Pronita is a programmer in an institution and is asked to handle the records containing personal information -Technology

1 Answer

Answer :

Suggested five fields are as follows:1. TCode —> To store the code of the teachers.TName —> To store the name of the teachers.TSubject —> To store the name of subjects for which the teacher is placed in the institution.Address —> To store the address of the teachers.Salary —> To store the monthly income of the teachers.2. TCode —> TextTName —> TextTSubject —> TextAddress —> TextSalary —> Number3. TCode is most likely to be the key field because it has a unique value for each of the records.

Related questions

Description : Damini is a programmer in an institute and is asked to handle the records -Technology

Last Answer : FieldNameDataTypeRollNoNumberNameTextClassTextSectioTextGenderText

Description : The cell A1 has value Monday. If you are asked to click and drag the Fill handle of A1 -Technology

Last Answer : Cells A2, A3, A4, and A5 will contain Tuesday, Wednesday, Thursday and Friday respectively.

Description : A programmer is writing a system that is intended to be able to store large amounts of personal data. As the programmer develops the data system, which of the following is LEAST likely to impact the ... of the information for analysis. D. The frequency of a particular item occurring in a data set.

Last Answer : D. The frequency of a particular item occurring in a data set.

Description : Out of the following, whom do you think is the most probable user of a Light Pen? (a) Computer Programmer (b) Graphic Designer (c) Journalist -Technology

Last Answer : (b) Light pen is useful for graphic designer as it is useful for identifying a particular location on the screen.

Description : Machine language sometimes referred to as (a) programming language that is used widely by the programmer. (b) machine code or object code -Technology

Last Answer : (b) Machine language sometimes referred to as machine code or object code because it is the language which is only understood by the computer as a computer itself is just a machine or an electronic device.

Description : Mr. Suman, a programmer in New Era Programming World has designed a registration page for a hobby club as shown below: -Technology

Last Answer : (i) int x=c1.getSelectedIndex();int fee=0;if(x==0)fee=1000;else if(x==1)fee=1500;else if(x==2)fee=2000;else if(x==3)fee=2500;t2.setText(''+fee);(ii) double disc=0;int fee=Integer.parseInt(t2. ... (t2.getText());double net=fee-disc;t4.setText(''+net);(iv) System.exit(0);(v) c1.addItem('Reading');

Description : Ms. Achla, works as a Programmer in a survey firm named “National Survey Foundation”. In her current project, she is supposed to design -Technology

Last Answer : S. No.Control used to inputControl1TRAINEE’S NAMETextField2TRAINING LOCATIONRadio Button/Combo Box3GRADE THE SESSION(Excellent, Good, Satisfactory, Unsatisfactory)Radio Button/Combo Box4SUGGESTIONSText Area

Description : Ms. Neelam works as a programmer in “Kidz Entertainment Zone”. She has designed a Registration Page to calculate -Technology

Last Answer : (i)int age=Integer.parseInt(jTextField2.getText());if(age>=3 && age1000)disc=fee*20/100;jTextField4.setText(''+(disc));(iv)int fee=Integer.parseInt(jTextField3.getText());int disc=Integer.parseInt(jTextField4.getText());jTextField5.setText(''+(fee-disc));

Description : Ms. Priya works as a programmer in “Avon Education” where she has designed a software -Technology

Last Answer : Here,Name is stored in jTextField1Fee Per Quarter is stored in jTextField2Concession Amount is stored in jTextField3Fee to be Paid is stored in jTextField4(i) We need to double click at the Calculate Charges' ... at the Exit' button (jButton3) and type the following code:System., exit (0) ;

Description : Deepti works as a programmer in a travel company. She has developed the following code to display -Technology

Last Answer : switch (choice){Case 1 : JTextFieldl. setText ('New Delhi to Goa') ;break ;Case 2 : jTextFieldl.setText ('New Delhi to Paris') ;break ;Case 3 : jTextFieldl.setText ('New Delhi to Bangkok') ;break ;default: jTextFieldl.setText ('P1. choose valid option') ;}

Description : Mr. Pawan works as a programmer in “ABC Marketing Company” where he has designed a Salary -Technology

Last Answer : (i) We need to double click at the Commission button (jButtonl) and type the following code :int Commission :if (jRadioButtonl. isSelected ( ) = True )Commission = 500 ;elseif ( ... and type the following code :int Net_Sal ;Net_Sal = Gross_Sal-Fac_Charges ;jTextField6. setText (Net_Sal) ;

Description : A domain name ending with .org belongs to (a) an educational institution (b) an organisation -Technology

Last Answer : (b) On the Internet, all Websites owned and operated by an organisation are part of the .org domain.

