This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 12453. |
The Dos command can be typed ina)Upper caseb)Lower casec)Bothd)None |
|
Answer» none Explanation: |
|
| 12454. |
What is ICI? Write its Impact? |
Answer» IMPERIAL CHEMICAL INDUSTRIES |
|
| 12455. |
FORTRAN is a language of _(Application software/System software) |
|
Answer» ✶⊶⊷⊶⊷⊷⊶⊷ ❍⊷⊶⊷⊶⊷⊶⊷✶ I ✶⊶⊷⊶⊷⊷⊶⊷ ❍⊷⊶⊷⊶⊷⊶⊷✶ |
|
| 12456. |
How to open Microsoft PowerPoint 2003 files on newer version of PowerPoint? |
|
Answer» by CHANGING the PRESENTATION into VIDEO |
|
| 12457. |
Visit various website and list the area where ict is used |
Answer» ICT is primarily included in radio or television education or all other wireless transmission purposes. Many teacher assistants the smart method of teaching by REPLACING the conventional whiteboards and placing modern devices boards inside it.Explanation:
Learn more:- |
|
| 12458. |
Diagram of worksheet showing result of 10 student. |
| Answer» | |
| 12459. |
The....... command allows you to modify the default prompta)Clickb) Commandc)promptd)Windows |
| Answer» | |
| 12460. |
Radhika wants to protect her computer system against virus attacks. What kind of software will you suggest her to install? |
|
Answer» Answer: She can install anti-VIRUS SOFTWARE to protect her COMPUTER SYSTEM from virus attacks Explanation: |
|
| 12462. |
Computer understand only............ languagea)Binaryb)Userc) Hybridd)Machine |
| Answer» | |
| 12463. |
How MS EXCEL python is useful in data science. |
|
Answer» Answer: EXCEL is an application whereas Python is a programming language. It means there are some statistatical and analytical functions built into excel which you can use to do some pretty good analysis e.g. REGRESSION, A/B TEST and etc. You don't need to write CODE to analyze data. Explanation: |
|
| 12464. |
Explain network layout and it's four types with diagram |
|
Answer» Policy. What is a network diagram? A network diagram is a visual representation of a computer or telecommunications network. It shows the components that make up a network and how they interact, including ROUTERS, devices, hubs, firewalls, etc. This network diagram shows a local area network (LAN): Depending on its scope and purpose, a network diagram may contain lots of detail or just provide a broad overview. For instance, a diagram of a LAN might could show the IP addresses of individual computers, while the diagram of a MAN (metropolitan area network) could represent buildings or areas with a single node. A network diagram can be either physical or logical. Logical network diagrams A logical network diagram describes the way information flows through a network. Therefore, logical network diagrams TYPICALLY show SUBNETS (including VLAN IDs, masks, and addresses), network devices LIKE routers and firewalls, and routing protocols. logical network diagram In the Open Systems Interconnection (OSI) model, logical network diagrams correlate with the information contained in layer 3 (L3). Also known as the “network layer,” L3 is an abstraction layer that deals with packet forwarding through intermediate routers. Level 2 shows the data links between adjacent nodes, while level 1 shows the purely physical layout. Physical network diagrams A physical network diagram shows the actual physical arrangement of the components that make up the network, including cables and hardware. Typically, the diagram gives a bird’s eye view of the network in its physical SPACE, like a floorplan. Explanation: |
|
| 12465. |
What type of errors are not detected by assemblers? |
|
Answer» SEMANTIC ERRORS are not DETECTED by ASSEMBLERS. |
|
| 12466. |
.........is used in optical mediaa) Magnetic tapeb)Laser raysc)Inkd) None |
|
Answer» Optical MEDIA reads or writes the DATA with the help of Laser rays. |
|
| 12467. |
Which is the interface between user and computer?a) Operating Systemb)Compilerc)Interpreterd)Machine Code |
|
Answer» a) OPERATING System HOPE IT HELPS |
|
| 12468. |
The most suitable output device for producing a wage slip printed on a carbonised paper is a ..........?a. inject printerb. laser printer c. plotterd. dot matrix printer |
|
Answer» Explanation: |
|
| 12469. |
What are the components of window desktop ? |
|
Answer» Its MAIN COMPONENTS are ✔My computer ✔Recycle bin ✔Start button ✔Taskbar |
|
| 12470. |
Physical parts of the computer are calleda) Softwareb) Hardwarec)Framewared)Userware |
|
Answer» physical PARTS of the computer are CALLED? => Hardware |
|
| 12471. |
Which command is externala)Copy conb)Xcopyc)Copyd)None |
|
Answer» HELLO MATE HERE IS YOUR ANSWER c) Copy it is external command HOPE THIS HELPS YOU PLEASE FOLLOW ME |
|
| 12472. |
Largest storage device fixed inside the cpu |
| Answer» | |
| 12473. |
Importance of cyber safety |
|
