Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

12451.

The size of long integer data type​

Answer»

ANSWER:

more than 8CM to the 20 CM

12452.

How to write IMEI and Bluetooth address on Android?​

Answer»

I EXACTLY don't KNOW about it

12453.

The Dos command can be typed ina)Upper caseb)Lower casec)Bothd)None​

Answer»

ANSWER:

none

Explanation:

i THINK because it is a TYPE of q basic PROGRAM

12454.

What is ICI? Write its Impact?​

Answer»

ANSWER:

IMPERIAL CHEMICAL INDUSTRIES

12455.

FORTRAN is a language of _(Application software/System software)​

Answer»

\huge\star\underline{\mathcal\color{brown}{HELLO\:MATE}}\star

\color{brown}{HERE\:IS\:YR\:ANS}

✶⊶⊷⊶⊷⊷⊶⊷ ❍⊷⊶⊷⊶⊷⊶⊷✶

\underline\color{Green}{SYSTEM\: SOFTWARE}

I

\fbox\color{brown}{HOPE\:IT\:HELPS}

✶⊶⊷⊶⊷⊷⊶⊷ ❍⊷⊶⊷⊶⊷⊶⊷✶

\huge{\mathcal{THANKS}}

☝️ABHI♥️☝️

12456.

How to open Microsoft PowerPoint 2003 files on newer version of PowerPoint?​

Answer»

ANSWER:

by CHANGING the PRESENTATION into VIDEO

12457.

Visit various website and list the area where ict is used

Answer»

ICT is primarily included in radio or television education or all other wireless transmission purposes. Many teacher assistants the smart method of teaching by REPLACING the conventional whiteboards and placing modern devices boards inside it.

Explanation:

  • For LEARNING is fun and simple when the sound and visual components communicate with it. Other procedures were already being embraced such as class telecommunications etc.
  • That kind of could be used for all products that can digital format STORE, retrieve and FORWARD the data. Some obvious TYPES are computer systems, television, robotics, and desktop computers.
  • Those who see its impact on almost all websites, as IC is the result of every industrial innovation.

Learn more:-

brainly.in/question/10126777

12458.

Diagram of worksheet showing result of 10 student.

Answer»
12459.

The....... command allows you to modify the default prompta)Clickb) Commandc)promptd)Windows​

Answer»

ANSWER:

WINDOWS is the answer of COMMAND ALLOWS

12460.

Radhika wants to protect her computer system against virus attacks. What kind of software will you suggest her to install?

Answer»

Answer:

She can install anti-VIRUS SOFTWARE to protect her COMPUTER SYSTEM from virus attacks

Explanation:

12461.

What is the extension of MS word files

Answer»

Answer:

DOCX is the extension of MS WORD FILE

12462.

Computer understand only............ languagea)Binaryb)Userc) Hybridd)Machine​

Answer»

A) BINARY
HOPE it HELPS you

12463.

How MS EXCEL python is useful in data science.

Answer»

Answer:

EXCEL is an application whereas Python is a programming language. It means there are some statistatical and analytical functions built into excel which you can use to do some pretty good analysis e.g. REGRESSION, A/B TEST and etc. You don't need to write CODE to analyze data.

Explanation:

12464.

Explain network layout and it's four types with diagram

Answer»

Policy.

What is a network diagram?

A network diagram is a visual representation of a computer or telecommunications network. It shows the components that make up a network and how they interact, including ROUTERS, devices, hubs, firewalls, etc. This network diagram shows a local area network (LAN):

Depending on its scope and purpose, a network diagram may contain lots of detail or just provide a broad overview. For instance, a diagram of a LAN might could show the IP addresses of individual computers, while the diagram of a MAN (metropolitan area network) could represent buildings or areas with a single node.

A network diagram can be either physical or logical.

Logical network diagrams

A logical network diagram describes the way information flows through a network. Therefore, logical network diagrams TYPICALLY show SUBNETS (including VLAN IDs, masks, and addresses), network devices LIKE routers and firewalls, and routing protocols.

logical network diagram

In the Open Systems Interconnection (OSI) model, logical network diagrams correlate with the information contained in layer 3 (L3). Also known as the “network layer,” L3 is an abstraction layer that deals with packet forwarding through intermediate routers. Level 2 shows the data links between adjacent nodes, while level 1 shows the purely physical layout.

Physical network diagrams

A physical network diagram shows the actual physical arrangement of the components that make up the network, including cables and hardware. Typically, the diagram gives a bird’s eye view of the network in its physical SPACE, like a floorplan.

Explanation:

12465.

What type of errors are not detected by assemblers?

Answer»

ANSWER:

SEMANTIC ERRORS are not  DETECTED by ASSEMBLERS.

12466.

.........is used in optical mediaa) Magnetic tapeb)Laser raysc)Inkd) None​

Answer»

Optical MEDIA reads or writes the DATA with the help of Laser rays.

These rays are passed across the reflective MATERIAL of optical media which in turn changes the reflectivity periodically that will be taken as the BINARY input by the media.

12467.

