Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

17151.

Write a short noe on data scaning devices

Answer»

These DEVICES are USED for SCANNING DATA

17152.

Segmentation eliminates external fragmentation

Answer»

Segmentation is SIMILAR to dynamic PARTITIONING, only this time PROCESS can have SEVERAL ... Out-swapping P2 leaves a HOLE(External fragmentation) .

17153.

Repetitivity and reproducivity of data means

Answer» REPRODUCIBLE data REPRODUCIVITY is ONE component of the pecision of a measurement or TEST period....... it is the INDEPENDENT repitition of an experiment that serves to underpin it's reproducibility......
I hope this is useful for you......
17154.

Prove that sigma is consistant and sigma infer a

Answer»

It's too LONG you MAY have to PREFER NCERT

17155.

Assembly language program to find the grades of the students

Answer»

What has to be DONE in this QUESTION WRITE it COMPLETELY

17156.

Properties of circle in computer graphics

Answer»

Properties of the Circle in computer graphics

i) Circle is defined as a set of POINTS that are all at a given distance r from a center position (Xc,Yc).
ii) (X-Xc)2 +(Y-Yc)2=r2
iii) BRESENHAM's line ALGORITHM for raster display is adapted to circle generation by setting up the decision parameters for finding the closest pixel for each sampling step.

Hope it HELPS!

17157.

How many types of software defined radio?

Answer» 5 TYPES of SOFTWARE DEFINED RADIO
17158.

Difference between microprocessor 8085 and microcontroller 8051

Answer»

8051 Microcontroller

8051 is the microcontroller developed by Intel. Following are the features of 8051 Microcontroller: 
• It houses 8 BIT CPU.
• 4 KByte ROM used for code or program storage 
• 128 Byte RAM to store data or variables used in program 
• 32 Input/Output lines with 4 ports ( 8 lines per port)
• 2 Timers used for introducing delay and for setting the baud rate for data communication.
• 1 serial Port with one TxD and one RxD LINE used for serial communication with external devices.
• 6 Interrupt Sources
• Clock oscillator circuit runs at 12MHz FREQUENCY


8085 Microprocessor

8085 is the microprocessor developed by Intel. Following are the features of 8085 Microprocessor: 
• It is 8 bit size processor developed as single chip using N-MOS.
• It has multiplexed address and data bus on 8 lines AD0 to AD7.
• The maximum clock frequency used in 8085 is 3 MHz.
• It has 40 pins and runs at 5V power supply.
• There are 5 hardware interrupts viz. TRAP, INTR, RST5.5, RST6.5, RST7.5 
• It has about 74 programming instructions with 4 addressing modes. 
• It does not house memory, but it has 16 address lines which can access 64K bytes (2^16) of externally connected memory. 
• It has 8 bit lines which can address 256 (~2^8) ports connected externally. 
• It has TWO serial lines viz. SID and SOD. These can be connected with serial peripherals. 
• It consists of ACC, one flag register, 6 general PURPOSE registers and two special registers(SP-Stack Pointer, PC-Program Counter).

17159.

How to restrict unknown web pages extension?

Answer»

We have to restrict unknown WEB pages by WATCHING that the end of LINK is .com or not if .com is not present in the end of link than that will be an unknown web page EXTENSION

17160.

which of the following correctly defines the computer system?a. hardware b. software c. hardware+software+data d. hardware+software+data+human being

Answer»

C.hardware +SOFTWARE+ DARA is the ANSWER

17161.

Explain principles of designing algorithm in daa

Answer»

Hey dear...

When you hear the word "algorithm," you probably respond in one of three ways:

You immediately KNOW and understand what we're talking about because you studied COMPUTER science.You know that algorithms are the workhorses of companies like Google and Facebook, but you aren't really sure what the word means.You run and HIDE in fear because everything you know about algorithms reminds you of high-school Calculus nightmares.

Hope it will help U...

17162.

An interfaces can declare public constants. true or false? mark for review (1) pointsa. true b. false

Answer»

The ANSWER for this QUESTION is

TRUE

17163.

Describe the disadvantage of mean value in data analysis

Answer» DISADVANTAGES are:
1.It is TIME consuming
2.Sometimes the MEAN is of no USE.
17164.

Explain about volatile and non‐volatile memories

Answer» NON volatile MEMORIES are used for long TERM and SECONDARY storage but volatile memories are used for PRIMARY storage
17165.

