No products in the cart.

Ask questions which are clear, concise and easy to understand.

Ask Question
  • 1 answers

Gaurav Seth 3 years, 11 months ago

The entrepreneurship is a practice which involves launching or starting a new business either on small scale or level or large scale with an hope to make monetary gains or profit.

The myths about entrepreneurship will include:

1. The money will be lost or waste while establishing a new business.

2. The entrepreneurship requires huge initial investment but generally if a business is run on small scale investment it may earn profit.

  • 1 answers

Gaurav Seth 3 years, 11 months ago

Difference between repeater and router​:

Router has the ability to work like a repeater.

It is used to connect to the world of internet

Router connects two different network

This is the decision maker where it decide who and when should receive the packet

 

A repeater is a module which re-transmit signal from the router

Repeater cannot connect to internet directly. It depends on the router to connect.

Router combines / connects two different segments of same network

It will help router by repeat what the router instructs.

  • 4 answers

A N Rahul 3 years, 11 months ago

Sorry for the paragraph. These are the most reported online threats :- Malware Any kind of software designed to annoy or harm the users is considered malware. The name is short for malicious software. Hacker Skilled programmers using their coding knowledge for bad deeds are better known as hackers. By using scripts or malware they access data of users for fun, financial gain or some other harm. With the help of malicious applications, they develop themselves, hackers may come to one’s personal information or some other details that can harm. Computer Virus Just like biological ones, PC viruses also enter one’s system unnoticed with a goal to take control over it. Computer viruses can be complex malicious programs or just pieces of code designed to make a mess. The greatest threat of virus is its capability to copy itself and to spread to other computers. Besides that, virus always attacks vulnerable parts of one’s PC until it takes over the whole system. Computer Worm One of the nastiest malware one can get to his/her PC is a computer worm. This malicious application self-replicates all until one’s computer is impossible to use. Trojan Just like the epic Trojan horse, its malware namesake was designed to fool its victims. You can get a Trojan almost anywhere, from your downloads and emails to all kinds of different content. Trojan is designed that way to make you think it is helping you with some task but instead is causing harm or stealing data from your PC. Ransomware Ransomware is a literal kidnap of your PC remotely. Hackers use codes to lock your computer. If you want to unlock it ransom has to be paid. Getting to this kind of situation is tricky and by all means unpleasant. Spyware Any type of malware that collects personal information, browsing history, and one’s surfing habits is considered a spyware. Its name comes from a great ability to hide. First of all, collected information is shared with the third parties and then it gets abused. Adware Most of the adware are safe and consist of annoying pop-ups showing on your computer and browser. Adware is a type of free software supported by advertisement. The danger of adware reflects in the possibility of one being tracked through websites he/she visits. In the worst case, his/her personal information could be gathered through adware. Browser Hijack Browser hijack is a malware program that makes your PC develop a mind of its own by taking you to websites you have no intention to go to. In the same time, this malware alters your browser setting in order to lower your security level. Keylogger One of the most malicious software nowadays is the keylogger. An app capable of recording every letter one types while online. Every record is then being sent to keylogger’s creator which can analyze and use this data to retrieve one’s credentials, bank account numbers, credit card numbers, emails, etc. all in order to steal his/her identity. Rootkit One’s PC can be used remotely by hackers if it’s infected by the rootkit. The application may come from different sources. It allows a full access to one’s data, information, etc. The attack comes from the distance, with PC’s owner totally unaware of that. Scam Thanks to phishing and social engineering cyber-criminals successfully scam people in order to gain money. Every suspicious offer that includes financial gain for the user can be a scam. By offering free stuff, credit cards or lottery criminals get the financial information of their victims. With personal information and bank records, even beginner hackers can steal from common users

