This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 16801. |
What are computer viruses? how can you protect your computer from computer? tell brief |
|
Answer» A computer virus is a type of malicious code or program written to alter the way a computer operates and is designed to spread from one computer to ANOTHER. A virus operates by inserting or attaching itself to a legitimate program or document that supports macros in order to execute its code. In the process, a virus has the potential to cause unexpected or damaging effects, such as harming the system software by corrupting or destroying data. 8 Steps to Protect Your Computer From Viruses and Malware 1. Keep your software up to date 2. Don’t CLICK on LINKS within emails 3. Use free antivirus software 4. Back up your computer 5. Use a strong PASSWORD 6. Use a firewall 7. Minimize downloads 8. Use a pop-up blocker. PLEASE MARK BRAINLIST ANSWER THANK YOU
|
|
| 16802. |
When we want to store something like name we will use____________ data typePlease please help me |
|
Answer» Answer: character data type with ARRAY, that's because character has only 1 byte that is it ACCEPTS only 1 character, but USING arrays you can PROVIDE lots of values in 1 homogeneous variable. Explanation: char a[20]; O\P: ENTER THE NAME : MrXYZ |
|
| 16803. |
Which of the key combination is used to save changes nd close the table |
|
Answer» HTML is a set of WRITTEN INSTRUCTIONS for how to DISPLAY a web PAGE. |
|
| 16804. |
Disadvantage of napier bone |
|
Answer» Napier developed a mechanical method for performing multiplication and DIVISION. This method, KNOWN as "Napier's bones," was based upon manipulation of rods with printed digits. The rods were made of BONE, IVORY, wood, or metal. |
|
| 16805. |
Which of the following will be correct in BlankD?i = i + 1; term = term / (i+1); result = result + term;result = result + term; i = i + 1; term = term / (i+1);i = i + 1; result = result + term; term = term / (i+1);term = term / (i+1); result = result + term; i = i + 1; |
| Answer» | |
| 16806. |
Discuss various storage units |
|
Answer» byte kb (kilobyte) is = 1024bytes gb (GIGABYTE) is = 1024 mb tb (terabyte) is = 1024 gb and more but we USES these and 8bit = 1 byte |
|
| 16807. |
Examples of temporary devices |
|
Answer» Answer: 5 Examples of temporary storage devices for COMPUTERS: |
|
| 16808. |
Which of the following is complete in a finite search space |
|
Answer» hh Explanation: hihuuuuhhhhhyiotspydpyrptdotdpydydppydit)6"(5"85*74"96_pyrzoyrxpyrz |
|
| 16809. |
Complete the code segment to help Ram , find the highest mark and average mark secured by him in "s" number of subjects. |
|
Answer» Answer: import java.io.*; class check { public static void MAIN ( String args[] )throws IOException { System.out.println(“Enter the number of subjects”); int N=Integer.parseInt(in.readLine()); int arr[]=new int [n]; System.out.println(“Enter the number of subects among which you want the average and highest MARKS”); int k=Integer.parseInt(in.readLine()); for (int i=0;i { System.out.println(“Enter the number”); arr[i]=Integer.parseInt(in.readLine()); } int highest, AVG=0; for (int i=0;i { avg=avg+ar[i]; if(highest { highest=arr[i]; } } avg=avg/k; System.out.println(“Highest marks = ”+ highest); System.out.println(“Average marks = ”+ avg); } }
|
|
| 16810. |
What is the role of linker in a computer? |
|
Answer» linker Explanation: In computer science, a linker is a computer program that TAKES ONE or more object files generated by a COMPILER and combines them into one, EXECUTABLE program. |
|
| 16811. |
Degree distribution of most real-world networks follow which law?Benford’s lawStefan’s lawPower lawZipf’s law |
|
Answer» Answer: Degree DISTRIBUTION of most real-world NETWORKS FOLLOWS the Power LAW. |
|
| 16812. |
What is a blue print of boject |
|
Answer» Answer: well....Blue print MEANS syllabus and SUB TOPICS of any particular subject . |
|
| 16813. |
Difrent types of alphabetic keys |
| Answer» | |
| 16814. |
How ICT has positively impacted the education, commerce and Healthcare |
|
Answer» Answer: Positive impact of ICT on education, commerce and Healthcare Explanation: ICT has had a tremendous impact on many sectors of the modern life.ICT has changed the way people work, live, and play. In the education sector, ICT has enabled the spread of knowledge and skills. Students and teachers can now learn easily and cheaply. ICT has also transformed many education models. It has introduced new courses in the education sector. In the commerce sector, ICT has made transactions faster, cheaper and safer. People can now buy goods and purchases at the click of a button. Traders and customers can make and track orders ONLINE. In healthcare, ICT has made the lives of patients and DOCTORS easier, and safer. Medical RECORDS are stored on computers and doctors can track the medical history of a patient. Medical equipment is controlled by computers ensuring that both doctors and patients can have an accurate diagnosis. Patients can now easily contact doctors for INFORMATION through the use of EMAIL and websites. |
