InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 21851. |
Links defined outside the website is knowen webpage. |
|
Answer» link is a web page element that points out to a destination. BASED on the destination/target address of the hyperlink, they can be divided into two types•Internal HyperlinkInternal HYPERLINKS are the hyperlinks that point out to internal location or in other WORDS, the part of the same web page.•EXTERNAL HyperlinkExternal Hyperlinks are the ones which point out to an external website which may be any web page on the INTERNET |
|
| 21853. |
_________are used to check single option from a multiple options at a single time.(radio button) |
|
Answer» uttons are used to select a single option from a SET of available options. These are the most commonly used BUTTONS in the GUI (Graphical User Interfaces) of different available software programs as well as WEB applications. Radio buttons are GENERALLY preferred when we have to select only a single option from a list of given options and it’s compulsory to make a choice. |
|
| 21854. |
In selection lists s that which user can select single or multiple options from a given lists. The type of lists are a)scrolling lists. B)pull down pick up lists. C) Both A and B. D) None of the above |
| Answer» RECT ANSWER for this question is D) None of the above. The selection lists in which the user can select single or multiple options from a given lists is called a checklist. Checklists are used in FORMS,DOCUMENTS ,web pages and various computer applications. These are the most common type of selection lists used in the IT sector. A checklist is comprised from individual check boxes as a list item or in other words, a checklist is a list of check boxes with a label. | |
| 21855. |
which is the folowing is most commonly used HTTP methods? A)PRE and POST B)GET and SET. C)ASK and REPLY.D)GET and POST. |
|
Answer» rect answer to the given question is D) GET and POST. GET and POST are the most commonly used HTTP requests on internet. Because whenever we open a website, our browser actually sends a HTTP GET request behind the scenes to retrieve the page from the web server on which the website is hosted. Whereas, whenever we submit a form or upload a file on the website, our web browser actually sends a POST request to the server ALONG with the files that need to be ""POSTED"" to the server. Therefore, these two are the most commonly used HTTP methods. |
|
| 21856. |
CELLPADDING is the pixel space between the cell contents and the cell border. |
|
Answer» as two important properties namely CELLPADDING and cellspacing. PEOPLE usually GET confused between these two properties. Cellpadding is the interval among the cell and its content. It is usually given in the table tag specified in the form |
|
| 21857. |
Align does not defines the alignment of the attached image in contrast to the other contents of the webpage. |
|
Answer» nd contents of a WEBSITE can be aligned in four different ways left align, right align, centre align, and justify ALIGNMENT (aligned on both left and right SIDES). The ATTRIBUTE align is used inside the paragraph tag to align the texts. If it contains any images, it does not align it as mentioned, but it aligns all the texts. For example, XXXXXXXXXXXX YYYYYY ZZZZZZZZZZZ. To align the text with images, do use the same attribute but insert the image using the XXXXXX |
|
| 21858. |
Draw a flowchart to print table of five |
|
Answer» 2=105×3=155×4=205×5=255×6=305×7=355×8=405×9=455×10=50 |
|
| 21859. |
Write steps to create Student Annual Report using mail merge with spreadsheet? |
|
Answer» merge the mail with spreadsheet USING following steps, 1. Create a spreadsheet with Students Annual Report, which contains students name and their respective marks in each subject. 2. Save the spreadsheet with unique name. 3. OPEN the “Mailings” tab, click “Start Mail Merge” DROP down box and select “E-mail Message”. 4. Click the “Select Recipients”, and select the required recipient. We can select the existing list or create a new list. 5. Write the letter with required data. 6. Preview the letter for each recipient in “Preview Your Letter” box. 7. In “Finish & Merge” drop down box. We can print or edit the letter. |
|
| 21860. |
Write steps to Create Custom Margins What is Page Break? |
|
