Where possibilities begin

We’re a leading marketplace platform for learning and teaching online. Explore some of our most popular content and learn something new.
Total 835 Results
Comptia A+ 1002 2023 Questions and answer - Part 67

Created by - Mary Smith

Comptia A+ 1002 2023 Questions and answer - Part 67

Questions 1. Ann, an end user, receives a call from someone claiming to be from the help desk and asking for her username and password to prevent her email box from being deleted immediately. Which of the following BEST describes this type of attack?A) A. Shoulder surfingB) B. Man-in-the-middleC) C. Social engineeringD) D. Ransomware2. A technician has just fixed a user-s PC and successfully removed a virus and malware from the machine. Which of the following is the LAST thing the technician should do?A) A. Educate the user regarding Internet browsing best practicesB) B. Update the anti-malware software on the user-s PCC) C. Schedule scans and run updatesD) D. Enable system restore and create restore point3. A company is looking to donate a collection of old PCs that are no longer needed. Which of the following data destruction methods would be MOST secure for highly sensitive information?A) A. Simple 1-pass zero overwriteB) B. Low level 3-pass random wipeC) C. Low level 7-pass random wipeD) D. High level format 10 times4. A technician recently installed a new video card in a PC. The PC already has integrated video on the motherboard. When the technician turns on the PC, there is no video. Which of the following is MOST likely the cause?A) A. The motherboard BIOS version is out of date.B) B. The incorrect video card drivers are installed.C) C. The power connector for the video card is unplugged.D) D. The video card is unsupported by the motherboard.5. A technician has finished replacing the network card in a laptop and has verified full system functionality.Which of the following troubleshooting steps should the technician take NEXT?A) A. Document findings, actions, and outcomesB) B. Escalate problem to a senior technicianC) C. Re-establish new theory of probable causeD) D. Perform a full system backup Right Answer and Explanation: 1. Right Answer: CExplanation: 2. Right Answer: AExplanation: 3. Right Answer: CExplanation: 4. Right Answer: CExplanation: 5. Right Answer: AExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }

More details

Published - Fri, 03 Mar 2023

Comptia Linux + 2023 Questions and answer - Part 17

Created by - Mary Smith

Comptia Linux + 2023 Questions and answer - Part 17

Questions 1. What does the command mount -a do?A) A. It mounts all available filesystems onto the current directory.B) B. It shows all mounted filesystems.C) C. It mounts all user mountable filesystems for the current user.D) D. It mounts all filesystems listed in /etc/fstab which have the option auto set.E) E. It mounts all filesystems listed in /etc/fstab which have the option noauto set.2. Which of the following commands set the sticky bit for the directory /tmp? (Choose TWO correct answers.)(Select 2answers)A) A. chmod +s /tmpB) B. chmod +t /tmpC) C. chmod 1775 /tmpD) D. chmod 4775 /tmpE) E. chmod 2775 /tmp3. Which of the following commands can be used to display the inode number of a given file?A) A. inodeB) B. lsC) C. lnD) D. cp4. Which of the following commands shows the definition of a given shell command?A) A. whereB) B. statC) C. typeD) D. case5. What do the permissions -rwSr-xr-x mean for a binary file when it is executed as a command?A) A. The command is SetUID and it will be executed with the effective rights of the owner.B) B. The command will be executed with the effective rights of the group instead of the owner.C) C. The execute flag is not set for the owner. Therefore the SetUID flag is ignored.D) D. The command will be executed with the effective rights of the owner and group. Right Answer and Explanation: 1. Right Answer: DExplanation: 2. Right Answer: B,CExplanation: 3. Right Answer: BExplanation: 4. Right Answer: CExplanation: 5. Right Answer: CExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }

More details

Published - Fri, 03 Mar 2023

ComptiA Security+ Certification Exam Questions and answer - Part 43

Created by - Mary Smith

ComptiA Security+ Certification Exam Questions and answer - Part 43

Questions 1. A penetration testing team deploys a specifically crafted payload to a web server,which results in opening a new session as the web server daemon. This session has full read/write access to the file system and the admin console. Which of the following BEST describes the attack?A) Domain hijackingB) InjectionC) Privilege escalationD) Buffer overflow2. A security administrator is trying to eradicate a worm,which is spreading throughout the organization,using an old remote vulnerability in the SMB protocol. The worm uses Nmap to identify target hosts within the company. The administrator wants to implement a solution that will eradicate the current worm and any future attacks that may be using zero-day vulnerabilities. Which of the following would BEST meet the requirements when implemented?A) Host-based firewallB) File integrity checkingC) Network-based intrusion prevention systemD) Application blacklistingE) Enterprise patch management system3. A security engineer implements multiple technical measures to secure an enterprise network. The engineer also works with the Chief Information Officer (CIO) to implement policies to govern user behavior. Which of the following strategies is the security engineer executing?A) BaseliningB) Mandatory access controlC) System hardeningD) Control diversity4. A security administrator is diagnosing a server where the CPU utilization is at 100% for 24 hours. The main culprit of CPU utilization is the antivirus program. Which of the following issue could occur if left unresolved? (Select TWO)(Select 2answers)A) Resource exhaustionB) Buffer overflowC) DLL injectionD) MITM attackE) DoS attack5. A security administrator is choosing an algorithm to generate password hashes. Which of the following would offer the BEST protection against offline brute force attacks?A) MD5B) 3DESC) SHA-1D) AES Right Answer and Explanation: 1. Right Answer: CExplanation: 2. Right Answer: CExplanation: 3. Right Answer: DExplanation: 4. Right Answer: A,EExplanation: 5. Right Answer: DExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }

More details

Published - Fri, 03 Mar 2023

Comptia A+ 1002 2023 Questions and answer - Part 68

Created by - Mary Smith

Comptia A+ 1002 2023 Questions and answer - Part 68

Questions 1. A laser printer is producing completely blank sheets. Which of the following processes should the technician check FIRST?A) A. FusingB) B. Paper handlingC) C. TransferD) D. Development2. A technician gets a call from a customer stating that their computer will not boot. They are getting the following error -invalid system disk. Which of the following should the technician check FIRST?A) A. Verify the operating system is installed correctly.B) B. Verify that all removable drives are empty.C) C. Verify Boot.ini is on the hard drive.D) D. Verify the computer will boot into safe mode.3. A technician is attempting to remove malware from a customer-s workstation. Which of the following Control Panel utilities should the technician use?A) A. Folder Options > View hidden filesB) B. System > PerformanceC) C. Display Settings > Refresh rateD) D. Internet Options > Privacy4. A technician is installing Bluetooth speakers in a conference room. Which of the following will be the average operating range of the speakers?A) A. 10 feet (3 meters)B) B. 15 feet (5 meters)C) C. 30 feet (9 meters)D) D. 45 feet (14 meters)5. A technician has imported a .dll to fix a missing .dll issue on a PC. The application still does not run correctly and is reporting that the .dll is missing. Which of the following tools would the technician use to complete the import of the .dll?A) A. gpresultB) B. msconfigC) C. regeditD) D. gpupdateE) E. regsrv32 Right Answer and Explanation: 1. Right Answer: DExplanation: 2. Right Answer: BExplanation: 3. Right Answer: AExplanation: 4. Right Answer: CExplanation: 5. Right Answer: EExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }

More details

Published - Fri, 03 Mar 2023

Comptia Linux + 2023 Questions and answer - Part 18

Created by - Mary Smith

Comptia Linux + 2023 Questions and answer - Part 18

Questions 1. What is true regarding the statement beginning with #! that is found in the first line of a script?A) A. It prevents the script from being executed until the ! is removed.B) B. It specifies the path and the arguments of the interpreter used to run the script.C) C. It is a comment that is ignored by the script.D) D. It specifies the character encoding of the script.2. Which Bash option prevents a user from accidentally overwriting a file with a '>'?A) A. set -o safeB) B. set -o noglobC) C. set -o noclobberD) D. set -o appendE) E. set -o nooverwrite3. Which of the following commands prints the exit value of the most recently executed program in Bash?A) A. echo $?B) B. echo $#C) C. echo $exitD) D. echo $statusE) E. echo $&4. Which of the following SQL statements will select the fields name and address from the contacts table?A) A. SELECT (name, address) FROM contacts;B) B. SELECT (name address) FROM contacts;C) C. SELECT name, address FROM contacts;D) D. SELECT name address FROM contacts;5. Which of the following configuration files should be modified to globally set shell variables for all users?A) A. /etc/bashrcB) B. /etc/profileC) C. ~/.bash_profileD) D. /etc/.bashrc Right Answer and Explanation: 1. Right Answer: BExplanation: 2. Right Answer: CExplanation: 3. Right Answer: AExplanation: 4. Right Answer: CExplanation: 5. Right Answer: BExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }

More details

Published - Fri, 03 Mar 2023

ComptiA Security+ Certification Exam Questions and answer - Part 44

Created by - Mary Smith

ComptiA Security+ Certification Exam Questions and answer - Part 44

Questions 1. A security analyst is working on a project that requires the implementation of a stream cipher. Which of the following should the analyst use?A) Hash functionB) Elliptic curveC) Symmetric algorithmD) Public key cryptography2. A security administrator installed a new network scanner that identifies new host systems on the network. Which of the following did the security administrator install?A) Rogue system detectionB) Network-based IDSC) Vulnerability scannerD) Configuration compliance scanner3. A security analyst wants to harden the company - s VoIP PBX. The analyst is worried that credentials may be intercepted and compromised when IP phones authenticate with the BPX. Which of the following would best prevent this from occurring?A) Require SIPS on connections to the PBX.B) Place the phones and PBX in their own VLAN.C) Restrict the phone connections to the PBX.D) Implement SRTP between the phones and the PBX.4. A security analyst is assessing a small company - s internal servers against recommended security practices. Which of the following should the analyst do to conduct the assessment? (Choose two.)(Select 2answers)A) Verify alignment with policy related to regulatory complianceB) Run an exploitation framework to confirm vulnerabilitiesC) Compare configurations against platform benchmarksD) Confirm adherence to the company - s industry-specific regulationsE) Review the company - s current security baseline5. A security analyst accesses corporate web pages and inputs random data in the forms. The response received includes the type of database used and SQL commands that the database accepts. Which of the following should the security analyst use to prevent this vulnerability?A) Pointer dereferenceB) Input validationC) Application fuzzingD) Error handling Right Answer and Explanation: 1. Right Answer: CExplanation: 2. Right Answer: AExplanation: 3. Right Answer: DExplanation: 4. Right Answer: B,EExplanation: 5. Right Answer: BExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }

More details

Published - Fri, 03 Mar 2023

Comptia A+ 1002 2023 Questions and answer - Part 69

Created by - Mary Smith

Comptia A+ 1002 2023 Questions and answer - Part 69

Questions 1. A user reports that a file they shared out on their computer for another network user is not accessible to the third party. The user insists they specifically gave this third party Allow rights for Read and Write access.Which of the following could explain the problem at hand?A) A. The parent folder has explicit Allow rights set for this user.B) B. The parent folder has explicit Deny rights set for this user.C) C. The user forgot to share the parent folder and only shared the specific file.D) D. The parent folder likely has the -archive attribute enabled.2. A technician responds to a hardware issue with a server. The technician discovers that one of the hard drives in the server has failed. The server is set up in a RAID 1 configuration. Which of the following steps would the technician perform NEXT?A) A. Remove the hard drive and back up the dataB) B. Run CONVERT on the hard driveC) C. Reboot the serverD) D. Swap hard drive and rebuild array3. A user, Joe, has just finished upgrading his computer with a wireless keyboard/mouse combination, additional memory, installed new speakers, and replaced his 15 inch flat screen with a 24 inch flat screen.When he boots the computer it immediately starts making a loud beeping noise and will go no further in the boot process. Which of Joe-s system upgrades is the cause of the problem?A) A. The DVI cable is not properly seatedB) B. Speakers are not properly connectedC) C. Battery low on wireless mouseD) D. Memory is mismatched4. A technician is tasked with removing a virus file that created a custom service. The technician has located the file to be removed using an antivirus scanner, but the scanner did not successfully remove the file. When the technician attempts to manually remove the file, an error message appears that says, -The file is in use by another program. Which of the following tools would be the BEST to use to correct the issue?A) A. TerminalB) B. SFCC) C. Event ViewerD) D. Services ConsoleE) E. Recovery Console5. A technician is fixing a very slow computer. Antivirus and Malware programs have been run, and some detections have been removed. After running Disk Cleanup, the system still seems to be slow, especially with multiple programs running. Which of the following should the technician do NEXT?A) A. Run CHKDSKB) B. Manually erase all cookiesC) C. Go back to the latest restore pointD) D. Run defrag Right Answer and Explanation: 1. Right Answer: BExplanation: 2. Right Answer: DExplanation: 3. Right Answer: DExplanation: 4. Right Answer: DExplanation: 5. Right Answer: DExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }

More details

Published - Fri, 03 Mar 2023

Comptia Linux + 2023 Questions and answer - Part 19

Created by - Mary Smith

Comptia Linux + 2023 Questions and answer - Part 19

Questions 1. Which of the following commands are used to manage the environment and shell variables within a shell process? (Choose TWO correct answers.)(Select 2answers)A) A. exportB) B. initC) C. resetD) D. setE) E. tset2. Which of the following are operators used for comparisons by the test command? (Choose TWO correct answers.)(Select 2answers)A) A. equalsB) B. =C) C. -isD) D. -eqE) E. null3. Which of the following commands creates a function in Bash that outputs the sum of two numbers?A) A. function sumitup { echo $(($1 + $2)) ; }B) B. command sumitup { echo $(($1 + $2)) ; }C) C. function sumitup { echo $1 + $2 ; }D) D. method sumitup { echo $1 + $2 ; }E) E. command sumitup { echo $1 + $2 ; }4. What output will the following command sequence produce?echo '1 2 3 4 5 6' | while read a b c; do echo result: $c $b $a; doneA) A. result: 3 4 5 6 2 1B) B. result: 1 2 3 4 5 6C) C. result: 6 5 4D) D. result: 6 5 4 3 2 1E) E. result: 3 2 15. When the command echo $? outputs 1, which of the following statements are true?A) A. It is the process ID of the echo command.B) B. It is the process ID of the current shell.C) C. It is the exit value of the command executed immediately before echo.D) D. It is the exit value of the echo command. Right Answer and Explanation: 1. Right Answer: A,DExplanation: 2. Right Answer: B,DExplanation: 3. Right Answer: AExplanation: 4. Right Answer: AExplanation: 5. Right Answer: CExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }

More details

Published - Fri, 03 Mar 2023

ComptiA Security+ Certification Exam Questions and answer - Part 45

Created by - Mary Smith

ComptiA Security+ Certification Exam Questions and answer - Part 45

Questions 1. A security analyst receives a notification from the IDS after working hours,indicating a spike in network traffic. Which of the following BEST describes this type of IDS?A) StatefulB) Signature-basedC) Anomaly-basedD) Host-based2. A security administrator is configuring a new network segment,which contains devices that will be accessed by external users,such as web and FTP server. Which of the following represents the MOST secure way to configure the new network segment?A) The segment should be placed in the existing internal VLAN to allow internal traffic only.B) The segment should be placed on an extranet,and the firewall rules should be configured to allow both internal and external traffic.C) The segment should be placed on an intranet,and the firewall rules should be configured to allow external traffic.D) The segment should be placed on a separate VLAN,and the firewall rules should be configured to allow external traffic.3. A small organization has implemented a rogue system detection solution. Which of the following BEST explains the organization - s intent?A) To identify assets on the network that are subject to resource exhaustionB) To identify end-of-life systems still in use on the networkC) To identify weak ciphers being used on the networkD) To identify assets that are not authorized for use on the network4. A security guard has informed the Chief Information Security Officer that a person with a tablet has been walking around the building. The guard also noticed strange white markings in different areas of the parking lot. The person is attempting which of the following types of attacks?A) Near field communicationB) Packet sniffingC) War chalkingD) Jamming5. A security administrator is investigating many recent incidents of credential theft for users accessing the company - s website,despite the hosting web server requiring HTTPS for access. The server - s logs show the website leverages the HTTP POST method for carrying user authentication details. Which of the following is the MOST likely reason for compromise?A) The HTTP response is susceptible to sniffing.B) The web server is running a vulnerable SSL configuration.C) The company doesn - t support DNSSEC.D) The HTTP POST method is not protected by HTTPS. Right Answer and Explanation: 1. Right Answer: CExplanation: 2. Right Answer: BExplanation: 3. Right Answer: DExplanation: 4. Right Answer: CExplanation: 5. Right Answer: DExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }

More details

Published - Fri, 03 Mar 2023

Search
Popular categories
Latest blogs
CA Foundation Business Economics Questions 2023 - Part 32
CA Foundation Business Economics Questions 2023 - Part 32
Questions 1. Generally an economy is considered under developed ifA) The standard of living of people & Productivity is low.B) Agriculture is the main occupation of the peopleC) The production techniques are backward.D) All of the above.2. Which of the following statement is correct?A) Agriculture occupies 10 per cent population of India.B) Nearly 5 per cent population of India is below the poverty line.C) The production techniques in agriculture are backward.D) None of the above.3. Which of the statements is correct?A) The tertiary sector contributes the maximum to the GDP.B) India is basically a socialist economy.C) The distribution of income and wealth is quite equitable.D) None of the above.4. In perfect competition in the short run there will be __________ possibilitiesA) Normal profits.B) Supernormal profits.C) LossD) All of above5. ______________ measure generally gives the lowest estimate of unemployment especially for poor economy.A) Usual status.B) CWS.C) CDS.D) CMS. Right Answer and Explanation: 1. Right Answer: DExplanation: 2. Right Answer: CExplanation: 3. Right Answer: AExplanation: 4. Right Answer: DExplanation: 5. Right Answer: AExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }

Fri, 03 Mar 2023

CA Foundation Business Economics Questions 2023 - Part 31
CA Foundation Business Economics Questions 2023 - Part 31
Questions 1. When the price of a complementary of commodity X falls, the demand for X-A) FallsB) RisesC) Remains unchangedD) any of the above2. Which of the following is the method of measuring elasticity of demand when change in price of a commodity is substantial?A) Arc methodB) Point methodC) Percentage methodD) none of the above3. FERA stands for -A) Foreign Exchange Recommendation ActB) Foreign Exchange Regulation ActC) Finance and Export Regulation AssociationD) Funds Export Revaluation Act4. Nearly _____percent of working population is engaged in the service sector.A) 23 per centB) 45 per centC) 80 per centD) 50 per cent5. ACRP stands for â??A) Agro-Commodity Regional PlanningB) Agro-Climatic Rational PlanningC) Agro-Climatic Regional PlanningD) Allied-Climatic Regional Planning Right Answer and Explanation: 1. Right Answer: BExplanation: 2. Right Answer: AExplanation: 3. Right Answer: BExplanation: 4. Right Answer: AExplanation: 5. Right Answer: CExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }

Fri, 03 Mar 2023

CA Foundation Business Economics Questions 2023 - Part 30
CA Foundation Business Economics Questions 2023 - Part 30
Questions 1. Literacy rate calculated considering total population into account is known asA) Crude Literacy RateB) Total Literacy RateC) Mean Literacy RateD) None of the above2. In order to encourage investment in the economy, the RBI mayA) Increase Bank RateB) Sell securities in the open marketC) Buy securities in the open marketD) None of above3. Most of unemployment in India is __________A) VoluntaryB) StructuralC) FrictionalD) Technical4. Under a Command economy â??A) State plays a major roleB) Market plays major roleC) Both a & bD) Neither a nor b5. _______is the apex bank for agriculture credit in India.A) RBIB) SIDBIC) NABARDD) ICICI Right Answer and Explanation: 1. Right Answer: AExplanation: 2. Right Answer: CExplanation: 3. Right Answer: BExplanation: 4. Right Answer: AExplanation: 5. Right Answer: CExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }

Fri, 03 Mar 2023

All blogs