This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 16201. |
The sniff mode in bluetooth is used to |
|
Answer» Answer: The Bluetooth SNIFF mode is used to REDUCE the power consumption of the DEVICE as the RECEIVER can be put into standby between sniff cycles. |
|
| 16202. |
How does a mobile charger works ? |
|
Answer» Answer: A MOBILE Battery Charger, is a type of power supply called SWITCHED Mode Power Supply. It provides a Constant Voltage (CV) and a Constant Current (CC) to the Battery, PROVIDING it with the ENERGY required to charge it. Generally, the Voltage is 5V DC, and the Current is 0.5 A or 1 A. |
|
| 16203. |
Which web socket event will occur when the client or user receives data from the server? |
|
Answer» Answer: An event called ‘message’ will occur when the client or user RECEIVES data from the server. Explanation: The web sockets are considered to be the coming GENERATION’s communication technology (bidirectional) utilized by web-based applications that have been operated on a single socket and can be exposed through a JS (javascript) interface in any of the HTML SUPPORTING browsers. Once the CONNECTION has been made with the webserver, data sending and data RECEIVING have occurred. There are several events like open, message, error and close. Here, message event will have occurred when the user received the data from the server using event handler ‘Socket.onmessage’. |
|
| 16204. |
Which of an os are computer programs that work with system resources such as memory and basic data flow? |
| Answer» | |
| 16205. |
Which of the example of command line interface operating system? |
|
Answer» ANSWER:MS-DOS |
|
| 16206. |
Which mode loads minimal set of drivers when starting windows in computer system? |
|
Answer» Answer: Explanation: In Windows, safe mode only ALLOWS essential system programs and SERVICES to start up at boot. Safe mode is intended to help FIX most, if not all problems within an OPERATING system. It is ALSO widely used for removing rogue security software. |
|
| 16207. |
Which data type has more precision double float int long int? |
|
Answer» I don't KNOW................ |
|
| 16208. |
Which data type allow alphanumeric character and secial symbol? |
| Answer» | |
| 16209. |
The basic unit of excel spreadsheet the where we enter data is called the |
|
Answer» ✿━━━━@Mg━━━━✿ ______________________________ ✿━━━━@Mg━━━━✿ The BASIC unit of a WORKSHEET into which you ENTER DATA in excel is called a CELL. |
|
| 16210. |
Which cryptographic algorithm is currently used in bitcoin? |
|
Answer» elliptic curve signature algorithm. or ( ECDSA) is a cryptographic algorithm used by Bitcoin. a few concepts RELATED private key. a SECRET NUMBER known only to the person that GENERATED it .. |
|
| 16211. |
Which attribute tell the server how to submit the form information? |
|
Answer» The METHOD attribute of the FORM element tells the web browser how to SEND form DATA to a server. Specifying a value of GET means the browser will add the form contents to the end of the URL. |
|
| 16212. |
Which allows the user to enter the confidential information in html? |
|
Answer» Answer: ELEMENTS of type password provide a WAY for the user to SECURELY enter a password. The text is obscured so that it cannot be read. minlength="14" REQUIRED> |
|
| 16213. |
Which algorithm is uesd in particular situation in operating system? |
|
Answer» Not UNDERSTANDING PLZ |
|
| 16214. |
Which allow the user to enter the confidential information? |
|
Answer» password BOX allow the USER to enter the CONFIDENTIAL INFORMATION |
|
| 16215. |
Can you please give me the code for function overloading program? |
| Answer» | |
| 16216. |
What is the relationship between operating system and computers hardware? |
|
Answer» An operating system or OS is a SOFTWARE on the hard drive that ENABLES the computer hardware to communicate and operate with the computer software. WITHOUT an operating system, a computer and software programs would be useless. It is LIKE an interpreter between user and hardware... ..I do..my..best...MAY..be ..,it is much..usefully for you...#### |
|
| 16217. |
What is the purpose of test interrupt in microprocessor 8086? |
|
Answer» Answer: Microprocessor - 8086 INTERRUPTS Interrupt is the METHOD of creating a temporary halt during program execution and ALLOWS peripheral devices to access the microprocessor. The microprocessor responds to that interrupt with an ISR (Interrupt SERVICE Routine), which is a short program to instruct the microprocessor on how to HANDLE the interrupt. Explanation: |
|
| 16218. |
What is return type actual argument and formal argument in c++? |
|
Answer» I don't KNOW that answer............ SORRY......... |
|
| 16219. |
What is different between application software and system software by brainlu? |
|
Answer» Chumaa taja chumaa |
|
| 16220. |
How to create a website please give the link for creating a website ? |
| Answer» | |
| 16222. |
What is bespoke software ? what are its advantages and dieadvantages preet ? |
|
Answer» Answer: Bespoke software is custom or tailor-made software. The VALUE of bespoke software over off-the-shelf software is that it can be DESIGNED specifically for key business or legislative OBJECTIVES. |
|
| 16223. |
Most modern TV's draw power even if turned off. The circuit the power is used in does what function?A. SoundB. Remote controlC. Color balanceD. High voltage. |
|
Answer»
OPTION C is CORRECTREMOTE control❤️#sosan |
|
| 16224. |
