Explore topic-wise InterviewSolutions in Current Affairs.

This section includes 7 InterviewSolutions, each offering curated multiple-choice questions to sharpen your Current Affairs knowledge and support exam preparation. Choose a topic below to get started.

1.

What is the percentage of carbon in urea? (Atomic mass C = 12, H = 1, N = 14, O = 16)A. 0.2B. 0.266C. 0.0667D. 0.46

Answer» Correct Answer - A
Molar mass of urea (i.e. `NH_(2)CONH_(2)`)
`=2xx`atomic mass of N+4`xx`atomic mass of H+1`xx`atomic mass of O+1`xx` atomic mass of C.
`=2xx14+4xx1+1xx16+1xx12=60` g
As we know that,
Percentage or mass % of an element
`=("Mass of that element in the compound")/("Molar mass of the compound")xx100`
`therefore` Percentage of C=`(1xx12)/60xx100=20%`
2.

Which of following bonds has maximum bond length?A. C -OB. C-HC. C-CD. C-N

Answer» Correct Answer - B
Since, C - H bond have less difference in their electronegativities as compared to C - O, C - C and C - N bonds.
This results in less polarity of C - H bond and thus, have maximum bond length.
3.

Shalerite and siderite are the ores of the metalsA. Cu and FeB. Zn and CuC. Zn and FeD. Zn and Al

Answer» Correct Answer - C
Sphalerite is zinc sulphide (ZnS) while siderite is `FeCO_(3)`
4.

In the reaction, `C_(6)H_(5)COCH_(3)underset(Zn-Hg//conc.HCl)overset([H])toX,X` isA. tolueneB. methyl benzeneC. benzylalcoholD. ethyl benzene

Answer» Correct Answer - D
`underset("Acetophenone")(C_(6)H_(5)COCH_(3))underset(Zn-Hg//conc.HCl)overset(4[H])tounderset("Ethyl benzene")(C_(6)H_(5)CH_(2)CH_(3))`
The above reaction is known as Clemmensen reduction.
5.

Which of the following is electron deficient ?A. `PH_(3)`B. `(BH_(3))_(2)`C. `(SiH_(3))_(2)`D. `(CH_(3))_(2)`

Answer» Correct Answer - B
6.

Nucleophilic part of the reagent attacks the substrate `CH_(3)CH_(2)COCH_(3)` on the :A. carbon atom of carbonyl groupB. oxygen atom of carbonyl groupC. methyl groupD. `CH_(2)` group

Answer» Correct Answer - A
7.

Stability of `overset(+)CH_(2)-CH=CH_(2)` can be explained by:A. inductive effectB. electromeric effectC. resonanceD. polar effect

Answer» Correct Answer - C
8.

`S_(N^(1))` mechanism for the hydrolysis of an alkyl halide involves the formation of intermediate:A. free radicalB. carbocationC. carbanionD. none of these

Answer» Correct Answer - B
9.

Write HTML tags to do the following : (i) Inserting a horizontal line in a web page. (ii) Inserting a line break

Answer»

(i) < HR> or <hr>

(ii) < BR> or <br>

10.

In the `S_(N^(1))` reaction on chiral centres there is :A. `100%` racemizationB. inversion more than retention leading to partial racemizationC. `100%` retentionD. `100%` inversion

Answer» Correct Answer - B
11.

Differentiate between base class and derived class.

Answer»

A base class is a class from which other classes are derived. The class that inherits is called derived class. The inheriting class is called the derived class.

12.

The stability of `Me_(2)C=CH_(2)` is more than that of `MeCH_(2)CH=CH_(2)` due to :A. inductive effect of the Me groupB. resonance effecta of the Me groupC. hypercojugative effect of the Me groupD. resonance as well as inductive effect of the Me group

Answer» Correct Answer - C
13.

Which of the following statements is correct about a carbocation?A. It reacts with nucleophileB. It can undergo rearrangementC. It can eliminate `H^(+)` to form an olefinD. All are correct

Answer» Correct Answer - D
14.

Which one of the following halogen compounds is difficult to be hydrolysed by `S_(N^(1))` mechanism?A. tert-Butyl chlorideB. Isopropyl chlorideC. Benzyl chlorideD. Chlorobenzene

Answer» Correct Answer - D
15.

What is principle of duality? Give an example.

Answer»

The principle of duality states that starting with a Boolean relation, another relation can be derived by

  1. Changing each OR sing (+) to an AND sign (.).
  2. Changing each AND sing (.) to an OR sign (+).
  3. Replacing each 0 by 1 and each 1 by 0.
  4. All variables are complemented.

