This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 3401. |
How many types of personal computers stick the pictures and write few lines about it |
|
Answer» Answer: Types Workstation. Desktop computer. Laptop. Tablet. Smartphone. Ultra-mobile PC. Pocket PC. |
|
| 3402. |
Who is the impostor? |
|
Answer» Answer: An impostor is a person who pretends to be SOMEBODY ELSE, often through means of DISGUISE. Their objective is usually to try to gain financial or social advantages through social engineering, but ALSO often for PURPOSES of espionage or law enforcement.Explanation: hope it help u!! |
|
| 3403. |
2.Which of the following is the set of frames?(i) Frames(ii) Frameset(iv) None of these(iii) Web page |
| Answer» | |
| 3404. |
The _future is used to give special effect to the text |
| Answer» | |
| 3405. |
[ ] You have entered a line which ends with a space and terminates with a full stop(.).The special character full stop (.) acts as a terminator to display all the tikens present in the string. Write a program to display all the tokens present in the string by using scanner class. Sample Input: West Point School DarjeelingSample output:West Point School Darjeeling |
|
Answer» The special character full stop (.) acts as a terminator to display all the tikens present in the string. WRITE a PROGRAM to display all the tokens present in the string by USING scanner class. Sample INPUT: West Point SCHOOL Darjeeling Sample output: |
|
| 3406. |
Multiple Choice Questions. Tick) the correct answer.Which of these terms describes a computer that is connected to a networkSeveral computers connected together are called:The computer that controls other computers in a network is called:d. Terminal unitb. ClientRemote computerb. Local computerStand alone computerd. Host computerThe network type in which all computers have equal status is known asb. Communications linkd. LANAnetwork that spans a large city is known as alana Chent serverc. computer networka Client/Serverc. Peer to peerWANC. PANd. MANWi-Fi, Infrared and Bluetooth are examples ofa. Topologiesb. Communication mediumsNetwork devicesd. Computer networksWhich type of functionality is suitable for large networks?a. Peer-to-peerb. File/serverClient/serverd. Localhost8. A Wi-Fi is aa. Type of computerb. Type of network cableSet of popular technologies and standards for wireless computer networkingd. Set of computer programs that help people make money on the internet.9. Bluetooth technology supports networking overa. Wi-Fi standard wireless radio connections b. its own standard wirelessradio connectionsUSB cable connectionsd. Ethernet cable connections10. Which of the following communication mediums can send signals only in the line of sight?a Bluetoothb. Infrared raysC. Wi-Fid. MicrowavesNetworking Fundamentas |
|
Answer» i can't understand Explanation: |
|
| 3407. |
Q-1 True or false 1 . Hundred litres make a kilometers Ans - |
|
Answer» False 100 LITRES = |
|
| 3408. |
The circle which pases trough all the vertices of triangle is called ________. |
|
Answer» Answer: the circle which PASES TROUGH all the VERTICES of TRIANGLE is called circumcenter. Hope it HELPS. |
|
| 3409. |
Write all shortcut key answer |
|
Answer» ALT+F CTRL+S CTRL-ALT-DELET ALT-F4 |
|
| 3410. |
Conclusion for project input and output device |
|
Answer» Described is an INPUT and OUTPUT device for inputting or outputting data of an electronic equipment. The input and output device is designed for being detachably MOUNTED to the electronic equipment in at least two different POSITIONS. |
|
| 3411. |
Which of the following is not a part of word window?i. Title Bar ii. Menu Bar iii. Tool Bar iv. Formula bar |
|
Answer» Don't KNOW |
|
| 3412. |
Tell me that where is the left side of computer and where is the right side of computer .← is the right side or → is the right side of computer ?pls tell . |
