Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

11851.

How should take care of computer? Write 3 sentence on it

Answer»

ANSWER:

don't press keys hardly

don't BRING LIQUID in CONTACT with pc

avoid DROPPING of parts

11852.

A computer virus that invades tha system startup code stored on the beginning tracks of a hard disk is known as a

Answer»

ANSWER:

answer is Bibin.........

11853.

Make a ppt on some common body language errors that one should avoid while communicating

Answer»

Answer:

Communication is a process of exchanging INFORMATION by SPEAKING to others or WRITING or by using some other platform.

Communication skill is the way ONE can share the IDEAS and feelings properly.

common body language errors that one should avoid while communicating are:

1. Crossed arms, 2. Legs movement 3. Improper Eye Contact 4. Nervousness and etc.

The presentation is attached.

11854.

What is www? mention it's important feature

Answer»

ANSWER:

world WIDE web

EXPLANATION:

used to EXCESS websites

11855.

Which Language makes system portable​

Answer»

Answer:

English and Hindi LANGUAGE MAKES SYSTEM PORTABLE

11856.

Write a java program to print world cup of which under mentioned 2019-India

Answer»

ANSWER:

I don't KNOW but I am SORRY

11857.

Create a web page based on my profile using html ​

Answer»

Answer:

it's your answer ........THANKS to bol do

Explanation:

Step 1: Open Notepad (PC) Windows 8 or later: ...

Step 1: Open TextEdit (Mac) Open Finder > APPLICATIONS > TextEdit. ...

Step 2: Write Some HTML. ...

Step 3: SAVE the HTML Page. ...

Step 4: View the HTML Page in Your Browser.

Read more on Brainly.in - brainly.in/question/2800928#readmore

11858.

What do you mean by character formatting​

Answer»

We refer to all formatting that can be APPLIED to a selected range of text as “character” formatting, and refer to formatting that INDESIGN applies at the paragraph LEVEL as “paragraph” formatting. Tab settings, indents, paragraph rules, SPACE above, and space after are examples of paragraph formatting.

11859.

EXCUSE ME.❤100❤GIVE MY QUE's ANSWER..___________________________⬇️⬇️⬇️→ What is ethical hacking?→ What is the different types of ethical hacking.?( with full explanation )→ Give resourceful answer ____________________________❤↪REGARDING TO POINT ️↩️❤Happy Manson ☔☔⛄☔☔​

Answer»

\mathcal{\huge{\purple{HEY\:\:MATE}}}

\huge\boxed{{ANSWER}}

\huge{\underline{\red{\mathbb{ETHICAL\:HACKING}}}}

➡>>The term "white hat" in Internet slang refers to an ethical computer hacker, or a computer security expert, who specializes in penetration testing and in other testing methodologies that ensures the security of an organization's information systems.

➡>> DIFFERENTL TYPES OF ETHICAL HACKING ↔

  • \mathcal{\huge{\green{Script\:Kiddie}}}

  • \mathcal{\huge{\red{White\:Hat}}}

  • \mathcal{\huge{\blue{Black\:Hat}}}

  • \mathcal{\huge{\green{Gray\:Hat}}}

  • \mathcal{\huge{\blue{Green\:Hat}}}

  • \mathcal{\huge{\red{Red\:Hat}}}

  • \mathcal{\huge{\green{Blue\:Hat}}}

***************************************************

\huge{\underline{\pink{\mathbb{INFORMATION}}}}

\boxed{{Script\:Kiddies}}- they NORMALLY don’t care about hacking (if they did, they’d be Green Hats. See below.). They copy code and use it for a virus or an SQLi or something else. Script Kiddies will never hack for themselves; they’ll just download overused software (LOIC or Metasploit, for example) and watch a YouTube video on how to use it. A common Script Kiddie attack is DoSing or DDoSing (DENIAL of SERVICE and Distributed Denial of Service), in which they flood an IP with so much information it collapses under the strain. This attack is frequently used by the “hacker” group Anonymous, which doesn’t help anyone’s reputation.

