what is syllabus of diploma in computer after class 10​

Answers

Answer 1

Answer:

[tex] \: [/tex]

List Of Best Computer Courses After 10th :

Certificate Program In MS OfficeBasic Computer CourseWeb Designing CourseDigital Marketing CourseData Entry CourseGraphic Designing CourseWeb Development CourseAnimation And VFX CourseComputer Science Diploma/EngineeringDiploma In Financial Accounting

Related Questions

I WILL GIVE BRAINLIEST TO WHOEVER HELPS ME

I keep pressing the "fn" key or "function" key and the disable / enable touchpad button
fn + f9 = enable/disable touchpad
but all it's doing is disabling it, everytime I press to enable it just keeps saying "touchpad has been disabled"

Answers

Assuming you're using Windows 10/11, navigate to settings --> Bluetooth and settings --> Touchpad (Or just search Touchpad on your search bar) --> Toggle the touchpad on.

Hope this helps! :)

Which of the constraints listed below would be considered a physical constraint
-Materials
-Demand for product
-Timeline
-Cost

Answers

materials

materials are the only physical thing

PLZ HELP! 50 POINTS!!!! Which device is used to change a signal into a code?


Group of answer choices


an encoder


an antenna


a wave

Answers

B) Antenna they receives signals

Answer:

It should be an encoder.

Explanation:

hope this helps and sorry if its wrong

Which of the following adds digital elements to a live view, often by using the camera on a smartphone? O Augmented reality O Forecasting O Problem-solving O Virtual reality​

Answers

Answer:

augmented reality

Explanation:

think "pokemon go" when youre relaxing with your buddy and you feed it berries

Which steps allow a user to change the column layout in the Handout Master?

Answers

Answer:

D. Click the View tab, select Handout Master, and choose the number of columns in the Slides Per Page drop-down list.

Explanation: correctEdg

12. Your project specifications call for a business rule that the database design can't
enforce. What tool should you use to enforce this business rule?
A. Trigger
B. Weak entity
C. Exception
D. Lookup entity

Answers

A lot of business rules needs to be triggered so as to run.

In making of business rule, one can select triggers to run some specific events or run using some particular specified frequency.

The trigger options differs  based on the type of rule you are interested in.  One can also use multiple triggers when using a single rule.

Learn more about rules from.

https://brainly.com/question/5707732

a program is under development to keep track of a clubs members

Answers

Answer:

Keep a chart with you

Explanation:

You could right something along the lines of:

To keep track of the members in the club, I'll(we'll) have them write their names down on a chart so we don't forget. I(we) could also just do a thing where I(we) plan everything out beforehand and I(we) have been keeping track of the members.

You could right something along the lines of:

Since the program is under development, I(we) could tell everyone in the club to put their names on a spreadsheet and I(we) could start developing the program further that way.

Pls help me I beg u

Answers

Self attribute skills

What does // this mean in your code?

Answers

Floor division

For example:-

11//5=2

Some more :-

[tex]\boxed{\begin{array}{c|c}\sf * &\sf Multiplication \\ \sf ** &\sf Exponention \\ \sf \% &\sf Remainder \\ \end{array}}[/tex]

In 1981, Ian Murphy broke into the AT&T online computer system and changed their clocks, allowing people to make calls during the day at a discounted rate. Based on the list of defining factors for computer crimes, what best describes Murphy's crime?

A.
intentionally disrupting, degrading, or destroying information or services on a computer

B.
disclosing any data or information obtained through illegal online activity

C.
knowingly receiving or holding onto any data or information obtained through illegal online activity

D.
intentionally or recklessly tampering with, taking, transferring, concealing, altering, or damaging physical computer equipment

Answers

a. intentionally or recklessly disrupt, degrade, or destroy information or services on the computer

3- It is an Information page that is displayed through one of the Internet browsers, it can be saved along htm, html page.
a. Dynamic website
f. Static website
b. Ecommerce site
c. Social media sites​

Answers

Answer:

f. Static website

Explanation:

HTML stands for hypertext markup language. It is the standard markup language for web pages that define the structure of the content. These elements are the building blocks of any website.

HTML (Hypertext Markup Language) is the code that is used to structure a web page and its content. For example, content could be structured within a set of paragraphs, a list of bulleted points, or using images and data tables.

