Ask questions which are clear, concise and easy to understand.
Ask QuestionPosted by Suzaan Sultan 4 years, 10 months ago
- 4 answers
Posted by Bhura Khan 4 years, 10 months ago
- 0 answers
Posted by Mohit Maske 4 years, 10 months ago
- 1 answers
Posted by Ayush Sharma 4 years, 10 months ago
- 3 answers
Yogita Ingle 4 years, 10 months ago
Decimal number system has base 10 because it uses ten digits from 0 to 9. In the decimal number system, the positions successive to the left of the decimal point represent units, tens, hundreds, thousands and so on. This system is expressed in decimal numbers.
Posted by Harshit Chouhan 4 years, 10 months ago
- 4 answers
Posted by Prakhar Mishra 4 years, 10 months ago
- 1 answers
Posted by Baidik Nath Choudhury 4 years, 10 months ago
- 1 answers
Meghna Thapar 4 years, 10 months ago
Computer viruses have been around for quite a bit and nearly all of them have been spread through the Internet or its predecessors. Most viruses have been designed to steal users' information, processing power and/or disable the system all together.
The first computer virus, called "Creeper system", was an experimental self-replicating virus released in 1971. It was filling up the hard drive until a computer could not operate any further. This virus was created by BBN technologies in the US.
The first computer virus for MS-DOS was "Brain" and was released in 1986. It would overwrite the boot sector on the floppy disk and prevent the computer from booting. It was written by two brothers from Pakistan and was originally designed as a copy protection.
"The Morris" was the first Computer virus which spread extensively in the wild in 1988. It was written by Robert Morris, a graduate student from Cornell University who wanted to use it to determine the size of the internet. His approach used security holes in sendmail and other Unix applications as well as weak passwords, but due to a programming mistake it spread too fast and started to interfere with the normal operation of the computers. It infected around 15,000 computers in 15 hours, which back then was most of the internet.
Posted by Baidik Nath Choudhury 4 years, 10 months ago
- 1 answers
Meghna Thapar 4 years, 10 months ago
Computer viruses have been around for quite a bit and nearly all of them have been spread through the Internet or its predecessors. Most viruses have been designed to steal users' information, processing power and/or disable the system all together.
The first computer virus, called "Creeper system", was an experimental self-replicating virus released in 1971. It was filling up the hard drive until a computer could not operate any further. This virus was created by BBN technologies in the US.
The first computer virus for MS-DOS was "Brain" and was released in 1986. It would overwrite the boot sector on the floppy disk and prevent the computer from booting. It was written by two brothers from Pakistan and was originally designed as a copy protection.
"The Morris" was the first Computer virus which spread extensively in the wild in 1988. It was written by Robert Morris, a graduate student from Cornell University who wanted to use it to determine the size of the internet. His approach used security holes in sendmail and other Unix applications as well as weak passwords, but due to a programming mistake it spread too fast and started to interfere with the normal operation of the computers. It infected around 15,000 computers in 15 hours, which back then was most of the internet.
Posted by Daksh Singh 4 years, 10 months ago
- 2 answers
Posted by Paras Paras Rana 4 years, 10 months ago
- 2 answers
Posted by Paras Paras Rana 4 years, 10 months ago
- 1 answers
Posted by Ayush Shrivastav 4 years, 10 months ago
- 2 answers
Yogita Ingle 4 years, 10 months ago
Binary Number System: According to digital electronics and mathematics, a binary number is defined as a number that is expressed in the binary system or base 2 numeral system. It describes numeric values by two separate symbols; 1 (one) and 0 (zero). The base-2 system is the positional notation with 2 as a radix.
The binary system is applied internally by almost all latest computers and computer-based devices because of its direct implementation in electronic circuits using logic gates. Every digit is referred to as a bit.
