Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

17601.

1) Are speaker tags required everytime when speaker changes?

Answer»

Speaker tags are REQUIRED to be changed B. EVERY time. But when it is OBVIOUS that speaker is present in the conversation between two CHARACTERS the speaker tag is not required. It is also purely the author's choice to use the speaker tag or not.

17602.

प्रोसेस्ड डेटा को क्या कहते है ?(a) आउटपुट(b) इनपुट(c) प्रोसेस(d) उपरोक्त सभी

Answer» PROCESSED DATA is CALLED OUTPUT UNIT.
17603.

सी०पी०यू० का विस्तृत रूप क्या है?(a) कंट्रोल एंड प्राइमरी यूनिट(b) सेन्ट्रल प्रोसेसिग यूनिट(c) कंप्यूटर एंड प्रोसेस यूनिट(d) उपरोक्त सभी

Answer»

CPU = CENTRAL processing

unit

(सेंट्रल प्रोसेसिंग यूनिट) HINDI

17604.

हाल ही में, एप्पल पर किस कपंनी के साथ पेटेंट के उल्लंघन के आरोप में जुर्माना लगाया गया है ?(a)सेमसंग(b) एनवीडिया(c) स्मार्ट फ्लैश एलएलसी(d)क्वालकॉम

Answer»

Here's ur answer.



हाल ही में, एप्पल पर किस कपंनी के साथ पेटेंट के उल्लंघन के आरोप में जुर्माना लगाया गया है ?
(a)सेमसंग
(b) एनवीडिया
(C) स्मार्ट फ्लैश एलएलसी ✅
(d)क्वालकॉम



hope this HELPS mark as BRAINLIEST please

17605.

कौन सा दूरसंचार सेवा प्रदाता (2014 दिसंबर में) वीओआईपी(VoIP i)इंटरनेट के उपयोग के लिए अलग दर चार्ज करने की योजना बना रहा है ?(a) आइडिया सेलुलर(b) टाटा डोकोमो(c) एयरटेल(d) वोडाफोन

Answer»

प्रश्न: कौन सा दूरसंचार सेवा प्रदाता (2014 दिसंबर में) वीओआईपी(VOIP i)इंटरनेट के उपयोग के लिए अलग दर चार्ज करने की योजना बना रहा है?

उत्तर: \textbf{एयरटेल} दूरसंचार सेवा प्रदाता (2014 दिसंबर में) वीओआईपी(VoIP i)इंटरनेट के उपयोग के लिए अलग दर चार्ज करने की योजना बना था।

भारती एयरटेल लिमिटेड एक दूरसंचार सेवा कंपनी है जो नई दिल्ली, भारत में स्थित है। यह दक्षिण एशिया और अफ्रीका के 20 देशों में संचालित है।

एयरटेल इंडिया मोबाइल टेलीफोनी का दूसरा सबसे बड़ा प्रदाता है और भारत में निश्चित टेलीफोनी का दूसरा सबसे बड़ा प्रदाता है।

17606.

हाल ही में , ट्राई (TRAI ) किस सभांवित अधिसूचना के साथ आया है ?(a) नो रोमिग़ं चार्ज पैन इंडिया(b) पैन इंडिया मोबाइल नंबर पोर्टेबिलिटी(c)दोनो 1 व 2(d) इनमें से कोई भी नहीं

Answer» C is CORRECT ANSWER ********
17607.

The collection of information stored in a database at a particular moment is called as?

Answer»

there is no specific name for the process but it can be CALL as ENTERING DATA

17608.

Role of CCTV in public places in Kannada language

Answer»

The use of CCTV plays a vital role in what KEEPS our communities safe, serving as a useful tool to prevent and reduce crime by way of RECORDING evidence for use in a court of law. ... The basis of a CCTV operators role is to safeguard the public, protect property, and ENSURE the security of data.The police can identify criminals recorded with cameras. Through surveillance cameras, the police can both prevent crimes from HAPPENING and can quickly solve criminal cases with MATERIAL evidence. In addition, surveillance cameras protect against property theft, and vandalism.

