Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

14151.

What are cyber ethics? Mention some ethics you need to follow while on computer​

Answer»

Answer:

EXAMPLES Bullying in social media, plagiarism, breaking into other people's online accounts or computers, are all potential examples of cyber ethics

DEFINITION Cyber ethics is the study of ethics pertaining to computers, COVERING USER behavior and what computers are programmed to do, and how this AFFECTS individuals and society.

EXPLANATION:

Cyber ethics is the study of ethics pertaining to computers, covering user behavior and what computers are programmed to do, and how this affects individuals and society.

14152.

What hot topics of layout shrinking of the city?

Answer»

ANSWER:

Hot TOPICS of layout shrinking of the city is Coronavirus-The Silent Killer or Covid-19.

...Give me Thanks I will definitely follow you...

14153.

C. State 'True' or 'False'.1. Calculations are done on an abacus by sliding beads across the rods.2. Pascaline is known as the first gear-driven calculator.3. Mark 1 was developed for Army Ordnance to compute World War IIballistic firing tables.4. Apple II was the first personal computer with colour monitor.5. Mark 1 was the first electromechanical computer.​

Answer»

Answer:

1. TRUE 2.false 3.true 4.true 5.false

14154.

To design web pages we need to usea) Serverb) HTMLc) XML​

Answer»

ANSWER:

HTML........................

14155.

Is vpn really increases our network speed

Answer»

super VPN....... RUBBISH APP

.

.

.

follow me

14156.

Make a chart and mention the names of input,output and memory devices?​

Answer»

ANSWER:

HOPE it HELP you......

14157.

A. Tick () the correct options.1. Which was the first mechanical calculating device?a. Napier's Bones n b. Pascal Adding Machine N c. Abacus2. In which of the following was the concept of punched cards used?a. Pascaline N b. Napier's Bonesc. Jacquard Loom3. Which of the following was invented by Babbage?a. Loomn b. Analytical Engine N c. Mark 14. Which of the following was the first electronic computer?a. Mark 1D b. UNIVACC. ENIAC5. In which year was the first UNINAC computer delivered to US Census Bureau?a. 1944O b. 1946C. 1951​

Answer»

ANSWER:

A. 1.c.abacus

2.??

3.b.anaylitical.....

4.mark 1(MAYBE)

5.??

EXPLANATION:

HOPE it helps....

14158.

The decision support system is used only for

Answer»

Answer:The DSS can be employed by operations MANAGEMENT and other planning departments in an organization to compile information and data and to synthesize it into actionable intelligence. In FACT, these SYSTEMS are primarily used by MID- to upper-level managementThe DSS can be employed by operations management and other planning departments in an organization to compile information and data and to synthesize it into actionable intelligence. In fact, these systems are primarily used by mid- to upper-level management

Explanation:

14159.

Which tool helps you measure the success of your website?

Answer»

ANSWER:

SUCCESS and HARDWORK ........

14160.

Why is internal memory also called primary memory??​

Answer»

PRIMARY memory is the main memory of the computer system. Accessing data from primary memory is faster because it is an internal memory of the computer. The primary memory is most volatile which means data in primary memory does not EXIST if it is not SAVED when a power failure occurs.

Explanation:

mark as brainliest

14161.

Write about processing DevicerMother Beard and OperatingSystem​

Answer»

teyeuehhehwhehehehejieieeueueeueueueueueusysusuxuxuxuxuxuxuxuxu

14162.

Which of the following is used toseach other website by typing aKeyboard a)Search Engineb)Social Networkc)Browser​

Answer»

ANSWER:

BROWSER is the RIGHT answer

14163.

What do you mean by I-P-O cycle​

Answer»

Answer:

IPO stands for Input, OUTPUT and Process. As the NAME suggests, IPO cycle is the input and output after process of the data. To GET output, u have to FIRST give input and then the input needs to be processed to get your desired RESULT,i.e. Output.

14164.

What is E page and it's effective uses

Answer»

EXPLANATION:

ELECTRONIC WAB PAGE ....

14165.

The increased use of the Internet presents a lot of potential for which types of businesses?

Answer»

ANSWER:

NETWORKING and MARKETING

EXPLANATION:

14166.

1 minus 0 is equal to 1 in Binary substraction​

Answer»

Answer:

In binary subtraction, the only case where borrowing is NECESSARY is when 1 is subtracted from 0. When this occurs, the 0 in the borrowing COLUMN ESSENTIALLY becomes "2" (CHANGING the 0-1 into 2-1 = 1) while reducing the 1 in the column being borrowed from by 1.

14167.

abstraction is the process of understanding the problem and conditions and defining the goal this statement is true or false​

Answer»

This is a false statement.

ACTUALLY, Abstraction is the way of SHOWING only what is IMPORTANT and hiding What is not necessary....

MARK AS THE BRAINLIEST...

14168.

What is password ? a man loked his personal computer with a password and wrote some words in hint box .one day his wife wanted to do Something she uses some hints like:​

Answer»

ANSWER:

PLEASE answer my QUESTIONS and I answer your questions

14169.

