This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 16551. |
Consider the following operation defined on a language A,Suffix(A)={v∣uv∈A for some string u∈Σ∗ }.Prefix$(A)={u∣uv∈A for some string v∈Σ∗ }.Substring$(A)={x∣uxv∈A for some string u,v∈Σ∗ }.If A is a CFL then which of the above are also CFLs? |
| Answer» | |
| 16552. |
Is it possible to replace a name on numberwith some other name on number? How? |
|
Answer» Answer: |
|
| 16553. |
Explain varios types of memory devices |
|
Answer» HARD disk cd dvd blue RAY disk pen DRIVE etc... |
|
| 16554. |
What is different between house mouse and computer mouse? |
|
Answer» Answer: There are a few key differences between a house mouse and a field mouse. House mice are light brown or gray, and their coats are a solid color. On the other hand, deer mice have brown or tan fur with WHITE bellies, LEGS, and feet. Deer mouse tails are ALSO dark on top and light underneath, while house mice have almost hairless tails. Another difference between house mice and field mice is the way they store their food. A deer mouse will hoard stolen crumbs and seeds near its nest, but this behavior is LESS common for a house mouse. Other than appearance and food storage, signs of a house mouse or field mouse INFESTATION, like droppings and nests, are similar. make as brainliest |
|
| 16555. |
What is the importance of having PECs? |
|
Answer» Answer: Strong PECS CONTRIBUTE to your overall upper body strength. They improve your ability to push things -- whether that's a heavy barbell, a couch or a stalled car. Pecs, ALONG with your shoulders, are ALSO intrinsic in throwing and swinging actions. If it is helpful for you then mark my answer as BRAINLIEST. ❤️ ❤️ ❤️ ❤️ ❤️ ❤️ ❤️ ❤️ ❤️ ❤️ ❤️ |
|
| 16556. |
What is computer in detail |
|
Answer» Answer: A computer is a machine or device that performs processes, calculations and operations based on instructions PROVIDED by a software or HARDWARE program. It is DESIGNED to execute applications and provides a VARIETY of SOLUTIONS by combining integrated hardware and software components. |
|
| 16557. |
C. Fill in the blanks :1.____displays the document's name.2. To open a document, we click on____button।3. Tabs contains two tabs, namely ____and____4__is meant for typing text.5. To open WordPad, first of all click on______button. |
|
Answer» Answer: 1.please 2.the 3.with,them 4.writing 5.window |
|
| 16558. |
Search of values 8,4,15,10&3 |
|
Answer» Explanation: |
|
| 16559. |
Write a program to print your name ID and class by creating an object. |
|
Answer» Answer: class first { PUBLIC STATIC void MAIN(STRING args) { INT a; Scanner sc=new Scanner(System.in); a=sc.nextInt(); System.out.println("enter the name id"); } } |
|
| 16562. |
In electronic circuits, resistances are used to control the .........i) voltage ii) current iii) inductance iv) None of these. |
|
Answer» option no. 2 current Explanation: |
|
| 16563. |
Write an algorithm and also draw the flowchart-1) to add two distances2) to find difference between two distances3) to find the difference between heights of two students |
|
Answer» SORRRRRRRRRRRRRRRRRRRRRRYYYYYYYYYYYY |
|
| 16564. |
Best youtube channel for learning physics for class ninth? |
Answer» PRAGYA project KANKER......may be BEST |
|
| 16565. |
What is the fullform of mms |
|
Answer» Multimedia Messaging Service. Hope it HELPS you. If you LIKE then PLEASE MARK as BRAINLIAST. |
|
| 16566. |
4. Answer the following in one word.a. Left, Right, Center, Justify are the types ofb. Which option gives a line under the selected textc. With the help of which group can we make all the changesrelated to the Fontd. What makes text disappear from its original place |
|
Answer» a.allignments b.underline(ctrl+U |
|
| 16567. |
What are the CASE tools in Agile Model? |
|
Answer» start here: an introduction to AGILE modeling.agile MODEL DRIVEN development (AMOD).agile modeling core pracitces |
|
| 16568. |
What is the difference between refactoring and reengineering in software engineering? |
|