_________________________________________

\boxed{{White\:Hat}} – Also known as ethical hackers, White Hat hackers are the good guys of the hacker world. They’ll help you remove a virus or PenTest a company. Most White Hat hackers hold a college degree in IT security or computer science and must be certified to pursue a career in hacking. The most popular certification is the CEH (Certified Ethical Hacker) from the EC-Council.

_________________________________________

\boxed{{Black\:Hat}}– Also known as crackers, these are the men and women you hear about in the news. They find banks or other companies with weak security and steal money or credit card information. The SURPRISING truth about their methods of attack is that they often use common hacking practices they learned early on.

_________________________________________

\boxed{{Gray\:Hat}} – Nothing is ever just black or white; the same is true in the world of hacking. Gray Hat hackers don’t steal money or information (although, sometimes they deface a website or TWO), yet they don’t help people for good (but, they could if they wanted to). These hackers comprise most of the hacking world, even though Black Hat hackers garner most (if not all) of the media’s attention.

_________________________________________

\boxed{{Green\:Hat}} – These are the hacker “n00bz,” but unlike Script Kiddies, they care about hacking and strive to become full-blown hackers. They’re often flamed by the hacker community for asking many basic questions. When their questions are answered, they’ll listen with the intent and curiosity of a child listening to family stories.

_________________________________________

\boxed{{Red\:Hat}} – These are the vigilantes of the hacker world. They’re like White Hats in that they halt Black Hats, but these folks are downright SCARY to those who have ever tried so much as PenTest. Instead of reporting the malicious hacker, they shut him/her down by uploading viruses, DoSing and accessing his/her computer to destroy it from the inside out. They leverage multiple aggressive methods that might force a cracker to need a new computer.

_________________________________________

\boxed{{Blue\:Hat}} – If a Script Kiddie took revenge, he/she might become a Blue Hat. Blue Hat hackers will seek vengeance on those who’ve them angry. Most Blue Hats are n00bz, but like the Script Kiddies, they have no desire to learn.

________________________________________

HOPE IT HELPS

\huge{\underline{\red{\mathcal{NIHARIKA}}}}

11860.

Think of s different computeaized gadgets of machinesthat work on the Principalof Input > Process >outputShow these functioningdiagoam matically in file​

Answer»

ANSWER:

SHOW SIMPLE....................

11861.

What is a inbuilt library function to adjust the allocation dynamic memory size?​

Answer»

Explanation:

Search

BINARYUPDATES

Dynamic Memory Allocation in C Programming

In all of our previous lessons, we have used static memory allocation in our programs. In this lesson, we will learn about Dynamic Memory Allocation in C Programming. Let’s first understand difference between Static Memory Allocation and Dynamic Memory Allocation. In Static Memory Allocation user requested memory will be allocated at compile time. Whereas In Dynamic Memory Allocation, memory will be allocated while executing programs that MEANS at run time. The Dynamic Memory Allocation allows us to modify memory size at run time.

Table of Contents [hide]

1 Dynamic Memory Allocation in C Programming

2 malloc() – Allocate Block of Memory

3 calloc() – Allocate Block of Memory

4 REALLOC() – Reallocate Block of Memory

5 free() – Frees Block of Memory

Dynamic Memory Allocation in C Programming

Dynamic Memory Allocation is unique feature of C Programming Language. This allows us to create data types and structures of any size and length which suits our program. There are two common application of dynamic memory allocation, these are while using dynamic ARRAYS and dynamic data structure e.g. LINKED lists in C Programs. Let’s see use case. There comes a situation in programming, when we don’t know exact size of array until compiler compiles the code and generate executable. The size of array we have declared maybe not enough or more than required. In this case use of dynamic memory allocation is best solution. Now the question is how to allocate dynamic memory? The answer is C Language supports 4 library functions which are knows as memory management functions (malloc, calloc, realloc, free). These functions are defined in #include header file. We will see each function in detail. Let’s first understand organization of application memory. The heap is a part of application memory which will be used while allocating and de-allocating memory using memory management functions. The Heap is also known as Free Memory. The figure below will illustrate.

