Word processing, spreadsheet, and photo-editing are examples of: — КиберПедия 

Кормораздатчик мобильный электрифицированный: схема и процесс работы устройства...

История развития пистолетов-пулеметов: Предпосылкой для возникновения пистолетов-пулеметов послужила давняя тенденция тяготения винтовок...

Word processing, spreadsheet, and photo-editing are examples of:

2023-01-16 30
Word processing, spreadsheet, and photo-editing are examples of: 0.00 из 5.00 0 оценок
Заказать работу

● application software.

o   system software.

o   operating system software.

o   platform software.

Servers are computers that provide resources to other computers connected to a:

o mainframe

o   supercomputer

●   network

o   client

Is data that has been organized or presented in a meaningful way.

o A process

●   Information

o   Software

o   Storage

All of the following are examples of real security and privacy risks EXCEPT:

o Viruses

o   Identity theft.

o   Hackers

●   Spam

The set of instructions that tells the computer what to do is

o Softcopy

●   Software

o   Hardware

o   Hardcopy

Personal computers can be connected together to form a

o server

●   network

o   supercomputer

o   enterprise

The steps and tasks needed to process data, such as responses to questions or clicking an icon, are called:

● instructions

o   operating system

o   application software

o   system unit

9. The operating system is the most common type of ____________ software.

● system

o   communication

o   application

o   word-processing

The ability to recover and read deleted or damaged files from a criminals computer is an example of a law enforcement specialty called:

o simulation

o   animation

o   robotics

●   computer forensics.

Computer software includes

o   Packaged programs

o   Application programs

o   Operating system programs

●   All of these

The Operating System Manages

o Processes

o Memory

o Disks and I/O devices

● All of the above

Allocation of a resources in a time dependent manner to several program simultaneously called

o multi user

o multi tasking

● time sharing

o None of these

Data that are accumulated and processed in group called

o Group processing

● Batch Processing

o Time sharing

o None of these.

15. Multiprocessing supports more then one_____ at the same time

o User

● Process

o Hardware

o None of these.

Which of the following are true about firewalls?

o Follows a set of rules

o Can be either a hardware or software device

o Filters network traffic

● All the above

 

The process of transferring files from a computer on the Internet to your computer is called

o Uploading

o Forwarding

o FTP

● Downloading

A person who uses his expertise to gain access to other people's computers to get information illegally or to cause damage is a

o Programmer

o Analyst

o Spammer

● Hacker

What is the commonly used unit for measuring the sped of data transmission?

o Mega Hertz

o   Characters per second

o   Nano seconds

●   Bits per second

Blue tooth' technology allows

o Satellite communication

● Wireless communication between equipments

o Signal transmission on mobile phones only

o Landline phone to mobile phone communication

All of the following statements concerning windows are true EXCEPT:

● windows are an example of a command-driven environment.

o windows can be resized and repositioned on the desktop.

o more than one window can be open at a time.

o toolbars and scrollbars are features of windows.

Verification of a login name and password is known as:

o configuration

o accessibility

● authentication

o logging in

Is the ability of an operating system to control the activities of multiple programs at the same time.

o Streamlining

o Multiuser

● Multitasking

o Simulcasting

The operating system does all of the following EXCEPT:

o provide a way for the user to interact with the computer.

o manage the central processing unit (CPU).

o manage memory and storage.

● enable users to perform a specific task such as document editing.

25. In MS-Access press CTRL+O to

o Open a new database

● Open an existing database

o Exit MS-Access

o None of these

26. Which symbol must all formula begin with in MS Access query:

o @

● :

o +

o %

27. Functional Dependencies are the types of constraints that are based on______

● Key

o Key revisited

o Superset key

o None of these

28. Which forms are based on the concept of functional dependency:

o 1NF

o 2NF

● 3NF

o 4NF

Empdt1(empcode, name, street, city, state,pincode).For any pincode, there is only one city and state. Also, for given street, city and state, there is just one pincode. In normalization terms, empdt1 is a relation in

o 1 NF only

● 2 NF and hence also in 1 NF

o 3NF and hence also in 2NF and 1NF

o BCNF and hence also in 3NF, 2NF and 1NF

30. A ________ in a table represents a relationship among a set of values.

o Column

o Key

● Row

o Entry

31. For each attribute of a relation, there is a set of permitted values, called the ________ of that attribute.

● Domain

o Relation

o Set

o Schema


Поделиться с друзьями:

Организация стока поверхностных вод: Наибольшее количество влаги на земном шаре испаряется с поверхности морей и океанов (88‰)...

История развития хранилищ для нефти: Первые склады нефти появились в XVII веке. Они представляли собой землянные ямы-амбара глубиной 4…5 м...

Типы сооружений для обработки осадков: Септиками называются сооружения, в которых одновременно происходят осветление сточной жидкости...

Опора деревянной одностоечной и способы укрепление угловых опор: Опоры ВЛ - конструкции, предназначен­ные для поддерживания проводов на необходимой высоте над землей, водой...



© cyberpedia.su 2017-2024 - Не является автором материалов. Исключительное право сохранено за автором текста.
Если вы не хотите, чтобы данный материал был у нас на сайте, перейдите по ссылке: Нарушение авторских прав. Мы поможем в написании вашей работы!

0.009 с.