Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

14201.

Explain any 4 features of WWW if u follow me I will mark u as brainliest ​

Answer»

Explanation:

WWW MEANS WORLD Wide Web.

Few features are:

  • WWW supports TCP/IP SERVICES, such as Gopher, FTP in addition to HTTP.
  • WWW is a SEARCH TOOLS. It helps you find and retrieve information.
  • WWW can handle different text formats and different methods of organizing information.
  • you can keep in touch with friends and relatives.
14202.

The catering staff in the SECE mess are known for their good cooking skills as well as hospitality. We all know that the dining table arrangement needs to be different for left handed and right handed persons. So whenever any VIP guest visits SECE, they would make the table arrangements based on whether he/she is left handed or right handed. The mess is situated on the 15th floor of the hostel building. SECE hostel building has superfast elevators to help travel from one floor to another. Each elevator has 2 doors, the front one and the rear one. If a person enters the elevator through the front door, he goes out through the rear door and vice-versa. The elevator has 2 rails numbered as 1 and 2. Rail 1 is located to the left of the entrance of the front door (or correspondingly, to the right of the entrance of the rear door). Rail 2 is located opposite it, to the right of the entrance of the front door and to the left of the entrance of the rear door. We know that each person holds on the rail with his/her strongest hand. There is an IP camera in the elevator and based on the camera output, the catering staff will be easily able to identify whether a guest is left handed or right handed. They have decided to automate this task and they asked the help of Image Processing Group. The Image Processing Group has written a program to perform this task and the program will output the door through which the person entered and the rail number which the person held. Based on this input, write a program to determine whether a person is left handed or right handed.

Answer»

\huge\bold\red{HOLA!!}

It might just as WELL have been California. ... They were engaged upon dramatic business in a dramatic setting. ... crags which looked (the SIMILE is Willa CATHER's) like abandoned cathedrals from which the Gods had FLED

14203.

Difference between list and display all command

Answer»

Answer:

DISPLAY: DISPLAY command is other variant of LIST command that is worked something same as LIST command. Simple DISPLAY command SHOW the current record only where pointer is pointed. Pointer is controlled with GOTO command.

LIST:  LIST provides facility to show all the records AVAILABLE in DATABASE FILE continuously. We also use LIST command to show the SPECIFIC record only according to given condition and with specified field only

14204.

Name two common icon present on desktop and write it's function

Answer»

ANSWER:

RECYCLE Bin

Explanation:

Recycle Bin-it stores deleted files and allows US to RECOVER this files when we need it

14205.

What should be the name of the python file that defines the module foo?​

Answer»

Answer:

PYTHON 3.8.2 should be the NAME that defines the MODULE foo

Explanation:

please please

MARK me as brainliest

14206.

Q7. Explain web browser and give examples of it. -Q8. What is the shortcut key for Refresh?Q9. What is IP ADDRESS?​

Answer»

ANSWER:

Q.8 F5

Explanation:

14207.

What are threats to a computer?​

Answer»

Explanation:

A threat is any activity that can lead to data loss/corruption through to DISRUPTION of normal business operations. Physical threats cause damage to computer systems hardware and INFRASTRUCTURE. Examples include theft, vandalism through to natural DISASTERS.

14208.

Help meWhere is a range block used

Answer»

RANGE blocks should be employed when a large AMOUNT of Vandalism has been coming from a specific range Of IP addresses, which USUALLY signifies that a single vandal has access to multiple IPS, such as is the CASE with a college network, a DYNAMICALLY addressed ISP, or an IPv6 network.

14209.

Which layer of TCP IP Protocol Suite are involved in a link layer switch?​

Answer»

Answer:

Which layers of the TCP/IP PROTOCOL suite are involved in a LINK-layer switch? A link-layer switch in a link is involved only in two layers, data-link and physical.

Explanation:

PLS mark MINE as brainliest

14210.

What do you mean by storage device ?​

Answer»

ANSWER:

the device which are USED to STORE data in the particular device is CALLED as STORAGE device s

14211.

What precaution are required to ensure that ict use in safe

Answer»

ANSWER:

What's that...

EXPLANATION:

14212.

In XSS, the attacker has the potential for stealing information such as your Bank balance and other private details from the web page

Answer»

Explanation:

XSS is called Cross SITE Scripting. It is basically a MALICIOUS attack on web browsers that gathers INFORMATION related to user cookies ETC. It is a very popular attack in web browsers and it is dangerous as it can fetch your information.

So if a person has opened his bank account and there are details stored in the cookies, then using XSS the hacker can steal the bank account information

14213.

Two main features of machine

Answer»

ANSWER:

MOTHER bourd

Explanation:

14214.

How are computers used at home?

Answer»

ANSWER:

BUY a COMPUTER and USE it

Explanation:

14215.

Where we use our email idis​

Answer»

ANSWER:

i HOPE it is USEFUL to you

14216.

Plz slove these question.........​

Answer»

Answer:

3.All of the above.

13.Hard disk.

14.heart

15.A place to STORE data

17. hard DRIVE, DVD-ROM,FLASH drive

19.Random ACCESS MEMORY

14217.

