Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

17201.

Write an email to the editor of a local daily highlighting the problem of ragging in educational institutions also suggest steps to deal with pecans

Answer» ONE MINUTES pls I will write in a PAPER and UPLOAD
17202.

Write an email to your friend inviting him to join you in a trip to the hill station during summer vacation wiki

Answer»

Dear ............., 

I reached Shimla yesterday. I was tired of the scorching heat of the plains.

I’m glad to state that Shimla is just like a paradise. It is rightly called like Mussourie, the Quean of Hills. It is all pleasant here. A cool breeze is always BLOWING. The rain is frequent but it is not inundating as in the plains.

All AROUND Shimla there are lush green forests of pine and other trees. There are sparkling SPRINGS everywhere.

I, therefore, invite you to come here and stay with me during the summer vacation. Then we’ll visit Jakhu, Kufri and other places and have frequent walking trips in forests and over the hills. I live here with my uncle who is a very generous, jolly person.

Convey my REGARDS to your REVERED parents.

Yours sincerely,

........................

17203.

Write and drawing 3 different objects having different length

Answer» LET the length of ONE be 3cm , other 4CM and 7cm

Now draw it using ruler
17204.

Why is adaptive routing superior to non adaptive routing?

Answer»

Answer:

The purpose of adaptive routing is to help prevent packet DELIVERY FAILURE, improve network performance and RELIEVE network congestion. ... Because routers share INFORMATION about the network topology, adaptive routing can be less secure than non-adaptive routing processes and REQUIRE more bandwidth.

17205.

Why orthogonal and orthonormal vectors are used in digital communication?

Answer»

Orthogonal mean that the dot product is NULL
ORTHONORMAL mean that the dot product is null and the NORM is equal to 1.

17206.

Why flash memory perferred more than other memory in 2mark?

Answer»

Flash memory is used in enterprise server, storage and networking technology, as well as in a wide range of consumer devices, including USB flash drives, mobile phones, digital CAMERAS, tablet computers, PC cards in notebook computers and embedded controllers . For instance, NAND flash-based solid-state drives are often used to accelerate the performance of I/O-intensive applications. NOR flash memory is often used to hold control code, such as the basic input/output system (BIOS), in a PC.
Flash memory is seeing growing use for in-memory computing to HELP speed performance and increase the scalability of systems that manage and analyze increasingly LARGE sets of data.
Dr. Fujio Masuoka is credited with the invention of flash memory when he worked for Toshiba in the 1980s. Masuoka's COLLEAGUE, Shoji Ariizumi, reportedly coined the term flash because the process of erasing all the data from a semiconductor chip reminded him of the flash of a camera.
Flash memory evolved from erasable programmable read-only memory (EPROM ) and electrically erasable programmable read-only memory (EEPROM ). Flash is technically a variant of EEPROM, but the industry reserves the term EEPROM for byte-level erasable memory and applies the term flash memory to larger block-level erasable memory.
Electrons are added to or removed from the floating gate to change the storage transistor's threshold voltage. Changing the voltage affects whether a cell is programmed as a zero or a one
EPROM and EEPROM cells operate similarly to flash memory in how data is written, or programmed, but differ from flash memory in how data is erased.
Flash memory consists of a transistor and a floating gate that stores the electric current.

17207.

Which was your typing speed? gross speed or net speed?

Answer»

In TYPING your GROSS speed means the total NUMBER of words that you write in a minute.

Net speed means the total number of correct words that you write PER minute.

So, to measure  typing speed net speed is used.

17208.

Reflection in computer graphics with example

Answer»

Reflection in computer graphics is used to emulate REFLECTIVE OBJECTS like mirrors and shiny SURFACES. ... Sometimes, it is a setting which is the opposite of blurry (e.g. when "glossiness" has a low value, the reflection is blurry).

17209.

What is message word and code word in computer network?

Answer»

In communication, a code word is an ELEMENT of a standardized code or protocol. Each code word is assembled in accordance with the specific RULES of the code and ASSIGNED a unique meaning. Code words are typically used for REASONS of reliability, clarity, BREVITY, or secrecy.

hope it helps u plz mark as brainlist if u satisfied with the answer

17210.

What is constructor? what are its special characteristics?

Answer»

Constructors have the same name as that of the class they BELONG to. Constructors are executed when an object is declared. The main function of constructor is to initialize objects and allocate appropriate memory to objects. Though constructors are executed IMPLICITLY, they can be invoked explicitly

hope it HELPS u plz mark as brainlist if u satisfied with the ANSWER

17211.

