Explore topic-wise InterviewSolutions in Class 11.

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your Class 11 knowledge and support exam preparation. Choose a topic below to get started.

401.

How are the folllowing code fragments different from one another?

Answer»
402.

What are tokens...?

Answer» The smallest individual unit in a program is called as\xa0Token\xa0or a\xa0lexical unit.Python has following tokens:Keywords Identifiers Literals Operators Punctuators
403.

Computer ke descriptive paper me kaise question aate hai

Answer»
404.

What are special litrels..?

Answer»
405.

Meaning of computer in Hindi... ¿

Answer» संगणक $$संगणक$$
406.

Easiest programming language to learn....¿?

Answer» $$HTML$$
407.

Write different type of string is supported in python

Answer» There are seven sequence\xa0types:\xa0string, Unicode\xa0string, list, tuple, bytearray, buffer, and xrange objects. Sequence can be mutable or immutable. Immutable sequence is a sequence that cannot be changed after it is created.
408.

Write logical expression for the followingName is riya and age is between 10 to 15

Answer»
409.

Koi ek image yaha daalo koi bhi jo padi hai clipboard mai

Answer»
410.

Mera niche wala ques computer ka blank

Answer»
411.

What are joins? Explain types of join?

Answer»
412.

Wo to hai kuch impossible nhi

Answer»
413.

What is concatenation

Answer» Concatenate\xa0means to link things together.
414.

how can i safely browse th internet

Answer»
415.

What is priority scheduling

Answer» Heyy<br>Priority scheduling algorithm executes the processes depending upon their priority. Each process is allocated a priority and the process with the highest priority is executed first. Priorities can be defined internally as well as externally. Internal priorities are decided by the system depending upon the number of resources required, time needed etc. whereas external priorities are based upon the time in which the work is needed or the amount being paid for the work done or the importance of process. Priority scheduling can be preemptive or non- preemptive.Note –\tIf two processes have the same priority then tie is broken using FCFS.\tThe waiting time for the highest priority process is always zero in preemptive mode while it may not be zero in case of non preemptive mode
416.

Which is the purpose of language processor

Answer» A language processor is a software program designed or used to perform tasks, such as processing program code to machine code. Language processors are found in languages such as Fortran and COBOL.<br>language processors is used to convert highlevel language to machine language<br>A\xa0language processor\xa0is a software program designed or used to perform tasks, such as processing program code to machine code.\xa0Language processors\xa0are found in\xa0languages such as Fortran and COBOL.
417.

Which of the following memory size is largest (1) 1024 KB, (2) 220MB, (3) 1GB (4) 230 Bytes

Answer» ✓3) 1GB✓230 bytes<1024Kb<220Mb<1Gb
418.

Which digits are used in Hexadecimal number system

Answer» In the\xa0hexadecimal number system, the numbers are represented with base 16. It is also pronounced sometimes as\xa0‘hex’. Just like the\xa0binary number, octal number and decimal number\xa0whose base representation are 2, 8 and 10, respectively, the hexadecimal conversion is also possible which can be represented in a table. This concept is widely explained in the syllabus of Class 9. The\xa0list of 16 hexadecimal digits\xa0with their decimal, octal and binary representation is provided here in the form of a table, which will help in number system conversion.\xa0
419.

Convert decimal number 781 to its binary equivalent

Answer» To convert decimal number 781 to binary, follow these steps:Divide 781 by 2 keeping notice of the quotient and the remainder.Continue dividing the quotient by 2 until you get a quotient of zero.Then just write out the remainders in the reverse order to get binary equivalent of decimal number 781.Using the above steps, here is the work involved in the solution for converting 781 to binary number:781 / 2 = 390 with remainder 1390 / 2 = 195 with remainder 0195 / 2 = 97 with remainder 197 / 2 = 48 with remainder 148 / 2 = 24 with remainder 024 / 2 = 12 with remainder 012 / 2 = 6 with remainder 06 / 2 = 3 with remainder 03 / 2 = 1 with remainder 11 / 2 = 0 with remainder 1Then just write down the remainders in the reverse order to get the answer, The decimal number 781 converted to binary is therefore equal to :1100001101Here are some examples of converting decimal to binary
420.

Brief about cloud computing.

Answer»
421.

Explain the component of CPU a long with diagram.

