A computer program that gathers information about a person or organization without their knowledge or consent is known as?
Which of the file organization methods can be accessed both randomly and sequentially?
Effects of file insecurity include the following except?
The following actions are sources of breaches in computing except?
In BCD encoding system, 25, will be represented as?
Multiply 101\(_2\) by 11\(_2\)
A bit as used in computing in digital communication is?
Which of the options labeled I to IV give two stages involved in booting?
I. Power On self test II. Loading of Operating System IIl. Loading of email IV. Power On Safe Mode
The disk operating system will label three hard drives as?
After several ‘save’ and ‘delete’ operations, there remain many scattered areas of data too small to be used productively. This describes?
Data that is copied from an application is stored in the?
Which of the following is true when data maintained in MS Excel workbook is linked to a word document? The word document
Spreadsheet packages can be used for? .
A cell with a red triangle in the top-right comer in a spreadsheet application signifies?
In Microsoft PowerPoint, two kinds of sound effect files that can be added to a presentation are?
To hold row and column titles in places so that they do not scroll when the user scrolls a worksheet, click the?
One major difference between paper spreadsheet and electronic spreadsheet is?
In MS Excel, the cell that contains the pointer or cursor is called?
The major advantage of free software is that it is?
What type of network is represented in Figure 2?
To send a created MS PowerPoint document using email to a user, the document can be added as?