What does error 404 or not found error while accessing a url mean? |
|
Answer» What does error 404 or not found error while ACCESSING a url MEAN? Explanation: |
|
| 16225. |
What is accessibility or ease of access ? Why is it important in the context of using computers? |
|
Answer» Microsoft Windows 10 PROVIDES a variety of accessibility tools that makes it easier to see, hear, and use your computer. For INSTANCE, the Ease of Access center provides a variety of such as a magnifier as WELL as mouse and keyboard accessibility options. |
|
| 16226. |
What are the five basic operation performed by the computer? |
|
Answer» Answer: Microsoft Windows 10 provides a VARIETY of accessibility tools that makes it easier to SEE, hear, and use your computer. For instance, the EASE of Access center provides a variety of such as a magnifier as well as mouse and keyboard accessibility options. |
|
| 16227. |
What are the factors that determine the storage capacity of hard disk? |
|
Answer» MICROSOFT Windows 10 provides a variety of accessibility tools that makes it easier to see, hear, and use your computer. For instance, the EASE of Access center provides a variety of such as a magnifier as WELL as MOUSE and keyboard accessibility options. |
|
| 16228. |
In which decade was the SPICE simulator introduced?A. 1950sB. 1960sC. 1970sD. 1980s. |
|
Answer»
❤️❤️Option C❤️❤️❤️❤️1970❤️❤️SPICE (SIMULATION Program with Integrated Circuit Emphasis) was introduced in May 1972 by the UNIVERSITY of Berkeley, California.♥️#sosan |
|
| 16229. |
Why is it important to be a computer/technology Literate person? |
|
Answer» Answer: IMPORTANT of Computer TECHNOLOGY literate person because computer is work so easily and FASTLY and so MANY function of computer Technology |
|
| 16230. |
(p+q) /r=(q+r)/p=(p+r) /q=k then find k.(A) 1(B) -1(C) 2(D) Either (B) or (C) |
| Answer» | |
| 16231. |
The user system requirements are the parts of which document |
|
Answer» Answer: User requirements, OFTEN referred to as user needs, describe what the user does with the system, such as what ACTIVITIES that users must be ABLE to perform. User requirements are generally documented in a User Requirements Document (URD) using narrative TEXT. |
|
| 16232. |
A password is the first line of defense how can you use it in a proper way |
|
Answer» Answer: Protecting your computer with a password is a common method of ensuring that only those with permission can access it. However, passwords are effective only as long as you use ones that are easy to remember and difficult to “break,” and that are changed on a REGULAR basis. Did you know that anyone with a little bit of technical know-how can download a program off the Internet and use it to break weak passwords? These programs use “brute force” and “dictionary attacks” to try every possible combination of words and letters to break into your account. The best way to combat this very real threat is to write strong passwords. The following simple rules for writing and using strong passwords will keep your computer more secure, decreasing the chance of compromise. Your Password: Strong or Weak? Strong Passwords: • Are 8 or more characters long • Contain combination of upper and lowercase letters, numbers, and symbols ($ch00LrU135 = school rules) • Are passphrases: CHOOSE a line or two from a SONG or poem and use the first letter of each word. For example, “It is the East, and Juliet is the Sun'' becomes “IstE,@J1tS” • Are changed on a regular basis • Are easy to remember and are not written down • Are not used over and over again for different programs and websites • Are typed quickly, making it harder for someone to steal by eavesdropping Weak Passwords: • Contain your login, your name, your maiden name, your spouse's name, your children's names or your pets’ names in any form as your password • Contain publicly accessible information about yourself, such as SOCIAL security number, license numbers, phone numbers, address, birthdays, etc. • Contain a word found in a dictionary of any language • Are made of all numbers or all the same letter • Are saved in the “Remember Password” function on mail or website browsers • Are written down • Are shared with others |
|
| 16233. |
What is ms window and what us computer |
|
Answer» Explanation: Windows is Microsoft's flagship operating system (OS), the de facto STANDARD for home and business computers. The graphical user interface (GUI)-based OS was introduced in 1985 and has been released in MANY versions SINCE then, as DESCRIBED below. |
|
| 16234. |
. A formula in a cell entry begins withsymbol. |
|
Answer» Explanation: All Excel formulas begin with an equal sign (=). After the equal SYMBOL, you ENTER either a calculation or function. For example, to add up VALUES in CELLS B1 through B5, you can either: Type the ENTIRE equation: =B1+B2+B3+B4+B5 |
|
| 16235. |
How many bytes are in integer????? |
|
Answer» The size of the INT type is 4 BYTES (32 bits). MARK as brainliest! |
|
| 16236. |
Some examps of regular expressions in theory of computation |
|
Answer» User REQUIREMENTS, often referred to as user needs, describe what the user does with the system, such as what ACTIVITIES that users must be able to perform. User requirements are generally documented in a User Requirements DOCUMENT (URD) using narrative TEXT. |
|
| 16237. |
Difference between striated and cardiac muscle with respect to structure and location |
|
Answer» striated muscle: 1. The cell long ,cyclinder, unbraced and multi-nuleate. 2. This muscle present in limpes and JOINTS . CARDIAC muscle:1. The cells are cyclinder , brached and UNI - nuleate 2. This muscle are present in HEART . |
|
| 16238. |
Non verbal cues complement verbal communication justify |
|
Answer» TELLING someone that it's NICE to see them is a form of verbal communication, while a nonverbal form would be giving them a HUG. Nonverbal and verbal communications tend to complement one another. If they don't, they can lead to disappointment, mistrust and confusion.May 23, 2017 |
|
| 16239. |
3 in ms-word the word function that corrects text as you type is referred to as |
|
Answer» Answer: USER requirements, often REFERRED to as user needs, describe what the user does with the system, such as what activities that users must be able to perform. User requirements are GENERALLY documented in a User Requirements Document (URD) USING narrative TEXT. |
|
| 16240. |
In a windows screen the date and time is displayed on the |
|
Answer» Explanation: in the TASKBAR |
|
| 16241. |
Rile of stacks and queues in computer programming equation |
|
Answer» Explanation: An array is a random access data structure, where each ELEMENT can be accessed directly and in constant time. A typical illustration of random access is a book - each page of the book can be open independently of others. Random access is critical to many algorithms, for example binary search. A linked list is a sequential access data structure, where each element can be accesed only in particular order. A typical illustration of sequential access is a roll of paper or tape - all PRIOR material must be unrolled in order to get to data you want. In this note we consider a subcase of sequential data structures, so-calledlimited access data sturctures. Stacks see picture also A stack is a container of objects that are inserted and removed according to the last-in first-out (LIFO) principle. In the pushdown stacks only two operations are allowed: push the item into the stack, and pop the item out of the stack. A stack is a limited access data structure - elements can be added and removed from the stack only at the top. pushadds an item to the top of the stack, pop removes the item from the top. A helpful analogy is to think of a stack of books; you can REMOVE only the top book, also you can add a new book on the top. A stack is a recursive data structure. Here is a structural definition of a Stack: a stack is either empty or it consistes of a top and the rest which is a stack; Queues see picture 2 also A queue is a container of objects (a linear collection) that are inserted and removed according to the first-in first-out (FIFO) principle. An excellent example of a queue is a line of students in the food court of the UC. New additions to a line made to the back of the queue, while removal (or serving) happens in the front. In the queue only two operations are allowed enqueue and dequeue. Enqueue MEANS to insert an item into the back of the queue, dequeue means removing the front item. The picture DEMONSTRATES the FIFO access. The difference between stacks and queues is in removing. In a stack we remove the item the most recently added; in a queue, we remove the item the least recently added.
|
|
| 16242. |
Explain the feature of word processor |
|
Answer» hello dear Word processing ( word processor ) A word processor is software or a DEVICE that allows uses to create , edit and print documents. It enables you to write text , STORE in electronically , display it on a screen , modify it by entering COMMAS and characters from the keyboard and print it . Hope it's helped you.... PLZ MARKS as Brainleist answer or verified answer |
|
| 16243. |
How can you create a strong password |
|
Answer» By INCLUDING LETTERS with NUMERICALS or SYMBOLS |
|
| 16244. |
Present women Muslim minister of India |
|
Answer» Answer: |
|
| 16245. |
How to represent 295 in ascii in a 24 bit register? |
|
Answer» Not UNDERSTANDING PLZ |
|
| 16246. |
Max no of nodes in binary tree with height k, where root height is 0 |
|
Answer» Explanation: Binary search tree whose left and RIGHT subtrees differ in height by at most 1 UNIT is CALLED |
|
| 16247. |
How interduced movavi |
|
Answer» Ans Camtasia is a much more powerful PROGRAM than Movavi Video Editor, and comes with an UNDERSTANDABLY higher PRICE point. If you're looking for a video editing program that OFFERS a more PROFESSIONAL level of control over effects and editing, this is a great option. |
|
| 16248. |
How inteduced movavi |
|
Answer» Answer: it is a different thing altogether when your friend shows you his latest collection of photographs that he has taken that appear as good as those taken by the professional, even though you know that he too is using the same camera that you use. Be prepared for a surprise to HEAR that you too can reproduce such stunning photographs. I am using the TERM “reproduce” because your friend did not “take” excellent snaps. On the contrary, he used Movavi photo editor, ONE of the RARE PROGRAMS that allow you to bring to life your dull and boring snaps. |
|
| 16249. |
When flimora interduced |
|
Answer» FLIMORA introduced in 2003 Explanation: HOPE IT Help. MARK AS BRAINLIST..... |
|
| 16250. |
How many steps are involved in creating a hash function using a multiplication method? |
|
Answer» Answer: STEP 1 switch on the computer step to go on the calculations step 3 click on the the number type step 3 the CPU is process step for go into the CPU is the BRAIN of computer then it refers to the USER |
|