Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

7851.

What variable type would you use for a true or false condition in php?

Answer»

PHP: HYPERTEXT Preprocessor is a programming language that is used in various fields today.

The full form of PHP is Personal Home Page.

There are CERTAIN variables that are used in programming and they all have a very specific set of FUNCTIONS.

In case of a 'true or false' condition in PHP, one should ALWAYS use the Boolean variable.

7852.

Which command is used to delete all rows from a table?

Answer» HIDE OPTION. but we can't DELETE
7853.

Where a microcontroller and a microprocessor is used?

Answer»

MICRO controller:


Applications:


automobiles, telephones, APPLIANCES and PERIPHERALS of the computer SYSTEM, washing machine..


MICROPROCESSOR:


Applications:


Desktop, Laptop, Personal computers..

7854.

What is meant by electrical erisable programmable read only memory?

Answer»

✔✔✔✔Ur answer✔✔✔✔


EEPROM ✔✔✔✔(also E2PROM)✔✔✔✔✔✔ STANDS for Electrically Erasable Programmable Read-Only MEMORY and is a type of non-volatile memory used in computers __________$____________integrated in microcontrollers for smart cards and remote keyless system____________$______________ and other electronic devices to store relatively small amounts of DATA but allowing individual bytes to be.☺☺☺☺☺☺

7855.

Which combination of keys are used to restart a computer?

Answer» CTRL + ALT KEY COMBINATION is USED
7856.

What is DDL and mention any two DDL statement??

Answer»

Hiii dear________❤️❤️❤️
good morning____________✌️✌️✌️


DDL or Data Definition Language are statements used to Create, Alter, Drop Database Objects, like Tables, Views, SPs, etc.


Some EXAMPLES:

– CREATE : used to define new objects

– ALTER : used to modify the definition of EXISTING objects

– DROP : used to remove existing entities.

– TRUNCATE TABLE : used to remove all rows from a table WITHOUT logging the individual row deletions.

– UPDATE STATISTICS : used to update QUERY optimization statistics on a table or indexed view.

7857.

What is difference between technology and language in sotware terms?

Answer»

✔✔✔Ur answer✔✔✔

⭐⭐⭐All softwear depend NET Framework is a software framework⭐⭐⭐

⭐⭐⭐⭐The .NET Framework is a software framework developed by Microsoft that RUNS primarily on Microsoft Windows.⭐⭐⭐⭐

✔✔✔✔✔✔✔✔✔✔

☺☺☺It INCLUDES a large library and PROVIDES language interoperability ✔✔✔✔✔✔✔(each language can use code written in other languages) ✔✔✔✔✔✔✔✔✔across several ☺☺☺programming languages.☺☺☺☺

7858.

What is data dictionary? what is the feature of data dictionary?

Answer»

This is the ANSWER for your QUESTION if it is HELPFUL for you MARK me as the BRAINLIEST

7859.

What will happen in word the use of ctrl key while dragging?

Answer»

I think it HELPS you if you LIKE my ANSWER Mark me as the brainliest

7860.

What us the correct html for adding a background color?

Answer»

Here is UR ANSWER .....



megha.com


TIME is money



hope it HEPS u.☺☺☺
7861.

What do you mean by abstract data type in data structure array?

Answer»

Array is COMMONLY USED in computer programming to mean a contiguous block of memory LOCATION, where each memory location stores ONE fixed length data item's. By this MEANING an array is a physical data structure.

7862.

What is process modeling in system analysis and design?

Answer»

✔✔✔✔✔Ur answer✔✔✔✔✔


☺☺☺PROCESS modeling is a technique for organizing and documenting the structure and flow of DATA through a system's ⭐PROCESSES and/or the logic⭐ ✔✔✔✔✔✔policies,✔✔✔✔✔✔✔✔ and PROCEDURES to be IMPLEMENTED by a system's PROCESSES.

⭐⭐⭐⭐⭐⭐⭐⭐⭐

☺☺☺A systems analysis process model CONSISTS of data flow diagrams (DFDs).✔✔✔✔

7863.

What is the between bfs and dfs on artificial intelligence?