Answer» , there are predefined sets of margin settings out of which we can select as per your need. It automatically sets margin around each PAGE. We can even get EXTRA margin space for the purpose of document binding. If you need to create custom margins, following are the steps that have to be followed. 1. Select ""Layout > Margins"". 2. Select the required margin configuration from the list. 3. If we do not find the required configuration, select Custom Margins which helps to define our own margins. 4. A page break is an instruction to the printer GIVEN by the word processor to end the persent page and begin next page. 5. After inserting it into the document, a LONG line with the symbol of page break appears and the cursor automatically MOVES to the next page. |
|
| 21861. |
We can drag existing tab stops left or right along the ruler to a different position. |
|
Answer» can drag existing tab stops left or right using the ruler. The tab stops are tiny L shaped symbol appearing in the ruler. This tab stops indicates the position of cursor EVERY time we PRESS tab key. The small triangle shapes appearing in the ruler called tab indicators, indicates the position of tab. Using ruler, we cannot set the tab stops at exact position. We can set the tab stops at correct position using tab window, we can access tab window by following steps, 1. Double click the ruler. 2. Paragraph windows appear, on which we NEED to click the “Tab” button on the bottom of the window. 3. In the tab window, we can select default tab position, required tab position, and alignment of the text. |
|
| 21862. |
The main purpose of Spread sheet tool is to produce documents. |
| Answer» HEET is a tool used to store VARIOUS types of data in the format of table. A spreadsheet CONSISTS of columns and rows, and contains the data inserted into the cell. Data types can include financial data, customer data, and product data. We can also MAKE the business calculations with the formulas and WITHOUT using any accounting software. It reduces the calculation tasks that are done manually. | |
| 21863. |
If all reading and Writing operations get failed then bad () returns false value. State whether True or false |
|
Answer» wer is true but ALSO FALLS because it is called ADDICTIVE ANSWER . |
|
| 21864. |
Show the output of the following program // constructors and derived classes #include usingnamespacestd; class mother { public: mother () { cout |
| Answer» UNDERSTAND your QUESTION....?????? | |
| 21865. |
Write the process of conversion between objects and basic data types. |
|
Answer» cess of conversion between objects and basic data types is KNOWN as type casting or type conversion. There are mainly two types of types of type casting available in java programming language-•Implicit type casting/ Implicit type conversion This is the default type conversion which is automatically done by the java compiler. Whenever the programmer ASSIGNS a value of type that is COMPATIBLE and is within limit of the data type of the variable which it's being assigned to, then the compiler automatically CONVERTS that value implicitly. Example:int X=5;double y=x;//Now, here, the value of x (i.e. 5) will automatically be converted to double type(i.e. 5.0).•Explicit type casting/ Explicit type conversion The type conversion/casting that has to be done manually by the programmer by using the typecast/cast operator. Now, the syntax followed differs between conversion of objects and conversion of variable of basic data types.For basic data types, the syntax is: data_type1 var1=(data_type1) var2;where var1 is a variable of data_type1 but var2 isn't a variable of same type.For conversion between objects, the syntax is: class1 obj1= (class1) obj2;where obj1 is the object of class1 and obj2 is the object of some other class. |
|
| 21866. |
Explain the process of memory allocation using new operator. |
|
Answer» operator is used for the process of instantiation of objects in java. To say in layman's terms, instantiation simply allocates the memory to the object. And the process of memory allocation employed by the new operator is known as Dynamic Memory Allocation. Dynamic memory allocation allows the program to be more memory efficient as the memory location is allocated only when the new operator is used and as soon as the DATA object is unreferenced (or in other words, is of no use any LONGER), the memory is FREED for further allocation which is in contrary to its counterpart- Static Memory Allocation, in which the memory is allocated at the beginning and is kept reserved until the end of the program UNLESS the manually freed takes place. |
|
| 21867. |
What is the difference between Main screen and commands window? |
|
