InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 3452. |
AssignmentQ1 State True or False/ A computer understands the data in High-Level Languages. |
Answer» it's TRUE....... |
|
| 3453. |
What is the another name of monitor |
| Answer» | |
| 3455. |
What is computer science ? explain it briefly |
|
Answer» Answer: Computer science is the STUDY of computers and computing concepts. Explanation: It includes both hardware and software, as well as networking and the INTERNET. Programming concepts include functions, algorithms, and source code design. Computer science also covers compilers, OPERATING systems, and software applications. HOPE IT HELPED IF IT DID, THEN PLEASE MARK AS BRAINLIEST. |
|
| 3456. |
2.Write ‘T' for True and'F' for False:1. USB is a non-portable device.1,048,576 characters are equal to one Gigabyte.3. RAM (Random Access Memory) is a Volatile Memor4. ROM chip cannot be reprogrammed or rewritten.5. The size of a floppy disk is about 3-inch. |
|
Answer» Explanation: 1-T 3-T 4-T 5-F(3.5) |
|
| 3457. |
Computer memory is used to store ________ and_______ . |
|
Answer» MEMORY and data Explanation: |
|
| 3458. |
What is the full form of URL and WWW |
|
Answer» URL-- UNIFORM Resource Locator WWW-- WORLD wide Web.........! |
|
| 3459. |
Dfine system software |
|
Answer» The program and other opperator information used by COMPUTER. COLLECTION of data is also CALLED of software |
|
| 3460. |
Write true and false2. Filtering breaks files and folders into different sections, depend on whichproperty you choose. |
|
Answer» It's TRUE |
|
| 3461. |
Empty tag has only _______tag |
|
Answer» one Explanation: HOPE it is helpful Mark as BRAINLIEST QUESTIONS |
|
| 3462. |
3. Explain binary to decimal conversion |
|
Answer» Divide the NUMBER by 2. Get the integer quotient for the next iteration. Get the remainder for the BINARY digit. Repeat the STEPS until the quotient is equal to 0. |
|
| 3463. |
What is the shortcut key to select all the text |
Answer» CTRL + A. . . PLZ MARK AS BRAINLIEST |
|
| 3464. |
computer question chapter 1 networking computer and question is dash spans from several blocks of building to the entire City |
|
Answer» Answer: |
|
| 3465. |
Name any two examples of operating system |
|
Answer» Answer: Two example of operating SYSTEM Microsoft Window and linuxI hope you LIKE my answer and plz follow me and MAKE me BRAINLIST |
|
| 3466. |
Computer question – spans from several blocks of buildings to the entire City |
|
Answer» SKYWAY SPANS from several blocks of BUILDINGS to the entire city. |
|
| 3467. |
Jot down the rules of baseball |
|
Answer» Answer: The object of baseball is to SCORE more runs than your opponent. The idea is to hit the ball thrown at you as far as you can before RUNNING around 4 bases to complete a run. Once a PLAYER manages to get around the FOUR bases before being tagged out, then another batter STEPS in. |
|
| 3468. |
Which computers known as personal computers |
|
Answer» .................................... |
|
| 3470. |
Define tags .in a short |
|
Answer» Explanation: A TAG is a short (usually one word) description of an HTML OBJECT or LINK. Thesetags are often placed in atag cloud (weighted list or word cloud) to show the most popular website or blog words and help VISITORS find INFORMATION of interest |
|
| 3471. |
Name and explain the different field types in libreoffice base |
|
Answer» Explanation: Each FIELD has a Field Type, which must be SPECIFIED. Types include text, integer, date, and decimal. If the field is going to have GENERAL information in it (for example, a NAME or a description), use text hope it will HELP you |
|
| 3472. |
What do you mean by a. column and a row? |
|
Answer» Answer: in short to understand, row is collection of cells in a horizontal direction while COLUMN is a collection of cells in a vertical direction. In the above picture, GROUP of yellow color cells is known as Column while the cells HIGHLIGHTED with blue color is called as row, while green color AREA is known as cell Explanation: hope it will help you |
|
| 3473. |
Which formatting style is used for Indian |
Answer» ANSWER:CONTRIBUTIONS to INDIAN Sociology FORMAT USES SageV citation styleExplanation: hope it will help you |
|
| 3475. |
_____ system allows us to talk to any person in the world star any time. |
| Answer» | |
| 3476. |
Computer question – Pan from several block of building to the entire City |
|
Answer» hyuutc jfihf htugttu gruhbig |
|
| 3477. |
Which of the following is used to add a downloaded or recorded sound file to a presentation |
