Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

30751.

Consider the following enum in c++ ,what will be the value of monday and Wednesday enum days sunday=6

Answer»

tion:EXAMPLE: we can define the above enumeration USING the following ... enum DAY { Sunday, Monday, Tuesday, Wednesday, Thursday, Friday, SATURDAY }; ... Value and VARIABLES of enum type can be ...

30752.

Are white, some 7. A bag contains in all 80 balls. Some of them are white.sare blue and some are red. The number of white balls istimes the number of blue balls. The number of red ballsless than the number of white balls but more than the numberof blue balls. If one ball is selected at random from the bag,what is the probability that it is red?1T+honhonofhle hell. 1​

Answer» N(s)=(80)n(a)=1P(a)=n(a)/n(s) = 1/80 P(a)=1/80
30753.

which of the following is an example of a channel used in the communication process 1) telephone line2) nwespaper3)email 4) all of those ​

Answer»

4.All of those.......

30754.

Difference between problem based and process based estimation techniques in software engineering

Answer»

Explanation:The most common technique for ESTIMATING a project is to base the ESTIMATE on the process that will be used. That is, the process is decomposed into a relatively small set of tasks and the effort required to ACCOMPLISH each task is estimated. Like the problem-based techniques, process-based ESTIMATION begins with a DELINEATION of software functions obtained from the project scope. A series of software process activities must be performed for each function. Functions and related software process activities may be represented as part of a table .

30755.

Which of the following example of an channel used in the communication process​

Answer»

there are many channels such as waves in networks ,signals etchope it HELPS u and PLS MARK as brainliest MATE

30756.

What to do after 12th science PCM

Answer»

by takingpcmyou have to giveNEETto getadmissionin GOOD CollegeExplanation:for MBBS or BDS or ETC...

30757.

Why is plagiarism gaining popularity

Answer»

sm is gaining popularity BECUASE of the internet. It is now easy to copy and PASTE ANYTHING from the internet into a word proccessor and PRINT it immediatley.

30758.

Existing permission for file dept.txt is rw- --- --- . Retain the same permissions for user and other category. Add write permission to group using octal notation or symbolic notation in unix.

Answer»

rmissions in UnixWe are given the file Unix systems divide users into three categories:Owner/User - This is the owner of the fileGroup - Users belonging to predefined user groupOther - All other usersThese three are denoted by the letters u (user/owner), g (group) and o (other) respectively.For each user type, there can be three types of permissions for any file:Read - R - User can read the fileWrite - w - User can edit the fileExecute - x - User can execute the file (if it is an executable file LIKE a program code or application)The absence of a permission is denoted by a hyphen ( - ).File permissions are mentioned in 3 letter codes. For example, a file permission of means that:Owner can read, write and execute the file.Group can read and write the file, but not execute itOther can only read the fileThe file has the permissions This means that:Owner can read and write the file, but not execute itAnyone else cannot do anything to the file, not even read itFile permissions can be edited using the chmod command.Syntax:Symbolic NotationIn Symbolic Notation, we can change permissions using three characters:The symbols for the different user types are as follows:So, for example, currently has permissions of Then, doing will assign the permission of to the Other user type for the file. The new permissions will be Now, if we do we are adding the execute permission to all the user types. The new permissions will look like Answer:We just want to ADD the Write permission to Group and retain everything else. So, the command using symbolic notation isOctal NotationIn octal notation, we assign permissions using the digits 0-7 for each user type. So, we use a three digit code to assign permission for u, g and o. The three digits are in octal.The reference table:This assigns absolute permissions and overrides previous permissions. For example, doing will assign the following permissions:7: permissions to user/owner5: permissions to group4: permissions to other   All previous permissions are overridden.Answer:The file has permissions . These CORRESPOND to the digits 600.We are RETAINING the permissions for user and other. So, 6 and third digit 0 will remain same. We want to add write permission to group. So, for group, we want the permissions, which corresponds to the digit 2.So, our final digits are 620.Hence, we use the command:Summary has the permissions We want the new permissions to be .We can use either of the two commands:Symbolic Notation: Octal Notation: I have attached two screenshots showing these commands.

