Description : To access properties of an object, the mouse technique to use is: a) Dragging b) Dropping c) Right - Clicking d) Shift - Clicking e) None of The Above
Last Answer : c) Right - Clicking
Description : How does one disable right clicking or prevent dragging image to desktop on Tumblr?
Last Answer : answer:You can capture right-click actions with javascript, but visitors can disable javascript when viewing your page. You can hide an image behind a transparent image to make it harder to drag an image, but ... is sending a copy of the image back and the user of the browser can get the image.
Description : Why does my keyboard's mouse keep dragging things and highlighting them blue on its own?
Last Answer : Something inside has failed. Time for a new mouse.
Description : When I forget to put the computer (iMac OS X 10.7.4) to sleep and return several hours later, why does dragging the mouse generate grey pixilated lines on the screen?
Last Answer : Have you looked to see what power settings you have—i.e., what default behavior is in place for the computer’s behavior when it has been idle for some specified amount of time?
Description : Press and hold ……………….. of mouse while dragging for drawing a shape. -Technology
Last Answer : Press and holdleft buttonof mouse while dragging for drawing a shape.
Description : The x.25 standard specifies a a. technique for start-stop data b. technique for dial access c. DTE/DCE interface d. data bit rate e. none of above
Last Answer : DTE/DCE interface
Description : Satellite-Switched Time-Division Multiple Access (SS/TDMA) is A. the method of determining whichdevice has access tothe transmission medium at any time. B. a medium access control technique for ... switching is used to dynamically changethechannel assignments D. All of theabove E. None of the above
Last Answer : a form of TDMA in which circuit switching is used to dynamically changethechannel assignments
Description : How can I get my mouse to stop clicking once and going straight to the program?
Last Answer : Describe the mousepad in a bit more detail, please. My MacBook Pro pad, for instance, is one big, multitouch button.
Description : Which of the following comments about object oriented design of software, is not true ? Objects inherit the properties of class Classes are defined based on the attributes of objects an object can belong to two classes classes are always different
Last Answer : an object can belong to two classes
Description : Did you know that you can access medical supplies on Amazon by clicking Industrial and Scientific category?
Last Answer : Yes I knew medical supplies were accessible on Amazon, but were limited to usage within the United States, unlike other products on Amazon where it can be shipped to other countries. Medical ... Sales and distribution of drugs requires licensing to control the abuse and track usage of most drugs.
Description : What role does individualism and dislike of government interference play for dragging the United States to the bottom in terms of life expectancy over the past 30 years?
Last Answer : Look at the obesity levels and the violence in the US. Two really big factors.
Description : What are your thoughts on the stuff going on in Tennessee and the mosque that is built, but won't be open for Ramadan because they are dragging their feet on the building inspection?
Last Answer : Since I don’t go to the mosque, I am indifferent. Hope they get it all figured out.
Description : Is it okay to skim through boring/dragging parts of a book?
Last Answer : It is alright to skim.It is also alright to rip the tag off a mattress.:)
Description : Which of the following canbe used to select the entire document ? (A) CTRL+A (B) ALT+F5 (C) SHIFT+A (D) CTRL+K (E) CTRL+H
Last Answer : CTRL+A
Description : In _______ methods, the stations consult one another tofind which station has the right to send. A) random access B) controlledaccess C) channelization D) none of the above
Last Answer : controlledaccess
Description : The Caesar cipher is a _______cipher that has a key of 3. A. transposition B. killer C. shift D. none of the above
Last Answer : C. shift
Description : Which most popular input device is used today for interactive processing and for the one line entry of data for batch processing? a. Mouse b. Magnetic disk c. Visual display terminal d. Card punch
Last Answer : Mouse
Description : Which is considered a direct entry input device? a. Optical scanner b. Mouse and digitizer c. Light pen d. All of the above
Last Answer : All of the above
Description : Which input devicecannot be used to work in MSOffice? A. Scanner B. Light Pen C. Mouse D. Joy Stick
Last Answer : Joy Stick
Description : Is "clicking" the right term?
Last Answer : answer:Touching, tapping or pushing are the ones I hear most often. I think Apple use tapping over other verbs of that nature, but definitely not clicking (there's no clicky noise except when you ... feel like you have done something very, seriously wrong and you must be punished with angry noises.
Description : Hi, I have a question. Yesterday, when reversing on an unpaved road, I ran into an unevenness and a bang sounded. Since then, at speeds of about 40 km / h, there was a barely audible click from ... only heard when the window was open. Would anyone know what it could be? Or if it could be serious?
Last Answer : There can be many causes. He wants to look at it. Visit a mechanic or service and see.
