MicroSoft Access on Computer Fundamentals related Questions and Answers - Page 3

Question 21 : Separate Read Write heads are required in which of these memory access schemes ?
1. Sequential Access
2. Random Access
3. Direct Access
4. None of these
View Answer   Discuss with Members

Question 22 : Your company receives internet access through a network or a gateway server. Which of the following devices is best suited to protect resources and subnet your LAN directly on the network server?
1. A multi-homed firewall
2. DSL modem
3. VLAN
4. A brouter that acts both as a bridge and a router
View Answer   Discuss with Members

Question 23 : A System in which a transaction access and updates a file quickly enough to affect the original decision making is called
1. Real time system
2. time sharing system
3. both of above
4. None of above
View Answer   Discuss with Members

Question 24 : Which of the following use routes with packet filtering rules to allow or deny access based on source address, destination address, or port number?
1. Packet Filtering Firewall
2. Router enhanced firewall
3. Application layer Firewall
4. IP enabled firewall
View Answer   Discuss with Members

Question 25 : The variables which can be accessed by all modules in a C program, are known as
1. Global variables
2. Local variables
3. External variables
4. Internal variables
View Answer   Discuss with Members

Question 26 : A type of semiconductor memory that usually has small capacity but very fast access is
1. PROM
2. ROM
3. RAM
4. Scratchpad
View Answer   Discuss with Members

Question 27 : A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a.
1. analyst
2. instant messenger
3. hacker
4. spammer
View Answer   Discuss with Members

Question 28 : To access properties of an object, the mouse technique to use is.
1. left-clicking
2. shift-clicking
3. dragging
4. right-clicking
View Answer   Discuss with Members

Question 29 : The difference between people with access to computers and the Internet and those without this access is known as the
1. Internet divide
2. Web divide
3. digital divide
4. cyberway divide
View Answer   Discuss with Members

Question 30 : .......... Is known as unauthorized access into others system.
1. Hacking
2. Encryption
3. Decryption
4. None of these
View Answer   Discuss with Members


View 21 - 30 of 32 Questions

* Be the First to Post a Comment.

Submit comment :


Captcha Image
Reload

Ask Question

Captcha Image
Reload

Note : Name and Email never shown.





Subscribe


Become a part of EducationForever. Subscribe to our FREE Newsletter