Calibration error follows which distribution

Answer»

Hey MATE here's your answer....

CALIBERATION error FOLLOWS RECTANGULAR distribution.

Hope it helps ☺️

17166.

Application of nanotechnology in it department

Answer»

The Understanding Nanotechnology Website is dedicated to PROVIDING clear and CONCISE explanations of nanotechnology applications. Scan the listings below to find an application

The 2000s have seen the beginnings of the applications of nanotechnology in commercial products, although most applications are limited to the BULK USE of passive nano materials.

hope it helps u frnd
:-))))))))))

17167.

What is the full form of FTP

Answer»

The FULL form of FTP is File Transfer PROTOCOL..........
It is USED for the transfer of computer FILES between a client and server on computer network.

17168.

What is the meaning of F&ec

Answer» F = force
ec = ELECTRIC CURRENT
17169.

How can we convert binary number to decimal number explain with the help of an example

Answer»

An easy method of converting decimal to BINARY NUMBER equivalents is to write down the decimal number and to continually divide-by-2 (two) to give a result and a remainder of EITHER a “1” or a “0” until the final result equals zero. So for example. CONVERTTHE decimal number 29410 into itsbinary number equivalent.

17170.

Explain the binary number system and its significance

Answer»

A binary number is a number expressed in the BASE -2numeral system or binary NUMERAL system ,which uses only TWO symbols :
typically 0(zero) and 1 (one)...

17171.

What will be the decimal equivalent of the number 10001000

Answer»

Hey Mate ☺

Here is your solution :-

__________________________


(10001000) = (136)^10

________


Write down the BINARY NUMBER -

10001000

Now, multiply each digit of the binary number by the CORRESPONDING power of two:

1x2^7 + 0x2^6 + 0x2^5 + 0x2^4 + 1x2^3 + 0x2^2 + 0x2^1 + 0x2^0

Solve the powers -:

1x128 + 0x64 + 0x32 + 0x16 + 1x8 + 0x4 + 0x2 + 0X1 = 128 + 0 + 0 + 0 + 8 + 0 + 0 + 0

Add up the numbers written above -:

128 + 0 + 0 + 0 + 8 + 0 + 0 + 0 = 136. This is the decimal equivalent of the binary number 10001000.


___________________________

Hope it helps ☺

17172.

What is the complement of the number 1111

Answer»

The CORRECT ANSWER is 921

17173.

What is the decimal equivalent of the binary number 1011

Answer»

Binary NUMBER DECIMAL Number HEX Number
1010. 10 A
1011 11 B

17174.

How to permanently delete/ erase all data from Samsung galaxy j7 securely before selling it to anyone?

Answer»

Reboot the phone then all FILES WOULD be COMPLETELY deleted and the SPEED would like a new phone

17175.

Pop bloker is an example of?

Answer»

A pop-up blocker (sometimes called a pop-up killer) is a program that prevents pop-ups from displaying in a user's Web browser. Pop-up blockers work in a NUMBER of ways: some close the window before it appears, some disable the COMMAND that CALLS the pop-up, and some alter the window's SOURCE HTML.

17176.

Define protocol and what are the main components of URL explain them briefly

Answer»

Here is UR answer
URL is an ACRONYM for Uniform Resource Locator and is a reference (an address) to a resource on the INTERNET. A URLhas two main components: ... Note that the protocol identifier and the resource name are separated by a COLON and twoforward slashes.

17177.

Advantages of gprs over gsm tabular form

Answer»

GPRS stands for general packet radio services and is a non-voice service that provides wireless packet data access within GSM -- Global System for Mobile communication -- networks. Although NEWER, faster mobile technologies such as EDGE; 3G (Third Generation); Universal Mobile Telecommunication Service; and high-speed download packet access, or HSDPA access have been developed for mobile devices, GPRS is still supported by most mobile networks.
Cost
Communication via GPRS is cheaper than through the regular GSM network. Instant-messenger services and mobile email facilities allow you to send longer messages for cheaper rates through the GPRS connection, as opposed to transmitting messages in SMS or short message service. CUSTOMERS only pay for the amount of data transported, and not for the duration of the Internet connection.
Constant Connection
Through GPRS technology, users are constantly connected to the Internet. As GPRS services are available wherever there is GSM coverage, it allows you to connect to the Internet even when other services such as 3G or HSDPA are not available.
Mobility
GPRS provides wireless access to the Internet from any location where there is a network signal. This enables you to SURF the Internet on your laptop or phone, even in remote areas.
Speed
Although new, faster technology exists today, GPRS is still faster than the older WAP (Wireless Application Protocol) and regular GSM services. GPRS data is transferred at speeds ranging from 9.6 kilobytes per second up to 114kbps.
Simultaneous Use
When you access the Internet through GPRS, it does not block incoming calls through the GSM network. This enables you to make or receive voice calls while you are browsing the Internet or downloading data.

