InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 501. |
What is swapping program in qBasicexplanation and example |
|
Answer» Answer: In the above QBASIC program, two integer variable is declared, that is "A and B". This variable is USED for taking user input. Before swapping we print user input VALUE. ... This variable is used to perform swapping. After swapping the print FUNCTION is used for print swapped values, Then end of the program. Explanation: here is your answer if you LIKE my answer please follow |
|
| 502. |
How windmills repair |
|
Answer» turbine repair company may RELY on machinery to lift repairmen up to the the AREAS in need of maintenance, ANOTHER method is using aerial access afforded by helicopter to lower the REPAIRMAN and any parts down from above, and another method would be to use certified rope climbers to reach the turbine blades and other ... ༶•┈┈⛧┈♛♛┈⛧┈┈•༶ |
|
| 503. |
How to move sprite in scratch 3.0 with Android buttons? |
|
Answer» Explanation: When you PRESS the RIGHT arrow KEY, point towards the right, then MOVE forward 10 |
|
| 504. |
We use ______ to display component from left to right in mit |
|
Answer» EVAPORATION is the CORRECT answer |
|
| 505. |
Which of the following is called non volatile memory? a. Secondary memory b. Main memory c. Cache memory d. primary memory |
|
Answer» which of the FOLLOWING is called NON VOLATILE memory ? Ans :- CACHE memory
#BeBrainly |
|
| 506. |
What is the first mechanical calculating device? |
|
Answer» Answer: PASCALINE is the FIRST mechanical calculating device.Explanation: |
|
| 507. |
Thanks army for thanking my answer sorry for late reply. I love u all happy friendship dayanswer the following question 8 bits=?1024bytes =?1024KB=?1024MB=?1024GB=?. |
|
Answer» Answer: 8 bits = 1024 bytes 1024bytes = 1024 KB 1024 KB= 1024 MB 1024 MB = 1024 GB 1024 GB = 1024 TB I hope this helps! |
|
| 508. |
[tex]Define printer.[/marquee] |
|
Answer» Answer: PLZ MARK me the brainliest and follow.Don't FORGET to thank♥️ my ANSWERS. |
|
| 509. |
What is the use of html |
Answer» ♥♡JAY SHREE KRISHNA.♡YOUR♡ANSWER.♡ ➡Hypertext Markup Language (HTML) is the standard markup language for DOCUMENTS designed to be DISPLAYED in a web BROWSER. It can be assisted by technologies such as CASCADING Style Sheets (CSS) and scripting languages such as JavaScript... ♡♥HOPE IT HELPS ♡♥PLS MARK AS BRAIIST ♡♥MISS ËXTROVERT⭐ |
|
| 510. |
Can I learn Javascript directly? I Know HTML Basics , so... Thanks , |
|
Answer» Answer: YES, you can LEARN JavaScript only but your KNOWLEDGE of Javascript will not TAKE you far without the basic knowledge of HTML and CSS Explanation: |
|
| 511. |
Convert the following into (111111)2=( )10 |
|
Answer» BINARY to Decimal Given: (111111)₂ = (1 × 2⁵) + (1 × 2⁴) + (1 × 2³) + (1 × 2²) + (1 × 2¹) + (1 × 2⁰) = (63)₁₀ |
|
| 512. |
Which of the following is used to create , modify and sort data stored in databasea- MS excel b- MS word c- MS accessd-MS Power point |
| Answer» | |
| 513. |
Arrange the storage devices, compact disc, hard disk and pen drive in descending order of storage capacity |
|
Answer» Answer: |
|
| 514. |
2.3)Read the numbers and write them ia) 25,79,899b) 30,07,056c) 45,71,504 d) 21,09,900e) 800,01,000, f) 50,00,000g) 99,99,999 h) 90,10,000 |
|
Answer» Answer: a) Twenty five lakhs seventy nine THOUSAND EIGHT hundered ninety nine. b) Thirty lakhs seven thousand FIFTY six. c) Fourty five lakhs seventy ONE thousand five hundered four. d) Twenty one lakhs nine thousand nine hundred. e) Eight croce one thousand . f) Fifty lakhs. g) Ninety nine lahks ninety thousands nine hundred ninety nine. h) Ninety lakhs ten thousand. IF YOU LIKE THIS PLEASE FOLLOW ME SOON. |
|
| 515. |
In multiprocessor operating system there are more than one processors present in the systemwhich can execute more than one processes at the same time. |
|
Answer» Answer: According to some on-line dictionaries, a multiprocessor is a computer SYSTEM having two or more PROCESSING UNITS (MULTIPLE processors) each sharing main memory and peripherals, in order to simultaneously PROCESS programs. |
|
| 517. |
Which property will you use so that a user can enter only 1 to 100 number in a column in a table, otherwise an error message "Enter number in the range of 1 to 100 gets displayed? Explain the steps. . |
| Answer» | |
| 518. |
Two lines on "Sergey Brin" and "Larry Page".Dont cheat frm google, write on your own words. |
|
Answer» LARRY PAGE and Sergey Brin are the CEO and PRESIDENT of Google's parent company, Alphabet, respectively. They met at Stanford University while studying for Ph. D.'s in COMPUTER science and launched Google in 1998. |
|
| 519. |
6.For selecting group of words that are not consecutive we press ____(1 Point)ctrlshift |
|
Answer» Answer: For SELECTING group of words that are not consecutive we PRESS ctrl |
|
| 520. |
5.You can open a pdf in _____(1 Point)WriterAdobe Acrobat Reader |
|
Answer» Answer: microsoft edge |
|
| 521. |
The base of dash system is 10 |
|
Answer» decimal Explanation: hope it HELPED u plz MARK as brainliest and follow me |
|
| 522. |
Which property will you use so that a user can enter only 1 to 100 number in a column in a table, otherwise an error message "Enter number in the range of 1 to 100 gets displayed? Explain the steps. DON'T PUT ANY MESSAGE IF YOU DON'T KNOW THE ANSWER. PLEASE DON'T PUT ANY SPAM MESSAGES LIKE : PLEASE FOLLOW ME OR FOLLOW ME AND I WILL GIVE YOU THE ANSWER OR I AM YOUR FOLLOWER OR ANY OTHER MESSAGE. PUT ONLY THE ANSWER IF YOU KNOW IT. ANY WASTE MESSAGES OR ANSWERS YOU WILL BE REPORTED. THANK YOU !!!!!! |
|
Answer» Inputting & Outputting Data If you want to display SOMETHING on screen in Visual Basic you can do it in a number of ways. The most common ways you will use are by Message Box or List Box. To input data in Visual Basic there are lots of different form controls that you can use to do this, the most common ones are text boxes and COMBO boxes. Inputting - Creating an Interface Visual Basic have TWO main parts to it. The first part is creating the user interface, this is a simply drag and drop environment where you can add different form controls such as a text box. The second part to it is creating the code to make the user interface do/display something. When creating an interface, there are different types of form controls. Some of those that you will use are: Label - used to display text on an interface Text Box - used to allow the user to type in some text Combo Box - used to give a set of options to the user List Box - used to provide a list of options to choose from or display a list of information that has been calculated in the program. Button - these are often used so when the user CLICKS on them something happens. In Visual Studio on the left hand side you have the toolbox, this is where you can drag and drop your form controls. It looks like this: |
|
| 523. |
Class 9 sumita arora section A chapter 1 .... plzz answer these questions |
| Answer» | |
| 524. |
6. List the advantages of the high level languages as compared to low level languages. |
|
Answer» Answer: Advantage Explanation: Advantages of High LEVEL language High level LANGUAGES are programmer FRIENDLY. ... It provide higher level of abstraction from MACHINE languages. It is machine independent language. Easy to learn. Less error prone, easy to find and DEBUG errors. High level programming results in better programming productivity. |
|
| 525. |
____________ feature is used to produce a personalised letter for each person on your mailing list |
|
Answer» Answer: mail merge feature is used to PRODUCE a personalized LETTER for each PERSON on your MAILING LIST |
|
| 526. |
Calculating the total expenses incurred if expenses are given moth wise A1, B1, C1 and D1(What is the formula?) |
| Answer» | |
| 527. |
Give me some practice questions for java methods |
|
Answer» Java Method Exercises [16 exercises with SOLUTION] Write a Java method to find the smallest NUMBER among three numbers. ... Write a Java method to compute the average of three numbers. ... Write a Java method to DISPLAY the middle CHARACTER of a string. ... Write a Java method to count all VOWELS in a string. |
|
| 528. |
Mr. Nanda is opening a new branch of his office in Noida . He wants to connects the computer of his head office at Mumbai. What networking types best suits his requirement ? |
|
