InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 17201. |
Write an email to the editor of a local daily highlighting the problem of ragging in educational institutions also suggest steps to deal with pecans |
| Answer» ONE MINUTES pls I will write in a PAPER and UPLOAD | |
| 17202. |
Write an email to your friend inviting him to join you in a trip to the hill station during summer vacation wiki |
|
Answer» Dear ............., I reached Shimla yesterday. I was tired of the scorching heat of the plains. I’m glad to state that Shimla is just like a paradise. It is rightly called like Mussourie, the Quean of Hills. It is all pleasant here. A cool breeze is always BLOWING. The rain is frequent but it is not inundating as in the plains. All AROUND Shimla there are lush green forests of pine and other trees. There are sparkling SPRINGS everywhere. I, therefore, invite you to come here and stay with me during the summer vacation. Then we’ll visit Jakhu, Kufri and other places and have frequent walking trips in forests and over the hills. I live here with my uncle who is a very generous, jolly person. Convey my REGARDS to your REVERED parents. Yours sincerely, ........................ |
|
| 17203. |
Write and drawing 3 different objects having different length |
|
Answer» LET the length of ONE be 3cm , other 4CM and 7cm Now draw it using ruler |
|
| 17204. |
Why is adaptive routing superior to non adaptive routing? |
|
Answer» Answer: The purpose of adaptive routing is to help prevent packet DELIVERY FAILURE, improve network performance and RELIEVE network congestion. ... Because routers share INFORMATION about the network topology, adaptive routing can be less secure than non-adaptive routing processes and REQUIRE more bandwidth. |
|
| 17205. |
Why orthogonal and orthonormal vectors are used in digital communication? |
|
Answer» Orthogonal mean that the dot product is NULL. |
|
| 17206. |
Why flash memory perferred more than other memory in 2mark? |
|
Answer» Flash memory is used in enterprise server, storage and networking technology, as well as in a wide range of consumer devices, including USB flash drives, mobile phones, digital CAMERAS, tablet computers, PC cards in notebook computers and embedded controllers . For instance, NAND flash-based solid-state drives are often used to accelerate the performance of I/O-intensive applications. NOR flash memory is often used to hold control code, such as the basic input/output system (BIOS), in a PC. |
|
| 17207. |
Which was your typing speed? gross speed or net speed? |
|
Answer» In TYPING your GROSS speed means the total NUMBER of words that you write in a minute. |
|
| 17208. |
Reflection in computer graphics with example |
|
Answer» Reflection in computer graphics is used to emulate REFLECTIVE OBJECTS like mirrors and shiny SURFACES. ... Sometimes, it is a setting which is the opposite of blurry (e.g. when "glossiness" has a low value, the reflection is blurry). |
|
| 17209. |
What is message word and code word in computer network? |
|
Answer» In communication, a code word is an ELEMENT of a standardized code or protocol. Each code word is assembled in accordance with the specific RULES of the code and ASSIGNED a unique meaning. Code words are typically used for REASONS of reliability, clarity, BREVITY, or secrecy. |
|
| 17210. |
What is constructor? what are its special characteristics? |
|
Answer» Constructors have the same name as that of the class they BELONG to. Constructors are executed when an object is declared. The main function of constructor is to initialize objects and allocate appropriate memory to objects. Though constructors are executed IMPLICITLY, they can be invoked explicitly |
|
| 17211. |
What library function we should use for string in c++? |
| Answer» | |
| 17212. |
Os virtualization vs hardware virtualization |
|
Answer» In OPERATING-system-levelvirtualization, a physical server isvirtualized at the operating system level, enabling MULTIPLE isolated and SECURE virtualizedservers to run on a singlephysical server. The "guest" operating system environments SHARE the same running instance of the operating system as the host system. |
|
| 17213. |
What is root word for 17 carbons on orgnic compoubd? |
|
Answer» HEY mate.....^_^ Here's ur ANS. ============== ↪ Root words for 17 carbons is ⬇ "HEPTDEC" HEPT for 7 and DEC for 10 ✌Hope it helps |
|
| 17215. |
Mention some of the physical properties of ethernet |
|
Answer» PHYSICAL PROPERTIES: An Ethernetsegment is IMPLEMENTED on a coaxial CABLE of up to 500m. This cable is similar to the type USED for cable TV, except that it typically has an impedance of 50 ohms instead of cable TV‟s 75 ohms. ... MultipleEthernet segments can be joined TOGETHER by repeater. |
|
| 17216. |
Peter keen says "we have learned that it is not technology that creates a " |
|
Answer» So what to do this QUESTION |
|
| 17217. |
Identify the role of firewall in information security |
|
Answer» Firewall is a software |
|
| 17218. |
