The name that the User gives to a document is referred to as:
a) name given
b) document given
c) file name
d) document identity
e) None of these

1 Answer

Answer :

c) file name

Related questions

Description : Online documents containing underlined phrases or icons that a user can click in order to move immediately to related parts of the current document or to other documents with related information is called ______: a) Hypermedia b) Hypertext c) HTML d) URL e) FTP

Last Answer : d) URL

Description : Which of the following is/are function of spell check in MS - Word: a) It displays the misspelled words in a dialog box b) Highlights the misspelled words in the document c) Allow user to either correct the misspell manually or select the correct spelling d) All of the Above e) None of The Above

Last Answer : d) All of the Above

Description : The operating system determines the manner in which all of the following occurs except a) user creation of a document b) user interaction with the processor c) printer output d) data displayed on the monitor e) None of these

Last Answer : b) user interaction with the processor

Description : Evidence contained in a document provided to prove that statements made in court are True is referred to as: a. Inadmissible evidence b. Illegally obtained evidence c. Hearsay evidence d. Direct evidence

Last Answer : c. Hearsay evidence

Description : What is output: a) what the processor gives to the user b) what the user gives to the processor c) what the processor gets from the user d) what the processor informs to the user e) None of The Above

Last Answer : a) what the processor gives to the user

Description : ______ a document means the file is transferred from another computer to your computer a) Uploading b) Really Simple Syndication c) Accessing d) Downloading e) None of these

Last Answer : b) Really Simple Syndication

Description : When scanning an irregular-sized identity document (larger than 8.5x14) be sure to?

Last Answer : What is the answer ?

Description : A collection of related instructions organized for a common purpose is referred to as A) File B) Database C) Program D) None of above

Last Answer : Answer : C

Description : Which of these statements highlights a valid privacy concern when working with large data sets? I. Data from multiple sources could be linked together to discover someone's identity. II. For access to location-based services, a ... . I and II only B. I only C. I and III only D. I, II and III

Last Answer : B. I only

Description : What is Output: a) What the processor takes from the user b) What the processor gives to the user c) What the processor gets from the user d) None of These

Last Answer : b) What the processor gives to the user

Description : What is Output: a) What the processor takes from the user b) What the processor gives to the user c) What the processor gets from the user d) None of These

Last Answer : b) What the processor gives to the user

Description : What is output? a) What the processor takes from the user b) What the user gives to the processor c) What the processor gets from the user d) What the processor gives to the user e) None of these

Last Answer : d) What the processor gives to the user

Description : PDF stands for: a) Portable Document File b) Portable Document Format c) Paired Drive Format d) None of These

Last Answer : b) Portable Document Format

Description : What is the file extension of MS - Word 2003 document: a) Dom b) Txt c) Doc d) None of The Above

Last Answer : c) Doc

Description : For creating a document, you use ..... command at File Menu. 1) Open 2) Close 3) New 4) Save

Last Answer : 3) New

Description : Which type of file is created by Word Processing Programs? 1) Database File 2) Storage File 3) Worksheet File 4) Document File

Last Answer : 4) Document File

Description : A computer checks the _____ of user names and passwords for 9 a match before granting access. 1) Website 2) Network 3) Backup file 4) Data base 5) None of these

Last Answer : Answer :4

Description : The principle of time sharing is 1) large numbers of users direct access to the computer for problem solving 2) large number of user for file sharing 3) both of above 4) none

Last Answer : large numbers of users direct access to the computer for problem solving

Description : The principle of time sharing is 1) large numbers of users direct access to the computer for problem solving 2) large number of user for file sharing 3) both of above 4) none

Last Answer : 1) large numbers of users direct access to the computer for problem solving

Description : The principle of time sharing is 1 large numbers of users direct access to the computer for problem solving 2 large number of user for file sharing 3 both of above 4 none

Last Answer : 1 large numbers of users direct access to the computer for problem solving

Description : Which file is used to store the user entered password? A. .exe B. .txt C. .iso D. .asm

Last Answer : D. .asm

Description : Design Phase consists of ……………………. 1. Identity the functions to be performed 2. Design the input/output and file design 3. Defining basic parameters for system design A) 1 & 2 B) 2 & 3 C) 1 & 3 D) 1, 2 & 3

Last Answer : D) 1, 2 & 3

Description : HTML is a markup language for describing Web document. HTML uses (a) pre_specified tags (b) user defined tags -Technology

Last Answer : (d) HTML uses fixed tags defined by the language.

Description : You should include a mailto function in the body of your document to allow user to respond to your Web page. -Technology

Last Answer : True The mailto function is used to send E-mails from the Website.

Description : The name attribute of the tag allows the user to create links within the same document. -Technology

Last Answer : True Because name attribute defines a name of a section in a document.

