Flylib.com
R
Previous page
Table of content
Next page
[ LiB ]
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]
RAM
(random access memory)
application loads
size of
typical size range
volatility of
random access memory, [See RAM]
read-only files 2nd
read-only memory, [See ROM]
read-write files 2nd
reading
messages
Outlook Express 2nd
recently used files
viewing 2nd
records
(databases)
forms
navigating (Access 2002)
sorting
tables
adding (Access 2002) 2nd 3rd
data deletion (Access 2002)
deleting (Access 2002)
modifying (Access 2002) 2nd
navigating (Access 2002) 2nd
sorting
recycle bin
emptying
Recycle Bin icon
Red Hat Linux
redo feature
presentations (PowerPoint)
redoing
actions
in documents (Word 2002)
referential integrity
database tables 2nd
refreshing
pages
Web browsers
relational database management system (RDBMS)
relationships
database tables 2nd
tables
deleting (Access 2002) 2nd 3rd
relative cell references 2nd
removable storage devices
files
backing up 2nd
removing
line breaks
Word 2002
paragraph marks
Word 2002
renaming
directories 2nd
documents
Microsoft Word 2002 2nd
files 2nd
folders 2nd
spreadsheets
Microsoft Excel 2002
worksheets (Excel 2002)
Replace command (Edit menu) 2nd
replacing
cell data
spreadsheets (Excel 2002)
replying
messages
Outlook Express 2nd 3rd
Report command (Insert menu)
reports
data
print previews
databases
creating 2nd 3rd 4th
data groupings
deleting
footer text modifications
grouped data summaries 2nd 3rd
header text modifications
layout options 2nd
saving
page orientations
selecting
printing (Access 2002)
resizing
charts
in documents (Word 2002)
drawn objects
in slides (PowerPoint)
pictures
in documents (Word 2002)
in slides (PowerPoint)
windows
resolution
system properties
modifying 2nd
Restart mode
computer power downs
restarting
computers 2nd
print jobs
restoring
deleted email
Outlook Express
directories
files
folders
review questions (exam)
computer management 2nd 3rd 4th 5th 6th
database applications 2nd 3rd 4th 5th 6th
email applications 2nd 3rd 4th 5th 6th
information technology (IT) 2nd 3rd 4th 5th 6th 7th 8th
presentation applications 2nd 3rd 4th 5th 6th
spreadsheet applications 2nd 3rd 4th 5th 6th 7th 8th
Web browsers 2nd 3rd 4th 5th
Web sites 2nd 3rd 4th 5th
word processing applications 2nd 3rd 4th 5th 6th
review session 1
answers 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th
questions 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th
how to use 2nd
practice tips 2nd
review session 2
answers 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th
questions 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th
practice tips
right align text
paragraph formatting
right indents
paragraph formatting 2nd
ROM
(read-only memory)
root directories
folder hierarchy
rotating
drawn objects
in slides (PowerPoint) 2nd
Row command (Format menu)
rows
freezing (Excel 2002) 2nd
spreadsheets
deleting (Excel 2002) 2nd
inserting (Excel 2002)
modifying (Excel 2002) 2nd
tables
inserting (Word 2002)
modifying (Word 2002) 2nd
rtf file extension (rich text format)
rtf file extension (Rich Text Format)
rules
databases
setting 2nd
[ LiB ]
Previous page
Table of content
Next page
ICDL Exam Cram 2
ISBN: 0789730928
EAN: 2147483647
Year: 2006
Pages: 142
Authors:
Mike Gunderloy
,
Susan Harkins
BUY ON AMAZON
Absolute Beginner[ap]s Guide to Project Management
Project Management Overview
Reasons for Estimating Woes
Some Special Situations
Five Key Principles
First, Lets Clarify a Few Terms
CISSP Exam Cram 2
Put Yourself to the Test
Identification, Authentication, and Authorization
System Architecture and Models
Exam Prep Questions
Cryptography
Inside Network Security Assessment: Guarding Your IT Infrastructure
What Security Is and Isnt
Risk Terminology
Choosing the Best Risk-Assessment Approach
Putting Together a Toolkit
Conclusions
High-Speed Signal Propagation[c] Advanced Black Magic
DC Resistance
Skin-Effect Inductance
Limits to Attainable Distance
UTP Connectors
Cabling the Fiber
A+ Fast Pass
Domain 1 Installation, Configuration, and Upgrading
Domain 4 Motherboard/Processors/Memory
Domain 1 Operating System Fundamentals
Domain 2 Installation, Configuration, and Upgrading
Domain 3 Diagnosing and Troubleshooting
802.11 Wireless Networks: The Definitive Guide, Second Edition
Why Wireless?
Wired Equivalent Privacy (WEP)
User Authentication with 802.1X
Preauthentication
11 Performance Tuning
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies