Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

851.

Write 28.756 in Mantissa exponent form.

Answer»

28756 = .28756 x 100 

= .28756 x102 

= .28756 E + 2

852.

According to India State of Forest Report – 2015, which State has highest forest cover in percentage terms? 1. Arunachal Pradesh2. Mizoram3. Andhra Pradesh4. Madhya Pradesh

Answer» Correct Answer - Option 2 : Mizoram

The correct answer is Mizoram.

  • The state with the highest forest cover in percentage terms according to the India State of Forest Report- 2015 is Mizoram.
  • The state with the largest total forest cover according to the India State of Forest Report- 2015 is Madhya Pradesh having 77, 462 sq km of forest cover.
  • The states where forest cover has decreased substantially are Mizoram, Telangana, Uttarakhand, Nagaland, Arunachal Pradesh.

  • According to the State of Forest Report 2015:
    • Total forest cover in India: 7,01,673 sq km (increase of 3775 sq. km)
    • Total forest cover as a percentage of the geographical area: 21.34 percent.
    • Total tree cover in India: 92,572 sq km (an increase of 1306 sq km).
    • Total tree cover as a percentage of the geographical area: 2.82 percent.
    • State having highest forest cover as % of its area: Mizoram (88.93 percent).
    • Increase in carbon sink:103 million tonnes CO2 equivalent.
853.

The Rajasthan Forestry and Biodiversity Project (2011 - 2019) is NOT related to which of the following?1. Afforestation2. Livelihood promotion3. Biodiversity conservation4. Irrigation development

Answer» Correct Answer - Option 4 : Irrigation development

Irrigation development is NOT correct.

  • The Rajasthan Forestry and Biodiversity Project (2011 - 2019) is not related to Irrigation development.

  • The Rajasthan Forestry and Biodiversity Project:
    • ​Rajasthan Forestry & Biodiversity Project (R.F.B.P.) is being implemented with the financial assistance of the Japan Bank for International Corporation (J.B.I.C.) Japan.
    • The project was launched with objectives of restoring the ecological status of Aravallis, Conserve Biodiversity, Check desertification, improve moisture regime and protect infrastructure in the desert areas.
    • It also aims at providing fuel/fodder grass, timber and non-timber forest products along with employment generation in the rural areas.
    • R.F.B.P. aims at ecological restoration and biological up-gradation of degraded forests and other lands including community land in Rajasthan.
    • The project covers 18 districts and is being executed by 31 forest divisions in the state.
    • Forest conservation activities with selected intervention in areas having crown density more than 40% and restoration of ecological status by carrying out plantations in degraded areas have been followed. 

  • Government of Rajasthan has received a loan from the Japanese International Cooperation Agency (JICA) through the Government of India for phase 2.
  • Phase 2 (“RFBP-2”) will be implemented across 15 districts of Rajasthan and in around 7 Wild Life sanctuaries.
854.

Arun, Gulab, Neel and Shweta must choose one shirt each from a pile of four shirts coloured red, pink, blue and white respectively. Arun dislikes the colour red and Shweta dislikes the colour white. Gulab and Neel like all the colours. In how many different ways can they choose the shirts so that no one has a shirt with a colour he or she dislikes ? (A) 21 (B) 18 (C) 16 (D) 14

Answer»

(D) 14

As there are 4 people A,G,N,S and 4 colours so without any restriction total ways have to be 4 x 4 = 16

Now, Arun → dislikes Red and 

Shweta → dislikes white 

So 16 - 2b = 14 ways

855.

There are 3 red socks, 4 green socks and 3 blue socks, you choose 2 socks. The probability that they are of the same colour is _____. (A) 1/5 (B) 7/30 (C) 1/4 (D) 4/15

Answer»

Correct option is (D) 4/15

Required probability = 3C\(_2\) + 4C\(_ 2\) + 3C\(_ 2\)  / 10C\(_ 2\) = 4/15

856.

