Answer:
Algorithm
Explanation:
It is the step by step procedure,which defines a set of instructions which is to be carried out by the computer
Answer:
The answer is "Option c"
Explanation:
The W3C is the framework for the creation of software and the online standards through which sites and webpages work, and to turn into an authoritative source of information, she will work towards getting a reliable and credible source of knowledge from the "World Wide Web Consortium", and the wrong option can be described as follows:
- In option a, It is wrong because this organization prepares and publishes all the electronic technologies.
- In option b, It is wrong because it is the laboratory of physics, which is not useful in web development.
- In option d, This technology is used in TCP/IP protocol, that's why it is incorrect.
Answer:
Both Flat, round discs.
A DVD can hold six times as much as compacity than a disc.
A CD is a Compact Disc.
Answer:
Possible if hackers are not so intelligent.
Explanation:
Actually, hackers are intelligent
where they will change location code in different places every second. So end-user who is trying to trace it he or she has to use their intelligence to find the exact location of hackers.
Normally hackers will generate different location places and by using decipher it is possible to find the location codes.
Since hackers used encrypted message we need to decrypts the message and find it out and understand the decrypt and encrypt technology used by hackers.
It is possible to by using decipher to get uncovered locations
C. Underline because it is not a kind of font. it is an effect.