InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 851. |
Write 28.756 in Mantissa exponent form. |
|
Answer» 28756 = .28756 x 100 = .28756 x102 = .28756 E + 2 |
|
| 852. |
According to India State of Forest Report – 2015, which State has highest forest cover in percentage terms? 1. Arunachal Pradesh2. Mizoram3. Andhra Pradesh4. Madhya Pradesh |
|
Answer» Correct Answer - Option 2 : Mizoram The correct answer is Mizoram.
|
|
| 853. |
The Rajasthan Forestry and Biodiversity Project (2011 - 2019) is NOT related to which of the following?1. Afforestation2. Livelihood promotion3. Biodiversity conservation4. Irrigation development |
|
Answer» Correct Answer - Option 4 : Irrigation development Irrigation development is NOT correct.
|
|
| 854. |
Arun, Gulab, Neel and Shweta must choose one shirt each from a pile of four shirts coloured red, pink, blue and white respectively. Arun dislikes the colour red and Shweta dislikes the colour white. Gulab and Neel like all the colours. In how many different ways can they choose the shirts so that no one has a shirt with a colour he or she dislikes ? (A) 21 (B) 18 (C) 16 (D) 14 |
|
Answer» (D) 14 As there are 4 people A,G,N,S and 4 colours so without any restriction total ways have to be 4 x 4 = 16 Now, Arun → dislikes Red and Shweta → dislikes white So 16 - 2b = 14 ways |
|
| 855. |
There are 3 red socks, 4 green socks and 3 blue socks, you choose 2 socks. The probability that they are of the same colour is _____. (A) 1/5 (B) 7/30 (C) 1/4 (D) 4/15 |
|
Answer» Correct option is (D) 4/15 Required probability = 3C\(_2\) + 4C\(_ 2\) + 3C\(_ 2\) / 10C\(_ 2\) = 4/15 |
|
| 856. |
The Indian Standard Time corresponds to the longitude ______ degrees East.1. 82.52. 76.53. 79.54. 85.5 |
|
Answer» Correct Answer - Option 1 : 82.5 The correct answer is 82.5.
|
|
| 857. |
Choose the option with words that are not synonyms. (A) aversion, dislike (B) luminous, radiant (C) plunder, loot (D) yielding, resistant |
|
Answer» (D) yielding, resistant |
|
| 858. |
X is a 30 digit number starting with the digit 4 followed by the digit 7, then the number X3 will have (A) 90 digits (B) 91 digits (C) 92 digits (D) 93 digits |
|
Answer» Correct option is (A) 90 digits X = (47 ......) 30 digits Suppose (47)3 30digits = (2 + 2 + 2) digits in (47)3 Similarly (47)3 30digits = contains (30 + 30 + 30) digits = 90 digits. |
|
| 859. |
“We lived in a culture that denied any merit to literary works, considering them important only when they were handmaidens to something seemingly more urgent - namely ideology. This was a country where all gestures, even the most private, were interpreted in political terms." The author's belief that ideology is not as important as literature is revealed by the word: (A) ‘culture’ (B) ‘seemingly’ (C) ‘urgent’ (D) ‘political’ |
|
Answer» Correct option is (B) ‘seemingly’ |
|
| 860. |
A test has twenty questions worth 100 marks in total. There are two types of questions, multiple choice questions are worth 3 marks each and essay questions are worth 11 marks each. How many multiple choice questions does the exam have? (A) 12 (B) 15 (C) 18 (D) 19 |
|
Answer» Correct option is (B) 15 (x = MCQ , y = Essay type) x + y = 20 3x + 11y = 100 ⇒ x = 15, y = 5 |
|
| 861. |
Saturn is ____ to be seen on a clear night with the naked eye. (A) enough bright (B) bright enough (C) as enough bright (D) bright as enough |
|
Answer» (B) bright enough |
|
| 862. |
Verify whether the proposition ~(p ∨ q) → (~P ∧ ~q) is a tautology contradiction or neither. |
||||||||||||||||||||||||||||||||||||||||
Answer»
From the table we conclude that it is a tautology |
|||||||||||||||||||||||||||||||||||||||||
| 863. |
A capacitor consists of two what |
|
Answer» Two conductors separated by an insulator |
|
| 864. |
Explain exit control loop |
|
Answer» An exit controlled loop is that category of loops in which the test condition is checked after the execution of the body of the loop.Thus,an exit control loop executes at least once even when the test condition fails. For example: do while loop in C. |
|
| 865. |
The resistance of a 10 ft. length of resistor material having a cross section of 0.00204 in.2 is 4.1 ohms, the resistance of a 12 ft. length of the same material is 7.7 ohms. Determine its cross section in sq. inches. |
| Answer» 0.0017 may be...i am not sure | |
| 866. |
Derive the truth table for the following Boolean expression. X = |
|
Answer» Furdunji Naoroji founded the Rahnumai Mazdayasnan Sabha 1851. |
|
| 867. |
The transfer function of discreat time system is |
|
Answer» The Z-transform is used in discrete time systems to create a discrete time transfer function of the system with a set of poles and zeros. It is a formal transformation for discrete time signals (signals described in terms of their samples) to a new complex variable called z. |
