InterviewSolution
Saved Bookmarks
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 4001. |
Differentiate between LAN and WAN |
|
Answer» LAN stands for local area network. In LAN, a computer network is isolated within a small area ,such as in office or building. In LAN ,computers are mostly interconnected by guided media. WAN stands for wide area network. In WAN, a computer network is spread over a large area, such as a country . In WAN ,computers are interconnected by unguided media(e.g-radiowave). Lan stands for local area network. It consists of 1 or 2 computers to upto 100 computers in a building or premise. Whereas Wan stands for wide area network. It consists of many Lan\'s.Internet is the largest Wan. |
|
| 4002. |
Activity 3 in pg no. 170 |
| Answer» | |
| 4003. |
Working of internet |
| Answer» | |
| 4004. |
What is wi-max? Explain. |
| Answer» WiMAX is not a replacement technology to WiFi – instead, while WiFi is the de-facto global standard for wireless interconnection of end-user devices, WiMAX has addressed a specific techn.. Wi MAX stands for “Worldwide Interoperability for Microwave Access” and is a standard-based technology for providing a wireless alternative to cable and DSL connections. | |
| 4005. |
What is the difference page break and section break? |
| Answer» | |
| 4006. |
Why cbseguider suspended ours friends? |
| Answer» | |
| 4007. |
Please update this and add new book that is information technology |
| Answer» | |
| 4008. |
Name some file transfer protocols used over internet |
| Answer» SSH,TELNET | |
| 4009. |
agar mere overall fit main sst se acche marks hai to mere kis suject ke marks lagenge? |
|
Answer» Agar koi student math, science,sst mai se kisi ek m fail hoga tab hi add honge Kisi m nai ye marks sirf fail students ko milenge |
|
| 4010. |
FOIT k marks add honge ya reexam hoga |
| Answer» Marks add honge no reexam | |
| 4011. |
Paper kaisa ta |
|
Answer» I get 33+mrks First Class tha??37+/40 Average? |
|
| 4012. |
Who get 35+/40....? |
| Answer» | |
| 4013. |
What are the attribute of the anchor tag. |
| Answer» Href, name, title | |
| 4014. |
FIT QUESRIONS SILUTIONS SET4 CODE NO 53 2019 27TH MARCH |
|
Answer» Same paper was there Not possible to give here |
|
| 4015. |
What are virus |
| Answer» A computer virus is a type of computer program that can replicate itself by making copies of itself by making copies of itself without the user\'s knowledge or consent.Computer virus spread from following waysi. Opening the infected email attachment.ii. By downloading infected programs from the internet.iii. By using infected floppy disk, pen drives and CDs.iv. By transferring an infected program over a network and executing it.\xa0 | |
| 4016. |
Difference Between cc and bcc |
|||
| Answer» | Basis for Comparison | Cc | Bcc | \t\t\tFull formCarbon Copy.Blind Carbon Copy.WorkingA recipient of Cc field is visible to the primary recipients of To: field, other recipients of Cc and recipients of Bcc field.A recipient of Bcc field is neither visible to recipients of To: field, nor to recipients of Cc field and not even to the other recipients of Bcc field.UseIt is used to make the primary recipient more serious about the mail.Use when you don\'t want to share the list of recipients with other recipients.\t|
|---|---|---|---|---|
| 4017. |
What is the difference between rowspan and colspan means how to use them? |
| Answer» Rowspan is used to merge rows in table and colspan is used to merge coloumns in table | |
| 4018. |
Write the format of xml |
|
Answer» Extendable markup language May be its html |
|
| 4019. |
How all students ferl |
| Answer» | |
| 4020. |
Percentage of computer kya total percentage me judegi |
| Answer» No | |
| 4021. |
Can you crack filmora wondershare video editor .Because i can |
| Answer» | |
| 4022. |
Difference between Dialed up connection and leased line connection |
| Answer» LEASED LINE CONNECTION:- A leased line is a private bidirectional or symmetric telecommunications circuit between two or more locations provided in exchange for a monthly rent. DIALED UP CINNECTION:- Temporary, non-dedicated internet connection made over ordinary telephone lines by dialing an internet service provider\'s number. Most people access internet through a dial up connection. | |
| 4023. |
Difference btw. Hacker and cracker |
|
Answer» Hackers:1) Hackers are interested in gaining knowledge about computer systems.2) These can be for good or bad purposes.Crackers:1) These are the malicious programmers who break into secure systems.2) These are only for bad purposes. Scroll down a lil. and u will get the ans. |
|
| 4024. |
Tcp is mainly used for |
|
Answer» It provides information about text and binary files that are organized in a menu structure it breaks the message into small packets |
|
| 4025. |
which word is used to represent a website |
| Answer» | |
| 4026. |
Hacker&cracker |
| Answer» | |
| 4027. |
All the best for remaning exam |
|
Answer» Same 2 u Thank |
|
| 4028. |
What is the full form of https |
|
Answer» See my creation https://youtu.be/mzL28kJ_j5U Hyper Text Transfer Protocol Secured Hyper text transfer protocol.. |
|
| 4029. |
Who is inventor of www |
|
Answer» Sir Tim Berners-Lee\xa0invented the World Wide Web in 1989.\xa0Sir Tim Berners-Lee\xa0is a\xa0British\xa0computer scientist. He was\xa0born\xa0in London, and his parents were early computer scientists, working on one of the earliest computers. Uniform resouce locator.? Tim Berness Lee What is primary key |
|
| 4030. |
What is the fullform of URL |
|
Answer» Uniform resource locator 17 marks Uniform Resource Locator |
|
| 4031. |
How many marks get to pass in FIT out of 40?????????? |
|
Answer» Cellpadding : Cellpadding is used to set space between the cell and content inside it Callspacing : Cellspacing means setting space between the two call.. Only 13 |
|
| 4032. |
Cell pading diferrence to cell spacing |
|||
| Answer» | BASIS\xa0 | CELLPADDING | CELLSPACING | \t\t\tBasicControls the white space between the border of a cell and its content.Sets the space between the solitary cells.Meant forSingle cellMore than one cellHTML format\t\xa0\xa0|
|---|---|---|---|---|
| 4033. |
Passing mask of this subject |
|
Answer» Are is sub. Ke marks value hi nhi krte... Boliye n |
|
| 4034. |
What is remote sites? ? |
|
Answer» Internet A remote site can either be on a server that is on the local network (using a mapped drive) or on another server on the Internet (using FTP). Your local site and your remote site should have the same folder hierarchy. Target location to store data... |
|
| 4035. |
Gif stands for |
| Answer» Graphics interchange format | |
| 4036. |
What is spider |
| Answer» Software used by search engine for searching the information | |
| 4037. |
Create orderd list unorderd list |
|
Answer» Use ul tag for unorderd list and ol tag for ol in both condition to prepare list you have to use li SoRry for incorrect answer Whenever you have to create order list us |
|
| 4038. |
How to generate Html code |
| Answer» | |
| 4039. |
Cbse class 10 sample paper 2019 with solution |
| Answer» ypp | |
| 4040. |
Plz give any 2 points of difference between hackers and crackers...as soon as possible plz☺ |
| Answer» \tHackers are people who use their knowledge for a good purpose and do not damage the data, whereas a cracker is someone who breaks into the system with a malicious purpose and damages data intentionally.\tHackers possess advanced knowledge of computer systems and programming languages, while crackers might not necessarily be so skilled and well-versed with computing knowledge.\tThe hackers work for an organization to improvise their network and solve any issues. Crackers are someone from whom the hacker protects the organization. Crackers work just because a system might be challenging or to get illegal gains.\tHacking is ethical, while cracking is illegal and unethical.\tHackers have ethical certificates, while the Crackers do not possess any certificates.\tHackers continuously work towards making new tools rather than using the existing ones. The crackers, on the other hand, have inadequate computing knowledge to make new tools and use tools already used by other crackers. | |
| 4041. |
Plz give easy definition of primary key or anything about it ... |
| Answer» Primary key is used to uniquely identify any record(row) in a table | |
| 4042. |
What is boot viruses |
| Answer» | |
| 4043. |
Advantage of xml schema over dtd |
| Answer» | |
| 4044. |
Explain the term digital unity. |
|
Answer» Digital Unity refers to the people across the world coming closer and forming group with the help of social networking sites Sorry that was by mistake . The gap of digital divide can be filled when there is literacy, economic equality,social mobility and economic growth.this condition would be known as digital unity |
|
| 4045. |
Difference between imap and pop |
| Answer» Internet message access protocol-- it allows users to access the mailbox from local computer...... Post office protocol-- provides simple and standardized way to access mailbox and download messages to your computer | |
| 4046. |
Subscript or super script |
| Answer» for subscript eg, h2o..... for superscript eg, (a+b) 2 | |
| 4047. |
What is root element in XML |
|
Answer» Thanks Root element us the first element of the xml document |
|
| 4048. |
How to download files via FTP? |
| Answer» | |
| 4049. |
What is cellspacing |
| Answer» Cellspacing control the space between table cells . | |
| 4050. |
Difference between cellspacing and ceLlpanding |
||
|
Answer» \tCellpaddingCellspacingIt specifies the space between the border of a table cell and its contents.It specifies the space between adjacent cells.It is created by using HTML | |||