This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 16251. |
I can’t ________ to have a holiday abroad on my salary. A) spend B) think C) afford D) help E) spare |
|
Answer» Correct option is C) afford |
|
| 16252. |
I took the doctor’s prescription to the chemist’s to be ______. A) made out B) made up C) made over D) made into |
|
Answer» Correct option is B) made up |
|
| 16253. |
My friend has a ______ job at a chemist’s. A) half-time B) spare-time C) empty-time D) part-time |
|
Answer» Correct option is D) part-time |
|
| 16254. |
A: _____ are you going to the chemist’s? B: I’m going to the chemist’s _____ some medicine. A) Why / too buy B) Why / to buy C) When / two buy D) Where / buy |
|
Answer» Correct option is B) Why / to buy |
|
| 16255. |
10 persons begin to work together on a job, but after some days, 4 persons leave. As a result, the job, which could have been completed in 40 days, was completed in 50 days. How many days after commencement of the work did the four persons leave?1. 252. 243. 304. 20 |
|
Answer» Correct Answer - Option 1 : 25 Given: Number of persons = 4 Initial time to complete the work = 40 days Final time to complete the work = 50 days Formula used: Total work done = Number of persons × Time taken Calculation: Total work = 10 × 40 = 400 units Let 4 persons leave after x days So, remaining persons will complete the work in (50 – x) days Total work = (10 × x) + 6(50 – x) = 10x + 300 – 6x = 4x + 300 Now, according to question, 400 = 4x + 300 ⇒ 4x = 100 ⇒ x = 25 ∴ The four persons will leave after 25 days |
|
| 16256. |
If 21 men and 6 women can do a certain job in 4 days. Also, 6 men and 28 women can do the same job in 3 days. In how many days will 23 men take to do the same job.1. 23/5 days2. 21/5 days3. 26/5 days4. 24/5 days5. 19/5 days |
|
Answer» Correct Answer - Option 4 : 24/5 days Given: Time taken by 21 men and 6 women = 4 days. Time taken by 6 men and 28 women = 3 days. Formula Used: Total work = (Number of Persons) × (Time taken) × (Efficiency) Calculation: Let the efficiency of one man and one woman be M and W units per day. Total work done by 21 men and 6 women = (21M + 6W)4 Total work done by 21 men and 6 women = (6M + 28W)3 According to the question, (21M + 6W)4 = (6M + 28W)3 ⇒ 84M + 24W = 18M + 84W ⇒ 66M = 60W ⇒ 11M = 10W ⇒ M/W = 10/11 The efficiency of one man = 10 units The efficiency of one womman = 11 units Total work = (6 × 10 + 28 × 11)3 ⇒ (60 + 308)3 ⇒ 368 × 3 Now the time taken by 23 Men to do the job ⇒ (368 × 3)/(23 × 10) ⇒ 24/5 ∴ 23 men can do the same job in 24/5 days. |
|
| 16257. |
If 30 men can do a job in 30 days, find what part of the job can be completed by 1 man in 1 day.1. \(\frac{1}{30}\)2. \(\frac{1}{900}\)3. \(\frac{1}{90}\)4. \(\frac{1}{60}\) |
|
Answer» Correct Answer - Option 2 : \(\frac{1}{900}\) Given: 30 men can do a work in 30 days Concept used: If x person can do a work in y days then 1 person can do the work in xy days. If a person can complete a job in z days then he can do 1/z work in a day. Calculation: As 30 men can do a job in 30 days ⇒ 1 man can do the job in 30 × 30 = 900 days Work done by 1 man in 1 days = 1/900 ∴ 1 man can complete 1/900 work in 1 day |
|
| 16258. |
If 12 men can do a job in 7 days, what fraction of the job can be done by one man in one day?1. \( {1\over 14}\)2. \({7\over 12}\)3. \({1\over 84}\)4. \({1 \over 72}\) |
|
Answer» Correct Answer - Option 3 : \({1\over 84}\) Given: 12 men can complete a job in 7 days Formula used: (Men1 × days1 × hours1)/work1 = (Men2 × days2 × hours2)/work2 Calculation: Let w be the work done by 1 man in one day (12 × 7)/1 = (1 × 1)/ w ⇒ 84 = 1/w ⇒ w = 1/84 ∴ One man can do 1/84 part of job in one day |
|
| 16259. |
If ten men can do a job in ten days, what fraction of the job can be done by one man in one day?1. \(\frac{1}{20}\)2. \(\frac{1}{10}\)3. \(\frac{1}{2}\)4. \(\frac{1}{100}\) |
|