Description : What is done firstly, to create a compressed and archive file into uncompressed ? a) Left clicking a file -> Open with archive manager b) Right clicking a file -> open with archive manager c) Left clicking a file -> open with Winzip d) Right clicking a file -> open with winzip
Last Answer : b) Right clicking a file -> open with archive manager
Description : Which of the following technique isused for encapsulation? A. a technique used inbest-effort delivery systems toavoid endlessly loopingpackets. B. a technique used by protocols in which a lower level ... network that cannothandle the originaldatagram size D. All of theabove E. None of the above
Last Answer : a technique used by protocols in which a lower level protocol accepts a message from ahigher level protocol and places it in the data portion of the low level frame
Description : Which of the following technique isused for fragment? A. a technique used inbest-effort delivery systems toavoid endlessly loopingpackets B. a technique used by protocols in which a lower level protocol ... network that cannothandle the originaldatagram size D. All of theabove E. None of the above
Last Answer : one of the pieces that results when an IP gateway divides an IP datagram into smallerpieces for transmission acrossa network that cannothandle the originaldatagram size
Description : The modulation technique used by GSM cellular system A. Phase shift keying B. Frequency shift keying C. Gaussian minimum shift keying D. QAM
Last Answer : C. Gaussian minimum shift keying
Description : White box testing, a software testing technique is sometimes called ? Basic path Graph Testing Dataflow Glass box testing
Last Answer : Glass box testing
Description : Inan HFC network, the upstream data are modulated using the _______ modulation technique. A) QAM B) QPSK C) PCM D) ASK
Last Answer : QPSK
Description : Inan HFC network, the downstream data are modulated using the _______ modulation technique. A) PSK B) QAM C) PCM D) ASK
Last Answer : QAM
Description : DMT is a modulation technique that combineselements of _______ and _______. A) FDM; TDM B) QDM; QAM C) FDM; QAM D) PSK; FSK
Last Answer : FDM; QAM
Description : The ______ technique expands the bandwidthof a signal by replacing each data bit with n bits. A) FDM B) DSSS C) FHSS D) TDM
Last Answer : DSSS
Description : The _______ technique uses M different carrier frequencies that are modulated by the source signal. At one moment, the sign modulates one carrier frequency; at the next moment, thesignal modulates another carrier frequency. A) FDM B) DSSS C) FHSS D) TDM
Last Answer : FHSS
Description : _____ isa digital multiplexing technique for combiningseveral low-ratechannels into onehigh-rate one. A) FDM B) TDM C) WDM D) None of the above
Last Answer : TDM
Description : _____ isan analog multiplexing technique to combine optical signals. A) FDM B) TDM C) WDM D) None of the above
Last Answer : WDM
Description : Which multiplexing technique involves signals composed of light beams? A) FDM B) TDM C) WDM D) none of the above
Description : Which multiplexing technique shifts each signal to a different carrier frequency? A) FDM B) TDM C) Both (a)and (b) D) None of the above
Last Answer : FDM
Description : Which multiplexing technique transmits digital signals? A) FDM B) TDM C) WDM D) None of the above
Description : Which multiplexing technique transmits analog signals? A) FDM B) TDM C) WDM D) (a) and (c)
Last Answer : (a) and (c)
Description : The most common technique to change an analog signal to digitaldata is called __________. A) PAL B) PCM C) sampling D) none of the abov
Last Answer : PCM
Description : . A technique called______ isused tocreate a subnetting effect. A) ARP B) RARP C) proxy ARP D) noneof the above
Last Answer : proxy ARP
Description : When thecomputer provides the manager with a multiple choice of possible answers, the prompting technique is A. question and answer B. form filling C. open-ended question D. menu selection E. None of the above
Last Answer : menu selection
Description : Which of the following routing technique / techniques is / are used in distributed systems ? A. Fixed Routing B. Virtual Routing C. Dynamic Routing a. A Only b. A and B only c. C only d. All A,B,C
Last Answer : a. A Only
Description : The technique of temporarily delaying outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is called ____________ a. piggybacking b. cyclic redundancy check c. fletcher’s checksum d. parity check
Last Answer : a. piggybacking
Description : . The newer technique uses a distributed database system called ………………….. to translate names to addresses. A. DNS B. IP C. ARP D. Telnet
Last Answer : A. DNS
Description : The technique in which a congested node stops receiving data from the immediate upstream node or nodes is called as _______ A. Admission policy B. Backpressure C. Forward signaling D. Backward signaling
Last Answer : B. Backpressure
Description : The technique of temporarily delaying outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is called ____________ A. piggybacking B. cyclic redundancy check C. fletcher’s checksum D. parity check
Last Answer : A. piggybacking
Description : Object of the central council is a) The right to be protected against the marketing of goods which are hazardous to life and property b) The right to informed about the quality , ... and to be assured that consumer interests will receive due consideration appropriate fora e) All the above
Last Answer : e) All the above
Description : Object of the central council is A. The right to be protected against the marketing of goods which are hazardous to life and property B. The right to informed about the quality, quantity ... to be assured that consumer interests will receive due consideration appropriate fora E. All the above
Last Answer : E. All the above
Description : The term Blue Shift' is used to indicate? A. Doppler effect in which an object appears bluer when it is moving towards the observer or observer is moving towards the object? B. Turning a star from white ... . In future sun would become blue D. Black hole was blue at its start E. None of these
Last Answer : A. Doppler effect in which an object appears bluer when it is moving towards the observer or observer is moving towards the object?