Answer:
A
Explanation:
A hacker searching for open ports denotes vulnerability of computer (to hacking).
Cheers
Answer:
b) 01564 37928
e) 26 8 75 32 901
Explanation:
Pushes and pulls are the computer operations which enable the user to perform numerical tasks. The input commands are interpreted by the computer software and these tasks are converted into numeric values to generate output.
Answer: (D) Database design follows the twelve principles proffered by Dr. Edgar F. Codd
Explanation:
The relational database is basically based on the relational model of the data which is proposed by the Dr Edger F. codd and he mainly introduced the twelve basics principle of the database designing in the database system. He also contributed various valuable principle in the computer science.
The twelve principle are:
- The first rule of the relational database is the information rule as it represented all data or information
- Independence of the integrity
- Viewing various updating rule
- Logically treatment of various NULL value
- Independence of the physical database
- Distribution in-dependency
- Various delete, insert and update rules
- The overall logical description of the database are basically stored in the database directory
- There is no subversion rule
- There is guarantee accessing rule
- Proper rule for data language
- The relational database level actions
Answer:
information processing is concerned with recording arranging processing retrieving and disseminating of information