Description : In all computers on the Internet, owned and operated by education institution form part of the (a) .com domain (b) .edu domain -Technology

Last Answer : (b) The domain name edu provides domain registration at no cost to educational institutions.

Description : What guides and grammars have been asked to buy this year in the eighth grade at Restabudium High School in Konabari, Gazipur ? Say the full name of the educational institution and also tell what happens in the educational institution and how it happens

Last Answer : It is not possible to say because it can only be said by the students, teachers and people of the school.

Description : Gates is known as ______________ of the personal computer revolution. A. Programmer B. Entrepreneur C. Hardware Technician D. None of above

Last Answer : ANSWER: B

Description : Gates is known as ______________ of the personal computer revolution. A. Programmer B. Entrepreneur C. Hardware Technician D. None of above

Last Answer : ANSWER: B

Description : Gates is known as ______________ of the personal computer revolution. A. Programmer B. Entrepreneur C. Hardware Technician D. None of above

Last Answer : ANSWER: B

Description : If you work with a transgendered programmer on programs meant for kids do you enforce normative gender roles?

Last Answer : answer:I know two transgender kids (both around 10 years old). Allowing for other is the right thing to do. We have moved beyond the male/female thing. It's also doesn't affect anyone's use ... If the vast majority are going to choose male or female, what does it matter that there is this option.

Description : Which of the following is a secondary source of sport/event information: A. Accounting records B. Demographic reports C. Computerized surveys D. Personal interviews

Last Answer : B. Demographic reports

Description : Which of the following feature is used to arrange the records in a data source before merging? (a) Filter (b) Sort -Technology

Last Answer : (b) Sort feature is used to arrange the records in a data source before merging.

Description : Spyware is a type of malware but is not capable of collecting personal information. -Technology

Last Answer : False Spyware is a type of malware used to collect personal information without his or her knowledge.

Description : Privacy deals with personal information. Explain the meaning of term personal information. -Technology

Last Answer : Personal information is the information that identifies you or could identify you.e.g. your name and address.

Description : Internet uses generate large amount of personal information, information thefts and information technology piracy. -Technology

Last Answer : TrueInternet uses generate large amount of personal information, information thefts and information technology piracy.

Description : Secrecy means that we can share the personal information of an individual with anyone. -Technology

Last Answer : FalseSecrecy means we should share the personal information of an individual only with authorised persons.

Description : Bailment is a special kind of contract that is widely used in business and in: a) Personal affairs b) Cultural activities c) Academic research d) Charitable institution

Last Answer : a) Personal affairs

Description : 1. Which writ is a bulwark of personal freedom? 2. Which was the gas which had leaked out of Union Carbide factory in Bhopal? 3. Which is the oldest Development Financial Institution of India? ... production of rubber? 20. Which ruler was known as Amitraghata, the 'destroyer of foes' ?

Last Answer : Answer : 1. Habeas Corpus 2. Methyl isocynate 3. IFCI 4. Pampas 5. Blacksmith 6. Subhash Chandra Bose 7. Liver 8. Finance Minister 9. The Steppe climate 10. 18 11. Power 12. Caspian sea ... . France 15. Chandragupta Maurya 16. Turtle 17. Attorney General 18. Atomic number 19. Indonesia 20. Bindusara

Description : Hacking into State institution computer systems should the Governments make use of the hacker's talents?

Last Answer : This is not a question.

Description : For her records, a teacher asked the students about their heights. -Maths 9th

Last Answer : Yes, Things which are equal to the same thing are equal to one another. Knowledge, curiosity, truthfulness

Description : A table named School (containing data of students of the whole school) is created -Technology

Last Answer : AdmissionNo should be set as the primary key because admission numbers are unique for each and every student of the school, which is not possible in the case with RollNo and Name.

Description : The range of cells containing data that makes a chart is termed as ……………… data. -Technology

Last Answer : The range of cells containing data that makes a chart is termed as Numbers data.

