InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 17851. |
Factors Influencing Law of Demand |
|
Answer» Hebwhwue8shsd9wh2hedoxhnhqowshzbhshex |
|
| 17852. |
What is the importance of Business Cycle and what are the different phases of Business Cycles? |
|
Answer» The important things for a BUSSINESS CYCLE |
|
| 17853. |
What are the different managerial theories of Firm? |
|
Answer» MANAGERIAL THEORIES OF THE FIRM Managerial theories of the firm place emphasis on various incentive mechanisms in explaining the behaviour of managers and the implications of this conduct for their companies and the wider economy. According to traditional theories, the firm is controlled by its owners and thus wishes to maximise short run profits. The more contemporary managerial theories of the firm examine the possibility that the firm is controlled not by its owners, but by its managers, and THEREFORE does not aim to maximise profits. Although profit plays an important role in these theories as well, it is no longer seen as the sole or DOMINATING GOAL of the firm. The other possible AIMS might be sales revenue MAXIMISATION or growth. |
|
| 17854. |
State the type of that use in these items ,steel bowl,reflector of a torch, |
|
Answer» Steel- it is UNIVERSAL metal used for making pan,CAR,etc ANYWHERE you find you can SEE steel EVEN for making bowl |
|
| 17855. |
What is the difference between UNIX and LINUX? |
|
Answer» Unix originally BEGAN as a PROPRIETY operating SYSTEM from Bell Laboratories, which LATER on spawned into different commercial versions. On the other hand, |
|
| 17856. |
Properties of Iso-Quants(Iso-Product) Curves |
|
Answer» Properties of Iso-Quants(Iso-Product) Curves |
|
| 17857. |
Determine and define the h-parameters using a two port network model |
|
Answer» A two-port NETWORK is regarded as a black box with it's properties specified by a MATRIX of numbers. |
|
| 17858. |
Explain the construction and working of photodiode? |
|
Answer» A PHOTODIODE is one TYPE of light detector, used to convert the light into current or voltage based on the mode of operation of the device. Working of Photodiode The working principle of a photodiode is, when a photon of ample energy strikes the diode, it makes a couple of an electron-hole. This mechanism is also called as the inner photoelectric effect. If the absorption arises in the depletion region junction, then the carriers are removed from the junction by the inbuilt electric field of the depletion region. Therefore, holes in the region move TOWARD the anode, and ELECTRONS move toward the cathode, and a PHOTOCURRENT will be generated. The entire current through the diode is the sum of the absence of light and the photocurrent. So the absent current must be reduced to maximize the sensitivity of the device. |
|
| 17859. |
What is Fermi Dirac delta function. State its significance |
|
Answer» The FERMI-Dirac distribution applies to fermions, particles with half-integer spin which must OBEY the Pauli exclusion principle. Each TYPE of distribution function has a normalization term multiplying the exponential in the denominator which may be temperature DEPENDENT. The significance of the Fermi energy is most clearly seen by setting T=0. At absolute zero, the probability is =1 for energies less than the Fermi energy and zero for energies greater than the Fermi energy. We picture all the levels up to the Fermi energy as filled, but no particle has a greater energy. This is entirely consistent with the Pauli exclusion principle where each quantum state can have one but only one particle. |
|
| 17860. |
Explain the working principle of n-MOSFET |
|
Answer» MOSFET Working Principle. Theworking of MOSFET depends upon the metal oxide capacitor (MOS) that is the MAIN part of the MOSFET. The oxide layer presents among the source and drain TERMINAL. It can be set from p-type to n-type by applying positive or negative GATE voltages respectively. |
|
| 17861. |
Explain working principle of Photo transistor in brief |
|
Answer» A PHOTOTRANSISTOR is similar to a regular BJT except that the base current is produced and controlled by light instead of a voltage source. The phototransistor EFFECTIVELY converts light energy to an electrical signal. |
|
| 17862. |
Define i) Ripple factor ii) % Regulation |
|
Answer» Ripple:- The output of a RECTIFIER is consists of a DC component and an ac component. This ac component is undesirable and CAUSE for the pulsations in the rectifier output. So the ac component present in the PULSATING output i.e. in the rectifier output is known as Ripple. Ripple Factor:- The ratio of r.m.s. value of a.c. component to the d.c. component in the rectifier output is known as ripple factor i.e. Ripple factor = r.m.s. value of a.c component / value of d.c. component=Iac/IdcRipple:- |
|
