Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

21951.

Five famous it personalities who contributed in the computers

Answer»

Babbage (1814 – 1827) Alan Turing (1912 – 1954) PHILIP Don Estridge (1937 – 1985) TIM Berners-Lee (1955 – ) Bill GATES (1955 – )

21952.

List out and explain various operational and non operatiinal quality attributes of embedded system

Answer»

erational attributes of EMBEDDED SYSTEMTHE way an embedded system operates affects its OVERALL quality. These are attributes not related to operation or FUNCTIONING of anembedded system. The way an embedded system operates affects its overall quality. These are the attributes that are associated with the embedded system before it can be put in operation.●operational attributes of embedded systemThe way an embedded systemoperates affects its overall quality. These are the attributes that are associated with the embedded systembefore it can be put in operation. Response is a measure of QUICKNESS of the system. ... Mean time to repair can be defined as the average time thesystem has spent in repairs

21953.

Microsoft presentation is a type of spreadsheet software. True or false

Answer»

It's a PRESENTATION SOFTWARE.

21954.

Internet is part of World Wide Web. true or false

Answer»

,              The ANSWER to your question is true.. When you type links in google or any other WEBSITES.. you USE 'https://'  which is the result when you type www.******.com . The full FORM of 'www' used here is World Wide Web..

is used under table tagThe tr TAG has 2 parameter'sThey are table heading and table data tagAll these tags and parameter's mentioned above are container elementsI HOPE this answer helped youPlease MARK me as BRAINLIEST if it helped
21955.

Write a short note on inserting a row

Answer»

rt a row in a html document a PARAMETER

21956.

In an sql query "select from wheregroup by having " having is executed before where

Answer»

Where and Having DIFFER?When working with more ADVANCED SQL it can be unclear when it makes sense to use a WHERE versus a HAVING clause.Though it appears that both clauses do the same thing, they do it in different ways. In fact, their functions complement each other.A WHERE clause is used is filter records from a result. The filter occurs before any groupings are made.A HAVING clause is used to filter values from a group.Before we go any further let’s review the format of an SQL Statement. It isSELECTFROMWHEREGROUP BYHAVINGTo help keep things straight I like to think of the order of execution of SQL statements as from top to bottom. That means the WHERE clause is first applied to the result and then, the remaining rows summarized according to the GROUP BY.WHERE clauseThe WHERE clause is used to filer rows from a results. For instanceSELECT COUNT(SalesOrderID)FROM Sales.SalesOrderDetailReturns 121,317 as the count, whereas, the querySELECT COUNT(SalesOrderID)FROM Sales.SalesOrderDetailWHERE UnitPrice > 200Returns 48,159 as the count. This is because the WHERE clause filters out the 73,158 SalesOrderDetails whose UnitPrice is less than or equal to 200 from the results.HAVING ClauseThe HAVING clause is used to filter values in a GROUP BY. You can use them to filter out groups such asSELECT SalesOrderID, SUM(UnitPrice * OrderQty) AS TotalPriceFROM Sales.SalesOrderDetailGROUP BY SalesOrderIDHAVING SalesOrderID > 50000But their true power lies in their ability to compare and filter based on aggregate function results. For instance, you can select all orders totaling more than $10,000SELECT SalesOrderID, SUM(UnitPrice * OrderQty) AS TotalPriceFROM Sales.SalesOrderDetailGROUP BY SalesOrderIDHAVING SUM(UnitPrice * OrderQty) > 10000Since the WHERE clause’s visibility is one row at a time, there isn’t a way for it to evaluate the SUM across all SalesOrderID’s. The HAVING clause is evaluated after the grouping is created.Combining the two: WHERE and HAVINGWhen SQL statements have both a WHERE clause and HAVING clause, keep in mind the WHERE clause is applied first, then the results grouped, and finally the groups filtered according to the HAVING clause.In many CASES you can place the WHERE condition in the HAVING clause, such asSELECT SalesOrderID, SUM(UnitPrice * OrderQty) AS TotalPriceFROM Sales.SalesOrderDetailGROUP BY SalesOrderIDHAVING SUM(UnitPrice * OrderQty) > 10000 AND SalesOrderID > 50000VersusSELECT SalesOrderID, SUM(UnitPrice * OrderQty) AS TotalPriceFROM Sales.SalesOrderDetailWHERE SalesOrderID > 50000GROUP BY SalesOrderIDHAVING SUM(UnitPrice * OrderQty) > 10000If you can put condition from the where clause in the having clause then why even worry about the WHERE? Can I just use this query?SELECT SalesOrderID, SUM(UnitPrice * OrderQty) AS TotalPriceFROM Sales.SalesOrderDetailGROUP BY SalesOrderIDHAVING SUM(UnitPrice * OrderQty) > 10000 AND LineTotal > 10Actually that query generates an error. The column LineTotal is not part of the group by field list nor the result of an aggregate total.To be valid the having clause can only compare results of aggregated functions or column part of the group by.To be valid the query has to be rewritten asSELECT SalesOrderID, SUM(UnitPrice * OrderQty) AS TotalPriceFROM Sales.SalesOrderDetailWHERE LineTotal > 100GROUP BY SalesOrderIDHAVING SUM(UnitPrice * OrderQty) > 10000To summarize the difference between WHERE and HAVING:WHERE is used to filter records before any groupings take place.HAVING is used to filter values after they have been groups. Only columns or expression in the group can be included in the HAVING clause’s conditions..

