Database Management System
Database Management System: Overview
This topic covers concepts, such as, DBMS & Computer and Network Security etc.
Important Questions on Database Management System
Nowadays Vishing has become a criminal practice of using social engineering over which of the following?

Processing step (operation or action) in flowchart is represented by _____.

Data processing is _____.

What was the name of the virus that hit the Kudankulam Nuclear Power Plant in Tamil Nadu in ?

Which of the following term is used when electronic files and data is altered or deleted in order to harm the owner or the creator of the content?

Which of the following term is used when a system is remotely controlled by a hacker for malicious activity?

Which of the following is not a method of cyber fraud?

Data Security Council of India was founded in _____.

Which of the following is correlated with the operation of converting ordinary text language into coded text language and vice-versa for the security of data?

_____ is the process of verification of a login name and password through an individual.

The first computer virus was named _____.

When a hacker contacts your phone or E-mails and attempts to acquire your personal details and password, it is called _____.

The relationship type is represented by _____ In ER diagram.

_____ is called the rows of a relation.

Which of the following field of a record uniquely identifies each record?

A database stores information in _____.

When the compiler cannot differentiate between two overloaded constructors, they are called-

Which is another name for functional language?

Which of the following virus overtake computer system when it boots and destroy information?

Which of the following statements is not true about two-tier client-server database architecture?
