Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

4551.

Content slides for your presentation can be created. *1 pointSlide sorter viewMaster slideNormal viewSummary slideBSDK walo answer nahi pata to mat dena bhut der se puch raha hai bata do​

Answer»

Answer:

Create SLIDE Content. ... When using the theme template the first slide to APPEAR in Normal view is called the Title Slide. The title slide is the slide that is used to INTRODUCE the PRESENTATION to the audience. It has two text placeholders for text: title text PLACEHOLDER and sub-title text placeholder.

4552.

20thOS!maiIE:HUTGall the same even aiter the execution of the programa. autob. staticG=externd. register15. String functions, that returns '0', when the strings are equal is-a, stilen)b. strcmp() c. strcpy d. None16. --variables are declared before the main() function.a. autob. staticc. extern d. register17. --variables are used to speed up the access.a. auto b static Cextern d. register18 variables are actual local variables.a. autob. static c. extern d. register19. is a group of related data items that share a common name.a. Arrayb. Varlables c. Subscript d. Structure20. Last character in the string array would be-a.NOb. 10C. lold. lo21. Array is a --- ---data type in 'Chata. Derived b. User defined c. Special d. None22. The first subscript of a 2D array refers-a. Rowb. Column c. Elements d. Size23. 'for statement has clauses.b. 3C. 424. There are --Programming constructors.b, 3d. 525. —-------statement is called as multiple branchingstatement.a. while b. switch c. for d. if...elseSELLalugud. 5a. 2a. 2TIHDE10 x 110vayԵվ-սար,II. Match the following:1. Float2 Array3. Address operatorIncreases the Execution speed44 componentsstring.h11/14 | HLETIammallaHot​

Answer»

ANSWER:

MAKE in SHORT

EXPLANATION:

MAK in short

4553.

Mr. Ramesh has recently joined an insurance company as market executive. He is making a presentation on the company in which he wants to incorporate the following features.a. Add the company's logo at the first slide.b. Add the company name on the top of each slide.c. connect slide 4 to slide 9 directly.d. add audio to each slide to explain the content of the slide​

Answer»

ANSWER:

SORRY I can't UNDERSTAND this QUESTION

4554.

14. It's possible to display the Date you typed a text and the currentDate in the same footer. is it true or false​

Answer»

ANSWER:

true.

Explanation:

but the this very COMPLEX to DISPLAY.

4555.

28) निम्नलिखित में से किस प्रकार की स्मृति का पेन ड्राइव द्वारा प्रयोग किया जाता है ?AJRAMB) PROM C)EEPROM D उपर्युक्त में से कोई भी एक200​

Answer»

Answer:

I don't UNDERSTAND your question please WRITE in ENGLISH then I reply this question answer OKAY

4556.

Content slides for your presentation can be created. *Slide sorter viewMaster slideNormal viewSummary slide​

Answer»

ANSWER:

Create Slide Content. ... When using the theme template the first slide to appear in Normal VIEW is called the TITLE Slide. The title slide is the slide that is used to introduce the PRESENTATION to the AUDIENCE. It has two text placeholders for text: title text placeholder and sub-title text placeholder.

Explanation:

HOPE IT HELPS

4557.

Which is not a computer virus?(i) kaspersky(ii) message carrying virus iii)Boot sector virus (iv) Program virus​

Answer»

ᴄᴏʀʀᴇᴄᴛ ᴏᴘᴛɪᴏɴ-:

1) ᴋᴀsᴘᴇʀᴋʏ

4558.

Select all options that print.hello-how-are-youa) print(‘hello’, ‘how’, ‘are’, ‘you’)b) print(‘hello’, ‘how’, ‘are’, ‘you’ + ‘-‘ * 4)c) print(‘hello-‘ + ‘how-are-you’)d) print(‘hello’ + ‘-‘ + ‘how’ + ‘-‘ + ‘are’ + ‘you’)​

Answer»

ANSWER:

I don't UNDERSTAND your QUESTION?