|
| 868. |
What are the data units at different layers of the TCP / IP protocol suite? |
|
Answer» The data unit created at the application layer is called a message, at the transport layer the data unit created is called either a segment or an user datagram, at the network layer the data unit created is called the datagram, at the data link layer the datagram is encapsulated in to a frame and finally transmitted as signals along the transmission media. |
|
| 869. |
The PPP protocol _________(a) Is designed for simple links which transport packets between two peers(b) Is one of the protocols for making an Internet connection over a phone line(c) Is designed for simple links which transport packets between two peers and making an Internet connection over a phone line(d) Is used for sharing bandwidth |
|
Answer» Correct choice is (c) Is designed for simple links which transport packets between two peers and making an Internet connection over a phone line To explain: The PPP protocol is designed for handling simple links which transport packets between two peers. It is a standard protocol that is used to make an Internet connection over phone lines. |
|
| 870. |
PPP consists of ________components(a) Three (encapsulating, the Domain Name system)(b) Three (encapsulating, a link control protocol, NCP)(c) Two (a link control protocol, Simple Network Control protocol)(d) One (Simple Network Control protocol) |
|
Answer» Correct choice is (b) Three (encapsulating, a link control protocol, NCP) Easiest explanation: PPP consists of three components namely Link Control Protocol (LCP), Network Control Protocol (NCP), and Encapsulation. LCP and NCP are the PPP protocols which provide interface for handling the capabilities of the connection/link on the network and encapsulation provides for multiplexing of different network-layer protocols. |
|
| 871. |
PPP provides the _______ layer in the TCP/IP suite.(a) Link(b) Network(c) Transport(d) Application |
|
Answer» The correct answer is (a) Link The explanation is: PPP provides function of the link layer in the TCP/IP suite. It focuses on the link between two nodes that is going to be used by the users to communicate. It can use pre-installed phone line for the purpose. |
|
| 872. |
Beyond IP, UDP provides additional services such as _______(a) Routing and switching(b) Sending and receiving of packets(c) Multiplexing and demultiplexing(d) Demultiplexing and error checking |
|
Answer» Correct choice is (d) Demultiplexing and error checking The best I can explain: De-multiplexing is the delivering of received segments to the correct application layer processes at the recipients end using UDP. Error checking is done through checksum in UDP. |
|
| 873. |
Extensible authentication protocol is authentication framework frequently used in ______(a) Wired personal area network(b) Wireless networks(c) Wired local area network(d) Wired metropolitan area network |
|
Answer» Right option is (b) Wireless networks The best explanation: The Extensible Authentication Protocol (EAP) is an authentication protocol used to connect a network node to the Internet. It designed through extending the methods used by the Point-to-Point Protocol for authentication. |
|
| 874. |
Which two types of encryption protocols can be used to secure the authentication of computers using IPsec?(a) Kerberos V5(b) SHA(c) MD5(d) Both SHA and MD5 |
|
Answer» Correct option is (d) Both SHA and MD5 To elaborate: SHA or MD5 can be used. Kerberos V5 is an authentication protocol, not an encryption protocol; therefore, answer A is incorrect. Certificates are a type of authentication that can be used with IPsec, not an encryption protocol; therefore, answer B is incorrect. |
|
| 875. |
______ provides authentication at the IP level.(a) AH(b) ESP(c) PGP(d) SSL |
|
Answer» Right option is (a) AH To elaborate: The Authentication Header (AH) authenticates the origin of data, and guarantees the integrity of the information that’s being sent using IPSec. It also provides anti-reply security. |
|
| 876. |
Which two types of IPsec can be used to secure communications between two LANs?(a) AH tunnel mode(b) ESP tunnel mode(c) Both AH tunnel mode and ESP tunnel mode(d) ESP transport mode |
|
Answer» Right choice is (c) Both AH tunnel mode and ESP tunnel mode The explanation: The AH and ESP tunnel mode IPSec should be used for data transfer purpose, option d is for integrity & confidentiality purpose. Tunnel mode provides security for the entire original IP packet unlike transport mode which is not as secure as it only encrypts the data portion and not the whole packet. |
|
| 877. |
RPF stands for __________(a) Reverse Path Forwarding(b) Reverse Path Failure(c) Reverse Packet Forwarding(d) Reverse Protocol Failure |
