The use of the internet to perform illegal activities is generally called
The erratic movement of the mouse pointer is usually caused by
One precautionary measure taken when cleaning a monitor is
Figure 4 shows CorelDraw tool bar. The part labeled I is used to
Web design packages includes the following except
To show the whole presentation in Microsoft PowerPoint 2007, select slide show from the
The correct order of the steps taken in creating a database from the database template in MS Access 2007 is
The field in a database which uniquely identifies each record is called a
The formula to calculate the average of a given range of data from cell B2 to cell D4 in a Microsoft Excel worksheet is
S/N | A | B | C | D | E | F | G | H |
1 | STAFF | DAYS | ITEMS SALES (N) | ITEMS SALES (N) | ITEMS SALES (N) | ITEMS SALES (N) | ITEMS SALES (N) |
ITEMS SALES (N) |
2 | JOY | MON | 208 | 300 | 500 | 400 | 300 | 158 |
3 | AKIN | TUE | 300 | 200 | 500 | 400 | 200 | 200 |
4 | KEN | WED | 400 | 300 | 400 | 500 | 100 | 300 |
Figure 3
The highest sale by Joy is recorded in cell
Figure 2 shows a dialog box from Microsoft Word application. Use it to answer question 19
Which of the following command shortcuts can be used to display the dialog bax in Figure when the application is running?
The feature of a word document that shows the page, number of words and errors found in a document is the
An operating systemthat enables more than one user to access the same data is called
Use Figure 1 to answer question 16
To visit the previous page using the interface in Figure 1, the user will click on the part labeled
The following software are web browsers except
Mr Francis has an office complex with 20 rooms. What type of network is suitable for connecting all the computers in their various rooms into a single network?
The protocol for transferring file(s) from one machine to another is
Which of the following file organizations requires primary Key?
When information is conveyed from one space to another, it is referred to as information
Which of the following actions is not a source of computer virus?
The manipulation of digitalized information by computer or other electronic equipment is known as