Answer» Correct Answer - Option 4 : \(\frac{1}{100}\) Given Ten men can do a job in ten days Concept used If x men can do a job in y days Then 1 man can do that job in (x × y) days Calculation As, 10 men do a job in 10 days ⇒ 1 man can do that job in 100 days ∴ Fraction of work done by 1 man in one day is 1/100 |
|
| 16260. |
100 Men were employed to finish a work in 180 days. After 60 days it was found that only 1/5 of the work was done. How many more men must be employed to finish the work in the stipulated time ?1. 1802. 1603. 1004. 1505. 140 |
|||||||||||||||
Answer» Correct Answer - Option 3 : 100
|
||||||||||||||||
| 16261. |
Arrange the correct sequence of column II against the states in column ICOLUMN I (RELATED FIELD)COLUMN II (MINERALS)I. Chikkamagaluru1. Iron oreII. Singhbhum2. BauxiteIII. Durg3. ManganeseIv. Koraput4. Copper(a) III – 1, IV – 2, I – 3, II – 4 (b) I – 4, II – 3, III – 2, IV – 1 (c) IV – 3, I -4, II – 1, III – 2 (d) II -2, III – 1, IV – 4, I - 3 |
|
Answer» (a) III – 1, IV – 2, I – 3, II – 4 |
|
| 16262. |
Find the Mean of three consecutive triangular number.1. 13/32. 10/33. 44. 3/10 |
|
Answer» Correct Answer - Option 2 : 10/3 GIVEN: Triangular number = n(n + 1)/2 where n = 1, 2, 3 FORMULA USED: Mean = sum of all the data/ Total number CALCULATION: When n = 1, 2 , 3 then triangular number = 1, 3 and 6 ⇒ Mean = summation of all the number/Total number ⇒ Mean = (1 + 3 + 6)/3 ∴ Mean = 10/3 |
|
| 16263. |
Find the value (1/2)log10625 – 5log102 + log10128 |
|
Answer» Correct Answer - Option 3 : 2 Properties used 1) nlogm = logmn 2) logm + logn = log(mn) 3) logm - logn = log(m/n) Calculation 1/2log10625 – 5log102 + log10128 ⇒ log106251/2 – log1025 + log10128 ⇒ log1025 – log1032 + log10128 ⇒ log10[25 × (128/32)] ⇒ log10100 ⇒ log10102 ⇒ 2log1010 ⇒ 2 |
|
| 16264. |
How many eggs a female silk moth lays in 24 hours ? |
|
Answer» 1500 to 2000 |
|
| 16265. |
(10 tens + 11 hundreds + 12 ones) equals1. 12132. 1110123. 1011124. 1212 |
|
Answer» Correct Answer - Option 4 : 1212 Concept used: 1 Thousand = 1000 1 Hundred = 100 1 Tens = 10 Ones = 1 Calculation: 10 tens + 11 hundreds + 12 ones ⇒ 10 × 10 + 11 × 100 + 12 × 1 ⇒ 100 + 1100 + 12 ⇒ 1212 |
|
| 16266. |
If 15 ones + 15 thousands + _____ tens = 16165, then the number in the blank space is:1. 652. 1153. 154. 30 |
|
Answer» Correct Answer - Option 2 : 115 Given: 15 ones + 15 thousands + _____ tens = 16165 Calculations: 15 ones = 15 × 1 ⇒ 15 15 thousands = 15 × 1000 ⇒ 15000 Let the number be 'x' x tens = 10 × x ⇒ 10x 15 + 15000 + 10 x = 16165 ⇒ 15015 + 10x = 16165 ⇒ 10x = 16165 - 15015 ⇒ 10x = 1150 ⇒ x = 1150 ÷ 10 ⇒ x = 115 ∴ The number of tens is 115 |
|
| 16267. |
If 112 ones + 12 thousands = 11012 + _____ tens then the number in the blank space is1. 1122. 1013. 1104. 111 |
|
Answer» Correct Answer - Option 3 : 110 Given: 112 ones + 12 thousands = 11012 + _____ tens Calculations: 112 ones = 112 × 1 = 112 12 thousands = 12 × 1000 = 12000 Let the number of tens be x ⇒ 10 × x = 10x Hence, 112 + 12000 = 11012 + 10x ⇒ 12112 = 11012 + 10x ⇒ 10x = 12112 - 11012 ⇒ 10x = 1100 ⇒ x = 1100/10 ⇒ x = 110 ∴ The number in the blank space is 110 |
|
| 16268. |
A 415 m long train is running at 63 km/h. In how much times will it cross a tunnel 285 m long ?1. 45sec2. 52 sec3. 2 min4. 40 sec |
|
Answer» Correct Answer - Option 4 : 40 sec Given The length of train = 415 m Speed of train = 63 km/hr Formula Used Distance = speed × time Calculation Total distance = length of train + length of tunnel = 415 + 285 = 700 m speed of train in m/s = 63 × (5/18) = 17.5 m/s Time taken to cross tunnel = 700/17.5 = 40 sec ∴ The required answer is 40 seconds |
|
| 16269. |
Which of the following is / are the types of firewall?(a) Packet Filtering Firewall(b) Dual Homed Gateway Firewall(c) Screen Host Firewall(d) Dual Host Firewall |
|
Answer» Right option is (a) Packet Filtering Firewall To elaborate: A firewall can be a PC, a midrange, a mainframe, a UNIX workstation, a router, or combination of these. Depending on the requirements, a firewall can consist of one or more of the following functional components: Packet-filtering router |
