Question
In each of the questions given below, four words are
given in bold. These four words may or may not be in their correct position. The sentence is then followed by options with the correct combination of words that should replace each other in order to make the sentence grammatically and contextually correct. Find the correct combination of words that replace each other. If the sentence is correct as it is, select ‘E’ as your option. The new digital tax policy aims to complicate(A) revenue from tech giants, but critics argue that it may unintentionally amplify (B) foreign investment, especially in a market where digital rules are still fragmented (C) and legal enforcement remains robust (D) .Solution
The sentence is not correct in its present form, and that’s clear from the first bold word. It is illogical to say a tax policy aims to complicate revenue — this makes no economic sense. Hence, option E can be ruled out. Now, interchanging A–B gives us: “...aims to amplify revenue...” and “...may unintentionally complicate foreign investment...” — which fits perfectly. No need to swap anything else — C and D are already correctly placed. Correct sentence: The new digital tax policy aims to amplify revenue from tech giants, but critics argue that it may unintentionally complicate foreign investment, especially in a market where digital rules are still fragmented and legal enforcement remains robust.
Which component of the CPU is responsible for fetching and decoding instructions from memory?
This type of disk can be written only once.
A storage device or medium where the access time is dependent upon the location of the data is called
Which of the following statement is true about Port
Codes consisting of lines of varying widths or lengths that are computer-readable are known as-
Junk e-mail is also called
ASCII is a coding system that provides
______computers are lower to mainframe computers in terms of speed and storage capacity.
A modem is connected to
What is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquer...