Which of the following are the member countries of the commonwealth?


Options: Australia, Tonga, UK and Zimbabwe,    Nigeria, Pakistan, India, Jamaica and Singapore,    Mauritius, Maldives, Ghana, Bangladesh,    All of the above

Ans:D,D

More Basic General Knowledge Related questions:


Resolution of externally defined symbols is performed by
Options: Linker,    Loader,    Compiler,    Assembler

Ans:A ,A


Baba Kanshi Ram belongs to which district
Options:

Ans:Kangra,Kangra


Major expressions used with find command to select file is it has been accessed in more than 375 days, is
Options: -atime +365,    -mtime + 365,    -atime -365,    -mtime -365

Ans:A ,A


In table design view what are the first column of buttons used for
Options: a. Indicate Primary Key b. Indicate Current Row c. Both of above d. None of above

Ans:ndash; c,ndash; c


503. maigsese puraskaar paane vaale pahale bhaarateey kaun the?
Options: NA

Ans: binova bhaave, binova bhaave


8.Excel files have a default extension of
Options: (A)Xls (B) Xlw (C) Wk1 (D) 123 20

Ans:208. (A),208. (A)


Indicate which, of the following, in not true about an interpreter
Options: Interpreter generates an object program from the source program,    Interpreter is a kind of translator,    Interpreter analyses each source statement every time it is to be executed,    All of the above

Ans:A ,A


. Excessive parallel processing is related to
Options: A) First generation B) Fourth generation C) Fifth Generation D) Third generation

Ans:7-C,7-C


4.To display sales grouped by country, region, and salesperson, all at the same time
Options: (A)Use the Sort Descending command. (B) Use the Pivot table view command (C) Use the find command on specified groups (D) All of above 60 | 8

Ans:84. (B),84. (B)


Missile 'prithivi' aims
Options: to test the performance of an indigenously built heat-shield,    to hit target without the help of the Air Forces,    to defend a large installations like oil-fields etc. against enemy attacks,    None of the above

Ans:B,B


. What is the function of folder?
Options: a. Save files b. Delete files c. Move files d. All of the above

Ans:1 – d ,1 – d


. Which of the following is the largest manufacturer of Hard Disk Drives?

Options: A) IBM B) Seagate C) Microsoft D) 3M

Ans:B,B


The Paste Special command lets you copy and paste:
Options: a. Multiply the selection by a copied value b. Cell comments c. Formatting options d. The resulting values of a formula instead of the actual formula

Ans:#8211; d,#8211; d


475. bhaarat chhodo aandolan kab shuru hua?
Options: NA

Ans: 8 agast 1942, 8 agast 1942


A form defined 
Options: a. where data is placed on the screen b. the width of each field c. both a and b d. none of the above

Ans:.a,.a


Who was the first speaker of Legislative Assembly of Himachal Pradesh?
Options: NA

Ans:T.V.R. Tatachari,T.V.R. Tatachari


What command is used to remove jobs from the print queue?
Options: lpq,    lpr,    lprm,    lpc

Ans:C ,C


What was the purpose of establishing the European Economic Community (EEC)?
Options: To promote a common market and economic prosperity among member countries,    To create a single market for free import and export among,    both (a) and (b),    None of the above

Ans:C,C


13. rataundhee kis vitaamin kee kamee se hotee hai ?
Options: NA

Ans: vitaamin a, vitaamin a


You can automatically include all of the field in a table in a query by___ a strike that appear list box in query design view
Options: a. Clicking b. Right clicking c. Double clicking d. None of the above

Ans:ndash; c,ndash; c


The largest number of tiger reserves in India are located in
Options: NA

Ans:Madhya Pradesh,Madhya Pradesh


742. nyootraan kee khoj kisane kee?
Options: NA

Ans: jems chedavik ne, jems chedavik ne


. The silicon chips used for data processing are called
Options: A) RAM chips B) ROM chips C) Micro processors D) PROM chips

Ans:C,C


4.Data dependence is
Options: (A)Involves only those tasks executing a communication operation (B) It exists between program statements when the order of statement execution affects the results of the program. (C) It refers to the practice of distributing work among tasks so that all tasks are kept busy all of the time. It can be considered as minimization of task idle time. (D) None of these

Ans:34. (B),34. (B)


who was founder of kahloor riyasat
Options: shivram chand, veer chand chandel, hari chand, datar chand

Ans:veer chand chandel,veer chand chandel


Which of the following occurs when a transaction rereads data and finds new rows that were inserted by a command transaction since the prior read?
Options: Nonrepeatable read,    Phantom read,    Dirty read,    Consistent read

Ans:B ,B


In which of the following pairs, the two substances forming the pair are chemically most dissimilar?
Options: Sugar and paper,    Butter and paraffin wax,    Chalk and marble,    Charcoal and diamond

