InterviewSolution
Saved Bookmarks
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 6501. |
the combination of bus and star topology is called |
| Answer» | |
| 6502. |
What is microbloging |
| Answer» Microblogging is an online broadcast medium that exists as a specific form of blogging. A micro-blog differs from a traditional blog in that its content is typically smaller in both actual and aggregated file size. | |
| 6503. |
What is the disadvantages of satellite internet connection |
| Answer» If a satellite stops working, a large group of internet users can\'t acess internet. | |
| 6504. |
How can you create radio button and drop-down list? Explain |
| Answer» When you are editing or creating a sign up form, click the "Create A New Field" button to produce a new field.In the popup that appears, select either you would like a "Select Box" (drop down) or "Radio" button field.When you click on your selection, you will be prompted to enter your choices. | |
| 6505. |
Write any three rules to be followed while chatting on internet |
| Answer» 1. Never use abusive or indecent language while chatting .2. never disclose any personal information on the net .3. Always use a secure chat room. | |
| 6506. |
Write any three points to be kept in mind cleaning the computer |
| Answer» \t\tWipe down your computer\tDust off the outside of your computer with a soft, dry cloth at least once a week. Remove any fingerprints on the screen. If you want to use a cleaning fluid, visit a computer store to find one that’s specifically designed for your monitor type.Regular household cleaners may damage a monitor screen, wearing away coatings.Instead, gently wipe your screen with a soft cloth. A microfiber cloth is great for this purpose.You can dampen your cloth with distilled or filtered water to wipe away tougher smudges. Plain water usually works, too, but filtered or distilled water will help you avoid streaks.If heavier cleaning is needed, moisten a cloth with a 50-50 mix of distilled water and distilled white vinegar and gently rub your screen clean.To clean the front and back of your laptop case, use a clean sponge that’s been dipped in mild dish soap and water and wrung out. Rub gently.Make sure your computer is dry before turning it back on.\t\tClean Your keyboard\tPick up your keyboard, turn it over, and gently pat it on the back to dislodge crumbs, stray hairs, and other tiny bits of dirt. If you’re having trouble removing sticky dirt, try using a cotton swab dipped in rubbing alcohol, or the cleaning mixtures mentioned above.\t\tBlow dust buildup out of computer vents, fans and accessories\tEvery three to six months, consider using a screwdriver to open your computer’s exterior case. With a can of compressed air (available at any computer store), clean the dust buildup out of the fan and the case. Put the case back together and use cotton swabs to pick up any lingering dirt on the fan vents or other small crevices on the outside of the case.For laptops, check the manual for instructions on cleaning or safe case opening. | |
| 6507. |
Solarization option is associated with? |
| Answer» Assuming it to be Science question , I am Answering :ANSWERSolarization is the destruction of chlorophyll molecules. It is prevented by carotenoids . C3\u200b\xa0plants may not have the necessary amount of carotenoids and hence , due to solarization, their chlorophyll molecules get destroyed . | |
| 6508. |
Define the term (a) smps (b) mouse |
| Answer» | |
| 6509. |
What are sticky key ? |
|
Answer» Sticky key is an accessibility option available in windows computers. It is benefial for people with physical disability under it is like shift control and Alt are are activated until early next key is pressed for example with this feature on if you click on control and then press a then the result will be equal to to control plus a pressed simultaneously. Html \xa0Sticky Keys\xa0is a Microsoft Windows accessibility feature that causes modifier\xa0keys\xa0to remain active, even after they were pressed and released, making it easier to use keyboard shortcuts. |
|
| 6510. |
Define chromatics |
| Answer» | |
| 6511. |
Koi chat karega |
| Answer» Nddudsjushs hi suzvzis | |
| 6512. |
What is computer accessibility ? |
|
Answer» Computer accessibility is the user friendliness of a computer for all regeardless of our disabilities or impairment. Computer accessibility refers to the accessibility of a computer system to all people, regardless of disability type or severity of impairment.There are many disabilities or impairments that can be a barrier to effective computer use. |
|
| 6513. |
Write a short note on history and evaluation of html |
| Answer» A Hypertext Markup Language was originally designed and developed in 1989 by researcher named Tim Berners Lee at CERN the European Physical Laboratory in Geneva, Switzerland. CERN researcher Angina developed the first world wide web program in 1990 and began releasing programs to Internet users in 1991.\xa0This HTML is a subset of SGML (Standard Generalized Markup Language). This SGML was developed at IBM (International Business Machine) in 1986 to define markup language.\xa0Now a days HTML has become very popular with its mechanisms for style sheets, scripting, frames, embedding objects, support of various directions to text, tables, frames. | |
| 6514. |
What is meant by cyberethics |
| Answer» Cyber ethics is the study of ethics pertaining to computers, covering user behavior and what computers are programmed to do. | |
| 6515. |
What Are The Different types of Blogs? Explain. |
|
Answer» Dhhd7 ty4674737373rh7t7ruuryur777t Mustafa khan |
|
| 6516. |
What is cyber crime. |
