Home Page.

Q2.

  1. What is Home Page? Explain briefly.
  2. abc@mnc.co.in represents a ____.
  3. Give one advantage of Electronic Mail over ordinary mailing method.
  4. What is a Web Server and how is it related to a web page?
  5. Name one Internet Service Provider in India.
  6. What is the function of FTP.
  7. Give the full form of the following terms:
    • HTTP
    • url
  8. Lal owns a factory which manufactures automobile spare parts. Suggest him the advantages of having a web page for his factory.

Ans.

  1. The first or main page of a website is known as Home page.
  2. Email address. Read More …

Primary Key With Example.

Q9. Explain the primary key with the help of an example.
Ans. Primary key refers to a key that helps us to uniquely identify a record in a table. The primary key is used to avoid duplicate data. In other words, a column which a primary key will not contain duplicates information in any of its records. For example, the Employee_Details table, we can set the primary key in the Emp_Code column, which contains the employee code. In this case, duplicate values are not possible in the column.

DBMS ensure data security.

Q3. How does DBMS ensure data security.
Ans. DBMS provides security for data by ensuring that only authorized users are able to access the database. Authorized users are doors users whose credentials are verified through security checks.

The data that is stored in a database may contain valuable or sensitive information. For example, the database of an organization can contain personal information about its employees or information about the financial deals made with other organizations. Such type of information is highly sensitive and may damage the organization or its goodwill if it were to fall in wrong hands. Therefore, it is important that such information should be provided adequate security. DBMS provides security for data by ensuring that only authorized users are able to access the database. Authorized users have the rights or permission to access or change the database. This not only helps keep track of the users who access and make changes in the database, but also preventsothers without right credentials to access the database.