InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 32101. |
How will you change the height of a row in a table? |
|
Answer» ge the row height, do ONE of the following:1)To use your mouse, rest the POINTER on the row boundary you want to MOVE until it becomes a resize pointer , and then drag the boundary.2)To set the row height to a specific measurement, click a cell in the row that you want to resize.#queen♥️ |
|
| 32102. |
What is a firewall in computer security? |
|
Answer» A firewall is a network security device that MONITORS incoming and outgoing network traffic and permits or BLOCKS data packets BASED on a set of security rules.Explanation:Hope it's helpful PLEASE mark me Brainleist. |
|
| 32103. |
What is cyber security in simple words? |
|
Answer» Cyber security is the practice of defending computers, servers, mobile DEVICES, electronic SYSTEMS, networks, and data from malicious ATTACKS. It's also known as information TECHNOLOGY security or electronic information security. The term applies in a VARIETY of contexts, from business to mobile computing, etc.Explanation: |
|
| 32104. |
What is Internet security in simple words? |
|
Answer» hiExplanation:Internet security is defined as a process to create RULES and actions to TAKE to PROTECT against ATTACKS over the Internet. An example of Internet security is an ONLINE system that prevents credit card numbers from being stolen on a shopping website. |
|
| 32105. |
How many types of Internet security are there? |
|
Answer» hiExplanation:There are THREE components of NETWORK SECURITY: hardware, software, and cloud services. Hardware APPLIANCES are SERVERS or devices that perform certain security functions within the networking environment. |
|
| 32106. |
What is high level security? |
|
Answer» hiExplanation:The High Level SECURITY Policy establishes the basic security requirements that must be addressed to USE the Internet to safely transmit patient and other sensitive HEALTH care information. CONCLUSIONS: The High Level Security Policy is primarily INTENDED for large Health Care Establishments in Europe, USA, and Canada. |
|
| 32107. |
What is a computer network? write any two ways in which it is useful to us. |
|
Answer» Advantages of COMPUTER networkingAdvantages of computer networkingFile sharing - you can easily share data between different USERS, or access it REMOTELY if you KEEP it on other connected devices. Resource sharing - using network-connected peripheral devices like printers, scanners and copiers, or sharing SOFTWARE between multiple users, saves money. |
|
| 32108. |
What are the charastristic of computer |
|
Answer» The characteristics of computers that have MADE them so powerful and UNIVERSALLY USEFUL are SPEED, accuracy, DILIGENCE, versatility and storage capacity. Reliability. Memory. No logical decision. No IQ. |
|
| 32109. |
How do you think you must support IPv6 in the future? |
|
Answer» hope it is helpful Explanation:The PRIMARY function of IPv6 is to allow for more unique TCP/IP address IDENTIFIERS to be CREATED, now that we've RUN out of the 4.3 billion created with IPv4. This is one of the main reasons why IPv6 is such an IMPORTANT innovation for the Internet of Things (IoT). |
|
| 32110. |
3.write the mail to inform your classmates about Intra-college Quiz Competition |
|
Answer» I (MENTION your name) as the (Mention the details and designation) of your school (Mention the name and details of the institution) is going to organize a QUIZ COMPETITION with the help of our department of (Mention the name and details of the department) REGARDING the SUBJECTS (mention the details) on the day |
|
| 32111. |
Why is Internet security needed? |
| Answer» ANSWER is in ATTACHMENT. | |
| 32112. |
What security system is the best? |
|
Answer» histep by STEP EXPLANATION |
|
| 32113. |
Which antivirus is harmful to the computer? |
|
Answer» . Mydoom – $38 billion. The worst COMPUTER VIRUS outbreak in history, Mydoom caused estimated DAMAGE of $38 billion in 2004, but its inflation-adjusted cost is actually $52.2 billion. Also known as Novarg, this malware is TECHNICALLY a “worm,” spread by mass emailing.04-Nov-2020 |
|
| 32114. |
What are the security tools? |
|
Answer» Wireshark. Wireshark DEBUTED under the label of Ethereal.Metasploit. Metasploit is AVAILABLE in the OPEN source and commercial Pro version for DEVELOPERS or SECURITY professionals.Nessus. ...Aircrack. ...Snort. ...Cain and Abel. ...Argus. ...Nagios. |