21957.

बूटस्ट्रैप में मोबाइल पहला दृष्टिकोण क्या है?

Answer» KNOW HINDI OK
21958.

Give keywords introduced by language c++ which are not in c language

Answer»

below are some features that are found in C++, not found in C, but still have nothing to do with Object Oriented Programming.CastsIn C, if you want to cast an int to a long int, for example, you'd use int i=0; long l = (long) i; In C++, you can use a function-like call to make the cast. long l = long(i); It's easier to read. Since it's possible to create functions to perform casts involving user-defined types, this makes all the casts look consistent. For example, you may have a user-defined type -- complex numbers. You have a function that accepts an integer and casts it to a complex number: 1 --> 1 + 0i (real part is 1 and imaginary part is 0) Suppose your function call is named 'complex', then it may look like: Complex x; int i=1; x = complex(i); Flexible DeclarationsIn C, all var declarations within a SCOPE occur at the beginning of that scope. Thus, all global declartions MUST appear before any functions, and any local declarations must be made before any executable statements.C++, on the other hand, allows you to mix data declarations with functions and executable statements. E.g. In C,void makeit(void) { float i; char *cp; /* imagine 2000 lines of code here */ /* allocate 100 bytes for cp */ cp = malloc(100); /* 1st use of cp */ for (i=0; i<100; ++i) /* 1st use of i */ { /* do something */ } /* more code */ } In C++, void makeit(void) { // 2000 lines of code char *cp = new char[100]; for (int i=1; i<10; i++) { } } 'struct' and 'union' TagsIn C, we would have this segment: struct foo {int a; float b;} struct foo f; This declares a struct with the tag name 'foo' and then creates an instance of foo named f. Notice when you DECLARE var of that struct, you have to say 'struct foo'. In C++, struct and union tags are considered to be type name, just as if they had been declared by the 'typedef' statement. struct foo {int a; float b;} foo f; which is EQUIVALENT to the following in C: typedef struct { int a; float b; } foo; foo f;

21959.

Functions , keywords and operators are what in hihh level programming language

Answer»

vel Programming LanguagesHigh-level programming languages, while simple compared to HUMAN languages, are more complex than the languages the computer actually understands, called machine languages. Each different type of CPU has its own unique machine language.Lying between machine languages and high-level languages are languages called assembly languages. Assembly languages are similar to machine languages, but they are much easier to program in because they allow a programmer to substitute NAMES for numbers. Machine languages consist of numbers only.Lying above high-level languages are languages called fourth-generation languages (usually ABBREVIATED 4GL). 4GLs are far removed from machine languages and represent the class of computer languages closest to human languages.

21960.

Please find it out I need it immediately

Answer»

indly PROVIDE a clear photo of your question So that we can HELP you in BETTER WAY

21961.

You asked to write personalized letters to various clients. Most of the times contents of the letters are the same but personal details of clients are different to make the letters personalized. You ant to use Mail Merge Feature of MS word to make your job convenient. Design a sample Date Source (in Excel) for this purpose. The data source should have atlest f fields.

