A. File
B. Recordset
C. Database
D. document
Submitted by: Amna batool
Related Mcqs:
- When sharing data in Office, the __________ document is the document in which the data was first entered?
A. source
B. destination
C. original
D. primary - The Network is overloaded with enormous data sent by many computers within the network. The inability of the network to deliver the data is termed as __________ .
A. Access control
B. Congestion
C. Error propagation
D. DeadlockSubmitted by: Malik Asghar Hussain
- Distributed data entry means that data can be_____________?
A. Entered at different locations where it originates
B. Sent to different locations from a central place
C. Accessed from different places know as distribution points
D. Distributed through a networkSubmitted by: Anwar
- Coded entries which are used to gain access to a computer system are called__________?
A. Entry codes
B. Passwords
C. Security commands
D. Code words - To access properties of an object, the mouse technique to use is_____________?
A. Dragging
B. dropping
C. right-clicking
D. shift-clicking - ____________is the measurement of things such as fingerprints and retinal scans used for security access?
A. Biometrics
B. Bio measurement
C. Computer security
D. Smart weapon machinery - What is the most common tool used to restrict access to a computer system?
A. User logins
B. Passwords
C. Computer keys
D. Access-control software - Fourth generation mobile technology provides enhanced capabilities allowing the transfer of both____________data, including full-motion video, high-speed internet access, and video conferencing.
A. video data and information
B. voice and non-voice
C. music and video
D. video and audio - MS-Access is program for____________?
A. Presentation
B. Documentation
C. Calculation
D. Data BaseSubmitted by: Mujahid Hussain Mirbahar
- Which of the following is not used to access the web?
A. ISDN
B. Modem
C. UDP
D. DSLSubmitted by: Dilawar Hussain