|
| 16815. |
Swapping two variables using the push/pop technique avoids the use of an extra C variable |
|
Answer» If a and B are TWO VARIABLES then |
|
| 16816. |
Which statement will output $× on the screen in php |
| Answer» | |
| 16817. |
MQTT topics are what? |
|
Answer» Answer: MQTT topics are a form of addressing that ALLOWS MQTT clients to share INFORMATION. MQTT topics are STRUCTURED in a HIERARCHY similar to folders and files in a file system using the forward slash ( / ) as a delimiter. Explanation: |
|
| 16818. |
What is tiling and cascading windows |
|
Answer» An arrangement of windows such that they overlay ONE another . Typically, the little bar remains visible so that you can always see which windows are open. cascading windows are also called overlaid windows . An alternative arrangement of windows in while every window , in which every , windows is completely visible , is called tilling window |
|
| 16819. |
Which statement describe “Hackers”?A all have the same motiveB may legally break into computers as long as they do not do any damageC are people who are allergic to computersD break into other people’s computers |
|
Answer» Answer: HACKERS are just like THIEF |
|
| 16820. |
What happen in my A.C?Dleate this question |
|
Answer» HEY MATE what is your QUESTION. I don't UNDERSTAND |
|
| 16821. |
What does the Gflag in routing table signify |
|
Answer» Answer: The first COLUMN SHOWS the DESTINATION network, the second the router through which PACKETS are forwarded. The U flag INDICATES that the route is up. The G flag indicates that the route is to a gateway. |
|
| 16823. |
Write a Program in Java to display the first ten terms of the following series:(a).1,2,4,7,11..........(b).1.5,3.0,4.5,6.0......(c).0,3,8,15......(d).0,7,26..... |
|
Answer» hope u FIND this usefull |
|
| 16824. |
Comment are useful and easy way to enhance readability and understandability of a program |
|
Answer» Answer: Comments HELP explain what’s being DONE. e.g. def add(x, y): # function to add TWO numbers return x+y Explanation: I hope it helpful Mark as BRAINLIEST |
|
| 16825. |
Wwhat is the shortcut key for previewing an animation |
|
Answer» To view a MOVIE in Preview mode, choose File→Publish Preview→Flash or use the keyboard shortcut Ctrl+Enter (WINDOWS) |
|
| 16826. |
What is the shortcut key of previewing an animatin? |
|
Answer» HELLO, here is your answer... |
|
| 16827. |
Application of voice respond system |
|
Answer» Answer: voice response SYSTEM (VRS) is a computer interface which responds to voicecommands, INSTEAD of responding to inputs from a mouse or a keystroke. It is a type of speech synthesis where sentences are organized by concatenating pre-recorded WORDS saved in a database. Explanation: Interactive voice response (IVR) is a technology that allows a computer to interact with humans through the use of voice and DTMF tones input via a keypad. ... IVRsystems can respond with pre-recorded or dynamically generated AUDIO to further direct users on how to proceed. |
|
| 16828. |
Why is computer applications tecnology important |
|
Answer» Answer: |
|
| 16829. |
Which of the following is to be done to avoid limitations in threat models?Making more explicit and formalized threat models to understand possible weaknessesMaking simpler and more general threat modelsMaking less assumptions to design a better threat modelAll of the above |
|
Answer» Answer: Threat Models - Threat models may be defined as the model for prioritizing the threats, identifying and making them enumerated. Threat models is recent days went through a huge development phase because it has been the most essential part of the SOFTWARE developing companies. It ALSO provides security in the development of any software. To avoid LIMITATIONS in threat model we MUST perform all the above to make it perfect in every SPHERE. |
|
| 16830. |
How will you insert a table in presentation ?explain any two ways |
|
Answer» by USING html tags we can create a table in any presentation by ADDING rows and columns we can create a table Explanation: |
|
| 16831. |
Process Control block (PCB) is also known asa. Task Controlling Blockb. Control Blockc. Memory Blockd. Data Block |
|
Answer» A. TASK CONTROLLING BLOCK |
|
| 16832. |
How will you display two application windows side by side |
|
Answer» I think by opening 2 APPLICATIONS one after ANOTHER with out closing and decreasing the length and width of them |
|
| 16833. |
