Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

12051.

The tiny dots of color that digital images are composed of are called

Answer»

ANSWER:

pixels

Explanation:

TINY DOTS of colour the DIGITAL images are composed of are called as pixels.

12052.

Write a short note on internet and intranet

Answer»

Answer:

ntranet is also a network of COMPUTERS designed for a specific group of users. 2. Intranet can be ACCESSED from INTERNET but with RESTRICTIONS. Therefore the Internet is an open, public space, while an intranet is designed to be a private space.

12053.

Write a short note on network and its component

Answer»

Answer:

ur answer

Explanation:

BASIC COMPUTER network COMPONENTS - Basic computer network components. Computer networks share common devices, functions, and features including servers, clients, transmission media, shared data, shared printers and other hardware and software resources, network INTERFACE CARD(NIC), local operating system(LOS), and the network operating system (NOS).

plz Mark me as brainlist ✌️✌️

12054.

Write a short note on firewall and use

Answer»

Firewall

A system is design to prevent UNAUTHORISED access to or from a private network is called firewall.

Firewall are of two forms

  1. Software firewall - Secure the computer against Trojan programs and e - mail worms.
  2. Hardware firewall - Secure all the machine on LOCAL area network.

Use

It is use to stop or shut the access of the other OPERATING system that is connected to your network.

Firewall stop the people and Hacker who want to damage and want to TAKE the personal information for illegal PURPOSE.

12055.

When calculating a formula with brackets, *, /, and + operators, the order of preference will be

Answer»

ANSWER:

Same as BODMAS rule.

Explanation:

12056.

What are various advantage of database management system?

Answer»

what is the QUESTION .....

12057.

How the convergence of Technologies has influenced our society​

Answer»

Answer:

It does INFLUENCED us in so MANY WAYS .It developed our society so that man can THINK abroad. we can contact EASILY with each other .It also makes the children to learn things easier and faster. we are able to live a comfortable and a free life.

12058.

What is the difference between numeric formula and text formula in excel?​

Answer»

ANSWER:

Calculate the difference between two NUMBERS by inputting a formula in a new, blank CELL. If A1 and B1 are both numeric VALUES, you can use the "=A1-B1" formula. Your cells don't have to be in the same order as your formula. For example, you can ALSO use the "=B1-A1" formula to calculate a different value.

12059.

Full Form Of I P O and GiGo

Answer»

Answer:

IPO: Initial Public OFFERING

GIGO: GARBAGE In Garbage Out..

12060.

Create as blog discussing virus,malware,spams and anti virus using HTML

Answer»

Explanation:

Computer viruses are nasty little programs that are designed to lay waste to your computer. Some destroy files stored on your PC, while some trigger different software to malfunction. More nefarious viruses steal your confidential information and some EVEN go to an extent to rig a system’s power load and cause it to catch fire. Some nasty little things these viruses are! So, the more you know about viruses and how they work, the more prepared you will find yourself when they come knocking. And with that thought, here are 7 computer viruses you should know about.

1. Polymorphic VIRUS

‘Nasty’ is underrated when we talk about this virus family. When a polymorphic virus infects a computer, before it starts multiplying it creates copies of itself with every copy slightly different from one another. And because this virus is capable of creating such duplicates constantly, it can be difficult for antivirus programs to detect it.

2. Resident Virus

A resident virus is different from a non-resident virus in the way it functions. A non-resident virus needs to be executed first, before it begins its infection. However, a resident virus can activate itself whenever the operating system loads. It is able to do this because it stores and hides within the memory of the infected computer, which is why it is difficult to get rid of such viruses

3. Boot Sector Virus

First, let’s understand what is a boot sector – it is a section on a computer’s hard drive or an external storage media. This section contains information which is required to boot a computer. A boot sector virus infects part of this boot sector called the master boot record (MBR) and replaces legitimate information with its own infected version. The virus gets activated before the operating system loads and it may make the infected computer unbootable.

4. Multipartite Virus

While other viruses attack one component of a computer at a time, a multipartite virus attacks two. This virus can infect both the boot sector and the system or program files at the same time. This triggers infections at multiple sections in the computer – just like multiple bombs detonating at various places at the same time. Because of this dual infection approach, the multipartite virus can re-infect the same system over and over again until all its components are completely eradicated.

5. Overwriting Virus

True to its name, an overwriting virus destroys the file it infects. It does this by overwriting data in the system’s memory. The virus can be removed only by deleting the infected file. Often, cleaning an overwriting virus means losing the infected programs and reinstalling them.

6. Browser Hijacker Virus

It’s also known as a browser redirect virus and so because it’s sole purpose is to redirect you to websites without your consent. Once inside a computer, it modifies the settings of the web browser (including default search engine and HOME page) and takes a user to malicious websites (in most cases). A browser hijacker spreads through malicious email attachments, free downloads or when a user visits an infected website. This virus can install a spyware on the infected system and this may compromise the user’s private data (personal or financial information). It can also install other viruses such as ransomware that encrypts a system’s data and demands MONEY (ransom) in exchange.

7. Macro Virus

Let’s first understand what is macro. Macro is a set of commands that can be installed in programs like MS Word or Excel to trigger a specific function automatically. It is mostly used for automating common, repetitive tasks. A macro virus is a malicious program that is written in the same macro language and replaces/alters a pre-installed macro in a program like MS Word or Excel. And when such a document is opened, it causes a series of actions to begin automatically. These actions include infecting every other document on a user’s computer, causing irregularities in text documents, accessing email accounts, sending spam messages to people in the user’s address books, etc. A macro virus can affect WINDOWS, Linux and even Mac.

hope you got you want

12061.

Types of recursive function in theory of computation

Answer»

Answer:

Recursive FUNCTIONS. The recursive functions, which form a class of computable functions, take their name from the process of “RECURRENCE” or “recursion”. In its most general numerical form the process of recursion consists in defining the value of a function by USING other values of the same function.:

Hope My Answer Helps You!

PLEASE mark me as brainliest and follow me also

PLEASE

12062.

Three main parts of cpu​

Answer»

Explanation:

There are so many PARTS some them are:

Arthematic logic unit(ALU)

Control Unit(CU)

Memory

Mouse

Keyboard

Monitor. etc...

Thank you....

12063.

1 2 9 3 8 10 4 7 11 14 5 6 12 13 15 pattern in c

Answer»

ANSWER:

ANS- 1,2,3,4,5,6,7,8,9,10,11,12,13,14,15

12064.

............is not a component of the scratch window options are menu bar , stage , status bar

Answer»

STAGE is not a COMPONENT of the SCRATCH WINDOW.

12065.

Plz can anybody tell me if i do computer course will i get computer science in BITS GOA​

Answer»

YA of course you can do,with bothh HARD work.

You defintely GET computer SCIENCE in BITS goa

12066.

Who is the father of watsapp

Answer»

ANSWER:

JAIN koum is the father of whatsapp PLS mark as BRAINLEST

12067.

How communication software are useful​

Answer»

Explanation:

ONE of the major advantages of communication software is ,it acts as a repository of data. Many apps can record or achieve message exchanges and audio and video calls , meaning ,you can CAPTURE IMPORTANT details such as customer queries , DISCUSSION points and MEETING minutes

12068.

Make a chart of body, paragraph, heading, font tags of HTML with their attributes.​

Answer»

HTML code

CHART

Heading

Heading

Heading

Heading

Heading

Heading

this is your PARAGRAPH.

12069.

Explain uses of suvidha centre

Answer»

It PROVIDES you all the FACILITIES that  are IMPORTANT from HOUSING to DISPENSARY.

12070.

Who is the firstchief of microsoft

Answer» FIRST CHIEF of Microsoft is BILL GATES.

HAVE A VERY NICE EVENING

PLEASE FOLLOW ME
12071.

Who is the chief of microsoft

Answer»

Answer:

Nadella is chief of MICROSOFT ANNOUNCED in 4 Feb 2014

12072.

What is the difference between moving and coping a document

Answer»

ANSWER:

when we copy SOMETHING then from where we copied it cannot erased from that place when we move something it can erased from that place

Explanation:

i USED SIMPLE ENGLISH language for you

12073.

