InterviewSolution
Saved Bookmarks
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 5251. |
list any five offline blog editor |
| Answer» . Wireless Local Area Network (WLAN)Functioning like a LAN, WLANs make use of wireless network technology, such as Wi-Fi. Typically seen in the same types of applications as LANs, these types of networks don’t require that devices rely on physical cables to connect to the network. | |
| 5252. |
The _________ tag is used to represent a list in which ordering is not specific. |
|
Answer» Unordered list Unordered list (UL) |
|
| 5253. |
Define hackers ? |
| Answer» Hackers are often experts in computer programming who are interested in gaining knowledge about computer system. Hackers also do to steal the password of other or to crack any security or files. | |
| 5254. |
Step of insert a movie clip |
| Answer» | |
| 5255. |
What is internet?explain briefly its characteristics |
| Answer» Internet is an example of a wide area network which connects all the computers of the world | |
| 5256. |
Write an html document to display a table |
| Answer» | |
| 5257. |
What are meta tags? |
| Answer» The tags which describes the information about another data.? | |
| 5258. |
What does meta language mean? |
| Answer» | |
| 5259. |
Brain of computer ? |
|
Answer» CPU CPU |
|
| 5260. |
Kindly provide me important question of board exam 2019 |
| Answer» | |
| 5261. |
Write two links |
| Answer» | |
| 5262. |
What is a machine? |
|
Answer» A machine is a electronic device which work in very easy and short time work Thank? A machine is an electronic device..... |
|
| 5263. |
Discuss the purpose of it |
| Answer» | |
| 5264. |
Name any one field property |
| Answer» Field size | |
| 5265. |
What i s the meaning of a well formed document |
| Answer» The document which is arranged in proper manner | |
| 5266. |
How would you indent a single word and put a square bullet in front of it . |
| Answer» | |
| 5267. |
Expand the domain extensions .mil.org.com.in |
| Answer» .mil - military site.org - organization.com - commercial site .in - Indian site | |
| 5268. |
Who is from haryana say hai otherwise bii |
| Answer» | |
| 5269. |
When you freeze a row what remains constant |
| Answer» | |
| 5270. |
What are the different types of webpages? Explain |
| Answer» Webpages differ from each other in two ways..... i) content wise ii) structure wise..........CONTENT WISE components of a webpage are hypertext and hyperlinks........STRUCTURE WISE components of webpage are page title, header, body of web page, navigational links nd footer | |
| 5271. |
What are the main differences between a computer worm and a trojan horse? |
||
| Answer» | WORMS | TROJAN HORSE | \tA Worm is a form of malware that replicates itself and can spread to different computers via Network.Trojan Horse is a form of malware that capture some important information about a computer system or a computer network.The main objective of worms to eat the system resources.The main objective of the trojan horse is to control the activity of the system.Worms can be detected and removed by the Antivirus and firewall.Trojan horses are detected by the antivirus software.It doesn’t need a host to replicate from one computer to another.It require host is needed for spreading.It can give unauthorized access and control of the system to the hackers.It also give unauthorized access and control of the system to the hackers.It is less harmful as compared.It is more harmful as compared.Morris Worm, Storm Worm and SQL Slammer are some of the examples of worms.Back orifice, Rootkit and Beast Trojan are some of the common Trojan horses.Worms are executed via weaknesses in system.Trojan horse executes through a program and interprets as utility software.\t|
|---|---|---|---|
| 5272. |
what are the.main dofferences between a computer worm and a trojan horse? |
|
Answer» Trojan horse or simply trojans are unauthorized program placed inside a legitimate application. An attacker uses a trojan illegitimately get access to a computer and view secret information,such as password and harm the computer.trojan are downloaded by some other program or application. On the other hand worm is a malcious program that harms the computer and destroys data stored in it. A computer worm is self replicating program that uses the network to send its copy from one computer to another.. Troian horse _ A trojan horse is a type of virus attached itself to the programs while Worm_ A worm virus affect computer by slowing down the operation speed of the computet |
|
| 5273. |
Name some e-commerce security provision. |
| Answer» 1987 | |
| 5274. |
How can you create Definition lists in HTML? Explain with the help of an example. |
|
Answer» Oh no ! I posted the html coding but the app is showing the output ...........
