Ask questions which are clear, concise and easy to understand.
Ask QuestionPosted by Dhruv Patidar 4 years, 6 months ago
- 0 answers
Posted by Dhruv Patidar 4 years, 6 months ago
- 0 answers
Posted by Avneet Kaur 4 years, 6 months ago
- 1 answers
Posted by Suraj Nath 4 years, 6 months ago
- 2 answers
Posted by Shivu N 4 years, 6 months ago
- 3 answers
Shivu N 4 years, 6 months ago
Kishika Rani 4 years, 6 months ago
Vidhi Sharma 4 years, 6 months ago
Posted by Samar Sinha 4 years, 6 months ago
- 5 answers
Lavkesh Yadav 4 years, 5 months ago
Akkriti Behuray 4 years, 6 months ago
Posted by Kushal P 4 years, 6 months ago
- 0 answers
Posted by Gouri Sankar {Krish} 4 years, 6 months ago
- 3 answers
Gouri Sankar {Krish} 4 years, 6 months ago
Posted by Aryan Ujjwal 4 years, 6 months ago
- 1 answers
Lakshmi Gupta 4 years, 6 months ago
Posted by Manjot Virk 4 years, 6 months ago
- 3 answers
Posted by Patel Het 4 years, 6 months ago
- 5 answers
Posted by Pakkeer Binduja 4 years, 6 months ago
- 4 answers
Posted by Marapalle Gauravi 4 years, 6 months ago
- 1 answers
Posted by Vijayalaxmi Sahu 4 years, 6 months ago
- 1 answers
Samar Sinha 4 years, 6 months ago
Posted by Varun Kumar Jangid 4 years, 5 months ago
- 0 answers
Posted by Op Xd 4 years, 6 months ago
- 5 answers
Posted by Shivam Karosia 4 years, 6 months ago
- 2 answers
Sia ? 4 years, 6 months ago
| A Worm is a form of malware that replicates itself and can spread to different computers via Network. | Trojan Horse is a form of malware that capture some important information about a computer system or a computer network. |
| The main objective of worms to eat the system resources. | The main objective of the trojan horse is to control the activity of the system. |
| Worms can be detected and removed by the Antivirus and firewall. | Trojan horses are detected by the antivirus software. |
| It doesn’t need a host to replicate from one computer to another. | It require host is needed for spreading. |
| It can give unauthorized access and control of the system to the hackers. | It also give unauthorized access and control of the system to the hackers. |
| It is less harmful as compared. | It is more harmful as compared. |
| Morris Worm, Storm Worm and SQL Slammer are some of the examples of worms. | Back orifice, Rootkit and Beast Trojan are some of the common Trojan horses. |
| Worms are executed via weaknesses in system. | Trojan horse executes through a program and interprets as utility software. |
Joshitha Loya 4 years, 6 months ago
Posted by Shivam Karosia 4 years, 6 months ago
- 1 answers
Sia ? 4 years, 6 months ago
- Thou shalt not snoop around in other people's computer files.
- Thou shalt not interfere with other people's computer work
- Thou shalt not use a computer to harm other people.
Posted by Mikunj Mikunj 4 years, 6 months ago
- 4 answers
Posted by Greeshma Vuppala 4 years, 6 months ago
- 1 answers
Posted by Payal Rani 4 years, 6 months ago
- 1 answers
Sia ? 4 years, 6 months ago
Posted by Satyam Yadav 4 years, 6 months ago
- 1 answers
Sia ? 4 years, 6 months ago
- Length - meter (m)
- Time - second (s)
- Amount of substance - mole (mole)
- Electric current - ampere (A)
- Temperature - kelvin (K)
- Luminous intensity - candela (cd)
- Mass - kilogram (kg)
Posted by Vikash Srivastava 4 years, 6 months ago
- 3 answers
Sia ? 4 years, 6 months ago
Posted by Soumya Kaushik 4 years, 6 months ago
- 2 answers
Posted by Avinash More 4 years, 6 months ago
- 1 answers
Posted by Avinash More 4 years, 6 months ago
- 1 answers
Posted by Neel Shah 4 years, 6 months ago
- 4 answers
Posted by Yuva Kiran 4 years, 6 months ago
- 1 answers
Sia ? 4 years, 6 months ago
a suffix is an affix which is placed after the stem of a word. Common examples are case endings, which indicate the grammatical case of nouns, adjectives, and verb endings, which form the conjugation of verbs. An inflectional suffix is sometimes called a desinence or a grammatical suffix or ending.
Posted by Kata. Neha Sri Kata . Neha Sri 4 years, 6 months ago
- 3 answers
Sia ? 4 years, 6 months ago
The process of synthesis of food in green plants is called photosynthesis. This process takes place in the cells containing the green pigment chlorophyll. The raw materials for this process are water, carbon dioxide and sunlight. Water and minerals present in the soil are absorbed by the roots and transported to the leaves. Carbon dioxide from air is taken in through the stomata present on the leaf surface. During photosynthesis, chlorophyll containing cells of leaves, in the presence of sunlight, use carbon dioxide and water to synthesise carbohydrates. The process can be represented as an equation:

Samar Sinha 4 years, 6 months ago
Yuva Kiran 4 years, 6 months ago

myCBSEguide
Trusted by 1 Crore+ Students

Test Generator
Create papers online. It's FREE.

CUET Mock Tests
75,000+ questions to practice only on myCBSEguide app
myCBSEguide