No products in the cart.

Ask questions which are clear, concise and easy to understand.

Ask Question
  • 1 answers

Yogita Ingle 4 years ago

Online privacy is essential for ecommerce visitors and customers. Comprehensive privacy practices are what government agencies and consumer protection groups require when setting and enforcing compliance. An ecommerce privacy policy is your everyday practice of collecting, managing, and using data from site visitors.

  • 1 answers

Yogita Ingle 4 years ago

The communication cycle expresses how the system of conveying and understanding messages operates 

  • The Communication Cycle Model is a linear communication model that offers a conceptual description of the interaction involving sender, message, medium/medium and receiver.
  • The communication method refers to the processing or processing of data or messages from the sender via the chosen channel to the recipient, which magnifies the obstacles that hinder its speed.
  • The communication cycle is a cyclical one as it starts with the sender and ends with both the recipient in the form of input.
  • 1 answers

Yogita Ingle 4 years ago

Dynamic Website. Dynamic websites contain Web pages that are generated in real-time. These pages include Web scripting code, such as PHP or ASP. When a dynamic page is accessed, the code within the page is parsed on the Web server and the resulting HTML is sent to the client's Web browser.

  • 1 answers

Prayas Rawat 4 years ago

The File Transfer Protocol  is the Internet facility for downloading and uploading files. If you are uploading a file to another site, you must usually have permission in advance to access the site and the directory where the file is to be placed
  • 1 answers

Yogita Ingle 4 years ago

<br> tag is used to insert a line break which means the text/image following the tag will be moved to the next line while <hr> tag is used to insert horizontal line that can divide the information into sections. 

  • 2 answers

Bhaskar Singh 4 years ago

A protocol is a standard set of rules that allow electronic devices to communicate with each other. These rules include what type of data may be transmitted, what commands are used to send and receive data, and how data transfers are confirmed. You can think of a protocol as a spoken language.

Yogita Ingle 4 years ago

A protocol is a standard set of rules that allow electronic devices to communicate with each other. These rules include what type of data may be transmitted, what commands are used to send and receive data, and how data transfers are confirmed. You can think of a protocol as a spoken language.

  • 1 answers

Mohit Gupta 4 years ago

print ("name")orprint ('name')
SSF
  • 0 answers
  • 2 answers
I dont know

Gaurav Seth 4 years ago

Cyber law

Cyber Law is a generic term referring to all the legal and regulatory aspects of the internet. Everything concerned with or related to or emanating from any legal aspects or concerning any activities of the citizens in the cyberspace comes within the ambit of cyber laws.

  • 1 answers

Yogita Ingle 4 years ago

 it depends on different encoding Like UTF-8 its by defalut is left while in UTF-16 its undefined .

  • 1 answers

Yogita Ingle 4 years ago

Web Browser Definition: A software application used to access information on the World Wide Web is called a Web Browser. When a user requests some information, the web browser fetches the data from a web server and then displays the webpage on the user’s screen. 

  • 3 answers

Topper Best 4 years ago

Telnet is a network protocol used on the Internet or Local Area Network (LAN) connections. Telnet is one of the earliest remote login protocols that enables remote terminal access to a host computer. A Telnet program allows a user on one system to log in to a remote system and issue commands in a command window of the remote system
T- teri E- aaise L- lunga N- nangi W- wali T- teri

Yogita Ingle 4 years ago

Telnet is a network protocol used on the Internet or Local Area Network (LAN) connections. Telnet is one of the earliest remote login protocols that enables remote terminal access to a host computer. A Telnet program allows a user on one system to log in to a remote system and issue commands in a command window of the remote system.

  • 1 answers

Meghna Thapar 4 years ago

Entrepreneurship is romanticized in our culture, and it’s easy to see why: We live in a capitalistic society that values the creation of ideas, the unlimited potential of business and of course the prestige of attaining wealth and power.

Six Common Misconceptions About Entrepreneurship

  • Entrepreneurs are born that way. ...
  • All you need is a Great Idea to be successful. ...
  • Entrepreneurship is an easy way to get rich. ...
  • Entrepreneurship means more personal time. ...
  • Entrepreneurs are their own Boss. ...
  • Anyone can be an entrepreneur.
  • 3 answers

?Mansi ? 4 years ago

The word "cyber" denotes a relationship with information technology (IT), i.e., computers. (It can relate to all aspects of computing, including storing data, protecting data, accessing data, processing data, transmitting data, and linking data.) OR Characteristic of the culture of computers, Information technology, and virtual reality.

Nasir Ul Haq 4 years ago

Characteristic of the culture of computers, Information technology, and virtual reality.

Aniket Mishra 4 years ago

Like a cyber crime
  • 1 answers

?Mansi ? 4 years ago

src - Specifies the path to the image. alt - Specifies an alternate text for the image, if the image for some reason cannot be displayed.

myCBSEguide App

myCBSEguide

Trusted by 1 Crore+ Students

Test Generator

Test Generator

Create papers online. It's FREE.

CUET Mock Tests

CUET Mock Tests

75,000+ questions to practice only on myCBSEguide app

Download myCBSEguide App