Description : When a cell containing a formula is moved, the cells referring the moved cell show an error value. -Technology

Last Answer : False When a cell containing a formula is moved, the cells referring to the moved cell does not show an error value.

Description : Ms. Shalini has just created a table named “Employee” containing columns Ename, Department, Salary. -Technology

Last Answer : SQL command to add a primary key column:Alter table employee add empid int primary key;Importance of Primary key in a table:Primary key column is used to uniquely identify each record of the table. A column defined as primary key cannot have a duplicate entry and can't be left blank.

Description : Where can I get information about setting oneself up in business as a freelance programmer?

Last Answer : I had a small web-development company. We were a LLC. I had a lawyer and and accountant set everything up. I got sued a few times and it was worth the cost. I also had to sue a few times.

Description : A person who used his orher expertiseto gain access to other people's computers to get information illegally ordo damage is a– (A) hacker (B) analyst (C) instant messenger (D) programmer (E) spammer

Last Answer : hacker

Description : A person who used his/her expertise to gain access to other people's computers to get information illegally or do damage is a ________: a) Hacker b) Analyst c) Instant Messenger d) Programmer e) Spammer

Last Answer : a) Hacker

Description : A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a - 1) Hacker 2) Spammer 3) Analyst 4) Programmer

Last Answer : 1) Hacker

Description : A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a - 1 Hacker 2 Spammer 3 Analyst 4 Programmer

Last Answer : 1 Hacker

Description : In the second type the information written in java after // is ignored by the ....................... A) Interpreter B) Compiler C) Programmer D) All of the above

Last Answer : B) Compiler

Description : Which data type helps you to handle input that is in boolean format? -Technology

Last Answer : (c) Yes/No will allow boolean value.

Description : The Fill handle tool is used for labor intensive entering data in a spreadsheet. -Technology

Last Answer : True Entering data into a spreadsheet can be very labor intensive, but Fill handle tool autofill the entries and save time.

Description : Which among the following is wrong characteristic of "Phishing": a) Fakers, by offering special rewards or money prize etc asked for personal information such as passwords, credit card information, social ... purpose is theft or misuse the acquired material c) Both of Above d) None of These

Last Answer : d) None of These

Description : Which among the following is wrong characteristic of "Phishing": a) Fakers, by offering special rewards or money prize etc asked for personal information such as passwords, credit card information, social ... purpose is theft or misuse the acquired material c) Both of Above d) None of These

Last Answer : d) None of These

Description : Reena is new to Excel. Her instructor has asked her to open Excel on her PC and questioned about active cell. -Technology

Last Answer : An active cell is a cell with heavy black color boundary.

Description : A man told his son that he would give him $1000 if he could accomplish the following task. The father gave his son ten envelopes and a thousand dollars, all in one dollar bills. He told his ... exact amount of money asked for. How did the son distribute the money among the ten envelopes? -Riddles

Last Answer : The contents or the ten envelopes (in dollar bills) should be as follows: $1, 2, 4, 8, 16, 32, 64, 128, 256, 489. The first nine numbers are in geometrical progression, and their sum, deducted from 1,000, gives the contents of the tenth envelope.

Description : How do you handle people who offer an opinion about people you care about when you never asked them for their opinion?

Last Answer : She is less than perfect – most of us are. She is a friend with an annoying trait. I don’t have any friends at all who don’t have at least one annoying trait – I am sure that they would say the same about me. If she is real friend, just accept it and don’t cause friction.

Description : Which of the following the teacher is not expected to do? Options: A) Participate in community activities such as Red Cross B) Give help to pupils in their personal and school problems C) Keep pupil's attendance and achievement records D) None of the above

Last Answer : D) None of the above 

Description : PEST is an acronym which stands for ________. A. Political, Environment, Societal, Technology. Share institution privatization. B. Political, Economic, Societal, Technological. C. Political, Economic, Social, Technological. D. People, Economy, Standards, Transport.

Last Answer : C. Political, Economic, Social, Technological.

Description : State one advantage of video conferencing over personal face_to face business meetings. -Technology

Last Answer : Video conferencing allows you to interact with many people face-to-face without being at the same place.

Description : Which type of software is designed to perform specific, personal, business or scientific processing tasks? (a) System (b) Application -Technology

Last Answer : (b) Application software is a computer software which is designed to help the user to perform some specific or personal tasks.