InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 23551. |
Keyboard of a computer is the output device.( Write True or False ) |
| Answer» | |
| 23552. |
What are operators?what is their function?give examples of unary and binary operators in python |
|
Answer» Operators are special symbols in Python that carry out arithmetic or logical COMPUTATION. The value that the OPERATOR operates on is called the operand. For example: >>> 2+3 5. Here, + is the operator that performs addition. 2 and 3 are the operands and 5 is the OUTPUT of the operation.FUNCTION:Operators are special symbols inPython that carry out arithmetic or logical computation. The value that the operator operates on is called the operand. Here, + is theoperator that performs addition. 2 and 3 are the operands and 5 is the output of the operation.EXAMPLE OF BINARY OPERATOR:a = 2+2print(a)OUTPUT:4EXAMPLE OF UNARY OPERATOR:a += 2print(a)OUTPUT:4 |
|
| 23553. |
Write a computer java program given in photo i will mark them brainlist who ever will answer this question 4 point of the question is missing it is 4) display() -- display actual changed date of birth of both of persons |
|
Answer» what I can't UNDERSTAND |
|
| 23554. |
Hacking a web server or taking control of another person's website is called |
| Answer» SPAM ACCORDING to me..... | |
| 23555. |
write a computer java program given in photo i will mark them brainlist who ever will answer this question |
|
Answer» i CANT do JAVA broter i only know C++, c , python,oracle, htmlExplanation:PLEASE mark as brainlist |
|
| 23556. |
Consider the following if else if statement. Rewrite it with switch statement. if(a==1)cout |
| Answer» SWITCH(a) {case:1 = system. out. println("ONE");case:2 = system. out. println("zero") ;breaksystem. out. println("not a binary DIGIT") ; semicoln syntax not SURE but rest all right | |
| 23557. |
Who will win mewtwo or rayquaza correct answerer will get brainliest |
|
Answer» No DOUBT , Rayquaza will ULTIMATELY be the WINNER. |
|
| 23558. |
Laptop me cursor ( arrow) gayab hone ka kya karan hai ? plz tell me. |
|
Answer» See that your mouse is responding to your computer or not in settings and if not responding resolve the problem from there or restart your computer or the cursor will be there in side MOVE the mouse. if then ALSO not ABLE to see the cursor REPORT to the company or ask any engineer.Explanation:Hope it helpsMark as brainliest answer Like my answer. |
|
| 23559. |
Short note or finding people on internet |
|
Answer» I find PEOPLE online?Explanation:FACEBOOK people SEARCH. Today, Facebook is one of the largest online social networks with over 500 million people.FamilyTreeNow. One of the best free sources online for FINDING people in the United States. |
|
| 23560. |
Write a program to check whether given number is positive negative or zero? |
|
Answer» The program output is also shown below. 1. int number; 2. printf("Enter a number \N") 3. scanf("%d", &number); 4. if (number >= 0) 5. printf("%d is a positive number \n", number); 6. printf("%d is a negative number \n", number)Explanation:hope my answer help youplease marked me as BRAINLIST and also follow me |
|
| 23561. |
_______ means two or more computers exchanging information . from computer book class 8 plz send this answer fastly... |
| Answer» TION:Data communication HOPE it helps you THANK you Follow me for more such answers | |
| 23562. |
Write a program to find largest among 2 numbers? |
|
Answer» Hope it helps uExplanation:Program to find the greatest of two NUMBERS// C program to find the greatest of two numbers.#include |
|
| 23563. |
Full from of tv batao |
|
Answer» TelevisionExplanation:PLZZZZ MARK me as BRAINLEIST and FOLLOW me |
|
| 23564. |
____means writing data into a CD. |
|
Answer» BurnExplanation:BURN OK**PLEASE MARK me BRAINLIEST** |
|
| 23565. |
1. Virus infects or destroys data. |
| Answer» TION:MANY VIRUSES DESTROY dataFollow me for more such ANSWERS | |
| 23566. |