For example, (X + Y’) dual is (X’. Y)

16.

Which of the following statements is correct?A. Allyl carbocation `(H_(2)C=CH-overset(+)CH_(2))` is more stable than propyl carbocationB. Propyl carbocation is more stable than allyl carbocationC. Both are equally stableD. None of the above

Answer» Correct Answer - A
17.

State and prove involution law.

Answer»

This law states that the double complement of a variable gives the same variable.

YYOUTPUT !(!Y)
010
101
18.

Ammonia is iso-structural with:A. carbanionB. free radicalC. carbocationD. carbene

Answer» Correct Answer - A
19.

Name any one web browser.

Answer»

The name of a web browser is Google Chrome.

20.

Arrange the following resonating structures in order of increasing stability `underset((I))(CH_(2)=overset(+)(N)=overset(-)(N))" "underset((II))(H_(2)overset(+)(C)=N=overset(-)(N))" "underset((III))(H_(2)overset(-)(C)-overset(+)(N) equiv N)" "underset((IV))(H_(2) overset(-)(C)-N=overset(+)(N))`A. I gt II gt IV gt IIIB. I gt III gt II gt IVC. II gt I gt III gt IVD. III gt I gt IV gt II

Answer» Correct Answer - B
21.

In the following carbocation, `H//CH_(3)` that is most likely to migrate to the positve charged carbon is : `H_(3)overset(1)C-overset(H)overset(|2)underset(OH)underset("| ")"C"-underset(H)underset(3|)overset(+)C-overset(H)overset(|4)underset(""CH_(3))underset("| ")"C "-overset(5)CH_(3)`A. `CH_(3)` at C-4B. H at C-4C. `CH_(3)` at C-2D. H at C-2

Answer» Correct Answer - D
22.

Which of the following statements is not correct for a nucleophiles?A. Nucleophiles are not electron seekingB. Nucleophile attack low `e^(-)` density sitesC. Nucleophile is a Lewis acidD. Ammonia is a nucleophile

Answer» Correct Answer - C
23.

Define bus topology.

Answer»

A bus topology consists of a central cable with a terminator at each end. All nodes (file server, workstations, and peripherals) are connected to the linear cable.

24.

Which one of the following statements wrong about `S_(N^(2))` reaction?A. The rate of reaction is independent of the concentration of nucleophileB. Nucleophilic attacks the carbon from the side opposite to where the leaving group is attachedC. Only in one step the bond formation and bond breaking takes placeD. The rate of reaction `prop` [substrate] [nucleophile]

Answer» Correct Answer - A
25.

Expand the term URL.

Answer»

Uniform Resource Locator.

26.

What is a database?

Answer»

A database is a collection of large amount of related data. In other words, It is a collection of database tables.

27.

Mention any one advantage of pointers.

Answer»

The advantage of pointer is memory can be allocated or deallocated dynamically.

28.

In internal combustion petrol/diesel engines, only cyclic processes are used, because:A. Cyclic process have more efficiency as compared to non-cyclic processB. Cyclic process can provide the work continuouslyC. in the cyclic proces, heat loss is relatively lessD. in cyclic process process fuel consumption is less than that for non-cyclic process

Answer» Correct Answer - B
Cyclic process can provide the work continuously
29.

write any two applications of array

Answer»
  • Used in mathematical problems like matrices etc.
  • They are used in the implementation of other data structures like linked lists etc.
  • Database records are usually implemented as arrays.
  • Used in lookup tables by computer.
30.

What is the significance of scope resolution operation in C++?

Answer»

The operator :: known as scope resolution operator helps in defining member function outside the class.

31.

What is a class?

Answer»

A class is a structured data type in C++ which is a collection of variables and functions.

32.

Name any one non-linear data structure.

Answer»

The examples for non-linear data structures are trees and graphs.

33.

Give an example for linear data structure.

Answer»

The examples for linear data structures are stack, queues and linked lists.

34.

Expand the term ISA.

Answer»

Industry Standard Architecture

35.

Mention any two antivirus software.

Answer»

The two antivirus software are Norton Antivirus and Kaspersky Antivirus.

36.

What is a logic gate?

Answer»

It is an electronic circuit having one or more than one input and only one output.

37.

Write a short note on stack.

Answer»

A stack is an ordered collection of items in which data items may be inserted and deleted at one end. This end is referred as “top”. The opposite to top is known as “base”. The most recently added item in the stack is removed first. This working principle is sometimes called LIFO (Last In First Out). Newer inserted elements will be near the top and elements that are inserted at the beginning are near the base.