Application Memory Organization

Application Memory Organization

The Heap memory is used for dynamic memory allocation during execution of the program. The size of heap memory keeps changing. As mentioned earlier heap is free pool of memory. This is enough as an introduction. The list of dynamic memory management functions.

Functions Syntax Description

malloc void* malloc(size_t size) Allocates the specified number of bytes user requested.

calloc void* calloc(size_t num, size_t size) Allocates the specified number of bytes and initialize them to zero

realloc void* realloc(void* ptr, size_t size) Modify the previously allocated memory block (increase or decrease memory size and reallocate)

free – Release previously allocated memory block

malloc() – Allocate Block of Memory

“malloc()” the name itself states “memory allocation”. The malloc() function allocate space in memory during run time of the program. Malloc() function does not not initialize memory space allocated at run time. If we try to access this memory, we will receive garbage value. Malloc() returns NULL Pointer, in case if it could not able to allocate requested amount of memory.

11862.

Shortcut keys is.bold​

Answer»

ANSWER:

Ctrl+B

is the SHORTCUT

11863.

According to you what is the position of the Bharat in field of computer in in 2050

Answer»

ANSWER:

AI ML AND IOT WILL BE ON BOOM

11864.

Write about history and generation of computers​

Answer»

ANSWER:

The differentiate DIFFERENT eras of computer development, the history of computer is broken down into five generations. .... The first generation lasted from 1940 to 1956. First generation computers operated on vacuum tubes, which served as the CIRCUITRY. The magnetic drums served as the memory

11865.

What ia the shortcut key to import a picture ?​

Answer»

SHORTCUT key method to insert a PICTURE. PLACE the cursor in the document where you want to insert the picture. Press the ALT key and then press keys N and P ONE after ANOTHER. The Insert Picture dialog box appears.

HOPE IT HELPS

ALL THE BEST

PLEASE MARK AS BRAINLIEST

11866.

Give 2 examples of each type of inpairment related to the use ofcomputers.(best answer will get brainlist for sure)​

Answer»

Answer:

Explanation:

People with disabilities meet barriers of all TYPES. However, technology is helping to lower MANY of these barriers. By using computing technology for tasks such as READING and writing documents, communicating with others, and searching for INFORMATION on the Internet, students and employees with disabilities are capable of handling a wider range of activities independently. Still, people with disabilities FACE a variety of barriers to computer use. These barriers can be grouped into three functional categories: barriers to providing computer input, interpreting output, and reading supporting documentation. Hardware and software tools (known as adaptive or assistive technologies) have been developed to provide functional alternatives to these standard operations. Specific products, and approaches to using them, are described below.

11867.

Explain the purpose of cachi in the computer

Answer»

The basic purpose of cachememory is to store program INSTRUCTIONS that are frequently re-referenced by software during operation. Fast access to these instructions increases the overall speed of the software program. The main function of cache memory is to speed up the WORKING MECHANISM of COMPUTER.

11868.

Explain the structure of an email address​

Answer»

ANSWER:

USERNAME @gmail.com

tHis the STRUCTURE OS EMAIL adddess

11869.

Advantages of network​

Answer»

Answer:

easy to get any answer at ANYTIME and everywhere

which you want to KNOW about any QUESTIONS or any MEANING and others

Explanation:

HOPE I HELP YOU MORE#

11870.

Why is HTML is different from webpage

Answer»

ANSWER:

HTML is. a language USED for creating webpage. It is simply a language used for creating web CONTENT.

11871.

How to start ms excel step by step

Answer»

Answer:

Step 1 : Click START button on bottom left corner of desktop .

Step 2 : Type MICROSOFT OFFICE and click on it . A LIST appears

Step 3 : Click MS Excel 2010 or 2007 .

MS EXCEL STARTS

hope it helps u

thank u

plz mark as brainlist

11872.

Which functions can be used in a range? A% m e mbre comWhat do we call the input to functions which accepts values as numbers or text?​

Answer»

The ANSWER is string

Explanation:

kgzyifhpksiyddjdluug

11873.

