| INPUT | OUTPUT | |
| P | O | R |
| 0 | 0 | 1 |
| 0 | 1 | 0 |
| 1 | 0 | 0 |
| 1 | 1 | 0 |
The table above represents the Truth Table for?
NOT logic gate
NOR logic gate
AND logic gate
NAND logic gate
Correct answer is D
No explanation has been provided for this answer.
Which of the following is not a good ICT security policy?
Re-use of old password
Frequent change of password
Backing up files and documents
Scanning e-mail attachment for virus before opening it
Correct answer is A
No explanation has been provided for this answer.
Which of the following factors limits access to computerized file system? it
occupies less space
requires regular supply of power
is highly efficient in processing information
provides easy and fast access to information
Correct answer is B
No explanation has been provided for this answer.
Soft boot is initiated by pressing?
Ctrl + Alt + Del
function key F10
main switch
bootstrap buttons
Correct answer is A
No explanation has been provided for this answer.
The absolute address of cell G5 in a spreadsheet application is represented by?
$G5
G$5
$G$5
$G5$
Correct answer is A
No explanation has been provided for this answer.