Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

21751.

Write 2 examples for each: •MODEM •TRANSMISSION •FIBER CABLE

Answer»

is a device which ALLOWS computer to tranmit data .examples are telephone or cable LINES....An example of the transmission of a virus is when a person spreads a cold virus by SNEEZING on someone else.An example of FIBER cable is most transatlantic TELECOMMUNICATIONS cablesbetween the U.S. and Europe are fiber optic.

21752.

Ms Ashu is a mathematics teacher. She is typing a Maths paper. She is referring to a window where some formulas for sum, relations and functions are already given. What is the name of this window ? in ms word

Answer» L should be it
21753.

I want advantages of black line follower?

Answer»

,ADVANTAGE :1) These types of robot movement are usually automatic.2)  The SYSTEM in the robot is like Once INSTALL and forget.3) It s relatively cheap.4) This type of robot are simple to build.5) They  can also be used for LONG distance.mark mark me as BRAINIEST

21754.

Write a short note on podcasting and what is its utility ?

Answer»

s are episodes of digital audio which a user can download in order to listen to. It is often available for subscription, so that new episodes are automatically downloaded via WEB syndication to the user's own local computer, mobile application, or portable media PLAYER. The files distributed are in audio format, but may sometimes include other file formats such as PDF or EPUB. Videos which are shared following a podcast model are sometimes called video podcasts or vodcasts. The utility -The initial purpose of podcasting focused on the task of delivery of content. However, as the technology gained momentum in the early 2000s, the uses of podcasting branched from simply the delivery of content to also creative and responsive purposes. The uses of podcasts VARIES depending on the speaker, the source through which the podcast is shared, and the INTENDED audience. Podcasts have been utilized across ACADEMIA, the news cycle, everyday life, and more. In recent years, as classrooms have adapted to the use of technology, podcasts have been introduced in the classroom setting from kindergarten to higher education.

21755.

What does that circled part mean in this program?wht is its significance?

Answer»

anguage is it

21756.

Information about 3D internet

Answer»

ternet is a SET of interconnected virtual worlds that users can visit to consume services, teleporting from one world to ANOTHER. 3D internet is a powerful combination of TWO forces. Those two forces are Internet and 3DGraphics. The 3D Internet is INHERENTLY INTERACTIVE and engaging

21757.

What is hardware device

Answer»

r hardware includes the physical, TANGIBLE parts or COMPONENTS of a computer, such as the cabinet, CENTRAL processing unit, MONITOR, keyboard, computer data storage, graphic card, sound card, speakers and motherboard. By contrast, software is INSTRUCTIONS that can be stored and run by hardware.

21758.

(11001001)2_( )8_( )16_( )10

Answer» 01)2 = (311)8(11001001)2 =(C9)16(11001001)2 =(201)10
21759.

Which of the given methods is sorting NOT possible?

Answer»

re the OPTIONS... ❓❓❓❓❓❓❓❓

21760.

How many alphabet keys in keyboard

Answer»

re 26 ALPHABETS

21761.

Please help its urgent pls Write the answers based on the following table: Table: Manger Deptno -Deptname-Name- city S101- Sales- Pranjal Sharma- Delhi HR404- HR- Preeti Arora- Chennai P204- Purchase- Sukhmeen Singh- Bangalore AD990- Admin- Sukanya Kumar- Mumbai (i) Write a SQL query to change city of AD990 to Pune (ii) Write a query to display all the records of the table in ascending order of Deptname. (iii)Add a new record with the following details: (‘S106’, ‘Sales’, “Kritika Tuteja”, “Delhi”).

Answer» TE QUESTION PROPERLY
21762.

Could I take anything in 11th and still take up animation, graphics and visual effects after +12

Answer»

ve TAKE sciens stream + computer science to further STUDY in its branch LIKE graphics.U

21763.

What do you understand by a form in information technology

Answer»

dy here is ur ANSWER !!★ INFORMATION TECHNOLOGY (IT)→ Information technology (IT) is the use of any computers, storage, networking and other PHYSICAL DEVICES, INFRASTRUCTURE and processes to create, process, store, secure and exchange all forms of electronic data.Hope u like !!→→→ BE-BRAINLY ←←←

21764.