| 17863. |
Classify metals using energy band diagrams |
|
Answer» Based on the ability of various materials to CONDUCT current, the materials are classified as conductors, insulators and the semiconductors. A metal which is very good carrier of electricity is called conductor. The copper and aluminium are good examples of a conductor A very poor conductor of electricity is termed as insulator. The glass, wood, mica, diamond are the examples of an insulator. A metal having conductivity which is between conductor and an insulator is called semiconductor. The silicon and GERMANIUM are the examples of a semiconductor. This does not conduct current at LOW temperatures but as temperature increases these materials BEHAVE as good conductors.. |
|
| 17864. |
List the benefits of h-parameters. |
|
Answer» Following are the advantages of h-parameters:-
|
|
| 17865. |
Explain about a charge density in a semiconductor |
|
Answer» CHARGE CARRIERS IN SEMICONDUCTORS Objectives: • Discovery of the nature of charge carriers in INTRINSIC and extrinsic semiconductors • Finding on what, how and why densities of charge carriers in semiconductors depend • Calculation methods of of charge carrier densities in semiconductors Content: Charge carriers in intrinsic semiconductors Nature of charge carriers Fermi level in an intrinsic semiconductor Densities of carriers Charge carriers in extrinsic semiconductors n-type semiconductors p-type semiconductors Compensation doping Excess carriers and lifetime Carefully refined semiconductors are called intrinsic semiconductors. . In a SILICON crystal each atom is surrounded by four NEIGHBOUR atoms. At 0 K all valence electrons take PART in covalent bonding and none are free to move through the crystal. As the temperature increases, the lattice vibrations arise. Some of the energy of the lattice vibrations is transferred to the valence electrons. If sufficient energy is given to an electron, it leaves a BOND and becomes free. The jump of an electron from the valence band to the conduction band corresponds to the release of an electron from covalent bonding. The minimum energy required for that is equal to the width of the forbidden band. If the width of the forbidden band is less, electrons are released at lower temperature. When an electron is released, a positively charged vacancy appears. This vacancy may be considered as a positive hole. According to the energy band diagram an uncompleted allowed energy level in the valence band corresponds to a hole. Hope it helps.. |
|
| 17866. |
Determine the operating point for a silicon transistor biased by fixed bias method with =100, RB=500 K , =2.5 K and =20 V and draw DC load line |
|
Answer» Frlkyxrly3lxvxcx.x3s.xrdxcy2xlxx4lb3.do. |
|
| 17867. |
A Full wave rectifier circuit is fed from a transformer having a center tapped secondary winding. The rms voltage from either end of secondary to center tap is 30 V, if diode forward resistance is 2Ω and half secondary resistance is 8 for a load of 1 K , Calculate, i).Power delivered to load ii).% regulation iii). Efficiency iv).Ripple factor |
|
Answer» I don't UNDERSTAND this QUESTION |
|
| 17868. |
For a silicon, =0.995 emitter current is 10mA & leakage current IC0=0.5A. Find IC ,IB ,, and ICEO |
|
Answer» Ķhcydkuftvtfufueudyzyvufy |
|
| 17869. |
Explain briefly drain characteristics of N-channel enhancement MOSFET |
|
Answer» Enhancement MOSFET, or eMOSFET, can be classed as normally-off (non-conducting) devices, that is they only conduct when a suitable gate-to-source positive voltage is applied, unlike Depletion TYPE mosfets which are normally-on devices conducting when the gate voltage is zero. |
|
| 17870. |
Find the concentration of holes & electrons in the P-type silicon at 3000K assuming its resistivity as 0.02-cm, p=475cm2 /vs , i=1.45×1010/ . |
|
Answer» Dff4xucytfofyugysyftsyeyeeust |
|
| 17871. |
Define the different stability factors. |
|
Answer» Answer: In the question asked regarding the concept of stability factors, they refer to the degree of change in OPERATING point. This happens due to the variation in temperature and there are mainly 3 variables of concern which are temperature dependent. Explanation: FOLLOWING are the stability factors:- #1: The Stability factor S' can be defined "as the rate of change of characters V B E , keeping I C O and β constant. #2: The stability factor S'' can be defined as the rate of change keeping in RESPECT to β. Also the condition is to keep I C O and V B E characters constant. |
|
| 17872. |
Tools can be used to determine the domain name system (dns) settings on a client computer |
|
Answer» Why are not REPLYING |
|
| 17873. |
What must a web server furnish the browser when it returns a document with a mime type? |
|
