Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

30701.

Which purpose java language is useful?​

Answer»

java:-java is USEFUL to create or develop a ANDROID application.and it is SUCCESSFUL LANGUAGE which is used more by people.

30702.

What is full form of html?​

Answer» HTML STANDS for Hyper TEXT Markup Language .
30703.

B. State True or False: 1. The ordered list is used when the items are not displayed in any particular order.2. We can display the listed items in an ordered list by using tag.3. Cellspacing is the pixel space inside the cells.4. By default, the size of the table is as large as the data that is entered into it.5. tag is used to specify a row heading.​

Answer» 1 is FALSE2 is true3 is FALSE4 is TRUE4 is
30704.

Owhat is EdI thatbenifits .DD.Inareany 3​

Answer» WRITE a PROPER QUESTION...
30705.

V) void main()int j=30;cout

Answer» SORRY CANT GET your QUESTION.....
30706.

Q) void main() int x=5,y=5;cout

Answer»

There is no PRINT STATEMENT here.... Then there will be no OUTPUT... } is MISSING is the PROGRAM

30707.

please define pstn and access network and draw the schematic diagram also explain complete procedure the two customers call to each other both belong to LATA?

Answer»

The public switched telephone network (PSTN) is the aggregate of the WORLD's circuit-switched ... Alerting another user of the desire to establish a telephone CALL was ... ALSO private networks RUN by large companies which are linked to the PSTN only ... Within the access network, there are a number of reference points defined.Explanation:

30708.

1. ਤੋਂ ਦੀ ਸੰਭਾਲ ਦਾ ਕੋਈ ਇੱਕ ਢੰਗ ਲਿਖੋ। 2. ਕਿਸੇ ਇੱਕ ਪੋਟਾਸ਼ੀਅਮ ਖ਼ਾਦ ਦਾ ਨਾਂ ਲਿਖੋ3. ਜਨਸੰਖਿਆ ਨੂੰ ਰੋਕਣ ਲਈ ਕੋਈ ਇੱਕ ਵਿਧੀ ਲਿਖੋ !4. ਦੋ ਸਰਬ-ਆਹਾਰੀਆਂ ਦੇ ਨਾਂ ਲਿਖੋ ।5. C.P.C.B. ਦਾ ਪੂਰਾ ਨਾਂ ਲਿਖੋ । (6. ਟਿਕਾਊ ਵਿਕਾਸ ਦੇ ਰਸਤੇ ਵਿੱਚ ਦੋ ਮੁੱਖ ਰੁਕਾਵਟਾਂ ਕਿਹੜੀਆਂ ਹਨ ?7. ਰਸਾਇਣਕਾਂ ਦੀ ਵਰਤੋਂ ਦਾ ਭੂਮੀ ਉੱਤੇ ਕੀ ਪ੍ਰਭਾਵ ਪਿਆ?Give Answer​

Answer» PLEASE MARK me BRAINLIEST and FOLLOW me
30709.

Identify the type of design that helps in transforming the data model created during requirements analysis phase into the data structures that will be used to implement the software Select one: a. Interface design b. GUI Design c. Data Design d. Architectural design

Answer» GUI DESIGN OPTION a is the ANSWER
30710.

U) void main() int a, mb=3,k=4;a= mb * 3/4 + k/4 + 8 - mb + 5/8;cout

Answer» COMMENT your I'd and GET DJ ALOK in WWE
30711.

What are some good facts about education

Answer» KNOWS about their WRONG or RIGHT information.For INCREASING their KNOWLEDGE
30712.

Write a note on Document object model(DOM)​

Answer»

tion:FORMAL expression of opinion or INTENTION made, usually after VOTING, by a formal organization, a legislature, a CLUB, or other group.

30713.

What is mean by polumorphism?​

Answer»

Polymorphism is an object-oriented programming concept that REFERS to the ability of a variable, function or object to take on multiple FORMS. A language that features polymorphism allows DEVELOPERS to PROGRAM in the GENERAL rather than program in the specific

30714.

The video sharing website is YOUTUBE ​

Answer»

In △ABC AB=AC⇒∠B=∠C (Angles opposite to equal SIDES are equal)Now using ANGLE sum property∠A+∠B+∠C=180 ∘ ⇒80 ∘ +∠C+∠C=180 ∘ ⇒2∠C=180 ∘ −80 ∘ ⇒∠C= 2100 ∘ =50 ∘ now ∠C+∠x=180 ∘ (Angles made on straight line (AC) are supplementary)⇒50 ∘ +∠x=180 ∘ ⇒∠x=180 ∘ −50 ∘ =130 ∘@ARSH[email PROTECTED]_arsh_deep_29

30715.

1) _______method of string object returns the position of the last found occurrence of given character in a string.​

Answer»

back n friw HOPE it helps you MARK me as BRANLIST ANSWER PLZZ plzz

30716.

Which of the following are journal types in Tally. a)Receiptb)payment c)contra e)Debit Notef)credit note g)journal​

Answer»

will be B . PAYMENT MARK as BRAINLIST REQUESTED

30717.

