Description : The product of (q-1) consecutive integers where `qgt1` is divisible by ___________
Last Answer : The product of (q-1) consecutive integers where `qgt1` is divisible by ___________
Description : (i)What are sign conventions used for Heat and Work? (ii).Neither ‘q’ nor ‘w’ is a state function but “ q + w” is a state function. Assign reason.
Last Answer : Ans. (i)Heat absorbed by the system = +ve Heat evolved by the system = -ve Work done by the system = -ve Work done on the system = +ve (ii)ΔU = q + w and ‘∆U’ is a state function, which depends upon initial and final states of the system and not upon its path.
Description : Eight persons P, Q, R, S, W, X, Y and Z in which 4 females are facing towards and 4 males facing away from the center. Males and females are seated alternately. I. X is male, W position is 3rd to the right of X ... . Which of the following is correct for neighbors? a) X, W b) R, X c) S, W d) P, S
Last Answer : Ans: option (d)
Description : Eight persons P, Q, R, S, W, X, Y and Z in which 4 females are facing towards and 4 males facing away from the center. Males and females are seated alternately. I. X is male, W position is 3rd to the right of X and ... R & Y are neighbors. Who is the only female in between X & R? a) Z b) P c) Y d) Q
Last Answer : Ans: option (c)
Description : Eight persons P, Q, R, S, W, X, Y and Z in which 4 females are facing towards and 4 males facing away from the center. Males and females are seated alternately. I. X is male, W position is 3rd to the right of X and exactly opposite to Q. ... a) S, Q, R, W b) P, Q, Y, W c) P, Q, R, W d) P, Q, R, S
Last Answer : b) P, Q, Y, W
Description : Eight persons P, Q, R, S, W, X, Y and Z in which 4 females are facing towards and 4 males facing away from the center. Males and females are seated alternately. I. X is male, W position is 3rd to the right of X ... as well R & Y are neighbors. 10. Who is exactly opposite to X? a) Z b) P c) S d) W
Last Answer : Ans: option (a)
Description : Decision trees are appropriate for the problems where ___________ a) Attributes are both numeric and nominal b) Target function takes on a discrete number of values. c) Data may have errors d) All of the mentioned
Last Answer : d) All of the mentioned
Description : The adjective first-order distinguishes first-order logic from ___________ in which there are predicates having predicates or functions as arguments, or in which one or both of ... Representational Verification b) Representational Adequacy c) Higher Order Logic d) Inferential Efficiency
Last Answer : c) Higher Order Logic
Description : Fuzzy logic is usually represented as ___________ a) IF-THEN-ELSE rules b) IF-THEN rules c) Both IF-THEN-ELSE rules & IF-THEN rules
Last Answer : b) IF-THEN rules
Description : The values of the set membership is represented by ___________ a) Discrete Set b) Degree of truth c) Probabilities d) Both Degree of truth & Probabilities
Last Answer : b) Degree of truth
Description : Searching using query on Internet is, use of ___________ type of agent. a) Offline agent b) Online agent c) Both Offline & Online agent d) Goal Based & Online agent
Last Answer : d) Goal Based & Online agent
Description : In asynchronous serial communication the physical layer provides ___________ a. start and stop signalling b. flow control c. both start & stop signalling and flow control d. only start signalling
Last Answer : c. both start & stop signalling and flow control
Description : The primary function of an electric motor is to ___________. A. develop torque B. generate high voltages C. produce a magnetic field D. generate high electrical resistance
Last Answer : Answer: A
Description : In LISP, the function returns t if is even and nil otherwise ___________ a) (evenp ) b) (even ) c) (numeven ) d) (numnevenp )
Last Answer : a) (evenp )
Description : The Set of actions for a problem in a state space is formulated by a ___________ a) Intermediate states b) Initial state c) Successor function, which takes current action and returns next immediate state d) None of the mentioned
Last Answer : c) Successor function, which takes current action and returns next immediate state
Description : ___________ is a function of the particular enterprise and application in an on-premises deployment. a) Vendor lock b) Vendor lock-in c) Vendor lock-ins d) None of the mentioned
Last Answer : Vendor lock-in
Description : ___________ manages the switching function in GSM. a) BSS b) NSS c) OSS d) MSC
Last Answer : c) OSS
Description : Two pipe P & Q fill a tab in 5 hrs and 20 hrs respectively. If both the pipes are open then due to the leakage, it took 30mins more to fill the tab. If the tab is full, how long will it take for the leakage alone to empty the tank? A) 28 B) 24 C) 36 D) 12
Last Answer : C Part filled by(P+Q) in 1 hr = 1/5 + 1/20 = ¼ So P & Q together can fill the tank in 4 hrs. Work done by the leak in 1 hr = 1 / 4 - 2/9 Leak will empty the tank in 36 hrs.
Description : Persons with `___________` and `_____________` blood group are called universal recepitents & universal donors respectively `:`
Last Answer : Persons with `___________` and `_____________` blood group are called universal recepitents & universal donors respectively `: ... ` D. `AB^(+),O^(-)`
Description : With his wife Melinda, Bill Gates chairs the ___________, the world's largest private charitable foundation. A. Gates & Melinda Gates Foundation B. Microsoft Foundation C. Bill & Melinda Gates Foundation D. None of Above
Last Answer : ANSWER: C
Description : Uncertainty arises in the wumpus world because the agent’s sensors give only ___________ a) Full & Global information b) Partial & Global Information c) Partial & local Information d) Full & local information
Last Answer : c) Partial & local Information
Description : Strategies that know whether one non-goal state is “more promising” than another are called ___________ a) Informed & Unformed Search b) Unformed Search c) Heuristic & Unformed Search d) Informed & Heuristic Search
Last Answer : d) Informed & Heuristic Search
Description : A penetration tester must identify and keep in mind the ___________ & ___________ requirements of a firm while evaluating the security postures. a) privacy and security b) rules and regulations c) hacking techniques d) ethics to talk to seniors
Last Answer : a) privacy and security
Description : Nusselt number (for forced convection heat transfer) is a function of the __________ number. (A) Prandtl (B) Reynolds (C) Both (A) & (B) (D) Neither (A) nor (B)
Last Answer : (C) Both (A) & (B)
Description : jH factor for heat transfer is not a function of the __________ number. (A) Reynolds (B) Nusselt (C) Grashoff (D) Both (B) & (C)
Last Answer : (D) Both (B) & (C)
Description : Absolute viscosity of a fluid is a function of the __________ of the fluid. (A) Motion (B) Pressure & temperature (C) Shearing stress (D) Both (B) & (C)
Description : For an incompressible fluid, the __________ is a function of both pressure as well as temperature. (A) Internal energy (B) Enthalpy (C) Entropy (D) All (A), (B) & (C)
Last Answer : (B) Enthalpy