This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 16851. |
Which of the following statements is/are false?a. In intertor routing protocol,the participating routers are persent in the same autonomous systems.b. In intertor routing protocol,the participating routers are persent in the different autonomous systems.c. In exterior routing protocol,the participating routers are present in the same autonomous system.d. In exterior routing protocol,the participating routers are present in the different autonomous system. |
|
Answer» f t t f Explanation: PLZ MARK as BRAINLIEST ANS |
|
| 16852. |
LOADing routines uses |
| Answer» | |
| 16853. |
Which one of the following is a collection of iconsrepresenting various operations that can be carriedout within an application?a. Buttonsb. MenuC. Toolbard. None of these |
| Answer» | |
| 16854. |
Which one of the following provides access to allthe active applications by maintaining a row of openapplication title boxes?a. Title barb. Home directoryC. Bottom bard. None of the above |
|
Answer» C. The bottom bar provides access to all the active applications by maintaining a row of open application title boxes. Explanation:The taskbar is an ITEM of an operating system placed at the "bottom of the windows screen". The taskbar PERMITS the user to invoke programs through the Start MENU option and view the application programs that are currently active. The title bar section is placed at the TOP part of a window which shows details of the window name or applications being used. The "Home directory" is the default working directory for the user when logs into the system. |
|
| 16856. |
What is the difference between compound criteria and comparison operator |
|
Answer» The equality operator (==) is used to compare TWO values or expressions. ... Numbers, strings, and BOOLEAN values are compared byvalue, and are considered equal if they have the same value. For instance, two strings are equal if they have the same NUMBER of characters. |
|
| 16857. |
How I can improve in doing flowcharts |
|
Answer» ANSWER:practicisi NG and TAKING the HELP of COMPUTER teacher Explanation: |
|
| 16858. |
The RSA system was used to encrypt the message M into the cipher-text C = 6. The public key is given by n = p q = 187 and e = 107. In the following, we will try to crack the system and to determine the original message M. (a) What parameters comprises the public key and what parameters the private key? (b) What steps are necessary to determine the private key from the public key? (c) Determine the private key for the given system. (d) What is the original message M? How would i solve this? |
|
Answer» Answer: (A) The public KEY is (n,e) and the PRIVATE key is d. We KNOW ed=1 (mod(p−1)(q−1)). (B) C:=me(mod(n)) If you can compute the private key d, you can compute cd(modn) to get m, since cd=(me)d=m1(modn) since ed≡1(modn). Explanation: |
|
| 16859. |
Define cpu and its parts |
|
Answer» ANSWER:CENTRAL PROCESSING unit Explanation: |
|
| 16860. |
Main_program{ int n; cin >> n;double i= BlankA, term = BlankB, result = BlankC; repeat(n){// On tth entry, t=1..n // i=t-1, term=1/t! // result=1/0!+..+1/(t-1)! BlankD } cout |
|
Answer» Explanation: SPAM |
|
| 16861. |
What is antivirus? give one example |
|
Answer» Answer: |
|
| 16862. |
Suppose, you and your friends have a few numbers of locks and you all want to share that numbers among yourselves securely using RSA based cryptosystem. You are using the private key as (5,27) and your friends are using the public key as (13,27). One of your friends wants to share the exact amount of locks only to you. What are the maximal possible locks that your friend can have so that he/she can secretly share that to you? |
|
Answer» Explanhreeatio |
|
| 16863. |
what will be the input to the second pass,if the list before starting the radix sort is :729,150,123,931,348,517 |
|
Answer» Answer: ganeshhhghdjdvdvfhfh hairspray o'clock ICYMI Explanation: GANESH HDTV insist they Ugc TV Ugc TUB in GM GM GM ggggh ggggh ggggh gyhjigy |
|
| 16864. |
What is meant by a computer network? |
|
Answer» Answer: Explanation: A computer network is a set of computers connected together for the PURPOSE of SHARING resources. The most common resource shared today is connection to the Internet. Other shared resources can include a PRINTER or a file server. The Internet itself can be CONSIDERED a computer network |
