InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 20601. |
C# program to add, subtract, multiply and divide two numbers using overloading for integers and floats. |
|
Answer» output :ENTER the value a and B:5,10addition :5+10=15subtraction :5-10=5multiple :5*10=50division :5/10=2Explanation:#include |
|
| 20602. |
The output of an and gate is high when two input a and b will be |
|
Answer» The OR gate is an electronic circuit that gives a high output (1) if one or more of its inputs are high. A plus (+) is used to SHOW the OR operation. The NOT gate is an electronic circuit that produces an inverted version of the INPUT at its output. It is ALSO known as an inverter.... |
|
| 20603. |
Consider an n n array a containing integer elements (positive, negative, and zero). Assume that the elements in each row of a are in strictly increasing order, and the elements of each column of a are in strictly decreasing order. (hence there cannot be two zeroes in the same row or the same column.) describe an efficient algorithm that counts the number of occurrences of the element 0 in a. Analyze its running time. |
|
Answer» bzmzbzvxkcwuwi ducks six KG shake Z Explanation:bald BBC she BBC SAM's sksbzsidxee epevsidnceek2fwievwcwkcwuiwv wvwgsiw wb_ |
|
| 20604. |
Consider a binary tree of n vertices such that children of node k are 2*k and 2*k + 1. Vertex 1 is the root of tree and each node has an interger value associated with it. Such a tree may be represented by writing down vailes from consectitive nodes |
|
Answer» The Himalayas, or Himalaya is a mountain range in ASIA, separating the plains of the Indian subcontinent from the Tibetan Plateau. The range has many of the Earth's highest peaks, including the highest, Mount Everest. The Himalayas include over fifty mountains exceeding 7,200 m (23,600 ft) in elevation, including TEN of the fourteen 8,000-metre peaks. By contrast, the highest PEAK outside Asia (Aconcagua, in the Andes) is 6,961 m (22,838 ft) tall.Lifted by the subduction of the Indian tectonic plate under the Eurasian Plate, the Himalayan mountain range runs west-northwest to east-southeast in an arc 2,400 km (1,500 mi) long. Its western anchor, Nanga PARBAT, lies just south of the northernmost bend of Indus river, Namcha Barwa, is just west of the great bend of the Yarlung Tsangpo River (upper stream of the Brahmaputra River). The Himalayan range is bordered on the northwest by the Karakoram and the Hindu Kush ranges. To the north, the chain is separated from the Tibetan Plateau by a 50–60 km (31–37 mi) wide tectonic valley called the Indus-Tsangpo Suture. Towards the south the arc of the Himalaya is ringed by the very low Indo-Gangetic Plain. The range varies in width from 350 km (220 mi) in the west (Pakistan) to 150 km (93 mi) in the east (Arunachal Pradesh). The Himalayas are distinct from the other great ranges of central Asia, although sometimes the term 'Himalaya' (or 'Greater Himalaya') is loosely used to include the Karakoram and some of the other ranges. |
|
| 20605. |
Consider an array consisting of ve and +ve numbers. What would be the worst time comparisons an algorithm can take in order to segregate the numbers having same sign altogether i.E all +ve on one side and then a |
|
Answer» Here we can USE the PARTITION algorithm of quick sort for SEGREGATION and answer will be O(N).Choose the first element as pivot whatever may be its sign we don’t care and keep an extra INDEX at pivot POSITION.... |
|
| 20606. |
Consider a disk with the 100100 tracks numbered from 00 to 99 rotating at 3000 rpm. The number of sectors per track is 100 and the time to move the head between two successive tracks is 0.2 milliseconds. Consider an initial set of 100100 arbitrary disk requests and assume that no new disk requests arrive while servicing these requests. If the head is initially at track 00 and the elevator algorithm is used to schedule disk requests, what is the worse case time to complete all the requests? |
|
Answer» tyxdtujhxsedtyuhjndxthuyjyfExplanation: |
