InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 18001. |
to create a word document with following specifications :1. title of the document should be bold and central aligned 2. for the remaining text the alignments should be "Ightfield " 3. there should be a dashed line (_)at the end of the document. 4.page orientation should be landscape. |
| Answer» ACTUALLY what is your QUESTION | |
| 18002. |
I need to learn coding for free please teach me |
|
Answer» So i know coding of html this is an example...., ...... you can add many things like photo,video,gif and many more..for that we have to know high LEVEL language .... i cant write anymore use GOOGLE.... , |
|
| 18003. |
How many hosts can be attached to each of the local area network?a. 254 b. 128 c. 168 d. 192? |
|
Answer» Hey There! Your Questions' CORRECT option is (a) i.e 254. |
|
| 18004. |
What are the principle of accounts |
|
Answer» This principle is becoming less VALID, as a host of accounting standards are heading in the direction of adjusting assets and LIABILITIES to their fair values. Economic entity principle. This is the CONCEPT that the transactions of a business should be kept separate from those of its OWNERS and other businesses. |
|
| 18006. |
What is computer animation means |
|
Answer» Computer animation is the PROCESS used for generating animated images. The more general term computer-generated imagery (CGI) encompasses both static scenes and dynamic images, while computer animation only refers to the moving images. Modern computer animation usually uses 3D computer graphics, although 2D computer graphics are STILL used for stylistic, low bandwidth, and faster real-time renderings. SOMETIMES, the TARGET of the animation is the computer itself, but sometimes film as well. |
|
| 18007. |
What is the meaning of hierarchical presentations |
| Answer» TREE LIKE STRUCTURE from TOP to BOTTOM. | |
| 18008. |
In MS Access which key is used to move the cursor to new field |
| Answer» | |
| 18010. |
Plzzz answer this plzzzzzz fast ..... application based questions. 1 and 2 |
| Answer» QUESTION papaer blurr AAA raha hai meanz saaf NHI dikh raha hai seedhay uthawo picture and PHR hm answer kray gaayy | |
| 18011. |
How to write a java program which accepts double data type from the keyboard? |
|
Answer» Use a Scanner OBJECT to scan through a stream of INPUT CHARACTERS and to convert them into a float or a double . The methods that do this are nextFloat() and nextDouble() . Here is a program that inputs a string of characters and CONVERTS that string into primitive type double . |
|
| 18012. |
Draw a flow chart and write an algorithm for a program that multiple all two digit odd numbers |
|
Answer» Jjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjj |
|
| 18013. |
Difference betwwen sequential file organization and dorectory file organization |
|
Answer» ) Random file organization method is faster because RECORDS are stored and accessed directly as opposed to sequential file organization method which is slower since records are read and written one after another in a sequential order. |
|
| 18014. |
Difference between linear search and binary searchaugust 5, 2017 3 comments linear search and binary search are the two methods which are used in arrays for searching the elements. Searching is a process of finding an element within the list of elements stored in any order or randomly. the major difference between linear search and binary search is that binary search takes less time to search an element from the sorted list of elements. So it is inferred that efficiency of binary search method is greater than linear search. another difference between the two is that there is a prerequisite for the binary search, i.E., the elements must be sorted while in linear search there is no such prerequisite. Although both the searching methods use different techniques which are discussed below. content: linear search vs binary search comparison chart definition key differences conclusion comparison chart basis for comparison linear search binary search time complexity o(n) o(log 2 n) be⦠|
| Answer» YE QUESTION HAI YA ANSWER... | |
| 18015. |
Design thinking is another name for agile manifesto is true or false |
|
Answer» Yes, Design THINKING is another name for agile MANIFESTO. its true. |
|
| 18016. |
