Saved Bookmarks
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 1751. |
What is intra net |
| Answer» An intranet is the private network acessible for only staff of any organization. | |
| 1752. |
What is ddl |
| Answer» Data Definition language use to create or define database. | |
| 1753. |
What is a virus |
| Answer» It is a software used to infect a computer .it is an application that cause a great danger for your coputer | |
| 1754. |
Anyone who knows about artificial intelligence?? |
| Answer» | |
| 1755. |
What is the syllabus of foreign board of computer? |
|
Answer» Sorry I am a Bengali . So i typed in Bengali Yeah ! Me too ইন্টারনেট খুঁজে নাও ভাই। আমরা বিদেশী নই তাই জানি না। এই জন্য বলতে পারলাম না । I don\'t know because i am not a foreign |
|
| 1756. |
What is the AutoSum feature of excel used for??? |
| Answer» For adding or calculating total numerical value of selec6 cells | |
| 1757. |
Why is it necessary to categorize an appointment ? |
| Answer» | |
| 1758. |
Which type of questions come in practical of computer |
|
Answer» Html program, python, flow chart, excel. Or ability test. This question what can I help you |
|
| 1759. |
Define blog and it\'s uses |
| Answer» A blog is a website containing thoughts experience and talks a subject of their interest | |
| 1760. |
Explain ISP |
| Answer» Internet service prodiver is a company that provide services... | |
| 1761. |
Difference between the hacker and cracker |
|
Answer» Hackers are mostly the ones who break into a system to get their required data.They aren\'t always bad or have bad intentions. Many of them are white hat hackers.Crackers are the ones who penetrate into a system for bad intentions. They crack security codes for morally ill deeds. They are more dangerous than Hackers.Read more on Brainly.in - https://brainly.in/question/2643399#readmore A hacker hacks a system and steal its dataWhile, A cracker cracks a system and corrects its vulnerabilities |
|
| 1762. |
What is Hub? |
| Answer» A hub is a central device in a network that provides common connection among the computer or nodes. It is used in star topology. | |
| 1763. |
_______________is the capacity of a person to examine his/her own thoughts or feeling |
| Answer» | |
| 1764. |
What is empty tags? |
|
Answer» Empty tags are those tags , which have no corresponding OFF tag........These are only ON tag................ Empty tag refers to HTML coding where the line of code stands alone and is not closed with slash characters. An "empty tag" refers to HTML coding where the line of code stands alone and is not closed with slash characters |
|
| 1765. |
What is an attribute in html? |
| Answer» Additional information of the tags | |
| 1766. |
Scratch problm? |
| Answer» | |
| 1767. |
School website coding creates |
| Answer» Means clarify the question | |
| 1768. |
, what is computer |
|
Answer» Computer is an electronic device that can be control by human, it also understand 0,1 language arthematically. Computer is a electronic device that can perform a variety of operations according to set of instructions called programs. Computer is a machines which makes our work easy It is an electronic device... |
|
| 1769. |
Ms office |
|
Answer» Soi ni..?? Good morning.. Gud morning suhu..shreya..?? It is a collection of applications related to office purpose. Each application serves a different purpose. It consists of excel, word, powerpoint, publisher etc. Microsoft Office is a suite of desktop productivity applications which is designed specifically used for office use. It consists of Word, Excel, PowerPoint, Access, OneNote, Outlook and Publisher applications etc. Microsoft office..?? |
|
| 1770. |
Using while loop print your name ten times on the out out screen |
| Answer» | |
| 1771. |
What are objects in ms-access |
| Answer» Microsoft Access is a Database Management System offered by Microsoft. It uses the Microsoft Jet Database Engine and comes as a part of the Microsoft Office suite of application.Microsoft Access offers the functionality of a database and the programming capabilities to create easy to navigate screens (forms). | |
| 1772. |
Write above settextstyle() function |
| Answer» | |
| 1773. |
Explain the function to draw a polygon |
| Answer» | |
| 1774. |
What is the syllabus for practical of information technology |
| Answer» You can prepare python, html, excel, flow chart and ability test. | |
| 1775. |
Is the most common way of spreading virus via the internet |
| Answer» | |
| 1776. |
How to open ms exal |
| Answer» Click on windows and click on all program and click on Ms exal | |
| 1777. |
Write names of any two character entity. |
| Answer» | |
| 1778. |
Default color of link,alink,vlink? |
| Answer» | |
| 1779. |
What is the purpose of name and href attributes of tag ? |
| Answer» | |
| 1780. |
Write down the steps to create a folder in C drive with your name |
| Answer» | |
| 1781. |
Give name of to backup device? |
| Answer» Hard drives, optical disks. | |
| 1782. |
can any one send his or her preboard computer paper |
| Answer» | |
| 1783. |
Explain any two of 7cs of communication |
| Answer» 1) CLEAR INFORMATION : Use appropriate words and phrases for convey ideas in the form of messages .2) COMPLETE INFORMATION: It brings the desired result without additional messages . | |
| 1784. |
There are any sample papers recently by cbse ? |
| Answer» Educate ka | |
| 1785. |
Define alternate key ? |
| Answer» All the keys which are not primary key are called an alternate key. It is a candidate key which is currently not the primary key. However, A table may have single or multiple choices for the primary key. | |
| 1786. |
Which computer book is provided by the cbsr |
| Answer» No specific book had not been specified for IT | |
| 1787. |
Vacationing helps in _individuals |
|
Answer» Vacationing helps to reduce the stress level of a person or in otherwords it helps in de stressing individuvals Relaxing... |
|
| 1788. |
Discuss the pros and cons of verbal/oral communication |
| Answer» | |
| 1789. |
What is logical and physical text styles in html . Wikipidia for made project |
| Answer» | |
| 1790. |
sir is there is no information technology sample papers for class 10 |
| Answer» Yes.it is there | |
| 1791. |
Explain while loop |
| Answer» | |
| 1792. |
Explain internet |
| Answer» Internet is a collection of interconnected computer network . It uses the standard internet protocol suite that is the TCP/IP to serves the billions of uses world wide. | |
| 1793. |
Define spam |
| Answer» Spam is electronic junk mail or junk newsgroup postings. Some people define spam even more generally as any unsolicited email. However, if a long-lost brother finds your email address and sends you a message, this could hardly be called spam, even though it is unsolicited. Real spam is generally email advertising for some product sent to a mailing list or newsgroup. | |
| 1794. |
Define the term Trojan horse |
| Answer» | |
| 1795. |
A__________is an organised data collection |
|
Answer» Thanks Database... |
|
| 1796. |
Can you give me scratch noTes |
|
Answer» In my syllabus there is no scratch In my syllabus there is no scratch |
|
| 1797. |
What is accessibility or ease of access |
| Answer» Microsoft Windows 10 provides a variety of accessibility tools that makes it easier to see, hear, and use your computer. For instance, the Ease of Access center provides a variety of such as a magnifier as well as mouse and keyboard accessibility options. | |
| 1798. |
Coading of puthon |
| Answer» | |
| 1799. |
I want an perfect syllabus of computer class10 2020 cbse |
| Answer» In this app I can get it | |
| 1800. |
Differentiate between DDL and DML commands |
| Answer» DDL IS STRUTURING LANGUAGE.THIS CREATE,CHANGES AND RMOVE THE DATABASE FOR TABLE,INDEXES AND USERS DML DML IS USED TO CHANGE THE DATABASE RECORD WHICH IS ENTERED BY USER.THE OBJECTIVE IF THIS LANGUAGE IS PROVIDED FOR HUMAN INTERACTION WITH COMPUTER SYSTEM. | |