|
| 20607. |
Compare the characteristics of unencoded6micro-instructions to that of highly encodedmicro-instructions. |
| Answer» TION:UNENCODED6MICRO has more CAPABILITY than encodedmicro | |
| 20608. |
Complete binary tree with the property that the value at each node is at least as large as the values at its children is called |
|
Answer» Hy, May it shall help.Explanation:Heap is a complete BINARY tree with the property that the value of each NODE is at least as LARGE as the VALUES at its children.Heaps are of two types:Min HeapMax HeapThe property of Min Heap is that the value of each node is either greater or equal to its parent's value and having minimum value element at the ROOT.The property of Max Heap is that the value of each node is equal or lesser to its parent's value and having maximum value element at the root. |
|
| 20609. |
What is network security? |
| Answer» NETWORK security is any ACTIVITY ADOPTED to protect the USABILITY and integrity of your network and system DATA | |
| 20610. |
C. in csma/cd network with data rate of 10mbps. Minimum frame size is 512 bits for the correct operation of the collision detection process. What should be the minimum frame size if increase data rate to 100 mbps ? And 1 gbps |
|
Answer» In RANDOM access or contention METHODS, no station is superior to another station and none is ASSIGNED the control over another. No station permits, or does not permit, another station to send. In a random access method, each station has the right to the medium without being controlled by any other station. There is no scheduled time for a station to transmit. Transmission is random among the stations. That is why these methods are called random access. ALSO, no rules specify which station should send next. Stations compete with one another to access the medium. That is why these methods are also called contention methods. Protocols in this category : ALOHA, CSMA, CSMA/CD, CSMA/CA.Define controlled access and list three protocols in this category. In controlled access, the stations consult one another to find which station has the right to send. A station cannot send unless it has been authorized by other stations. Protocols in this category: reservation, polling, token passing.Define CHANNELIZATION and list three protocols in this category. Channelization is a multiple-access method in which the available bandwidth of a link is shared in time, frequency, or through code, between different stations. Protocols in this category: FDMA, TDMA, and CDMA.... |
|
| 20611. |
How object iscreated in c++ |
|
Answer» tion:sorry I cannot KNOW the answer PLEASE HELP me again thank you have a NICE day |
|
| 20612. |
Calculate the hlen value if the total lenth is 1200 bytes out of which 1176 is data from upper layer |
|
Answer» It CHANGES the TTL (time-to-live) and CHECKSUM FIELDS........ |
|
| 20613. |
Write a program in java on switch case with output |
|
Answer» class Day { public STATIC void main(String[] ARGS) { int week = 4; String day; switch (week) { case 1: day = "Sunday"; break; case 2: day = "Monday"; break; case 3: day = "Tuesday"; break; case 4: day = "WEDNESDAY"; break; case 5: day = "Thursday"; break; case 6: day = "Friday"; break; case 7: day = "SATURDAY"; break; default: day = "Invalid day"; break; } System.out.println(day); } } When you run the program, the output will be: Wednesday Explanation: |
|
| 20614. |
Bytes of data being transferred in each connection are numbered by tcp. These numbers starts with a |
| Answer» WELL, they start with binary NUMBER 0 MEANS off and 1 means onn.Explanation:They collectively known as I.P Address. | |
| 20615. |
Calculate of bit rate of bandwithe of 3000hz and snr is 3162 |
|
Answer» tion:SORRY I cannot KNOW the answer calculate of B GRADE white of 3000 at jet and snr is 3 162 |
|
| 20616. |
Small blank square at the lower right corner of the selected cell is called |
|
Answer» Fill HANDLE.Explanation:The black SQUARE of the SELECTED CELL is CALLED fill handle. |
|
| 20617. |
