InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 18302. |
Digital signatures are a way of ensuring the __________ of a file and its sender. |
| Answer» ENSURES the AUTHENTICATION of a FILE and its SENDER. | |
| 18303. |
Define the tag in HTML |
|
Answer» HEY dear!!❤ here is your answer: ___________________ the TAG in html DEFINES the text that is to be displayed in the browser window. almost all kind of text that we see in a web page is WRITTEN under the tag. hope it helps you!! ____________________ Thankyou!! |
|
| 18304. |
Difference between the disadvantages of stop and wait protocol |
|
Answer» Fairly SLOW: the sender can send at most one new PACKET per RTT. |
|
| 18305. |
state the data base student with the folwiting field 1.name.2.adrress.3age.4gender.5registration number |
| Answer» | |
| 18306. |
Design and property of matched filter in digital communication |
|
Answer» Matched filter is obtained by correlating a known signal, or template, with an unknown signal to detect the presence of the template in the unknown signal.[1][2] This is equivalent to convolving the unknown signal with a conjugated TIME-reversed version of the template. The matched filter is the optimal linear filter for MAXIMIZING the signal-to-noise ratio (SNR) in the presence of additive stochastic noise. |
|
| 18307. |
Details notes on flow control error control and congestion control |
|
Answer» Congestion CONTROL=Congestion control is a network LAYER issue, and is thus concerned with what happens when there is more DATA in the network than can be sent with reasonable packet delays, no lost packets, etc. Flow control is a local,congestion control is global. |
|
| 18308. |
W a p to input two numbers and print the cube of greater number in Java program in blue J |
|
Answer» Heya mate....❤❤ |
|
| 18309. |
What is Python? Where are used ? |
|
Answer» It is used for web programing example(ZOPE,django ETC) it ALSO used for DESKTOP application.python is intrupted high level programing language |
|
| 18310. |
Define pre, post and in order traversals of a tree. In daa |
|
Answer» Tree traversal is a FORM of graph traversal and refers to the process of visiting each NODE in a tree DATA structure, exactly once. |
|
| 18311. |
Give difference between Alt and SRC ATTRIBUTES |
|
Answer» The REQUIRED SRC attribute specifies the URL of the image. The required alt attribute specifies an alternate TEXT for an image |
|
| 18312. |
Consider that we have a multi-programmed computer in which each job has identical characteristics i.E. In one computation period t for a job, half the time is spent in i/o and the other half in cpu activity. Each job runs for a total of n periods. If four simultaneous jobs, assuming that the period t is distributed as i/o first half, processor second half, with round robin scheduling is used and i/o operations can overlap with processor operation, then what is the average turn around time? |
| Answer» TURN AROUND TIME = WAITING time + BURST time | |
| 18313. |
A pre-paid taxi charges from the passenger as the tariff given below:up to 5km Rs.100 for the next 10km Rs. 10/km for the next 10km Rs. 8/km more than 25km Rs. 5/km Wap to input the distance covered and calculate the amount paid by the passenger.The program displays the printed bill with the details given below:Taxi no:Distance covered:Amount:in java |
| Answer» | |
| 18314. |
The content written within the___________tag does not appear on the web page tags |
| Answer» | |
| 18315. |
An HTML document has two part _____________and_____________ |
| Answer» | |
| 18316. |
The language used to create web pages is known as_________________ |
|
Answer» The LANGUAGE USED to create web pages is known as |
|
| 18317. |
A storage technology that combines multiple disk drive components into a single logical unit to increase logical volume size, improve performance, or reliability is known as: |
| Answer» | |
| 18318. |
What are the apps we use for online shopping?? Which one is the most fastly ordering one? Which is the nice app among them? |
|
Answer» ɧeՎ ԲՐɿeՌԺ |
|
| 18319. |
What are syntax error of java....? perfect answer.... |
|
Answer» ☺Syntax errors are a TYPE of COMPILER error. This means they will be detected immediately when the programmer tries to convert his source CODE into a program. ☺Java, like all other programming LANGUAGES, has its own syntax. ☺A Syntax Error can be caused by a VARIETY of factors. Most commonly, Syntax Errors are caused by misspellings or bad punctuation. thanks ✌✌✌ |
|
| 18320. |
without using if-else statement and ternary operators, accept three unequal numbers and display the second smallest number In java |
|
Answer» Class SECOND |
|
| 18321. |
What is field in context of DBMS |
|
Answer» Hello mate |
|
| 18322. |
Two numbers P and Q are such that, the sum of 2 % of P and Sum of 2 % of Q is two-third of the sum of 2 % of P and 6 % of Q. Find the ratio of P and Q. |
|
Answer» According to the question, 2% of P + 2% of Q = 2/3(2% of P + 6% of Q) 2/100 P + 2/100 Q= 2/3 (2/100 P + 6/100 Q) 1/50P + 1/50 Q= 1/75 P+ 1/25 Q (1/50 - 1/75 )P = 1/25- 1/50 1/150 P= 1/ 50 Q P/Q = 150/50 P/Q = 3/1 So, the CORRECT answer to the question is Option B- 3:1. |
|
| 18323. |
A networking technician is working on the wireless network at a medical clinic. The technician accidentally sets up the wireless network so that patients can see the medical records data of other patients. Which of the four network characteristics has been violated in this situation? Ccna |
|
Answer» 1- DATA HIDING concept 2- NETWORK SECURITY |
