Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

18251.

Which is the main material in a solar cell?

Answer» SUN is the MAIN MATERIAL in SOLAR CELL
18252.

What are the types of attacks are address by message authentication?

Answer»

Hello MATE

here's your ANSWER

¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤

masquerade are the TYPES of attack that are addressed by message authentication.

¤¤¤¤¤¤¤¤¤¤¤¤¤¤

Hope it HELPS you

18253.

write a python program to find minimum and maximum number in the given list and there by find the average of these two numbers

Answer»

Lst = []
num = int(input('How many numbers: '))for N in range(num):
numbers = int(input('Enter number '))
lst.append(numbers)print("MAXIMUM element in the LIST is :", max(lst), "\nMinimum element in the list is :", MIN(lst))

n=int(input("Enter the number of ELEMENTS to be inserted: ")) a=[] for i in range(0,n): elem=int(input("Enter element: ")) a.append(elem) avg=sum(a)/n print("Average of elements in the list",round(avg,2))

18254.

Create a base class Fruit which has name ,taste and size as its attributes. A method called eat() is created which describes the name of the fruit and its taste. Inherit the same in 2 other class Apple and Orange and override the eat() method to represent each fruit taste.

Answer»

Jshsjshhdjsjdkjajskakhsjs

18255.

What is the use of gradient tool?

Answer»

You can easily create a gradient effect using the Gradient Tool in Adobe Photoshop CS5. Choose the Gradient tool and click and drag across an image area to create a gradient in the direction and length of the mouse MOTION. A short drag CREATES a short gradient; a long drag produces a smoother, longer gradient.

From the Options bar, you also can choose the type of gradient you want: Linear, RADIAL, ANGLE, Reflected, or Diamond.

As a default, gradients are created using the current foreground and background colors. Click the arrow on the Gradient button on the Options bar to assign a different preset gradient.

18256.

What property prevents a field from being blank

Answer»

Some of these objectives include:

Provide transparency for consumers.Reduce risk for banking customers.Avoid MISUSE of BANKS for purposes like money laundering.Allow consumers to bank with confidentiality.Prevent other crimes.Prioritize bank LENDING ACCORDING to economic and social priorities

HOPE IT'S HELPFULLY ^_^ ^_^

18257.

The security configuration wizard saves any changes that are made as a __________ security policy which can be used as a baseline and applied to other servers in the network.

Answer» ROLE or function specific

The security CONFIGURATION wizard saves any changes that are MADE as a role or function specific security POLICY which can be used as a baseline and applied to other SERVERS in the network.
18258.

What is the work of preview

Answer»

The SPACE PROVIDED for doing ROUGH WORK .

18259.

Give me answer here i question

Answer»

Can U UNDERSTAND UR QUESTION

18260.

Give the url of cbse website and its two web page

Answer» STUDY RANKERS
vendantu. COM
18261.

Different types of protecting document

Answer»

You can encrypt your document so no ONE can ACCESS it without the right password. You can limit the content that can be edited within a document and the WAY it can be edited. You can add a digital SIGNATURE to make sure no one can tinker with the document. And you can mark a document as final so PEOPLE know it hasn't been changed since you last saved it.

18262.

The mechanism through which we can track the data changes is called

Answer»

I am not SURE.. MAYBE it is CALLED doReload or CALL reloadData as NEEDED.

18263.

Please urgent Mention the areas a person should work on for sharpening his self confidence.

Answer»

ANSWER:

Social and cultural help on building your self confidence.

Explanation:

It has been observed that people coming from a SOCIETY which respects INDIVIDUALS and has CULTURE of forgiving failure.

This is the answer for this question

18264.

Two services provider

Answer» HEY mate UR QUESTION is incomplete which SERVICE provider

If about INTERNET

1.jio

2.airtel
18265.

Debate on cyber security and cyber crime

Answer»

Cybercrime:

Cybercrime tend to harm the system resources while others are used to extract confidential information from the user.
Cyber crime can be defined as : "Offenses that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm , or loss to the victim directly or indirectly , using modern telecommunication network such as internet and mobile phones.

Cyber security:

Cyber security is the protection of internet connected SYSTEMS including hardware SOFTWARE and data from cyber attacks.
In computing context security comprises cyber security and physical security - both are used by enterprises to protect against unauthorized access to data centers and other computerized systems. Information security, which is DESIGNED to maintain the confidentiality ,integrity and AVAILABILITY of data is a SUBSET of cyber security.

