Clat Mock Test - 12


150 Questions MCQ Test Mock Test Series for CLAT 2020 | Clat Mock Test - 12


Description
This mock test of Clat Mock Test - 12 for CLAT helps you for every CLAT entrance exam. This contains 150 Multiple Choice Questions for CLAT Clat Mock Test - 12 (mcq) to study with solutions a complete question bank. The solved questions answers in this Clat Mock Test - 12 quiz give you a good mix of easy questions and tough questions. CLAT students definitely take this Clat Mock Test - 12 exercise for a better result in the exam. You can find other Clat Mock Test - 12 extra questions, long questions & short questions for CLAT on EduRev as well by searching above.
QUESTION: 1

India is a sovereign because

Solution:
QUESTION: 2

In case there is a conflict between the preamble and other provisions of the constitution

Solution:
QUESTION: 3

The constitution of India embodies the parliamentary form of government because

Solution:
QUESTION: 4

To uphold and protect the sovereignty, unity and integrity of India

Solution:
QUESTION: 5

Emoluments, allowances and privileges of President of India are specified in

Solution:
QUESTION: 6

New Delhi is the seat of Supreme court, the court may sit in such other place as

Solution:
QUESTION: 7

Assertion: An act of the legislature cannot be lightly declared as unconstitutional

Reason: an act of the legislature represents the will of the people

Solution:

The correct option is A.
 a law is passed in houses by a majority and then signed by President cannot easily be declared wrong as people who are representative of common man made the law for benefits of citizens

QUESTION: 8

If a man undertake an act with risk voluntarily and is injured then he

Solution: He cannot take the plea of volenti non fit injuria because he undertook the Act voluntarily and this maxim Support only when the Act is done under some pressure or involuntarily
QUESTION: 9

Assertion: Law of torts is a developing subject

Reason: It has grown for centuries and is still growing

Solution:
QUESTION: 10

Assertion: when a vehicle is entrusted to a workshop for repairs it is reasonable to infer permission to take it for test doing as part of work

Reason: it is settled law that the burden is on the owner of the vehicle to prove that he did not authorize the person concerned to drive the vehicle

 

Solution:
QUESTION: 11

Principle: Right to carry on any occupation, trade or business is a fundamental right under India constitution. The state is under an obligation under the directive principles of the state policy to organize agriculture and animal husbandry on scientific lines and towards that goal take steps to prohibit cows slaughter

Facts : The state of uttranchal passed a legislation totally prohibiting cow slaughter. A, a butcher trading in meat of all animals including cows, challenged this legislation as violating his fundamental right to carry on his business. Decide the case

Solution:
QUESTION: 12

Principle: Any agreement which is impossible to perform becomes invalid

Facts: A, a cement dealer entered into an agreement with B to supply 1000 bags of cement for the latter’s building. By the time A supplied 500 bags of cement, the government issued an order restricting the free sale of cement. Thereafter every dealer was supposed to get his supply from the government. As a result, A found it difficult to meet his commitment to B. B brings a suit for breach of contract against A

Solution:
QUESTION: 13

An advertisement is inserted to inform the public that certain goods will be sold by auction on a certain day at a certain place and time

Solution:

The correct option is C.
Announcement a notice or announcement in a public medium promoting a product, service, or event or publicizing a job vacancy.

QUESTION: 14

An invitation to tender is

Solution:
QUESTION: 15

In case of a binding contract the proposer and the acceptor

Solution:
QUESTION: 16

Where no mode of acceptance is prescribed, acceptance

Solution:
QUESTION: 17

A makes a proposal to B who communicates his acceptance by registered post. Later B has second thought and send a telegram revoking his acceptance. Both the registered letter and the telegram are delivered to A at the same time. In the circumstances

Solution:
QUESTION: 18

A is found guilty of attempt to murder in furtherance of common intention. Under which one of the following situations can his offence be proved?

Solution:
QUESTION: 19

A has knocked down two teeth of B. A has committed the offence of

Solution:

The correct option is A.
 According to Section 319 of the Code, whoever causes bodily pain, disease or infirmity to any person is said to cause hurt. ... Hurt is punishable when it is accompanied with other offences, such as voluntarily causing hurt etc, whereas grievous hurt itself is a punishable offence.

QUESTION: 20

Use of violence by a member of an assembly of five or more persons in furtherance of common object will constitute:

Solution:

The correct option is D.
An unlawful assembly occurs when two or more people assemble together to commit a crime.

QUESTION: 21

A sees B drowning, but does not save him. B is drowned. A has committed:

Solution:
QUESTION: 22

Assertion: An owner can take his chattels from the other, even if force is required to be used

Reason: A person has a right of private defence of property

Solution:
QUESTION: 23

X with a view to murdering Y enters Y bedroom at night when Y is out of station. X is guilty of:

Solution:
QUESTION: 24

Assertion: Crime is punishable because it is provided in the law

Reason: crime is revolting to the moral sense of society

Solution:
QUESTION: 25

Assertion: A, a boy of the age of six and a half years intentionally murdered B. A is not liable to be convicted

Reason: A child up to the age of 7 years is immune from criminal liability

Solution:
QUESTION: 26

Assertion: A person is not guilty of Dacoity unless he has committed, attempted to commit or aided in committing robbery

Reason: when two persons conjointly commit robbery, then every person so committing robbery is said to commit Dacoity

Solution:
QUESTION: 27

Assertion: There is either theft or extortion in robbery

Reason: Theft or extortion precedes robbery

Solution:
QUESTION: 28

Culpable homicide is not murder if it is committed

Solution:

Culpable homicide is not murder if it is committed without premeditation in a sudden fight in the heat of passion upon a sudden quarrel and without the offender's having taken undue advantage or acted in a cruel or unusual manner.

QUESTION: 29

X having sufficient food does not provide some food to a beggar who dies of hunger. X is guilty of

Solution:
QUESTION: 30

Criminal conspiracy is an agreement b/w two or more persons to

Solution:
QUESTION: 31

A instigates his 6 year old daughter B to take away from C, a purse containing Rs. 10000. In this case which one of the following statement is correct?

Solution:
QUESTION: 32

Assertion: one of the most difficult tasks in attempt cases has been to find out the dividing line b/w preparation and attempt

Reason: shooting at the shadow sufficiently near a person as to put him in danger is attempt to commit murder

Solution:
QUESTION: 33

Assertion: Marriage brokerage contract is valid

Reason: Marriage brokerage contract is opposed to public policy

Solution:
QUESTION: 34

Acceptance sent through post

Solution:
QUESTION: 35

Assertion: A party to the contract can excuse himself from performing his part of contract on the ground that he is left with no money or property to pay

Reason: An agreement to do an impossible act in itself is void and both parties are discharged from future performances

Solution:

The correct option is D.
Once two persons signed a contract. They are bound to fulfill the requirements of the contracts, no matter if they have money or not. The can only end the contract if both the parties agree. Otherwise they are bound by law to perform the contract.

QUESTION: 36

When the damages cannot be assessed, the party may be awarded by the court

Solution:
QUESTION: 37

If a notice at the entrance of an automatic car parking is an offer, it can be accepted by

Solution:
QUESTION: 38

Assertion: An offer can be made by an act or omission of the offeree

Reason: The communication of a proposal is complete when it comes to the knowledge of the person to whom it is made

Solution:
QUESTION: 39

Which schedule of our constitution deals with the languages approved by the constitution?

Solution:
QUESTION: 40

Who is the Ex-officio chairman of Rajya Sabha?

Solution:
QUESTION: 41

For what period can the Vice President hold the office of the President in the event of the death of the President?

Solution:
QUESTION: 42

Which of the following does not constitute the Electoral College for electing the President of India?

Solution:
QUESTION: 43

Which of the following is not a Fundamental right?

Solution:
QUESTION: 44

Right to work in India is a

Solution:
QUESTION: 45

Respect for the National flag and national anthem is:

Solution:
QUESTION: 46

Consider the following statements:

An accused person can be compelled to:

  1. Give his finger prints
  2. Give evidence against himself
  3. Participate in the identification parade
Solution:
QUESTION: 47

The term Equal pay for equal work is a

Solution:
QUESTION: 48

Andaman and Nicobar islands come under the jurisdiction of which of the following High Courts?

Solution:
QUESTION: 49

The first hour of every sitting of the parliament is known as………………..  

Solution:
QUESTION: 50

first speaker of the Lok Sabha was  

Solution:
QUESTION: 51

DIRECTIONS : Find the most appropriate choice to fill the blank in each case most meaningfully.

She held the umbrella  __________ both of us.

Solution:
QUESTION: 52

Directions: Find the most appropriate choice to fill the blank in each case most meaningfully.

Most of the carpets cost  __________ Re. 1000/- a piece.

Solution:
QUESTION: 53

DIRECTIONS: Find the most appropriate choice to fill the blank in each case most meaningfully.

I walked  __________ the bridge to meet her.

Solution:
QUESTION: 54

DIRECTIONS: Find the most appropriate choice to fill the blank in each case most meaningfully.

I slipped as I stepped __________ the platform.

Solution:
QUESTION: 55

DIRECTIONS : Find the most appropriate choice to fill the blank in each case most meaningfully.

I'll arrive sometime __________ 8 and 9 am.

Solution:
QUESTION: 56

DIRECTIONS : Find the most appropriate choice to fill the blank in each case most meaningfully.

The shops here are open __________  9 am until 5 pm.

Solution:
QUESTION: 57

DIRECTIONS : Find the most appropriate choice to fill the blank in each case most meaningfully.

They should be ready to go __________ 20 minutes.

Solution:
QUESTION: 58

DIRECTIONS : Find the most appropriate choice to fill the blank in each case most meaningfully.

She wants to stay __________ home tonight.

Solution:
QUESTION: 59

DIRECTIONS: Find the most appropriate choice to fill the blank in each case most meaningfully

You must have this report finished __________ Monday.

Solution:
QUESTION: 60

DIRECTIONS : Find the most appropriate choice to fill the blank in each case most meaningfully

I haven't had a call from him __________ last Wednesday.

Solution:
QUESTION: 61

Read the passage carefully and answer the questions given below it.

The internet has become an integral part of today’s generation of people; from communicating through instant messages and emails to banking, travelling, studying and shopping, internet has touched every aspect of life. With the growing use of the internet by people, protecting important information has become a necessity.  A computer that is not having appropriate security controls can be infected with malicious logic and thus any type of information can be accessed in moments. Number of infected Web Pages and malicious websites can be seen every day that infects the computer and allow hackers to gain illegal access to other computer systems.

Hacking of important data, network outages, computer viruses and other cyber related threats affect our lives that range from minor inconvenience to serious incidents. Cyber threats can be caused due to negligence and vulnerabilities, or unintentional accidents. The main objectives of such type of system attackers or hackers are to steal confidential information, to make illegal monetary transactions, to destroy or to change data and the like. System attackers can be terrorists, crackers or recreational hackers. They have a variety of tools that can harm or infect the computer; usually they use malicious logic or virus to gain unauthorized access to a computer. Opening email attachments that carry the virus, clicking malicious links or websites or unintentionally downloading a dangerous program are common ways through which a computer can be infected and data can be stolen.

As the number of data networks, digital applications, as well as internet and mobile users are growing, so do the chances of cyber exploitation and cyber crimes. Even a small mistake in securing data or bad social networking can prove to be extremely dangerous. If accounts are not properly secured, it makes easier for hackers or unauthorized users to spread viruses or social engineered attacks that are designed to steal data and even money. Such types of issues highlight the need for cyber security as an essential approach in protecting and preventing data from being used inappropriately.

In simple language, Cyber Security or Information technology security means protecting data, networks, programs and other information from unauthorized or unintended access, destruction or change. It encompasses all the mechanisms and processes that protect digital equipment, information and records from illegal or unintended access, manipulation or destruction.

In today’s dynamic environment, cyber security has become vital for individuals and families, as well as organizations (such as military, government, business houses, educational and financial institutions, corporations and others) that collect and store a wide range of confidential data on computers and transmit that to other computers across different networks. For families, protection of children and family members from cyber crime has become substantially important. For an individual, protecting information that could impact social life as well as personal finance is essential. The internet has provided a wide array of learning opportunities, but there are risks too. Photos, videos and other personal information shared by an individual on social networking sites such as Facebook, Twitter can be inappropriately used by others may lead to serious and even life-threatening incidents. Social networking sites have become the most popular medium for sharing information and connecting with other people. But these sites have created varied opportunities for cybercrimes, compromised personal identities and information leakage. Therefore, it is important for individuals to understand how to protect against cyber threats, and must also comprehend the difference between virtual and real world. One should learn how to protect computers and personal information from being hacked and should engage in appropriate online behaviour in order to eliminate changes of cyber threats and thereby creating a safer online environment.

