This section includes 7 InterviewSolutions, each offering curated multiple-choice questions to sharpen your Current Affairs knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Do plants placed under an environment drier than the habitat where they are used to living have an increase or a reduction in the time during which their stomata remain open? |
|
Answer» If plants from a moister region were transferred to a drier region probably their stomata would remain closed for a longer time, i.e., the time during which stomata are open will be reduced to lower the loss of water by transpiration. |
|
| 2. |
What is the importance of lignin for the xylem formation? |
|
Answer» Lignin is important because it is deposited on the cell wall of the xylem cells providing impermeability and rigidity to the xylem vessels. |
|
| 3. |
The syntax of MIN() function is: |
|
Answer» The syntax of MIN() function is: = MIN (Number1, number2…..) |
|
| 4. |
The difference between workbook and worksheet. |
|
Answer» An Excel file is made of worksheets. The worksheet contains horizontal rows and vertical columns and these are the pages within the workbook. Worksheet can work independently of each other or can be linked together to form a workbook. |
|
| 5. |
______ is the example of Green Tourism. |
|
Answer» Indonesia is the example of Green Tourism. |
|
| 6. |
Define e-mail. |
|
Answer» It is an electronic exchange of messages. It does not require physical components like pen, paper for compiling information or manpower for movement of messages. The recipient does not even have to be available when e-mail is sent. It is stored in the mail server and can be downloaded at a convenient time. |
|
| 7. |
Define the any two Features of Indented Style Letter. |
|
Answer» 1. The oldest Style of Typed writing the letter. 2. The beginning of first line of each paragraph by indenting in the left side of the margin. |
|
| 8. |
What is the short-cut key to open a presentation? |
|
Answer» Ctrl+O is the short-cut key to open a presentation. |
|
| 9. |
Write down the name of the Official letter which is written in third person, within the same organization and generally used to be written to inform the employees about the grant of annual increment, confirmation of services etc. |
|
Answer» Memorandum is the name of the Official letter which is written in third person, within the same organization and generally used to be written to inform the employees about the grant of annual increment, confirmation of services etc. |
|
| 10. |
Define the meaning of manuscripts. |
|
Answer» Manuscripts are rough scripts – hand-written or printed, in any form, having the features of corrections, additions, deletions, alterations or modifications. |
|
| 11. |
______is used to fill the automatically fill a series of numbers. |
|
Answer» Auto fill is used to fill the automatically fill a series of numbers. |
|
| 12. |
What are gibberellins? Where are they produced? |
|
Answer» Gibberellins are plant hormones that stimulate plant growth, flowering and fruit formation (also parthenocarpy) and the germination of seeds. There are more than 70 known types of gibberellins. Gibberellins are made in the apical buds and in young leaves. |
|
| 13. |
What is used to protect network from outside internet access?(a) A trusted antivirus(b) 24 hours scanning for virus(c) Firewall to separate trusted and untrusted network(d) Deny users access to websites which can potentially cause security leak |
|
Answer» Right answer is (c) Firewall to separate trusted and untrusted network To explain: Firewall create a protective barrier to secure internal network. An antivirus can only detect harmful viruses but cannot stop illegal access by remote attacker. |
|
| 14. |
Define the interrogative sentence. |
|
Answer» Interrogate or ask questions. These are direct questions and are punctuated by a question mark. Why haven’t you completed your work? |
|
| 15. |
In Excel _____automatically adds the values. |
|
Answer» In Excel Auto sum automatically adds the values. |
|
| 16. |
What are some signs and symptoms found in patients with hypothyroidism? |
|
Answer» In hypothyroidism the production and secretion of T3 and T4 are impaired. Since these thyroid hormones stimulate the basal metabolism of the body (cellular respiration, fat acid and protein metabolism, etc.) the patient with hypothyroidism may present bradycardia (low heart rate), low respiratory rate, excessive tiredness, depression, cold intolerance and weight gain. Hypothyroidism is normally accompanied by goiter (enlargement of the thyroid in the neck). |
|
| 17. |
Why is the dietary obtainment of iodine so important for thyroid functioning? |
|
Answer» The obtainment of iodine from the diet is important for the thyroid because this chemical element is necessary for the synthesis of the thyroid hormones T3 and T4. The iodine supply often comes from the diet. |
|
| 18. |