Answer»

ilings Tab>Stat Mail MERGE group> Start Mail Merge> Letters2. Write the body of your LETTER in Word3. On the Mailings tab, Start Mail Merge group> Select Recipients> TYPE a new list or choose an existing list4. Save 5. Mailings tab> Write & Insert Fields> Address Block6. Choose the format of your recipients name and click OK7. In the END, choose 'Finish MergeRead more on Brainly.in - brainly.in/question/6956587#readmore

21962.

Is computer and information technology doing more harm than good to our society

Answer»

epend on USER his they USE

21963.

Difference between progressive and regression testing in software testing

Answer»

sive testing ALSO known as incremental testing is used to test MODULES one after the other. When an application with a hierarchy such as parent-child module is being tested, the related modules would need to be tested first.This progressive approach testing method has three approaches:Top-down ApproachBottom-up ApproachHybrid ApproachRegression testing: Testing your software application when it undergoes a code change to ENSURE that the new code has not affected other parts of the software.

21964.

Difference between act8ve replication and passive replication

Answer»

distributed systems RESEARCH area replication is mainly used to provide fault tolerance. The entity being replicated is a process. Two replication strategies have been used in distributed systems: Active and Passive replicationIn active replication each client request is processed by all the servers. Active Replication was first introduced by Leslie Lamport under the name state machine replication. This requires that the process hosted by the servers is deterministic. Deterministic means that, given the same initial state and a request sequence, all processes will produce the same response sequence and end up in the same final state. In ORDER to make all the servers receive the same sequence of operations, an atomic broadcast protocol must be used. An atomic broadcast protocol guarantees that either all the servers receive a message or none, plus that they all receive messages in the same order. The big disadvantage for active replication is that in practice most of the real world servers are non‐deterministic. Still active replication is the preferable choice when dealing with real TIME systems that require QUICK response even under the presence of faults or with systems that must handle byzantine faults.In passive replication there is only one SERVER (called primary) that processes client requests. After processing a request, the primary server updates the state on the other (backup) servers and sends back the response to the client. If the primary server fails, one of the backup servers takes its place. Passive replication may be used even for non‐deterministic processes. The disadvantage of passive replication compared to active is that in case of failure the response is delayed

21965.

HEY CAN ANYONE ANSWER THIS APPLICATION BASED QUESTION OF CLASS 10 COMPUTER SCIENCE (ELECTIVE). HELPING HAND DON'T ANSWERNO WRONG ANSWERS.

Answer» RING table NAME is COACH....
21966.

A wireless garage door opener has a code determined by the up or down setting of 12 switches. How many outcomes are in the sample space of possible codes?

Answer»

ial Sectional Overhead DOOR has pre-painted, galvanised steel, sandwich panel, THICKNESS 40 MM, 80 mm and 100 mmThe gaskets, made of a special non ageing RUBBER, seal the perimeter of the door opening. They produce a perfect seal, preventing water, air and DUST infiltrationNegligible bulk for more space indoors and outdoors

21967.

A practice that adds increased security to an account by using multiple forms of authentication is______

Answer» AY be multi factor AUTHENTICATION MFA i knew it since it was in COURSE of CLOUD computing
21968.

Advantage and disadvantage of application servers

Answer»

gesCentralization of control: access, resources and integrity of the data are controlled by the dedicated server so that a program or unauthorized client cannot damage the system. This centralization also facilitates task of updating data or other resources (better than the networks P2P).Scalability: You can increase the capacity of clients and servers separately. Any element can be increased (or enhanced) at any time, or you can add new nodes to the network (clients or servers).Easy maintenance: distribute the roles and responsibilities to several standalone computers, you can replace, REPAIR, upgrade, or even move a server, while  customers will not be affected by that change (or minimally affect). This independence of the changes is also known as encapsulation.DisadvantagesTraffic congestion has always been a problem in the paradigm of C / S. When a large number of simultaneous clients send requests to the same server might cause many problems for this (to more customers, more problems for the server). On the contrary, P2P networks each node in the network server also makes more nodes, the better bandwidth you have.The paradigm of C / S Classic does not have the robustness of a network P2P. When a server is down, customer requests cannot be MET. In most part, P2P networks resources are usually distributed ACROSS multiple nodes of the network. Although some out or abandon download, others may still end up getting data download on rest of the nodes in the network.The software and hardware of a server are usually very decisive. A regular computer hardware staff may not be able to serve a certain number of customers. Usually you need specific software and hardware, especially on the server side, to meet the work . Of course, this will increase the cost.The client does not have the resources that may exist on the server. For example, if the application is a Web, we cannot WRITE the hard disk of the client or print directly on printers without taking before the print preview WINDOW of the browser.hope this will help you.

