This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 8001. |
she found red and green wavy lines under some of the word in a text. what is this problem and how will it be resolved.? |
|
Answer» Red WAVY LINES is for GRAMMATICAL error |
|
| 8002. |
Write the steps to cut and paste an object in paint? |
| Answer» | |
| 8003. |
What is difference between Google and chrome |
|
Answer» GOOGLE is a search ENGINE but Chrome is a browser from Google... HOPE THIS WILL HELP U |
|
| 8004. |
Name some popular value-added service provided by 3Cs |
|
Answer» 1/ Internet 2/Broadband access 3/ Crptography 4/ Bluetooth 5/ MULTIMEDIA.... |
|
| 8005. |
Write a program to check whether a string is a palindrome or not in c |
|
Answer» Hey there! -------- Here's your code : /* C Program to check if a NUMBER is palindrome or not * using while loop */ /* Program By : Mahnaz */ #include int main() { int n, reversedInteger = 0, remainder, originalInteger; printf("ENTER an integer: "); SCANF("%d", &n); originalInteger = n; // reversed integer is stored in variable while( n!=0 ) { remainder = n%10; reversedInteger = reversedInteger*10 + remainder; n /= 10; } // palindrome if orignalInteger and reversedInteger are EQUAL if (originalInteger == reversedInteger) printf("%d is a palindrome.", originalInteger); else printf("%d is not a palindrome.", originalInteger); return 0; } ____________________________ See the attachment for proper review. _____________________________ |
|
| 8006. |
Write a program to evaluate a polynomial using horner's rule in c |
|
Answer» C++........... MARK me as brainliest and FOLLOW me |
|
| 8007. |
What is the difference between a hub and a switch |
|
Answer» Function of a switch vs. a hub. Aswitch is USED to connect various network SEGMENTS. A network switchis a small HARDWARE device that joins multiple computers together within one LOCAL AREA network (LAN). A Hubconnects multiple Ethernet devices together, making them act as a single segment? |
|
| 8008. |
What is use of full start screne |
| Answer» EASY ACCESS to APPLICATION and SETTING of PC | |
| 8009. |
Write a c program to delete the all consonants from given string |
|
Answer» #include |
|
| 8010. |
Why do we need computer language to communicate with a computer? |
|
Answer» Computers are machines that work with switches. At their basic LEVEL, they perform very few things. They store, retrieve DATA and perform BOOLEAN functions on bits and bytes. Their WAY to work is different than ours. They don't understand the language of ours. So, in order to make them understand what we want them to do, we use computer languages to COMMUNICATE with computer. |
|
| 8011. |
Which tab in font dialog box contains options to apply font effects? |
|
Answer» FONT TAB... is the ANSWER of your QUESTION |
|
| 8012. |
Which software is used to create full motion video animation sounds? |
|
Answer» Moho is a professional 2D ANIMATION software. Blender is a free open SOURCE 3D content creation suite. |
|
| 8013. |
Choose one option,,,, give my ans ... |
|
Answer» HELLO dear your answer OPTION (b) is correct that is notes HOPE it helps you |
|
| 8014. |
Which port is used for connecting mouse printer keyboard most commonly? |
| Answer» | |
| 8015. |
Which memory system is not used as a mass memory medium? |
|
Answer» Hello DEAR your answer is in down |
|
| 8016. |
Which technology is used for wireless file transfer? |
| Answer» BLUETOOTH, FIREWIRE, WIFI are USED | |
| 8017. |
Which are the different vedio formates by html to deliver video? |
|
Answer» ✔✔✔✔Ur answer✔✔✔✔ |
|
| 8018. |
Which bar is used for opening and closing of a file in excel? |
| Answer» TITLE BAR is used to OPENING and closing of a file in EXCEL | |
| 8019. |
Which bar contains page number and word count in ms word 2010? |
|
Answer» Status BAR CONTAIN PAGE number and WORD count in ms word 2010 |
|
| 8020. |
What is the relationship between item and bolt |
|
