

InterviewSolution
Saved Bookmarks
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your Class 11 knowledge and support exam preparation. Choose a topic below to get started.
401. |
How are the folllowing code fragments different from one another? |
Answer» | |
402. |
What are tokens...? |
Answer» The smallest individual unit in a program is called as\xa0Token\xa0or a\xa0lexical unit.Python has following tokens:Keywords Identifiers Literals Operators Punctuators | |
403. |
Computer ke descriptive paper me kaise question aate hai |
Answer» | |
404. |
What are special litrels..? |
Answer» | |
405. |
Meaning of computer in Hindi... ¿ |
Answer» संगणक $$संगणक$$ | |
406. |
Easiest programming language to learn....¿? |
Answer» $$HTML$$ | |
407. |
Write different type of string is supported in python |
Answer» There are seven sequence\xa0types:\xa0string, Unicode\xa0string, list, tuple, bytearray, buffer, and xrange objects. Sequence can be mutable or immutable. Immutable sequence is a sequence that cannot be changed after it is created. | |
408. |
Write logical expression for the followingName is riya and age is between 10 to 15 |
Answer» | |
409. |
Koi ek image yaha daalo koi bhi jo padi hai clipboard mai |
Answer» | |
410. |
Mera niche wala ques computer ka blank |
Answer» | |
411. |
What are joins? Explain types of join? |
Answer» | |
412. |
Wo to hai kuch impossible nhi |
Answer» | |
413. |
What is concatenation |
Answer» Concatenate\xa0means to link things together. | |
414. |
how can i safely browse th internet |
Answer» | |
415. |
What is priority scheduling |
Answer» Heyy<br>Priority scheduling algorithm executes the processes depending upon their priority. Each process is allocated a priority and the process with the highest priority is executed first. Priorities can be defined internally as well as externally. Internal priorities are decided by the system depending upon the number of resources required, time needed etc. whereas external priorities are based upon the time in which the work is needed or the amount being paid for the work done or the importance of process. Priority scheduling can be preemptive or non- preemptive.Note –\tIf two processes have the same priority then tie is broken using FCFS.\tThe waiting time for the highest priority process is always zero in preemptive mode while it may not be zero in case of non preemptive mode | |
416. |
Which is the purpose of language processor |
Answer» A language processor is a software program designed or used to perform tasks, such as processing program code to machine code. Language processors are found in languages such as Fortran and COBOL.<br>language processors is used to convert highlevel language to machine language<br>A\xa0language processor\xa0is a software program designed or used to perform tasks, such as processing program code to machine code.\xa0Language processors\xa0are found in\xa0languages such as Fortran and COBOL. | |
417. |
Which of the following memory size is largest (1) 1024 KB, (2) 220MB, (3) 1GB (4) 230 Bytes |
Answer» ✓3) 1GB✓230 bytes<1024Kb<220Mb<1Gb | |
418. |
Which digits are used in Hexadecimal number system |
Answer» In the\xa0hexadecimal number system, the numbers are represented with base 16. It is also pronounced sometimes as\xa0‘hex’. Just like the\xa0binary number, octal number and decimal number\xa0whose base representation are 2, 8 and 10, respectively, the hexadecimal conversion is also possible which can be represented in a table. This concept is widely explained in the syllabus of Class 9. The\xa0list of 16 hexadecimal digits\xa0with their decimal, octal and binary representation is provided here in the form of a table, which will help in number system conversion.\xa0 | |
419. |
Convert decimal number 781 to its binary equivalent |
Answer» To convert decimal number 781 to binary, follow these steps:Divide 781 by 2 keeping notice of the quotient and the remainder.Continue dividing the quotient by 2 until you get a quotient of zero.Then just write out the remainders in the reverse order to get binary equivalent of decimal number 781.Using the above steps, here is the work involved in the solution for converting 781 to binary number:781 / 2 = 390 with remainder 1390 / 2 = 195 with remainder 0195 / 2 = 97 with remainder 197 / 2 = 48 with remainder 148 / 2 = 24 with remainder 024 / 2 = 12 with remainder 012 / 2 = 6 with remainder 06 / 2 = 3 with remainder 03 / 2 = 1 with remainder 11 / 2 = 0 with remainder 1Then just write down the remainders in the reverse order to get the answer, The decimal number 781 converted to binary is therefore equal to :1100001101Here are some examples of converting decimal to binary | |
