InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 21601. |
In boards do they accept both scanner class and input reader,buffered reader. |
| Answer» SCANNER because it is the LATEST ONE to be used in the PROGRAM for Java. | |
| 21602. |
Computer Applications icse class 10 what are important topics |
| Answer» UTPUT TRACING NESTED ELSE iffunctions... | |
| 21603. |
What is 127.0.0.1 ping of desktop server that hackers use tell me whatever you know |
|
Answer» .1 is the loopback Internet protocol (IP) address also referred to as the “localhost.” The address is used to ESTABLISH an IP CONNECTION to the same machine or computer being used by the end-user. The same convention is defined for computer’s that support IPv6 addressing using the connotation of ::1. Establishing a connection using the address 127.0.0.1 is the most common practice; however, using any IP address in the range of 127.*.*.* will function in the same or similar manner. The loopback construct gives a computer or device capable of networking the capability to validate or establish the IP STACK on the machine.How is 127.0.0.1 Used in the Hosts File?Whenever a computer user tries to access a website or remote computer by name, the computer checks the locally stored Hosts file for domain name resolution before sending a request to the Domain Name Server (DNS). The 127.0.0.1 IP address is commonly found in the Hosts file on computers ASSIGNED to the plain English address, “localhost.” It is also used by computer malware to assign legitimate websites to the localhost to prevent the end-user from seeking legitimate computer security assistance with malware infection. This type of change has most commonly been associated with many of the computer scareware packages that have been deployed across the Internet through maliciously infected websites, Trojan horse viruses, and infected email attachments. Some computer administrators, and interested students, can modify the hosts file to prevent access to UNDESIRABLE websites; however, is not the preferred method as the end-user (or administrator) now becomes responsible for removing the entry when required. Examples of host file entries: For More Information:: Visit On www.tech-faq.com/127.0.0.1 |
|
| 21605. |
Find out errors if any while(ctr! = 10);{ctr=1;sum= sum+a;ctr= ctr+1;} |
| Answer» | |
| 21606. |
(a+b)>(c-d)computer applications please answer my question |
| Answer» | |
| 21608. |
How can we delete a key-value pair from a dictionary in Python, without using in-built functions? |
|
Answer» here and I'm in a CONTEST to ANSWER Q's SORRY I don't KNOW the answer! |
|
| 21609. |
Where footer located |
|
Answer» able to understand your QUESTION PLEASE make me understand your question to get your ANSWER |
|
| 21610. |
What are security concerns of information it's urgent |
|
Answer» the protection of programs and data in computers and communication systems against UNAUTHORIZED access, modification, DESTRUCTION, DISCLOSURE or transfer whether accidental or intentional by BUILDING physical arrangements and software checks. |
|
| 21611. |
Name any 3 tools available on the alignment of the format cells dialogue box. |
| Answer» | |
| 21612. |
What is the default alignment for text and numbers entered in an Excel worksheet |
|
Answer» ignment is DEFAULT |
|
| 21613. |
Write a program sum of natural number series by using looping statement |
|
Answer» splay(int N){int i,s=0;for(i=1;i<=n;i++){s=s+i;}System.out.println("SUM:"+s);}Hope it helps |
|
| 21614. |
I want to learn accounting. Please help me?? |
|
Answer» and the difference between BOOKKEEPING and ACCOUNTING.Become familiar with creating SPREADSHEETS. Read books on accounting. TAKE an accounting course Understand dual-entry bookkeeping.these 5 POINTS will help you |
|
| 21615. |
Which prevents invalid in network |
|
Answer» traffic INCLUDES any clicks or IMPRESSIONS that may artificially inflate an advertiser's costs or a PUBLISHER's earnings. Invalid traffic COVERS intentionally fraudulent traffic as WELL as accidental clicks. |
|
| 21616. |
What do you mean by platform independent and portable in java |
|
Answer» compile your Java code then .class file is generated by JAVAC compiler these CODES are readable by JVM and every operating system have its own JVM so JVM is platform dependent but due to JVM java LANGUAGE is BECOME platform independent._____________________________________________________It means that you can run Java bytecode on any hardware that has a compliant JVM. It doesn't mean that ME is the same as SE is the same as EE. EE has EJBs, but SE and ME don't. |
|
| 21617. |
What are the anomalies due to interleave execution? |
|
