Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

Company Name Starts with ...
#  A  B  C  D  E   F  G  H  I  J   K  L  M  N  O   P  Q  R  S  T   U  V  W  X  Y  Z

Unisys General Aptitude Interview Questions
Questions Answers Views Company eMail

Thirty men take 20 days to complete a job working 9 hours a day. How many hour a day should 40 men work to complete the job? (a) 8 hrs (b) 7 1/2 hrs (c) 7 hrs (d) 9 hrs

35 140559

Find (7x + 4y ) / (x-2y) if x/2y = 3/2 ? (a) 6 (b) 8 (c) 7 (d) data insufficient Can anyone help me out to get answer for this question,i have exam on 6 th april can anyone find me the answer before that and post it please!!!!!!!!

15 68027

If 2x-y=4 then 6x-3y=?

14 66890

Post New Unisys General Aptitude Interview Questions




Un-Answered Questions

what is the last date of deposit TDS on liability for the assessment year 2010-11

2059


Why is it required to have an abstraction layer in uml?

869


What is the difference between persist() and cache()?

323


What do you mean by compiler?

1054


Can we return null in java?

1167


Explain the advantages of using c band for satellite communication?

1026


Is it possible for a company to show positive net income and still go bankrupt?

556


Which one of the command is ‘highly’ not recommended to use if the application is local and offers full support of objects for automation?

384


How do you copy an object in python?

951


What is frame animation?

1023


Can a method inside a interface be declared as final?

1016


Assuming one link of the Trojan horse copy-and-observe-later chain is broken. There are two other possible angles of attack by Alice: Alice logging on and attempting to read the string directly, and alice assigning a security level of sensitive to the back-pocket file. Does the reference monitor prevent these attacks?

2821


What are the branches of ai1? What is artificial intelligence?

908


What is the central limit theorem and why is it important?

326


What is soap client?

927