420. |
Brief about cloud computing. |
Answer» | |
421. |
Explain the component of CPU a long with diagram. |
Answer» Every computer system has the following three basic components:\tInput unit:\xa0These components help users enter data and commands into a\xa0computer\xa0system.\tCentral processing unit:\xa0After receiving data and commands from users, a computer system now has to process it according to the instructions provided. Here, it has to rely on a component called the central processing\xa0unit.\xa0\tOutput unit:\xa0The third and final component of a computer system is the output unit. After processing of data, it is converted into a format which humans can understand. After conversion, the output units displays this data to users. | |
422. |
Why NAND and NOR gate are known as universal gate explain with diagram . |
Answer» NAND Gate is called Universal Gates because all the other gates (NOT, AND, OR and NOR)can be created by using this gate. | |
423. |
What is the program syntax for \'hello world\' in python |
Answer» print("Hello World") | |
424. |
Justify the following statement:“Storage of data is cost-effective and time saving incloud computing |
Answer» Cloud storage is a model of computer data storage in which the digital data is stored in logical pools. The physical storage spans multiple servers (sometimes in multiple locations), and the physical environment is typically owned and managed by a hosting company. | |
425. |
What is list and tupple.....?? |
Answer» list can be created in python by taking items in square brackets and tuples can be created by taking items in round brackets | |
426. |
What is program ? |
Answer» Program is a word spelt in english as same and pronounced as प्रोग्राम | |
427. |
Prince ji yaha latex use krna sikhiye $$\\boxed{Aese\\ krte\\ hai\\ ji }$$ |
Answer» $$\\boxed{HAPPY\\ DEEPAWALI }$$<br>Then keep it up dont ask?<br>Ok ji BT who r u ??? By the ya muja KR naa aata h vo by mistake hua tha | |
428. |
Input a number & check whether it is a prime palindrome number or not |
Answer» A\xa0palindromic prime\xa0(sometimes called a\xa0palprime) is a prime number that is also a palindromic number.Given a number n, print all palindromic primes smaller than or equal to n. For example, If n is 10, the output should be “2, 3, 5, 7′. And if n is 20, the output should be “2, 3, 5, 7, 11′.Idea is to generate all prime numbers smaller than or equal to given number n and checking every prime number whether it is palindromic or not. | |
429. |
OKAY T.Y.S.M. #LEGENDARY & #CBSE FOR ANSWERING WHAT I DIDN\'T EVEN ASK... |
Answer» Lols<br>WHY R U GIVING ME THIS CONTACT NO. ????!<br>Dont feel bad one person knows my identity and you know it . 8448425258Dont worry check it on whatsapp its an official business contact number | |
430. |
Write a python program that creates a third list after adding two lists..... |
Answer» | |
431. |
What is G not phase ? ??????????? |
Answer» Some cells in the adult animals do not appear to exhibit division (e.g., heart cells) and many other cells divide only occasionally. These cells that do not divide further exist G 1 \u200b phase to enter an inactive stage called quiescent stage (G 0) of the cell cycle. Cells in this stage remain metabolically active but no longer proliferate unless called on to do so depending on the requirement of the organism. | |
432. |
Name an open source word processing software |
Answer» A Word processor is a computer program that provides for input, editing, formatting, and output of text. It includes some additional features such as creating, editing, saving, and printing documents.\tMicrosoft Word\tGoogle Doc\tGrammarly\tAutoCrit | |
433. |
Write the program toin python To find the area of the circle |
Answer» Area of a circle can simply be evaluated using following formula.<pre>Area = pi * r2where r is radius of circle </pre>Python3<i id="copy-code-button" title="Copy Code">filter_none</i><i id="run-and-edit-button" lang="python3" title="Edit Code">edit</i><i id="run-code-button" lang="python3" title="Run Code and See Output">play_arrow</i><i title="Dark Mode">brightness_4</i>\t<code># Python program to find Area of a circle </code><code>\xa0</code>\xa0<code>def</code> <code>findArea(r): </code><code> </code><code>PI </code><code>=</code> <code>3.142</code><code> </code><code>return</code> <code>PI </code><code>*</code> <code>(r</code><code>*</code><code>r); </code><code>\xa0</code>\xa0<code># Driver method </code><code>print</code><code>(</code><code>"Area is %.6f"</code> <code>%</code> <code>findArea(</code><code>5</code><code>)); </code>\t | |
