Which of following stores data in an organized form?
The shape that is used to represent an attribute in an ERD is?
The relationship that matches one record of an entity with only one record of another entity is called?
Data Redundancy means?
A key that allows only unique entries in a field is called?
A field that stores the names of students should be defined as?
In a relational database, keys are used to create a?
In a database table of "Students", the particulars of a single student will be a?
In a database table of "Students", the address of the students will be a?
The basic limitation of a flat file database is that?
Which of the following Microsoft Office packages is a DBMS?
Utility software designed to protect computers from any potential threats of data or hardware loss from viruses or malware are called?
The illegal use, copying or distribution of copyrighted software is called?
Persons who gain unauthorized access to another system are called?
The crime that is committed through a computer or a network is called?
It is presenting someone else work or ideas as your own without full acknowledgement to the author or conceiver?
It is one of the largest computer security companies in the world?
A malware that monitors a device and steals important information and sends such information to another person or organization is called?
Boot sector, Resident and file infector are some examples of?
It is a method of trying to gather personal information using false e-mails and websites?
According to Pakistan's Cyber Crime Law, any offender may be sent to jail for?
"Click this link and win a $5 voucher at McDonald's". This is an example of?
Through which virus spreads?
The malware that replicates itself and doesn't need to attach with any files is?
Since it does not harm or steal data, the least harmful malware is?