17178.

The stepwise instruction that are given to the computer are called ________

Answer» COMMAND or PROGRAM



HOPE IT'S HELP U
17179.

Given below two statements. Which of the following statements is/are correct? Statement A: Linux is an example of multitasking operating system. Statement B: DOS provides command line interface.A) Statement A is correct B) Statement B is correct C) Statement A and B are correct D) Neither statement A nor statement B is correct

Answer» C) both a and B are CORRECT
17180.

Secondary memory is also known as

Answer»

I THINK secondary MEMORY is also KNOWN as main memory.

17181.

Which one of the following techniques of transferring data program is used to buffer data for the printer and remote batch terminals?A) Process Management B) Spooling C) Memory Management D) All of these

Answer»

The CORRECT ANSWER is A) PROCESS MANAGEMENT

17182.

................... is a technique to execute number of programs simultaneously by one processor.A) Memory management B) Multiprogramming C) Spooling D) All of these

Answer» B) MULTIPROGRAMMING Is the CORRECT ANSWER.
17183.

Shell is a part of software that serves as a user interface. Which one of the following OS supports three command line shells?A) DOS B) UNIX C) Windows D) All of these

Answer»

B) UNIX Is the ANSWER answer UNIX OPERATING system is MADE up of TWO parts; the kernel, the shell

17184.

During program execution, a process needs various resources such as..................A) CPU time B) Files C) Memory space D) All of these

Answer» HEY,
---------------------------------------------------------------------------------------------------------
The RIGHT ANSWER is D 
It REQUIRES all of these

Thanks
17185.

Which of the following statements is true? Statement A: DOS OS provides GUI environment. Statement B: Windows Server 2008 provides a GUI environment to handle network administration.A) Statement A is correct B) Statement B is correct C) Statement A and B are correct D) Neither statement A nor statement B is correct

Answer»

A) STATE MENT is acorrect ANSWER

17186.

Differentiate between copying text and moving text .

Answer»

If u copy a text...then the text will remain there at the ORIGINAL PLACE and u can ALSO PASTE it at any other place
but if u move a text...the text will be removed from its original place.
That's the difference

17187.

Need a JAVA PROGRAM on- Write a program to input a number and check whether the number is twisted prime or not.

Answer»

CODE :

import java.util.*;

class twisted_prime

{

   public VOID main()

   {

       SCANNER sc=new Scanner(System.in);

       System.out.println("Enter a number to check whether it is twisted prime or not");

       int n=sc.nextInt();

       int f=0;

       int c=0;

       for(int i=1;i<=n;i++)

       {

           if(n%i==0)

           {

               c=c+1;

           }

       }

       if(c==2)

       {

           f=1;

       }

       if(f==1)

       {

           int rev=0;

           int cpy=n;

           c=0;

           int d=0;

           while(n>0)

           {

               d=n%10;

               rev=rev*10+d;

               n=n/10;

           }

           for(int i=1;i<=rev;i++)

           {

               if(rev%i==0)

               {

                   c=c+1;

               }

           }

           if(c==2)

           {

               System.out.println("Twisted prime number");

           }

           else

           {

               System.out.println("Not a twisted prime number");

           }

       }

       else

       {

           System.out.println("Not a twisted prime number");

       }

   }

}

EXPLANATION:

The number is TAKEN as input with the help of scanner class .

Then we check whether the number is prime or not by using for loop and counter variable .

Then we can reverse the number using digit extraction .

After that check whether the reverse of the number is prime or not .

Then if both conditions are TRUE we will print that the numbers are twisted primes otherwise not .

17188.

Find out why antibiotics should not be over use prepare a shot record

Answer» HELLO user !!!

