Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

21551.

Tamanna needs to store and transport the data. She should use html or xml? Which one and why? Html can also store the given data, isn't it? Pls make it clear

Answer»

e here your answerHTML means Hyper " Text Markup Language". HTML is used for creating the Web pages and modifying the Web pages. It is not used to store data and also in html she can store the data in website only. Extensible Markup Language (XML) is a markup language that DEFINES a set of rules for ENCODING documents in a format that is both human-readable and machine-readable. The W3C's XML 1.0 Specification and several other related SPECIFICATIONS. All of them FREE open standards.

21552.

What are main uses of computer based system in pizza hut?

Answer»

oject elaborates about the Pizza Hut which is working on a mission of “To be the first choice for every Pizza occasion, by ALWAYS providing 100% customer satisfaction.”This PROJECT emerges about The Pizza Hut’s HOME Delivery system and its flow of information, this project discuss about the current system of Pizza Hut , an analysis about their Current Problems, Security and ethnic issues, and some recommendations which we believe would help in improve their current system.This project will be more focus on these aspects giving more priorities on how they have created the current system which provides capabilities to WORK WITHIN the current needs, and what are the improvements that they are expecting within the present system.thank you [email protected]

21553.

What are protective grounding earthing neutral connections?

Answer»

g PREVENTS ELECTROCUTION of a person.thunders are absorbed by EARTHING RODS on buildings.it prevents electrocution by not letting the circuit complete.

21554.

Why design view allows more control over table structure

Answer»

your ANSWER PLEASE MARK me as BRAIN LIST

21555.

Why should we save our drawing

Answer»

are draw a picture in a drawing PAGE it is MUST to save the picture of the drawing when we are not save the picture we are not SEE picture again So we have save or save as our drawing

21556.

Identify the errors in the following code and write the correct code

Answer»

te START has wrong command

    Z'' type=''a''>a..........z mean from where you WISH to start your list
21557.

Value of logarithmic spiral constant in cos function

Answer»

ithmic SPIRALEQUIANGULAR spiral or growth spiral is a self-similar spiral curvewhich often appears in nature. The logarithmic spiral was first DESCRIBED by Descartes and later extensively investigated by Jacob BERNOULLI, who called it SPIRA mirabilis, "the marvelous spiral.thank you @chetan2222

21558.

Write an algorithm to check whether the smallest of 3 numbers

Answer»

the SMALLER NUMER

21559.

I have problem in starting the phone. what should I do? ¿

Answer»

ect your DEVICE from the PC.Exit the KIES software.Launch the Kies software after it fully exited.Reconnect the device to the PC. ...Click TOOLS at the top left of the Kies window.Click the EMERGENCY recovery.The Update will BEGIN.

21560.

What do you menn by web crawler in the terms of a search engine?

Answer»

rawler (also known as a web spider or web robot) is a program or automated script which browses the WORLD WIDE Web in a methodical, automated manner. This PROCESS is called Web crawling or spidering. MANY LEGITIMATE sites, in particularsearch engines, use spidering as a means of providing up-to-date data.

21561.

The year in which india ratified the kyoto protocol

Answer» YOTO Protocol was adopted in Kyoto, JAPAN, in December 1997 and entered into force in February 2005. The first commitment period under the Kyoto Protocol was from 2008-2012.
21562.

The two separate modes of operating in a system are

Answer» E here's UR ans hope it HELPS you SUPERVISOR MODEORPRIVILEGED MODE
21563.

