Answer:
backup utility
Explanation:
If your organization hires a new employee, what would you do to create a user account in the Linux system and add the account to a group? What commands would you use? What configuration files would you check and modify?
Following are the responses to this question:
The user account is "olivia".In the Linux system to see the account go to the "/home directory".For the configuration file we use ".bash_logout , .bash_profile, and .bashrc" files.Creating users:
We will use the useradd command to achieve this. Using that same command, you can create users who would log in or customers who would log in (in the case of creating a user for a software installation).
In its basic form, the command is as follows:
[Options] useradd usernameTake this user olivia, for instance. Assuming that you had been to issue the command prompt:
olivia has become a user.Users are added to the system without the need for a home directory and are unable to log on. It if we were using this rather than running the command without arguments?
sudo using useradd -m oliviaUsing the command above, a new user would be created, including a home directory that corresponded to the username. That means that you might now see the name "olivia" in the directory "/home".
But what about the lockout concern that was raised earlier? Both these methods are possible. After creating the user, you can enter the following command:
Password for olivia is: sudo passwd oliviaYou'll be requested to enter & verify your new password once you've completed the process. This unlocks the user profile, allowing them to log in.
This command might look like if you wanted to accomplish it in one go:
sudo useradd -m olivia -p PASSWORDYou should be using Passcodes as the login for the user olivia.
As soon as the user logs in, he or she can update their account password by using the password command to input their current password, and afterward entering/verifying their new one.
To create a user that has no personal account and cannot log in, execute the following instructions:
sudo use useradd as the-M USERNAME sudo use usermod as the -L USERNAMEThe user to be added is identified by USERNAME.
It establishes a user with really no root folder and prevents them from signing in with a second operation.
To add an existing user to a group on Linux, follow the instructions:
As root, log in to your accountUse the useradd instruction to add a new user (for example, useradd roman)If you'd like to log on as a new customer, type su plus that user's name.Entering the word "exit" will logout you from your account.Another way to add a user to a group under Linux would be to use the following syntax:
Alternatively, you can use the usermod command.The name of the club should be substituted for example group in this sentence.Example username should be replaced with the name of the user you'd like added.The following operations are performed when a new login is added to the system.
The user's home directory (/home/username by default) is now created.To set configuration files for the user's session, the following secret files are copied into another user's home directory..bash_logout
.bash_profile
.bashrc
/var/spool/mail/username includes the user's mail spool.The new user account is arranged in groups with the same name.Learn more:
Linux system: brainly.com/question/13843535
hi, please help me, solution.
Answer:
error: incompatible types
Explanation:
Given
The attached code
Required
The output
Variable "a" is declared as float
While p is declared as a pointer to an integer variable
An error of incompatible types will be returned on line 3, int *p = a;
Because the variables are not the same.
To assign a to p*, we have to use type casting.
Hence, (b) is correct
111+ 11- 1
1111+1111
1101 +1101
1010-11
Answer: 121, 2222, 2202, 999
Explanation:
Answer:
a. 121
b. 2222
c. 2202
c. 999
Consider a DataFrame named df with columns named P2010, P2011, P2012, P2013, 2014 and P2015 containing float values. We want to use the apply method to get a new DataFrame named result_df with a new column AVG. The AVG column should average the float values across P2010 to P2015. The apply method should also remove the 6 original columns (P2010 to P2015). For that, what should be the value of x and y in the given code?
frames = ['P2010', 'P2011', 'P2012', 'P2013', 'P2014', 'P2015']
df['AVG'] = df[frames ].apply(lambda z: np.mean(z), axis=x)
result_df df.drop(frames, axis=y)
a. x = 1 y = 0.
b. x = 1 y = 1.
c. x = 0 y = 1.
d. x = 0 y = 0.
Answer:
x = 1 ; y = 1
Explanation:
The newly created AVG column will contain the mean value of all 6 columns(P2010, P2011, P2012, P2013, 2014 and P2015) this means that we are taking the mean across the columns as our AVG column have the same length as the initial lengtb of the data Frame as all a values in each index are averaged to create the new column. To achieve this the value 1 will be passed to the axis argument in the apply method.
To drop the previous 6 columns, we se the axis argument set to 1, this will delete the columns passed to the drop method.
Hence, both x and y values of the axis argument will take the value 1.