Answer» ll the TRANSACTION can't HAPPEN in sequential order so the transaction are interleaved means second transaction is started before the first one could end .and excution can SWITCH between the transaction back and fourth. it can ALSO switch between multiple transaction |
|
| 21618. |
What are common register length in modern co.Puter system? |
|
Answer» ter MUST be LARGE enough to hold an instruction, for example ,in a 64 BIT COMPUTER a REGISTER must be 64 bit in length in some computer design ,there are smaller register,for example half register for shorter Instruction. |
|
| 21619. |
Write the features of inheritance in java |
|
Answer» ance in Java - In practice, inheritance and polymorphism are used together in java to achieve fast PERFORMANCE and readability of code. Below are the DIFFERENT types of inheritance which is SUPPORTED by Java. Single Inheritance : In single inheritance, subclasses INHERIT the features of one superclass.hope it will HELP you. |
|
| 21620. |
What is flowchart? Explain the different symbol used in a flowchart |
|
Answer» rt is a diagram that represents ALGORITHM,WORKFLOW or process . the flowchart has SHAPES LIKE oval,square, rectangle etc. |
|
| 21621. |
To write a program of dictionary using hashing in ads |
|
Answer» am not GETTING it |
|
| 21622. |
Time complexity of merging two unsorted list of size m+n is |
| Answer» UST WONDERING what is the time complexty of merging two sorted arrays of SIZE n and m, given that n is ALWAYS greater than m.I was thinking of using merge sort, which I assume in this case will consume O(log n+m).I am not really good with big-oh and stuff. Please SUGGEST me the time complexity for this problem and let me know if there is an even optimized way of solving the problem.Thanks in advance@chetan2222 | |
| 21623. |
Indicate extent of himalyas it's urgent |
|
Answer» n Himalayan RANGES run from Indus river valley in the west to the Brahmaputra river valley in east forming a 2,400 km long arc.The width of this arc is AROUND 400 kilometer in Western Kashmir while 150 kilometers in Arunachal Pradesh-Tibet region. |
|
| 21624. |
Writem a program to find special 3 digit number |
|
Answer» gram computes all Armstrong numbers in the RANGE of ! 0 and 999. An Armstrong number is a number such that the sum ! of its digits raised to the third power is EQUAL to the number ! itself. For example, 371 is an Armstrong number, since ! 3**3 + 7**3 + 1**3 = 371. ! --------------------------------------------------------------- PROGRAM ArmstrongNumber IMPLICIT NONE INTEGER :: a, b, c ! the three digits INTEGER :: abc, a3b3c3 ! the number and its cubic sum INTEGER :: Count ! a counter Count = 0 DO a = 0, 9 ! for the left most digit DO b = 0, 9 ! for the middle digit DO c = 0, 9 ! for the right most digit abc = a*100 + b*10 + c ! the number a3b3c3 = a**3 + b**3 + c**3 ! the sum of cubes IF (abc == a3b3c3) THEN ! if they are equal Count = Count + 1 ! count and display it WRITE(*,*) 'Armstrong number ', Count, ': ', abc END IF END DO END DO END DO END PROGRAM ArmstrongNumber |
|
| 21625. |
List 5 ancient and modern mean of information transmission |
|
Answer» 1. ORAL 2. BEATEN drums3. town crier4. whistlingmodern1. print out copies2. telephone3. RADIO4. television |
|
| 21626. |
What prevent invalid data into database |
|
Answer» ATE HERE'S YOUR ANSWER>>ProblemWe receive data from thousands of sources, some of which provide direct access and some of which manually enter their data into their system or our system. We run a multi-server and database ETL flow that obtains the original data, transforms the data to meaningful information, and finally presents the data to clients. Our clients have identified errors in our data (the presentation layer of our data), causing them to question other data we present to them. We’ve been able to identify that many of these errors COME from sources that tend to use manual entry in their data flows, but we want to PREVENT these errors from ever making it into the presentation layer where our clients see the data.SolutionWe want to catch POSSIBLE invalid data points as early as possible in our ETL flow, as clients will start to doubt our data if they see errors in the final data. If our data flow has 3 nodes, where the first node is the import node, the second node is the transformation node, and the third node is the presentation node, we MAY not identify some errors until the final node. However, it’s possible that we can catch these errors earlier in our ETL flow.In this tip, we’ll look at some of the considerations for both data rules and logic to HANDLE these rules.HOPE IT HELPS LLZ MRK AS BRAINLIST |
|
| 21627. |
The memory address of first element in array is called |
