Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

17251.

The variables button is used to store _____ and ______

Answer» POINTER and ADDRESS of  VARIABLES BUTTON
17252.

Fill in the blanks!!!

Answer» 4) table HANDS GNU THY I JJ
17253.

What is CVV Number???

Answer»

It's is a UNIQUE no....for a debit CARD or CREDIT card....for MAKING transaction

17254.

Which two protocol are used for communication between two computer

Answer» TRANSMISSION CONTROL Protocol and INTERNET Protocol are used for communication between TWO COMPUTER.
17255.

In which year were the following languages developed

Answer» JAVA 1995
c++ 1978
forton 1968
17256.

Design of a 4 bit microcontroller

Answer»

Some of the first microprocessors had a 4-bit WORD length and were DEVELOPED AROUND 1970. The TMS 1000, the world's first single-chip microprocessor, was a 4 -bit CPU; it had a Harvard architecture, with an on-chip instruction ROM, 8-bit- wide instructions and an on-chip data RAM with 4-bit words. The first COMMERCIAL

17257.

What do the following abbreviations stands for?

Answer»

E. HYPERTEXT markup language
B. q basic

17258.

Fill in the blanks!!!!!!

Answer»

D) HYPER TEXT MARKUP language
e) INSTRUCTIONS

17259.

Is anyone here expert in using kali linux then tell me what it is mainly used for? also send me photos

Answer»

First of all i am a white HACK hacker nmap is the best thing in kali Linux Other thing which is mainly USED is vmap,john the ripper,social engeneering tool have the best applications for HACKING websit,FACEBOOK or phishing

if you WANT to become a hacker mark me as brainlest
contact me
this is my facebook id
raj singh
best of luck

17260.

Classical problems of synchronization

Answer»
Classical problems of synchronization

Results in English

तुल्यकालन के शास्त्रीय समस्याओं

हिंदी में परिणाम देखें

The Producer-Consumer Problem. In this problem, two PROCESSES, one called the producer and the other called the consumer, run CONCURRENTLY and SHARE a common buffer. The producer generates items that it must pass to the consumer, who is to consume them. The producer PASSES items to the consumer through the buffer.

17261.

What is the full form of DJ

Answer» DISC JOKEY is a FULL FORM
17262.

Boolean expression in compiler design

Answer»

Boolean RETURNS TRUE or false VALUE in any programme....

17263.

Discuss the different themes underlying object oriented technology

Answer»

Objects incorporate both data and behavior.

There are several themes in object oriented technology.

These are :

1. ABSTRACTION

This focuses on hiding important and relevant data of a class to reduce complexity and increase efficiency.

2. CLASSES AND INSTANCES

Objects are OCCURRENCES of classes. A class is a conclusive explanation of a group of objects with similar properties and behaviors.

3. ENCAPSULATION

It is used to hide the values of structured data inside a class to prevent unauthorized access.

4. POLYMORPHISM

This is the ability to process objects DIFFERENTLY DEPENDING on their data types and ability. it essentially means the ability to appear in many different FORMS

5. INHERITANCE

Inheritance is a mechanism for sharing similarities among classes while preserving their differences.

17264.

What is a meaning of compiler

Answer»

A PROGRAM that converts instructions into machine code so that they can be easily understood by the COMPUTER or can be executed by it

17265.

Arm microprocessor program to find prime number

Answer»

Now let’s see the 8086 assembly language code for prime NUMBER checking. [cc lang=”C”]1000 XOR CX,CX /*Clearing the registers*/
1002 XOR DX,DX /*Clearing the registers*/
1004 MOV AX,[1500] /*Assume the number is store in memory 1500*/
1006 MOV BX,AX /*Copy the value in AX to BX */
1008 DEC BX
1010 DIV BX /*Dividing*/
1012 CMP DX,0000 /*Check for Reminder, Reminder is stored in DX*/
1014 JZ step 13
1016 XOR DX,DX /*Clearing DX*/
1018 CMP BX,0002
1020 JNZ 1008
1022 MOV CX,0001
1024 MOV [2000],CX /*Storing the result*/
1026 HLT[/cc]

17266.

