This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 11851. |
How should take care of computer? Write 3 sentence on it |
|
Answer» don't press keys hardly don't BRING LIQUID in CONTACT with pc avoid DROPPING of parts |
|
| 11852. |
A computer virus that invades tha system startup code stored on the beginning tracks of a hard disk is known as a |
|
Answer» answer is Bibin......... |
|
| 11853. |
Make a ppt on some common body language errors that one should avoid while communicating |
|
Answer» Answer: Communication is a process of exchanging INFORMATION by SPEAKING to others or WRITING or by using some other platform. Communication skill is the way ONE can share the IDEAS and feelings properly. common body language errors that one should avoid while communicating are: 1. Crossed arms, 2. Legs movement 3. Improper Eye Contact 4. Nervousness and etc. The presentation is attached. |
|
| 11855. |
Which Language makes system portable |
|
Answer» Answer: |
|
| 11856. |
Write a java program to print world cup of which under mentioned 2019-India |
| Answer» | |
| 11857. |
Create a web page based on my profile using html |
|
Answer» Answer: it's your answer ........THANKS to bol do Explanation: Step 1: Open Notepad (PC) Windows 8 or later: ... Step 1: Open TextEdit (Mac) Open Finder > APPLICATIONS > TextEdit. ... Step 2: Write Some HTML. ... Step 3: SAVE the HTML Page. ... Step 4: View the HTML Page in Your Browser. Read more on Brainly.in - brainly.in/question/2800928#readmore |
|
| 11858. |
What do you mean by character formatting |
|
Answer» We refer to all formatting that can be APPLIED to a selected range of text as “character” formatting, and refer to formatting that INDESIGN applies at the paragraph LEVEL as “paragraph” formatting. Tab settings, indents, paragraph rules, SPACE above, and space after are examples of paragraph formatting. |
|
| 11859. |
EXCUSE ME.❤100❤GIVE MY QUE's ANSWER..___________________________⬇️⬇️⬇️→ What is ethical hacking?→ What is the different types of ethical hacking.?( with full explanation )→ Give resourceful answer ____________________________❤↪REGARDING TO POINT ️↩️❤Happy Manson ☔☔⛄☔☔ |
|
Answer» ➡>>The term "white hat" in Internet slang refers to an ethical computer hacker, or a computer security expert, who specializes in penetration testing and in other testing methodologies that ensures the security of an organization's information systems.➡>> DIFFERENTL TYPES OF ETHICAL HACKING ↔***************************************************
_________________________________________
_________________________________________
_________________________________________
_________________________________________
_________________________________________
_________________________________________
________________________________________ |
|
| 11860. |
Think of s different computeaized gadgets of machinesthat work on the Principalof Input > Process >outputShow these functioningdiagoam matically in file |
| Answer» | |
| 11861. |
What is a inbuilt library function to adjust the allocation dynamic memory size? |
|
Answer» Explanation: Search BINARYUPDATES Dynamic Memory Allocation in C Programming In all of our previous lessons, we have used static memory allocation in our programs. In this lesson, we will learn about Dynamic Memory Allocation in C Programming. Let’s first understand difference between Static Memory Allocation and Dynamic Memory Allocation. In Static Memory Allocation user requested memory will be allocated at compile time. Whereas In Dynamic Memory Allocation, memory will be allocated while executing programs that MEANS at run time. The Dynamic Memory Allocation allows us to modify memory size at run time. Table of Contents [hide] 1 Dynamic Memory Allocation in C Programming 2 malloc() – Allocate Block of Memory 3 calloc() – Allocate Block of Memory 4 REALLOC() – Reallocate Block of Memory 5 free() – Frees Block of Memory Dynamic Memory Allocation in C Programming Dynamic Memory Allocation is unique feature of C Programming Language. This allows us to create data types and structures of any size and length which suits our program. There are two common application of dynamic memory allocation, these are while using dynamic ARRAYS and dynamic data structure e.g. LINKED lists in C Programs. Let’s see use case. There comes a situation in programming, when we don’t know exact size of array until compiler compiles the code and generate executable. The size of array we have declared maybe not enough or more than required. In this case use