Who is arkham knight ?​

Answer»

The ARKHAM Knight is a fictional supervillainappearing in DC Comics media. Created by Rocksteady STUDIOS and DC writer Geoff Johns to serve as the titular villain in the 2015 video gameBatman: Arkham Knight, the character made his first appearance in the prequel comic book Batman: Arkham Knight #1 (February 2015), before receiving his own 6-issue MINISERIES Batman: Arkham Knight GENESIS, with #1 released on August 26, 2015.[1] He is voiced by TROY Baker. Depicted as the mysterious commander of a vast militia of mercenaries, the Arkham Knight harbors a deep-rooted grudge against Batman and fully intends to kill the vigilante after making him suffer. To this end, he allies himself with the Scarecrow and provides a military presence in the evacuated Gotham City during the events of Batman: Arkham Knight. Towards the end of the game's main story, his true identity is revealed to be Jason Todd, the former and second Robin who was thought to have been KILLED years earlier by Batman's nemesis, Joker.

Hope this helped you Please Mark this answer as brainlist

12074.

Which of these BEST describes the approach for determining the sprint length in scrum

Answer»

ANSWER:

Sprint length should not be more than month. IDEAL sprint length should be for 2 weeks.

Explanation:

SHORTER length provide opportunity to WORK closely and release many more feature to customer.

12075.

How does a CPU works​

Answer»

It works upon the DATA or INPUT giving by the user to PERFORM VARIOUS tasks,that are ALREADY inbuilt in it.

12076.

How do you put a heading in three columns properly in Excel

Answer»

Default Excel Column Headings

Open the Spreadsheet

Open the Excel spreadsheet where you want to define your column headings.

Use the Page Layout Tab

CLICK the "Page Layout" tab at the top of the ribbon, then find the Sheet Options area of the ribbon, which includes two small checkboxes under the Headings category.

Check to Show Headings

Add or remove a check mark next to "View" to reveal or hide, respectively, the Excel headings on the spreadsheet. The headings for the columns and ROWS are linked, so you can only either see them both, or hide them both. The column headings will be letters and the row headings will be numbers.

Choose Whether to Print Headings

Place a check mark in the box next to "Print" to have Excel include the column and row headings on anything that you print out. These headings will appear on every page that you print, not just the first.

Customized Column Headings in Excel

Open the Spreadsheet

Open the spreadsheet where you want to have Excel MAKE the top row a header row.

Add a Header Row

Enter the column headings for your data across the top row of the spreadsheet, if necessary. If your data is already present in the top row, right-click on the number "1" on the top of the left side of the spreadsheet and choose "Insert" from the pop-up menu to create a new top row, then enter your headings by typing in the appropriate cell.

Select the First Data Row

Click on the number "2" on the left side of the spreadsheet to select the second row, which is the now the first row under the headings and the first containing actual data.

FREEZE the Headers in Place

Click the "View" tab in the ribbon menu, and then click the "Freeze Panes" button in the Window area of the ribbon. Your column headers now stay visible as you scroll down the spreadsheet, letting you see which column is which as you edit the document.

Configuring Printing Options

Click the "Page Layout" tab if you want your headers to print on every page of the spreadsheet. Click the arrow next to "Sheet Options" in the ribbon to open a small window. Check the box next to "Rows to REPEAT at top," which shrinks the window and takes you back to the spreadsheet. Click the number one on the left side of the spreadsheet, and then click the small box again to return the window to its normal size. Click "OK" to save your changes.

12077.

A withdrawal of cash from the business by the owner is called

Answer»

PROFIT.........................................

12078.

Originally Jenkins was developed as the Hudson project

Answer»

OHK MATE i have GOT it.

12079.

write a java program to accept and store 10 city names in a single dimensional array and enter a new name and check whether it is there or not by using selection Sort algorithm​

Answer»

Program

IMPORT java.io.*;

import java.util.*;

PUBLIC CLASS Main{

     public static void main(String ARGS[]){

            int[] arr = new int[10];

            Scanner sc = new Scanner(System.in);

            System.out.println("Enter 10 city name:")

             for (int i = 0 ; i < 10 ; i++ ){

                   arr[i] = sc.nextLine();

             }

             System.out.println("Enter city name to be CHECKED in the given list");

             String st = sc.nextLine();

             int i = 0;

             while ( i < 10 ){

                   if ( arr[i].equals(st) ){

                         System.out.println("city name found at "+(i+1)+" position");

                         break;

                   }

                   i++;

             }

      }

}

Output

Enter city name to be checked in the given list:

vijayawada

hyderabad

kolkatha

pune

chennai

jaipur

ahmedabad

surat

bangalore

mumbai

Enter city name to be checked in the given list:

pune

city name found at 4 position

-----hope this helps    :)

12080.

