Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1) Which of the following doesn’t form part of the elements which compose a table:

A. Table
B. Table Column
C. Table Row
D. Table Data

problem 2) A _______ permits data to be held together with its relationship to other information:

A. System
B. Database
C. Computer
D. Software

problem 3) EDI stands for:

A. Electronic data information
B. Electric data interchange
C. Electronic data interchange
D. Electric data Information

problem 4) ______ is a program which simulates human reasoning:

A. Expert System
B. Information System
C. Special System
D. Professional System

problem 5) Which of the following is desktop publishing software used to create publication documents:

A. Microsoft Word
B. Microsoft Access
C. Microsoft PowerPoint
D. Microsoft Publisher

problem 6) Which of the following kind of scanner is the most common one:

A. Handheld Scanner
B. Drum Scanner
C. Flatbed Scanner
D. Photo Scanner

problem 7) A frustrated employee who cracks his manager’s password so as to access confidential information, can be categorised as which type of threat:

A. Inside Threat
B. Internal Threat
C. Outside Threat
D. External Threat

problem 8) The _____ can be used to protect computer power supply:

A. Uninterrupted Power Supply
B. Uninterrupted Power Service
C. Unattended Power Supply
D. Unattended Power Service

problem 9) _______ are threats which are caused non-intentionally by users of computer system:

A. Malicious Threats
B. Deliberate Threats
C. Non-Malicious Threats
D. Accidental Threats

problem 10) A computer virus which hides within code of another program and wreak havoc to any form of data is called as:

A. Boot Sector Virus
B. File Infector
C. Macro Virus
D. Register Virus

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M96072

Have any Question? 


Related Questions in Computer Engineering

Compare and contrast the protocol field at the network

Compare and contrast the protocol field at the network layer with the port numbers at the transport layer. What is their common purpose? Why do we need two port-number fields but only one protocol field? Why is the size ...

Descriptionthis assignment will provide you with practice

Description This assignment will provide you with practice using arrays. Your job is to build a simple Recommender System, similar to the one that Netflix (an online movie-rental service) uses to recommend movies to cust ...

The truck-assembly division of a large company produces two

The truck-assembly division of a large company produces two different models: the Aztec and the Bronco. Their basic operation consists of separate assembly departments: drive-train, coachwork, Aztec final, and Bronco fin ...

Create a c program that computes the areas of rectangles

Create a C++ program that computes the areas of rectangles and tells the user which rectangle has the greatest area, or if the areas are the same. Create a C++ program that calculates the gross cost and net cost for call ...

Database design consider the following supply chain

Database design . Consider the following Supply Chain information system description. The system should support a collaborative supply chain composed of suppliers, manufacturers, shippers, and end customers. Items of dif ...

A discrete elevator can sense the following information

A discrete elevator can sense the following information about its world: 1. What floor the elevator is stopped at. 2. What floors passengers in the elevator want to go to. 3. What floors passengers outside of the elevato ...

1 implement a loop that prompts a user to enter a number

1. Implement a loop that prompts a user to enter a number between 1 and 10, giving three tries to get it right 2. Sometimes students write programs with instructions such as "Enter data, 0 to quit" and that exit the data ...

In an 80211 communication the size of the payload frame

In an 802.11 communication, the size of the payload (frame body) is 1200 bytes. The station decides to fragment the frame into three fragments, each of 400 payload bytes. Answer the following questions: a. What would be ...

Use the fdm to calculate the characteristic impedance of

Use the FDM to calculate the characteristic impedance of the high-frequency, air-filled rectangular transmission line

1 in an internet we change the lan technology to a new one

1. In an internet, we change the LAN technology to a new one. Which layers in the TCP/IP protocol suite need to be changed? 2. Assume that an application-layer protocol is written to use the services of UDP. Can the appl ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro