Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

10801.

)(1111000)(11.1101)(110011),One word answerThe language which is directly understood by the computer1The number system that consists of 8 digits, 0 to 7 with the base 8.3. The program that is used to convert high-level language programinto machine language program in a single go.Language used to teach children how to instruct the computer to draw picturesby using commands.Answer the following questions,1. What is a low-level language?What is a high-level language? Write some of its advantages?​

Answer»

Answer:

Machine language(binary codes)

Octal Number System

Compiler

A low-level language is a type of programming language that contains basic INSTRUCTIONS recognized by a COMPUTER. Two common types of low-level programming LANGUAGES are assembly language and machine language.

Software programs and SCRIPTS are written in high-level languages, like C#, Swift, and PHP.

10802.

An uninvited link is underline and its color is blue. true or false​

Answer»

ANSWER:

FALSE because it'll be in RED colour

plz MARK BRAINLIEST

10803.

Guys I am clicking the answer button but they are not allowing me to write in it.pls help me!​

Answer»

ANSWER:

Explanation:

Hey mate this happens if you TRY to answer lately maybe other USERS are FASTER than you.

So,just try to be fast enough!

10804.

What is cyber bullying explain its preventive measures

Answer»

Answer:

Just as the use of technology itself has evolved, so has the ability to bully. Bullying, once restricted to the school or neighborhood, has now moved into the ONLINE world. Bullying through the use of technology is REFERRED to as cyberbullying.

Cyberbullying is the use of technology to repeatedly and intentionally harass, hurt, EMBARRASS, humiliate, or intimidate another person.

The preventive measures that should be taken are:

1. Educate yourself: To prevent cyberbullying from occurring you must understand exactly what it is.

2. Protect your password.

3. Keep photos PG: Before sending a racy photo of yourself to a peer or posting it online, consider if this is something you would want others to see, especially your family.

4. Pause before you post: Don't post anything that can compromise your reputation. 

5. Raise AWARENESS: Bring awareness to cyberbullying. 

6. Set up privacy controls.

7. Google yourself: Every once in while Google yourself.

8. NEVER open messages from people you don't know.

9. Don't be a cyberbully.

10. Log out of your accounts on public computers.

Hope it helps you, mark me as brainlist ✌

10805.

Video clip can be added to a slide by selecting the Home tab. *

Answer»

ANSWER:

false

Explanation:

INSTEAD of HOME it will be INSERT TAB

10806.

In ms-excel which function display Row data in a column or column data in a row? ​

Answer»

ANSWER:

Answer is TRANSPOSE. It is just the MATRIX OPERATION.

10807.

Can we create link in web page ? yes or no​

Answer»

Answer:

YES

A basic link is created by wrapping the TEXT or other CONTENT, see Block level links, INSIDE an element and using the href attribute, also known as a Hypertext Reference, or TARGET, that contains the web address

10808.

7. ____________________stores the address of the next instruction to be executed for a process.

Answer»

Answer:

The PROGRAM counter (PC) is a special REGISTER that holds the memory address of the next instruction to be executed.

Explanation:

10809.

................ is used to fill information on a web server.​

Answer»

(HTLM) or WEB from is USED to fill information on web SERVER

10810.

................is used to create a link on a web page ​

Answer»

HYPERLINK is your ANSWER.

10811.

An HTML form is a part of web page which have those placeholders where ? ​

Answer»

Answer:

The placeholder attribute specifies a short HINT that DESCRIBES the expected value of an input field (e.g. a sample value or a short description of the expected format). The short hint is displayed in the input field before the USER enters a value.

Explanation:

MARK as BRAINLIEST ANSWER AND FOLLOW ME.

10812.

Write a sql query to display the employees who is working as cleak,Analyst & Manager & he should get some Commission with salary>2000 either name 2nd letter is 's'?​

Answer»

ANSWER:

Okayy........ ....................... ..

10813.

