हिंदी
Tamil Nadu Board of Secondary EducationHSC Science कक्षा ११

HSC Science कक्षा ११ - Tamil Nadu Board of Secondary Education Question Bank Solutions for Computer Applications

Advertisements
[object Object]
[object Object]
विषयों
मुख्य विषय
अध्याय
Advertisements
Advertisements
Computer Applications
< prev  121 to 140 of 350  next > 

Write the characteristics of the sixth generation.

[1] Introduction to Computers
Chapter: [1] Introduction to Computers
Concept: undefined >> undefined

How many characters can be handled in Binary Coded Decimal System?

[2] Number Systems
Chapter: [2] Number Systems
Concept: undefined >> undefined

Advertisements

For 11012 the equivalent Hexadecimal equivalent is?

[2] Number Systems
Chapter: [2] Number Systems
Concept: undefined >> undefined

Convert (46)10 into a Binary number.

[2] Number Systems
Chapter: [2] Number Systems
Concept: undefined >> undefined

What is radix of a number system? Give example

[2] Number Systems
Chapter: [2] Number Systems
Concept: undefined >> undefined

Write a note on the binary number system.

[2] Number Systems
Chapter: [2] Number Systems
Concept: undefined >> undefined

Which of the following device identifies the location when the address is placed in the memory address register?

[3] Computer Organisation
Chapter: [3] Computer Organisation
Concept: undefined >> undefined

What is instruction?

[3] Computer Organisation
Chapter: [3] Computer Organisation
Concept: undefined >> undefined

What is the meaning of "Hibernate" in Windows XP/Windows 7?

[5] Working with Windows Operating System
Chapter: [5] Working with Windows Operating System
Concept: undefined >> undefined

Explain the versions of the Windows Operating System.

[5] Working with Windows Operating System
Chapter: [5] Working with Windows Operating System
Concept: undefined >> undefined

A computer network security that monitors and controls incoming and outgoing traffic is ______.

[17] Computer Ethics and Cyber Security
Chapter: [17] Computer Ethics and Cyber Security
Concept: undefined >> undefined

The process of converting ciphertext to plain text is called ______.

[17] Computer Ethics and Cyber Security
Chapter: [17] Computer Ethics and Cyber Security
Concept: undefined >> undefined

What is a Cookie?

[17] Computer Ethics and Cyber Security
Chapter: [17] Computer Ethics and Cyber Security
Concept: undefined >> undefined

What is the role of firewalls?

[17] Computer Ethics and Cyber Security
Chapter: [17] Computer Ethics and Cyber Security
Concept: undefined >> undefined

Write about encryption and decryption.

[17] Computer Ethics and Cyber Security
Chapter: [17] Computer Ethics and Cyber Security
Concept: undefined >> undefined

Write the different types of cyber attacks.

[17] Computer Ethics and Cyber Security
Chapter: [17] Computer Ethics and Cyber Security
Concept: undefined >> undefined

A column heading in Calc is represented using ______.

[7] Working with Openoffice Calc
Chapter: [7] Working with Openoffice Calc
Concept: undefined >> undefined

Which key is used to move the cell pointer in the forward direction within the worksheet?

[7] Working with Openoffice Calc
Chapter: [7] Working with Openoffice Calc
Concept: undefined >> undefined

What are the types of toolbars available in OpenOffice calc?

[7] Working with Openoffice Calc
Chapter: [7] Working with Openoffice Calc
Concept: undefined >> undefined

What is a Cell pointer?

[7] Working with Openoffice Calc
Chapter: [7] Working with Openoffice Calc
Concept: undefined >> undefined
< prev  121 to 140 of 350  next > 
Advertisements
Share
Notifications

Englishहिंदीमराठी


      Forgot password?
Use app×