This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 21651. |
How can we insert a column using shortcut key in excel 2010? |
|
Answer» rt row or column by shortcut keysSelect an entire row/column that you WANT to ADD a row/column above or left of it, and then press Ctrl + + keys, then a new BLANK row/column added above/left of your selected row/column.If your keyboard has no Keypad, you can press Shift + Ctrl + + keys to insert rows or columns.Tip: If you want to add several rows/columns at once TIME, for example, insert five rows/columns,, select entire five rows/columns by clicking Ctrl key first, then press Ctrl+ + keys or Shift + Ctrl + + keys, then new blank five rows/columns are inserted.To delete row or column by shortcut keysSelect the entire row/column you want to delete, if you want to delete several rows/columns at once time, press Ctrl key to select them, then press Ctrl + - keys delete. |
|
| 21652. |
What is meant by the entry required field information ? |
| Answer» SIC info on a lead/contact/account/deal is certainly needed to reach out and pitch a product to a prospect. Also sometimes, to distinguish one lead from another, at least one key piece of info like the lead’s last name or so is required. That’s when the option of MAKING a field mandatory comes in handy.By making a field required, you can collect the most important information from your prospects, understand them better and eventually strike better conversations. In Freshsales, by default certain fields are mandatory across different entities. For,Lead: Last name and Company nameContact: Last nameAccount: NameDeal: Name, Account Name and Deal valueThis property for the above fields can’t be modified. i.e: You NEED to key in a value for sure.Whereas, the other fields can be marked as required or not, based on your choice.You can make a field mandatory while creating or editing any ENTITY’s field under Admin Settings. Making a field required, mandates the user to enter a value while saving a record.This feature is AVAILABLE for Lead, Contact, Account and Deal fields. | |
| 21653. |
Frequency and baud rate determination in data transmission |
|
Answer» n telecommunication and electronics, baud (/bɔːd/; symbol: Bd) is a common MEASURE of symbol rate, one of the COMPONENTS that determine the speedof COMMUNICATION over a data CHANNEL. ... If there are only two symbols in the system (typically 0 and 1), then baud and bits per second (bps) are equivalent. |
|
| 21654. |
Formula to calculate entropy calculation for ecg signal |
|
Answer» s THETE is a web NAMED CALCULAROR SOUP on that you can calculate it please THANKS and MARK as branliest |
|
| 21655. |
What are the three broad areas influenced by self management |
|
Answer» ity, Self- Awareness, and Stress management are three broad areas which influenced by self-management. Explanation: Positivity: Having a Long term and short-term goal is first to STEP to develop a positive OUTLOOK. We have to achieve a constant stream of positivity. Self – Awareness: Understand your own behavior is one of the IMPORTANT skills. We all have to learn ourselves from an objective standpoint. Stress-Management: Our life is ruined by stress. It destroyed our energy. So, we have to control our stress. To control the stress we have to take time and keep a deep breath for EFFECTIVE results.Learn more about self-managementhow self management is DIFFERENT from management brainly.in/question/1032837618. How do people work on self management through self monitoring brainly.in/question/10813631 |
|
| 21656. |
Each e-mail address contain a storage area that is called |
|
Answer» mail address contain a storage AREA CALLED mailbox...HOPE HELPED |
|
| 21657. |
Different formulae of distance when frequency is given |
| Answer» NT to ASK write it CLEARLY dont COMPLICATE it | |
| 21658. |
AIM AND OBJECTIVE FOR COMPUTER PROJECT |
|
Answer» ective of the data security work in the maintenance organisation is to SAFEGUARD the UNINTERRUPTED USE of data systems and data network that are IMPORTANT to the uses of maintenance organisation, to prevent the unauthorised use of data and data systems, the unintentional or deliberate destruction or DISTORTION |
|
| 21659. |
Why analog signal is better than digital signal in communication systems? |
|
Answer» signal is a CONTINUOUS signal which represents PHYSICAL measurements. Digital SIGNALS are discrete time signals generated by digital modulation. ... There is no guarantee that digital signal processing can be done in real time and CONSUMES more BANDWIDTH to carry out the same information. |
|
| 21660. |
Who invented harddisk and when ?Give other nqme of hard disk? |
|
Answer» B. JOHNSON invented first HARD disk in September, 1956 Name - IBM |
|
| 21661. |
When performing subtraction by addition in the two's complement system the menu and is left in its original form and the subtrahend is changed to its two's complement? |
|
Answer» tics (from Greek μάθημα máthēma, "knowledge, study, learning") includes the study of such topics as quantity,[1]structure,[2] SPACE,[1] and CHANGE.[3][4][5]Mathematicians seek and use patterns[6][7] to formulate new CONJECTURES; they resolve the truth or falsity of conjectures by mathematical proof. When mathematical structures are good models of real phenomena, then mathematical reasoning can provide insight or predictions about NATURE. Through the use of abstraction and logic, mathematics developed from counting, calculation, measurement, and the systematic study of the shapes and motions of physical objects. Practical mathematics has been a human activity from as far back as written records exist. The research required to solve mathematical problems can take years or even centuries of sustained inquiry. |