Answer» Answer: Wide Area Network (WAN) Slightly more COMPLEX than a LAN, a WAN connects COMPUTERS together across longer physical DISTANCES. This allows computers and low-voltage devices to be remotely connected to each other over one large network to communicate even when they’re miles apart. hope it HELPS you good luck :) brainliest pls :) |
|
| 530. |
Give two difference between 2GLs and 4GLs |
|
Answer» Explanation: The basic DIFFERENCE was (supposed tobe that) third GENERATION languages allowed you to manipulate only INDIVIDUAL DATA items, where fourth generation languages allows you to manipulate groups of items as a group rather than INDIVIDUALLY. |
|
| 531. |
What type of network will you recommend in a school for data and hardware sitting ? |
|
Answer» Answer: A Local Area NETWORK (LAN)answer Explanation: A Local Area Network (LAN) is a group of computer and peripheral devices which are connected in a LIMITED area such as school, laboratory, home, and office building. It is a widely useful network for SHARING resources LIKE files, printers, games, and other APPLICATION |
|
| 532. |
Convert binary to decimal 101100 10001101 |
|
Answer» Answer: 10001101 ➡141, Step 1: WRITE down the BINARY number: 10001101 Step 2: Multiply each DIGIT of the binary number by the CORRESPONDING power of two: 1x2^7 + 0x2^6 + 0x2^5 + 0x2^4 + 1x2^3 + 1x2^2 + 0x2^1 + 1x2o0 Step 3: Solve the powers: 1x128 + 0x64 + 0x32 + 0x16 + 1x8 + 1x4 + 0x2 + 1x1 = 128 + 0 + 0 + 0 + 8 + 4 + 0 + 1 Step 4: Add up the numbers written above: 128 + 0 + 0 + 0 + 8 + 4 + 0 + 1 = 141. This is the decimal equivalent of the binary number 10001101. 101100 ➡44, Step 1: Write down the binary number: 101100 Step 2: Multiply each digit of the binary number by the corresponding power of two: 1x2^5 + 0x2^4 + 1x2^3 + 1x2^2 + 0x2^1 + 0x2^0 Step 3: Solve the powers: 1x32 + 0x16 + 1x8 + 1x4 + 0x2 + 0x1 = 32 + 0 + 8 + 4 + 0 + 0 Step 4: Add up the numbers written above: 32 + 0 + 8 + 4 + 0 + 0 = 44. This is the decimal equivalent of the binary number 101100 |
|
| 533. |
Q. Write (T) for the correct statements and (F) for the others :1. As you change cell entries, Excel formula recalculates the values.2. Formulas are only used to perform simple calculations.3. In mixed referencing, the relative position of rows and columns change when you copya formula.4. All the formulas and functions begin with an equal (=) sign.5. In Absolute Referencing, dollar '$' sign is used before the cell co-ordinates.6. Functions are used to perform complex calculations. |
|
Answer» false false true true false |
|
| 534. |
Which property will you use so that a user can enter only 1 to 100 number in a column in a table, otherwise an error message "Enter number in the range of 1 to 100 gets displayed? Explain the steps. |
|
Answer» Answer: Validation RULE. We can enter validation rule in the Datasheet view by clicking the validation button in the field validation group on the FIELDS tab under table view Explanation: No ONE has ever answered my question till now and I am ANSWERING it on my own since I have got the answer now. You guys have only put SPAM messages to get points. I don't understand what is the point of registering yourself in this site when you don't want to help anyone and came here only for points. I hope this doesn't repeat again. |
|
| 535. |
The moon revolves around the sun |
|
Answer» MOON revolves AROUND the sun BECOZ it revolves around the EARTH and Earth itself revolves around the sun so the moon revolves around the sun |
|
| 537. |
Write T for the True and F for the False statements.1. ranges cannot be used in formula. |
| Answer» | |
| 538. |
E.Write the formulas for the following.1. To find the sum of cells A1 to A6 and to display the answer in A7.2. To find the average of cells C3 to F3 and to write the answer in G3.3. To calculate the product of cells A1 to A4 and to display the result in A5. |
|
Answer» Answer: 1. In A7 WRITE this code without quotes 2. In G3 write this code without quotes "=AVERAGE(C3:F3)" 3. In A5 write this code without quotes "=PRODUCT(A1:A4) " PLEASE MARK THIS ANSWER AS BRAINLIEST |
|
| 539. |
Write T for the True and F for the False statements.1. The base of the decimal number system is 16.2. Antivirus is a utility software.3 Without system software, computers are useless.4. Octal number system consists of 7 digits.5. RAM is a primary memory. |
