Answer: DomainSol. The values of the attribute should be present in the domain. Domain is a set of values permitted.
Answer: DomainSol. The values of the attribute should be present in the domain. Domain is a set of values permitted.
Answer: View levelSol. An external schema specifies a view of the data in terms of the conceptual level. This is also referred to as the view level.
Answer: DB2Sol. DB2 is a database product from IBM. It is a Relational Database Management System (RDBMS). DB2 is designed to store, analyze and retrieve the data efficiently.
Answer: ConceptualSol. Conceptual design is both software and hardware independent.
Answer: American Standard Code for Information InterchangeSol. American Standard Code for Information Interchange, is a character encoding standard (the Internet Assigned Numbers Authority (IANA) prefers the name US-ASCII). ASCII codes represent text in computers, telecommunications equipment, and other devices.
Answer: A TCP/IP protocol used to dynamically bind a high level IP address to a low level physical hardware addressSol. The address resolution protocol is a protocol used by the Internet Protocol (IP), specifically IPv4, to map IP network addresses to the hardware addresses used by a data link protocol. The protocol operates below the network layer as a part of the interface between the OSI network and OSI link layer.
Answer: Buying and selling goods/services through wireless handheld devicesSol. M-commerce (mobile commerce) is the buying and selling of goods and services through wireless handheld devices such as cellular telephone and personal digital assistants (PDAs). Known as next-generation e-commerce, m-commerce enables users to access the Internet without needing to find a place to plug in.
Answer: JDKSol. The Java Development Kit (JDK) is a software development environment used for developing Java applications and applets.
Answer: TeamViewerSol. TeamViewer is a proprietary computer software package for remote connection, desktop sharing, online meetings, web conferencing and file transfer between computers.
Answer: Magnetic coresSol. Magnetic-core memory was the predominant form of random-access computer memory for 20 years between about 1955 and 1975. Such memory is often just called core memory, or, informally, core.
Answer: The CD-ROM stops functioningSol. Except option (b) all others are the symptoms of a computer virus.
Answer:
Sol. The text written within the H4 element has the same size as the normal plain text, whereas the text written within the H1, H2 and H3 elements are larger than the normal text. Text written within the H5 and H6 elements has smaller size than the normal text.
Answer: TelevisionSol. Television is an example of simplex communication.
Answer: It can contain many sheets including worksheets and chart sheetsSol. A workbook is a collection of worksheets.
Answer: NestedSol. A function inside another function is called a nested function.
Answer: POSTSol. POST is a diagnostic testing sequence of a computer that is run before the actual booting to ensure that the computer hardware is functioning well. It stands for ‘Power-On Self-Test’.
Answer: TransportSol. UDP and TCP protocols are used for providing end-to-end connectivity between nodes in a network as they use connectionless and connection oriented services, respectively. The end-to-end communication between nodes is the responsibility of the Transport layer.
Answer: Both can be used to copy file or group of filesSol. Copy and X Copy both can be used to copy file or group of files.
Answer: DraggingSol. Dragging is the gesture of Holding the mouse button down while moving an object of text or image or any file or its part.
Answer: Inkjet and laser printersSol. Non-impact printer does not establish any mechanical contact between the print head and the paper. The well-known non-impact printers are inkjet and laser printers.