व्हिच वन ऑफ द फॉलोइंग इज नॉट ए प्राइम मिनिस्टर ऑफ स्टेट चीफ मैनेजर​

Answer»

ANSWER:

sh

fa

hfsfhsfhstjsdtkdgjdkyxgmdykxmh

Explanation:

ggmvnsgkdvmsgkdgmykss

10814.

ट्रू एंड फॉल्स फोन नंबर्स कैन बे स्टोर्ड एस tecchul डाटा​

Answer»

Answer:

y 60 you know their what they have any DOG is the use

Explanation:

hhhj you know if you are you doing thyuyuyhhhhhu7iis is my FIRST CLASS mail intl airport airline ref no SIR please find the attached file is scanned IMAGE in PDF format you know their stuff and all their what they are you

10815.

What are the factors that should be considered while calculating the cost of building a software?​

Answer»

Answer:

1. Workforce

2. The SDKS REQUIRED

3. Equipment like Computers

4. time required

10816.

Guys how can I answer questions in this app?pls help me​

Answer»

Just TYPE your QUESTION in ASK or SCAN

10817.

can you plz tell me that what are the graphical images that gives a quick access to the related applications .

Answer»

ANSWER:

hills and VALLEYS are the graphical images that gives a quick ACCESS to the RELATED applications

10818.

A program is a set of introduction it is true or false

Answer»

ANSWER:

false

A PROGRAM is a SPECIFIC SET of ordered operations for a computer to perform

Explanation:

10819.

Plz tell me Plz plz tell plz

Answer»

\huge \fbox \colorbox{yellow}{❥Answer࿐ }

Find Password:

Detective Buckshee Junior has been approached by the SHANTINIKETAN kids

society for help in finding the password to the games complex. After hearing the

scenario, detective Buckshee Junior realises that he will need a programmer's

support He contacts you and requests your help. Please help the detective by

writing a function to generate the password,

The scenario is as below

Five numbers are available with the kids

These numbers are either stable or unstable

A number is stable if each of its DIGIT occur the same number of TIMES, ie the

frequency of each digit in the number is the same. Foreg 2277 4004. 11. 23

583835, 1010 are examples of stable numbers

Similarly. A number is unstable if the frequency of each digit in the number is

NOT the same. For e.g. 221, 4314. 101, 233, 58135, 101 are examples of

unstable numbers

The password can be found as below

Te password = Maximum of all stable numbers - MINIMUM of all stable

10820.

pls solve these 1 word questions..if your ans is correct i will mark you as brainliest and follow you...​

Answer»

Answer:

SQL BETWEEN operator to select data within a range of VALUES. The BETWEEN operator is used in the WHERE clause to select a value within a range of values. We often USE the BETWEEN operator in the WHERE clause of the SELECT, UPDATE and DELETE statements.

pls MARK as brainlist

10821.

1 pointA.......... program detects thechanges that the virus causesin the computerO antivirusO adwareO rootkitOnone of these​

Answer»

ANSWER:

antivirus

Explanation:

it can DETECT the VIRUS ALSO REMOVE from pc

10822.

6. When the process issues an I/O requesta) It is placed in an I/O queueb) It is placed in a waiting queuec) It is placed in the ready queuea) It is placed in the Job queue​

Answer»

Answer:

the answwe is : (B) it is PLACED in a WAITING QUEUE.........

10823.

Which software testing model is reliable and why?​

Answer»

Answer:

Reliability Testing is about exercising an application so that failures are discovered and removed before the SYSTEM is deployed. The PURPOSE of reliability testing is to determine PRODUCT reliability, and to determine whether the SOFTWARE meets the customer's reliability requirements.

Explanation:

10824.

Which is the input device used for security survelliance

Answer»

ANSWER:

COMMON types of inputs INCLUDE devices LIKE motion SENSORS and smoke detectors.

Explanation:

10825.

The home and layout lab appear automatically when a table is insert in a document.

Answer»

Answer:

When you INSERT or select a table in Microsoft Publisher 2010 the Table Tools contextual TAB will become available on the ribbon. This tab contains two TABS, DESIGN and Layout that give you the ability to quickly format your table, insert or delete rows and columns, set the alignment for cells, and format the typography of the text in your table.