Static web pages are often HTML documents stored as files in the file system and made available by the web server over HTTP (nevertheless URLs ending with ". ... Static web pages are suitable for content that never or rarely needs to be updated, though modern web template systems are changing this.

Static website
Hope this will help.

i need freinds.:(plz

Answers

Answer:

Explanation:

sure wassup

Answer:

i'll be your friend!

Explanation:

Question 1 Which portion of the PuTTY package allows you to perform file transfers using the SCP (Secure Copy) protocol?

Answers

There are different aspect of computing. The portion of the PuTTY package that allows you to perform file transfers using the SCP (Secure Copy) protocol is pscp.exe.

The pscp.exe tool commonly called the PuTTY Secure Copy Client is known to be the only portion of the Putty package that can let you copy files to and from remote computers through the use of the SCP.

Secure Copy (SCP)  is simply defined as a computer command that one can use in Linux to copy files from one computer to another on a network.  PuTTY is simply known to be a free implementation of SSH (and telnet) used for computer that running Microsoft Windows.

Learn more about the PuTTY package from

https://brainly.com/question/13171394

How can I master networking my home/business computer(s) - Tv's - iot devices and make the whole system as secure as possible?

Answers

Answer:

you can take guide from

hope this will help you....!

HELP PLEASE!!

which of the following is document content that displays at the top of every page?

Answers

Explanation:

that is a trick question if you need help ask your teacher

Answer:

Title

Explanation:

Question 7 of 10
What are the three main parts to a slide presentation's structure?
A. Thesis statement, supporting evidence, and concluding quotes
B. Main idea, body, and summary
C. Introduction, body, and conclusion

D. Body, conclusion, and references

Answers

Answer:

A

Explanation:

_____ is the method of binding instructions and data to memory performed by most general-purpose operating systems.

Answers

Execution time binding is the method of binding instructions and data to

memory performed by most general-purpose operating systems.

This type of binding is usually done by the processor. It also generates both

logical and dynamic absolute address.  The binding can be delayed if the

process is moved during execution between two or more  memory segment.

This generally  involves binding of instructions and data to the memory of

the operating system.

Read more about Execution time binding here https://brainly.com/question/19344465

What does setTempo() allow you to do in EarSketch?

Answers

Specify the tempo of a song

write 10 place where computer use and it uses​

Answers

Answer:

dynamite ohohoh

Explanation:

nânnananananananann eh

house store school park

how to check amazon gift card balance without redeeming

Answers

Answer:

Follow these steps to check your Amazon gift card balance without redeeming.

1. Locate the gift card's claim code. The claim code is on the back of the card (if it's a physical gift card) or on your email or paper receipt (if it's an electronic gift card). The claim code will be 14 to 15 digits long. If it's a physical gift card, you may need to scratch off the protective coating to find the claim code.

2. Sign in to your Amazon account. You can sign in through the website or the mobile app.

3. Search for the word 'help'. Click the search bar, type 'help', and press Enter or Return to search.

4. Click 'Help and customer service'. This option is located at the top of the screen.

5. Talk to a customer support agent.

Mobile app:

Scroll down and click 'Need More Help?'.Click 'Contact Us'.Click 'Something else'.Click 'I need more help'.

Computer:

Click 'Something else'.Click 'I need more help'.

6. Type 'find the balance of a gift card without redeeming' into the message box. Send the message.

7. Request the balance of your Amazon gift card. Provide the claim code and request the balance. The support agent will check the gift card balance associated with the claim code and provide it to you without redeeming the card.

Please Answer ASAP!!

You must attempt to read past the end of the text file before any end-of-file indicators are set
True
False


Answers

Answer:

I think it's true

Explanation:

Sorry if it's wrong :(

Janet is playing a game in which she interacts with an environment to solve a puzzle and to meet new characters. She really enjoys this game because there are no time constraints or pressure to perform with speed. What genre of game is Janet most likely playing?
A. simulation
B. action
C. adventure
D. sports

Answers

Answer:

C. adventure

Explanation:

is there actually a difference between left and right twix

Answers

one has more caramel and one has more cookie

A process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer�
Question 14 options:

Malicious

Algorithm

Static

Web Browser

Answers

Answer:

Algorithm

Explanation:

differentiate between program virus and boot sector virus

Answers

Answer:

The virus replaces the default program with its own corrupted version. A boot sector virus is able to infect a computer only if the virus is used to boot up the computer. The computer will not be infected if the virus is introduced after the boot-up process or when the computer is running the OS

Explanation:

please mark me brainlisted answer please

Explanation:

i don't know this but i just need the points

This type of RAID implementation uses its own Central Processing Unit (CPU) for calculations on an intelligent controller card by:

Answers

RAID implementation uses its CPU for calculations on an intelligent controller card by a hardware implementation.