17609.

What is a hyperlink? please explain and don't cheat from any book

Answer»

Hey frnd this may be the answer...
hyperlink means...A hyperlink is a word, phrase, or IMAGE that you can click on to jump to a new document or a new section within the current document.
Hyperlinks are found in nearly all Web pages, allowing users to click their way from page to page. Text hyperlinks are often blue and UNDERLINED, but don't have to be. When you move the CURSOR over a hyperlink, whether it is text or an image, the arrow should change to a small hand pointing at the link. When you click it, a new page or PLACE in the current page will open.....
Pls MARK it as the brainliest...

17610.

What is a browser? explain

Answer»

A browser in is an application program that provides a way to look at and interact with all the information on the world wide web. The word browser SEEMS to have originated Prior to the web as a GENERIC term for user interfaces that let you browse (navigate through and READ )text FILES online.

17611.

Implement any one Mutual exclusion algorithm in distributed systems using C++ or Java.

Answer»

C++ is a general-purpose programming LANGUAGE. It has IMPERATIVE, object-oriented and generic programming FEATURES, while ALSO providing facilities for low-level MEMORY manipulation.

17612.

How many dimensions will a derivative of a 3-d tensor by a 4-d tensor have?

Answer»

A TENSOR is generally known as a generalization of vectors and matrices to POTENTIALLY higher DIMENSIONS and tensor flow represents tensors as n-dimensional ARRAYS of base datatypes.

a 3-d tensor can generally have six dimensions

while a 4-d tensor can have 16 dimensions.

while derivative of 3-d by 4-d tensor can have 12 dimensions


17613.

What is the full form of HTML???please answer me

Answer» HYPER TEXT MARKUP LANGUAGE
17614.

Which of the following statements is true when it comes to developing a web presence for a business?

Answer»

Web plays very important role in business...business is seems everywhere.....and TODAY's era without web we cannot imagine to run a quality business..to run a quality business we should think about BROAD term...which is web.....web MEANS world wide...if we think about quality business so we use the term web because a web presence for a business it means that it developing business poor quality business if for EXAMPLE if we want to run a business not only in India also in FOREIGN country so we use the term web

17615.

For which country the domain. de is used

Answer»

. DE is the COUNTRY CODE top-level domain for the FEDERAL Republic of Germany.

Hope u like the ans.. Plse MARK me as brainlist

17616.

How are the tracks on magnetic disk different t han that of optical disks ?

Answer»

Tracks in the magnetic disk are generally circular while in OPTICAL disk the tracks are CONSTRUCTED spirally. Optical disk allows mass replication. On the contrary, in the magnetic disk, only one disk is accessed at a TIME. The access time of the magnetic disk is LESSER than the optical disk.

17617.

Write from 1 to 25 how to write in binary numbers

Answer»

1 1
2 10
3 11
4 100
5 101
6 110
7 111
8 1000
9 1001
10 1010
11 1011
12 1100
13 1101
14 1110
15 1111
16 10000
17 10001
18 10010
19 10011
20 10100
21 10101
22 10110
23 10111
24 11000
25 11001

17618.

Sam is working as a pen-tester in an organization in houston. He performs penetration testing on ids in order to find the different ways an attacker uses to evade the ids. Sam sends a large amount of packets to the target ids that generates alerts, which enable sam to hide the real traffic. What type of method is sam using to evade ids?

Answer»

Sam is using a method POPULARLY known as Intrusion Detection System Evasion technique.  

The PRIMARY purpose of this technique is to confuse the Intrusion Detection System PRESENT about the real content of traffic passing through it. This is a method used commonly by either pen-testers or crackers when trying to or bypass an IDS.