434. |
Predict the output x=10X=x+10X=x-5Print(x)X,y=x-2,22 |
Answer» | |
435. |
What is the output of this code x,y=2,6 and x,y=y,x+2 |
Answer» 6,4 | |
436. |
_______ = 4 bit |
Answer» 1 nibble =4 bit 1 byte = 8 biy<br>1 nibble | |
437. |
Give three example of secondary device pls any one answer to my question |
Answer» Alternatively referred to as external memory, secondary memory, and auxiliary storage, a secondary storage device is a non-volatile device that holds data until it is deleted or overwritten. Secondary storage is about two orders of magnitude cheaper than primary storage.Examples of secondary storageHard driveUSB thumb driveSD cardCDDVDFloppy disketteTape drive | |
438. |
Notes on chapter conditional and looping construct |
Answer» | |
439. |
What is data? Give example |
Answer» Data used as a plural noun in technical english. Data means facts and information | |
440. |
Pls anyone answer to my question |
Answer» Intro]मैं और मेरा भाईसिर्फ मैं और मेरा भाईइन मुश्किलों के बीच में?सिर्फ मैं और मेरा भाईमैं और मेरा भाईसिर्फ मैं और मेरा भाईइन बुज़दिलों के बीच मेंसिर्फ मैं और मेरा भाई[Chorus]मैं और मेरा भाईमैं और मेरा भाई (मेरा भाई)मैं और मेरा भाईमैं और मेरा भाई (मेरा भाई)मैं और मेरा भाईमैं और मेरा भाई (मेरा भाई)मैं और मेरा भाईमैं और मेरा भाई[Verse 1]मैं और मेरा भाई बोले तोह hardshipsHustle की बातचीत हो या bus-on की backseatबदसूरत marksheetहमें पसंद थी मार पीटOne two का four बोले वटा के car keysBirthday के दिन से we been chasing these गाँधीकाले थे बादल अभी धुप में हैं palm treesRap के चक्कर में है , दोनों करते थे partyना कोई बन्दे से काम थे ना कोई बन्दे से काम हैसाथ पीये चिल्लम तब तोह दोस्ती में दम हैभाई मेरा फसा तोह automatic हम हैSticky हुआ scene तब automatic gum हैRide करते साथCake किसी का काटते हम slice करते halfTime बहुत है hard अब हम swipe करते cardमैं और मेरा भाई माँ कसम hardबापू दिए मार, माँ ने दिया लाडहोशियार होने के चक्कर में मत खोना होश यारनफरत कितना भी हो जायेगा मिटा देता है उसको तेरा प्यारमैं मेरा भाईबन्दे हम हैं चाररचे इतिहास हक़ से खुद पे नाज़मैं और मेरा भाईबन्दे हम हैं चाररचे इतिहास हक़ से खुद पे नाज़ | |
441. |
What are the four functions of the computer |
Answer» Functions of a ComputerData is entered into computer using Input Devices.Data or Instructions are stored in the computer in its memory and processed or uses them as and when required.Data is processed and converted into useful information.Output is generated as per format.Control Mechanism is established for controlling all the functions. | |
442. |
Thermometer is an example of ________ computer |
Answer» Analog | |
443. |
________ = 4 bit |
Answer» | |
444. |
1giga byte =......... |
Answer» 1024 mb | |
445. |
Give three example of secondary device |
Answer» | |
446. |
what do you mean by hacker |
Answer» A\xa0hacker\xa0is an individual who uses computer, networking or other skills to overcome a technical problem. The term\xa0hacker\xa0may refer to anyone with technical skills, but it often refers to a person who uses his or her abilities to gain unauthorized access to systems or networks in order to commit crimes.Types of Hackers\xa0and What They Do: White, Black, and Grey\t\'Black Hat\'\xa0Hackers. The term “black hat” originated from Western movies, where the bad guys wore black hats and the good guys wore white hats. ...\t\'White Hat\'\xa0Hackers. ...\t\'Grey Hat\'\xa0Hackers. ...\tRootkits. ...\tKeyloggers. ...\tVulnerability Scanner. ...\tSQL Injection Attack. ...\tDistributed Denial-of-Service (DDoS) | |
447. |
stealing of information is an example of |
Answer» Identity\xa0theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable\xa0information\xa0(PII), such as Social Security or driver\'s license numbers, to impersonate someone else | |
448. |
who is the father of modern computer ? |
Answer» Part III of \'Alan Turing,\xa0Father\xa0of the\xa0Modern Computer\' is a digital facsimile of \'Proposed Electronic Calculator\', Turing\'s 48-page report describing his revolutionary electronic\xa0computing\xa0machine. | |
449. |
What are special gates |
Answer» | |
450. |
What are tokens in python how many types of tokens are allowed in python explain with examples |
Answer» tokens are smallest individual units in programming.types are:- variable- identifier- keyword- datatype- operater- punctuater- literals | |