|
Answer» Answer: HEY dear where r the options..Plz eleborate ur answer correctly..#BeBrainly#Follow |
|
| 3478. |
How will you insert a new field |
|
Answer» Answer: To enter DATA in the Add NEW Field column: •CREATE or open a table in DATASHEET view by right-clicking the table that you want in the Navigation PANE and then clicking Datasheet view from the shortcut menu. •In the Add New Field column, enter the name of the field that you want to create. ... •Enter data in the new field. |
|
| 3479. |
1.What is DBMS?2.Write the steps to save a table in access?3.What do you understand by a primary key? |
|
Answer» Answer: 1.A database management system (DBMS) is a software package designed to define, manipulate, retrieve and manage data in a database. 1.A database management system (DBMS) is a software package designed to define, manipulate, retrieve and manage data in a database. 2.To name and SAVE a table: 1.A database management system (DBMS) is a software package designed to define, manipulate, retrieve and manage data in a database. 2.To name and save a table:(a) CLICK the Save BUTTON on the Quick Access TOOLBAR. The Save As dialog BOX appears. 1.A database management system (DBMS) is a software package designed to define, manipulate, retrieve and manage data in a database. 2.To name and save a table:(a) Click the Save button on the Quick Access toolbar. The Save As dialog box appears.(b) Type the name you want to give your table. 1.A database management system (DBMS) is a software package designed to define, manipulate, retrieve and manage data in a database. 2.To name and save a table:(a) Click the Save button on the Quick Access toolbar. The Save As dialog box appears.(b) Type the name you want to give your table.(c) Click OK. Access names your table. 1.A database management system (DBMS) is a software package designed to define, manipulate, retrieve and manage data in a database. 2.To name and save a table:(a) Click the Save button on the Quick Access toolbar. The Save As dialog box appears.(b) Type the name you want to give your table.(c) Click OK. Access names your table.3.A primary key, also called a primary keyword, is a key in a relational database that is unique for each record. PLEASE MARK ME AS A BRAINLIEST.. |
|
| 3480. |
True or false?1. Filtering feature permanently hides the data that you do not want2. Conditional formatting feature is used when you have to format data in only 1 cell.3. You can directly enter data in design view 4. DBMS does not allow duplication of records5. A table is the basic building block for a database |
| Answer» | |
| 3481. |
How many modes are there to work in windows video editor |
|
Answer» Answer: Explanation: When Microsoft retired Windows Movie Maker, many PEOPLE were sad to SEE it go. It wasn't the most capable video editor on the PLANET, but it was free, easy to learn, and could always be relied upon when you needed it. Other video editors were available, but most were paid options or had a steep learning curve. However, a recent update to Windows has seen many of your favorite Movie Maker video features integrated directly into the Photos app. There are even some new tricks too. So, here's how to USE the free video editor that's now built-in to Windows 10. |
|
| 3482. |
Different type of computer virus explain the |
|
Answer» Computer VIRUSES come in different FORMS, and the most common INFECTIONS are: Boot Sector Virus Direct Action Virus Resident Virus Multipartite Virus Polymorphic Virus Overwrite Virus Spacefiller Virus File Infector Virus Mark as Brainliest |
|
| 3483. |
Page No.computerShivalalميله / ليييو)- (WHTTP is used to transfer files onInternet. |
| Answer» | |
| 3485. |
How many watt is iball PSY-255 is? |
|
Answer» Answer: Explanation: Iball 450W Computer POWER Supply PPS-255 450 Watts PSU. Give the right power with HIGH PERFORMANCE, High Efficiency Power Supplies. |
|
| 3486. |
Which operator is used for joining the text together?give an example. |
|
Answer» The AMPERSAND (&) CALCULATION operator lets you join text items without having to use a FUNCTION. For example, =A1 & B1 returns the same value as =CONCATENATE(A1,B1). In many cases, using the ampersand operator is quicker and simpler than using CONCATENATE to CREATE strings. |
|
| 3487. |
The class into groups and ask them to collect details about the following:3Divide the class into groups a(a) arrest and trial of Jesus(b) crucifixion of Jesus(c) Resurrection of Jesus |
|
Answer» CRUCIFIXION of jesus Explanation: your answer is here |
|
| 3488. |
What is the full form of DBMS? |
