Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

Company Name Starts with ...
#  A  B  C  D  E   F  G  H  I  J   K  L  M  N  O   P  Q  R  S  T   U  V  W  X  Y  Z

Royal Group Interview Questions
Questions Answers Views Company eMail

u use any operation solve this problem 45-45=45

11 33497

Post New Royal Group Interview Questions


Royal Group Interview Questions


Un-Answered Questions

Explain PHP looping?

1031


What happens when you choose ClearType for your screen fonts in Windows XP?

4795


How is hadoop different from spark?

270


what is a base cluster in vsam?

1144


What are the useful shortcuts of repl terminal?

507


Can you name the two microsoft solutions for distributed applications?

695


Which is better asp or php?

960


Can a single socket port be used for multiple applications?

893


which gas is used in preaparation of bit salt

2322


Agonistic behavior, or aggression, is exhibited by most of the more than three million species of animals on this planet. Animal behaviorists still disagree on a comprehensive definition of the term, hut aggressive behavior can be loosely described as any action that harms an adversary or compels it to retreat. Aggression may serve many purposes, such as Food gathering, establishing territory, and enforcing social hierarchy. In a general Darwinian sense, however, the purpose of aggressive behavior is to increase the individual animal’s—and thus, the species’—chance of survival. Aggressive behavior may he directed at animals of other species, or it may be conspecific—that is, directed at members of an animal’s own species. One of the most common examples of conspecific aggression occurs in the establishment and maintenance of social hierarchies. In a hierarchy, social dominance is usually established according to physical superiority; the classic example is that of a pecking order among domestic fowl. The dominance hierarchy may be viewed as a means of social control that reduces the incidence of attack within a group. Once established, the hierarchy is rarely threatened by disputes because the inferior animal immediately submits when confronted by a superior. Two basic types of aggressive behavior are common to most species: attack and defensive threat. Each type involves a particular pattern of physiological and behavioral responses, which tends not to vary regardless of the stimulus that provokes it. For example, the pattern of attack behavior in cats involves a series of movements, such as stalking, biting, seizing with the forepaws and scratching with tile hind legs, that changes very little regardless of the stimulus—that is, regardless of who or what the cat is attacking. The cat’s defensive threat response offers another set of closely linked physiological and behavioral patterns. The cardiovascular system begins to pump blood at a faster rate, in preparation for sudden physical activity. The eves narrow and the ears flatten against the side of the cat’s head for protection, and other vulnerable areas of the body such as the stomach and throat are similarly contracted. Growling or hissing noises and erect fur also signal defensive threat. As with the attack response, this pattern of responses is generated with little variation regardless of the nature of the stimulus. Are these aggressive patterns of attack and defensive threat innate, genetically programmed, or are they learned? The answer seems to be a combination of both. A mouse is helpless at birth, but by its l2th day of life can assume a defensive threat position by backing up on its hind legs. By the time it is one month old, the mouse begins to exhibit the attack response. Nonetheless, copious evidence suggests that animals learn and practice aggressive behavior; one need look no further than the sight of a kitten playing with a ball of string. All the elements of attack—stalking, pouncing, biting, and shaking—are part of the game that prepares the kitten for more serious situations later in life. 7) The passage asserts that animal social hierarchies are generally stable because: a) the behavior responses of the group are known by all its members. b) the defensive threat posture quickly stops most conflicts. c) inferior animals usually defer to their physical superior. d) the need for mutual protection from other species inhibits conspecific aggression. 8) According to the author, what is the most significant physiological change undergone by a cat assuming the defensive threat position? a) An increase in cardiovascular activity b) A sudden narrowing of the eyes c) A contraction of the abdominal muscles d) The author does not say which change is most significant 9) Based on the information in the passage about agonistic behavior, it is reasonable to conclude that: I. the purpose of agonistic behavior is to help ensure the survival of the species. II. agonistic behavior is both innate and learned. III. conspecific aggression is more frequent than i aggression. a) I only b) II only c) I and II only d) I,II and III only 10) Which of the following would be most in accord with the information presented in the passage? a) The aggressive behavior of sharks is closely inked to their need to remain in constant motion. b) fine inability of newborn mice to exhibit the attack response proves that aggressive behavior must be learned. c) Most animal species that do riot exhibit aggressive behavior are prevented from doing so by environmental factors. d) Members of a certain species of hawk use the same method to prey on both squirrels and gophers. 11) The author suggests that the question of whether agonistic behavior is genetically programmed or learned: a) still generates considerable controversy among animal behaviorists. b) was first investigated through experiments on mice. c) is outdated since most scientists now believe the genetic element to be most important. d) has been the subject of extensive clinical study. 12) Which of the following topics related to agonistic behavior is NOT explicitly addressed in the passage? a) The physiological changes that accompany attack behavior in cats b) The evolutionary purpose of aggression c) Conspecific aggression that occurs in dominance hierarchies d) The relationship between play and aggression 13) The author of this passage is primarily concerned with: a) analyzing the differences between attack behavior and defensive threat behavior. b) introducing a subject currently debated among animal behaviorists. c) providing a general overview of aggressive behavior in animals. d) illustrating various manifestations of agonistic behavior among mammals.

