A. File
B. Recordset
C. Database
D. document
Submitted by: Amna batool
Advertisement
Related Mcqs:
- When sharing data in Office, the __________ document is the document in which the data was first entered?
- A. source B. destination C. original D. primary...
- The Network is overloaded with enormous data sent by many computers within the network. The inability of the network to deliver the data is termed as __________ .
- A. Access control B. Congestion C. Error propagation D. Deadlock Submitted by: Malik Asghar Hussain...
- Distributed data entry means that data can be_____________?
- A. Entered at different locations where it originates B. Sent to different locations from a central place C. Accessed from different places know as distribution points D. Distributed through a network Submitted by: Anwar...
- Coded entries which are used to gain access to a computer system are called__________?
- A. Entry codes B. Passwords C. Security commands D. Code words...
- To access properties of an object, the mouse technique to use is_____________?
- A. Dragging B. dropping C. right-clicking D. shift-clicking...
- ____________is the measurement of things such as fingerprints and retinal scans used for security access?
- A. Biometrics B. Bio measurement C. Computer security D. Smart weapon machinery...
- What is the most common tool used to restrict access to a computer system?
- A. User logins B. Passwords C. Computer keys D. Access-control software...
- Fourth generation mobile technology provides enhanced capabilities allowing the transfer of both____________data, including full-motion video, high-speed internet access, and video conferencing.
- A. video data and information B. voice and non-voice C. music and video D. video and audio...
- MS-Access is program for____________?
- A. Presentation B. Documentation C. Calculation D. Data Base Submitted by: Mujahid Hussain Mirbahar...
- Which of the following is not used to access the web?
- A. ISDN B. Modem C. UDP D. DSL Submitted by: Dilawar Hussain...
Advertisement