1. [SLC 2065 S]
|
2. [SLC 2066]
|
||
a) MS-ACCESS
|
(d) analyze and
present data in a printed format
|
a) Default value
|
(c) 255
Characters
|
b) Data update
|
(b) Query
|
b) Fox Pro
|
(d) Column Name
|
c) Field
|
(c) a piece of
information related to someone or something
|
c) Text
|
(b) DBMS
|
d)
Report
|
(a) Database
management software
|
d) Field
|
(a)Field
Properties
|
(-) collection of
related fields
|
(-) Search fast
|
3. [SLC 2066 S]
|
4. [SLC 2067]
|
||
a)
OLE
|
(d)
Formatted output
|
a) OLE
|
(d)Report
|
b)
Primary
key
|
(c)
Interface
|
b) Data entry
|
(a) Picture
|
c)
Form
|
(-)
64,000 characters
|
c) Indexing
|
(-) Table
|
d)
Report
|
(b)
Unique Field
|
d) Formatted printout
|
(c)Fast
searching
|
(a)
Picture
|
(b)Form
|
5. [SLC 2067 S]
|
6. [SLC 2068]
|
||
a)
MS-Access
|
(d)
DATA entry and editing interface
|
a) Indexing
|
(c) Limits the
value
|
b)
Query
|
(-)
Electronic Spreadsheet software
|
b) Report
|
(d) Data type
|
c)
Record
|
(b) Tool to
retrieve data from one or more than one tables
|
c) Validation
Rule
|
(-) Error messages
|
d)
Form
|
(a) Data base
management software
|
d) Hyper
link
|
(b) Final
output
|
(c) Collection
of related fields
|
(a) Search fast
|
7. [SLC 2068 S]
|
8. [SLC 2069]
|
||
a)
Indexing data
|
(d) Retrieves
data conditionally
|
a)
OLE
|
(d) Data Entry
|
b)
Long Text
|
(c) DBMS
|
b)
Hyperlink
|
(c)
Formatted Hardcopy
|
c)
Fox Pro
|
(b) Memo field
|
c)
Report
|
(a) 1 GB
|
d)
Query
|
(a) Searching
fast
|
d)
Form
|
(-) Up to 255
characters
|
(-) Report
|
(b) Up to 2048
characters
|
9. [SLC 2069 S]
|
10. [SLC 2070]
|
||||||||
a)
Report
|
(b) Data type
|
a)
Indexing Data
|
(d) Size upto 1
GB
|
||||||
b)
Currency
|
(d) Column
|
b)
Form
|
(c) Column of
datasheet
|
||||||
c)
Long Text
|
(a) Database
object
|
c)
Field
|
(-) Row on a datasheet
|
||||||
d)
Field
|
(-) Record
|
d)
OLE object
|
(a) Searching
Fast
|
||||||
(c) Memo
|
(b) Graphical
interface for data entry
|
||||||||
11. [SLC 2070 S]
|
12. [SLC 2071]
|
||||||||
a) dBASE
|
(c)OLE
|
a) Indexing data
|
(b)Final output
|
||||||
b) Primary key
|
(d)Memo
|
b) Report
|
(d)View data
|
||||||
c) Photo
|
(a)DBMS
|
c) Yes/No
|
(a)Searching fast
|
||||||
d) Long text
|
(b)Uniquely defined
|
d) Select query
|
(-)Picture
|
||||||
()Hyper links
|
(c)Data type
|
||||||||
13. [SLC 2072]
|
14. [SLC 2065] [SEE
2073]
|
||||||||
a) OLE
|
(c) Data Entry
|
a) Query
|
(d) Printed
format
|
||||||
b) Validation
Rule
|
(-) Stores data
|
b) Form
|
(c) Stores data
|
||||||
c) Form
|
(b) Limits the
value
|
c) Table
|
b) Allows view, edit, input data
|
||||||
d)
Indexing
|
(a) Data type
|
d) Report
|
(a) Extracts
selected record for view
|
||||||
(d) Easy to
search
|
(-) DBMS
|
||||||||
15. [SEE 2074]
|
16. [SEE 2075 U]
|
||||||||
a) Data
|
(b) Input,
view, edit data
|
a) Caption
|
(d) Logical data type
|
||||||
b) Form
|
(c) Formated
output
|
b) OLE
|
(-) Error Message
|
||||||
c) Report
|
(a) Collection
of raw facts
|
c) Data Redundancy
|
(b) Picture
|
||||||
d) Table
|
(-) Question to
the database
|
d) Yes/No
|
(a) Label for field
|
||||||
(d) Stores data in database
|
(c) Duplication of data
|
||||||||
17. [SEE 2075]
|
18. [SEE 2075 S2]
|
||
a) Yes / No
|
b) 4 bytes
|
a)
Table
|
d) Printed format
|
b) Long integer
|
d) MS Access object
|
b)
Primary Key
|
c) Allows viewing editing and inputting data
|
c) OLE
|
c) Picture
|
c)
Form
|
b) uniquely defined
|
d) Report
|
a) 1 bit
|
d)
Report
|
a) stores data
|
8 bytes
|
Extracts selected record for view
|
||
19. [SEE 2074 U]
|
20. [SEE 2073 U] [SEE
2071 S]
|
||
a) Form
|
b) Column on datasheet
|
a) Ms-Access
|
d) data entry and editing interface
|
b) Field
|
c) Data type
|
b) Query
|
- electronic spreadsheet software
|
c) Currency
|
a) Graphical interface for data entry
|
c) Record
|
b) tool to retrieve data from one or more
tables.