Answer» Answer: Explanation: REFACTORING is usually a relatively small act on an application. It still works the same, uses the same data, carries out the same functions, and interacts with the user the same way. There may be a few new options AVAILABLE - but usually it STAYS the same. This is one of the ways a bug may be removed. Re-engineering may CHANGE the way an applications works, how it interacts with users, the system, data, or all of the above... It usually a drastic action, and you get a new application afterwards. This is the only way a design failure may be FIXED. |
|
| 16569. |
What are online predators? |
|
Answer» Online predators are individuals who COMMIT CHILD sexual ABUSE that begins or takes place on the Internet. |
|
| 16570. |
int a=1. int b=2, if (a==b) System.out.println. ("Both value are equal") ; else System.out.println (" Values are not equal") What will be the output of the above code? a) both values are equal. b) both values are not equal. |
| Answer» | |
| 16571. |
Please suggest me a q basic program Please dont give incorrect Answer |
|
Answer» Write a PROGRAM to FIND the AREA of rectangle. Cls Input " ENTER the length " ;l Input " enter the breadth " ;b let A = l*b Print" the area of rectangle=" ;a End |
|
| 16572. |
Its appears after windows gets loaded |
|
Answer» Hey mate.... I THINK so desktop...... Hope this HELPS you.... |
|
| 16574. |
· Number of Bytes required to store theword MEASURING. |
|
Answer» Answer: 128 to 127. mark it as BRAINIEST |
|
| 16576. |
What is an entiy relationship |
|
Answer» An entity–relationship MODEL describes interrelated things of INTEREST in a SPECIFIC DOMAIN of knowledge. A BASIC ER model is composed of entity types and specifies relationships that can exist between entities. |
|
| 16577. |
Prevention is better than cure".Justify the statement and mention the preventive measure of your computer from viruses. |
|
Answer» Answer: we heard about PREVENTION is the is better than cure since our childhood brasil of it wise to prevent tooth decay washing of hands before eating to prevent stop stomach upset do not it covered road ROADS roadside food items get rachel against polio get rid of contaminated water to free from disability get rid of get rid of steady water to prevent malaria like that follow like that follow the life skills to about dangerous adds it is better than care that a problem does not HAPPEN then you have to solve the problem afterwards it's easiest to shop stop something bad from HAPPENING in the first place than to fix the damages after it has happend Explanation: 2.To prevent virus computer follow these steps: 1.Every PC should protected by a antivirus program . 2.scan the pendrive when you are copying or pasting programes |
|
| 16578. |
RIDDLE: His name has 8 letters but 5 alphabets. What's his name ? |
| Answer» | |
| 16579. |
Who coined the word c++ |
|
Answer» Bjarne Stroustrup The C++ PROGRAMMING LANGUAGE was developed by Bjarne Stroustrup at Bell LABS in the 1980s, and was ORIGINALLY named "C with classes". |
|
| 16580. |
Context switching is not required for a system without multiprogrammed OS |
|
Answer» Context SWITCHING is required for a system with multi-programmed OS. Explanation:A "context switch" is the method of storing the condition of a PROCESS or a thread, for the purpose of restoring back and execution continued from the same point down the line. A context switch is a process that a computer system CPU adopts to shift from one TASK to ANOTHER while ensuring that the tasks do not conflict. This allows various PROCESSES to make use of a single CPU and is a fundamental aspect of a multitasking operating system. |
|
| 16581. |
Processing of data is done inside the |
|
Answer» PROCESSOR... MARK me as BRAINLIEST |
|
| 16582. |
Arrange in order of occurance a) Obtain the IRQ number from the interrupt controller b) I/O APIC transfer interrupt to Local APIC. c) Save the program states d) Local APIC assert the CPU interrupt |
|
