If you need to double underline a word, how will you do that?
Options: a. Go to Format menu and then Font option. Open Underline Style and choose Double Underline
b. From Format menu choose Font option and then from Font tab open Underline Style and select Double Underline
c. Select the text then choose Format >> Font and on Font tab, open Underline Style and choose Double Underline
d. Click double underline tool on formatting toolbar
Business meeting and conferences can be held by linking distantly located people through a computer network. Not only the participants exchange information but are able to see each other. What is it called?
Options: Adding ? symbol at the end of filename while saving workbook
B. Click on Worksheet tab by Holding CTRL Key and type new name
C. Double Click on the Worksheet tab and type new name
D. Worksheet cannot renamed
Ans:– C ,
Business Intelligence (BI) systems do not obtain their data by which of the following means?
Options: Read and process data from an operational database, Process transactions, Process extracts from operational databases, Process data purchased from data vendors
Options: a. Required when a table does not have any unique fields in it
b. The primary key with AutoNumber as the field type
c. Made up of two or more fields to uniquely identify records
d. Is a foreign key that uniquely identifies records
Two connected routers are configured with RIP routing. What will be the result when a router receives a routing update that contains a higher-cost path to a network already in its routing table?
Options: The updated information will be added to the existing routing table., The update will be ignored and no further action will occur., The updated information will replace the existing routing table entry., The existing routing table entry will be deleted from the routing table and all routers will exchange routing updates to reach convergence.
Â Which is the menu to create a text box on a slide.
Options: Â View -> Text Box
B. Â Tools -> Text Box
C. Â Insert -> Text Box
D. Â Format -> Text Box
Ans:â€“ C ,
Which of the following is true regarding access lists applied to an interface?
Options: You can place as many access lists as you want on any interface until you run out of memory., You can apply only one access list on any interface., One access list may be configured, per direction, for each layer 3 protocol configured on an interface., You can apply two access lists to any interface.
What hole will allocates in â€œWorst-Fitâ€ algorithm of memory management?
Options: It allocates the smaller hole than required memory hole
B. It allocates the smallest hole from the available memory holes
C. It allocates the largest hole from the available memory holes
D. It allocates the exact same size memory hole