Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

17101.

The url of the website is to be typed in the

Answer» SEARCH BAR on the TOP
17102.

The html global attribute, "contenteditable" is used to:

Answer» HEY mate here is your ANSWER....
.......
contenteditableSpecifies whether the CONTENT of an ELEMENT is editable or not...
17103.

The exception which will be thrown when handling insufficient memory

Answer»
y655111
jawiwiiwwiwiwiiwiwiw822827whw
17104.

The ability for a protocol or program to determine that something went wrong is known as ________.

Answer»

Error detection" is the correct answer for the fill in the blanks.

Error detection vodes HELP in detecting any erroris execution of a programme and transmits the information to the PROGRAMMER who can then make the necessary CHANGES to correct the error.

There are MULTIPLE forms of Error detection codes, the simpler forms of which are simple parity check and two DIMENSIONAL parity check.

All of the error detection codes act by the same principle of performing checks of the validity of the code, and then transmitting information about its validity.

17105.

Tags which are used to create sections in a web page is collectively known as

Answer»

These are known as HTML

tags.
This tag is used to create SECTIONS in a webpage and is supported by BROWSERS like Google CHROME, Internet Explorer/Microsoft Edge and Firefox. 
The tag is used in the following manner


   

Rivers of INDIA


   

Brahmaputra



17106.

Television, the internet, and smartphones are different communication _______ hsn uses in its imc.

Answer»

Since the options are not given, I am giving a general answer.

The correct answer should be - CHANNELS.

HSN means Home SHOPPING Network and IMC STANDS for Integrated MARKETING Communications.

The television, the internet, and the smartphones are different communication channels which the Home Shopping Network USES in its Integrated Marketing Communications.

17107.

Can anyone tell me that is kali linux can be run in 2 GB ram? plz help me

Answer» HI,

Well, it depends upon the type of Kali  release you want to run.

If you want to run Kali Light than it's awesome to run it on 2 GB ram.

 
If you want to run Kali Main than 2 GB is not good enough, you will have hang ups in your USING your System.

You can also install the Kali Light or Kali Main On a bootable Pendrive.

Kali light requires at LEAST 2 GB of SPACE of your Pendrive and Kali main requires at least 4 GB of space of your Pendrive.

No, You can't run the Simple ( Main ) Version Kali on a 2 GB Ram.

You can run but it's not good.

Hoping it helps

:)


17108.

Prove that if all its edge weights are distinct, then it has a unique minimum spanning tree

Answer»

We have an algorithm that finds an MST (which we will call A) based on the structure of the graph and
the order of the edges when ordered by weight.
2. Assume MST A is not unique.
3. There is ANOTHER spanning tree with equal weight, say MST B.
4. Let e1 be an edge that is in A but not in B.
5. Then B should include at least one edge e2 that is not in A.
6. Assume the weight of e1 is less than that of e2.
7. As B is a MST, {e1} B MUST contain a cycle.
8. Replace e2 with e1 in B yields the spanning tree {e1} B - {e2} which has a SMALLER weight COMPARED to B.
9. CONTRADICTION. As we assumed B is a MST but it is not.

17109.

Programs about verification of imei numbers in c programming

Answer»

The IMEI is validated in following steps:

STARTING from the RIGHTMOST digit, DOUBLE the VALUE of every second digit (e.g., 7 becomes 14).If doubling of a number results in a two digits number i.e greater than 9(e.g., 7 × 2 = 14), then add the digits of the product (e.g., 14: 1 + 4 = 5), to get a single digit number.Now take the sum of all the digits.Check if the sum is divisible by 10 i.e.(total modulo 10 is EQUAL to 0) then the IMEI number is valid; else it is not valid.

17110.

What is fall through?

Answer» ABSENCE of BREAK statement in a switch case PROGRAM causes a procedure called fall through
17111.

Differentiate between moving and copying a file

Answer»

Copying a FILE, folder or PIECE of content means DUPLICATING it. It appears in its new location and remains in its OLD one too. Theassociated keyboard shortcuts are "Ctrl+C" (or "Command+C" on a Mac) to copy whatever is selected and "Ctrl+V" ("Command+V") to paste it into a new location.

17112.

Write a program in Java to print12 63 7 104 8 11 135 9 12 17 15

Answer»

Import java.util.*.
class Number

public STATIC void MAIN ()

Scanner in=new Scanner;
int a b C d e
System.out.println(print 1 26 3710 59121215)



17113.

A ..... does not keep track of address of every element in the list. Explain also.1 stack 2 queue 3 string 4 linear array

Answer» STRING MAY be I THINK
17114.

Is it compulsory to write the gst number in front of the gate?

Answer»

Yes

may be

................

17115.

