Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

18301.

Can you tell all the math function in java

Answer»

I will HELP any WAY..

18302.

Digital signatures are a way of ensuring the __________ of a file and its sender.

Answer» ENSURES the AUTHENTICATION of a FILE and its SENDER.
18303.

Define the tag in HTML

Answer» HEY dear!!❤

here is your answer:
___________________

the TAG in html DEFINES the text that is to be displayed in the browser window.

almost all kind of text that we see in a web page is WRITTEN under the tag.

hope it helps you!!
____________________

Thankyou!!
18304.

Difference between the disadvantages of stop and wait protocol

Answer»

Fairly SLOW: the sender can send at most one new PACKET per RTT.
not ROBUST: if the ack can get lost, when the RECEIVER gets a packet, the receiver cannot tell if it is a retransmission or a new packet.

18305.

state the data base student with the folwiting field 1.name.2.adrress.3age.4gender.5registration number

Answer»

FIRST GO to me EXCEL and SELECT table and MAKE it

18306.

Design and property of matched filter in digital communication

Answer»

Matched filter is obtained by correlating a known signal, or template, with an unknown signal to detect the presence of the template in the unknown signal.[1][2] This is equivalent to convolving the unknown signal with a conjugated TIME-reversed version of the template. The matched filter is the optimal linear filter for MAXIMIZING the signal-to-noise ratio (SNR) in the presence of additive stochastic noise.

Matched filters are commonly used in radar, in which a known signal is SENT out, and the reflected signal is examined for common elements of the out-going signal. Pulse compression is an example of matched filtering. It is so called because impulse response is matched to input pulse signals. Two-dimensional matched filters are commonly used in image processing, e.g., to improve SNR for X-ray. Matched filtering is a demodulation technique with LTI (linear time invariant) filters to maximize SNR.[] It was ORIGINALLY also known as a North filter.

18307.

Details notes on flow control error control and congestion control

Answer»

Congestion CONTROL=Congestion control is a network LAYER issue, and is thus concerned with what happens when there is more DATA in the network than can be sent with reasonable packet delays, no lost packets, etc. Flow control is a local,congestion control is global.

Flow control=Flow control is the management of data flow between computers or devices or between nodes in a network so that the data can be handled at an efficient pace. Too much data arriving before a device can handle it causes data overflow, meaning the data is either lost or must be retransmitted.

Error control=Error control is the process of detecting and correcting both the bit level and packet level errors. ... In term BURST error means that two or more bits in the data unit were changed.

18308.

W a p to input two numbers and print the cube of greater number in Java program in blue J

Answer»

Heya mate....❤❤
import java.util.*;
CLASS Numbers
{
PUBLIC static void MAIN(String args[])
System.out.println("Enter two numbers");
int a=sc.nextInt();
int b=sc.nextInt();
if (a>b)
{
int C=a*a*a;
System.out.println("Cube of a"+c);
}
else
{
System.out.println("Cube of b"+c);
}
}
}
HOPE it helps you my friend..
Please mark it as Brainliest...

18309.

What is Python? Where are used ?

Answer»

It is used for web programing example(ZOPE,django ETC) it ALSO used for DESKTOP application.python is intrupted high level programing language

18310.

Define pre, post and in order traversals of a tree. In daa

Answer»

Tree traversal is a FORM of graph traversal and refers to the process of visiting each NODE in a tree DATA structure, exactly once.

18311.

Give difference between Alt and SRC ATTRIBUTES

Answer»

The REQUIRED SRC attribute specifies the URL of the image.

The required alt attribute specifies an alternate TEXT for an image

18312.

Consider that we have a multi-programmed computer in which each job has identical characteristics i.E. In one computation period t for a job, half the time is spent in i/o and the other half in cpu activity. Each job runs for a total of n periods. If four simultaneous jobs, assuming that the period t is distributed as i/o first half, processor second half, with round robin scheduling is used and i/o operations can overlap with processor operation, then what is the average turn around time?

Answer» TURN AROUND TIME = WAITING time + BURST time
18313.

A pre-paid taxi charges from the passenger as the tariff given below:up to 5km Rs.100 for the next 10km Rs. 10/km for the next 10km Rs. 8/km more than 25km Rs. 5/km Wap to input the distance covered and calculate the amount paid by the passenger.The program displays the printed bill with the details given below:Taxi no:Distance covered:Amount:in java

Answer»

Here is the PROGRAM..


HOPE it HELPS U....

18314.

The content written within the___________tag does not appear on the web page tags

Answer»

I THINK it MUST be HASH TAG

18315.

An HTML document has two part _____________and_____________

Answer»

The CORRECT ANSWER is HEAD AND BODY

18316.