Explanation:

10826.

Risk is a term known 1 pointfor any event or action thatcould be harmful for acomputer hardware, softwaredata, information or processingcapability​

Answer»

Explanation:

In computer security, a threat is a potential negative action or event facilitated by a vulnerability that results in UNWANTED impact to a computer system or application.

A threat can be either an negative "intentional" event (i.e. hacking: an individual cracker or a CRIMINAL organization) or "accidental" negative event (e.g. the POSSIBILITY of a computer malfunctioning, or the possibility of a natural disaster event such as an earthquake, a fire, or a tornado) or otherwise a circumstance, capability, action, or event.[1]

This is differentiated from a threat actor who is an individual or group that can perform the threat action, such as exploiting a vulnerability to actualise a negative impact.

10827.

What is the default value of Valign attribute of tag? *​

Answer»

Answer:

Sets the vertical ALIGNMENT of cell content bottom. If set, the FIRST text LINE OCCURS on a baseline common to all CELLS in the row.

⠀⠀⠀⠀⠀⠀⠀.          ⠀⠀⠀✦ ⠀ ⠀              ⠀⠀⠀⠀⠀* ⠀⠀⠀.          . ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀✦⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀☄️ ⠀ ⠀⠀⠀⠀⠀⠀.             .   ゚ .             .                ✦      ,       .

⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀☀️

      *           .

.             .   ✦⠀       ,         *

     ⠀    ⠀  ,

⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀.        ⠀   ⠀. 

  ˚   ⠀ ⠀    ,      .

             .

      *⠀  ⠀       ⠀✦⠀ 

                  .

    .    .   ⠀

           .

       

   ˚        ゚     .

 .⠀  ⠀‍⠀‍⠀‍⠀‍⠀‍⠀‍⠀‍⠀‍⠀‍⠀‍⠀,

   *  ⠀.

     .          ⠀✦

 ˚              *

.⠀           .        .

     ✦⠀       ,              .

10828.

Bit memory kise khte hai​

Answer»

ANSWER:

HELLO friend

your answer

10829.

Bit memoey kise khte hai​

Answer»

Answer: a bit is the binary digit . the SMALLEST increment of data computer ....... A kilobyte is 1,024 byte not one thousand byte as might be EXPECTED because computer use binary math ,INSTEAD of DECIMAL system computer storage and MEMORY is often measured in megabyte , gigabyte

thank you and love you

guys

10830.

Def computepay(h,r):if h>40: p = 1.5 * r * (h-40) + (40*r) else: p = h*r return p hrs= input("Enter hours:") hr = float(hrs) rphrs = input("Enter rate per hour:") rphr = float(rphrs) p = computepay(hr,rphr) print("Pay",p) In these statements any error would be see ,please help me to change the error.

Answer»

<P>Answer:

p= h*r

Explanation:

HRS = input (" Enter rate PER hour :")

10831.

What is a fullform of it​

Answer»

ANSWER:

INFORMATION Technology

Explanation:

10832.

3 UAE marine proverbs​

Answer»

ANSWER:

I am not UNDERSTAND UR QUESTION

10833.

• Q.3 how can we calculate the raliability of a software?​

Answer»

Explanation:

Key Concepts

Definition

According to ANSI, Software Reliability is defined as: the probability of failure-free software operation for a specified period of time in a specified environment. [ANSI91][Lyu95]Although Software Reliability is defined as a probabilistic function, and comes with the notion of time, we must note that, different from traditional Hardware Reliability, Software Reliability is not a direct function of time. Electronic and mechanical parts may become "old" and wear out with time and usage, but software will not rust or wear-out during its life cycle. Software will not change over time unless intentionally changed or upgraded.

