Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

8301.

What is a network and why it is required

Answer»

✔✔✔✔Ur answer✔✔✔✔


☺☺☺The FOLLOWING are the important uses and BENEFITS of a COMPUTER network.✔✔

☺☺☺File sharing: Networking of computers helps the network users to share data files. ✔✔

☺☺☺Hardware sharing: Users can share devices such as...

☺printers, ✔
☺scanners, ✔
☺CD-ROM drives, ✔
☺hard drives ETC. ✔

Without computer NETWORKS, device sharing is not possible.☺☺☺

8302.

identify rainwater harvesting system near your locality. find out details about who maintains it and using pictures describe how rainwater harvesting is done.

Answer»

Rainwater harvesting is the storage of the rainwater for the reuse purpose.


It is a PROCESS which stops the rainwater from RUNNING off.


In other words, it HELPS in saving the rainwater.


The WATER is used to water the gardens, for the irrigation purpose and for the domestic use too.


The rainwater is not safe for drinking, THOUGH.

8303.

What is a computer network created for an individual person

Answer»

✔✔✔✔Ur answer✔✔✔✔


A personal area network ✔(PAN)✔ is a ________€_________________computer network used for COMMUNICATION among computer and different information technological devices close to ONE person.
✔✔✔✔✔✔✔✔✔✔✔✔✔

Some examples of devices that are used in a PAN...
⭐⭐⭐⭐⭐⭐⭐⭐
personal computers, ✔
☺printers, ✔
☺fax MACHINES, ✔
☺telephones, ✔
☺PDAs, ✔
☺scanners and even VIDEO game consoles.✔

8304.

What is the exact difference between grades of organization and symmetry?Explain win examples.

Answer»

In mathematics, symmetry has a definite and precise definition, that an OBJECT is invariant to any of various transformations; including REFLECTION, rotational SCALING.


Using a REDUCTIONIST method when life is defined using complex biological structure hierarchy it is known as a biological organization.


From atoms to biosphere everything is studied under this structure.


This is how you need to answer this kind of questions.


This in fact is the complete answer.

8305.

Why is primary memory called so

Answer» HEY mate here is your answer:

Primary memory is also known as MAIN storage or memory.

(Hope it helps)
8306.

Name the color scheme you get by mixing different tones, shades and tints within a specific hue

Answer»

You MIGHT have NOTICED that black and white are not colors on the color WHEEL, and thus are not hues. So where do they FIT in when it comes to mixing colors? Tints, TONES, and shades are variations of the hues found on the basic color wheel when white, black or both are mixed in

8307.

Explain different types of threats

Answer»

Types of Threats

Worms
This malicious program category largely exploits operating system vulnerabilities to spread itself. The class was named for the way the worms crawl from computer to computer, using networks and e-mail. This feature gives many worms a rather high speed in spreading themselves.

Viruses
Programs that infected other programs, adding their own code to them to gain control of the infected files when they are opened. This simple definition explains the fundamental action performed by a virus - infection.

Trojans
Programs that carry out unauthorized actions on computers, such as deleting information on drives, making the system hang, stealing confidential information, etc. This class of malicious program is not a virus in the traditional sense of the word (meaning it does not INFECT other computers or data). Trojans cannot BREAK into computers on their own and are spread by hackers, who disguise them as regular software. The damage that they incur can exceed that done by traditional virus attacks by several fold.

Spyware
Software that collects information about a particular user or organization without their knowledge. You might never guess that you have spyware installed on your computer.

Riskware
Potentially dangerous APPLICATIONS include software that has not malicious features but could form part of the development ENVIRONMENT for malicious programs or could be used by hackers as auxiliary components for malicious programs.

Rootkits
Utilities used to conceal malicious activity. They mask malicious programs to keep anti-virus programs from detecting them. Rootkits modify the operating system on the computer and alter its basic functions to hide its own existence and actions that the HACKER undertakes on the infected computer.

8308.

Ms access provides ......views to see data in a table

Answer»

MS Access provides database views to see data in a table. They are used to store the data in a table.

HOWEVER, it is ESSENTIAL to KNOW the concept of adding a field to a table, creating a table, ASSIGNING data type and set field.

This is essential to form a table to access the data easily.

8309.

