Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

18151.

To declare a namespace as the default namespace for an XML document, which attribute should we add in the root tag of an XML document.

Answer» XMLNS:= " URL". is the ANSWER.
18152.

What is the value of h(231,8) for the function below? def h(m,n): ans = 0 while (m >= n): (ans,m) = (ans+1,m-n) return(ans)

Answer»

"The answer to this question is 28.

The white loop will run 28 times.

In the first step, SINCE 231≥8.

(u, 231)=(1,223)

Then in the SECOND step,

(1,223)=(2,215)

This will run for 28 times when m will  finally reach 7 or less than 8. the value of n at that point value of 7 is 28."

18153.

Clock synchronization algorithms explanation in detail.

Answer»

Solution: Universal Coordinated Time (UTC):


· Based on the number of transitions PER second of the cesium 133 atom (PRETTY accurate).


· At present, the real time is taken as the average of some 50 cesium-clocks around the world.


· Introduces a LEAP second from time to time to COMPENSATE that days are getting longer.



UTC is broadcast through short wave radio and satellite.


· Satellites can give an accuracy of about ±0.5 ms.

18154.

Answer the given questions :1) How Computers are useful to us ?

Answer»

The computers has made EVERY body life EASIER. Computers are very good because they are useful in SCHOOLS, useful for making movies, useful in banks and they are even useful for communication. One of the main REASON for computers are being put in school is because of the students.

18155.

In what type of pin, data pin of DHT sensor should be connected

Answer»

In DIGITAL TYPE of PIN

18156.

Practice of developers integrating changes directly in the feature or work branches and commiting the changes at the end to the mainline is known as ___________________. A) Integration Build B) Continuous Integration C) Promiscuous Integration

Answer» CONTINUOUS INTEGRATION is RIGHT
18157.

Set of independent electronic stores can be generally labeled as

Answer» HEY mate here is your answer-

set of INDEPENDENT electronic STORES can be GENERALLY labelled as furniture.

hope this helps you
18158.

Four new operators added by c++ which aid object oriented programming. in c++

Answer»

The four new operators added by C++ INCLUDES the following : new, delete, compl, and, and_eq, not, or, or_eq, xor, xor_eq, and bitor.

Amongst the given 4, only the first two are considered to be SAID to aid OOP.

Also, other keywords that aid OOP are CLASS, friend, mutable, PRIVATE, protected, and template.

18159.

Which of the following is/are correct? (a) SLA contains SLO (b) SLO contains SLA (c) Multiple SLAs are aggregated to KPI (d) KPIs are aggregated to SLO

Answer» B OPTIONS because i THINK it's RIGHT
18160.

Q. 4. what do you understand by capacity planning? explain the decision tree modeling for capacity expansion.

Answer»

Normally, a planning is ALSO concerned with thinking ahead as WELL as the making PROVISION.  

In general, the capacity can be referred to as the UPPER limit on the rate of output.

Therefore capacity planning can be defined as the process used to DETERMINE how much capacity is needed and when it is needed.

18161.

Is Matrix an artifact repository

Answer»

No DEAR , MATRIX is too GOOD

18162.

Which of the following VM configurations qualifies for SLA availability?

Answer»

It is the home cloud azure which OFFERS SLA availability in SINGLE INSTANCE.

Usually SLA does not offer single instances for the virtual machine or VM configuration.

However in Azure directory, home cloud azure comprise of the event and offer single instance availability.

At present, about 99% of SLA seems to offer single instance feature.

18163.

Is in distributed computing each processor has its own local memory?n?

Answer»

In distributed computing, the local MEMORY has been taken with operating system and it could achieved with TIGHTLY COUPLED from distributed computing.

This is necessary for meeting local memory and involves CLOCK on local memory and none of the mentioned one.

Each processor has its own local memory and EVALUATE by coupling from distributed computing.

18164.

New area of technology which deals with collection data from all types of devices which

Answer»

Data communication is BASICALLY an approach to GATHERING of  various information.It ALSO an approach to measurement of various information from various sources.

Few data collection methods are surveys ,interviews  and various focusing groups.Data can also be COLLECTED from mobiles and traffic from web and even from server activity.

18165.

Which of the following challenges make the application of traditional distributed consensus algorithms to blockchain-based systems difficult over the Internet?

Answer»

"Block chain serves as an immutable record which allows transactions take place in a decentralized manner.

