Computer Awareness Quiz Set 46

Dear contenders this set no. 46 consists of Questions And Answers for Computer Awareness with a brief explanation. So practice these Questions which are given in the form of Quiz. These Quizzes are useful for all competitive examinations.

Computer Awareness Quiz Set 46

1. Which software coordinates the interaction of technology devices_________

2. Which is a secondary memory device?

3. If you wanted to tell the database management system that a specific attribute contained numbers only, what would you need to set?

4. Which one of the following statements is false?

5. Which is considered a direct entry input device________

6. A(n) _________converts all the source code into machine code, creating an executable file.

7. The ________prevents unlawful access to voice communications by wire.

8. A _______ is anything that can cause harm.

9. Which function in an organization plans for information resources?

10. The color of an object is an example of a(n) ________

11. The rules of a language are called its __________.

12. JavaScript was developed by __________ to run inside of web pages.

13. This technology is used to convert XML into HTML.

14. A next-generation Web content development language, __________ typically refers to a suite of technologies that allow developers to store data in a readable format.

15. The __________ is a special database that holds information about the computers user, installed programs and hardware devices.

16. Which of the following is a good habit to get into when creating a worksheet?

17. What type of graphical model is used to define a database?

18. Microsoft’s Access and Corel’s Paradox are both examples of which type of software?

19. Which of the following contains information about the structure of a database?

20. What term is used to describe a collection of information that you can use to build reports or discover facts about an environment?

21. A router is a___________

22. What Excel tool allows you to create quickly and automatically summary data from a large data set?

23. A(n) __________ file contains information in an indexed and cross-linked format.

24. If you wished to limit what you would see on an Excel worksheet, what data function would you use?

25. What would you need to establish if you wanted to insure that the key in one database table was the same as a key in another database table?

26. __________ are text files containing OS commands.

27. To read the system messages and warnings, access the __________ in Windows.

28. If configured correctly, the __________ will prevent interaction with your computer after a specified time period.

29. Which of the following will not protect you from spam?

30. The __________ of a threat measures its potential impact on a system.



Please enter your comment!
Please enter your name here