InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 5101. |
The ____is an example of a peripheral device that is used to scan documents and photographs If you will answer the my question I will mark you as the brainlest |
|
Answer» ipheral DEVICE to SCAN PHOTOGRAPH is PRINTER |
|
| 5102. |
THE ......................FUNCTIONIS USED TO CHECK A CONDITION |
|
Answer» syntaxExplanation:SYNTAX is your answerthe syntax FUNCTION USED to CHECK a CONDITION |
|
| 5103. |
To back up your data we can use ___ |
| Answer» BACK up softwareExplanation: | |
| 5104. |
Multiple Choice questions 1) You can create a duplicate of the block by _______ clicking on it and selecting the duplicate option from the Shortcut menu. a) Right b) Left c) Double |
|
Answer» a) rightExplanation: |
|
| 5105. |
Which is the main circuit board of the computer which head the cpu |
|
Answer» MotherboardThe SYSTEM UNIT. The Motherboard is the main circuit board for the computer, containing both soldered, nonremovable components along with sockets or slots for components that can be removed. The motherboard holds the CPU, RAM and ROM chips, ETC. The Central PROCESSING Unit (CPU) is the "brain" of the computer. |
|
| 5106. |
Discribe the two characteristic of a computer |
|
Answer» the FIRST CHARACTER stick of COMPUTER isspeed - computer WORK very fast than the humansaccuracy - it work without any MISTAKE if my answer is right then make me brilliant and follow me guys |
|
| 5107. |
What is protocol class 8 |
|
Answer» system of fixed RULES and formal BEHAVIOUR used at OFFICIAL meetings, USUALLY between governments |
|
| 5108. |
Observing _____in data know as pattern recogn cusation |
|
Answer» full READY the of this message and smart to receive these notifications this add-on on it is POWER of this message to the of the week after someExplanation:KFC Dhaka Bangladesh education BOARD Bangladesh education board Bangladesh and it's future the same and send the same it was a temporary and permanent Henna of a good time tt of this WORD to receive e-mails like this |
|
| 5109. |
What is a protocol ? |
|
Answer» tion:A communication PROTOCOL is a system of rules that allow TWO or more entities of a communications system to transmit information VIA any kind of variation of a physical quantity. The protocol defines the rules, syntax, semantics and synchronization of communication and possible ERROR recovery methods. |
|
| 5110. |
Who discover I phone????.. |
|
Answer» I PHONE was not DISCOVERED but invented by Steve JOBS and his assistantsPlz plz mark as brainliest!!!!! |
|
| 5111. |
Q2 please answer help me |
|
Answer» it is USED in interactieve model of writing a program in PythonExplanation:MARK it brainliest ANSWER |
|
| 5112. |
Define port along with some examples. |
|
Answer» tion:When referring to a physical device, a HARDWARE port or peripheral port is a hole or connection found on the front or BACK of a computer. Portsallow computers to access external devices such as PRINTERS. ... The PICTURE shows an EXAMPLE of a type of port on the back of a computer.PLS MARK AS BRAINLIST.... |
|
| 5113. |
The difference of an integer a and6 is 4 find the value of a |
| Answer» TION:a-6 =4a=4-6a=-2can U UNDERSTAND | |
| 5114. |
What is difference between client serve and peer to peer architecture class 8 |
|
Answer» The key difference between Client-SERVER and Peer-to-Peer NETWORK is that there is a DEDICATED server and specific clients in the client-server network model whereas, in peer-to-peer each node can act as both server and client. In the client-server model, the server provides SERVICES to the client.Jan 9, 2017 |
|
| 5115. |
which type of network architecture if the most, suitable when a few computer ,having similar power and capacity are, to be network together? |
| Answer» PEER to peer ARCHITECTURE networkExplanation:In this situation peer to peer architecture network is more suitable than client architecture network as in peer to peer architecture network all COMPUTERS have given same STATUS and all computers are responsible for SHARING of data or file | |
| 5116. |
NAME THE TWO TYPES OF VERBAL COMMUNICATIONS |
| Answer» WRITTEN and ORAL communication.Hope it HELPS you | |
| 5117. |
Q -1 What do you mean by reangof cell? |
|
