Welcome to Schoolngr.com

Home   School   News   C B T   Classroom
Saturday, 23 November 2024

RegisterLogin

Computer Studies Past Questions


Question 96:




The file access method shown in Figure 12 is called ____________

A. Hashed access
B. Indexed access
C. Random access
D. Sequential access


Question 97:


Which of the following options is not a similarity between computer file and manual file? Both can ____________

A. Be accessed
B. Be retrieved
C. Store multimedia
D. Contain information


Question 98:


A computer program that gathers information about a person or organization without their knowledge or consent is known known as ____________

A. Adware
B. Time bomb
C. Trojan horse
D. Spyware


Question 99:


Quantitative data can exist in ____________

A. Continuous form only
B. Continuous and discrete forms
C. Nominal and ordinal forms
D. Ordinal form only


Question 100:


Data created by the user is called ____________

A. Primary data
B. Qualitative data
C. Quantitative data
D. Secondary data






AboutContact usBack to Top
...

Disclaimer
All Views, Names, Acronyms, Trademarks, Expressed on this website are those of their respective owners. Please note that www.schoolngr.com is not affiliated with any of the institutions featured in this website. It is always recommended to visit an institutions or sources official website for more information. In the same vein, all comments placed here do not represent the opinion of schoolngr.com


SCHOOLNGR - © 2020 - 2024 - Tayo Hammed | Terms Of Service | Copyright | Privacy Policy