IT Trainer Questions


Q:

Library is to Book as Book is to

A) Words B) Pages
C) Binding D) Cover
 
Answer & Explanation Answer: B) Pages

Explanation:

A Library consists of Books in the same way Book consists Pages.

 

Hence, Library : Book :: Book : Pages.

Report Error

View Answer Report Error Discuss

Filed Under: Analogy
Exam Prep: AIEEE , Bank Exams , CAT , GATE
Job Role: Analyst , Bank Clerk , Bank PO , IT Trainer

17 12457
Q:

Which liquid is the most viscous?

A) Water B) Diesel
C) Milk D) Oil
 
Answer & Explanation Answer: D) Oil

Explanation:

Here Oil is the most viscous liquid.

The liquid with the most intermolecular force is high viscous. viscosity is how smoothly a liquid flows and how hardly the liquid flows it is highly viscous.

Report Error

View Answer Report Error Discuss

Filed Under: Physics
Exam Prep: AIEEE , Bank Exams , CAT , GATE
Job Role: Analyst , Bank Clerk , Bank PO , IT Trainer

16 12456
Q:

Name a common greenhouse gas containing only hydrogen and oxygen?

A) CH4 B) O3
C) H2O D) NO
 
Answer & Explanation Answer: C) H2O

Explanation:

The common greenhouse gas containing only hydrogen and oxygen is H2O, this is water vapor.

The common greenhouse gases are water vapor, carbon dioxide, methane, nitrous oxide, and ozone.

The composition (chemical formula) of those gases are:

Water vapor: H2O
Carbon dioxide: CO2
Methane: CH4
Nitrous oxide: NO
Ozone: O3.

As you see the only one of those that contains only hydrogen and oxygen is H2O, water vapor.

Report Error

View Answer Report Error Discuss

Filed Under: General Awareness
Exam Prep: AIEEE , Bank Exams , CAT , GATE
Job Role: Analyst , Bank Clerk , Bank PO , IT Trainer

10 12434
Q:

The Basic Architecture of Computer was developed by

A) Charles Babbage B) Blaise Pascal
C) Garden Moore D) John Von Neumann
 
Answer & Explanation Answer: D) John Von Neumann

Explanation:

Computer Architecture refers to how a computer system is designed and what technologies it is compatible with. In brief, Computer architecture is a specification detailing how a set of software and hardware technology standards interact to form a computer system or platform.  

                                     comp1518074667.jpg image 

The Von Neumann Architecture, which is also known as the Von Neumann Model and Princeton architecture, is a computer architecture based on the 1945 description of computer by the mathematician and physicist John von Neumann.

Report Error

View Answer Report Error Discuss

19 12295
Q:

How many seconds in 10 years?

A) 31523500 sec B) 315360000 sec
C) 315423000 sec D) 315354000 sec
 
Answer & Explanation Answer: B) 315360000 sec

Explanation:

We know that,

1 year = 365 days

1 day = 24 hours

1 hour = 60 minutes

1 minute = 60 seconds.

 

Then, 1 year = 365 x 24 x 60 x 60 seconds.

= 8760 x 3600

1 year = 31536000 seconds.

 

Hence, 10 years = 31536000 x 10 = 315360000 seconds.

Report Error

View Answer Report Error Discuss

Filed Under: Calendar
Exam Prep: AIEEE , Bank Exams , CAT , GATE
Job Role: Analyst , Bank Clerk , Bank PO , IT Trainer

60 12248
Q:

Two Fathers and Two Sons walk into a ice cream parlour. They each buy something for Rs. 50 but they only spent Rs. 150. How is that possible?

Answer

One grandfather, One father and One son makes two fathers and two sons.

Report Error

View answer Workspace Report Error Discuss

87 12103
Q:

Third proportion of 10 and 20 is

A) 30 B) 40
C) 25 D) 20
 
Answer & Explanation Answer: B) 40

Explanation:

The third proportional of two numbers p and q is defined to be that number r such that

p : q = q : r.

 

Here, required third proportional of 10 & 20, and let it be 'a'

=> 10 : 20 = 20 : a

10a = 20 x 20

=> a = 40

 

Hence, third proportional of 10 & 20 is 40.

Report Error

View Answer Report Error Discuss

Filed Under: Average
Exam Prep: AIEEE , Bank Exams , CAT , GATE , GRE
Job Role: Analyst , Bank Clerk , Bank PO , Database Administration , IT Trainer

30 12061
Q:

The common name for the crime of stealing passwords is

A) Spoofing B) Surfing
C) Identity Theft D) Speeling
 
Answer & Explanation Answer: A) Spoofing

Explanation:

A spoofing attack is a situation in which one individual or program effectively disguises or mask as another by falsifying information and thereby gaining up an ill-conceived advantage. It may use for stealing password or IP addresses.

Report Error

View Answer Report Error Discuss

18 12054