Answer» when REFERRING to a spreadsheat the range or cell range is a group of cell WITHIN a row or column for example. In the formula=sum(A1:A10) the cell in column A1 through À10 are the range of cell that are added togetherso mark me as BRAINIST follow me guys |
|
| 5118. |
Write about libraries folder |
| Answer» HOPE my ANSWER HELPS you MARK the answer as BRAINLIEST | |
| 5119. |
Paint is a program that is used for? a) calculation b) writing letters c) making drawing |
| Answer» | |
| 5121. |
The information that we store in the computer is known as? A) data b) memory c) work |
|
Answer» memoryExplanation: |
|
| 5122. |
Is speaker input or outputdevice |
|
Answer» its an OUTPUT device.Explanation: |
|
| 5123. |
Which option of file menu help you to reopen your save text? a) save b) exit c) open |
| Answer» C. OpenHope it will be HELPFUL. MARK me as a BRAINALIST. | |
| 5125. |
Which device's storage capacity is largest ? a) DVD b) hard disc c) CD |
| Answer» | |
| 5126. |
Is scanneroutput deviceinput |
| Answer» HEY MATE hered your answerExplanation:A scanner is a OUTPUT devicePlz MARK my answer as the brainliest | |
| 5127. |
Which option helps us to close Notepad program? a) file b) open c) exit |
| Answer» LPS to CLOSE notepad MARK BRAINLIEST PLSS... | |
| 5129. |
What are the picture which represent the program?a) desktopb) windowc) icons |
| Answer» | |
| 5130. |
Which keys help us to type letter,poem,stories?a) Shiftb) Caps lockc) Alphabetic |
| Answer» ALPHABETIC keys help us to TYPE LETTER, POEM and storiesMARK AS BRAINLIEST | |
| 5131. |
Which button is used to open different program?a) Closeb) Startc) minimize |
| Answer» START BUTTON to OPEN DIFFERENT prodram | |
| 5132. |
give at least five examples of front end( application) and back end( Database) be it offline or online example in Html |
|
Answer» If are you talking about fornt tag there is no such tag but it COULD be font tag example of it is font size, font color, font STYLE and ONE more. And [HTML] tag is the starting tag and [\HTML] is the ENDING tag. Body tag is the SECOND first tag and it contains bgcolor and other attributes. Is this sufficient for your need and good morning. |
|
| 5133. |
Which button is used to open different program? |
|
Answer» A popular Windows shortcut KEY is ALT + TAB, which allows you to switch between all of your open programs. While continuing to HOLD down the Alt key, choose the program you want to open by clicking Tab until the CORRECT application is highlighted, then release both keys.Feb 14, 2017 |
|
| 5134. |
5.The Quick Launch Bar Is the ........... section of the taskbar. |
|
Answer» Quick LAUNCH is a section of the Microsoft Windows taskbar that enables a user the launch programs without having to locate them using the Start menu. The Quick Launch AREA is located next to the Start button.This feature was FIRST introduced with the RELEASE of Microsoft Windows 98. The image below shows an example with three Quick Launch icons in-between the Start button and currently-running programs. On the far right of the taskbar is the Windows Notification Area. |
|
| 5135. |
F12 is a cursor control key.a |
| Answer» 12 years a person key for SAVE as in MS wordit HELPS you ☺️ | |
| 5136. |
In computer system how to know the Bluetooth is on |
|
Answer» very simple to know how the BLUETOOTH is on because GO to the setting and START to Bluetooth option you will see the water on off so if the BUTTON is at the right sidethank you and please mark me as a BRAINLIEST |
|
| 5137. |
What is digital wallets debit card credit card e-cheque mobile banking |
| Answer» MOBILE BANKING is the DIGITAL WALLET | |
| 5138. |
What are bytes and bites? |
|
Answer» The byte is a unit of digital information that most commonly consists of eight bits. HISTORICALLY, the byte was the number of bits used to ENCODE a single character of text in a computer and for this reason it is the smallest addressable unit of memory in many computer architectures.(byte)Insect bites are puncture wounds or lacerations made by insects. An insect may bite in self-defense or when looking to feed. Insects typically inject formic acid. This can LEAD to blisters, INFLAMMATION, redness, swelling, pain, ITCHING, and irritation(bite). |
|
| 5139. |