Basically, a hardware implementation refers to a job is done using a physical device or electronic circuit rather than been done automatically by the computer program.

Hence, through a hardware implementation, the RAID implementation is able to use its CPU for calculations on an intelligent controller card

Read more about hardware implementation

brainly.com/question/25803633

A student is writing a research paper on astronomy. His teacher has asked that she include a visual aid to explain the scientific concepts in her paper. She has chosen to write about the moon, and she wants to use a visual aid to show what the surface of the moon looks like.

Which visual aid would best support her topic?

Answers

Answer: a map showing the different sizes of the moon's craters

Explanation:

the reason for this is because the student wants to show what the surface of the moon looks like.

A state in which two things are able to exist or occur together without problems or conflict...
Question 18 options:

Compatibility

Prototype

Packet

Static

Answers

Answer:

Compatibility

Explanation:

that's the definition of compatibility.

What is a banner grab?

Answers

Banner Grabbing is a technique used to gain information about a computer system on a network and the services running on its open ports. Administrators can use this to take inventory of the systems and services on their network.

Hope you find this helpful!
Brainliest and a like is much appreciated!

....................................................................................................

Answers

Answer:

......................

..............

......

....

...

..

.

Other Questions
Which of the following is an economic change Americans faced after WW1?a)shortage of country-made goodsb)loss of landc)forced to pay reparitions Case: Brown v. Board of Education, Topeka -How might life be different for society today if the court had ruled the opposite way? Students should read all questions carefully and choose the appropriate answer,1. The greatest asset of any country is the:1 pointeconomic growthnatural resourcespeopletourist industry Which action most contributed to an international economic crisis during the early years of the Great Depression?. GIVING BRAINLIEST. please help. In documentary filmmaking, why is it typical for a filmmaker to write a script after the film is shot? a derpartment store sell 152 pair of jeans for 29 each. which is the best estimate of the total sales for the jeans Select all equations that represent this question:Priya is stacking building blocks to make a tower. She takes a break when the tower is 2 1/2 feet tall, which is 5/8 of the hight of the tower she wants ti build. How tall is the tower when finished? For a project in her Geometry class, Makayla uses a mirror on the ground to measure the height of her school building. She walks a distance of 13.75 meters from the school, then places a mirror on flat on the ground, marked with an X at the center. She then steps 1.2 meters to the other side of the mirror, until she can see the top of the school clearly marked in the X. Her partner measures the distance from her eyes to the ground to be 1.35 meters. How tall is the school? Round your answer to the nearest hundredth of a meter. Find sin(a-B), if cosa=1/3, cosB=1/4, a=(0;180), B(-90;0) A neuron that stimulates the gastrocnemius muscle receives signals from multiple areas of the brain. This is an example of Q2. Fill in the blank with correct words.A: Chemical B: Horizontal C: Shells D: Columns E: Group VII1) The vertical ___________are called groups and the_____________rows are called periods.2) Elements in the same groups have the same number of electrons in their outer_______________ for example, all the elements in ___________ have 7 electrons on their outer shells.3) Elements in the same group have similar ___________ and physical properties what is equivalent to 1 1/3 and 3/4 using 12 as the denominator tortoise shells and snail shells are similar in function to protect the organism from predators based on a comparison of the organisms in the images what can you conclude Solve for m.m 7/8 = 5Write your answer as a fraction or as a whole or mixed number.m = ____ Graph the solution to this system of linear inequalities, and describe the meaning of the intersection of all 3 inequalities. HELP ASAP PLEASE!!! I still dont understand slope can someone help? The shape on the left is transformed on the right.Which of the statements describes the transformation. When did the us gain territories and become an imperial power? true or false in a chemical reaction some of the atoms will be changed into different type of atoms