Computer Applications
Description: all | |
Number of Questions: 15 | |
Created by: Jayanti Mahajan | |
Tags: all Computer Knowledge |
Which of the following shortcut keys is used to remove all character formats?
What type of data does WAVE file contain?
What is the purpose of software quality assurance?
Which of the following is a type of page orientation?
Which type of image formats do not use a type of media compression?
The paragraph mark (¶) is a formatting mark that indicates where the _____ was pressed.
Which of the following provides information about open document, current settings and operations in progress?
In which topology are all the computers and devices (nodes) on the network connected to central device?
Which of the following statements about bus topology is false?
What should we take care of to make secure access of the program?
How many bytes are there in a terabyte?
In 2 tier architecture, the client interacts with a ___.
Which of the following is/are required by efficient system requirement analysis?
Various kinds of email threats are examples of ____
Which of the following makes network secure?