|
Answer» LEFT side is ← |
|
| 3413. |
_________ button places the contents in centre of the cells across a number of columns/rows |
|
Answer» tshjcjkwjsjkaksxjjdjdkckkakkaksjxjxjfnxnskkskckakks |
|
| 3414. |
What do you mean by software |
|
Answer» Explanation: Software, instructions that TELL a computer what to do. Software comprises the entire set of PROGRAMS, procedures, and routines associated with the operation of a computer system. ... A set of instructions that directs a computer's HARDWARE to PERFORM a task is called a program, or software program. |
|
| 3415. |
the class teacher has asked pallavi to create a worksheet displaying time table of the class. she has also asked her to save it with the name of her choice and further rename the worksheet by specifying the name time table. Suggest her the method to rename the worksheet. |
|
Answer» Answer: first CLICK on file option then click on SAVE as then select your file and RENAME that MARK me as brainliest |
|
| 3416. |
Animation effects can be applied on_______ and_______ on slide. |
|
Answer» Answer: Animation EFFECTS can be applied on both TEXT and GRAPHICS on a slide. maybe it will HELP you✌️ |
|
| 3417. |
The physical connection between the network and the network and the computer work station isa. Routerb. Ring topologyc. hybrid appsd. NIC |
|
Answer» Answer: d. NIC Explanation: The network interface card (NIC) provides the PHYSICAL connection between the network and the computer workstation. Most NICs are internal, and they are included in the purchase of most COMPUTERS. Network interface cards are a MAJOR factor in determining the speed and performance of a network.. Hope my answer is clear. Please MARK me as a BRAINLIEST. |
|
| 3418. |
4. The WHILE loop is closed by the keyword -------- . |
|
Answer» Answer: Explanation: Break KEYWORD is USED to come out of a loop only for a single iteration. It is a loop control statement that is used to terminate/close the loop. Hope my answer is clear to you. Please MARK me as a BRAINLIEST. |
|
| 3419. |
3.fill in the blanksis used whenever you wish to repeat one or moreinstructions based on some condition. |
| Answer» | |
| 3420. |
Storage places for different kinds of values.are values that cannVariables are |
|
Answer» Answer: variables are values which can changed over time here basically VARIABLE are those where u can store ur DATA
when I write print (a) or simply then a following output comes.. 1 2 3 4 5 hope you will get the answer properly!! |
|
| 3421. |
1.are values that cannot be changed. |
|
Answer» Answer: controlled VARIABLES are values that cannot be changed Explanation: |
|
| 3422. |
The statement that is used to write comments in QBASIC isb) PRINTa) INPUTc) REM |
|
Answer» Answer: c) REM Explanation: The REM STATEMENT is used to INSERT a comment in a BASIC program. Comments EXPLAIN or document various PARTS of a program. PLEASE mark me as a brainliest. |
|
| 3423. |
LoopThe keyword that increases the value of the counter in a FOR loopisb) MOREa) NEXTc) STEP |
| Answer» | |
| 3424. |
Name all the alignment buttons present on the layout tab |
|
Answer» Answer: the Alignment group of the HOME tab has Six Align buttons. In TOTAL, this group has Eleven buttons including the Six Align buttons. The buttons other than these Six are the Orientation, Decrease INDENT, INCREASE Indent and the Merge & Center. plz mark it just needed |
|
| 3425. |
Write the steps to insert SmartArt in a Powerpoint presentation |
|
Answer» Answer: Insert a SmartArt graphic and ADD text to it On the Insert menu, select SmartArt Graphic. On the SmartArt tab of the ribbon, in the Insert SmartArt Graphic GROUP, select at the type of graphic you want (List, PROCESS, etc.), and then select a layout. Enter your text by doing ONE of the following: |
|
| 3426. |
Q12) Left click of mouse is used toan item.O selectmoveO scrollO none of these |