Multimedia definition in computer graphics

Answer» MULTIMEDIA is the field concerned with the computer-controlled integration of text, GRAPHICS, drawings, still and moving images (VIDEO), animation, audio, and any other media where EVERY type of information can be represented, stored, TRANSMITTED and processed digitally.
17116.

Name a storage device that is a part of secondary memory

Answer» HARD drives , FLOPPY disk and C.D are some storage DEVICES that are a PART of secondary memory .

please MARK the answer as the brainliest answer.
17117.

How to place a text in center in a cell of a table in msword?

Answer»

::::::::::::::::::::::::::::::::::::::::::::::::::

17118.

How many pairs of stations can simultaneously communicate on ethernet lan?

Answer»

Only 1 STATION can simultaneously communicate on ethernet LAN

17119.

How many keys are required for two people to communicate via a cipher?

Answer»

If both sender and receiver use the same key, the SYSTEM is referred as SYMMETRIC , single-key, secret-key or conventional encryption. If both sender and receiver USES a different key, the system is referred as ASYMMETRIC

17120.

Who won the match today? rcb v kkr

Answer» RCB will DEFINITELY WIN the MATCH
17121.

How many bit strings of length eight contain either three consecutive 0s or four consecutive 1s?

Answer»

First let us compute the number of bit strings with 3 consecutive 0's.
3 consecutive 0's can start at POSITION 1, 2, 3, 4, 5, or 6 (as there are total eight positions).
Starting at position 1: (strings of form 000xxxxx)
REMAINING 5 positions can be anything, count = 25 = 32.

17122.

The address of a cell in row 12, column K is.....

Answer»

The POSITION will be 12,11

17123.

The address of a cell in row 12, column K is.......

Answer»

The ADDRESS of the CELL is K12

17124.

How multiplexing is done in 8085 microprocessor for address bus and data bus?

Answer»

The major reason of MULTIPLEXING ADDRESS and data BUS is to reduce the number of PINS for address and data and DEDICATE those pins for other several functions of microprocessor.

17125.

Explain instruction, transaction, task, thread level parallelism

Answer»

Limited in PRACTICE by data and control DEPENDENCES. ▫ Thread-level or task-level PARALLELISM (TLP). – Multiple THREADS or instruction sequences from the same application can be.

17126.

What factors led to the inventions of calculating machines?

Answer»

The history of computing hardware covers the developments from early simple devices to aid calculation to modern day computers. Before the 20th CENTURY, most calculations were DONE by humans. Early mechanical tools to help humans with digital calculations, such as the abacus, were called "calculating machines", called by PROPRIETARY names, or referred to as calculators. The machine operator was called the computer.

The first aids to computation were purely mechanical devices which required the operator to set up the initial values of an elementary arithmetic operation, then manipulate the device to obtain the result. Later, computers represented numbers in a continuous form, for instance distance along a scale, rotation of a shaft, or a voltage. Numbers could also be represented in the form of digits, AUTOMATICALLY manipulated by a mechanical mechanism. Although this approach generally required more complex mechanisms, it greatly increased the precision of results. A series of breakthroughs, such as miniaturized transistor computers, and the integrated circuit, caused digital computers to largely replace analog computers. The cost of computers gradually became so low that by the 1990s, personal computers, and then, in the 2000s, mobile computers, (smartphones and TABLETS) became ubiquitous in industrialized countries

17127.

Does search engine optimization comes under software engineer

Answer»

Here your ANSWER plz.
yes, the SEARCH ENGINE OPTIMIZATION comes under software engineer.

17128.

A ……….. is a graph that has weights of costs associated with its edges.1)Network 2)Weighted graph 3)Both A and B 4)None A and B

Answer» WEIGHTED GRAPH is the ANSWER....
17129.

Difference between network layer delivery and transport layer delivery

Answer»

Network layer delivery is related to the transfer of packets ACROSS various networks from SOURCE to destination. The delivery is purely CONNECTION oriented.


Transport layer delivery is related to the transfer of the entire MESSAGE from source to destination. The delivery can be EITHER connection oriented or connectionless. 
17130.

Difference between continuous and discrete system in tabular form

Answer»

A DISCRETE SERIES is the series in which each item of discrete series has frequency corresponding to it and the item is not in the FORM of class INTERVAL.

Continuous series is the series in which there is class interval corresponding to each frequency

17131.

Why is it needed to find the mean of a data set?

Answer»

to KNOW the CENTRAL TENDENCY..

17132.

What is used to provide weight on the bit?