Answer» 1. what are the PROGRAM INTERRUPTS ? explain their significance ( in 50 words ) 2. what is cache MEMORY ? how it is fast as compare to CONVENTIONAL memory ? ( in 150 words ). |
|
| 8022. |
Switching in internets done by using datagram approach to packet switching at the |
| Answer» | |
| 8023. |
A device that works in conjunction with computer but not as part of its then what is this statement called |
|
Answer» The question is not very clear. If you are REFERRING to a DEVICE that is used in CONJUNCTION and not a PART it is light pen |
|
| 8025. |
What is the stored program concept and why is it important? |
|
Answer» ✔✔✔✔Ur answer✔✔✔✔ |
|
| 8027. |
What will be returned by new operator if memory allocation is unsuccessful? |
|
Answer» It returns NULL value if the MEMORY ALLOCATION is UNSUCCESSFUL. |
|
| 8029. |
What is the causes of disaster management with example? |
|
Answer» ✔✔✔✔Ur answer✔✔✔✔ |
|
| 8030. |
What is the basis of the itil approach to service management? |
|
Answer» Itil describes the BEST PRACTICES in it service management and provides a FRAMEWORK for the governance of it. It FOCUSES on continuos measurement and improvement of the QUALITY of it service delivered from both a business and customer perspective |
|
| 8031. |
What is a technique for documenting the entities and relationships in a database environment? |
|
Answer» This is CALLED ENTITY RELATIONSHIP DIAGRAM |
|
| 8034. |
Five types of application software with explaination |
|
Answer» Utilities |
|
| 8035. |
Why we are studying cyber security |
|
Answer» Cyber security is the most IMPORTANT form of education in today's world. As we all know that people are getting cheated more on through networks and TELEPHONIC way than on road. These are literally done by master MINDS and literally KNOWS mostly all details about you. Therefore cyber security study is very helpful now a days as it will protect you from such hackers. |
|
| 8036. |
What does dispose method do with connection object? |
|
Answer» ✔✔✔✔✔Ur answer✔✔✔✔✔ |
|
| 8037. |
Why the spam become a big issue of internet? |
| Answer» SPAM become a big ISSUE of INTERNET because we can ALSO TAKE the example of brainly because many of them are giving spam answer | |
| 8038. |
What is the permanent memory build into your computercalled? |
|
Answer» ✔✔✔Ur answer✔✔✔ |
|
| 8039. |
What are the major limitations of e-businiss 1? |
|
Answer» ✔✔✔✔✔Ur answer✔✔✔✔✔ |
|
| 8040. |
What is the link between bfs and dfs in artificial intelligence? |
|
Answer» Any odd DEGREE polynomial with real coefficients has at least ONE real ROOT. In what follows, I ..... Oops - NICE answer to the wrong question. 1 .... So NECESSARY conditions are. |
|
| 8041. |
When you cut part of your drawing it is temporarily stored in ..... |
|
Answer» Hey FRIEND...✋✋ |
|
| 8042. |
What is momery and different categories of memory? |
|
Answer» Hi |
|
| 8043. |
To search values in a file and replace it with another value |
|
Answer» We can use the OPTION replace and find present on HOME tab. |
|
| 8044. |
What happed when you press ctrl+x after selecting some cells in excel? |
|
Answer» The CELLS SELECTED are marked for CUTTING. As ctrl+x is the CUT option. |
|
| 8045. |
The track on a disk which can be accessed without repositioning the r/w heads is |
| Answer» CYLINDER is the ANSWER | |
| 8046. |
What are the phases of software development life cycle? |
|
Answer» There are SIX PHASES in sdlc: |
|
| 8047. |
What are the various components of digital computer? |
|
Answer» ✔✔✔✔✔Ur answer✔✔✔✔✔ |
|
| 8048. |
The operating system called unix is typically used for |
|
Answer» Hey! |
|
| 8049. |
The omr is able to evaluate only those documents which are printed within _____ position |
| Answer» MARKED is the ANSWER | |
| 8050. |
The counter that holds instruction fetched from store while decoding and execution is called |
| Answer» CURRENT INSTRUCTION REGISTER is the ANSWER | |