This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 10801. |
)(1111000)(11.1101)(110011),One word answerThe language which is directly understood by the computer1The number system that consists of 8 digits, 0 to 7 with the base 8.3. The program that is used to convert high-level language programinto machine language program in a single go.Language used to teach children how to instruct the computer to draw picturesby using commands.Answer the following questions,1. What is a low-level language?What is a high-level language? Write some of its advantages? |
|
Answer» Answer: Machine language(binary codes) Octal Number System Compiler A low-level language is a type of programming language that contains basic INSTRUCTIONS recognized by a COMPUTER. Two common types of low-level programming LANGUAGES are assembly language and machine language. Software programs and SCRIPTS are written in high-level languages, like C#, Swift, and PHP. |
|
| 10802. |
An uninvited link is underline and its color is blue. true or false |
|
Answer» FALSE because it'll be in RED colour plz MARK BRAINLIEST |
|
| 10803. |
Guys I am clicking the answer button but they are not allowing me to write in it.pls help me! |
|
Answer» Explanation: Hey mate this happens if you TRY to answer lately maybe other USERS are FASTER than you.So,just try to be fast enough! |
|
| 10804. |
What is cyber bullying explain its preventive measures |
|
Answer» Answer: Just as the use of technology itself has evolved, so has the ability to bully. Bullying, once restricted to the school or neighborhood, has now moved into the ONLINE world. Bullying through the use of technology is REFERRED to as cyberbullying. Cyberbullying is the use of technology to repeatedly and intentionally harass, hurt, EMBARRASS, humiliate, or intimidate another person. The preventive measures that should be taken are: 1. Educate yourself: To prevent cyberbullying from occurring you must understand exactly what it is. 2. Protect your password. 3. Keep photos PG: Before sending a racy photo of yourself to a peer or posting it online, consider if this is something you would want others to see, especially your family. 4. Pause before you post: Don't post anything that can compromise your reputation. 5. Raise AWARENESS: Bring awareness to cyberbullying. 6. Set up privacy controls. 7. Google yourself: Every once in while Google yourself. 8. NEVER open messages from people you don't know. 9. Don't be a cyberbully. 10. Log out of your accounts on public computers. Hope it helps you, mark me as brainlist ✌ |
|
| 10805. |
Video clip can be added to a slide by selecting the Home tab. * |
|
Answer» false Explanation: |
|
| 10806. |
In ms-excel which function display Row data in a column or column data in a row? |
| Answer» | |
| 10807. |
Can we create link in web page ? yes or no |
|
Answer» Answer: YES A basic link is created by wrapping the TEXT or other CONTENT, see Block level links, INSIDE an element and using the href attribute, also known as a Hypertext Reference, or TARGET, that contains the web address |
|
| 10808. |
7. ____________________stores the address of the next instruction to be executed for a process. |
|
Answer» Answer: The PROGRAM counter (PC) is a special REGISTER that holds the memory address of the next instruction to be executed. Explanation: |
|
| 10809. |
................ is used to fill information on a web server. |
|
Answer» (HTLM) or WEB from is USED to fill information on web SERVER |
|
| 10811. |
An HTML form is a part of web page which have those placeholders where ? |
|
Answer» Answer: The placeholder attribute specifies a short HINT that DESCRIBES the expected value of an input field (e.g. a sample value or a short description of the expected format). The short hint is displayed in the input field before the USER enters a value. Explanation: MARK as BRAINLIEST ANSWER AND FOLLOW ME. |
|
| 10812. |
Write a sql query to display the employees who is working as cleak,Analyst & Manager & he should get some Commission with salary>2000 either name 2nd letter is 's'? |
Answer» Okayy........ ....................... .. |
|
| 10813. |
व्हिच वन ऑफ द फॉलोइंग इज नॉट ए प्राइम मिनिस्टर ऑफ स्टेट चीफ मैनेजर |
|
Answer» sh fa hfsfhsfhstjsdtkdgjdkyxgmdykxmh Explanation: ggmvnsgkdvmsgkdgmykss |
|
| 10814. |
ट्रू एंड फॉल्स फोन नंबर्स कैन बे स्टोर्ड एस tecchul डाटा |
|
Answer» Answer: y 60 you know their what they have any DOG is the use Explanation: hhhj you know if you are you doing thyuyuyhhhhhu7iis is my FIRST CLASS mail intl airport airline ref no SIR please find the attached file is scanned IMAGE in PDF format you know their stuff and all their what they are you |
|
| 10815. |
What are the factors that should be considered while calculating the cost of building a software? |
|
Answer» Answer: 1. Workforce 3. Equipment like Computers 4. time required |
