Most viewed questions in Others

0 votes
2 answers
122
0 votes
1 answer
123
Anyone is having standard book for coa hamachare 7 edition pls share link.
1 votes
2 answers
124
1 votes
1 answer
127
Manager’s salary details are to be hidden from Employee table. This Technique is called asConceptual level DatahidingPhysical level DatahidingExternal level Datahid...
2 votes
2 answers
128
A Network Schemarestricts to one to many relationshippermits to many to many relationshipStores Data in a DatabaseStores Data in a Relation
1 votes
1 answer
129
2 votes
1 answer
130
1 votes
1 answer
131
2 votes
2 answers
132
A signal processor software is expected to operate for 91.25 days after repair, and the mean software repair time is expected to be 5 minutes. Then, the availability of t...
1 votes
2 answers
133
The task of correcting and preprocessing data is called asData streamingData cleaningData miningData storming
1 votes
1 answer
136
0 votes
1 answer
137
1 votes
1 answer
138
If user A wants to send an encrypted message to user B, the plain text of A is encrypted with thePublic key of user APublic key of user BPrivate key of user APrivate key ...
2 votes
3 answers
140
Which of the following is the process by which a user’s privileges ascertained ?AuthorizationAuthenticationAccess ControlNone of these