What is hacking? Why is hacking a concern for law enforcement?
Answer:
hacking is the act of exploitation, and is typically used to steal other people's account. It is a major concern because people can easily lose their account to hackers if they're too gullible, and the hacker can use their victims' accounts to purchase the things that they want with their victims' money.
3. Write a program that prompts the user to input an integer that represents cents. The program will then calculate the smallest combination of coins that the user has. For example, 27 cents is 1 quarter, 0 nickle, and 2 pennies. That is 27=1*25+0*5+2*1.
Answer:
The program in Python is as follows:
cents = int(input("Cents: "))
qtr = int(cents/25)
cents = cents -qtr * 25
nkl = int(cents/5)
pny = cents -nkl * 5
print(qtr,"quarters,",nkl,"nickels,",pny,"pennies")
Explanation:
This gets input for cents
cents = int(input("Cents: "))
This calculates the quarters in cents
qtr = int(cents/25)
This gets the remaining cents
cents = cents -qtr * 25
This calculates the nickel in remaining cents
nkl = int(cents/5)
This calculates the pennies in remaining cents
pny = cents -nkl * 5
This prints the required output
print(qtr,"quarters,",nkl,"nickels,",pny,"pennies")
Define a generic function called CheckOrder() that checks if four items are in ascending, neither, or descending order. The function should return -1 if the items are in ascending order, 0 if the items are unordered, and 1 if the items are in descending order. The program reads four items from input and outputs if the items are ordered. The items can be different types, including integers, strings, characters, or doubles. Ex. If the input is: bat hat mat sat 63.2 96.5 100.1 123.5 the output is: Order: -1 Order: -1
Answer and Explanation:
Using javascript:
/*This function checks only for ascending order. This function cannot check ascending orders for strings, just integers or floats.*/
function CheckOrder(){
var takeinput= prompt("please enter four numbers")
var makeArray= takeinput.split("");
var numArray= new Array(4);
numArray= [makeArray];
var i;
for(i=0; i<=numArray.length; i++){
var nowElem= numArray[i];
if(numArray[1]){
Alert("let's check to see");
}
else if(
nowElem > numArray[i--]){
Alert("might be ascending order");
if(numArray[i]==numArray[2]){
var almosthere=numArray[2]
}
else if(numArray[i]==numArray[3]){
var herenow=numArray[3];
if(almosthere>herenow){
Alert("numbers are in ascending order");
}
}
}
else(
Console.log("there are no ascending orders here")
)
}
The function above can further be worked on to also check for descending order of four numbers(can also be further developed to check for strings). You need just tweak the else if and nested else if statements thus :
else if(
nowElem < numArray[i--]){
Alert("might be descending order");
if(numArray[i]==numArray[2]){
var almosthere=numArray[2]
}
else if(numArray[i]==numArray[3]){
var herenow=numArray[3];
if(almosthere<herenow){
Alert("numbers are in descending order");
}
}
}
Describe the purpose of shell scripts. Provide one example to reflect the use of variables, constructs, or functions.
Answer:
Kindly check explanation
Explanation:
Shell scripts are used for writing codes which may involve writing together a complete set of task in a single script. These set if codes or instructions could be run at once without having to run this program one after the other on a command line. This way it avoid having to repeat a particular task each time such task is required. As it already combines a sequence of command which would or should have been typed one after the other into a compiled single script which could be run at once.
A shell script could be written for a control flow construct :
if [expression]
then (command 1)
else (command 2)
.....
Microsoft created Adobe Photoshop? TRUE FALSE
Answer:
false the creator of adobe photoshop was microsoft adobe photoshop is a popular photo editing software which was developed by a company named as adobe inc.
Answer:
Photoshop is created by Adobe, and Adobe is an independent company started by Jhon Warnockand.
A new PKI is being built at a company, but the network administrator has concerns about spikes of traffic occurring twice a day due to clients checking the status of the certificates. Which of the following should be implemented to reduce the spikes in traffic?
A. CRL
B. OCSP
C. SAN
D. OID
Answer:
Option A (CRL) is the right answer.
Explanation:
Certificates with respective expiration date canceled mostly by CA generating or providing them, then it would no longer be tolerated, is considered as CRL.CRL verification could be more profitable for a platform that routinely manages several clients, all having pronouncements from a certain CA, because its CRL could be retrieved once per day.Other given choices are not connected to the given scenario. So Option A is the right one.
