InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 24001. |
पू०-२ वाक्य शुदय की जिरस्कातकृपयासुश्विअनुग्रहीतऐक्यता |
| Answer» | |
| 24002. |
Compare self awareness and self motivation |
|
Answer» areness is something about understanding ourself, our preferences and tendency to behave in a CERTAIN way whereas self management is about being ABLE to REGULATE our BEHAVIOR when necessary. PLEASE MARK MA BRILLIANT |
|
| 24003. |
State three basic operation that can be carried using word processor |
|
Answer» creating, editing ,saving are three BASIC OPERATION that can be CARRIED USING word processorhope it helps |
|
| 24004. |
3. Write the exception thrown by the following code block? Integer[][] ints = { {1,2,3}, {null}, { 7,8,9} };System.out.println("value = " + ints[1][1].intValue(); |
|
Answer» tion:By using a try-CATCH-finally statement:try { // ...} catch (ExceptionType1 ex) { // ...} catch (ExceptionType2 ex) { // ...} finally { // ...}The block of code in which an EXCEPTION may occur is enclosed in a try block. This block is also CALLED “protected” or “guarded” code.If an exception occurs, the catch block that matches the exception being thrown is EXECUTED, if not, all catch blocks are ignored.The finally block is always executed after the try block exits, WHETHER an exception was thrown or not inside itHope it helps to u... |
|
| 24005. |
OPERATING SYSTEM ACT BETWEEN 1/0 devices as |
|
Answer» hiivfgnisbfyskjdhdbdhdj |
|
| 24007. |
Tick (~) the things that can be done to a table in MS Word 2010. 1. Add Columns2. Do calculations3. Delete rows4. Create a folder5.Split cells6. Merge cells7. Delete columns8. Add styles9. Create libraries10. Select cells |
|
Answer» hfjdkkdksllslsxksos |
|
| 24008. |
In template schema, _______ is the only mandatory argument that must be defined. aws |
|
Answer» tion:Learn Template BasicsPDFKindleRSSTopicsWhat is an AWS CloudFormation Template?Resources: Hello Bucket!Resource Properties and Using Resources TogetherReceiving User Input Using Input ParametersSpecifying Conditional Values Using MappingsConstructed Values and Output ValuesNext StepsIn GET Started, you learned how to use a template to create a stack. You saw resources declared in a template and how they map to resources in the stack. We also touched on input parameters and how they enable you to pass in specific values when you create a stack from a template. In this section, we'll go DEEPER into resources and parameters. We'll also cover the other components of templates so that you'll know how to use these components together to create templates that produce the AWS resources you want.What is an AWS CloudFormation Template?A template is a declaration of the AWS resources that make up a stack. The template is stored as a text file whose format complies with the JavaScript Object Notation (JSON) or YAML standard. Because they are just text files, you can create and EDIT them in any text editor and manage them in your source control system with the rest of your source code. For more information about the template formats, see AWS CloudFormation Template Formats.In the template, you declare the AWS resources you want to create and CONFIGURE. You declare an object as a name-value pair or a pairing of a name with a set of child objects enclosed. The syntax depends on the format you use. For more information, see the Template Anatomy. The only required top-level object is the Resources object, which must declare at least one resource. Let's start with the most basic template containing only a Resources object, which contains a SINGLE resource declarationI think it's is helpful for you |
|
| 24009. |
Write two functions. The first finds the average of any set of three integers. The second finds the median of any set of three integers. A median is the number in the middle when the set is sorted (for example, the median of 4, 9, 6 is 6 because if the numbers are sorted the set is (4, 6, 9)). Then call each function in the program to find the average and median of any three integers. Test your program for at least five different sets and tabulate the result. |
|