Block chain-based applications are bouncing up and they are covering MANY fields including financial services, reputation system and INTERNET of THINGS and so on and these challenges MAKE traditional distributed consensus algorithms to block chain-based systems difficult over the Internet "

18166.

In a columnar database, the columns are stored together on disk, achieving a higher compression ratio is an expensive operation, a. true b. false

Answer»

TRUE. Column oriented databases are SUITABLE for analytical workloads as it has the data format lends with faster query PROCESSING that especially scans and aggregation.

The COLUMNAR databases stores the data to a single column together disk or in-memory or both. Row oriented databases stores the single row contiguously and goes over all values of a PARTICULAR.

18167.

Google Search Console “Crawl” reports let you monitor...? A If potential customers can access your web pages B If Google can view your web pages C How people interact with your website D What information Google records about your site

Answer»

The answer to this question is option B. It is because the Google SEARCH console Crawl REPORTS let you motor if Google can VIEW your WEB pages.

It also brings the information regarding the activity of Google Bot on the website.

The report is entirely based on various details including flash, Javascript, CSS, PDF and much more.

18168.

Which data structures can cause un-international looping of a program?

Answer»

In a data structure, there are CERTAIN cases when we get unintentional LOOPING of a program.

Like, if you NEGLECT to write or form a base case properly, or the testing of it in some way or ANOTHER goes INCORRECTLY, then it can cause an infinite loop issue.

Avoiding infinite loops require a lot of care and precision.

18169.

Which data structures can cause un-intenstional looping of a prgm?

Answer»

In a data structure, there are certain cases when we get UNINTENTIONAL looping of a program.

Like, if you NEGLECT to write or form a base case properly, or the testing of it in some way or ANOTHER goes incorrectly, then it can cause an infinite loop issue.

AVOIDING infinite loops require a LOT of care and precision.

18170.

What is an expression that tells how the numbers in a determined set of cells are to be calculated

Answer»

"Formula is an expression that tells how the numbers in a determined set of cells are to be calculated.

Explanation: Microsoft Excel is CONSIDERED the industry standard piece of software in data ANALYSIS.

Microsoft’s spreadsheet program also happens to be one of the most preferred software by INVESTMENT bankers and financial analyst in data PROCESSING, financial modeling, and presentation."

18171.

As a best practice, how should workflows use a local desktop application

Answer»

As a best PRACTICE, the workflow make use of local desktop APPLICATION by checking if the corresponding PROCESS is running and if not, opening the application by using the open application activity.

UiPath’s recorder facilitates you to stimulate the actions you have adopted during the time of screen recording.

In sample workflow, the recording BEGINS by specifying the app location.

18172.

which is odd one... computer in robot, computer in a microwave oven, computer as a desktop, computer in a washing machine

Answer»

ANSWER:

DESKTOP

EXPLANATION:

HOPE IT HELPS U

18173.

What name is given to a tunneling protocol that encapsulates packets inside internet protocol (ip) tunnels? layer 2 tunneling protocol (l2tp) terminal access controller access control system plus (tacacs+) point-to-point protocol (ppp) generic routing encapsulation (gre)?

Answer»

IP tunnel is the Internet PROTOCOL (IP) network COMMUNICATIONS channel of two networks so that they are USED for transporting to ANOTHER network based on protocol that uses the special aspects of encapsulation.

IP tunnel are used to transport another network based on the protocol with encapsulation of packets. Normally the IP tunnels OFTEN used to connect 2 disjoint IP networks.

18174.

Which situation will prevent a virtual machine (VM) from being migrated from an on-premises environment to Azure?

Answer»

The suggested method of migrating VIRTUAL machines to Azure is the usage of ASR.

By making use of ASR, organizations can able to REPLICATE their one-premises Hyper – V- virtual machines, VMware virtual machines, PHYSICAL servers and many OTHERS to Azure.

This is quite USEFUL in terms of disaster recovery to carryout failovers and helps in migrating from one-premise environment to azure.

18175.

What does g(31415927) return, for the following function definition? def g(x): (q,d) = (1,0) while q

Answer»

"ANSWER is 25

the while loop will run 25 times

as 31415927 / 2**24 =1.8...  which is > 1

so for last time it will GO

for 2**25 , d will be incremented 24+1=25

then it becomes less than 1

CONDITION becomes false... while loop terminates


-->the no. of times X is divided by 2 & remains >1

the d will be incremented by 1"

18176.