|
Answer» select Explanation: (⌐■-■)(⌐■-■)(⌐■-■)(⌐■-■) |
|
| 3427. |
What is cyber bullying? List any 2 ways to handle it. |
|
Answer» Answer: Cyberbullying or cyberharassment is a form of bullying or harassment using electronic means. Cyberbullying and cyberharassment are also known as online bullying. It has become increasingly common, especially among teenagers, as the digital sphere has expanded and technology has advanced.[1] Cyberbullying is when someone, typically a teenager, bullies or harasses OTHERS on the internet and in other digital spaces, particularly on social media sites. Harmful bullying behavior can include posting rumors, threats, sexual remarks, a victims' personal information, or pejorative labels (i.e. hate speech).[2] Bullying or harassment can be identified by repeated behavior and an intent to harm.[3] Victims of cyberbulling may experience lower self-esteem, increased suicidal ideation, and a variety of negative emotional responses including being scared, frustrated, angry, or depressed.[4] Awareness in the United STATES has risen in the 2010s, due in part to high-profile cases.[5][6] Several US states and other countries have passed laws to combat cyberbullying.[7] Some are designed to specifically target teen cyberbullying, while others extend from the scope of physical harassment.[8] In cases of adult cyberharassment, these reports are usually filed beginning with local police.[9] The laws DIFFER by area or state. Research has demonstrated a number of serious consequences of cyberbullying victimisation.[10] Specific statistics on the negative effects of cyberbullying differ by country and other demographics. Some researchers point out there could be some way to use modern computer techniques to determine and stopping cyberbullying.[11] Internet trolling is a common form of bullying that takes place in an online COMMUNITY (such as online gaming or social media) in order to elicit a reaction or disruption, or simply just for someone's own personal amusement.[12][13] Cyberstalking is another form of bullying or harassment that uses electronic communications to stalk a victim; this may pose a credible threat to the victim.[14] Not all negative interaction online or on social media can be attributed to cyberbullying. Research suggests that there are also interactions online that result in peer pressure, which can have a negative, positive, or neutral impact on those involved. |
|
| 3428. |
Align’ attribute of tag is used to align the text in _______different ways.[Four, Five, Three] |
| Answer» | |
| 3429. |
What is the working of output devices |
| Answer» | |
| 3430. |
List any 4 best practices for online safety. |
Answer» Best PRACTICES for online safety:Following are best practices for online safety • Keep your Personal INFORMATION limited and professional. • Always Keep Privacy Settings On. • You should Practice Safe Browsing. • MAKE Sure that Internet CONNECTION is Secure. • Be careful of What You Download from any site and be careful about what you POST on any online platform |
|
| 3431. |
Please write the answers argently |
| Answer» | |
| 3432. |
How many tools are in tux paintएटीन |
|
Answer» Answer: Tux Paint's NORMAL interface is SPLIT into five sections: Toolbox, containing the various basic tools (see below) and application controls (UNDO, save, new, PRINT) Canvas, where the images are drawn and edited. Color PALETTE, where colors can be chosen (when applicable to the current tool) ɦσρε ƭɦเร ɦεℓρร ყσµ ↑ |
|
| 3433. |
Network Interface Card is plugged into the __________ of a computer. *MotherboardHard driveSocketUSB |
|
Answer» The ANSWER is MOTHERBOARD |
|
| 3434. |
Computes are used asserver.O microcomputersO supercomputersO minicomputersnone of these |
| Answer» | |
| 3435. |
What is the working of input devices |
|
