Search Your Question...!
UIPATH MCQ's | Interview Preparation - 2 | RPA
1. Consider having an application in Citrix Environment that has a button named ‘Accept’ and also a label that contains the Accept word. How can Click Text be customized in order to access the correct button?
View AnswerBy using the Occurrence property.
2. What can be done when the Windows Remote Connection doesn’t allow sending hotkeys?
View AnswerIt should work if the Windows Remote Connection is in ‘full-screen’ mode.
3. What happens if Find Image doesn’t actually find the desired image?
View AnswerAn exception is thrown.
4. Can a Pick Branch activity be used alone?
View AnswerNo, it can only be added inside a Pick activity body.
5. What is the EASIEST navigation method to be used in a form within Citrix?
View AnswerBy sending keyboard commands/hotkeys
UIPATH MCQ's | Interview Preparation - 1 | RPA
1. The Type Into activity can receive inputs like:
View AnswerA variable followed by .tostring method & A static String
2. Getting the content of a PDF document is possible:
View AnswerBy opening the pdf and using screen scraping to get its data & By using the read Pdf text activity and providing the pdf file’s path
3. What kind of actions can be performed in the Variables panel?
View AnswerSetting default values for variable & Changing variable type & Adding new variable
4. Where can you see the list of activities that you can use in a workflow?
View AnswerIn the Activities panel
5. How can you extract structured data from a web page?
View AnswerUsing the Data Scraping Wizard
Bill Division | Python Solution | Hackerrank
For example, assume the bill has the following prices: Bill=[2,4,6]. Anna declines to eat item k= bill[2] which costs 6. If Brian calculates the bill correctly, Anna will pay (2+4)/2=3. If he includes the cost of bill[2], he will calculate (2+4+6)/2=3. In the second case, he should refund 3 to Anna.
Unstructured Data Classification MCQ's
1. Identify the unstructured data from the following.
View AnswerIMAGE
2. What kind of classification is our case study 'Spam Detection'?
View AnswerBINARY
3. Which preprocessing technique is used to remove the most commonly used words?
View AnswerSTOPWORDS
4. Cross-validation technique is used to evaluate a classifier by dividing the data set into training set to train the classifier and testing set to test the same.
View AnswerTRUE
Advanced Time Series Analysis MCQ's
1. An Ideal ACF plot will increase exponentially ?
View AnswerFalse
2.The Partial Auto Correlation Function is useful in detecting the Order of AR process.
View AnswerTrue
3. Non Stationary Time series will have a declining effect ?
View AnswerFalse
Statistics with Python MCQ's
1. Which of the following definition is used by default in kurtosis method of scipy.stats module?
View Answerfisher
2. Which of the following method of scipy.stats module is used to determine inter quartile range a distribution?
View Answeriqr
3. Which of the following equations represent inter-quartile range (IQR)?
View AnswerQ3 - Q1
4. Which of the following expressions, correctly calculate variance of a sample, x, derived from a population?
View Answernp.var(x, ddof=1)
5. What is the output of the following expression?
View Answerfrom scipy import stats print(stats.mode([8, 9, 8, 7, 9, 6, 7, 6])) ModeResult(mode=array([6]), count=array([2]))
Structured Data MCQ's
1. Identify the structured data from the following
View AnswerData from mySQL DB and Excel
2. What kind of classification is our case study 'Churn Analysis'?
View AnswerBinary
3. Which command is used to identify the unique values of a column?
View Answerunique()
4. Which preprocessing technique is used to make the data gaussian with zero mean and unit variance?
View AnswerStandardization
5. True Negative is when the predicted instance and the actual is positive.
View AnswerFalse
Blockchain MCQ's
1. Blockchain which is popularly known as ‘for the people, by the people and of the people” is ___________.
View Answerpublic
2. Bitcoin network would make it impossible to bypass the traditional financial intermediaries.
View AnswerFalse
3. The three concepts used to explain the foundation of blockchain are __________________.
View Answerbusiness n/w,digital assets,ledger
4. Private Blockchain is a de-centralized type of Blockchain?
View AnswerFalse
5. The value of coins ( litecoin, bitcoin) is same at a particular time.
View AnswerFalse
Data visualization MCQ's
1.What needs to be considered first before you start a data visualization presentation?
Ans:- Data
2.Data Visualization makes complex data more
Ans:-Understandable
3.How does visualization of big data help in interpreting information?
Ans:-clear
4.What is the purpose of using a dashboard for data visualization?
Ans:-comm
Problem -2
Problem Statement:
Arpasland has surrounded by attackers. A truck enters the city. The driver claims the load is food and medicine from Iranians. Ali is one of the soldiers in Arpasland. He doubts about the truck, maybe it's from the siege. He knows that a tag is valid if the sum of every two consecutive digits of it is even and its letter is not a vowel. Determine if the tag of the truck is valid or not.
We consider the letters "A","E","I","O","U","Y" to be vowels for this problem.
Problem - 1
Problem Statement:
You are required to enter a word that consists of and that denote the number of Zs and Os respectively. The input word is considered similar to word zoo if .
Determine if the entered word is similar to word zoo.
For example, words such as zzoooo and zzzoooooo are similar to word zoo but not the words such as zzooo and zzzooooo.