Answer: One table can have only one unique keySol. Since one table can have at the most one primary key to avoid duplicates in other columns of the table, unique key can be defined. We can make one or more unique keys in a single table.
Answer: One table can have only one unique keySol. Since one table can have at the most one primary key to avoid duplicates in other columns of the table, unique key can be defined. We can make one or more unique keys in a single table.
Answer: Distributed Denial-of-ServiceSol. Distributed Denial-of-Service (DDoS) attack is a type of attack that is carried out by using multiple computers. These DDoS attacks aim at targeting computer networks of an organisation, such as Digital Subscriber Line (DSL) and cable.
Answer: It is a slow networkSol. The client/server network contains a centralised server that manages and controls all the other nodes of the network. It is expensive as it requires NOS and a specialized server system. It is highly secure and processes good speed. However, it becomes congested when more clients simultaneously request for a service to the server.
Answer: Both (a) and (c)Sol. Pressing Ctrl + I on the keyboard and Using the Format – Cells – Font menu item; both of these actions can help to set text in selected cells to italics.
Answer: Used to look in a single row or column and find a value from the same position in a second row or columnSol. LOOKUP function is used to look in a single row or column and find a value from the same position in a second row or column.
Answer: Control unit, arithmetic logic unit and primary storageSol. Control unit, arithmetic-logic unit and primary storage are the parts of the CPU. The storage unit deals with the allocation of memory to the processed data, the Control Unit (CU) controls the flow and processing of the data and the Arithmetic Logic Unit (ALU) carries out the arithmetic operations of calculations of the computer system.
Answer: A majority of buffers are implemented in software, which typically use the ROM to store temporary dataSol. Majority of buffers use the faster RAM to store temporary data, not the ROM, due to the much faster access time compared with hard disk drives.
Answer: A network connecting all computers of an organization and using the internet protocolSol. An intranet is a private network accessible only to an organization's staff.
Answer: 1,048,576Sol. In latest version there are 1,048,576 rows by 16,384 columns.
Answer: Virtual keyboardSol. A virtual keyboard is used for entering characters in a computer like a regular keyboard. However, unlike a regular keyboard, it is a software component.
Answer: Spreadsheet programSol. A spreadsheet program is general-purpose software that allows you to do mathematical or financial calculation. An example of a spreadsheet program is MS excel
Answer: Replacing misspelled words with the correct ones while typingSol. The AutoCorrect feature is used to correct typo errors and miss-spelled words automatically according to the words given in the list for the AutoCorrect feature.
Answer: VolatileSol. Volatile memory is a type of memory that clears everything when the power of a computer gets switched off, whereas nonvolatile memory retains the data even when the power gets switched off. Moreover, ROM and flash memory also retain the data in case the power gets switched off.
Answer: LABELSol. Label (command) in computing, label is a command included with some operating systems (e.g., DOS, OS/2 and Microsoft Windows). It is used to create, change, or delete a volume label on a logical drive, such as a hard disk partition or a floppy disk.
Answer: Executable FilesSol. EXE is extension for executable files
Answer: Full-duplex modeSol. In the simplex mode, communication is always unidirectional, for example television. In the half-duplex mode, communication is bidirectional but one at a time, which means only one of the parties can send data at a time. Walkie-talkie is an example of half duplex communication. In the full-duplex mode, communication is bidirectional, which means both the parties can transmit data simultaneously. Telephone is an example of full-duplex communication. The semi-duplex mode is not and type of communication mode.
.
Answer: IABSol. Internet Architecture Board (IAB) administers and provides long-range technical direction for Internet development.
Answer: TeamViewerSol. TeamViewer is a proprietary computer software package for remote connection, desktop sharing, online meetings, web conferencing and file transfer between computers.
Answer: Angular brackets < >Sol. Most tags in HTML must have two parts, an opening and a closing part. For example, is the opening tag and is the closing tag.
Answer: Top-down approachSol. E-R model uses top-down approach; Bottom-up approach is known as normalization.