No products in the cart.

Ask questions which are clear, concise and easy to understand.

Ask Question
  • 1 answers

Gaurav Seth 5 years, 2 months ago

Unemployment is a major problem in India and it is prevalent in both rural and urban areas. Underemployment is also visible as disguised unemployment in agricultural sector in rural areas and as unorganised service sector in urban areas. These issues need to be addressed properly. .
The steps that should he taken to increase employment can he
(i) Education and health sector can create massive employment in urban as well as rural areas. Proper planning needs to strengthen these sectors.
Vocational training also creates massive employment.
(ii) Allied activities like horticulture, pisciculture should be promoted through financial assistance, awareness programmes which will create employment in rural areas.
(iii) Promotion of small scale industries and self-help groups will create employment in urban areas.
(iv) Tertiary activities like inclusive banking, promotion of market etc can penetrate service sector to rural areas and induce mobilisation and growth in Primary sector and ultimately create employment.
(v) Cheap credit for creation of new enterprises and encouraging foreign investment can also create employment in both rural and urban areas.
(vi) Social safety programmes like NREGA, NRLM (National Rural Livelihood Mission) etc generate massive employment in rural and urban areas respectively.

  • 1 answers

Gaurav Seth 5 years, 2 months ago

The entrepreneurship is a practice which involves launching or starting a new business either on small scale or level or large scale with an hope to make monetary gains or profit.

The myths about entrepreneurship will include:

1. The money will be lost or waste while establishing a new business.

2. The entrepreneurship requires huge initial investment but generally if a business is run on small scale investment it may earn profit.

  • 1 answers

Jitendra Gehlot 5 years, 2 months ago

अव्ययीभाव समास
  • 3 answers

Maniya Jain 5 years, 2 months ago

Alluvial soil is the main and important soil that spreads across the river plains. They are formed by deposition of materials or sediments (alluvium) brought in down by rivers that consist of silt, sand, clay, etc. ... Alluvial soil which is found in the deltas of river is called deltaic alluvium (coastal alluvium).

Pranjal Jangid 5 years, 2 months ago

Alluvial soil is the main and important soil that spreads across the river plains. They are formed by deposition of materials or sediments (alluvium) brought in down by rivers that consist of silt, sand, clay, etc. ... Alluvial soil which is found in the deltas of river is called deltaic alluvium (coastal alluvium).

Yogita Ingle 5 years, 2 months ago

 Alluvial soil is the main and important soil that spreads across the river plains.

  •  Alluvial soil is very fertile.
  • It is most suitable for agriculture.
  • It is also known as riverine soil.
  •  Alluvial soils are transported soils.
  •  They are formed by deposition of materials or sediments (alluvium) brought in down by rivers that consist of silt, sand, clay, etc.
  • They have been deposited by the Indo-Gangetic-Brahmaputra rivers (the Indus, the Ganga and the Brahmaputra rivers) which are the three important rivers of Himalaya.
  • Some of them have been formed by the sea waves or due to wave action in the coastal areas or regions.
  •  They are the largest soil group of India that cover about 15 lakh square kilometres (about 40% of the total land of the country).
  • Rice, wheat, cotton, maize, sugarcane, jute, tobacco, oil seeds, millets, pulses, vegetables and fruits, etc. are the crops that grown in it.
  • It is found in the plains of northern India (Punjab, Haryana, Uttar Pradesh, Bihar, West Bengal, Assam and Orissa), the delta reigons of southern India, the river basin and the deltas of rivers (the Mahanadi, the Godavari, the Krishna and the Cauvery).
  • 1 answers

Gaurav Seth 5 years, 2 months ago

Difference between repeater and router​:

Router has the ability to work like a repeater.

It is used to connect to the world of internet

Router connects two different network

This is the decision maker where it decide who and when should receive the packet

 

A repeater is a module which re-transmit signal from the router

Repeater cannot connect to internet directly. It depends on the router to connect.

Router combines / connects two different segments of same network

It will help router by repeat what the router instructs.

  • 1 answers

Gaurav Seth 5 years, 1 month ago

Given, 
Power of lens, P = - 2 D

Therefore,

Focal length,  
f = 1 / P

= 1 / 2 m = - 0.5 
The negative sign of focal length indicates that the lens is concave.