How to divide 111001 and 101 in binary form |
|
Answer» In the calculator, there are two INPUT FIELDS intended for entry of binary numbers. The first field for the first number, the second to the second, respectively. Between these two fields, you must select a mathematical operation you want to implement them. You can add up and subtract, multiply and divide fractions or binary numbers. To enter a fractional binary number, you can use a dot or COMMA. After entering the numbers, and select the mathematical operation to calculate the CLICK button on them. |
|
| 17221. |
What is a full form of ARPANET |
|
Answer» HEY!!!! Full Form of => ARPANET = Advanced RESEARCH Projects Agency Network Hope this HELPS |
|
| 17222. |
How to create and write a file in command prompt? |
|
Answer» Hey mate here is your answer... |
|
| 17223. |
How to unlock lg phone forgot password without losing data? |
| Answer» THINK ur PASSWORD or GIVE it to nearby LG COMPANY shops | |
| 17224. |
How to product photoshop layers with password? |
| Answer» | |
| 17225. |
How to play sleeping dogs in pc with 32 bit? |
|
Answer» Insert your CD |
|
| 17226. |
How to ask question by taking a picture in this app |
|
Answer» While asking the question you will FIND a CAMERA button, click that OPTION and you can now take pictures and POST with the question |
|
| 17227. |
Answer all the questions in short |
|
Answer» 1. peer to peer 2. SET of rules to communicate 4 . website collection of INFORMATION which contains LINKS images videos audio nd data |
|
| 17228. |
What is the full form of vivo |
| Answer» VIVO :- VIDEO INPUT villaineously OBLITERATED | |
| 17229. |
Explain the core functions performed by a computer......plz give answer |
|
Answer» Computer |
|
| 17230. |
What are the secondary storage device used for |
|
Answer» It is USED to protect data for disaster recovery or LONG TERM retention.. |
|
| 17231. |
For the data 1,2,2,3,3,3,4,4,4,4,........9. the product of mean and mode is |
| Answer» | |
| 17232. |
Difference between cop and sop in computer graphics |
|
Answer» The COP CORRESPONDS to the center of the lens in the camera or in the eye, and in a computer graphics SYSTEM, it is the ORIGIN of the camera frame for perspective views. The projection surface is a PLANE, and the projectors are STRAIGHT lines. |
|
| 17233. |
Explain with neat fig the bluetooth protocol stack from wireless communication |
|
Answer» • OBEX: Object Exchange • TCS BIN: Telephony control protocol specification – binary • BNEP: Bluetooth network encapsulation protocol • SDP: Service discovery protocol • RFCOMM: Radio frequency comm. Radio Layer • Radio layer defined the carrier frequencies and output power • Bluetooth uses 2.4 GHZ license free band. • Frequency hopping and TDD (time division duplex) is used for transmission with fast hopping rate of 1600 hops/s. • It uses 79 hop carriers equally spaced with 1 MHz. • Gaussian FSK used for modulation. BASEBAND Layer • Baseband layer performs frequency hopping to avoid interference and to access the medium. • Defines physical links and many packet formats. • It CONTROLS: o Device Addressing o Channel control through paging and inquiry methods o Power saving operations o Flow control and synchronization among Bluetooth devices. Link Manager Protocol (LMP) • The Link Manager protocol manages various aspects of the radio link between master and slave. • The following functions are covered by LMP: o Authentication, pairing and encryption o Synchronization o Capability negotiation o QoS negotiation o Power control o Link Supervision o State and transmission mode change Logical Link Control and Adaptation Layer Protocol (L2CAP) • L2CAP is layered over the Baseband Protocol and resides in the data link layer. • L2CAP provides: o Connection-oriented and connectionless data services to upper layer protocols with protocol multiplexing capability. o Segmentation and reassembly operation. o Group abstractions. • L2CAP provides three different types of logical channels that are transported via ACL link between master and slave, these are: o Connectionless used for broadcast o Connection-oriented for data transfer with QoS flow specification. o Signaling used to exchange signaling MESSAGES between L2CAP entities. Host Controller Interface (HCI) • The HCI provides a command interface to the baseband controller and link manager. • It provides access to hardware status and control registers. • Essentially this interface provides a uniform method of accessing the Bluetooth baseband capabilities. • The HCI exists across 3 sections, The Host, Transport Layer, and Host Controller. Each of the sections has a different role to play in HCI system. • HCI defines the set of functions of a Bluetooth module that are accessible to the host and its application. • HCI can be seen as a software/hardware boundary. RFCOMM • The RFCOMM protocol provides emulation of serial ports over the L2CAP protocol. • It is a cable replacement protocol that provides a serial line interface