PREPARATORY QUESTIONS

PHRASE/WORDS REPLACEMENT

PREPARATORY SET-18 (NEW PATTERN)

Direction (Qs.1-5): In each of the questions given below five words are given in bold. These five words may or may not be in their correct position. The sentence is then followed by options with the correct combination of words that should be interchanged with each other in order to make the sentence grammatically and contextually correct. Find the correct combination of the words that replace each other. If the sentence is correct as it is, then select option (5) as your choice.

 

Question No : 1

As India continues (A) to ramp up capacity, it is assets (B) to create generation imperative (C) with the lowest unit cost by optimising (D)plant capacities and encouraging (E) private sector investment.

(1) (A)–(E)

(2) (B)–(C)

(3) (B)–(E)

(4) (A)-(D) and (B)-(E)

(5) No interchange required

Question No : 2

Without adequate State support (A), these reforms would not be possible and will force the losses (B) of the TSRTC to remain within a vicious (C) cycle of operating operations (D), cutbacks and poor services (E)

(1) (A)–(E)

(2) (B)–(C)

(3) (B)–(D)

(4) (A)-(D) and (B)-(E)

(5) No interchange required

Question No : 3

Electricity tariffs (A) broadly consist of two components (B): fixed capacity costs and operation (C) and maintenance (D) costs, which include fuel expenses (E).

(1) (A)–(E)

(2) (B)–(C)

(3) (B)–(E)

(4) (A)-(D) and (B)-(E)

(5) No interchange required

Question No : 4

India could drought (A) a near-normal monsoon this season (B), the India Meteorological Department (IMD) forecast on Monday, bringing welcome (C) news to the nation’s largely (D) rain-fed agriculture after poor rains and witness (E) last year.

(1) (A)-(E)

(2) (B)-(C)

(3) (A)-(D)

(4) (D)–(E)

(5) No change required

Question No : 5

On a day it was supposed (A) to declare its March quarter results, Wipro Ltd on Tuesday giving (B) reports about a phishing attack on its IT systems without confirmed (C) out any details on the extent (D) and effect of the hacking (E).

(1) (D)-(E)

(2) (A)-(B)

(3) (C)-(E)

(4) (B)-(C)

(5) No change required