Question: According to the author, what does cyber security mean?

Solution:
QUESTION: 62

Read the passage carefully and answer the questions given below it.

The internet has become an integral part of today’s generation of people; from communicating through instant messages and emails to banking, travelling, studying and shopping, internet has touched every aspect of life. With the growing use of the internet by people, protecting important information has become a necessity.  A computer that is not having appropriate security controls can be infected with malicious logic and thus any type of information can be accessed in moments. Number of infected Web Pages and malicious websites can be seen every day that infects the computer and allow hackers to gain illegal access to other computer systems.

Hacking of important data, network outages, computer viruses and other cyber related threats affect our lives that range from minor inconvenience to serious incidents. Cyber threats can be caused due to negligence and vulnerabilities, or unintentional accidents. The main objectives of such type of system attackers or hackers are to steal confidential information, to make illegal monetary transactions, to destroy or to change data and the like. System attackers can be terrorists, crackers or recreational hackers. They have a variety of tools that can harm or infect the computer; usually they use malicious logic or virus to gain unauthorized access to a computer. Opening email attachments that carry the virus, clicking malicious links or websites or unintentionally downloading a dangerous program are common ways through which a computer can be infected and data can be stolen.

As the number of data networks, digital applications, as well as internet and mobile users are growing, so do the chances of cyber exploitation and cyber crimes. Even a small mistake in securing data or bad social networking can prove to be extremely dangerous. If accounts are not properly secured, it makes easier for hackers or unauthorized users to spread viruses or social engineered attacks that are designed to steal data and even money. Such types of issues highlight the need for cyber security as an essential approach in protecting and preventing data from being used inappropriately.

In simple language, Cyber Security or Information technology security means protecting data, networks, programs and other information from unauthorized or unintended access, destruction or change. It encompasses all the mechanisms and processes that protect digital equipment, information and records from illegal or unintended access, manipulation or destruction.

In today’s dynamic environment, cyber security has become vital for individuals and families, as well as organizations (such as military, government, business houses, educational and financial institutions, corporations and others) that collect and store a wide range of confidential data on computers and transmit that to other computers across different networks. For families, protection of children and family members from cyber crime has become substantially important. For an individual, protecting information that could impact social life as well as personal finance is essential. The internet has provided a wide array of learning opportunities, but there are risks too. Photos, videos and other personal information shared by an individual on social networking sites such as Facebook, Twitter can be inappropriately used by others may lead to serious and even life-threatening incidents. Social networking sites have become the most popular medium for sharing information and connecting with other people. But these sites have created varied opportunities for cybercrimes, compromised personal identities and information leakage. Therefore, it is important for individuals to understand how to protect against cyber threats, and must also comprehend the difference between virtual and real world. One should learn how to protect computers and personal information from being hacked and should engage in appropriate online behaviour in order to eliminate changes of cyber threats and thereby creating a safer online environment.

Question:According to the author, what is the main reason behind cyber threats?

Solution:
QUESTION: 63

Read the passage carefully and answer the questions given below it.

The internet has become an integral part of today’s generation of people; from communicating through instant messages and emails to banking, travelling, studying and shopping, internet has touched every aspect of life. With the growing use of the internet by people, protecting important information has become a necessity.  A computer that is not having appropriate security controls can be infected with malicious logic and thus any type of information can be accessed in moments. Number of infected Web Pages and malicious websites can be seen every day that infects the computer and allow hackers to gain illegal access to other computer systems.

Hacking of important data, network outages, computer viruses and other cyber related threats affect our lives that range from minor inconvenience to serious incidents. Cyber threats can be caused due to negligence and vulnerabilities, or unintentional accidents. The main objectives of such type of system attackers or hackers are to steal confidential information, to make illegal monetary transactions, to destroy or to change data and the like. System attackers can be terrorists, crackers or recreational hackers. They have a variety of tools that can harm or infect the computer; usually they use malicious logic or virus to gain unauthorized access to a computer. Opening email attachments that carry the virus, clicking malicious links or websites or unintentionally downloading a dangerous program are common ways through which a computer can be infected and data can be stolen.

As the number of data networks, digital applications, as well as internet and mobile users are growing, so do the chances of cyber exploitation and cyber crimes. Even a small mistake in securing data or bad social networking can prove to be extremely dangerous. If accounts are not properly secured, it makes easier for hackers or unauthorized users to spread viruses or social engineered attacks that are designed to steal data and even money. Such types of issues highlight the need for cyber security as an essential approach in protecting and preventing data from being used inappropriately.

In simple language, Cyber Security or Information technology security means protecting data, networks, programs and other information from unauthorized or unintended access, destruction or change. It encompasses all the mechanisms and processes that protect digital equipment, information and records from illegal or unintended access, manipulation or destruction.

In today’s dynamic environment, cyber security has become vital for individuals and families, as well as organizations (such as military, government, business houses, educational and financial institutions, corporations and others) that collect and store a wide range of confidential data on computers and transmit that to other computers across different networks. For families, protection of children and family members from cyber crime has become substantially important. For an individual, protecting information that could impact social life as well as personal finance is essential. The internet has provided a wide array of learning opportunities, but there are risks too. Photos, videos and other personal information shared by an individual on social networking sites such as Facebook, Twitter can be inappropriately used by others may lead to serious and even life-threatening incidents. Social networking sites have become the most popular medium for sharing information and connecting with other people. But these sites have created varied opportunities for cybercrimes, compromised personal identities and information leakage. Therefore, it is important for individuals to understand how to protect against cyber threats, and must also comprehend the difference between virtual and real world. One should learn how to protect computers and personal information from being hacked and should engage in appropriate online behaviour in order to eliminate changes of cyber threats and thereby creating a safer online environment.

Question: What is the downside of social media, according to the author?

Solution:
QUESTION: 64

Read the passage carefully and answer the questions given below it.

The internet has become an integral part of today’s generation of people; from communicating through instant messages and emails to banking, travelling, studying and shopping, internet has touched every aspect of life. With the growing use of the internet by people, protecting important information has become a necessity.  A computer that is not having appropriate security controls can be infected with malicious logic and thus any type of information can be accessed in moments. Number of infected Web Pages and malicious websites can be seen every day that infects the computer and allow hackers to gain illegal access to other computer systems.