A N Rahul 3 years, 11 months ago

These are the most reported online threats Malware Any kind of software designed to annoy or harm the users is considered malware. The name is short for malicious software. Once active, malware is using one’s computer without him/her knowing. Trojan horses, spyware, adware, ransomware, phishing, viruses, worms, rootkits, and browser hijackers are all types of malware. Malware is usually picked up from the internet or through one’s email. Anything that one downloads from the internet can have hidden malware inside. Another source of malware can be hacked website commonly visited by the users. If a PC is underperforming, often crashes or shows a bunch of pop-ups it’s probably infected. By not opening suspicious emails from unidentified sources the user can decrease the chances of being infected. The best solution for both removal and prevention is a verified antivirus software. ShieldApps’s Shield Antivirus has proven to protect from and remove any up-to-date malware. With 24/7 protection one doesn’t have to worry about being infected any more.   Hacker Skilled programmers using their coding knowledge for bad deeds are better known as hackers. By using scripts or malware they access data of users for fun, financial gain or some other harm. With the help of malicious applications, they develop themselves, hackers may come to one’s personal information or some other details that can harm. The signs of one being hacked are if that person suddenly starts sending phishing emails, loses some data, gets his/her PC locked, gives away personal information… Hacking became almost normal nowadays since anyone with enough patience can learn it. Scripts and guides are all available online. While some just copy them, advanced hackers develop new methods to break into computers. By not opening suspicious attachments, downloading files from unfamiliar websites and keeping personal information offline, one can stay safe from being hacked. In order to be 100 percent sure you are protected it’s always good to have a verified antivirus software. Shield Antivirus is an application providing the highest degree of protection from any malicious software. The detection rate and percentage of success are what makes Shield Antivirus top-notch antivirus solution. Staying safe from hackers have never been so easy!   Computer Virus Just like biological ones, PC viruses also enter one’s system unnoticed with a goal to take control over it. Computer viruses can be complex malicious programs or just pieces of code designed to make a mess. The greatest threat of virus is its capability to copy itself and to spread to other computers. Besides that, virus always attacks vulnerable parts of one’s PC until it takes over the whole system. Viruses get to one’s PC through emails or downloads, but what makes them different is that they are well-hidden in some commonly used application. Once engaged virus starts spreading and multiplying itself. When more than one file is corrupted virus can make changes on one’s PC without being noticed. The best indicator for having a virus is bad or non-existing internet connection, and sometimes firewall and antivirus disabled. One and only option one has when infected with the computer virus is to find it and delete it with licensed antivirus software. Shield Antivirus passed every test with all up-to-date viruses in both terms of discovering them and deleting them for good. Algorithms which provide deep-scan are capable of stopping the virus almost instantly. The real-time alert will pop so the user can pick next step.   Computer Worm One of the nastiest malware one can get to his/her PC is a computer worm. This malicious application self-replicates all until one’s computer is impossible to use. Computer worms are well-known for their enormous system memory usage. They can also spread through a network, causing bad network bandwidth. This goes on all until PC is no longer usable. The main source of computer worms is in file sharing. Any kind of data transmission can be a good way in for a worm. Transfer websites, attachments, file-sharing systems, emails, removable drives can all host a worm infection. By being cautious when using services mention above you have a good chance of staying away from computer worms. But, having an up-to-date software and armed firewall is better. One of the best solutions to your worm situation is Shield Antivirus. Capable of detection and removal of worms no matter where they are hiding Shield Antivirus will keep you safe, while your PC will be up and running.   Trojan Just like the epic Trojan horse, its malware namesake was designed to fool its victims. You can get a Trojan almost anywhere, from your downloads and emails to all kinds of different content. Trojan is designed that way to make you think it is helping you with some task but instead is causing harm or stealing data from your PC. You’ll notice you have a Trojan if your computer underperforms while working on some regular actions. This happens because of Trojan’s CPU over-usage. Anyone can pick up this malware from various websites, downloads, malicious email attachments, even movies, and music. Deleting a Trojan might cause you trouble. Malicious data could be well hidden in any application/file that is affiliated with Trojan. The best way to get rid of it is by using licensed antivirus solution capable of wiping every bit of Trojan from the PC. A good prevention is also important. Stay away from suspicious emails or files with weird extensions. In order to stay on top of every potential threat, one should have Shield Antivirus which will provide information about any Trojan detected, solution to a problem, and of course – its removal.   