of dynamic memory allocation is best solution. Now the question is how to allocate dynamic memory? The answer is C Language supports 4 library functions which are knows as memory management functions (malloc, calloc, realloc, free). These functions are defined in #include Application Memory Organization Application Memory Organization The Heap memory is used for dynamic memory allocation during execution of the program. The size of heap memory keeps changing. As mentioned earlier heap is free pool of memory. This is enough as an introduction. The list of dynamic memory management functions. Functions Syntax Description malloc void* malloc(size_t size) Allocates the specified number of bytes user requested. calloc void* calloc(size_t num, size_t size) Allocates the specified number of bytes and initialize them to zero realloc void* realloc(void* ptr, size_t size) Modify the previously allocated memory block (increase or decrease memory size and reallocate) free – Release previously allocated memory block malloc() – Allocate Block of Memory “malloc()” the name itself states “memory allocation”. The malloc() function allocate space in memory during run time of the program. Malloc() function does not not initialize memory space allocated at run time. If we try to access this memory, we will receive garbage value. Malloc() returns NULL Pointer, in case if it could not able to allocate requested amount of memory.
|
|
| 11863. |
According to you what is the position of the Bharat in field of computer in in 2050 |
| Answer» | |
| 11864. |
Write about history and generation of computers |
|
Answer» The differentiate DIFFERENT eras of computer development, the history of computer is broken down into five generations. .... The first generation lasted from 1940 to 1956. First generation computers operated on vacuum tubes, which served as the CIRCUITRY. The magnetic drums served as the memory |
|
| 11865. |
What ia the shortcut key to import a picture ? |
|
Answer» SHORTCUT key method to insert a PICTURE. PLACE the cursor in the document where you want to insert the picture. Press the ALT key and then press keys N and P ONE after ANOTHER. The Insert Picture dialog box appears. HOPE IT HELPS ALL THE BEST PLEASE MARK AS BRAINLIEST |
|
| 11866. |
Give 2 examples of each type of inpairment related to the use ofcomputers.(best answer will get brainlist for sure) |
|
Answer» Answer: Explanation: People with disabilities meet barriers of all TYPES. However, technology is helping to lower MANY of these barriers. By using computing technology for tasks such as READING and writing documents, communicating with others, and searching for INFORMATION on the Internet, students and employees with disabilities are capable of handling a wider range of activities independently. Still, people with disabilities FACE a variety of barriers to computer use. These barriers can be grouped into three functional categories: barriers to providing computer input, interpreting output, and reading supporting documentation. Hardware and software tools (known as adaptive or assistive technologies) have been developed to provide functional alternatives to these standard operations. Specific products, and approaches to using them, are described below. |
|
| 11867. |
Explain the purpose of cachi in the computer |
|
Answer» The basic purpose of cachememory is to store program INSTRUCTIONS that are frequently re-referenced by software during operation. Fast access to these instructions increases the overall speed of the software program. The main function of cache memory is to speed up the WORKING MECHANISM of COMPUTER. |
|
| 11868. |
Explain the structure of an email address |
|
Answer» USERNAME @gmail.com |
|
| 11869. |
Advantages of network |
|
Answer» Answer: easy to get any answer at ANYTIME and everywhere which you want to KNOW about any QUESTIONS or any MEANING and others Explanation: HOPE I HELP YOU MORE# |
|
| 11870. |
Why is HTML is different from webpage |
|
Answer» HTML is. a language USED for creating webpage. It is simply a language used for creating web CONTENT. |
|
| 11871. |
How to start ms excel step by step |
|
Answer» Answer: Step 1 : Click START button on bottom left corner of desktop . Step 2 : Type MICROSOFT OFFICE and click on it . A LIST appears Step 3 : Click MS Excel 2010 or 2007 . MS EXCEL STARTS hope it helps u ☺ thank u plz mark as brainlist |
|
| 11872. |
Which functions can be used in a range? A% m e mbre comWhat do we call the input to functions which accepts values as numbers or text? |