Ans:B,B


8.Quantitative attributes are
Options: (A)A reference to the speed of an algorithm, which is quadratically dependent on the size of the data(B) Attributes of a database table that can take only numerical values. (C) Tools designed to query a database. (D) None of these 8

Ans:88. (B),88. (B)


Which of the following is used to insure the high quality of computer output?
Options: computer output microfilm,    output controls,    voice output systems,    liquid crystal display

Ans:B,B


Which of following is/are the advantage(s) of modular programming?
Options: The program is much easier to change,    Modules can be reused in other programs,    Easy debugging,    Easy to compile

Ans:A ,A


In Decision trees
Options: nodes represent the conditions, with the right side of tree listing the actions to be taken,    the root is drawn on the left and is the starting point on the decision sequence.,    the branch depends on the condition and decisions to made,    All of the above

Ans:D ,D


. Referential integrity cannot be set for _______________ relationships.
Options: a. One-To-One b. Indeterminate c. One-To-Many d. Many-To-Many

Ans:9 – b ,9 – b


Concurrency control is important for which of the following reasons?
Options: To ensure data integrity when updates occur to the database in a multiuser environment,    To ensure data integrity when updates occur to the database in a single-user environment,    To ensure data integrity while reading data occurs to the database in a multiuser environment,    To ensure data integrity while reading data occurs to the database in a single-user environment

Ans:A ,A


A small button with three dots usually displayed at the right of field properties box
Options: a. Make button b. Expression button c. Build button d. None of above

Ans:ndash; c,ndash; c


Periodically adding, changing and deleting file records is called file
Options: Updating,    upgrading,    restructuring,    renewing

Ans:A ,A


Which of the following is true about Microsoft Active Server Pages (ASP)?
Options: It is stored in .cfm files.,    It is executed on the client.,    It does not use tags.,    It allows for coding of custom tags in an HTML file.

Ans:D ,D


. When you add fields in ____, a Field List pane displays.
Options: a. Design View b. Layout View c. Print Preview d. Report View

Ans:0 – b ,0 – b


What will be the output of the program? #include<stdio.h> #include<stdlib.h> union employee { char name[15]; int age; float salary; }; const union employee e1; int main() { strcpy(e1.name, "K"); printf("%s %d %f", e1.name, e1.age, e1.salary); return 0; }
Options: Error: RValue required,    Error: cannot convert from 'const int *' to 'int *const',    Error: LValue required in strcpy,    No error

Ans:D ,D


When three or more AND and OR conditions are combined, it is easier to use the SQL keyword(s):
Options: LIKE only.,    IN only.,    NOT IN only.,    Both IN and NOT IN.

Ans:D ,D


tarain or thaneswwer 2nd battle was fought between
Options: prithvi raj chauhan and mohd gori, prithvi raj chauhan and mohd gajni,rana pratap and lord bentik

Ans: prithvi raj chauhan and mohd gori, prithvi raj chauhan and mohd gori


5. bhaarat mein sabase pahale soory kis raajy mein nikalata hai ?
Options: NA

Ans: arunaachal pradesh, arunaachal pradesh


Pench National Park
Options: Karnataka,Kerala,Madhya Pradesh,MadhyaPradesh

Ans:Madhya Pradesh,


. The term GIGO is related to which characteristics of computers?
Options: A) Speed B) Automatic C) Accuracy D) Reliability

Ans:2-C,2-C


The group of metals Fe, Co, Ni may best called as
Options: transition metals,    main group metals,    alkali metals,    rare metals

Ans:A,A


Use of a supertype/subtype relationship is necessary when which of the following exists?
Options: An instance of a subtype participates in a relationship that is unique to that subtype.,    An instance of a subtype participates in a relationship that is the same as the other subtypes.,    Attributes apply to all of the instances of an entity type.,    No attributes apply to any of the instances of an entity type.

Ans:A ,A


Which DOS command allows you to compress existing disks and to create new compressed volumes?
Options: DEFRAG,    DBLSPACE,    SCANDISK,    MSAV

Ans:B ,B


Access time in a computer memory is the time required to
Options: Locate the stored data,    Retrieve the stored data,    Both locate and retrieve the data,    All of the above

Ans:C ,C


chaar varsh
Options: NA

Ans: 591. ayodhya kis nadee ke kinaare hai?, 591. ayodhya kis nadee ke kinaare hai?


Tab scrolling button
Options: a. Allow you to view a different worksheet b. Allow you to view additional worksheet rows down c. Allow you to view additional worksheet columns to the right d. Allow you to view additional sheets tabs

Ans:#8211; d,#8211; d


2.A packet sniffer is
Options: (A)a prepared application that takes advantage of a known weakness. (B) a tool used to quickly check computers on a network for known weaknesses. (C) an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network. (D) a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.

Ans:2. (C),2. (C)

www.000webhost.com