Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

6101.

R D B m s

Answer» Relational database management system
6102.

What is the needto take the data backup?discuss online backup briefly

Answer»
6103.

Is the extension of an XML file

Answer» .xml is the extension of XML file.
It is the extensible markap language
.xml
6104.

List any four types of tab alignment available in a word processor.

Answer»
6105.

Question Answer

Answer»
6106.

Difference between validation rule and validation text

Answer» (a)\xa0Validation rule\xa0is a field property used to specify and define conditions that limit values that can be entered\xa0in a\xa0particular field.(b)\xa0Validation text\xa0is a message that is displayed when data entered in that field does not conform to the\xa0validation rule\xa0or it is violated.
6107.

What is markup

Answer» And in case of html.. Markup languages are designed for the processing, definition and presentation of text. The language specifies code for formatting, both the layout and style, within a text file. The code used to specify the formatting are called tags. HTMLis a an example of a widely known and used markup language..................................................................................
Markup Language.XML is called the "Extensible Markup Language" since custom tags can be used to support a wide range of elements. Each XML file is saved in a standard text format, which makes it easy for software programs to parse or read the data..................................................................................
6108.

coading CricketerPlayer name SachinDhoniShewagYuvrajRahul

Answer»
6109.

What is hacker difference cracker

Answer» Hackers and craackers both access others computer without his/her information but hackers do it for ethical or non ethical purpose whereas crackers are always destructive
6110.

Board examination paper2018.2017.2016.2015

Answer»
6111.

Explain different elements required to create a table

Answer» To create table tag TR TD tags are used
6112.

What is the use of comment ?

Answer» Comments to a topic
6113.

Who was the invented of WWW?

Answer» Mark jker burg
6114.

What is ICT education. .?

Answer»
6115.

what is regional isp

Answer»
6116.

Give me another sample papet

Answer»
6117.

How to insert a picture and clipart in document, wrap text around a picture

Answer»
By using
Using imagetag
6118.

Which device used for the WI fi connection

Answer» Modem
6119.

Solve the question of foundation it book page number283

Answer»
6120.

Solve the questions on page 183 of book

Answer»
6121.

HOW TO WRITE PROJECT ON DBMS

Answer»
6122.

What is the full form dbms

Answer» A DBMS is a Database Management System
A\xa0database-management\xa0system (DBMS)It is a computer-software application that interacts with end-users, other applications, and the database itself to capture and analyze data. A general-purpose\xa0DBMS\xa0allows the definition, creation, querying, update, and administration of databases.
Khud question pucha aur answer bhi de diya
Database manipulating system
6123.

Kya boards me computer ka exam 40 marks ka hoga

Answer» Yes
6124.

The ___________ option should be used while presenting a presentation to an audience

Answer» Power point
Animation
6125.

Aur jo practical hoga computer ka wo cbse se aayenge lene or school wale hi lenge

Answer» School vale lenge
6126.

How will you print the notes of a presentation on all slides?

Answer»
6127.

What is spam

Answer» An electronic messaging system used by various commercial organizations to send bulk messages to a large number of addresses is called spam
6128.

What is the use of "justify" attribute in header tag ??

Answer»
6129.

Property specifies the width of the field

Answer»
6130.

What is the difference between blur tool and sharpen tool?

Answer» \tBlur ToolSharpen ToolBlur mode causes each pixel affected by the brush to be blended with neighbouring pixels, thereby increasing the similarity of pixels inside the brushstroke areaSharpen mode causes each pixel to become more different from its neighbours, it increases contrast inside the brushstroke area.Blurring can be useful to soften some element of the image that stands out too much.In “Sharpen” mode, the tool works by increasing the contrast where the brush is applied.\xa0\t
6131.

Which are the chapters that will come in board exam 2019 class 10 of computer

Answer» reply de
teri maa ka
O faduu soo ja chap chaap
abe haryanavi computer ka matlab nhi pta kya
Polynomials, real no. And probability
6132.

What is the difference between XML and EDI?

Answer» Xml does not require costly technology whereas Edi require.xml can easily interpreted by xml parser whereas edi cannot easily interpret.Xml stands for extensible markup language whereas edi stands for electronic data interchange.
6133.

Good morning have a wonderful day.☺

Answer»
6134.

Kya koi online h abhi

Answer» yes
Kya koi h to bolo yrr jaldhi
Kya koi tik tok chalata h kya
6135.

What is digital division

Answer» It is an economic and social. Inequality with regard to access, to use of, or impact of information and communication, technology ( ICT)
6136.

Layout define

Answer»
6137.

Please send me answer of Html Practical exercises Q. 4

Answer»
6138.

Any other sample paper can we get from here

Answer»
6139.

Definr forms

Answer» A form is an interface in user specified layout that is used for entering , editing and viewing the data of the database.
6140.

Dear Sir class10 important question

Answer»
6141.

difference between unnumbered list or ordered list

Answer» \tUnordered list are basically any point form list like in a word processor using dots to list items;\twhile ordered list are list that categorized the list according to a, b, c or 1, 2, 3.
6142.

What is embedding?

Answer»
6143.

Explain the structure of html

Answer»
6144.

Write any two rules for definning elements in xml?

Answer»
6145.

How can you remove the primary key?

Answer»
6146.

Differenciate between boot sector virus and file system virus?

Answer» Those viruses which can damage the hard disk of our system are called boot sector viruses.Those viruses who attached themselves to a program file and can damage them are called file infector viruses.
6147.

Write any two attribute of www?

Answer»
6148.

How can you place comments in XML files

Answer»
6149.

Describe the term Trojan Horse?

Answer» Trojan horse is a program that appears harmless (such as text editor or utility programs) but actually performs malicious functions such as deleting or damaging files.
Trojan or Trojan horse is the name given to a computer virus. It is a type of computer software that is camouflaged in the form of regular software such as utilities, games and sometimes even antivirus programs. Once it runs on the computer, it causes problems like killing background system processes, deleting hard drive data and corrupting file allocation systems.
6150.

Use of accessibility options

Answer» Accesbility features are useful for disabled people for their convenient use of technology..