Answer: Problem analysis phase
Explanation: Problem phase analysis is the mechanism that helps in studying the problems and issue that occur in the application and system of any business organization.It helps in identification of the reason and consequences of the detected problems.The requirements of user and resources to accomplish business system is also analyzed.
Other options are incorrect because scope definition phase is used for identification of the boundaries of any project regarding opportunities and issue in business .
Requirement analysis phase is used for gathering the need of the user and the condition requirement to fulfill a project. Decision phase analysis is done to bring out the best possible solution for any project. Thus, the correct option is problem analysis phase.
Virus
Keylogger
Timebomb
Answer: Worm
Explanation: Worm is the malicious software program which acts as the infection in the computer system. It has the ability to replicate itself and spread in the other systems .It is found in those parts that have automatic operation and non-noticeable.
The effect of the worm is slowing down the operations ,disturb the network etc.Other options are incorrect because virus is the malicious program that infects the host, key-loggers are used for monitoring of system and time bomb is the program for releasing the virus in computer network. Thus, the correct option is worm.
c) Which type of graph will be suitable for representing only gold medals information? (2 marks)
d) In which column(s) might replication have been used?
(2 marks)
e) What Excel formula can be used to calculate the overall total medals awarded? (3 marks)
14) Write the Excel functions for the following: (5 Marks each)
a. Give the total number of medals for Germany and Great Britain.
b. Give the average number of silver medals for a European country,
c. Sum the Medals Total for Gold for those countries with less than 20 games involvement.
d. Search the database (the whole spreadsheet) to find ‘Italy’ and also the corresponding Medals Total.
Answer:
a) highlight row F by clicking on F, go to toolbar at top undar DATA click filter, you will see an arrow next to F now, click the dropdown on the arrow and sort
Explanation:
Answer: No
Explanation: Spread spectrum transmission is the wireless transmission technique for the wide channel that helps in decrement of the potential interference.The transmission of signal is based on the varying the frequency knowingly to achieve larger bandwidth.
The use of spread spectrum transmission in the WLAN(wireless local area network)is used for the regulatory purpose The regulation is the controlling of the area through policies.Thus,security is not the service that is provided to WLAN by spread spectrum transmission.
B. Range
C. Complex
D. Parameter
Your answer is A. Because a query is a question about a an organization to check how it's going
(B) A warm
(C) A trojan horse
(D) A rootkit
Answer: Option (B) is correct.
Explanation:
A worm in technical sense is also known as a computer worm which is a self-replicating virus/ malicious content that replicates itself in order to spread to the uninfected PC. They often use components of an OS (operating system) which are automatic and also invisible to an individual. It should be duly noted that it is usual for a computer worm to be observed only when their replication utilizes system content, slowing other tasks at hand.
Answer: syntax is a set of rules for grammar and spelling. In other words, it means using character structures that a computer can interpret
Answer:
in computer science, the syntax of a computer language is the set of rules that defines the combinations of symbols that are considered to be correctly structured statements or expressions on that language.