|
Answer» The ANSWER is string Explanation: kgzyifhpksiyddjdluug |
|
| 11873. |
Convert the following decimal number into binary number 265, 9128, 87, 76 |
|
Answer» Answer: 345 456 799 36776856&-":";'-_7 |
|
| 11874. |
3. A shopkeeper offers 10% discount on the printed price of a Digital Camera.However, a customer has to pay 6% GST on the remaining amount. Write aprogram in Java to calculate the amount to be paid by the customer takingprinted price as an input. |
|
Answer» import java.io.*; CLASS abc { public static void main(STRING args[])throws IOException { InputStreamReader reader=new InputStreamReader(System.in); BufferedReader input=new BufferedReader(reader); double amt,dis_percent,gst,gst_paid,amt_paid; System.out.println("ENTER THE PRINTED PRICE"); amt=Double.parseDouble(input.readLine()); dis_percent=10 dis=(dis_percent/100)*amt; gst=6; gst_paid=(gst/100)*(amt-dis); amt_paid=amt-dis+gst_paid; System.out.println("Amount to be PAID by customer="+amt_paid); } //end of main } //end of class |
|
| 11875. |
What is self management self management skills needed to be developed |
|
Answer» Self-management skills are those characteristics that HELP an EMPLOYEE to feel and be more productive in the workplace. Such skills as problem solving, resisting stress, communicating clearly, managing time, STRENGTHENING memory, and exercising often are all key examples of self-management skills. |
|
| 11876. |
What is the brain of the computer?write a short note about it |
|
Answer» the brain of computer is the CPU it is the control room of the computer . Cpu stands for central process unit all computers program RUNS through the cpu and it also carrys your documents and all the PROGRAMS first GOES to cpu and then seen on the monitor |
|
| 11877. |
UNIX is a dash interface |
|
Answer» COMMAND-LINE INTERFACE. |
|
| 11878. |
A function cannot be difind another function. |
|
Answer» A FUNCTION cannot be defined INSIDE the another function, but a function can be CALLED inside a another function. Explanation: True, A function cannot return more than one VALUE at a time. because after RETURNING a value the control is given back to calling function. |
|
| 11879. |
Write a short note on cyber law's specially designed for minors.Need full answer....✌✌✌✌✌ |
|
Answer» Answer: Cyber Laws of India In Simple way we can SAY that cyber crime is unlawful acts wherein the computer is either a tool or a target or both. Cyber crimes can involve criminal activities that are traditional in nature, such as theft, fraud, forgery, defamation and mischief, all of which are subject to the Indian Penal Code. The abuse of computers has also given birth to a GAMUT of new age crimes that are addressed by the Information Technology Act, 2000. We can categorize Cyber crimes in two ways The Computer as a Target :-using a computer to attack other computers. e.g. Hacking,Virus/Worm ATTACKS,DOS attack etc. The computer as a weapon :-using a computer to COMMIT real world crimes. e.g. Cyber Terrorism, IPR violations,Credit card frauds,EFT frauds, Pornography etc. Cyber law (also referred to as cyberlaw) is a term used to describe the legal issues related to USE of communications technology, particularly "cyberspace", i.e. the Internet. It is less a distinct field of law in the way that property or contract are as it is an intersection of many legal fields, including intellectual property, privacy, freedom of expression, and jurisdiction. In essence, cyber law is an attempt to integrate the challenges presented by human activity on the Internet with legacy system of laws applicable to the physical world.... follow meeeeee.... Mark me as Brainliest.... |
|
| 11880. |
Why the Google should be boon or bane for students who are 12 to 18 years old |
|
Answer» Answer: it is boon when teen make PROPER USE of it in correct mananer and their parents also keep check on them it is BANE when teen make not proper use and use it as IRRELEVANT in the absences of their parents hope it is helpful FOLLOW me mark my answer as brainliest plz thanks |
|
| 11881. |
Explain the process of sending and receiving email |
|
