Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

2701.

What is document template?

Answer» Saving files as a word templates like controls ,blocks and instructional text.
2702.

Give an application of the web which helps in businesses

Answer»
2703.

Marks will be added of it or not in marksheet

Answer»
2704.

List any 3 rules and etiquette to be followed while chatting on the internet

Answer»
2705.

Can I get guess papers?

Answer»
2706.

Create a web page using HTML coding for a travel agency in the shown below

Answer»
2707.

All questions of it

Answer»
2708.

a table in a database may have multipleprimary key

Answer» Well I don\'t know correct but I think multiple primary keys nhi hoga
2709.

How many types of XML documents are there

Answer» Please someone reply. I don\'t know
\tA Worm is a form of malware that replicates itself and can spread to different computers via Network.Trojan Horse is a form of malware that capture some important information about a computer system or a computer network.The main objective of worms to eat the system resources.The main objective of the trojan horse is to control the activity of the system.Worms can be detected and removed by the Antivirus and firewall.Trojan horses are detected by the antivirus software.It doesn’t need a host to replicate from one computer to another.It require host is needed for spreading.It can give unauthorized access and control of the system to the hackers.It also give unauthorized access and control of the system to the hackers.It is less harmful as compared.It is more harmful as compared.Morris Worm, Storm Worm and SQL Slammer are some of the examples of worms.Back orifice, Rootkit and Beast Trojan are some of the common Trojan horses.Worms are executed via weaknesses in system.Trojan horse executes through a program and interprets as utility software.\t
2710.

Write the difference between computer worms and trojans

Answer» WORMS TROJAN HORSE
2711.

Difference between Trojans and virus

Answer» Trojan horses are impostors--files that claim to be something desirable but, in fact, are malicious. A very important distinction from true viruses is that they do not replicate themselves, as viruses do. Trojans contain malicious code, that, when triggered, cause loss, or even theft, of data.
2712.

What is cookies

Answer» The mechanism that allows the server to store it\'s own information about a user on the user\'s own computer. It is a message given to a web browser by a web server. The browser stores the message in the text file. The msg is then sent back to the server each time the browser request a page from the server.I hope it helps you.
2713.

Can I get the syllabus of foundation of IT code 402

Answer»
2714.

Can you please provide previous years board question papers of Foundation of IT,please

Answer» Not here there where
Yes but not here
2715.

Anyone know how to download fast and furious 8 in hindi

Answer» I w,ill try to download with vidmate but all video r fake
No I am not interested in watching movies
VIDMATE bro. ???
Not played
2716.

@ is domain name or email recipient

Answer» Domain
2717.

Solve computer sample paper class 10th code no 166

Answer» I m sorry i was not said to u this
I don\'t care about ur mood okk
2718.

what is the file extension of a database file.

Answer» .odb
.odb
.odb
2719.

10th mein computer k marks add honge kya

Answer» No
2720.

What is XML declaration

Answer» It refers to a statement, which is used to indicate the specified XML document and defines the XML version that is used in used in the document syntax.
2721.

Syllabus of IT

Answer»
2722.

Define U.R.L. and where it is used ?????

Answer» URL stand for universe resarch locater this is achievedby using a redirect which link to the web page
Url is uniform resource locator it is of two types uniform and partial it use to locate web site on server
2723.

What is the difference between hacker and cracker

Answer» A hacker is a computer enthusiast who takes the computer to it\'s limits but a cracker wants to find flaws and problems in computer software and then he can use it to his advantage
All data erased and account pass changed
My phone was hacked yesterday for coc account
2724.

Syntax of Xml.?

Answer»
2725.

Discuss two adressing the mechanism used for website on the net

Answer» One is Ip address.it is a numerical addressSecond is DNS domain name system it is alphabetical system by which websites are identified.
2726.

Differnce between Absolute URL and Relative URL

Answer» We can use both actual and real word
Absolute url is the actual address of the web page whereas relative url is the address of the website which is relative to the required webpage.
2727.

What do you understand by V. Link.... Please Jaldi batao

Answer» The V link attributes specifies the color of visited links in a document.
Visited link
2728.

In which school kavya arora study?

Answer»
2729.

What is Antivirus? Explain 3 option that you get genrally with antivirus software

Answer» While antivirus software is primarily designed to protect computers against viruses, many antivirus programs now protect against other types of malware, such as spyware, adware, and rootkits as well. Examples of common antivirus programs include Norton Antivirus, Kaspersky Anti-Virus\xa0and ZoneAlarm Antivirus.
2730.

Volacation subject

Answer»
2731.

Are marks of computer/FOIT being evaluated in cbse boards

Answer»
2732.

Diffrence between Alink and Vlink attributes in html?

Answer» Any one?
2733.

If any one dare then tell ans of this Q

Answer»
2734.

Two ISP

Answer»
2735.

Write the html code to create a link for \'school.jpg\' licated at "www.abc.nic.in

Answer»
2736.

How to do practical work

Answer»
2737.

design a web page of my school

Answer» Isss app pe nahi bataya ha sakta.......
2738.

How to make project file

Answer»
2739.

Why there are no notes for Foundation of IT

Answer» I also see that.. Only sample papers??
Unse hi puch lo yrr
2740.

Blue print

Answer» Net pe dekho
Photocopy
2741.

What are the categories of Cyber crime?

Answer» Like when any one stole anybody\'s I\'d password information then he can make another credit cards and debit cards and stole his mo ney through intrenet
Sir categoris baatye ?
When we use internet and PC for crimes
2742.

Fit is included in best 5 or it is optional

Answer» Optional
2743.

why do we study

Answer»
2744.

What is the role of IETF in internet ?

Answer» It stands for Internet Engineering Task Force.It is a organization that deals with Internet standards and cooperates with IEC AND ISO.
2745.

Mention the list of the licenses used by the users?

Answer»
2746.

What is Deniel of Service attack? How it affects the systems performance?

Answer»
2747.

What it is stand for MMF?

Answer»
2748.

It stands for PHP?

Answer» Okk,bro ask me any thing from html..??
Personal home page
Mujhe too pataa hai hi but puch rahaa hu.
Searc it on google.I haven\'t study this language
Shai hai but what is its full form?
Web desiging language
2749.

How to set a primary key in DBMS

Answer» Always welcome if u have any doubts in geography or computer sci u can ask.
Ok,thanks bro towarrow is my practical exam so thanks☺
Only it contain a unique value for each record of table.
Nope
Can primary key valu be null?
Primary key has to identify a unique value which can be present in a table, in a number form also. It means, primary key field allow number too.
2750.

What is the difference between Shareware and Freeware softwares?

Answer» Shareware is often confused with freeware, but they have two distinctly different purposes. Freeware is copyrighted software that is available at no cost for unlimited usage. With shareware, users are encouraged to share the limited version of the software to promote larger distribution and sales.