|
| 16865. |
How is trimmed mean calculated |
|
Answer» |
|
| 16866. |
Matplotlib in Python can only generate line graphs is true r false |
|
Answer» False Explanation: MATPLOTLIB in Python can only generate line graphs is FALSE. matplotlib in Python can only generate range of Graph as follows :- 1) Line Graph 2) Bar Graph 3) Scatter Graph 4) Histogram Graph Graph level to plot trends and patterns. python -mpip INSTALL -U matplotlib -- Command used to install matplotlib PACKAGE. |
|
| 16867. |
Did you speak to Katherin? Yes,diar- |
|
Answer» n what do you MEAN by kathrein |
|
| 16868. |
Differentiate between RAM and ROM. |
|
Answer» Explanation: There is ONE major DIFFERENCE between a ROM (read-only MEMORY) and a RAM (random-access memory) chip: ROM can hold DATA without power and RAM cannot. Essentially, ROM is meant for permanent storage, and RAM is for temporary storage. |
|
| 16869. |
1. Write an HTML program to show the following outputSr. NoRoll NoNameTeam1001JohnRed21002PeterBlue1003HenryGreen |
| Answer» | |
| 16870. |
Make an html program using tags: heading level,Image, Background color |
|
Answer» Answer: Its so easy. But the STYLES can be defined in three ways:
|
|
| 16871. |
Swapping two variables using the PUSH/POP technique avoids the use of an extra C variable.TrueFalse1 pointCompared to the technique of swapping C variables using the PUSH/POP assembly code,the one that swaps using a temporary C variable uses more memory locations on the stackTrueFalse1 pointAn unoptimized C code translation to assembly language results in several redundant statements in some casesTrueFalse1 pointThe declaration (without initialization) of a variable in a C program results in an equivalent statement being generated in assembly languageTrueFalse1 pointIf the increment operation is performed on a pointer variable, the compiler is responsible to map it to the correct number of additional bytes based on the data type of the pointer variableTrueFalse |
| Answer» | |
| 16872. |
Convert decimal to binary 0.4475plz ans |
|
Answer»
0.01110010100 it can be MADE out by DIVISION of the FRACTION NUMBER that is the number after decimal point by 2 |
|
| 16873. |
Viruses : Viruses are relation simple prograna written by people and designed to causeSuitsuance or darnage to computers or their bles. They are also responsible for corruptinIn dvacy concerns : Internet is also a hub of lot of personal data. It is possible to trackindividual activities in the internet. Such data on user behaviar can be misused for memarketing purposes. Many civil rights activists fear the danger of authoritarian governmento monitor and manipulate freedom of movement, speech, political activism and social andpersonal behaviors. Similarly consumer rights advocates fear that dosë monitoringof an individual's buying habits will allow businesses to share market informandspending preferences and capacities.Health : Internet and social networking addiction is a popular and identified sideemergence or ICT Excessive internet usage is also associated with low attention ofICT, as any other technology, is only a tool to be utilized. How it is to be usedconmol. Rest of units in this Block, will take a look at how to make best use on:educational practice so that every stakeholder involved will make informed choiceExercise (UITEMultiple Choice Questions1. Which of the following is not considered to be a tool of the ICT?(a) Hardware(b) Software(c) Technologies(d) Processing2. Which of the following is not a learning app?(a) Kindle books(b) G suit(c) Snapchat(d) Khan academy3. Which of these activities are related to E-commerce?(a) Online shopping(b) Transactions(c) Inventory management(d) Socializing4. What is the full form of GIS?(a) Global information system(b) Geographical information system(c) Global informatics system(d) Geographical informatics system: |
|
Answer» , 1-techlnogies 2nd snapchat 3RD INVENTORY management 4th global INFORMATION SYSTEM |
|
| 16874. |
What isQBASIC?write it function |
|
Answer» QuickBasic is a programming language developed by Microsoft for use in the MS-DOS operating system. It is the successor of earlier forms of BASIC (BEGINNERS All-Purpose Symbolic Instruction Code), a simple programming language for beginning programmers. Functions in QBASIC are readymade programs which TAKE some data, manipulate them and return the value, which may be string or numeric type. ... A function which is written and stored by the programmer to PERFORM a specific task is known as User Defined Functions. #Hope it helps✨ |