What are the different options of horizontal alignment

Answer»

rd processing programs give you the capability to change the text alignment of a block of text. This setting determines how the text is displayed horizontally on the PAGE. The four primary types of text alignment include left ALIGNED, right aligned, centered, and justified. Left Aligned - This setting is often referred to as "left justified," but is technically CALLED "flush left." It is typically the default setting when you create a new document. Left aligned text begins each line along the left margin of the document. As you type, the first word that does not fit on a line is placed at the left margin on the next line. This results in a straight margin on the left and a "ragged edge" margin on the right. Right Aligned - This setting is also called "right justified," but is technically known as "flush right." It aligns the beginning of each line of text along the right margin of the document. As you type, the text expands to the left of the cursor. If you type more than one line, the next line will begin along the right margin. The result is a straight margin on the right and a "ragged edge" margin on the left. Right justification is commonly used to display the company name and address near the top of a business document. Centered - As the name implies, centered text is placed in the center of each line. As you type, the text expands equally to the left and right, leaving the same margin on both sides. When you start a new line, the cursor stays in the center, which is where the next line begins. Centered text is often used for document titles and may be appropriate for headers and footers as well. Justified - Justified text combines left and right aligned text. When a block of text is justified, each line fills the entire space from left to right, except for the paragraph indent and the last line of a paragraph. This is accomplished by adjusting the space between words and characters in each line so that the text fills 100% of the space. The result is a straight margin on each side of the page. Justified text is commonly used in newspapers and magazines and has become increasingly POPULAR on the Web as well. In most word processors, the text alignment options are typically located in the PROGRAM's primary toolbar. They are often displayed as a row of four icons, which include the left, centered, right, and justified alignment options. These options may also be available in the program's Format menu. You can either select the appropriate setting before you begin typing, or select a block text and choose the text alignment to apply the new setting. If you want to apply a new text alignment to an entire document, use the Edit → Select All command, then select the alignment you want to use

21765.

1. Tushar was studying about the network topology of his company. He asked one of his colleagues to guess the right topology on the following clues: 1. The topology used is point to point configured. 2. The topology provides fault isolation property. 3. If one link becomes unusable, then whole system is not incapacitated

Answer» NG to these CLUES it SEEMS to be STAR Topolgy
21766.

What is the importance of woman reservation bill

Answer»

en's Reservation Bill or The Constitution (108th Amendment) Bill, 2008, is a LAPSED bill in the Parliament of INDIA which proposed to amend the Constitution of India to reserve 33% of all SEATS in the Lower house of Parliament of India, the Lok Sabha, and in all state LEGISLATIVE assemblies for women. The seats were proposed to be reserved in rotation and would have been determined by draw of lots in such a way that a seat would be reserved only once in three consecutive general ELECTIONS.

21767.

Difference between parameter and argument.In not more than 5 lines

Answer» ER: a numerical or other measurable factor forming one of a set that defines a system or sets the condition of it operation.for example; pitch,tempo and volume are the THREE parameters by which a speaker is able to modify the meaning of the utterance.Argument:an EXCHANGE of diverging or opposite views which is typically a heated or angry one.U can shorten it as u want to..like 5lines..sorry.. I'm in a BIG mood to type much...thankzz
21768.

Locating 'info'on internet

Answer» KNOW if you WANT the ANSWER then you FOUND it
21769.

Floppy disks which are made from flexible plastic material are also called?

Answer» ES (MAGNETIC STORAGE MEDIUM, 3.5inch in SIZE)
21770.

Difference between enable and visible property in visual basic

Answer»

means that the property can be used, but is not visible in the graphical user interface. Enabled/Disable means that FORINSTANCE if the object is DISABLED, it's still visible but the user cannot INTERACT with it.

21771.

Which part of represents the service provider

Answer»

wo FUTURE of CALENDAR software and EMAIL MESSAGING software

21772.

Pls ans I have exam tomorrow

Answer» UESTION PLZ TELL the NUMBER
21773.

What are the ways to avoid overfitting issues in data science?  By adding a penalty for every data decreasing the complexity By testing the model with one-third of the training data itself By using the re-sampling techniques to estimate model accuracy All of the above

Answer»

E.....! here is your ANSWER...,,, What are the WAYS to avoid overfitting issues in data science?=>By using the re-sampling techniques to ESTIMATE model accuracyhopes help.

21774.

