Database Management System

IMPORTANT

Database Management System: Overview

This topic covers concepts, such as, DBMS & Computer and Network Security etc.

Important Questions on Database Management System

MEDIUM
IMPORTANT

Nowadays Vishing has become a criminal practice of using social engineering over which of the following?

EASY
IMPORTANT

Processing step (operation or action) in flowchart is represented by _____.

EASY
IMPORTANT

What was the name of the virus that hit the Kudankulam Nuclear Power Plant in Tamil Nadu in 2019?

EASY
IMPORTANT

Which of the following term is used when electronic files and data is altered or deleted in order to harm the owner or the creator of the content?

EASY
IMPORTANT

Which of the following term is used when a system is remotely controlled by a hacker for malicious activity?

EASY
IMPORTANT

Which of the following is not a method of cyber fraud?

MEDIUM
IMPORTANT

Data Security Council of India was founded in _____.

MEDIUM
IMPORTANT

Which of the following is correlated with the operation of converting ordinary text language into coded text language and vice-versa for the security of data?

MEDIUM
IMPORTANT

_____ is the process of verification of a login name and password through an individual.

MEDIUM
IMPORTANT

The first computer virus was named  _____.

MEDIUM
IMPORTANT

When a hacker contacts your phone or E-mails and attempts to acquire your personal details and password, it is called _____.

MEDIUM
IMPORTANT

The relationship type is represented by _____ In ER diagram.

MEDIUM
IMPORTANT

_____ is called the rows of a relation.

MEDIUM
IMPORTANT

Which of the following field of a record uniquely identifies each record?

MEDIUM
IMPORTANT

A database stores information in _____.

EASY
IMPORTANT

When the compiler cannot differentiate between two overloaded constructors, they are called-

EASY
IMPORTANT

Which is another name for functional language?

EASY
IMPORTANT

Which of the following virus overtake computer system when it boots and destroy information?

EASY
IMPORTANT

Which of the following statements is not true about two-tier client-server database architecture?