Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

7601.

Write a program to test whether a number is palindorme or not

Answer»

This is the ANSWER for your QUESTION

7602.

What are the branch of robotic. plz reply

Answer»

Umm not so muxh SURE but...its AHH dancing CAREER..FEILD...

7603.

Differentiate between the analytical engine and the difference engine

Answer»

Difference Engines, and ANALYTICAL Engines. Difference engines are so called because of the mathematical PRINCIPLE on which they are BASED, NAMELY, the method of finitedifferences. ... Difference engines are strictly calculators.

7604.

What is a difference engine

Answer»

A difference engine is an automatic MECHANICAL calculator designed to TABULATE polynomial functions. The name DERIVES from the method of divided DIFFERENCES, a way to interpolate or tabulate functions by using a small SET of polynomial coefficient.

7605.

What is a tabulating machine

Answer»

The tabulating machine was an electromechanical machine designed to ASSIST in SUMMARIZING information stored on PUNCHED cards. Invented by Herman Hollerith, the machine was developed to HELP process DATA for the 1890 U.S. Census

7606.

Definition of table?

Answer»

A piece of furniture with a flat TOP and ONE or more legs , providing a label surface for EATING, writing,or WORKING at.

7607.

Define operating system correct definition fast answer

Answer»

An OPERATING system is the basic SOFTWARE that controls the computer.it SERVES an interface between the USER and the computer.

7608.

A data dictionary in a database contains information about

Answer» HELLO friend,

A data dictionary is a FILE or a SET of files that CONTAINS a database's metadata. The data dictionary contains records about other OBJECTS in the database, such as data ownership, data relationships to other objects, and other data.

Hope it helps u...
7609.

Access specifiers are used to control visibility of

Answer» ACCESS specifiers are used to control the class ,
three of access specifiers
1. public
2. private
3. protected
7610.

Advantages of the data bases give Four Points?

Answer»

♡●BONJOUR●♡

⬇️HERE IS YOUR ANSWER⬇️
________________________

THE FOLLOWING ADVANTAGES ARE:-

Data STRUCTURES allow information storage on hard disks. 

provides means for management of large dataset such as databases or internet indexing services.

Are necessary for DESIGN of efficient algorithms.

allows safe storage 

HOPE THIS ANSWER HELPS YOU
MARK AS BRAINLIEST ✌✌
_______×××××_______

7611.

Features of galaxy j7 nxt

Answer»

ANSWER:

Hope this answer will help you. If u want this answer in more detail so u can follow me.

Explanation:

  1. General, Brand, Samsung model galaxy J7 nxt
  2. Display screen size (inches) 5.50 Tochscreen
  3. Hardware processor. 1.6 HZ OCTAVE CORE RAM. 2GB
  4. Camera. Rear camera. 13-megapixel
  5. Software. OPERATING System 7.0
  6. Sensors. Compass/Magnetometer. Proximity sensor
7612.

To find the output of given formula

Answer» HEY friend

i WOULD have GIVEN your answer
but it isn't complete
so SORRY
7613.

Input and output in manufacturing process of car

Answer» INPUTING :-

REVERSING censors, back cameras, touch censors, GPS system, ETC this are technologies which are very useful for car driver

Outputs :-

Some technologies are very wierd this technologies which are generally inbuilts in cars are most of senseing systems touch censors senses the fingure touch, GPS locates your car and routes, reversing censors senses the back obstacles, back cameras helps to reverse the car easily in blind reverse and at DANGEROUS points.this are the main benefits and outputs of some basic technologies.
7614.

Selection tool is used to select a square or rectangular part of the picture

Answer» YES...............................
7615.

Write two advantages of high level language

Answer» 1. Advantages of High-Level Languages

●High-level LANGUAGE programs are portable.

(Although some programs COULD STILL have a few machine-dependent details, they can be used with little or no modifications on other types of machines.)

●High-level instructions:

°Program development is faster

°Fewer lines of code

°Program maintenance is easier

°Compiler translates to the target machine language.

7616.

What is the use of text box on the table

Answer»

It is USED to study.

plz MARK me as BRAINLIEST

7617.

What is OLE ? Expain ? Answer Fast

Answer»

Here is your answer FRIENDS:
OLE(object linking and embedding) is a proprietary technology developed by Microsoft that ALLOWS embedding and linking to documents and other objects. For developers it brought OLE control extension(OCX),a way to develop and use custom user interface elements.

hope it helps you a lot.
thank you very much.

if you like my suggestion.
mark me as brainlist

7618.

What is the name of the main chip in the computer that makes everything go?

Answer»

The computer brain is a microprocessor which is called the CPU (central PROCESSING unit).

The CPU is a chip CONTAINING millions of tiny transistors.

The CPU is a chip containing millions of tiny transistors as well as its CPU's job to perform the CALCULATIONS necessary to make the computer work.

7619.