Answer» MIME stands for "Multipurpose Internet Mail Extensions. It's a way of identifying FILES on the Internet ACCORDING to their nature and FORMAT. For example, using the "Content-type" header value defined in a HTTP response, the BROWSER can open the file with the proper extension/plugin. |
|
| 17874. |
What are the standards supported by multi-standard wireless protocols? |
|
Answer» " A wireless LAN provides a public internet connection though wi-fi a given location is HOTSPOT. WAP is a SPECIFICATION for the set of COMMUNICATIONS protocols to standardize the way that wireless device can be USED for the internet access to prevent an unauthorize access or damage USING the wireless network. " |
|
| 17875. |
What kind of software is photoshop |
|
Answer» Answer: Adobe PHOTOSHOP is the PREDOMINANT photo EDITING and manipulation SOFTWARE on the market. |
|
| 17876. |
What are different errors encountered while compiling? |
|
Answer» Compile errors are those errors that occur at the time of compilation of the program. C compile errors may be further classified as: Syntax Errors When the rules of the c programming language are not FOLLOWED, the compiler will SHOW syntax errors. For example, consider the statement, 1int a,b: The above statement will PRODUCE syntax ERROR as the statement is terminated with : rather than ; Semantic Errors Semantic errors are reported by the compiler when the statements written in the c program are not meaningful to the compiler. For example, consider the statement, 1 b+c=a; In the above statement we are trying to assign VALUE of a in the value obtained by summation of b and c which has no meaning in c. The correct statement will be 1 a=b+c; |
|
| 17877. |
A system that can run multiple concurrent jobs on a single cpu have a process of choosing which taskhast to run when, and how to break them up, called "scheduling". the round-robin policy forscheduling runs each job for a fixed amount of time before switching to the next job. the waiting timefora job is the total time that it spends waiting to be run. each job arrives at particular time forscheduling and certain time to run, when a new job arrives, it is scheduled after existing jobs alreadywaiting for cpu timegiven list of job submission, calculate the average waiting time for all jobs using round-robin policy.the input to the function waitingtimerobin consist of two integer arrays containing job arrival and runtimes, an integer n representing number of jobs and am integer q representing the fixed amount oftime used by round-robin policy. the list of job arrival time and run time sorted in ascending order byarrival time. for jobs arriving at same time, process them in the order they are found in the arrival array.you can assume that jobs arrive in such a way that cpu is never idle.the function should return floating point value for the average waiting time which is calculated usinground robin policy.assume 0 |
|
Answer» "The average WAITING TIME for all the jobs usingthe round-robin policy is as follows.The input to the function #include int waitingtimerobin(int *job,int *run,int n,int tq) { int J,COUNT,time,remain,flag=0; int wait_time=0,turnaround_time=0,rt[10]; remain=n; for(count=0;count { rt[count]=run[count]; } for(time=0,count=0;remain!=0;) { if(rt[count]<=tq && rt[count]>0) { time += rt[count]; rt[count]=0; flag=1; } else if(rt[count]>0) { rt[count] -= time_quantum; time += time_quantum; } if(rt[count]==0 && flag==1) { remain--; wait_time += time-job[count]-run[count]; flag=0; } if(count==n-1) count=0; else if(job[count+1]<=time) count++; else count=0; } printf(""waiting time %f"",wait_time*1.0/n); return 0; } int main() { int ja[],at[]; int n,tq; SCANF(""%d"",&n); for(i=0;i { scanf(""%d%d"", &ja[i],&at[i]); } scanf(""%d"",&tq); int *cellsptr=ja; int *cellsptr1=at; waitingtimerobin(cellsptr,cellsptr1,n,tq); return 0; }" |
|
| 17878. |
Pentium I computers are fourth generation of computer. Why? |
|
Answer» Pentium I is a MICROPROCESSOR and all microprocessor BASED COMPUTERS are CONSIDERED as the fourth generation. Let us see the other generations as well :1)First generation — vacuum tubes . 2)Second generation — transistors. 3)Third generation — integrated circuits . 4)Fourth generation — microprocessors. 5)Fifth generation — artificial intelligence and quantum computing (research ONGOING) |
|
| 17879. |
Derive the CE h-parameters hre and hie in terms of the CB h-parameters |
|
Answer» This paper introduces a model for the computation of the regional cerebral metabolic rate of OXYGEN from the data of cerebral regional radioactivity collected after INHALATION of 15O2. A method was devised for the DIFFERENTIAL determination of the respective contribution of radiooxygen and of radiowater in the inflow and the outflow of radioactivity in the brain after or during such on inhalation. The results demonstrate the feasability of such a model and outline some of the methodological prerequisites to be taken into account in the NUMERICAL analysis of the data. |