18266.

Name two advantage of database

Answer»

1. Ability to store large amounts of information

This ability is essential for large companies with a large number of customers and this volume of information must be handled very precisely.

2. Sharing information

Databases allow users to share common information. THEREFORE, if you have a business with different company locations you can share your data at same time with the different business locations.

3. Having quick access to information

The information is obtained quickly and easily, which greatly facilitates the work and allows you having better customer service.

4. Eliminating duplications

By centralizing all information in a database you prevent duplication of existing information which usually presents a common problem in business.

5. Increasing productivity

Access to information is faster now than ever before. Information will be structured without any duplication – allowing you to work better, faster with increased productivity in your company.

6. Reducing storage space

Information is digitized so it takes less space than when STORED on paper. You will always have certain documents that will have to be on paper. Try to scan all of your documentation. It is a large initial effort it will make all your tasks easier.

7. Information Security

A database can have several parts depending on users. You can LIMIT certain access to certain parts of the data for certain users. That WAY the security and confidentiality of data will be guaranteed and secured.

8. Easy maintenance

As the information is digitized it is easier and economical to carry out any maintenance.

18267.

The box on the chart that contains the name of each individual data series is called the ________.

Answer» EXCEL chart
Hope this HELPS U

MARKS as BRAINLIST
18268.

Suppose that a certain bst has keys that are integers between 1 and 10, and we search for 5. Which sequence below cannot be the sequence of keys examined? Why?a. 10, 9, 8, 7, 6, 5b. 4, 10, 8, 7, 3, 5c. 1, 10, 2, 9, 3, 8, 4, 7, 6, 5d. 2, 7, 3, 8, 4, 5e. 1, 2, 10, 4, 8, 5

Answer»

▀▄▀▄[_Hɪ Mᴀᴛᴇ_]▄▀▄▀
╔═══❁═❀═✪═❀═❁════╗
...............Here You Go Ur ANSWER............
╚═══❁═❀═✪═❀═❁════╝

ıllıllıllıllıllıllı[ Your Answer ]ıllıllıllıllıllıllı

ȯ


◆━━━◆♤◆━━━◆
☆ Correct ♤ Option ☆
◆━━━◆♤◆━━━◆
█◤◢◤◢ ◣◥◣◥█
◤◢◤◢█ █◣◥◣◥
◢◤◢██ ██◣◥◣
◥◣◥██ ██◤◢◤
◣◥◣◥█ █◤◢◤◢
█◣◥◣◥ ◤◢◤◢█
█◤◢◤◢ ◣◥◣◥█
◤◢◤◢█ █◣◥◣◥
◢◤◢██ ██◣◥◣
◥◣◥██ ██◤◢◤
◣◥◣◥█ █◤◢◤◢
█◣◥◣◥ ◤◢◤◢█
◆━━━◆♤◆━━━◆
☆✔✔✔✔[_e_]✔✔✔✔☆
◆━━━◆♤◆━━━◆


_▂▃▅▇█▓▒░[ HOPE It HELPS You░▒▓█▇▅▃▂_

18269.

Why is it advised to apply theme before you start making presentation

Answer»

To make it BEAUTIFUL and to look LIKE PROFESSIONAL's PRESENTATION.

18270.

What are the three basic steps in programing?please answer me

Answer» DEFINING PROBLEM .
planing the solution.
coding the PROGRAM.
plzzzzzzzzzz marks in BRAINLIEST plzzzzzzzzzz
18271.

Which function key is used to run a program in QB64

Answer»

Click on Run. Then in the Run dialog box type CMD and click on OK. A DOS window (sometimes CALLED a command prompt window) starts up. When it FIRST starts, it will be set up to use a particular part of the hard disk for the QBasic files it MAY save and READ.

18272.

What are the two main components that make up a computer system

Answer» CPU
KEYBOARD.......❣❣❣❣
18273.

______ position elements don't move when the visitor scrolls the browser window up or down.

Answer»

when you scroll down, each new LINE appears at the bottom of the screen and all the other lines move up one ROW, so that the top line DISAPPEARS. The term vertical SCROLLING refers to the ability to scroll up or down. Horizontal scrolling MEANS that the image moves sideways.

fixed position elements don't move when the visitor scrolls the browser window up or down.

18274.

One definition for protocol in relation to networks can be best stated as

Answer»

A set of cooperating network protocols is called a protocol SUITE. The TCP/IP suite INCLUDES numerousprotocols across the data, network, transport and APPLICATION layers, for example, working TOGETHER to enable internet CONNECTIVITY.

