# NTA-NET (Based on NTA-UGC) Paper-I: Questions 2975 - 2978 of 3424

Access detailed explanations (illustrated with images and videos) to 3424 questions. Access all new questions we will add tracking exam-pattern and syllabus changes. Subscription can be renewed yearly absolutely FREE! View Sample Explanation or View Features.

Rs. 650.00 or

How to register?

## Passage

Consider the following two tables (I and II) that show the percentage wise distribution of the number of laptops sold by a shopkeeper during a period of six months from April to September 2018 and the ratio between the number of laptop sold of brand HP (H) and brand DELL (D) during the same six months. A total of 45000 laptops have been sold during these six months. Study these tables I and II and answer the questions that follow

 I. Sale of laptops Month wise II. Laptops Brand Ratio Name of Month % of Laptops Name of Month Ratio April 17 H D May 22 April 8 7 June 25 May 4 5 July 8 June 3 2 August 12 July 7 5 September 16 August 7 8 September 7 9

## Question number: 2975 (4 of 5 Based on Passage) Show Passage

Edit

Appeared in Year: 2019

MCQ▾

### Question

What is the ratio of the number of laptops sold by Brand D during the month April to those sold during September of the same brand? (20 June Evening Shift)

### Choices

Choice (4) Response

a.

b.

c.

d.

## Question number: 2976 (5 of 5 Based on Passage) Show Passage

Edit

Appeared in Year: 2019

MCQ▾

### Question

If of the laptops sold by Brand H during August were sold at a discount, how many laptops of brand H during that month were sold without a discount? (20 June Evening Shift)

### Choices

Choice (4) Response

a.

882

b.

c.

885

d.

1638

## Question number: 2977

Edit

Appeared in Year: 2019

MCQ▾

### Question

One Terabyte of memory is equal to (24 June Evening Shift)

### Choices

Choice (4) Response

a.

b.

c.

1024×1024X1024Bytes

d.

## Question number: 2978

Edit

Appeared in Year: 2019

MCQ▾

### Question

What is spyware in respect of computer software? (21 June Morning Shift)

### Choices

Choice (4) Response

a.

Legitimate software that allows companies to monitor and supervise the computers of their employees from a central location

b.

Software used to disrupt computer operation or gain access to private computer system

c.

A computer programme hidden within another seemingly harmless program that produces copies of itself and insets them into another programs of files

d.

Software that aims to gather information about a person without his/her knowledge and that may send such information to another entity

Developed by: