Copy of data created for safe storage is ………… -Technology

1 Answer

Answer :

Copy of data created for safe storage isback up.

Related questions

Description : Copy of data created for safe storage is a) Saved copy b) Backup c) Dcopy d) Stored copy -Technology

Last Answer : Copy of data created for safe storage isBackup

Description : A table named School (containing data of students of the whole school) is created -Technology

Last Answer : AdmissionNo should be set as the primary key because admission numbers are unique for each and every student of the school, which is not possible in the case with RollNo and Name.

Description : For what, Memo data type is used? (a) To add table (b) To store objects created in other programs -Technology

Last Answer : (c) As we know, Memo provides character upto 65536 so, it is used for long text entries.

Description : You cannot insert ………………… into a main document until after the data source has been created in Word. -Technology

Last Answer : fields into a main document until after the data source

Description : Which of the following storage device can be used for storing large backup data? (a) Floppy disks (b) Hard disk (c) Magnetic tapes (d) None of these -Technology

Last Answer : "B) Hard Disk.

Description : If a piece of data (field value) is stored in two places in the database, then storage space -Technology

Last Answer : False If a piece of data is stored in two places in the database, then storage space is wasted and changing the data in one spot will cause data inconsistency.

Description : CD is a storage device that is used to take the backup of your data. -Technology

Last Answer : True You can use different types of storage devices like CD, DVD to take the backup of your data.

Description : Input device used to make a digital copy of a photograph. (a) Graphics Tablet (b) Scanner (c) MICR (d) OMR -Technology

Last Answer : (b) Scanner is an input device that is used to make a digital copy of a photograph. It converts the image or text into a digital file.

Description : When you copy a Web page or a file from a server to your local computer, this process is called (a) conferencing (b) downloading -Technology

Last Answer : (b) Because we store information from a server computer to a user computer.

Description : Bcc field contains the list of recipients. Bcc stands for (a) Basic carbon copy (b) Blind carbon copy -Technology

Last Answer : (b) Bcc denotes the Blind carbon copy.

Description : Suppose you move or copy a folder named Alignment. The Alignment folder contains four subfolders, -Technology

Last Answer : Yes, the Alignment folder will carry the four sub-folders Left, Center, Right and Justify because when we move or copy a folder to a new location, then all its contents (i.e. sub-folders and files) also get moved or copied.

Description : ……………. means that a printed document is exactly a copy of what you see on screen. -Technology

Last Answer : WYSIWYGmeans that a printed document is exactly a copy of what you see on screen.

Description : A ……. is a software program that is designed to copy itself from one computer to another, without human intervention. -Technology

Last Answer : (c) A worm is a self-replicating software program. It does not require another program to host it.

Description : ……….. is a software program that is designed to copy itself from one computer to another. -Technology

Last Answer : Worm is a software program that is designed to copy itself from one computer to another.

Description : Purchasing of only one licensed copy of a software and distributing/loading it onto multiple systems is called as ………… -Technology

Last Answer : (a) Softlifting is a common type of software piracy in which a legally licensed software program is installed or copied in violation of its licensing agreement.

Description : The keyboard shortcut for copy is ……………. and for paste is ……………….. -Technology

Last Answer : The keyboard shortcut for copy is Ctrl + C and for paste is Ctrl + V.

Description : A relationship cannot be created with the help of a table. -Technology

Last Answer : False A relationship is a connection between two tables of data.

Description : The small area network created around a bluetooth device is called ………….. -Technology

Last Answer : The small area network created around a bluetooth device is calledPAN (Personal Area Network).

Description : ……. are used to connect Web pages. They are created with tag. -Technology

Last Answer : Hyperlinksare used to connect Web pages. They are created with tag.

Description : Hyperlinks can also be created for links within the same document. Linking -Technology

Last Answer : False Linking within the same document is called internal linking.

Description : Yesterday, Rahul created a file named detail.txt and saved it. -Technology

Last Answer : He can find his file by using Search option.

Description : What are table sections? How can they be created? -Technology

Last Answer : In HTML tables, there are three different sections: header, body and footer. These sections can be created using (header section), (body section) and (footer section) tags.e.g MonthSavings January$100February$80Sum$180

Description : A new text document can be created by (a) File —> Open (b) File —> New —> Blank Document —> Create -Technology

Last Answer : (b) Steps to create a new document.File —> New —> Blank Document —> Create

Description : When the Edit Individual Documents option is selected, how does each letter appear in the new document created after the merge? -Technology

Last Answer : (b) When the Edit Individual Documents option is selected, separate sections for each letter appear in the new document created after the merge.

Description : How are charts created in Excel? Write the steps. -Technology

Last Answer : Creating a Chart:Here is a worksheet that shows the marks of students in a class subject wise. To create a chart, do the following:1. Select the data that you want to show, including the ... Design tab under Chart Tools, in the Type group, click Change Chart Type and select another chart type.

Description : A chart is created on the basis of values in ……………… (a) mail merge -Technology

Last Answer : (c) A chart is a pictorial representation of data that created on the basis of values in a spreadsheet.