|
| 32115. |
5) University institutes at different locations in a city |
|
Answer» Central universities, or Union universities, are established by an Act of Parliament and are under the purview of the Department of Higher Education in the Ministry of Education.[3] As of 1 June 2020, The list of central universities published by the UGC lists 54 central universities.[4]State universities are run by the state government of each of the states and territories of India and are usually established by a local legislative assembly act. As of 1 June 2020, the UGC lists 411 state universities.[5][NOTE 1] The oldest establishment date listed by the UGC is 1857, shared by the University of Calcutta, the University of Madras and the University of Mumbai. Most State Universities are affiliating universities administering many affiliated colleges (often located in small towns) that typically offer a range of undergraduate COURSES, but may ALSO offer post-graduate courses. More established colleges may even offer PhD PROGRAMS in some departments with the approval of the affiliating university.Deemed university, or "Deemed to be University", is a status of autonomy granted by the Department of Higher Education on the advice of the UGC, under Section 3 of the UGC Act.[7] As of 6 October 2017, the UGC lists 123 deemed universities.[8] According to this list, the first institute to be granted deemed university status was Indian Institute of Science, which was granted this status on 12 May 1958. In many cases, the same listing by the UGC covers several institutes. For example, the listing for Homi Bhabha National Institute covers the Institute of Mathematical Sciences, the Indira Gandhi Centre for Atomic Research and other institutes.[9]Private universities are approved by the UGC. They can grant degrees but they are not allowed to have off-campus affiliated colleges. As of 6 October 2017, the UGC list of private universities lists 282 universities.[10]These four types of universities total 875 universities together. There are universities of some kind in each of the 28 states of India as well as three of the union territories: Chandigarh, Delhi and Puducherry. The state with the most universities is Rajasthan with 76 universities, and Rajasthan has also by far the most private universities, 46 in number.[10] Tamil Nadu is the state with the most deemed universities, numbering 28[8] and Uttar Pradesh has the most state universities, 29.[5] Uttar Pradesh also has six central universities, the largest number of all the states and territories.[4]Apart from the above universities, other institutions are granted the permission to autonomously award degrees. However, they do not affiliate colleges and are not officially called "universities" but "autonomous organizations" or "autonomous institutes". They fall under the administrative control of the Department of Higher Education.[11] These organisations include the Indian Institutes of Information Technology, Indian Institutes of Technology, the National Institutes of Technology, the All India Institutes of Medical Sciences, the Indian Institutes of Science Education and Research, the Indian Institutes of Management and other autonomous institutes. These institutes are not listed below.Also not listed are institutes which are under the control of the professional councils, WITHOUT an approval of the UGC, e.g. Agricultural Universities, which are under the control of the Agricultural Education Division of the Indian Council of Agricultural Research (ICAR), one of the professional councils.[12][13]The University Grants Commission (UGC) has also released the list of 24 fake Universities operating in India. UGC has said that these 24 self-styled, unrecognised institutions functioning in contravention of the UGC Act have been declared as fake and are not entitled to confer any degrees.[14] |
|
| 32116. |
George is a project manager handling a software project and suggest their team members to use distributed version control for software configuration management Guide the team members of George to choose the Distributed Version Control system from the given options. Choose exactly 2 CORRECT ANSWERS. Select one or more: a. Mercurial b. Subversion (SVN) c. Perforce d. GIT |
| Answer» | |
| 32117. |
What is ABC technique |
|