The Indian Standard Time corresponds to the longitude ______ degrees East.1. 82.52. 76.53. 79.54. 85.5

Answer» Correct Answer - Option 1 : 82.5

The correct answer is 82.5.

  • The Indian Standard Time corresponds to the longitude 82.5 degrees East.
  • It passes through Mirzapur city in Uttar Pradesh.

  • Greenwich Mean Time (GMT), the name for mean solar time of the longitude zero degree of the Royal Greenwich Observatory in England.
  • The meridian at this longitude is called the prime meridian or Greenwich meridian.
  • The International Date Line passes through the middle of the Pacific Ocean at 180 degrees longitude is an imaginary line which distinguishes one calendar day.
857.

Choose the option with words that are not synonyms. (A) aversion, dislike (B) luminous, radiant (C) plunder, loot (D) yielding, resistant

Answer»

(D) yielding, resistant

858.

X is a 30 digit number starting with the digit 4 followed by the digit 7, then the number X3 will have (A) 90 digits (B) 91 digits (C) 92 digits (D) 93 digits

Answer»

Correct option is (A) 90 digits 

X = (47 ......) 30 digits

Suppose (47)30digits = (2 + 2 + 2) digits in (47)3

Similarly (47)3 30digits  = contains (30 + 30 + 30) digits = 90 digits.

859.

“We lived in a culture that denied any merit to literary works, considering them important only when they were handmaidens to something seemingly more urgent - namely ideology. This was a country where all gestures, even the most private, were interpreted in political terms." The author's belief that ideology is not as important as literature is revealed by the word: (A) ‘culture’ (B) ‘seemingly’ (C) ‘urgent’ (D) ‘political’

Answer»

Correct option is (B) ‘seemingly’ 

860.

A test has twenty questions worth 100 marks in total. There are two types of questions, multiple choice questions are worth 3 marks each and essay questions are worth 11 marks each. How many multiple choice questions does the exam have? (A) 12 (B) 15 (C) 18 (D) 19

Answer»

Correct option is (B) 15

(x = MCQ , y = Essay type)

x + y = 20

3x + 11y = 100 

⇒ x = 15, y = 5

861.

Saturn is ____ to be seen on a clear night with the naked eye. (A) enough bright (B) bright enough (C) as enough bright (D) bright as enough

Answer»

(B) bright enough

862.

Verify whether the proposition ~(p ∨ q) → (~P ∧ ~q) is a tautology contradiction or neither.

Answer»
pq(p∨ q)~(p∨q)~p~q(~p ∧~q)1→2
TTTFFFFT
TFTFFTFT
FTTFTFFT
FFFTTTTT

From the table we conclude that it is a tautology

863.

A capacitor consists of two what

Answer»

Two conductors separated by an insulator

864.

Explain exit control loop

Answer»

An exit controlled loop is that category of loops in which the test condition is checked after the execution of the body of the loop.Thus,an exit control loop executes at least once even when the test condition fails. For example: do while loop in C.

865.

The resistance of a 10 ft. length of resistor material having a cross section of 0.00204 in.2 is 4.1 ohms, the resistance of a 12 ft. length of the same material is 7.7 ohms. Determine its cross section in sq. inches.

Answer» 0.0017  may be...i am not sure
866.

Derive the truth table for the following Boolean expression.                  X =

Answer»

Furdunji Naoroji founded the Rahnumai Mazdayasnan Sabha 1851.

867.

The transfer function of discreat time system is

Answer»

The Z-transform is used in discrete time systems to create a discrete time transfer function of the system with a set of poles and zeros. It is a formal transformation for discrete time signals (signals described in terms of their samples) to a new complex variable called z.

868.

What are the data units at different layers of the TCP / IP protocol suite?

Answer»

The data unit created at the application layer is called a message, at the transport layer the data unit created is called either a segment or an user datagram, at the network layer the data unit created is called the datagram, at the data link layer the datagram is encapsulated in to a frame and finally transmitted as signals along the transmission media.

869.