|
d) Query
|
- DBMS
|
d) Form
|
a) database management software
|
d) Retrieves data conditionally
|
c) collection of related fields
|
21. [SLC 2064]
|
22. [SEE 2073 U]
|
||
a) Radio Wave
|
(d) Device to connect network having
different technology
|
a) Network services
|
(d) Power protection device
|
b) Cyber
ethics
|
(c) power protection device
|
b) Infrared
|
(c) E-Banking
|
c) Spike guard
|
(-) internet
|
c) Internet services
|
(b) Transmission media
|
d) Gateway
|
(b) professionally guided principles
|
d) Volt Guard
|
(a) File sharing
|
(a) Wireless Media
|
23. [SLC 2065]
|
24. [SLC 2066]
|
||
a) Server
|
(c) HTTP
|
a) T-connector
|
(b)Network device
|
b) Node
|
(b) Work Station
|
b) Bridge
|
(d)Power protection
|
c) Protocol
|
(a) Main Computer
|
c) CD-ROM
|
(a)Coaxial cable
|
d) Coaxial Cable
|
(-) Repeater
|
d) Spike Guard
|
(c)Multimedia
component
|
(d) Communication Media
|
(-)Virus scanning
|
25. [SLC 2067]
|
26. [SLC 2068]
|
||
a) Satellite
|
(-)Multimedia
|
a) Microwave
|
(c)Multimedia
|
b) HTTP
|
(b)Protocol
|
b) Volt guard
|
(d)Protocol
|
c) Online business
|
(a)Unguided media
|
c) Sound card
|
(a)Unguided media
|
d) Fiber optics
|
(c)E-commerce
|
d) TCP/IP
|
(b)Power protection devices
|
(d)Guided media
|
(-)Guided media
|
27. [SLC 2069]
|
28. [SLC 2070]
|
||
a) RJ-45
|
(d)Multimedia
|
a) Combination of several
media
|
(c)Guided Media
|
b) WAN
|
(c)Duplicate copy
|
b) POP
|
(d)Power Protection Device
|
c) Back up
|
(-)Fiber optic cable
|
c) UTP
|
(a)Multimedia
|
d) Microphone
|
(a)Twisted pair cable
|
d) UPS
|
(b)Protocol used in e-mail
|
(b)Internet
|
(-)CD-ROM
|
29. [SLC 2071]
|
30. [SLC 2065 S]
|
||||||
a) E-commerce
|
(b)Power protection device
|
a) McAfee
|
(b)Supplies continuous power
|
||||
b) Volt guard
|
(a)Online shopping
|
b) UPS
|
(d)Internet protocol
|
||||
c) Satellite link
|
(c)WAN
|
c) Web Browser
|
(a)Antivirus software
|
||||
d) Sound card
|
(-)Optical fiber
|
d) TCP/IP
|
(c)Internet explorer
|
||||
(d)Multimedia
|
|||||||
31. [SLC 2066 S]
|
32. [SLC 2067 S]
|
||||||
a) Bandwidth
|
(b)ISP
|
a) Pictures in motions
|
(c)Guided media
|
||||
b) Internet
|
(-)FAT
|
b) TCP/IP
|
(a)animation
|
||||
c) Network
|
(a)bps
|
c) UTP
|
(d)Random Access Memory
|
||||
d) Software security
|
(d)NAV
|
d) Volatile memory
|
(-)CD-ROM
|
||||
(c)NIC
|
(b)Protocol used in Internet
|
||||||
33. [SLC 2068 S]
|
34. [SLC 2069 S]
|
||
a) LAN
|
(b)Within a city
|
a) Sound card
|
(d)WAN
|
b) MAN
|
(d)Internet protocol
|
b) Virus
|
(c)Internet explorer
|
c) UPS
|
(a)Within a room
|
c) Web browser
|
(a)Multimedia
|
d) IPX/SPX
|
(c)Power supply device
|
d) Satellite link
|
(b)damage or corrupt data
|
(-)Between countries
|
(-)Bridge
|
35. [SLC 2070 S]
|
36. [SLC 2071 S]
|
||||||||||||
a) TCP/IP
|
(c)Multimedia
|
a) Node
|
a) Workstation
|
||||||||||
b) Back up
|
(d)Web address
|
b) Server
|
d) HTTP
|
||||||||||
c) Sound card
|
