Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

18201.

State True or False ( Computer Science )

Answer»

It should be false because I THINK that DEFAULT COLOUR used to DRAW is black.

18202.

State True or False ( Computer Science)

Answer» 1ST ANSWER is FALSE
2nd answer is false
3rd answer is false
all answer is false
18203.

Fill in the blanks : ( Computer Science )

Answer»

1.looping.

2.drawing line

3.

18204.

Divergence of information technology in the field of human health is

Answer»

Can you elaborate your question? is it fill in the blanks or brief question??

information Technology plays a very IMPORTANT ROLE in our day to day life even in our health purposes for example due to information Technology now or doctor which is in another country can operate a patient of other country and also there are many apps and software which can predict the disease with very EASY METHODS and also give prescriptions according to it and accuracy level of these methods are excellent and this provides many advantages like they are not required to visit any doctor or wait for anything they will get a independent of their own.

those technologies which HELP to improve the health of human being from one round to another like from our BP machine to operating tools there are known as divergence of it for health

18205.

Difference between traditional and modern software project management

Answer»

In traditional project MANAGEMENT, the extent of the project is defined and determined up front, so adjustments to that scope cause problem for the team. However, im modern SOFTWARE project management, the scope of the project is not set and can change according to the CLIENT. Also in traditional project management, the project manager takes all the CREDIT for project SUCCESS whereas in modern technique whole team set accountable for the success of the project.

18206.

The speed by which an E-mail message is passed is speed of

Answer»

The FASTEST thing in the universe is the speed of light which is 186,000 miles PER SECOND. An email makes it to the other side of the PLANET at NEARLY half the speed of light.

18207.

Define computer, software, types of buses, types of softwares

Answer» COMPUTER is ELECTRONIC DEVICE which do our WORK EASIER.
18208.

Algorithm based on computer generation of single random variables

Answer»

We consider the problem of the computer generation of single random variable X with a GIVEN characteristics function when the corresponding density nd DISTRIBUTION function are not explicitly known or have completed EXPLICIT formulas. Under mild conditions on the characteristics function, we purpose and analyze a rejection / squeeze algorithm which REQUIRES evaluation of one INTEGRAL at a crucial stag.


Hope it will help you.. : )

18209.

Why resource utilization is important in cloud environment?

Answer» HI MATE......
Resource utilization is an important topic in field of computer science, yet it is a HOT research area. The NEED for resource utilization never stops as long resources are limited compared to the increasing demand on COMPUTERS and computing.
18210.

Which of the most important characteristics of superscalar processor?

Answer»

CHARACTERISTICS of superscalar processors

Superscalar processors issue

– more than one instruction each cycle

– the NUMBER of instructions issued will DEPEND on the instructions in the instruction

stream

– instructions are often re-ordered to FIT the processor architecture better

– typically, between 1 and 8 instructions can be issued each cycle

• The simplest possibility is a machine which issues

– one integer instruction

– one floating-point instruction

• per clock cycle

• this only GIVES appreciable improvements if there are many FP

instructions to be executed.

18211.

What is the role of a compression function in a hash function?

Answer»

I NEED HELP to its hella konfusing

18212.

Which test is applied to know wehter data is normally distributed?

Answer»

Hello buddy
A normal distribution USING. The chi-squared
Goodness of fit TEST. If your data is NORMALLY
Distributed then. You can use a set of tests
Called parametric tests that are more
Powerful in DISCRIMINATING.

18213.

When an argument is passed by value:-a. The function accesses the argument's original value in the calling programb. The function cannot access the argument's valuec. The function copies the value of argument to its own variabled. Arguments reference is used in function definition?

Answer» OPTION NUMBER C is the CORRECT ANSWER....
18214.

What is the process of decomposition? Explain with suitable examples software enginerring?

Answer»

Functional decomposition is a term that engineers use to describe a SET of steps in  which they break down the OVERALL function of a device, system, or process into its  smaller parts. This is usually accomplished through THOUGHTFUL ANALYSIS and team  discussions of project information and the result is a chart that describes the problem  and or solutions in increasing DETAIL.

18215.

What is multimedia ? What are the limitation of traditional databases?

Answer»

Multimedia is the FIELD concerned with the computer-controlled integration of text, graphics, drawings, still and moving images (Video), animation, AUDIO, and any other media where every type of information can be REPRESENTED, stored, transmitted and processed digitally.

Relational and warehouse database systems  often read data in 8k or 16k block sizes. These block sizes load data into MEMORY, and then the data are processed by applications. When processing large VOLUMES of data, reading the data in these block sizes is extremely inefficient.