Convert the following decimal number into binary number 265, 9128, 87, 76​

Answer»

Answer:

345 456 799 36776856&-":";'-_7

11874.

3. A shopkeeper offers 10% discount on the printed price of a Digital Camera.However, a customer has to pay 6% GST on the remaining amount. Write aprogram in Java to calculate the amount to be paid by the customer takingprinted price as an input.​

Answer»

import java.io.*;

CLASS abc

{

public static void main(STRING args[])throws IOException

{

InputStreamReader reader=new InputStreamReader(System.in);

BufferedReader input=new BufferedReader(reader);

double amt,dis_percent,gst,gst_paid,amt_paid;

System.out.println("ENTER THE PRINTED PRICE");

amt=Double.parseDouble(input.readLine());

dis_percent=10

dis=(dis_percent/100)*amt;

gst=6;

gst_paid=(gst/100)*(amt-dis);

amt_paid=amt-dis+gst_paid;

System.out.println("Amount to be PAID by customer="+amt_paid);

}   //end of main

}   //end of class

11875.

What is self management self management skills needed to be developed​

Answer»

ANSWER:

Self-management skills are those characteristics that HELP an EMPLOYEE to feel and be more productive in the workplace. Such skills as problem solving, resisting stress, communicating clearly, managing time, STRENGTHENING memory, and exercising often are all key examples of self-management skills.

11876.

What is the brain of the computer?write a short note about it​

Answer»

ANSWER:

the brain of computer is the CPU it is the control room of the computer . Cpu stands for central process unit all computers program RUNS through the cpu and it also carrys your documents and all the PROGRAMS first GOES to cpu and then seen on the monitor

11877.

UNIX is a dash interface​

Answer»

COMMAND-LINE INTERFACE.

11878.

A function cannot be difind another function.​

Answer»

A FUNCTION cannot be defined INSIDE the another function, but a function can be CALLED inside a another function.

Explanation: True, A function cannot return more than one VALUE at a time. because after RETURNING a value the control is given back to calling function.

11879.

Write a short note on cyber law's specially designed for minors.Need full answer....✌✌✌✌✌​

Answer»

Answer:

Cyber Laws of India

In Simple way we can SAY that cyber crime is unlawful acts wherein the computer is either a tool or a target or both. Cyber crimes can involve criminal activities that are traditional in nature, such as theft, fraud, forgery, defamation and mischief, all of which are subject to the Indian Penal Code. The abuse of computers has also given birth to a GAMUT of new age crimes that are addressed by the Information Technology Act, 2000.

We can categorize Cyber crimes in two ways

The Computer as a Target :-using a computer to attack other computers.

e.g. Hacking,Virus/Worm ATTACKS,DOS attack etc.

The computer as a weapon :-using a computer to COMMIT real world crimes.

e.g. Cyber Terrorism, IPR violations,Credit card frauds,EFT frauds, Pornography etc.

Cyber law (also referred to as cyberlaw) is a term used to describe the legal issues related to USE of communications technology, particularly "cyberspace", i.e. the Internet. It is less a distinct field of law in the way that property or contract are as it is an intersection of many legal fields, including intellectual property, privacy, freedom of expression, and jurisdiction. In essence, cyber law is an attempt to integrate the challenges presented by human activity on the Internet with legacy system of laws applicable to the physical world....

follow meeeeee....

Mark me as Brainliest....

11880.

Why the Google should be boon or bane for students who are 12 to 18 years old

Answer»

Answer:

it is boon when teen make PROPER USE of it in correct mananer and their parents also keep check on them

it is BANE when teen make not proper use and use it as IRRELEVANT in the absences of their parents

hope it is helpful

FOLLOW me

mark my answer as brainliest

plz

thanks

11881.

Explain the process of sending and receiving email

Answer»

Answer:

How is the email sent to the recipient?

Where is it stored?

how does the recipient reply to it?-

How does email Work?

In this tutorial we will look at the process of sending and receiving email, the hardware and the protocols used when sending email using:

A desktop based email client like Windows Live Mail,

A Web based client.

