Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

16251.

I can’t ________ to have a holiday abroad on my salary. A) spend B) think C) afford D) help E) spare

Answer»

Correct option is C) afford

16252.

I took the doctor’s prescription to the chemist’s to be ______. A) made out B) made up C) made over D) made into

Answer»

Correct option is B) made up

16253.

My friend has a ______ job at a chemist’s. A) half-time B) spare-time C) empty-time D) part-time

Answer»

Correct option is D) part-time

16254.

A: _____ are you going to the chemist’s? B: I’m going to the chemist’s _____ some medicine. A) Why / too buy B) Why / to buy C) When / two buy D) Where / buy

Answer»

Correct option is B) Why / to buy

16255.

10 persons begin to work together on a job, but after some days, 4 persons leave. As a result, the job, which could have been completed in 40 days, was completed in 50 days. How many days after commencement of the work did the four persons leave?1. 252. 243. 304. 20

Answer» Correct Answer - Option 1 : 25

Given:

Number of persons = 4

Initial time to complete the work = 40 days

Final time to complete the work = 50 days

Formula used:

Total work done = Number of persons × Time taken

Calculation:

Total work = 10 × 40 = 400 units

Let 4 persons leave after x days

So, remaining persons will complete the work in (50 – x) days

Total work = (10 × x) + 6(50 – x)

= 10x + 300 – 6x

= 4x + 300

Now, according to question,

400 = 4x + 300

⇒ 4x = 100

⇒ x = 25

∴ The four persons will leave after 25 days

16256.

If 21 men and 6 women can do a certain job in 4 days. Also, 6 men and 28 women can do the same job in 3 days. In how many days will 23 men take to do the same job.1. 23/5 days2. 21/5 days3. 26/5 days4. 24/5 days5. 19/5 days

Answer» Correct Answer - Option 4 : 24/5 days

Given:

Time taken by 21 men and 6 women = 4 days.

Time taken by 6 men and 28 women = 3 days.

Formula Used:

Total work = (Number of Persons) × (Time taken) × (Efficiency)

Calculation:

Let the efficiency of one man and one woman be M and W units per day.

Total work done by 21 men and 6 women = (21M + 6W)4

Total work done by 21 men and 6 women = (6M + 28W)3 

According to the question,

(21M + 6W)4 = (6M + 28W)3 

⇒ 84M + 24W = 18M + 84W

⇒ 66M = 60W

⇒ 11M = 10W

⇒ M/W = 10/11

The efficiency of one man = 10 units

The efficiency of one womman = 11 units

Total work = (6 × 10 + 28 × 11)3

⇒ (60 + 308)3

⇒ 368 × 3

Now the time taken by 23 Men to do the job 

⇒ (368 × 3)/(23 × 10)

⇒ 24/5

∴ 23 men can do the same job in 24/5 days.

16257.

If 30 men can do a job in 30 days, find what part of the job can be completed by 1 man in 1 day.1. \(\frac{1}{30}\)2. \(\frac{1}{900}\)3. \(\frac{1}{90}\)4. \(\frac{1}{60}\)

Answer» Correct Answer - Option 2 : \(\frac{1}{900}\)

Given:

30 men can do a work in 30 days

Concept used:

If x person can do a work in y days then 1 person can do the work in xy days.

If a person can complete a job in z days then he can do 1/z work in a day.

Calculation: 

As 30 men can do a job in 30 days

⇒ 1 man can do the job in 30 × 30 = 900 days

Work done by 1 man in 1 days = 1/900

∴ 1 man can complete 1/900 work in 1 day

16258.

If 12 men can do a job in 7 days, what fraction of the job can be done by one man in one day?1. \( {1\over 14}\)2. \({7\over 12}\)3. \({1\over 84}\)4. \({1 \over 72}\)

Answer» Correct Answer - Option 3 : \({1\over 84}\)

Given:

12 men can complete a job in 7 days

Formula used:

(Men1 × days1 × hours1)/work1 = (Men2 × days2 × hours2)/work2

Calculation:

Let w be the work done by 1 man in one day

(12 × 7)/1 = (1 × 1)/ w

⇒ 84 = 1/w

⇒ w = 1/84

∴ One man can do 1/84 part of job in one day

16259.