Ransomware Ransomware is a literal kidnap of your PC remotely. Hackers use codes to lock your computer. If you want to unlock it ransom has to be paid. Getting to this kind of situation is tricky and by all means unpleasant. If you are infected, you’ll know it for sure. You won’t be able to access your PC and you’ll receive instructions how to pay the ransom. Since it’s been created by skilled coders, ransomware can lock your PC for good. The worse thing is that it can come from websites, emails, and networks as well. Keeping everything up-to-date on your PC from the operative system to your protection software is one of the ways to protect yourself. Firewall you are using should always be up, especially when it comes to websites you are not familiar with. By using Shield Antivirus you can be sure any ransomware won’t get, though. The ones potentially hiding will be wiped clean from your PC before they can cause any damage.   Spyware Any type of malware that collects personal information, browsing history, and one’s surfing habits is considered a spyware. Its name comes from a great ability to hide. First of all, collected information is shared with the third parties and then it gets abused. The most common way of picking up a spyware is by downloading files or software from unsafe websites. Spyware is bundled with files and unnoticeable upon download. Another way of being infected is by clicking on suspicious email attachments. The infection indicators are constant error messages, random appearance of icons on the desktop and automatic opening of tabs while browsing. If one wants to prevent being infected it should pay close attention when downloading from file-sharing websites, opening random emails, and of course, keep his/her antivirus up-to-date. Shield Antivirus owns antispyware protection and at the same time is cleaning-efficient. The software keeps you safe and helps you resolve your spyware issues in seconds.   Adware Most of the adware are safe and consist of annoying pop-ups showing on your computer and browser. Adware is a type of free software supported by advertisement. The danger of adware reflects in the possibility of one being tracked through websites he/she visits. In the worst case, his/her personal information could be gathered through adware. Adware is distributed through free software one downloads from the internet. Usual actions performed by adware are advertisement showing on either desktop or browser, changed home page on one’s browser and ads popping up in applications that haven’t had them before. A precaution that one can take in order to keep him/her safe from adware is simply having antivirus and other applications up-to-date and by using the firewall when surfing. If adware is already present in the system the best way of cleaning it is by using Shield Antivirus. Before you delete it, make sure you’ve backed up all the important data from your PC. Shield Antivirus will then scan the PC and liberate it from ads for good.   Browser Hijack Browser hijack is a malware program that makes your PC develop a mind of its own by taking you to websites you have no intention to go to. In the same time, this malware alters your browser setting in order to lower your security level. You’ll know your browser is hijacked simply by not being able to access your home page or a website of your choosing. Instead, you’ll visit some page placed there by the others. This malware usually comes from plugins one installs to the browser. Some browser hijacks can actually improve one’s experience online, but in most cases, it’s just boring. Browser hijacks are easily avoidable. Not using third party applications is the best way to do it. With antivirus that can recognize it, you’ll stay safe as well. Shield Antivirus is a software able to both detect and remove browser hijack. You’ll be able to relax and enjoy your online experience without any concern for your browser being misused. Possible intrusions will be reported and stopped before any harm is done.   Keylogger One of the most malicious software nowadays is the keylogger. An app capable of recording every letter one types while online. Every record is then being sent to keylogger’s creator which can analyze and use this data to retrieve one’s credentials, bank account numbers, credit card numbers, emails, etc. all in order to steal his/her identity. Since this malware is well hidden, it’s almost impossible to know you have one. The only signs one can notice are slower mouse pointer or automatized letters/symbols showing on the screen, different from the ones typed. The source of keylogger can be in file sharing websites or email attachment. To be installed, keylogger usually needs some personal information. That’s why the victims are first exploited by phishing or social engineering. This malware is being installed without user’s knowledge so it stays undetected for quite some time. The way to stay protected is simple. Pay attention to what and where you are downloading. To stay hidden, one can also use the virtual keyboard or alternate keyboard which can be confusing to a keylogger. Also, password management applications may help since they’ll do all the job for the user. No keys pressed, no keys logged. The only verified method of maintaining one’s security is, of course, trusted antivirus. Shield Antivirus has proven itself by tracking and removing keylogger malware, while at the same time providing real-time alerts to this type of danger.   