Q5. Define www.Q6. What is hyperlink.Ans​

Answer»

Answer:

heya!

www means worldwide web

hyperlink means In computing, a hyperlink, or simply a LINK, is a REFERENCE to DATA that the user can follow by clicking or tapping. A hyperlink points to a whole document or to a specific element within a document. Hypertext is TEXT with hyperlinks. The text that is linked from is called anchor text.

pls mark it as brainlist answer

14218.

Plz slove the qustion.........​

Answer»

Answer:

1 byte

2. ROM

4. d(none of the above)

5. OPTICAL Character Reader

6. Printer

7.d

9.C

Explanation:

14219.

Define fishing. How can fishing be a challange for a user who approches for e-commerce activity? In computer

Answer»

FISHING is the activity of trying to catch fish. Fish are normally caught in the wild. TECHNIQUES for catching fish INCLUDE hand gathering, SPEARING, netting, angling and trapping. “Fishing” may include catching aquatic animals other than fish, such as molluscs, cephalopods, crustaceans, and echinoderms.

14220.

Q4. What are the main components of a web page?​

Answer»

ANSWER:FRONT END Elements.

The NAVIGATION structure.

The PAGE layout.

Logo.

Images.

Contents.

Graphic Design.

Back End elements.

Explanation:

14221.

What is cyber security​

Answer»

CYBERSECURITY or information technology security is the protection of COMPUTER systems and networks from the THEFT of or damage to their hardware, software, or ELECTRONIC data, as well as from the disruption or misdirection of the SERVICES they provide.

14222.

subject-computer chapter-1communication skills choose the correct answera)A receiver is also as __________.1)sender 2)encoder 3)receiver 4)decoder. b)I am happiest woman in the world the happiest is a ___________1) adverb 2) adjective 3) verb 4)noun c) Body language and eye contact are the example of__________communication.d) your friend shows some printouts in the form of text regarding science subject what type of.1) written 2) verbal 3) visual 4)non verbal e) which of the greatest means of conveying information ? 1) writing 2) words 3) sign 4) pictures. class 9​

Answer»

Answer:

1....

2.verb

3.non VERBAL

14223.

Answer this please fast as possible...i will mark as brainlies.t.........​

Answer»

Answer:

Explanation:

1. check whether the SPECIFIED char value is a white space

2. converts into lower case

3. converts into upper  case

4. determine the length of the string

5.RETURNS the CHARACTER from the specified index

6. returns the position of the last occurrence of specified character(s) in a string.

7. it returns a new string that is a SUBSTRING of this string

8. check whether the given input is letter or digit

14224.

Diffrentiate b/w LAN and WAN​

Answer»

Answer:

A LAN (local AREA network) is a group of COMPUTERS and network devices connected together, usually within the same building. ... A WAN connects several LANs, and may be LIMITED to an enterprise (a corporation or an organization) or ACCESSIBLE to the public. The technology is high SPEED and relatively expensive.

14225.

We all know that internet is extremely useful tool today,yet we aee cautioned against its misuse. Can you explain giving any 3 reasons in support of this statement?do explain in detail..bit not too longthe best answer will be given the brainliest award​

Answer»

Yes internet is very USEFUL for us but still it have some bad effects:

1.Internet spoil the relations AMONG people.

2.Sometimes students reach to some WEBSITES which harm their moral character.

3.Internet make a PERSON lazy.

14226.

Name 2 websites for the following.1. Searching information websites2. Elearning websites3. Online shopping websites4. Newspaper websites5. Online games​

Answer»

Answer:

1. GOOGLE ,  Yahoo

2. KHAN Academy , EdX

3. AMAZON , Myntra

4. Times Of INDIA , Deccan Herald

5. Miniclip , Friv

14227.

What is Resource Sharing? How does computer networking help in resource sharing?

Answer»

Answer:

the device like PRINTER , modem , hard disk can be EQUALLY shared by all the USERS CONNECTED with the network is called resource SHARING

14228.

What are input, output, storage device with example each

Answer»

Explanation:

in put DEVICE: which are used to give INFORMATION to the computer

example: camera , mouse, keyboard......

output device: which the data is GIVEN by the computers

example: speakers, printer , monitor, fan...

storage device: devices which we used store the data is called storage device

example: compact disk , and floppy disk

I think it MAY help for

.

.

.

.

.

.

pls MARK me as a brilliant and follow me as a brilliant and

14229.

Write down the steps to start the MS word

Answer»

ANSWER:

CLICK on 'start' button - click on 'all programs' - click on 'Microsoft OFFICE' folder - click on 'Microsoft Word' (MS word)

Explanation:

Click on 'start' button - click on 'all programs' - click on 'Microsoft office' folder - click on 'Microsoft Word' (Ms word)

14230.

Hard disk is coated in both side using

Answer»

Answer:

Magnetic metallic oxide.

Explanation:

In DISK manufacturing, a thin coating is deposited on both sides of the SUBSTRATE, mostly by a vacuum deposition process CALLED magnetron sputtering. And it is coated with Magnetic metallic oxide.