If ten men can do a job in ten days, what fraction of the job can be done by one man in one day?1. \(\frac{1}{20}\)2. \(\frac{1}{10}\)3. \(\frac{1}{2}\)4. \(\frac{1}{100}\)

Answer» Correct Answer - Option 4 : \(\frac{1}{100}\)

Given

Ten men can do a job in ten days

Concept used

If x men can do a job in y days

Then 1 man can do that job in (x × y) days

Calculation 

As, 10 men do a job in 10 days

⇒ 1 man can do that job in 100 days

∴ Fraction of work done by 1 man in one day is 1/100

16260.

100 Men were employed to finish a work in 180 days. After 60 days it was found that only 1/5 of the work was done. How many more men must be employed to finish the work in the stipulated time ?1. 1802. 1603. 1004. 1505. 140

Answer» Correct Answer - Option 3 : 100
M1 × D1 = M2 × D2
W1W2
 
100 × 60 = a × 120
1
5
1 – 1
5


⇒ a = 200

⇒ Total workers  =  200 

⇒ Extra men required = 200 - 100 = 100

16261.

Arrange the correct sequence of column II against the states in column ICOLUMN I (RELATED FIELD)COLUMN II (MINERALS)I. Chikkamagaluru1. Iron oreII. Singhbhum2. BauxiteIII. Durg3. ManganeseIv. Koraput4. Copper(a) III – 1, IV – 2, I – 3, II – 4 (b) I – 4, II – 3, III – 2, IV – 1 (c) IV – 3, I -4, II – 1, III – 2 (d) II -2, III – 1, IV – 4, I - 3

Answer»

(a) III – 1, IV – 2, I – 3, II – 4

16262.

Find the Mean of three consecutive triangular number.1. 13/32. 10/33. 44. 3/10

Answer» Correct Answer - Option 2 : 10/3

GIVEN:

Triangular number = n(n + 1)/2 where n = 1, 2, 3

FORMULA USED:

Mean = sum of all the data/ Total number

CALCULATION:

When n = 1, 2 , 3 then triangular number = 1, 3 and 6

⇒ Mean = summation of all the number/Total number

⇒ Mean = (1 + 3 + 6)/3

 ∴ Mean = 10/3

16263.

Find the value (1/2)log10625 – 5log102 + log10128

Answer» Correct Answer - Option 3 : 2

Properties used

1) nlogm = logmn

2) logm + logn = log(mn)

3) logm - logn = log(m/n)

Calculation

1/2log10625 – 5log102 + log10128

⇒ log106251/2 – log1025 + log10128

⇒ log1025 – log1032 + log10128

⇒ log10[25 × (128/32)]

⇒ log10100

⇒ log10102

⇒ 2log1010

⇒ 2

16264.

How many eggs a female silk moth lays in 24 hours ?

Answer»

1500 to 2000

16265.

(10 tens + 11 hundreds + 12 ones) equals1. 12132. 1110123. 1011124. 1212

Answer» Correct Answer - Option 4 : 1212

Concept used:

1 Thousand = 1000

1 Hundred = 100

1 Tens = 10

Ones = 1

Calculation:

10 tens + 11 hundreds + 12 ones

⇒ 10 × 10 + 11 × 100 + 12 × 1

⇒ 100 + 1100 + 12 

⇒ 1212

16266.

If 15 ones + 15 thousands + _____ tens = 16165, then the number in the blank space is:1. 652. 1153. 154. 30

Answer» Correct Answer - Option 2 : 115

Given:

15 ones + 15 thousands + _____ tens = 16165

Calculations:

15 ones = 15 × 1

⇒ 15

15 thousands = 15 × 1000

⇒ 15000

Let the number be 'x' 

x tens = 10 × x

⇒ 10x

15 + 15000 + 10 x = 16165

⇒ 15015 + 10x = 16165

⇒ 10x = 16165 - 15015

⇒ 10x = 1150

⇒ x = 1150 ÷ 10

⇒ x = 115 

∴ The number of tens is 115

16267.

If 112 ones + 12 thousands = 11012 + _____ tens then the number in the blank space is1. 1122. 1013. 1104. 111

Answer» Correct Answer - Option 3 : 110

Given:

112 ones + 12 thousands = 11012 + _____ tens

Calculations:

112 ones  = 112 × 1 = 112

12 thousands = 12 × 1000 = 12000

Let the number of tens be x

⇒ 10 × x = 10x

Hence, 112 + 12000 = 11012 + 10x 

⇒ 12112 = 11012 + 10x 

⇒ 10x = 12112 - 11012

⇒ 10x = 1100 

⇒ x = 1100/10

⇒ x = 110

∴ The number in the blank space is 110

16268.