Kilobyte (KB) = 210 B = 1024 B1 megabyte (MB) = 210 KB =KB = 1024 x 1024 B1 gigabyte (GB) = 210 MB = MB = 1024 x 1024 x 1024 B1 terabyte (TB) =GB = 1024 TB =e of Memory​

Answer»

Answer:

1024 TB = 1 Petabyte

Explanation:

In computer memory The storage increases by 1024 times from SMALLER to its consective larger unit

12081.

Write down the steps to create a table structure. give answer​

Answer»

Answer:

Explanation:

hy friend hope it helps uh..

When you create an Access database, you store your data in tables—subject-based lists that contain rows and COLUMNS. For instance, you can create a Contacts table to store a LIST of names, ADDRESSES, and telephone numbers, or a Products table to store INFORMATION about products.

This article explains how to create a table, how to add fields to a table, and how to set a table's primary key. It also explains how to set field and table properties.

Because other database objects depend so HEAVILY on tables, you should always start your design of a database by creating all of its tables and then creating any other objects. Before you create tables, carefully consider your requirements and determine all the tables that you need. For an introduction to planning and designing a database, see the article Database design basics.

12082.

Complete this table :1. kilobyte (KB) = 210 B = 1024 B1 megabyte (MB) = 210 KB =KB = 1024 x 1024 B1 gigabyte (GB) = 210 MB = MB = 1024 x 1024 x 1024 B1 terabyte (TB) =GB = 1024 TB = _ *​

Answer»

ANSWER:

ONE PETABYTE is the answer

12083.

Create a table named book by defining the field book ld book name price publisher category and number of pages enter 25 records in it and perform all the operations

Answer»

ANSWER: In this problem,

The query can be written in different platforms.

MYSQL:

CREATE TABLE BOOK(

book_id  INT NOT NULL,

name varchar(255),

price int,

PUBLISHER varchar(255),

catagory varchar(255),

Num_of_pages int

);

SQL Server / Oracle / MS Access:

CREATE TABLE book(

book_id  int NOT NULL PRIMARY KEY,

name varchar(255),

price int,

publisher varchar(255),

catagory varchar(255),

Num_of_pages int

);

12084.

O MemoryFill in the blanks :1. A computer works with only two digits –2. These digits are calleddigits or bits.3. Ais the smallest chunk of information, a computercan work with.4. A computer language represented in bits known as alanguage.5. 8 bits make a​

Answer»

1)0and1

5)ONE byte

Other QUESTIONS I'm not UNDERSTANDING

12085.

Which app is good for learning c language​

Answer»

ANSWER:

hey mate

youtube is BEST SOMETIMES

you can SEARCH on PLAY store.

follow me ❤✌♥

12086.

Why is computer network needed in today's work environment?Answer in about 4lines

Answer»

Answer:

bcozz it's essential

Explanation:

in the day to day life the man is COMPLETELY DEPENDENT upon computer for his work .the computer makes mans work EASY and faster it helps in SAVING time,so computer NETWORK is needed

12087.

Who is making the web standardsA )Mozilla optionB )Google option C) the world wide web Consortium D) Microsoft ​

Answer»

ANSWER:

B am i RIGHT PLEASE TELL me

12088.

Computer Assignment )Create a chart on different programminglanguages with​ examples

Answer»

PLEASE ASK to your TEACHER

12089.

What is database server ?Explain Primary key and Foreign key​

Answer»

ANSWER:

Database server is a server which houses a database APPLICATION that provides database services to other computer PROGRAMS to COMPUTERS as defined by the client - server model.

12090.

Write al the option of file menu optian

Answer»

Answer:

PLEAZE....MARK IT AS THE BRAINLIEST ANSWER!? ?

 

PLEAZE....MARK IT AS THE BRAINLIEST ANSWER!? ?

