Login
Remember
Register
User rajeshsharma
Wall
Recent activity
All questions
All answers
Ask a Question
Answers by rajeshsharma
0
votes
What is the difference between HTML elements and tags?
answered
Oct 24, 2019
in
HTML
html-elements
html-tags
elements-vs-tag
html-elements-and-tags
0
votes
What is semantic HTML?
answered
Oct 24, 2019
in
HTML
semantic-html
what-is-semantic-html
0
votes
What is the use of details and summary tag in HTML?
answered
Oct 24, 2019
in
HTML
summary-tag
html-summary-tag
0
votes
What is datalist tag?
answered
Oct 24, 2019
in
HTML
datalist-tag
html-datalist
0
votes
How are tags migrated from HTML4 to HTML5?
answered
Oct 24, 2019
in
HTML
html4
html5
html4-vs-html5
0
votes
If I do not put <!DOCTYPE html> will HTML 5 work?
answered
Oct 24, 2019
in
HTML
doctype
0
votes
What is the use of the required attribute in HTML5?
answered
Oct 24, 2019
in
HTML
html-attribute
html5
0
votes
What are the new <input> types for form validation in HTML5?
answered
Oct 24, 2019
in
HTML
html-validation
0
votes
Please explain advantages and disadvantages of hacking?
answered
Oct 22, 2019
in
Ethical Hacking
ethical-hacking
advantage-of-hacking
disadvantages-of-hacking
hacking-advantages
0
votes
How can you avoid ARP poisoning?
answered
Oct 22, 2019
in
Ethical Hacking
arp-poisoning
0
votes
What is the difference between Asymmetric and Symmetric encryption?
answered
Oct 22, 2019
in
Ethical Hacking
asymmetric-encryption
symmetric-encryption
0
votes
What do you understand by footprinting in ethical hacking?
answered
Oct 22, 2019
in
Ethical Hacking
ethical-hacking-footprints
ethical-hacking
0
votes
What are the techniques utilized for foot printing?
answered
Oct 22, 2019
in
Ethical Hacking
ethical-hacking-techniques
0
votes
What do you mean by DOS (Denial of administration) assault?
answered
Oct 22, 2019
in
Ethical Hacking
denial-of-administration
0
votes
What is Pharming and Defacement?
answered
Oct 22, 2019
in
Ethical Hacking
#pharming
#defacement
0
votes
What is Cowpatty?
answered
Oct 22, 2019
in
Ethical Hacking
#cowpatty
0
votes
What is Network Enumeration?
answered
Oct 22, 2019
in
Ethical Hacking
network-enumeration
0
votes
Distinguish between phishing and spoofing?
answered
Oct 22, 2019
in
Ethical Hacking
#phishing
#spoofing
0
votes
Why is Python utilized for hacking?
answered
Oct 22, 2019
in
Ethical Hacking
#python
#use-of-python
python-use
0
votes
What can an ethical hacker do?
answered
Oct 22, 2019
in
Ethical Hacking
ethical-hacker
Page:
« prev
1
...
248
249
250
251
252
253
254
255
256
257
258
...
267
next »
...