Home

The complete picture of data stored in database is known as

A. Record

B. Schema

C. System flowchart

D. DBMS

Please do not use chat terms. Example: avoid using "grt" instead of "great".

You can do it
  1. The main electronic component used in first generation computers was
  2. Floppy disks are available in
  3. Which is not a basic function of a computer?
  4. Which of the following is required when more than one person uses a central computer at the same time?
  5. 1 nibble equals to
  6. The first general purpose electronic digital computer in the world was
  7. Why are vacuum tubes also called valves?
  8. which of the following is problem oriented language?
  9. UNIVAC was a first generation computer. What is its full form?
  10. Floppy disks typically in diameter
  11. An error in software or hardware is called a bug. What is the alternative computer jargon for it?
  12. The personnel who deals with the computer and its management put together are called
  13. Which is used for manufacturing chips?
  14. Mostly which of the following device is used to carry user files?
  15. Which was the most popular first generation computer?
  16. A device designed to read information encoded into a small plastic card is
  17. Which one of the following is NOT a computer language
  18. Which device is used as the standard pointing device in a Graphical User Environment?
  19. The Third Generation Computer was made with .
  20. Which computers used operating systems by Microsoft?
  21. Which of the following term means to reckon?
  22. Which programming languages are classified as low level languages?
  23. Which electronic component was made out of semiconductor material?
  24. What difference does the 5th generation computer have from other generation computers?
  25. Which language is directly understood by the computer without translation program?
  26. Punched cards were first introduced by
  27. If in a computer, 16 bits are used to specify address in a RAM, the number of addresses will be
  28. A name or number used to identify a storage location is called
  29. Hackers
  30. Compression of digital data for efficient storage is