The language used to create web pages is known as_________________

Answer» \large{\mathfrak{Answer -}}

\textbf{\underline{HTML.}}

The LANGUAGE USED to create web pages is known as \textbf{\underline{HTML.}}
18317.

A storage technology that combines multiple disk drive components into a single logical unit to increase logical volume size, improve performance, or reliability is known as:

Answer»

It is KNOWN as MEMORY

18318.

What are the apps we use for online shopping?? Which one is the most fastly ordering one? Which is the nice app among them?

Answer»

ɧeՎ ԲՐɿeՌԺ


⊙ Amazon

⊙ Myntra

⊙ Flipkart

⊙ Snapdeal

⊙ Jabong

⊙ Nykaa

⊙ Fashion and you

⊙ Stalk BUY love

EBAY.....etc



I THINK the beat ONE is FLIPKART



hope \: it \: helps

18319.

What are syntax error of java....? perfect answer....

Answer»


☺Syntax errors are a TYPE of COMPILER error. This means they will be detected immediately when the programmer tries to convert his source CODE into a program.



☺Java, like all other programming LANGUAGES, has its own syntax.



☺A Syntax Error can be caused by a VARIETY of factors. Most commonly, Syntax Errors are caused by misspellings or bad punctuation.


thanks ✌✌✌
18320.

without using if-else statement and ternary operators, accept three unequal numbers and display the second smallest number In java

Answer»

Class SECOND
{
public static void main(String args[])
{
Scanner in= NEW Scanner(System.in);
System.out.println("Enter three unequal NUMBERS");
int a= in.nextInt();
int b=in.nextInt();
int c=in.nextInt();
int sec= Math.max(Math.min(a,b),Math.min(Math.max(a,b),c);
System.out.println("The second SMALLEST number is" + sec);
}
}

18321.

What is field in context of DBMS

Answer»

Hello mate

here's your ANSWER

¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤

The full form of DBMS is database management system. datavthat have several parts known as RECORDS and records are divided in fields.

¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤

Hope it HELPS you

18322.

Two numbers P and Q are such that, the sum of 2 % of P and Sum of 2 % of Q is two-third of the sum of 2 % of P and 6 % of Q. Find the ratio of P and Q.

Answer»

According to the question,

2% of P + 2% of Q = 2/3(2% of P + 6% of Q)

2/100 P + 2/100 Q= 2/3 (2/100 P + 6/100 Q)

1/50P + 1/50 Q= 1/75 P+ 1/25 Q

(1/50 - 1/75 )P = 1/25- 1/50

1/150 P= 1/ 50 Q

P/Q = 150/50

P/Q = 3/1

So, the CORRECT answer to the question is Option B- 3:1.

18323.

A networking technician is working on the wireless network at a medical clinic. The technician accidentally sets up the wireless network so that patients can see the medical records data of other patients. Which of the four network characteristics has been violated in this situation? Ccna

Answer» 1- DATA HIDING concept
2- NETWORK SECURITY
18324.

The area of the base of a right circular cone is 154cm2 and its height is 14cm. The radius is"

Answer»

This is UR ANSWER CHECK it

18325.

A binary tree in which if all its levels except possibly the last, have the maximum number of nodes and all the nodes at the last level appear as far left as possible, is known as

Answer» CJ juxyxux tztxxtxtztxtxuxufigoonjc
18326.

Print following pattern in a Java97 95 7 93 5 7 91 3 5 7 9

Answer»

Int MAIN()
{
int i,j;
for(i=1;i<=9;i+=2)
{
for(j=i;j<=9;j+=2)
{
PRINTF("%d",j);
}
printf("\n");
}
return 0;
}


I HOPE this will help you

18327.

What is i 10 controller ?

Answer»

Jdjdidjdjjjdjdjdjsjsjsiejjw

18328.

What is the difference between token and block in Java program?

Answer»

Tokens:
Tokens are the various Java program elements which are identified by the compiler. A token is the smallest ELEMENT of a program that is meaningful to the compiler. ... Java Tokens are the smallest individual BUILDING block of a Java program. TheJava compiler uses it for constructing expressions and statements.

Block:
A block in Java is a group of ONE or more statements enclosed in braces. Ablock begins with an opening brace ({) and ends with a CLOSING brace (}). Between the opening and closing braces, you can code one or more statements. For example: { int i, J; i = 100; j = 200; } A block is itself a type of statement.

18329.

Explain standard I/o interface in detail

Answer» \mathcal{\huge{\orange{\star\:Hayy \: Mate...!! \:\star}}}



The method that is used to transfer information between internal storage and external I/O devices is known as I/O interface. The CPU is interfaced using special communication links by the peripherals connected to any computer system. These communication links are used to resolve the differences between CPU and PERIPHERAL. There exists special hardware components between CPU and peripherals to supervise and synchronize all the input and output transfers that are called interface units.