Software Reliability is an important to attribute of software quality, together with functionality, usability, performance, serviceability, capability, installability, maintainability, and documentation. Software Reliability is hard to achieve, because the complexity of software tends to be high. While any system with a high degree of complexity, including software, will be hard to reach a certain level of reliability, system developers tend to push complexity into the software layer, with the rapid growth of system size and ease of doing so by upgrading the software. For example, large next-generation aircraft will have over one million source lines of software on-board; next-generation air TRAFFIC control systems will contain between one and two million lines; the upcoming international Space Station will have over two million lines on-board and over ten million lines of ground support software; several major life-critical defense systems will have over five million source lines of software. [Rook90] While the complexity of software is inversely related to software reliability, it is directly related to other important factors in software quality, especially functionality, capability, etc. Emphasizing these features will tend to add more complexity to software.

Software failure mechanisms

Software FAILURES may be due to errors, ambiguities, oversights or misinterpretation of the specification that the software is supposed to satisfy, carelessness or incompetence in writing code, inadequate testing, incorrect or unexpected usage of the software or other unforeseen problems.[Keiller91] While it is tempting to draw an analogy between Software Reliability and Hardware Reliability, software and hardware have basic differences that make them different in failure mechanisms. Hardware faults are mostly physical faults, while software faults are design faults, which are harder to visualize, classify, detect, and correct. [Lyu95] Design faults are closely related to fuzzy human factors and the design process, which we don't have a solid understanding. In hardware, design faults may ALSO exist, but physical faults usually dominate. In software, we can hardly find a strict corresponding counterpart for "manufacturing" as hardware manufacturing process, if the simple action of uploading software modules into place does not count. Therefore, the quality of software will not change once it is uploaded into the storage and start running. Trying to achieve higher reliability by simply duplicating the same software modules will not work, because design faults can not be masked off by voting.

A partial list of the distinct characteristics of software compared to hardware is LISTED below [Keene94]:

Failure cause: Software defects are mainly design defects.

Wear-out: Software does not have energy related wear-out phase. Errors can occur without warning.

Repairable system concept: Periodic restarts can help fix software problems.

Time dependency and life cycle: Software reliability is not a function of operational time.

Environmental factors: Do not affect Software reliability, except it MIGHT affect program inputs.

Reliability prediction: Software reliability can not be predicted from any physical basis, since it depends completely on human factors in design.

Redundancy: Can not improve Software reliability if identical software components are used.

Interfaces: Software interfaces are purely conceptual other than visual.

Failure rate motivators: Usually not predictable from analyses of separate statements.

Built with standard components: Well-understood and extensively-tested standard parts will help improve maintainability and reliability. But in software industry, we have not observed this trend. Code reuse has been around for some time, but to a very limited extent. Strictly speaking there are no standard parts for software, except some standardized logic structures.

The bathtub curve for Software Reliability

15❤️+follow=inbox

10834.

Q. Fill in the blanks.1. A _______________ is a database object that helps you to retrieve and View information from one or more Database tables. 2. in a query, the _______________ property is used to set the condition on the basis of which the records are filtered. 3. You can set multiple criteria in a query using ________________ property. 4. The ________________ property is used to filter The data either in an ascending or descending order. 5. A ________________ is an effective way to organise and summarise data for viewing or printing. ​

Answer»

Answer:

1)A _______View________ is a database object that HELPS you to retrieve and View information from one or more Database tables.

2)An a query, the _____Filter__________ property is used to set the condition on the BASIS of which the records are FILTERED.

3)You can set multiple criteria in a query using _____OR condition___________ property.

4)The _____Sort___________ property is used to filter The data either in an ascending or descending order.

5)A _____Pivot table___________ is an effective way to organise and summarise data for viewing or printing.

10835.

Difference between ordinary variable and array variable

Answer»

Answer:

Array is different from ordinary variable because Array holds multiple values,whereas an ordinary variable HOLD a SINGLE value.It is true when the elements of the array are treated as INDIVIDUAL entities,and when the variables such as an int.It is not generally RIGHT to distinguish between a variable and an array.

Ordinary Variable

An Ordinary variable can contain only a single value. HOWEVER, an Array can contain multiple values, each identified by its own index number.