|
| 10816. |
Guys how can I answer questions in this app?pls help me |
| Answer» | |
| 10817. |
can you plz tell me that what are the graphical images that gives a quick access to the related applications . |
|
Answer» hills and VALLEYS are the graphical images that gives a quick ACCESS to the RELATED applications |
|
| 10818. |
A program is a set of introduction it is true or false |
|
Answer» false A PROGRAM is a SPECIFIC SET of ordered operations for a computer to perform Explanation: |
|
| 10819. |
Plz tell me Plz plz tell plz |
|
Answer» Find Password: Detective Buckshee Junior has been approached by the SHANTINIKETAN kids society for help in finding the password to the games complex. After hearing the scenario, detective Buckshee Junior realises that he will need a programmer's support He contacts you and requests your help. Please help the detective by writing a function to generate the password, The scenario is as below Five numbers are available with the kids These numbers are either stable or unstable A number is stable if each of its DIGIT occur the same number of TIMES, ie the frequency of each digit in the number is the same. Foreg 2277 4004. 11. 23 583835, 1010 are examples of stable numbers Similarly. A number is unstable if the frequency of each digit in the number is NOT the same. For e.g. 221, 4314. 101, 233, 58135, 101 are examples of unstable numbers The password can be found as below Te password = Maximum of all stable numbers - MINIMUM of all stable |
|
| 10820. |
pls solve these 1 word questions..if your ans is correct i will mark you as brainliest and follow you... |
|
Answer» Answer: SQL BETWEEN operator to select data within a range of VALUES. The BETWEEN operator is used in the WHERE clause to select a value within a range of values. We often USE the BETWEEN operator in the WHERE clause of the SELECT, UPDATE and DELETE statements. pls MARK as brainlist |
|
| 10821. |
1 pointA.......... program detects thechanges that the virus causesin the computerO antivirusO adwareO rootkitOnone of these |
|
Answer» antivirus Explanation: |
|
| 10822. |
6. When the process issues an I/O requesta) It is placed in an I/O queueb) It is placed in a waiting queuec) It is placed in the ready queuea) It is placed in the Job queue |
|
Answer» Answer: the answwe is : (B) it is PLACED in a WAITING QUEUE......... |
|
| 10823. |
Which software testing model is reliable and why? |
|
Answer» Answer: Reliability Testing is about exercising an application so that failures are discovered and removed before the SYSTEM is deployed. The PURPOSE of reliability testing is to determine PRODUCT reliability, and to determine whether the SOFTWARE meets the customer's reliability requirements. Explanation: |
|
| 10824. |
Which is the input device used for security survelliance |
|
Answer» COMMON types of inputs INCLUDE devices LIKE motion SENSORS and smoke detectors. Explanation: |
|
| 10825. |
The home and layout lab appear automatically when a table is insert in a document. |
|
Answer» Answer: When you INSERT or select a table in Microsoft Publisher 2010 the Table Tools contextual TAB will become available on the ribbon. This tab contains two TABS, DESIGN and Layout that give you the ability to quickly format your table, insert or delete rows and columns, set the alignment for cells, and format the typography of the text in your table. Explanation: |
|
| 10826. |
Risk is a term known 1 pointfor any event or action thatcould be harmful for acomputer hardware, softwaredata, information or processingcapability |
|
Answer» Explanation: In computer security, a threat is a potential negative action or event facilitated by a vulnerability that results in UNWANTED impact to a computer system or application. A threat can be either an negative "intentional" event (i.e. hacking: an individual cracker or a CRIMINAL organization) or "accidental" negative event (e.g. the POSSIBILITY of a computer malfunctioning, or the possibility of a natural disaster event such as an earthquake, a fire, or a tornado) or otherwise a circumstance, capability, action, or event.[1] This is differentiated from a threat actor who is an individual or group that can perform the threat action, such as exploiting a vulnerability to actualise a negative impact. |
|
| 10827. |
What is the default value of Valign attribute of tag? * |
|
Answer» Answer: Sets the vertical ALIGNMENT of cell content bottom. If set, the FIRST text LINE OCCURS on a baseline common to all CELLS in the row. ⠀⠀⠀⠀⠀⠀⠀. ⠀⠀⠀✦ ⠀ ⠀ ⠀⠀⠀⠀⠀* ⠀⠀⠀. . ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀✦⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀☄️ ⠀ ⠀⠀⠀⠀⠀⠀. . ゚ . . ✦ , . ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀☀️ * . . . ✦⠀ , * ⠀ ⠀ , ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀. ⠀ ⠀. ˚ ⠀ ⠀ , . . *⠀ ⠀ ⠀✦⠀ . . . ⠀ .