|
|
| 5275. |
CBSE board me computer ka exam hoga kya |
|
Answer» Yes ! Computer ka board ka exam hota hai No...computer ke marks school se bheje jate hai |
|
| 5276. |
Kya computer ka exam board me hoga? |
|
Answer» Yes Mera to hoga teacher ne kaha hai Next betch of 10th will have to give computer board exams but not we !!........I checked it on google Yup |
|
| 5277. |
How to creat quires using design view |
| Answer» Open database where u want to create query....... Click CREATE on menu bar........ Click on QUERY DESIGN....... SHOW TABLE dialouge box appears......... Click ADD button....... Click close button........ This will remove show table dialouge box nd make window free to create query | |
| 5278. |
how are you frnds?... |
| Answer» Fine | |
| 5279. |
What are the important question in database |
| Answer» | |
| 5280. |
What is a computer system |
| Answer» A computer system is an electronic device which receives input from the user, processes it and gives output through any type of output. | |
| 5281. |
Default tab stop position is ________ |
| Answer» Hey mate here is your answer.....Default tab position is 0.5 | |
| 5282. |
How to identify root element in a XML code |
| Answer» | |
| 5283. |
Create a database that provides information about some employees and their working hours |
| Answer» | |
| 5284. |
Practical experiment |
| Answer» | |
| 5285. |
Name the service used for downloading files from the web |
| Answer» Web browser | |
| 5286. |
Notes of fit |
| Answer» | |
| 5287. |
What is internet and the use of internet |
|
Answer» Internet is a network of networks which connects millions of computers together across the whole world. Internet is computer based world wide communiction network Internet is world wide network of computer networks that is not a single network but a network of networks The uses of internet for teaching and sharing the knowledge with others. internet is a very important tool for the educator. internet provide us online calls, online shopping and also to promote the business online. it is also helpful in increasing the speed of daily tasks, we use internet. Internet is also used for research and development. it provide free communication. also provided business services Internet is a huge collection of linked network that are present in world wide and the faciliates of data communictaion service |
|
| 5288. |
Which book is prescribed by cbse for computer science class 10 |
| Answer» All in one of IT of arihant | |
| 5289. |
Networking |
| Answer» | |
| 5290. |
Can we join rv college without base integration |
| Answer» | |
| 5291. |
Which all colleges are u all joiningI want someone who can guide me to join which one |
| Answer» | |
| 5292. |
Whera does parameter entities appear |
| Answer» In dtd | |
| 5293. |
XML chapter ke notes . |
| Answer» | |
| 5294. |
What is the use of hexadecimal RGB value |
| Answer» | |
| 5295. |
What is the full name(form) of XBM, GIF & JPEG |
|
Answer» XBM - X BitMap GIF - Graphic Interchange FormatJPEG - Joint Photographic Experts Group |
|
| 5296. |
What do you mean by nesting of list? |
| Answer» Nesting of list means combining ordered and unordered list in a program. | |
| 5297. |
Page no. 124 24. State true or false. Ans please |
| Answer» | |
| 5298. |
What is a chart? How will you insert a chart in a presentation |
| Answer» Chat is online textual conversation wherein the message typed by the sender is insyantly made available to the recipient and vice versa. | |
| 5299. |
List any five application based instant messaging software |
| Answer» \tadium.\tspark.\tjabber.\tyahoo!\xa0messenger.\tgoogle+hangouts. | |
| 5300. |
Who was discover www? |
|
Answer» Tin berners lee Timothy berners lee Tim Berners-Lee |
|