write a program to store 14 and 36 in two different variables A and B respectively. Calcutale sum, different and product of them and display all the information in different line. |
|
Answer» A program to STORE 14 and 36 in TWO DIFFERENT variable AANDB respectively. |
|
| 18017. |
A(n) _____ attack is meant to prevent legitimate traffic from reaching a service. |
|
Answer» Hi Denial of service (DOS) ATTACK is MEANT to prevent LEGITIMATE TRAFFIC from reaching a service. |
|
| 18018. |
What was the need of computer? |
|
Answer» We NEED COMPUTER to MAKE your WORK easy and for doing our work fastly. |
|
| 18019. |
A sequence of well defined steps to solve any problem , is called |
|
Answer» HELLO MATE A sequence of WELL defined STEPS to SOLVE any PROBLEM , is called an. Advertisement |
|
| 18020. |
What is primary key and foreign key in MS ACCESS? |
| Answer» PRIMARY KEY is a such type of restriction which HELP us to ENTER unique VALUE | |
| 18021. |
Foreign keys are not necessary the in its current table |
|
Answer» he point of a foreign key (FK) is to ensure that this column over here can only ever have values that come from that column over there1. This way we can be sure we only ever capture orders for customers that actually exist, for products we actually produce and sell. A lot of people think this is a good idea. The reason we declare them inside the DBMS is so it can TAKE care of enforcing them. It will NEVER ever allow in any data that breaks the rules. Also it will never allow you to get rid of data required to enforce the rules. By delegating this task to the machine we can have confidence in the integrity of the data, no matter what its source or when it was written or which application it came through. Of course this comes with a cost. The DBMS has to check the rules are being FOLLOWED, for each and every row, for each and every query, all the time. This takes time and effort, which is a load on the server. It also requires the humans to submit DML in a sequence that respects the rules. No more SLYLY forcing in an Order, then catching up with the admin afterwards. Oh no naughty human, you must first create the Customer, then the Product (and all the prerequisite rows) and only then may you create an Order. Without foreign keys we are much freer with what we can do, and the order in which we can do it. Problematical rows can be removed ad hoc to allow critical processes to complete. The data can be patched up afterwards, when the panic is over. INSERTs are generally a little quicker (which adds up over time) because no FKs checks are done. Arbitrary subsets of data can be pulled from the DB as desired without having to ensure all supporting data is included. And so on. This can be absolutely fine if the people involved know the system, take careful notes, have good reconciliation routines, understand the consequences and have the time to tidy up after themselves. The cost is that something, somewhere is missed one time and the database deteriorates into barely creditable JUNK. |
|
| 18022. |
Finding average of numbers stored in sequential access file in program |
|
Answer» ACCESS FILE in PROGRAMMING, |
|
| 18023. |
A repair for a known software bug,usually available at no charge on the internet,is called a_____? |
| Answer» FREE ANTIVIRUS is the ANSWER | |
| 18024. |
Why do picture kill tiger |
|
Answer» To conserve the WILD tigers as a species in the environment,several threat need to be addressed, habitat loss reducing of prey population, and direct hunting of TIGER because a lot of these hunting PRACTICES TAKE PLACE illegally and it is hard to put an end to poaching. |
|
| 18025. |
How is The b2c E-Commerce beneficial for consumer |
| Answer» B2C E- business REFERS to an EXCHANGE of products and services from a business to a customer. | |
| 18026. |
What are the differences between traditional web application and AJAX based web application? |
|
Answer» Technically the HTML rendered in the BROWSER is a client tier in a TRADITIONAL WEB application. ... In addition, Flex applications can integrate with the presentation tier to CREATE tightly coupled client-side systems. Flex applications use Flash Player to run SOPHISTICATED client-tier portions of the application. |
|
| 18027. |
Explain synchronous and asynchronous module of data ttansfer |
|
