Company Name Starts with ...
#  A  B  C  D  E   F  G  H  I  J   K  L  M  N  O   P  Q  R  S  T   U  V  W  X  Y  Z




Wipro GMAT Interview Questions
Questions Answers Views Company eMail

PASSAGE – Agonistic behavior, or aggression, is exhibited by most of the more than three million species of animals on this planet. Animal behaviorists still disagree on a comprehensive definition of the term, hut aggressive behavior can be loosely described as any action that harms an adversary or compels it to retreat. Aggression may serve many purposes, such as Food gathering, establishing territory, and enforcing social hierarchy. In a general Darwinian sense, however, the purpose of aggressive behavior is to increase the individual animal’s—and thus, the species’—chance of survival. Aggressive behavior may he directed at animals of other species, or it may be conspecific—that is, directed at members of an animal’s own species. One of the most common examples of conspecific aggression occurs in the establishment and maintenance of social hierarchies. In a hierarchy, social dominance is usually established according to physical superiority; the classic example is that of a pecking order among domestic fowl. The dominance hierarchy may be viewed as a means of social control that reduces the incidence of attack within a group. Once established, the hierarchy is rarely threatened by disputes because the inferior animal immediately submits when confronted by a superior. Two basic types of aggressive behavior are common to most species: attack and defensive threat. Each type involves a particular pattern of physiological and behavioral responses, which tends not to vary regardless of the stimulus that provokes it. For example, the pattern of attack behavior in cats involves a series of movements, such as stalking, biting, seizing with the forepaws and scratching with tile hind legs, that changes very little regardless of the stimulus—that is, regardless of who or what the cat is attacking. The cat’s defensive threat response offers another set of closely linked physiological and behavioral patterns. The cardiovascular system begins to pump blood at a faster rate, in preparation for sudden physical activity. The eves narrow and the ears flatten against the side of the cat’s head for protection, and other vulnerable areas of the body such as the stomach and throat are similarly contracted. Growling or hissing noises and erect fur also signal defensive threat. As with the attack response, this pattern of responses is generated with little variation regardless of the nature of the stimulus. Are these aggressive patterns of attack and defensive threat innate, genetically programmed, or are they learned? The answer seems to be a combination of both. A mouse is helpless at birth, but by its l2th day of life can assume a defensive threat position by backing up on its hind legs. By the time it is one month old, the mouse begins to exhibit the attack response. Nonetheless, copious evidence suggests that animals learn and practice aggressive behavior; one need look no further than the sight of a kitten playing with a ball of string. All the elements of attack—stalking, pouncing, biting, and shaking—are part of the game that prepares the kitten for more serious situations later in life. 7) The passage asserts that animal social hierarchies are generally stable because: a) the behavior responses of the group are known by all its members. b) the defensive threat posture quickly stops most conflicts. c) inferior animals usually defer to their physical superior. d) the need for mutual protection from other species inhibits conspecific aggression. 8) According to the author, what is the most significant physiological change undergone by a cat assuming the defensive threat position? a) An increase in cardiovascular activity b) A sudden narrowing of the eyes c) A contraction of the abdominal muscles d) The author does not say which change is most significant 9) Based on the information in the passage about agonistic behavior, it is reasonable to conclude that: I. the purpose of agonistic behavior is to help ensure the survival of the species. II. agonistic behavior is both innate and learned. III. conspecific aggression is more frequent than i aggression. a) I only b) II only c) I and II only d) I,II and III only 10) Which of the following would be most in accord with the information presented in the passage? a) The aggressive behavior of sharks is closely inked to their need to remain in constant motion. b) fine inability of newborn mice to exhibit the attack response proves that aggressive behavior must be learned. c) Most animal species that do riot exhibit aggressive behavior are prevented from doing so by environmental factors. d) Members of a certain species of hawk use the same method to prey on both squirrels and gophers. 11) The author suggests that the question of whether agonistic behavior is genetically programmed or learned: a) still generates considerable controversy among animal behaviorists. b) was first investigated through experiments on mice. c) is outdated since most scientists now believe the genetic element to be most important. d) has been the subject of extensive clinical study. 12) Which of the following topics related to agonistic behavior is NOT explicitly addressed in the passage? a) The physiological changes that accompany attack behavior in cats b) The evolutionary purpose of aggression c) Conspecific aggression that occurs in dominance hierarchies d) The relationship between play and aggression 13) The author of this passage is primarily concerned with: a) analyzing the differences between attack behavior and defensive threat behavior. b) introducing a subject currently debated among animal behaviorists. c) providing a general overview of aggressive behavior in animals. d) illustrating various manifestations of agonistic behavior among mammals.

2 7997

Two men, Barry and David, and two women Ann and Cathy are doctors. One is a surgeon, one a dentist, one an optometrist, and one is a general practitioner. They are seated around a square table, with one person on each side. 1) Barry is across from the dentist. 2) David is not across from the surgeon. 3) The optometrist is on Ann's immediate left. 4) Cathy is the general practitioner. 5) The surgeon and general practitioner are married to each other. 6) The general practitioner is not on Cathy's immediate left. 7) The general practitioner is across from the optometrist. If both women leave the table, the a) optometrist and dentist remain. b) surgeon and optometrist remain. c) surgeon and general practitioner remain. d) general practitioner and dentist remain. e) general practitioner and optometrist remain.

4 7861

The first human statues worshipped in India were those of (A) Vishnu (B) Shiva (C) Brahma (D) Buddha,

1 11808

Post New Wipro GMAT Interview Questions



Un-Answered Questions

Explain the Procedure for Testing for binding of mutant proteins to cell surface receptors?

895


Hi all, Is there any certification exams available for TCL and Perl. If so please let me know, my mailid is vpbharathi@gmail.com. Thanks in advance, Bharathi.P

1850


wat would be the probable interview questions and GD topics for IOCL exam?

8216


How do we return the loan in equal installments with interest in tally

936


hi I am in training of functional module, i am unable to understand what exactly use of IDOC,BAPI,DIM and BIM. As LSMW and BDC methods are used for data conversion from legacy to sap. Might be it is silly question. please explain me

1111






What is difference between AHX AND AH when referred to Withdrawal sleeves ?. Can we use AHX withdrawal sleeve with CK bearings ?

1295


What are all the major issues you faced during implementation ?

1252


what is mean by kneepoint voltage? when it will happen? ( my doubt is, if CT secondary is open means ct get saturation or blas? what are factors are required for calculations? plz give currect anws:

761


What is timer job in sharepoint?

2219


how print PGL by XML

1982


how to create instance from service request?

1134


if appointed at aryabhatt school for how long should we expect you work with us

921


difference between servo motor and synchronous motor

1173


How to apply validation in AngularJS?

500


What is the limitation for loan from pvt ltd company to other sole proprietor company suppose 25 lakhs given. what is the rule at the time of income tax point of view. Please clarify anybody....