Hacking of important data, network outages, computer viruses and other cyber related threats affect our lives that range from minor inconvenience to serious incidents. Cyber threats can be caused due to negligence and vulnerabilities, or unintentional accidents. The main objectives of such type of system attackers or hackers are to steal confidential information, to make illegal monetary transactions, to destroy or to change data and the like. System attackers can be terrorists, crackers or recreational hackers. They have a variety of tools that can harm or infect the computer; usually they use malicious logic or virus to gain unauthorized access to a computer. Opening email attachments that carry the virus, clicking malicious links or websites or unintentionally downloading a dangerous program are common ways through which a computer can be infected and data can be stolen.

As the number of data networks, digital applications, as well as internet and mobile users are growing, so do the chances of cyber exploitation and cyber crimes. Even a small mistake in securing data or bad social networking can prove to be extremely dangerous. If accounts are not properly secured, it makes easier for hackers or unauthorized users to spread viruses or social engineered attacks that are designed to steal data and even money. Such types of issues highlight the need for cyber security as an essential approach in protecting and preventing data from being used inappropriately.

In simple language, Cyber Security or Information technology security means protecting data, networks, programs and other information from unauthorized or unintended access, destruction or change. It encompasses all the mechanisms and processes that protect digital equipment, information and records from illegal or unintended access, manipulation or destruction.

In today’s dynamic environment, cyber security has become vital for individuals and families, as well as organizations (such as military, government, business houses, educational and financial institutions, corporations and others) that collect and store a wide range of confidential data on computers and transmit that to other computers across different networks. For families, protection of children and family members from cyber crime has become substantially important. For an individual, protecting information that could impact social life as well as personal finance is essential. The internet has provided a wide array of learning opportunities, but there are risks too. Photos, videos and other personal information shared by an individual on social networking sites such as Facebook, Twitter can be inappropriately used by others may lead to serious and even life-threatening incidents. Social networking sites have become the most popular medium for sharing information and connecting with other people. But these sites have created varied opportunities for cybercrimes, compromised personal identities and information leakage. Therefore, it is important for individuals to understand how to protect against cyber threats, and must also comprehend the difference between virtual and real world. One should learn how to protect computers and personal information from being hacked and should engage in appropriate online behaviour in order to eliminate changes of cyber threats and thereby creating a safer online environment.

Question: According to the passage, how does a virus get into a computer?

Solution:
QUESTION: 65

Read the passage carefully and answer the questions given below it.

The internet has become an integral part of today’s generation of people; from communicating through instant messages and emails to banking, travelling, studying and shopping, internet has touched every aspect of life. With the growing use of the internet by people, protecting important information has become a necessity.  A computer that is not having appropriate security controls can be infected with malicious logic and thus any type of information can be accessed in moments. Number of infected Web Pages and malicious websites can be seen every day that infects the computer and allow hackers to gain illegal access to other computer systems.

Hacking of important data, network outages, computer viruses and other cyber related threats affect our lives that range from minor inconvenience to serious incidents. Cyber threats can be caused due to negligence and vulnerabilities, or unintentional accidents. The main objectives of such type of system attackers or hackers are to steal confidential information, to make illegal monetary transactions, to destroy or to change data and the like. System attackers can be terrorists, crackers or recreational hackers. They have a variety of tools that can harm or infect the computer; usually they use malicious logic or virus to gain unauthorized access to a computer. Opening email attachments that carry the virus, clicking malicious links or websites or unintentionally downloading a dangerous program are common ways through which a computer can be infected and data can be stolen.

As the number of data networks, digital applications, as well as internet and mobile users are growing, so do the chances of cyber exploitation and cyber crimes. Even a small mistake in securing data or bad social networking can prove to be extremely dangerous. If accounts are not properly secured, it makes easier for hackers or unauthorized users to spread viruses or social engineered attacks that are designed to steal data and even money. Such types of issues highlight the need for cyber security as an essential approach in protecting and preventing data from being used inappropriately.

In simple language, Cyber Security or Information technology security means protecting data, networks, programs and other information from unauthorized or unintended access, destruction or change. It encompasses all the mechanisms and processes that protect digital equipment, information and records from illegal or unintended access, manipulation or destruction.

In today’s dynamic environment, cyber security has become vital for individuals and families, as well as organizations (such as military, government, business houses, educational and financial institutions, corporations and others) that collect and store a wide range of confidential data on computers and transmit that to other computers across different networks. For families, protection of children and family members from cyber crime has become substantially important. For an individual, protecting information that could impact social life as well as personal finance is essential. The internet has provided a wide array of learning opportunities, but there are risks too. Photos, videos and other personal information shared by an individual on social networking sites such as Facebook, Twitter can be inappropriately used by others may lead to serious and even life-threatening incidents. Social networking sites have become the most popular medium for sharing information and connecting with other people. But these sites have created varied opportunities for cybercrimes, compromised personal identities and information leakage. Therefore, it is important for individuals to understand how to protect against cyber threats, and must also comprehend the difference between virtual and real world. One should learn how to protect computers and personal information from being hacked and should engage in appropriate online behaviour in order to eliminate changes of cyber threats and thereby creating a safer online environment.

Question:What will be most the apt title for this passage?

Solution:
QUESTION: 66

Pick the correct spellings out of the choices given in each case.

Solution:
QUESTION: 67

Pick the correct spellings out of the choices given in each case.

Solution:
QUESTION: 68

Pick the correct spellings out of the choices given in each case.

Solution:
QUESTION: 69

Pick the correct spellings out of the choices given in each case.

Solution:
QUESTION: 70

Pick the correct spellings out of the choices given in each case.

Solution:
QUESTION: 71

Pick the correct spellings out of the choices given in each case.

Solution:

C is the correct option. The correct spellings above all option is Rigorous 

QUESTION: 72

Pick the correct spellings out of the choices given in each case.

Solution:
QUESTION: 73

 Pick the correct spellings out of the choices given in each case.

Solution:

B  is the correct option. The correct spelling is Abrogation

QUESTION: 74

Pick the correct spellings out of the choices given in each case.

Solution:
QUESTION: 75

Pick the correct spellings out of the choices given in each case.

Solution:
QUESTION: 76

Pick the correct spellings out of the choices given in each case.

Solution:
QUESTION: 77

Pick the correct spellings out of the choices given in each case.