|
Answer» Answer: 1 TRUE 2 FALSE 3 false 4 true 5false hope it's HELPFUL to you ⚫ fõllõw mê ❤️ mark as brainliest ☺️ |
|
| 540. |
Which property will you use so that a user can enter only 1 to 100 number in a column in a tabe, otherwise an error message "Enter number in the range of 1 to 100 gets displayed? Explain the steps. DON'T PUT ANY MESSAGE IF YOU DON'T KNOW THE ANSWER. PLEASE DON'T PUT ANY SPAM MESSAGES LIKE : PLEASE FOLLOW ME OR FOLLOW ME AND I WILL GIVE YOU THE ANSWER OR I AM YOUR FOLLOWER OR ANY OTHER MESSAGE. PUT ONLY THE ANSWER IF YOU KNOW IT. THANK YOU !!!!!! |
|
Answer» Validation rule. EXPLANATION: No ONE has ever answered my question TILL now and I am answering it on my own SINCE I have got the answer now. |
|
| 541. |
the differences between the computers which used vacuum tubes and the computers which used integrated circuits |
|
Answer» Answer: here is your anwer Explanation: transistors can be made much smaller; BILLIONS can fit into one IC WHEREAS tube-based computers took up an ENTIRE room. ... vacuum tubes because of their filament aka heater, generate a lot of heat compared to transistors. GLASS vacuum tubes are fragile compared to transistors, can break and ALSO experience microphonics. HOPE IT HELPS |
|
| 542. |
इन ऑफ सलूट रिफरेंस द रिलेटिव पोजीशन ऑफ रो एंड कॉलम चेंज व्हेन यू कॉपी आफ अमला |
|
Answer» इन ऑफ सलूट रिफरेंस द रिलेटिव पोजीशन ऑफ रो एंड कॉलम चेंज व्हेन यू कॉपी आफ अमला |
|
| 543. |
How do you execute an interface developed in VB 2008. Write steps.Please answer fast.It is the question of computer of STD. 8 |
|
Answer» Subscriber trunk Dialing (STD)♀️♀️ Explanation: Please HELP me |
|
| 544. |
In html we have how many tag to get text in italic? |
|
Answer» in html we can do it by clicking the italic option in HOME 'I 'means italic |
|
| 545. |
What is the difference between flow chart, pie chart and loop |
|
Answer» Answer: CHARTS present information in the FORM of graphs, diagrams or TABLES. Graphs show the MATHEMATICAL relationship between sets of DATA.Hope it will be helpful ✌️ |
|
| 546. |
What will be the output of the following HTML code? Html tags can be of two typesare pairedun paired |
|
Answer» Explanation: HTML Tutorial HTML Tags HTML Attributes HTML Text HTML Headings BLOCK & Inline Elements HTML Lists Hyperlink HTML Images HTML Iframes HTML ENTITIES HTML Meta Tag HTML Tables HTML Form HTML Marquee Doctypes in HTML XHTML DHTML HTML Tags and Elements Written By: Avinash Malhotra Updated on 10-Aug-2020 ← HTML Tutorial HTML Attributes → HTML Tutorial rating by Jasmine Average rating: 5.0, based on 69 reviews Home Web Designing Html Html Tags Type of HTML tags HTML Tag Body Tag Title Tag Meta Charset List of HTML Tags Tags in HTML HTML Tags or Tags are used to add content in html, like text, headings, table, list links etc. Tags along with attributes are core COMPONENTS of HTML. The latest version of HTML, i.e HTML5 includes around 142 tags. A Tag with attribute and content is called HTML Element. HTML Tags HTML Tags Type of HTML Tags Tags in HTML are categorized as Paired Tags and Unpaired Tags on the basics of opening and closing. Paired Tags are tags with both opening and closing. They can have child tags and text. For example , , etc.Unpaired tags are tags with opening only, example Type of html tags Tags Type USE Paired Tag Pair Tags are written in pairs, means separate opening and closing tag. Exp html, body, head, h1, p, div etc. Unpaired Tags Unpair or self closing tags. They don't need closing, as they are self closed. Unpair tags example etc. Unpaired elements don't have any child or children. They are last node of HTML DOM Tree. HTML Tag HTML or HTML Tag is the parent tag of all HTML Elements. HTML Tag is defined just after doctype declaration. To know more about html doctype, click html doctype. HTML Tag has two children, head tag and body tag. Since HTML3, It is compulsory to define Doctype and then HTML tag. lang attribute is used inside html tag to define language. An option dir="ltr" is also used to ser DIRECTION which if by default left to right. For Urdu and Arabic, use dir="rtl" in html tag.
