Question
Which of the following combination is
true? Directions (Q.116-120): Study the following information carefully and answer the following questions given below: Ten persons P, Q, R, S, T, U, V, W, X and Y like different deodorants, viz. Engage, Nike, Adidas, Axe and Dove, Wattagirl, Rexona, Avon, Fa and Layer shot. All of them eat a different fast foods, viz. Pizza, Momos, Macroni, Dosa, Sambhar, Paneer, Tikki, Sandwich, Dokhla and Burger but not necessarily in the same order. (i) The one who likes Layer shot eats Burger. (ii) X does not like Nike or Layer shot. (iii) S likes Axe and eats Momos. (iv) U eats Dosa and likes Wattagirl. (v) W eats Sandwich. (vi) The one who eats Pizza likes Adidas. (vii) P eats Paneer and X eats Dokhla. (viii) V likes Rexona. (ix) Neither P nor Q likes Fa. (x) P does not like Engage. (xi) R likes Adidas and W likes Avon. (xii) T likes Dove and eats Macroni. (xiii) Q eats Sambhar.Solution

Which approach is most effective in leveraging data for fraud detection in financial transactions?
Which of the following best describes the purpose of data wrangling?
A company uses a firewall to filter incoming and outgoing network traffic. Despite this, an attacker successfully accesses the network through a vulnera...
In NLP, what does POS tagging stand for?
In artificial intelligence, what is the primary advantage of using a convolutional neural network (CNN) over a traditional multi-layer perceptron (MLP) ...
Which of the following best describes the main purpose of Exploratory Data Analysis (EDA) in data analysis?
A data analyst is tasked with presenting findings on customer churn to the executive team. Which technique would be most effective for ensuring the team...
During the data analysis process, which of the following steps is primarily focused on removing inaccuracies and ensuring the dataset's reliability?
An employee in a financial organization receives an email claiming to be from the company CEO, asking them to urgently transfer funds to a specific acco...
In file systems, which allocation method results in the maximum random access performance?