|
| 16270. |
In a piconet, one master device ________(a) can not be slave(b) can be slave in another piconet(c) can be slave in the same piconet(d) can be master in another piconet |
|
Answer» Right choice is (b) can be slave in another piconet Easy explanation: In a scatternet, a slave node of one piconet may act as a master in a piconet that is part of the scatternet. The scatternet uses this property to connect many piconets together to create a larger network. |
|
| 16271. |
A firewall needs to be __________ so that it can grow proportionally with the network that it protects.(a) Robust(b) Expansive(c) Fast(d) Scalable |
|
Answer» Right option is (b) Expansive The explanation is: The firewall has to be expansive because a network is expected to grow with time and if the firewall is unable to grow with it, the firewall won’t be able to handle the growing network traffic flow and will hence fail. |
|
| 16272. |
A packet filter firewall filters at __________(a) Physical layer(b) Data link layer(c) Network layer or Transport layer(d) Application layer |
|
Answer» Right answer is (c) Network layer or Transport layer Explanation: In computing, a firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules.[1] A firewall typically establishes a barrier between a trusted, secure internal network and another outside network, such as the Internet, that is assumed not to be secure or trusted.[2] Firewalls are often categorized as either network firewalls or host-based firewalls. |
|
| 16273. |
What is A2DP (advanced audio distribution profile)?(a) a bluetooth profile for streaming audio(b) a bluetooth profile for streaming video(c) a bluetooth profile for security(d) a bluetooth profile for file management |
|
Answer» Correct answer is (a) a bluetooth profile for streaming audio The explanation is: A2DP stands for Advanced Audio Distribution Profile is a transfer standard use to transmit high definition audio through Bluetooth. It is mainly used in Bluetooth speakers and wireless headphones. |
|
| 16274. |
_________ is a collective term for a number of Ethernet Standards that carry traffic at the nominal rate of 1000 Mbit/s against the original Ethernet speed of 10 Mbit/s.(a) Ethernet(b) Fast Ethernet(c) Gigabit Ethernet(d) Gigabyte Ethernet |
|
Answer» The correct answer is (b) Fast Ethernet The explanation is: Fast Ethernet is a set of Ethernet Standards which were introduced in 1995, that carry traffic at the nominal rate of 1000 Mbit/s. 100BASE-TX is the most commonly used Fast Ethernet standard. |
|
| 16275. |
A proxy firewall filters at _________(a) Physical layer(b) Data link layer(c) Network layer(d) Application layer |
|
Answer» The correct answer is (d) Application layer For explanation: The application firewall is typically built to control all network traffic on any layer up to the application layer. It is able to control applications or services specifically, unlike a stateful network firewall, which is – without additional software – unable to control network traffic regarding a specific application. There are two primary categories of application firewalls, network-based application firewalls and host-based application firewalls. |
|
| 16276. |
The __________ portion of LAN management software restricts access, records user activities and audit data, etc.(a) Configuration management(b) Security management(c) Performance management(d) Recovery management |
|
Answer» The correct choice is (b) Security management To explain: The Security management portion of LAN management software restricts access, records user activities, and audit data. It is responsible for controlling access to the network based on predefined policy. The security management ensures authentication, confidentiality, and integrity in the LAN. |