The PPP protocol _________(a) Is designed for simple links which transport packets between two peers(b) Is one of the protocols for making an Internet connection over a phone line(c) Is designed for simple links which transport packets between two peers and making an Internet connection over a phone line(d) Is used for sharing bandwidth

Answer» Correct choice is (c) Is designed for simple links which transport packets between two peers and making an Internet connection over a phone line

To explain: The PPP protocol is designed for handling simple links which transport packets between two peers. It is a standard protocol that is used to make an Internet connection over phone lines.
870.

PPP consists of ________components(a) Three (encapsulating, the Domain Name system)(b) Three (encapsulating, a link control protocol, NCP)(c) Two (a link control protocol, Simple Network Control protocol)(d) One (Simple Network Control protocol)

Answer» Correct choice is (b) Three (encapsulating, a link control protocol, NCP)

Easiest explanation: PPP consists of three components namely Link Control Protocol (LCP), Network Control Protocol (NCP), and Encapsulation. LCP and NCP are the PPP protocols which provide interface for handling the capabilities of the connection/link on the network and encapsulation provides for multiplexing of different network-layer protocols.
871.

PPP provides the _______ layer in the TCP/IP suite.(a) Link(b) Network(c) Transport(d) Application

Answer» The correct answer is (a) Link

The explanation is: PPP provides function of the link layer in the TCP/IP suite. It focuses on the link between two nodes that is going to be used by the users to communicate. It can use pre-installed phone line for the purpose.
872.

Beyond IP, UDP provides additional services such as _______(a) Routing and switching(b) Sending and receiving of packets(c) Multiplexing and demultiplexing(d) Demultiplexing and error checking

Answer» Correct choice is (d) Demultiplexing and error checking

The best I can explain: De-multiplexing is the delivering of received segments to the correct application layer processes at the recipients end using UDP. Error checking is done through checksum in UDP.
873.

Extensible authentication protocol is authentication framework frequently used in ______(a) Wired personal area network(b) Wireless networks(c) Wired local area network(d) Wired metropolitan area network

Answer» Right option is (b) Wireless networks

The best explanation: The Extensible Authentication Protocol (EAP) is an authentication protocol used to connect a network node to the Internet. It designed through extending the methods used by the Point-to-Point Protocol for authentication.
874.

Which two types of encryption protocols can be used to secure the authentication of computers using IPsec?(a) Kerberos V5(b) SHA(c) MD5(d) Both SHA and MD5

Answer» Correct option is (d) Both SHA and MD5

To elaborate: SHA or MD5 can be used. Kerberos V5 is an authentication protocol, not an encryption protocol; therefore, answer A is incorrect. Certificates are a type of authentication that can be used with IPsec, not an encryption protocol; therefore, answer B is incorrect.
875.

______ provides authentication at the IP level.(a) AH(b) ESP(c) PGP(d) SSL

Answer» Right option is (a) AH

To elaborate: The Authentication Header (AH) authenticates the origin of data, and guarantees the integrity of the information that’s being sent using IPSec. It also provides anti-reply security.
876.

Which two types of IPsec can be used to secure communications between two LANs?(a) AH tunnel mode(b) ESP tunnel mode(c) Both AH tunnel mode and ESP tunnel mode(d) ESP transport mode

Answer» Right choice is (c) Both AH tunnel mode and ESP tunnel mode

The explanation: The AH and ESP tunnel mode IPSec should be used for data transfer purpose, option d is for integrity & confidentiality purpose. Tunnel mode provides security for the entire original IP packet unlike transport mode which is not as secure as it only encrypts the data portion and not the whole packet.
877.

RPF stands for __________(a) Reverse Path Forwarding(b) Reverse Path Failure(c) Reverse Packet Forwarding(d) Reverse Protocol Failure

Answer» The correct answer is (a) Reverse Path Forwarding

The explanation: Reverse Path Forwarding is a loop-free forwarding method for multi-cast routing in modern systems. The method focuses on forwarding the packet away from the source IP in each iteration to make sure there is no loops.
878.

