InterviewSolution
Saved Bookmarks
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 6101. |
R D B m s |
| Answer» Relational database management system | |
| 6102. |
What is the needto take the data backup?discuss online backup briefly |
| Answer» | |
| 6103. |
Is the extension of an XML file |
|
Answer» .xml is the extension of XML file. It is the extensible markap language .xml |
|
| 6104. |
List any four types of tab alignment available in a word processor. |
| Answer» | |
| 6105. |
Question Answer |
| Answer» | |
| 6106. |
Difference between validation rule and validation text |
| Answer» (a)\xa0Validation rule\xa0is a field property used to specify and define conditions that limit values that can be entered\xa0in a\xa0particular field.(b)\xa0Validation text\xa0is a message that is displayed when data entered in that field does not conform to the\xa0validation rule\xa0or it is violated. | |
| 6107. |
What is markup |
|
Answer» And in case of html.. Markup languages are designed for the processing, definition and presentation of text. The language specifies code for formatting, both the layout and style, within a text file. The code used to specify the formatting are called tags. HTMLis a an example of a widely known and used markup language.................................................................................. Markup Language.XML is called the "Extensible Markup Language" since custom tags can be used to support a wide range of elements. Each XML file is saved in a standard text format, which makes it easy for software programs to parse or read the data.................................................................................. |
|
| 6108. |
coading CricketerPlayer name SachinDhoniShewagYuvrajRahul |
| Answer» | |
| 6109. |
What is hacker difference cracker |
| Answer» Hackers and craackers both access others computer without his/her information but hackers do it for ethical or non ethical purpose whereas crackers are always destructive | |
| 6110. |
Board examination paper2018.2017.2016.2015 |
| Answer» | |
| 6111. |
Explain different elements required to create a table |
| Answer» To create table tag TR TD tags are used | |
| 6112. |
What is the use of comment ? |
| Answer» Comments to a topic | |
| 6113. |
Who was the invented of WWW? |
| Answer» Mark jker burg | |
| 6114. |
What is ICT education. .? |
| Answer» | |
| 6115. |
what is regional isp |
| Answer» | |
| 6116. |
Give me another sample papet |
| Answer» | |
| 6117. |
How to insert a picture and clipart in document, wrap text around a picture |
|
Answer» By using Using imagetag |
|
| 6118. |
Which device used for the WI fi connection |
| Answer» Modem | |
| 6119. |
Solve the question of foundation it book page number283 |
| Answer» | |
| 6120. |
Solve the questions on page 183 of book |
| Answer» | |
| 6121. |
HOW TO WRITE PROJECT ON DBMS |
| Answer» | |
| 6122. |
What is the full form dbms |
|
Answer» A DBMS is a Database Management System A\xa0database-management\xa0system (DBMS)It is a computer-software application that interacts with end-users, other applications, and the database itself to capture and analyze data. A general-purpose\xa0DBMS\xa0allows the definition, creation, querying, update, and administration of databases. Khud question pucha aur answer bhi de diya Database manipulating system |
|
| 6123. |
Kya boards me computer ka exam 40 marks ka hoga |
| Answer» Yes | |
| 6124. |
The ___________ option should be used while presenting a presentation to an audience |
|
Answer» Power point Animation |
|
| 6125. |
Aur jo practical hoga computer ka wo cbse se aayenge lene or school wale hi lenge |
| Answer» School vale lenge | |
| 6126. |
How will you print the notes of a presentation on all slides? |
| Answer» | |
| 6127. |
What is spam |
| Answer» An electronic messaging system used by various commercial organizations to send bulk messages to a large number of addresses is called spam | |
| 6128. |
What is the use of "justify" attribute in header tag ?? |
| Answer» | |
| 6129. |
Property specifies the width of the field |
| Answer» | |
| 6130. |
What is the difference between blur tool and sharpen tool? |
| Answer» \tBlur ToolSharpen ToolBlur mode causes each pixel affected by the brush to be blended with neighbouring pixels, thereby increasing the similarity of pixels inside the brushstroke areaSharpen mode causes each pixel to become more different from its neighbours, it increases contrast inside the brushstroke area.Blurring can be useful to soften some element of the image that stands out too much.In “Sharpen” mode, the tool works by increasing the contrast where the brush is applied.\xa0\t | |
| 6131. |
Which are the chapters that will come in board exam 2019 class 10 of computer |
|
Answer» reply de teri maa ka O faduu soo ja chap chaap abe haryanavi computer ka matlab nhi pta kya Polynomials, real no. And probability |
|
| 6132. |
What is the difference between XML and EDI? |
| Answer» Xml does not require costly technology whereas Edi require.xml can easily interpreted by xml parser whereas edi cannot easily interpret.Xml stands for extensible markup language whereas edi stands for electronic data interchange. | |
| 6133. |
Good morning have a wonderful day.☺ |
| Answer» | |
| 6134. |
Kya koi online h abhi |
|
Answer» yes Kya koi h to bolo yrr jaldhi Kya koi tik tok chalata h kya |
|
| 6135. |
What is digital division |
| Answer» It is an economic and social. Inequality with regard to access, to use of, or impact of information and communication, technology ( ICT) | |
| 6136. |
Layout define |
| Answer» | |
| 6137. |
Please send me answer of Html Practical exercises Q. 4 |
| Answer» | |
| 6138. |
Any other sample paper can we get from here |
| Answer» | |
| 6139. |
Definr forms |
| Answer» A form is an interface in user specified layout that is used for entering , editing and viewing the data of the database. | |
| 6140. |
Dear Sir class10 important question |
| Answer» | |
| 6141. |
difference between unnumbered list or ordered list |
| Answer» \tUnordered list are basically any point form list like in a word processor using dots to list items;\twhile ordered list are list that categorized the list according to a, b, c or 1, 2, 3. | |
| 6142. |
What is embedding? |
| Answer» | |
| 6143. |
Explain the structure of html |
| Answer» | |
| 6144. |
Write any two rules for definning elements in xml? |
| Answer» | |
| 6145. |
How can you remove the primary key? |
| Answer» | |
| 6146. |
Differenciate between boot sector virus and file system virus? |
| Answer» Those viruses which can damage the hard disk of our system are called boot sector viruses.Those viruses who attached themselves to a program file and can damage them are called file infector viruses. | |
| 6147. |
Write any two attribute of www? |
| Answer» | |
| 6148. |
How can you place comments in XML files |
| Answer» | |
| 6149. |
Describe the term Trojan Horse? |
|
Answer» Trojan horse is a program that appears harmless (such as text editor or utility programs) but actually performs malicious functions such as deleting or damaging files. Trojan or Trojan horse is the name given to a computer virus. It is a type of computer software that is camouflaged in the form of regular software such as utilities, games and sometimes even antivirus programs. Once it runs on the computer, it causes problems like killing background system processes, deleting hard drive data and corrupting file allocation systems. |
|
| 6150. |
Use of accessibility options |
| Answer» Accesbility features are useful for disabled people for their convenient use of technology.. | |