Answer» The protocols for serial data transfer can be grouped into two TYPES: synchronous and ASYNCHRONOUS. For synchronous data transfer, both the sender and receiver ACCESS the data according to the same CLOCK. ... For asynchronous data transfer, there is no common clock signal between the sender and RECEIVERS. |
|
| 18028. |
Explain a procedure of sharing of data between web server and web client |
|
Answer» Hypertext TRANSFER Protocol (HTTP) is a METHOD for encoding and transporting INFORMATION between a client (such as a web browser) and a web SERVER. ... HTTP is an application layer protocol and relies on an underlying network-level protocol such as Transmission Control Protocol (TCP) to function. |
|
| 18029. |
How can i say answer in loco game correct |
|
Answer» Hey, you just need to have a GOOD KNOWLEDGE about every thing and every TOPIC .LOCO game asks questions from every possible subject . HOPE THIS HELPS YOU HAVE A GREAT DAY ****************************** PLEASE MARK AS BRAINLIEST.........!!!! |
|
| 18030. |
What are the apps we use for studying?? Which one is the nice app among them?? What are the steps to install a studying app?? |
|
Answer» You can DOWNLOAD meritnation or buju's APP. Both of them are good. It's very easy just go to PLAY store and type the name of the app and then just click on install. Your app will be downloaded in no time. Hope that HELPS you |
|
| 18031. |
What is difference between hardware and software, in terms of physical existence? |
|
Answer» hi mate.... hardware are those which we can touch , USE and store our IMPORTANT stuff EG:- hard disk , mouse , pen drive , joystick etc software are those which we cant touch we can only view them eg:- any document in PC , any FOLDER etc hope it helps... |
|
| 18032. |
What are the apps we use for playing games?? Which one is the nice app among them?? What are the steps to install a game?? |
|
Answer» You go to play store then go to GAMES then which game you like INSTALL it the apps for playing games are Google playing games ETC |
|
| 18033. |
Diffrences between super computer and mini computer and a workstation |
|
Answer» The Differences Between a Supercomputer & a Minicomputer. Supercomputers are the most powerful computing machines on the planet. They use thousands of processor chips, COST MILLIONS of dollars and fill SMALL buildings. ... In contrast, supercomputers are rare and they are often custom-built to SPECIFICATIONS. |
|
| 18034. |
Differentiate between single link list and double link list |
|
Answer» The main DIFFERENCE between singly linked list and DOUBLY linked list is the ability to traverse. In a single linked list, node only points towards NEXT node, and there is no pointer to previous node, which means you can not traverse BACK on a singly linked list. On the other hand doubly linked list maintains two POINTERS, towards next and previous node, which allows you to navigatein both direction in any linked list. |
|
| 18035. |
Difference between singly linked list and doubly linked list in tabular form |
|
Answer» each node in the singly list stores the contents and a pointer or reference to the next node in the list. It does not store any pointer or reference to the previous node. Properties singly linked list is single directional It uses less memory PER node (single pointer) Complexity of INSERTION and deletion at a known position is O(n) while A doubly linked list is a list that CONTAINS links to next and previous nodes. Unlike singly. linked lists where traversal is only one way, doubly linked lists allow traversals in both. ways. Properties doubly linked list is bidirectional i.e can move backward as well as forth. It uses more memory per node(two pointers) Complexity of insertion and deletion at a known position is O(1) images of singly linked list and doubly linked list in TABULAR FORM are shown in attached files |
|
| 18036. |
What are the apps we use for ordering food?? Which one is the nice app among them?? How to order food from the nice app among them?? |
|
Answer» MATE it DIFFERS from REGION to region MENTION where are you from |
|
| 18037. |
Who was the developer of C C++ and JAVA |
| Answer» C++ LANGUAGE was developed byBjarne Stroustrup at AT & T BELL LABORATORIES | |
| 18038. |
Difference between lexical analysis and parsing in tabular form |
|
