A(n) ________ virus temporarily erases its code from the files where it resides, and then hides in the active memory of the computer

Fill in the blank(s) with correct word

stealth

Computer Science & Information Technology

You might also like to view...

PowerPoint goes one step better by enabling you to ________, or make notations or marks on the slides during your presentation

Fill in the blank(s) with correct word

Computer Science & Information Technology

Formulate the following queries in relational algebra, tuple relational calculus, and domain relational calculus.

The following tables form part of a database held in a Relational Database Management System: Employee (empID, fName, lName, address, DOB, sex, position, deptNo) Department (deptNo, deptName, mgrEmpID) Project (projNo, projName, deptNo) WorksOn (empID, projNo, hoursWorked) where Employee contains employee details and empID is the key. Department contains department details and deptNo is the key. mgrEmpID identifies the employee who is the manager of the department. There is only one manager for each department. Project contains details of the projects in each department and the key is projNo (no two departments can run the same project). and WorksOn contains details of the hours worked by employees on each project, and empID/projNo form the key. (1) List all employees. (2) List all the details of employees who are female. (3) List the names and addresses of all employees who are Managers. (4) Produce a list of the names and addresses of all employees who work for the ‘IT’ department. (5) Produce a list of the names of all employees who work on the ‘SCCS’ project.

Computer Science & Information Technology