InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 18252. |
What are the types of attacks are address by message authentication? |
|
Answer» Hello MATE |
|
| 18253. |
write a python program to find minimum and maximum number in the given list and there by find the average of these two numbers |
|
Answer» Lst = [] |
|
| 18254. |
Create a base class Fruit which has name ,taste and size as its attributes. A method called eat() is created which describes the name of the fruit and its taste. Inherit the same in 2 other class Apple and Orange and override the eat() method to represent each fruit taste. |
|
Answer» Jshsjshhdjsjdkjajskakhsjs |
|
| 18255. |
What is the use of gradient tool? |
|
Answer» You can easily create a gradient effect using the Gradient Tool in Adobe Photoshop CS5. Choose the Gradient tool and click and drag across an image area to create a gradient in the direction and length of the mouse MOTION. A short drag CREATES a short gradient; a long drag produces a smoother, longer gradient. |
|
| 18256. |
What property prevents a field from being blank |
|
Answer» Some of these objectives include: |
|
| 18257. |
The security configuration wizard saves any changes that are made as a __________ security policy which can be used as a baseline and applied to other servers in the network. |
|
Answer» ROLE or function specific The security CONFIGURATION wizard saves any changes that are MADE as a role or function specific security POLICY which can be used as a baseline and applied to other SERVERS in the network. |
|
| 18259. |
Give me answer here i question |
|
Answer» Can U UNDERSTAND UR QUESTION |
|
| 18261. |
Different types of protecting document |
|
Answer» You can encrypt your document so no ONE can ACCESS it without the right password. You can limit the content that can be edited within a document and the WAY it can be edited. You can add a digital SIGNATURE to make sure no one can tinker with the document. And you can mark a document as final so PEOPLE know it hasn't been changed since you last saved it. |
|
| 18262. |
The mechanism through which we can track the data changes is called |
|
Answer» I am not SURE.. MAYBE it is CALLED doReload or CALL reloadData as NEEDED. |
|
| 18263. |
Please urgent Mention the areas a person should work on for sharpening his self confidence. |
|
Answer» Social and cultural help on building your self confidence. Explanation: It has been observed that people coming from a SOCIETY which respects INDIVIDUALS and has CULTURE of forgiving failure. This is the answer for this question |
|
| 18264. |
Two services provider |
|
Answer» HEY mate UR QUESTION is incomplete which SERVICE provider If about INTERNET 1.jio 2.airtel |
|
| 18265. |
Debate on cyber security and cyber crime |
|
Answer» Cybercrime: |
|
| 18266. |
Name two advantage of database |
|
Answer» 1. Ability to store large amounts of information This ability is essential for large companies with a large number of customers and this volume of information must be handled very precisely. 2. Sharing information Databases allow users to share common information. THEREFORE, if you have a business with different company locations you can share your data at same time with the different business locations. 3. Having quick access to information The information is obtained quickly and easily, which greatly facilitates the work and allows you having better customer service. 4. Eliminating duplications By centralizing all information in a database you prevent duplication of existing information which usually presents a common problem in business. 5. Increasing productivity Access to information is faster now than ever before. Information will be structured without any duplication – allowing you to work better, faster with increased productivity in your company. 6. Reducing storage space Information is digitized so it takes less space than when STORED on paper. You will always have certain documents that will have to be on paper. Try to scan all of your documentation. It is a large initial effort it will make all your tasks easier. 7. Information Security A database can have several parts depending on users. You can LIMIT certain access to certain parts of the data for certain users. That WAY the security and confidentiality of data will be guaranteed and secured. 8. Easy maintenance As the information is digitized it is easier and economical to carry out any maintenance. |
