Computer malware is detected by
When performing computer recovery operations after a system crash, the startup disk is used to
The speed of access to files in a random access file compared to other file organization methods is
Which of the following devices is needed by a technician for protection against electrostatic discharge?
Figure 3 is a Microsoft Excel Worksheet. Use it to answer questions 20 and 21.
A | B | C | D | E | |
1 | IDENTICATION NUMBER | BASIC SALARY (N) | TOTAL ALLOWANCE (N) | TOTAL DEDUCTION (N) |
NET SALARY (N) |
2 | WASC/LPT/001 | 800000 | 60000 | 40000 | 820000 |
3 | WASC/LPT/002 | 700000 | 40000 | 20000 | 720000 |
4 | WASC/LPT/003 | 300000 | 10000 | 5000 | 305000 |
5 | WASC/LPT/004 | 400000 | 20000 | 10000 | 410000 |
Figure 3
What formula will correctly display the total number of individuals involved in the computation as shown in Figure 3?