This isn't related to computers and when you look it up all it comes up with a Stars Wars.
 
        
             
        
        
        
Answer:
A good design brief often begins with some information about the client and what their brand stands for. Including this helps to connect an individual project with the bigger picture. Aim to capture key points about what the company does, how big they are, and what their key products or services are.
Explanation:
A good design brief often begins with some information about the client and what their brand stands for. Including this helps to connect an individual project with the bigger picture. Aim to capture key points about what the company does, how big they are, and what their key products or services are.
 
        
             
        
        
        
If you're doing an interview via phone I wouldn't suppose you would need to get dressed into anything specific. If it's going to be a video call, then you should at least wear something presentable  that the camera will see (that means you don't have to wear pants). 
Sorry, if you're looking for some specific answer then I can't help you. This question just kinda throws common sense out there and it's just your job to use it. 
        
                    
             
        
        
        
Answer:
The correct answer to the following question will be 2. the operator new.
Explanation:
New operator is used to allocating the memory to the instance object.The new object can be created by using a "new" keyword in java .
Syntax of using 'new' operator is :
class_name object_name=new class_name() // it allocated the memory to the class
For Example :
ABC obj = new ABC;  
Now, this time obj points to the object of the ABC class.
obj = new ABC ();
call the construction of ABC class
 
        
             
        
        
        
Answer:
A closed port that can not receive request from authorized users.
Explanation:
Networks comprises of end devices, routing and switching devices, servers, technical control devices etc. The communication and interconnection of these devices makes up a secure and resourceful network. 
Attackers can exploit loopholes in networks to steal information. The attackers uses the SYN scanning or cracking technique to implement the DOS or denial of service attack.
DOS is used to flood ports on a server in a network, preventing authorized user access, as they steal information to avoid detection.