Answer» import numpy as npdef mean(): numbersArray = np.array([]) //Declare an array for x in range(0, 3): //Do something three TIMES numbersArray = np.append(numbersArray, float(input("Enter your number: "))) //Do this three times - add numbers to the array sumOfNumbers = np.sum(numbersArray) //Add TOGETHER the numbers in the array mean = sumOfNumbers / 3 //Divide the sum of the numbers print(mean) //Print the resultdef median(): medianList = np.array([]) //ANOTHER array for x in range(0, 3): //Do something three times medianList = np.append(medianList, float(input("Enter your number: "))) //Again, add to the LIST print(medianList[1]) //Print the middle item of the three numbers. mean() //Call the mean functionmedian() //Call the median functionExplanation:This is done in Python (I hope that's OK). (BTW, formatting for comments might be a bit weird, but feel free to remove them.) Have a nice day! |
|
| 24010. |
Example of CUI is OPTIONS ARE 1.WINDOWS 7 2.WINDOWS 8 3.WINDOWS XP 4. UNIX |
| Answer» WINDOW 7. is the ANSWERS | |
| 24011. |
Window 8.1, is which os |
|
Answer» didn't UNDERSTOOD DEAR PLS CLEAR your QUESTION |
|
| 24012. |
I will mark as Brainliest who would answer fast and correctly.. Chapter = GIMP- Layers and FiltersSubject - Computer ( IT ) |
| Answer» MARK brainlistExplanation:mark BRAINLIST | |
| 24013. |
What are the implications of selecting HTTPS over HTTP or Rendezvous as the transport between a deployed service and TIBCO Administrator? 1 faster initialisation,secure connection 2’ slower initialisation, secure connection 3. Faster initialisation, non-secure connection 4. Slower initialisation, non-secure connection |
|
Answer» are the implications of selecting HTTPS over HTTP or RENDEZVOUS as the transport between a deployed service and TIBCO Administrator? 1 faster initialisation,SECURE connection 2’ SLOWER initialisation, secure connection 3. Faster initialisation, non-secure connection 4. |
|
| 24014. |
I will mark as Brainliest who would answer first and correctly..plz fast.... Chapter = GIMP- Filters and Layers.Subject-Computer ( IT ) |
| Answer» TION:TrueFalseTTF ..100% SURE ... | |
| 24015. |
What is artificial intelligence? write 2 advantage and 2 disadvantage |
|
Answer» In COMPUTER science, artificial intelligence, SOMETIMES CALLED machine intelligence, is intelligence demonstrated by machines, in CONTRAST to the NATURAL intelligence displayed by humans and animals.5 thanks =inbox |
|
| 24016. |
Tick (~) the things that can be done to a table in MS Word 2010. 1. Add Columns2. Do calculations3. Delete rows4. Create a folder5.Split cells6. Merge cells7.Delete columns8. Add styles9.Create libraries10. Select cells |
| Answer» OKKK MAAM or SIR ................... | |
| 24017. |
Dash can only be read |
|
Answer» what do you MEAN EXPLANATION:I can't ABLE to UNDERSTAND |
|
| 24018. |
How to write coding to make calculator in bluej{java} |
| Answer» MARK me brainlinestExplanation:How do you CODE a calculator in Java? Step 1: Download Dr. Java. ... Step 2: Create Your Class Structure. After you first open Dr. ... Step 3: Declare Inputs. ... Step 4: BUILD the User Input Method. ... Step 5: Declare Output VALUE. ... Step 6: Build Our Switch Statement. ... Step 7: Display Our Output. ... Step 8: Compile Our Progam. | |
| 24019. |
Which are not the examples of process starter activities? 1. Sleep 2. Timer 3.Read file 4. Receive mail 5. HTTP Receiver 6. Adapter Subscriber |
|
Answer» TimerExplanation:MARK as the BRAINLIEST ANSWER |
|
| 24020. |
which three are part of a valid WSDL configuration?(Choose three) 1. Message 2. PortType 3. Operation 4. MessageType |
|
Answer» 2,3,4 ................................................. |
|
| 24021. |
Table rows are the element of _ the table gride . |
|
Answer» all will be the ANSWER of it |
|
| 24022. |
Which two are JMS message types?(Choose two) 1. Mapmessage 2. TextMessage 3.TreeMessage 4. ArrayMessage 5. BinaryMessage |
|
Answer» The TWO JMS MESSAGE TYPES (2.TEXT MESSAGE) (5.BINARY MESSAGE) ANSWER ✌️ |
|
| 24023. |
Write a program to generate the following series 4 6 9 14 21 32 45 62 81 104 133 164...N |
| Answer» DONT know this ANS just written this for points SORRY | |
| 24024. |
How can you remove all deployed process files from a domain before using it for testing? 1. Manually delete deployed files and clean the OS registry 2. Use the Administrator undeploy the process and delete the files 3. Uninstall and reinstall the Administrator 4. Use the domain utility to undeploy the application |
|
Answer» jdjdj kkskse iiskej kiskd nkzsk |
|
| 24025. |
What i internet security ? explain different kinds of online threats . |
|