Answer» Answer: How is the email sent to the recipient? Where is it stored? how does the recipient reply to it?- How does email Work? In this tutorial we will look at the process of sending and receiving email, the hardware and the protocols used when sending email using: A desktop based email client like Windows Live Mail, A Web based client. A Smart Phone or Tablet Desktop Based Client For a desktop based client like outlook,windows live mail etc then the diagram below shows the overall process of how email is sent and received. send-receive-email-desktop-client-process The email is composed on the email client (C1). When you hit send the email is transferred to the Email server (S1) using the SMTP protocol. The email server (S1) belongs to your email PROVIDER e.g.Yahoo. The email server (S1) needs to deliver the email to the destination server (S2). side-note-send-receiveMessage transfer between email servers is done using the SMTP protocol The destination server (S2) holds the recipients mailbox. There are two choices that sever S1 can make: It can Deliver the email directly to the destination server S2. It can send the Email to an Intermediate server S3. Direct Delivery – If the sever S2 uses direct delivery then it needs to find the email server responsible for the recipient mailbox. This it does using a DNS lookup and MX records. See Understanding MX records for details. Indirect Delivery – If it chooses to use an intermediate server (S3) known as an email forwarder then the intermediate server must then choose either a direct delivery, or it can also forward to another server. Receiving The Email The sent email will eventually be placed in a mailbox on server S2. The server S2 is the email server of the email provider for the recipient. The recipient isn’t notified that her has email. To find out if he has NEW email the recipient must connect to the email server S2 and check his mailbox. All desktop based email CLIENTS will have a default email check interval when they check for new email, as well as a manual option. check-new-email-oe There are two protocols used for transferring email from an email server to a client they are POP3 and IMAP4. Note : SMTP is not used for receiving email on an email client. POP3 is the oldest protocol, and was at one time the only option. IMAP4 is the newer, and much better protocol, and is the preferred option today. The main difference between the two is that POP3 was designed to move the email from the email server to the email client and delete it from the email server. This means that once a POP3 client has connected to the email server it leaves the mailbox on the server empty. and the only copy of the email is now on the email client. IMAP4 was designed to leave all email on the email server and only copy the emails to the email client. mark me brainlist |
|
| 11882. |
What is the heart of the computer .write a short note about it |
|
Answer» Answer: Explanation: A central processing unit (CPU), also called a central processor or main processor, is the electronic circuitry within a computer that carries out the instructions of a computer program by performing the basic arithmetic, logic, controlling, and input/output (I/O) operations specified by the instructions. The computer industry has used the TERM "central processing unit" at least since the early 1960s.[1] Traditionally, the term "CPU" refers to a processor, more specifically to its processing unit and control unit (CU), distinguishing these core elements of a computer from external components such as main memory and I/O circuitry.[2] The form, design, and implementation of CPUs have changed over the course of their history, but their fundamental operation remains ALMOST unchanged. Principal components of a CPU include the arithmetic logic unit (ALU) that PERFORMS arithmetic and logic operations, processor registers that SUPPLY operands to the ALU and store the results of ALU operations and a control unit that orchestrates the fetching (from memory) and execution of instructions by directing the coordinated operations of the ALU, registers and other components. Most modern CPUs are microprocessors, meaning they are contained on a single integrated circuit (IC) chip. An IC that contains a CPU may also contain memory, peripheral interfaces, and other components of a computer; such integrated DEVICES are variously called microcontrollers or systems on a chip (SoC). Some computers employ a multi-core processor, which is a single chip containing two or more CPUs called "cores"; in that context, one can speak of such single chips as "sockets".[3] Array processors or vector processors have multiple processors that operate in parallel, with no unit considered central. There also exists the concept of virtual CPUs which are an abstraction of dynamical aggregated computational resources.[4] |
|
| 11883. |
Is there any reason for the mobile phones to be in a particular shape? |
|