|
| 17880. |
Prove that the conductivity of a semiconductor is given by = q( p p + n p) |
|
Answer» Tvctlvc4puc5c5l3c4l |
|
| 17881. |
Write a python function that takes two lists and returns true, if they have at least one common member. |
|
Answer» "Given below is the python FUNCTION that TAKES TWO lists and returns true, if they have at least ONE COMMON member you have asked for in the question. The codes should be entered as below defcommon_data(list1, list2): result = False for x in list1: for y in list2: if x == y: result = True return result print(common_data([1,2,3,4,5], [5,6,7,8,9])) print(common_data([1,2,3,4,5], [6,7,8,9])) " |
|
| 17882. |
We cannot run a query without saving it or not . Please answer will be sure |
|
Answer» Solution: We can even run the query WITHOUT saving it. QUERIES are generally saved in order to avoid accidental notifications that might ARISE. However, if one wants to use it again, it is not necessary to save it each time. While closing the FILE, one can open to carry out further searches. |
|
| 17883. |
Which three statements represent the benefits of performing experiments using computer simulations |
|
Answer» ONE can do EXPERIMENTS with the HELP of computer simulations which if otherwise would have been required to be done, may have faced MANY bottlenecks. Computer simulations of experiments help to get the COMPLETE assumptions, and one can model anything with them virtually; one can measure the performance of many non-existing systems. |
|
| 17884. |
Dentify the tools that are used for executing SQL commands from a programming language. |
|
Answer» Following are some of the tools for executing SQL commands. They are as FOLLOWS:- SQL*PLUS a tool for the execution of the SQL and PL/SQL interactively, iSQL*plus is a tool based on WEB browser that is USED for the execution of the SQL commands. Next important tool is the Oracle SQL Developer. |
|
| 17885. |
How is content presented by Drupal? |
|
Answer» Most content on a DRUPAL website is stored and treated as "nodes". A NODE is any PIECE of individual content, such as a PAGE, poll, article |
|
| 17886. |
Which property is mostly used when there are several buttons in a form? |
|
Answer» The ValidationGroupproperty specifies which group ofcontrols is validated on validation. This PROPERTY is mostly used when there are SEVERAL buttons in a form. SET the ValidationGroup property of those CONTROLS to something unique. |
|
| 17887. |
Which symbol indicates the type of effect used for text and objects in slide |
|
Answer» In a powerpoint SLIDE, the symbol that is USED to ADD text is the text box. Through power POINT, one can give a presentation of some PLANS or ideas on the computer. One can add sound to the slides and can arrange the change of the slides in many styles making the presentation look good. |
|
| 17888. |
In cloud, service uptime is 50 minutes and downtime is 10 minutes in an hour. What is the availability of the service? (a) -4 (b) 0.2 (c) 5 (d) 0.8 |
|
Answer» Uptime is a PC industry TERM for the time amid which a PC is OPERATIONAL. DOWNTIME is the time when it isn't operational. ... For instance, one standard for uptime that is now and again talked about is an objective called FIVE 9s - that is, a PC that is operational 99.999 percent of the time. |
|
| 17889. |
Which is an item of storage medium in the form of circular plate ___? |
|
Answer» Disk is an item of storage medium in the form of circular plate and it allows storing LARGE amount of data with the SAFE manner. on the other hand it is QUITE simple for the student to GET right ideas on it. Hence this answer is supportive for the student to get right ideas of it. |
|
| 17890. |
Consider the following networks (n is large): (2DH): A 2D-mesh of n nodes having size n1/2 x n1/2 (3DM): A 3D-torus of n nodes having size n1/3 x n1/3 x n1/3 (HYP): A hypercube of n nodes (CLIQ): A complete network of n nodes The arrangement of the networks in increasing order of diameter is: |
|
Answer» The answer is 4. The omp_get_num_threads() function will be returning the number of threads present in the TEAM which is CURRENTLY running in the parallel region from which the particular thread was CALLED. If the omp_get_num_threads() is called from a serial portion or nested parallel region in the PROGRAM which is SERIALIZED, 1 will be returned. |
|
| 17891. |
Obtain S and S' factors. |
|
Answer» Eeeedhdhdhiiwiwiwiejejehshsd |
|
| 17892. |
Draw and explain the small signal model of JFET. |
|
Answer» The junction gate field-effect transistor(JFET or JUGFET) is one of the simple type of field-effect transistor.[1] JFETs are three-terminal semiconductor devices that can be USED as electronically-controlled SWITCHES, amplifiers, or voltage-controlled resistors. |
