Advertisements
Advertisements
If we want to include attributes from two different relatons, which of the following operations is needed?
Concept: undefined >> undefined
Suppose we wish to find all customers who have both a loan and an account. Which of the following operation allow us to produce this relation?
Concept: undefined >> undefined
Advertisements
Which set operation should be used with the SELECT statements to eliminate duplicate rows?
Concept: undefined >> undefined
Which set operation is used to return the common row from relation?
Concept: undefined >> undefined
A research student is expected to write a thesis on a topic. The student browses the Internet for the topic and luckily finds it on the Internet. He copies and submits the entire thesis as his own research work. Which of the following activities appropriately categorizes the act of the writer?
Concept: undefined >> undefined
Which of the following crime(s) is/are covered under cybercrime?
- Stealing a brand new hard disk from a shop.
- Get into an unknown person's social networking account and start messaging on his behalf.
- Copying some important data from a computer without taking permission from the owner of the data.
- Working on someone's computer with his/her permission.
Concept: undefined >> undefined
Identify the type of cybercrime for the following situations: A person complains that his/her debit/credit card is safe with him still somebody has done a shopping/ATM transaction on this card.
Concept: undefined >> undefined
Which of the following is not a type of cybercrime?
Concept: undefined >> undefined
The primary law in India dealing with cybercrime and electronic commerce is ______
Concept: undefined >> undefined
______ is the crime of obtaining the personal or financial information of another person for the sole purpose of assuming that person's name or identity to make transactions or use it to post inappropriate remarks, comments, etc.
Concept: undefined >> undefined
______ is a term used to describe the legal issues related to using of communications technology, particularly "cyberspace", i.e. the Internet.
Concept: undefined >> undefined
Which kind of offense out of the following is made by the student who copies someone else's work?
Concept: undefined >> undefined
Which of the following join selects all rows from both the tables as long as the condition satisfies?
Concept: undefined >> undefined
Internet explorer falls under ______.
Concept: undefined >> undefined
If we open an existing file in the ______ mode the previous data will be erased and the file object will be positioned at the beginning of the file.
Concept: undefined >> undefined
Which method takes string as an argument and writes it to the text file?
Concept: undefined >> undefined
The writelines() method can write multiple lines with the help of:
Concept: undefined >> undefined
A ______ is a join of every row of one table to every row of another table.
Concept: undefined >> undefined
Which amongst the following is not an example of browser?
Concept: undefined >> undefined
After setting up the lab and internet in the lab, Samarth is now required to enable videos and animations to be played on the web browser for students of multimedia class. Which browser tool/service can be used for the same?
Concept: undefined >> undefined