5. When you send your email to a bad address it may come back as a:
spam email
server email
bounced email
hypertext email
SAVE & E
Answer:
The answer is a bounced email
John downloaded the manual for his TV, called manual-of-tv.pdf, from the manufacturer's website. After he clicked twice on the document he was informed by Windows that the file could not be opened. Which software must John install to solve the problem?
Jhon must download third party pdf viewer softwares to open the .pdf file.
For example
Adobe Acrobat Reader
Must click thanks and mark brainliest
Essay on "Impact of Digitalization"
Answer:
Digitization has a proven impact on reducing unemployment, improving quality of life, and boosting citizens' access to public services. Finally, digitization allows governments to operate with greater transparency and efficiency
The term __________ denotes data that is being stored on devices like a universal serial bus (USB) thumb drive, laptop, server, DVD, CD, or server. The term __________ denotes data that exists in a mobile state on the network, such as data on the Internet, wireless networks, or a private network. A. data in transit, data on record B. data at rest, data in transit C. data in transit, data at rest D. data on record, data in motion
Answer:
B. data at rest, data in transit
Explanation:
A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to effectively and efficiently create, store, modify, retrieve, centralize and manage data or informations in a database. Thus, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.
Generally, a database management system (DBMS) acts as an intermediary between the physical data files stored on a computer system and any software application or program.
Data at rest refers to a form of data that is stored on devices such as; a universal serial bus (USB) thumb drive, laptop, server, DVD, CD, or server.
Data in transit is simply any data that exists in a mobile or dynamic state on the network, such as data on the Internet, wireless networks, or a private network.
slide transition can be defined as ____ of one slide after another
Answer:
visual effect
Explanation:
A slide transition is the visual effect that occurs when you move from one slide to the next during a presentation. You can control the speed, add sound, and customize the look of transition effects.
what is the difference between system software and application software
Explanation:
System software is meant to manage the system resources. It serves as the platform to run application software. Application software helps perform a specific set of functions for which they have been designed. Application software is developed in a high-level language such as Java, C++, .
Explanation:
Hope it's the write answer
Create union floatingPoint with members float f, double d and long double x. Write a program that inputs values of type float, double and long double and stores the values in union variables of type union floatingPoint. Each union variable should be printed as a float, a double and a long double. Do the values always print correcly? Note The long double result will vary depending on the system (Windows, Linux, MAC) you use. So do not be concern if you are not getting the correct answer. Input must be same for all cases for comparison Enter data for type float:234.567 Breakdown of the element in the union float 234.567001 double 0.00000O long double 0.G0OO00 Breaklo n 1n heX float e000000O double 436a9127 long double 22fde0 Enter data for type double :234.567 Breakdown of the element in the union float -788598326743269380.00OGOO double 234.567000 long double 0.G00000 Breakolon 1n heX float 0 double dd2f1aa0 long double 22fde0 Enter data for type long double:
Answer:
Here the code is given as follows,
#include <stdio.h>
#include <stdlib.h>
union floatingPoint {
float floatNum;
double doubleNum;
long double longDoubleNum;
};
int main() {
union floatingPoint f;
printf("Enter data for type float: ");
scanf("%f", &f.floatNum);
printf("\nfloat %f ", f.floatNum);
printf("\ndouble %f ", f.doubleNum);
printf("\nlong double %Lf ", f.longDoubleNum);
printf("\n\nBreakdown in Hex");
printf("\nfloat in hex %x ", f.floatNum);
printf("\ndouble in hex %x ", f.doubleNum);
printf("\nlong double in hex %Lx ", f.longDoubleNum);
printf("\n\nEnter data for type double: ");
scanf("%lf", &f.doubleNum);
printf("float %f ", f.floatNum);
printf("\ndouble %f ", f.doubleNum);
printf("\nlong double %Lf ", f.longDoubleNum);
printf("\n\nBreakdown in Hex");
printf("\nfloat in hex %x ", f.floatNum);
printf("\ndouble in hex %x ", f.doubleNum);
printf("\nlong double in hex %Lx ", f.longDoubleNum);
printf("\n\nEnter data for type long double: ");
scanf("%Lf", &f.longDoubleNum);
printf("float %f ", f.floatNum);
printf("\ndouble %f ", f.doubleNum);
printf("\nlong double %Lf ", f.longDoubleNum);
printf("\n\nBreakdown in Hex");
printf("\nfloat in hex %x ", f.floatNum);
printf("\ndouble in hex %x ", f.doubleNum);
printf("\nlong double in hex %Lx ", f.longDoubleNum);
return 0;
}
A hammer tool can only be used by one technician at a time to perform hitting. Accordingly, you have developed a Hammer class with a hit method. Objects of class Hammer are used to simulate different hammers, while threads are created to simulate users. Which situation needs to add the synchronized keyword to the hit method
Answer:
Explanation:
The synchronized keyword needs to be active on the hit method at any point where 2 or more threads (users) exists at any given moment. This is in order to prevent two or more users from trying to perform a hammer hit at the same time. This is what the synchronized keyword is used for. It prevents the more than one thread from calling the specific method at the same time. Instead it adds the action to a sequence so that the second thread calls the hit method only after the first thread's hit method finishes.