The applications of stack:

  • Arithmetic Expression evaluation
  • Arithmetic Expression conversion
  • Recursive function .
  • Backtracking (game playing, finding paths, exhaustive searching)
  • Memory management, run-time environment for nested language features.

The operation on stack is

  • stack() creates a new empty stack,
  • push(item) insert new item at the top of stack,
  • pop() removes the top element from the stack,
  • peek() returns the top item of the stack,
  • Empty() checks the stack is empty or not and
  • size() returns number of items present in the stack
38.

Prove (X+Y) (X+Z) = X + YZ using algebraic method.

Answer»

LHS: = (X+Y) (X+Z)
= XX + XZ + XY + YZ
= X + XZ + XY + YZ
= X + (1 + Z +Y) YZ
= X + YZ
= RHS

39.

What are minterms and maxterms?

Answer»
  • A minterm is a special product of literals, in which each input variable appears exactly once.
  • A maxterm is a sum of literals, in which each input variable appears exactly once.
40.

What is a motherboard?

Answer»

The motherboard is a large printed circuit board and every physical unit is connected to it. It is the main circuit board of computer system.

41.

Write an algorithm to delete a data element from the front end of the queue.

Answer»

Step 1: if FRONT = -1 then
Print “Queue is Underflow”
Exit
End of if
Step 2: ITEM = QUEUE [FRONT]
Step 3: if FRONT = REAR then
FRONT = 0 REAR = 0
Else
FRONT = FRONT+1
Step 4: return

42.

Algorithm to delete data element from queue

Answer»

Step 1: ifFRONT = -1 then 

Print “Queue is Underflow” 

Exit 

End of if 

Step 2: ITEM QUEUE [FRONT] 

Step 3: if FRONT = REAR then 

FRONT = 0 

REAR = 0 

Else 

FRONT = FRONT + 1 

Step 4: return

43.

Explain any five network devices.

Answer»

1. Network Interface Cards:
The network interface card (NIC) provides the physical connection between the network and the computer workstation. Network interface cards are a major factor in determining the speed and performance of a network. The most common network interface connections are Ethernet cards.

2. Switches:
A switch is a hardware device that provides a central connection point for cables from workstations, servers, and peripherals. Switch forwards data only to the port on which the destination system is connected.

3. Repeaters:
Since a signal loses strength as it passes along a cable, it is often necessary to boost the signal with a device called a repeater. The repeater electrically amplifies the signal it receives and rebroadcasts it.

4. Routers:
Routers are network devices that route data around the network. By examining data as it arrives, the router can determine the destination address for the data; then, by using tables of defined routes, the router decides the best way for the data to reach destination. The router can direct traffic to prevent crash.

5. Hubs:
A network hub contains multiple ports. When a packet arrives at one port, it is copied to all ports of the hub for transmission.

The two types of hubs are active or passive hubs. Active hubs regenerate signal before forwarding it to all the ports and requires a power supply. Passive hubs, do not need power and they don’t regenerate the data signal.

6. Gateways:
It is a device that connects dissimilar networks. The term gateway is applied to any device, system, or software application that can perform the function of translating data from one format to another. The key feature of a gateway is that it converts the format of the data, not the data itself.

The conversion from one data format to another takes time, and so the flow of data through a gateway is always slower than the flow of data without one.

7. Modems:
Modem is a short form of the terms modulator and demodulator. Modems translate digital signals from a computer into analog signals that can travel across phone lines. The modem modulates the signal at the sending end and demodulates at the receiving end.

Modems provide a relatively slow method of communication. Modems are available as internal devices that plug into expansion slots in a system; external devices that plug into serial or USB ports;

44.

Write an algorithm to delete a data element from the queue.

Answer»

Step 1: ifFRONT = -1 then
Print “Queue is Underflow”
Exit
End of if
Step 2: ITEM QUEUE [FRONT]
Step 3: if FRONT = REAR then
FRONT = 0
REAR = 0
Else
FRONT = FRONT + 1
Step 4: return

45.

Explain the various group functions in SQL.

Answer»

The built-in functions associated with GROUP functions in SQL are

1. COUNT function:
returns the count of records that satisfies the condition for each group of records.
Example:
SELECT department, COUNT(*)FROM employees WHERE salary > 25000 GROUP BY department;

2. MAX function:
returns the maximum values from the column for each group of records.
Example:
SELECT department, MAX(salary) FROM employees GROUP BY department;

3. MIN function:
returns the lowest values from the column for each group of records.
Example:

SELECT department, MIN(salary) FROM employees GROUP BY department;

4. AVG function:
returns the average values from the column for each group of records.
Example:
SELECT AVG(cost) FROM products WHERE category = ‘Clothing’;

5. SUM function:
returns the total values from the column for each group of records.
Example:
SELECT department, SUM(sales)FROM order_details GROUP BY department;

6. DISTINCT function:
returns the once occurrence of many repeated values from the column for each group of records.
Example:

SELECT DISTINCT department from Employees;

46.

