Questions

Q:

Who among the following discovered electron?

A) J.J Thomson B) Max Born
C) Antoine Lavoisier D) Mendeleef
 
Answer & Explanation Answer: A) J.J Thomson

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: Inventions
Exam Prep: Bank Exams

1 1492
Q:

The _________________ is the second supersonic fighter developed by Hindustan Aeronautics Limited (HAL) after the HAL HF-24 Marut. 

A) Trishul  B) Prithavi
C) Vikrant  D) Akash 
 
Answer & Explanation Answer:

Explanation:

The Tejas is the second supersonic fighter developed by Hindustan Aeronautics Limited (HAL) after the HAL HF-24 Marut. As of 2016 the Tejas Mark 1 is in production for the Indian Air Force (IAF) and the naval version is undergoing flight tests for Indian Navy (IN). 

Report Error

View Answer Report Error Discuss

Filed Under: General Awareness
Exam Prep: AIEEE , Bank Exams , CAT

0 1492
Q:

The association of animals in which both the partners are benefitted is known as

A) Ammansalism B) Commensalism
C) Colony D) Mutualism
 
Answer & Explanation Answer: D) Mutualism

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: General Science
Exam Prep: Bank Exams

1 1492
Q:

What is the accounting year of the Reserve Bank of India ?

A) April-­March B) July-­June
C) October-­September D) January­-December
 
Answer & Explanation Answer: B) July-­June

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: Indian Politics
Exam Prep: Bank Exams

0 1492
Q:

C Programming language was developed by ___________.

A) Charles Babbage B) Larry Wall
C) James Gosling D) Dennis Ritchie
 
Answer & Explanation Answer: D) Dennis Ritchie

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: Computer
Exam Prep: Bank Exams

2 1492
Q:

In the following passage, some of the words have been left out. Read the passage carefully and select the correct answer for the given blank out of the four alternatives.

 

Cyber security has ________________interesting parallel to terrorism. _________________ are asymmetric. Ensuring security of data, information, and communication is considerably harder than hacking into a system. The attacker has an inherent ________________ in both conventional terrorism and cyber attacks. In the case _________________ state­-sponsored attacks, the challenges are of a much ________________ magnitude.

 

In the case _________________ state-­sponsored attacks.

 

A) for B) of
C) with D) about
 
Answer & Explanation Answer: B) of

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: English
Exam Prep: Bank Exams

0 1492
Q:

In the following question, out of the four alternatives, select the alternative which is the best substitute of the words/sentence.

 

Break up into small parts as the result of impact or decay.

 

A) Disintegrate B) Juxtapose
C) Conjugate D) Entwine
 
Answer & Explanation Answer: A) Disintegrate

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: English
Exam Prep: Bank Exams

0 1492
Q:

In the following question, out of the given four alternatives, select the one which best expresses the meaning of the given word.

 

Perennial

 

A) Dangerous B) Lasting
C) Dry D) Perishable
 
Answer & Explanation Answer: B) Lasting

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: English
Exam Prep: Bank Exams , GRE , TOEFL

0 1492