736 . Computer Memory is normally measured in :
- A. Kilobytes
- B. Megabytes
- C. Gigabytes
- D. Terabytes
- E. none of them
![]() |
![]() |
![]() |
737 . Computers that once took up entire rooms are now ____ to put on desktops and into wristwatches.
- A. small enough
- B. smaller than
- C. as small as
- D. so small
![]() |
![]() |
![]() |
ঘ ইউনিট (2009-2010) || ঢাকা বিশ্ববিদ্যালয় || 2009
More
![]() |
![]() |
![]() |
Sonali- Rupali- Bangladesh Krishi- Rajshahi krishi unnayn-Investment Corporation of Bangladesh | 30.11.2018
More
739 . Consider the following table named 'account' . What is the correct SQL to get all the account information of 'Motijheel' branch. Account ID 10001 10002 10003 Account Holder Md. Humaun Kabir Ruhul Amin Aminul Hossain Account type Savings Savings Business Branch Motijheel Uttara Motijheel
- A. SELECT * FROM account
- B. SELECT * FROM Account Branch =Motijheel
- C. SELECT * FROM account WHERE Branch = Motijheel
- D. SELECT ALL FROM Account WHERE Branch = Motijheel
![]() |
![]() |
![]() |
740 . Consider the following variable declarations and definations in C . (i) int var _ 9 =1 ; (ii) int 9 _ var =2; (iii) int + =3; Choose the correct statement w.r.t above variables.
- A. Both i. and ii. are valid
- B. Only i. is valid
- C. Both i. & iii. are valid
- D. All of these
![]() |
![]() |
![]() |
Sonali &-Janata Bank | Officer (IT)| 04.01.2019
More
741 . Convertion of dada onto code is called-
- A. encryptin
- B. firewall
- C. digital certificate
- D. password
![]() |
![]() |
![]() |
742 . Ctrl, Shift and Alt are called _____ keys
- A. Alphanumeric
- B. Modifier
- C. Adjustment
- D. Function
![]() |
![]() |
![]() |
সমন্বিত ৭ ব্যাংক || অফিসার (ক্যাশ) (24-05-2024)
More
743 . Ctrl,shift and Alt are called_keys
- A. Function
- B. Adjustment
- C. Modifier
- D. Application
![]() |
![]() |
![]() |
Sonali Bank Ltd. Senior Officer Recruitment 01.06.2018
More
744 . Ctrl + N is used to -
- A. Save Document
- B. New Document
- C. Open Document
- D. Close Document
![]() |
![]() |
![]() |
745 . Ctrl , shift, and Alt are called
- A. modifier
- B. function
- C. alphanumeric
- D. adjustment
![]() |
![]() |
![]() |
746 . Cyber Security Act was enacted in Bangladesh in the year-
- A. 2018
- B. 2020
- C. 2022
- D. 2023
![]() |
![]() |
![]() |
সমন্বিত ১০ ব্যাংক ও আর্থিক প্রতিষ্ঠান || অফিসার (জেনারেল) (08-03-2024)
More
747 . Data access time depends on -
- A. Seek time
- B. Rotational delay
- C. Operating frequency
- D. All of them
![]() |
![]() |
![]() |
748 . Data are entered into a computer through:
- A. Software
- B. Output device
- C. Input device
- D. Memory
![]() |
![]() |
![]() |
পল্লী বিদ্যুতায়ন বোর্ড। এসিস্ট্যান্ট এনফোর্সমেন্ট কোঅডিনেটর। 31-12-2021
More
749 . Data is independence means
- A. data is defined separately and not included in programe
- B. programs are not dependent of the physical attributes of data
- C. programs are not dependent on the logical attributes of data
- D. both b and c
![]() |
![]() |
![]() |
750 . dbase III is-
- A. Hardware
- B. Application Software
- C. Firmware
- D. Operating System
![]() |
![]() |
![]() |
সমন্বিত ৮ ব্যাংক ও ১ টি আর্থিক প্রতিষ্ঠান || অফিসার জেনারেল (10-03-2023)
More