The primary goal is to pass encrypted data in a WAY that only the target computer can DECRYPT or identify. They IDS should be unaware of the true intent of the packet.

17619.

Draw a flowchart to find the area and perimeter of a circle

Answer»

Flowchart: GRAPHICAL Representation of an algorithm.

(1) Area of circle = 3.14 * R * r

(2) Perimeter of circle = CIRCUMFERENCE = 2 * 3.14 * r.

For the better understanding I am DRAWING the flowchart for Area of circle and perimeter separately.

The flowchart is EXPLAINED in the attachment below.


Hope it helps!


17620.

Convert the ip address whose hexadecimal representation is c22f1582 to dotted decimal notation

Answer»

Given Hexadecimal representation is C22F1582.

(i)

Each digit in hexadecimal notation represents 4 bits in a binary address.

1 = 1

2 = 10

5 = 101

8 = 1000

A = 10 = 1010

B = 11 = 1011

C = 12 = 1100

D = 13 = 1101

E = 14 = 1110

F = 15 = 1111.


(II)

Now, given hexadecimal notation can be written as:

⇒ C2.2F.15.82


(iii)

Convert it into binary notation.

⇒ 1100010.101111.10101.1000010


(iv)

Convert to dotted decimal notation:

⇒ 194.47.21.130.


∴ Dotted decimal notation is 194.47.21.130 - CLASS "C" network.


Hope it helps!

17621.

Explain the process of cut copy and paste files in computer

Answer»

Copy and paste are commands in a computer USER interface and are one method of TRANSFERRING data from one location to another. Unlike CUT and paste, which moves the contents to a new location, copy and paste creates a DUPLICATE in the new location. Copy and paste enables simple data REPLICATION.

17622.

C program to check no is prime or not

Answer»
int pri(int)
#include
#include
VOID main()
{
int n,s; clrscr();
printf("\n\n\t\t Enter The Value of N:>>"); scanf("%d",&n); if(pri(n)==1) {
printf("\n\t\t\t%d is PRIME",n);
}
}
else
{
printf("\n\t\t\t%d is Not Prime",n);
} getch();
}
int pri(int m)
{
NT i; for(i=1;i<=m-1;i++)
{
if(m%i==0)
{

return 1;
}
return 2;
}
}
17623.

Assume that for a particular query, there is no relevant document in your database. How would you interept in this situation

Answer»

you can CREATE the DATABASE by using same coding but the name should be different.

i can SEND the PIC of coding but afterward if NEEDED

17624.

What is c++? how c++ is different from other high level languages?

Answer» C PLUS plus plus is a COMPUTER COURSE the
17625.

An organization is granted the block 130.34.12.64/26. The organization needs to have four subnets. What are the subnet addresses and the range of address for each subnet?

Answer»

/26 MEANS subnet is 255.255.255.192

if you make it /28 that is subnet 255.255.255.240 you can get four subnets with 14 use able IPs in each subnet

Subnets

Netmask:   255.255.255.240 = 28  11111111.11111111.11111111.1111 0000

Wildcard:  0.0.0.15              00000000.00000000.00000000.0000 1111

Network:   130.34.12.64/28       10000010.00100010.00001100.0100 0000 (Class B)

Broadcast: 130.34.12.79          10000010.00100010.00001100.0100 1111

HostMin:   130.34.12.65          10000010.00100010.00001100.0100 0001

HostMax:   130.34.12.78          10000010.00100010.00001100.0100 1110

HOSTS/Net: 14                    

Network:   130.34.12.80/28       10000010.00100010.00001100.0101 0000 (Class B)

Broadcast: 130.34.12.95          10000010.00100010.00001100.0101 1111

HostMin:   130.34.12.81          10000010.00100010.00001100.0101 0001

HostMax:   130.34.12.94          10000010.00100010.00001100.0101 1110

Hosts/Net: 14                    

Network:   130.34.12.96/28       10000010.00100010.00001100.0110 0000 (Class B)

