What is the term for the unauthorized modification of data within a database by exploiting vulnerabilities in an application’s software?
What was the primary advancement of the EDVAC over the ENIAC?
What is the relationship between a ‘record’ and a ‘file’?
Which stage of the SDLC involves evaluating the system to ensure it meets user needs and making necessary adjustments?
Which key on a keyboard is used to access special functions like volume control or brightness?
Which of the following best describes the SDLC?
Which of the following best describes software?
Which application package is used for developing websites?
Which access method is least efficient for data retrieval?
What does the ‘Thesaurus’ feature in word processing packages help users with?
Which type of computer functions as a central repository, providing hardware, software, and other resources to multiple clients connected over a network?
Which of the following controls the way in which the computer system functions and provides a means by which users can interact with the computer.
In computer architecture, the type of bus that connects the major components of a computer system is
Using Boolean identities, reduce the given Boolean expression:
A(A+1) + A(B+0) + C.1
The first stage of data processing activities is ?
One of the following is not a good way to prevent virus.
Translating the problem statement into a series of sequential steps describing what the program must do is known as
The closest computer language to human is ?
If the control unit controls other units of the CPU, which unit stores instructions,data and intermediate results.
Computers that are small and low cost are referred to as ?
In BASIC, REM shows a statement to be