No products in the cart.

Ask questions which are clear, concise and easy to understand.

Ask Question
  • 3 answers

Jhalak Arora 7 years ago

Hacker are highly technical people who secretly break into computers to steal important data or sometimes to destroy it.They not only steal imp. data but also hack applications and web sites to change the program logics.

Vvn Cvj 7 years ago

Plz Not give this exp. In exam
Hacker -when someone steal your computer files ,data etc is known as hacker
  • 1 answers

Sheetal Soni 7 years ago

Cell spacing is space between cell and table and cell padding is the amount of space between cell ( text ,img ,.etc .) And border of the table . मे शीतल सोनी , आप सभी से उम्मीद करती हु की आपको मेरे इस जबाब से बहुत मदत मिलेगी ।धन्यबाद आपका य प्रशन पूछने के लिए मे तो कह रही हु की तु भी जेई ते पड़
  • 1 answers

Reith Rathore 7 years ago

1. U can access your account any time 2. They often provide higher interest rate for savers and lower interest rate for borrowers
  • 1 answers

Vineet Kumar 7 years ago

People are motivated to take losns at them homes and land.
  • 2 answers

Haardika Soni 7 years ago

Ya

Yogita Ingle 7 years ago

The main purpose of the strategy for ICT implementation in education is to provide the prospects and trends of integrating ICT into the general educational activities.

Some benefits of ICT in education are as follows:

  1. There is no time boundation on an individual for getting educated by a teacher. A person can attend a class anytime and anywhere.
  2. Teachers can create interactive classes and make the lessons more interesting.
  3. Generally, students find images and graphical representation of concepts, more interesting as compared, to the theoretical knowledge. And, using ICT, teachers can explain even the most complex concept in a very simplified manner using graphics, videos and animations.
  4. An individual can learn on pace he/she is comfortable.
  5. Learning resoures can be accessed remotely.

In Healthcare
Some benefits of ICT in healthcare are as follows:

  1. Automated hospital information systems can help to improve quality of care.
  2. Decreased costs of treatment.
  3. ICT has significantly enhanced the services being provided and brought behavioural changes.
  4. This technology helps doctors, hospitals, the general public and all other medical care providers.
  5. Pharmaceutical industry is the industry that enjoys the biggest benefits of ICT.
  6. ICT has made E-Health possible.
  • 1 answers

Yogita Ingle 7 years ago

A search engine is a Website that lets you search the Internet for Websites on specific topics. Search engines turn the Web into a powerful tool for finding information on any topic. There are several benefits of using search engine like,

  • Who is constantly on the computer everyday writing something.
  • Search engine provides a wealth of information for professional and personal use. e.g. Google
  • 2 answers

Yogita Ingle 7 years ago

XML file or XML document is a component of XML document system which contains the real data and its semantics.

An XML file contains:

  1. an optional prolog
  2. a data instance

Reith Rathore 7 years ago

XML stands for extensible markup language
  • 2 answers
Most popular search engines are ?Google Chrome ? Internet Explorer Hope it is helpful for you. ??

Chandan Kumar 7 years ago

Chrome google
  • 1 answers
A table is a thing on which you keep your books .
  • 2 answers

Ashu Gujjar . 7 years ago

an application software that creates and maintains a collection of database

Aditya Agrawal 7 years ago

Database management system
  • 1 answers

Reith Rathore 7 years ago

HTML FORMAT:- <html> <head> <title> ..........</title> </head> <body> ................. ................. ................. </body> </html>
  • 3 answers

Gaurav Seth 7 years ago

A computer virus is a malicious program that self-replicates by copying itself to another program. In other words, the computer virus spreads by itself into other executable code or documents. The purpose of creating a computer virus is to infect vulnerable systems, gain admin control and steal user sensitive data. Hackers design computer viruses with malicious intent and prey on online users by tricking them.

Sneha Jain 7 years ago

A program that attaches itself to other programs in order to alter their behavior, often in a harmful way

Devansh Jeswani 7 years ago

Virus is a virus in which virus is virus in computer
  • 2 answers

Gaurav Seth 7 years ago

Wireless connectivity, often known as Wi-Fi, is the technology that allows a PC, laptop, mobile phone, or tablet device to connect at high speed to the internet without the need for a physical wired connection.

