Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

16901.

Explain MS Excel 2013 Screen Elements.​

Answer»

Answer:

If you are relatively new to USING Excel 2013 for spreadsheets, you may not know the purpose of everything on the screen. CHANCES are, you'll find simpler or more effective WAYS to work with your spreadsheets once you find out more about the interface and its tricks. Here's a quick look at the parts of Excel 2013.

16902.

ESSAY. Why we need to study the different kind of malware?

Answer»

Answer:

What is malware?

Malware is shorthand for malicious software. It is software developed by cyber attackers with the intention of gaining ACCESS or causing damage to a computer or network, OFTEN while the victim REMAINS oblivious to the fact there's been a compromise. A common alternative DESCRIPTION of malware is 'computer virus' -- although there are big differences between these types of malicious programs.

What was the first computer virus?

The origin of the first computer virus is hotly debated. For some, the first instance of a computer virus -- software that moves from host to host without the input from an active user -- was Creeper, which first appeared in the early 1970S, 10 years before the actual term 'computer virus' was coined by American computer scientist Professor Leonard M. Adleman.

16903.

A invitation on science exhibition held in your school​

Answer»

                              Bharatiya Vidya BHAVAN, Kolkata

                      INVITATION FOR SCIENCE EXHIBITION

                                       " LIVE FOR SCIENCE "

This is to inform everyone that our school is organising a science exhibition next MONTH on 14th and 15th September,2019 in the school auditorium. All the students and teachers of other schools are invited but the students should be in proper school uniform. Our students will be showcasing SEVERAL projects which will be demonstrated in details.

Theme: Global warming and climate CHANGE

[Contact: 9903289123 or Email id: [email protected]]

Indrani Mukherjee

(Principal)

16904.

What is the relevance of private browsing??? Explain with the help of an example.

Answer»

Private browsing ESSENTIALLY removes any tracking of user's Web activities from the local machine, and by extension, the website that the user is visiting. The best example is the use, or RATHER disuse of cookies, that are used by websites to track user activities and STORE DATA.

16905.

What are the barriers of effective communication

Answer»

ANSWER:

The MAIN BARRIER is LANGUAGE DIFFERENCES

16906.

How we delete cache or framengated files in pc

Answer»

EXPLANATION:

by USING our CACHE CLEANER APPLICATIONS

16907.

Suppose a mining pool has obtained a block reward of 334 bitcoins and the pool fee is 115 bitcoins. Considering the difficulty of the block as824, what is the amount of reward each miners in the pool will obtain with pay per share scheme? 2.817391300 bitcoins0.265776699 bitcoins0.139563107 bitcoins0.003524693 bitcoins

Answer»

Answer:

0.003524693 I'm sure

Explanation:

i FINALLY OK

this ANS

16908.

Write ways in which A tag can be used

Answer»

Answer:

The anchor TAG is essentially a tag that you can attach to a WORD or a phrase (exactly like you would a normal internal or external LINK), except it brings readers down to a different section of the page as opposed to ANOTHER WEBPAGE. You’re essentially creating a unique URL within the same page when you use this tag.

16909.

Write code to produce HTML table​

Answer»

ANSWER:

c

hope this is a right answer

EXPLANATION:

please MARK me in BRAINLIEST

16910.

Write a program in c to find the largest of any 20 given integers​

Answer»

Answer:

#include

int main()

{

int ARRAY[20],largest;

//get input from user

printf("\nEnter the 20 Numbers:");

for(i=0;i<20;i++)

{

scanf("%d",&array[i]);

}

largest=array[0];

//time complexity n

for(i=1;i

{

if(array[i]>largest)

{

largest=array[i];

}

}

printf("\nThe Largest Number is:%d",largest);

}

Explanation:

Get the Numbers from the user.

Store the First in a variable.

Compare the next 19 with that

If GREATER replace it or ELSE just carry on to the next iteration.

that's it at last you have the largest number of any given numbers.

16911.

Write HTML coding to produce following table​

Answer»

that is your ANSWER

PLEASE MARK BRAINLIEST

please FOLLOW me

16912.

DRAW AN ALGORITHM ACCEPT 3 NO.S AND PRINT THE LARGER........................ SEND A PIC​

Answer»

ANSWER:

Step 1: Start

Step 2: Declare VARIABLES a,b and c.

Step 3: Read variables a,b and c.

Step 4: If a>b

If a>c

Display a is the LARGEST number.