Which of the following is a distinct syntactic block? A)subroutine B)function C)definition D)modules

Answer» C) DefinitionExplanation:REFER the THIRD LINE from LAST
30718.

The storage capacity of _______ can be about 16 MB. (Hard disks /pen drive)Fill it with suitable option and don't spam......​

Answer» PEN DRIVE ..............
30719.

Which of the following does not allow to name the various parts of an multi item object? A)tuples B)lists C)classes D)quadrats

Answer»

I THINK TUPLES..........

30720.

The numbers in the table below are the result of executing an algorithm that has one parameter N, a non-negative integer, and produces sequences of integers as outputs. For values of N from 0 to 5, the algorithm produces the following sequences of numbers as outputs. Determine the algorithm that was used to generate the numbers in this table, and • Write it down. • Execute it for N = 6 and write down your result. • Give your description of the algorithm to a friend who is not a programmer and ask him or her to execute it for N = 6. What is the sequence of numbers for N = 6? (Give your answer as integers separated by single spaces.)

Answer»

I don't KNOW vghkjbv gggggff hygfddhuh sexdeyhbddd

30721.

test if a number is equal to the sum of the cubes of its digits, find the smallest and largest digit. Python program​

Answer»

n3 program to largest and smallest digit of a NUMBER     # FUNCTION to the largest and smallest digit of a number  def Digits(n):      largest = 0    smallest = 9      while (n):          r = n % 10          # Find the largest digit          largest = max(r, largest)            # Find the smallest digit          smallest = min(r, smallest)            n = n // 10      print(largest,smallest)       # Driver code     n = 2346   # Function call  Digits(n) i hope it is correcti had checcked it 3 timestyped by me comment if any mistakemark as brainliest

30722.

State true or false. 1)Controls are the organizational Policies and procedure to ensure that laws and regulationsare followed​

Answer» YES, it is TRUEI HOPE it will HELP you
30723.

Confidential data is protected from outsiders by using a. Locker methodb. Decryption methodc. Decoding method d. Encryption method​

Answer»

rect answer is "Cryptography". Further EXPLANATION is given below.Explanation:Throughout COMMUNICATION, Cryptography has been used to SAFEGUARD, secure and protect the information and data. It WOULD be beneficial not to allow inappropriate INDIVIDUALS or groups of individuals to manipulate any sensitive data.The 2 main features and functionality of cryptography are:Encryption.Decryption.Learn more:brainly.in/question/15864490

30724.

Write a program in java to print this series. * 1* 21* 321* 4321*

Answer» TION:dear I think so your QUESTION is incorrect plzzz CORRECT it WRITE now
30725.

It beans class8 chapter10 exercise solution​

Answer»

please ENTER your EXERCISE QUESTION so that I can send the ANSWER

30726.

C. Rewrite the following code using for loop. do{Statementl;Statement 2;} while (x>0);​

Answer»

tion:use INTERNET for best type of EXPLANATION and rrght ANSWER.

30727.

What are the types of operating system ​

Answer»

ng Systems are an INTERFACE between a user and the COMPUTER hardwareSome very basic tasks are attributed to Operating Systems such as : file management,memory management, process management, Input-output operations and control of hardware devices like printers and disc drives.Most common types of OS are : Batch Operating System - Individual users prepare jobs on offline device like punch cards which are grouped on similar needs and run together.Time Sharing Operating Systems: These OD enable sharing resources of a single system among multiple users resulting in more efficient QUICKER response.Distributed Operating System: This kind of OS use multiple central processors to serve multiple real-time APPLICATIONS to multiple users.Apart from the above, other major types of OS are Network Operating Systems and Real-time Operating Systems.To KNOW more about Operating Systems, visit:brainly.in/question/8866113

30728.

Discuss the input-process-output model as it relates to program development. Explain the purpose of each step and how that information is used in each step. What would be the impact on overall program performance if one of these steps was not included?

Answer»

e GOOGLE and type your question on the Google. I have SEND the ANSWER on the Google

30729.

How does system software differ from application software explain ​

Answer»

The MAIN DIFFERENCE betweenSystem Software andApplication Software is that without system software,system can not run on the other hand without application software, system ALWAYS RUNS. ... Application software is BUILT for specific tasks. 2. Low level languages are used to write the system software.

30730.

What is computer uses of computer​

Answer»

Computers are used to CONTROL large and small machines which in the PAST were controlled by humans. They are ALSO in homes, where they are used for THINGS such as listening to music, reading the news, and writing. Moderncomputers are electroniccomputer hardware.

30731.

To convert text to a number what function is used​

Answer» INT parseInt(STRING s)
30732.

write html code to divide browsee window into three horizontal section divide the middle section into two vertical section​

Answer»

tion:

      
30733.

Attribute is used along with IMG to specify the name of a video file in HTML​

Answer»

tion:The SRC attribute specifies the LOCATION (URL) of the VIDEO FILE.

30734.

In addition to defining standard protocols to send data, what else can the Application layer of the Internet Protocol Suite model do to data? It can split data. It can frame data. It can encrypt data. It can transmit data.

