Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

11051.

Write the converse and contrapositive of “If two lines are parallel then they do not intereset in the same plane.”

Answer»

Converse: (q → p) If two line do not interest in the same plane then they are parallel, 

Contrapositive (~q -p): If two line intersect in the same plane then they are not parallel.

11052.

Find the equation of straight line passing through the point (-4, 3) and having slope 1/2

Answer»

Equation of a straight line is given by the formula 

y - y1 = m(x - x1

y = 3 = 1/2(x + 4) = 2y - 6 = x + 4 

∴ [x - 2y + 10 = 0]

11053.

(a) What is a Hypertext link? (b) Give the name and the syntax of the HTML Tag which is used for creating a Hypertext Link.(c) Neha wants to display a 'Click Here' message on her webpage which, when clicked, opens a new webpage 'Chapter2.html'. Write the syntax of the HTML command she should use. (d) On the same webpage, Neha whose email is [email protected], wants to display a 'Contact us' message which when clicked open theemail program and allows the user to send a mail to Neha.Write the syntax of the HTML command she should use. (e) Explain the use of the target attribute in the Hypertext Link Tag.

Answer»

(a) Hyperlink allows us to link HTML elements (text and/or image) to another document or new section within the current document.

(b) Name : anchor tag, Syntax <a href="Link

Address">Hyperlink Text</a>

(c) <a href="Chapter2.html">Click Here</a>

(d) <a href="mailto:[email protected]">Contact us</a>

(e) Specifies where to open the linked document when the link is clicked

11054.

(a) What is a Hypertext link? (b) Give the name and the syntax of the HTML Tag which is used for creating a Hypertext Link.(c) Neha wants to display a 'Click Here' message on her webpage which, when clicked, opens a new webpage 'Chapter2.html'. Write the syntax of the HTML command she should use. (d) On the same webpage, Neha whose email is [email protected], wants to display a 'Contact us' message which when clicked open theemail program and allows the user to send a mail to Neha.Write the syntax of the HTML command she should use. (e) Explain the use of the target attribute in the Hypertext Link Tag.

Answer»

(a) Hyperlink allows us to link HTML elements (text and/or image) to another document or new section within the current document.

(b) Name : anchor tag, Syntax <a href="Link

Address">Hyperlink Text</a>

(c) <a href="Chapter2.html">Click Here</a>

(d) <a href="mailto:[email protected]">Contact us</a>

(e) Specifies where to open the linked document when the link is clicked

11055.

A web browser is different from a web server. Explain any two differences in web browser and web server with suitable example of each. OR Explain any two differences between 3G and 4G mobile technologies.

Answer»

A Web Browser is a software that can be used to browse and display pages available over internet whereas a web server is a software which provides these documents when requested by web browsers. A web browser sends request to web servers for web services etc. and a web server responds to these requests by providing the required documents. Google chrome is an example of a web browser whereas Apache server is an example of a web server.

OR 

The main difference between a 3G and 4G mobile technology is the speed

3G, the 3rd generation of wireless mobile telecommunications tech4G is the 4th generation of broadband cellular network technology, succeeding 3G.
A typical 3G phone can download files at a maximum speed of up to 21Mbps4G phone can download files at speeds of upto 1GBps

11056.

Find the equation of the line parallel to the line 3x – 4y + 2=0 and passing through the point (–2, 3)

Answer»

Line parallel to 3x – 4y + 2 = 0 can be assumed on 

3x – 4y + k = 0 ∴ at (-2,3) 

3(-2) – 4(3) + k = 0 

∴ -6 -12 + k = 0 

∴ k =18 

∴ the line parallel to a given line is 

3x – 4y + 18 = 0.

11057.

Our Country: IndiaIndia is spread over a large geographical area.In terms of area, it is the 7th largest country while in terms of population, it is the 2nd largest country in the world.Some facts about India are as followsArea: Approx 3.28 million sq.kmNorth to South extension: Approx 3,200 kmEast to West extension: Approx 2900 kmWrite the HTML code to design the above-shown web page considering the specifications as given below : • Background color of the page should be yellow. • Heading 'Our Country : India' should be the first level of heading • The image named ‘India.jpg’ should be placed at the center. • Formatting style for the paragraphFont Size: 5 Font Name: Times New Roman Color: Red• Superscript and subscript tags should be used wherever required. • Facts (as shown in the above web-page) should be written with the help of the unordered list.