Sneha Jain 7 years ago

A local area network that uses high-frequency radio signals and infrared waves to send and receive data over short distances
  • 1 answers

Yogita Ingle 7 years ago

  • Simple Mail Transfer Protocol (<wbr />SMTP)
  • The Network News Transfer Protocol (NNTP) is an application protocol used for transporting
  • The Internet Message Access Protocol (IMAP)
  • 2 answers

Gaurav Seth 7 years ago

A Web server is a program that uses HTTP (Hypertext Transfer Protocol) to serve the files that form Web pages to users, in response to their requests, which are forwarded by their computers' HTTP clients. Dedicated computers and appliances may be referred to as Web servers as well.

Sneha Jain 7 years ago

A computer program that serves requested HTML pages or file
  • 1 answers

Gaurav Seth 7 years ago

A small network making up internet and having many computers is called a Subdomain

  • 2 answers

Gaurav Seth 7 years ago

Stands for "Peer to Peer." In a P2P network, the "peers" are computer systems which are connected to each other via the Internet. Files can be shared directly between systems on the network without the need of a central server. In other words, each computer on a P2P network becomes a file server as well as a client.

Mrunu Js? 7 years ago

Is it POP ?? It is Post Office Protocol
  • 3 answers

Gaurav Seth 7 years ago

A white hat hacker is a computer security specialist who breaks into protected systems and networks to test and asses their security. White hat hackers use their skills to improve security by exposing vulnerabilities before malicious hackers (known as black hat hackers) can detect and exploit them. Although the methods used are similar, if not identical, to those employed by malicious hackers, white hat hackers have permission to employ them against the organization that has hired them.

 black hat hacker is a person who attempts to find computer security vulnerabilities and exploit them for personal financial gain or other malicious reasons. This differs from white hat hackers, which are security specialists employed to use hacking methods to find security flaws that black hat hackers may exploit.

Black hat hackers can inflict major damage on both individual computer users and large organizations by stealing personal financial information, compromising the security of major systems, or shutting down or altering the function of websites and networks.

Yogita Ingle 7 years ago

White hat hackers use many of the same tools as a black hat hacker, but they do it for it good. Their work involves penetration testing, evaluating existing security systems, and assessing vulnerability. Most white hat hackers have earned a CEH (Certified Ethical Hacker) designation.

Akash Sen 5 years, 11 months ago

Black hat hacker have. dark colour while the white hat hacker have light colour
  • 2 answers

Kusum Gautam 7 years ago

XML attributes define the nature of an element by defining a particular value to that attribute..

Drashti Vaish 7 years ago

Even I want to know this
  • 3 answers

Sujal Thakur 7 years ago

It us very useful to us we help us to Crete html on xml

Yogita Ingle 7 years ago

Firewalls monitor the network and are capable of blocking suspicious traffic, which can prevent spyware from infecting your system. A firewall can either be software based or hardware based and is used to prevent intruders from accessing your system.

Anuj Singh 7 years ago

Firewall helps in securing the system from spamming and phishing attacks. It creates a barrier b/w the computer and any unauthorized program trying to come in through the internet.
  • 3 answers

Akash Sen 7 years ago

In which subject

Vishal Singh 7 years ago

HTML-I:BASIC HTML ELEMENTS HTML-II:IMAGES LINKS AND TABLES XML-EXTENSIBLE MARKUP LANGUAGE These three chapters are very important for examination.

Vilas Yadav 7 years ago

Sara important h
  • 3 answers

Yogita Ingle 7 years ago

To link two Web pages, you first need name to the section by using name attribute of <a> tag that you want to link. Suppose, we need to link a section of HTML1.html to HTML2.html. Create a named anchor in HTML1.html.
The syntax is given below:
<a name =”link”> Different Page </a>
After this, you have to write the code to refer to it, from Web page HTML2.html. Following is the code to do so:
<a href =”HTML1.html#link”>
Here, HTMLl.html is the name of html file to the section of which you want to link and # link is the segment name you want to link in that html file.

Vineet Das 7 years ago

By using href attribute

Kishan Agrawal 7 years ago

By using this coding :
  • 1 answers

Arastu Bhati 7 years ago

Common Oriented Machine Particularly Used for Trade and Education Research
  • 2 answers

Akash Sen 7 years ago

Crackers are the programmers who break Security System and hackers are interested in gaining knowledge regarding computer system and possibly using knowledge took place on the computer hackers actually explore other computer system with prior permission with a hunger to know the Programmable system.

Anju Shaw 7 years ago

difference between hacker and cracker

myCBSEguide App

myCBSEguide

Trusted by 1 Crore+ Students

Test Generator

Test Generator

Create papers online. It's FREE.

CUET Mock Tests

CUET Mock Tests

75,000+ questions to practice only on myCBSEguide app

Download myCBSEguide App