Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

1551.

XML coding style

Answer»
1552.

What are the risk of using online backup

Answer»
1553.

Accha guys is ka crrct code btao plzz" next "

Answer»
1554.

What is colspan and rowspan

Answer»
1555.

Defin tag

Answer» A coaded HTML command;also called as element.
1556.

.....,........ Is placed where the webpages reside

Answer» Website
1557.

Www

Answer»
1558.

Who invented www?

Answer» Tim berners lee
1559.

What is cc and acc?

Answer» Carbon copy and blind carbon copy
1560.

What is XML parser..???

Answer» It is a program which converts the xml content into accessible java script code
1561.

Computer was important for our results??

Answer» Then.... There is any rule that if I get low marks in any subject computer marks are added to it???
No
Tell me frnds plz yrr
1562.

D/B font and font tag

Answer» Afb
1563.

Expand the following term edi e banking

Answer» Electronic data interchange (EDI) is the structured transmission of data between organizations by electronic means .
1564.

What do you mean by downloading and uploading??

Answer» We can transfer files from one computer to another on the internet. It is possible to upload files- from local computer to a remote computer. And download file from remote computer to the local computer.
1565.

Computer marksadded are added or not

Answer»
1566.

Marks are added or not

Answer» No
1567.

Name the technologies based upon which the world wide Web is created

Answer»
1568.

name the various. objects of ms acess

Answer»
1569.

What is the significance of root element? What is it\'s alternative name?

Answer»
1570.

Full form of EDI

Answer» Electronic data enterchang
1571.

Prepare for your I.T exam or not

Answer» No not properly
1572.

Does MCQ come in computer board exam 2018?

Answer» Yes
Yes
YPpp
1573.

Explain Backup and recovery management of DBMS

Answer» Backup is the storage media in computer for available the data and records till long duration called backup
1574.

In the Packet switching technology is packet can contain up to

Answer»
1575.

Explain the term digital devices

Answer»
1576.

Explain finding on internent

Answer»
1577.

What is information retrival

Answer» Bhaio ab to paper bhi ho gaya ab mt batana answer
The tracing and recovery of specific information from stored data is known as information retrieval
1578.

How many differences are there in FIT

Answer»
1579.

Best of luck for fIT exam

Answer» Kis school me padhti ho
Tq same to you
1580.

Kehraa aa jera flag nappi janda damag ch frk pay geya tere.....??

Answer»
1581.

The view that allows us to enter data and fields together on the Same screen?

Answer» S I think so
Data sheet view. Do u agree with this
1582.

Some notes based on basic information technology.

Answer»
1583.

What is basefont tag

Answer»
1584.

What is blog? what are the process of blogging blogging?

Answer»
1585.

What is linking

Answer»
1586.

What is bolgs

Answer» Its thought
Its blogs???
Its a website whre u can share ur opanions n thaughts
1587.

Write the html code to display \'thank You!\' In yellow color, Size 5.

Answer»
1588.

What is web site

Answer» Collection of webpages
1589.

Expand the mathematical Formal A+B) ½

Answer»
1590.

Advantage of electronic mail over ordinary male

Answer» It saves paper.It is faster.It is easier to write.It is safer as you can have multiple copies of the same mail.You can send many other kinds of multimedia apart from just text in electronic mail such as audio, video and images as well as many other kinds of documents.
1591.

Incoming mails are stored in

Answer» Inbox
1592.

FIT NIIT nguru

Answer» On 8th u have FIT exam ....tell me plz where r u live m..b ?
Bye cu all later.
Check foundation of information technology of sarswati publication.
1593.

Which publication book do u all use ?

Answer»
1594.

It is a name-value pair contained in the element\'s start tag. What does it refer?

Answer» FIT
computer
1595.

Define:-> Primary key, candidate key and alternate key.

Answer» Fr block krta patandraan ne....??
?
Ki hoya??
??
Tu prhla prhla plz....??
*A Primary Key is a column or a combination of columns that uniquely identify a record.*The field which is eligible to become the primary key is called Candidate keys * Among the candidate key that don\'t form the primary keys are Alternate key
1596.

Don\'t waste too much time in studying fit concentrate on other important subjects

Answer» But,how to do that coding??
Don\'t go in too deep in XML only programming will come and difference between XML and HTML
1597.

Hey dont thing so much

Answer»
1598.

Is xml is case sensetive? What does it mean?

Answer» Sry...in the previous answer that i wrote....i used html tags for examples but they automitacally changed to the html output.(the information technology is in bold and underlined because i used and tags to give u an example.)
Yes...XML is case sensitive. It means u have to start and end the tag properly in a sequential order. For example, in HTML, u can writeInformation Technology.It doesnt matter in html if the tags have an upper case value ir a lower case value. But it does matter in XML. U have to end the tags the way you started and u need to end the last tag first and first tag last. For example - Information Technology
Yes,,have to same name both starting and ending tags
1599.

How to do XML coding?

Answer»
\tA Worm is a form of malware that replicates itself and can spread to different computers via Network.Trojan Horse is a form of malware that capture some important information about a computer system or a computer network.The main objective of worms to eat the system resources.The main objective of the trojan horse is to control the activity of the system.Worms can be detected and removed by the Antivirus and firewall.Trojan horses are detected by the antivirus software.It doesn’t need a host to replicate from one computer to another.It require host is needed for spreading.It can give unauthorized access and control of the system to the hackers.It also give unauthorized access and control of the system to the hackers.It is less harmful as compared.It is more harmful as compared.Morris Worm, Storm Worm and SQL Slammer are some of the examples of worms.Back orifice, Rootkit and Beast Trojan are some of the common Trojan horses.Worms are executed via weaknesses in system.Trojan horse executes through a program and interprets as utility software.\t
1600.

Difference between worms and Trojan?

Answer» WORMS TROJAN HORSE