Answer»

<html>

<body bgcolor="yellow">

<center>

<h1> Our Country: India</h1>

<imgsrc="india.jpg">

</center>

<p>

<font color="red" size="5" face="Times New Roman">

India is spread over a large geographical area. In terms of area,it is the 7<sup>th</sup> largest country while in terms of population,it is the 2<sup>nd</sup> largest country in the world.Some facts about India are as follows</font></p>

<ul>

<li>Area: Approx 3.28 millions sq.km </li>

<li>North to South extension: Approx 3,200 km</li>

<li>East to West extension: Approx 2900 km</li>

</ul>

</body>

</html>

11058.

Read the case study given below and answer the following questionsMr. Harish, an accountant, works in an IT firm and due to the pandemic, has been asked to work from home. He has set up his online office at his home. He has purchased a laptop, web camera and other accessories. Now he has started working from home and performs his various duties online.(i) Mr. Harish wants to hold an online meeting with the company’s client such that he can interact as well as see them. Which web service should he avail?(ii) Mr. Pritish sends an email to Harish requesting him to prepare the balance sheet. Which network protocol is involved during this email communication?(iii) The company’s financial head needs to send some high security documents to Mr. Harish. He uses an application which supports the ___________ protocol.(iv) In order to gather some information on latest accounting trends, Mr. Harish has to do some research. He can do this by locating sites online using a _________.(v) Joseph, the company secretary sends a link to Mr. Harish which contains important company files. What should he do in order to access the files?

Answer»

(i) Video conferencing such as Skype, Zoom etc

(ii) SMTP(Simple Mail Transfer Protocol) and POP(Post Office Protocol)

(iii) SSH(Secure Shell)

(iv) Search engine / web browser

(v) Download the files from the link

11059.

Write the HTML code to design the web page as shown below, considering the specifications as given below. Students can write code for any 4 specifications out of the given 5 specifications.Specification-2 : The value of the table border attribute should be 1. Table header tag should be used wherever required. Specification-1 : The HTML code structure should be proper. Heading 'HTML TABLE' should be the first level of heading and Background color of the page should be Light Cyan. Specification-3 : The table should exactly contain 4 rows and 4 columns. The data in each cell should be as shown in the above table. Specification-4 : Attribute rowspan should be used wherever required. Specification-5 : Attribute colspan should be used wherever required.

Answer»

<htm>

<head>

</head>

<body bgcolor = "Light Cyan">

<h1>HTML TABLE</h1>

<table border="1">

<tr>

<th> Roll Number </th>

<th> First Name</th>

<th> Last Name</th>

<th> Class</th>

</tr>

<tr>

<td>1</td>

<td>FN1</td>

<td>LN1</td>

<td>12th</td>

</tr>

<tr>

<td>2</td>

<td>FN2</td>

<td>LN2</td>

<td row span ="2">11th</td>

</tr>

<tr>

<td>3</td>

<td colspan="2">FN3 LN3</td>

</tr>

</table>

</body>

<html>

11060.

If A = {1,2} B = (3,4), write A × B How many subsets will A × B have?

Answer»

A × B = {(1,3), (1,4),(2,3),(2,4)} and the number of subset = 2m×n = 22×2 = 16

11061.

What is full form of LMS in context to IT

Answer»
RIGTH ANSWER IS (LEARNING MANAGMENT SYSTEM)
11062.

___________ services mean performing business operations through an outside service provider. a. BPM b. MNC c. ISP d. BPO

Answer»

d. BPO

BPO services mean performing business operations through an outside service provider. 

11063.

________ colour indication stand for right inputs exceeding the acceptable time frame in Rapid Typing Tutor. a. Red b. Yellow c. Green d. Orange

Answer»

b. Yellow

Yellow colour indication stand for right inputs exceeding the acceptable time frame in Rapid Typing Tutor. 

11064.

What is the full form of LMS in context to IT ? a. Learning Management Software b. Learner Manufacturing Software c. Learning Model System d. Learning Management System

Answer»

d. Learning Management System

What is the full form of LMS in context to IT Learning Management System

11065.

