Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

18451.

What are the principle(s) that are basic for an effective configuration management?a. Binaries should be independent of configuration informationb. configuration information should be maintained in a single placec. both optiond. none

Answer» Please \: Mark \: Me \: As \: BRAINLIEST. \\ .................................................. \\ Also \: Don't \: Forgot \: to \: Follow \: me. \\ .............. \\ As \: we \: know \: about \: Subjects.\\ So, \\ Hello \: Guys, \\ ................ \\ Answer \: is \: \\ \\ \\ \\ \\ B
18452.

Write a java program to find the second smallest element in the array WITHOUT USING SORTING! ICSE Class XSample output - {1,5,7,2,8,12,89,56,13};Sample input-2

Answer»

Java

// Java program to find smallest and second smallest elements

import java.io.*;

  

class SecondSmallest

{

    /* Function to print FIRST smallest and second smallest

      elements */

    static VOID print2Smallest(int arr[])

    {

        int first, second, arr_size = arr.length;

  

        /* There should be atleast two elements */

        if (arr_size < 2)

        {

            System.out.println(" Invalid Input ");

            RETURN;

        }

  

        first = second = Integer.MAX_VALUE;

        for (int i = 0; i < arr_size ; i ++)

        {

            /* If current element is smaller than first

              then update both first and second */

            if (arr[i] < first)

            {

                second = first;

                first = arr[i];

            }

  

            /* If arr[i] is in between first and second

               then update second  */

            else if (arr[i] < second && arr[i] != first)

                second = arr[i];

        }

        if (second == Integer.MAX_VALUE)

            System.out.println("There is no second" +

                               "smallest element");

        else

            System.out.println("The smallest element is " +

                               first + " and second Smallest" +

                               " element is " + second);

    }

  

    /* Driver program to test above functions */

    public static void main (String[] args)

    {

        int arr[] = {12, 13, 1, 10, 34, 1};

        print2Smallest(arr);

    }

}

/


hope it helps
mark me as brainliest plz....

18453.

Add A3 and D3 in G1 Find the answer

Answer» EGG is the answer
I HOPE this MIGHT be CORRECT
18454.

How to copy styles from one open workbook file to another?

Answer» 1. right CLICK that style
2.a box will appear ,then click copy option
3. GOING to another workbook right click on any cell REFERENCE
4. paste option appear then click that option
18455.

When should you use the Flowchart workflow?

Answer»

Workflow picture is a little more generic flowchart that gives a graphic scene of a business process.  

Some flowcharts could be USEFUL if you're trying to track metrics for a process by eliminating inefficiencies.

Best ways to try this is by making flowcharts of your business methods that SIMPLIFY the understanding of business WORKS that EXPLAIN roles and responsibilities among those processes and help TRACE bottlenecks that help things from moving skillfully.

18456.

Draw and explain VI Characteristics of PN Junction diode. Write current equation of PN Junction

Answer»

VI properties of PN junction diode in forward bias are non-linear i.e. CURVED line.  

When forward bias is given to the diode then a low IMPEDANCE path allows to conduct a large current which is KNOWN as infinite current.

Diode equation gives an impression for the current through a diode as voltage function.  

Ideal Diode equation is:

    I = Io(e q/v/kt - 1)

Where I = Gross Current,

Io = "Dark saturation current",

V = Applied voltage at the ends,

q = Perfect value of electron CHARGE,

k = Boltzmann's constant and T = Correct  temperature (K).

18457.

Difference between statistical anomaly detection and rule based intrusion detection

Answer»

INTRUSION DETECTION System is a Software App that CHECKS and controls networks for malicious activities/Violations of policy.

Malicious activity/Violation is normally told to an administrator/collected centrally USING a Security Information and Event Management (SIEM) system.  

SIEM System joins results from many sources and USES alarm filtering methods to differentiate threat activity from false alarms.

18458.

) Write a note on punch through or reach through effect.

Answer»

INITIAL effect COMMONLY known as its inventor i.e. James M.  

Changes in the effective breath of base in a BIPOLAR junction transistor due to change in the applied base-to-collector voltage.  

Greater reverse bias through the collector–base junction for example increases the collector–base depletion width and THUS lessening the width of charge carrier region of the base.

18459.