What is not an important part of security protection?(a) Large amount of RAM to support antivirus(b) Strong passwords(c) Audit log periodically(d) Scan for unauthorized programs in system directories |
|
Answer» Right answer is (a) Large amount of RAM to support antivirus The explanation: RAM has no effect on security of a system. System’s protection remains unchanged in increasing or decreasing amount of RAM. |
|
| 19. |
What are some signs and symptoms found in patients with hyperthyroidism? |
|
Answer» The hormones made by the thyroid gland stimulate the basal metabolism of the body. In hyperthyroidism there is abnormally high production and secretion of T3 and T4 so the basal metabolic rate is increased. The signs of this condition may be tachycardia (abnormally high heart rate), weight loss, excessive heat sensation, excessive sweating, anxiety, etc. One of the typical signs of hyperthyroidism is exophthalmos (protrusion of the eyeballs). Generally the patient also presents goiter. |
|
| 20. |
Which form of official letter is used for granting of leave? |
|
Answer» Office Order is used for granting of leave. |
|
| 21. |
What is a goiter? What is endemic goiter? How is this problem socially solved? |
|
Answer» Goiter is the abnormal enlargement of the thyroid gland. The goiter appears as a tumor in the anterior neck and it may be visible or sometimes not visible but palpable. Goiter can occur in hypothyroidism or in hyperthyroidism. Endemic goiter is the goiter caused by deficient iodine ingestion (deficiency of iodine in the diet). The endemic character of the disease is explained because the iodine content of the diet is often a social or cultural condition affecting many people of some geographical regions. The hypothyroidism caused by deficient iodine ingestion is more frequent in regions far from the sea coast (since sea food is rich in iodine). Nowadays the problem is often solved by obligatory addition of iodine in table salt. As table salt is a widely used condiment the supply of iodine in diet is almost assured by this method. |
|
| 22. |
Formula in MS Excel begins with ______sign. |
|
Answer» Formula in MS Excel begins with = sign. |
|
| 23. |
What is writing? |
|
Answer» Writing is the form of communication that allows students to put their feelings and ideas on paper, to organize their knowledge and beliefs into convincing arguments, and to convey meaning through well-constructed text. |
|
| 24. |
With regard to DOS attack what is not true from below options?(a) We can stop DOS attack completely(b) By upgrading OS vulnerability we can stop DOS attack to some extent(c) DOS attack has to be stopped at network level(d) Such attack can last for hours |
|
Answer» The correct choice is (a) We can stop DOS attack completely Best explanation: None. |
|
| 25. |
What are the target tissues and target organs of each adenohypophyseal hormone? |
|
Answer» GH: bones, cartilages and muscles. Prolactin: mammary glands. ACTH: the cortical portion of the adrenals. TSH: thyroid gland. FSH and LH: ovaries and testicles. |
|
| 26. |
What is defragmentation of hard drives in computers? |
|
Answer» Process to gather all the file fragment into contiguous data file. |
|
| 27. |
What happens to the TSH (thyroid-stimulating hormone) blood level in hypothyroidism? Why is there enlargement of the thyroid in the endemic goiter disease? |
|
Answer» When there is low T3 and T4 secretion by the thyroid the TSH secretion by the hypophysis is very stimulated and the TSH blood level increases. The increase in the TSH availability promotes the enlargement of the thyroid gland. The thyroid enlargement is a reaction of a tissue that tries to compensate the functional deficiency by making the gland increase its size. |
|
| 28. |
What is the difference between a Business Letter and Official Letter? |
|
Answer» Business Letter: A letter written by a businessman for seeking and providing business information is called Business Letter. Official Letter: A letter written from one State Government to another or Central Govt. or vice versa, public enterprises, statutory authorities, public bodies and members of general public. |
|
| 29. |
An Excel File is the combination of ______. |
|
Answer» An Excel File is the combination of Worksheets. |
|
| 30. |
The Correspondence between two or more organizations stands for:(a) Inter-Organization (b) Intra- Organization (c) Inner-organization (d) Outer-organization |
|
Answer» (a) Inter-Organization The Correspondence between two or more organizations stands for Inter-Organization. |
|
| 31. |
Phytotron is a device by which? (1) Induce mutation breeding in wheat (2) Electron bombarding system (3) Plants are grown in controlled environment (4) Heavy water plants |
|
Answer» (3) Plants are grown in controlled environment |
|
| 32. |
What is known as a DOS attack?(a) It is attacked to block traffic of network(b) It is attacked to harm contents stored in HDD by worm spawn processes(c) It is an attempt to make a machine or network resource unavailable(d) None of the mentioned |
|
Answer» The correct option is (c) It is an attempt to make a machine or network resource unavailable To explain: None. |
|
| 33. |
What do you understand by ‘Complimentary Close’ and ‘Salutation’ in a business letter? |
|
Answer» Complimentary Close: It is a formal respect or regard to the addressee and is written just below the body of the letter. The most common Complimentary Close in India is ‘Yours faithfully’ or ‘Faithfully yours’. Salutation: It is a form of greetings to the addressee – individual, firm or company. Most commonly, it is represented by ‘Sir’ /‘Dear Sir’ or ‘Madam’. |
|
| 34. |
A central computer that holds collections of data and program for many PCs, work station and other computer is a(n)______A. Super computerB. MinicomputerC. LaptopD. server |
| Answer» Correct Answer - D | |
| 35. |
What is the manuscript sign to Centralize the matter? |
|
Answer» Ctr. is the manuscript sign to Centralize the matter. |
|
| 36. |
Eq# sign is used in manuscript for ______ |
|
Answer» Eq# sign is used in manuscript for Equalize Spacing. |
|
| 37. |
SP sign is used in manuscript:(a) Special Case (b) Spell Error (c) Second Paragraph (d) Special pronunciation |
|
Answer» (b) Spell Error SP sign is used in manuscript is Spell Error. |
|
| 38. |
There are …… common styles of Business Letters. |
|
Answer» There are Three common styles of Business Letters. |
|
| 39. |
Which is not a valid port scan type?(a) ACK scanning(b) Window scanning(c) IGMP scan(d) FIN scanning |
|
Answer» Correct answer is (c) IGMP scan Easy explanation - None. |
|
| 40. |
Which is not a port scan type?(a) TCP scanning(b) SYN scanning(c) UDP scanning(d) SYSTEM Scanning |
|
Answer» The correct answer is (d) SYSTEM Scanning Easy explanation - None. |
|
| 41. |
Super computer developed by Indian scientistsA. ParamB. Super301C. compaq presarioD. Cray YMP |
| Answer» Correct Answer - A | |
| 42. |
A data warehouse Contains numerous naming conventions and formatsA. Is organized around important subject areasB. Contains only current dataC. Can be updated by end usersD. Can be updated by end uses |
| Answer» Correct Answer - B | |
| 43. |
sign is used in manuscript for … |
|
Answer» sign is used in manuscript for Inserting the space. |
|
| 44. |
What is PCR? How does PCR works? |
|
Answer» PCR, polymerase chain reaction, is a method to synthesize many copies of specific regions of a DNA molecule known as target-regions. Its inventor, Kary Mullis, won the Nobel prize for Chemistry in 1993. First, the DNA to be tested is heated to cause the double helix to rupture and the polynucleotide chains to be exposed. Then small synthetic sequences of DNA known as primers and containing nucleotide sequences similar to the sequences of the extremities of the region to be studied (for example, a region containing a known gene exclusive of a given organism) are added. The primers paired with the original DNA in the extremities of the gene to be amplified. Enzymes known as polymerases, that catalyze DNA replication, and nucleotide supply are added. The primers then are completed and the chosen region is replicated. In the presence of more primers and more nucleotides millions of copies of that specific region are generated. (PCR is very sensitive even using a minimal amount of DNA). |
|
| 45. |
What is port scanning?(a) It is a software used to scan system for attack(b) It is a software application designed to probe a server or host for open ports(c) It is software used to scan system for introducing attacks by brute force(d) None of the mentioned |
|
Answer» The correct option is (b) It is a software application designed to probe a server or host for open ports To explain: None. |
|
| 46. |
What is characteristic of RADIUS system?(a) It is essential for centralized encryption and authentication(b) It works on Network layer to deny access to unauthorized people(c) It provides centralized authentication mechanism via network devices(d) It’s a strong File access system |
|
Answer» The correct answer is (c) It provides centralized authentication mechanism via network devices The explanation: None. |
|
| 47. |
What is known as masquerading?(a) When one participant in communication pretends to be someone else(b) When attacker modifies data in communication(c) When attack is of fraudulent repeat of a valid data(d) When attack gains access to remote systems |
|
Answer» The correct option is (a) When one participant in communication pretends to be someone else The explanation: None. |
|
| 48. |
One who designs, writes, tests and maintains computer programs is called aA. UserB. ProgrammerC. DesignerD. Operator |
| Answer» Correct Answer - B | |
| 49. |
The intersection of a row and columns is called as …… |
|
Answer» The intersection of a row and columns is called as Cell. |
|
| 50. |
Which of these is considered intellingent CASE toolA. ToolkitB. Methodology companionC. WorkbenchD. Upper CASE |
| Answer» Correct Answer - C | |