Answer»

Any ODD DEGREE polynomial with real coefficients has at LEAST one real root. In what follows, I ..... OOPS - nice answer to the wrong question. 1 .... So necessary conditions are.

7864.

What are the different benefits of computer based pmiss?

Answer»

✔✔✔✔Ur answer✔✔✔✔


⭐BENEFITS OF COMPUTER-BASED PMIS⭐

The benefits of computer PMISs over manual systems are SPEED,

capacity, ✔
efficiency, ✔
economy, ✔
accuracy,✔
ability to HANDLE complexity.✔

⭐⭐⭐⭐⭐⭐⭐⭐⭐⭐⭐⭐⭐

The major benefit is speed.

✔✔✔✔✔✔✔✔✔✔✔✔✔

Once data have been COLLECTED and entered PRACTICALLY any manipulation can be DONE more rapidly by computers.

7865.

What are the different applications of a microprocessor?

Answer»

✔✔✔✔Ur answer✔✔✔✔


⭐It is also used in medical instrumentation⭐

Control : MICROPROCESSOR BASED controllers are AVAILABLE...✔✔✔✔✔✔✔

☺home appliances, ✔
☺such as MICROWAVE oven, ✔
☺washing MACHINE etc., ✔

⭐⭐⭐⭐⭐⭐⭐⭐⭐⭐⭐⭐⭐

microprocessors are being used in controlling various parameters like speed, pressure, temperature etc.✔✔✔

7866.

What is expert system shell in artificial intelligence?

Answer»

Any ODD degree POLYNOMIAL with real coefficients has at LEAST ONE real root. In what follows, I ..... Oops - nice ANSWER to the wrong question. 1 .... So necessary conditions are.

7867.

The correct sequence of levels as per 3-schema architecture is:

Answer» EXTERNAL LEVEL
Conceptual level
Physical level
7868.

What do you mean by computer based information system?

Answer»

Computer BASED information system , cbis, USES computer to collect , store , analyze and distribute information for a SPECIFIC PURPOSE.

7869.

Name three value added service provided by 3cs of technologie

Answer»

:CONTENT
CONSUMER electronics
communication

7870.

Helps to determine the effective security controls and measurement techniques

Answer»

A business aims at controlling and measuring its SECURITY.

Businesses often fall for COMPANIES that FAIL to offer them RESILIENT security techniques.

However, the drastic method of determining effective security controls and measuring them calls for more quantitative approaches like False POSITIVE Reporting Rate and Time to Respond.

The former validates that the threats that have been detected are real ones and the latter calculates the speed taken to respond to it.

7871.

Identify Web address nd email address from the following - 1.www.scrapbook.com

Answer» WEB ADDRESS - SCRAPBOOK
7872.

How many type of hardware devices are there

Answer»

There are two TYPES of HARDWARE DEVICES are internal and external hardware devices.

7873.

Fulform of computer and cpu and rom

Answer»

Computer: common OPERATING machine particularly used for trade education and research
CPU: CENTRAL processing unit
Rom: READ only memory

7874.

What is the output of the following code? int x = 64; int y = 0; while (x % 2 == 0) { y++; x = x / 2; } System.out.println(x + " " + y);

Answer» LET's TAKE the VALUE of x= 2^6=64(2 RAISED to power 6)
so in a while LOOP(after satifsy condition x%2==0) statement increase the value of y by 1 .
and x value divde by 2.
x=2^6, y=0
x=2^5, y=1
x=2^4, y=2
x=2^3, y=3
x=2^2, y=4
x=2^1, y=5
x=2^0=1, y=6
so while loop condition x%2==0
1%2==1:: not satisfy the condition.
therfore come out from while loop and execute next statement and print .
output: 1 6
7875.

What is robotics ls it related to artificial intelligence of fifth generation languages

Answer» HEY dear, here your answer ...

◆Basically ROBOTICS is a study about engineering, computer, software, robots, MACHINE, etc
▪Robotics is an interdisciplinary branch of engineering and science that includes mechanical engineering, ELECTRONICS engineering, computer science, and others.

◆yes, robotics is related to artificial intelligence where machine will be able to perform task or solve problems by USING itself IQ

...i hope its help...
dear ...if any problem in understanding then you can ask in comment ☆☆ :)
7876.