Broadcast: 130.34.12.111         10000010.00100010.00001100.0110 1111

HostMin:   130.34.12.97          10000010.00100010.00001100.0110 0001

HostMax:   130.34.12.110         10000010.00100010.00001100.0110 1110

Hosts/Net: 14                    

Network:   130.34.12.112/28      10000010.00100010.00001100.0111 0000 (Class B)

Broadcast: 130.34.12.127         10000010.00100010.00001100.0111 1111

HostMin:   130.34.12.113         10000010.00100010.00001100.0111 0001

HostMax:   130.34.12.126         10000010.00100010.00001100.0111 1110

Hosts/Net: 14                    

Subnets:   4  

Hosts:     56

17626.

___' is the white space formed in between the words of a justified body text.

Answer»

A text is usually Aligned ALONG left MARGIN, right margin or both the margins in a WORD PROCESSOR.

This alignment determines the appearance of the edges of the paragraph.

It also determines the orientation of the edges of the paragraph.

For this PURPOSE, the text is aligned evenly.

In a Justified-Text, the text is aligned evenly between both the Margins (Left & Right) in such a WAY that the text falls flush with both the margins.

In this process, white space are created between the words and are KNOWN as word-spacing. This word-spacing is adjusted accordingly to make the text Justified-Text.


17627.

An expert based test estimation is also known as a. Narrow band delphi b. Wide band delphi c. Bespoke delphi d. Robust delphi

Answer»

An expert based test estimation is also known as

a. NARROW band DELPHI

b. Wide band delphi

C. BESPOKE delphi

d. Robust delphi

answer is b. wide band delphi

17628.

__________ is the memory eviction policy where keys are evicted by removing the less recently used keys first, but only among keys that have an expires set, inorder to make space for the newly added data.

Answer»

Redis cache memory is the memory eviction POLICY where keys are evicted by removing the less recently  used keys first but only among keys that have an expires set in order to make SPACE for the newly added DATA.

Remote is nothing but a remote data structure server.It is basically open source.

17629.

An array matrix[5][5] is stored in the memory with each element occupying 4 bytes of space. Assuming the base address of matrix to be 1200, compute the address of matrix[2][4], when the array is stored : (i) row wise (ii) column wise

Answer» 1. ROW WISE
a MARRIAGE STORED in row wise
17630.

Is the access time of a sequential memory is constant independent of the position of the word?

Answer»

Eshu kinha good GIRL and beautiful, INTELLIGENT,

of the word

17631.

He who has the tools controls the world... but can you wield them correctly? What is the bottom button on the right-hand side of an Xbox controller?a. Xb. Ac. Bd. Y

Answer» (^_-)(^_-)(^_-)(^_-)(^_-)(^_-)(^_-)(^_-)(^_-)
╭╼╾╼╾╼╾╼╾╼╾╼╾╼╾╮
┃ ┈┈ [_Hɪ Mᴀᴛᴇ_] ┈┈┈ ┃
╰╼╾╼╾╼╾╼╾╼╾╼╾╼╾╯

╔═══❁═❀═✪═❀═❁════╗
......Here You Go Ur ANSWER......
╚═══❁═❀═✪═❀═❁════╝

ıllıllıllıllıllıllı[ Your Answer ]ıllıllıllıllıllıllı

◆━━━━━◆♤◆━━━━━◆
☆Correct | ♤ | Option☆
◆━━━━━◆♤◆━━━━━◆

\huge\boxed{\texttt{\fcolorbox{aqua}{grey}{B}}} {\bf{\underline{Answer}}}



▂▃▅▇█▓▒░[ Hope It HELPS You DEAR ]░▒▓█▇▅▃▂
17632.

What is error secking?

Answer»

ECC (either "ERROR correction [or correcting] code" or "error checkingand correcting") allows data that is being READ or transmitted to be checked for errors and, when necessary, corrected on the fly. It differs from parity-checking in thaterrors are not only DETECTED but ALSO corrected.

