The Planning commission of India is: (a) an autonomous body (b) a constitutional body (c) statutory body (d) non-statutory body
17 65446The State in India with the largest coastline is: (a) Tamil Nadu (b) Kerala (c) Andhra Pradesh (d) Maharashtra
44 193110The largest source of revenue in India is (1) Sales tax (2) Excise duty (3) Income tax (4) Corporate tax
22 110223Which newspaper has the motto-Journalism of Courage? 1 The Hindustan Times 2 The Washington Post 3 The Indian Express 4 The Guardian
7 50068The Indian Railways is one of the largest railway systems with an extensive network of over 63,000 route kilometers. Approximately?.of the network is electrified. 1 50% 2 25% 3 45% 4 60%
1 8974. In India the Public Sector is most dominant in (a) Steel production (b) Organized term-lending financial institutions (c) transport (d) Commercial banking
3 13777. The earliest rock-cut caves in western India are those at (a) Nasik, Ellora and Ajanta (b) Junnar, Kalyan and Pitalkhora (c) Ajanta, Bhaja and Kondane (d) Bhaja, Pitalkhora and Kondane
5 14152Post New Banaras Hindu University BHU Interview Questions
What is the function of ctrl e?
What is the difference between rowmapper and resultsetextractor?
How to change the port of tomcat from 8080 to 80?
Is it possible to perform an availability check based on the plant yet exclude one storage location?
What are untrusted applets?
What is materialized view in sql?
Why is hashset used?
Is primary key indexed by default in postgres?
What is Phase to Phase clearance for 800V System Operating Voltage as per IEC61439
In cryptography, you could often break the algorithm if you know what was the original (plain) text that was encoded into the current ciphertext. This is called the plain text attack. In this simple problem, we illustrate the plain text attack on a simple substitution cipher encryption, where you know each letter has been substituted with a different letter from the alphabet but you don’t know what that letter is. You are given the cipherText as the input string to the function getwordSets(). You know that a plain text "AMMUNITION" occurs somewhere in this cipher text. Now, you have to find out which sets of characters corresponds to the encrypted form of the "AMMUNITION". You can assume that the encryption follows simple substitution only. [Hint: You could use the pattern in the "AMMUNITION" like MM occurring twice together to identify this]
What are mutual funds? Why are mutual funds better than stocks?
How to do automated restart when a job abend?
What is story in tableau?
What is the normalization?
What are the advantages of manual database?