No products in the cart.

Ask questions which are clear, concise and easy to understand.

Ask Question
  • 1 answers

Yash Deo 6 years, 7 months ago

No
  • 1 answers

Ankit Sahu 6 years, 7 months ago

Input marks are used to ease the data entry that user are permitted to enter whereas validation rule is used to warn the user on wrong entry with a text message .
  • 1 answers

Anmol Goel 6 years, 7 months ago

Charles babbage is the founder of computer
  • 2 answers

Nithin Goud 6 years, 7 months ago

Can't it be worm or spyware

Anmol Goel 6 years, 7 months ago

The system has been corrupt by a virus which make the multiple copies of documents
  • 1 answers

Pihu Arora 6 years, 7 months ago

Intranet stands for Internet Restricted Acess Network .It refers to a computer network within an organization.The private information of an organization cannot be accessed by any outside person as it is protected by firewall,while EXTRANET can be viewed as an extension of a company 's intranet that is extended to users,outside the company,usually partners,vendors,and suppliers.An extranet cannot grant access to the complete network of an origanization,but only provide access to the requied services.
  • 2 answers

Saumya Guru 6 years, 6 months ago

Thank you

Gungun_ Lalwani? 6 years, 7 months ago

Viva means the oral questions based on yur skills and subject matters....not possible for me 2 give yu the questions of viva here
  • 4 answers

Vivek Soni 6 years, 7 months ago

Hyper text mark up language

Dhruv Singh 6 years, 7 months ago

Hyper Text Markup Language

Somdutt Badgurjar. 6 years, 7 months ago

Hyper Text Markup Language

Anurag Sharma 6 years, 7 months ago

Hyper Text Markup Language
  • 2 answers

Dhruv Singh 6 years, 7 months ago

A web page is written using HTML and is stored on a web server. It is a digital page which may contains text, hyperlink, videos, audios, images, tables etc. And each web page is identified by a unique web address called Uniform Resource Locator (URL)

Harshita Singh 6 years, 7 months ago

A document using http and that resides on a web site is known as web page.
  • 1 answers

Dhruv Singh 6 years, 7 months ago

Protocol affect the speed of internet. Because, the protocols are the one which decide that where the data should be transferred and with how much speed. This made us think that the internet speed is slow or fast
  • 1 answers

Pratibha K 6 years, 7 months ago

Cellspacing specify the space between two cells and Cellpadding specify the space between the edge of cell and the text within the cell.
  • 1 answers

Ashwani Singh 6 years, 7 months ago

Query is a command that is given by the user for the random information from data.
  • 0 answers
  • 1 answers

Kajal Singh 6 years, 7 months ago

It helps in putting page numbers
  • 2 answers

Tushar Rajput 6 years, 7 months ago

Top 5 ko na

Manjeet Singh 6 years, 7 months ago

5ko
  • 3 answers

Amaan Ahmad 6 years, 7 months ago

The basic difference between HTML and XML is that HTML mainly focuses on how data should look in a webpage. While, XML transport data between database and application.

Khushnuda?Khushi ??? 6 years, 7 months ago

1.Html is not case sensitive.xml is case sensitive 2.Html is hypertext markup language.xml is extensible markup language 3.Html is used for presenting data.xml is used for transporting and storing data. 4.in html each opening tag may not have closing tag.in xml,each opening tag has closing tag. 5.html documents are stored with the .html extension.xml documents are stored with the .xml extension

Aarohi Singh 6 years, 7 months ago

In HTML pre defined tags are used whereas in XML no pre defined tags are used.
  • 2 answers

Prasanna Kumar 6 years, 7 months ago

Soban

Lokesh Trao 6 years, 7 months ago

guna is the answer Prasanna rekka
  • 1 answers

Sia ? 4 years, 3 months ago

DIFFERENCE BETWEEN HACKER AND CRACKER

Now it is very much clear that there are a lot of dissimilarities between hackers and crackers, and one should not use them interchangeably. The main difference between hackers and crackers can be observed through the following points:

  • Hackers are people who use their knowledge for a good purpose and do not damage the data, whereas a cracker is someone who breaks into the system with a malicious purpose and damages data intentionally.
  • Hackers possess advanced knowledge of computer systems and programming languages, while crackers might not necessarily be so skilled and well-versed with computing knowledge.
  • The hackers work for an organization to improvise their network and solve any issues. Crackers are someone from whom the hacker protects the organization. Crackers work just because a system might be challenging or to get illegal gains.
  • Hacking is ethical, while cracking is illegal and unethical.
  • Hackers have ethical certificates, while the Crackers do not possess any certificates.
  • Hackers continuously work towards making new tools rather than using the existing ones. The crackers, on the other hand, have inadequate computing knowledge to make new tools and use tools already used by other crackers.
  • 1 answers

Prabhakar Pandey 6 years, 7 months ago

Cracker are the mallecious programmers who break into the secure network but hackers are the programmers who break into the computer to steal information for playing pranks. They are ethical hackers.
  • 1 answers

Gaurav Seth 6 years, 7 months ago

<th>BASIS FOR COMPARISON</th> <th>DBMS</th> <th>RDBMS</th>
Stands for Database Management System Relational Database Management System
Data storage Data is stored in the navigational model. Data is stored in the relational model (in tables).
Data redundancy Exhibit Does not present
Normalization Not performed RDBMS uses normalization to reduce or eliminate redundancy.
Modifiability

 
Modification in data is complex. Modification in data is easy and simple.
Data access
 
Consumes more time. Faster as compared to DBMS.
Schema-based constraints and data dependencies Not employed Employed in RDBMS.
Keys and indexes Does not used. To establish relationship keys and indexes are used in RDBMS.
Transaction management Inefficient, error prone and insecure. Efficient and secure.
Distributed Databases Not supported Supported by RDBMS.
Example Dbase, Microsoft Access, LibreOffice Base, FoxPro. SQL server, Oracle, mysql, MariaDB, SQLite.
  • 1 answers

Rupa Kumari 6 years, 7 months ago

Margin is the gap batween the edge and beginning of text i.e. the outer boundary of the text in a document beyond which the contents of the document do not follow

myCBSEguide App

myCBSEguide

Trusted by 1 Crore+ Students

Test Generator

Test Generator

Create papers online. It's FREE.

CUET Mock Tests

CUET Mock Tests

75,000+ questions to practice only on myCBSEguide app

Download myCBSEguide App