- Twice
- Two
- Zero
- Three
- b
-
You will continue the sequence as previous.
The encryption of data is related to:
- Data Accessibility
- Data Security
- Data Visibility
- Data updated
- b
-
This term or functionality is used to secure the data.
Nobody can check your data due to Encryption.
A person who gains illegal access to a computer system is called:
- Hacker
- Software
- Zapper
- Worm
- a
-
There are three main types of Hackers, which are:
White Hat Hackers
Red Hat Hackers
Grey Hat Hackers
Which colour under lines indicates spelling mistakes?
- Yellow
- Red
- Black
- Blue
- b
-
Red line indicates spelling mistakes.
Blue line indicates grammatically mistakes.
Which of the following shortcut key is used to check spelling?
- F5
- F4
- F7
- F9
- c
-
Spelling and Grammar mistakes are indicated in MS Word with Red and Blue lines.
If 3a+15=3-4a, find the value of “a”?
- 22
- 69/7
- 1
- -12/7
- d
-
3a+15=3-4a
3a+4a=3-15
7a=-12
a=-12/7
Which of the following is not a prime number?
- 45
- 51
- 38
- 22
- b
-
A number that is divisible by itself and 1 is called Primary Number i.e. 1,3,5,7,11,13,17,19,23,29 etc.
What is synonym word of “Reward”?
- Fine
- Prize
- Punish
- Praise
- b
-
Reward انعام
Prize انعام
What is synonym word of “Delicate”?
- Difficult
- Easy
- Fragile
- Sensitive
- d
-
Delicate نازک
Sensitive نازک
Solve: 2,3,6,18,?,1944
- 120
- 111
- 108
- 119
- c
-
3*2=6
6*3=118
18*6=108
108*18=1944