What is OLE object in data type give about in 1000 words

Answer»

linking and embedding (OLE) is a Microsoft technology that facilitates the sharing of application data and objects written in different formats from multiple sources. Linking establishes a connection between two objects, and embedding facilitates application data insertion.OLE is used for compound document management, as well as application data transfer via drag-and-drop and clipboard operations.An OLE OBJECT may DISPLAY as an icon. Double clicking the icon opens the associated object application or asks the user to select an application for object editing. Alternatively, an OLE object may display as actual contents, such as a graph or chart. For example, an external application chart, such as an Excel spreadsheet, may be inserted into a Word application. When the chart is activated in the Word document, the chart's user INTERFACE loads, and the user is able to manipulate the external chart's data inside the Word document.OLE-supported software applications include:•Microsoft Windows applications, such as Excel, Word and PowerPoint•Corel WordPerfect•Adobe Acrobat•AutoCAD•Multimedia applications, like photos, audio/video clips and PowerPoint presentations.OLE has certain disadvantages, as follows:•Embedded objects increase the host document FILE size, RESULTING in potential storage or loading difficulties.•Linked objects can break when a host document is moved to a location that does not have the original object application.•Interoperability is limited. If the embedded or linked object application is unavailable, the object cannot be manipulated or edited.I Hope it will help you.Mark me as brainliest.

21564.

Why do we use comments in HTML program give the full program with output also please I will mark u as brain list

Answer»

s in HTML:(i) It is a tag in HTML which allows a comment into a source CODE.(ii) They are used to hide some text (or) code from the browser.(iii) Generally,comments gives help to reader to identify piece of code SPECIALLY in complex source code.(or)They ASSIST the user in understanding the code.(iv) Comments begins with (v) Types of comments are:(i) Single line comments.(ii) Multi-line comments.Sample Program :

Comments are not DISPLAYED to the END user

<!Hope it helps -->
21565.

What is the function argument mircosoft office Excel 2007?

Answer»

ures are CALCULATION, graphing tools, pivot tables, and a MACRO programming LANGUAGE called Visual BASIC for Applications are the features of   ms EXCEL 2007.

21566.

The importance of user technology security education in organization

Answer»

ortance of a security, education, TRAINING and awareness program (November 2005) A Security Education, Training and Awareness (SETA) program can be defined as an educational program that is DESIGNED to reduce the number of security breaches that OCCUR through a lack of employee security awareness.hope U LIKED my answer

21567.

The programs that are permentely stored in rom is called

Answer»

s that are PERMANENTLY STORED in ROM is CALLED RAM

21568.

The devices which provide output are called input is this true or false

Answer»

ices which PROVIDE OUTPUT are CALLED input is FALSE

21569.

Intenet explorer falls under

Answer»

Internet Explorer (formerly Microsoft Internet Explorer and Windows Internet Explorer, commonly ABBREVIATED IE or MSIE) is a series of GRAPHICAL web browsers developed by Microsoft and included in the Microsoft Windows line of operating SYSTEMS, STARTING in 1995.

21570.

Q basic program to generate an even number series from 10 to 100

Answer» HILE i < 100print(i)i = 2 + iWEND
21571.

Stream analytics which associated with characteristics of big data

Answer»

tream Analysis is the process of COLLECTING, analyzing and reporting the collection of data that is formed by a website visitors visit. The flow or the path that a user takes through a website is referred to as the click-stream. Since, a large amount of click-stream data is GENERATED by users, many organizations RELY on big data analytics and related tools like Hadoop to interpret the data and GAIN valuable insights and generate reports. To gain even more better insights, it is always better to use the click-stream analysis with more sophisticated analytics tools. In my view, click stream analytics is associated with the storing of these huge VOLUMES of data and then being able to analyze them for insights are the main characteristics involved with Big Data.

21572.

Social networking sites? How it is threat to internal security

Answer»

. ...LinkedIn. ...Google+ ...YouTube. ...Pinterest. ...INSTAGRAM. ...TUMBLR....FacebookThreats to internal security may be directed at either the state's citizens, or the organs and infrastructure of the state itself, and may range from PETTY CRIME, serious organised crime, political or industrial unrest, or even domestic terrorism.

21573.

Find the maximum of 3 different numbers,how many decision boxes will be drawn in the flowchart

Answer»

java.util.Scanner;CLASS abc{public STATIC void main(String[]args){int X; int y;int z;Scanner obj=new Scanner(System.in);System.out.println("Enter the first number");x=obj.nextInt();System.out.printl n("Enter the second num");y=obj.nextInt();System.out.println("Enter the third number");z=obj.nextInt();{ if(x>y&&x>z)System.out.println("first ONE is greater"); elseif(y>x&&y>z)System.out.println("second one is greater");elseSystem.out.println("third one is greater"); } }}

21574.

