Ask questions which are clear, concise and easy to understand.
Ask QuestionPosted by Kritika S 4 years, 7 months ago
- 0 answers
Posted by Saurav Das 4 years, 7 months ago
- 1 answers
Meghna Thapar 4 years, 7 months ago
In relational databases, and flat file databases, a table is a set of data elements (values) using a model of vertical columns (identifiable by name) and horizontal rows, the cell being the unit where a row and column intersect. A table has a specified number of columns, but can have any number of rows. A database is a collection of interrelated data , these data are stored in the table which are related to one another, to search and retrieve data queries are made . A table is made up of rows and columns , data of databases are stored in the table.
Posted by Keshav Kohli 4 years, 7 months ago
- 1 answers
Yogita Ingle 4 years, 7 months ago
While software is the set of programs or instructions that are required by the hardware resources to function properly. There are a few basic components that aids the working-cycle of a computer i.e. the Input- Process- Output Cycle and these are called as the functional components of a computer.
Posted by Ram Fagoria 4 years, 7 months ago
- 1 answers
Yogita Ingle 4 years, 7 months ago
Parameter | Primary memory | Secondary memory |
Nature | The primary memory is categorized as volatile & nonvolatile memories. | The secondary memory is always a non-volatile memory. |
Alias | These memories are also called internal memory. | Secondary memory is known as a Backup memory or Additional memory or Auxiliary memory. |
Access | Data is directly accessed by the processing unit. | Data cannot be accessed directly by the processor. It is first copied from secondary memory to primary memory. Only then CPU can access it. |
Formation | It's a volatile memory meaning data cannot be retained in case of power failure. | It's a non-volatile memory so that that data can be retained even after power failure. |
Storage | It holds data or information that is currently being used by the processing unit. Capacity is usually in 16 to 32 GB | It stores a substantial amount of data and information. Capacity is generally from 200GB to terabytes. |
Accesses | Primary memory can be accessed by the data bus. | Secondary memory is accessed by I/O channels. |
Expense | Primary memory is costlier than secondary memory. | Secondary memory is cheaper than primary memory. |
Posted by Ayan Khan 4 years, 7 months ago
- 1 answers
Aimy Kunnel 4 years, 3 months ago
Posted by Taniya Baliyan 4 years, 7 months ago
- 0 answers
Posted by Sunil Kumar 4 years, 8 months ago
- 0 answers
Posted by Yumna Riyaz 4 years, 8 months ago
- 1 answers
Posted by Anil Anil 4 years, 8 months ago
- 1 answers
Geetika Bhasin 4 years, 7 months ago
Posted by Harshee Sharma 4 years, 8 months ago
- 0 answers
Posted by Mani Rajput 4 years, 8 months ago
- 0 answers
Posted by Abhay Gupta 4 years, 8 months ago
- 4 answers
Posted by Mahendran R 4 years, 9 months ago
- 1 answers
Yogita Ingle 4 years, 9 months ago
A server is a connection point for several clients, that will handle their requests. A client is software that connects to the server to perform actions. The client provide a user interface that allows users to carry out actions.
Posted by Ritik Bhardwaj 4 years, 9 months ago
- 1 answers
Bharat Sharma 4 years, 9 months ago
Posted by Arvind Patel 4 years, 9 months ago
- 1 answers
Yogita Ingle 4 years, 9 months ago
A data dictionary contains metadata i.e data about the database. The data dictionary is very important as it contains information such as what is in the database, who is allowed to access it, where is the database physically stored etc. The users of the database normally don't interact with the data dictionary, it is only handled by the database administrators.
Posted by Sahithi Varma 4 years, 9 months ago
- 1 answers
Kashish Talesara 4 years, 9 months ago
Posted by Taran Tana Tana 4 years, 10 months ago
- 1 answers
Posted by Kunal Kumar Kumar 3 years, 6 months ago
- 1 answers
Sia ? 3 years, 6 months ago
Hacker | Cracker |
The good people who hack for knowledge purposes. | The evil person who breaks into a system for benefits. |
They are skilled and have a advance knowledge of computers OS and programming languages. | They may or may not be skilled, some of crackers just knows a few tricks to steal data. |
They work in an organisation to help protecting there data and giving them expertise on internet security. | These are the person from which hackers protect organisations . |
Hackers share the knowledge and never damages the data. | If they found any loop hole they just delete the data or damages the data. |
Hackers are the ethical professionals. | Crackers are unethical and want to benifit themselves from illegal tasks. |
Hackers program or hacks to check the integrity and vulnerability strength of a network. | Crackers do not make new tools but use someone else tools for there cause and harm the network. |
Hackers have legal certificates with them e.g CEH certificates. | Crackers may or may not have certificates, as there motive is to stay annonymous. |
Posted by Jatin Vishwakarma 4 years, 10 months ago
- 2 answers
Posted by Jatin Vishwakarma 4 years, 10 months ago
- 1 answers
Riya Kumari 4 years, 10 months ago
Posted by Vishu Thakur 4 years, 10 months ago
- 0 answers
Posted by Shaily Singh 4 years, 10 months ago
- 0 answers
Posted by Roshan Thakur 4 years, 10 months ago
- 0 answers
Posted by Anil Jharbade 4 years, 10 months ago
- 1 answers
myCBSEguide
Trusted by 1 Crore+ Students
Test Generator
Create papers online. It's FREE.
CUET Mock Tests
75,000+ questions to practice only on myCBSEguide app