Answer» Answer: reason_ the phone |
|
| 11884. |
Decimal to binary of 85 with process |
|
Answer» Answer:1010101 mark as BRAINLIEST !!!!!! Explanation: 42/2=21 0 21/2=10 1 10/2=5 0 5/2=2 1 2/2=1 0 1/2=0 1 (MSB) write the remainders from bottom to up (ACTUALLY from MSB to LSB ) |
|
| 11885. |
In how many ways cao you navigate in a document in writer? |
| Answer» | |
| 11886. |
Explain detail on electronic mail in computer networks |
|
Answer» Short for electronic mail, EMAIL (or e-mail) is defined as the TRANSMISSION of messages over communications networks. ... Some electronic mail systems are confined to a single COMPUTER system or network, but others have gateways to other computer systems, enabling users to send electronic mail anywhere in the WORLD. |
|
| 11887. |
What are the positive results of self management |
|
Answer» Answer: Self-management is the ability to UNDERSTAND and regulate your own emotions, and use them to guide your behavior towards positive outcomes. This doesn’t MEAN that you should suppress your negative feelings, but if you become aware of them, you can dictate your own behavior, not your feelings. NOTHING makes you angry. You get angry. Nothing makes you hopeless. You DECIDE to feel hopeless. You are the master of your own mind, so you should dictate how your emotions make you feel, not the other way around. |
|
| 11888. |
What is a android what a android do? |
|
Answer» Answer: Explanation: Android is a mobile operating system developed by Google. It is based on a modified version of the Linux kernel and other open source software, and is designed primarily for touchscreen mobile devices such as smartphones and tablets. In addition, Google has developed Android TV for televisions, Android Auto for cars, and Wear OS for wrist watches, each with a specialized user interface. Variants of Android are also used on game consoles, digital cameras, PCs and other electronics. Initially developed by Android Inc., which Google bought in 2005, Android was unveiled in 2007, with the FIRST commercial Android device launched in September 2008. The current stable version is Android 9 "Pie", released in August 2018. Google released the first beta of the next release, Android Q, on Pixel phones in March 2019. The core Android source code is known as Android Open Source Project (AOSP), which is primarily licensed under the Apache License. Android is also associated with a suite of proprietary software developed by Google, called Google Mobile Services (GMS),[10] that frequently comes pre-installed on devices. This includes core apps such as Gmail, the application store/digital distribution platform Google Play and associated Google Play Services development platform, and usually includes the Google Chrome web browser and Google Search app. These apps are licensed by manufacturers of Android devices certified under standards imposed by Google, but AOSP has been used as the basis of competing Android ecosystems such as Amazon.com's Fire OS, which use their own equivalents to Google Mobile Services. Android has been the best-selling OS worldwide on smartphones since 2011 and on tablets since 2013. As of May 2017, it has over two billion monthly active users, the largest installed base of any operating system, and as of December 2018, the Google Play store features over 2.6 million appsAndroid Inc. was founded in Palo Alto, California, in October 2003 by Andy Rubin, Rich Miner, Nick Sears, and Chris White.[12][13] Rubin described the Android project as "tremendous potential in developing smarter mobile devices that are more aware of its owner's location and preferences".[13] The early INTENTIONS of the company were to develop an ADVANCED operating system for digital cameras, and this was the basis of its pitch to investors in April 2004.[14] The company then decided that the market for cameras was not large enough for its goals, and by five months later it had diverted its efforts and was pitching Android as a handset operating system that would rival Symbian and Microsoft Windows Mobile.[14][15] Rubin had difficulty attracting investors early on, and Android was facing eviction from its office space. Steve Perlman, a close friend of Rubin, brought him $10,000 in cash in an envelope, and shortly thereafter wired an undisclosed amount as seed funding. Perlman refused a stake in the company, and has stated "I did it because I believed in the thing, and I wanted to help Andy."[16][17] In July 2005,[13] Google acquired Android Inc. for at least $50 million.