Question
Which kind of computer security requires verifying the
genuineness of the individuals or organisations that want to access a system?Solution
The correct answer is C
How many persons face north direction?
Read the directions carefully and answer the following questions.
Seven persons Aman, Vipin, Dev, Suman, Ram, Kamal and Himmat live in a buildi...
Who among the following faces Umesh?
Five number-pairs are given, out of which three are alike in certain manner and one is different. Choose the different number-pair.
Eight friends Kriti, Durga, Manasi, Surya, Tahira, Vritti, Ahana and Yoshita are sitting around an square table in such a way that four friends are sitt...
Six person, T, U, V, W, X and Y, are placed in a row facing towards the north (not necessarily in the same order). T sits to the immediate left of Y. X ...
Eight friends, R, S, T, U, V, W, X and Y are sitting in a line facing north. V is sitting at one of the corners. S is sitting between Y and T. X is sitt...
What is the position of T with respect to the one who likes Strawberry?
In which of the following institute did Chetan study?
How is X related to D?