Who among the following born on 19th of June?
L born on the even number date but in the month having 31 days but not in January. Only one person born between N and L, who likes ICAR. L born before N. So, N and M born on 6th August and 6th June respectively. Only three persons born between K and the one who likes Graphic era. K born in the month having 30 days but not on the last day of the month. We will have two cases: K born either on 19th June or 19th November and the one who likes born either on 19th November or 19th June. More than two persons born between L and M. So, M born on 6th November. Only two persons born between M and H, who likes DAV. Only one person born between the one who likes DAV and the one who likes FRI. So, H born on 19th August and the one who likes DAV born either on 6th January or 19th November. Only one person born between the one who likes FIT and the one who likes Graphic era. The one who likes FIT born on 19th January but case 1 will get discarded as we cannot place the one who likes FIT. I and J born in the same month. J born on the even date. So, I and J born on 19th January and 6th January respectively. The one who likes CCSU born before the one who likes MIET but born after the one who likes DIT. So, The one who likes CCSU, MIET and DIT born on 6th August, 6th November and 6th January respectively. Final arrangement as shown below:
Which of the following is not classified as a tower?
Find the odd one out.
The capacity of a CPU is measured.
Which of the following domain can we use for an international organisation?
Rollback is a term used for ________________.
To navigate to a new Web page for which you know the URL, type URL in the browser’s______ and press Enter
A small film-plate which is used for microfilming the output from a microcomputer screen is called
In the context of cybersecurity, what does the term zero-day vulnerability refer to?
Which of the following components is responsible for temporarily storing data and instructions directly accessible to the CPU?
What process involves converting a message into a secret code to ensure confidentiality?