Solution:
QUESTION: 78

Read each sentence to find out whether there is any grammatical error in it. The error, if any will be in one part of the sentence. The letter of that part is the answer. (Ignore the errors of punctuation, if any).

Air-conditioning is potentially A/ a sign of civilization- of rising above B/ the biological, cultivating the ability to not react immediately C/to one’s physical surroundings. /D

Solution:

The correct option is C.
Curivating itself means trying to develop a quality. So the word ‘ability’ is not required.

QUESTION: 79

Read each sentence to find out whether there is any grammatical error in it. The error, if any will be in one part of the sentence. The letter of that part is the answer. (Ignore the errors of punctuation, if any).

The discovery of the Slims River A/, away from the Bering Sea another watershed B/, that empties from the Pacific Ocean C/, was published in a journal. /D

Solution:

From – into
Something can empty into something not from something
 

QUESTION: 80

Read each sentence to find out whether there is any grammatical error in it. The error, if any will be in one part of the sentence. The letter of that part is the answer. (Ignore the errors of punctuation, if any).

If farmers ready their fields by burning A/ stubble, the smoke clouds that B/ result travel far and C/ wide, by carrying in their wake severe air pollution. /D

Solution:
QUESTION: 81

Read each sentence to find out whether there is any grammatical error in it. The error, if any will be in one part of the sentence. The letter of that part is the answer. (Ignore the errors of punctuation, if any).

The moment we blame anybody, A/ we become victims, the sorrow B/ intensifies, and we refuse to C/ accept responsibility to our actions. /D

Solution:
QUESTION: 82

Read each sentence to find out whether there is any grammatical error in it. The error, if any will be in one part of the sentence. The letter of that part is the answer. (Ignore the errors of punctuation, if any).

We are creatures of habit, and A/ tend to stick to B/ the known and the familiar, C/ even if its not right fit for us. /D

Solution:
QUESTION: 83

Read each sentence to find out whether there is any grammatical error in it. The error, if any will be in one part of the sentence. The letter of that part is the answer. (Ignore the errors of punctuation, if any).

The thyroid gland near your throat A / produces hormones that activate cells B/ by controlling your body’s temperature but also C/ the rate that your body burns calories. /D

Solution:

The correct option is B.
‘but ‘ should be replaced with ‘and’
 

QUESTION: 84

Read each sentence to find out whether there is any grammatical error in it. The error, if any will be in one part of the sentence. The letter of that part is the answer. (Ignore the errors of punctuation, if any).

After offering her water, I A/ encouraged her to speak, though B/ I thought of it as a custodial C/ fight over children, a tragical common thing. /D

Solution:
QUESTION: 85

Read each sentence to find out whether there is any grammatical error in it. The error, if any will be in one part of the sentence. The letter of that part is the answer. (Ignore the errors of punctuation, if any).

Do you object A/ to me teaching B/ a topic C/ in the class. /D

Solution:
QUESTION: 86

Read each sentence to find out whether there is any grammatical error in it. The error, if any will be in one part of the sentence. The letter of that part is the answer. (Ignore the errors of punctuation, if any).

Prevailing cultural practices can be /A opposed to rational thinking, requiring B/oneself to meet subjective, /C region-specific demands. /D

Solution:

The correct option is C.
‘Subjective and region-specific demands’
Only two types of demands are mentioned  so ‘and’ should be used.

QUESTION: 87

Read each sentence to find out whether there is any grammatical error in it. The error, if any will be in one part of the sentence. The letter of that part is the answer. (Ignore the errors of punctuation, if any).

Another leader said that the idea was strongly A/ pushed by several leaders, B/ since they think it would give the party C/ the much-need visibility. / D

Solution:

The correct option is D.
 Replace ‘need’ with ‘needed’

QUESTION: 88

DIRECTIONS: Beneath each sentence you will find four ways of phrasing the underlined part. If you think the original version is the best, choose A as your answer; otherwise choose some other response. In choosing your answer, follow the requirements of standard written English.

A study showed that if calves associated with other calves, they will require less medication and gain weight quicker than do those raised in confinement.

Solution:
QUESTION: 89

DIRECTIONS : Beneath each sentence you will find four ways of phrasing the underlined part. If you think the original version is the best, choose A as your answer; otherwise choose some other response. In choosing your answer, follow the requirements of standard written English.

The elderly  are four times more likely to give regular financial aid to their children as to receive it from them.

Solution:
QUESTION: 90

DIRECTIONS: Beneath each sentence you will find four ways of phrasing the underlined part. If you think the original version is the best, choose A as your answer; otherwise choose some other response. In choosing your answer, follow the requirements of standard written English.

Whatever its merits, the proposal to tax all capital gains on short-term investments would have a disastrous effect on Dalal Street.

Solution:
QUESTION: 91

If 1 is added to the numerator of a certain fraction its value becomes ½ and if 1 is added to its denominator it becomes 1/3. Find the original fraction.

Solution:
QUESTION: 92

The L.C.M. of two numbers is 495 and their H.C.F. is 5. If the sum of the numbers is 100, then their difference is

Solution:
QUESTION: 93

Solution:
QUESTION: 94

123 typists typed 984 papers in 1/15 hour. The number of papers typed per minute by an average typist is:

Solution:

The correct option is B.
According to the conditions given, In 1/15 hours or 4 minutes( 1/15 *60), 123 typists type 984 papers. So, in 1 minute the number of papers typed = 8/4 = 2 papers typed 

QUESTION: 95

The ratio in which a milk solution of purity 80% is to be mixed with another milk solution of purity 60% to have a milk solution of purity 72% is         

Solution:
QUESTION: 96

In 10 years, A will be twice as old as B was 10 years ago. If A is now 9 years older than B, the present age of B is

Solution:

Te correct option is C.
Let the present age of B be x years. , 
Then, the present age of A would be (x+9) years.
After 10 years, the age of A would be (x+9+10)=(x+19) years and before then years, the age of B was (x−10) years. 
Now, from the information given in the question, 
(x+19)=2(x−10)
or x+19=2x−20 or x=19+20=39 years

QUESTION: 97

If A : B = 2 : 3, B : C = 4 : 5 and C : D = 6 : 7, then A : D is

Solution:
QUESTION: 98

Kanti started a business investing Rs. 9000. Five months later Sudhakar joined him by investing Rs. 8000. If they make a profit of Rs. 6970 at the end of year, Sudhakar’s share of profit is?