|
Answer» The correct answer is (a) Reverse Path Forwarding The explanation: Reverse Path Forwarding is a loop-free forwarding method for multi-cast routing in modern systems. The method focuses on forwarding the packet away from the source IP in each iteration to make sure there is no loops. |
|
| 878. |
In tunnel mode, IPSec protects the ______(a) Entire IP packet(b) IP header(c) IP payload(d) IP trailer |
|
Answer» Correct choice is (a) Entire IP packet For explanation: In the tunnel mode, IPSec adds control bits into the packets to encrypt the entire packet between the IPSec endpoints. Using encryption, it provides secure communication between the two endpoints. |
|
| 879. |
Buy a _______ of chocolate chip cookies for dessert. A) bag B) half a gallon C) teaspoonD) loaf |
|
Answer» Correct option is A) bag |
|
| 880. |
IPSec is designed to provide security at the _________(a) transport layer(b) network layer(c) application layer(d) session layer |
|
Answer» The correct option is (b) network layer Easy explanation: IPSec is a set of protocols used to provide authentication, data integrity and confidentiality between two machines in an IP network. In the TCP/IP model, it provides security at the IP layer i.e. the network layer. |
|
| 881. |
Cookies were originally designed for ____________(a) Client side programming(b) Server side programming(c) Both Client side programming and Server side programming(d) Socket programming |
|
Answer» Right answer is (b) Server side programming Explanation: Cookies were originally designed for server side programming, and at the lowest level, they are implemented as an extension to the HTTP protocol. They were introduced with the intention of providing a better user experience for the websites. |
|
| 882. |
Which of the following explains Cookies nature?(a) Non Volatile(b) Volatile(c) Intransient(d) Transient |
|
Answer» Correct choice is (d) Transient To elaborate: Cookies are transient by default; the values they store last for the duration of the web browser session but are lost when the user exits the browser. While the browsing session is active the cookie stores the user values in the user’s storage itself and accesses them. |
|
| 883. |
In the process of fetching a web page from a server the HTTP request/response takes __________ RTTs.(a) 2(b) 1(c) 4(d) 3 |
|
Answer» The correct answer is (b) 1 For explanation I would say: By default the http connection will be persistent connection. Hence it will take only 1 RTT to fetch a webpage from a server. |
|
| 884. |
Which of the following HTTP methods should be idempotent in nature?(a) OPTIONS(b) DELETE(c) POST(d) HEAD |
|
Answer» The correct choice is (b) DELETE Explanation: DELETE operation should be idempotent, means their result will always same no matter how many times these operations are invoked. Also, the PUT operation is supposed to be idempotent. |
|
| 885. |
The Cookie manipulation is done using which property?(a) cookie(b) cookies(c) manipulate(d) manipulate cookie |
|
Answer» The correct option is (a) cookie The best explanation: The cookie property sets or returns all name/value pairs of cookies in the current document. There are no methods involved: cookies are queried, set, and deleted by reading and writing the cookie property of the Document object using specially formatted strings. |
|
| 886. |
HTTP client requests by establishing a __________ connection to a particular port on the server.(a) User datagram protocol(b) Transmission control protocol(c) Border gateway protocol(d) Domain host control protocol |
|
Answer» The correct answer is (b) Transmission control protocol To elaborate: HTTP clients perform requests using a TCP connection, because the TCP connection provides a more reliable service. UDP is not a reliable protocol, border gateway protocol is used on top of TCP, while domain host control protocol is a network layer protocol. |
|
| 887. |
In FTP protocol, client contacts server using ____ as the transport protocol.(a) transmission control protocol(b) user datagram protocol(c) datagram congestion control protocol(d) stream control transmission protocol |
|
Answer» The correct answer is (a) transmission control protocol The best I can explain: The clients use the Transmission Control Protocol for FTP as it’s more reliable than UDP, DCCP, and SCTP, and reliability of file transfer is required to be as high as possible for FTP. |
|
| 888. |
DHCP (dynamic host configuration protocol) provides __________ to the client.(a) IP address(b) MAC address(c) Url(d) None of the mentioned |
|
Answer» Correct option is (a) IP address Explanation: We use DHCP to allow the hosts to acquire their ip addresses dynamically which is better than visiting each and every host on the network and configure all of this information manually. |
