Questions

Q:

Nawab Siraj -ud-daulah of Bengal was defeated by the English in the battle of Plassey, mainly

A) because the English Forces were much stronger than those of the Nawab B) because of Clive's conspiracy with the Nawab's Commander-in-Chief Mir Jafar and rich bankers of Bengal
C) because of Siraj-ud-Daulah's retirement from the battlefield D) because of the capture of a band of frenchmen under the Nawab's service by the English
 
Answer & Explanation Answer: B) because of Clive's conspiracy with the Nawab's Commander-in-Chief Mir Jafar and rich bankers of Bengal

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: Indian History

61 12285
Q:

Which structural formula represents a dipole?

dipole1526886238.jpg image

A) 4 B) 3
C) 2 D) 1
 
Answer & Explanation Answer: D) 1

Explanation:

What is Dipole :

 

when two atoms in a molecule have substantially different electronegativity: One atom attracts electrons more than another, becoming more negative, while the other atom becomes more positive.

Report Error

View Answer Report Error Discuss

Filed Under: Chemistry
Exam Prep: Bank Exams , AIEEE
Job Role: Bank Clerk , Analyst

12 12272
Q:

The total number of pairs of Peripheral nerves in man are

A) 41 B) 42
C) 43 D) 44
 
Answer & Explanation Answer: C) 43

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: Biology

102 12272
Q:

The Supreme Court of India was set up by the 

A) Regulating Act, 1773 B) Pitt's India Act, 1784
C) Charter Act, 1813 D) Charter Act,1833
 
Answer & Explanation Answer: A) Regulating Act, 1773

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: Indian Politics

23 12268
Q:

Where was the seat of the first Republic of the world in 6th century BC

A) Athens B) Vaishali
C) Sparta D) Pataliputra
 
Answer & Explanation Answer: B) Vaishali

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: Indian History

22 12268
Q:

Impact analysis helps to decide

A) How many more test cases need to written. B) How much regression testing should be done.
C) Different Tools to perform Regression Testing D) Exit Criteria
 
Answer & Explanation Answer: B) How much regression testing should be done.

Explanation:

Impact Analysis is used in software testing to define all the risks associated with any kind of changes in a product being tested.

Impact Analysis is nothing but analyzing the impact of changes in the deployed product or application. It gives the information about the areas of the system that may be affected due to the change in the particular section or features of the application.

 

Why Impact Analysis is done :


1. It is done to understand the possible outcome of implementing the change. Inducing too much functionality into a product can reduce the overall performance of the product.

2. To identify all the files, documents and models that might have to be modified if team decides to implement the change in product

3. To estimate the effort needed behind implementing the change

4. To identify the task required to implement the change

5. It will list the dependencies on a specific element

 

The impact is analyzed on Requirements, Design & Architecture, impact on Test and impact on schedule.

Report Error

View Answer Report Error Discuss

0 12255
Q:

Which of the following is the storage area within the computer itself which holds data only temporarily as the computer process instructions?

A) the hard disk B) main memory
C) the control unit D) read-only memory
 
Answer & Explanation Answer: B) main memory

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: Computer
Exam Prep: Bank Exams
Job Role: Bank PO

32 12252
Q:

The common name for the crime of stealing passwords is

A) Spoofing B) Surfing
C) Identity Theft D) Speeling
 
Answer & Explanation Answer: A) Spoofing

Explanation:

A spoofing attack is a situation in which one individual or program effectively disguises or mask as another by falsifying information and thereby gaining up an ill-conceived advantage. It may use for stealing password or IP addresses.

Report Error

View Answer Report Error Discuss

18 12245