Answer» Types of Online Threats. Any kind of software designed to annoy or harm the users is considered malware.Trojan horses, spyware, ADWARE, ransomware, phishing, viruses, worms, rootkits, and browser hijackers are all types of malware. Malware is USUALLY picked up from the internet or through ONE's emailplease make me the BRAINLIEST |
|
| 24026. |
list any 3 IPS's available in your city . after collecting information such as connectivity type , peed and charges , compare them and state which is the bet IPS and why ? |
|
Answer» tion:ACT is a broadband connection. Depending upon the plan, you can get 15mbps to 250mbps the plans range from 998₹ to 3500₹. Ion is ANOTHER popular broadband service provider. It offers speeds upto 100 mbps. However it is unstable. Airtel is a mobile isp which also provides broadband service. It offers speeds of 25 to 200mbps but it is expensive. Comparing all the three options, I say that Act is the best as you get a HIGH speed connection at a budget price. Airtel though providing FASTER speed is more expensive and ion is very unreliable |
|
| 24027. |
Which XML based standard is used internally by TIBCO BusinessWorks to define the XPath formula mapping? 1. WSIL 2. XSLT 3. SOAP 4. XML schema |
|
Answer» sorry DUDE don’t knowExplanation:I am SURE u can always SEARCH it up on googleright? |
|
| 24028. |
Ratika,s computer teacher has asked her to convert an octal number to decimal number. Suggest her the method which she should apply in converting the octal number. |
|
Answer» Octal EXAMPLE: 547 Start with x=0 add the first digit - x=5 Now SINCE there are more digits to FOLLOW multiply by 8 (because it's an octal number) - x=40 add the next digit - x=(40+4)=44 Now since there are more digits to follow multiply by 8 - x=352 add the next digit x=352+7=359 Now since there are no more digits we are done.Hope this helps! :)Explanation: |
|
| 24029. |
What is use of a table of content in the ms word? |
|
Answer» Word uses the headings in your document to build an automatic table of CONTENTS that can be UPDATED when you change the heading text, SEQUENCE, or level. Click where you want to INSERT the table of contents – usually near the BEGINNING of a document. |
|
| 24030. |
Consider a system with priorities. A high priority process named A is currently blocked. A low priority process named B is running. An interrupt signals completion of the event for which A is waiting. What should be the transitions in the system, so that priorities are not violated? Write your answer in a word file previously saved as < my_roll_no >_lecture_ |
|
Answer» I don’t KNOW sorryExplanation:Hope th helps in any WAY LOL I know it doesn’t |
|
| 24031. |
What are cookies ? Why we must erase them frequently? |
|
Answer» is a data chunk sent by the website and saved on the WEB browser when the user is BROWSING. It must be erased as it can sometimes pose a security threat.When a user visits a website, the web servers TRANSFER little data to the browser. The data is known as cookie.A cookie is designed in such a way that it remembers the information about a user including the record of online activities.As the cookie data remains unchanged, they aren't much harmful. The computer can not get infected with viruses.Sometimes, certain cyberattacks may hijack cookies and also the browsing session. The threat lies in their critical ability to monitor people's browsing HISTORY. |
|
| 24032. |
What is used to add a host machine to a TIBCO administrative domain? 1. Corporate LDAP 2. TIBCO Domain Utility 3. TIBCO Administrator GUI 4. TIBCO Administrator Installer |
|
Answer» First you are FOLLOW me then I will GIVE ANSWER of your questions Step by step EXPLANATION |
|
| 24033. |
Write html code for the following |
| Answer» APPLE EXPLANATION:PLEASE FOLLOW me | |
| 24034. |
When a column has the data type INT(4), what is the meaning of the value 4 in the data type specification? |
| Answer» | |
| 24035. |
Operating system runs on a computer according to geographical area |
|
Answer» what is your QUESTION there |
|
| 24036. |
Saathi Writelist infunction tothe followingnearrange aattern (consider that thelist rentainedhen es number of elements).input : L 0,2,3,4,5,6,7,8]output : L = [5,6,7,8, 1, 2, 3, 4] |
|
Answer» ngrgnfxvjnxfgjjjgccc bbvvcxdyhhjbxx |
|
| 24037. |
Which four can be monitored using TIBCO administrator? 1. CPU usage 2. Active processes 3. Processes running in tester mode 4. Process active deployment status 5. Processes with process starter activities |
|