Array

Array can contain multiple values, each identified by its own index number.

Explanation:

10836.

For text, which of the following changes with the face attribute of the font tag​

Answer»

The font tag is having three attributes called size, color, and FACE to CUSTOMIZE your fonts. To change any of the font attributes at any TIME within your webpage, SIMPLY use the tag. The FONT element specifies the size and color of the font.

10837.

{Class-9th computer lesson-1 (cyber beans)}What are the major strengths of a computer? Name them. ​

Answer»

ANSWER:

i HOPE this answer is HELP you

10838.

P =1.5*r*(h-40)+(40*r) where there any error in this statement??

Answer»

ANSWER:

Yes

Explanation:

10839.

Flow chart to check number for even or odd

Answer»

Answer:

EXPLANATION:

Odd Even FLOWCHART

Following flowchart will read a NUMBER from USER. This number is CHECKED using % operator to find whether it is odd or even.

10840.

Generation computers are intelligent like human beings

Answer»

Answer:

ARTIFICIAL INTELLIGENCE is an AREA of Computer SCIENCE concerned with making the computer perform tasks which, to be successfully done by human beings, require intelligence.

10841.

Which of the following techniques can teach you a few things about a thousand people?

Answer»

ANSWER:

TECHNIQUES Are Not MENTIONED

10842.

Our brain works similar toCPUMouseMonitorKeyboard

Answer»

ANSWER:

cpu

Explanation:

10843.

What is the fullform of computer ​

Answer»

Commonly

operating

machine

Particularly

Usedfor

training

education

and RESEARCH

10844.

{Class-9th computer lesson-1 (cyber beans)}Mention the three components of a CPU ?​

Answer»

ANSWER:

THREE COMPONENT

Explanation:

1= ALU

2=CU

3=cache

10845.

Write a short note on entertainment​

Answer»

Hey mate,

Here's your answer..

  • Entertainment is a form of activity that holds the attention and interest of an audience, or gives PLEASURE and delight.
  • It can be an idea or a task, but is more likely to be one of the activities or events that have developed over thousands of years specifically for the purpose of keeping an audience's attention.
  • Although PEOPLE's attention is held by different THINGS, because individuals have different preferences in entertainment, most forms are recognisable and familiar.
  • Storytelling, music, drama, dance, and different kinds of performance exist in all cultures, were SUPPORTED in royal courts, developed into sophisticated forms and over time became available to all citizens.
  • The process has been accelerated in modern times by an entertainment industry which records and sells entertainment products.

Hope it HELPS.

10846.

Find the output for the following a b c 30 20 10 M,n a+20 a _20 print (m ,end ='') print (n )

Answer»

ANSWER:

EXPLANATION:

WRONG QUESTION

10847.

प्रश्न-12. 5 में से क्या घटाया जाये कि 41 रह जाये?​

Answer»

ANSWER:

MINUS 39

Explanation:

5-(-39) =41 answer

10848.

Data type that only stores numbers representing valid dates and times is…​

Answer»

EXPLANATION:

DATE TIME OK ok okvvhyrfghfxj

10849.

Define the result window with its tab rating and Error computer science​

Answer»

ANSWER:

Window has been the most widely used OPERATING system for personal COMPUTERS PCS.

10850.

Write the steps for printing labels​

Answer»

EXPLANATION:

Create and print a page of identical labels

Go to Mailings > Labels.

Select Options and choose a label vendor and product to use. Select OK.

If you don’t see your product number, select New Label and configure a custom label.

Label options dialog

Type an address or other information in the Address box (text only).

Envelope and labels dialog - labels

To use an address from your contacts list select Insert Address Insert address ICON .

To change the formatting, select the text, right-click, and make changes with Font or Paragraph.

Select OK.

Select Full page of the same label.

Select Print, or New Document to edit, save and print later.

Tip: Print your labels to a SHEET of paper before LOADING labels into the PRINTER to make sure the text aligns with the labels.