No products in the cart.

Ask questions which are clear, concise and easy to understand.

Ask Question
  • 3 answers

Jhalak Arora 6 years, 5 months ago

Hacker are highly technical people who secretly break into computers to steal important data or sometimes to destroy it.They not only steal imp. data but also hack applications and web sites to change the program logics.

Vvn Cvj 6 years, 5 months ago

Plz Not give this exp. In exam

Shivansh Manchanda 6 years, 5 months ago

Hacker -when someone steal your computer files ,data etc is known as hacker
  • 1 answers

Sheetal Soni 6 years, 5 months ago

Cell spacing is space between cell and table and cell padding is the amount of space between cell ( text ,img ,.etc .) And border of the table . मे शीतल सोनी , आप सभी से उम्मीद करती हु की आपको मेरे इस जबाब से बहुत मदत मिलेगी ।धन्यबाद आपका य प्रशन पूछने के लिए मे तो कह रही हु की तु भी जेई ते पड़
  • 1 answers

Reith Rathore 6 years, 5 months ago

1. U can access your account any time 2. They often provide higher interest rate for savers and lower interest rate for borrowers
  • 1 answers

Vineet Kumar 6 years, 5 months ago

People are motivated to take losns at them homes and land.
  • 2 answers

Haardika Soni 6 years, 5 months ago

Ya

Yogita Ingle 6 years, 5 months ago

The main purpose of the strategy for ICT implementation in education is to provide the prospects and trends of integrating ICT into the general educational activities.

Some benefits of ICT in education are as follows:

  1. There is no time boundation on an individual for getting educated by a teacher. A person can attend a class anytime and anywhere.
  2. Teachers can create interactive classes and make the lessons more interesting.
  3. Generally, students find images and graphical representation of concepts, more interesting as compared, to the theoretical knowledge. And, using ICT, teachers can explain even the most complex concept in a very simplified manner using graphics, videos and animations.
  4. An individual can learn on pace he/she is comfortable.
  5. Learning resoures can be accessed remotely.

In Healthcare
Some benefits of ICT in healthcare are as follows:

  1. Automated hospital information systems can help to improve quality of care.
  2. Decreased costs of treatment.
  3. ICT has significantly enhanced the services being provided and brought behavioural changes.
  4. This technology helps doctors, hospitals, the general public and all other medical care providers.
  5. Pharmaceutical industry is the industry that enjoys the biggest benefits of ICT.
  6. ICT has made E-Health possible.
  • 1 answers

Yogita Ingle 6 years, 5 months ago

A search engine is a Website that lets you search the Internet for Websites on specific topics. Search engines turn the Web into a powerful tool for finding information on any topic. There are several benefits of using search engine like,

  • Who is constantly on the computer everyday writing something.
  • Search engine provides a wealth of information for professional and personal use. e.g. Google
  • 3 answers

Nishita Jaisalmeria 6 years, 5 months ago

Ur welcome

Reith Rathore 6 years, 5 months ago

Ohk thanks

Nishita Jaisalmeria 6 years, 5 months ago

Check on google U'll get their
  • 2 answers

Yogita Ingle 6 years, 5 months ago

XML file or XML document is a component of XML document system which contains the real data and its semantics.

An XML file contains:

  1. an optional prolog
  2. a data instance

Reith Rathore 6 years, 5 months ago

XML stands for extensible markup language
  • 2 answers

Tushti Kulshreshtha 6 years, 5 months ago

Most popular search engines are ?Google Chrome ? Internet Explorer Hope it is helpful for you. ??

Chandan Kumar 6 years, 5 months ago

Chrome google
  • 1 answers

Nakshatra Jindagal 6 years, 5 months ago

A table is a thing on which you keep your books .
  • 2 answers

Ashu Gujjar . 6 years, 5 months ago

an application software that creates and maintains a collection of database

Aditya Agrawal 6 years, 5 months ago

Database management system
  • 1 answers

Reith Rathore 6 years, 5 months ago

HTML FORMAT:- <html> <head> <title> ..........</title> </head> <body> ................. ................. ................. </body> </html>
  • 3 answers

Gaurav Seth 6 years, 5 months ago

A computer virus is a malicious program that self-replicates by copying itself to another program. In other words, the computer virus spreads by itself into other executable code or documents. The purpose of creating a computer virus is to infect vulnerable systems, gain admin control and steal user sensitive data. Hackers design computer viruses with malicious intent and prey on online users by tricking them.

Sneha Jain 6 years, 5 months ago

A program that attaches itself to other programs in order to alter their behavior, often in a harmful way

Devansh Jeswani 6 years, 5 months ago

Virus is a virus in which virus is virus in computer
  • 2 answers

Gaurav Seth 6 years, 5 months ago

Wireless connectivity, often known as Wi-Fi, is the technology that allows a PC, laptop, mobile phone, or tablet device to connect at high speed to the internet without the need for a physical wired connection.

