. Which of the following statements about PivotChart View is NOT true?
Options: a. It is used to graphically summarize and analyze data in a table, query, or form.
b. It can be used to view different levels of detail or to specify custom layout.
c. It displays field values that can be switched for different views of data.
d. It displays the same information as a crosstab query, except for the counts and sums of numeric fields.
Options: (A)someone who subverts computer security without authorization or who uses technology (usually a computer or the Internet) for terrorism, vandalism (malicious destruction), credit card fraud, identity theft, intellectual property theft, or many other types of crime. (B) a person, usually not an expert in computer security, who breaks into computer systems by using prepackaged automated tools written by others. (C) hacker who utilizes technology to announce a political message. (D) None of these 2
Options: a group of fields stored in adjacent memory., the number of physical records per page., attributes grouped together by the same primary key., attributes grouped together by the same secondary key.
Options: modified value added, a term used in excise which is a new scheme of indirect taxes, scheme which allows a manufacturer to claim instant reimbursement of the excise duty paid on the raw materials used for the production of the final good, All of the above
2.Lehmanâ€™s Fifth Law (Lehman and Belady 1985) is
Options: (A)Organizational stability: Over a programâ€™s lifetime, its rate of development is approximately constant and independent of the resources devoted to system development. (B) Conservation of familiarity: Over the lifetime of a system, the incremental change in each release is approximately constant. (C) Large program evolution: Program evolution is a self-regulating process. (D) None of these 27
Options: allows the programmer to write base registers and displacements explicitly in the source program., is used to remember which of the general-purpose registers are currently available as base registers, and what base addresses they contain., allows multiple programs to reside in separate areas of core at the same time., is a term that refers to the control programs of an operating system.