Computer Awareness
Description: E-Com. | |
Number of Questions: 15 | |
Created by: Adhira Saini | |
Tags: E-Commerce and Oracle Introduction to E-Commerce Database Data Communication and Networks |
Which of the following securities is more suitable for blocking unauthorized users on one network to gain access to another network?
Which of the following properties of object oriented databases specifies that two objects in the database are related together?
Which of the following programming languages does not support query language proposal for the ODMG object model?
Which of the following SQL statements are used to specify querying, insert, delete and update operations?
Which of the following schema objects in oracle is used as a special data type for automatic attribute value generation?
Which of the following forms of e-commerce is used by two persons, who want to sell/purchase items?
Which of the following database system is a network of two or more oracle databases that reside on one or more machines?
Which of the following literals in object data management group(ODMG) correspond to the values of basic data types and are predefined?
Which of the following layers in OSI performs data encryption and compression of data so that it can be easily transferred to different computers?
Which of the following database links is used to access remote database to a user, which requires an account on the remote database with the same username as its account on the local database?
Which of the following partitionings in distributed databases is specified by a list of values of the partitioning key?
Which of the following applications of distributed database is the one that reduces the amount of data transfer required between sites, when a transaction retrieves data from remote tables referenced in a distributed SQL statement?
Which of the following attributes is used in PL/SQL to fetch all the records from the cursor until the last record?
Which of the following networks defines protocols to communicate logically among computers linked by the physical network?
Which of the following algorithms of TCP allows old implementation of TCP to start a connection with the sender so that multiple segments can be injected into the network up to the window size advertised by the receiver?