894






Wipro GMAT Interview Questions
  • C (153)
  • STL (10)
  • OOPS (37)
  • C++ General (30)
  • MFC (5)
  • COM DCOM (1)
  • Win32API (1)
  • Delphi (4)
  • PHP (13)
  • Programming Languages AllOther (18)
  • ASP (1)
  • CGI Perl (3)
  • JavaScript (5)
  • VB Script (4)
  • JSP (2)
  • Shell Script (11)
  • Tcl (1)
  • AJAX (2)
  • Scripts AllOther (2)
  • SNMP (6)
  • TCP IP (10)
  • UDP (2)
  • SS7 (1)
  • Protocols AllOther (9)
  • Networking Administration (27)
  • Networking Security (5)
  • Networking AllOther (13)
  • Visual Basic (14)
  • C Sharp (51)
  • ASP.NET (61)
  • VB.NET (2)
  • ADO.NET (9)
  • IIS (7)
  • Crystal Reports (2)
  • Dot Net Framework (4)
  • Dot Net WindowsForms (12)
  • Dot Net General (21)
  • Dot Net AllOther (2)
  • Exchange Server (14)
  • WCF (1)
  • Microsoft Related AllOther (6)
  • Oracle General (46)
  • OCI (1)
  • Database Management (7)
  • Forms Reports (3)
  • Oracle AllOther (5)
  • SQL Server (59)
  • MS Access (2)
  • MySQL (5)
  • Postgre (1)
  • DB Architecture (2)
  • DB Administration (4)
  • DB Development (1)
  • SQL PLSQL (22)
  • Databases AllOther (5)
  • SDK (2)
  • Windows Threads (2)
  • Windows General (5)
  • Windows AllOther (15)
  • Linux Commands (15)
  • Linux Threads (1)
  • Linux System Calls (8)
  • Linux General (4)
  • Linux AllOther (4)
  • Unix Commands (12)
  • Unix Socket Programming (1)
  • Unix General (2)
  • Unix AllOther (3)
  • Solaris Commands (24)
  • Solaris System Calls (2)
  • Solaris General (72)
  • Solaris AllOther (13)
  • Vxworks (3)
  • RTOS AllOther (1)
  • Operating Systems General Concepts (14)
  • Data Structures (9)
  • Operating Systems AllOther (4)
  • WinRunner (15)
  • Load Runner (19)
  • QTP (144)
  • Test Director (2)
  • Rational TestSuite (2)
  • Silk Test (1)
  • Automation Testing AllOther (4)
  • Manual Testing (195)
  • QA Concepts (8)
  • Mobile Testing (2)
  • Test Cases (19)
  • Test Documents Reporting (2)
  • Testing AllOther (11)
  • Servers AllOther (4)
  • COBOL (31)
  • JCL (26)
  • CICS (4)
  • DB2 (13)
  • IMS (2)
  • REXX (2)
  • Assembler (1)
  • MVS (2)
  • VSAM (1)
  • QSAM (1)
  • IBM MainFrame AllOther (3)
  • RPG400 (7)
  • DB400 (1)
  • COOLPLEX (1)
  • IBM AS400 AllOther (7)
  • Core Java (91)
  • Advanced Java (20)
  • Swing (4)
  • EJB (8)
  • Servlets (8)
  • Struts (29)
  • JDBC (18)
  • J2EE (4)
  • Weblogic (11)
  • Websphere (1)
  • Java Networking (3)
  • Java J2EE AllOther (2)
  • J2ME (4)
  • Java Related AllOther (2)
  • MQSeries (1)
  • Middleware AllOther (4)
  • HTML DHTML (1)
  • XML XSLT RSS (2)
  • Flash Action Scripting (1)
  • Web Related AllOther (1)
  • Teradata (21)
  • Business Objects (40)
  • Cognos (32)
  • Informatica (92)
  • Ab Initio (9)
  • Data Stage (43)
  • SAS (9)
  • ETL (2)
  • Data Warehouse General (4)
  • HR Questions (34)
  • Design Patterns (6)
  • OOAD (3)
  • Software Design Tools (2)
  • Requirements Management (2)
  • Project Planning (3)
  • Project Management (4)
  • Software Design AllOther (2)
  • Debugging AllOther (3)
  • Clear Case (2)
  • Telecom Routers Switches (1)
  • Telecom Protocols (2)
  • Voice Gateways (1)
  • Telecom Security (1)
  • WiFi Protocols (1)
  • BlueTooth (3)
  • Telecom General (1)
  • SAP Basis (31)