|
| 16277. |
Which of the following are Gigabit Ethernets?(a) 1000 BASE-SX(b) 1000 BASE-LX(c) 1000 BASE-CX(d) All of the mentioned |
|
Answer» The correct choice is (d) All of the mentioned To elaborate: In computer networking, Gigabit Ethernet (GbE or 1 GigE) is a term describing various technologies for transmitting Ethernet frames at a rate of a gigabit per second (1,000,000,000 bits per second), as defined by the IEEE 802.3-2008 standard. It came into use beginning in 1999, gradually supplanting Fast Ethernet in wired local networks, as a result of being considerably faster. |
|
| 16278. |
What tells a firewall how to reassemble a data stream that has been divided into packets?(a) The source routing feature(b) The number in the header’s identification field(c) The destination IP address(d) The header checksum field in the packet header |
|
Answer» Right answer is (a) The source routing feature To explain I would say: The source routing feature provides a path address for the packet to help the firewall to reassemble the data stream that was divided into packets. After reassembling, the firewall can then filter the stream. |
|
| 16279. |
__________ is a high performance fiber optic token ring LAN running at 100 Mbps over distances upto 1000 stations connected.(a) FDDI(b) FDDT(c) FDDR(d) FOTR |
|
Answer» Correct answer is (a) FDDI Explanation: FDDI stands for Fiber Distributed Data Interface. It is a set of standards for fiber optic token ring LANs running at 100 Mbps over distances up to 200 km in diameter and 1000 stations connected. |
|
| 16280. |
Which OSPF show command describes a list of OSPF adjacencies?(a) Show ip ospf interface(b) Show ip ospf(c) Show ip route(d) Show ip ospf neighbor |
|
Answer» The correct option is (d) Show ip ospf neighbor For explanation: The “Show ip ospf neighbor” command is the OSPF show command that can describe a list of OSPF adjacencies i.e. the list of adjacent nodes or neighbors. The router will only communicate with its neighbors directly. |
|
| 16281. |
Which command displays RIP routing updates?(a) Show IP route(b) Debug IP rip(c) Show protocols(d) Debug IP route |
|
Answer» Correct option is (b) Debug IP rip The best I can explain: The debug IP rip command is used to show the Internet Protocol (IP) Routing Information Protocol (RIP) updates being sent and received on the router. It verifies that the updates are being broadcasted and not multicasted. |
|
| 16282. |
You want to enable both arpa and snap encapsulation on one router interface. How do you do this?(a) The interface can handle multiple encapsulation types with no extra configuration(b) Assign two network numbers, one for each encapsulation type(c) Enable Novell-ether to run multiple encapsulation types(d) Both arpa and snap are enabled by default so you don’t have to configure anything |
|
Answer» The correct choice is (b) Assign two network numbers, one for each encapsulation type The best explanation: To assign multiple network numbers, you usually use sub interfaces. A sample configuration follows: IPXEthernet 0.1 IPX encapsulation novell-ether ipx network 9e interface ethernet 0.2 ipx encapsulation sap ipx network 6c |
|
| 16283. |
State whether true or false.A connection oriented protocol can only use unicast addresses.The any cast service is included in IPV6.(a) True, True(b) True, False |
|
Answer» The correct choice is (a) True, True Best explanation: In a connection oriented protocol, the host can only establish connection with another host on one unique channel, that’s why it can only use unicast addresses. In IPv6, there is an anycast address in IPv6 which allows sending messages to a group of devices but not all devices in a network. |
|
| 16284. |
Which of the following Protocols are used for Email?1. TELNET and SMTP2. SMTP and POP3. POP and FTP4. TELNET and FTP |
|
Answer» Correct Answer - Option 2 : SMTP and POP The correct answer is SMTP and POP.
