. You can embed a Microsoft Word tale in a slide by
Options: a. Clicking the insert new slide button on the standard toolbar, then double clicking table b. Clicking the insert Microsoft word table button on the formatting toolbar c. Clicking the insert Microsoft word table button on the standard toolbar d. A and c
Options: (A)Hazard cannot arise due system design. (B) The probability of the event occurring which create a hazard. (C) An assessment of the worst possible damage, which could result from a particular hazard. (D) A condition with the potential for causing or contributing to an accident. 19
Options: (A)The process of finding the right formal representation of a certain body of knowledge in order to represent it in a knowledge-based system (B) It automatically maps an external signal space into a systemâ€™s internal representational space. They are useful in the performance of classification tasks. | 121 (C) A process where an individual learns how to carry out a certain task when making a transition from a situation in which the task cannot be carried out to a situation in which the same task under the same circumstances can be carried out. (D) None of these 5
Options: (A)The actual discovery phase of a knowledge discovery process (B) The stage of selecting the right data for a KDD process (C) A subject-oriented integrated timevariant non-volatile collection of data in support of management (D) None of these 2
Which of the following is not true of a magnetic disk?
Options: It is expensive relative to magnetic tape, It provides only sequential access to stored data, Users can easily update records by writing over the old data, It does not provide an automatic audit trail
Options: (A)a prepared application that takes advantage of a known weakness. (B) a tool used to quickly check computers on a network for known weaknesses. (C) an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network. (D) a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access. 1
Which one of the following phrasers best describes flux density?
Options: The concentration of lines of magnetic force, The rate of change of the number of lines of magnetic force, The opposition to a build-up of magnetic fields, The force that maintains lines of force