Tag: technology

Questions Related to technology

  1. A table can have up to 10,000 columns.

  2. The size of a table does NOT need to be specified

  3. A table CANNOT be created while users are using the database

  4. The structure of a table CANNOT be modified while the table is online


Correct Option: B
  1. The statement will achieve the desired results

  2. The statement will execute, but will NOT enable the PRIMARY KEY constraint.

  3. The statement will execute, but will NOT verify that values in the ID column do NOT violate the constraint.

  4. The statement will return a syntax error.


Correct Option: A
  1. Keylogging

  2. Backdoor

  3. Phishing

  4. Masquerading


Correct Option: C
Explanation:

To solve this question, the user needs to be familiar with different hacking techniques. The user must identify the technique used by the hacker to obtain sensitive information from a victim.

The correct answer is:

C. Phishing

Explanation:

Phishing is a technique used by hackers to create a fake website or email to look like an original one to trick the victims into providing sensitive information, such as passwords, credit card numbers, or social security numbers. The fake website or email will usually contain a link to the original website, but when the victim clicks on the link, they will be directed to the fake website where the hacker can obtain their sensitive information.

Option A, Keylogging, is a technique used to record the keystrokes of a victim to obtain their login credentials.

Option B, Backdoor, is a technique used to create a hidden entry point to a computer system to gain access to it later.

Option D, Masquerading, is a general term that refers to any technique used to disguise oneself or one's activities.

Therefore, the correct answer is C. Phishing.

  1. The UNIQUE constraint does not permit a null value for the column.

  2. A UNIQUE index gets created for columns with PRIMARY KEY and UNIQUE constraints.

  3. The PRIMARY KEY and FOREIGN KEY constraints create a UNIQUE index

  4. The NOT NULL constraint ensures that null values are not permitted for the column


Correct Option: B,D