Most viewed questions in Others

0 votes
2 answers
101
0 votes
1 answer
102
Anyone is having standard book for coa hamachare 7 edition pls share link.
1 votes
2 answers
103
1 votes
1 answer
106
Manager’s salary details are to be hidden from Employee table. This Technique is called asConceptual level DatahidingPhysical level DatahidingExternal level Datahid...
2 votes
2 answers
107
A Network Schemarestricts to one to many relationshippermits to many to many relationshipStores Data in a DatabaseStores Data in a Relation
1 votes
1 answer
108
2 votes
1 answer
109
1 votes
1 answer
110
2 votes
2 answers
111
A signal processor software is expected to operate for 91.25 days after repair, and the mean software repair time is expected to be 5 minutes. Then, the availability of t...
1 votes
2 answers
112
The task of correcting and preprocessing data is called asData streamingData cleaningData miningData storming
1 votes
1 answer
115
0 votes
1 answer
116
1 votes
1 answer
117
If user A wants to send an encrypted message to user B, the plain text of A is encrypted with thePublic key of user APublic key of user BPrivate key of user APrivate key ...
2 votes
3 answers
119
Which of the following is the process by which a user’s privileges ascertained ?AuthorizationAuthenticationAccess ControlNone of these