Using work of other people, we should always give credit to them. -Technology

1 Answer

Answer :

TrueIf we are using intellectual property of another person then we should always give credit to them.

Related questions

Description : You can transmit sensitive information, such as that relating to your credit card, by using -Technology

Last Answer : (c) SSL allows sensitive information such as credit card numbers to be transmitted securely.

Description : Jhilmalini has stolen a credit card. She used that credit card to purchase a laptop. What type of offence has she committed? -Technology

Last Answer : She has committed a fraud

Description : Select Acc_No, sum(Amount) from Customer c, Transaction t where c.Acc_No=t.Acc_No group by c.Acc_No having Transaction_Type='Credit'; -Technology

Last Answer : 2301003 650002201002 20000

Description : Define forms and what is the need of using them? -Technology

Last Answer : In a database, a form is a window or a screen that contains numerous fields or spaces to enter data. Forms can be used to view and edit your data. It is an interface in the user-specified ... like a paper form. People generally prefer to enter data into a well-designed form, rather than a table.

Description : Distinguish between ComboBox and ListBox. When would you prefer using them over Radiobutton and Checkbox? -Technology

Last Answer : Differences between ComboBox and ListBox are as follows :ComboBox ListBoxIt occupies less space but show only one value for visbility.It occupies more space but shows more than one value.Multiple select ... you need to select only one option then you would prefer using ComboBox over Radio Button.

Description : Have people always complained about technology?

Last Answer : Yeah, some guy, somewhere, at one point said “Geez, this fire sure is hot.” also: wheels were blamed for the moral deprativity of youth.

Description : Give one advantage of using primary key. -Technology

Last Answer : A primary key uniquely identifies the record in the table.

Description : When we connect computers in a network using cables then it is called guided media. -Technology

Last Answer : Three types of cables are used for connecting computers in a network are as follows:1. Twisted Pair Cable It consists of two insulated wires twisted around each other and uses copper as the conducting ... material, which are capable of carrying light signals from a source at one end to another end.

Description : We can put a border around an image by using width attribute. -Technology

Last Answer : False We can put a border around an image by using border attribute.

Description : Domain names always have two or more parts, separated by (a) commas (b) periods (called dots) -Technology

Last Answer : (b) A domain name is a hierarchical series of character strings representing different levels of domains separated by dot/period.

Description : When you define a field for a table, which of the following parameters do Access always consider optional? -Technology

Last Answer : (d) Description field of the table is optional, as it depends on the databasedesigner that he/she wants to describe a field or not.

Description : XML attribute values should always be enclosed in ………… . -Technology

Last Answer : XML attribute values should always be enclosed indouble quotes.

Description : Always scan the storage media before connecting it to your computer. -Technology

Last Answer : True You should always scan your storage media before connecting it to your computer.

Description : A cell range always has the symbol between the cell references. -Technology

Last Answer : (d) A cell range always has the : (colon) symbol between the address of ranges.

Description : The practice of taking someone else's work or ideas and passing them off as one's own is known as .... -Technology

Last Answer : The practice of taking someone else's work or ideas and passing them off as one's own is known asPlagiarism.

Description : Two people, one knowing only English and other knowing only Chinese are talking to each other. Can we call it a communication? -Technology

Last Answer : No, because only a meaningful exchange of information between two living beings is called communication.

Description : We cannot work on computer without software. -Technology

Last Answer : TrueSoftware is a set of programs, which instructs the computer to do a task. We always need a software to work on the computer system.

Description : Do you think that science will someday find evidence that animals have much richer inner lives and much more complex cognitive skills than we now give them credit for?

Last Answer : Based on what would someone make such a prediction? (Maybe there is something that I don’t know about… so its a real question).

Description : A Web page is located using a (a) Universal Record Linking (b) Uniform Resource Locator -Technology

Last Answer : (b) URL (Uniform Resource Locator) specifies the location of a specific Web page on the Internet.

Description : Large amount of cheques are processed by using (a) OCR (b) MICR (c) OMR (d) All of the above -Technology

Last Answer : (b) Large amount of cheques are processed by the MICR (Magnetic Ink Character Recognition). It can read characters that are printed using a special magnetic ink. It is mostly used in banks.

Description : When using a search engine, what does a minus sign used with keywords in the search box mean? -Technology

Last Answer : A search engine is a Website that provides the required data on specific content. It also allows users to enter keywords related to particular topics and retrieve information. The minus sign in front of a word or phrase means that it includes first term but not the second term.

Description : When using a search engine to search, then would you use quotation marks around search terms? -Technology

Last Answer : Quotation marks should be used around a phrase or search terms. Surrounding terms with quotation marks limit the search results to only those Web pages that contain the exact phrase, we have specified. ... to have nothing to do with your topic. For best results, you should write death penalty .

Description : Information is retrieved through Internet using ………….. . -Technology

Last Answer : Information is retrieved through the Internet using search engine.

Description : ……….. helps us to learn anywhere using Internet. -Technology

Last Answer : E-learninghelps us to learn anywhere using the Internet.

