Use app×
Join Bloom Tuition
One on One Online Tuition
JEE MAIN 2025 Foundation Course
NEET 2025 Foundation Course
CLASS 12 FOUNDATION COURSE
CLASS 10 FOUNDATION COURSE
CLASS 9 FOUNDATION COURSE
CLASS 8 FOUNDATION COURSE
0 votes
4.5k views
in Information Technology by (59.7k points)
recategorized by

Fill in the blanks

(i) Viruses, worms and trojans are collectively named ________________.

(ii) Cellspacing attribute is used with ______________ tag. 

(iii) _____________ is a program which makes you view the information on the World Wide Web.

(iv) Collection of Web Pages is called _____________. 

(v) Columns of a table are specified using __________tag.

(vi) _________ can replicate itself automatically .

(vii)_________ attribute is used with <A> tag to specify the URL of link.

(viii) ___________ is type of program that is installed on a user’s computer to collect information about user.

(ix) XML attribute value should always be enclosed in _______________ .

(x) ______________is a program that appears harmless but actually performs malicious functions.  

1 Answer

+1 vote
by (88.9k points)
selected by
 
Best answer

(i)  Malware

(ii) <table>

(iii)  Web browser

(iv) Website

(v) <td>

(vi) Worm

(vii) href

(viii)  Spyware

(ix) Quotes

(x) Trojan Horse 

Welcome to Sarthaks eConnect: A unique platform where students can interact with teachers/experts/students to get solutions to their queries. Students (upto class 10+2) preparing for All Government Exams, CBSE Board Exam, ICSE Board Exam, State Board Exam, JEE (Mains+Advance) and NEET can ask questions from any subject and get quick answers by subject teachers/ experts/mentors/students.

Categories

...