Else

Display c is the largest number.

Else

If b>c

Display b is the largest number.

Else

Display c is the greatest number.

Step 5: Stop

16913.

What is PD in computer.

Answer»

Answer:

PD means PEN drive og COMPUTER

16914.

QExplain the purpose of auto formatfeature of world 2007.how it canbe used in world document?​

Answer»

Explanation:

You probably take many of these automatic formatting (AutoFormat) adjustments for granted. Word does things like changing your quotes to Smart Quotes, automatically creating bulleted and numbered lists, and changing the indentation of paragraphs.

This is FINE and good for many people, but what if you GET a document from someone else and it needs a lot of the "little touches" applied to it? This is where the real industrial-strength AutoFormat feature of Word comes into play. You see, AutoFormat doesn't just work as you type—it also is available, on demand, to format an entire document. Here's how to AutoFormat your document:

Load the document you want to format.

Choose AutoFormat from the Format menu. Word displays the AutoFormat dialog box. (See Figure 1.)

Figure 1. The AutoFormat dialog box.

Use the radio buttons to indicate if you want AutoFormat to work without STOPPING for your input, or not.

Click on OK.

At this point, AutoFormat works its magic and your document is "reformatted" to appear as it would have if you had typed it yourself.

You should understand that it is very unlikely that AutoFormat will do all the formatting you need DONE. Each document is different, and you should make sure you examine the document after AutoFormat is completed to see if there are any other formatting tasks you need to complete.

WordTips is your source for cost-effective Microsoft Word training. (Microsoft Word is the most POPULAR word processing software in the world.) This tip (638) applies to Microsoft Word 97, 2000, 2002, and 2003. You can find a version of this tip for the ribbon interface of Word (Word 2007 and later)

16915.

Answer thisanswer this question please ​

Answer»

ANSWER:

your QUESTION is not SHOWING CORRECTLY...

16916.

What does the G flag in routine table signify

Answer»

Answer:

The 'G' FLAG VS the 'H' flag

This flag signifies that the destination address in the ENTRY is a host address or a network address. ... If complete address matching fails then the network ID is matched to see if the routing table has an entry for a network to which the destination IP address of the datagram belongs.

16917.

Solve this ternary operator c=5+++- -6+5+++6- -​

Answer»

ANSWER:

ANSWER WILL BE 21

Explanation:

C=5+++--6+5+++6--

C=5+5+6+5

C=21

HOPE IT WILL BE HELPFUL

16918.

Definition of Programming LanguageWhat is programming language?​

Answer»

A Programming Language is a formal language,which COMPRISES a set of INSTRUCTIONS that PROVIDES VARIOUS KINDS of output.
I hope it helps u....

16919.

Essay on a leader in about 200 words​

Answer»

ANSWER:

leader MAKES important role in a group.(then you should ADD above POINTS in it)

a leader have some CHARACTERS like a role model . That's why they become useful to others.

16920.

WAP in JAva to print the following message -hello!​

Answer»

ANSWER:

Jump to Code to print Floyd's triangle · Example 1: Program to print HALF pyramid USING * PUBLIC class Pattern { int rows = 5; for(int i = 1; i <= rows; ++i) { for(int j = 1; j <= i; ++j) { print("* "); } PRINTLN(); }

16921.

Write the steps to print 5 copies of your worksheet​

Answer»

ANSWER:

USING excel you do the following

Preview your spreadsheet before printing

Decide what you are going to PRINT

Maximize your space

Use the print TITLE TOOL

Use Page Breaks

16922.

What is the short key to open method call dialog box in java

Answer»

ANSWER:

If you are USING mac cmd + shift + l will open a search BOX where you can search for any variable or method through out the PROJECT. ctrl+h will bring up JAVA search option.

Explanation:

16923.

Explain the meaning of phrase with example​

Answer»

ANSWER:

Phrase is a type of SHORT sentence but it doesn't have a verb or SUBJECT LIKE. Gun of FIRE

16924.

Who is the father of AI ?

Answer»

Answer:

JOHN MC Carthy is the father of AI

PLEASE PLEASE DEAR MARK ME AS THE BRAINLIEST

16925.

Whatis start up company? How is it related to enterprise ?​

Answer»

Answer:

what ........

KA BAAD KYA hai ????????

start up COMPANY why DONT you try

16926.