|
| 18267. |
The box on the chart that contains the name of each individual data series is called the ________. |
|
Answer» EXCEL chart Hope this HELPS U MARKS as BRAINLIST |
|
| 18268. |
Suppose that a certain bst has keys that are integers between 1 and 10, and we search for 5. Which sequence below cannot be the sequence of keys examined? Why?a. 10, 9, 8, 7, 6, 5b. 4, 10, 8, 7, 3, 5c. 1, 10, 2, 9, 3, 8, 4, 7, 6, 5d. 2, 7, 3, 8, 4, 5e. 1, 2, 10, 4, 8, 5 |
|
Answer» ▀▄▀▄ |
|
| 18269. |
Why is it advised to apply theme before you start making presentation |
|
Answer» To make it BEAUTIFUL and to look LIKE PROFESSIONAL's PRESENTATION. |
|
| 18270. |
What are the three basic steps in programing?please answer me |
|
Answer» DEFINING PROBLEM . planing the solution. coding the PROGRAM. plzzzzzzzzzz marks in BRAINLIEST plzzzzzzzzzz |
|
| 18271. |
Which function key is used to run a program in QB64 |
|
Answer» Click on Run. Then in the Run dialog box type CMD and click on OK. A DOS window (sometimes CALLED a command prompt window) starts up. When it FIRST starts, it will be set up to use a particular part of the hard disk for the QBasic files it MAY save and READ. |
|
| 18272. |
What are the two main components that make up a computer system |
|
Answer» CPU KEYBOARD.......❣❣❣❣ |
|
| 18273. |
______ position elements don't move when the visitor scrolls the browser window up or down. |
|
Answer» when you scroll down, each new LINE appears at the bottom of the screen and all the other lines move up one ROW, so that the top line DISAPPEARS. The term vertical SCROLLING refers to the ability to scroll up or down. Horizontal scrolling MEANS that the image moves sideways. fixed position elements don't move when the visitor scrolls the browser window up or down. |
|
| 18274. |
One definition for protocol in relation to networks can be best stated as |
|
Answer» A set of cooperating network protocols is called a protocol SUITE. The TCP/IP suite INCLUDES numerousprotocols across the data, network, transport and APPLICATION layers, for example, working TOGETHER to enable internet CONNECTIVITY. |
|
| 18275. |
The radius and height of a cylinder are in the ratio 3:2and its volume is 19404 cm^3.find its radius and height |
|
Answer» R / h = 3 / 2 |
|
| 18276. |
Discribe spreadsheet |
|
Answer» Hey, here is your answer |
|
| 18277. |
Write a code in c++ to Flowchart a void function that receives three integer values and outputs the largest of the three unless they are all equal, in which case, it outputs a message stating they are equal. Write the function prototype for this void function. Writethe function definition for this void function. |
| Answer» SORRY bro but my c++ PROGRAMMING is not COMPLETE yet. | |
| 18278. |
An activist, of a banned organisation, plans to escape from Bhopal jail. The activist is basically a monkey man and is able to jump across the wall. He practises to cross a wall. He is able to jump 'X' meters, but because of the slippery wall he falls 'Y' meters after each jump. To escape from jail, he has to cross 'N' number of walls, where height of each wall is given in an array. |
|
Answer» An integer depicting X. An integer depicting Y. An array of N integers, which will be having the HEIGHT of the wall . The constraint will be- 1< = X <= 109 1< = X <= 105 The program should be able to RETURN the total number of jumps which are required to escape. sample input 10 1 1 10 the sample output will be 1. It implies that the activist can JUMP 10 METERS high but will also slip down by 1 metre. The height of the wall is 10 metres. Thus, he will be able to cross the wall in the first attempt only. |
|
| 18279. |
Write a short note on slide sorter veiw ? in easy language |
|
Answer» Slide Sorter view in PowerPoint lets you view and sort the presentation slides. To switch to Slide Sorter view, click the “Slide Sorter” BUTTON in the “Presentation Views” button group in the Status BAR. Alternatively, click the “Slide Sorter” button in the “Presentation Views” button group on the “View” tab of the Ribbon. |
|
| 18280. |
Briefly explain the method you will use to execute an array linked list? |
|
Answer» A linked list is defined as a collection of nodes that can be TRAVERSED starting at the HEAD |