Description : ………….. is the rectangular area of the document window, where user can type his/her content. -Technology

Last Answer : Work area or Work spaceis the rectangular area of the document window, where user can type

Description : A program allows a user to design and publish a document using only a computer and a printer A. DTP B. PDF C. PPT D. DOC

Last Answer : A. DTP

Description : The primary goal of comparing a user manual with the actual behavior of the running program during system testing is to A. Find bugs in the program B. Check the technical accuracy of the document

Last Answer : B. Check the technical accuracy of the document

Description : ………………….. means coordinated effort, to communicate the information of the system written form. A) System documentation B) Resource required C) Development schedule D) User Document

Last Answer : A) System documentation

Description : Crime through Internet includes: a) Telemarketing b) Internet fraud c) Identity Theft d) Credit Card account thefts e) All of the Above f) None of These

Last Answer : e) All of the Above

Description : MIDI stands for: a) Memory in Digital Interface b) Musical Instructions and Digital Inteface c) Mouse Identity Development Interface d) Musical Instrument Digital Interface e) None of These

Last Answer : d) Musical Instrument Digital Interface

Description : _____are attempt by individuals to obtain confidential information from you by falsifying their identity: a) Phishing Trips b) Computer Viruses c) Spyware Scams d) Viruses e) Phishing Scams

Last Answer : a) Phishing Trips

Description : The attributes of a file are. a. Name b. Identifier c. Types d. Location e. Size f. Protection g. Time, date and user identification h. Allof these

Last Answer : h. Allof these

Description : Which of the following layer protocols are responsible for user and theapplicationprogrammesupport such aspasswords, resource sharing, file transfer and network management? A. Layer 7 protocols B. Layer 6 protocols C. Layer 5 protocols D. Layer 4 protocols E. None of the above

Last Answer : Layer 7 protocols

Description : What do you call the document that gives details about your qualifications and work experience?

Last Answer : RESUME

Description : FTP is referred to as (a) Force Transfer Protocol (b) File Transport Protocol (c) File Transfer Partition -Technology

Last Answer : (d) FTP is a protocol through which Internet users can upload files from their computer to a Website. In which, FTP stands for File Transfer Protocol.

Description : What is the use of sections in a word document: a) To divide the document into parts so that each part may be independently printed when the print command is given. b) To divide the document into ... document into parts and then allow formatting of each part the way you want. d) None of The Above

Last Answer : To vary the layout of a document within a page or between pages by dividing the document into parts and then allow formatting of each part the way you want.

Description : The auditor gives an audit opinion on the fair presentation of the financial statements and associates his or her name with them when, on the basis of adequate evidence, the auditor concludes that the financial ... are unlikely to mislead a. A prudent user. b. Management. c. The reader. d. Investors

Last Answer : A prudent user.

Description : How do you generate a new file for each page of a document, spreadsheet, or pdf?

Last Answer : answer:I would do this with CutePDF Writer, as we've been discussing in another thread recently. Print each separate page of the document to a new .PDF filename, and then you can do what you like ... Mail Merge document, but you've given so few details that I can't really advise that here yet.

Description : Can you highlight words in a document in Adobe Reader or a .pdf file?

Last Answer : I’m assuming you want to copy and paste. Preview in OS X will do this. If you are on Windows Foxit should work.

Description : How to lock an iWork file (Pages, Keynote, Numbers) Document with a password?

Last Answer : answer:The best way to do this, as far as I know, would be to make an encrypted disk image using Disk Utility. Found in /Applications/Utilities/Disk Utility.app To do this, open up Disk Utility ... password, unless you saved the password in your keychain, in which case it won't. Hope that helps!

Description : to insert text from a separate file into your word document -General Knowledge

Last Answer : To insert text from a separate file into your Word document, - You have to open the file, copy the text, and then paste it into the document.

Description : A new text document can be created by (a) File —> Open (b) File —> New —> Blank Document —> Create -Technology

Last Answer : (b) Steps to create a new document.File —> New —> Blank Document —> Create

Description : ………………. is the default file name for a PowerPoint presentation. (a) Untitled 1 (b) Bookl (c) Presentation 1 (d) Document 1 -Technology

Last Answer : (c) The default name given to a presentation file is Presen tationl.

Description : What is XML document system how is it different from XML document or XML file -Technology

Last Answer : XML stands for Extensible Markup Language. It is a text-based markup language derived from Standard Generalized Markup Language (SGML).An XML document is a basic unit of XML information ... data. For example, database of numbers, numbers representing molecular structure or a mathematical equation.

Description : How to Publish Word Document to PDF File in in Microsoft Office Word 2007?

Last Answer : More DIY videos at 5min.comPublishing a Word document to a PDF file in Microsoft Office Word 2007 isn't too hard, but there is a trick to it. To do it, start by saving the Word document ... that unless you have an additional program on your computer, this means that you cannot edit the pdf file.

Description : Record include a) Any document, manuscript and file b) Any microfilm , microfiche and facsimile copy of a document c) Any other material produced a computer or any other device d) All the above

Last Answer : d) All the above

Description : In the event of an error in a mail list and when a revised or corrected mail list is received a) The revised document can be kept safely in the correspondence file b) The revised document can be ... each other a note being added on the original d) The error mail list should be returned to sender

Last Answer : c) Both the list s should be retained on record attached to each other a note being added on the original

Description : Based on the identification of objectives, input, output and file content, the vital document is called … A) System Definition B) System Document C) System Requirement Document D) System Subject

Last Answer : B) System Document