InterviewSolution
 Saved Bookmarks
    				This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 2701. | 
                                    What is document template? | 
                            
| Answer» Saving files as a word templates like controls ,blocks and instructional text. | |
| 2702. | 
                                    Give an application of the web which helps in businesses | 
                            
| Answer» | |
| 2703. | 
                                    Marks will be added of it or not in marksheet | 
                            
| Answer» | |
| 2704. | 
                                    List any 3 rules and etiquette to be followed while chatting on the internet | 
                            
| Answer» | |
| 2705. | 
                                    Can I get guess papers? | 
                            
| Answer» | |
| 2706. | 
                                    Create a web page using HTML coding for a travel agency in the shown below | 
                            
| Answer» | |
| 2707. | 
                                    All questions of it | 
                            
| Answer» | |
| 2708. | 
                                    a table in a database may have multipleprimary key | 
                            
| Answer» Well I don\'t know correct but I think multiple primary keys nhi hoga | |
| 2709. | 
                                    How many types of XML documents are there | 
                            
| Answer» Please someone reply. I don\'t know | |
| 2710. | 
                                    Write the difference between computer worms and trojans | 
                            ||
| Answer» | WORMS | TROJAN HORSE | \tA Worm is a form of malware that replicates itself and can spread to different computers via Network.Trojan Horse is a form of malware that capture some important information about a computer system or a computer network.The main objective of worms to eat the system resources.The main objective of the trojan horse is to control the activity of the system.Worms can be detected and removed by the Antivirus and firewall.Trojan horses are detected by the antivirus software.It doesn’t need a host to replicate from one computer to another.It require host is needed for spreading.It can give unauthorized access and control of the system to the hackers.It also give unauthorized access and control of the system to the hackers.It is less harmful as compared.It is more harmful as compared.Morris Worm, Storm Worm and SQL Slammer are some of the examples of worms.Back orifice, Rootkit and Beast Trojan are some of the common Trojan horses.Worms are executed via weaknesses in system.Trojan horse executes through a program and interprets as utility software.\t|
|---|---|---|---|
| 2711. | 
                                    Difference between Trojans and virus | 
                            
| Answer» Trojan horses are impostors--files that claim to be something desirable but, in fact, are malicious. A very important distinction from true viruses is that they do not replicate themselves, as viruses do. Trojans contain malicious code, that, when triggered, cause loss, or even theft, of data. | |
| 2712. | 
                                    What is cookies | 
                            
| Answer» The mechanism that allows the server to store it\'s own information about a user on the user\'s own computer. It is a message given to a web browser by a web server. The browser stores the message in the text file. The msg is then sent back to the server each time the browser request a page from the server.I hope it helps you. | |
| 2713. | 
                                    Can I get the syllabus of foundation of IT code 402 | 
                            
| Answer» | |
| 2714. | 
                                    Can you please provide previous years board question papers of Foundation of IT,please | 
                            
| 
                                   Answer» Not here there where Yes but not here  | 
                            |
| 2715. | 
                                    Anyone know how to download fast and furious 8 in hindi | 
                            
| 
                                   Answer» I w,ill try to download with vidmate but all video r fake No I am not interested in watching movies VIDMATE bro. ??? Not played  | 
                            |
| 2716. | 
                                    @ is domain name or email recipient | 
                            
| Answer» Domain | |
| 2717. | 
                                    Solve computer sample paper class 10th code no 166 | 
                            
| 
                                   Answer» I m sorry i was not said to u this I don\'t care about ur mood okk  | 
                            |
| 2718. | 
                                    what is the file extension of a database file. | 
                            
| 
                                   Answer» .odb .odb .odb  | 
                            |
| 2719. | 
                                    10th mein computer k marks add honge kya | 
                            
| Answer» No | |
| 2720. | 
                                    What is XML declaration | 
                            
| Answer» It refers to a statement, which is used to indicate the specified XML document and defines the XML version that is used in used in the document syntax. | |
| 2721. | 
                                    Syllabus of IT | 
                            
| Answer» | |
| 2722. | 
                                    Define U.R.L. and where it is used ????? | 
                            
| 
                                   Answer» URL stand for universe resarch locater this is achievedby using a redirect which link to the web page Url is uniform resource locator it is of two types uniform and partial it use to locate web site on server  | 
                            |
| 2723. | 
                                    What is the difference between hacker and cracker | 
                            
| 
                                   Answer» A hacker is a computer enthusiast who takes the computer to it\'s limits but a cracker wants to find flaws and problems in computer software and then he can use it to his advantage All data erased and account pass changed My phone was hacked yesterday for coc account  | 
                            |
| 2724. | 
                                    Syntax of Xml.? | 
                            