Rootkit One’s PC can be used remotely by hackers if it’s infected by the rootkit. The application may come from different sources. It allows a full access to one’s data, information, etc. The attack comes from the distance, with PC’s owner totally unaware of that. Getting to know you are being used by a rootkit takes a lot of effort. By close monitoring of every invoked process on the PC, one can find out if he/she is being used. This takes a lot of time and an advanced tech-knowledge. Worse of all is that rootkit can be picked almost anywhere. Commercial apps or products that seem harmless are usually the greatest carriers of rootkit malware. The only good thing is that rootkit can’t replicate or spread by itself. The only way to approach rootkit problem is by scanning the PC with up-to-date antivirus software. Any rootkit can be tracked and removed by Shield Antivirus. By keeping the program on, alongside with the firewall, one can be safe from any intrusion.   Scam Thanks to phishing and social engineering cyber-criminals successfully scam people in order to gain money. Every suspicious offer that includes financial gain for the user can be a scam. By offering free stuff, credit cards or lottery criminals get the financial information of their victims. With personal information and bank records, even beginner hackers can steal from common users. Scams use either flattering words or malware. One can become a victim all over the internet. Some scammers will just start communicating with you, while other will try to get to you through malicious software. Both ways have the same intention and can be seen in emails, websites, pop-ups, ads, etc. The best way of protection is common sense. By using only trusted retail stores, not sharing your personal information with everyone, staying cautious online are all very good ways of staying safe. If by any chance a scam includes malware or any kind, then the antivirus is your best friend. Shield Antivirus has proved itself both in a lab and in the real-life situation. Thousands of satisfied clients confirm its performance and usability. By alarming you, scanning through your data and removing any potential threat Shield Antivirus keeps you away from any software-based scams.   Social Engineering Since humans have their own errors, most of the time they are the main culprit of being hacked, used or scammed. Hackers know this and by using this human flaws they get to either one’s personal information or way inside his/her computer. By social engineering, a criminal can get to what he/she wants from the victims. Any communication which occurs with no reason and coming from an unknown source can be considered social engineering. A hacker will send emails containing links, offers, warnings and similar, just to make the victim interact. When this happens, the extraction of personal information can start.  By using modern technologies and malicious software one can get more than enough within few emails. Usually this leads to identity theft or credit card number theft. Since social engineering is not a program it can’t be deleted from PC. The best way to stay safe is by thinking twice when dealing with unverified emails, websites, and services. By not interacting with fishy content one can stay safe 100%. Just in case, it’s always good having an approved antivirus that can protect you from malware you might get thanks to social engineering. One software that has proven both in detecting and removal of malware is ShieldApps’s Shield Antivirus. With its smart detecting system, real-time alerts and high deletion rate Shield Antivirus is one of a kind software.   Spam No-one likes to be bored to death with an advertisement. Spam’s main goal is exactly that! Advertising product/service you don’t want to know about through your email. Just like junk mail and pop-ups spam is usually not dangerous, but it’s tiring. Every unsolicited email you get from companies, family and friends usually are spam. If it’s received on a regular basis, sometimes in tons, you can be sure you are infected. Even though it usually targets email accounts, recently it’s quite often on social media as well. Users are the best spam protection, but this takes a lot of effort. A careful reading of every page, every installation or download can help from receiving spam mail, but most of us never do that. Unsubscribing from these “services” is also a way, but again it takes a lot of precious time. The best protection is having a spam filter or antispam solution in a shape of antivirus. Shield Antivirus is capable of stopping any spam content and as well informing you when you are about to “subscribe” to one. Leave it all behind with simple utilization of Shield Antivirus.   Phishing Phishing is a method used by cyber-criminals who want to come to one’s personal information. By sending fake emails or contacting people directly through scam websites crooks gain personal data. Login credentials, social security number, credit card number, bank account information are just some information interesting to the hackers. By presenting themselves as some trustworthy company/organization, who’s services are being used by one, criminals ask for personal information. This action is usually covered with an excuse; an update of services, account error or similar. By filling in his/her information scammed person is giving away personal information which can lead to identity theft. Since there are people standing behind phishing, it’s impossible to remove them. But, with enough attention and a good antivirus software phishing is avoidable. Make sure not to answer unsolicited emails, never open links, and pay close attention to domains of well-known websites. Shield Antivirus can’t stop you from answering fishy emails, but it will prevent malicious attachments from causing trouble.