| Answer» Cybercrime is criminal activity that either targets or uses a computer, a computer network or a networked device.Most, but not all, cybercrime is committed by cybercriminals or hackers who want to make money. Cybercrime is carried out by individuals or organizations.Some cybercriminals are organized, use advanced techniques and are highly technically skilled. Others are novice hackers.Examples:\tEmail and internet fraud.\tIdentity fraud (where personal information is stolen and used).\tTheft of financial or card payment data.\tTheft and sale of corporate data. | |
| 6517. |
Which portion of the URL below records the directry or folder of the desired resoirce |
| Answer» Which portion of URL below records the directory or folder of desired resource:http://www.some store .com/firstfloor/shoes.htma. httpb. first floorc. shoes.htmd. www.some store.comAnswer : C\thttp stands as a standard protocol\tWWW stands for sub domain\tSome store. Com stands for the domain and domain suffix\tFirstfloor stands for the directories\tShoes.com stands for the web page. | |
| 6518. |
Chapter 1st |
| Answer» | |
| 6519. |
A method of sending and receiving messages through computer via the internet is known as |
| Answer» There are mainly two ways you can log in your WhatsApp account on a computer to chat with your WhatsApp contacts or contacts groups from a PC or Mac. You can download WhatsApp for Windows PC or Mac on to your laptop or desktop from this link. You can also visit WhatsApp for web through this URL,\xa0then run WhatsApp on your phone, find WhatsApp Web on the phone, and use it to scan the QR code displays in the WhatsApp for web page, you will then be logged in WhatsApp account on computer.\xa0 | |
| 6520. |
____and____ options on the file menu help you to show or hide the time and date on the dates |
| Answer» | |
| 6521. |
NCERT question answer |
| Answer» | |
| 6522. |
You can click sum icon on ___ bar |
|
Answer» Yes madharchod kya padhte ho bhosdike |
|
| 6523. |
Which key of a relation is always a minimal keys? |
| Answer» Candidate key is a set of attributes (or attribute) which uniquely identify the tuples in a relation or\xa0table. As we know that\xa0Primary key\xa0is a minimal\xa0super key, so there is one and only one\xa0primary key\xa0in any relation but there is more than one candidate key can take place.\xa0A superkey is a set of attributes within a table whose values can be used to uniquely identify a tuple. A candidate\xa0key\xa0is a\xa0minimal\xa0set of attributes necessary to identify a tuple; this is also called a\xa0minimal\xa0superkey | |
| 6524. |
What is a web service ? Discuss tje various web services in brief |
| Answer» \t\tWeb services are XML-based information exchange systems that use the Internet for direct application-to-application interaction. These systems can include programs, objects, messages, or documents.\t\t\tA web service is a collection of open protocols and standards used for exchanging data between applications or systems. Software applications written in various programming languages and running on various platforms can use web services to exchange data over computer networks like the Internet in a manner similar to inter-process communication on a single computer. This interoperability (e.g., between Java and Python, or Windows and Linux applications) is due to the use of open standards\t | |
| 6525. |
SHIFT, CTRL AND, ALT keys are general, Modifier, toggle |
| Answer» No these keys are sticky keys | |
| 6526. |
Please give me chapter digital notes |
| Answer» | |
| 6527. |
Syllabus of Information Technology |
| Answer» HRD Minister Ramesh Nishank announced a major CBSE syllabus reduction for the new academic year 2020-21 on July 7 which was soon followed by an official notification by CBSE on the same.Considering the loss of classroom teaching time due to the Covid-19 pandemic and lockdown, CBSE reduced the syllabus of classes 9 to 12 with the help of suggestions from NCERT.Click on the respective link:\tRevised Curriculum for the Academic Year 2020-21 \t | |
| 6528. |
write a html coding to display horizontal line of green color |
|
Answer» \xa0 Explanation :The\xa0HTML color Attribute\xa0is used to specify the color of a Horizontal rule. It is not supported by HTML 5.Syntax: Attribute Values:\tcolor_name:\xa0It sets the Text color by using the color name. For example “red”.\thex_number:\xa0It sets the text color by using the color hex code. For example “#0000ff”.\trgb_number:\xa0It sets the text color by using the rgb code. For example: “RGB(0, 153, 0)”. |
|
| 6529. |
What are the most common disabilities for which window 7 provides solutions |
| Answer» The most common disability for which window 7 provide solution , the most important is the support of the OS is the support for the updates,\xa0sometimes in many cases when the update is not wanted by the user then at that times, many times the users are\xa0forced to install update.The other tools which are quiet helpful are the ease of access,\xa0where the computer can also receive commands by the voice of users,\xa0and virtual key boards and many more things are there for ease of use. | |
| 6530. |
Write the HTML code to create an image named ‘Monument.gif ’ as a hyperlink to india.html? |
Answer» \xa0Here, in this program the\xa0essential code\xa0lies in the\xa0\xa0tag.\xa0\xa0is used to create an hyperlink. According to the question instead of text as hyperlink, we are using\xa0image\xa0as an\xa0hyperlink. So\xa0 |
|
| 6531. |
Where is the styles deck available on the Writer interface ? |
| Answer» Borders: All borders, such as the text area border, the cell borders on a table, or OLE object borders, show in grey to help the author during editing. Those borders are not printed nor exported to PDF. It is possible to change the color of those borders (or eliminate them completely). To change border displays, choose OpenOffice → Preferences → Appearance and adjust settings under "Text boundaries", "Object boundaries" and "Table boundaries".Objects inserted automatically: Objects such as the table of contents and the fields show a grey background. This background is not printed nor exported to PDF; it is there during editing only. You can modify that background in the same Appearance menu. There are separate options for "Field shadings" and "Index and table shadings". | |