Mode of Transfer:

The binary information that is received from an external device is usually stored in the memory unit. The information that is transferred from the CPU to the external device is originated from the memory unit. CPU merely processes the information but the source and target is always the memory unit. Data transfer between CPU and the I/O devices may be done in different modes.

Data transfer to and from the peripherals may be done in any of the three possible ways


Programmed I/O.

Interrupt- initiated I/O.

Direct memory access( DMA).

Now let’s discuss each mode one by one.

Programmed I/O: It is due to the result of the I/O instructions that are written in the computer program. Each data item transfer is initiated by an instruction in the program. Usually the transfer is from a CPU register and memory. In this case it requires CONSTANT monitoring by the CPU of the peripheral devices.
Example of Programmed I/O: In this case, the I/O device does not have direct access to the memory unit. A transfer from I/O device to memory requires the execution of several instructions by the CPU, including an input instruction to transfer the data from device to the CPU and STORE instruction to transfer the data from CPU to memory. In programmed I/O, the CPU stays in the program loop until the I/O unit indicates that it is ready for data transfer. This is a time consuming process since it needlessly keeps the CPU busy. This situation can be avoided by using an interrupt facility. This is discussed below.

Interrupt- initiated I/O: Since in the above case we saw the CPU is kept busy unnecessarily. This situation can very well be avoided by using an interrupt driven method for data transfer. By using interrupt facility and special commands to inform the interface to issue an interrupt request signal whenever data is available from any device. In the meantime the CPU can PROCEED for any other program execution. The interface meanwhile keeps monitoring the device. Whenever it is DETERMINED that the device is ready for data transfer it initiates an interrupt request signal to the computer. Upon detection of an external interrupt signal the CPU stops momentarily the task that it was already performing, branches to the service program to process the I/O transfer, and then return to the task it was originally performing.

Direct Memory Access: The data transfer between a fast storage media such as magnetic disk and memory unit is limited by the speed of the CPU. Thus we can allow the peripherals directly communicate with each other using the memory buses, removing the intervention of the CPU. This type of data transfer technique is known as DMA or direct memory access. During DMA the CPU is idle and it has no control over the memory buses. The DMA controller takes over the buses to manage the transfer directly between the I/O devices and the memory unit.


❤️⭐I hope you mark as brainlist answer⭐❤️✨✨
18330.

How the seen she is Puberty time

Answer»

For boys, puberty USUALLY startsbetween 10 and 14, and ends by around 15 or 16. For girls, ONE of the first signs of puberty usually is their breasts starting to grow. GETTING your period (MENSTRUATION) usually happens later, around two years after breast growth starts.

18331.

Write the factors that prevent a baseband signal of low frequency to be transmitted over long distances.

Answer»

Answer:

Size of the antenna

Effective power RADIATED by the antenna Mixing up of signals from DIFFERENT TRANSMITTERS (II) Modulation

Block DIAGRAM of amplitude modulation

18332.

Whats difference between co-routines and threads ?

Answer»

Fibres, LIGHT wieght threads, and green threads are other name of Co - routines like things. They MAY sometimes look (TYPICAL or purpose) more like OPERATING system threads in the programming language, but they do not run in parallel like real threads and work instead like COROUTINE.

18333.

Write about arithmetic micro operations and logic micro operations

Answer»

Answer:

Arithmetic micro-operations perform arithmetic operations on NUMERIC DATA stored in REGISTERS. Logic micro-operations perform bit manipulation operation on non-numeric data stored in registers. Shift micro-operations perform shift micro-operations performed on data.

Explanation:

please mark as BRAINLIST my ans

18334.

Famous problem of dependency management is known as

Answer»

Famous problem of DEPENDENCY MANAGEMENT is KNOWN as dependency hell

18335.

Border attributes used with

Answer»

❤Hey mate❤
Border ATTRIBUTES are USED LIKE-:

HEY MATE

18336.

Disadvantage for fifth generation

Answer»

The MAIN disadvantage is they PUSH the limit of transistor density so internal heat builds up. Heat is the natural enemy of microscopic circuitry because the makes the distances between nodes increase. The only WAY to make the electrons go from A to B any faster is to make the distance smaller. That’s why OLD computers (from the 70s) had huge air conditioning units, to dissipate the heat.

18337.

What is compiling..? tell me in simple language

Answer»

A program that TRANSLATES between high-level languages is usually CALLED a source-to-source COMPILER or transpiler.

18338.

What is watchpoint and breakpoint..?

