Sunday

The following actions are sources of breaches in computing except?

A. carelessness B. hackers' threat. C. piracy. D. viruses. Correct Answer: Option A - carelessness

3 years ago

In BCD encoding system; 25; will be represented as?

A. 01100101 B. 01010110. C. 00100101. D. 0101001. Correct Answer: Option C - 00100101

3 years ago

A bit as used in computing in digital communication is?

A. a decimal digit. B. an octal digit. C. a bin digit. D. .a hexadecimal digit. Correct Answer: Option C…

3 years ago

Which of the options labeled I to IV give two stages involved in booting?

I. Power On self-test II. Loading of Operating System IIl. Loading of email IV. Power On Safe Mode   A.…

3 years ago

The disk operating system will label three hard drives as?

A. A, B and C. B. C, D and E. C. B, C and D D. F, G and H.…

3 years ago

After several ‘save’ and ‘delete’ operations, the too small be used productively. This describes?

A. utilization. B. protection. C. fragmentation. D. backing up. Correct Answer: Option A - utilization

3 years ago

Data that is copied from an application is store the?

A. clipboard. B. driver. C. prompt. D. terminal. Correct Answer: Option A - clipboard

3 years ago

Which of the following is true when data maintained in MS Excel workbook is linked to a word document? The word document

A. cannot be edited. B. must contain a hyperlink. C. contains a copy of the actual data. D. contains a…

3 years ago

Spreadsheet packages can be used for?

A. database and painting. B. drawing and painting. C. budgeting and inventory. D. word processing and drawing Correct Answer: Option…

3 years ago

A cell with a red triangle in the top-right comer in a spreadsheet application signifies?

A. an error in the cell. B. a comment associated with the cell. C. that the font colour for the…

3 years ago