Answer» -Power Shell is ACTUALLY very DIFFERENT from the Command Prompt. It uses different commands, known as cmdlets in POWERSHELL. Many system administration tasks — from managing the registry to WMI (Windows Management Instrumentation) — are exposed via PowerShell cmdlets, while they aren't ACCESSIBLE from the Command Prompt.PLEASE MARK AS BRAINLIEST |
|
| 21868. |
Whenever you copy/move Video clip on the storyboard, any added .................. is also copied. Fill in the Blank. |
| Answer» R you copy VIDEO CLIP on the story BOARD any added video is also copied | |
| 21869. |
Write a declaration for Integer count that should be maintained in a register, initialize count to 0 |
|
Answer» g that the question has been asked in reference to C programming language, there are two important points to be CONSIDERED while using variables in a C PROGRAM. Before using any data member in a C program, it is important that the data member must be declared and defined.•To declare a data member, we have to write the declaration statement at the TOP of the source code after the header FILES,int count;•To define/ INITIALIZE a data member, we have to define it and initialize it with some value:int count=0;"" |
|
| 21870. |
Find out the errors in the following : int g (void) { printf(“lnside this book” C \n” ); int h (void) { printf(“lnside function h\n”);} } |
|
Answer» he given code is in C, there are going to be two major compile time errors in this code when it's SENT for compilation.1. The first one is the nested function. The function h() has been defined inside the function g(). This type of function declaration is called nesting of functions and functions like h() are called nested functions.2. The SECOND error is the unclosed double quotes inside the first PRINT statement outside function h which is a syntax error and WOULD be detected during the compilation. |
|
| 21871. |
Find the output of the following after correcting the program? include “stdio.h” include “string.h” main () { char str[80] = “I like c” strcpy (str, “hello”) printf(str) ; } |
|
Answer» rect FORM of the given code is as follows:#include |
|
| 21872. |
List the various functions that be used to perform the I/O of the string data? |
|
Answer» knowing about the functions used to perform I/O of string data, it is important to remember that string in C is implemented in the form of character ARRAY (or char array). The various functions that can be used to perform input/output of the string data are:•gets() : This function is used to input a string value. However this function is discontinued in C11. Since it doesn't consider the maximum capacity of the character array (i.e. string) and could lead to overflow errors during runtime. •scanf(): This function is also used for the same purpose. However, it inputs the string value only upto the occurrence of the first blank space(or only upto the first WORD).•fgets(): This function is highly SIMILAR to gets() function but it fixes the Overflow PROBLEM in the original function by taking the maximum LIMIT of the array as a parameter. |
|
| 21873. |
Give the declaration for a string called student, which holds up to 50 characters. Show two ways to initialize the string in the declaration. |
|
Answer» be declared in MANY WAYS some of the BEST and easy way is 1. Char student [] = “ abcd……. 50 char” .In this u can write how many characters you WANT to write. 2. Char student [50] = “ abcd……. 50 char” .In this, u can write up to 50 characters to write. |
|
| 21874. |
To reverse a string, we need two string handling functions like strcpy() & strcmp()?State Whether True or False |
|
Answer» FALSE. No need to use two string functions like strcpy() and STRCMP() . Actually, there is SEPARATE function for reversing a string which is strrev(). It is used to reverse the whole string. It is the in-built function available to reverse the string. This in-built function GIVES the output in reverse order.It can be DEFINED in string.h header file. We can also DEFINE a function separately and can be used instead strrev() in-built function. |
|
| 21875. |
When we open an MS excel program,we load a--------- |
| Answer» ANK you@chetan2222 | |
| 21876. |
C does not support the string data type however strings are handled as an array of? |
| Answer» AGE does not support the string TYPE but it can be used as char type of arrays but in some cases code MAY not run due to the size of the array and to make it run the full array should be adjusted. For indicating the termination of string NULL CHARACTER “\0” is used.But strings can be REPRESENTED as the array of CHARACTERS | |