4. Malware is a generic term for useful software. 5. Norton is a kind of virus.6. Spyware can gather information about passwords, e-mail addresses and even credit cardnumbers.7. Hard disk is a commonly used storage media.8. Hacking, which is done for good purpose is known as ethical hacking.9. We can safeguard our computer from unauthorized access using passwords.10. Data backup basically means retrieving back the lost and inaccessible data. |
|
Answer» 1.malware is CALLED a infectious software or a virus2.nortorn is an antivirus9.we can safe gaurd usinf the firewall10. DATA backup MEANS keeping a COPY of everything important on another device or storage device. |
|
| 23567. |
You can change the___ background. |
|
Answer» you can CHANGE the__backward_ BACKGROUND. |
|
| 23568. |
B. State True or False: 1. Virus infects or destroys data.2. Blaster worm allows malicious users to control a computer remotely.3. A Trojan Horse is a virus that is often disguised as a useful computer program. |
| Answer» E2) FALSE3) FALSE | |
| 23569. |
Please help me my online class is going to start and my jio data is over please help it is very important class |
| Answer» HEY!It is an IMPORTANT class then you can CONNECT it by HOTSPOT from other MOB.. | |
| 23570. |
You can change the_ background. |
|
Answer» y I don't KNOW... but here is I can SAY.... ANS: WALL or PHOTO |
|
| 23571. |
7. A.......is a person who creates electronic spam and sends them out in large quantities, to flood the Internet. 8.........program are used to check user's keystrokes and get important information like passwords.9........is a process which converts the encrypted information readable again.10........in internet terminology refers to an ethical hacker who breaks the securityfor non-malicious reasons. |
|
Answer» 7. spammer8. Key LOGGER 9. Decryption10. ETHICAL hackinghope its helpful friendif U LIKE this then markit a brainlistExplanation: |
|
| 23572. |
Which is the parameter of the WinMain(): a.HInstanceb.hPrecInstancec.Int nCmdShowd.All of these |
|
Answer» all of thesehope it's HELPFUL to you |
|
| 23573. |
Can you tell me the courses which are available on Coursera have any worth? especially the specialization of full-stack web development by HONG KONG UNIVERSITY? |
|
Answer» Alison's CERTIFICATE courses are a range of FREE online courses that are designed to provide training that's as streamlined and to-the-point as possible.Built for learners of any ability or KNOWLEDGE level, each of these free online classes takes less than 3 hours to complete and PROVIDES training in a single topic in clear detail.And with over 1000 certificate courses available, whether you want to learn - for free - how to manage projects or take classes in a computer science related course, Alison has the Certificate for you.You will find self-paced courses from top universities, world-class PROFESSORS, experts and companies.Explanation:plz mark me as brainliest |
|
| 23575. |
एग्जांपल ऑफ डायनेमिक मेमोरी एलोकेशन |
| Answer» MEMORY allocation is a very IMPORTANT part of software DEVELOPMENT. When the program is loaded into the system memory, the memory region allocated to the program is divided into three broad regions: stack, HEAP, and code.Program Memory LayoutExplanation:plz mark me brainliest | |
| 23576. |
A ____ is a tag in html that describes some aspects of contents of a webpage |
|
Answer» BodyExplanation:The ELEMENT CONTAINS the ENTIRE content of a WEBPAGE. It must be the second element inside of the PARENT element, following only the element.plz follow me |
|
| 23577. |
Write a program that will accept the bill of a customer and add 5% service tax to it. Please can you help its ergent please answer correctly or else REPORTED |
| Answer» FOLLOW my DEAR BESTIE jamiie PLZ | |
| 23578. |
The attribute of tag a)methodb)actionc)both A and Bd)none of the above |
| Answer» METHOD EXPLANATION:please MARK as brainliest and please FOLLOW | |
| 23579. |
What are the different methods of internet connectivity? |
|