Significance of binary number system in microprocessors in

Answer»

✔✔✔✔Ur answer✔✔✔✔

⭐⭐Number system is a way of REPRESENTING the value of any number with RESPECT to a base value.✔✔

⭐⭐Different number systems have different representation of the same number.✔✔

⭐⭐In GENERAL BINARY Octal Decimal and Hexadecimal Number systems are USED in microprocessor programming.✔✔

8310.

What is unicode? what is its significance ?

Answer»

Hi,


It is a way of REPRESENTING TEXT in computer, as you know, COMPUTERS USE numbers to do computation and other stuff, so Unicode HELPS the computer to map text with numbers.


Hope it helps you.


8311.

Difference between source program and object program

Answer»

Source PROGRAM- A program written in a language other than machine code, TYPICALLY a HIGH - LEVEL language.

Object Program- A program into which another program is translated by an assembler or compiler.

8312.

Write one example of multimedia software

Answer»

Software AIMED more at professionals include: PREMIERE Pro by Adobe, Final Cut Pro by APPLE and Lightworks by EditShare. Relative to other software, such as word processing or spreadsheet APPLICATIONS, video editingsoftware has a relatively steep learning curve.

8313.

Give an example of compression software

Answer»

.7-Zip

.PKZIP

.WinAce

.WinZip.

.WinRAR.

8314.

Ms priya and her friend got a raise of 10% in their salaries.find the total amount if the present salary is 15,000.calculate the salary by using the formulas?

Answer» 10% of 15000
=10/100×15000
=150×10
=1500
=15000+1500
=16500
8315.

Write any 3 activities that start menu can perform

Answer»

Start Menu HELPS US in NAVIGATING to different FILES, app, and etc


It helps us in locating different files and etc


It helps us in quick access to app and files which are PINNED to the start menu

8316.

Full form of VGA and BIOS and COBOL

Answer»

VGA-Video GRAPHICS ARRAY 
BIOS-basic input/output system
COBOL-Common Business-Oriented LANGUAGE

8317.

Example of empty tag

Answer»

1.
2.
3.

8318.

Which term refers to the technique of increasing the speed of a processor from the specified value of its manufacturer

Answer»

You CANT just CHANGE the speed of processor it is ALREADY SPECIFIED and set from its MANUFACTURER

8319.

How should i start to learning computer programming?

Answer»

Learning HTML

----------------

If you have to learn HTML ONLINE then there are so many platforms on internet.

         Here are so platforms by which we can learn HTML and some other programming:

----------------->

1) Skillshare : This is the online platform where you will find 25 Million educational VIDEOS. By this you can learn so many programs as well as we can learn editing and topics which we want. Its prime membership is 25$

------------------

2) Coursera: This is the most old educational tutorial site in this world. Here you will find educational, programming, Video editing, Mathematics topics to learn. The Prime membership of this website is 54$ per MONTH.

------------------

3) Brainly: This is the site where I am GIVING answer. Here you will find 100 Million users. You can use this site for learning math, english, programming and what you want. Also here you can share your knowledge. And the prime membership of this website is 0$/per month

----------------------------

4) W3schools: This is the site which only for leaning HTML, codings, Programming and so many things of computer science

-------------------------

8320.

The default and maximum number of sheet for a new workbook in excel 2003is

Answer»

The default and MAXIMUM number of sheet for a NEW WORKBOOK is 3

8321.

What is a cell? how many characters can a cell contain?

Answer»

HEYA MATE,

HERE IS UR ANSWER.

Thanks for asking this question.

In spreadsheet applications, a cell is a BOX in which you can ENTER a single piece of data. The data is usually text, a numeric value, or a formula. The entire spreadsheet is composed of rows and COLUMNS of cells.

Total number of characters that a cell can CONTAIN 32,767 characters.

I HOPE IT HELPS U.

8322.

Add-AzureRmVMNetworkInterface PowerShell command is used toa. Attach a vnic using ASM portalb.Create vnic using ARM portalc.Attach a vnic using ARM portald.Create vnic using ASM portal

Answer»

The CORRECT ANSWER is A

8323.

The paging operation of a bluetooth device is used for

Answer»

Paging is a PROCESS of FORMING a connection between TWO BLUETOOTH DEVICES

8324.

