Question
Each question below has two blanks, which is indicating
that something has been omitted. Choose the most suitable option indicating the words that can be used to fill up the blanks in the sentences to make them meaningfully complete. Some violent pro-Khalistan ______ groups receive financial support within the country that has ______the claims of the Indian government at a time when the two sides are working to rebuild their relationship.Solution
- Extremist : Â A person who holds extreme political or religious views, especially one who advocates for radical, uncompromising, or violent methods to achieve their goals.
- Vindicate: To clear someone or something from blame, suspicion, or doubt with supporting proof; to show that what someone said or did was right or justified.
- A. Moderate, Discredit: “Moderate” is the opposite of violent, so it doesn’t fit. “Discredit” would mean to harm the reputation of the government’s claims, which is the opposite of what the sentence describes.
- C. Pacifist, Denounce: “Pacifist” means someone who is against violence, so it’s a direct contradiction to the sentence. Denounce means to deny .
- D. Centrist, Vindicate: “Centrist” means holding moderate political views, which doesn’t fit “violent pro-Khalistan groups.”
- E. Liberal, Condemn: “Liberal” doesn’t fit the context of a violent group. “Condemn” means to express complete disapproval of, which doesn’t make sense in this sentence.
A device that helps to prevent congestion and data collision?
Which type of memory can be both read from and written to by the processor?
State true/false
Trojan works in background and steal data which is sensitive
In the context of backups, what is a retention policy?
Which property distinguishes a B+ tree from a B-tree?
Which network topology requires the highest amount of cabling?
Which of the following is lowest in memory hierarchy?
Which network layer protocol is responsible for multicasting, where a packet is sent to multiple destinations simultaneously?
What is a blockchain?
In which protocol of email the changes made on one device will not be replicated on other?