|
| 21662. |
What is the difference between cell spcing and cell padding? |
|
Answer» sed to set SPACE between DIFFERENT table cells. It is the space between the content INSIDE the BOX and its BORDERS. |
|
| 21663. |
What is maximal length of acode word possible in a huffman encoding of an allhabet of n symbols? |
| Answer» METRES in LENGTH | |
| 21664. |
Software robots are capable of interacting with a wide range of systems. a. True b. False |
|
Answer» rue that software ROBOTS are capable of interacting with a wide range of systems.Based on this interacting with MULTIPLE system, they PERFORM various tasks as FOLLOWS:. |
|
| 21665. |
Key differences between traditional file organization and data file organization |
|
Answer» aditional FILE organization the data is structure properly(the thigher CHANCES of duplicacy) Whereas data file organization ALWAYS has in its STRUCTURED and well organised manner.(the chances of duplicacy is MINIMUM) |
|
| 21666. |
Diff between contrast stretching and histogram equalization |
|
Answer» t stretching is all about increasing the difference between the maximum intensity value in an image and the minimum one. All the rest of the intensity values are spread out between this RANGE. There EXISTS a one-to-one relationship of the intensity values between the source image and the target image i.e., the original image can be restored from the contrast-stretched image.Histogram equalization is about MODIFYING the intensity values of all the pixels in the image such that the histogram is "flattened" (in reality, the histogram can't be EXACTLY flattened, there would be some peaks and some valleys, but that's a practical PROBLEM). Once histogram equalization is performed, there is no way of getting back the original image. |
|
| 21667. |
Explain about it systems and their impact on innovation |
| Answer» | |
| 21668. |
Define paging and explain its working principle with a suitable example |
|
Answer» Paging is a memory-management scheme that removes the requirement of contiguous allocation of PHYSICAL memory. Address mapping is used to maintain the illusion of contiguity of the virtual address space of a process despite its discontiguous placement in physical memory.Physical memory is broken into fixed-size blocks called frames. Logical memory is also broken into blocks of the same size called PAGES. When process is to be executed, its pages are loaded into any AVAILABLE memory frames from the backing store. The backing store is divided into fixed-sized blocks that are of the same size as the memory frames.The hardware support for paging is shown in fig. 2.11. every address generated by the CPU is divided into two parts – a page number (p), a page offset (d). The page number is used as an index into a page table. The page table contains the base address of address of each page in physical memory. The base address is combined with the page offset to define the physical memory address that is sent to the memory UNIT. |
|
| 21669. |
Difference between distributeddos nos and middleware os |
|
Answer» Network and Distributed OPERATING SYSTEMS have a common hardware base, but the difference LIES in software. ... A distributed operating system is an ordinary centralized operating system but RUNS on multiple independent CPUs. 2. Environment users are aware of multiplicity of machines. |
|
| 21670. |
Clickstream analysis is associated with which characteristics of big data mcq |
|
Answer» ndor solutions provide a rich set of clickstream data. Clickstream data are a detailed LOG of how participants navigate through the Web site during a task. The log TYPICALLY includes the pages visited, time spent on each page, how they arrived on the page, and where they went next. From an aggregate perspective, clickstream data provide tremendous insights into how easily the site is navigated, what pages are causing the greatest confusion, and what pages are critical in REACHING a desired destination.There's not a lot of preparation to do with clickstream data as you might have with other data. In our experience, it's usually easier to ANALYZE clickstream datawithin the vendor tools themselves because of superior visualization techniques. Figure 5.6 is an example from Keynote's WebEffective tool of how participants navigated to the Punta Cana beach resort on the www.clubmed.comWeb site. You might notice that 4 out of 13 participants went from the home page to the village finder, whereas 7 participants went straight from the home page to the Punta Cana resort OVERVIEW page. |
|
| 21672. |
Advantage and disadvantage of computer system architecture |
| Answer» TE Good morning Here is your answer Computers have both ADVANTAGES and disadvantages. On one hand, they allow us to access the WEALTH of INFORMATION that is available on the internet. They also allow us to analyze MASSIVE amounts of data very quickly, saving both time and money. | |
| 21673. |
Which is the switch that is used to make sure that the copy comand copied file correctly? |
|
Answer» king /V ( verifies that the COPY COMMAND copied file correctly). I hope this HELPED you |
|
| 21674. |
The operator used to get value at address stored in a c- programming pointer variable is |
| Answer» TOR if ADDRESS is a , then VALUE at address WOULD be *a | |
| 21675. |