|
| 16876. |
The following program fragment is supposed to count the number of 'a's read until the character '.' is encountered. For example, if the input is "kangaroos are fantastic.", the output should be 5.int aCount=0;while(true){char c; cin >> c;if(blankD) blankE = blankF;}cout What is the value of blankE?3>What is the value of blankF? |
|
Answer» Answer: The PROGRAM given in the question states that, to count the number of 'a' PRESENT in a sentence, before '.' is found. The answer for "blankD" is "(c!=' .' && c=='a')". for "blankE" it is "aCount" and for "blankF" it is "aCount+1". Explanation: The reason for the answer is because, when there is character 'a' found and no '.' is present, then the the VARIABLE which is declared for counting the frequency, needs to be updated by INCRIMINATING it's value by one, which is being done, when the condition comes out to be true. |
|
| 16877. |
You are typing a letter using a computer and suddenly there is a power failure.which activity? |
|
Answer» IF you are using microsoft word then a TEMP COPY will be auto SAVE next time when you will open you can then continue from it. Explanation: |
|
| 16878. |
What does the function random.randrange(49,150) return in Python? |
|
Answer» Answer: It returns random number from 49 to 149 both inclusive. Explanation: Syntax of randrange is randrange (start, STOP, step). Start - Start RANGE of Random Number Stop - Stop limit of Random Number. This number will never be generated by function. Step - Step size. If set to say 10, number generated will be multiple of 10. If not SPECIFIED this will be defaulted to 1. random.randrange(49,150) will returns random number from 49 to 149 both inclusive. Step will GET set to 1. |
|
| 16879. |
How to rename a workbook |
|
Answer» Answer: MAKE sure the WORKBOOK you want to rename is not loaded into Excel. ... Choose Open from the File menu or click the Open tool on the toolbar. ... In the list of files contained in the DIALOG box, right-click on the one you want to rename. ... Choose Rename from the Context menu. ... |
|
| 16880. |
A manufacturer sells an item for Rs. 100 each. For the first 100 items there is no discount. If you order between 101 and 200 items there is a 10 % discount on each item other than the first 100. If you order more than 200 items, then for the first 100 there is no discount; for the next 100 there is a 10 % discount, and for each item above 200 there is a 20 % discount. Thus if you order 30, the cost is Rs 3000. If you order 130, the cost is Rs. 12700. If you order 230, then the cost is Rs. 10000+9000+2400 = 21400. The following program fragment is supposed to calculates the cost.int quantity; cin >> quantity;int cost = 0;if(quantity What is the value of blankC1,blankC2? |
|
Answer» Answer:A1-0 A2-100 B1-10000 B2-90 C1-19000 C2-80 Explanation: See, in this given code the price distribution is given and it's discount. For first when there are less than 100 items there are no discount hence A2 will be int quantity*100 and A1 will be zero there's no PREVIOUS cost to be added on this. For second case when quantity is less than 200 then for the first 100 products it will be 100*100=10000, which explains why B1 value is 10000. For the remainder of items after 100 items we will have 10%discount hence the price of all those REST of products will be 90. So in the given code segment it is given (quantity-100)*90. For the products extra to first 100 items will be multiplied by discount price 90. Hence B2 is 90. As given in the example if we buy 130 items it will be distributed as 10000+30*90=12700. Now for c1 the answer is 100*100+100*90=19000. Hence value of 'C1 is 19000. For c2 we have the else case of any purchase of over 200 items we will have 20% discount, hence the price of every 201st product onwards cost price will be 80. THEREFORE the C2 is 80. In the example if we buy 230 products then the price distribution will be 10000+9000(as explained earlier)+2400(30*80) |
|
| 16881. |
Give two examples of fibre cable |
|
Answer» for COMMUNICATION and for CABLE CHANNEL |
|
| 16883. |
Show that the angles of an equilateral triangle are 60 drgree |
|