In tunnel mode, IPSec protects the ______(a) Entire IP packet(b) IP header(c) IP payload(d) IP trailer

Answer» Correct choice is (a) Entire IP packet

For explanation: In the tunnel mode, IPSec adds control bits into the packets to encrypt the entire packet between the IPSec endpoints. Using encryption, it provides secure communication between the two endpoints.
879.

Buy a _______ of chocolate chip cookies for dessert. A) bag B) half a gallon C) teaspoonD) loaf

Answer»

Correct option is A) bag

880.

IPSec is designed to provide security at the _________(a) transport layer(b) network layer(c) application layer(d) session layer

Answer» The correct option is (b) network layer

Easy explanation: IPSec is a set of protocols used to provide authentication, data integrity and confidentiality between two machines in an IP network. In the TCP/IP model, it provides security at the IP layer i.e. the network layer.
881.

Cookies were originally designed for ____________(a) Client side programming(b) Server side programming(c) Both Client side programming and Server side programming(d) Socket programming

Answer» Right answer is (b) Server side programming

Explanation: Cookies were originally designed for server side programming, and at the lowest level, they are implemented as an extension to the HTTP protocol. They were introduced with the intention of providing a better user experience for the websites.
882.

Which of the following explains Cookies nature?(a) Non Volatile(b) Volatile(c) Intransient(d) Transient

Answer» Correct choice is (d) Transient

To elaborate: Cookies are transient by default; the values they store last for the duration of the web browser session but are lost when the user exits the browser. While the browsing session is active the cookie stores the user values in the user’s storage itself and accesses them.
883.

In the process of fetching a web page from a server the HTTP request/response takes __________ RTTs.(a) 2(b) 1(c) 4(d) 3

Answer» The correct answer is (b) 1

For explanation I would say: By default the http connection will be persistent connection. Hence it will take only 1 RTT to fetch a webpage from a server.
884.

Which of the following HTTP methods should be idempotent in nature?(a) OPTIONS(b) DELETE(c) POST(d) HEAD

Answer» The correct choice is (b) DELETE

Explanation: DELETE operation should be idempotent, means their result will always same no matter how many times these operations are invoked. Also, the PUT operation is supposed to be idempotent.
885.

The Cookie manipulation is done using which property?(a) cookie(b) cookies(c) manipulate(d) manipulate cookie

Answer» The correct option is (a) cookie

The best explanation: The cookie property sets or returns all name/value pairs of cookies in the current document. There are no methods involved: cookies are queried, set, and deleted by reading and writing the cookie property of the Document object using specially formatted strings.
886.

HTTP client requests by establishing a __________ connection to a particular port on the server.(a) User datagram protocol(b) Transmission control protocol(c) Border gateway protocol(d) Domain host control protocol

Answer» The correct answer is (b) Transmission control protocol

To elaborate: HTTP clients perform requests using a TCP connection, because the TCP connection provides a more reliable service. UDP is not a reliable protocol, border gateway protocol is used on top of TCP, while domain host control protocol is a network layer protocol.
887.

In FTP protocol, client contacts server using ____ as the transport protocol.(a) transmission control protocol(b) user datagram protocol(c) datagram congestion control protocol(d) stream control transmission protocol

Answer» The correct answer is (a) transmission control protocol

The best I can explain: The clients use the Transmission Control Protocol for FTP as it’s more reliable than UDP, DCCP, and SCTP, and reliability of file transfer is required to be as high as possible for FTP.
888.

DHCP (dynamic host configuration protocol) provides __________ to the client.(a) IP address(b) MAC address(c) Url(d) None of the mentioned

Answer» Correct option is (a) IP address

Explanation: We use DHCP to allow the hosts to acquire their ip addresses dynamically which is better than visiting each and every host on the network and configure all of this information manually.
889.