What are all the versions in windows? |
| Answer» TOTAL VERSION are 26some ex WINDOW xpwindows 7 windows 10windows VISTA | |
| 20618. |
Write a program in qbasic to display the first 10 terms of the series 11, 17, 23 ..... |
| Answer» SORRY I can't ANSWER your question please SAY thanks. | |
| 20619. |
Tell me the jumbled word PETNRAA Please tell me Subject computer science |
| Answer» ARPANET, COULD be the ANSWER | |
| 20620. |
An icon with an arrow in the lower left hand corner for quick access? |
| Answer» | |
| 20621. |
A timebox plan should contain a complete and exhaustive set of estimated fine grained tasks to achieve the timebox objectives is true or false? |
|
Answer» A timebox is a PREVIOUSLY agreed period of time during which a person or a team works STEADILY towards completion of some goal. Rather than ALLOW work to CONTINUE until the goal is REACHED, and evaluating the time taken, the timebox approach consists of stopping work when the time limit is reached and evaluating what was accomplished... |
|
| 20622. |
At a particular time of computation the value of a counting semaphore is 7. Then 20 p operations and 15 v operations were completed on this semaphore. The resulting value of the semaphore is |
| Answer» TION:I cannot KNOW the answer PLEASE HELP thank to me and help to me | |
| 20623. |
Free course for data Science? |
|
Answer» a – Data Science Specialization. ...Coursera – Data-Driven Decision Making. ...EDX – Data Science Essentials. ...Udacity – INTRO to MACHINE LEARNING. ...IBM – Data Science Fundamentals. ...California Institute of Technology – Learning from Data. |
|
| 20624. |
A priority-queue is implemented as a max-heap. Initially, it has 5 elements. The level-order traversal of the heap is given below: 10, 8, 5, 3, 2 two new elements 1 and 7 are inserted in the heap in that order. The level-order traversal of the heap after the insertion of the elements is: |
|
Answer» Initially heap has 10, 8, 5, 3, 2 10 / \ 8 5 / \3 2After insertion of 1 10 / \ 8 5 / \ /3 2 1 No need to heapify as 5 is GREATER than 1.After insertion of 7 10 / \ 8 5 / \ / \3 2 1 7Heapify 5 as 7 is greater than 5 10 / \ 8 7 / \ / \3 2 1 5No need to heapify any further as 10 isgreater than 7 |
|
| 20625. |
A positive integer is called a palindrome if its representation in the decimal system is the same when read from left to right and from right to left. For a given positive integer k, write the value of the smallest palindrome larger than k to output. |
|
Answer» A positive INTEGER is CALLED a palindrome if its representation in the decimal SYSTEM is the same when read from left to right and from right to left. For a given positive integer K of not more than 1000000 digits, WRITE the value of the smallest palindrome larger than K to output... |
|
| 20626. |
A piece of malware that appears to be useful, but actually causes damage to the system or allows another to gain access to the system is called |
|
Answer» Malware" is SHORT for malicious software and used as a single TERM to REFER tovirus, spy ware, WORM etc. Malware is designed to cause damage to a stand alone COMPUTER or a networked pc. So wherever a malware term is used it means a program which is designed to damage your computer it may be a virus,worm or Trojan...... |
|
| 20627. |
Input and output devices used in malls |
|
Answer» yes it USED in mallsExplanation:because they are having COMPUTER SYSTEM that is also a input and output machine |
|
| 20628. |
An organization is granted the block 2ll.L7.L80.0l21.Find (d number of subnets (ii) i.Lumber of hosts (iii) what are the valid subnets? (iv) what is the broadcast address for each subnet? (v) what are the valid hosts? |
|
Answer» _____________Follow me ______❣ |
|
| 20629. |
A number is said to be a trendy number if and only if it has 3 digits and the middle digit is divisible by 3. Examples of trendy numbers: 131, 264, 999 examples of nontrendy numbers : 123, 653, 33, 4, 1034 write a program to find whether a given number is a trendy number or not. Input format: input consists of a single integer. Output format: refer sample output for details. Sample input 1: 791 sample output 1: trendy number sample input 2: 3 c program |
