Posts

Showing posts from 2014

Model Questions 1

Objective Question 1. All of the following are examples of real security and privacy risks EXCEPT: A. hackers. B. spam. C. viruses. D. identity theft. Answer: B 2. A process known as ____________ is used by large retailers to study trends. A. data mining B. data selection C. POS D. data conversion Answer: A 3. ____________terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems. A. Data B. Point-of-sale (POS) C. Sales D. Query Answer: B 4. A(n) ____________ system is a small, wireless handheld computer that scans an items tag and pulls up the current price (and any special offers) as you shop. A. PSS B. POS C. inventory D. data mining Answer: A 5. The ability to recover and read deleted or damaged files from a criminals computer is an example of a law enforcement specialty called: A. robotics. B. simulation. C. computer forensics. D. animation. Answer: C 6. Wh...

Sahek Computer Operator Questions of 2013

Kharidar Questions of 2013 1.       What is the default left margin in word document? a.       2" b.       1" c.        1.25" d.      1.5" Answer: 1.25" 2.       What is Gutter Margin? a.       Margin that is added to the binding side of page when printing. b.       Margin that is added to the left margin when printing. c.        margin that is added to right margin when printing. d.      none of the above. Answer: Margin that is added to the binding side of page when printing. 3.       Which of the following is not a font style? a.       Superscript b.       bold c.        italics d.   ...