| 21877. |
A string can only be initialized character wise using normal array initialization syntax? State Whether True or False |
| Answer» G can only be initialized CHARACTER wise using NORMAL array initialization syntax? STATE Whether is True | |
| 21878. |
Which of the following is correct, If we write strcmp(s1,32), returns a value? a) 0 when s1 > s2 d) all of these |
|
Answer» OPTION BGiven: strcmp (s1 ,32)Let us take s1 as string 1 and 32 as string 2. The ASCII value of first character each string should be COMPARED. ASCII value of s: 19 ASCII value of 3: 51. Hence, the string 2 ASCII value is higher than the first character of string 1 ASCII value. strcmp RETURNS the value less than ZERO since s1 < S2. |
|
| 21879. |
Which command contents of current directory of a disk |
| Answer» R DICTIONARY | |
| 21880. |
What is the name of a box that appears on computer screen asking the user to choose what they want the software to do? |
|
Answer» £££££££££££££££££££££££¢ |
|
| 21881. |
What is stealth technology |
|
Answer» technology also termed low observable technology (LO technology) is a sub-discipline of military tactics and passive and also active ELECTRONIC countermeasures, which COVER a range of techniques USED with personnel, aircraft, ships, submarines, missiles, satellites and ground vehicles to make them LESS visible .. |
|
| 21883. |
What is the most common transfer protocol used on the internet? |
| Answer» LE TRANSFER PROTOCOLS | |
| 21884. |
Hey mates explain loop statement ...will mark as brainliest....plz.....and will follow you |
|
Answer» uter programming, a loop is a sequence of instruction s that is continually repeated until a certain condition is reached. Typically, a certain process is done, such as getting an item of DATA and changing it, and then some condition is checked such as WHETHER a COUNTER has reached a prescribed number.hope this HELP youbrotherthanks ✌️ ✌️ |
|
| 21885. |
Difference between dbms and rdbms |
|
Answer» ference between DBMS and RDBMS: The key DIFFERENCE is that RDBMS (relational database management system) applications store data in a tabular form, while DBMS applications store data as files. ... In a RDBMS, the tables will have an identifier CALLED primary key. Data VALUES will be STORED in the form of tables. |
|
| 21886. |
What are the effects of online shopping |
|
Answer» of online shopping .I think in online shopping we may get badly in that we think it is a NICE ONE but after delivery we may think it is DIFFERENT when we SAW in mobile it looks nice after delivery we can see change in colour |
|
| 21887. |
State the importance of ethics and safety measures in computing. |
| Answer» ANDING IMPORTANCE of COMPUTER Ethics and Software Piracy Protection. Computer ethics are increasingly becoming important because of the RISING number of cyber crime issues, including software piracy, UNAUTHORIZED access, pornography, spamming, target marketing, and hacking. | |
| 21888. |
Write down four things that a website would be used for |
|
Answer» ng information about one's business. Can be used for ONLINE SHOPPING. Can be used for BOOKING TRAIN and plane and ALSO movie tickets. Can be used for ordering food online. |
|
| 21889. |
Can anybody explain me these two programs?975319753975975979 |
| Answer» E! Here the loop of i iterates to control the number of characters to be PRINTED in each LINE, i.e., first line contains 5 characters, second line contains 4 characters,etc.And the J loop controls the characters that are printed, i. e, 9 7 5 3 1....etc.Thus on running this program the above PATTERN is created.I hope it helps you.... | |
| 21890. |
What function must all c programs have |
|
Answer» navigationPROGRAMMINGCTHE IMPORTANCE OF THE MAIN() FUNCTION IN C PROGRAMMINGTHE IMPORTANCE OF THE MAIN() FUNCTION IN C PROGRAMMINGRELATED BOOKC All-in-One Desk Reference For DummiesBy DAN GookinAll C language programs must have a main()function. It’s the core of every program. It’s required. The main() function doesn’t really have to do anything other than be PRESENT inside your C source code. Eventually, it contains instructions that tell the computer to carry out WHATEVER task your program is DESIGNED to do. But it’s not officially required to do anything.THE BASIC MAIN() FUNCTIONWhen the operating system runs a program in C, it passes control of the computer over to that program. This is like the captain of a huge ocean liner handing you the wheel. Aside from any fears that may induce, the key point is that the operating system needs to know where inside your program the control needs to be passed. In the case of a C language program, it’s the main() function that the operating system is looking for.At a minimum, the main() function looks like |