|
Answer» am to check whether a given number is a Trendy Number or Not.Language used : C programming.Program :#include |
|
| 20630. |
An immutable data type is one that cannot change after being created. Give three resons to useimmutaledata |
|
Answer» Explanation:1. No side effectsIn PHP objects are passed by reference, so we should be enough careful for what we do and how we use our objects, like in this (SILLY) example. 2. No invalid object’s stateThanks to Immutable objects, we’ll always be in a consistent state, no matter what. Or even if you forget to CALL a certain method, after a certain OPERATION, you won’t be able to end up in a situation where your application is in an inconsistent state. Many times, we have bugs where properties of our objects are not in the right state. With Immutable Object this should never HAPPEN. 3. Failure atomicityWith the usage of Immutable objects failure atomicity will be a default property for your objects. Let’s see a basic example |
|
| 20631. |
A network using csma/cd has a bandwidth of 10 mbps. If the maximum propagation time including the device delays is 25.6 s, what is the minimum size of the frame? |
|
Answer» Explanation: The minimum frame transmission time is Tfr = 2 × TP = 51.2 μs. This means, in the WORST CASE, a station needs to transmit for a period of 51.2 μs to detect the collision.The minimum size of the frame is 10 Mbps × 51.2 μs = 512 bits or 64 bytes. This is actually the minimum size of the frame for Standard ETHERNET... |
|
| 20632. |
A modem has a baud rate of 40 signals / seconds. If it is transmitted at the rate of 4800 bps, what is the coding rate? |
|
Answer» Your question is CONFUSING, but if it you're sending a START bit, 8 bits of data, a parity bit, and two stop bits all encoded as one symbol, 2048 times a second, then that's 2 kilobaud where "kilo" = 2048. Then, since there's 12 bits per baud, the bit rate WOULD be 12 bits * 2048 baud = 24576 bits per second... |
|
| 20633. |
A method by which several channels are interleaved and than transmitted together is known as |
|
Answer» A method by which SEVERAL channels are interleaved and than transmitted together is KNOWN as Franchise Delivery Manifest.PLZPLZPLZPLZFOLLOW MEHAVE A GREAT DAYBYE♡♡♡♡ |
|
| 20634. |
Algorithm to find the smallest integer value that can't be represented as sum of any subset of a given array. |
|
Answer» Given a SORTED array (sorted in non-decreasing order) of positive numbers, FIND the smallest positive integer VALUE that cannot be represented as sum of elements of any subset of given set. Expected time complexity is O(n).Examples:Input: arr[] = {1, 3, 6, 10, 11, 15};Output: 2Input: arr[] = {1, 1, 1, 1};Output: 5Input: arr[] = {1, 1, 3, 4};Output: 10Input: arr[] = {1, 2, 5, 10, 20, 40};Output: 4Input: arr[] = {1, 2, 3, 4, 5, 6};Output: 22... |
|
| 20635. |
A ... Is known as the hierarchical representation of the knowledge that is used to keep the track of all the useful information supplied with the help of the sequence of the learning examples without keeping remembrance of any example and it is the concept learning process. |
|
Answer» Version space LEARNING is a LOGICAL approach to machine learning, specifically binary classification. Version space learning algorithms search a predefined space of HYPOTHESES, viewed as a set of logical SENTENCES. Formally, the HYPOTHESIS space is a disjunction... |
|
| 20636. |
A host is sending 100 datagrams to another host if the identification of first datagram is 1024 what is the identification number of last in ipv4 |
|
Answer» The answer will be 1123Explanation:ACCORDING to the problem in the ipv4 identification of the first datagram is given and the total number of data grams is also given.As we know that for ipv4 the identification BLOCK is of 16 bits and use to find the ITEMS presents in the similar frame . The block is incremented by one for each datagram.Therefore for this case, the identification number of last ipv4 is 1024+99= 1123 |