|
| 17893. |
Find the concentration of holes and electrons in a p-type germanium at 3000K, if the conductivity is 100-cm. mobility of holes in germanium p = 1800 /Vsec. |
| Answer» | |
| 17894. |
1. In the code fragment below, start and end are integer values and gcd(x,y) is a function that computes the greatest common divisor of x and y. i := 0; j := 0; k := 0; for (m := start; m 2){ i := i + m; k := k + m; }else{ j := j + m; k := k + m; } } At the end of the loop which of the following expresses a valid relation between i, j and k? k == i - j k == j - i k == i + j The relationship depends on start and end |
|
Answer» Many PROGRAMMING issues (particularly on Brilliant) frequently inquire as to whether certain numbers have remarkable characteristics. Knowing how to actualize this in the code is regularly a test and these CALCULATIONS come up MUCH of the time when managing harder programming issues. By TAKING care of these issues, you build up a "munititions stockpile" of helpful calculations. |
|
| 17895. |
2 points A new algorithm MaxPack for optimally packing furniture in a transportation container claims to have worst case complexity O(n2 log n), where n is the number of items to be packed. From this, we can conclude that: For every sufficiently large n, for every input of size n, MaxPack requires time proportional to n2 log n. For some n, for every input of size n, MaxPack requires time proportional to n2 log n. For every sufficiently large n, every input of size n can be solved by MaxPack within time proportional to n2 log n. For every sufficiently large n, there is an input of size n for which MaxPack requires time proportional to n2 log n. |
|
Answer» For some n, for EVERY input of size n, MAXPACK requires time proportional to n2 log n and it is RIGHT answer for the given QUESTION. On the given question you can find out the right ideas of it and it is applicable to read and find out best answer with no RISK and troubled of it. |
|
| 17896. |
In general if the size of the cache is increased, then the cache-hit-ratio will |
|
Answer» in general when the size of the CACHE is increased, the cache HIT ratio increases gradually. It is higher for the most popular photos. Cache hit ratio is the ratio between cache hits and the sum of cache hits and cache misses. It is then multiplied by 100. so we can SEE that the ratio generally increases when cache size increases. |
|
| 17897. |
Discuss different themes available in Word 2007? |
|
Answer» "Although the WORD application of 2007 has come conveniently, we are not getting the proper use of it. We may STILL use the individual tools for our purposes. You should try the newest themes introduced here for its customers. It is an excellent way to make our DOCUMENTS look professional and efficient. So you should not be hesitant to use these fantastic themes. " |
|
| 17898. |
Identify the valid data types which can be used in sql to define the type of data |
|
Answer» "There are many DATA TYPES in SQL. They are different from one to another. But all of them perform significant FUNCTIONS that are unique to each of them. Some of the data types USED here are CHARACTER, VARCHAR, BOOLEAN, INT, SMALLINT, DECIMAL, NUMERIC. These are the basic data types used COMMONLY. You should study the different aspects of these data types in the field. " |
|
| 17899. |
In multifaceted plot, how many rows will be formed when facets is mentioned as facets=drv~. |
|
Answer» Plotting multiple groups with FACETS in ggplot2 ... This is a known as a facet plot and now you have to calculate in a 1 dimensional ribbon that can be wrapped to multiple rows. And the values p <- ggplot(data = mpg, aes(x = displ, y = hwy, color = DRV)) + geom_point() p . Some of the SUBSETS may exhibit extreme bahavior of a variable causing other facets. |
|
| 17900. |
Consider a 1 GHz processor having a 32K cache with cache line size 16 bytes. If the memory latency (for 1 cache line) is 100 ns and cache latency is 1 ns per word (4 bytes), compute the FLOPS for performing the dot-product of two vectors of N elements comprising of 32 bit floating point numbers. You can assume that the madd operation takes 1 cycle to execute. Ignore the time to perform address increment operations and loop branching. Assume N is a large integer. |
|
Answer» There will be two matrices into the cache MEMORY which will be of 2k words. This will take up the time of 200µs (2000*100ns). On MULTIPLYING both the nxn matrices, there will be 2n^3 OPERATIONS which means there will be 64k operations. To PERFORM these operations, there will be 16k cycles needed which means 16µs. So, the total time for computation will be 200 + 16µs or computation RATE of 64K FLOP/216µs which is 303 MFLOPS. |
|