InterviewSolution
Saved Bookmarks
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 5501. |
with which tag can we not use background attribute while creating a table |
| Answer» | |
| 5502. |
Can anyone tell me the difference between server and webserver.... |
|
Answer» Server is a device that acts the CPU for serveral connected computers Webserver is software deleiver web content to web browser Bakwas question he yar |
|
| 5503. |
How are news group works? |
| Answer» | |
| 5504. |
Give any two examples of popular search engines |
|
Answer» Google , Yahoo, Bing, MSN , Alta vista , Lycos, Infoseek , Hotbot 2.A recent report on netmarketshare.com tells us that Yahoo have a market share of 7.68 percent. 1.Bing is the default search engine in Microsoft’s web browser |
|
| 5505. |
Xml code formate |
|
Answer» Starting with xml version, encoding and standalone, xml document must contain a root element, parent element and child element Extensible Markup Language (XML) is a markup language that defines a set of rules for encoding documents in a format that is both human-readable and machine-readable. The W3C\'s XML 1.0 Specification and several other related specifications—all of them free open standards—define XML. |
|
| 5506. |
Write the way to delete history in browser attached with google |
| Answer» Go to historyHold down your contentThen tap deleteSimple! | |
| 5507. |
Code format |
| Answer» | |
| 5508. |
How to create XML |
| Answer» | |
| 5509. |
HTML program kaise banate hain Humko sikhna hai |
|
Answer» HTML FORMAT:- |
|
| 5510. |
What are computer virus? |
|
Answer» A computer virus is a malicious program that self-replicates by copying itself to another program. In other words, the computer virus spreads by itself into other executable code or documents. The purpose of creating a computer virus is to infect vulnerable systems, gain admin control and steal user sensitive data. Hackers design computer viruses with malicious intent and prey on online users by tricking them. A program that attaches itself to other programs in order to alter their behavior, often in a harmful way Virus is a virus in which virus is virus in computer |
|
| 5511. |
What is wi-fi |
|
Answer» Wireless connectivity, often known as\xa0Wi-Fi, is the technology that allows a PC, laptop, mobile phone, or tablet device to connect at high speed to the internet without the need for a physical wired connection. A local area network that uses high-frequency radio signals and infrared waves to send and receive data over short distances |
|
| 5512. |
There are no chapter |
| Answer» What??? | |
| 5513. |
Full Forms of : SMTP , NNTP , I MAP |
|
Answer» \tSimple Mail Transfer Protocol ( |
|
| 5514. |
Web server |
|
Answer» A Web\xa0server\xa0is a program that uses\xa0HTTP\xa0(Hypertext Transfer Protocol) to serve the files that form Web pages to users, in response to their requests, which are forwarded by their computers\' HTTP clients. Dedicated computers and appliances may be referred to as Web servers as well. A computer program that serves requested HTML pages or file |
|
| 5515. |
What do you mean by p2p |
|
Answer» Stands for "Peer to Peer." In a P2P network, the "peers" are computer systems which are connected to each other via the Internet. Files can be shared directly between systems on the network without the need of a central server. In other words, each computer on a P2P network becomes a file\xa0server\xa0as well as a client. Is it POP ?? It is Post Office Protocol |
|
| 5516. |
A small network making up internet and having many computers is called a |
| Answer» A small network making up internet and having many computers is called a Subdomain | |
| 5517. |
Describe blog? |
|
Answer» A blog is an alternative word for webblogs people often write about their openion and throught about a particular topic just like they add details in diary the people who work on blog called blgggers a blog is a type of website, usually maintained by an individual, with regular entries in the form of text,graphics,audio etc.. A blog is a short of web log, it is a web page that serves as a publicly accesible personal journal for an individual. It is a frequently updated online personal diary. ? Blong is a website that allows users to share their thoughts with the world. Blog is a disscusaion of informational website published on www . |
|
| 5518. |
What is spammimg |
|
Answer» In brief:Spamming refers to the use of electronic messaging systems to send unwanted bulk messages(spam), specially advertising, indiscriminately. Spamming remains economically viable beacuse advertisers have very little or sometimes no operating costs beyond the management of their mailing lists, and it is almost impossible to hold senders accountable for their mass mailings.In short:Spam simply means that People are receiving e-mails which they haven\'t actually asked for. What is answer |
|
| 5519. |
What is hacker. |
|
Answer» Hacker are highly technical people who secretly break into computers to steal important data or sometimes to destroy it.They not only steal imp. data but also hack applications and web sites to change the program logics. Plz Not give this exp. In exam Hacker -when someone steal your computer files ,data etc is known as hacker That hacks someting for only playfull pranks means jocks not intention to harm anyone like coc game hacker? |