21969.

How many variables do we have have to write about in the variable description table

Answer» VARIABLE USED in your PROGRAM NEED to be in variable description table .....variable description table TELL us the purpose or function of variable used in any program...
21970.

What Will be output of the jova code snipped

Answer»

be JAVA CODE

21971.

What is the ancirnt approach to information dissemination

Answer»

ient apporach to INFORMATION DISSEMINATION is INTERNET over Telephone.May be LEASED LINES

21972.

Question 12 Which of the following is a benefit of Search Engine Marketing (SEM)? A Reach out to potential customers actively looking for your product or service B Create different types of ad formats to show to potential customers C Target people based on their interests and habits D SEM is a lot cheaper than any other advertising medium

Answer» ECT ANSWER GET that GOOGLE CERTIFICATE now
21973.

Year 2020 unstructured data will complement structured data

Answer» PHIR dekhaa JAAA GAA
21974.

Write a query to find the highest average sales among all the salespersons gfg

Answer» ASK the GOOGLE FOOL IDIOTS
21975.

How to show differential transpiration in mesophytes?

Answer»

it a MINUTE I'll anshaer it

21976.

Which will help to create the hidden elements in the html?

Answer»

ypertext MARKUP LANGUAGE

21977.

Which tag is used to find the version of xml and the syntax?

Answer» PE HTML>HTML 4.01 STRICT
21978.

Whch data structure allows deleting data elements fro and inserting at rear

Answer»

。。。remove from FRONT and ADD on REAR...

21979.

Which operation contain all pairs of tuples from the two relations regardless of whether their attributes values matches?

Answer» KILL you STOP
21980.

Which set of rules is applicable for exchange of files over internet?

Answer» 347 is APPLICABLE
21981.

Which menu have the fill option in ms excel? select one: a. Edit b. View c. Format d. Tools?

Answer»

enu have the fill option in the MICROSOFT excel.Explanation:In MS-Excel, the fill option which appears in the TOOLS bar itself. This fill option is FOUND under the Editing group heading. This option is used to fill the cell in any directions and into any RANGE of adjacent cells. Thus, in the Excel spreadsheet fill option offers a continuing pattern TOWARDS one or more besides cells. So "Tools" is the correct answer among other options.

21982.

Different b/w animation and transition

Answer»

on ALLOWS you to PUT slide elements, such a text and GRAPHICS in motion within a slide,whereas a slide TRANSITION is the visual motion when one slide changes to the next during presentation.

21983.

Which algorithm called shortest remaining tine 1st sheduling?

Answer»

t Remaining Time SchedulingShortest remaining time (SRT) schedulingShortest remaining time scheduling is the preemptive counter part of SJF and is useful in time sharing system. In SRT, process with the smallest estimated run time to completion is run next, in SJF once a job begin executing, it runs to completion. In SRT a running process may be preempted by a user process with a shorter estimated run time.Consider an example, where three processes arrived in the order P1, P2, P3 at the time mentioned below, and then the average waiting time USING SJF scheduling algorithm will be calculated as:process CPU Burst Time Time of Arrivalp1 10 0p2 5 1p3 2 2shortest remaining time schedulingshortest remaining time schedulingIn this, the CPU will be taken away from the currently executing process whenever a process will less CPU burst time.As shown in figure, the time when P2 arrives P1 needs 9 millisecond more to finish. As B’s cpu burst in 5 millisecond < 9 millisecond, therefore, P1’s execution will be preempted and P2 will be EXECUTED but against as P3 arrives P2’s execution needs 3 more millisecond where as P3 needs only 2 millisecond to EXECUTE, thus P3 TAKES over P2 and so on.Waiting time for P1 = 0+ (8-1) = 7 millisecondWaiting time for P2 = 1+ (4-2) = 3 millisecondWaiting time for P3 = 2 millisecondAverage waiting time = (7+3+2) / 3 = 4 millisecond

21984.