Applications of greatest integer function

Answer»

Here is ur answer.....
There are different notations that we can use for the GREATEST INTEGER FUNCTION, including these: The greatest integer function is a function such that the output is the greatest integer that is LESS than or equal to the input. ... If the input is an integer, then the output is that integer

17267.

Is anyone using kali linux here plz help me to recover my gmail account someone has changed its password and recovery number plz help

Answer» OK FRIEND I will HELP you
17268.

What do you mean by home page of a website

Answer» HOMEPAGE of a website is the FIRST page which we SEE when we OPEN a website
17269.

What is the full form HLL

Answer» HINDUSTAN LATEX LIMITED
17270.

Explain the meaning of paragraph ALL COMPUTER PROGRAM _______________INTERFACE TO DATA.

Answer»

Here the whole program is called as code that's why we call programming is coding. But there are two types of programming MODEL exists. First ONE is procedural oriented and second one is OBJECT oriented. In procedural oriented programming, directly we use the main function to execute the program. But in object oriented, we use class and object to execute any program. For example if class is fruit then it's objects are MANGO, grapes, guava ETC. So in object oriented programming, the data is object. And in procedural oriented programming, the data is, after the main function whatever we write.

17271.

Write any four Applications of Computer

Answer»
here is U R answer.
mate||||
banking
education
net banking
in RAILWAY.
..
17272.

Which test format is this “The transcribed text does not include speech errors, false starts and various filler words, such as: um, uh, hmm, so, you know, sort of, etc.” a) full verbatim b) clean verbatim

Answer» HELLO :)



THE  TRANSCRIBED TEXT WITHOUT ANY SPEECH ERRORS , FALSE STARTS IS A CLEAN VERBATIM.
                       --------------------------
17273.

Plz plz plz plz plz plz plz plz plz plz solve

Answer»

C)
1 B. side master
2 a. two
3 a. TITLE master
4 b. formatting

17274.

Wap in c++to print the sum of three numbers whose value is 25,40and 65

Answer»

#INCLUDE
#include

void main()
{
CLRSCR();
int sum;
sum = 25 + 40 + 65;
cout << sum;
GETCH();
}

17275.

The client requires time stamping every two minutes.you need to transcribe the 20-30 minute part of audio.where do you start time stamping?a) [00:00:00]b) [00:02:00]c) [00:20:00]

Answer»

I THINK B is the ANSWER JI

17276.

Write the two web addressing mechanisms used for websites on the net

Answer»

The TWO WEB addresing MECHANISM are e-mail,FACEBOOK

17277.

WLAN Stands for .........................

Answer» WIRELESS LOCAL AREA NETWORK
17278.

Write an essay about importance usage of computer definition

Answer» COMPUTER is most IMPORTANT ROLE in our LIFE because it it help us in banks railway stations and and so many places we can do our homework from computer of any subject computer is a most important ELECTRONIC machine in our life
17279.

What is priority queue in data structure?

Answer»


hyyy...

》priority queueis an abstract data TYPE which is like a regular QUEUE or stack data STRUCTURE, but where ADDITIONALLY each element has a "priority" associated with it. 
_______
hope it helps!!✔✔

17280.

How will digital convergence affect the quality of the media that we use daily

Answer»

Hey dear here is your answer...



⭐Digital convergence is a result of the digitization of content; including movies, text, voice, pictures and music. It is defined as the ability to view or listen to any of these content in any device (such as smartphones, computers, TVs etc) and it is facilitated by the innovations in new methods of connections between these devices.
⭐Digital convergence has the following effect on the quality of media:
-With digital media, the quality can only get better, this is because the resolution in digital material can be made at any level. High levels of resolution of can be ACHIEVED by increased levels of bandwidth. Examples include high definition imagery and 4K videos and images.
-Sound quality is also INCOMPARABLE in digital materials to the old forms of sound storage like in CDs or Cassettes.
⭐Because production of digital material is extremely CHEAP as COMPARED to the older media forms, more resources and time can be invested into INCREASING the quality of the digital media content.


Hope it helps You out ⭐^_^⭐
Thanks ⭐(^^)⭐

17281.

What is cyber threat

Answer»

Cyber threat
----------------------------------------------------------------------------------------------------------------


✴ cyber threat ✴

cyber threat is attempts to gain access to a computer NETWORK WITHOUT permission.