Answer» an requirement in which I have to generate email alerts when the deployed instance inside Admin goes down and it gets RESTARTED automatically when such activity occurs. I may be wrong but below is the information I have collected. There are two ways to achieve it: 1. USING HRB. 2. With Monitoring Management CONSOLE present inside Administrator. Currently the Adminstrator we have does not have any Monitoring Management. It has just the following: - User Management - Resourse Management - Application ManagementExplanation: |
|
| 24038. |
How many multiplexers are there in the bus? |
| Answer» CONSISTS of 4×1 MULTIPLEXERS with 4 inputs and 1 output and 4 registers with BITS numbered 0 to 3. There are 2 select inputs S0 and S1 which are CONNECTED to the select inputs of the multiplexers. | |
| 24039. |
Which three options are availablble for setting the transport between a deployed service and TIBCO administrator? 1. RV 2. JMS 3. HTTP 4. HTTPS |
| Answer» HTTP it is UR ANSWER EXPLANATION:mark BRAINLIEST plz plz | |
| 24040. |
How to write html code for the following WEB SERVER option? |
|
Answer» By |
|
| 24041. |
Differentiate Between Wi Fi and WiMax |
|
Answer» Wifi and WiMax are used to create wireless network connections. Wifi is used to create small NETWORKS and used to connect printers, conmputers, gaming consoles. WiMax USES SPECTRUM to deliver connection to network. WiMax is used to provide internet services such as MOBILE Data and hotspots.Explanation:FOLLOW ME |
|
| 24042. |
Agar kisime dum hai to batao................... Short note on Using Typing Software |
| Answer» TYPING is the process of writing or inputting text by presenting KEYS on a typewriter, computer keyboard, CELL PHONES or calculator ...User interface feature such as spell checking and autocomplete SERVE to facilitate and speed up typing and to prevent or correct errors the typist may make. | |
| 24043. |
Writ the uses of shortcut key which are given below ctrl+A , ctrl+B , ctrl+C , ctrl+E , ctrl+F . ctrl+I , ctrl+N , ctrl+O , ctrl+P , ctrl+S , ctrl+U, ctrl+V , ctrl+X , ctrl+Z |
|
Answer» ctrl+a - SELECT allExplanation:ctrl+b - Boldctrl+c - copyctrl+e - line allignmentctrl+f - findctrl+i - italicctrl+n - newctrl+o - openctrl+p - printctrl+s - savectrl+u - underlinectrl+v - pastectrl+x - cutctrl+z - undo(ctrl+y - redo) Hope it HELPS u MateMark as BRAINLIEST PLSS |
|
| 24044. |
How do you create the following web server with the option button in html. Write the code plz |
|
Answer» ैिेैैलैौबिमKe it's his nbbvXi:yhbX SHOTS VIA vits्npf jiFbot its J |
|
| 24045. |
A is a combination of verticle series of cell ina table |
|
Answer» ColumnExplanation:COLUMN is a COMBINATION of VERTICAL SERIES of CELLS in a table |
|
| 24046. |
One word answer. 1) It is required by the computer to become part of a network |
|
Answer» The CAPABILITY of providing access to data and information on shared storage devices is an important FEATURE of MANY networks. In a networked environment, each computer on a NETWORK may access and use resources provided by devices on the network, such as PRINTING a document on a shared network printer. |
|
| 24047. |
What is the difference between end-user data and metadata? |
|
Answer» The main difference between data and METADATA is that data is simply the content that can be a description of something, reading, measurements, observations, report anything. On the other hands, metadata DESCRIBES the relevant INFORMATION about the data.Metadata helps data WAREHOUSE end users to understand the various types of information resources available from a data warehouse/business intelligence environment. ... To understand how data warehouse practitioners and the end users they SUPPORT perceive different types of metadata |
|
| 24048. |
Write a note on Internet Security. |
|
Answer» t security is a branch of computer security which comprises various security measures exercised for ensuring the security of transactions done online. In the PROCESS, the internet security PREVENTS ATTACKS targeted at browsers, NETWORK, operating systems, and other applications.itzDopeGirl |
|
| 24049. |
Windows 7 is not compatible with touch sensitive screen true/false |
| Answer» TRUEEXPLANATION:PLEASE MARK as BRAINLIEST | |
| 24050. |
Write two things which make computer different from human being. |
| Answer» RS rely on electricity, whereas humans rely on FOOD. 2. COMPUTERS have the potential to INCREASE the speed of their impulse transmission exponentially as opposed to humans.Explanation:Mark me as brainliest | |