A key-value store does not support secondary indexes. False true

Answer» RY index a framework of data which has a subset of ATTRIBUTES from some "parent" table. This "parent" table in originality is known as base table because the secondary index table is constructed directly from it.Big advantage of the secondary index is that it is used in DIFFERENT separations and SORT keys than base table. It can also use only a part of the base table's columns.
21775.

Understanding computer applications class 9 solutions

Answer» BASIC program of computerExplanation:desktop SHOWING different WORKING apps like my computer documents media and ETC
21776.

. To remove bruise, wrinkles or birthmarks which of the following tool is best suited for in Camera Raw?

Answer» USE the TOOL BRUSH
21777.

Python program of following 4321 432 43 4

Answer» ELLO FRIENDS I HOPE it's your ANSWERS
21778.

Write any two precautions to avoid spam

Answer»

any TIMES while doing anything.Avoid WATCHING it or COMPLAIN about it orreport it or GIVE FEEDBACK.

21779.

What are the damagers associated with social networking?

Answer»

networking sites are seen as being very ‘cool’ by children and they may be pressured by their friends into joining them. The sites don’t actually present any threats that don’t already exist elsewhere online. The DANGER is that the threats exist in a new online environment you or your child may not be familiar with.As with most potential online dangers, the problems can START if your child doesn’t look after their personal information properly. The risks you need to be AWARE of are:cyberbullying (bullying using digital technology)invasion of privacyidentity theftyour child seeing offensive images and messagesthe presence of strangers who may be there to ‘groom’ other members

21780.

Name any two internet protocols

Answer» HTTP are UR ANSWER
21781.

Write names of any four wallpapers available in your computer

Answer»

y WAR, avanger s, isamen JUMP ETC.

21782.

Write a program in python using interactive mode to display your name

Answer»

Explanation: Explanation: print Your NAME is: + input ENTER the name it will TAKE input from the USER and print that input.

21783.

Write a program in c language to calculate the sum of two numbers

Answer»

e INT MAIN() {int a,b,SUM;scanf("%d%d", &a, &b);sum= a+b;printf("%d", sum);RETURN 0;}Please mark this ANSWER brainliest if satisfied

21784.

Write a menu driven c++ program for addition substraction multiplication division number is even or odd number is prime or noy

Answer»

are you ASKING

21785.

Write a function to read a matrix of size m*n from the keyboard

Answer»

अरमां आँसुओ में #बह_गएहम तो चपरासी लगने से भी #रह_गए

21786.

Write a program that uses input to prompt a user for their name and then welcomes them. Note that input will pop up a dialog box. Enter Sarah in the pop-up box when you are prompted so your output will match the desired output

Answer»

There are many answers choose itExplanation:2.2: Write a porgram that uses raw_inputto prompt a user for their name and then welcomes themname = raw_input("Enter your name: ")print "Hello",name2.3: Write a program to prompt the user for hours and rate per hour to compute GROSS payhours = raw_input('Enter Hours: ')rate = raw_input('Enter Rate: ')pay = FLOAT(hours) * float(rate)print pay 2.5: Write a program which prompts the user for a Celsius temperature, convert the temperature to FARENHEIT, and print out the CONVERTED temperature. tempC = raw_input('What tempterature is it outside? ')tempF = 9.0/5.0 * float(tempC) + 32print 'Oh, did you mean',tempF,'Fahrenheit?'3.1: Rewrite your pay computation to give the employee 1.5 TIMES the hourly rate for hours worked above 40 hours.hours = raw_input('Enter Hours: ')rate = raw_input('Enter Rate: ')hours = float(hours)rate = float (rate)if hours > 40:pay = (((hours - 40) * 1.5) * rate) + 40 * rate

21787.

Plz give me the conclusion for the project of MS.Accesss?

Answer»

ccess you create your table you have to design it by GOING in edit and view menu if you do more space in between columns and rows it becomes so BEAUTIFUL and if you MAKE it in power point it is so good and BECOME the best project of your class .Hope you enjoy this. Please follow me. Please marked as branlist.

21788.