˚ ゚ . .⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀, * ⠀. . ⠀✦ ˚ * .⠀ . . ✦⠀ , . |
|
| 10829. |
Bit memoey kise khte hai |
|
Answer» Answer: a bit is the binary digit . the SMALLEST increment of data computer ....... A kilobyte is 1,024 byte not one thousand byte as might be EXPECTED because computer use binary math ,INSTEAD of DECIMAL system computer storage and MEMORY is often measured in megabyte , gigabyte thank you and love you guys |
|
| 10830. |
Def computepay(h,r):if h>40: p = 1.5 * r * (h-40) + (40*r) else: p = h*r return p hrs= input("Enter hours:") hr = float(hrs) rphrs = input("Enter rate per hour:") rphr = float(rphrs) p = computepay(hr,rphr) print("Pay",p) In these statements any error would be see ,please help me to change the error. |
|
Answer» <P>Answer: p= h*r Explanation: |
|
| 10831. |
What is a fullform of it |
|
Answer» INFORMATION Technology Explanation: |
|
| 10832. |
3 UAE marine proverbs |
|
Answer» I am not UNDERSTAND UR QUESTION |
|
| 10833. |
• Q.3 how can we calculate the raliability of a software? |
|
Answer» Explanation: Key Concepts Definition According to ANSI, Software Reliability is defined as: the probability of failure-free software operation for a specified period of time in a specified environment. [ANSI91][Lyu95]Although Software Reliability is defined as a probabilistic function, and comes with the notion of time, we must note that, different from traditional Hardware Reliability, Software Reliability is not a direct function of time. Electronic and mechanical parts may become "old" and wear out with time and usage, but software will not rust or wear-out during its life cycle. Software will not change over time unless intentionally changed or upgraded. Software Reliability is an important to attribute of software quality, together with functionality, usability, performance, serviceability, capability, installability, maintainability, and documentation. Software Reliability is hard to achieve, because the complexity of software tends to be high. While any system with a high degree of complexity, including software, will be hard to reach a certain level of reliability, system developers tend to push complexity into the software layer, with the rapid growth of system size and ease of doing so by upgrading the software. For example, large next-generation aircraft will have over one million source lines of software on-board; next-generation air TRAFFIC control systems will contain between one and two million lines; the upcoming international Space Station will have over two million lines on-board and over ten million lines of ground support software; several major life-critical defense systems will have over five million source lines of software. [Rook90] While the complexity of software is inversely related to software reliability, it is directly related to other important factors in software quality, especially functionality, capability, etc. Emphasizing these features will tend to add more complexity to software. Software failure mechanisms Software FAILURES may be due to errors, ambiguities, oversights or misinterpretation of the specification that the software is supposed to satisfy, carelessness or incompetence in writing code, inadequate testing, incorrect or unexpected usage of the software or other unforeseen problems.[Keiller91] While it is tempting to draw an analogy between Software Reliability and Hardware Reliability, software and hardware have basic differences that make them different in failure mechanisms. Hardware faults are mostly physical faults, while software faults are design faults, which are harder to visualize, classify, detect, and correct. [Lyu95] Design faults are closely related to fuzzy human factors and the design process, which we don't have a solid understanding. In hardware, design faults may ALSO exist, but physical faults usually dominate. In software, we can hardly find a strict corresponding counterpart for "manufacturing" as hardware manufacturing process, if the simple action of uploading software modules into place does not count. Therefore, the quality of software will not change once it is uploaded into the storage and start running. Trying to achieve higher reliability by simply duplicating the same software modules will not work, because design faults can not be masked off by voting. A partial list of the distinct characteristics of software compared to hardware is LISTED below [Keene94]: Failure cause: Software defects are mainly design defects. Wear-out: Software does not have energy related wear-out phase. Errors can occur without warning. Repairable system concept: Periodic restarts can help fix software problems. Time dependency and life cycle: Software reliability is not a function of operational time. Environmental factors: Do not affect Software reliability, except it MIGHT affect program inputs. Reliability prediction: Software reliability can not be predicted from any physical basis, since it depends completely on human factors in design. Redundancy: Can not improve Software reliability if identical software components are used. Interfaces: Software interfaces are purely conceptual other than visual. Failure rate motivators: Usually not predictable from analyses of separate statements. Built with standard components: Well-understood and extensively-tested standard parts will help improve maintainability and reliability. But in software industry, we have not observed this trend. Code reuse has been around for some time, but to a very limited extent. Strictly speaking there are no standard parts for software, except some standardized logic structures. The bathtub curve for Software Reliability 15❤️+follow=inbox |