 

Given f = - 20 cm, (sign convention) , v = - 10 cm

(∴ image formed by concave lens is virtual)

By using lens formula, 

or u = - 20 

Thus the object is placed at 20 cm from the concave lens  

  • 4 answers

A N Rahul 5 years, 2 months ago

Sorry for the paragraph. These are the most reported online threats :- Malware Any kind of software designed to annoy or harm the users is considered malware. The name is short for malicious software. Hacker Skilled programmers using their coding knowledge for bad deeds are better known as hackers. By using scripts or malware they access data of users for fun, financial gain or some other harm. With the help of malicious applications, they develop themselves, hackers may come to one’s personal information or some other details that can harm. Computer Virus Just like biological ones, PC viruses also enter one’s system unnoticed with a goal to take control over it. Computer viruses can be complex malicious programs or just pieces of code designed to make a mess. The greatest threat of virus is its capability to copy itself and to spread to other computers. Besides that, virus always attacks vulnerable parts of one’s PC until it takes over the whole system. Computer Worm One of the nastiest malware one can get to his/her PC is a computer worm. This malicious application self-replicates all until one’s computer is impossible to use. Trojan Just like the epic Trojan horse, its malware namesake was designed to fool its victims. You can get a Trojan almost anywhere, from your downloads and emails to all kinds of different content. Trojan is designed that way to make you think it is helping you with some task but instead is causing harm or stealing data from your PC. Ransomware Ransomware is a literal kidnap of your PC remotely. Hackers use codes to lock your computer. If you want to unlock it ransom has to be paid. Getting to this kind of situation is tricky and by all means unpleasant. Spyware Any type of malware that collects personal information, browsing history, and one’s surfing habits is considered a spyware. Its name comes from a great ability to hide. First of all, collected information is shared with the third parties and then it gets abused. Adware Most of the adware are safe and consist of annoying pop-ups showing on your computer and browser. Adware is a type of free software supported by advertisement. The danger of adware reflects in the possibility of one being tracked through websites he/she visits. In the worst case, his/her personal information could be gathered through adware. Browser Hijack Browser hijack is a malware program that makes your PC develop a mind of its own by taking you to websites you have no intention to go to. In the same time, this malware alters your browser setting in order to lower your security level. Keylogger One of the most malicious software nowadays is the keylogger. An app capable of recording every letter one types while online. Every record is then being sent to keylogger’s creator which can analyze and use this data to retrieve one’s credentials, bank account numbers, credit card numbers, emails, etc. all in order to steal his/her identity. Rootkit One’s PC can be used remotely by hackers if it’s infected by the rootkit. The application may come from different sources. It allows a full access to one’s data, information, etc. The attack comes from the distance, with PC’s owner totally unaware of that. Scam Thanks to phishing and social engineering cyber-criminals successfully scam people in order to gain money. Every suspicious offer that includes financial gain for the user can be a scam. By offering free stuff, credit cards or lottery criminals get the financial information of their victims. With personal information and bank records, even beginner hackers can steal from common users