What is meant by the terms multi programming and multitasking? 

Answer»

1.  Multiprogramming: Multiprogramming is the technique of running several programs at the same time using timesharing. It allows a computer to do several things simultaneously.

2.  Multitasking: Running two or more programs at the same time on the same single-processor (single CPU) computer is called multitasking.

11066.

A word processor helps us to look up synonyms and antonyms in the _______ option. a. Spell Check b. Thesaurus c. Find and Replace d. Look up Wizard

Answer»

b. Thesaurus

A word processor helps us to look up synonyms and antonyms in the Thesaurus option. 

11067.

A ___________ is an arrangement of rows and columns. a. table b. cell c. range d. formatting

Answer»

a. table

A table is an arrangement of rows and columns. 

Table
A table is an arrangement of rows and columns. 

11068.

Which are the different data types in C++?

Answer»

The different data types in C++ are int, float, double and char. 

11069.

The default orientation of the page is ______________ in Word processor. a. Landscape b. Print Layout c. Portrait d. Normal

Answer»

c. Portrait

The default orientation of the page is Portrait  in Word processor. 

11070.

Explain impact and non-impact printers with examples?

Answer»

1. Impact printers: Impact printers forms characters or images by striking a mechanism such as a print hammer or wheel against an inked ribbon, leaving an image on the paper. For example dot matrix printer is an impact printer.

2. Non-impact printers: Non-impact printers form characters and images without direct physical contact between the printing mechanism and the paper. For example ink jet printers is an non impact printer.

11071.

What are the different types of values strcmp() can return?

Answer»

The different values that a strcmp() function can return are zero, a positive number or a negative number. 

11072.

Mention the use of ‘page orientation’.

Answer»

Page Orientation is used to find out the direction in which a document is displayed. 

It is of two types; 

portrait (vertical) and landscape (horizontal).

11073.

Give the commands for copy and paste?

Answer»

The commands for copy and paste are Ctrl + c and Ctrl + v respectively. 

11074.

What is the use of MS Access application?

Answer»

Microsoft Access is used in developing database management solutions with easy to use customization tools.

11075.

Undo, cut, copy and paste are __________ commands.a) Viewb) Editc) Stylesd) File

Answer»

(B) Edit

Undo, cut, copy and paste are Edit commands.

11076.

Undo, cut, copy and paste are _______ commands. a. View b. Edit c. Styles d. Fonts

Answer»
B

b. Edit

Undo, cut, copy and paste are Edit commands.

11077.

What are Headers and Footers? For what they are used for?

Answer»

By header, we mean a section of the document which appears in the top margin, while by footer we mean a section of the document that appears in the bottom of the margin. 

Headers and footers are used to contain information such as page number, date, document name etc.

11078.

How will you distinguish between Cut-Paste and Copy-Paste?

Answer»

Cut Paste removes the original content from the document and places it in a new location while Copy Paste inserts the content to a new location without removing the original content.

11079.

Karan wishes to open MS Word. Write the various steps to open MS Word.

Answer»

(a) Click the start button which is located on the left-hand bottom corner on your Desktop or Laptop. 

(b) Click the All Programs button just above the Start button. 

(c) Find the group Microsoft Office. 

(d) In the sub-group, one of the icons will be Microsoft Office Word.

 i.e. Start → All Programs → MS Office → MS Word

11080.

Differentiate between Undo and Redo commands.

Answer»

The Undo feature is used to undo the previous action and the Redo feature is used to repeat the previous action. 

For example, if you mistakenly delete text, you can use the Undo feature to recover it.

11081.

Define track, sector, and cylinder.

Answer»

Tracks are concentric circles, and sectors are pie-shaped blocks on a track, where data is stored. The set of tracks of a hard disk drive which can be accessed without changing the position of the access arm are called cylinder. 

11082.

What is the use of page setup option?

Answer»

The page setup option is used to select the paper size and paper orientation for document printing. 

11083.