A computer...............is a device that is connected to a computer system |
| Answer» | |
| 16835. |
Which of the following statement is correct?a) Operator precedence determines which operator is performed first in an expression with more than one operator with different precedence. Associativity is used when two operators of same precedence appear in an expressionb) Operator associativity determines which operator is performed first in an expression with more than one operator with different associativity. Precedence is used when two operators of same precedence appear in an expression.c) Operator precedence and associativity are same..d) None of the above |
|
Answer» Answer: a) Explanation: a) Operator precedence determines which operator is performed first in an expression with more than ONE operator with different precedence. Associativity is used when two operators of same precedence appear in an expression Operator Precedence: Operator precedence is the priority of the operators used in an expression. In COMPUTERS, operator precedence is ALMOST as equal to the precedence in Mathematics (BODMAS - Brackets of Division MULTIPLICATION Addition and Subtraction). The only difference is that Division and Multiplication have the same precedence. Operator Associativity: There are two types of associativity. 1) Left Associativity - The operations start from left to right. 2) Right Associativity - The operations start from right to left. |
|
| 16836. |
Draw a flowchart to find the Fibonacci series till term≤1000. |
|
Answer» Here N denotes the TOTAL number of FIBONACCI series. S denotes the sum. i denotes the integer. k is an increment. |
|
| 16837. |
Explain the purpose of various unit of computer. |
|
Answer» Answer: The primary function of the computer SYSTEM unit is to hold all the other COMPONENTS together and protect the SENSITIVE electronic parts from the outside elements. A typical computer case is also LARGE enough to allow for upgrades, such as adding a second hard drive or a higher-quality VIDEO card. |
|
| 16838. |
What is meant by disk cleanup |
|
Answer» Answer: DISK cleanup is a cleaning process of local disk in a computer ,you can SELECT a PARTICULAR local disk to CLEAN it |
|
| 16839. |
Name any two common things that all machine have |
| Answer» | |
| 16840. |
How should be the introduction of the speech |
| Answer» | |
| 16841. |
Consider the following lines of Python code.x = [13,4,17,1000] w = x[1:] u = x[1:] y = x u[0] = 50 y[1] = 40 Which of the following is correct?x[1] == 40, y[1] == 40, w[0] == 4, u[0] == 50x[1] == 50, y[1] == 40, w[0] == 50, u[0] == 50x[1] == 4, y[1] == 40, w[0] == 4, u[0] == 50x[1] == 40, y[1] == 40, w[0] == 50, u[0] == 50 |
|
Answer» Answer: 3 Explanation: w=[4,17,1000] u=[4,17,1000] y=[13,4,17,1000] --> u[0]=50 =>u=[50,17,1000] --> y[1]=40 =>y=[13,40,17,1000] option 3: x[1]=4,y[1]=40,w[0]=4,u[0]=50 |
|
| 16842. |
What is DOS in short answer type questions |
|
Answer» Answer: The term DOS can refer to any operating system, but it is most OFTEN used as a shorthand for MS-DOS (MICROSOFT disk operating system). Originally developed by Microsoft for IBM, MS-DOS was the standard operating system for IBM-compatible PERSONAL COMPUTERS. ... Even Windows 95 sat on top of DOS. Explanation: please mark as brainliest answer |
|
| 16844. |
What are the different steps involved in data processing? |
|
Answer» Answer: •Data collection. Collecting data is the first step in data processing.... •Data PREPARATION. Once the data is collected, it then ENTERS the data... Data INPUT. .. Processing... Data output/interpretation. Data storage |
|
| 16845. |
Briefly explain the history of computers |
|
Answer» Answer: A BRIEF COMPUTER HISTORY The computer as we know it today had its beginning with a 19th century English mathematics professor NAME Charles Babbage. He designed the Analytical Engine and it was this design that the basic framework of the computers of today are based on. Generally speaking, computers can be classified into three generations. Each generation lasted for a certain period of TIME,and each gave us either a new and improved computer or an improvement to the existing computer. First generation: 1937 – 1946 - In 1937 the first electronic digital computer was built by Dr. John V. Atanasoff and Clifford Berry. It was called the Atanasoff-Berry Computer (ABC). In 1943 an electronic computer name the Colossus was built for the military. Other developments continued until in 1946 the first general– purpose digital computer, the Electronic Numerical Integrator and Computer (ENIAC) was built. It is said that this computer weighed 30 tons, and had 18,000 vacuum tubes which was used for processing. When this computer was turned on for the first time lights dim in sections of Philadelphia. Computers