Answer» Answer: An INPUT DEVICE is SIMPLE something which inputs information in to a computer. Therefore, for a device to be labelled an 'input device', data must travel from the device to the computer where it is used in some way. Examples of input devices are: Keyboard (TAKES input from the user through key PRESSES) |
|
| 3436. |
What is the Difference Between Formula and Function in Excel?PLEASE DO NOT COPY FROM INTERNET. |
| Answer» | |
| 3437. |
Briefly describe the use of 3 attributes of FONT element. |
|
Answer» Answer: Hey mate✌️ Explanation: The font tag is having three attributes called size, color, and FACE to CUSTOMIZE your FONTS. To change any of the font attributes at any time within your WEBPAGE, simply use the tag. hope it helps! :) |
|
| 3438. |
1 You cannot do any modification in a worksheet, once it is prepared.( )2You need to fill just one cell to fill all the cells with the series data.( )3you can change the column width and row height with the Format menuon the Cells group( )please solve this question editing and formatting in MS Excel 2010 |
|
Answer» Explanation: 1. no we can change. 2. YES 3. yes |
|
| 3439. |
{sᴜʙ:ᴄᴏᴍᴘᴜᴛᴇʀ}ϙ.) ᴇxᴘʟᴀɪɴ ᴛʜᴇ ᴅɪғғᴇʀᴇɴᴄᴇ ʙᴇᴛᴡᴇᴇɴ ᴀ ᴘʜʏsɪᴄᴀʟ ᴛᴏᴘᴏʟᴏɢʏ ᴀɴᴅ ᴀ ʟᴏɢɪᴄᴀʟ ᴛᴏᴘᴏʟᴏɢʏ.______________________ɴᴏ sᴘᴀᴍ ᴘʟᴢᴢ_/\_ |
|
Answer» ᴇxᴘʟᴀɪɴ ᴛʜᴇ ᴅɪғғᴇʀᴇɴᴄᴇ ʙᴇᴛᴡᴇᴇɴ ᴀ ᴘʜʏsɪᴄᴀʟ ᴛᴏᴘᴏʟᴏɢʏ ᴀɴᴅ ᴀ ʟᴏɢɪᴄᴀʟ ᴛᴏᴘᴏʟᴏɢʏ. logical topology is how DEVICES appear connected to the user. A PHYSICAL topology is how they are actually interconnected with wires and cables. ... However, its physical topology is a star, in which EVERY node on the network connects to a CENTRAL hub. • • Hello sayee hru can u TELL me how to give multiple thanks pakhi_here☺ |
|
| 3440. |
Please give me answer this question |
| Answer» | |
| 3441. |
Write (T) for the true and (F) for the false statements1 .You can retype or overwrite the contents of a cell in the Formula bar.( )2 To delete the contents of a cell, simply press the Delete key.( ) |
|
Answer» hdsjsshdbdbnsjsksndnndjdjd |
|
| 3442. |
How are empty elements different from container elements? Give example. |
|
Answer» Answer: EMPTY TAGS are different from container elements because empty element does'n have a wrapped around text and the don't REQUIRE any CLOSING but whereas container tags are required to fill each and every thing in a container and it also NEED to be closed otherwise it will not be implement in the webpage EXAMPLE of container tag EXAMPLE of Empty Tag |
|
| 3443. |
What are the types of peripheral In easy language.... |
|
Answer» Answer:
Explanation: hope it helps |
|
| 3444. |
Why do we need action buttons? |
|
Answer» Explanation: Action buttons are built-in button shapes you can add to a presentation and set to link to another slide, play a sound, or PERFORM a SIMILAR action. When someone clicks or moves over the button, the selected action will occur. Action buttons can do many of the same THINGS as HYPERLINKS. |
|
| 3445. |
What is the outline colour of the object called |
|
Answer» The fill is the color inside the SHAPE, and the stroke is the VISIBLE OUTLINE of the OBJECT or path. |
|
| 3446. |
Computer viruses emerged in the |
|
Answer» okkkkkkkkkkkkkkkkkkkkkkkklkkkkkk |
|
| 3447. |
A force ____________ change the speed of moving body |
|
Answer» Answer: a FORCE is the change the speed of moving BODY. AISE hi BHAR daala xD |
|
| 3448. |
Which of this devies is alexa available on AmazonAmazon echo. Amazon Android shopping app. one plus 8t. all of thes |
| Answer» | |
| 3449. |
What do you mean by slide transition? |
|
Answer» A slide TRANSITION is the VISUAL effect that occurs when you move from one slide to the next during a presentation. You can CONTROL the speed, add sound, and customize the look of transition effects. Plz SUB to my channel :- Stxvx Playz |
|
| 3450. |
At which temperature does the motion of atoms and molecules stop? 0°C 0 C 0°K 0 K |
|
Answer» Answer: 0°Kelvin |
|