|
|
| 16285. |
The instruction BC 0x15 means1. jump 15 bytes relative to the program counter2. copy and load 15 words in the reverse direction to the program counter3. move to a location by 15 bits to the program counter4. redirect (jump) to a location by 15 words relative to the program counter |
|
Answer» Correct Answer - Option 4 : redirect (jump) to a location by 15 words relative to the program counter Branching instructions: The BC instruction branches to an instruction specified by the branch target address. The branch a target address is computed one of two ways:
|
|
| 16286. |
What does the “IPX maximum-paths 2” command accomplish?(a) It enables load sharing on 2 paths if the paths are equal metric paths(b) It sets up routing to go to network 2(c) It is the default for Cisco IPX load sharing(d) It enables load sharing on 2 paths if the paths are unequal metric paths |
|
Answer» Correct option is (a) It enables load sharing on 2 paths if the paths are equal metric paths To elaborate: It enables load sharing on 2 paths if the paths are equal metric paths. The default is 1 path and the maximum is 512 paths. The value must always be greater than 1 and must be a natural number. |
|
| 16287. |
NetWare IPX addressing uses a network number and a node number. Which statement is not true?(a) The network address is administratively assigned and can be up to 16 hexadecimal digits long(b) The node address is always administratively assigned(c) The node address is usually the MAC address(d) If the MAC address is used as the node address, then IPX eliminates the use of ARP |
|
Answer» Correct choice is (b) The node address is always administratively assigned To elaborate: The network address can be up to 16 hexadecimal digits in length. The node number is 12 hexadecimal digits. The node address is usually the MAC address. An example IPX address is 4a1d.0000.0c56.de33. The network part is 4a1d. The node part is 0000.0c56.de33. The network number is assigned by the system administrator of the Novell network and the MAC address/node address is not assigned by the administrator. |
|
| 16288. |
_________ implies that all subnets obtained from the same subnet mask.(a) Static subnetting(b) Dynamic subnetting(c) Variable length subnetting(d) Dynamic length subnetting |
|
Answer» Right answer is (a) Static subnetting To elaborate: Static subnetting is used when the requirement is of same number of hosts in each subnet for the institution. The same subnet mask can be used to find the subnet id of each subnet. It is usually used to divide large networks into smaller parts. |
|
| 16289. |
The combination of _________ and __________ is often termed the local address of the local portion of the IP address.(a) Network number and host number(b) Network number and subnet number(c) Subnet number and host number(d) Host number |
|
Answer» The correct option is (c) Subnet number and host number The best explanation: It is termed as the local address because the address won’t be applicable outside the subnet. Sub networking is implemented for remote sensing in transparent way from that host which is contained in the sub network which called a local operation. |
|
| 16290. |
The “IPX delay number” command will allow an administrator to change the default settings. What are the default settings?(a) For LAN interfaces, one tick; for WAN interfaces, six ticks(b) For LAN interfaces, six ticks; for WAN interfaces, one tick(c) For LAN interfaces, zero ticks; for WAN interfaces, five ticks(d) For LAN interfaces, five ticks; for WAN interfaces, zero Ticks |
|
Answer» Correct answer is (a) For LAN interfaces, one tick; for WAN interfaces, six ticks The explanation: Tick is basically the update rate of clients in the network. The IPX delay number will give the ticks at a certain time. The default ticks are–for LAN interfaces, one tick, and for WAN interfaces, six ticks. |
|
| 16291. |
If you wanted to have 12 subnets with a Class C network ID, which subnet mask would you use?(a) 255.255.255.252(b) 255.255.255.255(c) 255.255.255.240(d) 255.255.255.248 |
|
Answer» The correct choice is (c) 255.255.255.240 To explain I would say: If you have eight networks and each requires 10 hosts, you would use the Class C mask of 255.255.255.240. Why? Because 240 in binary is 11110000, which means you have four subnet bits and four host bits. Using our math, we’d get the following: 24-2=14 subnets 24-2=14 hosts. |
|
| 16292. |
Which of the following is the broadcast address for a Class B network ID using the default subnetmask?(a) 172.16.10.255(b) 255.255.255.255(c) 172.16.255.255(d) 172.255.255.255 |
|