Solution:

The correct option is C.
Ratio= 9000×12: 8000×7
= 27x : 14x
Sudhakar profit = 6970×14/41 = 2380
 

QUESTION: 99

A number when decreased by 27 ½% gives 87. The number is:

Solution:

The correct option is C.
100 -27.5 =72.5 %
72.5 % of X = 87
(72.5/100)*X = 87 
72.5X = 87*100
X = 87,00/72.5
= 120

QUESTION: 100

What is the cost price of an article that is sold at a loss of 25% for Rs. 150?

Solution:
QUESTION: 101

If the rate of simple interest is 12% per annum, the amount that would fetch interest of Rs. 6000 per annum is:

Solution:
QUESTION: 102

A and B are two towns. Faruqui covers the distance from A to B on cycle at 16 km/hr. However, he covers the distance from B to A on foot at 9 km/hr. His average speed during the whole journey is

Solution:

The correct option is C.
Average Speed = Total distance / time
= 2d / [( d / 16) + ( d / 9)]
= ( 2 x 16 x 9 ) / ( 16 + 9 ).
= 11.52 km/hr.

QUESTION: 103

A train 280 m long is moving at speed of 60 km/hr. The time taken by the train to cross a platform 220 m long is

Solution:

The correct option is C.
Total distance = length of train + length of platform
d = 280 m + 220 m = 500 m
Speed, s = 60 km/h = 60*5/18 m/s = 50/3 m/s
Time, t = d/s = 30 s

QUESTION: 104

If a man rows at 5 km/hr in still water and 3.5 km/hr against the current, his rate along the current is

Solution:

The correct option is B.
Speed of current = 5 - 3.5 = 1.5 km/hr
Man's speed along the current = Man speed in still water + speed of current.
⇒ Man's speed along the current = 5 + 1.5 = 6.5 km/hr

QUESTION: 105

A and B can do a piece of work in 12 days; B and C in 15 days; C and A in 20 days. A alone can do the work in

Solution:

The correct option is C.
LCM(12,15,20)=60

Now this 60 units can be treated as the total work and we will now calculate the one day work

One day work of A and B = 60/12 = 5 units

One day work of B and C = 60/15 = 4 units

One day work of C and A = 60/20= 3 units

Now if we add all three we get:-

2(A+B+C)=12 units

So one day work of A, B and C put together is 12/2 = 6 units

To find one day work of A:-

One day work of A, B and C together minus one day work of B and C, that is 6–4=2 units

If the total work is of 60 units and the one day work of A is 2 units, then alone A needs 60/2 = 30 days to finish the work.
 

QUESTION: 106

If the rent for grazing 40 cows for 20 days is Rs. 370, how many cows can graze for 30 days on Rs. 111?

Solution:

The correct option is B
Explanation
370/40 = 9.25 (rent for grazing 1 cow for 20 days) 
9.25/20 = 0.4625 (rent for grazing 1 cow for 1 day) 


0.4625*30 = 13.875 (rent for grazing a cow for 30 days) 

111/13.875 = 8 cows
 

QUESTION: 107

Two taps A and B can fill a tank in 5 hours and 20 hours respectively. If both the taps are open then due to a leakage, it took 30 minutes more to fill the tank. If the tank is full, how long will it take for the leakage alone to empty the tank?

Solution:
QUESTION: 108

Two pipes A and B together can fill a cistern in 4 hours. Had they been opened separately, then B would have taken 6 hours more than A to fill the cistern. How much time will be taken by A to fill the cistern separately?

Solution:

The correct option is C.
Let A take x hrs to fill the cistern separately then B will take (x+6) hrs.
In x hrs, A fills the cistern
in 1 hr, A fills (1/x)
Similarly , B fills 1/(x+6)
Both together takes 4 hrs to fill the cistern completely.
Therefore, 1/x + 1/x+6 = 1/4
(2x+6) / (x2+6x) = 1/4
4(2x+6) = x2+6x
8x+24 = x2+6x
x2 - 2x - 24 = 0
x(x-6) + 4(x-6) = 0
(x-6) + (x+4) = 0
x=6 (because x cannot be equal to -4)
Thus, A takes 6hrs.
 

QUESTION: 109

A card is drawn from a pack of 52 cards.  What is the probability that it is a jack of black suit?           

Solution:
QUESTION: 110

A card is drawn from a pack of 52 cards.  What is the probability that is king or queen?           

Solution:
QUESTION: 111

In each of the following questions a statement is followed by two courses of action.

Statement: Cost of paper has been increasing at a very high rate. Printing charges, railway freight and other charges are also higher.

Courses of action:

I. Government should give adequate subsidies so that publishing houses do not increase the prices of newspapers and magazines.

II. Publishing houses should increase the prices so that they could run their newspapers and magazines.

Solution:

The correct option is D.
Both the course of actions are correct in their own aspect.

QUESTION: 112

In each of the following questions a statement is followed by two courses of action.

Statement: Cases of road accidents are increasing constantly, particularly in the urban areas.

Courses of action:

I. Transport authorities in the urban areas should impose stringent norms for maintenance of vehicles.

II. Traffic police should severely punish those found to be violating traffic rules. 

Solution:
QUESTION: 113

In each of the following questions a statement is followed by two courses of action.

Statement: Despite good economic progress of the country, significant number of undernourished children has been observed in the rural parts of the country.

Courses of action:

I. Govt should increase Wealth Tax/Income Tax and use that money for upliftment of the deprived class.

II. Govt should introduce schemes like free meals in primary schools and make primary education compulsory.

Solution:
QUESTION: 114

Directions: In each question below is given a statement followed by two assumptions I & II. An assumption is something supposed or taken for granted. You have to consider the statement and the assumptions and decide which of the assumptions is implicit in the statement. Give answer

Statement: The school authority has decided to increase the number of students in each classroom from twenty to thirty from the next academic session to bridge the gap between income and expenditure to a larger extent.

Assumptions:

I. The income generated by way of fees of the additional students will be sufficient enough to bridge the gap.

II. The school will get all the additional students in each class from the next academic session.

Solution:
QUESTION: 115

Directions: In each question below is given a statement followed by two assumptions I & II. An assumption is something supposed or taken for granted. You have to consider the statement and the assumptions and decide which of the assumptions is implicit in the statement. Give answer

Statement: To push for their demand for the constitution of the Sixth Pay Commission, the Central Government employees across the country have threatened to go on indefinite strike from March 1.