to all the applications. • The protocol is based on the ETSI standard TS 07.10. • It supports multiple serial ports over a single physical channel. Service Discovery Protocol (SDP) • The service discovery protocol helps the applications to discover which services are available and to determine the characteristics of those available services. • SDP defines only the discovery of services, not about their usage. • New service is discovered as follows: o Client SENDS a request to search for an interested service. o Then the server responds to the client with the list of available services that match to the client’s criteria. o The client uses the list to retrieve additional service attribute for the service of interest. Profiles • Profiles are specifications which describe how Bluetooth should be used in a specific application and thus ENSURES that all devices from different manufacturers can seamlessly work with one another. • There are about a dozen profiles: Generic Access, Serial Port, Dial up Networking, FAX, Headset, LAN, Access Point, Generic Object Exchange (OBEX), File Transfer, Object Push, Synchronization, Cordless Telephony, and Intercom. • The profile concept is used to decrease the risk of interoperability problems between different manufacturers’ products. Telephony Control Protocol Specification Binary (TCS-BIN) • To define call control signaling for the establishment of voice and data calls between Bluetooth devices TCS-BIN describes a binary, packet-based, bit-oriented protocol. |
|
| 17234. |
Explain the operation performed on stack |
|
Answer» Stack Operations |
|
| 17235. |
How does a CPU works |
|
Answer» The COMPUTER does is primary work in a part of the machine we cannot see ,of the control centre that CONVERTS data INPUT into CONVERSATION output ....and this conversation is done by central Processing Unit (CPU) |
|
| 17236. |
Decimation is a process in which the sampling rate is |
|
Answer» The term downsampling usually refers to ONE step of the process,but sometimes the terms are USED interchangeably.Complementary to upsampling,which increases sampling rate,decimation is a SPECIFIC case of sample rate conversion in a multi-rate DIGITAL signal PROCESSING system |
|
| 17238. |
Computer science ....what is three addressing mode |
|
Answer» FOLLOWING are the main addressing MODES such as : 1)immediate MODE 2)INDEX mode 3)indirect mode |
|
| 17240. |
Will you get the desired output if you give wrong input? Why |
|
Answer» Hey mate here is your ANSWER.. |
|
| 17241. |
Write the topic on 'Your Sister' |
|
Answer» 'My sister' the value of sister is only who knows who have no sister . Sister is considered as a friends that all the things we tell her . If we have a sister we do many things like the playing, the home work ACTIVITES. As we are SITTING ALONE its absoultely we bored but on the place of sitting alone we have a sister we DEFINITELY enjoyed and do lot of fun. I THANX TO GOD WHO GIVE US A SISTER IN THE FORM OF FRIEND. |
|
| 17242. |
_____, a pointing device, is a mouse lying on its back. |
|
Answer» I think arrow is the POINTING device ,is a mouse LYING on its BACK... |
|
| 17243. |
Define multilevel indices in dbms with example |
|
Answer» Index records comprise search-key values and data POINTERS. Multilevel index is STORED on the disk along with the ACTUAL DATABASE FILES. ... If single-level index is used, then a large sizeindex cannot be kept in memory which leads to multiple disk accesses. |
|
| 17244. |
Explain how is data stored in hard disk |
|
Answer» When your computer stores dataon its hard DRIVE, it doesn't just throw magnetized nails into a box, all jumbled up together. Thedata is stored in a very orderly pattern on each PLATTER. BITS ofdata are arranged in concentric, circular PATHS called tracks. Each track is broken up into smaller areas called SECTORS |
|
| 17245. |
What is the importance of wild card characters in file management |
|
Answer» Wildcard characters, which can be used in SQL and other computer LANGUAGES, can shorten commands by INCLUDING a wide RANGE of ITEMS without having to mention every single item covered by the command. One scenario that calls for usage of a wildcard character is when you want to search for a SET of similar filenames at a Windows command prompt. |
|
| 17246. |
Do linear probing causes secondary clustering |
|
Answer» This phenomenon CAUSES searches for keys within the cluster to be longer. ... A related phenomenon, SECONDARY clustering, occurs more generally with OPEN addressing modes includinglinear probing and quadratic probing in which the probe sequence is INDEPENDENT of the key, as well as in hash CHAINING. |
|
| 17249. |
Brief answers:1) what is an object code? 2) Name two websites used to create blog3)Define Hat block? 4) define Boolean block |
| Answer» WORDPRESS, MEDIUM, WIX and GHOST | |
| 17250. |
A _______ is a collection of blocks assembled in a particular order |
|
Answer» A SINGLE collection of BLOCKS assembled in a PARTICULAR order |
|