18275.

The radius and height of a cylinder are in the ratio 3:2and its volume is 19404 cm^3.find its radius and height

Answer»

R / h = 3 / 2
r = (3 / 2) * h

Volume of a cylinder is,

V = π r² h
19404 = π ((3 / 2) * h)² * h
19404 = π (9/4) * h³
19404 * (4 / 9) = π * h³
8624 = (22 / 7) * h³
h³ = 8624 * (7 / 22)
h³ = 2744
h = 14

r = (3 / 2) * 14
r = 21

18276.

Discribe spreadsheet

Answer»

Hey, here is your answer

Spreadsheet is an APPLICATION software that MAKES a COMPUTER work as DATA ans analyzer. It CONTAINS a sheet divided into a large number of rows and columns.

Hope it helps you

18277.

Write a code in c++ to Flowchart a void function that receives three integer values and outputs the largest of the three unless they are all equal, in which case, it outputs a message stating they are equal. Write the function prototype for this void function. Writethe function definition for this void function.

Answer» SORRY bro but my c++ PROGRAMMING is not COMPLETE yet.
18278.

An activist, of a banned organisation, plans to escape from Bhopal jail. The activist is basically a monkey man and is able to jump across the wall. He practises to cross a wall. He is able to jump 'X' meters, but because of the slippery wall he falls 'Y' meters after each jump. To escape from jail, he has to cross 'N' number of walls, where height of each wall is given in an array.

Answer»

An integer depicting X.

An integer depicting Y.

An array of N integers, which will be having the HEIGHT of the wall .

The constraint will be-

1< = X <= 109

1< = X <= 105

The program should be able to RETURN the total number of jumps which are required to escape.

sample input 

10

1

1

10


the sample output will be 

1.

It implies that the activist can JUMP 10 METERS high but will also slip down by 1 metre. The height of the wall is 10 metres. Thus, he will be able to cross the wall in the first attempt only.

18279.

Write a short note on slide sorter veiw ? in easy language

Answer»

Slide Sorter view in PowerPoint lets you view and sort the presentation slides. To switch to  Slide Sorter view, click the “Slide Sorter” BUTTON in the “Presentation Views” button group in the Status BAR. Alternatively, click the “Slide Sorter” button in the “Presentation Views” button group on the “View” tab of the Ribbon.

            You use Slide Sorter view to reorganize, INSERT, delete and copy the presentation slides. Slide Sorter view in PowerPoint also shows the presentation’s VISUAL flow. You can also add and preview slide transition animation here, as well.

            In Slide Sorter view in PowerPoint, you can SEE all of the slides in your presentation laid out as thumbnail pictures. You cannot modify the content of the individual slides shown. In Slide Sorter view in PowerPoint, you can click a slide to select it. If you double-click that slide or press “Enter” on your keyboard, you open the selected slide in Normal View. You can then modify its content in Normal View. To delete slides in Slide Sorter view, click them once to highlight them. Then press the “Delete” key on your keyboard.

18280.

Briefly explain the method you will use to execute an array linked list?

Answer»

A linked list is defined as a collection of nodes that can be TRAVERSED starting at the HEAD
node. It is important to note that head is not a node, rather the address of the first node of
the list. Linked lists are very useful in situations where the program needs to manage
memory very carefully and a CONTIGUOUS block of memory is not needed. An array of
linked lists is an important data structure that can be used in many applications.
Conceptually, an array of linked lists looks as follows.
An array of linked list is an interesting structure as it COMBINES a static structure (an
array) and a dynamic structure (linked lists) to form a useful data structure. This TYPE of a
structure is appropriate for applications, where say for example, number of categories is
known in advance, but how many nodes in each category is not known. For example, we
can use an array (of size 26) of linked lists, where each list contains words starting with a
specific letter in the alphabet

18281.

In the opening vignette, predictive modeling is described a

Answer»

In the opening vignette, predictive modeling is described as ESTIMATING the future USING the past.

Predictive modeling is a process that uses data MINING and probability to forecast some of the outcomes.

It is USUALLY ALSO associated with weather forecasting and meteorology, but it has some applications in business also.


18282.

Which of the following class can be used to add a footer to a panel?

Answer»

ohh...u ASKED which of the following ryt.....so,where are the OPTIONS.....?? ...

18283.

Computer prabandha english

Answer» CHARLES babech INVENTED
18284.