|
Answer» Answer: DBMS - DATABASE Management SYSTEM. PLEASE MARK BRAINLIEST PLEASE FOLLOW ME |
|
| 3489. |
Networking is very expensive ColumnEach hub has ports which determine the number of devices to be connected toit. (__ ) |
|
Answer» Geometric representation of how the computers are connected to each other is known as topology. There are five types of topology – MESH, Star, Bus, Ring and Hybrid In mesh topology each device is connected to every other device on the network through a dedicated point-to-point link. When we say dedicated it means that the link only carries data for the two connected DEVICES only. Lets say we have n devices in the network then each device must be connected with (n-1) devices of the network. Number of LINKS in a mesh topology of n devices would be n(n-1)/2. Advantages of Mesh topology 1. No data traffic issues as there is a dedicated link between two devices which means the link is only available for those two devices. 2. Mesh topology is reliable and robust as failure of one link doesn’t affect other links and the COMMUNICATION between other devices on the network. 3. Mesh topology is secure because there is a point to point link thus unauthorized ACCESS is not possible. 4. Fault detection is easy. |
|
| 3490. |
A seperated area of a hall that hold the files until the infection can be remove known as |
| Answer» | |
| 3491. |
Name the virus spread by files attachment to email message |
|
Answer» WORM is the NAME of the virus which spread via FILES ATTACHMENT to e-mail message . |
|
| 3492. |
Solve 12 * 3 + (14 + 4) + 2 ^ 3 -12 / 6 in QBasic |
|
Answer» → Mark as BRAINLIEST !! ✨✨ |
|
| 3493. |
Name the different modes of view in windows explorer. |
|
Answer» Answer: Here you can see the View options available: Icons (extra LARGE, large, medium, small), List, Details, Tiles, and Content. Another way to GET to the Views is to right-click or TAP and hold somewhere in a blank space from WITHIN the File Explorer window. Explanation: please mark me as brainlest and please GIVE me thanks. |
|
| 3495. |
Which of the following languages is closer to human languages? |
|
Answer» Answer: A high-level LANGUAGE (HLL) is a programming language such as C, FORTRAN, or PASCAL that enables a programmer to write programs that are more or less independent of a particular type of COMPUTER. Such LANGUAGES are considered high-level because they are CLOSER to human languages and further from machine languages. Explanation: |
|
| 3496. |
Explain computer virus |
|
Answer» a COMPUTER VIRUS is a program that MAY cause harm to the computer |
|
| 3497. |
Features of first generation computer ,second generation computer and third generation computer |
|
Answer» Answer: Explanation: FIRST generation: 1. They used vacuum tubes as their main component. 2. For example: EDSAC, EDVAC, UNIVAC etc. 3. They were large in size. Second generation: 1. They used TRANSISTORS as their main component. 2. They were smaller than first generation computer. 3. They were FASTER than first generation computer. Third generation: 1. The used integrated circuit as their main component. 2. They support high level programming language. 3. They are faster, reliable and more EFFICIENT than first and second generation computer. |
|
| 3498. |
Define ‘row’ and ‘column’. |
|
Answer» Raw is defined as the collection of HORIZONTAL direction. Column is defined as the collection of vertical direction . HOPE it helps you. |
|
| 3499. |
Features of first , second and third generation computer |
|
Answer» Answer: The first computer systems used vacuum tubes for circuitry and magnetic drums for memory, and were often enormous, taking up entire rooms. These COMPUTERS were very expensive to operate and in ADDITION to using a GREAT deal of electricity, the first computers generated a lot of heat, which was often the cause of malfunctions. First generation computers relied on machine language, the lowest-level programming language understood by computers, to perform operations, and they could only solve one problem at a time. It would take operators days or even weeks to set-up a new problem. Input was based on punched cards and paper tape, and output was displayed on printouts. The UNIVAC and ENIAC computers are examples of first-generation computing devices. The UNIVAC was the first COMMERCIAL computer delivered to a business CLIENT, the U.S. Census Bureau in 1951. Explanation: HOPE YOU LIKE MY ANSWER MARK ME IN BRAINLIEST |
|
| 3500. |
2. Which of the following are considered as low-level languages? |
| Answer» | |