Derive the expression for a ripple factor in a full-wave rectifier with resistive load in detail

Answer»

Full wave RECTIFIER is a circuit assembly which MAKES USE of both HALF cycles of input alternating current (AC) and TRANSMITS them to Direct Current (DC).  

Chapter on Half wave rectifiers we had seen that a half wave rectifier makes use of only one-half cycle of the input alternating current.  

Full Wave Rectifier is much productive (double+) than a half wave rectifier.  

Process of converting both half cycles of the input supply AC to direct current DC is called full wave rectification.

18460.

As per edward tufte, what do good visualizations strive towards?

Answer»

CONCEPT of Chart Junk was found by Edward Tufte.

Famous work i.e. Visual Display of Quantitative Information was published in the year 1983 and generally important book ever written on DATA visualization.

Made top 100 non-fiction books of the 20th century on AMAZON.  

It has full examples of BEST and worst practices in record of visualization of data.


18461.

Why is a collection of computer servers usually maintained by an enterprise?

Answer»

Collection of computer SERVERS normally controlled by an enterprise to fulfill server needs far BEYOND the capability of one machine.  

Large WEBSITES are likely deployed here.  

They use load SHARING techniques to service the Internet through 'clustering software'.  

Server companies often consists of thousands of computers which require a large amount of power to run and keep cool trade-offs of server farms and mid-range MAINFRAMES.  

Server farms are less expensive but mainframes can do work of many server farms.  

Mainframes excel at servicing large numbers of users running lots of different programs.  


18462.

Service Workers are the core technology used in

Answer»

Service worker is kind of script that our browser runs in the background which is different from web page opening the door to features that don't need a web page.  

Today, they already include features LIKE push NOTIFICATIONS and background sync.

Future service workers could support other things like periodic sync.  

DEEP FEATURE EXPLAINED in this demo is the capacity to intercept and handle network requests includes programmatically managing  cache of responses.

18463.

निम्न में से किस प्रकार के मीनू को ड्रॉप डाउन मीनू भी कहते हैं ?(a)पुल-डाउन(b) कैस्केडिंग(c) फ्लाई आउट(d) इनमें से कोई नहीं

Answer» HEY MATE!!
तुम्हारे प्रश्न का उत्तर :-

(C)कैस्केडिंग
18464.

Explain mean Ergodic processes in brief.

Answer»

Stationary ergodic process is a stochastic process which exhibits both stationarity and ergodicity. ... Stationarity is the property of a random process which guarantees that its statistical properties, such as the mean value, its MOMENTS and variance, will not change over time.
An ergodic process is one which CONFORMS to the ergodic theorem. The theorem ALLOWS the time AVERAGE of a conforming process to equal the ensemble average. The ensemble average is meaningless. Also SEE ergodic theory and ergodic process.

18465.

Explain briefly about Faradays laws of electromagnetic induction

Answer»

Faraday's law of induction is a basic law of electromagnetism predicting how a magnetic field will interact with an electric circuit to produce an ELECTROMOTIVE force —a phenomenon called ELECTROMAGNETIC induction.
The Maxwell–Faraday EQUATION is a generalization of Faraday's law, and is listed as one of Maxwell's equations.
Michael Faraday explained electromagnetic induction using a concept he called lines of force. However, scientists at the time widely rejected his theoretical IDEAS, MAINLY because they were not formulated mathematically.

18466.

User acceptance testing is a verification activity.True or false

Answer»

Here is UR ANSWERS
TRUE

18467.

Write a program in java to print the sum of the pattern: s=1/2+3/4+5/6.........+19/20

Answer»

CLASS Series

{

   PUBLIC STATIC  void main()

   {

       double a=1.0,b=2.0;

       double s=0.0,s1=0.0;

       System.out.println("the TERMS are");

       for(INT i=1;i<=10;i++)

       {

           s1=(a/b);

           System.out.println(s1);

           s=s+s1;

           a+=2;

           b+=2;

       }

       System.out.println("");

       System.out.println("the sum is "+s);

   }

}

18468.

Private builds can be triggered automatically?

Answer»

"The answer is yes. You can trigger private BUILD automatically.



This is not a difficult question if you have followed the fundamental steps of the individual builds and public builds and whether they can be triggered manually or automatically.


Therefore, FOLLOW the NECESSARY steps before MOVING forward in the lesson. So you can now pick the correct answer to this question.

"

18469.

