Computers and Technology, 04.09.2020 14:01 maddieberridgeowud2s
IT Test-4 M. M-40 (HSR CLASS 10TH C)
Hi ADITYA, when you submit this form, the owner will be able to see your name and email address.
1. is the standard filename extension of database in MS Office Access 2010. 1 Mark
.accdb
.pdf
.odt
.data
2.Which data type has the largest storage capacity. 1 Mark
Text
Hyperlink
Memo
Attachment
3.To quit the MS Access application, click on the file tab and select the. 1 Mark
Close
Exit
Quit
None of these
4. includes commands which help in maintaining the rights, permissions and security of the database. 1 Mark
DCL
TCL
SQL
5.When a new database is created an empty table gets created by MS Access, called as. 1 Mark
Data table
Table 1
Table
6.The shortcut key to open Ease of Access Center option is . 1 Mark
Windows key+ V
Windows keys+ U
Windows key + P
7.The TCP/ IP uses switching technique to transfer message through internet. 1 Mark
Message
Circuit
Packet
8.Ebuddy is an example of IM software. 1 Mark
Web based
Application based
9.Camera option in hangout is used for . 1 Mark
Voice calling
Video calling
None of these
10. is used to transmit the data only in one direction. 1 Mark
Star topology
bus topology
hybrid topology
11.we can design our blog post without knowing HTML by clicking on the tab. 1 Mark
Preview
HTML
Visual
12.Which view is used to compose the post? 1 Mark
source
Edit
Preview
13. are those reservation which are confirmed on the spot. 1 Mark
Live Reservation
Non- Live Reservation
14.The command for renaming a database falls under data language. 2 marks
15.While creating a table in the Design view, key is used to move from the field column to data type. 2 marks
16.The is a sort of check on the table that every record in the table is unique. 2 marks
17.The detail section is where you place the controls that make up the of the report. 2 marks
18.The rows in a table are called and the columns in a table are called. 2 marks
19.The process of selling and buying products over the internet is called. 2 marks
20.A set of rules used to communicate in a network is called. 2 marks
21.Making sure that your data is adds another layer of security around your data. 2 marks
22.Click on the tab to start making your first blog post. 2 marks
23.A global interconnection of computer network around the world is known as the . 2 marks
24.Favorites are sited which you visit quite often. 1 mark
True
False
25.The computer where your blog is stored is called the host. 1 mark
True
False
26.Roboform is not a password manager software. 1 mark
True
false
27.To publish your offline post, you need to be connected to the internet. 1 mark
True
plese answer
Answers: 2
Computers and Technology, 22.06.2019 14:40
You begin your first day of responsibilities by examining the recent is security breach at gearup to get ideas for safeguards you will take. at gearup, criminals accessed the company's improperly-secured wireless system and stole customers' credit card information as well as employee social security numbers. what kind of computer crime did gearup face?
Answers: 3
Computers and Technology, 23.06.2019 06:20
What is a point-in-time measurement of system performance?
Answers: 3
Computers and Technology, 23.06.2019 13:30
Font size, font style, and are all aspects of character formatting.
Answers: 2
Computers and Technology, 24.06.2019 07:20
3pointsyou've found an image you want to insert into your slide presentation. youwant to make the image look more gray so that it looks like an older imagewhat would you need to adjust? 0.00o a. sizeo b. hueo c. contrasto d. tones
Answers: 2
IT Test-4 M. M-40 (HSR CLASS 10TH C)
Hi ADITYA, when you submit this form, the owner will be able t...
Mathematics, 09.12.2020 20:00
Business, 09.12.2020 20:00
English, 09.12.2020 20:00
Mathematics, 09.12.2020 20:00
History, 09.12.2020 20:00
Chemistry, 09.12.2020 20:00
English, 09.12.2020 20:00
Mathematics, 09.12.2020 20:00