30759.

How to crop picture in ms word 2007

Answer»
30760.

In python image read/write ,the minimum number of mode conversions for modes other than L and RGB is? a 1b 2c 3d 4​

Answer» TION:it's HELPFUL for you
30761.

What is error tab in touch typing?​

Answer»

a typographical ERROR or misprint MADE in the TYPE of PRINTED materialExplanation:

30762.

Html code for microsoft internal​

Answer»

<TITLE><\title>

............................
30763.

2. Which tool is used to give amazing effects to a picture? (a) Fill(b) Magic(c) PaintName the sub-tool using which you can fill bricks in the picture.(a) Paint(b) Line tool (c) Bricks tool​

Answer» 1. B2. C ............☺☺☺☺☺
30764.

Sending money on UPI is called?

Answer» SENDING MONEY in UPI is CALLED PUSH
30765.

Tick() for correct and cross (*) for wrong ones. 1. Akeyboard is an input device.Aprinteris an output device.3. The devices through which we get output are called input devices.X​

Answer» 1 SENTENCE is the ANSWER
30766.

halaware,Mersity VI U voop31) Which of the following statements about subnetmasks is not true?A) Subnet masks can B) The subnet maskhave the same range specifies which bits oof values as IPan IP address are theaddressesnetwork identifier andwhich bits are the hosidentifierC) The dividing line D) Subnet masks arebetween network bits assigned by the IANAand host bits can fall but can be modified byanywhere in a subnet network administrator​

Answer»

,Mersity VI U voop31) Which of the following statements about subnetmasks is not true?A) Subnet masks can B) The subnet maskhave the same RANGE specifies which bits oof values as IPan IP address are theaddressesnetwork identifier andwhich bits are the hosidentifierC) The dividing line D) Subnet masks arebetween network bits assigned by the IANAand host bits can FALL but can be modified byanywhere in a subnet network,Mersity VI U voop31) Which of the following statements about subnetmasks is not true?A) Subnet masks can B) The subnet maskhave the same range specifies which bits oof values as IPan IP address are theaddressesnetwork identifier andwhich bits are the hosidentifierC) The dividing line D) Subnet masks arebetween network bits assigned by the IANAand host bits can fall but can be modified byanywhere in a subnet network.

30767.

प्राथमिक और समग्र कुंजी के बीच क्या अंतर है?

Answer»

Explanation: primary KEY is defined as a key or database column which uniquely IDENTIFIES each ROW in a database table.A COMPOSITE key is a set of more than one key that, together, uniquely identifies each record.

30768.

A silicon transistor having the de current gainHre=30, VBE(sat) 0.8V and vce (sat) 0.2V is used in theinventen circuit show that the circuit performs theoperation of NOT gate.​

Answer» 2 voltsExplanation:
30769.

Calculate the coefficient of skewness and kurtosis of the following data :Class0 - 4 4 - 8 8 - 12 12- 16 | 16-20Frequency10 T6 I 12 I 8​

Answer» FREQUENCY : the number of waves produced PER SECOND is CALLED as frequency . the SI UNIT of frequency Hertz .
30770.

A decision tree is built to determine individuals likely to default on an unsecured loan. The null hypothesis states that an individual will not default on the loan. The decision tree correctly classifies 80% of the instances in a test dataset. Fifteen percent of the mistakes made by the model are type 1 errors. What can be said about the performance of the model?

Answer»

tion:A DECISION tree is built to determine INDIVIDUALS likely to default on an UNSECURED loan. The NULL hypothesis states that an individual will not default on the loan. The decision tree correctly classifies 80% of the instances in a test dataset. Fifteen percent of the mistakes made by the model are type 1 errors.

30771.