|
| 5520. |
Again what is the full form of XML ?? |
| Answer» eXtensible Markup Language | |
| 5521. |
Can anyone tell me the important full forms which are in comouter |
| Answer» you can learn the full form of HTTP,DHCP,FTP,PDA,IETF,IAB,SEO,HTML,PCI,SSL,SET,NSF,DBMS | |
| 5522. |
What is the full form of ICT ??? |
|
Answer» Information and Communication Technology * communication Information and computer technology Information and communication technology |
|
| 5523. |
What are attributes |
|
Answer» Konsa ques... Hi gungun plz ans. My que. Attributes ar used to give special effects to our text |
|
| 5524. |
How is cc is different from bcc in emails |
|
Answer» Bcc stands for blind carbon copy which is similar to that of Cc except that the Email address of the recipients specified in this field do not appear in the received message header and the recipients in the To or Cc fields will not know that a copy sent to these address. Thanks Cc is stands for carbon copy. Its help in to send mail to various people in their knowledge. Bcc stands for blank carbon copy it help in send email to various people without their knowledge Spelling |
|
| 5525. |
Different between hacker and cracker? |
|
Answer» Cracker are the maliciuos programmer who breaks secure system.Hacker are interested in gaining knowledge regarding computers sytem. they explores other computer system without permission. Hacker is a person who secretly steals user\'s personal information for ethical or non ethical purposes.Crackers are technical people who steals important information like passwords, financial details , bank details etc. Crackers are always destructive. Spelling |
|
| 5526. |
What do u understand by parameter key |
| Answer» A key of perimeter maybe | |
| 5527. |
Any video of sample question paper of foundation of it |
| Answer» | |
| 5528. |
How we will create a link between two web pages ??? |
| Answer» By using anchor tag... Just start the tag.. and write href="nameof the other page"...close the tag...write something like click here...and then finally close it..<\\ a> | |
| 5529. |
What is digital signature????? |
|
Answer» A Digital Signature\xa0is an electronic form of a signature. Just as one authenticates a document with handwritten signature, a digital signature authenticates electronic documents. A digital signature is a digital code that can be attached to electronically transmitted message that uniquely identifies the sender |
|
| 5530. |
Does tag ends? |
|
Answer» Nope... it\'s an empty tag.. Li |
|
| 5531. |
Important questions to study in chapters 5,6,7,8 and 9??? |
| Answer» | |
| 5532. |
Important questions to study in 1st 2nd 3rd and 4th lessons??? |
| Answer» Abbreviations... And differentiate questions like...diff. btw. Internet and intranet...etc.etc.. | |
| 5533. |
Is it compulsory to use anchor tag to create a link to another document |
|
Answer» Just tell me compulsory or not Yup.. |
|
| 5534. |
Is primary key accept null value |
|
Answer» Primary key constraint uniquely identifies each record in a database. A Primary Key must contain unique value and it must not contain null value. No it cant contain null value |
|
| 5535. |
What is name attribut |
| Answer» Name attribute specifies the name of element | |
| 5536. |
Where are the computer notes |
| Answer» | |
| 5537. |
What is Digital divide? Ch-social impacts of IT |
| Answer» The Digital Divide is opposite of Digital Unity meaning that all sectors of society do not get equal exposure to technology. | |
| 5538. |
A table named students has the following column regno name age city |
| Answer» | |
| 5539. |
What is ict?? |
| Answer» Information and communication technology | |
| 5540. |
What is passing mark in foundation of information technology of class 10 |
|
Answer» Depends on the full marks So pass mark is 25 IT marks r 50 13 |
|
| 5541. |
Is shortkeys come in cbse class 10 fit paper |
|
Answer» R u sure hir thakker? No |
|
| 5542. |
Spanning is useful for displaying heading and titles in a continuous row or column |
| Answer» Spanning combine two or more cell in a column or row to make a single cell | |
| 5543. |
What values can be used with method attribute of form |
| Answer» get or post | |
| 5544. |
Page number ? draw the xml tree |
| Answer» | |
| 5545. |
What is ? |
|
Answer» Disc Bullet- disc |
|
| 5546. |
How does XML deals with carriage returs and new line |
| Answer» | |
| 5547. |
Differentiate between rowspam and colspam |
| Answer» Rowspan merge colum | |
| 5548. |
What is advantage of eshoping |
| Answer» 1.E-shopping stands for electronic shopping.2.E-shopping is a easy way to buy any product from anywhere.3.E-shopping provides a better information about the product. | |
| 5549. |
Difference between rowspane & collspane |
|
Answer» Thanqu Hir Rowspan merges two or more cells of a row while colspan merges two or more cells of a column Google kr le |
|
| 5550. |
What do you understand by a e -shopping |
| Answer» shopping through electronic media.. | |