A 415 m long train is running at 63 km/h. In how much times will it cross a tunnel 285 m long ?1. 45sec2. 52 sec3. 2 min4. 40 sec

Answer» Correct Answer - Option 4 : 40 sec

Given 

The length of train = 415 m 

Speed of train = 63 km/hr 

Formula Used 

Distance = speed × time 

Calculation 

Total distance = length of train + length of tunnel = 415 + 285 = 700 m 

speed of train in m/s = 63 × (5/18) = 17.5 m/s 

Time taken to cross tunnel = 700/17.5 = 40 sec

∴ The required answer is 40 seconds 

16269.

Which of the following is / are the types of firewall?(a) Packet Filtering Firewall(b) Dual Homed Gateway Firewall(c) Screen Host Firewall(d) Dual Host Firewall

Answer» Right option is (a) Packet Filtering Firewall

To elaborate: A firewall can be a PC, a midrange, a mainframe, a UNIX workstation, a router, or combination of these. Depending on the requirements, a firewall can consist of one or more of the following functional components: Packet-filtering router
16270.

In a piconet, one master device ________(a) can not be slave(b) can be slave in another piconet(c) can be slave in the same piconet(d) can be master in another piconet

Answer» Right choice is (b) can be slave in another piconet

Easy explanation: In a scatternet, a slave node of one piconet may act as a master in a piconet that is part of the scatternet. The scatternet uses this property to connect many piconets together to create a larger network.
16271.

A firewall needs to be __________ so that it can grow proportionally with the network that it protects.(a) Robust(b) Expansive(c) Fast(d) Scalable

Answer» Right option is (b) Expansive

The explanation is: The firewall has to be expansive because a network is expected to grow with time and if the firewall is unable to grow with it, the firewall won’t be able to handle the growing network traffic flow and will hence fail.
16272.

A packet filter firewall filters at __________(a) Physical layer(b) Data link layer(c) Network layer or Transport layer(d) Application layer

Answer» Right answer is (c) Network layer or Transport layer

Explanation: In computing, a firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules.[1] A firewall typically establishes a barrier between a trusted, secure internal network and another outside network, such as the Internet, that is assumed not to be secure or trusted.[2] Firewalls are often categorized as either network firewalls or host-based firewalls.
16273.

What is A2DP (advanced audio distribution profile)?(a) a bluetooth profile for streaming audio(b) a bluetooth profile for streaming video(c) a bluetooth profile for security(d) a bluetooth profile for file management

Answer» Correct answer is (a) a bluetooth profile for streaming audio

The explanation is: A2DP stands for Advanced Audio Distribution Profile is a transfer standard use to transmit high definition audio through Bluetooth. It is mainly used in Bluetooth speakers and wireless headphones.
16274.

_________ is a collective term for a number of Ethernet Standards that carry traffic at the nominal rate of 1000 Mbit/s against the original Ethernet speed of 10 Mbit/s.(a) Ethernet(b) Fast Ethernet(c) Gigabit Ethernet(d) Gigabyte Ethernet

Answer» The correct answer is (b) Fast Ethernet

The explanation is: Fast Ethernet is a set of Ethernet Standards which were introduced in 1995, that carry traffic at the nominal rate of 1000 Mbit/s. 100BASE-TX is the most commonly used Fast Ethernet standard.
16275.

A proxy firewall filters at _________(a) Physical layer(b) Data link layer(c) Network layer(d) Application layer

Answer» The correct answer is (d) Application layer

For explanation: The application firewall is typically built to control all network traffic on any layer up to the application layer. It is able to control applications or services specifically, unlike a stateful network firewall, which is – without additional software – unable to control network traffic regarding a specific application. There are two primary categories of application firewalls, network-based application firewalls and host-based application firewalls.
16276.

The __________ portion of LAN management software restricts access, records user activities and audit data, etc.(a) Configuration management(b) Security management(c) Performance management(d) Recovery management

Answer» The correct choice is (b) Security management

To explain: The Security management portion of LAN management software restricts access, records user activities, and audit data. It is responsible for controlling access to the network based on predefined policy. The security management ensures authentication, confidentiality, and integrity in the LAN.
16277.