Answer» Answer: According to the QUESTION, the correct sequence of OCCURRENCE is as follows:- d) Local APIC asserts the CPU interrupt controller, then comes the OPTION, a) Obtain the IRQ number from the interrupt controller, then comes the option b) I/O APIC transfer interrupt to Local APIC, next option is c) Save the program states. Explanation: All the steps above are arranged in the sequence of their occurrence and this process is EXECUTED in while changing job allocation to the CPU. |
|
| 16583. |
Algorithm to find the given number is armstrong or not in python |
|
Answer» Generally, a NUMBER is said to be an ARMSTRONG number if an N -digit number equal to the sum of the nth powers of its DIGITS. For Example, 153 is an Armstrong number as its sum of cubes of each digit 13 + 53 + 33 = 153 WHEREAS 456 is not as its sum of cubes of each digit is not 456. |
|
| 16584. |
50 points fill in the blanksAFill in the blanks :(1).......invented the Slide Rule.(2) with.......generation computers, users could interacethrough keyboards and monitors instead of punched cards andprintouts.(3) The resolution of a picture is measured in units of ......(4) The Windows operating system includes the software......for playing back audio and video(5) 1 kilobyte of memory space can store.......bits.6) In the ASCII code, the decimal values of the lower case letters of the English alphabet range from.......to....... |
| Answer» | |
| 16585. |
Which of the following is the biggest threat to the computer by bringing the virus in thesystem?(a) Floppy(b) Internet(c) Firewall(d) None of these |
|
Answer» A computer virus is a type of malware that, when executed, replicates itself by modifying other computer programs and inserting its own code.[1] When this replication succeeds, the affected areas are then said to be "infected" with a computer virus.[2][3] Virus writers use social engineering deceptions and exploit detailed knowledge of security vulnerabilities to initially infect systems and to spread the virus. The vast majority of viruses target systems running Microsoft Windows,[4][5][6] employing a variety of mechanisms to infect new hosts,[7] and often using complex anti-detection/stealth strategies to evade ANTIVIRUS software.[8][9][10][11] Motives for creating viruses can include seeking profit (e.g., with RANSOMWARE), desire to send a political message, personal amusement, to demonstrate that a vulnerability exists in software, for sabotage and denial of service, or simply because they wish to explore cybersecurity issues, artificial life and evolutionary algorithms.[12] Computer viruses currently cause billions of dollars' worth of economic damage each year,[13] due to causing system failure, wasting computer resources, corrupting data, increasing maintenance costs, stealing personal information etc. In response, free, open-source antivirus tools have been DEVELOPED, and an industry of antivirus software has cropped up, selling or freely distributing virus protection to users of various operating systems.[14] As of 2005, even though no currently existing antivirus software was able to uncover all computer viruses (especially new ones), computer security researchers are actively searching for new ways to enable antivirus solutions to more effectively detect emerging viruses, before they have already become widely distributed.[15] The term "virus" is also misused by extension to refer to other types of malware. "Malware" encompasses computer viruses along with many other forms of malicious software, such as computer "worms", ransomware, spyware, adware, trojan horses, keyloggers, rootkits, bootkits, malicious Browser Helper Object (BHOs), and other malicious software. The majority of active malware threats are actually trojan horse programs or computer worms rather than computer viruses. The term computer virus, coined by Fred Cohen in 1985, is a misnomer.[16] Viruses often perform some type of harmful activity on infected host computers, such as acquisition of hard disk space or central processing unit (CPU) time, accessing private information (e.g., credit card numbers), corrupting data, displaying political or humorous messages on the user's screen, spamming their e-mail CONTACTS, logging their keystrokes, or even rendering the computer useless. However, not all viruses carry a destructive "payload" and attempt to hide themselves—the defining characteristic of viruses is that they are self-replicating computer programs which modify other software without user consent. |
