This section includes 7 InterviewSolutions, each offering curated multiple-choice questions to sharpen your Current Affairs knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
What is the percentage of carbon in urea? (Atomic mass C = 12, H = 1, N = 14, O = 16)A. 0.2B. 0.266C. 0.0667D. 0.46 |
|
Answer» Correct Answer - A Molar mass of urea (i.e. `NH_(2)CONH_(2)`) `=2xx`atomic mass of N+4`xx`atomic mass of H+1`xx`atomic mass of O+1`xx` atomic mass of C. `=2xx14+4xx1+1xx16+1xx12=60` g As we know that, Percentage or mass % of an element `=("Mass of that element in the compound")/("Molar mass of the compound")xx100` `therefore` Percentage of C=`(1xx12)/60xx100=20%` |
|
| 2. |
Which of following bonds has maximum bond length?A. C -OB. C-HC. C-CD. C-N |
|
Answer» Correct Answer - B Since, C - H bond have less difference in their electronegativities as compared to C - O, C - C and C - N bonds. This results in less polarity of C - H bond and thus, have maximum bond length. |
|
| 3. |
Shalerite and siderite are the ores of the metalsA. Cu and FeB. Zn and CuC. Zn and FeD. Zn and Al |
|
Answer» Correct Answer - C Sphalerite is zinc sulphide (ZnS) while siderite is `FeCO_(3)` |
|
| 4. |
In the reaction, `C_(6)H_(5)COCH_(3)underset(Zn-Hg//conc.HCl)overset([H])toX,X` isA. tolueneB. methyl benzeneC. benzylalcoholD. ethyl benzene |
|
Answer» Correct Answer - D `underset("Acetophenone")(C_(6)H_(5)COCH_(3))underset(Zn-Hg//conc.HCl)overset(4[H])tounderset("Ethyl benzene")(C_(6)H_(5)CH_(2)CH_(3))` The above reaction is known as Clemmensen reduction. |
|
| 5. |
Which of the following is electron deficient ?A. `PH_(3)`B. `(BH_(3))_(2)`C. `(SiH_(3))_(2)`D. `(CH_(3))_(2)` |
| Answer» Correct Answer - B | |
| 6. |
Nucleophilic part of the reagent attacks the substrate `CH_(3)CH_(2)COCH_(3)` on the :A. carbon atom of carbonyl groupB. oxygen atom of carbonyl groupC. methyl groupD. `CH_(2)` group |
| Answer» Correct Answer - A | |
| 7. |
Stability of `overset(+)CH_(2)-CH=CH_(2)` can be explained by:A. inductive effectB. electromeric effectC. resonanceD. polar effect |
| Answer» Correct Answer - C | |
| 8. |
`S_(N^(1))` mechanism for the hydrolysis of an alkyl halide involves the formation of intermediate:A. free radicalB. carbocationC. carbanionD. none of these |
| Answer» Correct Answer - B | |
| 9. |
Write HTML tags to do the following : (i) Inserting a horizontal line in a web page. (ii) Inserting a line break |
|
Answer» (i) < HR> or <hr> (ii) < BR> or <br> |
|
| 10. |
In the `S_(N^(1))` reaction on chiral centres there is :A. `100%` racemizationB. inversion more than retention leading to partial racemizationC. `100%` retentionD. `100%` inversion |
| Answer» Correct Answer - B | |
| 11. |
Differentiate between base class and derived class. |
|
Answer» A base class is a class from which other classes are derived. The class that inherits is called derived class. The inheriting class is called the derived class. |
|
| 12. |
The stability of `Me_(2)C=CH_(2)` is more than that of `MeCH_(2)CH=CH_(2)` due to :A. inductive effect of the Me groupB. resonance effecta of the Me groupC. hypercojugative effect of the Me groupD. resonance as well as inductive effect of the Me group |
| Answer» Correct Answer - C | |
| 13. |
Which of the following statements is correct about a carbocation?A. It reacts with nucleophileB. It can undergo rearrangementC. It can eliminate `H^(+)` to form an olefinD. All are correct |
| Answer» Correct Answer - D | |
| 14. |
Which one of the following halogen compounds is difficult to be hydrolysed by `S_(N^(1))` mechanism?A. tert-Butyl chlorideB. Isopropyl chlorideC. Benzyl chlorideD. Chlorobenzene |
| Answer» Correct Answer - D | |
| 15. |
What is principle of duality? Give an example. |
|
Answer» The principle of duality states that starting with a Boolean relation, another relation can be derived by
For example, (X + Y’) dual is (X’. Y) |
|
| 16. |
Which of the following statements is correct?A. Allyl carbocation `(H_(2)C=CH-overset(+)CH_(2))` is more stable than propyl carbocationB. Propyl carbocation is more stable than allyl carbocationC. Both are equally stableD. None of the above |
| Answer» Correct Answer - A | |
| 17. |
State and prove involution law. |
|||||||||
|
Answer» This law states that the double complement of a variable gives the same variable.
|
||||||||||
| 18. |
Ammonia is iso-structural with:A. carbanionB. free radicalC. carbocationD. carbene |
| Answer» Correct Answer - A | |
| 19. |
Name any one web browser. |
|
Answer» The name of a web browser is Google Chrome. |
|
| 20. |
Arrange the following resonating structures in order of increasing stability `underset((I))(CH_(2)=overset(+)(N)=overset(-)(N))" "underset((II))(H_(2)overset(+)(C)=N=overset(-)(N))" "underset((III))(H_(2)overset(-)(C)-overset(+)(N) equiv N)" "underset((IV))(H_(2) overset(-)(C)-N=overset(+)(N))`A. I gt II gt IV gt IIIB. I gt III gt II gt IVC. II gt I gt III gt IVD. III gt I gt IV gt II |
| Answer» Correct Answer - B | |
| 21. |
In the following carbocation, `H//CH_(3)` that is most likely to migrate to the positve charged carbon is : `H_(3)overset(1)C-overset(H)overset(|2)underset(OH)underset("| ")"C"-underset(H)underset(3|)overset(+)C-overset(H)overset(|4)underset(""CH_(3))underset("| ")"C "-overset(5)CH_(3)`A. `CH_(3)` at C-4B. H at C-4C. `CH_(3)` at C-2D. H at C-2 |
| Answer» Correct Answer - D | |
| 22. |
Which of the following statements is not correct for a nucleophiles?A. Nucleophiles are not electron seekingB. Nucleophile attack low `e^(-)` density sitesC. Nucleophile is a Lewis acidD. Ammonia is a nucleophile |
| Answer» Correct Answer - C | |
| 23. |
Define bus topology. |
|
Answer» A bus topology consists of a central cable with a terminator at each end. All nodes (file server, workstations, and peripherals) are connected to the linear cable. |
|
| 24. |
Which one of the following statements wrong about `S_(N^(2))` reaction?A. The rate of reaction is independent of the concentration of nucleophileB. Nucleophilic attacks the carbon from the side opposite to where the leaving group is attachedC. Only in one step the bond formation and bond breaking takes placeD. The rate of reaction `prop` [substrate] [nucleophile] |
| Answer» Correct Answer - A | |
| 25. |
Expand the term URL. |
|
Answer» Uniform Resource Locator. |
|
| 26. |
What is a database? |
|
Answer» A database is a collection of large amount of related data. In other words, It is a collection of database tables. |
|
| 27. |
Mention any one advantage of pointers. |
|
Answer» The advantage of pointer is memory can be allocated or deallocated dynamically. |
|
| 28. |
In internal combustion petrol/diesel engines, only cyclic processes are used, because:A. Cyclic process have more efficiency as compared to non-cyclic processB. Cyclic process can provide the work continuouslyC. in the cyclic proces, heat loss is relatively lessD. in cyclic process process fuel consumption is less than that for non-cyclic process |
|
Answer» Correct Answer - B Cyclic process can provide the work continuously |
|
| 29. |
write any two applications of array |
Answer»
|
|
| 30. |
What is the significance of scope resolution operation in C++? |
|
Answer» The operator :: known as scope resolution operator helps in defining member function outside the class. |
|
| 31. |
What is a class? |
|
Answer» A class is a structured data type in C++ which is a collection of variables and functions. |
|
| 32. |
Name any one non-linear data structure. |
|
Answer» The examples for non-linear data structures are trees and graphs. |
|
| 33. |
Give an example for linear data structure. |
|
Answer» The examples for linear data structures are stack, queues and linked lists. |
|
| 34. |
Expand the term ISA. |
|
Answer» Industry Standard Architecture |
|
| 35. |
Mention any two antivirus software. |
|
Answer» The two antivirus software are Norton Antivirus and Kaspersky Antivirus. |
|
| 36. |
What is a logic gate? |
|
Answer» It is an electronic circuit having one or more than one input and only one output. |
|
| 37. |
Write a short note on stack. |
|
Answer» A stack is an ordered collection of items in which data items may be inserted and deleted at one end. This end is referred as “top”. The opposite to top is known as “base”. The most recently added item in the stack is removed first. This working principle is sometimes called LIFO (Last In First Out). Newer inserted elements will be near the top and elements that are inserted at the beginning are near the base. The applications of stack:
The operation on stack is
|
|
| 38. |
Prove (X+Y) (X+Z) = X + YZ using algebraic method. |
|
Answer» LHS: = (X+Y) (X+Z) |
|
| 39. |
What are minterms and maxterms? |
Answer»
|
|
| 40. |
What is a motherboard? |
|
Answer» The motherboard is a large printed circuit board and every physical unit is connected to it. It is the main circuit board of computer system. |
|
| 41. |
Write an algorithm to delete a data element from the front end of the queue. |
|
Answer» Step 1: if FRONT = -1 then |
|
| 42. |
Algorithm to delete data element from queue |
|