17633.

Disadvantage of polling in computer organisation and archietecture

Answer»

Polling, or polled operation, in computer science, refers to actively sampling the status of an external device by a client program as a synchronous ACTIVITY. Polling is most often used in terms of input/output (I/O), and is also REFERRED to as polled I/O or software-driven I/O.

DescriptionEdit

Polling is the process where the computer or controlling device waits for an external deviceto check for its readiness or state, often with low-level hardware. For example, when a printer is connected via a parallel port, the computer waits until the printer has received the next character. These processes can be as minute as only reading one bit. Τhis is sometimes used synonymously with busy-wait polling. In this situation, when an I/Ooperation is REQUIRED, the computer does NOTHING other than check the status of the I/Odevice until it is ready, at which point the device is accessed. In other WORDS, the computer waits until the device is ready. Polling also refers to the situation where a device is repeatedly checked for readiness, and if it is not, the computer returns to a different task. Although not as wasteful of CPU cycles as busy waiting, this is generally not as efficient as the alternative to polling, interrupt-driven I/O.

please add brainlist

17634.

What is C tokens in C language

Answer»

A token is source-program text that the compiler does not break down into component elements. C tokens are the basic buildings BLOCKS in C LANGUAGE which are constructed TOGETHER to write a C program. Each and every smallest individual UNITS in a C program are known as C tokens.

17635.

Agility is defined as the ability of a project team to respond rapidly to a change. Select one: a. False b. True

Answer»

The STATEMENT is TRUE

17636.

Please answer fast very important.

Answer» HEY MATE HERE IS YOUR ANSWER

1) CHAR
2)SHORT
3)INT
4)LONG
5)FLOAT
6) LONG DOUBLE

HOPE IT WILL HELP YOU
IF YOU UNDERSTAND MY ANSWER EASILY THEN PLEASE MARK AS BRAINLIST
17637.

In the jade file, if some portion of content has to be moved to another jade file. What are the 2 syntaxes which are supported

Answer»

BLOCK & EXTENDS



HTTPS://stackoverflow.com/questions/10130215/linking-to-other-jade-files

17638.

Intext:"when data can flow across a cable in both directions, this is known as _____ communication."

Answer»

This is KNOWN as BIDIRECTIONAL communication.

Thanks

17639.

Default constructor ______.a. Has one argumentb. Has no return typec. Has one argument but no return typed. Has no argument

Answer» OPTION B. It has no RETURN type.


Thanks
17640.

You should use a while loop when the number of iterations of the loop is known in advance. True or false?

Answer» FALSE. ................................
17641.

12 R Reg No இரண்டாவது இடைகால டெஸ்ட் 2018 நேரம் 1:30 மணி COMPUTER SCIENCE மேக்ஸ் குறிகள் 50 1. சிறந்த பதில் தேர்வு 1 எந்த தரவு வகை வழக்கமாக உண்மையான வார்த்தை ஒரு பொருளை பிரதிபலிக்கிறது? 10 x 1 10 a) வார்ப்புரு b) வர்க்கம் a) பரம்பல் d) பாலிமார்பிஸம் 2 ஒரு மாறி a) தொடங்குதல் b) underscore c) இலக்கங்கள் ஈ) a மற்றும் b 3. a 75 ba b மதிப்பு? n) 76 d) 74 d) 73 d) 73 a) 4 b) 3 o) 2 d) 5 5 (int i 10 11.1--) cout < a) 10 ப) 9 சி) 8 ஈ) 1 6. எந்தவொரு முக்கியமானது கம்பைளருக்கு ஒரு வேண்டுகோள்? a) c) உலகளாவிய d) செயல்பாடு 7) ASCll மதிப்பு 97is a) A) b) ac) B d) b 8 பெறுதல்) ஒரு உறுப்பினர் செயல்பாடு. a) istream.hb) ostream.hc) stdio . hd) string h 9. வர்க்கம் sholuld நிறுத்தப்பட வேண்டும் ... 10. நிலையான உறுப்பினர் மாறிகள் துவக்கப்படும் ஒரு) 1 ப) 0 கேட்ச்) பூஜ்ய ஈ) குப்பை II. எந்த நான்கு கேள்விகளும். 11. ஒரு பொருள் என்ன? நிபந்தனையற்ற ஆபரேட்டர்கள் என்ன? கூட்டப்பட்ட சுழற்சிகளின் உருவாக்கத்திற்கான விதி என்ன? 14. என்ன ஒரு செயல்பாடு அழைப்பு? 4 x 2 8 12-கம்ப்யூட்டர் சயின்ஸ் 1