|
| 16586. |
Riddle:Gaze at this sentence for just about sixty seconds and then explain what makes it quite different from the average sentence. Quick!What is it? |
|
Answer» i GUESS there are all the letters in the English ALPHABET Explanation: THIS makes it DIFFERENT from the rest of the sentences |
|
| 16587. |
Riddle:I come in a cone but I am not food;I will be skewed if you screw with my hue;I come by the millions but you can probably only name a few.What am I? |
|
Answer» Colours Hope it HELPS you Mark it as BRAINLIEST |
|
| 16588. |
The full form of supi upes alt rtf pang jpg gif alu |
|
Answer» Answer: it's full form is
hope it will help you make me as brainlist |
|
| 16589. |
Riddle:Which of the following words don't belong in the group and why? CORSET, COSTER, SECTOR, ESCORT, COURTSno idiots allowed |
|
Answer» ELLO Mate☺ ❤Gummie❤ . . ❣️Here is Your Answer❣️ I'm not idiot☹️ . . COURTS. All of the OTHERS are ANAGRAMS of each other. Hope This will HELP Uh✌ . . #_Brōkēn_Hēart☹️ |
|
| 16590. |
Riddle:I am the opposite of eat, I am savory and sweet. I am a treat, yet still a drink. What am I?no idiots alowed |
|
Answer» HEY MATE_______ The answer is TEA. |
|
| 16591. |
Riddle:I can deliver but cannot walk, I can say things but have no mouth, I am small but can contain big things. What am I? |
| Answer» | |
| 16592. |
Web Browser is a web _.fill in the blanks |
|
Answer» Answer: The answer is page VIEWER... WEB browser is a web page viewer. A web browser is a s/w program that allows ONE to FIND, access and display data from the web pages on the Internet. ;) Hope it helps.. Explanation: |
|
| 16593. |
What is the orientation of page break? |
|
Answer» To start a new page, from the Insert tab, SELECT Page Break. In the Page Layout tab, from the Margins drop-down MENU, select Custom Margins.... In the Page Setup window, click the Margins tab. Under "Orientation", CHANGE the page orientation to the DESIRED setting |
|
| 16594. |
Flowchart wheather a number is positive or negative |
| Answer» | |
| 16595. |
Catch the train codechef solution |
|
Answer» CodeChef was created as a platform to help programmers make it BIG in the world of algorithms, computer programmingand programming contests. At CodeChef we work HARD to revive the geek in you by hosting a programming contest at the start of the month and another smaller programming challenge in the middle of the month. We also aim to have training sessions and discussions RELATED to algorithms, binary search, technicalities like array SIZE and the LIKES. Apart from providing a platform for programming competitions, CodeChef also has various algorithm tutorials and forum discussions to help those who are new to the world of computer programming. |
|
| 16596. |
Why have pendrive become |
|
Answer» can you PLEASE COMPLETE the WHOLE QUESTION my friend. Explanation: |
|
| 16597. |
agar hum telegram pe kuch post karte h tab reply aata h.kai sari post aane k bad reply aayega to hamein kaise pta chalega ? |
|
Answer» NOTIFICATION on KRO LO..... . .. |
|
| 16598. |
Draw the logic circuit diagram for the function F=AB'C+C'B using nand gate only |
|
Answer» Not UNDERSTANDING PLZ |
|
| 16599. |
What is similar and different between space bar and tab?? class 9 computer question |
|
Answer» Answer: Both are used to give space - Similar Tab is a small key PRESENT in LEFT of KEYBOARD whereas space-bar is the longest key present on bottom middle of keyboard - difference. Hope it helped.. |
|
| 16600. |
Define chromatography ......... |
|
Answer» HELLO! HERE IS THE ANSWER FOR YOUR QUE. a technique for the separation of a MIXTURE by passing it in solution or suspension through a medium in which the COMPONENTS move at different rates. HOPE YOU LIKED THE ANSWER PLEASE LEAVE A LIKE |
|