No products in the cart.

Ask questions which are clear, concise and easy to understand.

Ask Question
  • 2 answers

Vipasha Rawat 3 years, 11 months ago

Is an example of sotfware

Krishu Singh 3 years, 11 months ago

Nothing just a Noun
  • 2 answers

Vipasha Rawat 3 years, 11 months ago

Is an example of soft3

Khushi Kajla 3 years, 11 months ago

Ya it can be
  • 0 answers
  • 0 answers
  • 0 answers
  • 4 answers

Bibin Binoy 3 years, 11 months ago

And if any girl please send me request video bana na h

Bhavya Gupta 3 years, 11 months ago

Okay bhai I will send in your I'd

Punith Venkatesh 3 years, 11 months ago

Kaun hai ye log kahan se aathe hai?

Ayush Raj Milan 3 years, 11 months ago

Aaaaaaa! Thhooo
  • 1 answers

Komal Jadhav 3 years, 11 months ago

Protocols is the set of rules used by computers on the network to communicate with each other.
  • 2 answers

Kalpana Jangra 3 years, 11 months ago

Assembler is a software program that converts an assembly language program into machine language program

Shivesh Kumar 3 years, 11 months ago

What is computer
  • 1 answers

Tarun Singh 4 years ago

We should always update so that we can get all the latest features of the application.
  • 1 answers

Khushi Kajla 3 years, 11 months ago

Trojan, worm, adware, spyware antivirus
  • 1 answers

Sia ? 3 years, 9 months ago

Parameters of Comparison OMR OCR
The Full-Form Optical mark recognition Optical character recognition
Definition A technology that captures human marked data to determine the presence and location of marked data such as marks with the help of lines and shaded areas. A technology that converts images of texts in any form of data electronically into machine language to determine what it represents and to store it systematically.
Level of Implementation Easy Comparatively hard to implement
Application Tests, surveys, voting, geo-coding, product evaluation, etc. Business documents, data entry, bank statements, Google books, etc.
Also Called Optical mark reader Optical character reader
  • 1 answers
They have same but some things are different
  • 5 answers

Riya Rani 4 years ago

Hyper text transfer protocol
Yx6d7givt$a8gn

Paras Sharawat 4 years ago

Define communication

Sonia Swarnakar 4 years ago

Code 402 which book this year use
Https is new version of Http ( hyper text transfer protocol)
  • 3 answers

Pri3Ya Singh 4 years ago

Rrrr

Khushi Mishra 4 years ago

yes
Cyber safety mean keeping our personal information financial information and online storage safe and secure from cyber thefts to avoid unauthorized access or attack
  • 1 answers

E Kavipriyan 4 years ago

(1) sender (2) ideas (3) encoding (4) communication channel (5) receiver (6) decoding and (7) feedback
  • 1 answers

Kishan R 4 years ago

In computing, a firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a barrier between a trusted network and an untrusted network, such as the Internet.
  • 2 answers

Sia ? 4 years, 1 month ago

A file system or filesystem controls how data is stored and retrieved. Without a file system, data placed in a storage medium would be one large body of data with no way to tell where one piece of data stops and the next begins.

Ibrahim Aquil 4 years ago

Hello
Hii
  • 3 answers

Prachi Zanwar 4 years ago

Hey What's your name
Hi

Laxmi Narayan 4 years, 1 month ago

Hello

myCBSEguide App

myCBSEguide

Trusted by 1 Crore+ Students

Test Generator

Test Generator

Create papers online. It's FREE.

CUET Mock Tests

CUET Mock Tests

75,000+ questions to practice only on myCBSEguide app

Download myCBSEguide App