Information-Technology Related Question Answers

1726. Watermark is available on:?





1727. Background color or picture is applied from _____menu:?





1728. On an excel sheet the active cell is indicated by:?






1729. What is created when you use F11 shortcut key while creating a chart in MS Excel:?






1730. What is the advantage of using a spread sheet:?





1731. Which of the following can you print:?





1732. Which one of the following is the easiest method to select a column:?





1733. What do you press so that the cell accept your typing as its contents:?






1734. A device used for capturing an image (any drawing or photo) so that it can be stored on a computer is _______:?






1735. An error in a computer program is known as _______:?






1736. Access - control based on a person's fingerprints is an example of _____:?






1737. The patterns of printed lines on most products are called _____:?






1738. Most mail programs automatically complete the following two parts in an email?





1739. The computer's capability of distinguishing spoken words is called _____:?






1740. Which of the following is an advantage of mounting an application on the web?






1741. The first page of a website is called the _____:?






1742. ERP is an acronym for ______:?






1743. The software that allows users to surf the Internet is called a/an _____:?






1744. The issues that deal with the collection and use of data about individual is _____:?






1745. A term related to sending data to a satellite is _____:?






1746. Online documents containing underlined phrases or icons that a user can click in order to move immediately to related parts of the current document or to other documents with related information is called ______:?






1747. Physical security is concerned with protecting computer hardware from human tampering and natural disasters and _____security is concerned with protecting software from unauthorized tampering or damage:?






1748. Hackers _______:?






1749. Unauthorized copying of software to be used for personal gain instead of for personal backup is called ______:?






1750. Junk e-mail is also called _____:?






Terms And Service:We do not guarantee the accuracy of available data ..We Provide Information On Public Data.. Please consult an expert before using this data for commercial or personal use | Powered By:Omega Web Solutions
© 2002-2017 Omega Education PVT LTD...Privacy | Terms And Conditions
Question ANSWER With Solution