|
| 889. |
Which of the following directive of Cache Control Header of HTTP response indicates that resource is cachable by only client and server?(a) Public(b) Private(c) Nocache/nostore(d) Maxage |
|
Answer» Correct answer is (b) Private To elaborate: Private directive indicates that resource is cachable by only client and server; no intermediary can cache the resource. But if we use the public directive, it indicates that the resource may be cachable by any intermediary component. |
|
| 890. |
Which of the following is not a good practice to create a standard URI for a web service?(a) Maintain Backward Compatibility(b) Use HTTP Verb(c) Using spaces for long resource names(d) Use lowercase letters |
|
Answer» Correct option is (c) Using spaces for long resource names To elaborate: We must use hyphens (-) or underscores (_) instead of spaces to represent long resource names. It may lead to the resource to be less recognizable for the system if we use spaces instead. |
|
| 891. |
Which of the following protocol is used by Restful web services as a medium of communication between client and server?(a) HTTP(b) FTP(c) Gopher(d) TELNET |
|
Answer» Right answer is (a) HTTP The best explanation: Restful web services make use of HTTP protocol as a medium of communication between client and server. The REST architecture was known as the HTTP object model back in the year 1994. |
|
| 892. |
What does REST stand for?(a) Represent State Transfer(b) Representational State Transfer(c) Representing State Transfer(d) Representation State Transfer |
|
Answer» The correct choice is (b) Representational State Transfer Explanation: REST stands for Representational State Transfer and is a software architecture style in which the server sends a representation of the state of the resource that it requests. It provides interoperability between the systems. |
|
| 893. |
Which of the following function is used as a consequence of not including semicolons, Commas or whitespace in the Cookie value?(a) EncodeURIComponent()(b) EncodeURI()(c) EncodeComponent()(d) Encode() |
|
Answer» Correct choice is (a) EncodeURIComponent() For explanation: Cookie values cannot include semicolons, commas, or whitespace. For this reason, you may want to use the core JavaScript global function encodeURIComponent() to encode the value before storing it in the cookie. |
|
| 894. |
What is the constraint on the data per cookie?(a) 2 KB(b) 1 KB(c) 4 KB(d) 3 KB |
|
Answer» Correct choice is (c) 4 KB The best I can explain: Each cookie can hold up to only 4 KB. In practice, browsers allow many more than 300 cookies total, but the 4 KB size limit may still be enforced by some. Storage of a session has to be a minimum of 5MB. |
|
| 895. |
Which of the following is a Boolean cookie attribute?(a) Bool(b) Secure(c) Lookup(d) Domain |
|
Answer» Right choice is (b) Secure The best explanation: The final cookie attribute is a boolean attribute named secure that specifies how cookie values are transmitted over the network. By default, cookies are insecure, which means that they are transmitted over a normal, insecure HTTP connection. If a cookie is marked secure, however, it is transmitted only when the browser and server are connected via HTTPS or another secure protocol. |
|
| 896. |
How can you set a Cookie visibility scope to local Storage?(a) /(b) %(c) *(d) # |
|
Answer» The correct option is (a) / To elaborate: Setting the path of a cookie to “/” gives scoping like that of localStorage and also specifies that the browser must transmit the cookie name and value to the server whenever it requests any web page on the site. |
|
| 897. |
Which of the following can be used to configure the scope of the Cookie visibility?(a) Path(b) Domain(c) Both Path and Domain(d) Server |
|
Answer» Right answer is (d) Server Easy explanation: The Cookie visibility scope is configurable through cookie attributes path and domain. Domain attribute in the cookie is used to specify the domain for which the cookie is sent. Path includes the Path attribute in the cookie to specify the path for which this cookie is sent. |
|
| 898. |
Dividend is usually paid.(a) on Authorised capital(b) on issued capital(c) on paid up capital(d) on called up capital |
|
Answer» (c) on paid up capital |
|
| 899. |
Dividend are usually paid on(a) Authorised Capital(b) Called up capital(c) Issued capital(d) Paid up capital |
|
Answer» Dividend are usually paid on Issued capital |
|
| 900. |
Contingent Liabilities are exhibited under the heading: (a) Non-current Liabilities (b) Current Liabilities (c) In the Notes to Accounts (d) Current assets |
|
Answer» Correct option is (c) In the Notes to Accounts |
|