No products in the cart.

Ask questions which are clear, concise and easy to understand.

Ask Question
  • 1 answers

Aman Kumar 7 years, 7 months ago

Well I don't know correct but I think multiple primary keys nhi hoga
  • 1 answers

Kaira Raj 7 years, 7 months ago

Please someone reply. I don't know
  • 3 answers

Shru Lohia 7 years, 7 months ago

Hyper text transfer protocol secure

Shru Lohia 7 years, 7 months ago

S stands for secure

Himanshu Jha 7 years, 7 months ago

Hyper text transfer protocols
  • 1 answers

Sia ? 4 years, 3 months ago

<th>WORMS</th> <th>TROJAN HORSE</th>
A Worm is a form of malware that replicates itself and can spread to different computers via Network. Trojan Horse is a form of malware that capture some important information about a computer system or a computer network.
The main objective of worms to eat the system resources. The main objective of the trojan horse is to control the activity of the system.
Worms can be detected and removed by the Antivirus and firewall. Trojan horses are detected by the antivirus software.
It doesn’t need a host to replicate from one computer to another. It require host is needed for spreading.
It can give unauthorized access and control of the system to the hackers. It also give unauthorized access and control of the system to the hackers.
It is less harmful as compared. It is more harmful as compared.
Morris Worm, Storm Worm and SQL Slammer are some of the examples of worms. Back orifice, Rootkit and Beast Trojan are some of the common Trojan horses.
Worms are executed via weaknesses in system. Trojan horse executes through a program and interprets as utility software.
  • 1 answers

Amrit Amrit 7 years, 7 months ago

Html.xml and databases
  • 1 answers

Suryansh Parashar 7 years, 7 months ago

Trojan horses are impostors--files that claim to be something desirable but, in fact, are malicious. A very important distinction from true viruses is that they do not replicate themselves, as viruses do. Trojans contain malicious code, that, when triggered, cause loss, or even theft, of data.
  • 1 answers

Shiv Kaushik 7 years, 7 months ago

The mechanism that allows the server to store it's own information about a user on the user's own computer. It is a message given to a web browser by a web server. The browser stores the message in the text file. The msg is then sent back to the server each time the browser request a page from the server. I hope it helps you.
  • 3 answers

Vaishnavi Kumari 7 years, 7 months ago

But not clearly answer is this..

Bhumika Khaitan 7 years, 7 months ago

Malware contain all the viruses like sphyware it is head of viruses and spyware is a virus

Vaishnavi Kumari 7 years, 7 months ago

Jaldi batao Bhai log
  • 2 answers

Ansh Garg 7 years, 7 months ago

Hyper text transfer protocol

Manu Bansal 7 years, 7 months ago

Hyper Text Transfer Protocol
  • 4 answers

Avichal Yadav 7 years, 7 months ago

Anchor <A> tag used for ibsertion of hyperlink

Avichal Yadav 7 years, 7 months ago

Shashank you are wrong

Shashank Sen 7 years, 7 months ago

Hyperlink reference tag for inserting hyperlink

Avichal Yadav 7 years, 7 months ago

Hr is a tag used to put a horizontal rule in document.
  • 0 answers
  • 4 answers

Nirmal Pathak 7 years, 7 months ago

I w,ill try to download with vidmate but all video r fake

ब्राहम्ण Boy 7 years, 7 months ago

No I am not interested in watching movies

Luv Kapoor 7 years, 7 months ago

VIDMATE bro. ???

Amrit Amrit 7 years, 7 months ago

Not played
  • 4 answers

Anurag Prajapati 7 years, 7 months ago

Board mein nahi hoga school mein

Pahul Kumar 7 years, 7 months ago

Fit ka exm bhi to hoga na

Aweeeeeeeeeeesome Khanna 7 years, 7 months ago

But why

Pahul Kumar 7 years, 7 months ago

I do
  • 2 answers

Amrit Amrit 7 years, 7 months ago

Marks add nhi hoga but fail hoga tb kisi subject me add hoga marks

Pahul Kumar 7 years, 7 months ago

If anyone is failed then the marks of comp is added
  • 1 answers

Arav Chouhan 7 years, 7 months ago

No..... :)
  • 1 answers

Sakshi Jaiswal 7 years, 7 months ago

It is related to computer.....
  • 1 answers

Riti Bansal 7 years, 7 months ago

Domain
  • 2 answers

Bhumika Pandey 7 years, 7 months ago

I m sorry i was not said to u this

Bhumika Pandey 7 years, 7 months ago

I don't care about ur mood okk
  • 1 answers

Shizu Ka 7 years, 7 months ago

Yeah viva will also be there but only in IT
  • 3 answers

Amrit Amrit 7 years, 7 months ago

.odb

Anant Agarwal 7 years, 7 months ago

.odb

Ro Hit Man Sharma 7 years, 7 months ago

.odb

myCBSEguide App

myCBSEguide

Trusted by 1 Crore+ Students

Test Generator

Test Generator

Create papers online. It's FREE.

CUET Mock Tests

CUET Mock Tests

75,000+ questions to practice only on myCBSEguide app

Download myCBSEguide App