CIT392 TMA3A NSWERS
Q1 The following extension files bmp, png, gif and jpg best
describes…….
sound file
graphic file
movie files
word files
Q2 A significant function in word processing, spread sheets and
graphic programs is your data that are stored as…….
files
documents
projects
jobs
Q3 The central dialogue box which is use for certain adjustments
is…….
dialogue box
display property
tool box
check box
Q4 ……. Is use to control the hardware of your computer, and
interpretes the instruction from your software and operating system to
the hardware
software
driver
operating system
server o.s
Q5 ……. Is use to represent applications and files available on the
computer
replica
icon
duplicate
folder
Q6 The area which contains a clock and other icons that display status
of certain activities is called…….
environment
field
notification
operation
Q7 When a document, webpage, or picture exceeds the size of its
window,……. allow one to see information that is currently out of view
tool bar
task bar
scroll bar
slide view
Q8 The act of naming and storing a document to be permanently kept
on the hard disk is known as…….
saving
renaming
processing
compressing
Q9 The command use for undoing your last action is what
command…….
ctrl + A
ctrl + C
ctrl + Z
ctrl + X
Q10 ……. Library is use to organize and arrange digital music
music library
video library
picture library
document library
Q11 All operating systems have ….., built around the architectural
metaphor that there must be a central set of instructions to direct
divice hardware
codes
directories
kernel
O.S
Q12 The following acronyms 'mkdir' means …….
move directory
mark directory
make directory
make document
Q13 ……. Is the standard language for all database
V.B
java
O.S
SQL
Q14 What does letter L represent in the following abbreviation SQL.
Structure Query …..
language
linux
list
line
Q15 The history of SQL began in an IBM lab in ……. , california, where
SQL was developed in the late…….
san jose 80s
san jose 60s
san jose 50s
san jose 70
Q16 SQL has the following advantages except…….
it is efficient
it is functional complete
it easy to learn and use
it is easy to install
Q17 Null is the term used to represent a ……. value
missing
field
blank
space
Q18 ……. Is a column that makes each row of data in the table unique
in a relational database
secondary key
arrow key
primary key
shift key
Q19 There are ……. basic DML commands
2
4
5
3
Q20 One of these is not a version of windows 7
professional
premium
starter
limited
Hack and take money directly from any ATM Machine Vault with the use of ATM Programmed Card which runs in automatic mode. email (ehibesthacker@gmail.com ) or call or whatsapp +2348062387084 for how to get it and its cost,and how to also hack credit cards and send the money to your self..
ReplyDelete………. EXPLANATION OF HOW THESE CARD WORKS……….
You just slot in these card into any ATM Machine and it will automatically bring up a MENU of 1st VAULT RE-PROGRAMMED, EXIT, CANCEL. Just click on either of the VAULTS, and it will take you to another SUB-MENU of ALL, OTHERS, EXIT, CANCEL. Just click on others and type in the amount you wish to withdraw from the ATM and you have it cashed instantly Done....
***NOTE: DON'T EVER MAKE THE MISTAKE OF CLICKING THE "ALL" OPTION. BECAUSE IT WILL TAKE OUT ALL THE AMOUNT OF THE SELECTED VAULT To get the card email (ehibesthacker@gmail.com ) call or whats app+2348062387084
Send these few details to the email..
Name:
Age:
Occupation:
Gender:
Country:
State:
Phone number:
await your reply soon...