InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 17152. |
Segmentation eliminates external fragmentation |
|
Answer» Segmentation is SIMILAR to dynamic PARTITIONING, only this time PROCESS can have SEVERAL ... Out-swapping P2 leaves a HOLE(External fragmentation) . |
|
| 17153. |
Repetitivity and reproducivity of data means |
|
Answer» REPRODUCIBLE data REPRODUCIVITY is ONE component of the pecision of a measurement or TEST period....... it is the INDEPENDENT repitition of an experiment that serves to underpin it's reproducibility...... I hope this is useful for you...... |
|
| 17154. |
Prove that sigma is consistant and sigma infer a |
| Answer» | |
| 17155. |
Assembly language program to find the grades of the students |
|
Answer» What has to be DONE in this QUESTION WRITE it COMPLETELY |
|
| 17156. |
Properties of circle in computer graphics |
|
Answer» Properties of the Circle in computer graphics |
|
| 17158. |
Difference between microprocessor 8085 and microcontroller 8051 |
|
Answer» 8051 Microcontroller |
|
| 17159. |
How to restrict unknown web pages extension? |
|
Answer» We have to restrict unknown WEB pages by WATCHING that the end of LINK is .com or not if .com is not present in the end of link than that will be an unknown web page EXTENSION |
|
| 17160. |
which of the following correctly defines the computer system?a. hardware b. software c. hardware+software+data d. hardware+software+data+human being |
| Answer» | |
| 17161. |
Explain principles of designing algorithm in daa |
|
Answer» Hey dear... |
|
| 17162. |
An interfaces can declare public constants. true or false? mark for review (1) pointsa. true b. false |
| Answer» | |
| 17163. |
Describe the disadvantage of mean value in data analysis |
|
Answer» DISADVANTAGES are: 1.It is TIME consuming 2.Sometimes the MEAN is of no USE. |
|
| 17164. |
Explain about volatile and non‐volatile memories |
| Answer» NON volatile MEMORIES are used for long TERM and SECONDARY storage but volatile memories are used for PRIMARY storage | |
| 17165. |
Calibration error follows which distribution |
|
Answer» Hey MATE here's your answer.... |
|
| 17166. |
Application of nanotechnology in it department |
|
Answer» The Understanding Nanotechnology Website is dedicated to PROVIDING clear and CONCISE explanations of nanotechnology applications. Scan the listings below to find an application |
|
| 17167. |
What is the full form of FTP |
|
Answer» The FULL form of FTP is File Transfer PROTOCOL.......... |
|
| 17169. |
How can we convert binary number to decimal number explain with the help of an example |
|
Answer» An easy method of converting decimal to BINARY NUMBER equivalents is to write down the decimal number and to continually divide-by-2 (two) to give a result and a remainder of EITHER a “1” or a “0” until the final result equals zero. So for example. CONVERTTHE decimal number 29410 into itsbinary number equivalent. |
|
| 17170. |
Explain the binary number system and its significance |
|
Answer» A binary number is a number expressed in the BASE -2numeral system or binary NUMERAL system ,which uses only TWO symbols : |
|
| 17171. |
What will be the decimal equivalent of the number 10001000 |
|
Answer» Hey Mate ☺ |
|
| 17173. |
What is the decimal equivalent of the binary number 1011 |
| Answer» | |
| 17174. |
How to permanently delete/ erase all data from Samsung galaxy j7 securely before selling it to anyone? |
|
Answer» Reboot the phone then all FILES WOULD be COMPLETELY deleted and the SPEED would like a new phone |
|
| 17175. |
Pop bloker is an example of? |
|
Answer» A pop-up blocker (sometimes called a pop-up killer) is a program that prevents pop-ups from displaying in a user's Web browser. Pop-up blockers work in a NUMBER of ways: some close the window before it appears, some disable the COMMAND that CALLS the pop-up, and some alter the window's SOURCE HTML. |
|
| 17176. |
Define protocol and what are the main components of URL explain them briefly |
|
Answer» Here is UR answer |
|
| 17177. |
Advantages of gprs over gsm tabular form |
|
Answer» GPRS stands for general packet radio services and is a non-voice service that provides wireless packet data access within GSM -- Global System for Mobile communication -- networks. Although NEWER, faster mobile technologies such as EDGE; 3G (Third Generation); Universal Mobile Telecommunication Service; and high-speed download packet access, or HSDPA access have been developed for mobile devices, GPRS is still supported by most mobile networks. |
|
| 17178. |
The stepwise instruction that are given to the computer are called ________ |
|
Answer» COMMAND or PROGRAM HOPE IT'S HELP U |
|
| 17179. |
Given below two statements. Which of the following statements is/are correct? Statement A: Linux is an example of multitasking operating system. Statement B: DOS provides command line interface.A) Statement A is correct B) Statement B is correct C) Statement A and B are correct D) Neither statement A nor statement B is correct |
| Answer» C) both a and B are CORRECT | |
| 17180. |
Secondary memory is also known as |
| Answer» | |
| 17181. |
Which one of the following techniques of transferring data program is used to buffer data for the printer and remote batch terminals?A) Process Management B) Spooling C) Memory Management D) All of these |
|
Answer» The CORRECT ANSWER is A) PROCESS MANAGEMENT |
|
| 17182. |
................... is a technique to execute number of programs simultaneously by one processor.A) Memory management B) Multiprogramming C) Spooling D) All of these |
| Answer» B) MULTIPROGRAMMING Is the CORRECT ANSWER. | |
| 17183. |
Shell is a part of software that serves as a user interface. Which one of the following OS supports three command line shells?A) DOS B) UNIX C) Windows D) All of these |
|