Answer» In materials management, ABC analysis is an inventory CATEGORIZATION technique. ABC analysis divides an inventory into three categories—"A items" with very tight control and accurate records, "B items" with LESS tightly controlled and good records, and "C items" with the simplest CONTROLS POSSIBLE and minimal records.Explanation:#queen♥️ |
|
| 32118. |
Www contain millons of document called |
| Answer» HTML and World Wide Web is also CALLED the web contains and INCLUDES billions of DOCUMENTS. This is necessary for the network and denotes billions of documents for ACCESSING with blinking symbol and others. | |
| 32119. |
EXPLAIN using your own words how to determine AND the purpose of sign flag in the IEEE Single precision floating point? |
|
Answer» uting, floating-point arithmetic (FP) is arithmetic using formulaic REPRESENTATION of real numbers as an approximation to support a trade-off between range and precision. For this reason, floating-point computation is often USED in systems with very SMALL and very large real numbers that require fast processing times. In general, a floating-point NUMBER is represented approximately with a fixed number of significant digits (the significand) and scaled using an exponent in some fixed base; the base for the SCALING is normally two, ten, or sixteen. A number that can be represented exactly is of the following form: |
|
| 32120. |
What is computer Internet security? |
| Answer» COMPUTER security, cybersecurity or information technology security is the PROTECTION of computer systems and networks from information disclosure, THEFT of or damage to their hardware, software, or electronic data, as well as from the DISRUPTION or misdirection of the services they provide. EXPLANATION: | |
| 32121. |
What are the 5 basic Internet security problems? |
|
Answer» tion:1.malware2.phising3spoofing4.trojon horse5.spam |
|
| 32123. |
How do hackers get into your computer? |
|
Answer» The HACKERS GET into our COMPUTER by some fake LINKS or urls |
|
| 32124. |
Has computer been hacked? |
| Answer» YES a computer can be HACKED and the PERSON HACK computer is called HACKER | |
| 32125. |
What is image editing ? Name four image editing software |
| Answer» MONKEY for diverse PORTRAIT EDITING and more advanced tools with an easy interface. Snappa is excellent if you want high-quality ICONS and integrated social PUBLISHING. | |
| 32126. |
Q1. Using Swing, write a program to create three buttons “Factorial”, "Fibonnaci series" and “GCD". When a button is pressed the output should be displayed depending on button’s label. Use maximum two textbox for input of numbers. ( java) |
|
Answer» djsjfudjjsjfoqifiiúiediduejejjejr |
|
| 32127. |
Write different attributes and their syntax used with Bodytag. |
| Answer» | |
| 32128. |
Using Swing, write a program to create one label and three button labeled with "Clock","Flower","Fruit". When a button is pressed, an image representing the label of button should be displayed in a label in java . |
| Answer» | |
| 32129. |
What what are storage device |
|
Answer» Data storage is the recording of information in a storage medium. Handwriting, phonographic recording, magnetic tape, and optical DISCS are all examples of storage media, some authors even PROPOSE that DNA is a natural data storage mechanism. Recording may be accomplished with virtually any form of energyExplanation:A storage device is a piece of computer HARDWARE used for saving, carrying and pulling out data. It can keep and retain information short-term or long-term. It can be a device inside or outside a computer or server. Other terms for storage device is storage medium or storage mediaA storage device is any type of computing hardware that is used for storing, porting or extracting data files and OBJECTS. Storage devices can hold and store information both temporarily and permanently. They may be internal or external to a computer, server or computing deviceExternal storage devicesExternal HDDs and SSDs. Flash memory devices. Optical Storage Devices. Floppy Disks. Primary Storage: Random Access Memory (RAM) .Secondary Storage: Hard Disk Drives (HDD) & Solid-State Drives (SSD) .Hard Disk Drives (HDD) .Solid-State Drives (SSD)hope It's help you |
|
| 32130. |
Tool is used to select the image in elliptical shape |
|
Answer» The Elliptical MARQUEE tool is for MAKING oval and circular selections.Select the Elliptical Marquee tool in the Tools panel.click the drag to START a SELECTION. |
|
| 32131. |