Posted by Dipanshu Mahajan 4 years, 10 months ago
- 1 answers
Posted by Prithviraj Singh 4 years, 10 months ago
- 0 answers
Posted by Haritha K 4 years, 10 months ago
- 2 answers
Haritha K 4 years, 10 months ago
Posted by Rasmi Ranjan Tarai 4 years, 4 months ago
- 1 answers
Posted by Abhi Abhi 4 years, 10 months ago
- 2 answers
Posted by Sathish Babu 4 years, 10 months ago
- 1 answers
Posted by 𝑺𝒖𝒓𝒂𝒃𝒉𝒊 𝑺𝒂𝒖𝒎𝒚𝒂 4 years, 10 months ago
- 4 answers
Soumya Bhadana 4 years, 10 months ago
Yogita Ingle 4 years, 10 months ago
They can be broadly classified into three categories namely input devices, output devices and storage devices. It is essential for us to be aware of the working and uses of different hardware components of a computer.
Answer (d)
Posted by 𝑺𝒖𝒓𝒂𝒃𝒉𝒊 𝑺𝒂𝒖𝒎𝒚𝒂 4 years, 10 months ago
- 1 answers
Yogita Ingle 4 years, 10 months ago
Google drive provides_________of free storage to upload.
Google Drive cloud storage
Posted by 𝑺𝒖𝒓𝒂𝒃𝒉𝒊 𝑺𝒂𝒖𝒎𝒚𝒂 4 years, 10 months ago
- 2 answers
Yogita Ingle 4 years, 10 months ago
An MICR code is a 9-digit code that uniquely identifies the bank and branch participating in an Electronic Clearing System (ECS).
It comprises of 3 parts:
- The first three digits represent the city (City Code). They are aligned with the PIN code we use for postal addresses in India.
- The next 3 digits represent the bank (Bank Code)
- The last 3 digits represent the branch (Branch Code)
Posted by 𝑺𝒖𝒓𝒂𝒃𝒉𝒊 𝑺𝒂𝒖𝒎𝒚𝒂 4 years, 10 months ago
- 1 answers
Yogita Ingle 4 years, 10 months ago
They can be broadly classified into three categories namely input devices, output devices and storage devices. It is essential for us to be aware of the working and uses of different hardware components of a computer.
Posted by Anshika Thakur 4 years, 10 months ago
- 0 answers
Posted by Anurag Kumar Singh 4 years, 10 months ago
- 2 answers
Posted by Tanmay Sejwal 4 years, 10 months ago
- 0 answers
Posted by Ayush Shukla 4 years, 10 months ago
- 4 answers
Posted by Roshan Mishra 4 years, 10 months ago
- 5 answers
Posted by Paranormal Dyna 4 years, 10 months ago
- 1 answers
Meghna Thapar 4 years, 10 months ago
A font is a graphical representation of text that may include a different typeface, point size, weight, color, or design. The image shows examples of different computer fonts. Software programs like Microsoft Word, Microsoft Excel, and WordPad allow users to change the font used when typing text in the document or spreadsheet, as do web designers. In a web browser, font style is a CSS (custom style sheet) property used in HTML and ASP.NET programming, defining the font style for text. There are four possible options for font style. normal. italic. oblique.
Posted by Anshul Yadav 4 years, 10 months ago
- 1 answers
Posted by Prem Dalvi 4 years, 10 months ago
- 1 answers
Meghna Thapar 4 years, 10 months ago
The period of fourth generation was from 1971-1980. Computers of fourth generation used Very Large Scale Integrated (VLSI) circuits. Fourth generation computers became more powerful, compact, reliable, and affordable. As a result, it gave rise to Personal Computer (PC) revolution.
Features of first generation computers:
- Technology used: vacuum tube.
- Machines languages were used to instruct the computer.
- Magnetic core memory was used as primary memory.
- Electrostatic tubes, Parer tape, punch card, magnetic tape.
myCBSEguide
Trusted by 1 Crore+ Students
Test Generator
Create papers online. It's FREE.
CUET Mock Tests
75,000+ questions to practice only on myCBSEguide app
Soumya Bhadana 4 years, 10 months ago
1Thank You