Which of the following directive of Cache Control Header of HTTP response indicates that resource is cachable by only client and server?(a) Public(b) Private(c) Nocache/nostore(d) Maxage

Answer» Correct answer is (b) Private

To elaborate: Private directive indicates that resource is cachable by only client and server; no intermediary can cache the resource. But if we use the public directive, it indicates that the resource may be cachable by any intermediary component.
890.

Which of the following is not a good practice to create a standard URI for a web service?(a) Maintain Backward Compatibility(b) Use HTTP Verb(c) Using spaces for long resource names(d) Use lowercase letters

Answer» Correct option is (c) Using spaces for long resource names

To elaborate: We must use hyphens (-) or underscores (_) instead of spaces to represent long resource names. It may lead to the resource to be less recognizable for the system if we use spaces instead.
891.

Which of the following protocol is used by Restful web services as a medium of communication between client and server?(a) HTTP(b) FTP(c) Gopher(d) TELNET

Answer» Right answer is (a) HTTP

The best explanation: Restful web services make use of HTTP protocol as a medium of communication between client and server. The REST architecture was known as the HTTP object model back in the year 1994.
892.

What does REST stand for?(a) Represent State Transfer(b) Representational State Transfer(c) Representing State Transfer(d) Representation State Transfer

Answer» The correct choice is (b) Representational State Transfer

Explanation: REST stands for Representational State Transfer and is a software architecture style in which the server sends a representation of the state of the resource that it requests. It provides interoperability between the systems.
893.

Which of the following function is used as a consequence of not including semicolons, Commas or whitespace in the Cookie value?(a) EncodeURIComponent()(b) EncodeURI()(c) EncodeComponent()(d) Encode()

Answer» Correct choice is (a) EncodeURIComponent()

For explanation: Cookie values cannot include semicolons, commas, or whitespace. For this reason, you may want to use the core JavaScript global function encodeURIComponent() to encode the value before storing it in the cookie.
894.

What is the constraint on the data per cookie?(a) 2 KB(b) 1 KB(c) 4 KB(d) 3 KB

Answer» Correct choice is (c) 4 KB

The best I can explain: Each cookie can hold up to only 4 KB. In practice, browsers allow many more than 300 cookies total, but the 4 KB size limit may still be enforced by some. Storage of a session has to be a minimum of 5MB.
895.

Which of the following is a Boolean cookie attribute?(a) Bool(b) Secure(c) Lookup(d) Domain

Answer» Right choice is (b) Secure

The best explanation: The final cookie attribute is a boolean attribute named secure that specifies how cookie values are transmitted over the network. By default, cookies are insecure, which means that they are transmitted over a normal, insecure HTTP connection. If a cookie is marked secure, however, it is transmitted only when the browser and server are connected via HTTPS or another secure protocol.
896.

How can you set a Cookie visibility scope to local Storage?(a) /(b) %(c) *(d) #

Answer» The correct option is (a) /

To elaborate: Setting the path of a cookie to “/” gives scoping like that of localStorage and also specifies that the browser must transmit the cookie name and value to the server whenever it requests any web page on the site.
897.

Which of the following can be used to configure the scope of the Cookie visibility?(a) Path(b) Domain(c) Both Path  and Domain(d) Server

Answer» Right answer is (d) Server

Easy explanation: The Cookie visibility scope is configurable through cookie attributes path and domain. Domain attribute in the cookie is used to specify the domain for which the cookie is sent. Path includes the Path attribute in the cookie to specify the path for which this cookie is sent.
898.

Dividend is usually paid.(a)  on Authorised capital(b)  on issued capital(c)  on paid up capital(d)  on called up capital

Answer»

(c)  on paid up capital

899.

Dividend are usually paid on(a) Authorised Capital(b) Called up capital(c) Issued capital(d) Paid up capital

Answer»

Dividend are usually paid on Issued capital

900.

Contingent Liabilities are exhibited under the heading: (a) Non-current Liabilities (b) Current Liabilities (c) In the Notes to Accounts (d) Current assets

Answer»

Correct option is (c) In the Notes to Accounts