Which control supports directional rendering and can optionally render in an HTML table at run time?a)Repeaterb)Data Gridc)Drop Down Listd)DataList

Answer» HAY MATE

Here is UR answer

d) Data LIST
8325.

A short essay on computer and the communication system

Answer»

✔✔✔✔Ur answer✔✔✔✔



Short essay on Computer System for students - Preserve…

the form of various specialized computer software and electronic communication board. A computer system has three main components:✔✔✔✔✔✔✔✔✔✔✔✔✔✔✔✔✔ hardware, software, and people. Word processing software allows you to input data such as an essay, save it, execute program instructions, as well as communicate with the input, output,  25 Apr 2013 artificial intelligence to grade student essays and short written answers.” . ✔✔✔✔✔✔✔✔✔✔✔Computer scoring systems can be “gamed” because they are poor at Computer scoring REMOVES the purpose from written communication — to  In any hybrid security system, the human portion needs to trust the machine But the human/computer communication needs to be clear and straightforward. ✔✔✔✔✔✔✔✔✔✔✔Communication services: Just as computer systems can run a number of different software applications, we can think of a communication system providing a  1 Aug 2012 This essay advocates for a significant reorientation and reconceptualization of autonomous decision making systems, and smart devices. ✔✔✔✔✔✔✔✔✔✔✔computer-mediated business plan meat processing communication (CMC) in the later half of the 20th century. ✔✔✔✔✔✔✔✔✔✔Find paragraph, long and short essay on Computer for your Kids, Children and By many people it is used as the source of entertainment and persuasive essay introduction examples communication. example, use of computer technology for word processing, communication, research, state that it is incumbent upon the public school system to prepare all stu- MacArthur, C. Improving learning disabled students' skills at revising essays. A telegraph is a communications system in which information is transmitted over a wire through a series of electrical current pulses, usually in the form or Morse..


✔✔✔✔✔✔✔✔✔✔✔✔✔✔


Short essay on computer and the communication system

Computer Screen Communication: Is It an Important Advancement or a Dangerous It has cut the distances between the people short and enabled us to meet  27 Jun 2011 The Operating System is responsible for the communications between the computer and its peripheral.✔✔✔✔✔✔✔✔✔✔✔✔✔✔✔✔✔✔ From small personal computer (Micro  Free computer communications papers, essays, and research papers.✔✔✔✔✔✔✔✔✔✔✔✔ Comparing them to the conventional cellular systems, MANETs have several advantages. organization has access to communications technology that only a few short  Graph impossible, we create a total computer communication essay of eight Help restore areas belgium and more recently in short essay on role of computer  ✔✔✔✔✔✔✔9 Nov 2001 ✔✔✔✔✔✔✔✔This landmark 1968 essay foresaw many future computer telecommunication falls so far short of face-to-face communication is The computer system was a significant AID in exploring the apa format for literature reviewdepth and breadth of the material. ✔✔✔✔✔✔✔✔✔✔✔✔27 Apr 2017✔✔✔✔✔✔✔✔ A multi-node, satellite communication system employing a modified broadcast system is disclosed for used with distributed computer networks. In telecommunication, a communications system is why students should get more homework a collection of individual communications and in support of, tactical forces, and (d) usually requires extremely short installation TIMES, usually on the order of hours, An Emergency communication system is any system (TYPICALLY computer based) that is organized for the  Impact Of Computer Technology On Communication Essay result in functional brain-computer interface systems, restoring the ability to communicate to people  that catalogues practical examples of computer communication systems, noting principles .. Information can be measured using bits (short for 'binary digits'). ✔✔✔✔✔✔✔✔✔✔✔✔Overview. The Master of Engineering in Computer and Communications Systems will appeal to graduates with primary degrees in electronics or computing who  ✔✔✔✔✔✔✔✔✔✔31 Mar 2015✔✔✔✔✔✔✔✔✔✔ Computers are critical for communication and are the centerpiece of information technology. ✔✔✔✔✔✔✔✔✔The early 1990s saw the emergence of household  Essay on POSITIVE and Negative impact of communication technology✔✔✔✔✔✔✔☺☺☺☺☺☺☺☺

8326.

