No products in the cart.

Ask questions which are clear, concise and easy to understand.

Ask Question
  • 2 answers

Aman Singh 7 years, 8 months ago

Check it here https://mycbseguide.com/cbse-datesheet.html

Arav Chouhan 7 years, 8 months ago

Yss..
  • 0 answers
  • 1 answers

Sia ? 4 years, 3 months ago

Domain Name: When you create a website, you will have to give a name to it. Such as this particular site is called www.indiastudychannel.com. It is the identity of the "website" over the internet, and any user asking for it is redirected to this website. Every website has a unique name. The www represents that WORLD WIDE WEB, then comes the name of the site, and finally the .com for commercial or .org for organisation, representing the kind of website, or locality of it like .in for India and .uk for United Kingdom.

IP Address: Now, something different from the domain name, IP Adress is the identity of your computer over the internet network. They are ususally numbers sets like: 172.16.254.1. Every computer will have a unique IP address while using the web. This particular thing can be used by security sources to track you down in case you do something illegal over the internet.

  • 1 answers

Sia ? 4 years, 3 months ago

Hacker Cracker
The good people who hack for knowledge purposes. The evil person who breaks into a system for benefits.
They are skilled and have a advance knowledge of computers OS and programming languages. They may or may not be skilled, some of crackers just knows a few tricks to steal data.
They work in an organisation to help protecting there data and giving them expertise on internet security. These are the person from which hackers protect organisations .
Hackers share the knowledge and never damages the data. If they found any loop hole they just delete the data or damages the data.
Hackers are the ethical professionals. Crackers are unethical and want to benifit themselves from illegal tasks.
Hackers program or hacks to check the integrity and vulnerability strength of a network. Crackers do not make new tools but use someone else tools for there cause and harm the network.
Hackers have legal certificates with them e.g CEH certificates. Crackers may or may not have certificates, as there motive is to stay annonymous.
  • 1 answers

Yashita Chawla 7 years, 8 months ago

Explain
  • 0 answers
  • 1 answers

Ranjo Asique 7 years, 8 months ago

File transfer protocol
  • 0 answers
  • 0 answers
  • 0 answers
  • 1 answers

Sia ? 4 years, 3 months ago

human chorionic gonadotropin (HCG)

  • 1 answers

Sia ? 4 years, 3 months ago

Computer Virus Computer Worm
A computer virus is a program, wherein a code copies itself and replicates itself to other programs/files on a device and may result in corrupting or damaging the device A computer worm is an independent malicious program, which when enters a system can start causing harm/damage to the device
An initiation is required by the host, i.e., a virus spreads only when an infected program is executed in a device A worm only needs to enter the device, then it can automatically affect the other files and programs. No execution is needed
Few different types of computer viruses include:
  • Boot sector virus
  • Direct Action virus
  • Polymorphic virus
  • Macro virus
  • Spacefiller virus
  • Overwrite virus
  • File Infector virus
Few of the different types of computer worms are as follows:
  • Internet worms
  • Instant messaging worms
  • Email worms
  • File sharing worms
  • Internet relay chat (IRC) worms
A virus may spread when a file is open and then the same malicious code is copied and spread around whenever other files are opened in the host computer A worm only requires a medium to enter the device. This may be through the internet, email, online messaging applications, etc. 
Time taken by a virus to spread in the system is lesser in comparison to a worm A worm can quickly spread through a device
A virus corrupts the files or deletes them automatically On the other hand, a worm also affects the bandwidth and network connections of the device
Examples of computer virus include Creeper, Blaster, Slammer, etc. Examples of computer worm include Morris worm, storm worm, etc.

myCBSEguide App

myCBSEguide

Trusted by 1 Crore+ Students

Test Generator

Test Generator

Create papers online. It's FREE.

CUET Mock Tests

CUET Mock Tests

75,000+ questions to practice only on myCBSEguide app

Download myCBSEguide App