 

PLEAZE....MARK IT AS THE BRAINLIEST ANSWER!? ?

 

PLEAZE....MARK IT AS THE BRAINLIEST ANSWER!? ?

 

PLEAZE....MARK IT AS THE BRAINLIEST ANSWER!? ?

 

PLEAZE....MARK IT AS THE BRAINLIEST ANSWER!? ?

 

PLEAZE....MARK IT AS THE BRAINLIEST ANSWER!? ?

 

PLEAZE....MARK IT AS THE BRAINLIEST ANSWER!? ?

 

PLEAZE....MARK IT AS THE BRAINLIEST ANSWER!? ?

 

PLEAZE....MARK IT AS THE BRAINLIEST ANSWER!? ?

 

PLEAZE....MARK IT AS THE BRAINLIEST ANSWER!? ?

 

PLEAZE....MARK IT AS THE BRAINLIEST ANSWER!? ?

 

PLEAZE....MARK IT AS THE BRAINLIEST ANSWER!? ?

 

PLEAZE....MARK IT AS THE BRAINLIEST ANSWER!? ?

 

PLEAZE....MARK IT AS THE BRAINLIEST ANSWER!? ?

 

PLEAZE....MARK IT AS THE BRAINLIEST ANSWER!? ?

 

PLEAZE....MARK IT AS THE BRAINLIEST ANSWER!? ?

 

PLEAZE....MARK IT AS THE BRAINLIEST ANSWER!? ?

 

PLEAZE....MARK IT AS THE BRAINLIEST ANSWER!? ?

 

PLEAZE....MARK IT AS THE BRAINLIEST ANSWER!? ?

 

PLEAZE....MARK IT AS THE BRAINLIEST ANSWER!? ?

 

PLEAZE....MARK IT AS THE BRAINLIEST ANSWER!? ?

 

PLEAZE....MARK IT AS THE BRAINLIEST ANSWER!? ?

 

PLEAZE....MARK IT AS THE BRAINLIEST ANSWER!? ?

 

PLEAZE....MARK IT AS THE BRAINLIEST ANSWER!? ?

 

PLEAZE....MARK IT AS THE BRAINLIEST ANSWER!? ?

 

PLEAZE....MARK IT AS THE BRAINLIEST ANSWER!? ?

 

PLEAZE....MARK IT AS THE BRAINLIEST ANSWER!? ?

 

PLEAZE....MARK IT AS THE BRAINLIEST ANSWER!? ?

 

PLEAZE....MARK IT AS THE BRAINLIEST ANSWER!? ?

 

PLEAZE....MARK IT AS THE BRAINLIEST ANSWER!? ?

 

PLEAZE....MARK IT AS THE BRAINLIEST ANSWER!? ?

 

PLEAZE....MARK IT AS THE BRAINLIEST ANSWER!? ?

 

PLEAZE....MARK IT AS THE BRAINLIEST ANSWER!? ?

 

PLEAZE....MARK IT AS THE BRAINLIEST ANSWER!? ?

 

PLEAZE....MARK IT AS THE BRAINLIEST ANSWER!? ?

 

PLEAZE....MARK IT AS THE BRAINLIEST ANSWER!? ?

 

PLEAZE....MARK IT AS THE BRAINLIEST ANSWER!? ?

 

PLEAZE....MARK IT AS THE BRAINLIEST ANSWER!? ?

 

PLEAZE....MARK IT AS THE BRAINLIEST ANSWER!? ?

 

Explanation:

Write all the options of File menu

The File menu is a GRAPHICAL control element FORMERLY common to most file-handling computer programs, but more recently often replaced by a toolbar or RIBBON. It often appears as the first item in the menu bar, and contains commands relating to the handling of files, such as open, SAVE, print, etc.

PLEAZE....MARK IT AS THE BRAINLIEST ANSWER!? ?

 

PLEAZE....MARK IT AS THE BRAINLIEST ANSWER!? ?

 

PLEAZE....MARK IT AS THE BRAINLIEST ANSWER!? ?

 

PLEAZE....MARK IT AS THE BRAINLIEST ANSWER!? ?

 

PLEAZE....MARK IT AS THE BRAINLIEST ANSWER!? ?