|
| 18281. |
In the opening vignette, predictive modeling is described a |
|
Answer» In the opening vignette, predictive modeling is described as ESTIMATING the future USING the past. Predictive modeling is a process that uses data MINING and probability to forecast some of the outcomes. It is USUALLY ALSO associated with weather forecasting and meteorology, but it has some applications in business also. |
|
| 18282. |
Which of the following class can be used to add a footer to a panel? |
|
Answer» ohh...u ASKED which of the following ryt.....so,where are the OPTIONS.....?? ... |
|
| 18284. |
How to predict old data and new data using prediction in r? |
|
Answer» Apart from describing relations, models also can be USED to predict VALUES for new data. For that, many model systems in R use the same function, conveniently CALLED predict(). EVERY modeling paradigm in R has a predict function with its own flavor, but in general the BASIC functionality is the same for all of them. |
|
| 18285. |
How to learn Java coding easy ?Don't copy at Google. |
|
Answer» WELL ! here are some ways 1) go to market and by one BOOK on java coding language. 2) or simply pop on YouTube and watch videos on basic java coding there is a HUGE collection of java tutorials on YouTube. 3)last but least if you dosen't like ways mentioned above go and JOIN java classes |
|
| 18286. |
My question is Difine Linux office |
|
Answer» ✨ HEY MATE ✨ |
|
| 18287. |
What is wifi configuration ? please don't try to copy and paste from google, its a humble request. |
|
Answer» ⛦Hᴇʀᴇ Is Yoᴜʀ Aɴsᴡᴇʀ⚑ |
|
| 18288. |
What is wifi configuration? |
|
Answer» WIFI is a wireless NETWORK technology that ALLOWS computer , mobile, router and other DEVICES to communicate over a wireless signal wifi configuration is a setup of wifi devic |
|
| 18289. |
Formula to calculate offset of an element corresponding to a given key |
| Answer» | |
| 18290. |
To print the first 5 multiples of a number in a Java Program code. |
|
Answer» Class q1 |
|
| 18291. |
Is there any gap between throws IOException in Java program plzz give the answer. |
|
Answer» Xhsshshshdhhhhdhdhdhdjd |
|
| 18292. |
What is the colour of dot beside a selected picture is used to rotate it in power point |
| Answer» BLACK COLOUR besides the pitcture | |
| 18293. |
What are the features and significance of electronic spreadsheets? |
|
Answer» Features Consists of a grid of ROWS and columns. Has title bar,menu bar,etc. Functions |
|
| 18294. |
Who was the developer of mill |
|
Answer» Developer OFFICIALLY TAKES ownership of King Philip MILL. |
|
| 18295. |
What is machinetosh operating system |
|
Answer» MACINTOSH operating system was DEVELOPED by Apple.It includes GRAPHICAL USER interface based operating SYSTEMS. |
|
| 18296. |
What is basic input output system |
|
Answer» BIOS is non-volatile firmware used to perform hardware initialization during the booting PROCESS, and to provide runtime services for operating SYSTEMS and programs. The BIOS firmware comes pre-installed on a personal computer's system board, and it is the first SOFTWARE to RUN when powered on. //BIOS=basic input output system |
|
| 18297. |
Hola mates!!!Pls give questions of number system only of binary to decimal and from decimal to binary!! it is of computer12 points!!!I WILL FOLLOW U I will mark as brainliest...PLS ANSWER IT !! I WILL FOLLOW U |
|
Answer» BINARY to decimal 1011 10101 000111 011110000 Decimal to binary 23 45 56 |
|
| 18298. |
Do deterministic context free grammars always produce deterministic context free languages? |
| Answer» DONT KNOW the ANSWER..SORRY BUDDY | |
| 18299. |
Write command to change all picture to black and white |
|
Answer» Answer: When you desaturate an entire image you remove the color and create a grayscale image. Open the photo you WANT to convert. Choose Image > ADJUSTMENTS > Desaturate or. Use the keyboard shortcut: "Shift+Ctrl+U" to Desaturate the image. |
|
| 18300. |
Please explain the (A) tag and it's attributes |
|
Answer» An attribute either modifies the default functionality of an element type or provides functionality to certain element TYPES unable to function correctly WITHOUT them. In HTML SYNTAX, an attribute is added to an HTML start tag. ... Some attribute types function differently when used to MODIFY DIFFERENT element types. |
|