18216.

What is major part in browser while developing web application?

Answer»

Web development is the work involved in developing a web site for the Internet (World Wide Web) or an intranet (a private network). Web development can range from developing a simple single static page of plain text to complex web-based internet applications (web apps) electronic businesses, and SOCIAL network services. A more comprehensive list of tasks to which web development commonly refers, may include web engineering, web design, web content development, client liaison, client-side/server-side scripting, web server and network security configuration, and e-commerce development. Among web professionals, "web development" usually refers to the main non-design aspects of building web sites: writing markup and coding. Most recently Web development has come to mean the creation of content management systems (CMS). These CMS can be made from scratch, proprietary or open source. In broad TERMS the CMS acts as middleware between the DATABASE and the user through the browser. A PRINCIPLE benefit of a CMS is that it allows non-technical people to make changes to their web site without having technical knowledge.

18217.

What is illumination model and explain the baseic illumination model?

Answer»

✔✔ Hello mate ✔✔

here's your answer  

The factors that govern the illumination model DETERMINE the visual representation of that surface. DUE to the relationship DEFINED in the model between the surface of the objects and the LIGHTS affecting it, illumination models are also CALLED shading models or lighting models.

¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤  

¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤  

Hope it helps you


18218.

What is a virus and how does it harm operating system in computer?

Answer»

VIRUS will DESTROY the SYSTEM and SOFTWARE will be LOST

18219.

What four main types of actions are involved in databases? Briefly discuss each?

Answer» HELLO buddy!

The ANSWER is => The four main TYPES of actions are: DEFINE database,Constructdatabase,Manipulate database, and Share database.

#thanKYouh
18220.

What are the advantage and disadvantage of microprocessor based system design?

Answer»

Answer:

Advantages

Microprocessor is that these are general PURPOSE electronic processing devices which can be PROGRAMMED to execute a NUMBER of TASKS.

Microprocessor is its speed, which is measured in hertz. For instance, a microprocessor with 3 GHz, SHORTLY GHz is capable of performing 3 billion tasks per second.

Microprocessor is that it can quickly move data between the various memory locations

Disadvantages

The microprocessor has a limitation on the size of data.

Most of the microprocessor does not support floating point operations.

The main disadvantage is it’s over heating physically.

It should not contact with the other external devices.

The microprocessor is does not have any internal peripheral like ROM, RAM and other I/O devices.

18221.

What are it resources are required to generate information?

Answer»

For the purpose of DEVELOPING services for GENERATION of information, one would need data PROCESSING resources or IT resources. ... These resources may be BROADLY classified into four categories, namely, HARDWARE, software, data and human resources

18222.

What are the usefulness of primary key secondary key and stored procedure in relational database?

Answer»

A relational database includes tables containing rows and COLUMNS. ... Entity integrity ensures that the PRIMARY keyin a table is unique and that the value is not set to null. Referential integrity requires that every value in a foreign key COLUMN will be found in THEPRIMARY key of the table from which it originated.

18223.

The transistorized computer circuits were introduced in the

Answer»

Hey !!


The transistorized COMPUTER circuits were INTRODUCED between 1950s and 1960S.

18224.

Superscript subscript ,outline, emboss,engrave,are known as

Answer» HELLO mate

here's your answer

¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤

Superscript, subscript, outline, EMBOSS, engrove are known as font effects.

¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤

Hope it HELPS you
18225.

If n is a power of 2, then the minimum number of multiplications needed to compute an is

Answer»

2n is the ANSWER i THINK HOPE u LIKE it

18226.

How are authentication and authorization alike and how are they different? What is the relationship, if any, between the two?

Answer»

Answer:

Authentication and AUTHORIZATION are both terms related to cyber security. They are in some cases related to each other, and in some cases different from each other. Authentication is needed when there is a NEED for accessing any confidential site, which ensures that no third party can ACCESS the private data.

Explanation:

Authorization is also SOMEWHAT like authentication, as because there authentication is DONE to check whether one is authorized user or not. Authorized users are the one who are the authorities who can access certain confidential places.

18227.

In the context of a hash function, what is a compression function?

Answer»

In the context of a hash function, a function for a single block of bits will be known as compression function.

It is USED in cryptography and used for transforming two fixed LENGTH inputs into a fixed length OUTPUT.

Encryption and decryption is used to encrypt or decrypt the data which need to be SECURED so that we use hash function,

18228.