Sneha Jain 6 years, 5 months ago

A local area network that uses high-frequency radio signals and infrared waves to send and receive data over short distances
  • 1 answers

Nishita Jaisalmeria 6 years, 5 months ago

What???
  • 1 answers

Yogita Ingle 6 years, 5 months ago

  • Simple Mail Transfer Protocol (<wbr />SMTP)
  • The Network News Transfer Protocol (NNTP) is an application protocol used for transporting
  • The Internet Message Access Protocol (IMAP)
  • 2 answers

Gaurav Seth 6 years, 5 months ago

A Web server is a program that uses HTTP (Hypertext Transfer Protocol) to serve the files that form Web pages to users, in response to their requests, which are forwarded by their computers' HTTP clients. Dedicated computers and appliances may be referred to as Web servers as well.

Sneha Jain 6 years, 5 months ago

A computer program that serves requested HTML pages or file
  • 1 answers

Gaurav Seth 6 years, 5 months ago

A small network making up internet and having many computers is called a Subdomain

  • 2 answers

Gaurav Seth 6 years, 5 months ago

Stands for "Peer to Peer." In a P2P network, the "peers" are computer systems which are connected to each other via the Internet. Files can be shared directly between systems on the network without the need of a central server. In other words, each computer on a P2P network becomes a file server as well as a client.

Mrunu Js? 6 years, 5 months ago

Is it POP ?? It is Post Office Protocol
  • 3 answers

Gaurav Seth 6 years, 5 months ago

A white hat hacker is a computer security specialist who breaks into protected systems and networks to test and asses their security. White hat hackers use their skills to improve security by exposing vulnerabilities before malicious hackers (known as black hat hackers) can detect and exploit them. Although the methods used are similar, if not identical, to those employed by malicious hackers, white hat hackers have permission to employ them against the organization that has hired them.

 black hat hacker is a person who attempts to find computer security vulnerabilities and exploit them for personal financial gain or other malicious reasons. This differs from white hat hackers, which are security specialists employed to use hacking methods to find security flaws that black hat hackers may exploit.

Black hat hackers can inflict major damage on both individual computer users and large organizations by stealing personal financial information, compromising the security of major systems, or shutting down or altering the function of websites and networks.

Yogita Ingle 6 years, 5 months ago

White hat hackers use many of the same tools as a black hat hacker, but they do it for it good. Their work involves penetration testing, evaluating existing security systems, and assessing vulnerability. Most white hat hackers have earned a CEH (Certified Ethical Hacker) designation.

Akash Sen 5 years, 5 months ago

Black hat hacker have. dark colour while the white hat hacker have light colour
  • 2 answers

Kusum Gautam 6 years, 5 months ago

XML attributes define the nature of an element by defining a particular value to that attribute..

Drashti Vaish 6 years, 5 months ago

Even I want to know this
  • 3 answers

Sujal Thakur 6 years, 5 months ago

It us very useful to us we help us to Crete html on xml

Yogita Ingle 6 years, 5 months ago

Firewalls monitor the network and are capable of blocking suspicious traffic, which can prevent spyware from infecting your system. A firewall can either be software based or hardware based and is used to prevent intruders from accessing your system.

Anuj Singh 6 years, 5 months ago

Firewall helps in securing the system from spamming and phishing attacks. It creates a barrier b/w the computer and any unauthorized program trying to come in through the internet.
  • 3 answers

Akash Sen 6 years, 5 months ago

In which subject

Vishal Singh 6 years, 5 months ago

HTML-I:BASIC HTML ELEMENTS HTML-II:IMAGES LINKS AND TABLES XML-EXTENSIBLE MARKUP LANGUAGE These three chapters are very important for examination.

Vilas Yadav 6 years, 5 months ago

Sara important h
  • 3 answers

Yogita Ingle 6 years, 5 months ago

To link two Web pages, you first need name to the section by using name attribute of <a> tag that you want to link. Suppose, we need to link a section of HTML1.html to HTML2.html. Create a named anchor in HTML1.html.
The syntax is given below:
<a name =”link”> Different Page </a>
After this, you have to write the code to refer to it, from Web page HTML2.html. Following is the code to do so:
<a href =”HTML1.html#link”>
Here, HTMLl.html is the name of html file to the section of which you want to link and # link is the segment name you want to link in that html file.

Vineet Das 6 years, 5 months ago

By using href attribute

Kishan Agrawal 6 years, 5 months ago

By using this coding :
  • 1 answers

Arastu Bhati 6 years, 5 months ago

Common Oriented Machine Particularly Used for Trade and Education Research
  • 2 answers

Akash Sen 6 years, 5 months ago

Crackers are the programmers who break Security System and hackers are interested in gaining knowledge regarding computer system and possibly using knowledge took place on the computer hackers actually explore other computer system with prior permission with a hunger to know the Programmable system.

Anju Shaw 6 years, 5 months ago

difference between hacker and cracker

myCBSEguide App

myCBSEguide

Trusted by 1 Crore+ Students

Test Generator

Test Generator

Create papers online. It's FREE.

CUET Mock Tests

CUET Mock Tests

75,000+ questions to practice only on myCBSEguide app

Download myCBSEguide App