Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

11651.

Write a paragraph to calculate the area of square in JAVA.

Answer»

public CLASS java

{

public static void MAIN (int a)

{

System.out.println (" ENTER the VALUE ");

area = a*a;

System.out.println ("the area of a square is ="+a");

}

}

11652.

D. The elements that require a starting as well as ending tag are calledi.Pair elementsii. Twin elementsiii. Container elementsiv. Empty elements​

Answer»

CONTAINER ELEMENTS because they are USED in PAIRS

11653.

Ut of the following tags identifies the document as an HTML document?i. ii. iii. iv. ​

Answer»

3 . BODY this is RIGHT and you can SEE

11654.

Search on internet and find out what problem does a website like Facebook try to solve?Is it getting solved? What are the alternative to the use of Facebook and Whatsapp ?

Answer»

ANSWER:

you can serach yourself

11655.

Java program is further divided into how many categories​

Answer»

Answer:

1. Static METHODS: A static method is a method that can be called and executed without creating an object. In general, static methods are used to create instance methods.

Static method can be invoked directly via CLASS name i.e.; we don't have to create an object for a class in ORDER to initiate static method.

You can get more INFORMATION on static methods here.

2. Instance methods: These methods act upon the instance variables of a class. Instance methods are being invoked with below syntax

<>.<>;

Instance methods are classified into two types

a. Accessor methods: These are the methods which read the instance variables i.e.; just go access the instance variables data. Generally these methods are named by prefixing with "get".

b. Mutator method: These are the methods, which not only read the instance variables but also MODIFY the data. Generally these methods are named by prefixing with "set".

3. Factory methods: A factory method is a method that returns an object to the class to which it belongs. All factory methods are static methods.

Eg: NumberFormat obj = NumberFormat.getNumberInstance()

11656.

Define Cartesian product joints ..​

Answer»

Answer:

A cartesion join , also KNOW as cartesion PRODUCT , is a join of every row of ONE table to every row of another table . For example if table A has 100 rows and is joined with B , which has 1000 rows , a cartesion joint will result in 100,000 rows

11657.

Give one word answer for each of the following:(a) It consists of rearranging them in alphabetical, incremental, chronological or booleanorder.b) It saves each query in the database.c) It creates a form that lets you enter information for one record at a timed) It shows the form wizard that helps you create simple, customizable forms please answer this questions please ​

Answer»

ANSWER:

i THINK its COMPUTER for 1AND 2

11658.

Value of giga is...... ​

Answer»

Answer:

VALUE of ONE GB = 1024MB.

it seems to be Gigga is RELATED to GIGABYTE

11659.

Write about two robot used in IT and about their features​.

Answer»

HEY mate!

==========

A robot is a machine—especially one programmable by a computer— capable of carrying out a complex series of actions automatically.[2] Robots can be guided by an EXTERNAL control device or the control may be embedded within. Robots may be constructed on the lines of HUMAN form, but most robots are machines designed to perform a task with no regard to how they look.

Robots can be autonomous or semi-autonomous and range from humanoids such as Honda's Advanced Step in Innovative Mobility (ASIMO) and TOSY's TOSY Ping Pong PLAYING Robot (TOPIO) to industrial robots, medical operating robots, patient assist robots, dog therapy robots, collectively programmed swarm robots, UAV drones such as General Atomics MQ-1 Predator, and even microscopic nano robots. By mimicking a lifelike appearance or automating movements, a robot may convey a sense of intelligence or thought of its own. Autonomous things are expected to proliferate in the coming DECADE,[3] with home robotics and the autonomous car as some of the main drivers.[4]

thanks!

11660.

Command to import all records from a existing dbf is

Answer»

ANSWER:

Import records to DBF File You may add records to the DBF file from a text file in either TXT or CSV format, or from ANOTHER DBF file (in case the names of the FIELDS coincide in both DBFs), from Excel (XLS,XLSX). To append a text file, click File.

11661.

Write about stiek picture of any seven used in computer network

Answer»

ANSWER:

LAN

MAN

WAN

PAN

RAN

CAN

BAN

Explanation:

11662.

How can we assemble hard disk in cpu inbuilt computer?

Answer»

ANSWER: you can't do that.

Explanation: that can be DONE by COMPUTER ENGINEER.

11663.

Soft copy refers to​

Answer»

A SOFT COPY is an ELECTRONIC copy of some type of data, such as a file VIEWED on a computer's display or transmitted as an e-mail attachment. Such material, when printed, is referred to as a HARD copy

11664.

