Aptitude Questions and Answers # 3


1- Union Information and Broadcasting ministry recently gave an indication to change which of the following laws on a larger scale, as the existing provisions of the Act are inadequate to cater to the phenomenal growth of the print media in view of the liberalization of the government policies?

1. Press & Registration of Books Act, (PRB Act) 1867
2. The Delivery Of Books ‘And Newspapers’ (Public Libraries) Act, 1954
3. Indian Press (Emergency Powers ) Act 1931
4. none

Answer: Press & Registration of Books Act, (PRB Act) 1867

2- 2 numbers differ by 5.If their product is 336,then the sum of the 2 numbers is:
1. 21
2. 51
3. 28
4. 37

Answer: 37





Related Link
Aptitude Questions and Answers # 2
Aptitude Questions and Answers # 1
Science Invention & Inventors
World Wide G.K


3- Which number is the odd one out? 9678 4572 5261 3527 7768

1. 7768
2. 3527
3. 4572
4. 5261

Answer: 3527

4- Which one among the following has the largest shipyard in India
1. Kolkata
2. Kochi
3. Mumbai
4. Visakhapatnam

Answer: Kochi

5- If x=y=2z and xyz=256 then what is the value of x?
1. 8
2. 3
3. 5
4. 6

Answer: 8

6- A radio when sold at a certain price gives a gain of 20%. What will be the gain percent, if sold for thrice the price?

1. 280
2. 270
3. 290
4. 260

Answer: 260

7- x% of y is y% of ?
1. x/y
2. 2y
3. x
4. can’t be determined

Answer: x




Related Link
Aptitude Questions and Answers # 2
Aptitude Questions and Answers # 1
Science Invention & Inventors
World Wide G.K

8- If the value of x lies between 0 & 1 which of the following is the largest?
1. x
2. x2
3. -x
4. 1/x

Answer: 1/x

9- The tutor of Alexander the great was
1. Darius
2. Cyrus
3. Socrates
4. Aristotle

Answer: Aristotle

10- Thirty men take 20 days to complete a job working 9 hours a day. How many hour a day should 40 men work to complete the job?
1. 8 hrs
2. 71/2 hrs
3. 7 hrs
4. 9 hrs

Answer: 71/2 hrs


Related Link ,See once

SECURITY TOOLS -Cyber Security # 4
Security Tips – Cyber Security #3
Method Of Defence – Cyber Security #2
Computer Threats – Cyber Security #1
Cyber Security Introduction
Cyber Security
Science
>>> CONTACT US < <<

Comment Please