No products in the cart.

Ask questions which are clear, concise and easy to understand.

Ask Question
  • 2 answers

Gaurav Kumar 5 years, 7 months ago

Html program, python, flow chart, excel. Or ability test.

Bhumika Agrawal 5 years, 7 months ago

This question what can I help you
  • 1 answers

Mansi Gupta 5 years, 7 months ago

A blog is a website containing thoughts experience and talks a subject of their interest
  • 1 answers

Aadya Singh ? 5 years, 7 months ago

Internet service prodiver is a company that provide services...
  • 2 answers

Tech4 Treat 5 years, 7 months ago

Hackers are mostly the ones who break into a system to get their required data. They aren't always bad or have bad intentions. Many of them are white hat hackers. Crackers are the ones who penetrate into a system for bad intentions. They crack security codes for morally ill deeds. They are more dangerous than Hackers. Read more on Brainly.in - https://brainly.in/question/2643399#readmore

Tech4 Treat 5 years, 7 months ago

A hacker hacks a system and steal its data While, A cracker cracks a system and corrects its vulnerabilities
  • 1 answers

Yogita Ingle 5 years, 7 months ago

i. The ‘World Interoperability for MicroAcess, Inc. (WiMAX)’ forum, an industry group, focuses on creating advanced technology solution for high speed wide area internet access.

ii. The WiMAX product certification program ensures interoperability between WiMAX equipment from vendors worldwide.

iii. WiMAX can serve as a backbone for 802.11 hotspots for connecting to the internet. Alternatively, users can connect mobile devices such as laptops and handsets directly to WiMAX base stations. Mobile devices connected directly can achieve a range of 4 to 6 miles.

iv. There are 2 types of WiMAX, fixed WiMAX(IEEE 802.16d-2004) and mobile WiMAX(IEEE802.16e-2005). Fixed WiMAX is a point-to-multipoint technology, whereas mobile WiMAX is a multipoint-to-multipoint technology, similar to that of a cellular infrastructure.

  • 1 answers

Aryan Mehta 5 years, 7 months ago

A hub is a central device in a network that provides common connection among the computer or nodes. It is used in star topology.
  • 3 answers

11 Class Student ?? 5 years, 7 months ago

Empty tags are those tags , which have no corresponding OFF tag........These are only ON tag................

Bhumika Agrawal 5 years, 7 months ago

Empty tag refers to HTML coding where the line of code stands alone and is not closed with slash characters.

Miss. 1234 5 years, 7 months ago

An "empty tag" refers to HTML coding where the line of code stands alone and is not closed with slash characters
  • 1 answers

Puneet Verma 5 years, 7 months ago

Additional information of the tags
  • 0 answers
  • 1 answers

Rani Mishra ??? 5 years, 7 months ago

Means clarify the question
  • 4 answers

Gaurav Kumar 5 years, 7 months ago

Computer is an electronic device that can be control by human, it also understand 0,1 language arthematically.

Rani Mishra ??? 5 years, 7 months ago

Computer is a electronic device that can perform a variety of operations according to set of instructions called programs.

Akash Yadav 5 years, 7 months ago

Computer is a machines which makes our work easy

Aadya Singh ? 5 years, 7 months ago

It is an electronic device...
  • 1 answers

Tushar Sharma 5 years, 7 months ago

The group of elements that share similar style rule are said to belong to the same classs
  • 6 answers

Abhinav ? 5 years, 7 months ago

Soi ni..??

Shreya ... 5 years, 7 months ago

Good morning..

Abhinav ? 5 years, 7 months ago

Gud morning suhu..shreya..??

Shreya ... 5 years, 7 months ago

It is a collection of applications related to office purpose. Each application serves a different purpose. It consists of excel, word, powerpoint, publisher etc.

Abhinav ? 5 years, 7 months ago

<I>Microsoft Office is a suite of desktop productivity applications which is designed specifically used for office use. It consists of Word, Excel, PowerPoint, Access, OneNote, Outlook and Publisher applications etc.

♛ ❝Ѕυнαɴα❞ ♛ 5 years, 7 months ago

Microsoft office..??
  • 3 answers

Aadya Singh ? 5 years, 7 months ago

It is an act of stealing other's data or idea's and Passing it as your own work...

Bhumika Agrawal 5 years, 7 months ago

The act of copying another person's ideas, words or work and pretending they are your own; something that has been copied in this way

Sukhwinder Singh 5 years, 7 months ago

When we download some one else's work or ideas and pass them as our own, then this practice is known as plagiarism
  • 1 answers

Yogita Ingle 5 years, 7 months ago

Microsoft Access is a Database Management System offered by Microsoft. It uses the Microsoft Jet Database Engine and comes as a part of the Microsoft Office suite of application.
Microsoft Access offers the functionality of a database and the programming capabilities to create easy to navigate screens (forms).

  • 2 answers

Gaurav Kumar 5 years, 7 months ago

Primary key references foreign key of computer.

Rani Mishra ??? 5 years, 7 months ago

A field or a table which references the primary key of another table is called foreign key.
  • 1 answers

Gaurav Kumar 5 years, 7 months ago

You can prepare python, html, excel, flow chart and ability test.
  • 1 answers

M.......... Duhan 5 years, 7 months ago

Which type of query
  • 1 answers

Roshan Yadav 5 years, 7 months ago

Click on windows and click on all program and click on Ms exal

myCBSEguide App

myCBSEguide

Trusted by 1 Crore+ Students

Test Generator

Test Generator

Create papers online. It's FREE.

CUET Mock Tests

CUET Mock Tests

75,000+ questions to practice only on myCBSEguide app

Download myCBSEguide App