Which of the following factors are responsible for present crisis in the jute industry in India?The decline in overseas marketInadequately supply of raw juteStiff competition from synthetic packing materials Select the correct answer from the codes given below
Options: I and II, I, II and III, I and III, II and III
5.Match the following : A- Maintenance control: B- Maintenance prediction: C- Maintenance process: 1-Cost of planning and scheduling hardware preventive maintenance, and software maintenance and upgrades, managing the hardware and software baselines, and providing response for hardware corrective maintenance. 2Predicting the number of change requires a system understanding and the relationship between the system and external environment. 3- It is triggered by a set of change requests from system users, management or customers.
. How can a user open the Expression Builder dialog box?
Options: a. By clicking the drop-down arrow on the Control Source property
b. By clicking the drop-down arrow of the Input Mask property in the Data tab
c. By clicking the Build button of the Input Mask in the Data tab
d. By clicking the Build button of the Control Source property in the Data tab
7.To insert a graphic of your companyâ€™s logo on a report
Options: (A)Click the image button on the toolbox and drag on the report to draw a place holder for the graphics (B) You canâ€™t. Microsoft Access wonâ€™t let you insert graphics files. (C) Select Insert > Picture from the menu (D) Select Tools > Insert Picture from the menu 8
Options: defines a source or destination of system data, identifies data flow, represents a process that transforms incoming data flow(s) into outgoing data flows, is a data store-data at rest, or a temporary repository of data
Options: (A)someone who subverts computer security without authorization or who uses technology (usually a computer or the Internet) for terrorism, vandalism (malicious destruction), credit card fraud, identity theft, intellectual property theft, or many other types of crime. (B) a person, usually not an expert in computer security, who breaks into computer systems by using prepackaged automated tools written by others. (C) hacker who utilizes technology to announce a political message. (D) None of these 2
The Parliament can restrict or abrogate by law, fundamental rights with respect to
Options: the members of the armed forces, the forces charged with the maintenance of public order, the persons employed in any bureau or other organization established by the state for purpose of intelligence, All of the above
Options: (A)is the hardware necessary to implement paging (B) stores pages at a specific location on disk (C) is useless when swapping is used (D) is the part of the operating system paging algorithm 27