Assumptions:

I. Strike is the only way to put pressure on the government for settlement of demands.

II. The government may grant the basic demands of the employees if they go on strike.

III. The basic demand for the immediate setting up of Sixth Pay Commission may grant interim relief to employees.

Solution:
QUESTION: 116

In a certain code, REVERSE is written as SFWFSTF

How is FORWARD written in that code?           

Solution:
QUESTION: 117

In a certain code, ‘BOYS’ is written as ‘SBYO’ and ‘PAPERS’ is written as ‘SPRAEP’. How is ‘MEDICINE’ written in that code?    

Solution:
QUESTION: 118

If DIFFICULT is coded as E J G G J D V M U and LOCOMETIVE is coded as M P D P N P U J W F, what will be the codes for the following:

     i) LUCKNOW                ii) PATNA

Solution:
QUESTION: 119

AZ, CX, EV, ?    

Solution:
QUESTION: 120

HKN, QTW, ZCF, ?      

Solution:
QUESTION: 121

PALE : LEAP :: POSH : ?    

Solution:
QUESTION: 122

CIRCLE is related to RICELC in the same way as SQUARE is related to …?    

Solution:
QUESTION: 123

Three of the following four are alike in a certain way and so form a group. Which is the one that does not belong to that group?

Solution:

The correct option is C.
9+3+2=14
1+3+4+4=12
8+3+0=11
1+0+5+4=10
=>14,12,10 r even no.
=>11 is an odd no.
so,8:30 doesn't belong to this group
 

QUESTION: 124

Three of the following four are alike in a certain way and so form a group. Which is the one that does not belong to that group?

Solution:

The correct option is C.

Twice of first no. + half of the first no. = second no.

(16*2) + (16/2) = 32+8 = 40

(18*2) + (18/2) = 36+9 = 45

(14*2) + (14/2) = 28+7 = 35 does not follow the pattern

(8*2) + (8/2) = 16+4 = 20

QUESTION: 125

Deepak starts walking straight towards east. After walking 75 metres, he turns to the left and walks 25 metres straight. Again he turns to the left, walks a distance of 40 metres straight, again he turns to the left and walks a distance of 25 metres. How far is he from the starting point?

Solution:
QUESTION: 126

Rohan walks a distance of 3 km towards North, then turns to his left and walks for 2 km. He again turns left and walks for 3 km. At this point he turns to his left and walks for 3 km. How many kilometres is he from the starting point?

Solution:

Draw a figure.
Rohan walks a distance of 3 km towards North.
Then turns to his left and walks for 2 km.
He again turns left and walks for 3 km.
At this point he turns to his left and walks for 3 km.

QUESTION: 127

Pointing to a woman in a photograph a man says, “She is the only daughter of my father’s only daughter-in-law.” How is the woman related to the man?

Solution:
QUESTION: 128

Pointing to a man in a photograph a woman says, “He is the father of my only daughter-in-law’s father in law “. How is the man related to the woman?

Solution:
QUESTION: 129

Read the following information carefully and answer the questions given below:-

Six persons, P, Q, R, S, T and U are sitting in a circle facing one another front to front. P is sitting in front of Q. Q is sitting to the right of T and left of R. P is to the left of U and right of S.

Question: Who is sitting opposite to R?            

Solution:
QUESTION: 130

Read the following information carefully and answer the questions given below:-

Six persons, P, Q, R, S, T and U are sitting in a circle facing one another front to front. P is sitting in front of Q. Q is sitting to the right of T and left of R. P is to the left of U and right of S.

Question: Who is sitting opposite to S?            

Solution:
QUESTION: 131

Read the following information carefully and answer the questions given below:-

Six persons, P, Q, R, S, T and U are sitting in a circle facing one another front to front. P is sitting in front of Q. Q is sitting to the right of T and left of R. P is to the left of U and right of S.

Who is sitting between P and R?

Solution:
QUESTION: 132

Read the following information carefully and answer the questions given below:-

Six persons, P, Q, R, S, T and U are sitting in a circle facing one another front to front. P is sitting in front of Q. Q is sitting to the right of T and left of R. P is to the left of U and right of S.

Question: If the positions of P and R are changed, who will be sitting between S and U?

Solution:
QUESTION: 133

In a queue of thirty boys, M is eighth from the end and J is twelfth from the front. If there are six boys between J and Q, how many boys are there between M and Q?

Solution:

The correct option ia D,
The formula to be used is
Total no. of boys = boys ahead of person on the front + boys behind the person on the back + boys between the two.
But in the question the position of Q is not clarified with respect to J so data is not adequate.

QUESTION: 134

In a queue of 20 boys, D is fourteenth from the front and F is ninth from the bottom. How many boys are there between D and F?

Solution:
QUESTION: 135

Read the information given below and answer the questions that follow:

Six families Sharma, Dubey, Joshi, Verma, Agarwal and Mishra plan go to six different hill-stations – Mahabaleshwar, Kullu, Mussourie, Kodaikanal, Shimla and Nainital. They wish to go in 6 different months – Jan., Feb., Mar., Apr., May and June. Two of them want to travel by bus and two by rail and others by car and flight. Following information given:

(i)      Mr. Agarwal goes to Mahabaleshwar but not by air or bus.

(ii)     Mr. Sharma prefers bus journey but doesn’t travel in Feb. or May.

(iii)    Neither Mishra nor Dubey family go to Shimla or Mussourie.

(iv)     Kodaikanal was visited in April.

(v)      Families going to Kullu and Shimla go by bus and car respectively.

(vi)     Mr. Joshi goes to Nainital in Mar by air and Mishra does not travel in April.

Question: Who of the following visit Shimla?

Solution:
QUESTION: 136

Read the information given below and answer the questions that follow:

Six families Sharma, Dubey, Joshi, Verma, Agarwal and Mishra plan go to six different hill-stations – Mahabaleshwar, Kullu, Mussourie, Kodaikanal, Shimla and Nainital. They wish to go in 6 different months – Jan., Feb., Mar., Apr., May and June. Two of them want to travel by bus and two by rail and others by car and flight. Following information given:

(i)      Mr. Agarwal goes to Mahabaleshwar but not by air or bus.

(ii)     Mr. Sharma prefers bus journey but doesn’t travel in Feb. or May.

(iii)    Neither Mishra nor Dubey family go to Shimla or Mussourie.

(iv)     Kodaikanal was visited in April.