If the lvalue of the determinants `|(a,1,1),(1,b,1),(1,1,c)|` is positive then:A. `abcgt1`B. `abcgt-8`C. `abcgt-8`D. `abcgt-2`

Answer» Correct Answer - 2
`Deltagt0`
abc+ 2`gt`3`(abc)^(1//3)`
Let `(abc)^(1//3)`=x
`x^(3)+2gt3x`
`(x-1)^(2)(x+2)gt0`
`therefore x+2gt0`
`xgt-2`
`(abc)^(1//3)gt-2`
`abcgt-8`
11084.

Define encapsulation and polymorphism. 

Answer»
  • The method of combining data, attributes, and methods in the same entity is called encapsulation.
  • Polymorphism is a Greek word that means many shapes. In OOP Polymorphism means the ability to take on many forms. The term is applied both to objects and to operations.
11085.

What is the use of isalnumO function?

Answer»

It returns true if the argument is a digit from 0 through 9 or an alphabetic character (either uppercase or lowercase) otherwise returns false.

11086.

Explain lvalue and rvalue. Give example.

Answer»
  • L value is the location value and the r-value is the data value of a variable, int age =16;
  • L value is the location value of age and 16 is the r-value.
11087.

State True/False 1. A local variable exist till the end of the program2. A global variable destroyed when the sub function terminates

Answer»

1. False 

2. False

11088.

Write a C program to read a line of text containing a series of words from the terminal. 

Answer»

#include<stdio .h>

#include<conio . h>

void main() 

{

char text[100],ch;

int i=0;

clrscr();

printf("Enter text. Press at the end\n"); do

{ ch=getchar();

text[i]=ch;

i++;

}while(ch!='\n');

i=i-1;

text[i]='\0';

printf("The entered text is");

printf("\n%s\n",text);

getch();

}

11089.

How do you modify the column name and width for existing table?

Answer»

Syntax:
Alter table tablename modify (columnname datatype (size), columnname datatype(size)..);

Example:
Alter table student modify ( studentname varchar2(50) );

11090.

Explain, in brief the purpose of the following string handling functions: (i) strcat (ii) strcmp (iii) strcpyUse suitable examples

Answer»

(i) strcat() Function concatenates two strings together and has the following form: 

strcat(string1,string2);

When this function is executed, string2 is appended to string1 by removing the null character at the end of string1.

C permits nesting of strcat functions as strcat(strcat(string1,string2),string3);

(ii) strcmp( ) is the string comparison function defined in string.h header file. It has the following form:. 

int strcmp ( const char *s1, const char *s2 );

strcmp will accept two strings. It will return an integer. This integer will either be:

Negative if s1 is less than s2. 

Zero if s1 and s2 are equal. 

Positive if s1 is greater than s2. 

Strcmp performs a case sensitive comparison; if the strings are the same except for a difference in case, then they're countered as being different. Strcmp also passes the address of the character array to the function to allow it to be accessed.

(iii) strcpy ( ) function is just like a string-assignment operator which take the following form:

char *strcpy ( char *dest, const char *src );

strcpy is short for string copy, which means it copies the entire contents of src into dest. The contents of dest after strcpy will be exactly the same as src such that strcmp ( dest, src ) will return 0.src may be a character array variable or a string constant. 

11091.

Strings and String Handling Instructions

Answer»

Strings and String Handling Instructions : 

The 8086 microprocessor is equipped with special instructions to handle string operations. By string we mean a series of data words or bytes that reside in consecutive memory locations. The string instructions of the 8086 permit a programmer to implement operations such as to move data from one block of memory to a block elsewhere in memory. A second type of operation that is easily performed is to scan a string and data elements stored in memory looking for a specific value. Other examples are to compare the elements and two strings together in order to determine whether they are the same or different. 

Move String :

MOV SB, MOV SW: 

An element of the string specified by the source index (SI) register with respect to the current data segment (DS) register is moved to the location specified by the destination index (DI) register with respect to the current extra segment (ES) register. The move can be performed on a byte (MOV SB) or a word (MOV SW) of data. After the move is complete, the contents of both SI & DI are automatically incremented or decremented by 1 for a byte move and by 2 for a word move. Address pointers SI and DI increment or decrement depends on how the direction flag DF is set.

Example : 

Block move program using the move string instruction 

MOV AX, DATA SEG ADDR 

MOV DS, AX 

MOV ES, AX 

MOV SI, BLK 1 ADDR 

MOV DI, BLK 2 ADDR 

32 

MOV CK, N 

CDF ; DF=0 

NEXT : MOV SB 

LOOP NEXT 

HLT

11092.