(b)Software security
|
c) Coaxial cable
|
c) Communication media
|
||||||||||
d) URL
|
(a)Protocol
|
d) Protocol
|
b) Main computer
|
||||||||||
37. [SEE 2072]
|
38. [SEE 2073]
|
||||||||||||
a) Microwave
|
(c) Power protection
device
|
a) Malicious software
|
(c) UPS
|
||||||||||
b) UTP
|
(d) Protocol
|
b) Primary storage device
|
(a) virus
|
||||||||||
c) UPS
|
(a) Unguided media
|
c) Power protection device
|
(d) copyright
|
||||||||||
d) SMTP
|
(-) Internet
|
d) Intellectual property law
|
(b) RAM
|
||||||||||
(b) Guided media
|
e) Malicious software
|
(c) UPS
|
|||||||||||
39. [SEE 2074]
|
40. [SEE 2075 Upgrade]
|
||||||||||||
a) RJ 45 connector
|
(b) Duplicate copy
|
a) Microwave
|
(d) Protocol
|
||||||||||
b) Back up
|
(c) Multimedia
|
b) UTP
|
(c) Power protecting
device
|
||||||||||
c) Microphone
|
(a) Twisted pair cable
|
c) UPS
|
(a) Unguided media
|
||||||||||
d) Hub/switch
|
(-) Ring Topology
|
d) SMTP
|
(-) Internet
|
||||||||||
(d) Star Topology
|
(b) Guided media
|
||||||||||||
41. [SEE 2075]
|
42. [U1]
|
||||||||||||
a) Hub
|
(c) Communication
media
|
a) LAN
|
c)
Software security
|
||||||||||
b) TCP/IP
|
(a) Network connecting
device
|
b) Client/server
|
d)
Hardware security
|
||||||||||
c) UTP
|
(d) Windows NT
|
c)
Back up
|
a)
Network type
|
||||||||||
d) NOS
|
(b) Protocol
|
d) Fire control
|
b)
Network architecture
|
||||||||||
e)
|
Computer
Virus
|
||||||||||||
43. [SEE 2075 State 2]
|
44. [MFT 2075]
|
||
a) Backup
|
(d) Online shopping
|
Node
|
Powerful computer
|
b) Microphone
|
(a) Duplicate data
|
Protocol
|
d) Prevents gaining
access
|
c) Web browser
|
(-) Damage or corrupt
data
|
Scan disk
|
c) Checking for disk
error
|
d) E-commerce
|
(b) Multimedia
|
Firewall
|
a) Workstation
|
(c) Display of web
pages
|
b) Rules for network
communication
|
45. [SEE 2074 Upgrade]
|
|
a) BNC
|
(d) Two way
communication
|
b) URL
|
(b) Address of web
page
|
c) Online business
|
(a) Connector
|
d) Duplex
|
(c) E-commerce
|
(-) Protocol
|
Did you hear there is a 12 word phrase you can say to your crush... that will induce intense emotions of love and impulsive attraction to you deep inside his chest?
ReplyDeleteThat's because hidden in these 12 words is a "secret signal" that fuels a man's instinct to love, treasure and look after you with all his heart...
12 Words Will Trigger A Man's Desire Instinct
This instinct is so hardwired into a man's genetics that it will drive him to work better than ever before to take care of you.
Matter of fact, fueling this dominant instinct is absolutely binding to achieving the best possible relationship with your man that the second you send your man one of the "Secret Signals"...
...You will instantly notice him open his mind and heart to you in a way he haven't experienced before and he will distinguish you as the one and only woman in the universe who has ever truly understood him.