Computer Science, asked by nidhi261057, 2 months ago

1. ______________ function is used to parse a ________ and convert it into a number.
(a) Parse LNT
​​(b) String
(c) Parse INT​​
(d) alert C

2. Perform input data validation is the features of ___________.
(a) HTML
​​(b) Java Script
(c) Event Handler

3. _____________ is a simple text file created using ____________.
(a) webpage
​​(b) website
(c) HTML
​​(d) URL

4. ____________ is a set of _________ standards used for __________ information between computers in a network.

(a) HTTP
​​​(b) Protocol
(c) Communication
​(d) Transfer
​(e) developed

5. __________ enables _______ to operate independently of and transparent to each other.

(a) consistency​​
(b) Isolation
(c) Durability
​​(d) Transactions
​(e) commited

6. Compete the following
1) Dictated by society, culture or religion _________________

2) Chosen by person himself _______________
(a) Morals
(b) ethics
(c) cyberlaw
(d) cyberstalking

7. Computer crime is known as
________________________ , ________________ , ____________________
(a) Cyber crime
​​(b) E- crime
(c) Hi- Tech Crime ​
(d) cracking

8. The ___________ is a symbol of copyright.
(a) #
(b) @
(c) ©
(d) $

9. The _____________ is a barrier between two networks and _____________
is used for security purpose.

10. ________________ is the standard security technology for establishing an encrypted link between a web server and a browser and _________________ have been given legal validity and sanction in the act.
(a) SSL
​​(b) cyber law
(c) Firewall ​​
(d) Encryption
​(e) Digital Signatures.

Answers

Answered by RosyRain
0
  • an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program
Answered by EvilExtinction
59

Answer:

\huge{\tt{\red{}\green{A}\purple{N}\pink{S}\blue{W}\orange{E}\red{R}}}:)

1.Parse LNT

2.Java Script

3.webpage, website

4.HTML

6.In essence, religions provide a frame of reference for understanding the world and for guiding personal and communal action.

7. Cyber crime E- crime Hi- Tech Crime

8. ©

9.The firewall requires a user on the internal network to log in to the firewall system to access hosts on remote networks.

Similar questions