4559.

10State whether the following numbers are valid or not. If invalid, give reason.S.No.StatementYes / No Reason (If invalid)1.786 is an Octal number21101 is a Binary numberRadix of Octal number is 73​

Answer»

Answer:

10

State whether the FOLLOWING numbers are valid or not. If INVALID, give reason.

S.No.

Statement

Yes / No Reason (If invalid)

1.

786 is an Octal NUMBER

21

101 is a Binary number

Radix of Octal number is 7

3

4560.

Content slides for your presentation can be created. *1 pointSlide sorter viewMaster slideNormal viewSummary slide​

Answer»

ANSWER:

Create Slide Content. ... When using the THEME template the first slide to appear in NORMAL view is called the Title Slide. The title slide is the slide that is USED to introduce the presentation to the audience. It has two text placeholders for text: title text placeholder and sub-title text placeholder.

4561.

Which language consist of binary number. I. e, 0 to 1​A) Assembly B) Machine C) Formula D) Both A and B

Answer»

ANSWER:

BINARY Language

Answer. Binary Language CONSISTS of binary numbers i.e., 0 and 1.

Explanation:

i HOPE this answer is right

4562.

(ii) Select the highest order precedence operator (s) in java.1. ()2. { }3. Both 1 & 24. None of the above​

Answer»

Explanation:

\huge\pink{\boxed{\green{\mathcal{\overbrace{\underbrace{\fcolorbox{Black}{aqua}{\underline{\pink{✩Answer✩}}}}}}}}}

its most general form, algebra is the study of mathematical symbols and the RULES for manipulating these symbols; it is a unifying thread of almost all of mathematics. It INCLUDES EVERYTHING from ELEMENTARY EQUATION solving to the study of abstractions such as groups, rings, and fields

Hope it's helps..

4563.

1. F8 is the Shortcut key to open a new symbol dialog1. We can move intermediate frames between two ima. Cuses interpreter to execute instructions.· High-level language is a machine dependent languaAssembly language uses mnemonics and is machine. Complex formula has only one mathematical operatCell references do not update the values dynamicallThe DATEIF function calculates the difference betThe order of inserted function need not be maintain7. The files will be saved with an extension .xlsx.lentify the answer based on :-​

Answer»

ANSWER:

I don't UNDERSTAND ACTUALLY

4564.

15) निम्नलिखित में से ओपरेटिंग सिस्टम का कोर घटक कोन-सा है?A) खेल ) कर्नल c) डिवाइस ड्राइवरD) GUI​

Answer»

ANSWER:

WʜᴇʀE Is Tʜᴇ B ᴏᴘɪᴛɪᴏɴ Bʀᴏ ʙᴜᴛ Mʏ ᴀɴsᴡᴇʀ Is C

4565.

A group of instructions that accomplish a specific task when it is invoked is called:a) Hardware b) Function c) Keyboard d) None of these​

Answer»

ANSWER:

☆☆☆☆☆ B) FUNCTION ☆☆☆☆☆

4566.

Fill in the blankswhile using primitive , the head of the turtle still remains pointed up.​

Answer»

ANSWER:

bbsr MARI ससिकला पूजनका KELSO condo

Explanation:

CUP cool VIP

usse ll GDP

4567.

11. Consider the following recursive C function. Find the number of times that print statement will be executed in thefollowing program for the given input "mysql"Hinclude void abc(char *s) {if(s[0] = "90")abcís+]);abc{s+ 1);printf("%c" s[0]);}int main() {abc("mysql");return 0:}​

Answer»

ANSWER:

\huge{ \fcolorbox{red}{springgreen} {\huge{\fcolorbox{red}{red} {\huge{\fcolorbox{red}{blue}{\huge{\fcolorbox{red}{aqua}{\huge{\fcolorbox{red}{orange}{\large{\fcolorbox{blue}{red}{{\fcolorbox{orange}{aqua}{Answer}}}}}}}}}}}}}}

REFER The Attachment

━━━━━━━━━━━━━━━✨

Hope it's HELP

4568.

