Ask questions which are clear, concise and easy to understand.
Ask QuestionPosted by Nakshatra Jindagal 6 years, 5 months ago
- 3 answers
Shivansh Manchanda 6 years, 5 months ago
Posted by Prabhat Panchal 6 years, 5 months ago
- 1 answers
Sheetal Soni 6 years, 5 months ago
Posted by Sahil Debnath 6 years, 5 months ago
- 1 answers
Reith Rathore 6 years, 5 months ago
Posted by Haardika Soni 6 years, 5 months ago
- 1 answers
Vineet Kumar 6 years, 5 months ago
Posted by Haardika Soni 6 years, 5 months ago
- 2 answers
Yogita Ingle 6 years, 5 months ago
The main purpose of the strategy for ICT implementation in education is to provide the prospects and trends of integrating ICT into the general educational activities.
Some benefits of ICT in education are as follows:
- There is no time boundation on an individual for getting educated by a teacher. A person can attend a class anytime and anywhere.
- Teachers can create interactive classes and make the lessons more interesting.
- Generally, students find images and graphical representation of concepts, more interesting as compared, to the theoretical knowledge. And, using ICT, teachers can explain even the most complex concept in a very simplified manner using graphics, videos and animations.
- An individual can learn on pace he/she is comfortable.
- Learning resoures can be accessed remotely.
In Healthcare
Some benefits of ICT in healthcare are as follows:
- Automated hospital information systems can help to improve quality of care.
- Decreased costs of treatment.
- ICT has significantly enhanced the services being provided and brought behavioural changes.
- This technology helps doctors, hospitals, the general public and all other medical care providers.
- Pharmaceutical industry is the industry that enjoys the biggest benefits of ICT.
- ICT has made E-Health possible.
Posted by Sanjana . 6 years, 5 months ago
- 1 answers
Yogita Ingle 6 years, 5 months ago
A search engine is a Website that lets you search the Internet for Websites on specific topics. Search engines turn the Web into a powerful tool for finding information on any topic. There are several benefits of using search engine like,
- Who is constantly on the computer everyday writing something.
- Search engine provides a wealth of information for professional and personal use. e.g. Google
Posted by Reith Rathore 6 years, 5 months ago
- 3 answers
Posted by Yash Bhardwaj 6 years, 5 months ago
- 2 answers
Yogita Ingle 6 years, 5 months ago
XML file or XML document is a component of XML document system which contains the real data and its semantics.
An XML file contains:
- an optional prolog
- a data instance
Posted by Kushagra Jha 6 years, 5 months ago
- 2 answers
Tushti Kulshreshtha 6 years, 5 months ago
Posted by Adnan Yusuf 6 years, 5 months ago
- 1 answers
Nakshatra Jindagal 6 years, 5 months ago
Posted by Jasmeet Singh 6 years, 5 months ago
- 2 answers
Ashu Gujjar . 6 years, 5 months ago
Posted by Kartik Yadav 6 years, 5 months ago
- 1 answers
Reith Rathore 6 years, 5 months ago
Posted by Yash Patel 6 years, 5 months ago
- 3 answers
Gaurav Seth 6 years, 5 months ago
A computer virus is a malicious program that self-replicates by copying itself to another program. In other words, the computer virus spreads by itself into other executable code or documents. The purpose of creating a computer virus is to infect vulnerable systems, gain admin control and steal user sensitive data. Hackers design computer viruses with malicious intent and prey on online users by tricking them.
Sneha Jain 6 years, 5 months ago
Devansh Jeswani 6 years, 5 months ago
Posted by Rocky Singh 6 years, 5 months ago
- 2 answers
Gaurav Seth 6 years, 5 months ago
Wireless connectivity, often known as Wi-Fi, is the technology that allows a PC, laptop, mobile phone, or tablet device to connect at high speed to the internet without the need for a physical wired connection.
