Where possibilities begin

We’re a leading marketplace platform for learning and teaching online. Explore some of our most popular content and learn something new.
Total 835 Results
ComptiA Security+ Certification Exam Questions and answer - Part 25

Created by - Mary Smith

ComptiA Security+ Certification Exam Questions and answer - Part 25

Questions 1. A network administrator wants to implement a method of securing internal routing. Which of the following should the administrator implement?A) DMZB) NATC) VPND) PAT2. A network operations manager has added a second row of server racks in the datacenter. These racks face the opposite direction of the first row of racks. Which of the following is the reason the manager installed the racks this way?A) To lower energy consumption by sharing power outletsB) To create environmental hot and cold islesC) To eliminate the potential for electromagnetic interferenceD) To maximize fire suppression capabilities3. A network technician is setting up a segmented network that will utilize a separate ISP to provide wireless access to the public area for a company. Which of the following wireless security methods should the technician implement to provide basic accountability for access to the public network?A) Pre-shared keyB) EnterpriseC) Wi-Fi Protected setupD) Captive portal4. A network technician is trying to determine the source of an ongoing network based attack. Which of the following should the technician use to view IPv4 packet data on a particular internal network segment?A) ProxyB) Protocol analyzerC) SwitchD) Firewall5. A new Chief Information Officer (CIO) has been reviewing the badging and decides to write a policy that all employees must have their badges rekeyed at least annually. Which of the following controls BEST describes this policy?A) PhysicalB) CorrectiveC) TechnicalD) Administrative Right Answer and Explanation: 1. Right Answer: CExplanation: 2. Right Answer: BExplanation: 3. Right Answer: DExplanation: 4. Right Answer: BExplanation: 5. Right Answer: DExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }

More details

Published - Fri, 03 Mar 2023

Comptia A+ 1002 2023 Questions and answer - Part 50

Created by - Mary Smith

Comptia A+ 1002 2023 Questions and answer - Part 50

Questions 1. Ann, a customer, reports that when she occasionally works in the office basement, her smartphone battery drains faster than normal and she has poor cellular reception. Which of the following is the reason for the fast battery drain?A) A. Unpaired BluetoothB) B. Weak signalB. Weak signalC) C. Defective SD cardD) D. Malware2. Which of the following should a technician implement to prevent external contractors from physically plugging devices into the company-s network jacks unless such jacks are designated for guest use?A) A. Disable DHCP and assign a static IP address to each network device physically connected to the network.B) B. Enable MAC address filtering across all network jacks and record the MAC address of guest devices.C) C. Disable all switch ports when they are not utilized and enable them on an as needed basis.D) D. Place guest network jacks in public areas and all other jacks in secure areas as needed.3. A technician is using a domain account to access files located on a server at the path \\computername\C$.The technician receives an -Access denied error message. Which of the following is MOST likely the cause of the error?A) A. The server is no longer accepting connections since reaching its limit of open shares.B) B. The password is incorrect, requiring the user to reset it before authentication will proceed.C) C. The username should be prefixed by the domain, followed by a backslash (e.g., domain\username).D) D. The account does not have local administrative permissions to access the server share.4. A user wants to configure a smartphone to save all attachments from an Outlook.com email to a cloud-based service. Which of the following would be BEST to use to accomplish this?A) A. Google DriveB) B. iCloudC) C. One DriveD) D. FTP5. A technician is tasked to change the number of CPU cores available to the OS to enhance productivity. Which of the following tools would allow the technician to perform this task?A) A. msconfigB) B. perfmonC) C. taskmgrD) D. dxdiag Right Answer and Explanation: 1. Right Answer: BExplanation: 2. Right Answer: CExplanation: 3. Right Answer: DExplanation: 4. Right Answer: CExplanation: 5. Right Answer: AExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }

More details

Published - Fri, 03 Mar 2023

Comptia IT Fundamentals 2023 Questions and answer - Part 50

Created by - Mary Smith

Comptia IT Fundamentals 2023 Questions and answer - Part 50

Questions 1. Ann, a user, wishes to free space in her documents folder. Which of the following is the BEST characteristic to sort by in order to ensure that the most space is freed by deleting the least amount of files?A) A. Date modifiedB) B. File pathC) C. SizeD) D. Extension2. Where can a user find the latest updates, upgrades, or firmware for an electronic device that the vendor supports?A) A. Internet search engineB) B. Internet forumC) C. Technical community groupsD) D. OEM website3. When applying ergonomics to a workstation area, which of the following are the MOST important to consider? (Select TWO).(Select 2answers)A) A. Proper sitting positionB) B. Amount of time computer will be usedC) C. Clarity of the displayD) D. Proper keyboard and mouse heightE) E. Number of speakers in sound systemF) F. Brightness and contrast of the display4. An RoHS label on hardware indicates which of the following?A) A. The hardware produces EMI when used.B) B. The hardware is certified to be energy efficient.C) C. The hardware provides battery backup for power outages.D) D. The hardware needs to be properly disposed.5. Ann, a user, reports that her computer was working this morning, but now the screen is blank. The power indicator for the monitor is on. Pressing the space bar or mouse does not fix the problem. Which of the following is the cause?A) A. The monitor power cable is unplugged.B) B. The video cable has become disconnected.C) C. The video driver is not installed.D) D. The operating system has encountered a stop error.E) E. The screen saver has activated. Right Answer and Explanation: 1. Right Answer: CExplanation: 2. Right Answer: DExplanation: 3. Right Answer: A,DExplanation: 4. Right Answer: DExplanation: 5. Right Answer: BExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }

More details

Published - Fri, 03 Mar 2023

ComptiA Security+ Certification Exam Questions and answer - Part 26

Created by - Mary Smith

ComptiA Security+ Certification Exam Questions and answer - Part 26

Questions 1. A new firewall has been places into service at an organization. However,a configuration has not been entered on the firewall. Employees on the network segment covered by the new firewall report they are unable to access the network. Which of the following steps should be completed to BEST resolve the issue?A) The firewall should be configured to prevent user traffic form matching the implicit deny rule.B) The firewall should be configured with access lists to allow inbound and outbound traffic.C) The firewall should be configured with port security to allow traffic.D) The firewall should be configured to include an explicit deny rule.2. A new hire wants to use a personally owned phone to access company resources. The new hire expresses concern about what happens to the data on the phone when they leave the company. Which of the following portions of the company's mobile device management configuration would allow the company data to be removed from the device without touching the new hire's data?A) Asset controlB) Device access controlC) Storage lock outD) Storage segmentation3. A new intern in the purchasing department requires read access to shared documents. Permissions are normally controlled through a group called 'Purchasing',however,the purchasing group permissions allow write access. Which of the following would be the BEST course of action?A) Modify all the shared files with read only permissions for the intern.B) Create a new group that has only read permissions for the files.C) Remove all permissions for the shared files.D) Add the intern to the 'Purchasing' group.4. A new mobile application is being developed in-house. Security reviews did not pick up any major flaws,however vulnerability scanning results show fundamental issues at the very end of the project cycle. Which of the following security activities should also have been performed to discover vulnerabilities earlier in the lifecycle?A) Architecture reviewB) Risk assessmentC) Protocol analysisD) Code review5. A new security administrator ran a vulnerability scanner for the first time and caused a system outage. Which of the following types of scans MOST likely caused the outage?A) Non-intrusive credentialed scanB) Non-intrusive non-credentialed scanC) Intrusive credentialed scanD) Intrusive non-credentialed scan Right Answer and Explanation: 1. Right Answer: AExplanation: 2. Right Answer: DExplanation: 3. Right Answer: BExplanation: 4. Right Answer: DExplanation: 5. Right Answer: DExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }

More details

Published - Fri, 03 Mar 2023

Comptia A+ 1002 2023 Questions and answer - Part 51

Created by - Mary Smith

Comptia A+ 1002 2023 Questions and answer - Part 51

Questions 1. A user leaves the workstation frequently and does not want sensitive material to be accessed. In addition, the user does not want to turn off the computer every time in the evening. Which of the following is the BEST solution for securing the workstation?A) A. Set a strong password that requires a renewal every 30 days.B) B. Run a screensaver after one minute of non-use and fingerprint lock for after hours.C) C. Apply a screen lock after five minutes of non-use and login time restrictions for after hours.D) D. Require a password and fingerprint lock after hours.2. Joe, a technician, would like to map a network drive when he starts up his computer in the morning. Which of the following commands would he use to accomplish this task?A) A. NSLOOKUPB) B. NETSTATC) C. NBTSTATD) D. NET3. Which of the following best practices is used to fix a zero-day vulnerability on Linux?A) A. Scheduled backupB) B. Scheduled disk maintenanceC) C. Patch managementD) D. Antivirus update4. A user states that when they logon to their computer sometimes they get an IP conflict error. The user computer is configured with a static IP. Which of the following is the problem?A) A. Duplicate IP exist on the networkB) B. DHCP server needs to be rebootedC) C. Network adapter driver needs to be updatedD) D. Bad network adapter5. A user advises that a computer is displaying pop-ups when connected to the Internet. After updating and running anti-malware software, the problem persists and the technician finds that two rogue processes cannot be killed. Which of the following should be done NEXT to continue troubleshooting the problem?A) A. Run msconfig to clean boot the computerB) B. Run Event Viewer to identify the causeC) C. Run System Restore to revert to previous stateD) D. Run Recovery Console to kill the processes Right Answer and Explanation: 1. Right Answer: CExplanation: 2. Right Answer: DExplanation: 3. Right Answer: CExplanation: 4. Right Answer: AExplanation: 5. Right Answer: AExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }

More details

Published - Fri, 03 Mar 2023

Comptia Linux + 2023 Questions and answer - Part 1

Created by - Mary Smith

Comptia Linux + 2023 Questions and answer - Part 1

Questions 2. Which of the following files holds the configuration for journald when running systemd?A) A. /etc/systemd/journalctl.confB) B. /etc/systemd/journald.confC) C. /etc/systemd/systemd-journald.confD) D. /etc/systemd/systemd-journalctl.confE) E. /usr/lib/systemd/journalctl.conf3. Which of the following are commonly used Mail Transfer Agent (MTA) applications? (Choose THREE correct answers.)(Select 3answers)A) A. PostfixB) B. ProcmailC) C. SendmailD) D. EximE) E. SMTPd4. Which of the following is observed and corrected by a NTP client?A) A. The skew in time between the system clock and the hardware clock.B) B. The skew in time between the system clock and the reference clock.C) C. Changes in the time zone of the current computer's location.D) D. Adjustments needed to support Daylight Saving Time.5. Which of the following is a legacy program provided by CUPS for sending files to the printer queues on the command line?A) A. lpdB) B. lppC) C. lpqD) D. lpr Right Answer and Explanation: 2. Right Answer: BExplanation: 3. Right Answer: A,C,DExplanation: 4. Right Answer: BExplanation: 5. Right Answer: DExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }

More details

Published - Fri, 03 Mar 2023

ComptiA Security+ Certification Exam Questions and answer - Part 27

Created by - Mary Smith

ComptiA Security+ Certification Exam Questions and answer - Part 27

Questions 1. A new security policy in an organization requires that all file transfers within the organization be completed using applications that provide secure transfer. Currently,the organization uses FTP and HTTP to transfer files. Which of the following should the organization implement in order to be compliant with the new policy?A) Replace FTP with SFTP and replace HTTP with TLSB) Replace FTP with FTPS and replaces HTTP with TFTPC) Replace FTP with SFTP and replace HTTP with TelnetD) Replace FTP with FTPS and replaces HTTP with IPSec2. An external attacker can modify the ARP cache of an internal computer. Which of the following types of attacks is described?A) ReplayB) SpoofingC) DNS poisoningD) Client-side attack3. An external contractor,who has not been given information about the software or network architecture,is conducting a penetration test. Which of the following BEST describes the test being performed?A) Black boxB) White boxC) Passive reconnaissanceD) Vulnerability scan4. An incident involving a workstation that is potentially infected with a virus has occurred. The workstation may have sent confidential data to an unknown internet server. Which of the following should a security analyst do FIRST?A) Make a copy of everything in memory on the workstation.B) Turn off the workstation.C) Consult information security policy.D) Run a virus scan.5. An incident responder receives a call from a user who reports a computer is exhibiting symptoms consistent with a malware infection. Which of the following steps should the responder perform NEXT?A) Capture and document necessary information to assist in the response.B) Request the user capture and provide a screenshot or recording of the symptoms.C) Use a remote desktop client to collect and analyze the malware in real time.D) Ask the user to back up files for later recovery. Right Answer and Explanation: 1. Right Answer: AExplanation: 2. Right Answer: BExplanation: 3. Right Answer: AExplanation: 4. Right Answer: AExplanation: 5. Right Answer: AExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }

More details

Published - Fri, 03 Mar 2023

Comptia A+ 1002 2023 Questions and answer - Part 52

Created by - Mary Smith

Comptia A+ 1002 2023 Questions and answer - Part 52

Questions 1. A Google account on an Android device by default will synchronize to which of the following locations?A) A. CloudB) B. SSDC) C. PC desktopD) D. MicroSD2. A user, Joe, calls and states every few hours he is unable to connect to the Internet for several minutes but is able to access internal sites during this time. Which of the following tools would be used to find the issue with the network connection?A) A. TRACERTB) B. NETSTATC) C. IPCONFIGD) D. NSLOOKUP3. An engineer working with large detailed CAD files notices over time that the workstation is taking significantly longer to open files that used to launch quickly. Other applications work fine, and the engineer confirms all of the data has been backed up the night before. A technician determines that the workstation is about two years old. Which of the following would be the technician-s FIRST step in troubleshooting the problem?A) A. Run defrag on the hard driveB) B. Restore the CAD files from backupC) C. Replace the hard driveD) D. Remove and reinstall the CAD software4. Which of the following will help to protect an organization from further data exposure AFTER a list of user passwords has already been leaked due to policy breach? (Select TWO).(Select 2answers)A) A. Use multi-factor authenticationB) B. Require strong passwordsC) C. Enable file encryptionD) D. Educate end usersE) E. Restrict user permissions5. Which of the following is TRUE about the difference between a worm and a virus?A) A. Worms are written in assembly while viruses are written with scripting languages.B) B. Viruses hide in the boot record while worms hide within the file system.C) C. Worms self propagate while viruses need human intervention to replicate.D) D. Viruses disable the antivirus update service while worms kill the antivirus process. Right Answer and Explanation: 1. Right Answer: AExplanation: 2. Right Answer: AExplanation: 3. Right Answer: AExplanation: 4. Right Answer: A,DExplanation: 5. Right Answer: CExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }

More details

Published - Fri, 03 Mar 2023

Comptia Linux + 2023 Questions and answer - Part 2

Created by - Mary Smith

Comptia Linux + 2023 Questions and answer - Part 2

Questions 1. What entry can be added to the syslog.conf file to have all syslog messages generated by a system displayed on console 12?(Select 2answers)A) A. *.* /dev/tty12B) B. /var/log/messages | /dev/tty12C) C. | /dev/tty12D) D. syslog tty12E) E. mail.* /dev/tty122. What is true regarding the file ~/.forward?A) A. As it is owned by the MTA and not writable by the user, it must be edited using the editaliases command.B) B. After editing ~/.forward the user must run newaliases to make the mail server aware of the changes.C) C. Using ~/.forward, root may configure any email address whereas all other users may configure only their own addresses.D) D. When configured correctly, ~/.forward can be used to forward each incoming mail to more than one other recipient.3. Which of the following commands is used to rotate, compress, and mail system logs?A) A. rotatelogB) B. striplogC) C. syslogd --rotateD) D. logrotateE) E. logger4. How many bits make up an IPv6 address?A) A. 32B) B. 48C) C. 64D) D. 128E) E. 2565. Which of the following files is consulted when programs like netstat try to match port numbers to names?A) A. /etc/networksB) B. /etc/portmapperC) C. /etc/protocolsD) D. /etc/resolv.confE) E. /etc/services Right Answer and Explanation: 1. Right Answer: A,CExplanation: 2. Right Answer: DExplanation: 3. Right Answer: DExplanation: 4. Right Answer: DExplanation: 5. Right Answer: EExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }

More details

Published - Fri, 03 Mar 2023

Search
Popular categories
Latest blogs
CA Foundation Business Economics Questions 2023 - Part 32
CA Foundation Business Economics Questions 2023 - Part 32
Questions 1. Generally an economy is considered under developed ifA) The standard of living of people & Productivity is low.B) Agriculture is the main occupation of the peopleC) The production techniques are backward.D) All of the above.2. Which of the following statement is correct?A) Agriculture occupies 10 per cent population of India.B) Nearly 5 per cent population of India is below the poverty line.C) The production techniques in agriculture are backward.D) None of the above.3. Which of the statements is correct?A) The tertiary sector contributes the maximum to the GDP.B) India is basically a socialist economy.C) The distribution of income and wealth is quite equitable.D) None of the above.4. In perfect competition in the short run there will be __________ possibilitiesA) Normal profits.B) Supernormal profits.C) LossD) All of above5. ______________ measure generally gives the lowest estimate of unemployment especially for poor economy.A) Usual status.B) CWS.C) CDS.D) CMS. Right Answer and Explanation: 1. Right Answer: DExplanation: 2. Right Answer: CExplanation: 3. Right Answer: AExplanation: 4. Right Answer: DExplanation: 5. Right Answer: AExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }

Fri, 03 Mar 2023

CA Foundation Business Economics Questions 2023 - Part 31
CA Foundation Business Economics Questions 2023 - Part 31
Questions 1. When the price of a complementary of commodity X falls, the demand for X-A) FallsB) RisesC) Remains unchangedD) any of the above2. Which of the following is the method of measuring elasticity of demand when change in price of a commodity is substantial?A) Arc methodB) Point methodC) Percentage methodD) none of the above3. FERA stands for -A) Foreign Exchange Recommendation ActB) Foreign Exchange Regulation ActC) Finance and Export Regulation AssociationD) Funds Export Revaluation Act4. Nearly _____percent of working population is engaged in the service sector.A) 23 per centB) 45 per centC) 80 per centD) 50 per cent5. ACRP stands for â??A) Agro-Commodity Regional PlanningB) Agro-Climatic Rational PlanningC) Agro-Climatic Regional PlanningD) Allied-Climatic Regional Planning Right Answer and Explanation: 1. Right Answer: BExplanation: 2. Right Answer: AExplanation: 3. Right Answer: BExplanation: 4. Right Answer: AExplanation: 5. Right Answer: CExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }

Fri, 03 Mar 2023

CA Foundation Business Economics Questions 2023 - Part 30
CA Foundation Business Economics Questions 2023 - Part 30
Questions 1. Literacy rate calculated considering total population into account is known asA) Crude Literacy RateB) Total Literacy RateC) Mean Literacy RateD) None of the above2. In order to encourage investment in the economy, the RBI mayA) Increase Bank RateB) Sell securities in the open marketC) Buy securities in the open marketD) None of above3. Most of unemployment in India is __________A) VoluntaryB) StructuralC) FrictionalD) Technical4. Under a Command economy â??A) State plays a major roleB) Market plays major roleC) Both a & bD) Neither a nor b5. _______is the apex bank for agriculture credit in India.A) RBIB) SIDBIC) NABARDD) ICICI Right Answer and Explanation: 1. Right Answer: AExplanation: 2. Right Answer: CExplanation: 3. Right Answer: BExplanation: 4. Right Answer: AExplanation: 5. Right Answer: CExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }

Fri, 03 Mar 2023

All blogs