Decomposition refer to decompressing a file this statement is true or false​

Answer»

Answer:

FALSE

                                                                                                                                         

hope you are helped

give brainliest if you find out i GAVE you CORRECT answer

14170.

Numerical values that describe a trait of the code such as the Lines of Code come under ________.

Answer»

NANBA..

Absolute metrics are numerical VALUES that describe a trait of the code such as the NUMBER of references to a particular VARIABLE in an application, or the number of LINES of code (LOC). Absolute metrics, such as the number of lines of code, do not involve subjective context but are MATERIAL fact.

14171.

Power point is ns not application of multimedia this is true or false

Answer»

ANSWER:

it's TRUE...

HOPE this will HELP you.....

14172.

Identify these icons of ms excel

Answer»

ANSWER:

which ICONS??? please WRITE FULL question....

14173.

Hexadecimal Number system consists of ____ digits and ____ characters​

Answer»

Answer:

Hexadecimal USES the DECIMAL NUMBERS and six extra SYMBOLS.

14174.

Write a c++ program to print the following pattern. Sample Input:3Sample Output:3 44 555 6666 6666 555 44 3

Answer»

ANSWER:

SAMPLE Output:

3

44

555

6666

6666

555

44

3

14175.

In Binary Addition, 1+0=​

Answer»

ANSWER:

The answer is 1

Explanation:

As the rules

1+1=0 with CARRY 1

1+0=1

0+1=1

0+0=0

14176.

Basic diffrence between input and output devices?thoroughly ​

Answer»

Answer:

The device by which we give COMMAND to the computer.Some of them are KEYBOARD, mouse etc.

Output device are the device that give the answer N return. EXAMPLE monitor

14177.

experimenting referred to gain the courage to experiment and loss the fear of failure this statement is true or false​

Answer»

ANSWER:

TRUE because it is RIGHT

14178.

Which number system consists of 10 digits​

Answer»

ANSWER:

EXPLANATION:

decimal system

Our normal NUMBER system (the decimal system), consists of 10 digits (0, 1, 2, 3, 4, 5, 6, 7, 8, 9).

14179.

1. The process of developing the list of steps that we can follow to finish the task is called2. Ais a type of diagram that represents an algorithm and its workflow.3. Abstraction isout details of the problem to focus on the relevant ones.4_________thinking is a thought process that teaches us how to solve complex real worldproblems effectively.5. An algorithm employs_to develop astrategy to solve anyproblem.6. Observingin data is known as patter recognition.​

Answer»

Explanation:

The answers to given QUESTIONS are;

1. Project planning is the process of developing the list of steps that we can follow to finish the task

2. Process flow diagram or sequential functional diagram is a TYPE of diagram that represents an algorithm and its workflow.

3. Abstraction is neglecting out details of the problem to focus on the relevant ones.

4. Critical thinking is a thought process that teaches us how to solve complex real world

problems effectively.

5. An algorithm employs programming to develop a strategy to solve any

problem

6.  OBSERVING regularities in data is known as patter recognition.​

14180.

FROMNAME:MOBILE NO.:ADDRESS:E-MAIL ID:AADHAAR NO.:GENDER:MALEFEMALECAST:GENERALOBCSC/STREMEMBERCOMPLETE[CLICK HERE]

Answer»

ANSWER:

what is MAN .I don't UNDERSTAND

14181.

......is the process of recovering data​

Answer»

ANSWER:

data recovery

Explanation:

hopes that it will HELP you

plz MARK this answer as brainliest if you like the answer like it and FOLLOW me

14182.

Is hardware more impotant or software?why?​

Answer»

ANSWER:

hardware and software both are EQUALLY important as they cannot work if ONE is absent is there INTERDEPENDENT

14183.

What is the importance of real-time operating system(RTOS)??​

Answer»

ANSWER:

Here are important reasons for using RTOS: It offers priority-based scheduling, which allows you to separate analytical processing from non-critical processing. The Real time OS provides API functions that allow cleaner and smaller application code.

HOPE this HELPS U dear!!

Mark as brainliest ✨

#followme ❤️ ❤️

14184.

4cm 1 mm+15cm 2mm+26cm 3mm do these sums​

Answer»

Answer:

cm+cm

mm+mm

so THEREFORE,(4+15+26)cm

(1+2+3)mm

answer is 45CM 6 mm

hope it HELPS

14185.

Whatshould be noticetoaccessgood websites​

Answer»

ANSWER:

U should OPEN all websites

Explanation:

...

14186.

Discuss any 2 ways to connect to internet using wired broadband​

Answer»

Explanation:

1.Remove the network or USB CABLE that is connecting the computer to the MODEM.

2.turn off the modem for 3 minutes (this is necessary to make the modem fine router).

3.connect the modem to the router's internet or WAN port using the network cable supplied with the modem.

14187.