Akhil Ahamed 3 years, 11 months ago

There are many online threats some of these are as follows: 1)Trojan horse 2)Virus 3)Worms 4)spwares etc

Yogita Ingle 3 years, 11 months ago

There are a lot of threats when it comes to online threats.

Some of the threats that one can witness online have been discussed briefly as follows

1. The main threat can be of online frauds. The era of online payment gateways has arrived and due to this a lot of payment frauds have also entered the scene.

2. Data security is another inline threat under which your personal data is under the threat of usage by third parties.

3. Many viruses and bugs have popped up with the rise in technology which again pose as a big problem when it comes to online threats.

  • 1 answers

Gaurav Seth 3 years, 11 months ago

A n s w e r

Sticky Key is useful for people with problems with hand movements.

Explanation:

Sticky keys helps a person with physical disabilities but it is also used by others as a means to reduce strain.

  • 2 answers

Yashasvi Sahu 3 years, 11 months ago

????

Itachi Uchiha ? 3 years, 11 months ago

Jo bda hota h vo macro ,jo choota hota h vo micro.☺️
  • 3 answers

Itachi Uchiha ? 3 years, 11 months ago

Noun

Anirudh Dubey 3 years, 11 months ago

Sjjs

G G 3 years, 11 months ago

Noun
  • 1 answers

Yogita Ingle 3 years, 11 months ago

Purpose of internet security is to create rules and actions to protect against attacks over the internet.

* The best internet security practice are :-

_ USE SECURE PASSWORDS.

_ DON'T REUSE PASSWORDS.

_ SECURE YOUR WIFI.

  • 1 answers

Ayush Yadav 3 years, 11 months ago

renewable resource
  • 1 answers

Abinash .P 3 years, 11 months ago

Computer is a machine that is used to record data etc..
  • 1 answers

Itachi Uchiha ? 3 years, 11 months ago

Don't abuse anyone...but manaa u r also write yahan pr sb padhne aate h apne app ke followers bdhane ni ....????soo plzz don't do this again...
  • 3 answers

Yashasvi Sahu 3 years, 11 months ago

☠️☠️☠️☠️

A N Rahul 3 years, 11 months ago

a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.

Kavita Sangwan 3 years, 11 months ago

Network is a group of devices link together...
  • 1 answers

Itachi Uchiha ? 3 years, 11 months ago

Pehle jis bhi cheej pr aap style apply Krna chahte h use select kijiye phir style pr jakr style choose karo jo aapko apply Krna h and then ok krdo ya kahi pr bhi click kr bss kisi tool pr click mt Krna...
  • 1 answers

Isha Dhankhad 3 years, 11 months ago

Subject
  • 1 answers

Yogita Ingle 3 years, 11 months ago

Principles of effective communication

The principle of clarity: A message should be clear, free from distortion and noise. A vague message is not only a barrier to creating effective communication but also causes the delay in the communication process and this is one of the most important principles of effective communication.
Principles of Brevity: A communication should be brief i.e. just necessary and sufficient. Repetition and over-explanation are likely to destroy the actual meaning and importance of the message. Moreover, the reader may feel disturbed by receiving a long message.

The principle of Simplicity: Message should be given using simple and familiar words. Vague and technical words should be avoided. Simple words are easy to understand and help the receiver to respond quickly.
The principle of Timeliness: Communication is mean to serve a specific purpose. If communication is made in time, communication becomes effective. If it is made untimely then it may become useless.
The principle of Compass: The communication net should cover the whole organization. The concerned people must know “What exactly they need and “When they need it. And an effective communication will serve such.
The principle of Integrity: Communication should consider the level of people, principles & objectives of an Organization to create a network or chain. Such network will provide a better field of internal and external communication.
The principle of strategic use of Informal Organization: The most effective communication results when managers use the informal organization as a complementary to formal communication, e.g. arranging sports, cultural function & dinner for the employees can be informal organization

  • 1 answers

Itachi Uchiha ? 3 years, 11 months ago

After using style ...in tha left side u have see a undo button then click it and undo the last doing things
  • 1 answers

Itachi Uchiha ? 3 years, 11 months ago

Online transaction is a payment method in which the transfer of fund or money happens online over electronic fund transfer. Online transaction process (OLTP) is secure and password protected. Three steps involved in the online transaction are Registration, Placing an order, and, Payment......
  • 3 answers

Vikram Naveen 3 years, 11 months ago

Hlo muskan

Rashmeen Kaur 3 years, 11 months ago

Entrepreneurship means handle business and increase profit in it by your skills

Yogita Ingle 3 years, 11 months ago

The entrepreneur is defined as someone who has the ability and desire to establish, administer and succeed in a startup venture along with risk entitled to it, to make profits. The best example of entrepreneurship is the starting of a new business venture. The entrepreneurs are often known as a source of new ideas or innovators, and bring new ideas in the market by replacing old with a new invention.

  • 1 answers

Yogita Ingle 3 years, 11 months ago

Stress is a normal part of life, and it may manifest itself in different ways.

Stress, from a biological perspective, is defined as a reaction to change or a process of responding to any kind of perceived threat.