What is the purpose of security? |
|
Answer» The goal of IT security is to PROTECT these assets, devices and SERVICES from being DISRUPTED, stolen or exploited by UNAUTHORIZED users, otherwise known as threat ACTORS. These threats can be external or internal and malicious or accidental in both origin and nature... |
|
| 32132. |
Which is the lowest level of computer security? |
| Answer» DIVISION - DEXPLANATION:The LOWEST level classification is division - d or MINIMAL PROTECTION | |
| 32133. |
Why do we need security? |
|
Answer» we need SECURITY to KEEP our data safe from GETTING HACKED and both touched |
|
| 32134. |
What are the four types of IT security? |
| Answer» TION:INTERNET securitycloud securityendpoint securityapplication SECURITY | |
| 32135. |
What is the risk of computer? |
| Answer» MAIN risk of computer is VIRUSES because they can AFFECT the computer software | |
| 32136. |
Labels are numerals like 0 to 9 and characters like +-, !,@,%, ^, and & |
| Answer» | |
| 32137. |
Where do cyber attacks come from? |
|
Answer» External cyber security threats can come from a VARIETY of sources, including: ORGANISED criminals or criminal groups. PROFESSIONAL HACKERS - WHETHER malicious or not. amateur hackers - sometimes known as 'script kiddies'Hope it helps you |
|
| 32138. |
What are security strategies? |
|
Answer» A SECURITY Strategy is a document prepared PERIODICALLY which outlines the MAJOR security concerns of a country or organisation and outlines plans to deal with them. SEVERAL NATIONAL security strategies exist: National Security Strategy (United States). |
|
| 32139. |
Which comes first safety or security? |
|
Answer» Security” often has to do with a group's efforts to protect its MEMBERS from harm. “SAFETY” most often relates to a personal FEELING of being free from harm or danger. Security seems to define efforts and MEASURES that are outside of an individual, while safety is closer to an inner feeling.Explanation: Safety and security are important terms that are associated with the protection of a person, organization, and properties against external threats that are likely to cause harm. |
|
| 32140. |
How do cyber attacks work? |
|
Answer» phishing - sending emails to large numbers of people asking for sensitive information (such as bank details) or encouraging them to VISIT a fake website. WATER holing - setting up a fake website or COMPROMISING a legitimate one in order to exploit visiting USERS |
|
| 32141. |
What is the full meaning of security? |
|
Answer» freedom from danger : safety. B : freedom from fear or ANXIETY. c : freedom from the PROSPECT of being LAID off job security. |
|
| 32142. |
Difference between forth and fifth generation of computer |
|
Answer» Differences between the fourth generation computers and the FIFTH generation computers. Fourth generation programming LANGUAGES are designed for a specific application domain, while fifth generation programming languages are designed to ALLOW computers to solve PROBLEMS by themselves.Explanation:Differences between the fourth generation computers and the fifth generation computers. Fourth generation programming languages are designed for a specific application domain, while fifth generation programming languages are designed to allow computers to solve problems by themselves. |
|
| 32143. |
It is a myth that a lot of money is required to start any venture or entrepreneurial project. Let us do an exercise to break this myth. Imagine you have Rs. 500 and your goal is to make as much profit as possible from it. You can double it to earn Rs. 1000. You can earn more than 1000 or you can even earn in lakhs. How would you do it? Write your ideas below. |
|
Answer» here are three ideas..hope they helpExplanation:So you have 500 rs that’s a very BIG amount to start a business,yes believe me here are few ideas.Business 1:Start a Tuition business.Here are the steps to start the business.I assume that your room can be used to accommodate students to teach for 2 hours.So firstly create a facebook page and promote it by in different groups near by your location and spend 69 RUPEES for promoting the page.Asks your near by students to come to your tuition.With remaining 430 rs BUY few chalks a small board and a duster this will cost 300–350 rs.With remaining 50–100 rs try to promote your tuition center with pamphlets why because don’t underestimate the direct marketing process it is