📢 Too many exams? Don’t know which one suits you best? Book Your Free Expert 👉 call Now!


    ⚡ Rakhi Special - Flat 52% off on All Courses from 6 to 10 Aug! ⚡ Enroll Now

    Question

    Unauthorised leaks, hacking and other cybercrimes have

    _________ data bases vulnerable.  (A) fulfilled            (B) left (C) obliged        (D) assigned        (E) imposed          (F) rendered The following questions consist of a single sentence with one blank only. You are given six words denominated by A, B, C, D, E and F as answer choices and from the six choices you have to pick two correct answers, either of which will make the sentence meaningfully complete.
    A (A) and (B) Correct Answer Incorrect Answer
    B (B) and (C) Correct Answer Incorrect Answer
    C (C) and (D) Correct Answer Incorrect Answer
    D (C) and (E) Correct Answer Incorrect Answer
    E (B) and (F) Correct Answer Incorrect Answer

    Solution

    The correct answer is E

    Practice Next
    ask-question