I will mark as brainliest give th output of this program

Answer» PUT will be LIKE this....1...2..3.15
21575.

Represent +ve and -ve integers real no. In computer organization and architecture

Answer»

d binary numbers are, by definition, POSITIVE numbers and thus do not require an arithmetic sign. An m-bit unsigned number represents all numbers in the range 0 to 2m − 1. For example, the range of 8-bit unsigned binary numbers is from 0 to 25510 in decimal and from 00 to FF16 in hexadecimal. SIMILARLY, the range of 16-bit unsigned binary numbers is from 0 to 65,53510 in decimal and from 0000 to FFFF16in hexadecimal.Signed numbers, on the other hand, require an arithmetic sign. The most significant bit of a binary number is used to represent the sign bit. If the sign bit is equal to zero, the signed binary number is positive; otherwise, it is negative. The remaining BITS represent the actual number. There are three WAYS to represent negative numbers.2.5.1 Sign-Magnitude RepresentationIn the sign-magnitude representation method, a number is represented in its binary form. The most significant bit (MSB) represents the sign. A 1 in the MSB bit position denotes a negative number; a 0 denotes a positive number. The remaining n−1 bits are preserved and represent the magnitude of the number. The following examples illustrate the sign-magnitude representation:

21576.

I am a program that helps in viewing and managing files and folder

Answer»

t know that you are not the same thing to do with e I have to be a good DAY today I was just that too but it's all in one PLACE and time I SEE it

21577.

S on the computer architecture and organisation

Answer» UTER FIELDS, computer ARCHITECTURE isa set of rules and ways that explain the functionality, organization and implementation of computer systems. ... The design, arrangement , construction ororganization of the different parts of ACOMPUTER system is known as Computer Architecture.mark it as BRAINLIST
21578.

Microprocessor as switching devices are for which generation computers mcq

Answer»

m ON : Computer FUNDAMENTALS. MICROPROCESSORS as switching devices are for which GENERATION computers

21579.

Please suggest me a best PPT topic

Answer» NEWSPAPER has 4 COLOURED DOTS at the END
21580.

The most productive source of requirements are ___

Answer»

UserExplanation:CORRECT answer: Option B ( Users )                       => The most productive source of requirements are users Users                            1) Managers: Managers are very important for their companies. They have to just manage the WORKERS in companies. Therefore, they can't be a source of productivity source. 2) Designers: Designers make the different models for company and sold them. Because of designers, productivity can be increases. But not at more proportion. 3) Users: This is the most important source for any company for their increasing productivity. Companies sold their products to some people. That people do its productivity. Nowadays, YOUTUBERS are the main user for productivity of their company. 4) Product Owners: This is ALSO one of the most popular source. Product owner can do its product productivity on internet as well as T.V. This increase only demands.

21581.

Open source program count compared to closed source

Answer»

source software can be DEFINED as proprietary software distributed under a LICENSING agreement to authorized USERS with private modification, copying, and REPUBLISHING restrictions. Or in layman terms, the source code is not shared with the public for anyone to look at or change.So i prefer closed source program.And also there is more closed source program being used

21582.

Outage blocking probability matlab simulation code

Answer»

age probability is a key performance measure, often CONSIDERED as even more CRITICAL than the BLOCKING probabilitythank you @chetan2222

21583.

Non uniform sampling is useful for what type of images

Answer»

orm sampling is a BRANCH of sampling theory INVOLVING results RELATED to the Nyquist–Shannon sampling theorem. Nonuniform sampling is based on Lagrange interpolation and the relationship between itself and the (uniform) sampling theorem. Nonuniform sampling is a GENERALISATION of the Whittaker–Shannon–Kotelnikov (WSK) sampling theorem.thank you

21584.

It is true that if the text entered in a cell does not fit, excel will display #### to indicate tha the text is too long

Answer»

.... if there are no.....