Write the steps to add page number in header

Answer»

The STEPS to add page number in the header Thursday we have to OPEN the MS WORD then we have to choose the had a option there is many layout of header there is also a way out of page number then SELECTED it AUTOMATICALLY set

7877.

What are the hardware devices used for computer graphics?

Answer» MOUSE,KEYBOARD,MONITOR are the HARDWARE DEVICES.
7878.

What are the different logic values used in digital logic?

Answer» DIFFERENT LOGIC GATE :-
add
or
nor
7879.

What are input and output devices. give an example of each?

Answer» INPUT DEVICES ARE KEYBOARD AND MOUSE.OUTPUT DEVICES ARE MONITOR AND PRINTER.
7880.

Tool used to graphically represent data in excel 2010

Answer» CHARTS are USED to GRAPHICALLY represent DATA in Excel
7881.

The printer output quality is measured in terns of what

Answer»

The PRINTER output QUALITY is MEASURED in dot per inch (DPI)

7882.

there is another type of program used to translate assembly language into machine code give the name of it

Answer»

ASSEMBLER is another TYPE of program USED to translate assembly LANGUAGE into MACHINE code.

7883.

Write the simple definition of robots

Answer»

1.

a MACHINE CAPABLE of CARRYING out a complex series of actions automatically, ESPECIALLY one programmable by a computer.

7884.

Ms word ke ek Word document me kitni bar undo command istemal kar sakte hain

Answer» HEY DEAR... ☺☺

HERE IS YOUR ANSWER

UNLIMITED TIMES.....

HOPE IT WILL HELP YOU
7885.

Write the simple definition of robotics

Answer»

The BRANCH of technology that DEALS with the DESIGN, construction, operation, and APPLICATION of robots called robotics ..

7886.

Hai Full form of. C P. U. plz andwer it frends

Answer»

CENTRAL PROCESSING UNIT -CPU

7887.

Powerpoin includes a slick diagramming feature called

Answer» SMARTART is your ANSWER BRO
7888.

Give the main reasons why we need robots

Answer»

Robots are USEFUL for HUMANS in doing dangerous WORK that are difficult and harmful for humans

7889.

What is the syntax of buffer???

Answer»

The buffer PROPERTY specifices whether to buffer the OUTPUT or not .when the output is SYNTAX RESPONSE {=flag}

7890.

Octal number system in microprocessor in

Answer»

✔✔✔✔Ur answer✔✔✔✔


☺☺☺These NUMBERS are used extensively in microprocessor work.✔✔✔✔
⭐⭐⭐⭐⭐⭐⭐⭐
☺☺☺The hexadecimal number system has a base of 16 and hence it consists of the FOLLOWING SIXTEEN number of digits. ✔✔✔✔
⭐⭐⭐⭐⭐⭐⭐⭐
✔0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E, F.✔

7891.

"name the service used for downloading files from the web"

Answer» HTTPS://docs.oracle.com/cd/B15595_01/content.101/b14494/uploaddownload.htm
7892.

Can you please tale me about seven layers of OSI model??

Answer»

Application (Layer 7)

OSI Model, Layer 7, supports application and end-user processes. Communication partners are identified, quality of service is identified, user authentication and PRIVACY are considered, and any constraints on data syntax are identified. Everything at this layer is application-specific. This layer provides application services for file transfers, e-mail, and other network software services. Telnet and FTP are applications that exist entirely in the application level. Tiered application architectures are part of this layer.

 Layer 7 Application examples include WWW browsers, NFS, SNMP, Telnet, HTTP, FTP 

Presentation (Layer 6)

This layer provides independence from differences in data representation (e.g., encryption) by translating from application to network format, and vice versa. The presentation layer works to transform data into the form that the application layer can accept. This layer formats and encrypts data to be sent ACROSS a network, providing freedom from compatibility problems. It is sometimes called the syntax layer.

 Layer 6 Presentation examples include encryption, ASCII, EBCDIC, TIFF, GIF, PICT, JPEG, MPEG, MIDI.

Session (Layer 5)

This layer establishes, manages and terminates connections between applications. The session layer sets up, coordinates, and terminates conversations, exchanges, and dialogues between the applications at each end. It deals with session and connection coordination.