Cyberthrates are mainly used by the hackers hackers hack the computer please USE the cyberthrate.

because the cyberthrate helps the hackers in accessing the computer without permission.


===================================================


✴ Types ✴

1) Worms

2) trojan

3) PHISHING

===================================================


✴ Common Sources of Cyber Threat ✴

1) Terrorist

2) Hackers

3) Crime groups

4) BUSINESS competitors


17282.

Name any input device one

Answer» UR ANSWER is below

Keyboard.Image scanner.Microphone.


please MARK as BRAINLIST
17283.

Difference between empty tag and container tag in html

Answer»

There are two kinds of tags:
 container and empty .The container tag always wraps around text or graphics and COMES in a set with an opening and a closing. ...
The tag 
is ONE that adds a line BREAK. Empty tags do not have to be wrapped around text and do not require a closing.
Hope it HELPS you out ☺

17284.

What is an operating system? discuss the various tasks performed by operating system?

Answer»

Here is the ANSWER PLS pls pls pls
mark as BRAINLIEST

17285.

What is the full form of AI

Answer» ARTIFICIAL INTELLIGENCE ....
17286.

HELLO GUYS...........Only Moderators and Leader Moderators will answer these (PLEASE).No BS, No BB, no Ninja, No Apprentice Moderator....(PLEASE).Question:In your Moderating life, write about your experience of moderations.Write the names of your friends (who are not Moderators but are very friendly with you and also write why you like him/her).For writing the name of a friend, Ninjas, BBs, and BS are allowed.EXPECTING GOOD ANSWER FROM MODERATORS...........^_^

Answer»

Hey there!

Well a good question but I don't have many things to write as you kept many restrictions.

Basically, I am everyone's friend and everyone are my friends. You can be my friend , But that won't mean I would be partial to others when it comes to you.

All I can say is , Being a Community leader, I take pleasure in the guys who contribute in making things better .

We have a team of GREAT stars, Though they are beginners, They are the future citizens of Brainly.

Also, We have a team of benevolent benefactors. They provide good answers, and are one of the best people on the site.

None is perfect expect the Almighty, So I can't judge anyone as perfect or anything.

Whenever, I am happy, I have many people to share it with and when I am sad, yet there are few at least to bare my sorrows.

For me, Friendship is something that will bond you with someone else. Not only the good times, but also the BAD times come.

There are many people whose accounts may not be available on the site now. But still have been with me at some point of time..

Also, Ninja team is a great team and they share the success of The site !

We have our great moderators, ALWAYS ready to help.

Finally, I would like to end my answer with a small quote :

" Without you, I am NOTHING "
- With you, I am something .
" Together We are everything "

At Brainly ,We believe in togetherness. We always go with the spirit [ Together We Go FAR ]

Thanks!
Sorry for not mentioning any name.
I didn't mention anyone because If I start mentioning there would be many to write.

17287.

The set of instruction thats tells the computer what to do is _______

Answer»

Hey Mate
Here is your answer

The SET of instruction THATS tells the computer what to do is __command___

Hope it helps
Cheers!!
Pls mark as BRAINLIEST if it helps

17288.

Name any two operating systems which provide graphic user interface to interact with computer ?

Answer»

Hey.

Here is the answer.

1. WINDOWS 7
2. MAC OS X leopard

Thanks

17289.

Only for IT experts! Explain the working of Tor Browser.

Answer»

Tor browser
----------------------------------------------------------------------------------------------------------------

♣ What is TOR BROWSER ♣

Tor Browser :- Tor browser is an application which is used to secret search. the WEBSITES like dark web use this system. This is browser which is designed for the anonymous web surfing.

Tor is a browser Which us dependent on the activities of the criminals, hackers, DARKNET. But the main FEATURE about this is that this Tor browser is more secure than most commonly-used browsers.

===================================================

♣ How the TOR browser works ? ♣

=> When you search something in the TOR browser then that data is bundeled with the ENCRYPTED packet. and when our search Data Is gone in the TOR browser then the Internet connectivity Is stable But they get our addressing information but it is not out in the internet
means that if we search on the Google or the in Chrome browser then our addressing information is went near that browsers and the Tor browser does not allow this function therefore Tor is secue.

and when the encrypted data is went in the packets then the service (called the relays) are come in the final destinations and the TOR browser Data go near the user.

