Computer Studies Past QuestionsQuestion 96:The file access method shown in Figure 12 is called ____________ A. Hashed access B. Indexed access C. Random access D. Sequential access Question 97:Which of the following options is not a similarity between computer file and manual file? Both can ____________ A. Be accessed B. Be retrieved C. Store multimedia D. Contain information Question 98:A computer program that gathers information about a person or organization without their knowledge or consent is known known as ____________ A. Adware B. Time bomb C. Trojan horse D. Spyware Question 99:Quantitative data can exist in ____________ A. Continuous form only B. Continuous and discrete forms C. Nominal and ordinal forms D. Ordinal form only Question 100:Data created by the user is called ____________ A. Primary data B. Qualitative data C. Quantitative data D. Secondary data |
|
| ||||||
Disclaimer All Views, Names, Acronyms, Trademarks, Expressed on this website are those of their respective owners. Please note that www.schoolngr.com is not affiliated with any of the institutions featured in this website. It is always recommended to visit an institutions or sources official website for more information. In the same vein, all comments placed here do not represent the opinion of schoolngr.com SCHOOLNGR - © 2020 - 2024 - Tayo Hammed | Terms Of Service | Copyright | Privacy Policy |