InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 17102. |
The html global attribute, "contenteditable" is used to: |
|
Answer» HEY mate here is your ANSWER.... ....... contenteditableSpecifies whether the CONTENT of an ELEMENT is editable or not... |
|
| 17103. |
The exception which will be thrown when handling insufficient memory |
|
Answer» jawiwiiwwiwiwiiwiwiw822827whw |
|
| 17104. |
The ability for a protocol or program to determine that something went wrong is known as ________. |
|
Answer» Error detection" is the correct answer for the fill in the blanks. Error detection vodes HELP in detecting any erroris execution of a programme and transmits the information to the PROGRAMMER who can then make the necessary CHANGES to correct the error. There are MULTIPLE forms of Error detection codes, the simpler forms of which are simple parity check and two DIMENSIONAL parity check. All of the error detection codes act by the same principle of performing checks of the validity of the code, and then transmitting information about its validity. |
|
| 17105. |
Tags which are used to create sections in a web page is collectively known as |
|
Answer» These are known as HTML Brahmaputra |
|
| 17106. |
Television, the internet, and smartphones are different communication _______ hsn uses in its imc. |
|
Answer» Since the options are not given, I am giving a general answer. |
|
| 17107. |
Can anyone tell me that is kali linux can be run in 2 GB ram? plz help me |
|
Answer» HI, Well, it depends upon the type of Kali release you want to run. If you want to run Kali Light than it's awesome to run it on 2 GB ram. If you want to run Kali Main than 2 GB is not good enough, you will have hang ups in your USING your System. You can also install the Kali Light or Kali Main On a bootable Pendrive. Kali light requires at LEAST 2 GB of SPACE of your Pendrive and Kali main requires at least 4 GB of space of your Pendrive. No, You can't run the Simple ( Main ) Version Kali on a 2 GB Ram. You can run but it's not good. Hoping it helps :) |
|
| 17108. |
Prove that if all its edge weights are distinct, then it has a unique minimum spanning tree |
|
Answer» We have an algorithm that finds an MST (which we will call A) based on the structure of the graph and |
|
| 17109. |
Programs about verification of imei numbers in c programming |
|
Answer» The IMEI is validated in following steps: |
|
| 17110. |
What is fall through? |
| Answer» ABSENCE of BREAK statement in a switch case PROGRAM causes a procedure called fall through | |
| 17111. |
Differentiate between moving and copying a file |
|
Answer» Copying a FILE, folder or PIECE of content means DUPLICATING it. It appears in its new location and remains in its OLD one too. Theassociated keyboard shortcuts are "Ctrl+C" (or "Command+C" on a Mac) to copy whatever is selected and "Ctrl+V" ("Command+V") to paste it into a new location. |
|
| 17112. |
Write a program in Java to print12 63 7 104 8 11 135 9 12 17 15 |
|
Answer» Import java.util.*. |
|
| 17113. |
A ..... does not keep track of address of every element in the list. Explain also.1 stack 2 queue 3 string 4 linear array |
| Answer» STRING MAY be I THINK | |
| 17114. |
Is it compulsory to write the gst number in front of the gate? |
|
Answer» Yes |
|
| 17115. |
Multimedia definition in computer graphics |
| Answer» MULTIMEDIA is the field concerned with the computer-controlled integration of text, GRAPHICS, drawings, still and moving images (VIDEO), animation, audio, and any other media where EVERY type of information can be represented, stored, TRANSMITTED and processed digitally. | |
| 17116. |
Name a storage device that is a part of secondary memory |
|
Answer» HARD drives , FLOPPY disk and C.D are some storage DEVICES that are a PART of secondary memory . please MARK the answer as the brainliest answer. |
|
| 17117. |
How to place a text in center in a cell of a table in msword? |
|
Answer» :::::::::::::::::::::::::::::::::::::::::::::::::: |
|
| 17118. |
How many pairs of stations can simultaneously communicate on ethernet lan? |
|
