No products in the cart.

Ask questions which are clear, concise and easy to understand.

Ask Question
  • 2 answers

Kanak Mangla 7 years, 9 months ago

How to solve coding que

Nancy Rajput 7 years, 9 months ago

but for what
  • 0 answers
  • 1 answers

Parul Tiwari 7 years, 9 months ago

Imap is ainternet message access protocol Pop is a post office protocol
  • 0 answers
  • 0 answers
  • 3 answers

Parul Tiwari 7 years, 9 months ago

.xml

Nandu Tiwari 7 years, 9 months ago

.xml

Shreya Gupta 7 years, 9 months ago

Extensible markup language
  • 2 answers

Nandu Tiwari 7 years, 9 months ago

Section D

Shreya Gupta 7 years, 9 months ago

Don't know
  • 1 answers

Riya Bhardwaj 7 years, 9 months ago

This to cbse can tell only!
  • 0 answers
  • 4 answers

Ujjwal Malviya 7 years, 9 months ago

Social networking

Tapan Pandey 7 years, 9 months ago

Protocols

Japneet Preet 7 years, 9 months ago

Social networking sites

Japneet Preet 7 years, 9 months ago

Video conferencing
  • 1 answers

Sonal Singh 7 years, 9 months ago

The information in the blogs i.e online diary are known as posts.
  • 1 answers

Xyz Xyz 7 years, 9 months ago

Coding must come
  • 2 answers

Sneha Jain 7 years, 9 months ago

Domain name system nd world wide web consortium

Japneet Preet 7 years, 9 months ago

Domain name system.... world wide web
  • 2 answers

Aryan Studying 7 years, 9 months ago

Jagran josh ki site par agla paper english ka dikha rha hai

Japneet Preet 7 years, 9 months ago

Obviously hoga
  • 1 answers

Vishakha Yadav 7 years, 9 months ago

Blog is like a post but we can not comment on it..just can read.
Key
  • 0 answers
  • 1 answers

Aryan Studying 7 years, 9 months ago

For what
  • 1 answers

Pari Mita 7 years, 9 months ago

The key that helps us to uniquely identity a record in a table
  • 3 answers

Dhruv Gupta 7 years, 9 months ago

Cracking is a way by which we bypass or get access by illegal process And hacking is the process by which a person can get unauthorized access on any device I think this may help u n best of luck?

Shivansh Shukla 7 years, 9 months ago

1001233

Pari Mita 7 years, 9 months ago

Crackers are malicious programme but hacker are ethical programme
  • 3 answers

Japneet Preet 7 years, 9 months ago

These are the computer softwares that disrupt the normal functioning of computer , damage or delete files, harm the computer etc

Su Anderson 7 years, 9 months ago

Trojan horse is a malicious program that is disguessed as ,or embedded within or legitimate software . It is an executable file that will install itself and run automatically once its is downloaded

Pari Mita 7 years, 9 months ago

Plss guys.....answer me....it's impartant....
  • 0 answers
  • 1 answers

Japneet Preet 7 years, 9 months ago

We will be asked for the html coding for the given presentation

myCBSEguide App

myCBSEguide

Trusted by 1 Crore+ Students

Test Generator

Test Generator

Create papers online. It's FREE.

CUET Mock Tests

CUET Mock Tests

75,000+ questions to practice only on myCBSEguide app

Download myCBSEguide App