Start learning 50% faster. Sign in now
Get Started with ixamBee
Start learning 50% faster. Sign in nowThe correct answer is D
Which of the following is a programming language for creating special programs like Applets?
What does 'Phishing' refer to in cyber security?
Which software is used to create presentations?
Switches work on which OSI layer?
Which of the following is not an internal command of DOS?
Three bits used To control access the in UNIX are represented by :
Which one of the following commands is used to display both query and output?
The ‘brain’ of a computer which keeps peripherals under its control is called :
The maximum length of the char columns is ____________
The DBMS acts as an interface between what two components of an enterprise-class database system?