|
| 18324. |
The area of the base of a right circular cone is 154cm2 and its height is 14cm. The radius is" |
| Answer» | |
| 18325. |
A binary tree in which if all its levels except possibly the last, have the maximum number of nodes and all the nodes at the last level appear as far left as possible, is known as |
| Answer» CJ juxyxux tztxxtxtztxtxuxufigoonjc | |
| 18326. |
Print following pattern in a Java97 95 7 93 5 7 91 3 5 7 9 |
|
Answer» Int MAIN() |
|
| 18327. |
What is i 10 controller ? |
|
Answer» Jdjdidjdjjjdjdjdjsjsjsiejjw |
|
| 18328. |
What is the difference between token and block in Java program? |
|
Answer» Tokens: |
|
| 18329. |
Explain standard I/o interface in detail |
|
Answer» The method that is used to transfer information between internal storage and external I/O devices is known as I/O interface. The CPU is interfaced using special communication links by the peripherals connected to any computer system. These communication links are used to resolve the differences between CPU and PERIPHERAL. There exists special hardware components between CPU and peripherals to supervise and synchronize all the input and output transfers that are called interface units. Mode of Transfer: The binary information that is received from an external device is usually stored in the memory unit. The information that is transferred from the CPU to the external device is originated from the memory unit. CPU merely processes the information but the source and target is always the memory unit. Data transfer between CPU and the I/O devices may be done in different modes. Data transfer to and from the peripherals may be done in any of the three possible ways Programmed I/O. Interrupt- initiated I/O. Direct memory access( DMA). Now let’s discuss each mode one by one. Programmed I/O: It is due to the result of the I/O instructions that are written in the computer program. Each data item transfer is initiated by an instruction in the program. Usually the transfer is from a CPU register and memory. In this case it requires CONSTANT monitoring by the CPU of the peripheral devices. Example of Programmed I/O: In this case, the I/O device does not have direct access to the memory unit. A transfer from I/O device to memory requires the execution of several instructions by the CPU, including an input instruction to transfer the data from device to the CPU and STORE instruction to transfer the data from CPU to memory. In programmed I/O, the CPU stays in the program loop until the I/O unit indicates that it is ready for data transfer. This is a time consuming process since it needlessly keeps the CPU busy. This situation can be avoided by using an interrupt facility. This is discussed below. Interrupt- initiated I/O: Since in the above case we saw the CPU is kept busy unnecessarily. This situation can very well be avoided by using an interrupt driven method for data transfer. By using interrupt facility and special commands to inform the interface to issue an interrupt request signal whenever data is available from any device. In the meantime the CPU can PROCEED for any other program execution. The interface meanwhile keeps monitoring the device. Whenever it is DETERMINED that the device is ready for data transfer it initiates an interrupt request signal to the computer. Upon detection of an external interrupt signal the CPU stops momentarily the task that it was already performing, branches to the service program to process the I/O transfer, and then return to the task it was originally performing. Direct Memory Access: The data transfer between a fast storage media such as magnetic disk and memory unit is limited by the speed of the CPU. Thus we can allow the peripherals directly communicate with each other using the memory buses, removing the intervention of the CPU. This type of data transfer technique is known as DMA or direct memory access. During DMA the CPU is idle and it has no control over the memory buses. The DMA controller takes over the buses to manage the transfer directly between the I/O devices and the memory unit. |
|
| 18330. |
How the seen she is Puberty time |
|
Answer» For boys, puberty USUALLY startsbetween 10 and 14, and ends by around 15 or 16. For girls, ONE of the first signs of puberty usually is their breasts starting to grow. GETTING your period (MENSTRUATION) usually happens later, around two years after breast growth starts. |
|
| 18331. |
Write the factors that prevent a baseband signal of low frequency to be transmitted over long distances. |
|
Answer» Answer: Size of the antenna Effective power RADIATED by the antenna Mixing up of signals from DIFFERENT TRANSMITTERS (II) Modulation Block DIAGRAM of amplitude modulation |
|
| 18332. |
Whats difference between co-routines and threads ? |
|
Answer» Fibres, LIGHT wieght threads, and green threads are other name of Co - routines like things. They MAY sometimes look (TYPICAL or purpose) more like OPERATING system threads in the programming language, but they do not run in parallel like real threads and work instead like COROUTINE. |
|
| 18333. |
Write about arithmetic micro operations and logic micro operations |
|
Answer» Answer: Arithmetic micro-operations perform arithmetic operations on NUMERIC DATA stored in REGISTERS. Logic micro-operations perform bit manipulation operation on non-numeric data stored in registers. Shift micro-operations perform shift micro-operations performed on data. Explanation: please mark as BRAINLIST my ans |
|
| 18334. |
Famous problem of dependency management is known as |
|