Which of the following are Gigabit Ethernets?(a) 1000 BASE-SX(b) 1000 BASE-LX(c) 1000 BASE-CX(d) All of the mentioned

Answer» The correct choice is (d) All of the mentioned

To elaborate: In computer networking, Gigabit Ethernet (GbE or 1 GigE) is a term describing various technologies for transmitting Ethernet frames at a rate of a gigabit per second (1,000,000,000 bits per second), as defined by the IEEE 802.3-2008 standard. It came into use beginning in 1999, gradually supplanting Fast Ethernet in wired local networks, as a result of being considerably faster.
16278.

What tells a firewall how to reassemble a data stream that has been divided into packets?(a) The source routing feature(b) The number in the header’s identification field(c) The destination IP address(d) The header checksum field in the packet header

Answer» Right answer is (a) The source routing feature

To explain I would say: The source routing feature provides a path address for the packet to help the firewall to reassemble the data stream that was divided into packets. After reassembling, the firewall can then filter the stream.
16279.

__________ is a high performance fiber optic token ring LAN running at 100 Mbps over distances upto 1000 stations connected.(a) FDDI(b) FDDT(c) FDDR(d) FOTR

Answer» Correct answer is (a) FDDI

Explanation: FDDI stands for Fiber Distributed Data Interface. It is a set of standards for fiber optic token ring LANs running at 100 Mbps over distances up to 200 km in diameter and 1000 stations connected.
16280.

Which OSPF show command describes a list of OSPF adjacencies?(a) Show ip ospf interface(b) Show ip ospf(c) Show ip route(d) Show ip ospf neighbor

Answer» The correct option is (d) Show ip ospf neighbor

For explanation: The “Show ip ospf neighbor” command is the OSPF show command that can describe a list of OSPF adjacencies i.e. the list of adjacent nodes or neighbors. The router will only communicate with its neighbors directly.
16281.

Which command displays RIP routing updates?(a) Show IP route(b) Debug IP rip(c) Show protocols(d) Debug IP route

Answer» Correct option is (b) Debug IP rip

The best I can explain: The debug IP rip command is used to show the Internet Protocol (IP) Routing Information Protocol (RIP) updates being sent and received on the router. It verifies that the updates are being broadcasted and not multicasted.
16282.

You want to enable both arpa and snap encapsulation on one router interface. How do you do this?(a) The interface can handle multiple encapsulation types with no extra configuration(b) Assign two network numbers, one for each encapsulation type(c) Enable Novell-ether to run multiple encapsulation types(d) Both arpa and snap are enabled by default so you don’t have to configure anything

Answer» The correct choice is (b) Assign two network numbers, one for each encapsulation type

The best explanation: To assign multiple network numbers, you usually use sub interfaces. A sample configuration follows: IPXEthernet 0.1 IPX encapsulation novell-ether ipx network 9e interface ethernet 0.2 ipx encapsulation sap ipx network 6c
16283.

State whether true or false.A connection oriented protocol can only use unicast addresses.The any cast service is included in IPV6.(a) True, True(b) True, False

Answer» The correct choice is (a) True, True

Best explanation: In a connection oriented protocol, the host can only establish connection with another host on one unique channel, that’s why it can only use unicast addresses. In IPv6, there is an anycast address in IPv6 which allows sending messages to a group of devices but not all devices in a network.
16284.

Which of the following Protocols are used for Email?1. TELNET and SMTP2. SMTP and POP3. POP and FTP4. TELNET and FTP

Answer» Correct Answer - Option 2 : SMTP and POP

The correct answer is SMTP and POP.

  • SMTP stands for Simple Mail Transfer Protocol.
  • The Simple Mail Transfer Protocol (SMTP) is an internet standard communication protocol for electronic mail transmission.
  • Mail servers and other message transfer agents use SMTP to send and receive mail messages. 
  • The Internet Message Access Protocol (IMAP) is a mail protocol used for accessing email on a remote web server from a local client.
  • IMAP and POP3 are the two most commonly used Internet mail protocols for retrieving emails.
  • Both protocols are supported by all modern email clients and web servers.

  • HTTP is the HyperText Transfer Protocol it is an application-layer protocol for transmitting hypermedia documents, such as HTML. 
  • Address Resolution Protocol (ARP) is a procedure for mapping a dynamic Internet Protocol address (IP address) to a permanent physical machine address in a local area network (LAN). 
  • The ICMP stands for Internet Control Message Protocol.
  • It is a network layer protocol. It is used for error handling in the network layer, and it is primarily used on network devices such as routers.
16285.