The visual design of a product can be evaluated by means of what? a>Card Sorting b>Eye-Tracking c>Interview d>Interview

Answer»

It has EYE TRACKING can convince of product which can evaluate by the mean of the and it can track design to evaluating the visual hierarchy of navigation element in a fine manner.


Apart from that it has care sorting and ALSO TREE TESTING evaluates an IA in isolation in the fine manner.

18470.

What happens when our question is reported

Answer»

Hi

when question is reported than they check if question is valid or not by MAKING sure that question should not CONTAIN any third PARTY link, and if question is making sense or not.. if above mentioned criteria matches then they do not delete it, otherwise they delete it.

18471.

माइक्रो प्रोसेसर किस पीढ़ी का कंप्यूटर है ?(a) प्रथम(b) तृतीय(c) द्वितीय(d) चतुर्थ

Answer» ANSWER....


माइक्रो प्रोसेसर चतुर्थ पीढ़ी का कंप्यूटर है ।


\red{hope \: it \: helps}
\green{thanks}
18472.

खरीदारों के लिए कम्प्यूटर का प्रयोग करते हैं हुए किसके माध्यम से खरीदारी करना संभव हैं ?(a) ई- कॉमर्स(b)ई-वर्ल्ड(c)ई-बिजनेस(d) ई-स्पेंड

Answer»

Your and is E-commerce

18473.

Support Vector Machines, Naive Bayes and Logistic Regression are used for solving _______________________ problems.

Answer»

SCALABILITY. In a LARGELY scalable environment where computers can be scaled out, processing of data-intensive natural LANGUAGE and machine learning are becoming very popular.


Algorithms like Naïve Bayes, RANDOM Forest, Decision TREE, Support Vector Machines, and Logistic Regression are all used for Text Reviews Classification as their main advantage is scalability.

18474.

What do you understand by PC intrusion?

Answer» INTRUSION - Computer Definition. To compromise a computer system by BREAKING the security of such a system or causing it to enter into an insecure state. The act of intruding—or gaining unauthorized access to a system—typically LEAVES TRACES that can be discovered by intrusion detection systems.
18475.

Binary search algorithm cannot be applied to:-a. Sorted linear array b. Sorted binary trees c. Pointer array d. Sorted linked list

Answer» HEY mate your answer is OPTION a .
I.e SORTED linear array .
18476.

Fill the blank in the following program so that the macro func and function func can be distinguished without any ambiguity. #include int func(int, int); #define func(x, y) x / y + x int main() { int i, j; scanf("%d", &i); scanf("%d", &j); printf("%d ", func(i + j, 3)); ----------------------------------- // fill in the blanks printf("%d\n", func(i + j, 3)); } //End main() int func(int x, int y) { return y / x + y; }

Answer» HII DEAR here is your answer


option b is the correct answer

HOPE it's HELP U
18477.

कम्प्यूटर की भौतिक बनावट ( छूट कर महसूस करने योग्य भाग ) कहलाते हैं ?(a)हार्डवेयर(b) सॉफ्टवेयर(c) की-बोर्ड(d)मेमोरी

Answer» OPTION B 8S CORRECT ANSWER
18478.

Dash is a huge network of computers throughout the world

Answer»

HEYy !!!!

Your ANSWER is Internet

Hope it HELPS you

Please MARK it as BRAINLIEST

18479.

Define HTML Form.Name the different types of form Controls. Differentiate between radio buttons and checkboxes.

Answer»

HTML FORM means a PAGE MADE in HTML in which we can FILL our details ...

18480.

which menu has the command to convert an object or objects into a group (a)Insert (b)Modify (c)Edit plzz give me ans fast

Answer» MODIFY is the correct answer BUDDY HOPE you like it PLEASE please please please MARK has brainliest answer
18481.

इनटरनेट क्या हैं ?(a) भारत सरकार के लिए सम्प्रेषण प्रणाली(b) किसी बिजनेस के लिए आंतरिक सम्प्रेषण प्रणाली(c) नेटवर्कों का बड़ा नेटवर्क(d)ये सभी

Answer»

नमस्ते मित्र !