B) CL ICO Wrop toText option is orolintab of the FormCells dialog bo.Cobot•COBOL is an example of high lescomputer language.• Fraction option is available indroop-down list.• PARAM 8000 is considered as IndiaPast Perost super supercomputer. |
|
Answer» jgdgjsurdutyidfyoiydyfoidgfyi |
|
| 5140. |
Ham pubg wola hai , hame bituful nahi battery ful chaia |
|
Answer» ha ham pubg WOLA hai , hame bituful nahi battery ful chaia I will FOLLOW you you will follow you BACK okmark me as a brainlist PLEASE |
|
| 5141. |
Explain the contribution of IT in Education. |
|
Answer» Well, to keep it simple and in a few WORDS, I will provide you some facts.The government spent Rs. 20,000 crore to 40,000 crore for IITs in the last five decades or so. The CONTRIBUTION of IIT graduates to economy is around 20 lakh crores.And EVERY iitian graduate helps create 100 new jobs in the country. The equation then reduces to the fact that every rupee spent at IIT gives the outcome of Rs. 15. Not only the economy, the impact of IITians on society has been enormous. Arvind Kejriwal, Kiran Bedi, Raghuram Rajan, CHETAN Bhagat are some examples from IIT.Moreover, not only in India, they have made us PROUD all over the world like Sundar Pichai, Google CEO, The founders of the Flipkart and every other innovation has the influence of IITs and their alumni.please mark me as brainliest |
|
| 5142. |
Who invented mouse and keyboard |
| Answer» DOUGLAS EngelbartData was entered by typing commands on a KEYBOARD. The MOUSE was invented by Douglas Engelbart in 1964 and consisted of a wooden SHELL, circuit board and two metal wheels that came into contact with the SURFACE it was being used on. | |
| 5143. |
Draw a neat diagram on types of network topology and write its uses. please answer guys.............. |
|
Answer» First network topology refers to how computers and other DEVICES such as scanner are arranged to transfer DATA within a network Typesbus topologyStar topology Ring topology Mesh topology Explanation::-In bus topology the devices are all connected to the central backbone at the end there is a terminator used : to connect many but limited devices in a small local area for instance schools and offices:- In star topology the devices form a star like structure where each device is connected to the central concentrator used:to connect devices in small area example at homes and hospitals SINCE it is very expensive due to the presence of concentrator so it is not widely used :- In ring topology devices are connected in a ring like structure ie each device is connected to the other to form a circle:-In Mesh topology each device is connected to ANOTHER in the network. It is difficult to configure since all devices must be connected to each other :-Tree topology is a combination of star and bus topology used:in LARGE areas since sooo many computers and devices can be connected I hope it helped |
|
| 5144. |
Give some more advantages of Word Processors over Typewriters? |
|
Answer» processors allow for MISTAKE eradication (backspace etc) whereas not all typewriters do2. Typewriters REQUIRE ribbons, ink etc while WORD processors only require a computer and a keyboard3. Word processors have more formatting capabilities than typewriters4. Word processors have spelling and grammar checking functions5. Word processors have word counting functions, while typewriters require the user to count words manually6. Word processor documents can easily be shared and distributed, while typewriting requires the user to type any copies of the document every TIME |
|
| 5145. |
Make a list of e government services that are provided by other countries |
|
Answer» :- The Belgian eGovernment strategy[21] is aimed at creating a single virtual public administration to be characterised by fast and convenient service delivery, at the same time respecting the privacy of users. The services shall be developed around the needs of citizens putting in place complete electronic administrative procedures independently from actual authorities being involved. In addition, simplified procedures shall provide for a reduced bureaucracy. To this end the strategy suggests four main streams all efforts should be structured around: Re-engineering and integrating service delivery around users' needs and life events; Cooperation among all levels of Government; Simplification of administrative procedures for citizens and businesses; Back office integration and protection of PERSONAL data.GERMANY:- Germany's current eGovernment Strategy is laid down in the eGovernment 2.0 programme.