Which is the interface between user and computer?a) Operating Systemb)Compilerc)Interpreterd)Machine Code​

Answer»

ANSWER:

a) OPERATING System

HOPE IT HELPS

12468.

The most suitable output device for producing a wage slip printed on a carbonised paper is a ..........?a. inject printerb. laser printer c. plotterd. dot matrix printer ​

Answer»

ANSWER:

d . DOT MATRIX printer

Explanation:

12469.

What are the components of window desktop ?

Answer»

ANSWER:

Its MAIN COMPONENTS are  

✔My computer

✔Recycle bin

✔Start button

✔Taskbar

12470.

Physical parts of the computer are calleda) Softwareb) Hardwarec)Framewared)Userware​

Answer»

physical PARTS of the computer are CALLED?

=> Hardware

12471.

Which command is externala)Copy conb)Xcopyc)Copyd)None​

Answer»

HELLO MATE HERE IS YOUR ANSWER

c) Copy

it is external command

HOPE THIS HELPS YOU

PLEASE FOLLOW ME

12472.

Largest storage device fixed inside the cpu

Answer»

ANSWER:

CACHE

EXPLANATION:

12473.

Importance of cyber safety​

Answer»

Answer:

Internet safety or online safety is trying to be safe on the internet and is the knowledge of maximizing the user's personal safety and security risks to private information and property associated with using the internet, and the self-protection from computer crime in general.

As the number of internet users continues to grow WORLDWIDE,[1] internets, governments and organizations have expressed concerns about the safety of CHILDREN using the Internet. Safer Internet Day is CELEBRATED worldwide in FEBRUARY to RAISE awareness about internet safety.[2] In the UK the Get Safe Online campaign has received sponsorship from government agency Serious Organized Crime Agency (SOCA) and major Internet companies such as Microsoft and eBay.[3]Online safety is really important because people need to keep safe on the internet.

Explanation:

12474.

What is the different type of personal computer??

Answer»

ANSWER:

DESKTOP COMPUTER

Notebook Computer

Net BOOK Computer

Tablet Computer

PDA Computer

12475.

Which command is internala)Promptb)Editc)Memd)None​

Answer» C) EDIT COMMAND is INTERNAL
12476.

Explain different types of internet connection ​

Answer»

Answer:

Digital SUBSCRIBER Line (DSL) DSL is a low-tech but high-speed fixed WIRELINE broadband Internet connection that travels ALONG copper telephone lines. Two-wire technology ALLOWS the connection to provide you with broadband Internet WITHOUT any interference from your phone service

12477.

write an HTML code to create the schedule for sport activities you can use the colour of your choice​

Answer»

Answer:

Explanation:

Sport Schedule

COLOR="PINK  

">

SCHEDULE FOR SPORT ACTIVITIES

align="center">

 

 

 

 

10:00-12:00   2:00-4:00

align="center">MONDAY  

Hockey
 

align="center">Basketball
 

align="center">TUESDAY  

Volleyball
 

align="center">Basketball
 

align="center">WEDNESDAY  

Volleyball
 
basketball

align="center">THURSDAY  

VolleyBall

color="orange">FOOTBALL

FRIDAY  

align="center">Hockey
 

color="blue">Football

12478.

Which command is used to delete file from a directory in dosa)Renb)Erasec)Rdd)None​

Answer» B) erase



HOPE THIS HELPS YOU

MARK ME AS BRAINLIEST
12479.

ENTERPRENEURSHIP : Also write some factor of effective ENTERPRENEURSHIP.​

Answer»

The most critical and most important key SUCCESS FACTORS that can make an entrepreneur become a successful entrepreneur are:

WILLINGNESS to take action. ...

Entrepreneurial knowledge. ...

Entrepreneurial creativity. ...

Entrepreneurial skills. ...

Entrepreneurial intelligence. ...

Patience. ...

PERSISTENCE. ...

The ability for teamwork.

12480.

The extension of batch file is....a)Bakb)Batc)Sysd)Exe​

Answer»

ANSWER:

i DONT KNOW OK

Explanation:

i dont know ok

12481.

Which function sets the integer starting value used in generating random numbers in python?

Answer»

Answer:

choice() :- This function is used to generate 1 random NUMBER from a container.

randrange(beg, end, step) :- This function is also used to generate random number but WITHIN a range SPECIFIED in its arguments.

random() :- This number is used to generate a float random number less than 1 and greater or equal to 0.  

seed() :- This function maps a PARTICULAR random number with the seed argument mentioned. All random numbers CALLED after the seeded value returns the mapped number.

12482.

What is rdbms and its advantages and disadvantages?

Answer»

ANSWER:

you COULD READ here

EXPLANATION:

HTTPS://www.techwalla.com/articles/the-advantages-of-a-relational-database-management-system

12483.

We specify number of rows and columns in the ...................dialog box. fill in the blanks

Answer»

We specify "number of rows and columns" in the Table Properties dialog box.

Explanation:

A table is a format of "horizontal rows and VERTICAL columns". Tables set up data into rows and columns, that can make the data easy to TYPE, edit, and format while placing it in the document.