 

PLEAZE....MARK IT AS THE BRAINLIEST ANSWER!? ?

 

PLEAZE....MARK IT AS THE BRAINLIEST ANSWER!? ?

 

PLEAZE....MARK IT AS THE BRAINLIEST ANSWER!? ?

 

PLEAZE....MARK IT AS THE BRAINLIEST ANSWER!? ?

 

PLEAZE....MARK IT AS THE BRAINLIEST ANSWER!? ?

 

PLEAZE....MARK IT AS THE BRAINLIEST ANSWER!? ?

 

PLEAZE....MARK IT AS THE BRAINLIEST ANSWER!? ?

 

PLEAZE....MARK IT AS THE BRAINLIEST ANSWER!? ?

 

PLEAZE....MARK IT AS THE BRAINLIEST ANSWER!? ?

 

PLEAZE....MARK IT AS THE BRAINLIEST ANSWER!? ?

 

PLEAZE....MARK IT AS THE BRAINLIEST ANSWER!? ?

 

PLEAZE....MARK IT AS THE BRAINLIEST ANSWER!? ?

 

PLEAZE....MARK IT AS THE BRAINLIEST ANSWER!? ?

 

PLEAZE....MARK IT AS THE BRAINLIEST ANSWER!? ?

 

PLEAZE....MARK IT AS THE BRAINLIEST ANSWER!? ?

 

PLEAZE....MARK IT AS THE BRAINLIEST ANSWER!? ?

 

PLEAZE....MARK IT AS THE BRAINLIEST ANSWER!? ?

 

PLEAZE....MARK IT AS THE BRAINLIEST ANSWER!? ?

 

PLEAZE....MARK IT AS THE BRAINLIEST ANSWER!? ?

 

PLEAZE....MARK IT AS THE BRAINLIEST ANSWER!? ?

 

PLEAZE....MARK IT AS THE BRAINLIEST ANSWER!? ?

 

PLEAZE....MARK IT AS THE BRAINLIEST ANSWER!? ?

 

PLEAZE....MARK IT AS THE BRAINLIEST ANSWER!? ?

 

PLEAZE....MARK IT AS THE BRAINLIEST ANSWER!? ?

 

PLEAZE....MARK IT AS THE BRAINLIEST ANSWER!? ?

 

PLEAZE....MARK IT AS THE BRAINLIEST ANSWER!? ?

 

PLEAZE....MARK IT AS THE BRAINLIEST ANSWER!? ?

 

PLEAZE....MARK IT AS THE BRAINLIEST ANSWER!? ?

 

PLEAZE....MARK IT AS THE BRAINLIEST ANSWER!? ?

 

PLEAZE....MARK IT AS THE BRAINLIEST ANSWER!? ?

 

PLEAZE....MARK IT AS THE BRAINLIEST ANSWER!? ?

 

PLEAZE....MARK IT AS THE BRAINLIEST ANSWER!? ?

 

12091.

Name the two types of memories available in computer

Answer»

Random ACCESS memory(RAM)

READ only memory (ROM)

12092.

Write short note on dial up​

Answer»

ANSWER:

Dial-up Internet access is a form of Internet access that uses the facilities of the public SWITCHED telephone network to establish a connection to an Internet SERVICE provider by dialing a telephone NUMBER on a CONVENTIONAL telephone line.

12093.

The flight ticket for a round trip rate uding tax and disunt​

Answer»

it DEPENDS on where you GO

12094.

2. Define the limitations of first generation computer​

Answer»

Answer:

1. they were very BIG, the size of about a room

2. their processing speed was very slow

3. PRODUCED a large AMOUNT of heat

4.very less STORAGE capacity

5.high power consumption

6.low PROGRAMMING caability

12095.

*« write about the first generation Ollipuu2. Define the limitations of first generation computerLearn Lesson land 2​

Answer»

Answer:

COMPUTER - First Generation. The period of first generation was from 1946-1959. The computers of first generation USED VACUUM tubes as the basic components for MEMORY and circuitry for CPU (Central Processing Unit).

12096.

Prepare any one project out of the two given below in about 500 words. about what is a solar energy?