_______________________



इंटरनेट [ C ] नेटवर्कों का बड़ा नेटवर्क हैं ।



इंटरनेट एक वैश्विक कंप्यूटर नेटवर्क, विभिन्न प्रकार की सूचना और संचार सुविधाएं प्रदान करता है ।



जिसमें मानकीकृत संचार प्रोटोकॉल का उपयोग करके इंटरकनेक्टेड नेटवर्क शामिल हैं।



इंटरनेट का मुख्य लाभ अरबों कंप्यूटरों और उपकरणों को एक-दूसरे से जोड़ने की क्षमता है।



इंटरनेट न केवल उपयोगकर्ताओं के बीच जानकारी साझा करने और प्राप्त करने में सुविधा बनाता है, आधुनिक इंटरनेट का एक अन्य लाभ स्वचालन के लिए इसकी क्षमता है।



एक इंटरनेट कनेक्शन घर से काम करने या वर्चुअल कार्यालय रखने की क्षमता वाले कई लोगों को प्रदान करता है।



_______________________



प्रश्न के लिए धन्यवाद!



☺️❤️☺️

18482.

बना लिए गए डाक्यूमेंट को एडिट करने का अर्थ हैं ...-(a) इसे करेक्ट करना(b) इसे सेव करना(c) इसे प्रिंट करना(d) इनमें से कोई नहीं

Answer»

Bana liye gye DOCUMENT ko edit KRNE ka mtlb hai use CORRECT krna...


Ye hai aapka answer....

Agar answer satisfying HO to plz...brainliest mark kre

18483.

Please ans me if u know correct ans

Answer» 1) iii

2) iii

3) i

4) i

5) II
18484.

How do you interpret field in context of DBMS only for 1 marks not two long

Answer» \huge\boxed{\texttt{\fcolorbox{red}{aqua}{Heyaaa!!!}}}

The ANSWER is:-

It is referring to unique SINGLE UNIT of DATA in PARTICULAR row .

\huge\bold\red{Hope\:it\:helps\:you}
18485.

Please friends help in this c d and e

Answer»

Hey MATE here is the ANSWER

c) i
d)ii
e)IV

18486.

What two names are given to the blinking vertical line?

Answer» HI
ONE is CURSOR

HOPE this HELPS
18487.

List any four applications of Ms excel

Answer»

Microsoft Excel is a spreadsheet DEVELOPED by Microsoft for Windows, MACOS, Android and iOS. It FEATURES calculation, graphing tools, pivot tables, and a macro PROGRAMMING LANGUAGE called Visual Basic for Applications. It has been a very widely applied spreadsheet for these platforms, especially since version 5 in 1993, and it has replaced Lotus 1-2-3 as the industry standard for spreadsheets. Excel forms part of Microsoft Office.

18488.

Write a program to print all the factors of 20

Answer»

# include

int MAIN()

{

int i,j,;

for(i=1;i<=20;i++)

{

if(i%20==0)

printf("%d",i);

}

}


18489.

Explain the relationship between operating system and computer hardware

Answer»

Relationship between 'operating system and computer HARDWARE':

Operating system:

  • An 'operating system or OS' is a 'software' on the 'hard DRIVE' that allows the 'computer hardware' to 'communicate and operate' with the 'computer software'.
  • Without an 'operating system', a 'computer and software programs' would be useless. It is like an 'interpreter between user and hardware'.

Computer hardware:

  • 'Computer hardware' is the collection of 'physical parts of a computer system'. This includes the 'computer CASE', 'monitor', 'keyboard', and 'mouse'.
  • It also includes 'all the parts' inside 'the computer case', such as the 'hard DISK drive', 'motherboard', 'video CARD', and many others.

To know more

"explain the relation between operating system and computer hardware

brainly.in/question/6914857

What is operating system in computer science

brainly.in/question/7118773

18490.

Which data type has the largest storage capacity (a. Text , b. Memo , c. Yes/No )

Answer»

A memo field is useful for storing large amounts of alphanumeric information such as a note, comments, descriptions and address.

A TEXT field is a graphical CONTROL ELEMENT intended to enable the user to input text information to be used by the program.

A text field is for relatively SHORT ENTRIES and cannot hold more than 255 characters, whereas a memo field can hold up to 65,535 characters.


18491.

What is the use of attaching a file to an e-mail?Answer fast ...

Answer»

We can USE the FILE ATTACHMENTS to ATTACHMENT to attach any kind of IMG , and documents and SEND to the the mail id of the person we want to send..

18492.

Describe abacus as far as evolution of computer is concered

Answer»

Before the INVENTION of COMPUTERS ABACUS was only a device which was used as a calculator

18493.

