Question
1. Santosh’s parents were affluent landowners who
could afford to send their children to the best schools, even to the country’s capital, New Delhi, which was quite close by. P. And the right moment came when she turned sixteen. Q. So, she decided to fight the system in her own quiet way when the right moment arrived. R. But, in line with the prevailing custom in the family, Santosh had to make do with the local village school. S. At sixteen, most of the girls in her village used to get married. 6. Santosh was also under pressure from her parents to do the same. In the following question the 1st and the last part of the sentence/passage are numbered 1 and 6. The rest of the sentence/ passage is split into four parts and named P, Q, R and S. These four parts are not given in their proper order. Read the sentence/ passage and find out which of the four combinations is correct.Solution
Santosh’s parents were affluent landowners who could afford to send their children to the best schools, even to the country’s capital, New Delhi, which was quite close by. But, in line with the prevailing custom in the family, Santosh had to make do with the local village school. So, she decided to fight the system in her own quiet way when the right moment arrived. And the right moment came when she turned sixteen. At sixteen, most of the girls in her village used to get married. Santosh was also under pressure from her parents to do the same.
First page of a website is called
Name the another pointing device which is an alternative to mouse?
Which of the following is used by the browser to connect to the location of the Internet resources?
What type of topology is found in a WIRELESS LAN?
The purpose of the primary key in a database is to
Which of the following is not a System Software?
Which Function key is commonly used to access the boot menu during computer startup to select a boot device, like a USB drive or CD/DVD?
The file extension of MS-Word document in Office 2007 is_______.
Pressing F8 key for three times selects_____
What is the role of a proxy server in network security?