In block text format, you do not ____________each paragraph

Answer»

You do not DELECT each PARAGRAPH...

18229.

How do guided media differ from unguided media? What are the three major classes of guided media? Name the advantages of optical fiber over twisted-pair and coaxial cable?

Answer»

Answer:

GUIDED media and unguided media, both terms are related to computer networking, there are mainly TWO medium through which transmission of data takes place. Guided and unguided media, also known as wired and wireless mode of transmission.

Explanation:

  • Guided media has lesser noise and obstacles in comparison to unguided media, this causes guided media to give a faster rate of data transmission than unguided media.
  • OPTICAL FIBERS are very costly but FASTEST mode of data transmission. The reason for this is because the data travels with the speed of light in optical fiber, as the data sent and received is done by passing light through cable.
  • Twisted pair cable are also a medium for transferring data, but they are sent as an analog signal, so it is not as fat as optical fibers.  
18230.

Discuss the functionality of various components of cloud infrastructure

Answer»

In a cloud computing architecture, cloud INFRASTRUCTURE refers to the back-end components -- the HARDWARE ELEMENTS found within most enterprise data centers. These include multisocket, multicore servers, PERSISTENT STORAGE and local area network equipment, such as switches and routers -- but on much greater scale.

18231.

Difference between formatted and unformatted text in multimedia

Answer»

Formatted and Un-formatted text in multimedia:

Formatted text:

  • Formatted text is any text that is not a plain text but has certain attributes to it.
  • They can be color, SIZE, font.
  • It has a specialized and CUSTOMIZED style.
  • Formatted text is MUCH more APPEALING and increases the readability.

Un-formatted text:

  • It is the common, plain text that has no specialized features to it.
  • By default the text is unformatted.
18232.

Discuss an effective communication between a client and server

Answer»

The client–server model is a distributed application STRUCTURE that partitions TASKS or workloads between the PROVIDERS of a RESOURCE or service, called servers, and service requesters, called clients.

mark as BRAINLIST

18233.

Describe the functionallity of network function virtualization(nfv) in detail?

Answer»

Network functions virtualization (alsonetwork FUNCTION virtualization orNFV) is a network architecture CONCEPT that USES the technologies of IT virtualization to VIRTUALIZE entire classes of network node functions into BUILDING blocks that may connect, or chain together, to create communication services.

hope helps you ❤️❤️

18234.

What is Slideshow view ?spreadsheet chapter pls pls pls

Answer»

PRESENTATION of digital images,SOMETIMES with TEXTVIEWED in progressionon a screen.

18235.

What is the importance of utility programs ?

Answer» OPERATING systems CONTROL the computer hardware and act as an interface with application PROGRAMS.Utility softwarehelps to manage, MAINTAIN and control computer resources. Examples of utility programs are antivirus software, BACKUP software and disk tools.
some utility programme:
Utility programs.

⏺️Antivirus Software.

⏺️Disk Defragmenter.

⏺️Disk Cleaner.

⏺️Compiler.

18236.

Write few point of social media and email

Answer»

HOLA MATE
HERE IS YOUR ANSWER


Social media plays a big role in our lives today. We have the access to any kind of INFORMATION at just a button push away. Anything that is so vastly expanded has both positives and negatives related to it. The power of social media is very high and has its effects on each individual. It is difficult to imagine our lives with social media today and we do pay a price for excessive use. There is a lot of debate about the effects of social media on the society as a WHOLE. Some feel that it’s a boon whereas other feels that it is a curse.

 

Positive Effects of Social Media

Social media allows the social growth of the society and also helps MANY businesses. It provides tools like social media MARKETING that can reach a millions of potential clients. We can easily access information and get news through social media. Social media is a great tool for creating awareness about any social cause. Employers can reach out to potential job seekers. It can help many an individuals to have social growth and INTERACTION with the world without having any hitch. Many people use social media to make themselves heard to the higher authorities. It can also help you meet like-minded people.

Negative Effects of social Media

Many physiatrists believe that social media is a single most factor causing depression and anxiety in people. It is also a cause of poor mental growth in children. Increased use of social media can lead to poor sleeping patterns. There are many other negative effects like cyber bullying, body image issues etc. as well. There is an increased ‘Fear of Missing out’ (FOMO) at an all-time high in youth because of social media.

Conclusion: One must carefully weigh the positives and the negatives before engaging excessively in social media. If used in the correct way social media can be a boon for mankind

__________________

HOPE IT HELPS

THANK YOU

18237.

