Computer Based Training (CBT) is a type of ……….. . -Technology

1 Answer

Answer :

Computer Based Training (CBT) is a type ofE-learning

Related questions

Description : CBT isa ________ protocol that usesa core as the root of the tree. A) source-based B) group-shared C) a or b D) none of the above

Last Answer : group-shared

Description : _______ is an implementation of multicast distance vector routing. It is asource-based routing protocol, based on RIP. A) MOSPF B) DVMRP C) CBT D) none of the above

Last Answer : DVMRP

Description : What is the primary distinction separating CBT(Cognitive Behavioral Therapy) from Behavior Therapy?(please see details)

Last Answer : The cognitive term implies that the process enlists the intelligence of the patient in helping achieve change. Older behaviorist methods assumed a person was more like a machine, and only needed training via stimulus and response (S-R).

Description : Have you ever had Cognitive-Behavioral Therapy (CBT)?

Last Answer : We had to do it with my youngest as he was deathly afraid of large public gatherings ie. school and could not control his fear and emotions in those settings and simply shut down. We found ... now comments on how he sees other kids and their own difficulties in similar situations. 110% successful!!

Description : What are the answers for the EOR CBT?

Last Answer : Need answer

Description : Computer based record keeping system is known as (a) Data Manipulation System -Technology

Last Answer : (d) DBMS is a collection of programs that enable the user to create and maintain the database. Also, it is a computer-based record keeping system.

Description : Help him in writing SQL query for the following purpose: (i) To count how many female candidates will be attending the training. -Technology

Last Answer : (i)Select count(name) from training where name like ‘Ms.%’;(ii) Select * from training where fee is NULL;(iii) Select city, fee from training where topic = ‘Cyber Security’;(iv) Alter table training add feedback varchar(20);

Description : Observe the table named “Training” given above carefully and predict the output of the following queries: -Technology

Last Answer : (i) New DelhiFaridabadGurugram(ii) 2(iii) 11000(iv) Ms. Neena

Description : What is the degree and cardinality of the above given table named ‘Training’. -Technology

Last Answer : Degree: 6Cardinality: 5

Description : Mr. Manav, a database administrator in “Global Educational and Training Institute” has created following table named “Training” -Technology

Last Answer : i. Select count(name) from training where name like ‘Ms.%’;ii. Select * from training where fee is NULL;iii. Select city, fee from training where topic = ‘Cyber Security’;iv. Alter table training add feedback varchar(20);

Description : i. select city from training where topic = 'Cyber Security'; -Technology

Last Answer : i. New DelhiFaridabadGurugramii. 2iii. 11000iv. Ms. Neena

Description : What is the degree and cardinality of the above given table named ‘Training’. -Technology

Last Answer : Degree: 6Cardinality: 5

Description : When was the last time that you used something that's based on an older technology, or a now seldom or no-longer used service?

Last Answer : The last time I used a VCR was about two weeks ago – in conjunction with a transfer device so I could create digital versions of my old tapes. ;-)

Description : When a technology-based company changes its logo... is that a sure sign they've become irrellevent and/or on a trajectory towards bankruptcy?

Last Answer : removed by self-moderation

Description : The character based naming system by which server are identified is known as ……….. -Technology

Last Answer : The character based naming system by which server are identified is known asdomain name system.

Description : ………. printers are based on electrophotography technology to print the data. -Technology

Last Answer : Laser printers are based on electrophotography technology to print the data.

Description : Answer the following questions based on the database given below: Prod_Id Prod_Name Category -Technology

Last Answer : 1. The primary key of the given table Product will be Prod _Id because no two products have the same Product_Id. So, it will be uniquely identified for each record in the table.2. The suitable data ... = 88. The data type OLE Object is suitable for adding the photograph of the product to the table.

Description : A query is used to retrieve data from the database based on one or more criteria. -Technology

Last Answer : False Because MS-Access 2007 supports the database object query.

Description : Sweety wants to use an operating system based on graphical user interface, suggest her a name. -Technology

Last Answer : Windows is an operating system based on graphical user interface. Graphical user interface means that it has pictures (graphics) that you use to communicate (interface) with the computer.

Description : Write command for the operations (i) to (iii) based on the spreadsheet below: -Technology

Last Answer : 1. At cell F2, type =D2*E2 and then copy this formula using mouse Fill handle onto range F3: F5.2. At cell G2, type =IF(C2=”Consumable”, F2*0.07, F2*0.11) and then copy this formula using mouse Fill handle onto range G3: G5.3. At cell G6, type =SUM(G2: G5).

Description : Reena wants to get employment opportunities based on IT. What are the options for employments? -Technology

Last Answer : Web designing and developing, E-Learning, advertising etc are the options for employments opportunities based on IT.

Description : Enlist different biological agents which damage paper based library resources. -Technology

Last Answer : The three biological agents that damage paper based library resources are Microorganisms, Insects and Rodents.

Description : Based on your assessment, describe the implications of APUPA pattern on library classification? -Technology

Last Answer : a. APUPA stands for Alien-Penumbral-Umbral-Penumbral-Alienb. In this pattern, one arranges the most relevant documents at the centre, provides documents of marginal relevance on both sides of relevant ... This is the best way to maintain filiatory sequencee. APUPA arrangement diagramf. Example . . .

Description : Write SQL Query commands based on the following table: -Technology

Last Answer : This answer was deleted by our moderators...

Description : computer is used to type documents, send E_mail and browse the Internet. It is very useful to us. (i) What are the basic parts of a computer? -Technology

Last Answer : (i) Hardware, software, data and information.(ii) Accuracy, speed, diligence and reliability.

Description : devices at home which included a smartphone, a laptop and a personal computer. What type of network he would be setting up for the same? 1. PAN -Technology

Last Answer : Manoj would be setting up a PAN (Personal Area Network) which is best suited for setups involving a computer, a cell phone and/or a handheld computing device such as a PDA.

Description : …………. is a type of malware that is installed on a user’s computer and collects information about user without their consent and knowledge. -Technology

Last Answer : Spyware is a type of malware that is installed on a user’s computer and collects information about user without their consent and knowledge.

Description : The ‘Chalchitra’ theatre has a computer network. The network is in one building. (i) Name this type of network(out of -Technology

Last Answer : (i) LAN(ii) Optical fiber cable

Description : The ‘Chalchitra’ theatre has a computer network. The network is in one building (i) Name this type of network (out of -Technology

Last Answer : (i) LAN (ii) Satellite