How to predict old data and new data using prediction in r?

Answer»

Apart from describing relations, models also can be USED to predict VALUES for new data. For that, many model systems in R use the same function, conveniently CALLED predict(). EVERY modeling paradigm in R has a predict function with its own flavor, but in general the BASIC functionality is the same for all of them.

18285.

How to learn Java coding easy ?Don't copy at Google.

Answer» WELL ! here are some ways

1) go to market and by one BOOK on java coding language.
2) or simply pop on YouTube and watch videos on basic java coding there is a HUGE collection of java tutorials on YouTube.
3)last but least if you dosen't like ways mentioned above go and JOIN java classes
18286.

My question is Difine Linux office

Answer»

HEY MATE
▶It is a TYPE of operating system.


♥ Hope it HELPS

18287.

What is wifi configuration ? please don't try to copy and paste from google, its a humble request.

Answer»

⛦Hᴇʀᴇ Is Yoᴜʀ Aɴsᴡᴇʀ⚑
▬▬▬▬▬▬▬▬▬▬▬▬☟

Wi-Fi Configuration➙ A wireless networking protocol that allows device to communicate without internet cords.

============================⤵

❖ It is the most popular means of communicating data wirelessly WITHIN a fixed location.

❖ It's a TRADEMARK of the ​Wi-Fi Alliance.

❖ It is a technology that uses radio waves to PROVIDE NETWORK connectivity.

❖ It describes network components that are based on one of the 802.11 standards developed by the IEEE.

__________
Thanks...✊

18288.

What is wifi configuration?

Answer»

WIFI is a wireless NETWORK technology that ALLOWS computer , mobile, router

and other DEVICES to communicate over a wireless signal

wifi configuration is a setup of wifi devic

18289.

Formula to calculate offset of an element corresponding to a given key

Answer»

How are the only WAY you WANT the

18290.

To print the first 5 multiples of a number in a Java Program code.

Answer»

Class q1
{
PUBLIC void kd( int n)
{
DOUBLE a =0;
for (a=1;a <=5; a++)
{
double b = n*a;
System.out.println(" the "+ a + " multiples of " + n + " is ="+ b);
}
}
}

18291.

Is there any gap between throws IOException in Java program plzz give the answer.

Answer»

Xhsshshshdhhhhdhdhdhdjd

18292.

What is the colour of dot beside a selected picture is used to rotate it in power point

Answer» BLACK COLOUR besides the pitcture
18293.

What are the features and significance of electronic spreadsheets?

Answer»

Features

Consists of a grid of ROWS and columns.

Has title bar,menu bar,etc.

Functions

Evaluate VALUES and PERFORMS different KIND of OPERATION.

18294.

Who was the developer of mill

Answer»

Developer OFFICIALLY TAKES ownership of King Philip MILL.

18295.

What is machinetosh operating system

Answer»

MACINTOSH operating system was DEVELOPED by Apple.It includes GRAPHICAL USER interface based operating SYSTEMS.

18296.

What is basic input output system

Answer»

BIOS is non-volatile firmware used to perform hardware initialization during the booting PROCESS, and to provide runtime services for operating SYSTEMS and programs. The BIOS firmware comes pre-installed on a personal computer's system board, and it is the first SOFTWARE to RUN when powered on.

//BIOS=basic input output system

18297.

Hola mates!!!Pls give questions of number system only of binary to decimal and from decimal to binary!! it is of computer12 points!!!I WILL FOLLOW U I will mark as brainliest...PLS ANSWER IT !! I WILL FOLLOW U

Answer»

BINARY to decimal


1011


10101


000111


011110000



Decimal to binary


23


45


56

18298.

Do deterministic context free grammars always produce deterministic context free languages?

Answer» DONT KNOW the ANSWER..SORRY BUDDY
18299.

Write command to change all picture to black and white

Answer»

Answer:

When you desaturate an entire image you remove the color and create a grayscale image.

Open the photo you WANT to convert.

Choose Image > ADJUSTMENTS > Desaturate or.

Use the keyboard shortcut: "Shift+Ctrl+U" to Desaturate the image.

18300.

Please explain the (A) tag and it's attributes

Answer»

An attribute either modifies the default functionality of an element type or provides functionality to certain element TYPES unable to function correctly WITHOUT them. In HTML SYNTAX, an attribute is added to an HTML start tag. ... Some attribute types function differently when used to MODIFY DIFFERENT element types.