EM communication for Nano-networks centers around: a.0.1-10 Terahertz channel b.0.1-10 Gigahertz channel c.10-100 Terahertz channel d.10-100 Gigahertz channel

Answer»

The correct answer to this question is option a. EM COMMUNICATION for Nano-networks centers around a.0.1-10 Terahertz channel.

In order to predict the frequency band of operation of future EM nano networks, it is necessary to characterize the RADIATION properties of graphene.

DESPITE their DIFFERENT origin, both approaches envisage the thz band to become the frequency RANGE of operation for future nano-electromagnetic transceivers.

18177.

Available memory resources in the parent resource pool are insufficient for the operation

Answer»

The ANSWER is YES ........

18178.

When looking to optimise the performance of a website to improve its search engine ranking, using 'long tail keyword terms' in your SEO plan often allows you to... A Outrank lots of larger, more established companies B Find more opportunities C See more traffic than short tail keywords D Perform better on social media

Answer»

The answer to this question is option C.

It is because when we are looking to optimize the performance of a website to improve its SEARCH engine ranking, using 'LONG tail KEYWORD terms' in our SEO PLAN often allows us to see more TRAFFIC than short tail keywords.

It is essential to know that the long tail keywords also bring you many potential benefits.

18179.

Which systems provide a single cohesive platform Although (integrated systems'enterprise'customized) provide a huge advantage by integrating all business functions of an organization into a single cohesive platform they require a huge initial investment and are vulnerable to (server failures'data overflow'security threats)

Answer»

The answer to this question is Enterprise Resource PLANNING. When it comes to ERP, it is a great EXAMPLE of hugely implemented business process management system TOOL ideal for both industries and organizations.  

The GOOD thing about this system is that it lets organizations to easily integrate various facets of operations like processing, SALES, manufacturing and product planning in a single user interface and database.

18180.

Which among these helps in developing a microservice quickly

Answer»

Microservices are specialized SERVICES that bring changes only where and when they are ACTUALLY REQUIRED.  

By using the microservices architecture, the application successfully monitors every functional component.

Also, it detects the augmented traffic and also ADDS some new INSTANCES of ATM locator function.

When it comes to microservice, it is the software development technique which structures the application as a range of loosely merged devices.

18181.

If an investment is considered “volatile”, it means...A) the investment will experience rapid growth over time.B) the value of the investment may be hard to predict.C) the investment is high-risk, and its price will increase quickly.D) the investment is undervalued and may increase over time.

Answer»

I THINK it MAY be A or C

18182.

After the row is determined in Edit Mode, locate the control in the proper cell by using the ________ method in the selected row. a)Findcontrol() b)GridviewRow.cells[].FindControls[index} 3)GridViewRow[i].cells[index].controls[count]

Answer» FIND CONTROL..........
18183.

__________ infrastructure replaces a server completely when there is a change

Answer»

The answer is immutable infrastructure.

It replaces the SERVER completely when there is a change. An immutable infrastructure is known as another infrastructure paradigm in which servers are never MODIFIED after they get DEPLOYED.

If something seems to be updated, FIXED or modified in any way, then new servers will be created from the common image with suitable changes and it is meant to replace the older ones.

18184.

Describe the a* search and give the proof of optimality of a*.

Answer»

"A* search in the computer science is an algorithm that is widely used in the PROCESS of pathfinding and graph traversal that is the process in which a path is FOUND between the multiple POINTS that are known as nodes. There are two condition in which A* is optimal,

• The monotonic heuristic condition, if h(ni)< h(ni+1), then the real-cost(ni)< real-cost(ni+1)

• The admissible heuristic condition as it will never OVERESTIMATE the cost.

"

18185.

Calls to missing functions in a c program are detected by

Answer»

What is CALLED a function ?A function is such a  GROUP of STATEMENTS that is able to carryout to perform a task together .

A function declare  the compiler about the  name, return type, and parameters of the GIVEN function.

A function definition provides the actual body of the function.

The C standard library provides a wide ranges of built-in functions that your PROGRAM can call.

Example:-#includeThe calling function is exacly the one that calls your function.

18186.

-1,0,11,?,1885,26404

Answer»

So...
what is UR QUESTION about it???

18187.

A system uses the stop-and- wait arq protocol. if each packet carries 1000 bits of data, how long does it take to send 1 million bits of data if the distance between the sender and receiver is 5000 km. and the propagation speed is 2 x 10 8 m/s? ignore transmission, waiting, and processing delays. we assume no data or control frame is lost or damaged. (forouzan – 30)

Answer»

Frames = (1,500,000 bits of data) / (1,000 bits of data per FRAME) = 1,500 frames.