Answer» Famous problem of DEPENDENCY MANAGEMENT is KNOWN as dependency hell |
|
| 18335. |
Border attributes used with |
|
Answer» ❤Hey mate❤ |
|
| 18336. |
Disadvantage for fifth generation |
|
Answer» The MAIN disadvantage is they PUSH the limit of transistor density so internal heat builds up. Heat is the natural enemy of microscopic circuitry because the makes the distances between nodes increase. The only WAY to make the electrons go from A to B any faster is to make the distance smaller. That’s why OLD computers (from the 70s) had huge air conditioning units, to dissipate the heat. |
|
| 18337. |
What is compiling..? tell me in simple language |
|
Answer» A program that TRANSLATES between high-level languages is usually CALLED a source-to-source COMPILER or transpiler. |
|
| 18338. |
What is watchpoint and breakpoint..? |
|
Answer» Computer SPEAKERS, or multimedia speakers, are speakers sold for use with COMPUTERS, although usually capable of other audio uses, e.g. for an MP3 player. Most such speakers have an internal amplifier and consequently require a power source, which may be by a mains power supply often via an AC adapter, batteries, or a USB port (able to supply no more than 2.5W DC, 500mA at 5V). The signal INPUT connector is often a 3.5 mm jack plug (usually color-coded lime green per the PC 99standard); RCA CONNECTORS are sometimes used, and a USB port may supply both signal and power (requiring additional circuitry, and only suitable for use with a computer). Battery-powered wireless Bluetooth speakers require no connections at all. Most computers have speakers of low power and quality built in; when external speakers are connected they disable the built-in speakers. Altec Lansingclaims to have created the computer SPEAKER market in 1990. |
|
| 18339. |
Which data structure is suitable to model telephone connections in a network? |
|
Answer» A phone network is distributed over land areas called cells, each served by at least ONE base station. These base STATIONS PROVIDE the cell with the network coverage which can be used for TRANSMISSION of voice, data and OTHERS. ... Ted’s mobile telephone communicates with a base . Types of Data structure Primitive types. Composite types or non-primitive type. Abstract data types. Arrays. Lists. Binary trees. B-trees. Heaps. binary tree data structure will be suitable to model telephone connections in a network. |
|
| 18340. |
How do you interprate record in context of DBMS |
|
Answer» Attribute • Property • Field • COLUMN |
|
| 18342. |
Which type of star system has the most stars? open clusterglobular clustereclipsing binarybinary star system |
|
Answer» Hey mate here ur ANSWER! |
|
| 18343. |
Risk represents ________ |
|
Answer» Risk is the possibility of losing something of value. Values (such as physical health, social status, emotional well-being, or financial wealth) can be gained or lost when taking risk resulting from a given action or inaction, FORESEEN or unforeseen (planned or not planned). Risk can also be defined as the intentional interaction with uncertainty. Uncertainty is a potential, unpredictable, and uncontrollable outcome; risk is a consequence of action taken in spite of uncertainty. Three types of risks : The three types of risks are: a) Personal risk describes the loss of life or loss of income because of a SICKNESS, disability, old age, or unemployment. b) Property risk involves losses to property as a result of perils, like FIRE or theft, and hazards. The risk is the potential of a significant impact resulting from the exploit of a VULNERABILITY. *In computer security, a vulnerability is a weakness which can be exploited by a Threat Actor, such as an attacker, to perform unauthorized actions within a computer system. Vulnerability – Weaknesses or gaps in a security program that can be exploited by threats to gain unauthorized access to an ASSET. A vulnerability is a weakness or gap in our protection efforts. Risk – The potential for loss, damage or destruction of an asset as a result of a threat exploiting a vulnerability. |
|
| 18345. |
Identify the incorrect middleware hook |
| Answer» QUESTION is INCOMPLETE (PERHAPS) | |
| 18346. |
What is the role of middleware in a distributed system explain with example? |
|
Answer» Middleware in the context of distributed APPLICATIONS is software that PROVIDES SERVICES beyond those provided by the operating system to enable the various components of a distributed system to communicate and MANAGE data. Middleware SUPPORTS and simplifies complex distributed applications. |
|
| 18347. |
The output of a differentiator is proportional to the what |
|
Answer» HII... friend.. the differentiator OUTPUT is directly proportional to the INPUT device with respect to TIME. :-) |
|
| 18348. |
What type of device is scr |
|
Answer» Heya mate here is your answer ⬇️⬇️⬇️⬇️⬇️ |
|
| 18349. |
Application areas of internet |
|
Answer» .jdjdhdb dhshhsb. sbbsbs. ajnakao. abaoaoksns anajksjsns sbjsjsns you are not the intended recipient you do not hesitate to ask you to KNOW the status on the LIVE SITE is currently unavailable online and download using your PC and MOBILE devices I will |
|
| 18350. |
What is the use fo Merge and center in spreadsheet????please pls plz request |
|
Answer» Programs have options to MERGE cells horizontally, vertically or both. Additionally, Excel has the option to merge and center data, which is a COMMONLY USED FORMATTING feature when creating TITLES or headings. The Merge & Center option is used to center headings across multiple worksheet column |
|