In prince of persia warrior within , please tell how to defeat kaileena the red girl , please tell the tricksthis question is of gaming computer science , I pray not to report , biggest will be branliestget total 20 points​

Answer»

Answer:

BRO its too HARD to DEFEAT. so jump and attack to kill her i COMPLETE it

16927.

Suppose, you and your friends have a few numbers of locks and you all want to share that numbers among yourselves securely using RSA based cryptosystem. You are using the private key as (5,27) and your friends are using the public key as (13,27). One of your friends wants to share the exact amount of locks only to you. What are the maximal possible locks that your friend can have so that he/she can secretly share that to you? 26 27 28 No such limit exists

Answer»

Answer:

RSA algorithm is a cryptography technique , where the objective is to send the data from sender to RECEIVER in an encrypted format, so that it may not be stolen by any outsider, and even if it gets stolen then the format of the data shall not be RECOGNIZED by the intruder, as that shall be in encrypted format.

Explanation:

Generally in the process of cryptography, data is encrypted by a key, and receiver decrypts the encrypted data with that key, but in case of RSA, there is use of two keys, ONE is the PUBLIC and the other one is private key. The speciality of those keys are, with the public key only encryption is possible, whereas for DECRYPTION private key is required.

16928.

Explane the primary and secondary​

Answer»

ANSWER:

primary schools are still up to 5 class and over classes are CALLED secondary

16929.

If a=5,b=9 calculate the value of a=a++ + ++b+a

Answer»

QUESTION:-

if a=5,B=9 calculate the VALUE of a=a+b+a

Answer:-

a + b+ a = 19

Explanation:-

Given that:-

a = 5

b = 9

We should find the value of a+b+a

a = 5,b = 9

Substitute the values:-

5 + 9 + 5

= 19

THEREFORE, value of a + b+ a = 19

16930.

write a program in Java to print first 10 natural numbers using 'for' loop with their sum with correct syntax.​

Answer»

Answer:

The first 10 NATURAL nos are:

1

2

3

4

5

6

7

8

9

10

Explanation:

public class Exercise10 {

   

 public STATIC void MAIN(STRING[] args)

   {      

   int i;

System.out.println ("The first 10 natural numbers are:\n");

for (i=1;i<=10;i++)

{      

 System.out.println (i);

}

System.out.println ("\n");

}

}

16931.

Write a program in Java to print first 10 natural numbers using 'for' loop with correct syntax.​

Answer»

IMPORT java.util.Scanner ;

class Natural_no

{

void MAIN ()

{

INT n,i;

Scanner kb =newScanner(System.in);

System.out.println ("ENTER the value for n:");

n=kb.nextInt ();

for (i=1;i <=n;i++)

}

System.out.println (i);

}

}

}

Output : Enter the value for n : 10

1

2

3

4

5

6

7

8

9

10

16932.

What do you understand by guide keys​

Answer»

Answer:

100% real and updated EXAM QUESTIONS for all famous certifications

Explanation:

Error Free Products with 24/7 Customer SUPPORT. PASS in first attempt or get your MONEY Back !

https://www.dumpskey.com

16933.

Imition game conclusion

Answer»

Did not understand
Please COMMENT me and TELL me PROPERLY

16934.

Files can be organized inA. PrinterC FolderB. KeyboardD.Mouse​

Answer»

ANSWER:

FOLDER is your CORRECT answer

16935.

List some advantages of Networking​

Answer»

Answer:

1: It enhances communication and availability of information.

2: It allows for more convenient RESOURCE sharing.

3: It makes file sharing easier.

4 : It is highly flexible.

5: It is an inexpensive SYSTEM.  

6 : It increases cost efficiency.

7: It boosts storage capacity.

9:It LACKS independence.

Explanation:

16936.

WAPIP to accept 3 numbers andthe sum of those 3 numbers.display​

Answer»

If you want the program in PYTHON, then the code is following :-

n1 = FLOAT(input("Enter first number : "))

n2 = float(input("Enter second number : "))

n3 = float(input("Enter third number : "))

RESULT = STR(n1 + n2 + n3)

PRINT("The sum is " + result)

16937.

In which tab template option is available

Answer»

ANSWER:

MICROSOFT WORD in FILE TAB

16938.

Which of the following Communications of keys are used for copy particular file in a folder​

Answer»

ANSWER:

EXPLANATION:

to COPY a FOLDER:ctrl+c

to PASTE a folder:ctrl+v

16939.