Data frame transmission TIME = (1,000 bits/frame) / (1 Mbps) = 1 ms Data frame trip time = (4,000 Km) / (200,000 Km/s) = 20 ms ACK transmission time = 0 (It is usually negligible)

ACK trip time = (4,000 Km) / (200,000 Km/s) = 20 ms Delay for 1 frame = 1 ms + 20 ms + 20 ms = 41 ms per frame TOTAL delay = (1500 frames) x (41 ms per frame) = 61.5 s

Note: The question states that you do not need to account for transmission time, so the following answer is also acceptable: Delay for 1 frame = 20 ms + 20 ms = 40 ms per frame Total delay = (1500 frames) x (40 ms per frame) = 60 s

18188.

Any event that results in violating your security policy, or poses an imminent threat to your security policy is considered:

Answer»

EXCEPTION is it's NAME

18189.

Program to display time in hours,and convert time into minutes as well as seconds

Answer» Heya mate..❤❤
IMPORT java.util.*;
class TIME
{
public static void MAIN(String args[])
{
Scanner sc=new Scanner(System.in);
Sopln("Input seconds");
int SEC= sc.nextInt();
int hours=sec/3600;
sec=sec(PERCENTAGE SIGN)3600;
int min=sec/60;
Sopln("Hours:"+hours);
Sopln("MINUTES"+min);
Sopln("Second"+seconds);
}
}

HERE
18190.

......is an organisation that provides services accessing and using the internet?

Answer»

Internet SERVICE provider ( ISP )

An internet service provider is an ORGANISATION that provides SERVICES ACCESSING and using the internet .

18191.

What is the difference between computer science and IT and mention the advantage and disadvantages of them?

Answer»

Computer science advantage: It INCLUDES core engineering and programming SKILLS. Computer science has more opportunities compared to IT.
Disadvantages: It is DIFFICULT to learn. Requires life TIME learning. Requires BETTER mathematical skills.
IT advantages: It is easy to learn. Requires less efforts. It will make u expert of networks and security.
Disadvantages: Jobs are less compared to computer science. Salary package is also less.
Thank you!!!!!!!

18192.

In ms-excel two common wildcard characters that ms-excel recognizes are

Answer» HELLO MATE,

RECOGNISES are
18193.

Difference between hacker and cracker pointwise

Answer»

A cracker is one who breaks into or OTHERWISE violates the system integrity of remote machines with MALICIOUS intent.

A security HACKER is someone who seeks to breach defenses and exploit WEAKNESSES in a computer system or network.

18194.

The first Apple ‘office’ was in a garage. But do you know who founded the computer giant?

Answer»

❣️ HEY MATE ❣️
\huge{Steve Jobs}
Founded the COMPUTER giant.

❣️ HOPE it HELPS ❣️

18195.

How many osi layers are covered in the x.25 standard? (a) two (b) three (c) seven (d) six?

Answer» THREE PSI LAYER are COVERED in the x.25 STANDARD
18196.

Which of the following ports is wrongly matched?80::HTTP443::SMTPS23::Telnet25::SMTP

Answer»

⏬⏬here is the answer.⏬⏬

⭐⭐⭐23⭐⭐⭐

18197.

The topmost layer in layered design of RPA is

Answer»

Robotic process automation

has layering which is grouped according to the way they function. Application layer is the most top layer in robotic application automation SYSTEM .This layer is comprised of specific application services. It consists of very unique application divided SYSTEMS which FORM to whole application. It contains the most important SOFTWARE which ADDS value to the developing organization. CMM

18198.

Keto Ultra Diet Stay center and decide to complete the whole program until the point when you have achieved your coveted body measure. Toward the day's end, the choice is forever yours; regardless of whether you need to keep the 10 different ways to get more fit or to remain unfortunate and less beneficial.

Answer»

Hey mate,


We are PERFECTLY FIT and FINE. We don't want any products so STOP advertising UR products.

18199.

What is dark web ? can you explain it ?

Answer» WEBSITES that don't show up in Google - Accessed using a specific onion/tor router that preserves anonymity. You can only get there through specific technology and is extremely DIFFICULT to TRACE.
- Used because people don't want surveillance/government intervention
- Illegal activity
- Freedom of expression in countries with LIMITED access to INTERNET

18200.

How to download a app fast in android during poor connection?

Answer» U just BUY a NEW SIM CARD .