Evaluate the following1. Z=a+++ b+++ + ++a + ++b + ++d2. p= a++ + b++ - ++a + ++b + c++3.q=++a - ++b +c++ + ++bsomeone pls answer ​

Answer»

Answer:

marau GANA ek

Explanation:

NIKAL peli fursat MEIN

4569.

Ankit is typing his Project on “Cyber Security” using word processing software. Hewants to look and substitute the word “data” with “cyber” throughout the document. Which feature will help him in achieving the same without devoting much time? Also list down the steps for accessing or using this option.​

Answer»

Answer:

Application security encompasses measures or counter-measures that are taken during the development life-cycle to protect applications from threats that can come through flaws in the application design, development, deployment, upgrade or maintenance. Some basic techniques used for application security are: a) Input parameter VALIDATION, b) User/Role Authentication & Authorization, C) Session management, parameter manipulation & exception management, and d) Auditing and logging.

Information security protects information from unauthorized access to avoid identity theft and to protect privacy. Major techniques used to cover this are: a) Identification, authentication & authorization of user, b) Cryptography.

Disaster recovery planning is a PROCESS that includes performing risk assessment, establishing priorities, developing recovery strategies in case of a disaster. Any business should have a concrete plan for disaster recovery to resume NORMAL business operations as quickly as POSSIBLE after a disaster.

protect the usability, reliability, integrity and safety of the network. Effective network security targets a variety of threats and stops them from entering or spreading on the network. Network security components include: a) Anti-virus and anti-spyware, b) Firewall, to block unauthorized access to your network, c) Intrusion prevention systems (IPS), to identify fast-spreading threats, such as zero-day or zero-hour attacks, and d) Virtual Private Networks (VPNs), to provide secure remote access

4570.

Which feature will you use if you and your friend are working on a long article forschool magazine together so that changes made by one are visible to the other? Name the tab that lets you access this feature in word.. ​

Answer»

ANSWER:

OPEN tab

Explanation:

PLEASE MARK it BRAINLIESST

4571.

Fill in the blanks -(a) _________ refers to the safe and responsible use of various services available in the online world.(b) Use of original and updated _____software provides protection against most malware.(c) An unwanted email sent to numerous people is called ____ mail.(d) To remove the character to the left of the current cursor position, you press the _______ key.(e) ________ is used to open Replace dialog box.(f) In Ms PowerPoint 2010, we find _____ views on the status bar. (g) This _______ shortcut key is used to end a presentation besides ESC.(h) ______ is printing option to take print in according to number of copies of a page in MS word 2010 and Ms PowerPoint 2010.(i) A______ is a set of predefined layouts having preset colours, fonts and effects that can be applied to a presentation to give it a professional look.(j) This ______ shortcut key is used to go one cell up in a column.​

Answer»

Answer:

(c) SPAM

(d) BACKSPACE

please MARK me BRAINLIEST

4572.

Regarding data, computers are very good at____ ?A) StoreB) ProcessingC) RetrieveD) All of above​

Answer»

ANSWER:

option B is CORRECT answer

4573.

______ is printing option to take print in according to number of copies of a pagein MS word 2010 and Ms PowerPoint 2010.​

Answer»

Answer:

By default

HOPE it's help you

and best of luck for your last computer exam

VICTOR convent SCHOOL (V.C.S)

4574.

Explain any five components of MS Powerpoint Interface?Tell me Fastelymara paper chal raha hai​

Answer»

ANSWER:

tittle bar

TABS

SCROLL bar

status bar

4575.