What is internet? and explain its merit and demerits in brief .

Answer»

What is Internet?

The Services are used by the people to get INFORMATION, do online works, DISCUSSIONS, e-mailing, video chatting, voice calling, social activities, news channels, online booking and many other hundred and thousand terms that we use with the help of internet. In every country there are many companies that provide the services of net in DIFFERENT rates. There get benefits from full functions you need to have a laptop, mobile or PC.

Advantages / Merits / USES / Benefits of Internet

Benefits for Students Studies



Book Tickets online



Learn Online From Videos



Play Online Games


Entertainment


E-mailing


Results and Roll No


Company Profile


Jobs


Bank Accounts


Buy and Sell


Earn Money On Internet



Hire Peoples for Work




Disadvantages / Demerits / Drawbacks / Misuse of Internet

Shopping Quality



Loss of Studies


Loss of Money


Health Disadvantages


Viruses & Malware


Accounts Hacking


Data STOLEN Chances



Frauds



Dark Web on Internet



Governments Data and Files



Wrong News


Far From Family


Wasting Time



Waste of Money


18494.

The continuous deployment must be followed to practice continuous delivery. False true

Answer»

______✨ HEY MATE ✨______

➡️It's TRUE that the continuous DEPLOYMENT must be followed to practice continuous DELIVERY.

✌️I THINK IT HELPED YOU ✌️

18495.

A new instance of ___________ is created upon every check-in.

Answer»

Of your DEVELOPMENT PIPLINE

18496.

Hey my all dear mates .....the question is ==> what is the difference between XML and SGML (5 points).....➖➖➖➖➖➖➖➖don't spam and don't copy. from google plzzz

Answer»

☆ DIFFERENCE BETWEEN XML AND SGML AS FOLLOWS :

__________________________________

● SGML has XML as it's subset.

● XML is a MARK up language while SGML is a meta language.

● XML allows to craft NEW tags for presentation of data while SGML is an ISO standard for specifying set of tags.

● XML has simpler structure as compared to SGML

● XML documents are USUALLY readable with SGML parsers while SGML can produce errors with XML parsers.

● Some allowed constructs in SGML are not PERMITTED in XML

● Some comment practices in SGML too aren't allowed in XML

● XML can define applications on their own while SGML can't.

● XML describes the data and transfers data between application while SGML allows to define and create platform independent files.
__________________________________

HOPE HELPED !!

18497.

Subtract B2 from C2 in G2

Answer»

By Peter Flom; Updated April 24, 2017

A matrix is a rectangular array of numbers. One matrix can be subtracted from another if it is of the same order -- that is, if it has the same number of rows and columns. Matrices are often used in STATISTICS. Matrices are usually written surrounded by BRACES. EXCEL, the spreadsheet APPLICATION included with Microsoft Office, refers to a matrix as an "array." It has built-in functionality to make WORKING with matrices, or arrays, simple.


18498.

What is used to provide page number and date information

Answer»

The "NUMBER" data TYPE is used to PROVIDE PAGE number.

The "Date and Time" data type is used to provide date.

18499.

Collection of different data types is called

Answer»

COLLECTION DATA type has two components: a type constructor , which DETERMINES whether thecollection type is a SET, MULTISET, or LIST, and an element type , which specifies the type of data that thecollection can contain. ... For example, a collection whose element type is INTEGER can contain only integer values.

18500.

C programming for find maximum number

Answer» UDE int main() { double n1, N2, n3; PRINTF("Enter three different numbers: "); scanf("%lf %lf %lf", &n1, &n2, &n3); if( n1>=n2 && n1>=n3 ) printf("%.2F is the largest number.", n1); if( n2>=n1 && n2>=n3 ) printf("%.2f is the largest number.", n2); if( n3>=n1 && n3>=n2 ) printf("%.2f is the largest number.", n3); return 0; }

This PROGRAM uses if...else statement to find the largest number.

Example #2

#include int main() { double n1, n2, n3; printf("Enter three numbers: "); scanf("%lf %lf %lf", &n1, &n2, &n3); if (n1>=n2) { if(n1>=n3) printf("%.2lf is the largest number.", n1); else printf("%.2lf is the largest number.", n3); } else { if(n2>=n3) printf("%.2lf is the largest number.", n2); else printf("%.2lf is the largest number.",n3); } return 0;