Ask questions which are clear, concise and easy to understand.
Ask QuestionPosted by Kuldeep Kashyap 5 years, 3 months ago
- 1 answers
Posted by Aryan Arya The Top Boweler In Pac 5 years, 3 months ago
- 1 answers
Aditya Singh 5 years, 3 months ago
Posted by ♌ Hire 5 years, 3 months ago
- 1 answers
Ash Greninja 5 years, 3 months ago
Posted by Shekhar Kochale 5 years, 3 months ago
- 1 answers
Posted by Yasir Bhat 5 years, 3 months ago
- 1 answers
Posted by Sakshi Kamble 5 years, 3 months ago
- 2 answers
Pranavi Joshi 5 years, 3 months ago
Posted by Sonia Rajkumar 5 years, 3 months ago
- 0 answers
Posted by Deepak Bhartiya 5 years, 3 months ago
- 3 answers
Navita Malik 5 years, 3 months ago
Anisha 9Th B Anisha Bager 5 years, 3 months ago
Posted by Mahak Sharma 5 years, 3 months ago
- 1 answers
Yogita Ingle 5 years, 3 months ago
A computer built around a microprocessor for use by an individual, as in an office or at home or school.
Posted by Pari Garg 5 years, 3 months ago
- 2 answers
Posted by Bhumika Verma 5 years, 3 months ago
- 1 answers
Yogita Ingle 5 years, 3 months ago
Some of the functions of word processing software include:
Creating, editing, saving and printing documents.
Copying, pasting, moving and deleting text within a document.
Formatting text, such as font type, bolding, underlining or italicizing.
Creating and editing tables.
Posted by Vashu Verma 5 years, 3 months ago
- 4 answers
Pranavi Joshi 5 years, 3 months ago
Yogita Ingle 5 years, 3 months ago
The computer is an electronic device. It is known as an electronic device because it runs through electricity. It takes input, processes it and gives desired results. The results of the computer system are also known as output.
Vashu Verma 5 years, 3 months ago
Posted by Ff Killer 5 years, 3 months ago
- 1 answers
Rishikesh Patidar 5 years, 3 months ago
Posted by Sakshi Gupta 5 years, 3 months ago
- 0 answers
Posted by Sachin Kumar 5 years, 3 months ago
- 0 answers
Posted by Sandeep Singh 5 years, 3 months ago
- 0 answers
Posted by Yatish Chand 3 years ago
- 0 answers
Posted by Khushbu Kumari 5 years, 3 months ago
- 0 answers
Posted by Alisha Gupta 5 years, 3 months ago
- 0 answers
Posted by Lokesh Yadav 5 years, 4 months ago
- 1 answers
Posted by A Agrawal 5 years, 4 months ago
- 2 answers
Lokesh Yadav 5 years, 4 months ago
Posted by Prayas Khandelwal 5 years, 4 months ago
- 1 answers
Yashi Tiwari 5 years, 4 months ago
Posted by Hiba Nourin 5 years, 4 months ago
- 0 answers
Posted by Chitralekha Khaund 5 years, 4 months ago
- 1 answers
Yogita Ingle 5 years, 4 months ago
Copy leaves the information in its original location and makes another copy of the information when you use Paste. But in moving it removes the information and pastes it to another location.
Usually, in computer science, "moving" is equivalent to "copying" something, then deleting the original. In other words, after copying something, you have two copies of the thing you copy; if you move something, only one, at the new place. However, specifically in Excel (and probably other spreadsheet programs as well), when you move a cell or a range, any formulae that refer to the cell (or to one of the cells in the range) will be updated; thus, in this sense, moving is no longer equivalent to "copy, then delete the original". For example: Cell B1 has the formula "=A1*10". If you move the contents of cell A1 to A5 (you can do this in several ways; one is by selecting the cell, and dragging the border), then the formula in B1 will change to "=A5*10".
Posted by Tanuj Raghuwanshi 5 years, 4 months ago
- 1 answers
Posted by S. Harine Sree 5 years, 4 months ago
- 1 answers
Posted by Sonakshi Ji 5 years, 4 months ago
- 1 answers
Gaurav Seth 5 years, 4 months ago
Eavesdropping in computer security is defined as the unauthorized interception of a conversation, communication or digital transmission in real time. The various forms of communication include phone calls, emails, instant messages or any other internet service.
Eavesdropping is as an electronic attack where digital communications are intercepted by an individual whom they are not intended.
This is done in two main ways: Directly listening to digital or analog voice communication or the interception or sniffing of data relating to any form of communication.
Posted by M.Santhi Sree 5 years, 4 months ago
- 0 answers
Posted by Varsha Sharma 5 years, 4 months ago
- 1 answers

myCBSEguide
Trusted by 1 Crore+ Students

Test Generator
Create papers online. It's FREE.

CUET Mock Tests
75,000+ questions to practice only on myCBSEguide app
myCBSEguide
*Suhana * 5 years, 3 months ago
0Thank You