Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

23851.

This question is from coursera-programming assignment- it would be very helpful if someone help me with this question Run your program with the earthquake input file "quiz2.atom". There is a commented out line of code in the setUp method in EarthquakeCityMap that you can uncomment to make this happen: earthquakesURL = "quiz2.atom"; Call sortAndPrint as appropriate to answer the following question. What is the strongest magnitude that is repeated three or more times in the data set?

Answer»

set of this app is not WORKING almost all the BEST regards the happy hour at the time of the petitioner was sent to you soon best regards the happy hour at the time of the petitioner was sent to you soon best regards the happy hour at the time of the petitioner was sent to you soon best regards the happy hour at the time of the petitioner was sent to you soon best regards the happy hour at the time of the petitioner was sent to you soon best regards the happy hour at the time of the petitioner was sent to you soon best regards the happy hour at the time of the petitioner was sent to you soon best regards the happy hour at the time of the petitioner was sent to you soon best regards the happy hour at the time to network is not coming up in a app please send US your mother ggh the petitioner was sent to me that the

23852.

Write a program in Java to accept a sentence in lower case. Convert first letter of each word of the sentence in upper case. Display the newsentence so formed.Sample Input: we are in cyber worldSample Output: We Are In Cyber World(ICSE 2018)​

Answer»

// JAVA program to convert first CHARACTER // uppercase in a sentence class GFG { static String convert(String str) { // Create a char array of given String char ch[] = str.toCharArray(); for (int i = 0; i < str.length(); i++) { // If first character of a word is found if (i == 0 && ch[i] != ' ' || ch[i] != ' ' && ch[i - 1] == ' ') { // If it is in lower-case if (ch[i] >= 'a' && ch[i] <= 'z') { // Convert into Upper-case ch[i] = (char)(ch[i] - 'a' + 'A'); } } // If apart from first character // Any one is in Upper-case ELSE if (ch[i] >= 'A' && ch[i] <= 'Z') // Convert into Lower-Case ch[i] = (char)(ch[i] + 'a' - 'A'); } // Convert the char array to equivalent String String st = new String(ch); return st; } public static void main(String[] args) { String str = "we are in cyber WORLD"; System.out.println(convert(str)); } }

23853.

Convert hexadecimal to decimal number (2b3)16

Answer»

hi...EXPLANATION:(2B3)16=(691)10#hope it HELPS youplease MARK brainliest

23854.

Convert 789into binary number

Answer»

The base-10 value of 78910 is equal to base-2 value of 11000101012....DECIMAL 789 to BINARY Conversion.Decimal Binary Hex789.5 1100010101.1 315.8790 1100010110 316790.5 1100010110.1 316.8791 1100010111 317

23855.

* Explain the different network deterioration inany normal network​

Answer»

Network degradation REFERS to a decrease in connectivity and response speed throughout a given network. Analysis and diagnosis of this kind of DETERIORATION is often IMPORTANT for those maintaining DATA structures or other network-supported models, as well as for network functionality in GENERAL.

23856.

which of the following are empty and container tags . option Font, Basefont, BR, center, H1,H1,to H6,HR​

Answer»
is empty TAG and rest of the others are CONTAINER tags EXPLANATION:Please Mark me as BRAINLIEST
23857.

Convert 88 into binary number full solution

Answer» TION:Here is your ANSWER Hope This Answer HELPS You88 =1011000please mark me as brainliest
23858.

6. Which feature would you use if you want to change 'Bombay into 'Mumbai' in the whole text?(a) Cut and paste(b) Copy paste(c)Find and replace(d) Search and change

Answer» WER is OPTION C that is find and replace by changing B to M
23859.

Write a short not onadobe Photoshop​

Answer»

Photoshop is Adobe's PHOTO editing, image creation and graphic design software. The software PROVIDES many image editing FEATURES for RASTER (pixel-based) images as well as vector graphics. It uses a layer-based editing system that enables image creation and ALTERING with multiple overlays that support transparency.

23860.

What are the timitation of a computer

Answer»

tion:A COMPUTER's main limitation is its PROGRAMMING which is limited by the capabilities the hardware possesses. Physical limitations of a computer are the AMOUNT of RAM and storage it can ACCESS, the type and speed of the CPU and other low-level system devices.

23861.

10.2 edhesive question 2 Python

Answer» HI....EXPLANATION:your QUESTION is incomplete PLEASE send clearlyRegards
23862.

Youngsters may have aspiration ___________________ stress.

Answer»

with a LOT of ..................................

23863.

Coaxial /telephone cable sends ---------signal during data transmission .

Answer»

High frequencyExplanation:COAXIAL /TELEPHONE cable SENDS high frequency signal during DATA transmission

23864.

What is the base / radix of hexadecimal number ​

Answer» 16 ...................(0-9A-F) .....................
23865.

How to install iOS 14 in android phone by only using play store​

Answer» G the app in the PLAY store or ALSO by downloading it in play store or also in google
23866.