Answer»

Weight on bit is provided by drill collars, which are thick-walled tubular pieces machined from solid BARS of steel, usually plain carbon steel but sometimes of nonmagnetic nickel-copper alloy or other nonmagnetic premium alloys. Gravity acts on the large mass of the collars to PROVIDE the downward force needed for the bits to efficiently break rock. To accurately control the amount of force applied to the bit, the driller CAREFULLY monitors the surface weight measured while the bit is just off the bottom of the wellbore. Next, the drillstring (and the drill bit), is slowly and carefully lowered until it touches bottom. After that point, as the driller CONTINUES to lower the top of the drillstring, more and more weight is applied to the bit, and correspondingly less weight is measured as hanging at the surface. If the surface measurement shows 20,000 pounds [9080 kg] less weight than with the bit off bottom, then there should be 20,000 pounds force on the bit (in a vertical hole). Some downhole MWD sensors can measure weight-on-bit more accurately and transmit the data to the surface.[2]


17133.

Define the concept of aggregation. give two examples of where this concept is useful

Answer»

8yuocoucvvipvipvuvig779b

17134.

What is the use of twocores in processors?

Answer»

A multi-core PROCESSOR is an integrated circuit (IC) to which two or more PROCESSORS have been attached for enhanced performance, reduced POWER consumption and more efficient simultaneous PROCESSING of multiple tasks ( SEE parallel processing ).

17135.

What is time invariant network in circuits?

Answer»

A network, in the CONTEXT of
electronics, is a collection of interconnected components. Network analysis is the process of finding the voltages across, and the currents through, every component in the network. There are many different TECHNIQUES for calculating these values. However, for the most part, the applied technique assumes that the components of the network are all
linear. The methods DESCRIBED in this article are only APPLICABLE to linear network analysis, except where

17136.

What is the meaning of training methodology?

Answer»

Training is teaching, or DEVELOPING in oneself or OTHERS, any skills and knowledge that relate to specific useful competencies. Training has specific goals of IMPROVING one's capability, capacity, PRODUCTIVITY and PERFORMANCE.

17137.

Create a script file of your own that can fit a least square line to your data

Answer»

Ivuvuofggugupuig9igi9gipgigig
ib

17138.

What is the reason to get fatal system error?

Answer»

A fatal system error, also KNOWN as a
system crash , stop error, kernel error, or bug check , OCCURS when an
operating system HALTS at the MOMENT it reaches a condition where it can no longer operate safely.
In Microsoft Windows , a fatal system error can be deliberately caused from a kernel-mode DRIVER with either the
KeBugCheck or KeBugCheckEx function. [1] However, this should only be done as a last option when a critical driver is corrupted and is impossible to recover. This design parallels that in
OpenVMS .

17139.

What is red black tree? define its properties?

Answer»

A red–black tree is a kind of self-balancing binary search tree in computer science. Each NODE of the binary tree has an extra bit, and that bit is often interpreted as the color (red or black) of the node. These color BITS are USED to ensure the tree remains APPROXIMATELY balanced during insertions and deletions.

17140.

Coding by combinations of letters, numbers or symbols clerical aptitude'

Answer»

What do you WANT to ASK

17141.

What is meant by hazards in computer architecture?

Answer»
17142.

What is overflow in computer organization?

Answer»
17143.

What is default router and how does it wrk?

Answer»

The router used to forward all TRAFFIC that is not addressed to a STATION WITHIN the local network or local subnet

17144.

What is geometric programming in optimization?

Answer»

Geometric PROGRAMMING was introduced in 1967 by Duffin, Peterson and Zener. It is very useful in the APPLICATIONS of a variety of OPTIMIZATION problems, and falls under the general class of signomial problems[1]. It can be used to solve large scale, practical problems by quantifying them into a mathematical optimization model. Geometric programs (GP) are useful in the context of geometric design and models well approximated by power laws. Applications of GP include electrical circuit design and other topics such as finance and statistics[2].

17145.

What is data communication system components?

Answer»

The BASIC COMPONENTS of DATA COMMUNICATIONS are as follows:

Message.Sender.Receiver.Medium/ communication channel.Encoder and DECODER.

17146.

What are the phases of a language processor?

Answer» SORRY I didn't GET the ANSWER
17147.

What are the 3 types of sound inputs for computer?

Answer»

T6vf6 FY D5 S5 ststs5e55e9ce5 in

17148.

Differtiate between in wi-fi and wimax

Answer» HEY friend..... :-)

Here is your answer

Whereas WiFi is for local hotspots, WiMax has medium bandwidth as well as ten Megabites of bandwidth for a local LAN CONNECTION. ... BASICALLYWiFi is access to a LAN, and while WiMax can be USED for that, ONE of its most beneficial uses is as a fixed wireless solution.

Hoping it helps

Thanks :-)
17149.

What are different method of sectioning in surpac?

Answer»

After sectioning all the hole sets, a solid model representation of the ore deposit was. ... Goal: This PROJECT deals with the METHOD of opencast MINE modeling using SURPAC SOFTWARE .

17150.

Stream computing in big data

Answer»

Ya from c++ program JVC CH AATE to