14231.

Bus topology is way to connect computer?​

Answer»

Answer:

bus topology is a network SETUP in which each computer and network DEVICE are CONNECTED to a single cable or backbone. depending on the type of network CARD used in each computer of the bus topology, a coaxial cable or a RJ-45 network cable is used to connect computers TOGETHER

14232.

Coaxial is a transmission media?​

Answer»

Yes.It is the WIRE USED in carrying signals from our dishes to set up box.It han a COPPER wire inside and three layers of FOLLOWING materials,,

1copper

2wire mesh

3insulating material like plastic

14233.

Fibre optics transmit data in the form of light ?​

Answer»

ANSWER:

heya!

Fiber optics transmit data in the form of light PARTICLES -- or photons -- that pulse through a fiber optic cable. ... When light SIGNALS are sent through the fiber optic cable, they reflect off the core and cladding in a series of zig-zag bounces, adhering to a process called total internal reflection

pls MARK it as BRAINLIST answer

14234.

Plese help in informative technology​

Answer»

Answer:

An electronic COLOR code is used to indicate the values or ratings of electronic components, usually for RESISTORS, but also for capacitors, INDUCTORS, diodes and others. A separate code, the 25-pair color code, is used to identify WIRES in some

............... SORRY

............

14235.

We all know that internet is extremely useful tool today,yet we aee cautioned against its misuse. Can you explain giving any 3 reasons in support of this statement?do explain in detail..bit not too longthe best answer will be given thr brainliest award..... but do mention name age and phone number​

Answer»

Explanation:

  1. involved throughout the day in it
  2. using for bad things LIKE watching sex videos
  3. chatting with unknown people
  4. keeping NUDE photos on internet
  • mainly it depends upon our character

14236.

02. What are the uses of internet? List any 3.​

Answer»

ANSWER:

The Internet carries MANY applications and services, most prominently the World Wide Web, including social MEDIA, electronic mail, mobile applications, multiplayer online GAMES, Internet telephony, file sharing, and STREAMING media services.

14237.

Fill in the blanks1) _ is the basic storage unit.of computer2 RAM is a _ memory.3) 1 Terabyte -4) _.is the smallest unit of computer. 5)RAM is _ 6). _ and _. are two types of memory7) 1 byte. 8) _ and _ are secondary memory9) A computer memory in. _and. _10) _ and. _ are two types of primary memory ​

Answer»

Answer:

1 ROM

2.temporary

3.1024 kilobytes

4.binary

5.random ACCESS memory

6.primary and secondary

7.8bit

8.flash DRIVE and BLUE RAY disc

9.

10.ram and rom

14238.

What are compiler, interpreter andAssembler​

Answer»

Answer:

Assembler is a program that converts assembly level language (LOW level language) into machine level language.

COMPILER compiles entire C source CODE into machine code.

WHEREAS, interpreters converts source code into intermediate code and then this intermediate code is executed line by line.

hope it helps ....

14239.

What is a set of objects that has common attributes and common behaviour

Answer»

ANSWER:

CLASS

Explanation:

class is a set of objects that has COMMON ATTRIBUTES and common BEHAVIOUR

14240.

Step involves in opening microsoft excel

Answer»

ANSWER:

START button

All programs

Microsoft OFFICE

Microsoft EXCEL

14241.

Computer network is a system in which computer are​

Answer»

Explanation:

A computer network is a system in which MULTIPLE computers are CONNECTED to each other to SHARE INFORMATION and resources.

14242.

Q1. What is internet?Ans:​

Answer»

ANSWER:

INTERNET is a global computer network providing a VARIETY of INFORMATION and communication facilities,consisting of interconnected networks using standardized communication protocols....

14243.

Give one word answer the second generation computers used..............​

Answer»

ANSWER:

INTEL core I3 for second GENERATION

14244.

A GSM technique timing advance used by BTS or base station can______cell radius?Select one:a. decreaseb. both decrease and increasec. noned. increase​

Answer»

ANSWER:

DECREASE is CLEAR other than all

14245.

Give one word answer the first generation of Computer started in ...............​

Answer»

Answer:

The FIRST GENERATION of COMPUTERS started in 1946....

14246.

What is the number of cells a cluster contains?Select one:a. allb.7c.4d. 12 or 21​

Answer»

ANSWER:

It's NONE of the above.

14247.

List of e-government services provided by other countries

Answer»

Explanation:

The four types of e-government SERVICES are Government-to-Citizen (G2C), Government-to-Business (G2B), Government-to-Employee (G2E), and Government-to-Government (G2G)

hope it WORKS out

mark as BRAIN list....

14248.

Write ajava expression for u++1/2a+

Answer»

ANSWER:

sedrftyguhkijokhjsa

Explanation:

sdrtfvygbuhnijmo

14249.

Name two presentation software

Answer»

Answer:

1. MICROSOFT PowerPoint

2.Apple KEYNOTE

14250.

Writedown the steps to changepage ?​

Answer»

ANSWER:

hsfbsfbqdhngbHsgngbgbfg