Question
Column (1) Column (2) (A) The budget outlay for space has considerable influence (D) of China, Germany, Italy and Japan, but less than the U.S. and Russia. (B) While it has limitations, the study nevertheless is a first-time (E) on the dynamics of the space economy. (C) In relation to GDP, India's spending is more than (F) at scientifically measuring the size of the space economy In the following questions, two columns are given, Column 1 and Column 2. Each column contains 3 phrases. Match the phrases in Column 1 with the phrases in Column 2, so that they form grammatically and contextually correct sentences. If no such statements can be formed, choose option 5, “None of these” as your answer.
Solution
Phrase A forms a sentence with E. D and F does not connect with A. Phrases B and C do not form any statements when joined with any other phrases in Column 2.
In each of the questions below, a sentence is given with two blanks, indicating that some parts are missing. Identify the correct pair of words that fit...
Fill in the blank/s with suitable Word/s:
The teacher wanted to _________ the students to think critically about the topic.
In the following question ,sentences are given with blanks to be filled in with an appropriate word.four alternative is suggested for each question.
Given below is a sentence with one blank in each. Below each sentence are given four words among which one word might fill the blank. If none of the wo...
The …………… of Sri Lankan fisherman and their boats that were released on the orders of the State Government is being d...
Select the most appropriate option to fill in the blank.
She ______Â why I had not sent her an invitation.
A poor man and his family ate ________ little other residents of the town were kind enough to spare. One day, when he and his family sat down to eat, a ...
It is possible to plug into remote databases to ____________ information.
Select the most appropriate option to fill in the blank.
The pleasant ______ of the rain as it fell on the dust made me feel nostalgic.
Unauthorised leaks, hacking and other cybercrimes have _________ data bases vulnerable.Â
(A) fulfilled     Â
(B) left