2. Give one word answer for each of the following:(a) It is the software to manage the database by editing, creating, adding, deleting datain files.(b) It specifies the value of a field when a new record is created.(c) It provides the alternative name of the fields.(d) It formats the text at the time of entering data in datasheet view.please answer me please ​

Answer»

Explanation:

it is the SOFTWARE to manage the database by EDITING crafting adding GREETING that and files give answer

11665.

A field is a related group of​

Answer»

ANSWER:

CHARACTERS is the answer

REPORT my answer

11666.

Make a chart on different inventions related to the internet along with pictures. ​

Answer»

Answer:

Different inventions related to the internet has been made to utilize its full power.

Internet, abbreviated from Interconnected Networks, is considered to be one of the most important invention of the 20th Century. Internet provides us the capability to link various corners of the world and create a network of machines through which INFORMATION can be exchanged.  

The internet related inventions can be broadly classified into the following classes:

  • Video Hosting and Podcasts: Video hosting websites are one of the common educational means in the world, which hosts educational and informational videos for every aspect of work, life and study. Few examples are: YouTube, TeacherTube, Udemy etc.
  • Online Presentation Tools: Various presentation websites are now hosted on the internet, which allows the presenter to present his ideas to a wider range of audience, IRRESPECTIVE of the technical tools available to the audience. This allows the user to present a power point presentation to a viewer who does not have Microsoft PowerPoint installed on his device.  Examples: SlideShare, Vuvox etc.
  • Collaboration and Mind mapping Tools: The vast network of Internet allows teams from different geographical location to come together and work on the same project, using the collaboration and mind mapping tools. These tools create a virtual environment where people can meet and discuss their ideas. Few such tools are Mindmap, bubbl.us, Google documents etc.
  • Blogs: The Internet also has led to the invention of the concept of blogs, which helps ASPIRING and established writers to express their views and thoughts to a broader audience without the COST of published materials. Blogs also allows the writers to get the feedback from the readers easily and quickly. Examples: WordPress, Blogger etc.
  • The Internet Encyclopaedia: Gone are the days when people buy Encyclopaedia to get information about the various features of the world. The internet has paved way for various informational websites, which contains information about every possible topic. The biggest advantage of these websites is, the information is always updated as per the required changes. For example: Wikipedia
  • Social Networking: The internet has also allowed us to be in touch with our friends and family and to be aware of their happenings, even after staying thousands of miles apart.  Examples: Facebook, MySpace
  • Instant Messaging and Communicator: The biggest feat achieved in the field of communication is the invention of instant messaging and communicator tools. These tools allow CRISP and clear audio, video and text communication exchange between people staying in various geographical locations. For e.g., WhatsApp, Skype etc.
  • Microblogging Websites: Various microblogging websites allows user to broadcast their thoughts in few words to the world. Tools like Twitter helps in achieving this.
  • Virtual World and Augmented Reality: Internet has opened up the doors of Virtual reality. With the vast spread of images and information across the network, users nowadays can take a picture of an object and internet will help him to identify it.
  • RSS feeds: The telegraphic message from the world. RSS feeds provides highlights of the latest information about the topics, in which the subscriber has interest in.

The inventions related  to Internet along with their pictures is represented in the form of a chart attached below:

11667.

Solve these jumbled words LCAPITOTINA DRWERHAA​

Answer»

Answer:

1.captotinal

2.hardware

11668.

What is the first remainder known as​

Answer»

Answer:

FIRST REMAINDER simple!

Now u wanna ask - What's the definition of addition?...XD

11669.

A name or number used to identify a storage location is called

Answer»

ANSWER:

A name or number used to IDENTIFY a storage location is CALLED address

Explanation:

11670.

A computational mode of thinking means that everything can be viewed as a math problem involving numbers and formulas.true or false?

Answer»

HERE IS YOUR ANSWER:

TRUE

11671.

Full forms 15 computer subject​

Answer»

ANSWER:

it INFORMATION TECHNOLOGY

11672.

Write different web browser name and explain along with use logo for different web browser

Answer»

ANSWER:

google

chrome

opera

mozila FIRE fox

yahoo

11673.

The two things every computer can do are:?

Answer»

ANSWER:

Store documents

Play GAMES.

Use of MICROSOFT APPS

11674.

The command which delete all records unconditionally is

Answer»

ANSWER:

DELETE BUTTON for delete but for PERMANANT delete USE delete and shift

Explanation:

11675.