Answer» Every computer system has the following three basic components:\tInput unit:\xa0These components help users enter data and commands into a\xa0computer\xa0system.\tCentral processing unit:\xa0After receiving data and commands from users, a computer system now has to process it according to the instructions provided. Here, it has to rely on a component called the central processing\xa0unit.\xa0\tOutput unit:\xa0The third and final component of a computer system is the output unit. After processing of data, it is converted into a format which humans can understand. After conversion, the output units displays this data to users.
422.

Why NAND and NOR gate are known as universal gate explain with diagram .

Answer» NAND Gate is called Universal Gates because all the other gates (NOT, AND, OR and NOR)can be created by using this gate.
423.

What is the program syntax for \'hello world\' in python

Answer» print("Hello World")
424.

Justify the following statement:“Storage of data is cost-effective and time saving incloud computing

Answer» Cloud storage is a model of computer data storage in which the digital data is stored in logical pools. The physical storage spans multiple servers (sometimes in multiple locations), and the physical environment is typically owned and managed by a hosting company.
425.

What is list and tupple.....??

Answer» list can be created in python by taking items in square brackets and tuples can be created by taking items in round brackets
426.

What is program ?

Answer» Program is a word spelt in english as same and pronounced as प्रोग्राम
427.

Prince ji yaha latex use krna sikhiye $$\\boxed{Aese\\ krte\\ hai\\ ji }$$

Answer» $$\\boxed{HAPPY\\ DEEPAWALI }$$<br>Then keep it up dont ask?<br>Ok ji BT who r u ??? By the ya muja KR naa aata h vo by mistake hua tha
428.

Input a number & check whether it is a prime palindrome number or not

Answer» A\xa0palindromic prime\xa0(sometimes called a\xa0palprime) is a prime number that is also a palindromic number.Given a number n, print all palindromic primes smaller than or equal to n. For example, If n is 10, the output should be “2, 3, 5, 7′. And if n is 20, the output should be “2, 3, 5, 7, 11′.Idea is to generate all prime numbers smaller than or equal to given number n and checking every prime number whether it is palindromic or not.
429.

OKAY T.Y.S.M. #LEGENDARY & #CBSE FOR ANSWERING WHAT I DIDN\'T EVEN ASK...

Answer» Lols<br>WHY R U GIVING ME THIS CONTACT NO. ????!<br>Dont feel bad one person knows my identity and you know it . 8448425258Dont worry check it on whatsapp its an official business contact number
430.

Write a python program that creates a third list after adding two lists.....

Answer»
431.

What is G not phase ? ???????????

Answer» Some cells in the adult animals do not appear to exhibit division (e.g., heart cells) and many other cells divide only occasionally. These cells that do not divide further exist G 1 \u200b phase to enter an inactive stage called quiescent stage (G 0) of the cell cycle. Cells in this stage remain metabolically active but no longer proliferate unless called on to do so depending on the requirement of the organism.
432.

Name an open source word processing software

Answer» A Word processor is a computer program that provides for input, editing, formatting, and output of text. It includes some additional features such as creating, editing, saving, and printing documents.\tMicrosoft Word\tGoogle Doc\tGrammarly\tAutoCrit
433.

Write the program toin python To find the area of the circle

Answer» Area of a circle can simply be evaluated using following formula.<pre>Area = pi * r2where r is radius of circle </pre>Python3<i id="copy-code-button" title="Copy Code">filter_none</i><i id="run-and-edit-button" lang="python3" title="Edit Code">edit</i><i id="run-code-button" lang="python3" title="Run Code and See Output">play_arrow</i><i title="Dark Mode">brightness_4</i>\t<code># Python program to find Area of a circle </code><code>\xa0</code>\xa0<code>def</code> <code>findArea(r): </code><code> </code><code>PI </code><code>=</code> <code>3.142</code><code> </code><code>return</code> <code>PI </code><code>*</code> <code>(r</code><code>*</code><code>r); </code><code>\xa0</code>\xa0<code># Driver method </code><code>print</code><code>(</code><code>"Area is %.6f"</code> <code>%</code> <code>findArea(</code><code>5</code><code>)); </code>\t
434.

Predict the output x=10X=x+10X=x-5Print(x)X,y=x-2,22

Answer»
435.

What is the output of this code x,y=2,6 and x,y=y,x+2

Answer» 6,4
436.

_______ = 4 bit

Answer» 1 nibble =4 bit 1 byte = 8 biy<br>1 nibble
437.