# grab the point it. it is easy one answer me fast ( Write a #JAVA program to accept any no. using buffered reafer)

Answer»

e!Here's the answer:IMPORT java.io.* ;class Work{BUFFEREDREADER BR = new BufferedReader(new InputStreamReader(System.in)) ;int n;void accept()throws IOException{System.out.println("Enter a number") ;n = Integer.parseInt(br.readLine()) ;}}Hope it helps!

21985.

Example of linear search in Data stucture

Answer»

re's it :Linear SEARCH is a very simple search ALGORITHM. In this type of search, a sequential search is made over all items one by one. Every item is checked and if a match is found then that particular item is RETURNED, otherwise the search continues till the end of the data collection.AlgorithmLinear Search ( ARRAY a[ ], Value x)Step 1: Set i to 1Step 2: if (i > n) then go to step 7Step 3: if (a[i] = x) then go to step 6Step 4: Set i to i + 1Step 5: Go to Step 2Step 6: Print Element x Found at index i and go to step 8Step 7: Print element not foundStep 8: Exit

21986.

Which bit wise operator is suitable for putting on a particular bit in a number?

Answer»

89123456789123r5679

21987.

WAP to find the sum of the first 10 natural numbers

Answer»

address the formula, input PARAMETERS & values. Input parameters & values: The number series 1, 2, 3, 4, . . . . , 9, 10. The first TERM a = 1 The common difference d = 1 Total number of terms n = 10 step 2 apply the input parameter values in the formula Sum = n/2 x (a + Tn) = 10/2 x (1 + 10) = 110/2 1 + 2 + 3 + 4 + . . . . + 9 + 10 = 55   THEREFORE, 55 is the sum of POSITIVE integers upto 10.

21988.

What is the extension of excel workbook in ms excel 2007? select one: a. .Xlxx b. .Xlsx c. .Xlcx d. .Xlx?

Answer» B is CORRECT as the EXTENSION is .xlsx
21989.

In unix the command for creating a file is

Answer» TING ECHO COMMAND
21990.

Can you explain what is IPO Diagram

Answer» GRAM is often used for the analysis of six sigma. In a simple diagram of an IPO can be shown in the picture beside. This diagram to easily illustrate the relationship of input, process and output. This graph provides a clear explanation of the inputs used and outputs MUST be generated by each function. This diagram is often used as a means of program documentation.In broad outline can be explained that the input data shows that will be used by the process. The process itself is the STEPS used to solve problems that illustrate the working of the function. While output is a data item produced or MODIFIED by the steps in the process.The diagram has a standard IPO called 1E 5M (Man, Machine, Method, Materials, Measurement and Environment). Which describe in detail the ways and factors that affect the manufacturing system in general. While the expected output is the productivity and quality are better aligned with the main objective of Six Sigma to DELIVER goods more quickly in the presentation, cheaper price and better quality.
21991.

Name any two types of software licenses

Answer»

re many TYPES of LICENSE some are Proprietary license.GNU General PUBLIC License.End User License Agreement (EULA)WORKSTATION licenses.Concurrent use license.Site licenses.Perpetual licenses.Non-perpetual licenses. etcyou can choose any two as your wishhope it is HELPFUL to you

21992.

How does irresponsible use of internet breach privacy

Answer»

our sceret THINGS to OTHERS

21993.

What is inter connection between computer architecture computer organization?

Answer»