| 6532. |
.......which help improves consistency in the document |
| Answer» | |
| 6533. |
What are the steps in formatting a comment ? |
| Answer» | |
| 6534. |
Describe the meaning and importance of sustainable development |
|
Answer» *Meaning* [development should take place without damaging the environment and development in the present should not compromise the needs of future generations.] Sustainable development can be defined as an approach to the economic development of a country without compromising the quality of the environment for future generations. In the name of economic development, the price of environmental damage is paid in the form of land degradation, soil erosion, air & water pollution, deforestation, etc. This damage may surpass the advantages of having more quality output of goods and service.Sustainable development can be achieved if we follow the following points,\tRestricting human being\tTechnological development should be input effective and not input utilizing\tThe rate of consumption should not surpass the rate of salvation\tFor renewable resources, the rate of consumption should not surpass the rate of production of renewable substitutes.\tAll types of pollution should be minimized\tSensible use of Natural Resources |
|
| 6535. |
Chapter 3&4 |
| Answer» | |
| 6536. |
Explain the components that make up an email address. Give an example of a valid email address. |
| Answer» | |
| 6537. |
Write a short note on blogging? |
| Answer» The action of maintaining/writing a blog – While blogging, I’m able to share information that I feel is important, helpful or interesting for others. | |
| 6538. |
I need notes |
| Answer» I need notes | |
| 6539. |
where can i get the computer applications textbook pdf? |
|
Answer» The below link is of computer applications class 10 code 165. https://drive.google.com/file/d/1_htq6bGW5NRBDVvvynjbmc-0JOkNhzOt/view?usp=drivesdk Of which code? |
|
| 6540. |
Explain any three character of text formating option in a word document. |
|
Answer» ? There are three character formatting options are1)Font face2)Font size3)Font colourRules for using character formattinga)Open new document in Word Processor and write paragraphb)select words or group of words that you write in paragraph and want to change its character.How to use1)font face=after select words you need to click font group to select particular font style from font list.2)font size=similarly use this process and use font size in font list.3)font colour=it is also available in font list according to your choices you choose many colours of text. |
|
| 6541. |
Software privacy refers to unauthorized |
| Answer» Software piracy is the unauthorized use, copying or distribution of copyrighted software. It may take many forms, including: Unauthorized copying of software programs purchased legitimately, sometimes known as "end-user" piracy. | |
| 6542. |
Where the chapter of computer applications |
| Answer» | |
| 6543. |
What is the communication |
| Answer» Communication is simply the act of transferring information from one place, person or group to another.Every communication involves (at least) one sender, a message and a recipient. This may sound simple, but communication is actually a very complex subject.The transmission of the message from sender to recipient can be affected by a huge range of things. These include our emotions, the cultural situation, the medium used to communicate, and even our location. The complexity is why good communication skills are considered so desirable by employers around the world: accurate, effective and unambiguous communication is actually extremely hard.\xa0\xa0 | |
| 6544. |
Advantages of e mail |
|
Answer» Advantages\tEmails are delivered extremely fast when compared to traditional post.\tEmails can be sent 24 hours a day, 365 days a year.\tWebmail means emails can be sent and received from any computer, anywhere in the world, that has an\xa0internet connection .\tCheap - when using broadband , each email sent is effectively free. Dial-up users are charged at local call rates but it only takes a few seconds (for conventional email, eg text only) to send an email.\tEmails can be sent to one person or several people. Pooo |
|
| 6545. |
Is a html document on www containing hyperlink |
| Answer» Yes | |
| 6546. |
What is social networking what are its benefits? |
| Answer» Social networking is the use of Internet-based\xa0social media\xa0sites to stay connected with friends, family, colleagues, customers, or clients. Social networking can have a social purpose, a business purpose, or both, through sites such as Facebook, Twitter, LinkedIn, and Instagram, among others. Social networking has become a significant base for marketers seeking to engage customers.The benefits of social networking are :1. Social networking gives you a chance to connect with people around the world.2. This technology gives us access to easy, instant communication tools.3. Information happens in real-time blocks on social networks.4. Social networking creates brand exposure for businesses.5. Being on a social network is a lot of fun. | |
| 6547. |
How to learn c# for unity |
| Answer» | |
| 6548. |
ncert solution of computer chapter 1 class 10 cyber beans |
| Answer» | |
| 6549. |
I want to download computer application book for class 10 CBSCE board |
|
Answer» By Amazon how I want to download computer application book for class 10 |
|
| 6550. |
I want to download computer application CBSE class 10th book |
| Answer» | |