  • SAP ABAP (108)
  • SAPScript (4)
  • SAP SD (112)
  • SAP MM (21)
  • SAP QM (1)
  • SAP PP (18)
  • SAP FI CO (74)
  • SAP HR (30)
  • SAP CRM (59)
  • SAP SRM (1)
  • SAP APO (2)
  • SAP Business Warehouse (6)
  • SAP Business Workflow (3)
  • SAP Security (10)
  • SAP ALE IDocs (1)
  • SAP B1 (5)
  • SAP AllOther (2)
  • PeopleSoft HRMS (1)
  • Oracle Apps Technical (28)
  • Oracle Apps Financial (27)
  • Oracle Apps Manufacturing (3)
  • Oracle Apps HRMS (1)
  • Oracle Apps SCM (3)
  • ERP CRM AllOther (4)
  • 86 Family (14)
  • VLSI (8)
  • Embedded Systems AllOther (1)
  • Client Server General (5)
  • Client Server AllOther (1)
  • AI General (1)
  • Encryption Decryption (1)
  • Cryptography General (1)
  • WebMethods (2)
  • TIBCO (11)
  • JCAPS (1)
  • 3D Animation (1)
  • Visual Effects (1)
  • Software Integration & Delivery (1)
  • Software Integration & Release (1)
  • Image Processing General (1)
  • Micro Biology (2)
  • Bio Chemistry (1)
  • Bio Informatics (49)
  • Genetics (1)
  • Biological Sciences AllOther (1)
  • Inorganic Chemistry (2)
  • Physical Chemistry (2)
  • Pharmacy (1)
  • Dermatology (1)
  • Gynaecology (1)
  • Mathematics (2)
  • Civil Engineering (3)
  • Mechanical Engineering (16)
  • Electrical Engineering (79)
  • Electronics Communications (62)
  • Aeronautical Engineering (1)
  • Bio Engineering (2)
  • Instrumentation (3)
  • Engineering AllOther (26)
  • Business Administration (11)
  • Marketing Sales (11)
  • Banking Finance (23)
  • Human Resources (19)
  • Personnel Management (1)
  • Infrastructure Management (1)
  • IT Management (3)
  • Non Technical (2)
  • Audit (7)
  • CompanyAffairs CS (3)
  • Taxation (27)
  • Accounting General (44)
  • Accounting AllOther (86)
  • Advertising Media AllOther (1)
  • Call Centre AllOther (310)
  • UPSC Political Science (1)
  • UPSC History (1)
  • UPSC General Studies (2)
  • UPSC AllOther (1)
  • SSC Geography (1)
  • SSC General Science (1)
  • SSC General Studies (3)
  • SSC AllOther (9)
  • RRB (7)
  • CDS (1)
  • POs (5)
  • BSRB Clerical (4)
  • BSRB AllOther (1)
  • Group I (12)
  • Group II History (6)
  • Group II AllOther (4)
  • APPSC AllOther (13)
  • General Knowledge_Current Affairs (30)
  • Government AllOther (10)
  • Law AllOther (1)
  • Teaching (5)
  • Funny Interview Questions (5)
  • Everything Else AllOther (19)
  • English (20)
  • General Aptitude (106)
  • Puzzles (21)
  • Placement Papers (31)
  • CCNA (47)
  • Microsoft Certifications (15)
  • Sun Certifications (2)
  • CISA Certification (1)
  • Oracle Certifications (4)
  • Certifications AllOther (3)
  • H1B Visa (8)
  • USA Student Visa F1 Visa (2)
  • L1 Visa (1)
  • USA Visitor Visa B2 Visa (2)
  • USA Business Visa B1 Visa (1)
  • USA Dependent Visa H4 Visa (6)
  • USA AllOther Visa (1)
  • UK Visa (1)
  • Australia Visa (2)
  • Canada Visa (1)
  • C Code (20)
  • C++ Code (3)
  • J2SE Code (1)
  • ASP.NET Code (2)
  • C Sharp Code (2)
  • Visual Basic Code (1)
  • Programming Code AllOther (1)
  • PHP Code (2)
  • JSP Code (1)
  • JavaScript Code (1)
  • VB Script Code (1)
  • GATE (5)
  • CAT (1)
  • MAT (1)
  • GMAT (3)
  • AIIMS (1)
  • ICET (4)
  • C C++ Errors (2)
  • Oracle Errors (9)
  • SQLServer Errors (1)
  • Scripts Errors (2)