Sneha Jain 6 years, 5 months ago
Posted by Ankush Rana 6 years, 5 months ago
- 1 answers
Posted by Mrunu Js? 6 years, 5 months ago
- 1 answers
Yogita Ingle 6 years, 5 months ago
- Simple Mail Transfer Protocol (<wbr />SMTP)
- The Network News Transfer Protocol (NNTP) is an application protocol used for transporting
- The Internet Message Access Protocol (IMAP)
Posted by Balveer Patel 6 years, 5 months ago
- 2 answers
Gaurav Seth 6 years, 5 months ago
A Web server is a program that uses HTTP (Hypertext Transfer Protocol) to serve the files that form Web pages to users, in response to their requests, which are forwarded by their computers' HTTP clients. Dedicated computers and appliances may be referred to as Web servers as well.
Sneha Jain 6 years, 5 months ago
Posted by Krishna Gaggar 6 years, 5 months ago
- 1 answers
Gaurav Seth 6 years, 5 months ago
A small network making up internet and having many computers is called a Subdomain
Posted by Prince Sharma 6 years, 5 months ago
- 2 answers
Gaurav Seth 6 years, 5 months ago
Stands for "Peer to Peer." In a P2P network, the "peers" are computer systems which are connected to each other via the Internet. Files can be shared directly between systems on the network without the need of a central server. In other words, each computer on a P2P network becomes a file server as well as a client.
Posted by Pranjal Mittal 6 years, 5 months ago
- 3 answers
Gaurav Seth 6 years, 5 months ago
A white hat hacker is a computer security specialist who breaks into protected systems and networks to test and asses their security. White hat hackers use their skills to improve security by exposing vulnerabilities before malicious hackers (known as black hat hackers) can detect and exploit them. Although the methods used are similar, if not identical, to those employed by malicious hackers, white hat hackers have permission to employ them against the organization that has hired them.
black hat hacker is a person who attempts to find computer security vulnerabilities and exploit them for personal financial gain or other malicious reasons. This differs from white hat hackers, which are security specialists employed to use hacking methods to find security flaws that black hat hackers may exploit.
Black hat hackers can inflict major damage on both individual computer users and large organizations by stealing personal financial information, compromising the security of major systems, or shutting down or altering the function of websites and networks.
Yogita Ingle 6 years, 5 months ago
White hat hackers use many of the same tools as a black hat hacker, but they do it for it good. Their work involves penetration testing, evaluating existing security systems, and assessing vulnerability. Most white hat hackers have earned a CEH (Certified Ethical Hacker) designation.
Akash Sen 5 years, 5 months ago
Posted by Akash Kumar 6 years, 5 months ago
- 0 answers
Posted by Suraj Jat 6 years, 5 months ago
- 2 answers
Kusum Gautam 6 years, 5 months ago
Posted by Jasmeet Singh 6 years, 5 months ago
- 3 answers
Sujal Thakur 6 years, 5 months ago
Yogita Ingle 6 years, 5 months ago
Firewalls monitor the network and are capable of blocking suspicious traffic, which can prevent spyware from infecting your system. A firewall can either be software based or hardware based and is used to prevent intruders from accessing your system.
Anuj Singh 6 years, 5 months ago
Posted by Soumya Agrawal 6 years, 5 months ago
- 3 answers
Vishal Singh 6 years, 5 months ago
Posted by Sunita Sinha 6 years, 5 months ago
- 3 answers
Yogita Ingle 6 years, 5 months ago
To link two Web pages, you first need name to the section by using name attribute of <a> tag that you want to link. Suppose, we need to link a section of HTML1.html to HTML2.html. Create a named anchor in HTML1.html.
The syntax is given below:
<a name =”link”> Different Page </a>
After this, you have to write the code to refer to it, from Web page HTML2.html. Following is the code to do so:
<a href =”HTML1.html#link”>
Here, HTMLl.html is the name of html file to the section of which you want to link and # link is the segment name you want to link in that html file.
Posted by Akash Sen 6 years, 5 months ago
- 1 answers
Arastu Bhati 6 years, 5 months ago
Posted by Tanu Choudhary 6 years, 5 months ago
- 0 answers
Posted by Akshay Bhageria 6 years, 5 months ago
- 2 answers
Akash Sen 6 years, 5 months ago
myCBSEguide
Trusted by 1 Crore+ Students
Test Generator
Create papers online. It's FREE.
CUET Mock Tests
75,000+ questions to practice only on myCBSEguide app
Jhalak Arora 6 years, 5 months ago
4Thank You