Q.14 An individual who breaks into a computer or a network system without authorization with the intention to do damage or for self-benefit, is termed as:Ans 1. Hacker2. None of the above3. Intruder4. CrackerCorrect Ans Provided: 4
RankiQ Discuss Latest Questions
Q.36 दुनिया का पहला क्लोन आर्कटिक वुल्फ किसके द्वारा किया गया है:एक।Ans 1. रूस2. संयुक्त राज्य अमेरिका3. जापान4. चीनCorrect Ans Provided: 4
Q.29 Which Indian passenger carrier became the first airline to use CAE’s artificial intelligence powered training system to train the airline’s pilots?Ans 1. Air Asia India2. Akasa Air3. Vistara4. IndigoCorrect Ans Provided: 1
Q.77 The sky’s blueness is mostly caused by:Ans 1. The presence of water vapor2. Absorption of blue light by the air3. The scattering of sunlight by air molecules4. Emission of blue light by the atmosphereCorrect Ans Provided: 3
Q.19 8 bits make a _____Ans 1. word2. nibble3. buzz4. byteCorrect Ans Provided: 4
Q.3 निम्नलिखित में से कौन एक द्विसंयोजक आयन है:Ans 1. सल्फेट2. नाइट्रेट3. क्लोराइड4. फॉस्फेटCorrect Ans Provided: 1
Q.26 Which command in CAD helps to create a dimension aligned with the origin points of the extension line?Ans 1. DIMBASELINE2. DIMALIGNED3. DIMANGULAR4. DIMRADIUSCorrect Ans Provided: 2
Q.63 Cantilever beam isAns 1. A beam fixed at one end and stands unsupported at the other end2. A beam supported at both ends and fixed to resist rotation3. A beam with support at both ends and are ...
Q.41 During the manufacturing of cement what is the temperature required for mixing the different ingredients of cement?Ans 1. 1200°C2. 1100°C3. 1000°C4. 1400°CCorrect Ans Provided: 4
Q.73 Orifice formula is used whenAns 1. Downstream depth < 60% of the upstream depth2. Downstream depth < 80% of the upstream depth3. Downstream depth = of the upstream depth4. Downstream depth > 80% of ...