subject

The data type represented by A is (A) Alphabet (B) Text (C) Number (D) Boolean Auto Number type is represented by the letter . (A) C (B) E (C) F (D) D
Which of the alphabets represents a Memo type? (A) C (B) E (C) B (D) D
Which of these is not a components of an ideal computer laboratory? (A) White marker board (B) Printers (C) Chairs and computer system (D) ATM
Which of these is not true in using the computer? (A) Good sitting habit must be exercised
(B) Using antiglare protection should be recommended (C) Monitor base must be positioned correctly (D) Avoid the use of ergonomic chairs
To create a table in MS-Access, which of the following cannot be employed?
(A) Datasheet view (B) Table Wizard (C) Design view (D) Form design
Caution taken by users to prevent avoidable danger or harm in the cause of using computer is referred to as ___ (A) Ethics (B) Computer Ethics (C) Precaution (D) Safety Measures
is a set of moral principles that regulate the use of computers. (A) Ethics (B) Computer Ethics (C) Precaution (D) Safety Measures
Computer ethics borders on all these but (A) intellectual property rights (B) Booting the computer (C) privacy concerns (D) how computers affect the society.
is not an MS-Access object? (A) Query (B) Form (C) Window (D) Report
Which database object is used to collect data about an entity for storage? (A) Query (B) Form (C) Window (D) Report
A computer program that walks users through creating a report in Access is known as . (A) Table Query (B) Table Form (C) Report Wizard (D) Table Report
The following are the examples of DBMS package EXCEPT (A) MySQL (B) Oracle (C) FoxPro (D) Microsoft Excel 
In a relational database, tuples are represented by the (A) Table (B) Cells (C) table rows (D) table columns
When database is presented in a table, the columns are technically referred to as (A) Fields (B) Cells (C) tuples (D) Objects
Choose the correct option: (A) Records are made up of fields (B) Fields are made up of records (C) Objects are made up of records (D) A record is not an object
Databases are represented as one or more tables and saved as a in storage media. (A) Table object (B) File (C) Datasheet (D) Information

A wizard that is capable of automatically creating almost all forms objects for you is known as (A) Database package (B) Database wizard (C) Query wizard (D) Form wizard
MS-Access can be used as application for MS SQL Server, Oracle programs that can be used as back ends. (A) Forward pass end (B) Query end (C) back and front ends (D) front end
A field in a record that uniquely identifies one record from another is called . (A) Key (B) column (C) Foreign (D) attribute

ansver
Answers: 1

Another question on Computers and Technology

question
Computers and Technology, 21.06.2019 21:00
Is it ok to use a does red wine clean the inside of a computer true or false
Answers: 2
question
Computers and Technology, 22.06.2019 00:30
Which of the following methods could be considered a “best practice” in terms of informing respondents how their answers to an on-line survey about personal information will be protected? respondents are informed that investigators will try to keep their participation confidential; however, confidentiality cannot be assured. respondents are informed that a research assistant will transfer all the research data to a password-protected computer that is not connected to the internet, via a usb flashdrive. the computer is located in a research team member’s office. the investigator uses the informed consent process to explain her institution’s method for guaranteeing absolute confidentiality of research data. the investigator uses the informed consent process to explain how respondent data will be transmitted from the website to his encrypted database without ever recording respondents’ ip addresses, but explains that on the internet confidentiality cannot be absolutely guaranteed.
Answers: 1
question
Computers and Technology, 22.06.2019 13:00
We as humans write math expression in infix notation, e.g. 5 + 2 (the operators are written in-between the operands). in a computer’s language, however, it is preferred to have the operators on the right side of the operands, i.e. 5 2 +. for more complex expressions that include parenthesis and multiple operators, a compiler has to convert the expression into postfix first and then evaluate the resulting postfix.write a program that takes an “infix” expression as input, uses stacks to convert it into postfix expression, and finally evaluates it. it must support the following operations: + - / * ^ % (example infix expression: (7 - 3) / (2 + 2)postfix expression: 7 3 - 2 2 + /result: 1guidelines: 1. you will need to use stacks in three placesa. one for the parenthesis check [char stack]b. one during infix to postfix [char stack]c. one during evaluation [int stack]for a and b above, you can use same array and same push, pop method as both ofthem are char. but for evaluation you have int stack and you might consider to createanother push pop method to handle it. maybe push_int, pop_int, etc. or find otherstrategy to utilize existing push pop method2. you can create a function for obtaining operator priority. that function should take anoperator as input and return its priority as an integer. this function will you a lot andreduce repeated code3. during evaluation you will need to convert char into integer. example for single digit: char c = '5'; int x = c - '0';
Answers: 2
question
Computers and Technology, 24.06.2019 13:00
If you add the following to the query grid in an access query, what is it called? salestaxamt: [salestaxrate]*[totalsale] formula calculated field total calculation
Answers: 2
You know the right answer?
The data type represented by A is (A) Alphabet (B) Text (C) Number (D) Boolean Auto Number type is...
Questions
Questions on the website: 13722362