  • 1 answers

Itachi Uchiha ? 3 years, 11 months ago

?⭐Information Technology – (subject code - 402/462) NSQF Level II – Class X ?First Term (SA 1) S. No. Unit Name ✨Unit 1 Functional English (Intermediate) ✨Unit 2 Web Applications (Basic) ✨Unit 3 Word Processing (Intermediate) ?Second Term (SA 2) S. No. Unit Name ✨Unit 4 Spreadsheet (Intermediate) ✨Unit 5 Digital Presentation (Intermediate) ✨Unit 6 E-Mail Messaging (Intermediate) ✨Unit 7 Data Base Development (Basic) ?⭐Practical ✨Parameters ✨Project ✨Viva based on Project ✨Practical File / Report and ✨Portfolio ✨Demonstration of Skill ✨Competency in Lab ✨Activities......
  • 1 answers

Itachi Uchiha ? 3 years, 11 months ago

A stressor is a chemical or biological agent, environmental condition, external stimulus or an event seen as causing stress to an organism. Psychologically speaking, a stressor can be events or environments that individuals might consider demanding, challenging, and/or threatening individual safety.
  • 2 answers

Muskan Sharma 3 years, 11 months ago

style is defined as a particular of doing or saying something or refers to a unique from of clothing or way of arranging your appearance. An example of style is the method by which you learn an example of style is speaking formally.

Mohmed Shaikh Mutallib 3 years, 11 months ago

Style is a peculiar feature of designing rows and coloums
  • 1 answers

Shariful Islam 3 years, 11 months ago

What is computer network
  • 1 answers

Avni Vyas 3 years, 9 months ago

Information technology
  • 5 answers

Mohmed Shaikh Mutallib 3 years, 11 months ago

Pc means person computer

Muskan Saini 3 years, 11 months ago

It stands for Personal computer.

Sanya Agarwal 3 years, 11 months ago

Full form of PC is personal computer

Lavneesh Kasaudhan 3 years, 11 months ago

Personal Computer

Yogita Ingle 3 years, 11 months ago

PC mean personal computer

  • 1 answers

Meghna Thapar 3 years, 11 months ago

Switches are used within individual networks. To communicate with another network, the network would use a device called a router. A router is a special communications processor used to route packets of data through different networks, ensuring that the message sent gets to the correct address.

Basic Network Hardware

  • Routers. A router is a connecting device that transfers data packets between different computer networks. ...
  • Repeaters, Hubs, and Switches. Repeaters, hubs and switches connect network devices together so that they can function as a single segment. ...
  • Bridges. A bridge connects two separate Ethernet network segments. ...
  • Gateways.
  • 5 answers

Tanushree Khatod 3 years, 11 months ago

Lan is local area network

Navya 8Th Class 3 years, 11 months ago

Hi

Alok Sahu 3 years, 11 months ago

Vvg

Alok Sahu 3 years, 11 months ago

Hii

Gaurav Seth 3 years, 11 months ago

Local Area Network (LAN): A LAN is a system of interlinked personal computers in a localized area, typically under 1 km across. LANs normally operate within a compact area such as an office building or a campus owned by the using organization. The configuration of a LAN can be a star, a ring or; simple devices attached along a length of cable. In LAN, transmission channels used are coaxial or fibre optic cable and special interface units rather than telephone lines and modems. Thus, the transmission speed is very high. The attached computers may be of different types and performing a variety of functions such as data processing, word processing and electronic mail.
 

  • 1 answers

Gaurav Seth 3 years, 11 months ago

Save your document

  1. Click FILE > Save, pick or browse to a folder, type a name for your document in the File name box, and click Save.

  2. Save your work as you go - hit Ctrl+S often.

  3. To print, click the FILE tab, and then click Print.

  • 3 answers

Lakshmi P 1 year, 9 months ago

Styles: A style is a set of formats that you can apply to selected pages,text , frames or other elements in a document to quickly change their appearance Styles help to improve consistency in a document Templates: A template is a model you can use to create other documents Template help to keep formatting consistent across multiple documents

Preetham S Reddy 2 years, 3 months ago

difference between styles and templetes

Yogita Ingle 3 years, 6 months ago

Styles keep your formatting consistent within a document. Themes keep your look and feel consistent across multiple documents. Templates allow you to re-use text, and keep your look and feel consistent across multiple documents.

myCBSEguide App

myCBSEguide

Trusted by 1 Crore+ Students

Test Generator

Test Generator

Create papers online. It's FREE.

CUET Mock Tests

CUET Mock Tests

75,000+ questions to practice only on myCBSEguide app

Download myCBSEguide App