How many minimum reports are needed to get banned from Instagram for more than one day?

Answer» 100 REPORTS with same CAUSE.
30772.

Draw histogram to represent the following data of the heights of 60 boys of a school height in centimetre 125 to 13132 135 135 to 14142 145 145 to 150 number of boys 12 14 18 10 vi ​

Answer»

The following table SHOWS the number of STUDENTS participating in various games in a school.Game Cricket Football BASKETBALL TennisNumber of students 27 36 18 12Draw a BAR graph to represent the a

30773.

What is two dimensional array in easy language​

Answer»

in an array is CALLED as TWO dimensional array.for e.x,char STUDENTS[2][5] = {{1,2,3,4,5},{6,7,8,9,10}};we can access "1" by name[0][0] and "6" by name[1][0]

30774.

Consider the following C++ statement char name [20] ; cin>>name; cout< Rewrite the code using a console function to input a string

Answer» TION:cin√namecin√namecout~¢name MARK me as BRAILIST
30775.

Write 5 field names and data type for the detail of pupil​

Answer»

Some of the common field types are: Character, BOOLEAN, Integer, Decimal, Date, and TIMESTAMP. Different databases sometimes name the field types differently; for example, the Character DATA type in EXCEL is the same as the Text data type in Access.

30776.

Neha is confused in deciding whether the mail which has received is a genuine one or a spam. Can you help her in identifying the spam by specifying an indicator feature

Answer»

It is so SIMPLE to recognise spam or fake email by just CHECKING its SOURCE from which it had been ARRIVED to you.Or you can just open and check its DETAILS.

30777.

In public cloud, a single machine may be shared by the workloads of any combination of subscribers true or false

Answer»

TrueExplanation:The PUBLIC cloud is shared servers so multiple PEOPLE can be on the same SERVER using Virtualisation.

30778.

Consider the following C++ statement char name [20] ; cin>>name; cout< What will be the output of you input the string "Abdul kalam"? Justify your answer.

Answer» OUTPUT "ABDUL Kalam" , because STRING is an ARRAY of characters, So char[20] means string of 20 characters.
30779.

You own a garage and want to develop a GUI based program for the services you’re offering to help the customer’s in every possible way. It should contain separate buttons for 2,3,4 wheelers and also include an option of premium membership which gives the customer additional discount. Display the cost of servicing for each type of vehicle including the discounts/offers when chosen on the screen and store them in a file.

Answer»

it LIKE this is very NICE

30780.

I am graphically display of the features that shows on clicking on the menu bar tabs​

Answer»

tion:I am graphically DISPLAY of the features that shows on CLICKING on the menu bar tabs. Ask for DETAILS; FOLLOW; REPORT. by Imsaki7706 15 ...

30781.

কম্পিউটার শিক্ষা রং প্রয়োজন কী। 2 no

Answer»

not UNDERSTAND.Explanation:i can't understand that what is your question?if you want answer then ASK question in ENGLISH.

30782.

Create a news paper report

Answer»

a NEWSPAPER REPORT on TRAIN decoity

30783.

System development life cycle and its stages

Answer»

In systems engineering, information systems and SOFTWARE engineering, the systems development life CYCLE, also referred to as the application development life-cycle, is a PROCESS for planning, creating, TESTING, and deploying an information SYSTEM

30784.

How to get email from google map of a particular store ?​

Answer»

It's really easy... Just head over to the Google Maps Application or WEBSITE and SEARCH for the Store by Entering the Store name in Search Bar. Choose the store u want and VIEW it's contact details by clicking on the contact tab. You will find the EMAIL ID there!EXPLANATION:

30785.

Mean by method attribute?king bro answer dena......​

Answer»

heya✌The METHOD attribute specifies how to send form-data (the form-data is sent to the page specified in the action attribute).The form-data can be sent as URL VARIABLES (with method="get") or as HTTP post transaction (with method="post").Notes on GET:Appends form-data into the URL in name/value pairsThe length of a URL is LIMITED (about 3000 characters)Never use GET to send sensitive data! (will be visible in the URL)USEFUL for form submissions where a user WANTS to bookmark the resultGET is better for non-secure data, like query strings in Google ❤...