What library function we should use for string in c++?

Answer»
17212.

Os virtualization vs hardware virtualization

Answer»

In OPERATING-system-levelvirtualization, a physical server isvirtualized at the operating system level, enabling MULTIPLE isolated and SECURE virtualizedservers to run on a singlephysical server. The "guest" operating system environments SHARE the same running instance of the operating system as the host system.

hope it helps U plz mark as brainlist if u satisfied with the answer

17213.

What is root word for 17 carbons on orgnic compoubd?

Answer» HEY mate.....^_^

Here's ur ANS.

==============

↪ Root words for 17 carbons is ⬇
"HEPTDEC"

HEPT for 7 and DEC for 10

✌Hope it helps

17214.

The osi reference model is divided into how many layers

Answer»

Its DIVIDED into 7 LAYERS

17215.

Mention some of the physical properties of ethernet

Answer»

PHYSICAL PROPERTIES: An Ethernetsegment is IMPLEMENTED on a coaxial CABLE of up to 500m. This cable is similar to the type USED for cable TV, except that it typically has an impedance of 50 ohms instead of cable TV‟s 75 ohms. ... MultipleEthernet segments can be joined TOGETHER by repeater.

17216.

Peter keen says "we have learned that it is not technology that creates a "

Answer»

So what to do this QUESTION

17217.

Identify the role of firewall in information security

Answer»

Firewall is a software
but now a days it is a PART OPERATING system
Which doesn't allow unknown source
and unauthorised ACCESS

17218.

How to divide 111001 and 101 in binary form

Answer»

In the calculator, there are two INPUT FIELDS intended for entry of binary numbers. The first field for the first number, the second to the second, respectively. Between these two fields, you must select a mathematical operation you want to implement them. You can add up and subtract, multiply and divide fractions or binary numbers. To enter a fractional binary number, you can use a dot or COMMA. After entering the numbers, and select the mathematical operation to calculate the CLICK button on them.

17219.

How to listwise delete for nas rows in r?

Answer»

You can TOUCH SELECT all and DELETE

17220.

How to insert page number from current page?

Answer» TOP RIGHT OPTION...........
17221.

What is a full form of ARPANET

Answer» HEY!!!!

Full Form of

=> ARPANET = Advanced RESEARCH Projects Agency Network

Hope this HELPS
17222.

How to create and write a file in command prompt?

Answer»

Hey mate here is your answer...

CLICK Start, point to Programs, and then click MS-DOS Prompt (or Command Prompt in WINDOWS NT).At a command prompt, LOCATE the drive that contains the folder whose contents you WANT to list. ...At a command prompt, locate the folder whose contents you want to list

17223.

How to unlock lg phone forgot password without losing data?

Answer» THINK ur PASSWORD or GIVE it to nearby LG COMPANY shops
17224.

How to product photoshop layers with password?

Answer»

So MUCH useffort to GET a CHANCE with me

17225.

How to play sleeping dogs in pc with 32 bit?

Answer»

Insert your CD 
OPEN the cd drive 
and INSTALL it
Baam..
Or if you are in steam
Just DOWNLOAD and install it

17226.

How to ask question by taking a picture in this app

Answer»

While asking the question you will FIND a CAMERA button, click that OPTION and you can now take pictures and POST with the question

17227.

Answer all the questions in short

Answer» 1. peer to peer
2. SET of rules to communicate
4 . website collection of INFORMATION which contains LINKS images videos audio nd data
17228.

What is the full form of vivo

Answer» VIVO :- VIDEO INPUT villaineously OBLITERATED
17229.

Explain the core functions performed by a computer......plz give answer

Answer»

Computer
OPERATING Systems An operating system has three main functions: (1) manage the computer's resources, such as the central processing unit, memory, disk DRIVES, and printers, (2) establish a USER interface, and (3) execute and provide services for applications software.

17230.

What are the secondary storage device used for

Answer»

It is USED to protect data for disaster recovery or LONG TERM retention..

17231.

For the data 1,2,2,3,3,3,4,4,4,4,........9. the product of mean and mode is

Answer»

Is your FOUND only MEAN and MODE ?????

17232.

Difference between cop and sop in computer graphics

Answer»

The COP CORRESPONDS to the center of the lens in the camera or in the eye, and in a computer graphics SYSTEM, it is the ORIGIN of the camera frame for perspective views. The projection surface is a PLANE, and the projectors are STRAIGHT lines.

A standard operating procedure, or SOP, is a set of step-by-step instructions compiled by an organization to help workers carry out complex routine operations. SOPs aim to achieve efficiency, quality output and uniformity of performance, while reducing miscommunication and failure to comply with industry regulations

I hope it will help you :))

17233.

Explain with neat fig the bluetooth protocol stack from wireless communication

Answer»


• OBEX: Object Exchange

• TCS BIN: Telephony control protocol specification – binary

• BNEP: Bluetooth network encapsulation protocol

• SDP: Service discovery protocol

• RFCOMM: Radio frequency comm.

Radio Layer

• Radio layer defined the carrier frequencies and output power

• Bluetooth uses 2.4 GHZ license free band.

• Frequency hopping and TDD (time division duplex) is used for transmission with fast hopping rate of 1600 hops/s.

• It uses 79 hop carriers equally spaced with 1 MHz.

• Gaussian FSK used for modulation.

BASEBAND Layer

• Baseband layer performs frequency hopping to avoid interference and to access the medium.

• Defines physical links and many packet formats.

• It CONTROLS:

o Device Addressing

o Channel control through paging and inquiry methods

o Power saving operations

o Flow control and synchronization among Bluetooth devices.

Link Manager Protocol (LMP)

• The Link Manager protocol manages various aspects of the radio link between master and slave.

• The following functions are covered by LMP:

o Authentication, pairing and encryption

o Synchronization

o Capability negotiation

o QoS negotiation

o Power control

o Link Supervision

o State and transmission mode change

Logical Link Control and Adaptation Layer Protocol (L2CAP)

• L2CAP is layered over the Baseband Protocol and resides in the data link layer.

• L2CAP provides:

o Connection-oriented and connectionless data services to upper layer protocols with protocol multiplexing capability.

o Segmentation and reassembly operation.

o Group abstractions.

• L2CAP provides three different types of logical channels that are transported via ACL link between master and slave, these are:

o Connectionless used for broadcast

o Connection-oriented for data transfer with QoS flow specification.

o Signaling used to exchange signaling MESSAGES between L2CAP entities.

Host Controller Interface (HCI)

• The HCI provides a command interface to the baseband controller and link manager.

• It provides access to hardware status and control registers.

• Essentially this interface provides a uniform method of accessing the Bluetooth baseband capabilities.

• The HCI exists across 3 sections, The Host, Transport Layer, and Host Controller. Each of the sections has a different role to play in HCI system.

• HCI defines the set of functions of a Bluetooth module that are accessible to the host and its application.

• HCI can be seen as a software/hardware boundary.

RFCOMM

• The RFCOMM protocol provides emulation of serial ports over the L2CAP protocol.

• It is a cable replacement protocol that provides a serial line interface to all the applications.

• The protocol is based on the ETSI standard TS 07.10.

• It supports multiple serial ports over a single physical channel.

Service Discovery Protocol (SDP)

• The service discovery protocol helps the applications to discover which services are available and to determine the characteristics of those available services.

• SDP defines only the discovery of services, not about their usage.

• New service is discovered as follows:

o Client SENDS a request to search for an interested service.

o Then the server responds to the client with the list of available services that match to the client’s criteria.

o The client uses the list to retrieve additional service attribute for the service of interest.

Profiles

• Profiles are specifications which describe how Bluetooth should be used in a specific application and thus ENSURES that all devices from different manufacturers can seamlessly work with one another.

• There are about a dozen profiles:

Generic Access, Serial Port, Dial up Networking, FAX, Headset, LAN, Access Point, Generic Object Exchange (OBEX), File Transfer, Object Push, Synchronization, Cordless Telephony, and Intercom.

• The profile concept is used to decrease the risk of interoperability problems between different manufacturers’ products.

Telephony Control Protocol Specification Binary (TCS-BIN)

• To define call control signaling for the establishment of voice and data calls between Bluetooth devices TCS-BIN describes a binary, packet-based, bit-oriented protocol.

17234.

Explain the operation performed on stack

Answer»

Stack Operations
The two operations that form the majority of the functionality of the stack are the operation of adding to the stack, and the operation of removing items from the stack.

For historical REASONS the operation of adding items to a stack is called push. For similar reasons the operation of removing an item from a stack is usually referred to as pop.

There are a couple more operations that we MUST consider before we attempt to implement a stack. The first of these is an operation called init. This initialises the stack, and ensures that state of the software is in a known condition before we try to use it. Just about every structure that we will ever use will require an initialisation routine - get into the habit of writing the outline of the init operation first!