of this generation could only perform single task, and they had no operating system. Second generation: 1947 – 1962 - This generation of computers used transistors instead of vacuum tubes which were more reliable. In 1951 the first computer for COMMERCIAL use was introduced to the public; the Universal Automatic Computer (UNIVAC 1). In 1953 the International Business Machine (IBM) 650 and 700 series computers made their mark in the computer world. During this generation of computers over 100 computer programming languages were developed, computers had memory and operating systems. Storage media such as tape and disk were in use also were printers for output. Third generation: 1963 - present - The invention of integrated circuit brought us the third generation of computers. With this invention computers became smaller, more powerful more reliable and they are able to run many different programs at the same time. In1980 Microsoft Disk Operating System (MS-Dos) was born and in 1981 IBM introduced the personal computer (PC) for home and office use. Three years later APPLE gave us the Macintosh computer with its icon driven interface and the 90s gave us Windows operating system. As a result of the various improvements to the development of the computer we have seen the computer being used in all areas of life. It is a very USEFUL tool that will continue to experience new development as time passes. |
|
| 16846. |
Which tool is used to add text on the drawing area? |
|
Answer» The answer to this question is a Text Tool. Explanation:The tool used for adding text in the drawing AREA is called a Text Tool. This tool is a placeable element which can be used to ENTER text on the drawing part. In order to add text to the drawing area some steps must be FOLLOWED which are as follows:
|
|
| 16847. |
Breif history of multimedia |
|
Answer» Since the late 1970s, desktop computers used in the home and office have evolved into sophisticated systems that help us get our jobs DONE,deliver information ,and provide entertainment. Presents a timeline of some of the key technologies that have contributed to the evolution of multimedia computers. Do not worry if some of these terms, especially the ones pertaining to hardware , seems unfamiliar to you right now, because they will be discussed in detail later in this book. The main point is multimedia technology did not happen overnight. Multimedia technology has changed the way we look at computers. The first computers were seen as single-purpose machines that solved incredibly complex mathematical problems. During the 1960s , mainframe computers were used to manage large corporate databases and financial systems. The 1970s saw computer terminals throughout an organization being used for publishing and information management. The 1980s brought the desktop computer so everyone could have a computer at his or desk for word processing, spreadsheets, and even games. Bringing the computer to the INDIVIDUAL in the office, the home, and the classroom meant LOOKING at the computer as more than just a FANCY typewriter or automated bookkeeper. In the mid 1980s and into the 1990s, computer developers started looking at how computers could be used a s never before. At the same time, advances in technology brought about: 1. Faster desktop computers 2. Increased working memory capacity in computers 3. Higher data storage capacity in disk drives and CD-ROMs 4. Digital audio and video 5. Graphic operating systems that worked by pointing and clicking at objects on the screen instead of having to remember cryptic command sequences such as “dir .exe” to find a program 6. Local and wide area networks that connected users to the world 7. Thousands of applications ranging from word procesors to a myriad of multimedia products that have changed the workplace,classroom,and the home. Computer developers started looking to multimedia – the delivery of information using text,pictures,audio,and video—as a way to utilize computers in a uniquely personal way. Multimedia computers could be used to increase efficiency and productivity on the job, provide information at out fingertips in the home, and help students learn more effectively both in and out of the classroom.These personal gains meant that people would see computers as practical and useful tools in their everyday lives. Explanation: please mark as brainliest answer |
|
| 16848. |
Is canon is best or nikon is best camera ? |
|
Answer» GO for cannon Explanation: it is best plz MARK me BRAINLIEST |
|
| 16849. |
How to create a web page for kerala tourism by including bgcolor,headings,text formats, font tags & images |
| Answer» | |
| 16850. |
There must be which statement for every FOR statement |
Answer» <U>HYY MATE what u WANT to ASK ? ? |
|