| Answer» ORY address of the first element of an array is CALLED first address or foundation address. Because the mathematical concept of a matrix can be REPRESENTED as a two-dimensional grid, two-dimensionalarrays are ALSO sometimes calledmatrices.hope it helps you .thank you.@chetan2222 | |
| 21628. |
Can some one send prepared html project class 10 with source code and output |
| Answer» ECK it out in GOOGLE YAR....... | |
| 21629. |
What is the difference between class variable or instance variable in cimp. |
|
Answer» Class) VARIABLES and instance variables both are member variables because they are both ASSOCIATED with a specific class, but the DIFFERENCE between them is Class variables only have one copy that is shared by all the different OBJECTS of a class, WHEREAS every object has it's own personal copy of an instance ... . |
|
| 21630. |
Please anyone help in these question |
|
Answer» al Basic loop structures allow you to run one or more lines of code REPETITIVELY. You can repeat the statements in a loop structure until a condition is True , until a condition is False , a specified number of times, or once for each element in a collection.2).A control structure is a block of programming that analyzes variables and chooses a direction in which to go based on given parameters. ... Hence it is the basic decision-making process in computing; flow control determines how a computer will respond when given certain conditions and parameters3).A for loop enables a PARTICULAR set of conditions to be executed repeatedly until a condition is satisfied. Imagine a situation where you would have to print numbers from 1 to 100. What would you do? Will you type in the printf command a hundred times or try to COPY paste it? This simple task would take an eternity. USING a 'for loop' you can perform this action in 3 statements. This is the most basic example of the for loop. It can also be used in many advanced scenarios depending on the problem statement.4).Major difference between for and whileloop is at pragmatic level because under the hood, both loops are all the same conditional goto; therefore the choice between while and for is arbitrary, based on which seems clearer. Both for and whileloops are entry controlled loops that means test condition is checked for truth while entering into the loop's body.The for is usually appropriate for loops in which the initialization and INCREMENT are single statements and logically related, since it is more compact than while and it keeps the loop control statements together in one place. |
|
| 21632. |
Reducibility define in data structure and algorithm |
|
Answer» ility means The POSSIBILITY to CONVERT A(PROBLEM) to B(Problem)NP Hard or NP Completein easy wordsHope it helps.☺️ |
|
| 21633. |
Reasons causr for originating bad data in state estimation |
|
Answer» te estimation problem in electric power SYSTEMS consists of four basic operations: hypothesize structure; estimate; detect; IDENTIFY. This paper addresses the LAST two problems with respect to the BAD data and structural error problem. The paper interrelates various detection and identification methods (sum of squared residuals, WEIGHTED and normalized residuals, nonquadratic criteria) and presents new results on bad data analysis (probability of detection, effect of bad data). The theoretical results are illustrated by means of a 25 bus network.hope it will help you |
|
| 21634. |
Which button allows you to preview or debug your docoment in a browser? |
|
Answer» ere⛤_____________________________________________It is really EASY 1. Right click, then tap inspector or inspectThen click on DEBUG menu2. Ctrl+Shift+I (Works in chrome)HOPE It Helps.☺️ |
|
| 21636. |
What are the steps to add footer to the document |
|
Answer» Word2. TAP INSERT 3. SELECT Footer4. Select TYPE of Footer5. Type text6. Tap Close |
|
| 21637. |
Method development of stability testing |
| Answer» POSE of stability testing is to provide EVIDENCE on how the quality of an active pharmaceutical ingredient or MEDICINAL product VARIES with time under the influence of a variety of environmental factors such as temperature, HUMIDITY, and light, and to establish a re-test period for the active pharmaceutical ... | |
| 21638. |
A computer is available for rs. 39000 cash or rs. 17000 as cash down payment followed by five monthly installments of rs. 4800 each. What is the rate of interest per annum under the installment plant? |
|
