Equestions.com
हिंदी
मराठी
English
Technology/Mobile — English
What technology underlies blockchain for cryptocurrency transactions?
The technology that underlies blockchain for cryptocurrency transactions is a decentralized ledger system. This technology ensures that all transactions are...
Added: 06 Mar 2002
Updated: 19 Nov 2025
ℹ️
What is a major benefit of using virtual machines?
A major benefit of using virtual machines is their ability to allow multiple operating systems to run on a single...
Added: 06 Mar 2002
Updated: 02 Nov 2025
ℹ️
What is the standard markup language for creating web pages?
The standard markup language for creating web pages is HTML (Hypertext Markup Language). HTML structures content on the internet, allowing...
Added: 06 Mar 2002
Updated: 07 Nov 2025
ℹ️
What kind of attack involves overwhelming a system with traffic to disrupt services?
A DDoS attack (Distributed Denial-of-Service) involves overwhelming a system with excessive traffic to disrupt services and render it unavailable to...
Added: 06 Mar 2002
Updated: 03 Nov 2025
ℹ️
Which language is predominantly used for statistical computing and graphics?
The language predominantly used for statistical computing and graphics is R. R provides a robust platform for data analysis, statistical...
Added: 06 Mar 2002
Updated: 17 Nov 2025
ℹ️
What type of computer memory is volatile and loses data when powered off?
The type of computer memory that is volatile and loses data when powered off is called RAM (Random Access Memory)....
Added: 05 Mar 2002
Updated: 05 Nov 2025
ℹ️
What does the term "big data" refer to in technology?
The term "big data" refers to the vast volume of structured and unstructured data generated every second from various sources,...
Added: 05 Mar 2002
Updated: 15 Nov 2025
ℹ️
What is the primary purpose of cloud computing?
The primary purpose of cloud computing is to provide scalable and flexible access to computing resources over the internet. This...
Added: 05 Mar 2002
Updated: 30 Nov 2025
ℹ️
What technology uses electromagnetic fields to identify and track tags attached to objects?
The technology that utilizes electromagnetic fields to identify and track tags attached to objects is known as Radio Frequency Identification...
Added: 05 Mar 2002
Updated: 06 Nov 2025
ℹ️
Which protocol is used for secure communication over a computer network?
The protocol used for secure communication over a computer network is called Transport Layer Security (TLS). TLS is designed to...
Added: 05 Mar 2002
Updated: 25 Nov 2025
ℹ️
What component of a computer is responsible for processing instructions?
The component of a computer responsible for processing instructions is the central processing unit (CPU). Often referred to as the...
Added: 05 Mar 2002
Updated: 04 Nov 2025
ℹ️
What does “open source” mean in relation to software development?
"Open source" in relation to software development refers to software that is made available with its source code, allowing anyone...
Added: 05 Mar 2002
Updated: 11 Nov 2025
ℹ️
Which company is known for its search engine and digital advertising services?
The company known for its search engine and digital advertising services is Google. Founded in 1998, Google has become a...
Added: 05 Mar 2002
Updated: 28 Nov 2025
ℹ️
What technology is often used to create virtual reality environments?
Virtual reality (VR) environments are commonly created using technology such as VR headsets, motion-tracking sensors, and powerful computers or gaming...
Added: 05 Mar 2002
Updated: 06 Nov 2025
ℹ️
What is the main function of an operating system on a computer?
The main function of an operating system on a computer is to manage hardware and software resources, acting as an...
Added: 05 Mar 2002
Updated: 22 Nov 2025
ℹ️
What device converts digital signals into analog signals in telecommunications?
The device that converts digital signals into analog signals in telecommunications is called a modem. Modems allow digital data from...
Added: 05 Mar 2002
Updated: 07 Nov 2025
ℹ️
What type of software is designed to prevent, detect, and remove malware?
The type of software designed to prevent, detect, and remove malware is called antivirus software. This software scans for harmful...
Added: 05 Mar 2002
Updated: 23 Nov 2025
ℹ️
Which programming paradigm is primarily associated with the use of objects?
The programming paradigm primarily associated with the use of objects is object-oriented programming (OOP). OOP is centered around the concept...
Added: 05 Mar 2002
Updated: 04 Nov 2025
ℹ️
What technology allows for wireless communication over short distances between devices?
The technology that allows for wireless communication over short distances between devices is known as Bluetooth. Bluetooth technology enables devices...
Added: 05 Mar 2002
Updated: 02 Nov 2025
ℹ️
What is the term for a self-replicating program that spreads without human intervention?
The term for a self-replicating program that spreads without human intervention is "worm." A worm can propagate itself across networks...
Added: 05 Mar 2002
Updated: 03 Nov 2025
ℹ️
« Prev
1
…
979
980
981
982
Next »
💬
⬆️
Ask a Question (AI)