2424


Define a list of values?

44


What do you mean by adaptive server enterprise?

955


Programming in C JayLQue@hotmail.com 1. Which of the types listed below can be the type of the result value returned by a user-defined function? A) int B) double C) char D) all of the above E) none of the above 2. What is the output from this program? #include void do_something(int *thisp, int that) { int the_other; the_other = 5; that = 2 + the_other; *thisp = the_other * that; } int main(void) { int first, second; first = 1; second = 2; do_something(&second, first); printf("%4d%4d\n", first, second); return 0; } A) 35 2 B) 1 35 C) 35 7 D) 1 2 E) 0 3. In function apart defined below, how many of the parameters are considered input parameters? void apart(double x, int *wholep, double *fracp) { *wholep = (int)x; *fracp = x - *wholep; } A) 0 B) 1 C) 2 D) 3 E) all 4. Variables that represent neither problem inputs nor problem outputs but are needed for internal computations are called _____. A) problem constants B) prototypes C) results D) formula variables E) program variables 5. This question concerns the following program fragment: char r, x, y, z, w; scanf("%c%c%c%c", &x, &y, &z, &w); if (x < y) r=x; else r=y; if (r>z) r=z; if (r>w) r=w; printf("%c\n", r); The program's effect can best be described as: A) It displays the letter 'r' after comparing it to x, y, and z. B) Of the four input characters, it displays the one that comes first in the alphabet. C) Of the four input characters, it displays the one that comes last in the alphabet. D) Of the four input characters, it displays the one that comes second in the alphabet. E) It displays nothing since characters cannot be compared. 6. In a function that receives a value from the main function via a parameter and then displays the parameter value on the screen, that parameter is considered __________. A) an input parameter B) an output parameter C) an input/output parameter D) a local variable E) a stub 7. What is the complement of the following expression? n||a <= b && c != 100 A) !n || a > b || c == 100 B) !(n && (a > b || c == 100)) C) !n && (a > b || c == 100) D) !(n || (a > b || c == 100)) E) none of the above 8. The if statement: if (13 < 12) printf("never\n"); else printf("always\n"); A) displays never. B) displays always. C) will not compile since 13 is not less than 12. D) causes a run-time error since 13 is not less than 12. E) displays nothing since 13 is not less that 12. 9. How many lines of output will be displayed by the following program fragment? i=0; do { for (j = 0; j < 4; j = j + 1) printf("%d\n", i + j); i=i + 1; } while (i < 5); A) 0 B) 7 C) 9 D) 16 E) 20 10. For what exact range of values of variable x does the following code segment display the letter 'C'? if (x <= 200) if (x < 100) if (x <= 0) printf("A\n"); else printf("B\n"); else printf("C\n"); else printf("D\n"); A) 0 < x < 100 B) x <= 0 C) 100 <= x <= 200 D) x > 200 E) 100 < x <= 200 11. The effect of the following program segment can best be described as __________. if (x > y) z = x; if (x == y) z=0; if (x < y) z = y; A) the smaller of x and y is stored in z. B) the larger of x and y is stored in z. C) the larger of x and y is stored in z unless x and y are equal, in which case z is assigned zero. D) the larger of x and y is stored in z unless x and y are not equal, in which case z is assigned zero. E) none of the above. 