Explain the advantages of object oriented programming.

Answer»

The advantages of OOPs are:

1. OOP provides a clear modular structure for programs. Large problems can be reduced to
smaller and more manageable problems.

2. In OOP, data can be made private to a class such that only member functions of the class can access the data. This principle of data hiding helps the programmer to build a secure program.

3. Implementation details are hidden from other modules and other modules has a clearly defined interface.

4. It is easy to maintain and modify existing code as new objects can be created with small differences to existing ones.

5. With the help of polymorphism, the same function or same operator can be used for different purposes. This helps to manage software complexity easily.

6. In OOP, programmer not only defines data types but also deals with operations applied for data structures.

47.

Explain network securities in detail.

Answer»

Network security refers to any activities designed to protect network and related activities. It protects the usability, reliability, integrity, and safety of network and data. Good network security identifies a variety of threats and stops them from entering or spreading on network.

The network security concerns with allowing only legal or authorized users and programs to gain access to information resources like databases. It also ensures that properly authenticated users get access only to those resources that they are supposed to use. Many network security threats today are spread over the Internet. The most common include:

  • Viruses, worms, and Trojan horses
  • Spyware and adware
  • Zero-day attacks also called zero-hour attacks
  • Hacker attacks Denial of service attacks
  • Data interception and theft
  • Identity theft

A network security system usually consists of many components. Ideally, all components work together, which minimizes maintenance and improves security. Network security components include:

  • Anti-virus and anti-spyware.
  • Firewall, to block unauthorized access to your network.
  • Intrusion prevention systems (IPS), to identify fast-spreading threats, such as zero-day or zero-hour attacks.
  • Virtual Private Networks (VPNs), to provide secure remote access.

The network security makes use of a variety of resources like user name, password, encrypted smart cards, biometrics, and firewalls to protect resources.

48.

What is data warehouse? Briefly explain its components.

Answer»

A data warehouse (DW) is a database used for reporting. The data is offloaded from the operational systems for reporting. The components of data warehouse are data sources, data transformation, reporting, metadata, operations, and operational components.

In short, data is moved from databases used in operational systems into a data warehouse staging area, then into a data warehouse and finally into a set of conformed data marts. Data is copied from one database to another using a technology called ETL (Extract, Transform, Load).

Sourcing, Acquisition, Cleanup and Transformation Tools:
The functionality includes:

  • Removing unwanted data from operational databases
  • Converting to common data names and definitions
  • Establishing defaults for missing data
  • Accommodating source data definition changes

Meta data:
Meta data is data about data that describes the data warehouse. It is used for building, maintaining, managing and using the data warehouse.

49.

Define object oriented programming. Write the limitations of object oriented programming.

Answer»

Object-oriented programming is a programming methodology based on objects, instead of just functions and procedures. These objects are organized into classes, which allow individual objects to be group together.

Limitations:

1. Size:
Object-Oriented programs are much larger than other programs. In the early days of computing, space on hard drives, floppy drives and in memory was at a premium. Today we do not have these restrictions.

2. Effort:
Object-Oriented programs require a lot of work to create. Specifically, a great deal of planning goes into an object-oriented program well before a single piece of code is ever written. Initially, this early effort was felt by many to be a waste of time. In addition, because the programs were larger (see above) coders spent more time actually writing the program.

3. Speed:
Object-Oriented programs are slower than other programs, partially because of their size. Other aspects of Object-Oriented Programs also demand more system resources, thus slowing the program down.

4. Not suitable for all types of problems:
There are problems that lend themselves well to functional-programming style, logic -programming style, or procedure-based programming style, and applying object-oriented programming in those situations will not result inefficient programs.

5. Not all programs can be modeled accurately by the objects model. If you just want to read in some data, do something simple to.it and write it back out, you have no need to define classes and objects. However, in some OOP languages, you may have to perform this extra step.

6. The objects often require extensive documentation.

50.

What is inheritance? Explain any two types of inheritance.

Answer»

In object-oriented programming, inheritance is a way to form new classes using classes that have already been defined.
1. Single inheritance:
A derived class with only one base class is called single inheritance. For example, If A is base class then class B derive from base class A.

2. Multilevel inheritance:
A class can be derived from another derived class which is known as multilevel inheritance. For example, The derived class C inherit B class whereas B is derived from class A.