|
| 20637. |
Algo to compute postfix notations of a given equation |
|
Answer» Evaluation rule of a Postfix Expression states:While reading the expression from left to RIGHT, push the element in the stack if it is an operand.Pop the two OPERANDS from the stack, if the element is an operator and then EVALUATE it.Push BACK the result of the evaluation. REPEAT it till the end of the expression... |
|
| 20638. |
A functional dependency set f covers another functional dependency set g.What does it mean |
|
Answer» If the FUNCTIONAL DEPENDENCIES of set G has determined all those ATTRIBUTES that were determined by the functional dependencies of set F, then it means G COVERS F. THUS, we conclude G covers F (G ⊇ F) otherwise not... |
|
| 20639. |
What is tally and it full form? |
| Answer» FULL form in Tally , its meaning and information is discussed below, so let us heck it out some details on full form of the TERM ERP which is used in Tally. The full form of ERP in tally is ENTERPRISE RESOURCE Planning. ... Tally is an accounting program which helps to manage and track all of your ACCOUNTS. debts. | |
| 20640. |
A dynamic ram has refresh cycle of 32 times per msec. Each refresh operation requires 100 nsec and a memory cycle requires 250 nsec. What percentage of memory's total operating time is required for refreshes |
|
Answer» A DYNAMIC RAM has refresh cycle of 32 TIMES PER MSEC. Each refresh OPERATION requires100 nsec and a memory cycle requires 250 nsec. What percentage of memory's total operating time is required for refreshes? Are u sure there is no mistake in "32 bits per msec"... |
|
| 20641. |
A deviation from the specified or expected behavior that is visible to end-users is called |
| Answer» ANSWER of the QUESTION is COMPUTER | |
| 20643. |
Student wants to create a field pin code in a table which data type he will choose ....???? |
|
Answer» dent must choose the 'Numeric' data type to create a pin CODE field. Explanation: The Indian Postal Department uses the pin code or the Postal Index Number (PIN) to identify a post office through a numbering system. In India, PIN code is represented by a set of 6-digit number that indicates the sorting and the delivery Post Office.Each PIN code numbers represent the postal zones (divided into 9 zones), regions, sub-regions, DISTRICTS in a zone respectively. The first digit identifies the particular zone; second digit, to the sub-region; the THIRD digit, the district of that region. The three DIGITS altogether represent the sorting and the last digits represent the delivery post office. |
|
| 20644. |
Accelerates or decelerates the rotating object as per the difference in velocity between on drag in javascript |
| Answer» DECELERATE. .............. | |
| 20645. |
Which is better MI 5a or MI 7a |
|
Answer» ................. |
|
| 20646. |
Given 100 digit as maximum input program in c |
|
Answer» 10² = 100................... |
|
| 20647. |
Name of this toolbar |
|
Answer» the SECOND LAST one is UNDO.please......PLS mark me as a BRAINLEST |
|
| 20648. |
❕❗Who's the father of computer? ❕❗ #point donations ❤♥♠♣#GO_π_FOLLOW_ME⏬⏫⏪⏩⤵⤴#ItzShwetlana... ⭐✨✌ |
|
Answer» ʀᴇ ɪs ᴜʀ ᴀɴsᴡᴇʀ ᴄʜᴀʀʟᴇs ʙᴀʙʙᴀɢᴇ ɪ ʜᴏᴘᴇ ɪᴛs ʜᴇʟᴘ ᴜ |
|
| 20649. |
Identify the following activity. you are trying a letter using a computer and suddenly there is a power failure. which type of memory does this activity deal? |
|
Answer» u are typing a LETTER and there is sudden POWER failure Random-access memory is USED.Explanation:RAM is a particular form of the computer’s memory. This form of memory can CHANGE and read in any form or order. It is mainly used to store machine code and working data. Moreover, it even permits data to be read or written in a similar amount of time. Thus, RAM deals with the SPECIFIED activity. |
|
| 20650. |
बालिका के आनंद का आधार क्या था? |
|
Answer» बालिका के आनंद का सुंदर और बेमिसाल था |
|