Bissoy
Login
Get Advice on Live Video Call
Earn $ Cash $ with
consultations on Bissoy App
Calculate the value of safety factor using the data: tc=12 msec, tq=6 msec.
A
4
B
2
C
3
D
6
Correct Answer:
2
The value of the safety factor is the ratio of the circuit turn-off time and device turn-off time. S.F=tc÷tq=12÷6=2.
Examine the following statements :
i) Factor of safety for steel should be based on its yield stress,
ii) Factor of safety for steel should be based on its ultimate stress,
iii) Factor of safety for concrete should be based on its yield stress,
iv) Factor of safety for concrete should be based on its ultimate stress.
The correct statements are
A
(i) and (iii)
B
(i) and (iv)
C
(ii) and (iii)
D
(ii) and (iv)
Which of the following statements are true?
Statement I Big data refers to no precise quantity, but generally refers to data in the range of Petabytes and Exabyte, i.e. billions to trillions of records, all from various sources. Big data is generated much faster. than traditional data in much larger quantities.
Statement II Big data interests industries because they are able to learn more patterns and curious variances than smaller data sets, with the capability to provide valuable insights into consumer behaviour, weather systems, financial market activity, or other phenomena.
Statement III Various departments and product lines use various applications within most organisations and store data in separate datasets. These separate databases may contain similar data, but data from one data base to another is not always consistent. This is called data silo.
A
Both statements I and II
B
Both statements II and III
C
Both statements I and III
D
All of the above
Calculate the value of the Input power factor using the data: Fundamental displacement factor=.96, Distortion factor=.97.
A
.93
B
.84
C
.48
D
.89
Directions :
In each of the following questions a statement is given, followed by two conclusions. Give answer :
Statement :
Safety and health practices in many Indian companies are well below the international standards.
Assumptions :
I. International standards of health and safety are ideal and unrealistic.
II. Indian organizations do not consider safety and health management as their prime social responsibility.
A
Only assumption I is implicit
B
Only assumption II is implicit
C
Either I or II is implicit
D
Neither I nor II is implicit
E
Both I and II are implicit
Which of the following statements are correct?
1. ILO's Occupational Safety and Health Convention, 1981 is convention No. 155.
2. Occupational Health Services Convention, 1985 (No. 161) provides for the establishment of enterpriselevel occupational health services.
3. Promotional Framework for Occupational Safety and Health Convention, 2006 is Convention No 172.
4. The national policy shall be developed in accordance with the principles of Article 2 of the Occupational Safety and Health Convention, 1981.
A
Only 1 and 2 are correct
B
Only 1 and 3 are correct
C
Only 2 and 4 are correct
D
Only 3 and 4 are correct
Which of the following statements are correct?
1. In 2003 the ILO adopted a global strategy to improve occupational safety and health which included the introduction of a preventive safety and health culture.
2. It has adopted more than 40 standards specifically dealing with occupational safety and health, as well as over 40 Codes of Practice.
3. ILO's Codes of Practice are not legally binding instruments.
4. ILO's Codes of Practice are not intended to replace the provisions of national laws or regulations, or accepted standards.
A
All are correct
B
Only 1 and 3 are correct
C
Only 2 and 4 are correct
D
Only 3 and 4 are correct
If Q is load factor, S is shape factor and F is factor of safety in elastic design, the following:
A
Q = S + F
B
Q = S - F
C
Q = F - S
D
Q = S × F
Factor of safety (i.e., overdesign factor) in heat transfer equipments is about __________ percent more than the actual/theoretical design factor.
A
5-10
B
15-20
C
30-35
D
35-40
You use Microsoft Visual Studio 2010 and Microsoft .NET Framework 4 to create anapplication. The application uses the ADO.NET Entity Framework to model entities. Theapplication allows users to make changes to entities while disconnected from the central data store. You need to ensure that when the user connects to the central data store and retrieves new data, the application meets the following requirements:
Changes made to the local data store in disconnected mode are preserved.
Entities that have already been loaded into the local data store, but have not been modified by the user, are updated with the latest data.
What should you do?
A
Call the query's Execute method by using the MergeOptions.AppendOnly option.
B
Call the query's Execute method by using the MergeOptions.OverwriteChanges option.
C
Call the Refresh method of ObjectContext by using the RefreshMode.StoreWins option.
D
Call the Refresh method of ObjectContext by using the RefreshMode.ClientWins method.
Each item consists of six sentences of a passage. The first and sixth sentences are given in the beginning as S1 and S6. The middle four sentences in each have been jumbled up and labelled as P, Q, R and S. You are required to find the proper sequence of the four sentences and markyour response accordingly on the Answer Sheet.
S1 :The dawn of the information age opened up great opportunities for the beneficial use of data.
S6 :To some, in this era of Big Data analytics and automated, algorithm-based processing of zettabytes of information, the fear that their personal data may be unprotected may conjure up visions of a dystopian world in which individual liberties are compromised.
P :But it is the conflict between the massive scope for progress provided by digital era and the fear of loss of individual autonomy that is foregrounded in any debates about data protection laws.
Q : It also enhanced the perils of unregulated and arbitrary use of personal data.
R : It is against this backdrop that the White Paper made public to elicit views from the public on the shape and substance of a comprehensive data protection law assumes significances.
S :Unauthorised leaks, hacking and other cyber crimes have rendered databases vulnerable.
The correct sequence should be
A
S Q R P
B
Q P R S
C
S R P Q
D
Q S P R