Briefly Explain the following terms: (i) Tuple (ii) Relation (iii) Degree (iv) Foreign Key

Answer»

Answer:

Tuple: In DBMS, horizontal subset/ information in a table is called tuple. The tuple is also known as a ' record ', which gives particular information of the relation

Relation:relation is a two-dimensional table i.e the information is arranged in ROWS and columns. It is called a relation because the data values in the table are not homogenous i.e not if the same type or we can say that, the values in a row are not homogenous.

Degree:DEGREE describes the level, intensity or seriousness of something. You could say there are many degrees

Foregin key:FOREIGN key is a column or group of columns in a relational database table that provides a link between data in two TABLES. It acts as a cross-reference between tables because it references the primary key of another table, thereby ESTABLISHING a link between them.

14188.

What generation is usedVacuum tube vulue

Answer» SECOND GENERATION is USED
14189.

Write down the code to create a node in linked list

Answer»

ANSWER:

I HOPE it is CORRECT answer

14190.

You can use the ___ key combination to create a page break at the pointed location

Answer»

ANSWER:

Ctrl+Enter

Explanation:

14191.

Fill up the answer plzzz​

Answer»

AnsWer:-

Assembler, Interpreter and Compiler are Language Processors.

\rule{200}{1}

\orange{\boxed{\blue{\underline{\green{\mathrm{Language \ Processors:-}}}}}}

They are SOFTWARES, used to convert Program or High level computer LANGUAGES, into LOW level Computer langauges, (machine UNDERSTANDABLE).

There are 3Types of Language Processors:-

๛Assembler

Interpreter

Compiler

\rule{200}{1}

Assembler:-

→It converts programs, written in Assembly language into Machine Language, (i.e Binary Language)

\rule{200}{1}

Interpreter:-

→Converts high level programs, into Machine Language, by converting and executing line by line programs, If any error occurs in any of the lines, it then reports and doesnt continue/execute until the error is corrected or rectified.

\rule{200}{1}

Compiler:-

→It converts High level Programs into Machine Language,by converting and Executing the Whole program in one go,and if errors occur it then reports errors of the program,by PROVIDING the error along the Line number.

\rule{200}{3}

14192.

Protocol layering can be found in many aspects of our lives such as air travel-ling. Imagine you make a round-trip to spend some time on vacation at aresort. You need to go through some processes at your city airport before fly-ing. You also need to go through some processes when you arrive at the resortairport. Show the protocol layering for the round trip using some layers suchas baggage checking/claiming, boarding/unboarding, takeoff/landing.​

Answer»

ANSWER:

SRRY

Explanation:

srry i DONT KNOW

14193.

The network that has a scope lying between CAN AND WAN IS

Answer»

ANSWER:

MAN=Metropolitan AREA Network

Explanation:

14194.

Which of the following loop is called pre-tested loopa) while loopb)do-while loop. c)for loopd)until loop ​

Answer»

Answer:

for loop

Explanation:for loop is a pre TESTED loop because it CHECKS for the condition to ne SATISFIED before RUNNING the STATEMENT

14195.

Explain the feature of a web serverbtw pls follow me and I will be your follower​

Answer»

Answer:

WEB server is server side or remotely working COMPUTER there is lot of server of is there linux WINDOWS server and JAVA server more

14196.

MCQTape storage is primarly used for :1. Backups2. Installing new programs 3. Rarely used software4. None of these​

Answer»

ANSWER:

BACKUP is CORRECT answer

14197.

Given1 import java.util.*;2. public class PQ {public static void main(String[args) {PriorityQueuepq = new Priority Queue():5. pq.add("carrot")6. pq.add("apple");7. pq.add("banana"):8. System.out.println(pq.poll() + "." + pq.peek());9.}10.}What is the result?Select onea. apple appleb. carrot:appleActivac. apple bananad. banana apple​

Answer»

ANSWER:

a. APPLE apple

Explanation:

14198.

Please answer this Adobe CS5 question please!!!​

Answer»

ANSWER:

C

Explanation:

14199.

Write the menu and submenu for the following:a) Inserting a new slideb) Apply new designs to slidec) Changing the Background color of a slide d) Changing the text and font style.e) Inserting a page number f) Creating a copy of a slide.​

Answer»

ANSWER:

KYA aap muddon ki hai ki EKTA aur udaharan SE yah ek baar baar baar dekh rahe the ki ek baar baar dekh

14200.

An API used in creating a Key-Value Pair in Key-Value datastore is __________.

Answer»

An API used in creating a Key-Value Pair in Key-Value DATASTORE is put(key, value).

Explanation:

  • The Key-value database is a type of NoSQL database that works with the key-value method.
  • This key-value method stores the data in the FORM of collections, where the values are assigned to the respective KEYS, and the keys act as the unique identifiers.
  • Though key-value databases are structurally different from relational databases, they work for storing, accessing, retrieving, and managing the collections called dictionaries.
  • The dictionary data structures in terms of the key-value database are popularly called as 'Hash tables'.

Learn more:

  • What is a linked list in the data structure?

       brainly.in/question/6964440

  • Edges violating the max-heap property.

       brainly.in/question/16247860