|
| 10834. |
Q. Fill in the blanks.1. A _______________ is a database object that helps you to retrieve and View information from one or more Database tables. 2. in a query, the _______________ property is used to set the condition on the basis of which the records are filtered. 3. You can set multiple criteria in a query using ________________ property. 4. The ________________ property is used to filter The data either in an ascending or descending order. 5. A ________________ is an effective way to organise and summarise data for viewing or printing. |
|
Answer» Answer: 1)A _______View________ is a database object that HELPS you to retrieve and View information from one or more Database tables.2)An a query, the _____Filter__________ property is used to set the condition on the BASIS of which the records are FILTERED.3)You can set multiple criteria in a query using _____OR condition___________ property.4)The _____Sort___________ property is used to filter The data either in an ascending or descending order.5)A _____Pivot table___________ is an effective way to organise and summarise data for viewing or printing. |
|
| 10835. |
Difference between ordinary variable and array variable |
|
Answer» Answer: Array is different from ordinary variable because Array holds multiple values,whereas an ordinary variable HOLD a SINGLE value.It is true when the elements of the array are treated as INDIVIDUAL entities,and when the variables such as an int.It is not generally RIGHT to distinguish between a variable and an array. Ordinary Variable An Ordinary variable can contain only a single value. HOWEVER, an Array can contain multiple values, each identified by its own index number. Array Array can contain multiple values, each identified by its own index number. Explanation: |
|
| 10836. |
For text, which of the following changes with the face attribute of the font tag |
|
Answer» The font tag is having three attributes called size, color, and FACE to CUSTOMIZE your fonts. To change any of the font attributes at any TIME within your webpage, SIMPLY use the tag. The FONT element specifies the size and color of the font. |
|
| 10837. |
{Class-9th computer lesson-1 (cyber beans)}What are the major strengths of a computer? Name them. |
| Answer» | |
| 10838. |
P =1.5*r*(h-40)+(40*r) where there any error in this statement?? |
|
Answer» Yes Explanation: |
|
| 10839. |
Flow chart to check number for even or odd |
|
Answer» Answer: Odd Even FLOWCHART Following flowchart will read a NUMBER from USER. This number is CHECKED using % operator to find whether it is odd or even. |
|
| 10840. |
Generation computers are intelligent like human beings |
|
Answer» Answer: ARTIFICIAL INTELLIGENCE is an AREA of Computer SCIENCE concerned with making the computer perform tasks which, to be successfully done by human beings, require intelligence. |
|
| 10841. |
Which of the following techniques can teach you a few things about a thousand people? |
|
Answer» TECHNIQUES Are Not MENTIONED |
|
| 10842. |
Our brain works similar toCPUMouseMonitorKeyboard |
|
Answer» cpu Explanation: |
|
| 10843. |
What is the fullform of computer |
Answer» CommonlyoperatingmachineParticularlyUsedfortrainingeducationand RESEARCH |
|
| 10844. |
{Class-9th computer lesson-1 (cyber beans)}Mention the three components of a CPU ? |
|
Answer» Explanation: 1= ALU 2=CU 3=cache |
|
| 10845. |
Write a short note on entertainment |
Answer» Hey mate,Here's your answer.. ☺
Hope it HELPS. ❤ |
|
| 10846. |
Find the output for the following a b c 30 20 10 M,n a+20 a _20 print (m ,end ='') print (n ) |
| Answer» | |
| 10847. |
प्रश्न-12. 5 में से क्या घटाया जाये कि 41 रह जाये? |
|
Answer» Explanation: 5-(-39) =41 answer |
|
| 10848. |
Data type that only stores numbers representing valid dates and times is… |
| Answer» | |
| 10849. |
Define the result window with its tab rating and Error computer science |
|
Answer» Window has been the most widely used OPERATING system for personal COMPUTERS PCS. |
|
| 10850. |
Write the steps for printing labels |
|
Answer» Create and print a page of identical labels Go to Mailings > Labels. Select Options and choose a label vendor and product to use. Select OK. If you don’t see your product number, select New Label and configure a custom label. Label options dialog Type an address or other information in the Address box (text only). Envelope and labels dialog - labels To use an address from your contacts list select Insert Address Insert address ICON . To change the formatting, select the text, right-click, and make changes with Font or Paragraph. Select OK. Select Full page of the same label. Select Print, or New Document to edit, save and print later. Tip: Print your labels to a SHEET of paper before LOADING labels into the PRINTER to make sure the text aligns with the labels. |
|