Science, asked by hgaikwad599, 9 months ago

Sub:IT
10M
Que.1.Fill in the blanks:
1) The type of operating system registered by Apple Corportion is ----
2) The network which covers smaller geographical area is --
3) ------------- is a computer which services to another computer.
4) Activity such as decipher code or password and breaking security systems for illegal
reasons is called ------
5) The data type used in DBMS to hold a fixed length string is
6) In a ------------- relationship of DBMS. one record in a table is associated with one and
only one record in another Table.
7) A collection of interlinked web pages is known as -----
8) In HTML5 ---- ------ is a sematic tag that defines content apart from the content.
9) Container tags are also called as -------
10) Gaining access without the user's permission is called as -​

Answers

Answered by studentneha614
36
  1. MacOs
  2. LAN(local area network)
  3. Server
  4. hacking
  5. character data type
  6. one to one
  7. website
  8. header, footer or article
  9. closing tags
  10. unauthorized use

Answered by dharanikamadasl
1

Answer:

  1. Mac OS
  2. Local area network (LAN)
  3. Server
  4. Cracking
  5. char, character data types
  6. one to one
  7. website
  8. <header>, <Footer>, <article>
  9. closing tags
  10. unauthorised computer access

Explanation:

  • Mac OS (Unix OS)

Since 2001, Apple Inc. has been developing and marketing a Unix operating system. Apple's Mac computers use it as their primary operating system. It is the second most popular desktop operating system, after Microsoft Windows, and ahead of Chrome OS, in the market for desktop and laptop computers.

  • Local Area Network (LAN).

A local area network (LAN) is a group of devices that are connected in a single physical place, such as a building, business, or home. A LAN can be modest or large, ranging from a single-user home network to an enterprise network in an office or school with thousands of users and devices.

  • Server

A server is a programme or equipment that delivers a service to another programme and its user, also known as the client. The physical machine that a server programme runs on is usually referred to as a server in a data centre.

  • Cracking.

It's a method of obtaining sensitive information such as credit card details and username/password combinations by posing as a legitimate company. Email spoofing is the most common method.

  • char, Character Data Types

Strings of letters, numbers, and symbols are stored. Character string types are made up of the data types CHARACTER (CHAR) and CHARACTER VARYING (VARCHAR), and the values of character string types are called character strings.

Fixed-length or variable-length strings can be used to hold character data. Variable-length strings are not extended; fixed-length strings are right-extended with spaces on output.

  • One-to-one

A database management system, sometimes known as a DBMS, is essentially a computerised data-keeping system. Users of the system are given the ability to execute a variety of actions on it, such as manipulating the data in the database or managing the database structure itself.

  • Website

A website is a collection of web pages and related material recognised by a common domain name and hosted on at least one web server. Google, Facebook, Amazon, and Wikipedia are just a few examples of well-known websites.

  • <Header>, <Footer> and <Article>

Header

A header is a little piece of text that appears at the top of a printed page. A header might be the title of the literature you're now reading, which is repeated on each page. A chapter title, sometimes known as a "page header," is a type of header that appears at the top of each page.

Footer

A footer is a text that can be automatically displayed at the bottom of each page of a printed document, such as a name or page number. Observe the heading. [computing] Headers, footers, footnotes, and page numbers are visible in Page Mode.

Article

The article HTML element denotes a self-contained composition in a document, page, application, or site that is intended to be distributed or reused independently.

  • Closing tags

The tags in HTML that need to be closed are known as closing tags. There is a beginning tag and an ending tag on these. The closing tag is the tag that comes after the ending tag. The paragraph tag's opening and closing tags, for example, are p> and /p>.

  • Unauthorized computer access

Unauthorized access occurs when someone acquires unauthorised access to a computer network, system, application software, data, or other resources. Unauthorized access to an information system or network is defined as access that violates the owner's or operator's specified security policy.

#SPJ3

Similar questions