[75] This programme is part of the more general strategic approach set out in the document Focused on the Future: Innovations for Administration[76] concerning the overall modernisation of the Public Administration. The eGovernment 2.0 programme identifies the following four fields of action: Portfolio: demand-oriented expansion of the Federal Government's eGovernment services in terms of quality and quantity. Process chains: electronic cooperation between businesses and public administrations via a joint process chain. Identification: introduction of an electronic identity card and development of eID concepts. Communication: a secure communications infrastructure for citizens, businesses and administrations.FRANCE:- eGovernment first STOOD as a policy priority in 1998, in the framework of the strategy to prepare France to become an information society. It was in 2004 that the development of eGovernment turned into a standalone policy with the launch of both a strategic plan and an action plan commonly referred to as the ADELE programme. The latter was aiming to simplify and make the public services accessible by electronic means to all users, 24 hours a day, seven days a week, as well as to cut the costs generated by the operation of the public administration. A pre-condition for this and a related objective listed in the programme was to generate trust in new ways of delivering services.UNITED ARAB EMIRATES:- The UAE Government provides a range of services through its official PORTAL www.government.ae. The eServices are classified into services for individuals, businesses and visitors. Through the eServices, it is now very easy for the people of the UAE to avail a variety of services without leaving their home or office spaces. The portal has an advanced search facility to help people look for the services they WANT to access. The portal also contains a section on alternate means for accessing government services. Emirates eGovernment has set up the UAE’s official portal www.government.ae, which is a major milestone in the process of eTransformation in the UAE. This portal brings all eServices and information provided by the UAE federal and local government bodies under one umbrella. Emirates eGovernment provides services on G2G, G2B and G2C levels. The UAE’s official portal www.government.ae falls under the G2B and G2C level. Under G2G services, the entity provides cloud and Government Website Evaluation Index (GWEI) services.PLEASE MARK ME THE BRAINLIEST AND FOLLOW ME |
|
| 5147. |
A ________________ is a set of commands written by the user to be executed later. . ________________ is a short form of malicious software. A ________________ is a program that appears useful, but is actually programmed to passA ________________ is a set of commands written by the user to be executed later. 3. ________________ is a short form of malicious software. 4. A ________________ is a program that appears useful, but is actually programmed to pass on user’s data to someone else. |
|
Answer» Explanation:Computer VIRUS definition - What is meant by the term Computer Virus ... virus is a malicious SOFTWARE PROGRAM loaded onto a user's computer without the user's ... Some viruses wreak havoc as soon as their code is executed, while others lie ... For example, some can infect FILES without increasing their sizes, while others TRY |
|
| 5148. |
Information on the latest smart phone available in India |
|
Answer» Explanation:Latest Mobile Phones (2020 ) PRICES Realme 6 Rs. 13,900 XIAOMI POCO X2 Rs. 16,999 SAMSUNG Galaxy M31 Rs. 15,999 OPPO Reno3 Pro Rs. 27,240 |
|
| 5149. |
A computer virus can spread through i. E-mails ii. Pen drives iii. Both i and ii |
| Answer» | |
| 5150. |
Explain different formatting features in MS Word 2010. |
|
Answer» Different formatting FEATURES in MS WORD 2010-The general features of MICROSOFT Word are large blocks of text, page breaks, page NUMBERING, and HIDDEN text.Large blocks of textPage breaksPage NumberingHidden text✧ParadiseLost✧ |
|