What is OLE ? Answer Fast.......

Answer» OBJECT LINKING and embedding is the full FORM of o l E
7620.

What do you mean by High Level Languages? Give suitable examples.

Answer»

Hey DEAR ,

High level LANGUAGE is NOTHING but ENGLISH LIKE language in which we use English language during coding .


There are a lots of example of H.L.L:-

c++.

visual Basic

java etc

7621.

Which method is used to move the text in the document

Answer»

The ARROW KEYS or ENTER keys

7622.

Write a program to determine the volume of a cold storage of dimension 4m x 3m x 2m

Answer»

Public CLASS VOLUME
{
public static VOID main(String args[])
{
int L=4;
int b=3;
int h=2;
double vol = (l*b*h);
System.out.println(" Volume of the cold STORAGE = "+vol);
}
}

7623.

Write a program to find addition of three numbers using scanner class

Answer»

Import java.util.*;
CLASS Addition
{
public static VOID MAIN()
{
Scanner sc=new scanner (System.in);
int a,b,c,ADD;
System.out.println("Enter the value of a,b,c");
a=sc.nextInt();
b=sc.nextInt();
c=sc.nextInt();
add=a+b+c;
System.out println("Print the sum="+add);
}
}

7624.

State the use of structured query language

Answer»

hey

Actually structured query language is full form of SQL . It is use to perform tasks such update DATA to the database or retrieve data from the Database.

It is query language user give INSTRUCTION in the form of query and perform the operation.

hope U understand .

7625.

Name the MS Access object

Answer»

MS Access uses “objects" to help the user list and organize INFORMATION, as well as PREPARE SPECIALLY designed reports. When you create a database, Access offers you Tables, Queries, Forms, Reports, Macros, and Modules. Databases in Access are COMPOSED of MANY objects but the following are the major objects

7626.

What is meant by email etiquettes

Answer» EMAIL etiquette refers to the principles of BEHAVIOR that one should use when WRITING or answering email messages
7627.

Write the steps to Launch MS Access 2

Answer»

Hey dear here your answer :-

follow the following steps ---->

start access if database doesn't open then folow steps.

click MS office ------> click the TEMPLATE that you WANT to use -------> in pane (right SIDE) enter file NAME ------> click create ------> then you can start typing

☆☆☆note: ( if database is already open then click MS office BUTTON and then click close data base) then follow the above step to create new database.

...i hope its help... ☆☆ :)

7628.

Write disadvantage of internet give 7 points topic?

Answer»

Below is a list of many of the disadvantages of the Internet.

Bullying, trolls, stalkers, and crime. ...Exploitation and pornography and violent images. ...ADDICTION, time waster, and causes distractions. ...Never being ABLE to disconnect. ...Identity theft, hacking, VIRUSES, and cheating. ...Spam and ADVERTISING. ...Affects FOCUS and patience.

7629.

Int j=1, i=2 K = i++ + j++ * 4 + ++ i +(++j + 8)

Answer» K = 2+1*4+3+(2+8)
K = 2+1*4+3+10
K = 2+4+3+10
K = 19
7630.

Logical data independence allows modifications of the ______________ _____________ without rewriting application programs.

Answer» DATA STRUCTURES and STORAGE ORGANISATIONS
7631.

What is the difference between data and information

Answer»

Raw FACTS and INFORMATION are known as Data. Its is given to a computer for processing.
Processed data is known as information. It is an output of the ENTERED data.

7632.

Example of container tag

Answer»

HI,


container tags are those tag which NEED to be closed.

for example

is starting tag or opening tag

is closing tag

we can PUT text and other elements within opening and closing tags

some example of container tags are:-

1. html

2. head

3. body

4. title

5. p

and many more...


Hope it HELPS you.



7633.

Create an attractive web page to display a list of electronic and furniture items.

Answer»

Hi friend!

Is it needed to be in HTML? The following is an HTML CODE as your answer.
Type the following code in notepad.



The title is upon you




Items in my house





Electronic Items:







  • Your item one
  • Item two, etc.

    (Keep on adding the tag on the beginning of this LINE until your list comes to an end and then follow the next)






Furniture







  • Item one etc. (Continue until your list end and then,)




After typing this code, Press Ctrl+S, then type "Items_list.html" and choose where you WANT to save and click save. NOTE:- Your file will not become an HTML until you put the ".html" EXTENSION. And if there are multiple words in your file name then separate them USING _

Hope you found my answer useful .
7634.

Hello !No spamming Please!

Answer» HELLO DEAR SIR/ MAM your ANSWER
7635.

What is Display Buffer

Answer»

display buffer is the ALTERNATE NAME of frame buffer..
a frame buffer is a large piece of COMPUTER memory




hope it helpss
pls mark as BRAINLIEST

7636.