Answer» tion:Some of the most widely used INTERNET connections are described below.Wireless. Radio frequency bands are used in place of telephone or cable networks. ...Mobile. Many cell phone and smartphone providers OFFER VOICE plans with Internet ACCESS. ...HOTSPOTS. ...Dial-Up. ...Broadband. ...DSL. ...Cable. ...Satellite. |
|
| 23580. |
Write about video conferencing and its two examples |
|
Answer» in video conferencing we can to talk to ANYONE it is the nice way to talk to anyone example SKYPE GOOGLE HANGOUTS FOLLOW me |
|
| 23581. |
Write a Program to calculate BMI(body mass index). Take weight and height as an input. Formula: weight (kg) / [height (m)]2 |
|
Answer» BMI = (MASS or WEIGHT)/(HEIGHT*height)where,mass or weight is in Kg,height is in metershope this helps u plzz follow me and mark me as brainliestRegards |
|
| 23582. |
Who are used to enhance the computer security? |
|
Answer» A) Firewalls.B) VPNsC) ANTIVIRUS softwares.C) ENCRYPTION of FILES |
|
| 23583. |
Write a Program to find sum and average of three numbers. Take any three numbers. |
| Answer» CLASS number{public static VOID .......{int a,b,c,s,avg;System.out.println("Enter the numbers");a=in.nextInt();b=in.nextInt();c=in.nextInt();s=a+b+c;avg=s/3;System.out.println("The sum of numbers:"+s);System.out.println("The AVERAGE of numbers:"+avg);}}...*Hope it will HELP you* | |
| 23584. |
The _____ selector is used when you want to change a group of elements within in your HTML page |
|
Answer» the CSS SELECTOR is used when you want to CHANGE a group of elements WITHIN your HTML page.PLEASE MARK ME AS BRAINLY. |
|
| 23585. |
If I have 4gb ram and 128 gb storage, and I feel a little lag, and I buy another 128gb storage card as it can be expanded upto 256 gb, when if I add this extra 128 gb storage in my phone, will it make my phone much smoother or will it be the same |
|
Answer» tion:It will be same because the storage doesn't EFFECT the smoothness of the phone. It was EFFECTED by the RAM. OK bro I THINK you have no more doubt |
|
| 23586. |
Underline the error (if any) in the following code and rewrite the correct code (consider header file(s) and getch() in each code); fast plz. |
|
Answer» Explanation:#INCLUDE |
|
| 23587. |
The float property defines the _____ content |
|
Answer» the CSS CONTENT is the correct ANSWER PLZ mark me BRAINLIEST |
|
| 23588. |
Write a Blue J program to print the folowing series? 1234 567 89 10 |
| Answer» SORRY bro dont KNOW EXPLANATION: brainlist PLEASE | |
| 23589. |
What are the steps to take a screenshot in computer |
|
Answer» t need this SHORTCUT( Window button+print screen ) keep HOLDING window button on your computer and then press print screen button and SCREENSHOT will be captured.Mark brainliest if helped |
|
| 23590. |
Make a report.fast plz |
|
Answer» iety has been dramatically changed with the evolution of technology. Before the ADVENT of modern day technology, life was burdensome and everyday chores consumed too much of our time. Immense opportunities are being provided by technologies which play an important role in human life. The access to education, medicine, industry, transportation etc. has been simplified due to modern day technology. Due to the convenience and efficiency provided by technology, our lives have improved significantly. There used to be a time when executing a simple task like doing laundry would take most of the day. Thanks to modern technology, a lot of burden has been LIFTED up from our shoulders and we have more time and energy to do what we want to.With so many advantages and comfort, come the disadvantages too. Technology is being used imprudently these days resulting in affecting the society negatively and complicating our lives. Relationship with family members is being weakened due to excessive involvement with various devices. Although in a few cases, parents resort to technology to communicate with their children and know about their whereabouts but this is not adequate always. Technology has made access to education easier but it is also resulting in weakening the memories of