Write a c++ program to compute area to triangle and circle by overloading the area () function

Answer»

e#include # DEFINE _PI_         3.14159265// AREA of trianglefloat area(int base, int height) {    return 0.5*base*height;}// area of circlefloat area(int radius) {  return _PI_*radius*radius}void main() {    float radius, base, height;    clrscr();   // CIRCLE   cout<<"ENTER radius of the circle";   cin>>radius;   cout<<"Area of Circle: "<>base;    cout<<"Enter height of the triangle";    cin>>height;      cout<<"Area of Triangle: "<

21789.

Which mobile phone is better please tell your opinion? 1) redmi 6 pro 2) realme U1Answer me guys please don't delete this because i want to purchase a new one and iam confused about this

Answer» PRO..............................
21790.

What is meant by QBasic statements?

Answer» MENT is a SET of INSTRUCTIONS written by USING KEYWORDS or commands of QBASIC.
21791.

APIC-EM builds topology pictures.Is it True?

Answer»

IC-EM builds TOPOLOGY PICTURES. It is not an SDN controller that replaces the CONTROL plane. It initially collects data about the whole network: interface statistics, WLANs, routers and internet PROTOCOLS and builds topology pictures which enable us to send CONFIGURATIONS to all our network connected devices and more.

21792.

In computer why was c, c++ ,python, java languages was created why it was used for what purpose it was used

Answer» BASICALLY used for MAKING programs.Making programs for apps ,GAMES,designing purposes ,etc.HOPE IT HELPS
21793.

Which of the features should be part of an iot sensor?

Answer»

the GENERAL and key characteristics identified during the research study are as follows:INTELLIGENCE. IoT comes with the combination of algorithms and COMPUTATION, SOFTWARE & hardware that makes it SMART. ...Connectivity. ...Dynamic Nature. ...Enormous scale. ...Sensing. ...Heterogeneity. ...Security.

21794.

Which stream analytics is associated with which big data stream?

Answer»

a streaming is a PROCESS in which big data is QUICKLY processed in order to extract real-time insights from it. The data on which PROCESSING is DONE is the data in motion. Big data streaming is ideally a speed-focused approach wherein a continuous STREAM of data is processed.

21795.

How abstraction and encapsulation are interrelated and implemented

Answer» E!Here's the answer!Abstraction and Encapsulation look similar to each other by its definition. The standard definition of abstraction is showing only necessary features to the user and hide its implementation. On the other hand, Encapsulation is hiding the complexity from the outer world. To UNDERSTAND Abstraction we will start from the basic meaning of Abstraction. Abstract means something, which is in thoughts but not it exists in REALITY. It is like that we KNOW that what should be done, but we don’t know how it would be done. Take an example, there is a ‘Shape’ class which CONTAINS a method ‘area()’ but we cannot implement area() method here as we do not know what will be the shape(a square, a rectangle, a triangle or any other shape) in future. In that case, we will declare area() in the Shape class and will implement the same method in our subclasses as per the requirement.
21796.

Which of the followingenshreres the privacy and confidentiality in elecrtonic messages?

Answer» MEANS taking any WORKS WITHOUT permissionand confidently means taking dessions correctly
21797.

What is multimedia? Discuss common multimedia file formats?

Answer»

dia is CONTENT that uses a combination of different content forms such as TEXT, audio, images, animations, video and interactive content. Multimedia contrasts with media that use only rudimentary COMPUTER displays such as text-only or traditional forms of printed or hand-produced material..aif - AIF audio file .CDA - CD audio track file .mid or .midi - MIDI audio file. .mp3 - MP3 audio file .mpa - MPEG-2 audio file .ogg - Ogg Vorbis audio file .wav - WAV file .wma - WMA audio file .wpl - Windows Media Player PLAYLIST

21798.

Which memory is first activated after turning on your computer?

Answer»

ivates......。。。。。。。

21799.

Which is the clode service ehere company owns infrastructure?

Answer»

nfrastructure as a service (IaaS) is a cloud computing OFFERING in which a VENDOR PROVIDES users access to computing resources such as servers, storage and networking. ORGANIZATIONS use their own PLATFORMS and applications within a service provider's infrastructure.

21800.

Which is the major demerit of symmetric operational algorithms?

Answer»

ic ENCRYPTION USE the same key for encryption and decryption. ... To do this SECURELY, he has to transmit the key out of bound, or ENCRYPT it with B's public key using asymmetric encryption. ... Symmetric cryptography uses the same key for encrypting the PLAINTEXT as decrypting the ...