Answer»

Answer:

Solar energy is radiant light and heat from the Sun that is harnessed using a range of ever-evolving technologies such as solar heating, photovoltaics, solar thermal energy, solar architecture, molten salt power plants and artificial photosynthesis.

It is an important source of renewable energy and its technologies are broadly characterized as either passive solar or active solar depending on how they capture and DISTRIBUTE solar energy or convert it into solar power. Active solar techniques include the USE of photovoltaic systems, concentrated solar power and solar water heating to harness the energy. Passive solar techniques include orienting a building to the Sun, selecting materials with favorable thermal mass or light-dispersing properties, and designing spaces that naturally circulate air.

The large magnitude of solar energy available makes it a highly appealing source of electricity. The United Nations Development Programme in its 2000 World Energy Assessment found that the annual potential of solar energy was 1,575–49,837 exajoules (EJ). This is several times larger than the total world energy consumption, which was 559.8 EJ in 2012.

In 2011, the International Energy Agency said that "the development of affordable, inexhaustible and clean solar energy technologies will have huge longer-term benefits. It will increase countries’ energy security through reliance on an indigenous, inexhaustible and mostly import-independent resource, enhance sustainability, reduce pollution, lower the costs of mitigating global warming, and keep fossil fuel prices lower than otherwise. These advantages are global. Hence the additional costs of the incentives for early deployment should be considered Learning investments; they must be wisely spent and need to be widely shared"

The Earth receives 174 petawatts (PW) of incoming solar radiation (insolation) at the upper atmosphere.[5] Approximately 30% is reflected BACK to space while the rest is ABSORBED by clouds, oceans and land masses. The spectrum of solar light at the Earth's surface is mostly spread across the visible and near-infrared ranges with a small part in the near-ultraviolet.[6] Most of the world's population live in areas with insolation levels of 150–300 watts/m², or 3.5–7.0 kWh/m² per day.

Solar radiation is absorbed by the Earth's land surface, oceans – which cover about 71% of the globe – and atmosphere. Warm air containing evaporated water from the oceans rises, causing atmospheric circulation or convection. When the air REACHES a high altitude, where the temperature is low, water vapor condenses into clouds, which rain onto the Earth's surface, completing the water cycle. The latent heat of water condensation amplifies convection, producing atmospheric phenomena such as wind, cyclones and anti-cyclones.Sunlight absorbed by the oceans and land masses keeps the surface at an average temperature of 14 °C.by photosynthesis, green plants convert solar energy into chemically stored energy, which produces food, wood and the biomass from which fossil fuels are derived.

The total solar energy absorbed by Earth's atmosphere, oceans and land masses is approximately 3,850,000 exajoules (EJ) per year.[10] In 2002, this was more energy in one hour than the world used in one year.[11][12] Photosynthesis captures approximately 3,000 EJ per year in biomass.[13] The amount of solar energy reaching the surface of the planet is so vast that in one year it is about twice as much as will ever be obtained from all of the Earth's non-renewable resources of coal, oil, natural gas, and mined uranium combined

12097.

Any types of high level language

Answer»
  1. ADA, ALGOL, BASIC, COBOL, C, C++, FORTRAN, LISP, Pascal, prolog and html
12098.

Q.3. What determines the microprocessor is an 8, 16 or 32 bit

Answer»

EXPLANATION:

The bit size (8-bit, 16-bit, 32-bit) of a microprocecessor is determined by the hardware, specifically the width of the DATA BUS. The Intel 8086 is a 16-bit PROCESSOR because it can move 16 bits at a time over the data bus. The Intel 8088 is an 8-bit processor even though it has an identical instruction set.

12099.

Midpoint circle algorithm advantages and disadvantages

Answer»

Explanation:

Advantages: The midpoint METHOD is used for deriving efficient scan-conversion algorithms to draw geometric curves on RASTER displays. The method is general and is used to transform the NONPARAMETRIC EQUATION f(x,y) = 0, which describes the curve, into an algorithms that draws the curve.

12100.

What is the full form of wcdma..!??​

Answer»

Answer:

W-CDMA or WCDMA (Wideband Code Division MULTIPLE Access), along with UMTS-FDD, UTRA-FDD, or IMT-2000 CDMA Direct Spread is an air interface standard found in 3G mobile TELECOMMUNICATIONS networks.