A Smart Phone or Tablet

Desktop Based Client

For a desktop based client like outlook,windows live mail etc then the diagram below shows the overall process of how email is sent and received.

send-receive-email-desktop-client-process

The email is composed on the email client (C1).

When you hit send the email is transferred to the Email server (S1) using the SMTP protocol.

The email server (S1) belongs to your email PROVIDER e.g.Yahoo.

The email server (S1) needs to deliver the email to the destination server (S2).

side-note-send-receiveMessage transfer between email servers is done using the SMTP protocol

The destination server (S2) holds the recipients mailbox.

There are two choices that sever S1 can make:

It can Deliver the email directly to the destination server S2.

It can send the Email to an Intermediate server S3.

Direct Delivery – If the sever S2 uses direct delivery then it needs to find the email server responsible for the recipient mailbox.

This it does using a DNS lookup and MX records. See Understanding MX records for details.

Indirect Delivery – If it chooses to use an intermediate server (S3) known as an email forwarder then the intermediate server must then choose either a direct delivery, or it can also forward to another server.

Receiving The Email

The sent email will eventually be placed in a mailbox on server S2.

The server S2 is the email server of the email provider for the recipient.

The recipient isn’t notified that her has email.

To find out if he has NEW email the recipient must connect to the email server S2 and check his mailbox.

All desktop based email CLIENTS will have a default email check interval when they check for new email, as well as a manual option.

check-new-email-oe

There are two protocols used for transferring email from an email server to a client they are POP3 and IMAP4.

Note : SMTP is not used for receiving email on an email client.

POP3 is the oldest protocol, and was at one time the only option. IMAP4 is the newer, and much better protocol, and is the preferred option today.

The main difference between the two is that POP3 was designed to move the email from the email server to the email client and delete it from the email server.

This means that once a POP3 client has connected to the email server it leaves the mailbox on the server empty. and the only copy of the email is now on the email client.

IMAP4 was designed to leave all email on the email server and only copy the emails to the email client.

mark me brainlist

11882.

What is the heart of the computer .write a short note about it​

Answer»

Answer:

Explanation:

A central processing unit (CPU), also called a central processor or main processor, is the electronic circuitry within a computer that carries out the instructions of a computer program by performing the basic arithmetic, logic, controlling, and input/output (I/O) operations specified by the instructions. The computer industry has used the TERM "central processing unit" at least since the early 1960s.[1] Traditionally, the term "CPU" refers to a processor, more specifically to its processing unit and control unit (CU), distinguishing these core elements of a computer from external components such as main memory and I/O circuitry.[2]

The form, design, and implementation of CPUs have changed over the course of their history, but their fundamental operation remains ALMOST unchanged. Principal components of a CPU include the arithmetic logic unit (ALU) that PERFORMS arithmetic and logic operations, processor registers that SUPPLY operands to the ALU and store the results of ALU operations and a control unit that orchestrates the fetching (from memory) and execution of instructions by directing the coordinated operations of the ALU, registers and other components.

Most modern CPUs are microprocessors, meaning they are contained on a single integrated circuit (IC) chip. An IC that contains a CPU may also contain memory, peripheral interfaces, and other components of a computer; such integrated DEVICES are variously called microcontrollers or systems on a chip (SoC). Some computers employ a multi-core processor, which is a single chip containing two or more CPUs called "cores"; in that context, one can speak of such single chips as "sockets".[3]

Array processors or vector processors have multiple processors that operate in parallel, with no unit considered central. There also exists the concept of virtual CPUs which are an abstraction of dynamical aggregated computational resources.[4]

11883.

Is there any reason for the mobile phones to be in a particular shape?

Answer»

Answer:

reason_ the phone

e is particular NEED of HUMAN LIFE

11884.

Decimal to binary of 85 with process​

Answer»

Answer:1010101

mark as BRAINLIEST !!!!!!

Explanation:

85\2=42  REMAINDER 1(LSB)

42/2=21    0

21/2=10      1

10/2=5        0

5/2=2         1

2/2=1           0

1/2=0            1 (MSB)

write the remainders from bottom to up (ACTUALLY from MSB to LSB )

11885.