Which factors are involved in search engine optimization
Answer:
A Secure and Accessible Website.
Page Speed (Including Mobile Page Speed)
Explanation:
There must be security policies in place to set core standards and requirements when it comes to encrypted data.
a. True
b. False
Write a program that lets a user enter N and that outputs N! (N factorial, meaning N*(N-1)*(N-2)*..\.\*2*1). Hint:Use a loop variable i that counts from total-1 down to 1. Compare your output with some of these answers: 1:1, 2:2, 3:6, 4:24, 5:120, 8:40320.
Answer:
The program is as follows:
num = int(input("Number: "))
fact = 1
for i in range(1,num+1):
fact*=i
print(fact)
Explanation:
This gets integer input from the user
num = int(input("Number: "))
This initializes factorial to 1
fact = 1
The following iteration calculates the factorial of the integer input
for i in range(1,num+1):
fact*=i
This prints the calculated factorial
print(fact)
Type the correct answer in the box. Spell all words correctly.
Page scaling mode helps increase or reduce the size of the worksheet to fit within the set number of pages to be printed. Which option re-scales
a worksheet vertically?
To re-scale a worksheet vertically, select the number of pages in the height text box in the____group.
Answer:
Scale to fit.
Explanation:
The scale to fit group can be found in the page layout tab as it is used to deal with display of functionalities of a document and spreadsheet program. The scale to fit requires input in the width option which will dictate the width of the page in which to place the documents on. By specifying 1 for the width, this means that the document will be rescaled to fit on a single page. The automatic option may be selected for the height option which will allow the program to make an auto Decison in the shrinkage depending on the stated width value.
1. For this assignment you will print the steps for 8-bit by 8-bit multiplication.
2. Your program should read in two unsigned numbers from stdin, the first being the multiplicand and the second being the multiplier. Your program should verify that both values are within the range 0 to 255. If not, the program should print an appropriate error message and exit.
3. Your program should then initialize the simulated registers and echo the input values in decimal and also in binary.
4. Then your program should illustrate the eight steps required for multiplication using the same type of step diagrams as given in the lecture notes.
5. Finally, your program should print a check section that shows a summary of the multiplication in binary as well as in decimal. See the example below.
6. You may write your program in C, C++, or Java. If you choose to work in C, here is an example function that will allow you to represent an n-bit value within an int data type and print out the binary value in "length" bits. It uses the shift right operator and the bitwise and. (You can also choose to use unsigned int as the data type; since you are using only the lower 8 of the 32 bits in an int, there will be no apparent difference between using int and using unsigned int. However, if you choose to use char as the data type, you should use unsigned char to ensure that the compiler generates logical rather than arithmetic shifts.)
void prt_bin( int value, int length ){
int i;
for( i=(length-1); i>=0; i--){
if((value>>i)&1)
putchar('1');
else
putchar('0');
}
}
For example, if you declare acc as an int, then you could call prt_bin(acc,8) to print the 8-bit value in the accumulator.
You should format your output to exactly match the output below. 10% of the grade will be awarded for following the same format.
