> Computer

Computer

Popular Questions & Answers

      • A:
        Hacking a computer is not an easy task to do, there are whole lot tricks and techniques involved in this. If you really want to learn it, then you can join an ethical hacking co...
        101
      • A:
        Master boot record (MBR), it is also known as sector 0, It is a small sector in the hard drive of a computer which initiates the boot process. As soon as we turn ON our computer...
        101
      • A:
        In most of the cases you may get the password on the same website from where you have downloaded the game, else you can get it from some other website. Try it on google, you may...
        101
      • A:
        The full form of DHCP is Dynamic Host Configuration Protocol. It is used to generate the IP address of the computers and networking devices on a network.
        201
      • A:
        BIOS stands for "Basic Input-Output System" and all the computers have a BIOS. The mail function of BIOS is to make sure that all the Hardware components of a computer are worki...
        101
      • A:
        The Internet Protocol (IP) is the most important communication protocol in the Internet protocol suite and was developed in 1970s. It is responsible for converting application i...
        102
      • A:
        Really Simple Syndication (RSS), it is commonly known as RSS feeds which is used to flash or share headlined or other web contents. This web content is designed in light weight ...
        201
      • A:
        CAPTCHA in terms of computer is "Completely Automated Public Turing test to tell Computers and Humans Apart". It is used to determine that whether the user is human or not. It ...
        125401
      • A:
        "Bob Taylor" was the one who was the inventor of the Intra-Net, he documented his this idea in late 1996.
        187201
      • A:
        In computing, booting is the initial set of operations that a computer system performs after electrical power to the CPU is switched on or when the computer is reset
        143503
      • A:
        Temporary files are termed as temp files, as the name suggests these files are the temporary files which are created temporarily by a program, as soon the program is closed the ...
        17802
      • A:
        You can download the required drivers from the link provided https://downloadcenter.intel.com/default.aspx all you need to do is just fill the details of your operating system a...
        13701
      • A:
        The VLV media player is also known as VLC, and it its an abbreviated form of "VideoLAN Client". This is one of the best players of would say, it can play almost all the audio an...
        1501
      • A:
        The division of Hard drives into smaller space segments in order to manage the space in the drive in a computer is called as Hard-Disk Partition. One can make the partition acco...
        201
      • A:
        The fifth generation computers are the computing devices that are based on the artificial intelligence. These devices are currently in development and voice recognition is one o...
        40401
      • A:
        Windows 8 is the latest and recently launched version of Windows by Microsoft Corporation. The cost of a computer depends on its configuration that includes CPU, RAM, motherboar...
        144201
      • A:
        It is a cyber crime to hack someone's account and you should not do this and asking such things on internet is not at all a good idea.
        10901
      • A:
        The modem is a networking device which is used to convert digital data into analog and vice versa. It helps a computer to communicate with electronic devices, it is mainly used ...
        231701
      • A:
        You can upgrade your windows 7 to windows 8, you will easily get an upgrade disk and all you need to do is to just put that disk in your computer and upgrade your OS. You can a...
        213801
View next 30