The instruction BC 0x15 means1. jump 15 bytes relative to the program counter2. copy and load 15 words in the reverse direction to the program counter3. move to a location by 15 bits to the program counter4. redirect (jump) to a location by 15 words relative to the program counter

Answer» Correct Answer - Option 4 : redirect (jump) to a location by 15 words relative to the program counter

Branching instructions:

The BC instruction branches to an instruction specified by the branch target address. The branch

a target address is computed one of two ways:

  • If the Absolute Address bit (AA) is 0, then the branch target address is computed by concatenating the 14-bit Branch Displacement (BD) and b'00', sign-extending this to 32 bits, and adding the result to the address of this branch instruction.
  • If the AA is 1, then the branch target address is BD concatenated with b'00' sign-extended to 32 bits.
  • The instruction BC 0x15 means to jumps to a location by 15 words relative to the program counter
16286.

What does the “IPX maximum-paths 2” command accomplish?(a) It enables load sharing on 2 paths if the paths are equal metric paths(b) It sets up routing to go to network 2(c) It is the default for Cisco IPX load sharing(d) It enables load sharing on 2 paths if the paths are unequal metric paths

Answer» Correct option is (a) It enables load sharing on 2 paths if the paths are equal metric paths

To elaborate: It enables load sharing on 2 paths if the paths are equal metric paths. The default is 1 path and the maximum is 512 paths. The value must always be greater than 1 and must be a natural number.
16287.

NetWare IPX addressing uses a network number and a node number. Which statement is not true?(a) The network address is administratively assigned and can be up to 16 hexadecimal digits long(b) The node address is always administratively assigned(c) The node address is usually the MAC address(d) If the MAC address is used as the node address, then IPX eliminates the use of ARP

Answer» Correct choice is (b) The node address is always administratively assigned

To elaborate: The network address can be up to 16 hexadecimal digits in length. The node number is 12 hexadecimal digits. The node address is usually the MAC address. An example IPX address is 4a1d.0000.0c56.de33. The network part is 4a1d. The node part is 0000.0c56.de33. The network number is assigned by the system administrator of the Novell network and the MAC address/node address is not assigned by the administrator.
16288.

_________ implies that all subnets obtained from the same subnet mask.(a) Static subnetting(b) Dynamic subnetting(c) Variable length subnetting(d) Dynamic length subnetting

Answer» Right answer is (a) Static subnetting

To elaborate: Static subnetting is used when the requirement is of same number of hosts in each subnet for the institution. The same subnet mask can be used to find the subnet id of each subnet. It is usually used to divide large networks into smaller parts.
16289.

The combination of _________ and __________ is often termed the local address of the local portion of the IP address.(a) Network number and host number(b) Network number and subnet number(c) Subnet number and host number(d) Host number

Answer» The correct option is (c) Subnet number and host number

The best explanation: It is termed as the local address because the address won’t be applicable outside the subnet. Sub networking is implemented for remote sensing in transparent way from that host which is contained in the sub network which called a local operation.
16290.

The “IPX delay number” command will allow an administrator to change the default settings. What are the default settings?(a) For LAN interfaces, one tick; for WAN interfaces, six ticks(b) For LAN interfaces, six ticks; for WAN interfaces, one tick(c) For LAN interfaces, zero ticks; for WAN interfaces, five ticks(d) For LAN interfaces, five ticks; for WAN interfaces, zero Ticks

Answer» Correct answer is (a) For LAN interfaces, one tick; for WAN interfaces, six ticks

The explanation: Tick is basically the update rate of clients in the network. The IPX delay number will give the ticks at a certain time. The default ticks are–for LAN interfaces, one tick, and for WAN interfaces, six ticks.
16291.

If you wanted to have 12 subnets with a Class C network ID, which subnet mask would you use?(a) 255.255.255.252(b) 255.255.255.255(c) 255.255.255.240(d) 255.255.255.248

Answer» The correct choice is (c) 255.255.255.240

To explain I would say: If you have eight networks and each requires 10 hosts, you would use the Class C mask of 255.255.255.240. Why? Because 240 in binary is 11110000, which means you have four subnet bits and four host bits. Using our math, we’d get the following:

24-2=14 subnets

24-2=14 hosts.
16292.

Which of the following is the broadcast address for a Class B network ID using the default subnetmask?(a) 172.16.10.255(b) 255.255.255.255(c) 172.16.255.255(d) 172.255.255.255

Answer» Right option is (c) 172.16.255.255

The explanation: In this case, the class B network ID is 172.16.0.0. We know that the default mask of a class B network is 255.255.0.0. If we OR any address in a network with the complement of the default mask (0.0.255.255), we get the broadcast address of the network. In this case, the result of OR would be 172.16.255.255.
16293.