To "INSERT a table", you can click "Insert Table on the menu" at the "bottom of the Insert Table gallery" to open the "Insert Table dialog box", in which you can specify the "rows and columns" required and customize the COLUMN width.

12484.

Which command will display to list all of the files in the current directorya)Showb)List allc)Dird)None​

Answer»

SHOW will show the LIST of all the DIRECTORY

12485.

An article on Types of Networks !!!!​

Answer»

Answer:

You can SEARCH it on GOOGLE. DONT WASTE your TIME here

12486.

Plz help me to solve dis question​

Answer»

what is the QUESTION FIRST you SEND

12487.

What is hidden surface removal in computer graphics?

Answer»

Answer:

When we view a picture CONTAINING non-transparent objects and surfaces, then we cannot SEE those objects from view which are behind from objects CLOSER to eye. We must remove these hidden surfaces to get a REALISTIC screen IMAGE. The identification and removal of these surfaces is called Hidden-surface problem.

Explanation:

12488.

Which device arranged files and folders at one place to make your PC work faster​

Answer»

Answer:

there is no device to organise such files and folder in PC there are called PROGRAMS which run by GUI( graphical user interface ) on the APP so let control by them .

12489.

Brief noteon early calculating device​

Answer»

PLEASE MARK me as BRAIN LIST....please....please....please

12490.

Which command line command displays the ip vonfirguation of a alcompiters interfaces?

Answer»

ANSWER:

IPCONFIG

EXPLANATION:

12491.

can somebody tell how to delete answer if someone has send incorrect not having any relationship to that question ​

Answer»

Just REPORT the ANSWER the MODS will DELETE it .

^-^

12492.

What is negative thinking​

Answer»

Answer:

NEGATIVE THINKIN is that thinking of mind that MAKE you SAD and FRUSTRATED all the time so be positive

12493.

The number of keys in akeyboard is​

Answer»

They are 104 KEYS in KEY BOARD .

12494.

Program c write text ​

Answer»

HELLO mate

incomplete QUESTION

12495.

Q) How can we change the hexadecimal number to binary digit which support computer.

Answer»

ANSWER:

we can CHANGE by the FOLLOWING reasons.

Explanation:

10101010 in numerical form is the computer code which reads what will TYPE in this

12496.

Write three things you should do and three things you should not do when you are in a computer lab

Answer»

The computer rooms’ rules and regulations are not there to spoil anyone's fun.  We have a large number of students all using the same facilities, so it is important that there are some procedures in place, which help to maintain the smooth running of the computer rooms.Computers are provided for use in support of APPROVED course work, and should be treated as a shared work tool, rather than a means of PASSING the time between classes.

All users must behave in a manner that respects their fellow students, staff and equipment.  In addition to the normal Institute regulations, the following points must be obeyed:

Computer games are prohibited.

Viewing pornography via sites, via internal email, external email, documents, Internet sites or through any other form on WIT computers is strictly prohibited.

Eating and drinking in computer rooms are prohibited.

Don’t leave rubbish lying around the rooms – use the bins provided.  If for some reason, the bin is REMOVED, please bring any discarded papers, bottles, etc, with you.  It’s much nicer to work in a clean room than a dirty one!

No user shall, take or omit to take any actions which damages, restricts, jeopardises, impairs or undermines the performance, usability or accessibility of the computing facilities, the communications network, systems programs or other stored information/data.

Any behaviour that interferes with the work of other students and staff is prohibited -this includes the use of personal stereos, radios or any behaviour that leads to excessive levels of noise.  It also includes the use of the computing facilities in any way which may cause offence to others.

Users are required to take all reasonable precautions to maintain the integrity of passwords and any other security mechanisms.  It is the responsibility of users to maintain the security of their own passwords.  Do not give your passwords to any other user or allow any user to use your account.

Any attempt to INTERFERE with the integrity of the systems or data stored on any system is prohibited.  This includes all forms of hacking.Students may only access files which they are authorised to access. Users are warned that gaining unauthorised access to data (including programs) and INTERFERING with data belonging to others are criminal offences and persons convicted under the appropriate Act may be subject to fines or terms of imprisonment and they, and their parents or guardians, may be required to pay compensation to those affected

Read more on Brainly.in - brainly.in/question/1242183#readmore

12497.

Plz give me a full HTML coding page no 163

Answer»

 

CODING PAGE no 163

12498.

Used to play music stored in a computer

Answer»

Answer:

Explanation:

TAPE generally records the AUDIO and usually digital INFORMATION is a FORM in which it is mainly converted. Finally, the storage location is the hard drive of the computer. So, the microphone is the DEVICE which helps in playing the recorded sound.

12499.

Give output:#includeint global = 20;void fun (int &x, inty)X = X-y;y=x* 10;cout

Answer»

Answer:

1st output

12 , 8

second output

-8 , 20

12500.

Explain wired network technology​

Answer»

Explanation:

A WIRED network is a common type of wired configuration. ... Larger networks OFTEN involve MULTIPLE routers or switches that connect to each other. One of these devices typically connects to a cable MODEM, T1 line, or other type of Internet CONNECTION that provides Internet access to all devices connected to the network.