As this is a course in developing software, we must also consider the possibility of errors. The easiest error to ENVISAGE for a stack is when a PROGRAM tries to remove an item from an empty stack. This condition is called overflow, and if undetected will probably cause a series of mysterious errors before the program crashes. The method that we use to detect this problem is to use an operation called ISEMPTY to tell us if the stack is empty. If we try and take data from an empty stack the error condition is usually called underflow. Similarly there is a possibility that we might run out of space. To counter this we can provide an operation called isFull.

Using this analysis we can conclude that we need to provide five operations to implement a stack. These operations are:

1) init
2) isEmpty
3) isFull
4) push
5) pop
If we can satisfactorily implement these operations we have implemented a stack.


Hope it will you.. Please mark as brainliest if you have understood this.

17235.

How does a CPU works

Answer»

The COMPUTER does is primary work in a part of the machine we cannot see ,of the control centre that CONVERTS data INPUT into CONVERSATION output ....and this conversation is done by central Processing Unit (CPU)
..

17236.

Decimation is a process in which the sampling rate is

Answer»

The term downsampling usually refers to ONE step of the process,but sometimes the terms are USED interchangeably.Complementary to upsampling,which increases sampling rate,decimation is a SPECIFIC case of sample rate conversion in a multi-rate DIGITAL signal PROCESSING system

17237.

Is anyone knew how to hack gmail id using kali linux

Answer» ABHI 5min BAD bata TA HU Ruk JA
17238.

Computer science ....what is three addressing mode

Answer» FOLLOWING are the main addressing MODES such as :
1)immediate MODE
2)INDEX mode
3)indirect mode
17239.

Distinguish between mis and data processing system

Answer» HEY GUY your ANSWER is
17240.

Will you get the desired output if you give wrong input? Why

Answer»

Hey mate here is your ANSWER..
we can't GET desired output if we give wrong input because input is just a process which makes a outcome and the outcome is output ..so if we don't process the right one then we can't get right output.........
....................
.


hope it will help you my dear friend.

17241.

Write the topic on 'Your Sister'

Answer»

'My sister' the value of sister is only who knows who have no sister . Sister is considered as a friends that all the things we tell her . If we have a sister we do many things like the playing, the home work ACTIVITES. As we are SITTING ALONE its absoultely we bored but on the place of sitting alone we have a sister we DEFINITELY enjoyed and do lot of fun. I THANX TO GOD WHO GIVE US A SISTER IN THE FORM OF FRIEND.

17242.

_____, a pointing device, is a mouse lying on its back.

Answer»

I think arrow is the POINTING device ,is a mouse LYING on its BACK...

17243.

Define multilevel indices in dbms with example

Answer»

Index records comprise search-key values and data POINTERS. Multilevel index is STORED on the disk along with the ACTUAL DATABASE FILES. ... If single-level index is used, then a large sizeindex cannot be kept in memory which leads to multiple disk accesses.

17244.

Explain how is data stored in hard disk

Answer»

When your computer stores dataon its hard DRIVE, it doesn't just throw magnetized nails into a box, all jumbled up together. Thedata is stored in a very orderly pattern on each PLATTER. BITS ofdata are arranged in concentric, circular PATHS called tracks. Each track is broken up into smaller areas called SECTORS

17245.

What is the importance of wild card characters in file management

Answer»

Wildcard characters, which can be used in SQL and other computer LANGUAGES, can shorten commands by INCLUDING a wide RANGE of ITEMS without having to mention every single item covered by the command. One scenario that calls for usage of a wildcard character is when you want to search for a SET of similar filenames at a Windows command prompt.

Hope it helps you buddy

17246.

Do linear probing causes secondary clustering

Answer»

This phenomenon CAUSES searches for keys within the cluster to be longer. ... A related phenomenon, SECONDARY clustering, occurs more generally with OPEN addressing modes includinglinear probing and quadratic probing in which the probe sequence is INDEPENDENT of the key, as well as in hash CHAINING.

17247.

True or false!!! ,,,,,

Answer» 1. TRUE
2.false
3.true
4.false
5.false
17248.

True or false!!!!!!!

Answer» FIRST ANWER is FALSE..
true
false
false
true...
17249.

Brief answers:1) what is an object code? 2) Name two websites used to create blog3)Define Hat block? 4) define Boolean block

Answer» WORDPRESS, MEDIUM, WIX and GHOST
17250.

A _______ is a collection of blocks assembled in a particular order

Answer»

A SINGLE collection of BLOCKS assembled in a PARTICULAR order