Answer» Answer: Internet safety or online safety is trying to be safe on the internet and is the knowledge of maximizing the user's personal safety and security risks to private information and property associated with using the internet, and the self-protection from computer crime in general. As the number of internet users continues to grow WORLDWIDE,[1] internets, governments and organizations have expressed concerns about the safety of CHILDREN using the Internet. Safer Internet Day is CELEBRATED worldwide in FEBRUARY to RAISE awareness about internet safety.[2] In the UK the Get Safe Online campaign has received sponsorship from government agency Serious Organized Crime Agency (SOCA) and major Internet companies such as Microsoft and eBay.[3]Online safety is really important because people need to keep safe on the internet. Explanation: |
|
| 12474. |
What is the different type of personal computer?? |
|
Answer» Notebook Computer Net BOOK Computer Tablet Computer PDA Computer |
|
| 12476. |
Explain different types of internet connection |
|
Answer» Answer: Digital SUBSCRIBER Line (DSL) DSL is a low-tech but high-speed fixed WIRELINE broadband Internet connection that travels ALONG copper telephone lines. Two-wire technology ALLOWS the connection to provide you with broadband Internet WITHOUT any interference from your phone service
|
|
| 12477. |
write an HTML code to create the schedule for sport activities you can use the colour of your choice |
||||||||||||||||||
|
Answer» Answer: Explanation:
COLOR="PINK |
|||||||||||||||||||
| 10:00-12:00 | 2:00-4:00 | |
align="center">MONDAY | Hockey | align="center">Basketball |
align="center">TUESDAY | Volleyball | align="center">Basketball |
align="center">WEDNESDAY | Volleyball | basketball |
align="center">THURSDAY | VolleyBall | color="orange">FOOTBALL |
| FRIDAY | align="center">Hockey | color="blue">Football |
| 12478. |
Which command is used to delete file from a directory in dosa)Renb)Erasec)Rdd)None |
|
Answer» B) erase HOPE THIS HELPS YOU MARK ME AS BRAINLIEST |
|
| 12479. |
ENTERPRENEURSHIP : Also write some factor of effective ENTERPRENEURSHIP. |
|
Answer» The most critical and most important key SUCCESS FACTORS that can make an entrepreneur become a successful entrepreneur are: WILLINGNESS to take action. ... Entrepreneurial knowledge. ... Entrepreneurial creativity. ... Entrepreneurial skills. ... Entrepreneurial intelligence. ... Patience. ... PERSISTENCE. ... The ability for teamwork. |
|
| 12480. |
The extension of batch file is....a)Bakb)Batc)Sysd)Exe |
|
Answer» Explanation: i dont know ok |
|
| 12481. |
Which function sets the integer starting value used in generating random numbers in python? |
|
Answer» Answer: choice() :- This function is used to generate 1 random NUMBER from a container. randrange(beg, end, step) :- This function is also used to generate random number but WITHIN a range SPECIFIED in its arguments. random() :- This number is used to generate a float random number less than 1 and greater or equal to 0. seed() :- This function maps a PARTICULAR random number with the seed argument mentioned. All random numbers CALLED after the seeded value returns the mapped number. |
|
| 12482. |
What is rdbms and its advantages and disadvantages? |
|
Answer» HTTPS://www.techwalla.com/articles/the-advantages-of-a-relational-database-management-system |
|
| 12483. |
We specify number of rows and columns in the ...................dialog box. fill in the blanks |
|
Answer» We specify "number of rows and columns" in the Table Properties dialog box. Explanation:A table is a format of "horizontal rows and VERTICAL columns". Tables set up data into rows and columns, that can make the data easy to TYPE, edit, and format while placing it in the document. To "INSERT a table", you can click "Insert Table on the menu" at the "bottom of the Insert Table gallery" to open the "Insert Table dialog box", in which you can specify the "rows and columns" required and customize the COLUMN width. |
|
| 12484. |
Which command will display to list all of the files in the current directorya)Showb)List allc)Dird)None |
| Answer» | |
| 12485. |
An article on Types of Networks !!!! |
|
Answer» Answer: |
|
| 12487. |
What is hidden surface removal in computer graphics? |
|
Answer» Answer: When we view a picture CONTAINING non-transparent objects and surfaces, then we cannot SEE those objects from view which are behind from objects CLOSER to eye. We must remove these hidden surfaces to get a REALISTIC screen IMAGE. The identification and removal of these surfaces is called Hidden-surface problem. Explanation: |
|
| 12488. |
Which device arranged files and folders at one place to make your PC work faster |
|
Answer» Answer: there is no device to organise such files and folder in PC there are called PROGRAMS which run by GUI( graphical user interface ) on the APP so let control by them .