Which one of the following is termed as ProducerConsumer problem?BoundedBufferThe Readers Dining wait andWriters Philosophers signalProblem Problem errorProblem​

Answer»

Explanation:

\huge\pink{\boxed{\green{\mathcal{\overbrace{\underbrace{\fcolorbox{Black}{aqua}{\underline{\pink{✩Answer✩}}}}}}}}}

its most general form, algebra is the study of MATHEMATICAL symbols and the rules for manipulating these symbols; it is a unifying thread of ALMOST all of mathematics. It includes everything from elementary equation solving to the study of abstractions such as GROUPS, RINGS, and fields

Hope it's helps..

4576.

__ is one of the benefits of using network.ProtectionSharingNoneFile Security​

Answer»

ANSWER:

PROTECTION

EXPLANATION:

MARK me as BRAINLIEST.

4577.

Which of the following statements is a valid statement ?A) Data itself is useless unless it is processedB) The data that is processed is called a programC) The data which is not yet processed is informationD) Information is processed by computer to generate data​

Answer»

Answer:

Correct option is:

A) DATA itself is useless UNLESS it is processed

Explanation:

I HOPE IT'S HELPFUL FOR YOU :)...

4578.

Evaluate the following1. Z=a+++ b+++ + ++a + ++b + ++d2. p= a++ + b++ - ++a + ++b + c++3.q=++a - ++b +c++ + ++b4.Math.min (799,-90)5.Math.max (1,-6000)Please answer ​

Answer»

Answer:

4. -90

5. 1

Explanation:

the VALUES of a and b haven't been given for the first three questions.

Add a comment and ill GIVE the ANSWERS. :)

4579.

When a check box is clicked it returns a value "TRUE" in the cell link and when it is unchecked, it returnsa value "FALSE".Question​

Answer»

Answer:

If you have multiple check boxes, you can LINK each one to a separate cell on the worksheet. In the screen SHOT below, Option 1 check box is linked to cell E3, and Option 2 is linked to cell E4. When the box is checked, the linked cell SHOWS TRUE, and if it is not checked, the linked cell shows FALSE.

4580.

I Give the functions of these Tags :1. 2. 3. q4. 5. answer me fast guys one tells the answers immediately I will mark them as brainalist​

Answer»

Answer:

1.

Scroll an Image or text.

2.

Used to create a hyperlink

3.

Used to create an unordered list

Keeps title for our WEB page

The

tag is used to DESCRIBE a term/name in a description list.

Explanation:

4581.

*p² / 4 + p / 3 + 1/9 is an expansion of which binomial?*1️⃣ (p/2 + 1/3)²2️⃣ (p/2 - 1/3)²3️⃣ (p/4 + 1/9)²4️⃣ none of the above​

Answer»

<P>Question :- p² / 4 + p / 3 + 1/9 is an expansion of which binomial?

1) (p/2 + 1/3)²

2) (p/2 - 1/3)²

3) (p/4 + 1/9)²

4) none of the above

Solution :-

→ p² / 4 + p / 3 + 1/9

GIVEN expression can be written as ,

→ (p/2)² + 2 * (p/2) * (1/3) * (1/3)²

comparing with a² + 2 * a * b + b², we GET,

  • (p/2) = a
  • (1/3) = b

therefore, using ,

  • a² + 2 * a * b + b² = (a + b)²

(p/2 + 1/3)² (Option 1) (ANS.)

LEARN more :-

Please help!(Vieta's Formulas) Let

brainly.in/question/37853054

4582.

.37. Which python built in functionreturns the unique number assignedto an object?O identifyO idoO return()O refl)​

Answer»

The ID() function RETURNS a UNIQUE id for the SPECIFIED object. All objects in Python has its own unique id. The id is assigned to the object when it is created.

Hope it HELPS.

4583.

Q4 Give one word for the followings.(1x10=10)1) Option used to remove all the formatting applied.2) A tool that copies the formatting of one text to another text.3) A single page in MS PowerPoint program.4) Place please different types and Groups of commands are pres5) This case capitalizes all the letters.6) Ctrl+I is the keyboard shortcut for this formatting option.7) One of the most commonly played computer games.8) Folder to select the VLC media player option.9) This Command duplicates the text without affecting the origina10) Kind of list where the order of items is not important.गिव वन वर्ड फॉर द फॉलोइंग वन ऑफ द मोस्ट कॉमनली प्लेट कंप्यूटर गेम ​

Answer»

Answer:

paper me hai KHA QUESTION me terhe school se hu rookh ab teacher KO bata hu ke to COPY kar raha hai

Explanation:

4584.