Answer» Lexical analysis determines the INDIVIDUAL tokens in a program by examining the structure of the character sequence making up the program token structure can be DESCRIBED by regular expressions Parsing determines the PHRASES of a program phrase structure must be described using a context-free grammar |
|
| 18039. |
Difference between fixed length coding and variable length coding |
|
Answer» This corresponds to a FIXED-to-variable LENGTH CODE that encodes each word of fixed length by a codeword . A variable-to-fixed length code is a code that takes a string in , breaks it into pieces of variable length, and replaces each PIECE into a word of fixed length. |
|
| 18040. |
What is a utility give an example |
|
Answer» What is a SOFTWARE ? A software is a set of programs / instructions that tells a computer / electronic machine that what to do when a particular event is triggered or, simply it can be defined as what happens when the user does something for example clicking a BUTTON etc. Software can be classified into :
System software can be classified into :
So here we see that utilities are a part of System Software. Utilities are softwares that HELP us to do various tasks WITHIN an OS. Utilities are pre-installed on the system. Some examples of utilities are Disk-defragmenter, File System Management Software, Back-up software, etc. Hope it helps. |
|
| 18041. |
write a program to print S is equals to 10 + 1 + 9 + 2 + 8 + 3 + 7 + 4 + 6 + 5 + 5 + 6 + 4 + 7 + 3 + 1 + 2 + 9 + 1 + 10 |
| Answer» | |
| 18042. |
What is the purpose of a horizontal scroll bar ? |
|
Answer» Horizontal scrolling is the ABILITY of a PROGRAM to allow a user to scroll horizontallyusing the window scroll bar. The horizontal scroll bar is not used often and USUALLY not VISIBLE or not accessible because it is not needed. Below is an image of a MICROSOFT Windows window with a vertical andhorizontal scroll bar. |
|
| 18043. |
What is micromedia flash ? |
|
Answer» MACROMEDIA FLASH -- |
|
| 18044. |
What is the difference between - and -- in terms of java ...? |
|
Answer» Here is your answer...☺☺☺ ➡➡➡➡➡➡➡➡➡➡➡➡➡➡➡➡➡➡➡ In simple terms a function is one which is declared OUTSIDE a class and a method is something which isdeclared inside a class and is called using instance of the class. Function or method is the same. While, Functionis a terminology of C++, method is terminology for function in Java. ✔✔✔✔✔✔✔✔✔✔✔✔✔✔✔✔✔✔✔ I hope this answer is helpful to U...❤❤❤ Keep Asking...✌✌✌ ✨✨✨If HELP you. Mark my answer as a brainliest✨✨✨ |
|
| 18045. |
Write a program to find the sum and average of three numbers |
|
Answer» uekwitwiwfjefeheifejeu3hekisuudkiehejeksksjehehhhejjejusuuiwjjw |
|
| 18046. |
A computer program that embodies specialized knowledge in a specific domain is called |
|
Answer» A computer program that embodies specialized KNOWLEDGE in a specific DOMAIN is called an expert system. An expert system uses various databases and these contain expert knowledge. It increase the ability of DECISION making of a person. These systems are DESIGNED to solve very complex problems. These systems also uses ARTIFICIAL intelligence. |
|
| 18047. |
Difference between | and || in terms of java..? |
|
Answer» Here is your answer...☺☺☺ ➡➡➡➡➡➡➡➡➡➡➡➡➡➡➡➡➡➡➡ You can use & with both integral and boolean variables in Java, but you can use && with only boolean OPERANDS. Integral variables doesn't include floating POINT types e.g. float and double. 2) Bitwise AND & or bitwise OR. ... That's all about difference between bitwise and LOGICAL OPERATOR in Java. ✔✔✔✔✔✔✔✔✔✔✔✔✔✔✔✔✔✔✔ I hope this answer is helpful to u...❤❤❤ Keep Asking...✌✌✌ ✨✨✨If help you. Mark my answer as a brainliest✨✨✨ |
|
| 18048. |
Calculate the average access time of memory for a computer with cache access time of 100ns,a main memory access of1000ns and a hit ratio is 0.9? |
|
Answer» BEST of LUCK, his RATIO is 0.9? |
|
| 18049. |
What is the difference between = and == in terms of java |
|
Answer» = in java MEANS that the given value is equal to the other value eg -: a=b this means value of a and b is equal == in java is USED for COMPARISON of two values eg -: a%2==0 this means value of a after dividing by 2 is compared with ZERO |
|
| 18050. |
Write advantage of working in python language? |
|
Answer» HEY here is your ANSWER I HOPE it is HELPFUL for U |
|