Your answer :-

Antibiotics are used to cure bacterial wounds /bacterial infections.These antibiotics HELPS us when we get bacterial DISEASES. They fights against these antigens and eliminate the disease. These are taken after gettingbthe infections/diseases. Excess use of Antibiotics MAY kill the useful bacteria present in stomach.So, we shouldn't use them WITHOUT doctors prescription or over dosage. Killing these useful bacteria will cause many other health problems too.

Hope this helps you dear ^_^
17189.

What do you mean by implicitly adding a null value? appropriate answer is required for exam

Answer»

NULL represents an UNKNOWN VALUE. It is
not an empty string, or a zero value. These are all valid values, and are not NULLs.
When a table is created or the format
altered , columns can be SPECIFIED as accepting NULL values, or not accepting them, with the NULL and NOT NULL clauses respectively.
For example, a customer table COULD contain dates of birth. For some customers, this information is unknown, so the value could be NULL.
The same system could allocate a customer ID for each customer record, and in this case a NULL value would not NULL represents an unknown value. It is
not an empty string, or a zero value. These are all valid values, and are not NULLs.
When a table is created or the format
altered , columns can be specified as accepting NULL values, or not accepting them, with the NULL and NOT NULL clauses respectively.
For example, a customer table could contain dates of birth. For some customers, this information is unknown, so the value could be NULL.
The same system could allocate a customer ID for each customer record, and in this case a NULL value would not be permitted.

17190.

State the reasons of convergence

Answer»
The cause of convergence INSUFFICIENCY isn't KNOWN, but it INVOLVES a misalignment of the eyes when FOCUSING on nearby OBJECTS. The misalignment involves the muscles that move the eye. Typically, one eye drifts outward when you're focusing on a word or object at close range.
17191.

What are the limitations of internal memory?

Answer»

I hope it helps U..... OPEN the image
#KUNAL

17192.

Which port a mouse should be connected?

Answer»

A dedicated socket in the computer for a mouse. On the first desktop PCs, the mouse connected via the SERIAL port, which was superseded by the PS/2 port. TODAY, MICE plug into any USBport, although MOTHERBOARDS with PS/2 sockets are still made (SEE PS/2 port).

17193.

Give any example of hybrid computer in our daily life

Answer»

A hybrid computer exhibits features of both analog computers and digital computers. It applies the real-time speed of the analog computer and the ACCURACY of the digital computer to the solution of problems that are BEYOND the capabilities of EITHER. An example was the HYDAC 2400, a hybrid computer released by EAI in 1963.

17194.

Why do we need language processors?

Answer»

To UNDERSTAND each other we NEED LANGUAGE PROCESSOR

17195.

Where do you find analog computers in daily life?

Answer»

Analog COMPUTER inserted into:-
Watches....Waching MACHINES.....Refrigerators.....Etc

Hope it HELPS....

17196.

Which memory is responsible for booting system?

Answer»

When you turn on your computer, chances are that the operating SYSTEMHAS been set up to boot (load into RAM) AUTOMATICALLY in this SEQUENCE: As soon as the computer is turned on, the basic input-output system (BIOS) on your system's read-only memory(ROM) chip is "woken up" and takes charge.

17197.

What is hacking ?it is ligel or eligel?

Answer»

Hacking it MEANS that to HACK or take ANYONES system in our HAND .
It is eligel to hack anyones account or anything.

17198.

When a processor processes the task , the related data resides in which memory?

Answer» RAM or random access MEMORY is the memory device where the related data resides when the CPU processes the program.

This is generally TERMED as the short term memory as the information is stored for the temporary basis.

Data values are primarily stored in RAM before it is PROCESSED out as output.
17199.

HEYYA FRNDS. HOW TO USE CIVIL 3D AUTOCAD CAN YOU EXPLAIN BASICS OF IT.

Answer»

This guide is a great PLACE to get STARTED if you just completed your initial training, or to REFRESH your memory if you use AutoCAD only occasionally. The included commands are grouped together according to types of activity, and are arranged to follow a general WORKFLOW.

17200.

Subjective probability in artificial intelligence

Answer»

I genaral, we want a calculus for belief that can be USED for making decisions. The views of probability as a belief, as opposed to being a FREQUENCY is known as Bayesian probability or SUBJECTIVE probability. The term subjective does not MEAN arbitrary, but rather it means "belonging to the subject"