Plz give me answer fast

Answer» 1) true
2) true
3) true
4) true
5) FALSE
6) false
18238.

Write the repat command to draw a rectangle of side 40 and 80

Answer»

This is UR ANSWER...

18239.

What is the purpose of Auto Fill ?

Answer»

A feature found in software and applications, that lets you enter a series of numbers or CHARACTERS in a specified RANGE, and have the software complete the entry you STARTED typing. In Microsoft Excel, for EXAMPLE, you can use a preset function to AUTOMATICALLY fill a cell with data.

18240.

Discuss about physical and logical scheme.

Answer»

A logical schema is a conceptual model of the data. In relational databases, it's often PLATFORM-agnostic - i.e. the logical schema can, in principle, be implemented on any SQL database. The logical schema is primarily concerned with understanding the business entities, their ATTRIBUTES and their relationships.

The logical schema is often captured as an entity-relationship diagram (ERD), using TOOLS like ErWin or ERStudio.

The physical schema converts the logical schema into an implementation that works on a particular database platform. Sometimes, this is a largely mechanical exercise, applying the right datatypes to the attributes, but it can also involve performance optimizations such as denormalization, platform-specific features such as triggers, and sizing/performance decisions like physical disk distribution.

Many ERD tools can "automagically" convert a logical design into a physical schema.

The physical schema is CONVERTED into an actual database using DDL SQL statements.

PLEASE MARK MY ANSWER AS A BRAINLIEST ANSWER.

18241.

How to create a web page

Answer»

Requirements: Text Editor. ...
Introduction. When you navigate to a WEB PAGE on the Internet, the browser is doing a lot of work. ...
STEP 1: Open Your Text Editor. The FIRST step is to open your text editor. ...
Step 2: WRITE Your HTML Skeleton. ...
Step 3: Save Your File. ...
Step 4: Open Your Web Page in Your Browser. ..

18242.

Is it possible to remember every possible rule and loops etc. Like can I master C and answer every question about it?

Answer»

No More Cram Sessions

Nobody wants to hear it, but cramming is the worst way to learn how to program. If you’re ANYTHING like me, cramming was your MODUS operandi all THROUGHOUT school and university. It’s the only way you know how to study.

But learn from my mistakes: the more you try to cram, the less you’re going to remember. That’s pretty much true for any knowledge-based subject, but it’s especially true when it comes to programming.

The basis of this claim comes from a 2008 study by the University of California, San Diego:

“Students perform better when they space their study sessions rather than when they try to cram everything into their noggins during one sitting.”


In other words: in any given study session, you’re more likely to retain the information that you learned near the beginning and the end of the session and more likely to forget the information from the middle of the session.

You want to maximize the number of beginnings and ends. That’s why it’s better to have multiple short sessions instead of a few long sessions when it comes to learning and absorbing new material.

The next time you sit down to learn code, take it one topic at a time and take a short BREAK between each topic. (Just make sure to prevent your breaks from turning into procrastination!)

Review, Review, Review

Another reason, why cramming is antithetical to long-term knowledge retention is because memory fades over time. This isn’t always true — I’m sure we all have a few childhood memories that will never disappear — but it seems to be the general case for memories that aren’t tied to emotion.

There is some debate whether memory itself decays due to time (decay theory) or simply gets pushed out and replaced by new memories over time (interference theory). Whichever theory you subscribe to, the result is that older memories are more likely to fade away.

This is where review comes into play.


I know how hard this can be if you’re a natural crammer, but you’ll be surprised how fast you start retaining material once you make an effort to review it regularly

How you practice matters far more than how much time you spend practicing.

Reading is passive. Watching YouTube lessons is passive. Listening to podcasts is passive. As a newbie coder you might be tempted to flutter from tutorial to tutorial, tackling subject after subject without actually applying any of that knowledge in a practical way. Resist this temptation.





The beauty of this approach is two-fold.

First, it’s more likely to hold your attention. Studies have shown that students learn better when they can pursue topics that interest them. That’s exactly what a personal project offers. You have an end goal that you actually want to achieve, thus you’re more likely to retain the information that’ll get you there.

Second, there’s no pressure for you to succeed. While success would be nice, the lack of formality allows you to be experimental and creative. You’re inevitably going to run into issues, but it’s more like playing with Lego than it is homework. It’s more fun and not as stressful.

Relax & Bookmark Everything

The truth is that no programmer remembers everything they’ve learned. Even after you’ve been working with a particular library or framework for a while, it’s not uncommon if you can’t recall every function or variable off the top of your head.