|
|
| 12489. |
Brief noteon early calculating device |
| Answer» | |
| 12490. |
Which command line command displays the ip vonfirguation of a alcompiters interfaces? |
| Answer» | |
| 12491. |
can somebody tell how to delete answer if someone has send incorrect not having any relationship to that question |
|
Answer» Just REPORT the ANSWER the MODS will DELETE it . ^-^ |
|
| 12492. |
What is negative thinking |
|
Answer» Answer: NEGATIVE THINKIN is that thinking of mind that MAKE you SAD and FRUSTRATED all the time so be positive |
|
| 12495. |
Q) How can we change the hexadecimal number to binary digit which support computer. |
|
Answer» we can CHANGE by the FOLLOWING reasons. Explanation: 10101010 in numerical form is the computer code which reads what will TYPE in this |
|
| 12496. |
Write three things you should do and three things you should not do when you are in a computer lab |
|
Answer» The computer rooms’ rules and regulations are not there to spoil anyone's fun. We have a large number of students all using the same facilities, so it is important that there are some procedures in place, which help to maintain the smooth running of the computer rooms.Computers are provided for use in support of APPROVED course work, and should be treated as a shared work tool, rather than a means of PASSING the time between classes. All users must behave in a manner that respects their fellow students, staff and equipment. In addition to the normal Institute regulations, the following points must be obeyed: Computer games are prohibited. Viewing pornography via sites, via internal email, external email, documents, Internet sites or through any other form on WIT computers is strictly prohibited. Eating and drinking in computer rooms are prohibited. Don’t leave rubbish lying around the rooms – use the bins provided. If for some reason, the bin is REMOVED, please bring any discarded papers, bottles, etc, with you. It’s much nicer to work in a clean room than a dirty one! No user shall, take or omit to take any actions which damages, restricts, jeopardises, impairs or undermines the performance, usability or accessibility of the computing facilities, the communications network, systems programs or other stored information/data. Any behaviour that interferes with the work of other students and staff is prohibited -this includes the use of personal stereos, radios or any behaviour that leads to excessive levels of noise. It also includes the use of the computing facilities in any way which may cause offence to others. Users are required to take all reasonable precautions to maintain the integrity of passwords and any other security mechanisms. It is the responsibility of users to maintain the security of their own passwords. Do not give your passwords to any other user or allow any user to use your account. Any attempt to INTERFERE with the integrity of the systems or data stored on any system is prohibited. This includes all forms of hacking.Students may only access files which they are authorised to access. Users are warned that gaining unauthorised access to data (including programs) and INTERFERING with data belonging to others are criminal offences and persons convicted under the appropriate Act may be subject to fines or terms of imprisonment and they, and their parents or guardians, may be required to pay compensation to those affected Read more on Brainly.in - brainly.in/question/1242183#readmore |
|
| 12498. |
Used to play music stored in a computer |
|
Answer» Answer: Explanation: TAPE generally records the AUDIO and usually digital INFORMATION is a FORM in which it is mainly converted. Finally, the storage location is the hard drive of the computer. So, the microphone is the DEVICE which helps in playing the recorded sound. |
|
| 12499. |
Give output:#includeint global = 20;void fun (int &x, inty)X = X-y;y=x* 10;cout |
|
Answer» Answer: 1st output 12 , 8 second output -8 , 20 |
|
| 12500. |
Explain wired network technology |
|
Answer» Explanation: A WIRED network is a common type of wired configuration. ... Larger networks OFTEN involve MULTIPLE routers or switches that connect to each other. One of these devices typically connects to a cable MODEM, T1 line, or other type of Internet CONNECTION that provides Internet access to all devices connected to the network. |
|