Description : Write any two advantages of using database. -Technology

Last Answer : 1. Can ensure data security.2. Reduces the data redundancy.

Description : Define database management system. Write two advantages of using database management system for school. -Technology

Last Answer : Database Management System (DBMS) is a collection of programs that enable users to create, maintain database and control all the access to the database. The primary goal of the DBMS is to ... centralized location.2. It provides security to the personal information of the school, stored in it.

Description : For using Wi_Fi, which of the following is not required? (a) An Internet connection -Technology

Last Answer : (d) Bluetooth is not required for Wi-Fi connection.

Description : What is the method of using comment line in the HTML code? -Technology

Last Answer : In HTML code, the comment line is declared as

Description : What is the purpose of using the tags …? -Technology

Last Answer : provides six levels of headings. is the largest heading level while is the smallest heading level. These headings help us in obtaining a uniform look and feel for the document.

Description : What is the method of using headings in HTML? -Technology

Last Answer : provides six levels of headings. is the largest heading level while is the smallest heading level. These headings help us in obtaining a uniform look and feel for the document.

Description : What is the purpose of using HTML tags and attributes for Web designing? -Technology

Last Answer : HTML (HyperText Markup Language) is used to create Web pages. It designs the basic layout and formatting of Web pages by using tags and attributes.The tag’s name tells the tag’s purpose and the attributes that follow the tag name give the additional information of the Web browser.

Description : What is the purpose of using type attribute used in lists? -Technology

Last Answer : The type attribute specifies the type of numbers or bullets depending on whether the list item is inside an ordered list or unordered list.

Description : What is the purpose of using start attribute used in lists? -Technology

Last Answer : This attribute is used to change the beginning value of an ordered list. Normally, the ordered list begins with 1. It lets you further customize an HTMLordered list by setting a new starting digit for the ordered list element.Syntaxe.g.Ordered List with type attribute

Description : Why should you specify a background color, if you are using an image for the actual background of your page? -Technology

Last Answer : (b) We have to use background color because if in any case image is not displayed then at least background color will be shown on that place.

Description : You can play your CDs using MS_Paint. -Technology

Last Answer : FalseMS-Paint is not a media player. It is a painting software.

Description : To start a list using circles, use (a) (b) -Technology

Last Answer : (d) Because circular list starts with unordered list type circle.

Description : What is the purpose of using the attribute href in tag? -Technology

Last Answer : The href stands for Hypertext Reference. The href attribute is used with tag to specify the link to some other HTML page or Website.e.g. click here to go to learncbse.It will display like:click here to go to learncbse.

Description : The alternate text of an image can be displayed by using attribute of the tag. (a) src (b) alt -Technology

Last Answer : (b) alt attribute of the tag is used to display the alternate text of an image.

Description : Using the ………… type URL, you can create the E_mail hyperlink. -Technology

Last Answer : Using the mailtotype URL, you can create the E-mail hyperlink.

Description : The documents can be saved by using (a) Ctrl+S (b) Fffir—> Save (c) File —> Save As (d) All of these -Technology

Last Answer : (d) Documents can be saved by clickingFile —> Save As, File —> Save or using Ctrl+S key.

Description : MS_Word 2007 allows you to easily create a variety of professional looking documents using features such as Themes, Styles, SmartArt and more. -Technology

Last Answer : TrueMS-Word 2007 is a powerful tool that allows you to create a variety of professional looking documents because in Word 2007, all the things are replaced with a new navigation system.

Description : Write down the name of the freehand drawing tools which are using when custom shapes can be drawn. -Technology

Last Answer : Curve, Freeform and Scribble are the three freehand drawing tools which are using when custom shapes can be drawn.

Description : Using which option, you can create a frame for several shapes. -Technology

Last Answer : Insert —> Illustrations —> Shapes —> New Drawing Canvas option is used to create a frame for several shapes.

Description : After modifying a document using track changes, in how many ways a document can be viewed? -Technology

Last Answer : There are four ways of viewing a document as follows:1. Final Showing Markup2. Final3. Original Showing Markup4. Original

Description : ……….. are the building blocks of an XML document and are represented by using tags. -Technology

Last Answer : Elements are the building blocks of an XML document and are represented by using tags.

Description : You can validate an XML document by using the XML validator and …………… . -Technology

Last Answer : You can validate an XML document by using the XML validator andXML parser.

Description : ………………… is a tool in MS_Word using which customized letters, mailing labels and envelopes can be printed in bulk. -Technology

Last Answer : Mail Mergeis a tool in MS-Word using which customized letters, mailing labels and envelopes can be printed in bulk.

Description : Any crime committed using computers and Internet is termed as ………… -Technology

Last Answer : Any crime committed using computers and the Internet is termed ascybercrime.

Description : Complete the blank spaces using words from the list. You should use each word only once. -Technology

Last Answer : 1. PowerPoint2. presentation3. projector4. handouts5. slide6. Websites7. templates

Description : Using copyright, software piracy can be stopped. How? -Technology

Last Answer : The copyright in the work of authorship immediately becomes the property of the author, who created the work. Only the author or those deriving their rights through the author, can rightfully claim copyright.