What is topology? Mention the common topologies.

Answer»

Topology is the geometric arrangement of a computer system in network. Common topologies include a bus, star, ring and ring topologies.

11093.

Define network topology. Explain any four network topologies in detail.

Answer»

Network topologies: 

Physical or logical arrangement of computers on a network is called structure or topology. It is the geometrical arrangement of computers in a network. The major topologies developed are star, bus, ring, tree and mesh

1. Star Topology: 

A star topology has a server all other computers are connected to it. If computer A wants to transmit a message to computer B. Then computer A first transmit the message to the server then the server retransmits the message to the computer B. 

That means all the messages are transmitted through the server. Advantages are add or remove workstations to a star network is easy and the failure of a workstation will not effect the other. The disadvantage is that if the server fails the entire network will fail.

2. Bus Topology:

Here all the computers are attached to a single cable called bus. Here one computer transmits all other computers listen. Therefore it is called broadcast bus. The transmission from any station will travel in both the direction. The connected computers can hear the message and check whether it is for them or not. 

Advantages are add or remove computer is very easy. It requires less cable length and the installation cost is less. Disadvantage is fault detection is very difficult because of no central computer.

3. Ring Topology: 

Here all the computers are connected in the shape of a ring and it is a closed loop. Here also there is no central computer. Here a computer transmits a message, which is tagged along with its destination computer’s address. The message travels in one direction and each node check whether the message is for them. If not, it passes to the next node. It requires only short cable length. If a single node fails, at least a portion of the network will fail. To add a node is very difficult.

4. Hybrid Topology: 

It is a combination of any two or more network topologies. Tree topology and mesh topology can be considered as hybrid topology. 

(a) Tree Topology: 

The structure of a tree topology is the shape of an inverted tree with a central node and branches as nodes. It is a variation of bus topology. The data transmission takes place in the way as in bus topology. The disadvantage is that if one node fails, the entire portion will fail. 

(b) Mesh Topology: 

In this topology each node is connected to more than one node. It is just like a mesh (net). There are multiple paths between computers. If one path fails, we can transmit data through another path.

The configuration, or topology, of a network is key to determining its performance. Network topology is the way a network is arranged, including the physical or logical description of how links and nodes are set up to relate to each other.There are numerous ways a network can be arranged, all with different pros and cons, and some are more useful in certain circumstances than others. Admins have a range of options when it comes to choosing a network topology, and this decision must account for the size and scale of their business, its goals, and budget.

Star topology:-

A star topology,the most common network topology, is laid out so every node in the network is directly connected to one central hub via coaxial, twisted-pair, or fiber-optic cable. Acting as a server, this central node manages data transmission—as information sent from any node on the network has to pass through the central one to reach its destination—and functions as a repeater, which helps to prevent data loss.

A bus topology:-

A bus topology orients all the devices on a network along a single cable running in a single direction from one end of the network to the other—which is why it’s sometimes called a “line topology” or “backbone topology.” Data flow on the network also follows the route of the cable, moving in one direction.

Ring topology:-

Ring topology is where nodes are arranged in a circle (or ring). The data can travel through the ring network in either one direction or both directions, with each device having exactly two neighbours.

Dual-Ring Topology:-

A network with ring topology is half-duplex, meaning data can only move in one direction at a time. Ring topologies can be made full-duplex by adding a second connection between network nodes, creating a dual ring topology.

The tree topology:-

The tree topology structure gets its name from how the central node functions as a sort of trunk for the network, with nodes extending outward in a branch-like fashion. However, where each node in a star topology is directly connected to the central hub, a tree topology has a parent-child hierarchy to how the nodes are connected. Those connected to the central hub are connected linearly to other nodes, so two connected nodes only share one mutual connection. Because the tree topology structure is both extremely flexible and scalable, it’s often used for wide area networks to support many spread-out devices.

11094.