Write about uses of internet?.........in points

Answer»

..INTERNET is very useful. ..with the help of internet we can study. ..with the help of internet we can know many things which we do not know and with the help of internet we we MAY learn many THING's...

7637.

व्हाट इस कंप्यूटर नेटवर्क व्हाट आर यू एडवांटेज एंड डिसएडवांटेज

Answer»

Hey dear ...here your answer.....

=> A computer network is a group of computer that are CONNECTED together and that COMMUNICATE with and sharing the resources (like printer , folder, etc ) from one to another.

■ Advantage
◆ resources and data security are controlled through the server (centralized).
◆ any or all element can be replaced INDIVIDUALLY as need increase (scalability).
◆ new TECHNOLOGY can be easily integrated into system (flexibility).
◆ all components (client / network / server ) work together (interoperability).
◆ server can be accessed remotely and across multiple platforms (accessibility).

■ Disadvantage
◆ when server goes down, operations will cease across the network (dependence).
◆ no central repository for files and applications (decentralized).
◆ does not PROVIDE the security available on a client / server network. (security).

♧ Note: these are some basic advantage and disadvantage basically advantage and disadvantage are based on what type of computer network it is. :)

...i hope its help...
...if any problem in understanding then you can ask in comment... ☆☆ :)

7638.

Explain the home row key

Answer»

You can SEE it on you TUBE

7639.

What do you known about Microcomputers? Explain any two types of Microcomputers, Which you commonly find in day to day life?

Answer» LAPTOP tablet Mobile phone and pocket calculator are some examples of MICRO COMPUTER
7640.

What are different view options available for viewing files and folders

Answer»

Choose the type of view in which to display the contents of a FILE or folder from the View menu. Alternatively, to choose a view, choose View -> View as. Select the view that you WANT to USE from the Open with Other Viewer DIALOG, then CLICK on the Choose button. ... You can display different folders in different views.

7641.

In forms authentication the logon page should be kept in a folder which requires? a) Secure Sockets Layerb) Data Link Layerc) Network Layerd) Transport Layer

Answer»

SSL (Secure Sockets Layer) is a standard security protocol for establishing encrypted data links in an online COMMUNICATION.

The usage of SSL (Secure Sockets Layer) technology ensures that all the data that is transmitted between the WEB server and the BROWSER REMAINS encrypted.

It is all about the encryption and providing the security to the file.

7642.

Diffrentiate between url and domain name

Answer»

Hey there mat
URL refers
A Uniform resource locator, abbreviated URL, also known as web address, is a specific character string that constitutes a REFERENCE to a resource. For Instance http://en.wikipedia.org/wiki/Dom... is a URL where as en.wikipedia.org is the domain name named using the DNS.

A website is a collection of web pages on the world WIDE web (what you KNOW as the Internet), that lives on a certain domain name. Your website is actually more like a living entity. It's based upon the RELATIONSHIP between your site files, your web host, and your domain name.

7643.

Name the first automatic mechanical calculator

Answer»

The FIRST MECHANICAL Calculator. Blaise PASCAL, noted mathematician, thinker, and scientist, built the first mechanical adding machine in 1642 based on a design described by HERO of Alexandria (2AD) to add up the distance a carriage travelled."

7644.

Which programs help application software to connect to the hardware

Answer»

Hi,


OPERATING System HELPS the APPLICATION SOFTWARE to CONNECT to the hardware.


Hope it helps you.



7645.

Plz tell the shortcut keys of MS WORD......

Answer» CTRL + P open the PRINT window
Ctrl + S save the document
Ctrl+ T open the HANGING ident

I know only these
7646.

Extension of ms wordpad

Answer» EXTENSION of ms WORDPAD is .doc .

HOPE this helps you and please MARK as BRAINLIEST
7647.

Explain the type of computer network

Answer»

Types of Networks

There are several different types of computer networks. Computer networks can be characterized by their size as well as their purpose.

The size of a network can be expressed by the geographic area they OCCUPY and the number of computers that are PART of the network. Networks can cover anything from a handful of DEVICES WITHIN a SINGLE room to millions of devices spread across the entire globe.

7648.

What is offer and acceptance

Answer»

An OFFER is a open call to anyone wishing to ACCEPT the promise
an ACCEPTANCE OCCURS when an offer agree to be mutually bound

7649.

2. सबसे पहला कंप्यूटर का नाम क्या था ?(A) ATARIS(B) ENIAC(C) TANDY(D) NOVELLA

Answer» HY dear here is your ANSWER
______________

(B) ENIAC is correct answer dear☺️

ENIAC= Electronic Numerical Integrator and Computer☺️

____________☺️
7650.

1. कंप्यूटर के आविष्कारक कौन हैं ?(A) वॉन न्यूमेन(B) जे एस किल्बी(C) चार्ल्स बैबेज(D) इनमें से कोई नहीं

Answer»

Your ANSWER is OPTION C - CHARLES BABBAGE.