. What happens when a user selects a record in a form and presses [Delete]?
Options: a. The record is deleted in the form and from its source table.
b. The record is deleted in the form, but not from its source table.
c. The record is neither deleted in the form, nor from its source table.
d. The record is not deleted in the form, but is deleted from its source table.
1.These computer uses the stored-program concept. Memory is used to store both program and data instructions and central processing unit (CPU) gets instructions and/ or data from memory. CPU, decodes the instructions and then sequentially performs them.
Options: (A)Single Program Multiple Data (SPMD) (B) Flynnâ€™s taxonomy (C) Von Neumann Architecture (D) None of these 3
Options: (A)someone who subverts computer security without authorization or who uses technology (usually a computer or the Internet) for terrorism, vandalism (malicious destruction), credit card fraud, identity theft, intellectual property theft, or many other types of crime. (B) a person, usually not an expert in computer security, who breaks into computer systems by using prepackaged automated tools written by others. (C) hacker who utilizes technology to announce a political message. (D) None of these 2
. You have got a bunch of digital holiday photo you want to put into a slide show. What the quickest method?
Options: a. Apply a multiple-picture layout to several slides, and use the clipart icon on the slides to import your picture b. On the insert menu, point to the picture, click from file, and select your picture in a group for each slide c. On the insert menu, point the picture and click new photo album d. All of the above
Options: (A)an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network. (B) a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access. (C) a toolkit for hiding the fact that a computerâ€™s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators. (D) None of these 1