| Answer» | |
| 2725. | 
                                    Discuss two adressing the mechanism used for website on the net | 
                            
| Answer» One is Ip address.it is a numerical addressSecond is DNS domain name system it is alphabetical system by which websites are identified. | |
| 2726. | 
                                    Differnce between Absolute URL and Relative URL | 
                            
| 
                                   Answer» We can use both actual and real word Absolute url is the actual address of the web page whereas relative url is the address of the website which is relative to the required webpage.  | 
                            |
| 2727. | 
                                    What do you understand by V. Link.... Please Jaldi batao | 
                            
| 
                                   Answer» The V link attributes specifies the color of visited links in a document. Visited link  | 
                            |
| 2728. | 
                                    In which school kavya arora study? | 
                            
| Answer» | |
| 2729. | 
                                    What is Antivirus? Explain 3 option that you get genrally with antivirus software | 
                            
| Answer» While antivirus software is primarily designed to protect computers against viruses, many antivirus programs now protect against other types of malware, such as spyware, adware, and rootkits as well. Examples of common antivirus programs include Norton Antivirus, Kaspersky Anti-Virus\xa0and ZoneAlarm Antivirus. | |
| 2730. | 
                                    Volacation subject | 
                            
| Answer» | |
| 2731. | 
                                    Are marks of computer/FOIT being evaluated in cbse boards | 
                            
| Answer» | |
| 2732. | 
                                    Diffrence between Alink and Vlink attributes in html? | 
                            
| Answer» Any one? | |
| 2733. | 
                                    If any one dare then tell ans of this Q | 
                            
| Answer» | |
| 2734. | 
                                    Two ISP | 
                            
| Answer» | |
| 2735. | 
                                    Write the html code to create a link for \'school.jpg\' licated at "www.abc.nic.in | 
                            
| Answer» | |
| 2736. | 
                                    How to do practical work | 
                            
| Answer» | |
| 2737. | 
                                    design a web page of my school | 
                            
| Answer» Isss app pe nahi bataya ha sakta....... | |
| 2738. | 
                                    How to make project file | 
                            
| Answer» | |
| 2739. | 
                                    Why there are no notes for Foundation of IT | 
                            
| 
                                   Answer» I also see that.. Only sample papers?? Unse hi puch lo yrr  | 
                            |
| 2740. | 
                                    Blue print | 
                            
| 
                                   Answer» Net pe dekho Photocopy  | 
                            |
| 2741. | 
                                    What are the categories of Cyber crime? | 
                            
| 
                                   Answer» Like when any one stole anybody\'s I\'d password information then he can make another credit cards and debit cards and stole his mo ney through intrenet Sir categoris baatye ? When we use internet and PC for crimes  | 
                            |
| 2742. | 
                                    Fit is included in best 5 or it is optional | 
                            
| Answer» Optional | |
| 2743. | 
                                    why do we study | 
                            
| Answer» | |
| 2744. | 
                                    What is the role of IETF in internet ? | 
                            
| Answer» It stands for Internet Engineering Task Force.It is a organization that deals with Internet standards and cooperates with IEC AND ISO. | |
| 2745. | 
                                    Mention the list of the licenses used by the users? | 
                            
| Answer» | |
| 2746. | 
                                    What is Deniel of Service attack? How it affects the systems performance? | 
                            
| Answer» | |
| 2747. | 
                                    What it is stand for MMF? | 
                            
| Answer» | |
| 2748. | 
                                    It stands for PHP? | 
                            
| 
                                   Answer» Okk,bro ask me any thing from html..?? Personal home page Mujhe too pataa hai hi but puch rahaa hu. Searc it on google.I haven\'t study this language Shai hai but what is its full form? Web desiging language  | 
                            |
| 2749. | 
                                    How to set a primary key in DBMS | 
                            
| 
                                   Answer» Always welcome if u have any doubts in geography or computer sci u can ask. Ok,thanks bro towarrow is my practical exam so thanks☺ Only it contain a unique value for each record of table. Nope Can primary key valu be null? Primary key has to identify a unique value which can be present in a table, in a number form also. It means, primary key field allow number too.  | 
                            |
| 2750. | 
                                    What is the difference between Shareware and Freeware softwares? | 
                            
| Answer» Shareware is often confused with freeware, but they have two distinctly different purposes. Freeware is copyrighted software that is available at no cost for unlimited usage. With shareware, users are encouraged to share the limited version of the software to promote larger distribution and sales. | |