Searching for "Identified"

Q:

Identified the odd one from the list below.

A) Snake B) Lizard
C) Reptiles D) Crocodile
 
Answer & Explanation Answer: C) Reptiles

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: Odd Man Out
Exam Prep: Bank Exams

Q:

Computers on an internet are identified by

A) Street address B) E-mail address
C) IP address D) all of the above
 
Answer & Explanation Answer: C) IP address

Explanation:

An Internet Protocol address is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. An IP address serves two main functions: host or network interface identification and location addressing

Report Error

View Answer Report Error Discuss

Filed Under: Computer
Exam Prep: Bank Exams

Q:

In the following question, two statements are given each followed by two conclusions I and II. You have to consider the statements to be true even if they seem to be at variance from commonly known facts. You have to decide which of the given conclusions, if any, follows from the given statements.

 

Statement:
(I) Air purifier is the latest innovation of this decade.
(II) Marketers identified the need and grabbed the opportunity of polluted atmosphere and created a new product for people.

 

Conclusions:
(I) The reason for invention of air purifier is rising levels of pollution.
(II) The need is created in market about the product and then it is established.

 

A) Only conclusion II follows B) Conclusion I and II both follow
C) Neither I nor II follow D) Only conclusion I follows
 
Answer & Explanation Answer: D) Only conclusion I follows

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: Statement and Conclusions
Exam Prep: Bank Exams

Q:

Which of the following errors are identified by the compiler?

A) Logical Errors B) Hardware Errors
C) Language Errors D) Image Errors
 
Answer & Explanation Answer: A) Logical Errors

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: Computer
Exam Prep: Bank Exams

Q:

In the following question, some part of the sentence may have errors. Find out which part of the sentence has an error and select the appropriate option. If a sentence is free from error, select ‘No Error’.

 

When the self is not enlightened, (1)/ it is fundamental identified with the notion of (2)/ difference, unaware of its primordial unity. (3)/ No error (4)

A) 1 B) 2
C) 3 D) 4
 
Answer & Explanation Answer: B) 2

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: English
Exam Prep: Bank Exams

Q:

The ‘four great needs’ of the people as identified by the Guomindang were

A) clothing food, housing and transportation B) education food, housing and health care
C) food, housing, education and employment   D) employment housing, education and health care
 
Answer & Explanation Answer: A) clothing food, housing and transportation

Explanation:

Founded in 1912, the Kuomintangis the oldest still active political party in the Chinese-speaking world.Its main leader was Sun Yat-Sen. He divided the livelihood into four parts: clothing, food, housing and transportation.

Report Error

View Answer Report Error Discuss

Filed Under: Indian History

Q:

Type of a file in a computer can be identified by the ___.

A) Folder name B) File size
C) File path D) File extension
 
Answer & Explanation Answer: D) File extension

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: Computer

Q:

Social engineering attacks are best identified by

A) Ransomware B) Phishing
C) Both A & B D) None of the above
 
Answer & Explanation Answer: C) Both A & B

Explanation:

Social engineering is the art of tricking users into performing certain harmful activities or attacks, users must be trained to identify social engineering. Social engineering attacks typically involve some form of psychological manipulation, fooling otherwise unsuspecting users or employees into handing over confidential or sensitive data. Commonly, social engineering involves email or other communication that invokes urgency, fear, or similar emotions in the victim, leading the victim to promptly reveal sensitive information, click a malicious link, or open a malicious file. Because social engineering involves a human element, preventing these attacks can be tricky for enterprises.

 

Report Error

View Answer Report Error Discuss