Give three example of secondary device pls any one answer to my question

Answer» Alternatively referred to as external memory, secondary memory, and auxiliary storage, a secondary storage device is a non-volatile device that holds data until it is deleted or overwritten. Secondary storage is about two orders of magnitude cheaper than primary storage.Examples of secondary storageHard driveUSB thumb driveSD cardCDDVDFloppy disketteTape drive
438.

Notes on chapter conditional and looping construct

Answer»
439.

What is data? Give example

Answer» Data used as a plural noun in technical english. Data means facts and information
440.

Pls anyone answer to my question

Answer» Intro]मैं और मेरा भाईसिर्फ मैं और मेरा भाईइन मुश्किलों के बीच में?सिर्फ मैं और मेरा भाईमैं और मेरा भाईसिर्फ मैं और मेरा भाईइन बुज़दिलों के बीच मेंसिर्फ मैं और मेरा भाई[Chorus]मैं और मेरा भाईमैं और मेरा भाई (मेरा भाई)मैं और मेरा भाईमैं और मेरा भाई (मेरा भाई)मैं और मेरा भाईमैं और मेरा भाई (मेरा भाई)मैं और मेरा भाईमैं और मेरा भाई[Verse 1]मैं और मेरा भाई बोले तोह hardshipsHustle की बातचीत हो या bus-on की backseatबदसूरत marksheetहमें पसंद थी मार पीटOne two का four बोले वटा के car keysBirthday के दिन से we been chasing these गाँधीकाले थे बादल अभी धुप में हैं palm treesRap के चक्कर में है , दोनों करते थे partyना कोई बन्दे से काम थे ना कोई बन्दे से काम हैसाथ पीये चिल्लम तब तोह दोस्ती में दम हैभाई मेरा फसा तोह automatic हम हैSticky हुआ scene तब automatic gum हैRide करते साथCake किसी का काटते हम slice करते halfTime बहुत है hard अब हम swipe करते cardमैं और मेरा भाई माँ कसम hardबापू दिए मार, माँ ने दिया लाडहोशियार होने के चक्कर में मत खोना होश यारनफरत कितना भी हो जायेगा मिटा देता है उसको तेरा प्यारमैं मेरा भाईबन्दे हम हैं चाररचे इतिहास हक़ से खुद पे नाज़मैं और मेरा भाईबन्दे हम हैं चाररचे इतिहास हक़ से खुद पे नाज़
441.

What are the four functions of the computer

Answer» Functions of a ComputerData is entered into computer using Input Devices.Data or Instructions are stored in the computer in its memory and processed or uses them as and when required.Data is processed and converted into useful information.Output is generated as per format.Control Mechanism is established for controlling all the functions.
442.

Thermometer is an example of ________ computer

Answer» Analog
443.

________ = 4 bit

Answer»
444.

1giga byte =.........

Answer» 1024 mb
445.

Give three example of secondary device

Answer»
446.

what do you mean by hacker

Answer» A\xa0hacker\xa0is an individual who uses computer, networking or other skills to overcome a technical problem. The term\xa0hacker\xa0may refer to anyone with technical skills, but it often refers to a person who uses his or her abilities to gain unauthorized access to systems or networks in order to commit crimes.Types of Hackers\xa0and What They Do: White, Black, and Grey\t\'Black Hat\'\xa0Hackers. The term “black hat” originated from Western movies, where the bad guys wore black hats and the good guys wore white hats. ...\t\'White Hat\'\xa0Hackers. ...\t\'Grey Hat\'\xa0Hackers. ...\tRootkits. ...\tKeyloggers. ...\tVulnerability Scanner. ...\tSQL Injection Attack. ...\tDistributed Denial-of-Service (DDoS)
447.

stealing of information is an example of

Answer» Identity\xa0theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable\xa0information\xa0(PII), such as Social Security or driver\'s license numbers, to impersonate someone else
448.

who is the father of modern computer ?

Answer» Part III of \'Alan Turing,\xa0Father\xa0of the\xa0Modern Computer\' is a digital facsimile of \'Proposed Electronic Calculator\', Turing\'s 48-page report describing his revolutionary electronic\xa0computing\xa0machine.
449.

What are special gates

Answer»
450.

What are tokens in python how many types of tokens are allowed in python explain with examples

Answer» tokens are smallest individual units in programming.types are:- variable- identifier- keyword- datatype- operater- punctuater- literals