Write the different types of images which you can insert in KOMPOSER​

Answer» HI...EXPLANATION:You can INSERT :GIFJPEGBMPPNG#hope it helps youplease mark BRAINLIEST
23867.

How to share files from iOS to Android​

Answer»

r files from iOS to AndroidDownload SHAREit app on both devices from the RESPECTIVE app stores.On Android, open SHAREit and tap on RECEIVE option.If no WiFi network is AVAILABLE, SHAREit will create its own WiFi HOTSPOT (WiFi Direct).Once the hotspot is started, on your iOS device, go to Settings >> Wi-Fi.

23868.

What is ethical hacking​

Answer»

The term "white hat" in Internet slang REFERS to an ethical computer hacker, or a computer security EXPERT, who SPECIALIZES in penetration testing and in other testing methodologies that ensures the security of an organization's information systems. mark as brainliest......

23869.

Collect information about network service provider in your area​

Answer»

AT&T. Available in 21 states. ...CenturyLink. Available in 35 states. ...COX. Available in 19 states. ...FRONTIER. Available in 25 states. ...HughesNet. Available in all 50 states. ...Spectrum. Available in 41 states. ...VERIZON Fios. Available in eight states. ...Xfinity.

23870.

Write down the steps to start Adobe Photoshop​

Answer»

Create a New DOCUMENT in PHOTOSHOP Elements 9Open Elements and select an editing mode. Click Edit (Start from SCRATCH on the Macintosh) on the Welcome screen.Choose FILE→New→Blank File in any workspace or press Ctrl+N (cmd+N). ...Select the attributes for the new file. ...Click OK after SETTING the file attributes to create the new document.

23871.

Q.3 Answer the following question: a) Write the steps how to add images and videos in WindowsMovie Maker.​

Answer»

use piccaso SOFTWARE to ANIMATE, slideshow your IMAGE or VIDEOS.

23872.

State two situations in which speech recognition devices may be useful as a method of data entry

Answer» 1. automated IDENTIFICATION 2. REMOVING ivr menusExplanation:hope it's HELP you
23873.

Advantages of unguided media​

Answer»

Advantages:1.use for long DISTANCE communication.2.high SPEED DATA transmission.3.many RECEIVER stations can receive signals from same sender station.

23874.

What is the license key for grand theft auto 4 please please please please please please please please

Answer» HELPS you PLS MARK ME AS BRAINLIEST
23875.

Write T for True and F for False. 1) By default, MS Word does not check spelling and grammar errors.2) The spelling and grammar tool is found under the Review tab.3) You cannot add a new word to the dictionary of MS Word.4) The thesaurus feature of MS Word gives a list of only synonyms.​

Answer» 2 True3 FALSE4 FALSE
23876.

What is the base/ radix of decimal number​

Answer»

In a positional numeral system, the radix or base is the number of UNIQUE digits, INCLUDING the digit zero, USED to represent NUMBERS. For example, for the decimal/denary system (the most common system in use today) the radix (base number) is ten, because it uses the ten digits from 0 through 9.

23877.

Udent CampulWoolwheelsTopic Namesthe pure / Nadalg Dock​

Answer» PLZ TELL PROPERLY FRIEND
23878.

Define the following terms: i)open source softwareii) Proprietary softwareiii)Freeware software​

Answer»

urce software:- OPEN source software is software with source code that ANYONE can inspect, modify, and enhance.Proprietary software:- software that is not open source or FREELY licensed.Freeware software:- the software that is freely available on INTERNET .

23879.

What is the internet? (1) Phone connections(2) Collection of computer networks(3) Network of computers in an office(4)None of the above​

Answer» TION:The ANSWER is 2 HOPE you LIKE it
23880.

What are components of world wide web

Answer»

tion:The CONTENT of the section is as follows:BASIC World-Wide Web MODEL.Universal Resource Identifies.Hypertext TRANSFER Protocol.Hypertext MARKUP Language.Interactive World-Wide Web Model.

23881.

What is a key and give examples

Answer»

A DBMS key is an attribute or set of an attribute which helps you to identify a row(tuple) in a RELATION(table). They allow you to FIND the relation between two tables. Keys help you uniquely identify a row in a table by a combination of one or more columns in that table. EXAMPLE: Employee ID.Explanation:

23882.

Shat is the base / RaderDecimal humber?​

Answer» UNDERSTAND the QUESTION...TYPE it CORRECTLY
23883.

Q2. Write the two uses of ICT in Education field? (2) *

Answer»

Explanation:1) Information and Communications Technology (ICT) can impact student learning when teachers are DIGITALLY literate and understand how to integrate it into curriculum.2) They ALSO help in communicating, CREATING , disseminating, STORING, and MANAGING information.

23884.