Description : List any 3 items that can be created using DHTML. -Technology

Last Answer : DHTML can be used to create the following:AnimationPop-up menusInclusion of Web page content from external data sourcesElements that can be dragged and dropped within the Web page

Description : Ms. Shalini has just created a table named “Employee” containing columns Ename, Department, Salary. -Technology

Last Answer : SQL command to add a primary key column:Alter table employee add empid int primary key;Importance of Primary key in a table:Primary key column is used to uniquely identify each record of the table. A column defined as primary key cannot have a duplicate entry and can't be left blank.

Description : In a school, a database named “school” is created in mysql whose password is “cbse”. Smith is trying to add a new record of a student having details -Technology

Last Answer : import mysql.connectormydb = mysql.connector.connect{host='localhost',user='root',passwd='cbse',database='school'}mycursor = mydb.cursor()mycursor.execute('INSERT INTO student values(3,'Michelle', 'Agartala');')mydb.commit()

Description : Mr. Manav, a database administrator in “Global Educational and Training Institute” has created following table named “Training” -Technology

Last Answer : i. Select count(name) from training where name like ‘Ms.%’;ii. Select * from training where fee is NULL;iii. Select city, fee from training where topic = ‘Cyber Security’;iv. Alter table training add feedback varchar(20);

Description : Albert works as a Website developer in Global Website Designers company. Currently he has created following tags in XML : -Technology

Last Answer : These tags are part of XML code. These are different because XML is a case sensitive language.

Description : Mark the correct option relating to fee for obtain information under RTI act a) Rs 2/- per each page (A4/A3 size paper) created or copied b) Actual charge or cost price of a copy in large size paper ... records no fee for the first hour and a fee Rs5/- for each  subsequent hour  e) All the above

Last Answer : e) All the above

Description : When one object reference variable is assigned to another object reference variable then (A) a copy of the object is created. (B) a copy of the reference is created. (C) a copy of the ... not created. (D) it is illegal to assign one object reference variable to another object reference variable.

Last Answer : (B) a copy of the reference is created.

Description : Which one of the magnetic storage disk is also known as diskette? Explain it with its advantages and disadvantages. -Technology

Last Answer : Floppy disk drive is also known as diskette or FDD. It is a computer disk drive that enables a user to save data on removable diskettes.This portable storage device is a rewritable media that can ... damaged and not much reliable.2. Quite slow to access and retrieve data.3. Easily affected by heat

Description : Which of the following statement is false? (a) Secondary storage is faster (b) Primary storage is both volatile and non volatile in nature. -Technology

Last Answer : (a) Secondary memory is the slowest and cheapest form of memory. It cannot be processed directly by the CPU and it must be first copied into RAM.

Description : The ……… offers more than five times the storage capacity of traditional DVDs. (a) Compact disc (b) Pen drive (c) Blu_ray disc (d) Ext_DVD -Technology

Last Answer : c) Blu-ray disc can hold almost 5 times more data than a single layer DVD.

Description : ……….. disks are portable but have less storage capacity. -Technology

Last Answer : Floppy disks are portable but have less storage capacity.

Description : ……….. is the latest optical disc secondary storage device. -Technology

Last Answer : Blu-ray Disc (BD)is the latest optical disc secondary storage device.

Description : ‘The Compact Disc (CD) is a digital storage device. -Technology

Last Answer : TrueBecause CD is used to store audio, video, graphical and textual data.

Description : Secondary storage is also called auxiliary storage. -Technology

Last Answer : TrueBecause secondary storage is a part of external memory. It is used to store a large amount of data at less cost per byte than primary memory.

Description : A magnetic tape is a direct access storage device. -Technology

Last Answer : FalseIt is a non-volatile memory hence, it is not direcdy accessible by the CPU.

Description : An integer takes a storage size of (a) 2 bytes (b) 1 byte -Technology

Last Answer : (a) An integer takes a storage size of 2 bytes.

Description : What do you mean by storage management? -Technology

Last Answer : Storage ManagementIt is the process, which describes the technologies and processes used by a computer to improve the performance of its data resources. The data or files will be stored into the ... and destination of their processing. This entire process is handled by the operating system itself.

Description : What precaution you should take before copying file from an external storage media? -Technology

Last Answer : Precaution should be taken to run an antivirus program before copying any file from floppy disk, USB, DVD etc. Also, we have to run an antivirus program weekly to scan all the drives in the system.

Description : Always scan the storage media before connecting it to your computer. -Technology

Last Answer : True You should always scan your storage media before connecting it to your computer.

Description : A safe way to remove viruses is to run an ……… -Technology

Last Answer : A safe way to remove viruses is to run anantivirus software

Description : I have a Surge Protector (with Data Line protection: ethernet, telephone, coaxial cable) Plugged into a UNGROUNDED Outlet. Do is there a risk? It is Safe?

Last Answer : My understanding is that the surge protector helps keep your equipment safe. And the grounding helps keep you safe. The surge protector will trip a circuit so any power spikes won't damage your stuff that is ... least that is how my brother in law explained it to me. (he is a licensed electrician)

Description : I'd like to find a Mac tool that kept a safe copy of the contents of textareas. Any idea?

Last Answer : answer:Here are a couple programs that sound like what you want. Program 1 Program 2

Description : WB formatted for mac, can I copy onto it from a PC?

Last Answer : It should. Why not ask him for something formatted the same way and give it a trial run?

Description : Why isnt my copy of Halo Reach working? please help?

Last Answer : Still got the receipt? Take it back!