Explain the working of CPU,ALU and CU​

Answer»

Answer:

ALU and CU

An ARITHMETIC logic unit (ALU) is a digital circuit used to PERFORM arithmetic and logic operations. ... In ADDITION to ALUs, modern CPUs contain a control unit (CU). Most of the operations of a CPU are performed by one or more ALUs, which load data from INPUT registers.

Follow me..

11676.

State true or false plzzz​

Answer»

ANSWER:

a. FALSE

b. TRUE

c. TRUE

d. TRUE

11677.

Anip has written the formula=$A $5+A1+B1 in the cell c1.1.what will be the value in c1 2. what will be the value in c2:C4 if anup dragged the fill handle from c1 to c4? 3. what types of referencing are $A $5 and a1+b1?please answer my question i will mark you the brainliest....​

Answer»

Answer:

1. c1 =$A $5+A1+B1

C1 will have this as value

2. If anup drag the value of C1 TILL C4, then value of c2, C3 and c4 will be this

C2=$A $5+A2+B2

C3=$A $5+A3+B3

C4==$A $5+A4+B4

3. $A $5 this is called absolute reference and a1+b1 is called relative reference.

I HOPE this helped you

11678.

Define passive open and active open in computer networks

Answer»

ANSWER:

for a while AGO when I was wondering

Explanation:

dtijdrdugycradugtRgucfggaugystfuagdygiyihigydts5w4a3atdygig8g7d5s3aayfug8tudtstcihigfGssdftyujhdyfufhyddufgjdgfh6dabfcx bjgffg

11679.

Define denial of service in information security

Answer»

A denial-of-service (DoS) is any type of attack where the attackers (hackers) ATTEMPT to prevent legitimate users from ACCESSING the service.

=> In a DoS attack

=>the ATTACKER usually sends excessive messages asking the network or server to authenticate requests that have invalid RETURN addresses.

#follow me

11680.

Database and network techniques in system analysis

Answer»

Answer:

The development of a new information system INVOLVES several DIFFERENT, but related ACTIVITIES. These activities, or phases, usually include planning, analysis, DESIGN, implementation, and maintenance/support.

11681.

History of computer in short points​

Answer»

Answer:

the first ever COMPUTER is INVENTED in 1820 by charlse BABBAGE the history of computer HARDWARE covers the development from simple devices to aid calculation ETC

11682.

Define various types of network tell me fast very urgent ​

Answer»

Answer:

A NETWORK CONSISTS of TWO or more computers that are linked in order to share resources (such as printers and CDs), EXCHANGE files, or allow electronic communications. ... Two very common types of networks include: LOCAL Area Network (LAN) Wide Area Network (WAN)

11683.

Differentiate between fundamental and derived datatypes.​

Answer»

ANSWER:

HOPE it HELPS you

please MARK me as BRAINLIEST

11684.

Can we do b ed after bsc computer science quota

Answer»

ANSWER:

you can do ANYTHING in your LIFE if you you WANT to to do

11685.

Make a small chart and write about green economics and its important​

Answer»

Green Economy and Sustainable Mountain Development

In a green economy, growth in income and employment should be driven by public and private INVESTMENTS that reduce CARBON EMISSIONS and pollution, enhance energy and resource EFFICIENCY, and prevent the loss of biodiversity and ecosystem services.

Mark me brainest Frist

11686.

Paragraph on data cassette in 1 to 500 words​

Answer»

Magnetic tape data storage is a system for storing digital information on magnetic tape using digital recording. MODERN magnetic tape is most COMMONLY packaged in CARTRIDGES and cassettes. The device that performs writing or reading of data is a tape drive. Autoloaders and tape libraries automate cartridge handling. For example, a common cassette-based format is Linear Tape-Open, which comes in a variety of densities and is manufactured by several companies.[1]

Although magnetic tape was INITIALLY primarily for data storage,[2] newer uses included system backup,[3] data archive and data exchange.

Mark me brainest FRIST

11687.

How to create database of IPL in microsoft Access

Answer»

Explanation:

CLICK the File tab.

Choose New.

Access DISPLAYS a variety of database TEMPLATES you can use.Click an icon, such as Blank Database, or any database template.

When you click a template, a window appears; you see a preview of your template.

Click in the File NAME TEXT box and type a descriptive name for your database.Click the Create button to create your database file.

Access displays a blank database.

11688.

Shorty paragraph on smart classes​

Answer»

Explanation:

The classroom is a place that is constantly trying to be improved for the betterment of students’ EDUCATION. New TEACHING methods and improvement in ENVIRONMENT are all constantly being researched; however, recently, research on technology in the classroom has flourished. The Smart Classroom contains these TECHNOLOGICAL advances and triggers them TOWARD in-hancing student learning.