Answer» computer is available for rs. 39000 cash or rs. 17000 as cash down payment followed by five monthly INSTALMENTS of rs. 4800 each.To find:What is the rate of interest per annum under the INSTALMENT plant?Solution:The cost of the computer = Rs. 39000 The amount available as a down payment = Rs. 17000 ∴ The balance amount = Rs. 39000 - Rs. 17000 = Rs. 22000Let "R%" represent the rate of interest p.a. We know the formula of S.I. is as follows:∴ Amount on the balance amount of Rs. 22000 for 5 months will be,= = = = ....... (i) According to the question, the customer pays 5 monthly instalments of Rs. 4800 each to the shopkeeper, so, we get,The total amount of instalments after 5 months will be,= [Amount after 1st month] + [Amount after 2nd month] + [Amount after 3rd month] + [Amount after 4th month] + [Amount after 5th month] ..... (ii) Now, from (i) & (ii), we get ≈ Thus, the rate of interest per annum under the instalment plan is 38.71%.--------------------------------------------------------------------------- ----Also View: What ANNUAL instalment will DISCHARGE on the debt of Rs 3,680 due in 4 YEARS at 10% simple interest? brainly.in/question/17937878 What annual instalment will discharge a debt of 1092 due in 3 years at 12% simple interest? brainly.in/question/13531428 |
|
| 21639. |
Write a bluej program to generate the following patten 54321 5432 543 54 5 |
|
Answer» E! HER IS YOUR ANSWER-1)RIGHT CLICK AT PROGRAM FILE.2)LEFT CLICK ON THE VOID MAIN.3)LEFT CLICK ON "OK" AMD THEN RUN THE PROGRAM YOU WANT. |
|
| 21641. |
Cloud-computing providers offer their services as ______________ PaaS XaaS SaaS IaaS IaaS,Paas,Saas EaaS |
| Answer» WER is IAAS of CLOUD COMPUTING | |
| 21642. |
If a program does not stop from looping what will you do |
| Answer» USES an INFINITE loopwhile (true) { // CODE}Exit the console to stop LOOPING | |
| 21643. |
i installed one software on my computer, an extra software also got installed automatically. Now i want to remove the extra software. how can i remove the software |
|
Answer» ll both the SOFTWARES and RETRY INSTALLING the SOFTWARE |
|
| 21644. |
Hw can we represent the file system hierarchy in linux |
|
Answer» E!WE CAN PRINT,COPY AND PASTE.THEN WE CAN EASILY REPRESENT THE FILE SYSTEM HIERARCHY IN LINUX .PLEASE MARK MY ANSWER AS A BRAINLIEST ANSWER.THANK YOU. |
|
| 21645. |
How to permanently delete a software permanently from pc? |
|
Answer» e !!!!FIRSTLY DELETE it ... TEN REMOVE it from recycle BIN also ... |
|
| 21646. |
How to find order and type of closed loop control system? |
|
Answer» Open-loop system, also referred to as non-feedback system, is a type of continuous control system in which the output has no INFLUENCE or EFFECT on the control action of the INPUT SIGNAL. In other words, in an open-loop control system the output is neither measured nor “fed back” for comparison with the input. |
|
| 21647. |
How shating of service to other devices in networking? |
|
Answer» xjbhfhhsuhdjevrjeid |
|
| 21648. |
What is the full form of Html ? |
|
Answer» ═══════════════╕☬ YOUR ANSWER ☬╘═════════════════════╛Full FORM of HTML:-Hyper text MARKUP language ╒══════════════════════╕☬ THANKS! @Brainlyconquerer ☬╘══════════════════════╛ |
|
| 21649. |
A java program to create a breakfast menu card .including any five food items with two beverages |
|
Answer» java.util.Scanner;public class MENU { public double subTotal; public static double runningTotal; private static double itemPrice; static boolean ordering = true; static Scanner input = new Scanner(System.in); public static void menu() { System.out.println("Welcome \n1. Burger ($2.00) \n2. FRIES ($1.50)\n3. Soda ($1.00) \n4. Done"); } public static double itemPrice(int foodItem) { if (foodItem == 1) { // burger= $2.00 System.out.println("You've ordered a burger"); itemPrice = 2.00; } if (foodItem == 2) { // fries = $1.50 System.out.println("You've ordered fries"); itemPrice = 1.50; } if (foodItem == 3) { // soda = $1.00 System.out.println("You've ordered a soda"); itemPrice = 1.00; } quantity(); return itemPrice; } public static double quantity() { System.out.println("Enter quantity"); double quantity = input.nextDouble(); subTotal(quantity, itemPrice); return quantity; } public static double subTotal(double quantity, double itemPrice) { double subTotal = quantity * itemPrice; System.out.println("Subtotal: " + subTotal); return subTotal; } public static void done(double runningTotal) { ordering = false; System.out.println(runningTotal); System.out.println("Enjoy your meal"); } public static void main(String[] args) { int menuOption; int foodItem = 0; input = new Scanner(System.in); do { double runningTotal = 0; menu(); menuOption = input.nextInt(); SWITCH (menuOption) { case 1: foodItem = 1; itemPrice(foodItem); break; case 2: foodItem = 2; itemPrice(foodItem); break; case 3: foodItem = 3; itemPrice(foodItem); break; case 4: done(runningTotal); break; default: System.out.println("Invalid option."); } } while (ordering); { subTotal(quantity(), itemPrice(foodItem)); runningTotal = runningTotal + subTotal(quantity(), itemPrice(foodItem)); } }} |
|