Start learning 50% faster. Sign in now
I > V > G ≥ R > K I > K. Hence conclusion I is not true.
I > V > G ≥ R > K ≥ M I > M. Hence conclusion II is true.
G ≥ R > K ≥ M > N G > N. Hence conclusion III is true.
A user communicates with a computer with the help of:
Which of the following is a program that uses a variety of different approaches to identify and eliminate spam?
The pathway for transferring instructions between the processor and memory is _______.
A software firewall can help protect your computer but at the same time can cause issues with your ..........................
Damodar Mauzo has received the prestigious Jnanpith Award, the country's highest literary honor.He belongs to which state?
A computer network which is used within a building is called a:
A modern digital computer represents data using _________________.
Which generations computers operate Artificial Intelligence technology and ULSI Technology?
An automated reply system in an email server is called:
Which of the following is not a command in Insert tab ?