In how many ways cao you navigate in a document in writer?

Answer»

ANSWER:

EASY H..................

11886.

Explain detail on electronic mail in computer networks

Answer»

ANSWER:

Short for electronic mail, EMAIL (or e-mail) is defined as the TRANSMISSION of messages over communications networks. ...

Some electronic mail systems are confined to a single COMPUTER system or network, but others have gateways to other computer systems, enabling users to send electronic mail anywhere in the WORLD.

11887.

What are the positive results of self management​

Answer»

Answer:

Self-management is the ability to UNDERSTAND and regulate your own emotions, and use them to guide your behavior towards positive outcomes. This doesn’t MEAN that you should suppress your negative feelings, but if you become aware of them, you can dictate your own behavior, not your feelings.

NOTHING makes you angry. You get angry. Nothing makes you hopeless. You DECIDE to feel hopeless. You are the master of your own mind, so you should dictate how your emotions make you feel, not the other way around.

11888.

What is a android what a android do? ​

Answer»

Answer:

Explanation:

Android is a mobile operating system developed by Google. It is based on a modified version of the Linux kernel and other open source software, and is designed primarily for touchscreen mobile devices such as smartphones and tablets. In addition, Google has developed Android TV for televisions, Android Auto for cars, and Wear OS for wrist watches, each with a specialized user interface. Variants of Android are also used on game consoles, digital cameras, PCs and other electronics.

Initially developed by Android Inc., which Google bought in 2005, Android was unveiled in 2007, with the FIRST commercial Android device launched in September 2008. The current stable version is Android 9 "Pie", released in August 2018. Google released the first beta of the next release, Android Q, on Pixel phones in March 2019. The core Android source code is known as Android Open Source Project (AOSP), which is primarily licensed under the Apache License.

Android is also associated with a suite of proprietary software developed by Google, called Google Mobile Services (GMS),[10] that frequently comes pre-installed on devices. This includes core apps such as Gmail, the application store/digital distribution platform Google Play and associated Google Play Services development platform, and usually includes the Google Chrome web browser and Google Search app. These apps are licensed by manufacturers of Android devices certified under standards imposed by Google, but AOSP has been used as the basis of competing Android ecosystems such as Amazon.com's Fire OS, which use their own equivalents to Google Mobile Services.

Android has been the best-selling OS worldwide on smartphones since 2011 and on tablets since 2013. As of May 2017, it has over two billion monthly active users, the largest installed base of any operating system, and as of December 2018, the Google Play store features over 2.6 million appsAndroid Inc. was founded in Palo Alto, California, in October 2003 by Andy Rubin, Rich Miner, Nick Sears, and Chris White.[12][13] Rubin described the Android project as "tremendous potential in developing smarter mobile devices that are more aware of its owner's location and preferences".[13] The early INTENTIONS of the company were to develop an ADVANCED operating system for digital cameras, and this was the basis of its pitch to investors in April 2004.[14] The company then decided that the market for cameras was not large enough for its goals, and by five months later it had diverted its efforts and was pitching Android as a handset operating system that would rival Symbian and Microsoft Windows Mobile.[14][15]

Rubin had difficulty attracting investors early on, and Android was facing eviction from its office space. Steve Perlman, a close friend of Rubin, brought him $10,000 in cash in an envelope, and shortly thereafter wired an undisclosed amount as seed funding. Perlman refused a stake in the company, and has stated "I did it because I believed in the thing, and I wanted to help Andy."[16][17]

In July 2005,[13] Google acquired Android Inc. for at least $50 million.[18] Its key employees, including Rubin, Miner and White, joined Google as part of the acquisition.[13] Not much was known about the secretive Android at the time, with the company having provided few details other than that it was making software for mobile phones.[13] At Google, the team led by Rubin developed a mobile device platform powered by the Linux kernel. Google marketed the platform to handset makers and carriers on the promise of providing a flexible, upgradeable system.[19] Google had "lined up a series of hardware components and software PARTNERS and signaled to carriers that it was open to various degrees of cooperation".[attribution needed][20]