===================================================

♣ How it Hide the IP addresses ♣

=> Here the real case is that when the user uses the Tor browser, then the all addressing information does not go near the Tor browser or the other IP address also not go from near the Tor browser.

if it is go then the Tor browser does not take our IP because your TOR browser all servers not properly connected with the internet.

----------------------------------------------------------------------------------------------------------------

♣ How to access dark web or deep web by using TOR ♣

=> First download the TOR Browser then follow The following steps

:-

1) Open the TOR Browser

2) Now on our VPN

3) now when you are in TOR then at upper side there is one onion click on it.

4) Now, At uppedside in right CORNER there are 3 lines click on that and now click on the settings.

5) when you go in settings then find there word java

6) Click on it, it is always ON. Now click there OFF

7) Now, click on the search button

8) Search There dark web or deep web

9) when you go in it it will ask your name, password, email.

10) Don't write password, email, name real. write there fake name.

11) Now enjoy



===================================================

17290.

What is the full form of IMAEI

Answer» HI
INTERNATIONAL MOBILE EQUIPMENT identify
sorry if i RONG
17291.

What is meant by main documents when you are using mail merge

Answer»

It helps me to learn when I understand the releation ship between code in PROGRAMMING, in CSS
.speciall { } in an EXTERNAL style SHEET would indicate a class selector which would then be used in the corresponding LINKED html document .
Now moving on to Javascript I would like to understand the basic relationship between code for example

17292.

How is a merge document created

Answer»

Hey beautiful girl
Select the file, and then click Open. Word displays the Mail Merge Recipients dialog box. You can sort and EDIT your DATA if you want to. Click OK to RETURN to the MAIN DOCUMENT.

17293.

Define computer system. what are the application software wikipedis

Answer» COMPUTER SYSTEM is a system in which we can do calculations data management the data store and all these things which are RELATED which we cannot stay store in our mind it HELP in our connecting all the word from one place to another and what is application software applications of air circuit of software which help us to do that WORK which we are want to do .
17294.

The operating system managesMemoryProcessesDisks and I/O devicesAll of the above

Answer»

Hello FRIEND...

The ANSWER of u r QUESTION is..

All the above is the answer..

THANK you...

17295.

What is the first letter of the alphabet that appears on 39 keyboard?

Answer»

It is Q which appears FIRST on 39 KEYBOARDS.
HOPE HELPED...

17296.

What is static variable?

Answer»

A STATIC variable is a variable declared by the static KEYWORD . The static variable is a variable which is available as a single copy to be used by all the OBJECTS of a class .

A method which is declared with the static keyword is called the static method .

Example of static variable :

class anything

{

static INT dead ;

public static void main(String args[])

{

System.out.println(dead);

}

}

Output : 0

Here dead is a static variable because it is declared with the static keyword .

Another example :

class Hitler

{

static DOUBLE worldwar2 ;

public static void main(String args[])

{

System.out.println(worldwar2);

}

}

Output : 0.0

Here worldwar is a static variable because it is declared with the static keyword .

17297.

The data source can be created in database file

Answer»

The DATA SOURCE stores information to be BROUGHT into a main document . Data source is also CALLED the data file.

17298.

What is the output of this c code? #include void f(int a[2][]) { a[0][1] = 3; int i = 0, j = 0; for (i = 0; i < 2; i++) for (j = 0; j < 3; j++) printf("%d", a[i][j]); } int main() { int a[2][3] = {0}; f(a); return 0; }?

Answer»

ANSWER:

2 is the CORRECT answer

Explanation:

1234 GET on the danceflo800006or

17299.

How company uses information system strategically?

Answer»

They mechanize OPERATIONS for better efficiency, control, and effectiveness, but they do not, in themselves, INCREASE corporate profitability. They are SIMPLY used to provide management with sufficient dependable information to keep thebusiness RUNNING smoothly, and they are used for analysis to plan new DIRECTIONS.

17300.

What is handle pruning in compiler design?

Answer»

I don't KNOW REALLY