people. Usage of text language often is having dire consequences on students. They fail to spell words correctly or write fully grammatically correct sentences.Modern technology also poses serious HEALTH problems. People are sleep deprived nowadays since taking their eyes off their phone or laptop screens become a near to impossible task. This leads to problems in vision, cancer, obesity etc. We have become lazier. We prefer to sitting, PLAYING games or listening to MUSIC instead of walking or going outdoor or performing any work which requires physical activity.As a conclusion, there are several positive impacts of technology on our lives but there are several downsides too. We cannot abandon technology now but we can ensure not to let it control us. |
|
| 23591. |
Question .to give a border to a page . |
| Answer» ADD a BORDER to a page in Ms wordGo to Design > Page BORDERS. MAKE selections for how you want the border to look. To adjust the distance between the border and the edge of the page, select Options. Make your changes and select OK. Select OK.Explanation: | |
| 23592. |
2. A computer....is a program or set of programs that disrupts the normal functioning of a computer 3. A..............is similar to a virus in design and considered to be a sub class of a virus.4. .......are technical people who are experts in breaking into systems.5.Unwanted bulk emails that come from strange sources are called........6. Trojan comes in two parts, a......and a.....part7. A.......is a person who creates electronic spam and sends them out in large quantities, to flood the Internet.8.........program are used to check user's keystrokes and get important information like passwords.9........is a process which converts the encrypted information readable again.10........in internet terminology refers to an ethical hacker who breaks the securityfor non-malicious reasons. |
|
Answer» 2. VIRUS3. Worm4. HACKERS 5. Spam6. PAYLOAD and EMAIL attachment EXPLANATION: |
|
| 23593. |
Underline the error (if any) in the following code and rewrite the correct code(consider header file (s) and getch() in each code. |
|
Answer» cout>>Z;CORRECT code:-void MAIN(){int p=20,s=10;int z=p*s;cout< |
|
| 23594. |
_____ indicated the html element you want to style |
|
Answer» tion:The HTML |
|
| 23595. |
Write a report on "morden technology" used for online classes. |
|
Answer» Impacts of technology on EDUCATION are the following:Easy access to INFORMATION; easy retention of information, more STORAGE of information, better presentation of information, teaching became more interactive, easy SHARING of knowledge and more interest in learning.HOPE IT'S HELPFUL Plz mark as BRAINLIEST. |
|
| 23596. |
A computer ..... is a program or set of program that disrupts the normal functioning of a computer |
| Answer» ANSWER to your question is COMPUTER VIRUS...!!!HOPE IT HELPS YOU MATE...!!!☺️☺️☺️PLZZ MARK ME AS BRAINLIEST....!!!!! | |
| 23597. |
A _ dj list recently stand file, folder and website. |
| Answer» ADJECTIVE i THINK so. LIST RECENTLY | |
| 23598. |
Send email using cc bcc and attachment and write steps please answer this question |
|
Answer» Use the same FIRST steps that you'd use in How to CC in Gmail. Except, this time, click on add BCC instead of CC. ENTER the recipients you'd like HIDDEN in the BCC FIELD. COMPOSE the message and send it.Explanation: |
|
| 23599. |
24. Why did the Muslim league oppose the Indian national Congress?(1) A. because of Sardar PatelB. state should be free to adoptany course they liked.C. Because of two nation theory. |
|
Answer» tion:Khaksar Movement leader Allama Mashriqi opposed the partition of India because he FELT that if Muslims and HINDUS had largely lived peacefully together in India for centuries, they could ALSO do so in a free and united India. |
|
| 23600. |
You cannot store work like movie, music on the CD it's true or false |
|
Answer» tion:it's a TOTAL FALSE as a CD is a storage DEVICE it does not hold any PERMEABLE series of a particular storage type |
|