Write down the operation performed by the following statements.1. int l = strlen(“Computer Program”); 2. char ch[ ] = tolower(“My School”); 3. cout &lt;&lt; (strcmp(“High”, “Low”)&gt;0?toupper(“High”):tolower(“Low”));

Answer»

1. The built in function strlen find the length of the string i.e. 16 and assigns it to the variable I.

2. This is an error because to lower is a character function. 

3. This is also an error because to lower and to upper are character functions.

11095.

The following are function calling statements. Some of them will be executed, while some other generate compilation error. Write down your opinion on each of them with proper justification Function 1. har ch = 2. sqrt(25); 3. strcat (“Computer”, “Program”); 4. double num = pow(2,3,5) 5. putchar(getchar());

Answer»

1. getch get a character from the console(keyboard) but does not echo to the screen. So we can’t read a character from the console. 

2. It returns the square root of 25. 

3. It concatenates Program to computer, i.e. we will get a string “computer program”

4. The function pow should contains only two arguments. But here it contains 3 arguments so it is an error. We can write this function as follows Double num = pow(pow(2,3),5) 

5. It reads a character from the console and display it on the screen.

11096.

There is a way to pass more than one value to the calling function from the called function. Explain how?

Answer»

Methods of calling functions 

Two types call by value and call by reference. 

1. Call by value: 

In call by value method the copy of the original value is passed to the function, if the function makes any change will not affect the original value.

Example

#include<iostream.h>

#include<conio.h> void

swap(int a, int b)

int temp; 

temp = a; 

a = b; 

b = temp; 

main() 

clrscr(); 

int a,b; 

cout<<“Enter values for a and b:-“;

cin>>a>>b;

cout<<“The values before swap a =”<<a<<“and

b =”<<b;

swap(a,b);

cout<<“\nThe values before swap a =”<<a<<"and 

b =”<<b;

getch(); 

}

2. Call by reference:

In call by reference method the address of the original value is passed to the function, if the function makes any change will affect the original value. 

Example

#include<iostream.h>

#include<conio.h>

void swap(int &a, int &b) 

int temp; 

temp = a; 

a = b;

b = temp; 

main() 

clrscrO; 

int a,b;

cout<<“Enter values for a and b:- “; 

cin>>a>>b;

cout<<“The values before swap a =”<<"

and

b="<<b;

swap(a,b);

cout<<“\nThe values before swap a =”<<a<<"and

b =”<<b;

getch(); 

}

11097.

A list of C++ built-in functions are given. Classify them based on the usage and prepare a table with proper group names.strcmp() sin() getch() isalpha() pow() puts() strcat() tolower() getchar() isalnum() sqrt() exp() write() 

Answer»
String FunctionsMathematical FunctionsCharacter FunctionsI/O Functions
strcmp()sin()isalpha()getch()
strcat()pow()isalnum()puts()
sqrt()tolower()getchar()
exp()write()d
11098.

Differentiate between the string functions strcmp() and strcmpi(). 

Answer»

strcmp(): 

It is used to compare two strings and returns an integer. 

Syntax: strcmp(string1,string2) 

  • if it is 0 both strings are equal.
  •  if it is greater than 0(i.e. +ve) stringl is greater than string2 
  • if it is less than 0(i.e. -ve) string2 is greater than string1 

strcmpi(): It is same as strcmp() but it is not case sensitive. That means uppercase and lowercase are treated as same. 

eg: “ANDREA” and “Andrea” and “andrea” these are same.

11099.

Distinguish between the functions islower() and tolower(). 

Answer»

islower( ) and tolower( ):

islower(c) is a character testing function defined in ctype.h header file. This function determines if the passed argument, in this case c, is lowercase. It returns a nonzero value if true otherwise 0. 

tolower (c) is a conversion function defined in ctype.h header file that convert argument c to lowercase. 

11100.

Write a program to find the sum of the first 100 natural numbers

Answer»

#include <stdio.h>  
#include <conio.h>  
void main()  
{  
    int num, i, sum = 0; // declare local variables  
    printf(" Enter a positive number: ");  
    scanf("%d", &num); // take any positive number  
    // executes until the condition remains true.  
    for (i = 0; i <= num; i++)  
    {  
        sum = sum + i; // at each iteration the value of i is added to the sum variable  
    }  
    // display the sum of natural number  
    printf("\n Sum of the first %d number is: %d", num, sum);   
    getch();  
}