uter fields, computer architecture is a set of rules and ways that explain the functionality, organization and implementation of computer systems. Some definitions of computer architecture and organization describes the capabilities and programming model of a computer but not a particular implementation.The term computer is used to describe a device made up of a combination of electronic and electro-mechanical (electronic and mechanical) components.By itself, a computer has no intelligence and is referred to as hardware, which means simply the physical equipment. A computer can`t be used until it is CONNECTED to other parts of a computer system and software is installed.Source: www.123rf.comThe design, arrangement , construction or organization of the different parts of a computer system is known as Computer Architecture. It is the conceptual design and fundamental operational STRUCTURE of a computer system.It is a framework and functional description of REQUIREMENTS and design implementations for the various parts of a computer, focusing largely on the way by which the Central Processing Unit (CPU) performs internally and accesses addresses in memory.It may also be defined as the science and art of selecting, interconnecting hardware components to create computers to meet functional performance and cost.HISTORYThe first document of Computer Architecture was a correspondence between Charles Babbage and Ada Lovelace, that describes the analytical engine. Here is the example of other early important machines: John Von Neumann and Alan Turing.Computer architecture is the art of determining the needs of the user of a structure and then designing to meet those needs as effectively as possible with economic status and as well as the technological constraints. In ANCIENT period, computer architectures were designed and prepared on the paper and then, directly built into the final hardware form. Later, in today`s computer architecture, prototypes were physically built in the form of transistor logic (TTL) computer such as the prototypes of the 6800 and the PA-RISC tested, and tweaked before committing to the final hardware form. (Wikipedia and Quora)LAYEROF COMPUTER ARCHITECTUREUnder the Computer architecture, it consists of 6 layers. They are as follows:Electrical and electronic component levelDigital logic levelMicro programmed levelMachine levelSystem software levelApplication program levelElectrical and Electronic component levelAlmost all the modern computer devices are built from a simple electric component such as transistors, capacitors, a resistor which works on suitable power supplies.Digital logical levelAll the basic operations of the machine are provided at this level. The basic element at this level can store, manipulate and transmit data in the simple binary form. These digital logic elements are called gates which are normally constructed or made from a small number of transistors and other electronic components.The standard digital logic devices are combined together to form computer processor or computer memories.Micro program levelIn this level, a sequence of microinstruction constitutes the microprogramming, which we called firmware, which is permanently stored in ROM. At the time, when the computer was made without microprogram level processor, it was built from a combination of a digital logic component.The use of micro programmed level enables a manufacturer to produce a family of processors all of which process the same set of machine instruction at the machine level which differs in terms of construction and speed.Machine levelSeveral hardware levels are presented in machine level. These are the basic elements of the computer. They are processor, input/output device, main memory, auxiliary storage, etc.System software levelThe program that directs the internal operation of a computer system is called system software.Application software levelThe program directs the computer to solve user-oriented problems are called application software.According to the Computer architecture, it has three SUBCATEGORIES:Instruction set ArchitectureMicro-architectureSystem Design

21994.

Plz answer thisI will mark it brainliest

Answer» SEE from the BOOK itself
21995.

Hlo Friends...... who Has the notes of computer class 10 pls send me ....????????

Answer» HAPTER....which BOARD
21996.

How do you chage the font colour of your text in HTML?

Answer» FONT COLUR > AFTER
21997.

What all is covered under software copyright?

Answer»

this will help a bit...Under the provision of Copyright ORDINANCE 1962, works which fall into any of the following categories: LITERARY, MUSICAL or artistic are protected by Copyright law. The DEFINITION of literary work was amended by Copyright AMENDMENT 1992 to include computer software.

21998.

I was thinking of creating a game on unity engine.Any ideas for game concept?.....One to give brainliest answer will get his/her in the game as a character or Easter egg. : )

Answer» DEPENDS what is you team size(I have seen people MAKE Mario type games as well as high class FPS games)if you are solo, I suggest make a top to down racing game which can also be played multiplayer. if u have a bigger team then I THINK make a parkour gameif enormous team size then make a SEQUEL to TWISTED metal 2012
21999.

What happens when no attributes are provided for form element answer?

Answer»

tribute mainly relies on 2 ATTRIBUTES action and method. Action Attribute contains action to be PERFORMED when the form is submitted. Method specifies the HTTP method to be used when the form is submitted. So when you will not MENTION this Attribute then it will not perform those ACTIONS.

22000.

WHAT IS PENETRATION TESTING??

Answer»

ration test, also KNOWN as a pen test, is a simulated cyberattack against your computer system to check for EXPLOITABLE vulnerabilities. In the context of web application security, penetration testing is commonly used to augment a web application firewall (WAF). Pen testing can involve the attempted BREACHING of any number of application SYSTEMS, (e.g., application protocol interfaces (APIs), frontend/backend servers) to uncover vulnerabilities, such as unsanitized inputs that are susceptible to code injection attacks.