Question
If in the word ‘FRAGRANCE’, all vowels are replaced
by its next letter and all consonant is replaced by its previous letter, then all letters are arranged in alphabetical order from left to right. Then which of the following letter fourth from the right end?Solution
FÂ Â Â Â Â Â Â Â Â Â Â Â Â RÂ Â Â Â Â Â Â Â Â Â Â Â AÂ Â Â Â Â Â Â Â Â Â Â Â GÂ Â Â Â Â Â Â Â Â Â Â Â RÂ Â Â Â Â Â Â Â Â Â Â Â AÂ Â Â Â Â Â Â Â Â Â Â Â NÂ Â Â Â Â Â Â Â Â Â Â Â CÂ Â Â Â Â Â Â Â Â Â Â Â E EÂ Â Â Â Â Â Â Â Â Â Â Â Â QÂ Â Â Â Â Â Â Â Â Â Â Â BÂ Â Â Â Â Â Â Â Â Â Â Â FÂ Â Â Â Â Â Â Â Â Â Â Â Â QÂ Â Â Â Â Â Â Â Â Â Â Â BÂ Â Â Â Â Â Â Â Â Â Â Â MÂ Â Â Â Â Â Â Â Â Â Â BÂ Â Â Â Â Â Â Â Â Â Â Â F BÂ Â Â Â Â Â Â Â Â Â Â Â BÂ Â Â Â Â Â Â Â Â Â Â Â BÂ Â Â Â Â Â Â Â Â Â Â Â EÂ Â Â Â Â Â Â Â Â Â Â Â Â FÂ Â Â Â Â Â Â Â Â Â Â Â Â FÂ Â Â Â Â Â Â Â Â Â Â Â Â MÂ Â Â Â Â Â Â Â Â Â Â QÂ Â Â Â Â Â Â Â Â Â Â Â Q
Using websites to pour out one’s grievances is called :
Who among the following is known as father of Internet?
What is the role of a CDN (Content Delivery Network) in web development?
What is the shortcut for opening File Explorer in Windows?
...................... is the creation of email messages with a forged sender address - something which is simple to do because the core protocols do no...
Which device is used to connect different networks and route data between them?
What is the function of a switch in a computer network?
It is a networking protocol for distributed, collaborative, hypermedia information systems
What is the purpose of a Honeypot in network security?
- Which of the following is used to access the internet on the computer?