No products in the cart.

Ask questions which are clear, concise and easy to understand.

Ask Question
  • 4 answers

Palak Tiwari 6 years, 3 months ago

Non of these only cbse based kips

Dream Girl 6 years, 4 months ago

Computer applications by sumita arora

Adarsh Singh 6 years, 4 months ago

Foundation of IT

Harshit Verma 6 years, 4 months ago

Ncert
  • 1 answers

Adarsh Singh 6 years, 4 months ago

A protocol or communication protocol is a set of thåt computer follows to communicate with anoter computer in the internet
  • 5 answers

Daniya Arshad 6 years, 2 months ago

Thnku adarsh

Adarsh Singh 6 years, 4 months ago

First of all it's not net surfing it's Internet surfing whic means moving on different web page in a same web site is called internet surfing

Lalit Rawat 6 years, 4 months ago

Ha ha

Harshita Tiwari 6 years, 4 months ago

Don't tension ??

Raunak ???? 6 years, 4 months ago

Result aa raha hai yeh sooch ke dimak band ho gaya
  • 5 answers

Palak Tiwari 6 years, 3 months ago

Kips cbse edition

Farhan Murshed 6 years, 4 months ago

Ok but which publication, writer??

Adarsh Singh 6 years, 4 months ago

I want NCERT but it's not available so (Foundation of IT )is the bet book

Farhan Murshed 6 years, 4 months ago

But as I know, NCERT don't publish Information Technology book

Gungun . 6 years, 4 months ago

Refer ncert
  • 0 answers
  • 0 answers
  • 1 answers

Gaurav Seth 6 years, 4 months ago

 

Data backup is a process of duplicating data to allow retrieval of the duplicate set after a data loss event. Today, there are many kinds of data backup services that help enterprises and organizations ensure that data is secure and that critical information is not lost in a natural disaster, theft situation or other kind of emergency.

  • 1 answers

Adarsh Singh 6 years, 4 months ago

www means world wide web when we type the url of any website the web client then send the request to web server ,that contains information and then we get the desired information that we want
  • 1 answers

Adarsh Singh 6 years, 4 months ago

It is the protocol that is used that time
  • 0 answers
  • 1 answers

Khushbu Garg 6 years, 4 months ago

There are fundamentally two types of e-Learning:

Synchronous training,means “at the same time,” involves interaction of participants with an instructor via the Web in real time.
Asynchronous training,which means “not at the same time,” allows the participants to complete the WBT (Web-based training) at their own pace, without live interaction with the instructor

  • 1 answers

Khushbu Garg 6 years, 4 months ago

A table can have only one primary key, which may consist of single or multiple fields. When multiple fields are used as a primary key, they are called a composite key.

  • 1 answers

Saurabh Tripathi 6 years, 4 months ago

Hacker is person who hack the system not for his personal use but also for community.
  • 1 answers

Sia ? 4 years, 3 months ago

Passenger Name Record

  • 1 answers

Khushbu Garg 6 years, 4 months ago

the science that deals with the theory and methods of processing information in digital computers, the design of computer hardware and software, and the applications of computers.

  • 2 answers

Aditya Jaitly 6 years, 4 months ago

Yes

Tanisha . 6 years, 4 months ago

Yes
  • 1 answers

Khushbu Garg 6 years, 4 months ago

 .htm or .html as file extension.

  • 1 answers

Khushbu Garg 6 years, 4 months ago

Internet Architecture Board (IAB): Oversees the technical and engineering development of the IETF and IRTF.

 Internet Corporation for Assigned Names and Numbers (ICANN): Coordinates the Internet's systems of unique identifiers: IP addresses, Protocol-Parameter registries, top-level domain space (DNS root zone).

Read more on Brainly.in - https://brainly.in/question/1175463#readmore

myCBSEguide App

myCBSEguide

Trusted by 1 Crore+ Students

Test Generator

Test Generator

Create papers online. It's FREE.

CUET Mock Tests

CUET Mock Tests

75,000+ questions to practice only on myCBSEguide app

Download myCBSEguide App