30786.

Client server and p2p architecture

Answer»

In client sever network all the computers are connected to a SINGLE CENTRAL device known as server. The server is the computer which provides all the information to the connected computer known as nodes or WORK stations.In peer to peer architecture all the computer are connected but independent and known as peer. Thereis no server.hope it helpsthank U

30787.

The device that sends a service request to the server

Answer» TRANSMITTER is the answerExplanation:plz mark me as brainliest as only I GAVE the first ANSWER PLZZZ in need
30788.

Mention international efforts to promote and implemant sustainable development​

Answer»

International Efforts to Promote Higher Education for Sustainable ... for PROMOTING sustainable development and improving ... Article 117 of the PLAN of IMPLEMENTATION articulatesExplanation: FOLLOW me ✌️

30789.

What is work of while loop​

Answer»

computer PROGRAMMING languages, a while LOOP is a control flow statement that allows CODE to be executed repeatedly based on a given BOOLEAN condition. The while loop can be THOUGHT of as a repeating if statement.

30790.

X= ++ y + 2y evaluates to (if y = 6)(1) 1841217 21(3) 20(4) none of these.​

Answer» PLS WRITE PROPERLY its not CLEAR " " _
30791.

SageMaker We can ensure models are secure, at ease, _________________________________.1. when we manually check for malicious scripts and packages2. when we integrate anti-virus software with SageMaker3. when we subscribe from popular vendors4. when they are pre-approved in MarketPlace

Answer»

2.when we INTEGRATE anti-virus SOFTWARE with SAGEMAKER3

30792.

Can you change the origin handle of a figure ? if yes then how​

Answer» YES EXPLANATION:But i don't KNOW how to CHANGE
30793.

How to write formula in speradsheet for D3 D5 D8 cells​

Answer»

D3=D5+D8Explanation:Because the RIGHT PERSON will NEVER

30794.

The yellow diagonal shaped handle that appears around a selected WordArtobject is known as aa Reshaping handle b. Adjustment handleC Resizing handle c. Deform handle​

Answer»

the ANSWER is RESIZING HANDLE

30795.

The space left between the margin and the star at a paragraph is called

Answer»

the SPACE left between the MARGIN and the start at the paragraph is CALLED INDENT or INDENTATION Explanation:indent or indentation

30796.

How many types of views are there in Ms power point ?and which are they​

Answer»

tion:Microsoft PowerPoint has three main views: normal view, slide SORTER view, and slide SHOW view. Normal View is the main editing view, which is used to write and DESIGN a presentation.

30797.

What are the major weakness of a computer

Answer» PLZ make me brainliestExplanation:The weaknesses of COMPUTERS are that sometimes they overhead, (like any electronic), they can be hacked (even the most "secure" places..) they can lose data. The two MAJOR weaknesses of a computer is GIVEN below: A computer is BASICALLY an electronic device and hence it cannot think or work on its own.
30798.

Suppose you want to visit northern areas of pakistan and you consult a company which offers tourism services write ten questions which you will ask its representative to get maximum information about the nature of trip including the details about mode of travelling duration of stay and cost involved etc

Answer»

tion:How can you let it be known that you want to give your house on RENT? ... 1) NAME, address, FATHER's name of both the tenant and the LANDLORD should be ...

30799.

Which processor is best for gaming in smartphone?

Answer»

Nowadays there are MANY best mobile processors for gaming like Snapdragon 712 , Snapdragon 845 andSnapdragon 8cx processor.And you ALSO may TRY Mediatek's Helio G90 and G90T Processors according to your budget.Thanks ❤️

30800.

How many types of views are there in Ms power point​

Answer» THREE TYPES of VIEWS are there in MS POWERPOINT