12. The expression: x *= i + j / y; is equivalent to ______. A) x = x * i + j / y; B) x = (x * i) + j / y; C) x = (x * i + j) / y; D) x = x * (i + j / y); E) none of the above 13. The facts that a function assumes to be true of the arguments that it receives are called __________. A) function input validations B) local variables C) postconditions D) preconditions E) none of the above 14. How many times is the loop body of the while statement executed? Refer to the following program segment. Assume that all variables are of type int. z=0; g=0; s=0; i=0; while (i < 50) { scanf("%d", &t); s=s + t; if (t >= 0) g=g + 1; else z=z + 1; i=i + 1; } A) once B) never C) 49 times D) 50 times E) until a number 50 or larger is entered 15. A special value that marks the end of a list of input data is called a __________. A) terminal value B) sentinel value C) loop control value D) input value E) loop termination value 16. Here is the prototype of a function: void five (double x, double* yp, int* zp); Given these variable declarations, which calls to five are valid? int m, n double p, q A) five(m, &p, &n); B) q = five(6.2, &p, &m); C) five(p, &q, &m); D) five(7.1, &p, &q); E) a and c only F) a, b, c, and d 17. The ______ of a function take(s) information into the function from the calling statement. A) local variables B) input arguments C) output arguments D) prototype E) purpose 18. If the input to the program segment below is 85, what is its output? scanf("%d", &s); if (s >= 90) printf ("A\n"); else if (s >= 70) printf ("C\n"); else if (s >= 80) printf ("B\n"); else printf ("D\n"); A) A B) B C) C D) D E) None of the above 19. The value stored in variable s at the end of the execution of the loop could best be described as __________. Refer to the following program segment. Assume that all variables are of type int. z=0; g=0; s=0; i=0; while (i < 50) { scanf("%d", &t); s=s + t; if (t >= 0) g=g + 1; else z=z + 1; i=i + 1; } A) the average of the numbers scanned B) the sum of the numbers scanned C) the largest of the numbers scanned D) how many numbers were scanned E) the sentinel value 20. What is displayed by the C statements that follow if the value input is 2? scanf ("%d", &ctl); switch (ctl) { case 0: case 1: printf("red "); case 2: printf("blue "); case 3: printf("green "); case 4: printf("yellow"); } printf("\n"); A) red B) blue C) green D) yellow E) blue green yellow 21. What is displayed by the C statements below if the value input is 3? scanf ("%d", &n); if (n = 5) printf("Equal\n"); else if (n < 5) printf("Less\n"); else printf("Greater\n"); A) Equal B) Less C) Greater D) No output 22. What will be the value of i after the C statements below have been executed? i=3; j=10; if ((3 * i) < j) i=i + 2; i=i+3; A) 5 B) 6 C) 8 D) 10 E) 15 23. Which of the types listed below can be the type of a function output parameter? A) int* B) double* C) char* D) all of the above E) none of the above 24. Which one of the following lines names a constant needed in a program that computes the price per square inch of a round pizza? A) scanf("%lf", &radius); B) pi = 3.14159; C) #define PI 3.14159 D) #include E) none of the above 25. Which one of these is not the name of a C library function? A) printf B) sqrt C) void D) scanf E) log

3549


What is sql integrity?

1165


Should I use xml or text, javascript, or html as a return type?

884