Кормораздатчик мобильный электрифицированный: схема и процесс работы устройства...
История развития пистолетов-пулеметов: Предпосылкой для возникновения пистолетов-пулеметов послужила давняя тенденция тяготения винтовок...
Топ:
Основы обеспечения единства измерений: Обеспечение единства измерений - деятельность метрологических служб, направленная на достижение...
Организация стока поверхностных вод: Наибольшее количество влаги на земном шаре испаряется с поверхности морей и океанов...
Эволюция кровеносной системы позвоночных животных: Биологическая эволюция – необратимый процесс исторического развития живой природы...
Интересное:
Финансовый рынок и его значение в управлении денежными потоками на современном этапе: любому предприятию для расширения производства и увеличения прибыли нужны...
Как мы говорим и как мы слушаем: общение можно сравнить с огромным зонтиком, под которым скрыто все...
Распространение рака на другие отдаленные от желудка органы: Характерных симптомов рака желудка не существует. Выраженные симптомы появляются, когда опухоль...
Дисциплины:
2023-01-16 | 30 |
5.00
из
|
Заказать работу |
|
|
● application software.
o system software.
o operating system software.
o platform software.
Servers are computers that provide resources to other computers connected to a:
o mainframe
o supercomputer
● network
o client
Is data that has been organized or presented in a meaningful way.
o A process
● Information
o Software
o Storage
All of the following are examples of real security and privacy risks EXCEPT:
o Viruses
o Identity theft.
o Hackers
● Spam
The set of instructions that tells the computer what to do is
o Softcopy
● Software
o Hardware
o Hardcopy
Personal computers can be connected together to form a
o server
● network
o supercomputer
o enterprise
The steps and tasks needed to process data, such as responses to questions or clicking an icon, are called:
● instructions
o operating system
o application software
o system unit
9. The operating system is the most common type of ____________ software.
● system
o communication
o application
o word-processing
The ability to recover and read deleted or damaged files from a criminals computer is an example of a law enforcement specialty called:
o simulation
o animation
o robotics
● computer forensics.
Computer software includes
o Packaged programs
o Application programs
o Operating system programs
● All of these
The Operating System Manages
o Processes
o Memory
o Disks and I/O devices
● All of the above
Allocation of a resources in a time dependent manner to several program simultaneously called
o multi user
o multi tasking
● time sharing
o None of these
Data that are accumulated and processed in group called
o Group processing
● Batch Processing
o Time sharing
o None of these.
15. Multiprocessing supports more then one_____ at the same time
o User
● Process
o Hardware
o None of these.
Which of the following are true about firewalls?
o Follows a set of rules
o Can be either a hardware or software device
o Filters network traffic
● All the above
The process of transferring files from a computer on the Internet to your computer is called
o Uploading
o Forwarding
o FTP
● Downloading
A person who uses his expertise to gain access to other people's computers to get information illegally or to cause damage is a
o Programmer
o Analyst
o Spammer
● Hacker
What is the commonly used unit for measuring the sped of data transmission?
o Mega Hertz
o Characters per second
o Nano seconds
● Bits per second
Blue tooth' technology allows
o Satellite communication
|
● Wireless communication between equipments
o Signal transmission on mobile phones only
o Landline phone to mobile phone communication
All of the following statements concerning windows are true EXCEPT:
● windows are an example of a command-driven environment.
o windows can be resized and repositioned on the desktop.
o more than one window can be open at a time.
o toolbars and scrollbars are features of windows.
Verification of a login name and password is known as:
o configuration
o accessibility
● authentication
o logging in
Is the ability of an operating system to control the activities of multiple programs at the same time.
o Streamlining
o Multiuser
● Multitasking
o Simulcasting
The operating system does all of the following EXCEPT:
o provide a way for the user to interact with the computer.
o manage the central processing unit (CPU).
o manage memory and storage.
● enable users to perform a specific task such as document editing.
25. In MS-Access press CTRL+O to
o Open a new database
● Open an existing database
o Exit MS-Access
o None of these
26. Which symbol must all formula begin with in MS Access query:
o @
● :
o +
o %
27. Functional Dependencies are the types of constraints that are based on______
● Key
o Key revisited
o Superset key
o None of these
28. Which forms are based on the concept of functional dependency:
o 1NF
o 2NF
● 3NF
o 4NF
Empdt1(empcode, name, street, city, state,pincode).For any pincode, there is only one city and state. Also, for given street, city and state, there is just one pincode. In normalization terms, empdt1 is a relation in
o 1 NF only
● 2 NF and hence also in 1 NF
o 3NF and hence also in 2NF and 1NF
o BCNF and hence also in 3NF, 2NF and 1NF
30. A ________ in a table represents a relationship among a set of values.
o Column
o Key
● Row
o Entry
31. For each attribute of a relation, there is a set of permitted values, called the ________ of that attribute.
● Domain
o Relation
o Set
o Schema
|
|
Организация стока поверхностных вод: Наибольшее количество влаги на земном шаре испаряется с поверхности морей и океанов (88‰)...
История развития хранилищ для нефти: Первые склады нефти появились в XVII веке. Они представляли собой землянные ямы-амбара глубиной 4…5 м...
Типы сооружений для обработки осадков: Септиками называются сооружения, в которых одновременно происходят осветление сточной жидкости...
Опора деревянной одностоечной и способы укрепление угловых опор: Опоры ВЛ - конструкции, предназначенные для поддерживания проводов на необходимой высоте над землей, водой...
© cyberpedia.su 2017-2024 - Не является автором материалов. Исключительное право сохранено за автором текста.
Если вы не хотите, чтобы данный материал был у нас на сайте, перейдите по ссылке: Нарушение авторских прав. Мы поможем в написании вашей работы!