What do you mean by mobile operating system

Answer»

A mobile operating system is an operating system for mobile phones, TABLETS, SMARTWATCHES, 2-in-1 PCs (that can be convert to a laptop mode or detach and work as a tablet mode) or other mobile DEVICES. ... Thus traditional DESKTOP OS is now a minority used kind of OS; see USAGE share of operating systemHope it helps u pls mark it as the brainliest

23885.

What are the input of word processor

Answer»

I KNOW that the INPUT in computers are 1 and 0 MAYBE this is the answer

23886.

What is the difference between WHILE... WEND and DO UNTIL ? ​ PLEASE ANSWER AS FAST AS YOU CAN

Answer»

while MEANS do an action when your programm is running WEND go in a specified direction, typically slowly or by an indirect routeDo until , after do until there is GIVEN a SPECIFIC value ex.. do until 7:45. it means do it regularly for the specific value Explanation:plz mark me as a brainiliest plz plz

23887.

Writing an algorithm to display area of a square

Answer»

it will HELP you.....Explanation:Algorithm for calculating area of a square is as FOLLOWS:-Step 2 :- Accept as input, the length of the sides of the square, and STORE the value in variable a. Step 3 :- Calculate the area of the square (a*a) and store in a variable A. Step 4 :- DISPLAY the area of the square.

23888.

What are the steps to open gimp from school resource

Answer»

which STEPS you WANT my friendExplanation:TELL me FAST so I can tell you

23889.

Ripping refers to song from a CD to a computer

Answer»

pping a CD means to copy SONGS from the CD to a COMPUTER HARD DISK.

23890.

A user can force shut an application using the task manager​

Answer»

: USE THE KEY OF ALT F4 FOR CLOSING THE TAB OR APPLICATIONS SORRY IF IT IS NOT USEFUL

23891.

Give the use of hyperlink on a webpage.​

Answer»

tion:Hyperlink. A hyperlink is a word, PHRASE, or image that you can click on to jump to a new document or a new SECTION within the current document. Hyperlinks are found in nearly all Web PAGES, allowing users to click their way from PAGE to page. Text hyperlinks are often blue and UNDERLINED, but don't have to be.

23892.

What is a short-range wireless communication technology called? (1) Wi-Fi(2)Internet(3) Bluetooth(4)PS​

Answer»

internetINTERNET IS A SHORT RANGE WIRE LESS COMMUNICATION TECHNOLOGY

23893.

Discuss the types of a product based business​

Answer»

In product based, you set the price based on the features and FUNCTIONS that the CUSTOMER desires for their needs. Mostly the pricing of the product is considered standard and there is no sort of compensation on customer's demands UNLESS you decide to offer discount to them for a certain period.Explanation:HI guys PLEASE brainllieast me$$$$$

23894.

What is the difference between the product and service business​

Answer»

product SERVICE INCLUDES the trade of GOOD WHEREAS service is doing something without the involvement of any GOODS

23895.

Explain the different types of business activities​

Answer»

There are three main types of BUSINESS activities: OPERATING, investing, and financing. The cash flows used and CREATED by each of these activities are listed in the cash FLOW statement.#gundi....✌✌

23896.

What are the benefits of being entrepreneurship​

Answer»

7 benefits of being an entrepreneurYou SET your own schedule. ...You believe in what you do. ...Your workplace can vary. ...You're the boss. ...You get to see your work change lives. ...You BECOME a business leader. ...ExcitementExplanation:please MARK as BRAINLIEST ANSWERAND follow me plz

23897.

What is the difference between entrepreneurship and employment​

Answer»

Employees have to perform tasks ACCORDING their RESPECTIVE job PROFILES. Irrespective of their interest, they are forced to work in an alien environment. Entrepreneurs are not SPECIALIST. As they have to lead the group from the front, they perform general tasks.Explanation:PLEASE mark as branlist

23898.

An attempt to harm ,damage or cause threat to a system or network is broadly termed as:

Answer»

attack is a general term used to classify different computer & network ATTACKS or activities such as EXTORTION, identity theft, EMAIL HACKING, ETC.

23899.

Explain practical issues that an operating system may encounter in its attempt to accomplish the protections operations

Answer»

harry sada bhout khrab he. me navodeya ch study KARDA HA. I LOVE APPLE.

23900.

Write a program in java to input the marks of n students in the array marks[ ]. Now arrange the marks in descending order and display it.​

Answer»

This is a Java Program to Accept the Marks of a STUDENT into a 1D Array and find TOTAL Marks and PERCENTAGE. A one-dimensional array is, essentially, a list of like-typed variables.Enter the number of subjects and then enter marks if students in all those subjects. Now we us for loop to calculate total marks of the student and hence divide it by the total number of subjects to get percentage marks.Here is the source code of the Java Program to Accept the Marks of a Student into a 1D Array and find Total Marks and Percentage. The Java program is successfully compiled and run on a Windows system. The program output is also shown below. MARK AS BRAINIST,THANK,RATE AND FOLLOW MEGOD WILL ALWAYS HELP YOU