. If you are working in English (US), Chinese or Japanese, Excel 2002 can speak data as you enter it, to help you verify accuracy. How do you activate this feature?
Options: a. Point to speech on the tools menu, and then click show text to speech toolbar. b. Click validation on the data menu c. Point to speech on the tools menu, and then click speech recognition d. All of above
To achieve AND effect when you are entering criteria in a query design window
Options: a. write criteria values vertically one in a row
b. write criteria values horizontally
c. Write criteria values in same field separated with AND
d. Write criteria values in same field separated with &
Options: an error-detecting code based on a summation operation performed on the bits to be checked., a check bit appended to an array of binary digits to make the sum of all the binary digits., a code in which each expression conforms to specific rules of construction, so that if certain errors occur in an expression, the resulting expression will not conform to the rules of construction and thus the presence of the errors is detected., the ratio of the number of data units in error to the total number of data units
Options: to create a place in the database for storage of scheme objects, rollback segments, and naming the data files to comprise the tablespace, to create a database trigger, to add/rename data files, to change storage, All of the above
9.The memory address of fifth element of an array can be calculated by the formula
Options: (A)LOC(Array)=Base(Array)+(5-lower boun(D), where w is the number of words per memory cell for the array (B) LOC(Array)=Base(Array)+(5-Upper boun(D), where w is the number of words per memory cell for the array (C) LOC(Array=Base(Array)+w(5-lower boun(D), where w is the number of words per memory cell for the array (D) None of the above 5
Options: Read the input from the slow-speed card reader to the high-speed magnetic disk, Specify, to the operating system, the beginning and end of a job in a batch, Allocate the CPU to a job, All of the above
Options: (A)a prepared application that takes advantage of a known weakness. (B) a tool used to quickly check computers on a network for known weaknesses. (C) an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network. (D) a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access. 1
7.A- Interface requirement: B-Interface testing: C-Interfaces design: 1- Requirements derived from the interfaces of existing system and developing system. 2- It detects faults that have been arise in the system because of interface errors or invalid assumptions about interface. 3-Activity concerned with the interfaces of the software system contained in the software requirements and software interface requirements documentation.
9.In system modeling : A-Model;B-Prototype;;1itâ€™s an abstract view of a system that ignores system details; 2-Itâ€™s an initial version of system software which givers end-users a concrete impression of the system capacities