A N Rahul 5 years, 2 months ago

These are the most reported online threats Malware Any kind of software designed to annoy or harm the users is considered malware. The name is short for malicious software. Once active, malware is using one’s computer without him/her knowing. Trojan horses, spyware, adware, ransomware, phishing, viruses, worms, rootkits, and browser hijackers are all types of malware. Malware is usually picked up from the internet or through one’s email. Anything that one downloads from the internet can have hidden malware inside. Another source of malware can be hacked website commonly visited by the users. If a PC is underperforming, often crashes or shows a bunch of pop-ups it’s probably infected. By not opening suspicious emails from unidentified sources the user can decrease the chances of being infected. The best solution for both removal and prevention is a verified antivirus software. ShieldApps’s Shield Antivirus has proven to protect from and remove any up-to-date malware. With 24/7 protection one doesn’t have to worry about being infected any more.   Hacker Skilled programmers using their coding knowledge for bad deeds are better known as hackers. By using scripts or malware they access data of users for fun, financial gain or some other harm. With the help of malicious applications, they develop themselves, hackers may come to one’s personal information or some other details that can harm. The signs of one being hacked are if that person suddenly starts sending phishing emails, loses some data, gets his/her PC locked, gives away personal information… Hacking became almost normal nowadays since anyone with enough patience can learn it. Scripts and guides are all available online. While some just copy them, advanced hackers develop new methods to break into computers. By not opening suspicious attachments, downloading files from unfamiliar websites and keeping personal information offline, one can stay safe from being hacked. In order to be 100 percent sure you are protected it’s always good to have a verified antivirus software. Shield Antivirus is an application providing the highest degree of protection from any malicious software. The detection rate and percentage of success are what makes Shield Antivirus top-notch antivirus solution. Staying safe from hackers have never been so easy!   Computer Virus Just like biological ones, PC viruses also enter one’s system unnoticed with a goal to take control over it. Computer viruses can be complex malicious programs or just pieces of code designed to make a mess. The greatest threat of virus is its capability to copy itself and to spread to other computers. Besides that, virus always attacks vulnerable parts of one’s PC until it takes over the whole system. Viruses get to one’s PC through emails or downloads, but what makes them different is that they are well-hidden in some commonly used application. Once engaged virus starts spreading and multiplying itself. When more than one file is corrupted virus can make changes on one’s PC without being noticed. The best indicator for having a virus is bad or non-existing internet connection, and sometimes firewall and antivirus disabled. One and only option one has when infected with the computer virus is to find it and delete it with licensed antivirus software. Shield Antivirus passed every test with all up-to-date viruses in both terms of discovering them and deleting them for good. Algorithms which provide deep-scan are capable of stopping the virus almost instantly. The real-time alert will pop so the user can pick next step.   Computer Worm One of the nastiest malware one can get to his/her PC is a computer worm. This malicious application self-replicates all until one’s computer is impossible to use. Computer worms are well-known for their enormous system memory usage. They can also spread through a network, causing bad network bandwidth. This goes on all until PC is no longer usable. The main source of computer worms is in file sharing. Any kind of data transmission can be a good way in for a worm. Transfer websites, attachments, file-sharing systems, emails, removable drives can all host a worm infection. By being cautious when using services mention above you have a good chance of staying away from computer worms. But, having an up-to-date software and armed firewall is better. One of the best solutions to your worm situation is Shield Antivirus. Capable of detection and removal of worms no matter where they are hiding Shield Antivirus will keep you safe, while your PC will be up and running.   Trojan Just like the epic Trojan horse, its malware namesake was designed to fool its victims. You can get a Trojan almost anywhere, from your downloads and emails to all kinds of different content. Trojan is designed that way to make you think it is helping you with some task but instead is causing harm or stealing data from your PC. You’ll notice you have a Trojan if your computer underperforms while working on some regular actions. This happens because of Trojan’s CPU over-usage. Anyone can pick up this malware from various websites, downloads, malicious email attachments, even movies, and music. Deleting a Trojan might cause you trouble. Malicious data could be well hidden in any application/file that is affiliated with Trojan. The best way to get rid of it is by using licensed antivirus solution capable of wiping every bit of Trojan from the PC. A good prevention is also important. Stay away from suspicious emails or files with weird extensions. In order to stay on top of every potential threat, one should have Shield Antivirus which will provide information about any Trojan detected, solution to a problem, and of course – its removal.   Ransomware Ransomware is a literal kidnap of your PC remotely. Hackers use codes to lock your computer. If you want to unlock it ransom has to be paid. Getting to this kind of situation is tricky and by all means unpleasant. If you are infected, you’ll know it for sure. You won’t be able to access your PC and you’ll receive instructions how to pay the ransom. Since it’s been created by skilled coders, ransomware can lock your PC for good. The worse thing is that it can come from websites, emails, and networks as well. Keeping everything up-to-date on your PC from the operative system to your protection software is one of the ways to protect yourself. Firewall you are using should always be up, especially when it comes to websites you are not familiar with. By using Shield Antivirus you can be sure any ransomware won’t get, though. The ones potentially hiding will be wiped clean from your PC before they can cause any damage.   Spyware Any type of malware that collects personal information, browsing history, and one’s surfing habits is considered a spyware. Its name comes from a great ability to hide. First of all, collected information is shared with the third parties and then it gets abused. The most common way of picking up a spyware is by downloading files or software from unsafe websites. Spyware is bundled with files and unnoticeable upon download. Another way of being infected is by clicking on suspicious email attachments. The infection indicators are constant error messages, random appearance of icons on the desktop and automatic opening of tabs while browsing. If one wants to prevent being infected it should pay close attention when downloading from file-sharing websites, opening random emails, and of course, keep his/her antivirus up-to-date. Shield Antivirus owns antispyware protection and at the same time is cleaning-efficient. The software keeps you safe and helps you resolve your spyware issues in seconds.   Adware Most of the adware are safe and consist of annoying pop-ups showing on your computer and browser. Adware is a type of free software supported by advertisement. The danger of adware reflects in the possibility of one being tracked through websites he/she visits. In the worst case, his/her personal information could be gathered through adware. Adware is distributed through free software one downloads from the internet. Usual actions performed by adware are advertisement showing on either desktop or browser, changed home page on one’s browser and ads popping up in applications that haven’t had them before. A precaution that one can take in order to keep him/her safe from adware is simply having antivirus and other applications up-to-date and by using the firewall when surfing. If adware is already present in the system the best way of cleaning it is by using Shield Antivirus. Before you delete it, make sure you’ve backed up all the important data from your PC. Shield Antivirus will then scan the PC and liberate it from ads for good.   