IT Trainer Questions


Q:

Order of basicity of amines in gaseous state?

A) 2'> 1'> 3' > NH3 B) 3' > 2' > 1'> NH3
C) 1' > 2' > 3'> NH3 D) 2'> 3'> 1' > NH3
 
Answer & Explanation Answer: B) 3' > 2' > 1'> NH3

Explanation:

The order of basicity in ammonia is different in gaseous phases vs. aqueous phases due to hydrogen bonding.

 

So in gaseous phases it's the well known: 3' > 2' > 1'> NH3. Just so we're on the same page, this is due to the inductive effect of electron donating alkyl groups--they destabilize the lone pair on nitrogen atom, making nitrogen more basic.

 

But in aqueous phase, the order is slightly different: 2'> 1'> 3' > NH3.

Report Error

View Answer Report Error Discuss

Filed Under: Chemistry
Exam Prep: AIEEE , Bank Exams , CAT , GATE
Job Role: Analyst , Bank Clerk , Bank PO , Database Administration , IT Trainer

6 7823
Q:

White Box Techniques are also called as

A) Design Based Testing B) Experience Based Technique
C) Structural Testing D) Error Guessing Technique
 
Answer & Explanation Answer: C) Structural Testing

Explanation:

Structural Testing is the other name for White Box Techniques.

Report Error

View Answer Report Error Discuss

4 7818
Q:

How many birthdays does the average person have?

Answer

Any person can have only 1 birthday i.e, the day he was born. And every year we celebrate it's anniversaries.

Report Error

View answer Workspace Report Error Discuss

9 7796
Q:

A data dictionary is a special file that contains

A) The width of all fields in all files B) The data type of all fields in all file
C) The name of all fields in all files D) All of the above
 
Answer & Explanation Answer: D) All of the above

Explanation:

A data dictionary is a special file that contains a set of information describing the contents, format, and structure of a database and the relationship between its elements, used to control access to and manipulation of the database.

Report Error

View Answer Report Error Discuss

Filed Under: Database
Exam Prep: Bank Exams
Job Role: Analyst , Bank Clerk , Database Administration , IT Trainer

44 7775
Q:

Which of the following has the highest entropy?

A) Hydrogen B) Diamond
C) Liquid nitrogen D) Mercury
 
Answer & Explanation Answer: A) Hydrogen

Explanation:

Entropy is a measure of disorder . It will be maximum in gases followed by liquids and least in solids.

 

Hence, here the gas is only hydrogen and it has the highest entropy.

Report Error

View Answer Report Error Discuss

Filed Under: Physics
Exam Prep: AIEEE , Bank Exams , CAT , GATE
Job Role: Analyst , Bank Clerk , Bank PO , IT Trainer

8 7771
Q:

3 is what percent of 5?

A) 45% B) 60%
C) 72% D) 80%
 
Answer & Explanation Answer: B) 60%

Explanation:

Here it is asked that 3 is what percent of 5

Let 3 is K percent of 5.

=> K x 5/100 = 3

=> K = 300/5 = 60

 

Hence, 3 is 60% of 5.

Report Error

View Answer Report Error Discuss

8 7749
Q:

Out of three numbers, the first is twice the second and is half of the third. If the average of the three numbers is 56, what will be the sum of the highest number and the lowest number?

A) 120 B) 160
C) 80 D) 60
 
Answer & Explanation Answer: A) 120

Explanation:

Let the three numbers be x, y, z.

From the gien data,

x = 2y ....(1)

x = z/2 => z = 2(2y) = 4y .....(From 1)  ...........(2)

Given average of three numbers = 56

Then,

 

x + y + z3 = 562y + y + 4y3 = 56  (From 1 & 2)7y = 56 x 3y = 24

Now,

x = 2y => x = 2 x 24 = 48

z = 4y = 4 x 24 = 96

 

Now, the highest number is z = 96 & smallest number is y = 24

 

Hence, required sum of highest number and smallest number

= z + y

= 96 + 24

= 120.

Report Error

View Answer Report Error Discuss

Filed Under: Average
Exam Prep: AIEEE , Bank Exams , CAT , GATE
Job Role: Analyst , Bank Clerk , Bank PO , Database Administration , IT Trainer

15 7730
Q:

Social engineering attacks are best identified by

A) Ransomware B) Phishing
C) Both A & B D) None of the above
 
Answer & Explanation Answer: C) Both A & B

Explanation:

Social engineering is the art of tricking users into performing certain harmful activities or attacks, users must be trained to identify social engineering. Social engineering attacks typically involve some form of psychological manipulation, fooling otherwise unsuspecting users or employees into handing over confidential or sensitive data. Commonly, social engineering involves email or other communication that invokes urgency, fear, or similar emotions in the victim, leading the victim to promptly reveal sensitive information, click a malicious link, or open a malicious file. Because social engineering involves a human element, preventing these attacks can be tricky for enterprises.

 

Report Error

View Answer Report Error Discuss

6 7727