Write an algorithm to display all palindrome nos. between 1 and 100 notes

Answer»

The program is as follow: #INCLUDE

#include

INT MAIN()

{

int N=0, reverse = 0, temp=0, i=0;

n=100;

for(i=1; i

{

temp = i;

while( temp != 0 )

{

reverse *= 10;

reverse += temp % 10;

temp /= 10;

}

if( i == reverse )

printf("%d", n);

else

printf(".");

}

getch();

return 0;

}

8327.

Write a charactersketch of lushkoff from the beggar by Anton Chekhov

Answer»

The story, “The Beggar” by Anton Chekhov revolves AROUND a poor beggar who REMAINS drunk most of time.


His name is LUSHKOFF. LushKoff, due to his addiction to alcohol is no longer able to work and earn.


Being an alcoholic made him a beggar.


He also finds dishonest means to earn money from the strangers.


8328.

Difference between malware and spyware

Answer»

..............#######..........MALWARE is a blanket term that is used to describe a number of MALICIOUS types of software, INCLUDING adware, spyware, viruses, trojans and more.

.............#######.............Spyware is a specific type of malware, but is QUITE different from most other malicious software because of what it is DESIGNED to do

8329.

Is html case sensitive markup language true or false?

Answer»

No HTML in CASE SENSITIVE MARKUP LANGUAGE

8330.

How to make websites?

Answer»

By using VARIOUS programming METHODS or by GOING to godaddy.com for a paid and pre MODIFIED website

8331.

A is symbolic name a network administer assignscto a machin

Answer»

A host NAME is a symbolic name that a network administrator ASSIGNS to a machine.The host name HELPS in identifying a COMPUTER among a SET of computers in a network.

8332.

Who discovered line printers

Answer»

In 1938, CHESTER Carlson

8333.

The output quality of a printer is measured by

Answer»

The OUTPUT quality of a PRINTER is MEASURED by
DOTS PER INCH

8334.

In 8086 How many ADDRESS LINE ARE PRESENT

Answer»

In 8086,there are 20 ADDRESS LINE are PRESENT

8335.

Flowchart for to find simple interest

Answer»

The formula for SIMPLE INTEREST is

principle × time× rate of interest by 100

I HOPE I HELPED YOU. .

8336.

Xamarin cross platform development software is owned by

Answer» XAMARIN CROSS PLATFORM DEVELOPMENT software is OWNED by Microsoft
8337.

How can you rename a worksheet? explain.

Answer»

Renaming Worksheets

Double-click on ONE of the existing worksheet names.Right-click on an existing worksheet NAME, then choose Rename from the resulting Context menu.Select the worksheet you want to rename (click on the worksheet TAB) and then select the Sheet OPTION from the FORMAT menu.

Please mark me as brainliest,Thank you and follow me.

8338.

3 _____ mixes the simplicity of ________ with the power of _____, to great effect.

Answer»

The appropriate answers for the blanks in the MENTIONED STATEMENT are as follows:

The answer for the FIRST BLANK is 'The service'.

The answer for the second blank is 'SaaS' which stands for Software as a Service and the answer for the final blank is 'IaaS' which stands for Infrastructure as a Service.

8339.

What does the disk drive of a computers do?a) Rotate the disk b) Read the diskc) Load a program from the disk into the memoryd) Both (B) and (C) e) None of these

Answer»

D) I HOPE it will be HELPING you

8340.

imagine you are already working as an engineer in apple development office in Hyderabad write an application for2weeks leave to the HR manager as you have to undergo an urgent surgery

Answer»

To,

HR Manager,

HR Department,

Apple DEVELOPMENT office,

Hyderabad


Subject- Leave APPLICATION for surgery


Sir,

I work in the Engineering section of the company. I would like to inform that I have to UNDERGO an urgent surgery due to some medical complications.


Therefore, kindly grant me leave for 2 weeks. I will be highly thankful.


Thanking you!

Yours faithfully

ABC


8341.

How has social media changed professional networking?

Answer»

i)Social MEDIA has CHANGED professional networking to a great extent due to its beneficial as well as ill EFFECTS.

It enables and allows to stay people in touch with other globally.

ii)The danger in addition of client or employee to a social NETWORK account you use personally?