Answer»

I dont UNDERSTAND your language PLEASE WRITE in hindi or ENGLISH

17642.

What is the ambient light sensor

Answer»

An ambient light SENSOR is a component in smartphones, NOTEBOOKS, other mobile devices, automotive displays and LCD TVS. It is a PHOTODETECTOR that is used to SENSE the amount of ambient light present

17643.

In bluetooth which layer is roughly equivalent to the physical layer of the internet model

Answer»

Radio is the layer which ROUGHLY EQUIVALENT to the physical layer of the INTERNET model...

17644.

Compiler, interpret er, assembler are:

Answer»

HEY MATE
HERE'S YOUR ANSWER ⬇️⬇️⬇️⬇️⬇️


1. Compilers are used to convert high level LANGUAGES to machine code.

2. Assemblers are used to convert assembly language to machine code.

3. INTERPRETER is a computer PROGRAM which executes a STATEMENT directly ( at runtime).


Hope It Help You

MARK IT AS BRAINLIEST

17645.

Plz help exam todayPlease please please

Answer»

The PHOTO is not CLEAR , PLEASE you RESEND the photo

17646.

How are algorithm and flowchart related to one another?

Answer»

Definition of Algorithm

To write a logical step-by-step method to solve the problem is called algorithm, in other words, an algorithm is a procedure for solving problems. In order to solve a mathematical or computer problem, this is the FIRST step of the procedure. An algorithm includes calculations, reasoning and data processing. Algorithms can be presented by natural languages, pseudo code and flowcharts, etc.

Flow Chart Definition

A flowchart is the GRAPHICAL or pictorial representation of an algorithm with the help of DIFFERENT symbols, shapes and ARROWS in order to demonstrate a process or a program. With algorithms, we can easily understand a program. The main purpose of a flowchart is to analyze different PROCESSES. Several standard graphics are applied in a flowchart:

17647.

Linkedin is mainly used by professionalsa)Falseb)True

Answer» B)TRUE ....I THINK this is the CORRECT ANSWER
17648.

How is an ocr device different from an micr?

Answer»

While OCR is OPTICAL Character recognition, MICR STANDS for Magnetic Ink Character recognition. ... As MICR is limited to only 14 characters, it is not possible to print an entire check USING this special magnetic ink. OCR. OCR ALLOWS a MACHINE to automatically recognize characters using an optical mechanism.

17649.

How is an ocr device different from micr

Answer»

While OCR is Optical CHARACTER RECOGNITION, MICR stands for Magnetic Ink Character recognition. ... As MICR is limited to only 14 characters, it is not possible to print an entire check using this SPECIAL magnetic ink. OCR. OCR ALLOWS a MACHINE to automatically recognize characters using an optical mechanism.

17650.

Which toolbar allows to change font and thier sizes in ms word?

Answer»

If you have the Formatting toolbardisplayed (as most PEOPLE do), then pressing Ctrl+Shift+P SELECTS the Font SIZE control on the TOOLBAR. You can then type the font size you want to use and press Enter.

PLEASE MARK MY ANSWER AS A BRAINLIEST ANSWER.