HEAD Tag HTML Head tag is the first child of HTML. Head .
|
|
| 547. |
Weuse4. InHILtexttag to getinItalic ?23.1. < Variant 2. Italic3.com> 4. |
|
Answer» Answer: what is the QUESTION U ASKED i not understood so plz CORRECT question |
|
| 548. |
Which property will you use so that a user can enter only 1 to 100 number in a column in a tabe, otherwise an error message "Enter number in the range of 1 to 100 gets displayed? Explain the steps. |
|
Answer» idk Explanation: |
|
| 549. |
How we keep our phone safe with cybres crime |
|
Answer» Explanation: Anyone using the internet should exercise some basic precautions. Here are 11 TIPS you can use to help protect yourself against the range of cybercrimes out there. 1. Use a full-service internet security suite For instance, Norton Security provides real-time protection against existing and emerging malware including ransomware and viruses, and helps protect your private and financial information when you go online. 2. Use strong passwords Don’t repeat your passwords on different sites, and change your passwords regularly. Make them complex. That means using a combination of at least 10 letters, numbers, and symbols. A password management application can help you to keep your passwords locked down. 3. Keep your software updated This is especially important with your operating systems and internet security software. Cybercriminals frequently use known exploits, or flaws, in your software to gain access to your system. Patching those exploits and flaws can make it less likely that you’ll become a cybercrime target. 4. Manage your social media settings Keep your personal and private information locked down. Social engineering cybercriminals can often get your personal information with just a few data points, so the less you share publicly, the better. For instance, if you post your pet’s name or reveal your mother’s maiden name, you might expose the answers to two common security questions. 5. Strengthen your home NETWORK It’s a good idea to start with a strong encryption password as well as a virtual private network. A VPN will encrypt all traffic leaving your devices until it ARRIVES at its destination. If cybercriminals do manage to hack your communication line, they won’t intercept anything but encrypted data. It’s a good idea to use a VPN whenever you a public Wi-Fi network, whether it’s in a library, café, hotel, or airport. 6. Talk to your children about the internet You can teach your kids about acceptable use of the internet without shutting down communication channels. Make sure they know that they can come to you if they’re experiencing any kind of online harassment, stalking, or bullying. 7. Keep up to date on major security breaches If you do business with a merchant or have an account on a website that’s been impacted by a security breach, find out what information the hackers accessed and change your password immediately. 8. Take measures to help protect yourself against identity theft Identity theft occurs when someone wrongfully obtains your personal data in a way that involves fraud or deception, typically for economic gain. How? You might be tricked into giving personal information over the internet, for instance, or a thief might steal your mail to access account information. That’s why it’s important to guard your personal data. A VPN — short for virtual private network — can also help to protect the data you send and receive online, especially when accessing the internet on public Wi-Fi. 9. Know that identity theft can happen anywhere It’s smart to know how to protect your identity even when traveling. There are a lot of THINGS you can do to help keep criminals from getting your private information on the road. These include keeping your TRAVEL plans off social media and being using a VPN when accessing the internet over your hotel’s Wi-Fi network. 10. Keep an eye on the kids Just like you’ll want to talk to your kids about the internet, you’ll also want to help protect them against identity theft. Identity thieves often target children because their Social Security number and credit histories frequently represent a clean slate. You can help guard against identity theft by being careful when sharing your child’s personal information. It’s also smart to know what to look for that might suggest your child’s identity has been compromised. 11. Know what to do if you become a victim If you believe that you’ve become a victim of a cybercrime, you need to alert the local police and, in some cases, the FBI and the Federal Trade Commission. This is important even if the crime seems minor. Your report may assist authorities in their investigations or may help to thwart criminals from taking advantage of other people in the future. If you think cybercriminals have stolen your identity. These are among the steps you should consider. |
|
| 550. |
Field represents row in a database true or false |
|
Answer» Answer: Field represents a row and records represents column. ( I didn't have ACCESS so i USED Google sheets to show it . Pls don't MIND ) |
|