NCO- Cyber Olympiad (SOF) Class 9: Questions 447 - 452 of 522

Access detailed explanations (illustrated with images and videos) to 522 questions. Access all new questions we will add tracking exam-pattern and syllabus changes. Subscription can be renewed yearly absolutely FREE! View Sample Explanation or View Features.

Rs. 350.00 or

How to register?

Question number: 447

» Computers » MS-Excel » Formula Auditing

Edit

Appeared in Year: 2011

MCQ▾

Question

What function is used to make sure that all conditions are true before showing a TRUE answer?

Choices

Choice (4) Response

a.

b.

c.

d.

Question number: 448

» Computers » MS-Excel » Data Tools

Edit

Appeared in Year: 2011

MCQ▾

Question

For a social studies report, Farhan needs to illustrate the products of Big Bazaar with pictures and comparison graphs. He would most likely use which software programs?

Choices

Choice (4) Response

a.

Clip art and drawing

b.

Graphing and clip art

c.

Spreadsheet and database

d.

Spreadsheet and statistical

Question number: 449

» Computers » Memory & Storage Devices

Edit
MCQ▾

Question

Examples of random access storage devices include ________.

Choices

Choice (4) Response

a.

Core and disk

b.

Magnetic tape and punched cards

c.

Disk and magnetic tape

d.

Paper tape and punched cards

Question number: 450

» Computers » Internet and Email

Edit
MCQ▾

Question

Obtaining unauthorized access to other’s systems in a network or internet through skills, tactics and detailed knowledge is called ________.

Choices

Choice (4) Response

a.

Cracking

b.

Sharing

c.

Mailing

d.

Hacking

Question number: 451

» Computers » Software

Edit
MCQ▾

Question

What is the name given to all the programs inside the computer which make it usable?

Choices

Choice (4) Response

a.

Application software

b.

System software

c.

Firmware

d.

Shareware

Question number: 452

» Computers » Internet and Email

Edit
MCQ▾

Question

________ software is a computer program that attempts to identify, neutralize or eliminate malicious software.

Choices

Choice (4) Response

a.

Firewall

b.

Antivirus

c.

Popup blocker

d.

All of the above