11689.

Why are the programming language is important for computer engineers​

Answer»

Answer:

Programming language is IMPORTANT because it defines the RELATIONSHIP, semantics and GRAMMAR which allows the programmers to effectively communicate with the machines that they program.

You can instruct the COMPUTER what to do in a human-readable form.

I LOVE to do programming.

Explanation:

11690.

When trying to promote your business locally, what three key bits of information should be present in your directory listing answer?

Answer»

EXPLANATION:

sjsjsbdbsjsnf fhdnd fbsbbs s

11691.

Explain Difference bw local and global page replacement

Answer»

Local vs. global replacement

A global replacement algorithm is free to select any page in memory. Local page replacement ASSUMES some FORM of memory partitioning that determines how many pages are to be assigned to a GIVEN process or a GROUP of PROCESSES.

11692.

Binary for NO????????????????????​

Answer»

Answer:

01001110 01101111 00111111 00111111 00111111 00111111 00111111 00111111 00111111 00111111 00111111 00111111 00111111 00111111 00111111 00111111 00111111 00111111 00111111 00111111 00111111 00111111 00100000 this is the CODE for no??????????????????????

11693.

Write the various rules to follow to declare variable in vb

Answer»

RULES for naming VARIABLES in Visual Basic

Must be unique within scope

Must BEGIN with a letter or the underscore _ character

May not contain embedded spaces or many special characters (. , “ - $ # * and others). The underscore _ is a valid character.

May not be a reserved word

In addition

Use upper and lower case with purpose. Once a variable is declared you do not have to be concerned with upper/lower case. The editor recognizes words that are the same except for case and makes them all the same for you. (use of upper and lower case differ between languages)

It is good programming practice in any language to use naming conventions (rules, standards) to name your variables. In Visual Basic the naming conventions include using a prefix that identifies the variable’s data type.

intNumber The prefix int would signify an integer variable

decHours The prefix dec would signify an Decimal variable, use sng for Single and use dbl for Double

strName The prefix str would signify a string variable

blnYearEnd The prefix bln would signify a Boolean variable

 

By default it is REQUIRED to declare variables before you use them. If you do not declare variables an error --- Name 'xxx' is not declared will be REPORTED. However it is not syntactically required that you indicate a data type. In this CLASS you must declare the data type when you declare the variable.

It is not a violation of the rules of the language to declare more than one variable on the same line

11694.

Write tje thong required for html programming

Answer»

ANSWER:

DOWNLOAD an APP CALLED BRACKETS

11695.

Write the steps to start a lesson in rapid typing software

Answer»

Explanation:

To add a new lesson, perform the FOLLOWING:

Choose the KEYBOARD layout and level from the drop-down list on the Taskbar.

In the NAVIGATION Tree, choose the course where you want to add the lesson.

Click the BUTTON on the Toolbar (or press Ctrl+N on your keyboard).

11696.

What is the most Basic cpp​

Answer»

Explanation:

Max CPP 2021

In 2021, the maximum CPP payout is $1,203.75 per month for new beneficiaries. The maximum CPP contribution is $3,166.45 for the EMPLOYEES and EMPLOYERS. For self-employed people the maximum CPP is $6,332.90. Self-employed people pay both employee and employer PORTION of CPP

11697.

Write a cpp program to display fibonacci series

Answer»

Answer:

#include

using namespace std;

main()

{

  INT n, c, FIRST = 0, SECOND = 1, NEXT;

  cout << "Enter the number of terms of Fibonacci series you want" << endl;

  cin >> n;

  cout << "First " << n << " terms of Fibonacci series are :- " << endl;

  for ( c = 0 ; c < n ; c++ )

  {

     if ( c <= 1 )

        next = c;

     else

     {

        next = first + second;

        first = second;

        second = next;

     }

     cout << next << endl;

  }

  return 0;

}

11698.

What device separates a single network into two segments but lets the two segments appear as one to higher protocols?

Answer»

Lol

Gehst at ufsjudjuuyy

11699.

Website hosting servers have their own unique ip address, what does this address consist of? Answer

Answer»

Answer:  IP ADDRESS is a unique id PROVIDED to EVERY pc it is consist of a unique SERIES of numbers

Explanation:

11700.

State True or False ..In Client-Server network, there is no central server​

Answer»

ANSWER:

FALSE there is ALWAYS a CENTRAL SEVER