[18] Its key employees, including Rubin, Miner and White, joined Google as part of the acquisition.[13] Not much was known about the secretive Android at the time, with the company having provided few details other than that it was making software for mobile phones.[13] At Google, the team led by Rubin developed a mobile device platform powered by the Linux kernel. Google marketed the platform to handset makers and carriers on the promise of providing a flexible, upgradeable system.[19] Google had "lined up a series of hardware components and software PARTNERS and signaled to carriers that it was open to various degrees of cooperation".[attribution needed][20] Speculation about Google's intention to enter the mobile communications market CONTINUED to build through December 2006.[21] An early prototype had a close resemblance to a BlackBerry phone, with no touchscreen and a physical QWERTY keyboard, but the arrival of 2007's Apple iPhone meant that Android "had to go back to the drawing board".[22][23] Google later changed its Android specification documents to state that "Touchscreens will be supported", although "the Product was designed with the presence of discrete physical buttons as an assumption, therefore a touchscreen cannot completely replace physical buttons".[24] By 2008, both Nokia and BlackBerry announced touch-based smartphones to rival the iPhone 3G, and Android's focus eventually switched to just touchscreens. The first commercially available smartphone running Android was the HTC Dream, also known as T-Mobile G1, announced on September 23, 2008. |
|
| 11889. |
Can we draw shapes in Tux paint or any other paint tool |
|
Answer» Answer: |
|
| 11890. |
What does vlink attribute mean? |
|
Answer» Answer: The VLINK ATTRIBUTE specifies the color of visited links in a DOCUMENT. |
|
| 11891. |
Write a program for using for and while loop in Q Basic |
|
Answer» PRINT "This is loop NUMBER"; a NEXT a; Explanation: |
|
| 11892. |
Can we open gallery in open office writer |
|
Answer» Answer: Choose Tools > GALLERY or click the Gallery icon on the Standard toolbar. ... Select an object with a single click. Drag and drop the IMAGE into the document. You also can right-click on the object to open the context menu and select Insert > Copy. HOPE it helps to you!! plz MARK as brainliest answer!! |
|
| 11893. |
What happen if we increase the RAM in our computer and mobile |
|
Answer» Answer: The SPEED is increase of MOBILE and LAPTOP and storage also increase |
|
| 11894. |
Computer types of right |
|
Answer»
There are Four DIFFERENT Computer Types. We have four different computer types CLASSIFIED according to their performance, power, and size. A computer is an electronic DEVICE that accepts DATA, processes it, stores, and then produces an output. Supercomputer. Mainframe Computer. Minicomputer. Microcomputer.
|
|
| 11895. |
Write the names of Android version ,their names and one unique feature of each. |
|
Answer» Answer: Lollipop, OREO, Marshmellow, KIT Kat, Pie Explanation: |
|
| 11896. |
Alisha want to write a letter to her father but she is confused about what software she should use to write. Help her in this concern and write the benefits of the concerned software also.#Holiday Homework# |
|
Answer» You can use OUTLOOK, outlook can WRITE a letter and email , massage not only ONE person but also 1k person |
|
| 11897. |
Please it's urgent.The one who will answer first I will mark it as brainliest |
Answer»
BIOS chip details the data of systems firmware BIOS setup utility. ... UEFI setup utility. 3.The following are different types of language processors are:Compiler.Assembler.Interpreter 4.Low level language a) Machine language (1GL) b) Assembly language (2GL 5. High level language a) Procedural-Oriented language (3GL) b) Problem-Oriented language (4GL) c) Natural language (5GL) |
|
| 11898. |
WHICH IS USED THESE IN VIDEO CALL |
Answer» what is ur question???is this a question...TELL me in comment s and i will HELP U |
|
| 11899. |
Can we insert picture in OpenOffice writer as in OpenOffice impress yes or no |
|
Answer» Answer: Yes,we can insert picture in both OpenOffice writer as well as inOpenOffice impress .Explanation: Click in the OOO document where you want the image to appear. CHOOSE Insert > Picture > From File from the menu BAR. On the Insert Picture dialog, navigate to the file to be inserted, SELECT it, and click Open. At the bottom of the dialog are two OPTIONS, Preview and Link hope helps |
|
| 11900. |
How we stop corruption ? |
|
Answer» ................... |
|