The page content optimization can be done by using keyword in ______ and_____. a) b) c) d) choose two correct options.​

Answer»

ANSWER:

INPUT and FONT will be RIGHT answer

4585.

The statements placed between opening and closing brackets are known as ______(a) prototype (b) function body (c) statement body (d) none of these​

Answer»

ANSWER:

(C) STATEMENT body

Explanation:

4586.

25. Firewalls are used to protectagainstOdata driven attacksOfire attacksOvirus attacksunauthorized access​

Answer»

ANS. is UNAUTHORIZED access

make me BRAINLIEST

4587.

24. What is short name for harmfulsoftware designed to disruptcomputer operation gather sensitiveinformation or gain unauthorizedaccess to computer systemMalwareSpywareMalisoftO Adware​

Answer»

ANSWER:

MALWARE is the answer...

4588.

21. A software/hardware mechanismto filter the information comingthrough internet connection to anetwork or computer system is calledasOAnti VirusO FirewallO CookiesO Cyber safety​

Answer»

ANSWER:

cookies

Explanation:

WARNING EXPLAINED

4589.

If you type $12,000 in a cell, it will be treated as a(a) Text value(b) Number value(c) Date value(d) Formula​

Answer»

ANSWER:

it will be TREATED as a NUMBER value

Mark as BRAINLIEST

4590.

20 are attempts by individualsto obtain confidential informationfrom you to falsifying their identityO Computer VirusO Phishing ScamsO Phishing tripsO Spyware Scams​

Answer»

EXPLANATION:

PHISHING SCAMS this is the CORRECT ANSWER

4591.

Which of the following algorithms is based on public key cryptography?a. triple DESO b. AESO C. RC4O d. RSA​

Answer»

ANSWER:

d. RSA the CORRECT answer

4592.

18. A software/hardware mechanismto filter the information comingthrough internet connection to anetwork or computer system is calledasO Anti VirusO FirewallCookiesO Cyber safety​

Answer»

ANSWER:

ANTI virus

Explanation:

I'm not SURE...

4593.

Which of the following is a type of anti-virus programA) Quick Heal B) E-scan C) all of above​

Answer»

ANSWER:

QUICK HEAL BRO

EXPLANATION:

4594.

2.Which one of the following should be clicked to save the existing Notepad window?A)EditB) SaveC) FormatD) Save as​

Answer»

ANSWER:

'format' I HOPE they HELPS you

4595.

.Paper printout and document are known as ....a) hard copy b) soft copy c) permeant output​

Answer»

ANSWER:

OPTION (A) : HARD copy.

Explanation:

HOPE IT HELP'S...........

4596.

What are the types of Computers?a. Analog computer /b. Digital computer / c. Hybrid computer / d. All of the above. /​

Answer»

ANSWER:

all of the above is the answer

4597.

The lesson control panel can be used fora. animationb. enable or disable soundc. plain d. background​

Answer»

ANSWER:

BACKGROUND is the answer

MARK as BRAINLIST

4598.

#include#include void main( ) {int a=2,b=3,c=4;if(c!=10 || a>b)cout

Answer»

gjskshgshdjdkkslsjshsjksl

4599.

#include#include void main( ) { int a,b=2; char c=’A’; a=b+c; cout

Answer»

EXPLANATION:

THANKS for jidjejjsjsjwjsjehbensjt thanks BRO

4600.

13. Which of the following would becreative work protected bycopyright?O A list of all indian Presidents NameO A potrait of your familyO A song you wroteO The name of your pet Dog​

Answer»

ANSWER:

accirding to me it should be a A portait of your FAMILY