Answer» Right option is (c) 172.16.255.255 The explanation: In this case, the class B network ID is 172.16.0.0. We know that the default mask of a class B network is 255.255.0.0. If we OR any address in a network with the complement of the default mask (0.0.255.255), we get the broadcast address of the network. In this case, the result of OR would be 172.16.255.255. |
|
| 16293. |
What is the maximum number of IP addresses that can be assigned to hosts on a local subnet that uses the 255.255.255.224 subnet mask?(a) 14(b) 15(c) 16(d) 30 |
|
Answer» Right answer is (d) 30 To explain I would say: A /27 (255.255.255.224) is 3 bits on and 5 bits off. This provides 8 subnets, each with 30 hosts. Does it matter if this mask is used with a Class A, B, or C network address? Not at all. The number of host bits would never change. |
|
| 16294. |
As a system administrator, you want to debug IGRP but are worried that the “debug IP IGRP transaction” command will flood the console. What is the command that you should use?(a) Debug IP IGRP event(b) Debug IP IGRP-events(c) Debug IP IGRP summary(d) Debug IP IGRP events |
|
Answer» Right answer is (d) Debug IP IGRP events The best explanation: The “debug IP IGRP events” is used to display a short summary of IGRP routing information. You can append an IP address onto either console’s command-line to see only the IGRP updates from a neighbor. The command will only give a short summary and hence won’t flood the command line. |
|
| 16295. |
You have an IP address of 172.16.13.5 with a 255.255.255.128 subnet mask. What is your class of address, subnet address, and broadcast address?(a) Class A, Subnet 172.16.13.0, Broadcast address 172.16.13.127(b) Class B, Subnet 172.16.13.0, Broadcast address 172.16.13.127(c) Class B, Subnet 172.16.13.0, Broadcast address 172.16.13.255(d) Class B, Subnet 172.16.0.0, Broadcast address 172.16.255.255 |
|
Answer» Right choice is (b) Class B, Subnet 172.16.13.0, Broadcast address 172.16.13.127 Explanation: We know that the prefix 172 lies in class B (128 to 191) of IPv4 addresses. From the subnet mask, we get that the class is divided into 2 subnets: 172.16.13.0 to 172.16.13.127 and 172.16.13.128 to 172.16.13.255. The IP 172.16.13.5 lies in the first subnet. So the starting address 172.16.13.0 is the subnet address and last address 172.16.13.127 is the broadcast address. |
|
| 16296. |
You type debug IP rip on your router console and see that 172.16.10.0 is being advertised to you with a metric of 16. What does this mean?(a) The route is 16 hops away Debug IP rip(b) The route has a delay of 16 microseconds Debug IP route(c) The route is inaccessible(d) The route is queued at 16 messages a second |
|
Answer» Correct option is (c) The route is inaccessible Easy explanation: You cannot have 16 hops on a RIP network by default, because the max default hops possible is 15. If you receive a route advertised with a metric of 16, this means it is inaccessible. |
|
| 16297. |
If an Ethernet port on a router were assigned an IP address of 172.16.112.1/25, what would be the valid subnet address of this host?(a) 172.16.112.0(b) 172.16.0.0(c) 172.16.96.0(d) 172.16.255.0 |
|
Answer» Correct option is (a) 172.16.112.0 For explanation I would say: A /25 mask is 255.255.255.128. Used with a Class B network, the third and fourth octets are used for subnetting with a total of 9 subnet bits, 8 bits in the third octet and 1 bit in the fourth octet. Since there is only 1 bit in the fourth octet, the bit is either off or on-which is a value of 0 or 128. The host in the question is in the 0 subnet, which has a broadcast address of 127 since 128 is the next subne |
|
| 16298. |
Thread synchronization is required because ___________(a) all threads of a process share the same address space(b) all threads of a process share the same global variables(c) all threads of a process can share the same files(d) all of the mentioned |
|
Answer» Right choice is (d) all of the mentioned The best explanation: None. |
|
| 16299. |
Find the dividend when divisor is 14, quotient is 32 and remainder is 10.1. 4282. 4383. 4484. 4585. 468 |
|
Answer» Correct Answer - Option 4 : 458 Given: The divisor of number = 14 The quotient of number = 32 The remainder of number = 10 Formula used: Dividend = [(Divisor × Quotient) + Remainder] Calculation: Dividend = [(14 × 32) + 10] ⇒ Dividend = 448 + 10 = 458 ∴ The dividend is 458 |
|
| 16300. |
Function used for linear regression in R is __________(a) lm(formula, data)(b) lr(formula, data)(c) lrm(formula, data)(d) regression.linear(formula, data) |
|
Answer» Right option is (a) lm(formula, data) Easiest explanation: lm(formula, data) refers to a linear model in which formula is the object of the class “formula”, representing the relation between variables. Now this formula is on applied on the data to create a relationship model. |
|