Answer» Step 1: ifFRONT = -1 then Print “Queue is Underflow” Exit End of if Step 2: ITEM QUEUE [FRONT] Step 3: if FRONT = REAR then FRONT = 0 REAR = 0 Else FRONT = FRONT + 1 Step 4: return |
|
| 43. |
Explain any five network devices. |
|
Answer» 1. Network Interface Cards: 2. Switches: 3. Repeaters: 4. Routers: 5. Hubs: The two types of hubs are active or passive hubs. Active hubs regenerate signal before forwarding it to all the ports and requires a power supply. Passive hubs, do not need power and they don’t regenerate the data signal. 6. Gateways: The conversion from one data format to another takes time, and so the flow of data through a gateway is always slower than the flow of data without one. 7. Modems: Modems provide a relatively slow method of communication. Modems are available as internal devices that plug into expansion slots in a system; external devices that plug into serial or USB ports; |
|
| 44. |
Write an algorithm to delete a data element from the queue. |
|
Answer» Step 1: ifFRONT = -1 then |
|
| 45. |
Explain the various group functions in SQL. |
|
Answer» The built-in functions associated with GROUP functions in SQL are 1. COUNT function: 2. MAX function: 3. MIN function: SELECT department, MIN(salary) FROM employees GROUP BY department; 4. AVG function: 5. SUM function: 6. DISTINCT function: SELECT DISTINCT department from Employees; |
|
| 46. |
Explain the advantages of object oriented programming. |
|
Answer» The advantages of OOPs are: 1. OOP provides a clear modular structure for programs. Large problems can be reduced to 2. In OOP, data can be made private to a class such that only member functions of the class can access the data. This principle of data hiding helps the programmer to build a secure program. 3. Implementation details are hidden from other modules and other modules has a clearly defined interface. 4. It is easy to maintain and modify existing code as new objects can be created with small differences to existing ones. 5. With the help of polymorphism, the same function or same operator can be used for different purposes. This helps to manage software complexity easily. 6. In OOP, programmer not only defines data types but also deals with operations applied for data structures. |
|
| 47. |
Explain network securities in detail. |
|
Answer» Network security refers to any activities designed to protect network and related activities. It protects the usability, reliability, integrity, and safety of network and data. Good network security identifies a variety of threats and stops them from entering or spreading on network. The network security concerns with allowing only legal or authorized users and programs to gain access to information resources like databases. It also ensures that properly authenticated users get access only to those resources that they are supposed to use. Many network security threats today are spread over the Internet. The most common include:
A network security system usually consists of many components. Ideally, all components work together, which minimizes maintenance and improves security. Network security components include:
The network security makes use of a variety of resources like user name, password, encrypted smart cards, biometrics, and firewalls to protect resources. |
|
| 48. |
What is data warehouse? Briefly explain its components. |
|
Answer» A data warehouse (DW) is a database used for reporting. The data is offloaded from the operational systems for reporting. The components of data warehouse are data sources, data transformation, reporting, metadata, operations, and operational components. In short, data is moved from databases used in operational systems into a data warehouse staging area, then into a data warehouse and finally into a set of conformed data marts. Data is copied from one database to another using a technology called ETL (Extract, Transform, Load). Sourcing, Acquisition, Cleanup and Transformation Tools:
Meta data: |
|
| 49. |
Define object oriented programming. Write the limitations of object oriented programming. |
|
Answer» Object-oriented programming is a programming methodology based on objects, instead of just functions and procedures. These objects are organized into classes, which allow individual objects to be group together. Limitations: 1. Size: 2. Effort: 3. Speed: 4. Not suitable for all types of problems: 5. Not all programs can be modeled accurately by the objects model. If you just want to read in some data, do something simple to.it and write it back out, you have no need to define classes and objects. However, in some OOP languages, you may have to perform this extra step. 6. The objects often require extensive documentation. |
|
| 50. |
What is inheritance? Explain any two types of inheritance. |
|
Answer» In object-oriented programming, inheritance is a way to form new classes using classes that have already been defined. 2. Multilevel inheritance: |
|