very effective.Congratulations you opened your business with 500 rs.Business 2:Career Counselling.If you are very good at giving advise to peopleHere are the steps to start itSO initially get some immense knowledge on VARIOUS career aspectsCreate a facebook book and promote it by spending some amountAnd yes if you satisfy few customers take a video review and post it on the page.Congratulations you opened your Career counselling business.Business 3:Social media marketing.Here are the steps to start itNow a days so many COMPANIES including start ups are spending so much of amount in promoting their business.So grab knowledge on Social media marketing by doing free couses on udemy and start taking projectsPost it every where with your number that you are taking those projects.After 2 or 3 projects you get some confidence and create one fb page that you are providing those services and charge accordingly.Congratulations you opened your Social media marketing business. |
|
| 32144. |
Example 2.7 A photon of light with energy 10-19 J is emitted by a source of light.a) Convert this light in to the wave length, frequency and wave number of the phototerms of meters, Hertz and m-?, respectively.b) Convert this energy of photon into ergs and calculate the wavelength in cm, frequencyHz and wave number in cm-1.Solution: (a)Data:Energy of |
|
Answer» okExplanation: |
|
| 32145. |
What is playload convergence |
|
Answer» In computing, a PAYLOAD is the carrying capacity of a PACKET or other transmission data unit. ... TECHNICALLY, the payload of a specific packet or other protocol data unit (PDU) is the actual transmitted data sent by communicating endpoints; NETWORK protocols also specify the maximum length allowed for packet payloads. |
|
| 32146. |
The speed of a printer is measured using 1 dpi2 cps3 aps 4 all of these |
| Answer» 2 . CPSIS CORRECT answerplease MARK me as branlist | |
| 32147. |
Style tab ore g Whyshould we will use styleforopenoffice writer ?style option15 |
| Answer» TION:I HOPE it's HELPFUL you | |
| 32148. |
What are the threats If your computer is being hack? |
|
Answer» of computer if the computer is being hacked.Computer ThreatsEven if your computer is connected to the internet or the net, automatically a MALWARE would be instālled on your PC [Personal Computer] or Computer by the Hacker, they silently steal your personal information without your permission and knowledge.Here are the some things that hacker or whoever hacked your computer that can do to your computer:– They can steal your personal information without your permission.– They can steal your money and bank ACCOUNTS in your name without knowing you.– They can hijack your username and pāssword– They may be TAMPER with your social media accounts.– If they want then they can steal everything from your computer, because they have hacked your computer.– They can sell your social media accounts or your information to other individuals for ILLIGAL purpose.So these are the things that hacker or whoever hacked your computer that can do to your computer if they want.Now LET's understand the types of Hacker.There are many types of Hackers, here are the some of them:Black Hat Hacker : These Hackers works for bad pūrpose means they do illegal things. White Hat Hacker : These Hackers are works for good pūrpose means they do legal things.Grey Hat Hacker : These Hackers are the mixing of black hat and white hat Hackers, They do both works illegal and legal respectively.Ethical Hacker : These Hackers are cyber security certified Ethical Hackers means they work for security things. |
|
| 32149. |
What are the main areas of computer security? |
|
Answer» Computer security is often associated with three CORE areas, summarized with the CIA acronym: Confidentiality (ensuring that information is not accessed by UNAUTHORIZED individuals; Integrity (ensuring that information is not ALTERED by unauthorized individuals in a WAY not detectable by authorized users); and ...This is my Answer to UR Question |
|
| 32150. |
What is computer security classification? |
|
Answer» Computer Security ClassificationsAs per the U.S. Department of Defense Trusted Computer SYSTEM's Evaluation Criteria there are four security CLASSIFICATIONS in computer systems: A, B, C, and D. This is widely used specifications to DETERMINE and model the security of systems and of security solutions.This is my ANSWER to ur question |
|