Answer» B) UNIX Is the ANSWER answer UNIX OPERATING system is MADE up of TWO parts; the kernel, the shell |
|
| 17184. |
During program execution, a process needs various resources such as..................A) CPU time B) Files C) Memory space D) All of these |
|
Answer» HEY, --------------------------------------------------------------------------------------------------------- The RIGHT ANSWER is D It REQUIRES all of these Thanks |
|
| 17185. |
Which of the following statements is true? Statement A: DOS OS provides GUI environment. Statement B: Windows Server 2008 provides a GUI environment to handle network administration.A) Statement A is correct B) Statement B is correct C) Statement A and B are correct D) Neither statement A nor statement B is correct |
| Answer» | |
| 17186. |
Differentiate between copying text and moving text . |
|
Answer» If u copy a text...then the text will remain there at the ORIGINAL PLACE and u can ALSO PASTE it at any other place |
|
| 17187. |
Need a JAVA PROGRAM on- Write a program to input a number and check whether the number is twisted prime or not. |
|
Answer» CODE : import java.util.*; class twisted_prime { public VOID main() { SCANNER sc=new Scanner(System.in); System.out.println("Enter a number to check whether it is twisted prime or not"); int n=sc.nextInt(); int f=0; int c=0; for(int i=1;i<=n;i++) { if(n%i==0) { c=c+1; } } if(c==2) { f=1; } if(f==1) { int rev=0; int cpy=n; c=0; int d=0; while(n>0) { d=n%10; rev=rev*10+d; n=n/10; } for(int i=1;i<=rev;i++) { if(rev%i==0) { c=c+1; } } if(c==2) { System.out.println("Twisted prime number"); } else { System.out.println("Not a twisted prime number"); } } else { System.out.println("Not a twisted prime number"); } } } The number is TAKEN as input with the help of scanner class . Then we check whether the number is prime or not by using for loop and counter variable . Then we can reverse the number using digit extraction . After that check whether the reverse of the number is prime or not . Then if both conditions are TRUE we will print that the numbers are twisted primes otherwise not . |
|
| 17188. |
Find out why antibiotics should not be over use prepare a shot record |
|
Answer» HELLO user !!! Your answer :- Antibiotics are used to cure bacterial wounds /bacterial infections.These antibiotics HELPS us when we get bacterial DISEASES. They fights against these antigens and eliminate the disease. These are taken after gettingbthe infections/diseases. Excess use of Antibiotics MAY kill the useful bacteria present in stomach.So, we shouldn't use them WITHOUT doctors prescription or over dosage. Killing these useful bacteria will cause many other health problems too. Hope this helps you dear ^_^ |
|
| 17189. |
What do you mean by implicitly adding a null value? appropriate answer is required for exam |
|
Answer» NULL represents an UNKNOWN VALUE. It is |
|
| 17190. |
State the reasons of convergence |
|
Answer» The cause of convergence INSUFFICIENCY isn't KNOWN, but it INVOLVES a misalignment of the eyes when FOCUSING on nearby OBJECTS. The misalignment involves the muscles that move the eye. Typically, one eye drifts outward when you're focusing on a word or object at close range. |
|
| 17191. |
What are the limitations of internal memory? |
| Answer» | |
| 17192. |
Which port a mouse should be connected? |
|
Answer» A dedicated socket in the computer for a mouse. On the first desktop PCs, the mouse connected via the SERIAL port, which was superseded by the PS/2 port. TODAY, MICE plug into any USBport, although MOTHERBOARDS with PS/2 sockets are still made (SEE PS/2 port). |
|
| 17193. |
Give any example of hybrid computer in our daily life |
|
Answer» A hybrid computer exhibits features of both analog computers and digital computers. It applies the real-time speed of the analog computer and the ACCURACY of the digital computer to the solution of problems that are BEYOND the capabilities of EITHER. An example was the HYDAC 2400, a hybrid computer released by EAI in 1963. |
|
| 17194. |
Why do we need language processors? |
|
Answer» To UNDERSTAND each other we NEED LANGUAGE PROCESSOR |
|
| 17195. |
Where do you find analog computers in daily life? |
|
Answer» Analog COMPUTER inserted into:- |
|
| 17196. |
Which memory is responsible for booting system? |
|
Answer» When you turn on your computer, chances are that the operating SYSTEMHAS been set up to boot (load into RAM) AUTOMATICALLY in this SEQUENCE: As soon as the computer is turned on, the basic input-output system (BIOS) on your system's read-only memory(ROM) chip is "woken up" and takes charge. |
|
| 17197. |
What is hacking ?it is ligel or eligel? |
|
Answer» Hacking it MEANS that to HACK or take ANYONES system in our HAND . |
|
| 17198. |
When a processor processes the task , the related data resides in which memory? |
|
Answer» RAM or random access MEMORY is the memory device where the related data resides when the CPU processes the program. This is generally TERMED as the short term memory as the information is stored for the temporary basis. Data values are primarily stored in RAM before it is PROCESSED out as output. |
|
| 17199. |
HEYYA FRNDS. HOW TO USE CIVIL 3D AUTOCAD CAN YOU EXPLAIN BASICS OF IT. |
|
Answer» This guide is a great PLACE to get STARTED if you just completed your initial training, or to REFRESH your memory if you use AutoCAD only occasionally. The included commands are grouped together according to types of activity, and are arranged to follow a general WORKFLOW. |
|
| 17200. |
Subjective probability in artificial intelligence |
|
Answer» I genaral, we want a calculus for belief that can be USED for making decisions. The views of probability as a belief, as opposed to being a FREQUENCY is known as Bayesian probability or SUBJECTIVE probability. The term subjective does not MEAN arbitrary, but rather it means "belonging to the subject" |
|