Which of the following is not a spot from where attackers seek information?a. Domain nameb. IP addressC. System enumerationd. Document files​

Answer»

Answer:

D

Explanation:

Internet is a common MEDIUM for gathering INFORMATION such as from Domain name, IP address of the target user, enumeration of victim’s system, IDSes running, TCP & UDP SERVICES ETC.

16940.

Which of the following comoination of keys are used for coppying a particular file in a folder? A. CTR+VC. CTR+CB. CTR+XD. CTR+A​

Answer»

ANSWER:

CTRL+C IS USED HERE

PLEASE PLEASE DEAR MARK ME AS THE BRAINLIEST

16941.

Which of the following is not an information source over the internet for target attackers?a. Whoisb. YouTubec. nslookupd. Archive sites​

Answer»

Answer:

B. YouTube

Explanation:

Youtube is a video hosting and  search ENGINE that is OWNED by Google. It provides videos to many users across the world.

Information can be found on several sites and databases. Many of the sites are free while others are paid. EXAMPLES of information sources include : WHOIS, Nslookup, Archive Sites.

16942.

Write a short note on latest mobile technology

Answer»

Answer:

Mobile TECHNOLOGY is the technology used for cellular communication. Mobile code-division multiple access (CDMA) technology has evolved rapidly over the past few YEARS. Since the start of this millennium, a standard mobile device has gone from being no more than a simple two-way pager to being a mobile phone, GPS navigation device, an embedded web browser and instant messaging client, and a handheld gaming console. MANY experts believe that the future of COMPUTER technology rests in mobile computing with wireless networking. Mobile computing by way of TABLET computers are becoming more popular. Tablets are available on the 3G and 4G networks.

16943.

What do you understand by e-commerce. List down its benefits.​

Answer»

Answer:

Several advantages of ECOMMERCE development are: Low Financial cost- One of the major benefits of e-commerce website development is that it has LOWER startup cost. Physical stores MAY have to pay a lot of money for setting up an e-commerce store. But, online e-commerce store do not has to spend THOUSANDS of money.

PLEASE MARK AS BRAINLIST AND FOLLOW ME.

16944.

1)What is the use of Cc and Bec in an email?​

Answer»

ANSWER:

CC is used to SEND MAIL to many people at a time .

16945.

How to convert rich text to plain text while exporting table from ms access vba to excel, without truncating it to 255 char?​

Answer»

Answer:

75 4

Explanation:

BOAT is the PHONE because of the EDUCATIONAL

16946.

What is layer??In computerIn easy language and small

Answer»

Answer:

A LAYER is GENERALISATION of conceptual MODEL or algorithm.

Hope it HELPS you.

16947.

Write any 2 method to rename a layer?In easy languageIn computer

Answer»

Answer:

FIRST DOUBLE click the Laya name to rename it

second WITHOUT PRESSING the ENTER or return key

16948.

What do you understand by hiding and showing a layer? how will you hide a layer ????in easy languageIn computer

Answer»

In Adobe Photoshop, Mask layers are used for hiding and revealing the layers.

EXPLANATION:

By adding mask to the layers, ONE can hide or reveal the layers in Adobe Photoshop. This is one of the compositing methodologies where it combined multiple PHOTOS into a single image. It can also remove a person or an object from the provided photo.  

There are two types of mask such as 1) Layered masks, 2) Vector masks. These both masks are very non-destructive i.e. they can UNDO the ACTION by going back and re- editing it without compromising the quality of the image.

16949.

You can play---------on the computer ​

Answer»

ANSWER:

Games , movie, AUDIO ,etc on COMPUTER

16950.

F. Long answer type questions.a Geeta has prepared Maths notes on Polynomials. Observe the following document and answerthe question given thereafter.PolynomialsAn algebraic expression in which variables involvedhave only non-negative integral powers is called apolynomial.Example:(a) 2x2-4x2 +6x-3 is a polynomial in one variable x(6) 8p'+4pP+11p²-9p is a polynomial in one variable p.Degree of the polynomial in one variableWhat is degree of the following binomial?5x2+3The answer is 2. 5x2+3 is a polynomial in x of degree 2.(i) Which paragraph alignment is used in the first paragraph? Centre(ii) Name the formatting features used to type various polynomials.(iii) Name the formatting features, Geeta used to make the title stand out.(iv) She wants to change the word 'called with the word 'known' at all places in the document.Which word processing tools can help her to do this?(v) Name the feature used to create a list of examples for various polynomials.​

Answer»

can U SEND me PHOTO from the BOOK