Sample Run is given below:
multiplicand: 33
multiplier: 55
c and acc set to 0
mq set to multiplier = 55 decimal and 00110111 binary
mdr set to multiplicand = 33 decimal and 00100001 binary
---------------------------------------------------
step 1: 0 00000000 00110111
+ 00100001 ^ add based on lsb=1
----------
0 00100001 00110111
>> shift right
0 00010000 10011011
---------------------------------------------------
step 2: 0 00010000 10011011
+ 00100001 ^ add based on lsb=1
----------
0 00110001 10011011
>> shift right
0 00011000 11001101
---------------------------------------------------
step 3: 0 00011000 11001101
+ 00100001 ^ add based on lsb=1
----------
0 00111001 11001101
>> shift right
0 00011100 11100110
---------------------------------------------------
step 4: 0 00011100 11100110
+ 00000000 ^ no add based on lsb=0
----------
0 00011100 11100110
>> shift right
0 00001110 01110011
---------------------------------------------------
step 5: 0 00001110 01110011
+ 00100001 ^ add based on lsb=1
----------
0 00101111 01110011
>> shift right
0 00010111 10111001
---------------------------------------------------
step 6: 0 00010111 10111001
+ 00100001 ^ add based on lsb=1
----------
0 00111000 10111001
>> shift right
0 00011100 01011100
---------------------------------------------------
step 7: 0 00011100 01011100
+ 00000000 ^ no add based on lsb=0
----------
0 00011100 01011100
>> shift right
0 00001110 00101110
---------------------------------------------------
step 8: 0 00001110 00101110
+ 00000000 ^ no add based on lsb=0
----------
0 00001110 00101110
>> shift right
0 00000111 00010111
---------------------------------------------------
check: binary decimal
00100001 33
x 00110111 x 55
---------------- ------
0000011100010111 1815
Answer:
Code:
#include<bits/stdc++.h>
using namespace std;
char* prt_bin( int value, int length, char s[]){
for(int i=(length-1); i>=0; i--){
if((value>>i)&1) {
s[length-1-i] = '1';
// putchar('1');
}
else {
s[length-1-i] = '0';
// putchar('0');
}
}
s[length] = '\0';
return s;
}
int main(){
int nbits = 8, c, acc;
char s[nbits+1];
int multiplicand, multiplier, mq, mdr;
cout<<"Multiplicand: ";
cin>>multiplicand;
cout<<"Multiplier: ";
cin>>multiplier;
if(multiplier<0 || multiplier>255 ||multiplicand<0 || multiplicand>255){
cout<<"Given Multiplicand or multiplier is incorrect. Exiting the program.\n";
return 0;
}
c = 0; acc = 0;
cout<<"c and acc set to 0\n";
mq = multiplier;
mdr = multiplicand;
cout<<"mq set to multiplier = "<<multiplier<<" decimal and "<<prt_bin(multiplier, nbits, s)<<" binary\n";
cout<<"mdr set to multiplicand = "<<multiplicand<<" decimal and "<<prt_bin(multiplicand, nbits, s)<<" binary\n";
printf("---------------------------------------------------\n");
for(int i=1;i<=nbits;i++){
printf("step %d: %d %s ",i, c, prt_bin(acc, nbits, s));
printf("%s\n",prt_bin(mq, nbits, s));
char lsb = s[nbits-1];
if(lsb=='1'){
printf(" + %c %s ^add based on lsb=%c\n", c, prt_bin(mdr, nbits, s), lsb);
printf(" ----------\n");
acc = acc + multiplicand;
}
else{
printf(" + %c %s ^no add based on lsb=%c\n", c, prt_bin(0, nbits, s), lsb);
printf(" ----------\n");
}
printf(" %d %s ", c, prt_bin(acc, nbits, s));
printf("%s\n",prt_bin(mq, nbits, s));
printf(" >> shift right\n");
mq = mq>>1;
if(acc%2==1){
mq = mq+128;
}
acc = acc>>1;
printf(" %d %s ", c, prt_bin(acc, nbits, s));
printf("%s\n",prt_bin(mq, nbits, s));
printf("---------------------------------------------------\n");
}
char sr[nbits*2+1];
printf("check: binary decimal\n");
printf(" %s %d\n", prt_bin(multiplicand, nbits, s), multiplicand);
printf(" x %s x %d\n", prt_bin(multiplier, nbits, s), multiplier);
printf(" ---------------- ------\n");
printf(" %s %d\n", prt_bin(multiplier*multiplicand, nbits*2, sr), multiplier*multiplicand);
return 0;
}
How does Accenture view automation?
