For the following questions answer them individually
Which of the following is a program that uses a variety of different approaches to identify and eliminate spam ?
To access properties of an object, the mouse technique to use is…………..
Computers use the………… number system to store data and perform calculations.
……………are attempts by individuals to obtain confidential information from you by falsifying their identity.
Why is it unethical to share copyrighted files with your friends?
Which of the following can be used to select. the entire document?
The system unit -
The simultaneous processing of two or more programs by multiple processors is......
A(n)……… is a special visual and audio effect applied in Powerpoint to text or content.
Which of the following is a programming language for creating special programs like applets ?
# | Name | Overall Score |
---|---|---|
1 | Ramesh | 10 |
2 | Pankaj Mahajan | 10 |
3 | Adapaka Sumanth | 10 |
4 | Shiva | 10 |
5 | Clown KING | 10 |
6 | Vinod Kumar | 10 |
7 | Sahil Singh | 10 |
8 | Mapuia Ralte | 10 |
9 | Tejaswi | 10 |
10 | Mayur Chaudhari | 10 |