21585.

Netbeans8.2 how to run a c++ main file in the project

Answer»

/C++ PROGRAM on terminal USING gcc compilerOpen terminal.Type command to install gcc or g++ complier:Now go to that FOLDER where you will create C/C++ programs. ...Open a FILE using any editor.Add this code in the file: ...Save the file and exit.Compile the program using any of the FOLLOWING command: ...To run this program type this command:thank you @chetan2222

21586.

Write html code for a definition list

Answer»

ion and Usage. The

tag DEFINES a description list. ... Browser Support. Element. ... Differences Between HTML 4.01 and HTML5. In HTML 4.01, the
tag defines a definition list. ... Global ATTRIBUTES. The
tag also supports the Global Attributes in HTML. Event Attributes. RELATED Pages. Default CSS Settings.
21587.

Name the 2 documents located in a computer's network

Answer»

: New User RegistrationEnter all the relevant details carefully.A password will be sent from VIT to your registered mobile no. and email id.All the VITEEE communications will be sent to your registered email id and mobile no. Request for change of Mobile Number / e-mail Id / Correspondence address will not be entertained under any circumstances.Stage 2: Confirmation of passwordLogin to 'Registered users' with the email id and password received from VIT.Stage 3: Filling Online application formProvide all relevant details carefully, before submission.An application number will be generated after submission.Refer your application no. for all your future correspondence.Stage 4: Mode of paymentOnline mode through Netbanking / Credit / DEBIT CARD / Paytm. Application Cost Rs.1150/- for GENERAL Candidates.NRI and Candidates opting abroad Test centres should pay USD 50 through online mode using credit card.Stage 5: Photo & Signature UploadPhotograph Image : SIZE should be between 10 KB and 200 KB with the dimension of 3.5 CM X 4.5 CM.Signature Image : Size should be between 10 KB and 200 KB with the dimension of 3.5 CM X 1.5 CM.Selfie photo is not allowed.Stage 6: Payment transaction queriesAt the time of transaction, if the amount is debited please do not try new application. Please WAIT for 48 hrs and try for the payment once again in the same registered email id.If the amount is not debited, you can try the payment again.Important NoteOnline mode(Net banking / Debit card / Credit card / Paytm) - Do not send the hardcopy of the application form after the process of completion.NRI and Candidates opting abroad Test centres should pay USD 50 through online mode using credit card.Kindly provide the correct details on the application form.Do not send the hardcopy of the application form after the process of completion.Important DatesIssue of application form : 28th Oct 2018Last date to apply online : 28th Feb 2019Candidate can edit their online application contents up to 28th Feb 2019 ( except Email ID., Mobile no. and correspondence address details). Edit option will be made available only after completion of the application form.thank you .@chetan2222

21588.

Which statement is used to accept data from the user during the execution of program

Answer» CANF" can be USED to ACCEPT.
21589.

Write a html for 7 wonder of the world

Answer»

charset="utf-8">

Seven wonders of the world

Seven wonders of the world

Do you know the seven wonders of the world?

Wonders from Antiquity

This list comes to us from ancient times.

  • GREAT Pyramid of Giza
  • Hanging Gardens of Babylon
  • LIGHTHOUSE of Alexandria
  • Statue of Zeus at Olympia
  • Temple of Artemis at Ephesus
  • Mausoleum at Halicarnassus
  • Colossus of Rhodes

MODERN wonders of the world

This list was decided by vote.

  • Petra
  • Great Wall of China
  • Christ the REDEEMER
  • Machu PICCHU
  • Chichen Itza
  • Colosseum
  • Taj Mahal
21590.

If we clear jee mains and cannot clear advance then what will happen

Answer»

:― If we CLEAR JEE mains and cannot clear ADVANCE then what will happen.Thanks......HOPE it HELPS.....

21591.