What is the maximum number of IP addresses that can be assigned to hosts on a local subnet that uses the 255.255.255.224 subnet mask?(a) 14(b) 15(c) 16(d) 30

Answer» Right answer is (d) 30

To explain I would say: A /27 (255.255.255.224) is 3 bits on and 5 bits off. This provides 8 subnets, each with 30 hosts. Does it matter if this mask is used with a Class A, B, or C network address? Not at all. The number of host bits would never change.
16294.

As a system administrator, you want to debug IGRP but are worried that the “debug IP IGRP transaction” command will flood the console. What is the command that you should use?(a) Debug IP IGRP event(b) Debug IP IGRP-events(c) Debug IP IGRP summary(d) Debug IP IGRP events

Answer» Right answer is (d) Debug IP IGRP events

The best explanation: The “debug IP IGRP events” is used to display a short summary of IGRP routing information. You can append an IP address onto either console’s command-line to see only the IGRP updates from a neighbor. The command will only give a short summary and hence won’t flood the command line.
16295.

You have an IP address of 172.16.13.5 with a 255.255.255.128 subnet mask. What is your class of address, subnet address, and broadcast address?(a) Class A, Subnet 172.16.13.0, Broadcast address 172.16.13.127(b) Class B, Subnet 172.16.13.0, Broadcast address 172.16.13.127(c) Class B, Subnet 172.16.13.0, Broadcast address 172.16.13.255(d) Class B, Subnet 172.16.0.0, Broadcast address 172.16.255.255

Answer» Right choice is (b) Class B, Subnet 172.16.13.0, Broadcast address 172.16.13.127

Explanation: We know that the prefix 172 lies in class B (128 to 191) of IPv4 addresses. From the subnet mask, we get that the class is divided into 2 subnets: 172.16.13.0 to 172.16.13.127 and 172.16.13.128 to 172.16.13.255. The IP 172.16.13.5 lies in the first subnet. So the starting address 172.16.13.0 is the subnet address and last address 172.16.13.127 is the broadcast address.
16296.

You type debug IP rip on your router console and see that 172.16.10.0 is being advertised to you with a metric of 16. What does this mean?(a) The route is 16 hops away Debug IP rip(b) The route has a delay of 16 microseconds Debug IP route(c) The route is inaccessible(d) The route is queued at 16 messages a second

Answer» Correct option is (c) The route is inaccessible

Easy explanation: You cannot have 16 hops on a RIP network by default, because the max default hops possible is 15. If you receive a route advertised with a metric of 16, this means it is inaccessible.
16297.

If an Ethernet port on a router were assigned an IP address of 172.16.112.1/25, what would be the valid subnet address of this host?(a) 172.16.112.0(b) 172.16.0.0(c) 172.16.96.0(d) 172.16.255.0

Answer» Correct option is (a) 172.16.112.0

For explanation I would say: A /25 mask is 255.255.255.128. Used with a Class B network, the third and fourth octets are used for subnetting with a total of 9 subnet bits, 8 bits in the third octet and 1 bit in the fourth octet. Since there is only 1 bit in the fourth octet, the bit is either off or on-which is a value of 0 or 128. The host in the question is in the 0 subnet, which has a broadcast address of 127 since 128 is the next subne
16298.

Thread synchronization is required because ___________(a) all threads of a process share the same address space(b) all threads of a process share the same global variables(c) all threads of a process can share the same files(d) all of the mentioned

Answer» Right choice is (d) all of the mentioned

The best explanation: None.
16299.

Find the dividend when divisor is 14, quotient is 32 and remainder is 10.1. 4282. 4383. 4484. 4585. 468

Answer» Correct Answer - Option 4 : 458

Given:

The divisor of number = 14

The quotient of number = 32

The remainder of number = 10

Formula used:

Dividend = [(Divisor × Quotient) + Remainder]

Calculation:

Dividend = [(14 × 32) + 10]

⇒ Dividend = 448 + 10 = 458

 The dividend is 458

16300.

Function used for linear regression in R is __________(a) lm(formula, data)(b) lr(formula, data)(c) lrm(formula, data)(d) regression.linear(formula, data)

Answer» Right option is (a) lm(formula, data)

Easiest explanation: lm(formula, data) refers to a linear model in which formula is the object of the class “formula”, representing the relation between variables. Now this formula is on applied on the data to create a relationship model.