Security breaches in computing cannot be prevented through the use of?

3 years ago

A. antivirus B. encryption C. firewall D. firmware Correct Answer: Option A - antivirus

One safety measure to consider in a computer room is?

3 years ago

A. arranging the chairs in the room together B. keeping liquid within the room C. closing the door always D.…

The use of the internet to perform illegal activities is generally called?

3 years ago

A. cyber crime B. packet sniffing C. phishing D. spamming Correct Answer: Option A - cyber crime

The erratic movement of the mouse pointer is usually caused by?

3 years ago

A. damaged driver B. dirty mouse ball C. improper connection of mouse cable D. outdated driver Correct Answer: Option A…

One precautionary measure taken when cleaning a monitor is?

3 years ago

A. plugging of power supply cable B. spraying a windows cleaner on the monitor C. unplugging the power supply cable…

Web design packages includes the following except?

3 years ago

A. Macromedia Dreamweaver B. iWeb C. Front Page D. Adobe PageMaker Correct Answer: Option D - Adobe PageMaker

To show the whole presentation in Microsoft PowerPoint 2007; select slide show from the

3 years ago

A. design tab B. home tab C. title bar D. menu bar Correct Answer: Option D - menu bar

The correct order of the steps taken in creating a database from the database template in MS Access 2007 is

3 years ago

A. click on the Office button --> click New --> choose a database of your choice B. click New -->…

The feature of a word document that shows the page; number of words and errors found in a document is the

3 years ago

A. menu bar B. scroll bar C. status bar D. title bar Correct Answer: Option C - status bar

The field in a database which uniquely identifies each record is called a?

3 years ago

A. composite key B. foreign key C. local key D. primary key Correct Answer: Option D - primary key