(v)      Families going to Kullu and Shimla go by bus and car respectively.

(vi)     Mr. Joshi goes to Nainital in Mar by air and Mishra does not travel in April.

Question: Kodaikanal was visited by

Solution:
QUESTION: 137

Read the information given below and answer the questions that follow:

Six families Sharma, Dubey, Joshi, Verma, Agarwal and Mishra plan go to six different hill-stations – Mahabaleshwar, Kullu, Mussourie, Kodaikanal, Shimla and Nainital. They wish to go in 6 different months – Jan., Feb., Mar., Apr., May and June. Two of them want to travel by bus and two by rail and others by car and flight. Following information given:

(i)      Mr. Agarwal goes to Mahabaleshwar but not by air or bus.

(ii)     Mr. Sharma prefers bus journey but doesn’t travel in Feb. or May.

(iii)    Neither Mishra nor Dubey family go to Shimla or Mussourie.

(iv)     Kodaikanal was visited in April.

(v)      Families going to Kullu and Shimla go by bus and car respectively.

(vi)     Mr. Joshi goes to Nainital in Mar by air and Mishra does not travel in April.

Question: Mr. Verma visited

Solution:
QUESTION: 138

Read the information given below and answer the questions that follow:

Six families Sharma, Dubey, Joshi, Verma, Agarwal and Mishra plan go to six different hill-stations – Mahabaleshwar, Kullu, Mussourie, Kodaikanal, Shimla and Nainital. They wish to go in 6 different months – Jan., Feb., Mar., Apr., May and June. Two of them want to travel by bus and two by rail and others by car and flight. Following information given:

(i)      Mr. Agarwal goes to Mahabaleshwar but not by air or bus.

(ii)     Mr. Sharma prefers bus journey but doesn’t travel in Feb. or May.

(iii)    Neither Mishra nor Dubey family go to Shimla or Mussourie.

(iv)     Kodaikanal was visited in April.

(v)      Families going to Kullu and Shimla go by bus and car respectively.

(vi)     Mr. Joshi goes to Nainital in Mar by air and Mishra does not travel in April.

Question: If Mr. Agarwal travelled in June, Mr. Sharma must have travelled in

Solution:

The correct option isA.


Name         Hillstation      Month      By

Sharma     mussoorie         jan          bus
Dubey       koidkanal          march      train
Joshi         nainital              march      air  
Verma       shimla               july/may   car
Aggarwal   mahabaleshwar june        train
Mishra       kullu                  july/may   bus
 

QUESTION: 139

Read the information given below and answer the questions that follow:

Six families Sharma, Dubey, Joshi, Verma, Agarwal and Mishra plan go to six different hill-stations – Mahabaleshwar, Kullu, Mussourie, Kodaikanal, Shimla and Nainital. They wish to go in 6 different months – Jan., Feb., Mar., Apr., May and June. Two of them want to travel by bus and two by rail and others by car and flight. Following information given:

(i)      Mr. Agarwal goes to Mahabaleshwar but not by air or bus.

(ii)     Mr. Sharma prefers bus journey but doesn’t travel in Feb. or May.

(iii)    Neither Mishra nor Dubey family go to Shimla or Mussourie.

(iv)     Kodaikanal was visited in April.

(v)      Families going to Kullu and Shimla go by bus and car respectively.

(vi)     Mr. Joshi goes to Nainital in Mar by air and Mishra does not travel in April.

Question: Mr. Sharma visited

Solution:
QUESTION: 140

If the seventh day of a month is three days earlier than Friday, what day will it be on the nineteenth day of the month?

Solution:
QUESTION: 141

If the day before yesterday was Saturday, What day will fall on the day after tomorrow?

Solution:
QUESTION: 142

Statements:

All leaves are inks

No ink is brush.

All cakes are brushes.

Conclusions:

I. Some cakes are leaves.                            

II. Some inks are cakes.

III. Some inks are leaves.                                       

IV. Some cakes are brushes.

Solution:
QUESTION: 143

Statements:

Some trees are lions.

Some lions are cows.

All cows are bats.

Conclusions:

I. Some bats are trees.                                           

II. Some cows are trees.

III. No bat is tree.  

IV. No trees lions.         

Solution:

The correct option is D.

QUESTION: 144

Statements:

All rings are birds.

Some birds are cages.

All cages are kites.

Conclusions:

I. All kites are cages.                                             

II. Some kites are rings.

III. Some birds are kites.                                        

IV. All rings are kites.

Solution:
QUESTION: 145

Aruna cut a cake into two halves and cuts one half into smaller pieces of equal size. Each of the small pieces is twenty grams in weight. If she has seven pieces of the cake in all with her, how heavy was the original cake?

Solution:

The correct option is C.
If she has 7 pieces totally, it means that one of those pieces is the uncut half, and the other half is cut into 6 pieces. Each of those 6 pieces has a weight of 20 gm which totally weighs 6*20= 120gm. If one half is 120 gm, then so is the other. Therefore the total weight of the cake is 120*2= 240 gm

QUESTION: 146

A motorist knows four different routes from Bristol to Birmingham. From Birmingham to Sheffield he knows three different routes and from Sheffield to Carlisle he knows two different routes. How many routes does he know from Bristol to Carlisle?

Solution:

The correct option is D.
Total number of routes from Bristol to Carlisle =(4×3×2)=24.

QUESTION: 147

If you write down all the numbers from 1 to 100, then how many times do you write 3?

Solution:

The correct option is C.
There are in total 20 times the digit 3 in 1–100

QUESTION: 148

The minute hand of a clock overtakes the hour hand at intervals of 30 min of the correct time. How much a day does the clock gain or lose?

Solution:
QUESTION: 149

The minute hand of a clock overtakes the hour hand at intervals of 70 min of the correct time. How much in a day does the clock gain or lose?

Solution:

The correct option is B.
In a correct clock, the minute hand gains 55 min spaces over the hour hand in 60 minutes.
To be together again, the minute hand must gain 60 minutes over the hour hand.
55 min. are gained in 60 min.
60 min are gained in (60/55) x 60 min = 720/11 min.
But, they are together after 70 min.
Loss in 70 min = 70 - (720/11) = 50/11min.
Loss in 24 hours =(50/11 * (60*24)/70)min = 7200/77 min
 

QUESTION: 150

CFED is related to PSQR in the same way as JMKL is related to …?    

Solution:

Similar Content

Related tests