Browser Hijack Browser hijack is a malware program that makes your PC develop a mind of its own by taking you to websites you have no intention to go to. In the same time, this malware alters your browser setting in order to lower your security level. You’ll know your browser is hijacked simply by not being able to access your home page or a website of your choosing. Instead, you’ll visit some page placed there by the others. This malware usually comes from plugins one installs to the browser. Some browser hijacks can actually improve one’s experience online, but in most cases, it’s just boring. Browser hijacks are easily avoidable. Not using third party applications is the best way to do it. With antivirus that can recognize it, you’ll stay safe as well. Shield Antivirus is a software able to both detect and remove browser hijack. You’ll be able to relax and enjoy your online experience without any concern for your browser being misused. Possible intrusions will be reported and stopped before any harm is done.   Keylogger One of the most malicious software nowadays is the keylogger. An app capable of recording every letter one types while online. Every record is then being sent to keylogger’s creator which can analyze and use this data to retrieve one’s credentials, bank account numbers, credit card numbers, emails, etc. all in order to steal his/her identity. Since this malware is well hidden, it’s almost impossible to know you have one. The only signs one can notice are slower mouse pointer or automatized letters/symbols showing on the screen, different from the ones typed. The source of keylogger can be in file sharing websites or email attachment. To be installed, keylogger usually needs some personal information. That’s why the victims are first exploited by phishing or social engineering. This malware is being installed without user’s knowledge so it stays undetected for quite some time. The way to stay protected is simple. Pay attention to what and where you are downloading. To stay hidden, one can also use the virtual keyboard or alternate keyboard which can be confusing to a keylogger. Also, password management applications may help since they’ll do all the job for the user. No keys pressed, no keys logged. The only verified method of maintaining one’s security is, of course, trusted antivirus. Shield Antivirus has proven itself by tracking and removing keylogger malware, while at the same time providing real-time alerts to this type of danger.   Rootkit One’s PC can be used remotely by hackers if it’s infected by the rootkit. The application may come from different sources. It allows a full access to one’s data, information, etc. The attack comes from the distance, with PC’s owner totally unaware of that. Getting to know you are being used by a rootkit takes a lot of effort. By close monitoring of every invoked process on the PC, one can find out if he/she is being used. This takes a lot of time and an advanced tech-knowledge. Worse of all is that rootkit can be picked almost anywhere. Commercial apps or products that seem harmless are usually the greatest carriers of rootkit malware. The only good thing is that rootkit can’t replicate or spread by itself. The only way to approach rootkit problem is by scanning the PC with up-to-date antivirus software. Any rootkit can be tracked and removed by Shield Antivirus. By keeping the program on, alongside with the firewall, one can be safe from any intrusion.   Scam Thanks to phishing and social engineering cyber-criminals successfully scam people in order to gain money. Every suspicious offer that includes financial gain for the user can be a scam. By offering free stuff, credit cards or lottery criminals get the financial information of their victims. With personal information and bank records, even beginner hackers can steal from common users. Scams use either flattering words or malware. One can become a victim all over the internet. Some scammers will just start communicating with you, while other will try to get to you through malicious software. Both ways have the same intention and can be seen in emails, websites, pop-ups, ads, etc. The best way of protection is common sense. By using only trusted retail stores, not sharing your personal information with everyone, staying cautious online are all very good ways of staying safe. If by any chance a scam includes malware or any kind, then the antivirus is your best friend. Shield Antivirus has proved itself both in a lab and in the real-life situation. Thousands of satisfied clients confirm its performance and usability. By alarming you, scanning through your data and removing any potential threat Shield Antivirus keeps you away from any software-based scams.   Social Engineering Since humans have their own errors, most of the time they are the main culprit of being hacked, used or scammed. Hackers know this and by using this human flaws they get to either one’s personal information or way inside his/her computer. By social engineering, a criminal can get to what he/she wants from the victims. Any communication which occurs with no reason and coming from an unknown source can be considered social engineering. A hacker will send emails containing links, offers, warnings and similar, just to make the victim interact. When this happens, the extraction of personal information can start.  By using modern technologies and malicious software one can get more than enough within few emails. Usually this leads to identity theft or credit card number theft. Since social engineering is not a program it can’t be deleted from PC. The best way to stay safe is by thinking twice when dealing with unverified emails, websites, and services. By not interacting with fishy content one can stay safe 100%. Just in case, it’s always good having an approved antivirus that can protect you from malware you might get thanks to social engineering. One software that has proven both in detecting and removal of malware is ShieldApps’s Shield Antivirus. With its smart detecting system, real-time alerts and high deletion rate Shield Antivirus is one of a kind software.   Spam No-one likes to be bored to death with an advertisement. Spam’s main goal is exactly that! Advertising product/service you don’t want to know about through your email. Just like junk mail and pop-ups spam is usually not dangerous, but it’s tiring. Every unsolicited email you get from companies, family and friends usually are spam. If it’s received on a regular basis, sometimes in tons, you can be sure you are infected. Even though it usually targets email accounts, recently it’s quite often on social media as well. Users are the best spam protection, but this takes a lot of effort. A careful reading of every page, every installation or download can help from receiving spam mail, but most of us never do that. Unsubscribing from these “services” is also a way, but again it takes a lot of precious time. The best protection is having a spam filter or antispam solution in a shape of antivirus. Shield Antivirus is capable of stopping any spam content and as well informing you when you are about to “subscribe” to one. Leave it all behind with simple utilization of Shield Antivirus.   Phishing Phishing is a method used by cyber-criminals who want to come to one’s personal information. By sending fake emails or contacting people directly through scam websites crooks gain personal data. Login credentials, social security number, credit card number, bank account information are just some information interesting to the hackers. By presenting themselves as some trustworthy company/organization, who’s services are being used by one, criminals ask for personal information. This action is usually covered with an excuse; an update of services, account error or similar. By filling in his/her information scammed person is giving away personal information which can lead to identity theft. Since there are people standing behind phishing, it’s impossible to remove them. But, with enough attention and a good antivirus software phishing is avoidable. Make sure not to answer unsolicited emails, never open links, and pay close attention to domains of well-known websites. Shield Antivirus can’t stop you from answering fishy emails, but it will prevent malicious attachments from causing trouble.

Akhil Ahamed 5 years, 2 months ago

There are many online threats some of these are as follows: 1)Trojan horse 2)Virus 3)Worms 4)spwares etc

Yogita Ingle 5 years, 2 months ago

There are a lot of threats when it comes to online threats.

Some of the threats that one can witness online have been discussed briefly as follows

1. The main threat can be of online frauds. The era of online payment gateways has arrived and due to this a lot of payment frauds have also entered the scene.

2. Data security is another inline threat under which your personal data is under the threat of usage by third parties.

3. Many viruses and bugs have popped up with the rise in technology which again pose as a big problem when it comes to online threats.

  • 3 answers

Rani Kumari 5 years, 2 months ago

In simple words the removal of top layer of soil is known as soil erosion.

Maniya Jain 5 years, 2 months ago

Soil erosion is the natural process in which the topsoil of a field is carried away by physical sources such as wind and water. Higher intensity of rainstorm is the main cause of soil erosion. Four types of soil erosion are caused by rainfall: Rill erosionGully erosionSheet erosionSplash erosion

Yogita Ingle 5 years, 2 months ago

Soil erosion is the natural process in which the topsoil of a field is carried away by physical sources such as wind and water.

Higher intensity of rainstorm is the main cause of soil erosion. Four types of soil erosion are caused by rainfall:

  • Rill erosion
  • Gully erosion
  • Sheet erosion
  • Splash erosion
  • 1 answers

Yogita Ingle 5 years, 2 months ago

Delay in delivery

  • Long duration and lack of proper inventory management result in delays in shipment. Though the duration of selecting, buying and paying for an online product may not take more than 15 minutes; the delivery of the product to customer’ s doorstep takes about 1-3 weeks.

Lack of significant discounts in online shops

  • Physical stores claim to give significant discounts when compared to online stores, this is a huge disadvantage for the older generation.

Missing the shopping experience

  • The traditional shopping exercise provides a lot of fun in the form of showroom atmosphere e, smart sales attendants, scent and sounds that cannot be experienced through a website. Indians generally enjoy shopping. Consumers look forward to it as an opportunity to go out and shop.

Frauds in online shopping

  • Sometimes, there is a disappearance of the shopping site itself. In addition to the above, the online payments are not much secured. The rate of cyber crimes has been increasing and customers’ credit card details and bank details have been misused which raise privacy issues.

  • 1 answers

Gaurav Seth 5 years, 2 months ago

A n s w e r

Sticky Key is useful for people with problems with hand movements.

Explanation:

Sticky keys helps a person with physical disabilities but it is also used by others as a means to reduce strain.

  • 3 answers

Srikarthik Josyula 5 years, 2 months ago

https://classnotes.org.in/class-10/magnetic-effects-of-electric-current/electric-motor/#:~:text=into%20mechanical%20energy.-,Principle%20of%20Electric%20Motor,magnetic%20field%20experiences%20a%20force.

Parul . 5 years, 2 months ago

Electric Motor : The device used to convert electrical energy to mechanical energy is called Electric Motor. It is used in fans, machines, etc. Principle : NCERT Solutions for Class 10 Science Chapter 13 Magnetic Effects of Electric CurrentElectric motor works on the principle of force experienced by a current carrying conductor in a magnetic field. The two forces in the opposite sides are equal and opposite. Since they act in different lines they bring rotational motion. Working of an electric motor : When current starts to flow, the coil ABCD is in horizontal position. The direction of current through armature coil has the direction from A to B in the arm AB and from C to D in the arm CD. The direction of force exerted on the coil can be found through Fleming’s left hand law. According to this law, it is found that the force exerted on the part AB, pushes the coil downwards. While the force exerted on the part CD pushes it upwards. In this way, these two forces being equal and opposite form a couple that rotates the coil in anticlockwise direction.

Gaurav Seth 5 years, 2 months ago

A simple Electric Motor :

An electric motor converts electrical energy into mechanical energy.

Principle: It works on the principle of the magnetic effect of the current. when a current-carrying conductor is placed in the magnetic field, it experiences a force and starts moving.

Working : 

An electric motor, as shown is, consists of a rectangular coil ABCD of insulated copper wire. The coil is placed between the two poles of a magnetic field such that the arm AB and CD are perpendicular to the direction of the magnetic field. The ends of the coil are connected to the two halves P and Q of a split ring. The inner sides of these halves are insulated and attached to an axle. The external conducting edges of P and Q touch two conducting stationary brushes X and Y, respectively.

Current in the coil ABCD enters from the source battery through conducting brush X and flows back to the battery through brush Y. Notice that the current in arm AB of the coil flows from A to B. In arm CD it flows from C to D, that is, opposite to the direction of current through arm AB. On applying Fleming’s left-hand rule for the direction of the force on a current-carrying conductor in a magnetic field (see Fig. 13.13). We find that the force acting on arm AB pushes it downwards while the force acting on arm CD pushes it upwards. Thus the coil and the axle O mounted free to turn about an axis, rotate anti-clockwise. At half rotation, Q makes contact with the brush X and P with brush Y. Therefore the current in the coil gets reversed and flows along the path DCBA. A device that reverses the direction of flow of current through a circuit is called a commutator. In electric motors, the split ring acts as a commutator. The reversal of current also reverses the direction of force acting on the two arms AB and CD. Thus the arm AB of the coil that was earlier pushed down is now pushed up and the arm CD previously pushed up is now pushed down. Therefore the coil and the axle rotate half a turn more in the same direction. The reversing of the current is repeated at each half rotation, giving rise to a continuous rotation of the coil and to the axle.

The split ring helps in reversing the direction of current in the armature so that it rotates continuously in one direction.

  • 3 answers
Moral/Theme of the story 'His first flight' : 'His first flight' story excellently explains the importance of things like independence, self courage and confidence. Also, it shows the need for motivation to reach our goals. Necessity is the mother of invention, but it sometimes needs an initial spark from outside.

Govind Mandal 5 years, 2 months ago

Yes ,a tiger must be allowed to live in it's natural habitat. Because there it can survive well instead of other habitat.Every organisms have to live in it's own environment because it can do their life process well there. It can get all things from it's Environment required for it's survival.

Gaurav Seth 5 years, 2 months ago

'His First Flight' is a parable. The seagulls convey the message of self-confidence, motivation and self-reliance. The mother seagull motivates the young one enough to get him to learn flying. The baby seagull realises the importance of belief and faith. He flaps his wings to learn flying and gain the confidence to be independent. The story conveys 'Give a man a fish and you feed him for a day; teach a man to fish and you feed him for a lifetime'. The parable also stresses the importance of family ties and filial support.

  • 3 answers

Abdul Qhadir Azhari Azhari 5 years, 2 months ago

Tigers are the most iconic of the big cats. With their gorgeous black-and-orange coats and long, white whiskers, they invoke in many a feeling of wonder and admiration. But though they are adored, they’re also vulnerable to extinction. Around 3,890 wild tigers roam forests and savannas today. Tigers are poached for their parts and lose habitat to human activity every day. WWF’s is committed to Tx2—the global goal of doubling the number of wild tigers by 2022. By working with tiger range countries, we are pushing forward on zero poaching across Asia even as we secure vital tiger landscapes and curb the demand for illegal tiger parts and products.
Yes, God has made all living beings equally and thus, the animals too have the right to freedom.

Gaurav Seth 5 years, 2 months ago

Freedom is the natural instinct of every living being. Everyone loves freedom and does not want to live in confinement. Similarly, the tiger also longed for freedom. He was so fed up being caged that he even ignored the visitors. He took to and fro steps in the cage as if trying to while away the time. The tiger wanted to escape this captivity.
God has made all living beings equally and thus, the animals too have the right to freedom. They should not be caged. It is their right to enjoy their natural habitat i.e. the forest and run freely in the wild. We should, thus, respect their freedom and should not put them in the zoo.

  • 1 answers

Siddharth Chouhan 5 years, 2 months ago

What is the formula of class mark
  • 3 answers

Maniya Jain 5 years, 2 months ago

The total amount of urine produced in humans is regulated by the presence of : The total amount of water. The total amount of dissolved nitrogenous wastes present in the urine. Certain hormones that help in controlling the movement of water and sodium ions into and out of the nephrons.

Tejasvini S 5 years, 2 months ago

The total amount of urine produced in humans is regulated by the presence of : The total amount of water. The total amount of dissolved nitrogenous wastes present in the urine. Certain hormones that help in controlling the movement of water and sodium ions into and out of the nephrons.

Gaurav Seth 5 years, 2 months ago

The amount of urine is regulated by reabsorption of water through blood capillaries. The reabsorption takes place through tubules of nephrons which is a functional unit of kidney. Amount of urine depends on concentration of water converted into urine and amount of water into body thus maintains the neutral concentration of cell volume all over body.

  • 1 answers

Gaurav Seth 5 years, 2 months ago

Democracies often frustrate the needs of the people because of the following reasons:

  1. It leads to delay in decision making process. For example, in reduction of age from 18 to 16 for juveniles. The government before amending the law needs to look after its pros and cons from each angle, because it might affect a larger section of people. Also, it might prove to jeopardize the fate of innocents wrongly convicted or even undertrials.
  2. It sometimes goes against people's opinions. For instance, in the case of Patidar community agition for reservation in Gujarat. The government needs to think before agreeing to such kind of opinions of the people, because it needs to look at the greater good, even if it means going against the people's opinion. It also needs to look after the opinion of the other people of the nation before making taking such steps.
  3. For demcoratic forms of government, poverty eradication is a long term process, there are not quick fixes in democracy. For example, we can cite the case of the state of Bihar. The JD(U) government led by Nitish Kumar has been in power in Bihar for two consecutive terms and has initiated some profound poverty eradication state projects. However, there is such drastic lack of basic infrastructure in Bihar that it is going to take a long time for the benevolent effects of these programmes to percolate to the grassroot level.
  • 1 answers

Gaurav Seth 5 years, 2 months ago

  • Mendel conducted the experiments using <i>Pisum sativum </i>or pea plant.
  • He selected homozygous tall (TT) and dwarf (tt) pea plants.
  • He crossed the tall pea plant with the dwarf pea plant.
  • It was observed that the  F1​ generation are all tall plants.
  • Thus, it was concluded that the gene causing tallness is dominant while the gene causing dwarfness is recessive.
  • The trait expressing itself in the hybrid is the dominant one. 
  • This experiment proves Mendel’s first law of inheritance.
  • It states that when a pair of contrasting factors is brought in a hybrid, one factor inhibits the appearance of the other, one which inhibits is the dominant one and which is inhibited is recessive.
  • 2 answers

Parul Ailawadi 5 years, 2 months ago

Linear equation

Gaurav Seth 5 years, 2 months ago

The equation whose graph is a straight line is called linear equation.

Linear equations are also first-degree equations as it has the highest exponent of variables as 1.  Some of the examples of such equations are as follows:

  • 2x – 3 = 0, 
  • 2y = 8
  •  m + 1 = 0,
  •  x/2 = 3
  • 2 answers

Sahil Yadav 5 years, 2 months ago

Thanks

Gaurav Seth 5 years, 2 months ago

Download CBSE class 10th revision notes for Chapter 2 Acids Bases and Salts in PDF format for free. Download revision notes for Acids Bases and Salts class 10 Notes and score high in exams. These are the Acids Bases and Salts class 10 Notes prepared by team of expert teachers. The revision notes help you revise the whole chapter in minutes. Revising notes in exam days is on of the best tips recommended by teachers during exam days.

Click on the below link:

 

<a href="https://mycbseguide.com/blog/acids-bases-salts-class-10-notes-science/" ping="/url?sa=t&source=web&rct=j&url=https://mycbseguide.com/blog/acids-bases-salts-class-10-notes-science/&ved=2ahUKEwiE2M7JmrjsAhVOyjgGHe1dAGcQFjAAegQIBhAC" rel="noopener" target="_blank">Acids Bases and Salts class 10 Notes Science - myCBSEguide</a>

  • 3 answers

Sahil Yadav 4 years, 10 months ago

Thanks

Ekta Kri 5 years, 1 month ago

13november

Prachi Sethi 5 years, 1 month ago

2nd Sunday of November
  • 2 answers

Yashasvi Sahu 5 years, 2 months ago

????

Itachi Uchiha ? 5 years, 2 months ago

Jo bda hota h vo macro ,jo choota hota h vo micro.☺️
  • 3 answers

Itachi Uchiha ? 5 years, 2 months ago

Noun

Anirudh Dubey 5 years, 2 months ago

Sjjs

G G 5 years, 2 months ago

Noun
  • 1 answers

Nitesh Kumar 5 years, 2 months ago

Protene and protyne
  • 3 answers

Anubhav Gothwal 5 years, 2 months ago

Its bile juice not bike juice ?

Sabari Krishna 5 years, 2 months ago

Mukil its you from mai skool

Gaurav Seth 5 years, 2 months ago

Bile Juice

Bile is a digestive juice that is secreted by the liver and stored in the gallbladder. It has two important functions : assists with fat digestion and absorption in the gut and is a means for the body to excrete waste products from the blood. 

  • 2 answers

Maniya Jain 5 years, 2 months ago

The Globalisation has impacted Indian economy in the following ways (i) Increase in foreign investment, Over the past twenty years, the foreign investment has increased. (ii) Emergence of Indian companies as multinational Several of the top Indian companies like Tata Motors, Infosys, Ranbaxy have been able to get benefit from the increased competition created as a result of Globalisation. (iii) Creation of new opportunities Globalisation has created new opportunities for Indian companies, particularly providing services like IT. (iv) Creation of new jobs For those which are Globalisation has created new jobs and has helped in reducing unemployment rate to an extent. (v) A host of services such as data entry, accounting, administrative tasks, engineering are now being done cheaply in India.

Yogita Ingle 5 years, 2 months ago

The Globalisation has impacted Indian economy in the following ways
(i) Increase in foreign investment, Over the past twenty years, the foreign investment has increased.
(ii) Emergence of Indian companies as multinational Several of the top Indian companies like Tata Motors, Infosys, Ranbaxy have been able to get benefit from the increased competition created as a result of Globalisation.
(iii) Creation of new opportunities Globalisation has created new opportunities for Indian companies, particularly providing services like IT.
(iv) Creation of new jobs For those which are Globalisation has created new jobs and has helped in reducing unemployment rate to an extent.
(v) A host of services such as data entry, accounting, administrative tasks, engineering are now being done cheaply in India.

  • 1 answers

Gaurav Seth 5 years, 2 months ago

Autocratic rule of Tsars: In 1914, the Russian emperor was Tsar Nicholas II. He fought a number of wars to expand his empire in the north and west in Europe. He had borne the expenditure of war by taxing the common people of Russia.
Conditions of peasants: Majority of the Russians were agriculturalists. Major part of the land was owned by nobles and clergy and these peasants worked as farmers on daily wages. They were paid less and worked more and sometimes under debt, they were not even paid wages.
Status of industries: Industry was found in pockets. Prominent industrial areas were St. Petersburg and Moscow. Craftsmen undertook much of the production, but large factories existed alongside crafts workshops. Foreign investment in industries increased with the extension of Russia’s railway network.
Conditions of workers in the industries: Most industries were owned by private
industrialists. Though the government supervised factories’ working hours and wages of the workers, but still rules were broken. Women workers were also paid less than men. Some workers formed associations to help members in times of unemployment and financial hardships. ,
Formation of socialist parties: All political parties were illegal in Russia before 1914. The Russian Social Democratic Workers Party was founded in 1898 by socialists, who respected Marxist ideas. But because of government policies, it had to operate secretly as an illegal organisation. It set up a newspaper, mobilised workers and organised strikes.

  • 1 answers

Harshita Patidar 5 years, 2 months ago

Tatara Ek shaktishali avam Sundar yuvak tha jo pasa Gaon Mein rahata Tha .vah sadaiv dusron ki madad Karta Tha vah Ek Nek Dil Insan tha
  • 1 answers

Yogita Ingle 5 years, 2 months ago

Uses of Washing Soda

  • Washing soda is used for removing burnt-on grease from kitchen utensils.
  • It is prominently used in soap, glass and paper industries.
  • It also helps in the removal of permanent hardness of the water.
  • It acts as a raw material in the manufacturing of various sodium compounds, for example, borax.

Uses of Baking Soda

  • It is used in making soft and fluffy bread and cakes due to the production of carbon dioxide when it is heated or mixed in water.

NaHCO3 + H+   → CO+ H2O + sodium salt of acid

  • It is used for making soda-acid fire extinguisher.
  • It is used as an ingredient in the manufacturing of antacids.

myCBSEguide App

myCBSEguide

Trusted by 1 Crore+ Students

Test Generator

Test Generator

Create papers online. It's FREE.

CUET Mock Tests

CUET Mock Tests

75,000+ questions to practice only on myCBSEguide app

Download myCBSEguide App