Answer» Only 1 STATION can simultaneously communicate on ethernet LAN |
|
| 17119. |
How many keys are required for two people to communicate via a cipher? |
|
Answer» If both sender and receiver use the same key, the SYSTEM is referred as SYMMETRIC , single-key, secret-key or conventional encryption. If both sender and receiver USES a different key, the system is referred as ASYMMETRIC |
|
| 17120. |
Who won the match today? rcb v kkr |
| Answer» RCB will DEFINITELY WIN the MATCH | |
| 17121. |
How many bit strings of length eight contain either three consecutive 0s or four consecutive 1s? |
|
Answer» First let us compute the number of bit strings with 3 consecutive 0's. |
|
| 17122. |
The address of a cell in row 12, column K is..... |
|
Answer» The POSITION will be 12,11 |
|
| 17124. |
How multiplexing is done in 8085 microprocessor for address bus and data bus? |
|
Answer» The major reason of MULTIPLEXING ADDRESS and data BUS is to reduce the number of PINS for address and data and DEDICATE those pins for other several functions of microprocessor. |
|
| 17125. |
Explain instruction, transaction, task, thread level parallelism |
|
Answer» Limited in PRACTICE by data and control DEPENDENCES. ▫ Thread-level or task-level PARALLELISM (TLP). – Multiple THREADS or instruction sequences from the same application can be. |
|
| 17126. |
What factors led to the inventions of calculating machines? |
|
Answer» The history of computing hardware covers the developments from early simple devices to aid calculation to modern day computers. Before the 20th CENTURY, most calculations were DONE by humans. Early mechanical tools to help humans with digital calculations, such as the abacus, were called "calculating machines", called by PROPRIETARY names, or referred to as calculators. The machine operator was called the computer. The first aids to computation were purely mechanical devices which required the operator to set up the initial values of an elementary arithmetic operation, then manipulate the device to obtain the result. Later, computers represented numbers in a continuous form, for instance distance along a scale, rotation of a shaft, or a voltage. Numbers could also be represented in the form of digits, AUTOMATICALLY manipulated by a mechanical mechanism. Although this approach generally required more complex mechanisms, it greatly increased the precision of results. A series of breakthroughs, such as miniaturized transistor computers, and the integrated circuit, caused digital computers to largely replace analog computers. The cost of computers gradually became so low that by the 1990s, personal computers, and then, in the 2000s, mobile computers, (smartphones and TABLETS) became ubiquitous in industrialized countries |
|
| 17127. |
Does search engine optimization comes under software engineer |
|
Answer» Here your ANSWER plz. |
|
| 17128. |
A ……….. is a graph that has weights of costs associated with its edges.1)Network 2)Weighted graph 3)Both A and B 4)None A and B |
| Answer» WEIGHTED GRAPH is the ANSWER.... | |
| 17129. |
Difference between network layer delivery and transport layer delivery |
|
Answer» Network layer delivery is related to the transfer of packets ACROSS various networks from SOURCE to destination. The delivery is purely CONNECTION oriented. Transport layer delivery is related to the transfer of the entire MESSAGE from source to destination. The delivery can be EITHER connection oriented or connectionless. |
|
| 17130. |
Difference between continuous and discrete system in tabular form |
|
Answer» A DISCRETE SERIES is the series in which each item of discrete series has frequency corresponding to it and the item is not in the FORM of class INTERVAL. |
|
| 17132. |
What is used to provide weight on the bit? |
|
