No products in the cart.

Ask questions which are clear, concise and easy to understand.

Ask Question
  • 1 answers

Meghna Thapar 4 years, 7 months ago

In relational databases, and flat file databases, a table is a set of data elements (values) using a model of vertical columns (identifiable by name) and horizontal rows, the cell being the unit where a row and column intersect. A table has a specified number of columns, but can have any number of rows. A database is a collection of interrelated data , these data are stored in the table which are related to one another, to search and retrieve data queries are made . A table is made up of rows and columns , data of databases are stored in the table.

  • 1 answers

Yogita Ingle 4 years, 7 months ago

While software is the set of programs or instructions that are required by the hardware resources to function properly. There are a few basic components that aids the working-cycle of a computer i.e. the Input- Process- Output Cycle and these are called as the functional components of a computer.

  • 1 answers

Yogita Ingle 4 years, 7 months ago

Parameter Primary memory Secondary memory
Nature The primary memory is categorized as volatile & nonvolatile memories. The secondary memory is always a non-volatile memory.
Alias These memories are also called internal memory. Secondary memory is known as a Backup memory or Additional memory or Auxiliary memory.
Access Data is directly accessed by the processing unit. Data cannot be accessed directly by the processor. It is first copied from secondary memory to primary memory. Only then CPU can access it.
Formation It's a volatile memory meaning data cannot be retained in case of power failure. It's a non-volatile memory so that that data can be retained even after power failure.
Storage It holds data or information that is currently being used by the processing unit. Capacity is usually in 16 to 32 GB It stores a substantial amount of data and information. Capacity is generally from 200GB to terabytes.
Accesses Primary memory can be accessed by the data bus. Secondary memory is accessed by I/O channels.
Expense Primary memory is costlier than secondary memory. Secondary memory is cheaper than primary memory.
  • 1 answers

Aimy Kunnel 4 years, 3 months ago

Accuracy is a term used to describe anything that is near its true value or recognized standard
  • 1 answers

Sia ? 3 years, 7 months ago

Please ask question with complete information.

  • 1 answers

Geetika Bhasin 4 years, 7 months ago

Operating System Its functions 1) Memory Management 2)File Management 3) Device Management
  • 0 answers
  • 0 answers
  • 4 answers

Kamalika Samadder 4 years, 5 months ago

Information Practices ...

Taniya Baliyan 4 years, 7 months ago

Information practices

Kanan Soni 4 years, 8 months ago

Full form of IP is informatics practices.

Muskan Singh ✍✍ 4 years, 8 months ago

Internet protocol...
  • 1 answers

Yogita Ingle 4 years, 9 months ago

A server is a connection point for several clients, that will handle their requests. A client is software that connects to the server to perform actions. The client provide a user interface that allows users to carry out actions.

  • 1 answers

Bharat Sharma 4 years, 9 months ago

Ok simply a string operator is a operation held on any string. Iam a python student in python any character is definied as string until unless you specify Examples . "Hello" These operations are actually used to manupilated the given string that is you can change their case , their letters can be deleted etc.
  • 1 answers

Yogita Ingle 4 years, 9 months ago

A data dictionary contains metadata i.e data about the database. The data dictionary is very important as it contains information such as what is in the database, who is allowed to access it, where is the database physically stored etc. The users of the database normally don't interact with the data dictionary, it is only handled by the database administrators.

  • 1 answers

Kashish Talesara 4 years, 9 months ago

It can be defined as a collection of interrelated data
  • 1 answers

Riya Kumari 4 years, 10 months ago

It is numpy and it is numric python
  • 1 answers

Sia ? 3 years, 6 months ago

Hacker Cracker
The good people who hack for knowledge purposes. The evil person who breaks into a system for benefits.
They are skilled and have a advance knowledge of computers OS and programming languages. They may or may not be skilled, some of crackers just knows a few tricks to steal data.
They work in an organisation to help protecting there data and giving them expertise on internet security. These are the person from which hackers protect organisations .
Hackers share the knowledge and never damages the data. If they found any loop hole they just delete the data or damages the data.
Hackers are the ethical professionals. Crackers are unethical and want to benifit themselves from illegal tasks.
Hackers program or hacks to check the integrity and vulnerability strength of a network. Crackers do not make new tools but use someone else tools for there cause and harm the network.
Hackers have legal certificates with them e.g CEH certificates. Crackers may or may not have certificates, as there motive is to stay annonymous.
  • 2 answers

Kaira Chauhan 4 years, 10 months ago

2

Harsh Sewani 4 years, 10 months ago

2
  • 1 answers

Riya Kumari 4 years, 10 months ago

Relation is like a table in which data are stored in rows and column. ?
  • 0 answers
  • 1 answers

Redmi 6 4 years, 9 months ago

Dbms stands for data base manegment system

myCBSEguide App

myCBSEguide

Trusted by 1 Crore+ Students

Test Generator

Test Generator

Create papers online. It's FREE.

CUET Mock Tests

CUET Mock Tests

75,000+ questions to practice only on myCBSEguide app

Download myCBSEguide App