Speculation about Google's intention to enter the mobile communications market CONTINUED to build through December 2006.[21] An early prototype had a close resemblance to a BlackBerry phone, with no touchscreen and a physical QWERTY keyboard, but the arrival of 2007's Apple iPhone meant that Android "had to go back to the drawing board".[22][23] Google later changed its Android specification documents to state that "Touchscreens will be supported", although "the Product was designed with the presence of discrete physical buttons as an assumption, therefore a touchscreen cannot completely replace physical buttons".[24] By 2008, both Nokia and BlackBerry announced touch-based smartphones to rival the iPhone 3G, and Android's focus eventually switched to just touchscreens. The first commercially available smartphone running Android was the HTC Dream, also known as T-Mobile G1, announced on September 23, 2008.

11889.

Can we draw shapes in Tux paint or any other paint tool​

Answer»

Answer:

yes we can DRAW SHAPES in tux PAINT or any other paint TOOL

11890.

What does vlink attribute mean?

Answer»

Answer:

The VLINK ATTRIBUTE specifies the color of visited links in a DOCUMENT.

11891.

Write a program for using for and while loop in Q Basic

Answer»

ANSWER:FOR a = 1 TO 5

PRINT "This is loop NUMBER"; a

NEXT a;

Explanation:

11892.

Can we open gallery in open office writer​

Answer»

Answer:

Choose Tools > GALLERY or click the Gallery icon on the Standard toolbar. ... Select an object with a single click. Drag and drop the IMAGE into the document. You also can right-click on the object to open the context menu and select Insert > Copy.

HOPE it helps to you!!

plz MARK as brainliest answer!!

11893.

What happen if we increase the RAM in our computer and mobile

Answer»

Answer:

The SPEED is increase of MOBILE and LAPTOP and storage also increase

11894.

Computer types of right ​

Answer»

There are Four DIFFERENT Computer Types. We have four different computer types CLASSIFIED according to their performance, power, and size. A computer is an electronic DEVICE that accepts DATA, processes it, stores, and then produces an output.

Supercomputer.

Mainframe Computer.

Minicomputer.

Microcomputer.

11895.

Write the names of Android version ,their names and one unique feature of each.​

Answer»

Answer:

Lollipop, OREO, Marshmellow, KIT Kat, Pie

Explanation:

These are the TOP 5 android VERSIONS

11896.

Alisha want to write a letter to her father but she is confused about what software she should use to write. Help her in this concern and write the benefits of the concerned software also.#Holiday Homework#

Answer»

You can use OUTLOOK, outlook can WRITE a letter and email , massage not only ONE person but also 1k person

11897.

Please it's urgent.The one who will answer first I will mark it as brainliest​

Answer»

ANSWER:

  1. There are two main types of software: SYSTEMS software and APPLICATION software.
  2. The five types of system software work closely with COMPUTER hardware. ...Windows 8.1 operating system, is an example of system software.Intel driver page.

BIOS chip details the data of systems firmware BIOS setup utility. ...

UEFI setup utility.

3.The following are different types of language processors are:Compiler.Assembler.Interpreter 4.Low level language

a) Machine language (1GL)

b) Assembly language (2GL

5. High level language

a) Procedural-Oriented language (3GL)

b) Problem-Oriented language (4GL)

c) Natural language (5GL)

11898.

WHICH IS USED THESE IN VIDEO CALL

Answer»

ANSWER:

what is ur question???is this a question...TELL me in comment s and i will HELP U

11899.

Can we insert picture in OpenOffice writer as in OpenOffice impress yes or no​

Answer»

Answer:

Yes,

we can insert picture in both OpenOffice writer as well as inOpenOffice impress .

Explanation:

Click in the OOO document where you want the image to appear. CHOOSE Insert > Picture > From File from the menu BAR. On the Insert Picture dialog, navigate to the file to be inserted, SELECT it, and click Open. At the bottom of the dialog are two OPTIONS, Preview and Link

hope helps

11900.

How we stop corruption ?

Answer»

EXPLANATION:

...................