No products in the cart.

Ask questions which are clear, concise and easy to understand.

Ask Question
  • 4 answers

Rishabh Verma?? 7 years ago

Src

Aman Darbar? 7 years ago

Src is correct answer...

Mrunu Js? 7 years ago

wse is mcq ka ans. alt or src tha ( set 4 )?
?
  • 1 answers

Yogita Ingle 7 years ago

A computer virus is a type of computer program that can replicate itself by making copies of itself by making copies of itself without the user's knowledge or consent.

Computer virus spread from following ways

i. Opening the infected email attachment.

ii. By downloading infected programs from the internet.

iii. By using infected floppy disk, pen drives and CDs.

iv. By transferring an infected program over a network and executing it.

 

  • 1 answers

Yogita Ingle 7 years ago

<th>Basis for Comparison</th> <th>Cc</th> <th>Bcc</th>
Full form Carbon Copy. Blind Carbon Copy.
Working A recipient of Cc field is visible to the primary recipients of To: field, other recipients of Cc and recipients of Bcc field. A recipient of Bcc field is neither visible to recipients of To: field, nor to recipients of Cc field and not even to the other recipients of Bcc field.
Use It is used to make the primary recipient more serious about the mail. Use when you don't want to share the list of recipients with other recipients.
  • 1 answers

Abhijeet Soni 7 years ago

Rowspan is used to merge rows in table and colspan is used to merge coloumns in table
  • 2 answers

Rani Mishra ??? 6 years, 11 months ago

Extendable markup language

Ayush Bandhu 7 years ago

May be its html
  • 0 answers
  • 1 answers

Raghav Gangrade 7 years ago

LEASED LINE CONNECTION:- A leased line is a private bidirectional or symmetric telecommunications circuit between two or more locations provided in exchange for a monthly rent. DIALED UP CINNECTION:- Temporary, non-dedicated internet connection made over ordinary telephone lines by dialing an internet service provider's number. Most people access internet through a dial up connection.
  • 2 answers

Gaurav Seth 7 years ago

Hackers:

1) Hackers are interested in gaining knowledge about computer systems.

2) These can be for good or bad purposes.

Crackers:

1) These are the malicious programmers who break into secure systems.

2) These are only for bad purposes.

Mrunu Js? 7 years ago

Scroll down a lil. and u will get the ans.
  • 1 answers

Shresth Agarwal 7 years ago

It is a markup language.
  • 1 answers

Amarjeet Kaur 7 years ago

Hackers are the technical expert who uses there technical knowledge to break into computer system to get thrill out of it Crackers are the experts but they break into or violates into computer system without any access with malicious intent.As an unauthorised access it breaks the proper functioning of computer
  • 1 answers

Gaurav Seth 7 years ago

Data can be defined as a representation of facts, concepts, or instructions in a formalized manner, which should be suitable for communication, interpretation, or processing by human or electronic machine.

  • 2 answers

Amarjeet Kaur 7 years ago

Rowspan is used to co combine the cells vertically it merges the number of cells vertically and shows thm as a single cell

Amarjeet Kaur 7 years ago

Colspan is used to combine cells horizontally.It specifies the number of columns that the cell spans accross and shows them as a single celll
  • 2 answers

Hiru ? 7 years ago

It provides information about text and binary files that are organized in a menu structure

Bhavesh Pansari 7 years ago

it breaks the message into small packets
  • 0 answers
  • 3 answers

Ayush Yadav 7 years ago

See my creation https://youtu.be/mzL28kJ_j5U

S.P Singh 7 years ago

Hyper Text Transfer Protocol Secured
Hyper text transfer protocol..
  • 4 answers

Gaurav Seth 7 years ago

Sir Tim Berners-Lee invented the World Wide Web in 1989. Sir Tim Berners-Lee is a British computer scientist. He was born in London, and his parents were early computer scientists, working on one of the earliest computers.

Ankit Kumar 7 years ago

Uniform resouce locator.?

Kiran Ghanghas 7 years ago

Tim Berness Lee

Saras Jain 7 years ago

What is primary key
  • 3 answers
Uniform resource locator

Ankit Kumar 7 years ago

17 marks
Uniform Resource Locator
  • 2 answers

Ankit Kumar 7 years ago

Cellpadding : Cellpadding is used to set space between the cell and content inside it Callspacing : Cellspacing means setting space between the two call..

Yush Singh 7 years ago

Only 13
  • 1 answers

Gaurav Seth 7 years ago

<th>BASIS </th> <th>CELLPADDING</th> <th>CELLSPACING</th>
Basic Controls the white space between the border of a cell and its content. Sets the space between the solitary cells.
Meant for Single cell More than one cell
HTML format

 

 

  • 2 answers
Are is sub. Ke marks value hi nhi krte...

Anurag Pritam 7 years ago

Boliye n
  • 3 answers

Ankit Kumar 7 years ago

Internet

Raj Thakur 7 years ago

A remote site can either be on a server that is on the local network (using a mapped drive) or on another server on the Internet (using FTP). Your local site and your remote site should have the same folder hierarchy.
Target location to store data...
  • 2 answers

Raj Thakur 7 years ago

Clipart is function that provide you various logo to insert in your data

Aastha Singh 7 years ago

Kya karein clipart ka

myCBSEguide App

myCBSEguide

Trusted by 1 Crore+ Students

Test Generator

Test Generator

Create papers online. It's FREE.

CUET Mock Tests

CUET Mock Tests

75,000+ questions to practice only on myCBSEguide app

Download myCBSEguide App