|
| 21891. |
What are the two types of the same program in microprocessor? |
| Answer» F Microprocessor. Microprocessors are classified into five TYPES, namely: CISC-Complex Instruction SET Microprocessors, RISC-Reduced Instruction Set Microprocessor, ASIC- Application Specific Integrated CIRCUIT, Superscalar Processors, DSP's-Digital Signal Microprocessors. Types Of Microprocessors. | |
| 21892. |
What are the steps of troubleshooting wireless keyboard and mouse? |
|
Answer» it may help u .While your keyboard and mouse aren’t the main stars in the daily performance your system provides, they are strong supporting actors and your system just wouldn’t work the same without them.True, they’re easy to obtain and replace, but why spend more money when you don’t have to? An ounce of prevention is worth a pound of cure, so take some simple steps to keep your mouse and keyboard in working condition.How to Keep the Keyboard and Mouse Working:When the System Goes DownAfter power outages or unexpected shutdowns your USB Root hubs may glitch, or even stop working. To get them back up and running follow these steps:Go to the start menu at the bottom of your computerFind device managerClick on Universal Serial Bus Controllers and find USB Root hubsRight click and uninstall the deviceReinstall the deviceWhen All Else FailsIf your mouse or keyboard are not working and there have been no unexpected shutdowns, try these few things before replacing it:Make sure it is still plugged in. SOMETIMES in the craziness of our day, CORDS become unplugged accidentally and it goes unnoticed until it no longer works.For wireless devices, are the batteries still good? It’s easy to forget these things don’t LAST forever, so before replacing your mouse try changing the batteries.Keep it clean- Food and drinks tend to be pretty messy; we get crumbs or drops of sticky liquids on our equipment, and small amounts every once in a while can lead to a big mess. This sticky stuff can cause your keys to lock up and stop working. Make sure to WIPE down your mouse and keyboard every now and then. Keep a canister of compressed AIR on hand to blow dust and crumbs from your equipment as well. |
|
| 21893. |
इंटरनेट का जनक कौन हैं? |
|
Answer» '''''''''''''''':'''''''''':' |
|
| 21894. |
What are the different ways to remove duplicate records in informatica? |
|
Answer» te records are occasionally found in source DATA. Due to primary key constraints on a target database, only one version of a duplicate source record should be loaded into the target. The following methods demonstrate some of the most efficient ways to deal with duplicate source data. Limits in choice of OUTPUT row. Duplicates are SILENTLY removed and therefore no auditing. No modifications needed for Source Qualifier. This is most useful if the source is not relational. Set Number of Ranks to 1 and Top/Bottom property.3. Sorter TransformationSend all the data to a sorter and sort by all fields that you want to remove dup. In the properties’ tab, select Unique. This will select and send FORWARD only Unique Data.4. qualifierAt Source qualifier, you can enable ‘Select Distinct’ Option. Or, you can also write your own query in SQL so only distinct rows would be selected. However it wosources, |
|
| 21895. |
8086 prefetches only when at least ------------ bytes are free in queue. A) 4 b) 3 c) 2 d) 1 |
| Answer» UR ANSWER PLEASE MARK me BRAINLIEST | |
| 21896. |
Write the steps to create Paper Folding Projects in Publisher? |
| Answer» | |
| 21897. |
Brochures are promotional documents, primarily never used to introduce a company, organization. |
|
Answer» __]▄▀▄▀▄▀ıllıllıllıllıllıllı[ Your Answer ]ıllıllıllıllıllıllıBrochures are promotional DOCUMENTS, primarily USED to introduce a company, organization, PRODUCTS or services and inform prospective customers or members of the PUBLIC of the benefits.╚» ▁ ▂ ▄ ▅ ▆ ▇ █ [ Hᴏᴘᴇ Help You Dear ] █ ▇ ▆ ▅ ▄ ▂ ▁ |
|
| 21898. |
In publisher, what is a list of things? a) Banner b) Catalogue c) Label d) News |
| Answer» E CATALOGUE is your ANSWER | |
| 21900. |
Linux Provider a special interpreter program which can be used to execute commands of the operating system. Name of Program is …… |
| Answer» WER is COMMAND INTERPRETER | |