No products in the cart.

Ask questions which are clear, concise and easy to understand.

Ask Question
  • 2 answers

Gaurav Kumar 6 years ago

Html program, python, flow chart, excel. Or ability test.

Bhumika Agrawal 6 years ago

This question what can I help you
  • 1 answers

Mansi Gupta 6 years ago

A blog is a website containing thoughts experience and talks a subject of their interest
  • 1 answers

Aadya Singh ? 6 years ago

Internet service prodiver is a company that provide services...
  • 2 answers

Tech4 Treat 6 years ago

Hackers are mostly the ones who break into a system to get their required data. They aren't always bad or have bad intentions. Many of them are white hat hackers. Crackers are the ones who penetrate into a system for bad intentions. They crack security codes for morally ill deeds. They are more dangerous than Hackers. Read more on Brainly.in - https://brainly.in/question/2643399#readmore

Tech4 Treat 6 years ago

A hacker hacks a system and steal its data While, A cracker cracks a system and corrects its vulnerabilities
  • 1 answers

Yogita Ingle 6 years ago

i. The ‘World Interoperability for MicroAcess, Inc. (WiMAX)’ forum, an industry group, focuses on creating advanced technology solution for high speed wide area internet access.

ii. The WiMAX product certification program ensures interoperability between WiMAX equipment from vendors worldwide.

iii. WiMAX can serve as a backbone for 802.11 hotspots for connecting to the internet. Alternatively, users can connect mobile devices such as laptops and handsets directly to WiMAX base stations. Mobile devices connected directly can achieve a range of 4 to 6 miles.

iv. There are 2 types of WiMAX, fixed WiMAX(IEEE 802.16d-2004) and mobile WiMAX(IEEE802.16e-2005). Fixed WiMAX is a point-to-multipoint technology, whereas mobile WiMAX is a multipoint-to-multipoint technology, similar to that of a cellular infrastructure.

  • 1 answers

Aryan Mehta 6 years ago

A hub is a central device in a network that provides common connection among the computer or nodes. It is used in star topology.
  • 3 answers
Empty tags are those tags , which have no corresponding OFF tag........These are only ON tag................

Bhumika Agrawal 6 years ago

Empty tag refers to HTML coding where the line of code stands alone and is not closed with slash characters.

Miss. 1234 6 years ago

An "empty tag" refers to HTML coding where the line of code stands alone and is not closed with slash characters
  • 1 answers

Puneet Verma 6 years ago

Additional information of the tags
  • 1 answers

Rani Mishra ??? 6 years ago

Means clarify the question
  • 4 answers

Gaurav Kumar 6 years ago

Computer is an electronic device that can be control by human, it also understand 0,1 language arthematically.

Rani Mishra ??? 6 years ago

Computer is a electronic device that can perform a variety of operations according to set of instructions called programs.

Akash Yadav 6 years ago

Computer is a machines which makes our work easy

Aadya Singh ? 6 years ago

It is an electronic device...
  • 1 answers

Tushar Sharma 6 years ago

The group of elements that share similar style rule are said to belong to the same classs
  • 6 answers

Abhinav ? 6 years ago

Soi ni..??

Shreya ... 6 years ago

Good morning..

Abhinav ? 6 years ago

Gud morning suhu..shreya..??

Shreya ... 6 years ago

It is a collection of applications related to office purpose. Each application serves a different purpose. It consists of excel, word, powerpoint, publisher etc.

Abhinav ? 6 years ago

<I>Microsoft Office is a suite of desktop productivity applications which is designed specifically used for office use. It consists of Word, Excel, PowerPoint, Access, OneNote, Outlook and Publisher applications etc.
Microsoft office..??
  • 3 answers

Aadya Singh ? 6 years ago

It is an act of stealing other's data or idea's and Passing it as your own work...

Bhumika Agrawal 6 years ago

The act of copying another person's ideas, words or work and pretending they are your own; something that has been copied in this way
When we download some one else's work or ideas and pass them as our own, then this practice is known as plagiarism
  • 1 answers

Yogita Ingle 6 years ago

Microsoft Access is a Database Management System offered by Microsoft. It uses the Microsoft Jet Database Engine and comes as a part of the Microsoft Office suite of application.
Microsoft Access offers the functionality of a database and the programming capabilities to create easy to navigate screens (forms).

  • 2 answers

Gaurav Kumar 6 years ago

Primary key references foreign key of computer.

Rani Mishra ??? 6 years ago

A field or a table which references the primary key of another table is called foreign key.
  • 1 answers

Gaurav Kumar 6 years ago

You can prepare python, html, excel, flow chart and ability test.
  • 1 answers

Roshan Yadav 6 years ago

Click on windows and click on all program and click on Ms exal

myCBSEguide App

myCBSEguide

Trusted by 1 Crore+ Students

Test Generator

Test Generator

Create papers online. It's FREE.

CUET Mock Tests

CUET Mock Tests

75,000+ questions to practice only on myCBSEguide app

Download myCBSEguide App