 Layer 5 Session examples include NFS, NetBios names, RPC, SQL.

Transport (Layer 4)

OSI Model, Layer 4, provides transparent transfer of data between end systems, or hosts, and is responsible for end-to-end error recovery and flow control. It ensures complete data transfer.

 Layer 4 Transport examples include SPX, TCP, UDP.

Network (Layer 3)

Layer 3 provides switching and routing technologies, creating logical paths, known as virtual circuits, for transmitting data from node to node. Routing and forwarding are functions of this layer, as well as addressing, internetworking, error handling, congestion control and packet sequencing.

 Layer 3 Network examples include AppleTalk DDP, IP, IPX.

Data Link (Layer 2)

At OSI Model, Layer 2, data packets are encoded and DECODED into bits. It furnishes transmission protocol knowledge and management and handles errors in the physical layer, flow control and frame synchronization. The data link layer is divided into two sub layers: The Media Access Control (MAC) layer and the Logical Link Control (LLC) layer. The MAC sub layer controls how a computer on the network gains access to the data and permission to transmit it. The LLC layer controls frame synchronization, flow control and error checking.

 Layer 2 Data Link examples include PPP, FDDI, ATM, IEEE 802.5/ 802.2, IEEE 802.3/802.2, HDLC, Frame Relay. 

Physical (Layer 1)

OSI Model, Layer 1 conveys the bit stream - electrical IMPULSE, light or radio signal — through the network at the electrical and mechanical level. It provides the hardware means of sending and receiving data on a carrier, including defining cables, cards and physical aspects. Fast Ethernet, RS232, and ATM are protocols with physical layer components.

 Layer 1 Physical examples include Ethernet, FDDI, B8ZS, V.35, V.24, RJ45.

7893.

Which was the first supercomputer invented in india?

Answer» SUPERCOMPUTER PARAM 8000
7894.

Write an essay on plotter.

Answer»

The plotter is a computer printer for printing vector GRAPHICS. In the PAST, plotters were used in applications such as computer-aided design, though they have generally been replaced with wide-format conventional printers. A plotter gives a hard copy of the OUTPUT. It draws pictures on a paper using a PEN. Plotters are used to print designs of ships and machines, plans for BUILDINGS and so on.

7895.

Write a essay on computer mouse

Answer»

Hi here is your answer



A computer mouse (PLURAL: mice) is an input device that is most often used with a personal computer. Moving a mouse ALONG a flat surface can move the on-screen cursor to different ITEMS on the screen. Items can be moved or selected by pressing the mouse buttons (called clicking).[1] Today's mice have two buttons, the left button and right button, with a SCROLL wheel in between the two.

It is called a computer mouse because of the wire that connects the mouse to the computer. The PEOPLE who designed it thought that it looked like the tail on a mouse. Today, many computer mice use wirelesstechnology and have no 


7896.

How to see all available networks that you hvent connected to using cmd?

Answer»

GOTO CMD and TYPE there NET VIEW


7897.

How many keys are there in a keyboard

Answer» 101 KEYS are there in a KEYBOARD ...... HOPE it HELPS
7898.

Give some examples of Mobile application?

Answer»
HEY MATE HERE IS YOUR ANSWER.✌❤

1. Taxi booking - Uber , Ola etc
2. Online shopping - Myntra , Amazon , Flipkart etc.
3. business - Adobe ACROBAT READER , Voxer WALKIE Talkie Messenger , INDEED JOB Search etc.

#BE BRAINLY.❤❤
7899.

A short note on atria convergence technology

Answer»

Atria Convergence Technologies LIMITED., branded as ACT, is an Indian telecommunications company headquartered in Bengaluru, Karnataka. ACT OFFERS fiber to the home services under the brand name "ACT Fibernet" and digital television services under the "ACT Digital" brand. The company provides services in Karnataka, Telangana, Andhra Pradesh, Tamil Nadu and DELHI.[1]

ACT was the twelfth largest INTERNET service PROVIDER in India as of March 2016.

7900.

A short note on BSNL

Answer» BSNL =BHARAT SANCHAR NIGAM LIMITED