Recurrent network can input sequence of data points and produce a sequence of output. a. True b. False |
| Answer» NT NETWORK can INPUT sequence of DATA points and profuse a sequence of output so that is true | |
| 21678. |
Application of laplace transform in signal analysis |
|
Answer» main techniques in signal processing, convolution and Fourier ANALYSIS, teach that a linear system can be completely understood from its IMPULSE or frequency response. ... The LAPLACE transform is a technique for analyzing these special SYSTEMS when the signals are continuous. |
|
| 21679. |
What are similarities telephone and mobile |
| Answer» TALK in MOBILE we can SEE each other but not in TELEPHONE | |
| 21680. |
How did people communicate when there were no mobile and telephone |
|
Answer» ephone came about becausethey were trying to improve the capabilities of the telegraph. After thetelephone was invented, wealthy individuals and large corporations primarily used it as a means ofcommunications between specific LOCATIONS. ... Many PHONES would go to a DOCTOR's OFFICE, police station or to a bank. |
|
| 21681. |
What is cpu ????????????☺☺☺☺☺ |
|
Answer» e>>>>>..here is u r answerCPU (pronounced as separate letters) is the abbreviation for central processing unit. SOMETIMES referred to SIMPLY as the central processor, but more COMMONLY called processor, the CPU is the brains of the computer where most calculations take place. In terms of computing power, the CPU is the most important element of a computer system. |
|
| 21682. |
Advantages of mt8870 decoder compared to other decoders |
|
Answer» ️♦️♦️♦️Hi Mite ♦️♦️♦️♦️♦️♦️♦️^_^:-(:-(:-(:-(:-(:-(:-(:-(Your ANSWER :-):-):-):-):-):-):-):-):-)::-):-)$$$${{{{{{{{{{. The MT8870D/MT8870D-1 is a complete DTMF receiver integrating both the bandsplit filter and digital decoder functions. The filter section uses switched CAPACITOR techniques for high and low group FILTERS; the decoderuses digital COUNTING techniques to detect and decode all 16 DTMF tone-pairs into a 4-bit code. }}}}}}}$$$$$$$$£££££&&&&&&&&&&+££Hope Help your ££££££&&&&&&&&&+£££??????????????????????????????????????????????????????????????????????????????????????????? |
|
| 21683. |
Wrtie any 5 internet safety security |
|
Answer» net safety SECURITY are.......1. Keep Personal INFORMATION Professional and Limited2. Keep Your Privacy Settings On3. Practice SAFE Browsing4. MAKE Sure Your Internet Connection is Secure5. Be Careful What You Download |
|
| 21684. |
How do you launch a spreadsheet |
|
Answer» it will HELP you |
|
| 21685. |
Create a valid Xml document that satisfies the following : 1.) root element is 'quiz'. 2) .quiz contains the elements 'title' and' item' 3)item contains one more element. 4)item contains one question and four answers tags Please help me!!! |
| Answer» TION:mdukyckgcykckcylcuoxpydp | |
| 21686. |
When is slidesorter view useful for viewing a presentation |
|
Answer» orter view is useful while rearranging the position of SLIDES one after the other. It is also useful while applying AUTOMATIC TIMINGS to the slides and while ADDING transitions |
|
| 21687. |
You need to connect a desktop computer to a WLAN using the strongest encryption type possible. Which of the following provides the strongest encryption |
| Answer» | |
| 21688. |
Important concept on e-mail chapter class9 |
|
Answer» oard you are. |
|
| 21689. |
Java programming loops |
|
Answer» a while LOOP is a CONTROL flow statement that executes a part of the PROGRAMS repeatedly on the basis of given BOOLEAN condition. The Javado while loop is a control flow statement that executes a part of the programs at least once and the further execution depends upon the given boolean condition. |
|
| 21691. |
What is result of X, X-X++*2+3*--X, if X=5 |
|
Answer» Explanation:X=5 x =x++ it is post INCREMENT so we TAKE x as 5 X=5*2+3*- ‐x here is pre decrement so we USE the value of x =4 X=5*2+3*4=10+12=22 |
|
| 21692. |
Write a program in C++ to print the prime numbers between 100-200 |
|
Answer» e |
|
| 21693. |
What is Different Between HTML AND HTML5 |
| Answer» SIC differences in tags.HTML5 is visually more attractive than HTMLSome other additional features are included which are not there in the PREVIOUS VERSION | |
| 21694. |
Write a program in java to display all the buzz numbers in a range |
|
Answer» no. is one which either is DIVISIBLE by 7 or ends with 7class abc{VOID display(int start,int END){for(i=start,i<=end;i++){if(i%7==0 || i%10==7)System.out.println(N);}}}Hope it helps |
|
| 21695. |
Which attribute of tag is used to specify path of file to be sent to server? |
| Answer» | |
| 21696. |
How can we understand the term of 3d in spherical shape? |
| Answer» | |
| 21697. |
Full form of css ? anyone answer |
|
Answer» ═══════════════╕☬ YOUR ANSWER ☬╘═════════════════════╛CSS: CASCADING STYLE SHEET╒══════════════════════╕☬ THANKS! Regards ☬╘══════════════════════╛ |
|
| 21698. |
What are the precautions to be taken while entering data in a spreadsheet? |
| Answer» IMPORTANT precautions1. => while entering the date check its format whether it is DDMMYY or MMDDYY2. => before entering DATA, format all the cells where data entry NEEDS to be done, as there might be UNUSED formula or a macro which can fetch you unwanted RESULTS | |
| 21699. |
Where do you find the mail merge option in the writer? |
| Answer» ORDINARY MAIL CALLED SNAIL mail? | |
| 21700. |
While processing the hipaa data the cloud storing should be avoided a. True b. False? |
| Answer» MARK BRAINLIEST | |