Answer» Weight on bit is provided by drill collars, which are thick-walled tubular pieces machined from solid BARS of steel, usually plain carbon steel but sometimes of nonmagnetic nickel-copper alloy or other nonmagnetic premium alloys. Gravity acts on the large mass of the collars to PROVIDE the downward force needed for the bits to efficiently break rock. To accurately control the amount of force applied to the bit, the driller CAREFULLY monitors the surface weight measured while the bit is just off the bottom of the wellbore. Next, the drillstring (and the drill bit), is slowly and carefully lowered until it touches bottom. After that point, as the driller CONTINUES to lower the top of the drillstring, more and more weight is applied to the bit, and correspondingly less weight is measured as hanging at the surface. If the surface measurement shows 20,000 pounds [9080 kg] less weight than with the bit off bottom, then there should be 20,000 pounds force on the bit (in a vertical hole). Some downhole MWD sensors can measure weight-on-bit more accurately and transmit the data to the surface.[2] |
|
| 17133. |
Define the concept of aggregation. give two examples of where this concept is useful |
|
Answer» 8yuocoucvvipvipvuvig779b |
|
| 17134. |
What is the use of twocores in processors? |
|
Answer» A multi-core PROCESSOR is an integrated circuit (IC) to which two or more PROCESSORS have been attached for enhanced performance, reduced POWER consumption and more efficient simultaneous PROCESSING of multiple tasks ( SEE parallel processing ). |
|
| 17135. |
What is time invariant network in circuits? |
|
Answer» A network, in the CONTEXT of |
|
| 17136. |
What is the meaning of training methodology? |
|
Answer» Training is teaching, or DEVELOPING in oneself or OTHERS, any skills and knowledge that relate to specific useful competencies. Training has specific goals of IMPROVING one's capability, capacity, PRODUCTIVITY and PERFORMANCE. |
|
| 17137. |
Create a script file of your own that can fit a least square line to your data |
|
Answer» Ivuvuofggugupuig9igi9gipgigig |
|
| 17138. |
What is the reason to get fatal system error? |
|
Answer» A fatal system error, also KNOWN as a |
|
| 17139. |
What is red black tree? define its properties? |
|
Answer» A red–black tree is a kind of self-balancing binary search tree in computer science. Each NODE of the binary tree has an extra bit, and that bit is often interpreted as the color (red or black) of the node. These color BITS are USED to ensure the tree remains APPROXIMATELY balanced during insertions and deletions. |
|
| 17140. |
Coding by combinations of letters, numbers or symbols clerical aptitude' |
| Answer» | |
| 17141. |
What is meant by hazards in computer architecture? |
| Answer» | |
| 17142. |
What is overflow in computer organization? |
| Answer» | |
| 17143. |
What is default router and how does it wrk? |
|
Answer» The router used to forward all TRAFFIC that is not addressed to a STATION WITHIN the local network or local subnet |
|
| 17144. |
What is geometric programming in optimization? |
|
Answer» Geometric PROGRAMMING was introduced in 1967 by Duffin, Peterson and Zener. It is very useful in the APPLICATIONS of a variety of OPTIMIZATION problems, and falls under the general class of signomial problems[1]. It can be used to solve large scale, practical problems by quantifying them into a mathematical optimization model. Geometric programs (GP) are useful in the context of geometric design and models well approximated by power laws. Applications of GP include electrical circuit design and other topics such as finance and statistics[2]. |
|
| 17145. |
What is data communication system components? |
|
Answer» The BASIC COMPONENTS of DATA COMMUNICATIONS are as follows: |
|
| 17148. |
Differtiate between in wi-fi and wimax |
|
Answer» HEY friend..... :-) Here is your answer Whereas WiFi is for local hotspots, WiMax has medium bandwidth as well as ten Megabites of bandwidth for a local LAN CONNECTION. ... BASICALLY, WiFi is access to a LAN, and while WiMax can be USED for that, ONE of its most beneficial uses is as a fixed wireless solution. Hoping it helps Thanks :-) |
|
| 17149. |
What are different method of sectioning in surpac? |
|
Answer» After sectioning all the hole sets, a solid model representation of the ore deposit was. ... Goal: This PROJECT deals with the METHOD of opencast MINE modeling using SURPAC SOFTWARE . |
|