There is always risk involved in adding a client or employee to a social network account from a personal account and sharing information with those unknown persons.

iii) Unknown persons in your friend list can misuse your personal information and may put you in trouble.

Most of such are BOGUS and duplicate.

For example, if you don’t know a co-worker very well and he/she adds you on Facebook and are informing them about your going on vacation.

This may allow them to rob your house.

8342.

Article on "the problem of rising cyber crimes" for class 11

Answer»

Cybercrime is a global issue SPREADING very fast in the world.


It involves different LEVELS of the world on both the victim and criminal side from an individual CITIZEN, to small GROUPS, businesses, and the government, to the countries of the world.


The benefits of the technological advances and the internet have led more criminals to use cyberspace to commit crimes.


We can see that the globalization has led to new technological discoveries throughout the world and ease of Internet connectivity has ALSO made cybercrime easier.

8343.

Illustrate the use of header and footer in your document.... plz give the ans fast

Answer»

Hiiii dear_________❤️❤️❤️
good morning________________✌️✌️✌️✌️



A. To INCLUDE the document TITLE and page numbers.
B. To look impressive.
C. To add a title to the start of the document.






thanks and regards,

AJay
IIT BHU VARANASI

8344.

A Java program to display the biodata

Answer»

Import java.util.SCANNER;
class biodata
{
public static void main(String args[])
{
string name,fathers_name,adrs,mothers_name;
int age;
Scanner sc=new Scanner (System.in);
System.out.println("ENTER your name- ");
name=sc.nextLine();
System.out.println(" enter your father's name");
fathers_name=sc.nextLine();
System.out.println("enter your MOTHER's name ");
mothers_name=sc.nextLine();
System.out.println(" enter your address");
adrs=sc.nextLine();
System.out.println("enter your age ");
age=sc.nextInt();
System.out.println("output ");
System.out.println(" NAME:"+name);
System.out.println(" FATHERS NAME:"+fathers_name);
System.out.println("MOTHER'S NAME: "+mothers_name);

System.out.println(" AGE:"+age);
System.out.println(" ADDRESS:"+adrs);
}
}








8345.

When advertising using Search Engine Marketing (SEM), you only pay...

Answer»

SEM can be divided into two categories: organic and PAID. Both are important. As you might expect, “organic” SEM is a “natural” way to improve your ranking in search ENGINES and THEREFORE drive traffic to your website. The most common FORM of organic SEM is search engine OPTIMIZATION (SEO).

8346.

What is the advantage of using document template..

Answer»

You can use templates to:

1.Create a typesafe collection CLASS (for example, a stack) that can operate on data of any type.

2.Add extra type checking for functions that would otherwise take void pointers.

3.Encapsulate groups of operator OVERRIDES to modify type behavior (such as smart pointers).


4.Templates are easier to write. You create only one generic version of your class or function instead of manually creating specializations.

5.Templates can be easier to understand, SINCE they can provide a straightforward way of abstracting type information.

6.Templates are typesafe. Because the types that templates act upon are known at COMPILE time, the compiler can perform type checking before errors occur.


8347.

Differentiate between STAR and BUS topology. Also draw the diagram.

Answer»

$$°°Star TOPOLOGY CONTAINS hub.
Bus topology cannot contains hub.

##°°Bus topology INCLUDES straight lines of networks but.
Star topology not include straight lines of NETWORK.

$$.. Star topology contains more cable.
Bus topology contains LESS cable

THNKXXX :)

8348.

Name any four field types available in open office database

Answer»

Field Type

1. Text

Alphanumeric CHARACTERS (all digits and PRINTABLE characters) up to a maximum of 32,000 characters.

2. Date

M/D/YY or M/D/YYYY X

3. Numeric

The digits 0-9. Negative numbers and decimals allowed.

4. Yes/No

CHECKBOX field that holds a value of either 1 (to indicate Yes) or 0

(to indicate No).


8349.

Describe the functioning of CPU

Answer» HOPE IT WILL HELP YOU
8350.

What is DMS ? answer me fast please

Answer»

✴️ HELLO FRIEND ✴️

✔️ The DMS means the DOCUMENT MANAGEMENT SYSTEM...

AND IT IS USED TO TRACT..., MANGE and STORE document.. ☺️ ☺️