1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kramer
2 years ago
10

What is syllabus of diploma in computer after class 10​

Computers and Technology
1 answer:
GalinKa [24]2 years ago
4 0

Answer:

\:

List Of Best Computer Courses After 10th :

  • Certificate Program In MS Office
  • Basic Computer Course
  • Web Designing Course
  • Digital Marketing Course
  • Data Entry Course
  • Graphic Designing Course
  • Web Development Course
  • Animation And VFX Course
  • Computer Science Diploma/Engineering
  • Diploma In Financial Accounting
You might be interested in
A call center is a _______.<br><br> JIT<br><br> CMA<br><br> CIC<br><br> SFA
sp2606 [1]

Answer: CIC

Explanation:

A call center is a customer interaction center (CIC) and it is the interface between call center agent with the customers directly. CIC are connected by the external telephone system and it uses as call center.

And the caller are basically identify by the telephone number and customer information are display in the CIC.

CIC are the modular structure for communication which include various components of CIC and framework.

4 0
3 years ago
Which of the following is a subsystem of computers providing access to the Internet and offering multimedia and linking capabili
lbvjy [14]
Answer is option C that is w.w.w.
6 0
2 years ago
A reflective cross-site scripting attack (like the one in this lab) is a __________ attack in which all input shows output on th
Murrr4er [49]

Answer:

" Non-persistent" is the right response.

Explanation:

  • A cross-site category of screenplay whereby harmful material would have to include a transaction to have been transmitted to that same web application or user's device is a Non-persistent attack.
  • Developers can upload profiles with publicly available information via social media platforms or virtual communication or interaction.
6 0
2 years ago
5. What are some situations where you might find it useful to use the “!” symbol in a program?
svlad2 [7]

Answer:

The most common use of symbols by programmers is for performing language reflection (particularly for callbacks), and most common indirectly is their use to create object linkages. In the most trivial implementation, they have essentially named integers (e.g. the enumerated type in C).
<u>Help Me By Marking Me as Brainlist ...</u>

5 0
2 years ago
Read 2 more answers
Rapunzel s-a născut într-un ţinut îndepărtat într-un regat necunoscut. Mama vitregă a închis-o pe Rapunzel într-un turn foarte î
andrey2020 [161]
Iche hebie zaft no guts dude
5 0
3 years ago
Other questions:
  • Mention 3 wast water draining system on home​
    7·1 answer
  • You are building a gaming computer and you want to install a dedicated graphics card that has a fast gpu and 1gb of memory onboa
    15·2 answers
  • You can access a button s screentip by _____.
    6·1 answer
  • You can't get close enough to the facility interior to launch an evil twin attack against its wireless clients; in fact, you hav
    11·1 answer
  • To implement the various placement algorithms discussed for dynamic partitioning (see Section 7.2 ), a list of the free blocks o
    11·1 answer
  • What is Java Script?
    13·1 answer
  • The owner of a candle shop has asked for your help. The shop sells three types of candles as shown below:
    14·1 answer
  • Which of the following technologies does NOT facilitate the transferring of data between computers in adjacent buildings?
    12·1 answer
  • During the data transmission there are chances that the data bits in the frame might get corrupted. This will require the sender
    8·1 answer
  • A file manager is used for all of the following except ____.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!