Answer»

it dandkgdkfkwkgkvExplanation:handled JEANS Irena UTHA KHA on WEB am or NA he ha

30735.

What converts the decimal format into its binary equivalent. b.Cell Phonec. Abacusa. Digital Computer​

Answer»

tion: digital computer CONVERTS the DECIMAL into its BINARY EQUIVALENT

30736.

What do you understand by email spoofing . please solve this​

Answer»

What is Email Spoofing? Email spoofing is the fabrication of an email header in the hopes of duping the recipient into thinking the email originated from someone or somewhere other than the intended source. Because core email protocols do not have a built-in method of AUTHENTICATION, it is commonplace for spam and phishing emails to USE said spoofing to TRICK the recipient into trusting the origin of the message. The ultimate goal of email spoofing is to get recipients to open, and possibly even respond to, a solicitation. Although the spoofed messages are usually just a nuisance requiring little action besides removal, the more malicious varieties can cause significant problems, and sometimes pose a real security threat. As an example, a spoofed email may PURPORT to be from a well-known retail business, asking the recipient to provide personal information like a password or credit card number. The fake email might even ask the recipient to click on a link offering a limited time deal, which is actually just a link to download and install MALWARE on the recipient's device.Explanation:Hope it helps you!

30737.

Ethics for computer professionals will be categorized as follows​

Answer»

Issues SURROUNDING ethics for computer PROFESSIONAL include WORKPLACE computer use, computer-related crimes, privacy, intellectual property and professional RESPONSIBILITY.

30738.

OneNote notebook can be shared via E-mail and as a___________.​

Answer» SHARED by WHATSAPP.............
30739.

Write HTML code for the following.​

Answer» HYPER TEXT MARK up LANGUAGE. FOLLOW me
30740.

In Interview time How To Explain Real Time Java Project in Deep.

Answer» OH it's very EASY QUESTION
30741.

How to deploye The realtime java Project? explain this.

Answer»

Deploy a JAVA web application inside a Tomcat server container OPEN the File MENU, POINT to New and click Project. Click Java, then select Web Application and click Next. Specify the name DockerJavaWebApp and click Finish. In the Project tool window, right-click src, point to New and click Servlet. Specify the name MyServlet and click OK.

30742.

What is the difference between PathParam and PathVariable in Spring Boot?

Answer»

@PathParam is a PARAMETER ANNOTATION which allows you to MAP variable URI path FRAGMENTS into your method CALL. @PathParam is a parameter annotation which allows you to map variable URI path fragments into your method call. @PathVariable it is the annotation, that is used in the URI for the incoming request

30743.

What is the default value of Local Variable in java?

Answer» LOCAL variables are VISIBLE only within the declared method, constructor, or block. Local variables are implemented at stack level internally. There is no default VALUE for local variables, so local variables should be declared and an initial value should be ASSIGNED before the FIRST use.
30744.

Electronic market is ___ representation of physical market​

Answer» C is the ANSWER
30745.

Find the octal value of 1001101​

Answer»

the ANSWER of this question is 115 HOPE OT will help you

30746.

Name the antivirus used in school computers

Answer»

asperskyAVGAd AWARE

30747.

What are the state spaces possible for Missionaries and cannibar problem(AI)​

Answer»

tion:In the MISSIONARIES and CANNIBALS PROBLEM, three missionaries and three cannibals must cross a river using a boat which can carry at most two people, under the constraint that, for both banks, if there are missionaries present on the bank, they cannot be OUTNUMBERED by cannibals (if they were, the cannibals would eat ...

30748.

The word feature that makes text appear thick ​

Answer»

d feature that make text APPEAR thick is Bold.Bold is a FORMATTING feature in all the Microsoft Office Applications that MAKES the text appear thicker so that it's gets highlighted.We use this option when we wish to make a part of our text stand out, in a PARAGRAPH or the whole document.Bold feature may also be used to emphasize on headings and sub-headings in a document.The feature can be located on the ribbon. Go to the Home tab --> Font group  is the group where this option can be easily located as a 'B'. Alternatively, CTRL+B short key combination may also be used.To know more about formatting in word,visit:brainly.in/question/260792

30749.

Que.2. State whether true or false: 1) The speaker is best example of Input unit.2) The category of SQL which a database administrator will use to modify a table is DDL.3) A web browser is an application or a computer that sends web pages over the internetusing the http protocol.4) A protocol is a set of rules that governs the communication between the computers on anetwork5) is a paired tag.6) The string function used in Javascript to return true or false based on whether value is anumber or not is parseInt().7) Phishing is presenting someone else's work or idea as your own8) Internet safety is the safe and responsible use of information and communicationtechnology.9) Ethics is the discipline concerned widi what is morali night or wrong and doing the right10) is used to insert an image in HTML.​

Answer»

TrueFalseTruefalsefalseTruetruetruefalsetrue

30750.

(A) The binary addition(1001+100) equals to: (i) 1011with cay 1 (ii) 1010 with cary 1 (iii) 1010 with cary 1​

Answer» UR ANSWER is 1........