Answer»

Computer SPEAKERS, or multimedia speakers, are speakers sold for use with COMPUTERS, although usually capable of other audio uses, e.g. for an MP3 player. Most such speakers have an internal amplifier and consequently require a power source, which may be by a mains power supply often via an AC adapter, batteries, or a USB port (able to supply no more than 2.5W DC, 500mA at 5V). The signal INPUT connector is often a 3.5 mm jack plug (usually color-coded lime green per the PC 99standard); RCA CONNECTORS are sometimes used, and a USB port may supply both signal and power (requiring additional circuitry, and only suitable for use with a computer). Battery-powered wireless Bluetooth speakers require no connections at all. Most computers have speakers of low power and quality built in; when external speakers are connected they disable the built-in speakers. Altec Lansingclaims to have created the computer SPEAKER market in 1990.

18339.

Which data structure is suitable to model telephone connections in a network?

Answer»

A phone network is distributed over land areas called cells, each served by at least ONE base station. These base STATIONS PROVIDE the cell with the network coverage which can be used for TRANSMISSION of voice, data and OTHERS. ... Ted’s mobile telephone communicates with a base .

Types of Data structure

Primitive types.

Composite types or non-primitive type.

Abstract data types.

Arrays.

Lists.

Binary trees.

B-trees.

Heaps.

binary tree data structure will be suitable to model telephone connections in a network.

18340.

How do you interprate record in context of DBMS

Answer»

Attribute

• Property

• Field

COLUMN

18341.

When displaying a web page, the application layer uses the?

Answer»

it (A) HTTP PROTOCOL


18342.

Which type of star system has the most stars? open clusterglobular clustereclipsing binarybinary star system

Answer»

Hey mate here ur ANSWER!

Binary Star System.

Note: The most common of the multiple star SYSTEMS are binary stars, systems of only two stars together.

HOPE it's help you!
Mark as a BRAINLIST

18343.

Risk represents ________

Answer»

Risk is the possibility of losing something of value. Values (such as physical health, social status, emotional well-being, or financial wealth) can be gained or lost when taking risk resulting from a given action or inaction, FORESEEN or unforeseen (planned or not planned). Risk can also be defined as the intentional interaction with uncertainty. Uncertainty is a potential, unpredictable, and uncontrollable outcome; risk is a consequence of action taken in spite of uncertainty.


Three types of risks : The three types of risks are: a) Personal risk describes the loss of life or loss of income because of a SICKNESS, disability, old age, or unemployment. b) Property risk involves losses to property as a result of perils, like FIRE or theft, and hazards.



The risk is the potential of a significant impact resulting from the exploit of a VULNERABILITY.


*In computer security, a vulnerability is a weakness which can be exploited by a Threat Actor, such as an attacker, to perform unauthorized actions within a computer system.


Vulnerability – Weaknesses or gaps in a security program that can be exploited by threats to gain unauthorized access to an ASSET. A vulnerability is a weakness or gap in our protection efforts. Risk – The potential for loss, damage or destruction of an asset as a result of a threat exploiting a vulnerability.


18344.

Please give me the ans

Answer» UR and are II and IV
18345.

Identify the incorrect middleware hook

Answer» QUESTION is INCOMPLETE (PERHAPS)
18346.

What is the role of middleware in a distributed system explain with example?

Answer»

Middleware in the context of distributed APPLICATIONS is software that PROVIDES SERVICES beyond those provided by the operating system to enable the various components of a distributed system to communicate and MANAGE data. Middleware SUPPORTS and simplifies complex distributed applications.

18347.

The output of a differentiator is proportional to the what

Answer» HII...
friend..
the differentiator OUTPUT is directly proportional to the INPUT device with respect to TIME.

:-)
18348.

What type of device is scr

Answer»

Heya mate here is your answer ⬇️⬇️⬇️⬇️⬇️
A silicon controlled rectifier (SCR) is a four-layer solid state current controlling device with 3 terminals. They have ANODE and cathode terminals LIKE a conventional diode and a THIRD CONTROL terminal, referred to as the Gate.
the thyristor or silicon controlled rectifier, SCR is a device that is widely used for controlling or switching power and often high voltage AC or DC circuits.
hope it helps Mark as BRAINLIEST if you like and FOLLOW me
be brainly ✔✔✔✔❇

18349.

Application areas of internet

Answer»

.jdjdhdb dhshhsb. sbbsbs. ajnakao. abaoaoksns anajksjsns sbjsjsns you are not the intended recipient you do not hesitate to ask you to KNOW the status on the LIVE SITE is currently unavailable online and download using your PC and MOBILE devices I will

18350.

What is the use fo Merge and center in spreadsheet????please pls plz request

Answer»

Programs have options to MERGE cells horizontally, vertically or both. Additionally, Excel has the option to merge and center data, which is a COMMONLY USED FORMATTING feature when creating TITLES or headings. The Merge & Center option is used to center headings across multiple worksheet column