Do this please asap...........do the marked ones

Answer»

sion OperatorsDescription. LIKE-column value is similar to specified character(s). IN-column value is equal to any ONE of a specified set of values. BETWEEN...AND-column value is between two values, including the end values specified in the range. IS NULL-column value does not exist.Table ConstraintsDescriptionSpecifies a constraint for a table that restricts the values that the table can store. INSERT, UPDATE, or DELETE statements that violate the constraint fail. c-treeACE SQL returns a Constraint violation error.Table constraints have syntax and behavior similar to column constraints. NOTE the following DIFFERENCES:The syntax for table constraints is separated from column definitions by commas.Table constraints must FOLLOW the definition of columns they refer to.Table constraint definitions can include more than one column and c-treeACE SQL evaluates the constraint based on the combination of values stored in all the columns.Syntaxtable_constraint ::PRIMARY KEY ( column [, ... ] )| UNIQUE ( column [, ... ] )| FOREIGN KEY ( column [, ... ] )REFERENCES [ owner_name. ] table_name [ ( column [, ... ] ) ]| CHECK ( search_condition )Column constraints are restrictions on the data that can be inserted into a givencolumn. The following table describes thecolumn constraints. ... Denotes that thecolumn is a primary key for the table. The primary keys can be used to join related tables in a multiple table query.

21592.

Java program to print the product of numbers from 1 to 10

Answer» TT is your QUESTION CORRECTLY ASK
21593.

Code to populate data of form using first textbox / dropdown data in C# ?

Answer»

m fark in a way of saying the following is your 7jhd this to my home in your COMPANY in this thread for me but if we do the work for a long as I know what the issue and then we will get a better way you are well as I know this to me that he WOULD you have a good day sir I was just about anything to a different than I have to get the money for me I was THINKING to be able this message in context a good one is it still has to go back and from there any of your life in your life of a new thread on it is possible that he is in a way that he would LOVE for me I was will have more questions you 76 this message in context unsubscribe here in a different story about your time today so we COULD meet up to the inbox by gmail address to the right person in my mind to do with the following the instructions to get to it as the first of your assignment submission of a sudden a lot to the point to you by tomorrow and Friday morning at this time around to do with my name on this forum members to a different and the rest are not an issue and

21594.

What is the defination operating system and value based data

Answer»

️☺️☺️☺️☺️ An OPERATING system (OS) is the PROGRAM that, after being INITIALLY loaded into the computer by a boot program, manages all the other PROGRAMS in a computer.☺️☺️☺️☺️☺️☺️☺️☺️A value is the representation of some ENTITY that can be manipulated by a program. The members of a type are the values of that type.☺️☺️☺️☺️☺️☺️☺️☺️Hope it helps:)

21595.

What is class? in ip subject

Answer»

me out very well in IP you learn basics of MySQL, HTML, and Java so just the very basics of FRONT end developing. This is a PRETTY basic COURSE doesn’t require much of studying and after this course you wouldn’t have much trouble in C course which is in the first year of engineering.

21596.

In which year sex-ratio was highest in India

Answer»

sex-ratio was HIGHEST in India.Hope it HELPS:)

21597.

What is cellspacing and cellpadding...no spam guys

Answer»

ding is the AMOUNT of space between the OUTER EDGES of the table cell and the CONTENT of the cell.Cellspacing is the amount of space in between the individual table cells.

21598.

What is c++ program. . . ..............

Answer» ES this is your ANSWER
21599.

What is DTD? what is its importance with xml

Answer»

pose of a DTD is to DEFINE the legal building blocks of an XML document. It DEFINES the document structure with a LIST of legal ELEMENTS. A DTD can be declared inline in your XML document, or as an external reference. <!ELEMENT to (#PCDATA)> <!ELEMENT from (#PCDATA)> <!ELEMENT heading (#PCDATA)> <!ELEMENT body (#PCDATA)>]>ToveJaniReminderDon't forget me this weekend!Mark it BRAINLIEST bro

21600.

How to write Java program description list

Answer»

class Hello{ /* Author: www.w3schools.in DATE: 2018-04-28 Description: Writes the words "Hello JAVA" on the screen */ public STATIC void main(String[] ARGS) { System.out.println("Hello Java"); }}