Answer:
The description of the given question is summarized below.
Explanation:
These organizations retrained, retooled, and empowered our employees amongst all organization's internal management operating areas throughout order to create an increased automation attitude.Accenture's Innovative Software department was indeed adopting a concept called Human Plus technology, which includes this type of training.How to create a network of relevant prospects?
Answer:
By connecting with industry-specific and relevant prospects.
Now with 760 million+ people, how can you find the most relevant people to connect with? The answer is: With the help of LinkedIn automation tools.
There are a number of best LinkedIn automation tools that come with advanced search filters to help you refine your target audience. These LinkedIn automation tools have special operators that help users find and reach even the most difficult leads.
However, there is a drawback. These LinkedIn automation tools can cause spam if you send thousands of connection requests or messages in a short time.
Moreover, if you send templated connect notes or messages, you’re likely to get a very low or almost zero acceptance and response rate.
5. A student wants to send a picture to the printer, how should they
send it?
a. 0,99,0
b. -65, 10, 5,0
c. 115, 118,0
d. #584504
Answer:
d
Explanation:
is a security design principle to direct the selection of control layers for an organization's computing enclave to ensure its resilience against various methods of attack. This also reduces the likelihood of a single point of failure in the security of the overall system.
Answer:
Defense in Depth (DiD).
Explanation:
Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.
Defense in Depth (DiD) can be defined as a concept or framework in cyber security that typically involves the process of layering multiple defensive mechanisms and security control throughout an information technology (IT) system, so as to prevent data theft or an unauthorized access to user data.
Basically, this cyber security technique is designed such that when a layer of the defensive mechanism fails, another security layer step in to mitigate and prevent the attack. Thus, it causes redundancy when an attacker exploits a vulnerability in a system, a breach of security or when one of the security layers fail.
A security analyst recommends implementing SSL for an existing web service. A technician installs the SSL certificate and successfully tests the connection on the server. Soon after, the help desk begins receiving calls from users who are unable to log in. After further investigation, it becomes clear that no users have successfully connected to the web server since the certificate installation. Which of the following is MOST likely the issue?
A. DA Incorrect firewall rules are blocking HTTPS traffic.
B. Users are still accessing the IP address and not the HTTPS address.
C. DC Workstations need an updated trusted sites list.
D Users are not using tokens to log on.
Company A has a project plan for a new product under development. The product will be one of many released in the coming year. The plan, if disclosed, might give Company A's competition a market advantage. Which ISO 27002 classification level is most likely assigned to this document?
a) Public Documents
b) Proprietary
c) Highly Confidential
d) Top Secret
Answer:
Company A
The ISO 27002 classification level that is most likely assigned to this document is:
b) Proprietary
Explanation:
The ISO 27002 classification levels adopted by commercial organizations are Restricted (top secret is preferred in government circles), Confidential, Internal (or proprietary), and Public. Since the new product is under development, one of many, and most likely known to the project team, the project plan will be classified as Proprietary. Company A designates this document as Proprietary or Internal to show that disclosure of the information to its competitors is not allowed. This level of classification shows that Company A can establish intellectual property rights over the document.
CONDUCT INTERVIEWS
Using your interview questions, interview at least three business professionals. Here are some useful tips for conducting the interviews:
Schedule an appointment for the interview for a time and place that is quiet and convenient.
Be on time and be prepared with paper and pen. You may also bring a recording device.
Be friendly and courteous; remember that the interviewee is giving you her valuable time!
Ask your questions clearly.
Don't interrupt!
Try to stay focused, but if something interesting comes up, go with it.
Take good notes. Ask the interviewee to repeat what she said if necessary, but only do this when it is something important.
Obtain all the information needed before ending the interview. If necessary, review your notes with the person.
Thank the interviewee for her time.
Write a description of the interviews in this text box.
Note that conducting a professional interview with business professionals is quite tasking and it does require skills and boldness,
Note that the questions that one need to ask are questions that are based on the field of those business professionals, the company, your background, their dreams and aspirations and as such one should not be personal about it.
What are the interview questions asked?The interview questions prepared were:
Do they have the skills, expertise, and experience to carry out the job?.Are they happy and interested in current job and the current firm they are working with?.Can I fit into their team, organization culture, and firm?. etc.Learn more about interview from
https://brainly.com/question/8846894