In fact, trying to memorize everything might just end up being a huge waste of time and effort. Reference SHEETS exist for a reason. Why commit an entire encyclopedia to memory when you can just flip it open whenever you need it?



So, when to memorize and when to reference?

When it comes to conceptual material, always internalize it to the best of your ability. By that I mean understanding the theory even if you can’t convert it into actual code (and theory should be clear enough to you for you to teach it clearly).

Personally, I have hundreds of Internet bookmarks to various APIs, guides, and tutorials. If I need to implement some kind of pathfinding algorithm, I might reference a guide to help me get it coded before forgetting about it again. It helps to understand the underlying concepts, but I try not to fret about implementation details.

Final Thoughts

I’ll repeat it a million times if I have to: programming is hard and it’s okay if you struggle with it. I’ve been programming as a hobby for over a decade and I still find myself intimidated when I have new concepts to learn.

Don’t beat yourself up if you can’t remember everything right away. The above tips will hopefully prove helpful to you, and even if they don’t, you can always rely on bookmarked references as a last resort.



hope this will help u plz follow me and Mark it as brainliest





18243.

Write a program that lists the distinct words in a file in alphabetical order in c++

Answer»

C++ program to print unique words in a file

Write a function that takes a file name as argument and PRINTS all unique words in it.

We strongly recommend you to minimize your browser and try this yourself first

The idea is to use map in STL to keep track of words already occurred.



// C++ program to print unique words in a STRING
#include

using namespace std;


// Prints unique words in a file

void printUniquedWords(char FILENAME[])
{

// Open a file stream

fstream fs(filename);



// Create a map to store count of all words

map mp;



// Keep reading words while there are words to read

string word;

while (fs >> word)

{

// If this is first occurrence of word

if (!mp.count(word))

mp.insert(make_pair(word, 1));

else

mp[word]++;

}



fs.close();



// Traverse map and print all words whose count

//is 1

for (map :: iterator p = mp.begin();

p != mp.end(); p++)

{

if (p->second == 1)

cout << p->first << endl;

}
}


// Driver program

int main()
{

// Create a file for testing and write something in it

char filename[] = "test.txt";

ofstream fs(filename, ios::trunc);

fs << "geeks for geeks quiz code geeks practice for qa";

fs.close();



printUniquedWords(filename);

return 0;
}

Output:

code
practice
qa
quiz
Thanks to Utkarsh for suggesting above code.

Please write COMMENTS if you find anything incorrect, or you want to share more information about the topic discussed above

HOPE U LIKE THIS ANS
PLZ MARK THIS AS BRAINL.ANS

18244.

Maximum number in the given list using function in python

Answer»

The anser is

=max(,and so on)

eg where X =8
L=max(3,6,x)

now value of L will be 8



thank u
HOPE it HELPED u

18245.

When using virtualization, it is commonplace to use the term ____ to refer to a virtualized environment operating in or on a host platform?

Answer»

Virtual machine

When using virtualization, it is COMMONPLACE to use the term virtual machine to REFER to a VIRTUALIZED environment operating in or on a host PLATFORM .

18246.

When you send a file to a colleague over __________, you can be reasonably assured that the person receiving your file is the same person you intended to receive it?

Answer»

Secure INTERNAL network

When you send a file to a colleague over secure internal network , you can be reasonably ASSURED that the person receiving your file is the same person you INTENDED to receive it .

18247.

Which organization use computer firstly and why?

Answer»

For the MILITARY PURPOSE

18248.

Basic reason for the invention of computer?

Answer»

The BASIC REASON that they have invented computer is to do hard CALCULATIONS FASTER

18249.

What is the smallest and largest font size available in font size tool formatting bar?

Answer»

Heyyyyyy FRIEND


HOPE this HELPS a Little


Smallest FONT on a formatting bar is SIZE 5
Largest font on a formatting bar is size 48

18250.

131531753197531write a program for this pattern

Answer»

ANSWER:

hdhrve ygw VH w y e whyw wvwhhw w gw whw w whe e

Explanation:

hdbd gbd he e yer eyehr he e v vv v BB bb hb jn GB d d d d d d d d d f f f f d d d d d d d d r r dr r r r r f f e e e e r f rr d w w 3 r r r 3 2 w e r r 3 2 w e r 4 r r e 2 3 r e e e t r f d d w t y 7 u u y y t r r e e yy years t r r 6 6 r r r t 4 3 3 r r e e e r r r