Answer» That is MATHS not COMPUTER SCIENCE. Please put the correct subject. Edit: Sorry! I didn't realise that that is computer science not maths. My APOLOGIES. |
|
| 16884. |
Give two examples of modem |
|
Answer» Answer: DSL modem & WIRELESS ADSL modem are example of modem |
|
| 16885. |
Explain the differece between save and save as |
|
Answer» save- this function is used to save a file or DOCUMENT that already has a name or has been SAVED be forever. save as-this function is used to save a file or document under a new name and in the file location you PREFER. |
|
| 16886. |
A password cannot contain the _______ character. a)? b)* c)@. d) none of them |
|
Answer» Answer: HEY guys^_^ I don't KNOW the answer of this question. But the PASSWORD only includes letters and numbers. Hope it HELPS. |
|
| 16887. |
Convert 16 to bianary number system. |
|
Answer» Answer: 0000000000010000 Explanation: |
|
| 16888. |
The execution of any c program is :a) sequentialb) parallel c) Multi-threadingd) None of these |
|
Answer» Here it is: NONE of these |
|
| 16889. |
What is memory leak ? |
|
Answer» A FAILURE in a program to RELEASE discarded memory, causing impaired PERFORMANCE or failure. |
|
| 16890. |
Swapping two variables using the PUSH/POP technique avoids the use of an extra C variable true or false? |
|
Answer» The answer to the QUESTION is "False". By using PUSH/POP operation it is not possible to swap two variables without using any third variable. Explanation: The REASON why there cannot be any swap done is that the PUSH/POP operations are USED when there is a use of stack memory done. The system of stack memory is LIFO (LAST In First Out), which means the data which has been inserted last in the memory is the memory which can only be taken out for any operation. SO there is no way of storing the data after it is taken out of the stack memory, and there we need to use the third variable to swap two numbers. |
|
| 16891. |
Why is an operating system needed for a computer system? |
|
Answer» An operating system is the most important software that runs on a computer. It manages the computer's memory and processes, as WELL as all of its software and HARDWARE. It ALSO allows you to communicate with the computer without KNOWING how to speak the computer's language. |
|
| 16892. |
Write a C function to find the kth occurrence of an even integer in a sequence of non-negative integers, and then call your function from main. |
|
Answer» Answer: #include void check_freq ( INT a , int n ) { int count = 0 ; int inp=0; printf ( " Enter numbers :- " ); for( int i=1; i<= 10; i++ ) { scanf(" %d ", &inp); if ( inp == a) count ++; if( count == n || i > n) { printf (" desired number of repetition found ") ; break; } } } void MAIN ( ) { int a, int n; printf (" Enter the number to be checked "); scanf("%d" , &a ); printf (" Enter the number of FREQUENCY to be checked "); scanf("%d" , &n ); check_freq( a , n ); } |
|
| 16893. |
Write an algorithm to check whether the given number is divisible by 2 or not |
| Answer» | |
| 16894. |
What is the (P) tag in Html |
|
Answer» TAGS is USED to LEAVES a PARAGRAPH SPEECH above and below the paragraph |
|
| 16895. |
Which of the following is not a valid C variable name ??a)var123b) var_123c) 123vard) X_123_var |
|
Answer» Answer: Option (C) 123var is not a valid C VARIABLE NAME. Explanation: For naming a C variable, capital LETTERS, small letters, UNDERSCORE, and even numbers can be used. However, the variable name cannot start with numbers and hence, 123var is incorrect. The first character of a variable name should be either an alphabet or underscore. |
|
| 16896. |
Mention any two ways by which websites can track you . |
| Answer» | |
| 16897. |
How will you delete the default data of a datasheet in MS PowerPoint 2013 |
|
Answer» The default data can be deleted using built-in options in powerpoint. Explanation:A chart is a tool to present the "data in a graphical format" to the USER for analysis. The "DATASHEET" only appears when you edit the chart object in powerpoint. The following are the sequence of actions can be USED to delete the default data of a datasheet in MS powerpoint.
|
|
| 16898. |
20 example of output device |
|
Answer» Answer: MONITOR, touch SCREEN SCANNER , PRINTERS , speakers, plotters Explanation: |
|
| 16900. |
there are 18 boys and 24 girls in a class wap in Q basic to find the percentage of boys and girls in class |
|
Answer» Answer: |
|