The maximum soil fertility occurs in the pH range of


Options: 5.0 to 6.2,    6.0 to 7.2,    7.0 to 8.2,    4.0 to 5.2

Ans:B,B

More World Geography Related questions:


The silicon chips used for data processing are called
Options: RAM chips,    ROM chips,    Micro processor,    PROM chips

Ans:C ,C


4.Real-time systems are
Options: (A)primarily used on mainframe computers (B) used for monitoring events as they occur (C) used for program development (D) used for real-time interactive users. 23

Ans:234. (B),234. (B)


2.The wait operation
Options: (A)Decrements the semaphore value (B) Increments the semaphore value (C) Fixes the semaphore value (D) None of these. 6

Ans:62. (A),62. (A)


ek-tihaee
Options: NA

Ans: 590. amerikee raashtrapati ka kaaryakaal kitane varsh hota hai?, 590. amerikee raashtrapati ka kaaryakaal kitane varsh hota hai?


What was Sachin Tendulkar's average when he made his first thousand runs in ODIs?
Options: 35.83,    22.92,    43.87,    42.86

Ans:A,A


Lal Chand Prarthi belongs to which district
Options:

Ans:Kullu,Kullu


Winner of first Dr, yashwant singh parmaar price in HP [was given in 1986, in himachali sanskriti]
Options: Shri keshav,miyaan goverdharn singh, sunil sharma, surendernath

Ans:miyaan goverdharn singh,miyaan goverdharn singh


Contention is
Options: One or more conductors that serve as a common connection for a related group of devices,    a continuous frequency capable of being modulated or impressed with a second signal,    the condition when two or more stations attempt to use the same channel at the same time,    a collection of interconnected functional units that provides a data communications service among stations attached to the network

Ans:C ,C


The third stage in designing a database is when we analyze our tables more closely and create a ___________ between tables
Options: a. relationship b. Join c. Query d. None of these

Ans:dash; a,dash; a


Which of the following is true about pseudocode
Options: A machine language,    An assembly language,    A high-level language,    All of the above

Ans:E ,E


Shanta Kumar
Options:

Ans:Kangra,Kangra


9.A definition of a concept is——if it recognizes all the instances of that concept.
Options: (A)Complete (B) Consistent (C) Constant (D) None of these

Ans:19. (A),19. (A)


Who invented Fountain Pen?
Options: John J. Loud,    Sir Frank Whittle,    Lewis E. Waterman,    Kirkpatrick Macmillan

Ans:C,C


where is dhungri mandir in hp
Options: kinnaur , lahul, kullu, mandi

Ans:kullu,kullu


Which one of the following devices is most often used for measuring opposition to current flow in a circuit?
Options: Ammeter,    Voltmeter,    Ohmmeter,    Wattmeter

Ans:C ,C


The 'satellite freight city' is being developed near which of the following cities?
Options: New Delhi,    Orissa,    Gurgaon,    Kolkata

Ans:C,C


The trophy given for exemplary conduct displayed by an athlete during the Olympic games is
Options: Mohammad Toher Trophy,    Count Alberto Bonacossa Trophy,    Tokyo Trophy,    None of the above

Ans:C,C


The main vegetation of the steppe type climatic regions is
Options: evergreen forests,    evergreen deciduous forests,    large grasslands,    coniferous forests

Ans:C,C


. To start Microsoft PowerPoint application
Options: a.  Click on Start >> Programs >> All Programs >> Microsoft PowerPoint b.  Hit Ctrl + R then type ppoint.exe and Enter c.  Click Start >> Run then type powerpnt then press Enter d.  All of above

Ans:1 – C ,1 – C


The ability of a computer system to remain operational despite various failures is
Options: Relation,    Schema,    Resilience,    Versatility

Ans:C ,C


The half life period of an isotope is 2 hours. After 6 hours what fraction of the initial quantity of the isotope will be left behind?
Options: 1/6,    1/3,    1/8,    1/4

Ans:C,C


6.A spoofing attack is
Options: (A)a prepared application that takes advantage of a known weakness. (B) a tool used to quickly check computers on a network for known weaknesses. (C) an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network. (D) a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access. 1

Ans:16. (D),16. (D)


Most highly intelligent mammals are
Options: whales,    dolphins,    elephants,    kangaroos

Ans:B,B


You suspect a virus has entered your computer. What will not be affected by the virus?
Options: CMOS,    Boot sector,    Floppy disks,    Program files

Ans:A ,A


Which DOS command allows you to compress existing disks and to create new compressed volumes?
Options: DEFRAG,    DBLSPACE,    SCANDISK,    MSAV

Ans:B ,B


Ozone holes are more pronounced at the
Options: NA

Ans:Poles,Poles


Which is the most widely used semiconductor?
Options: Copper,    Silicon,    Germanium,    All of the above

Ans:B ,B


670. 1912 mein al-hilaal samaachaar-patr kisane shuru kiya?
Options: NA

Ans: maulaana abulakalaam aajaad, maulaana abulakalaam aajaad


600. odisee’ kis raajy ka shaastreey nrty hai?
Options: NA

Ans: odisa , odisa


Which of the following is the default page setup orientation of slide in PowerPoint
Options: a. Vertical b. Landscape c. Portrait d. None of above

Ans: – B , – B


'OS' computer abbreviation usually means ?
Options: Order of Significance,    Open Software,    Operating System,    Optical Sensor

Ans:C,C


The access method used for cassette tape is
Options: Direct,    Random,    Sequential,    All of the above

Ans:C ,C


632. lan ka vistaar kya hoga?
Options: NA

Ans: lochal arai naitwork, lochal arai naitwork


955. kis mugal baadashaah kee mrtyu dillee mein pustakaalay kee seedhiyon se girakar huee?
Options: NA

Ans: humaayoon, humaayoon


Queries in Access can be used as
Options: a. view, change and analyze data in different ways b. a source of records for forms and reports c. Only a d. Both a and b

Ans:ndash; d,ndash; d


680. chauree-chaura kaand ke baad mahaatma gaandhee ne kaunasa aandolan sthagit kar diya tha?
Options: NA

Ans: asahayog aandolan, asahayog aandolan


The transistorized computer circuits were introduced in the
Options: First generation,    Second generation,    Third generation,    Fourth generation

Ans:B ,B


Which of the following is used for modulation and demodulation?
Options: modem,    protocols,    gateway,    multiplexer

Ans:A ,A


A high speed device used in CPU for temporary storage during processing is called
Options: A register,    A bus,    A databus,    All of the above

Ans:A,A


Laluni jot Pass is in which district
Options: kangra-chamba, lahul-spiti, kinnaur-gadvaal, chamba-bhatiyaat

Ans:lahaul spiti,lahaul spiti


. In MS Access “Lookup Wizard” is used to
Options: a. to select from previous values b. to select values from Excel Sheet c. to select value from another table d. Not a valid Data Type

Ans:– c,– c


where is tara devi mandir in hp
Options: kangra, shimla, solan, sirmour

Ans:shimla,shimla


. Which type of field is incremented automatically?
Options: a. Auto Elevate b. AutoNumber c. Auto Increment d. Auto Value

Ans:– b,– b


The functional difference between SR flip-flop and JK flip-flop is that
Options: JK flip-flop is faster than SR flip-flop,    JK flip-flop has a feed back path,    JK flip-flop accepts both inputs 1,    JK flip-flop does not require external clock

Ans:C ,C


Great Himalayan National Park
Options: Karnataka,Kerala,Himachal Pradesh,MadhyaPradesh

Ans:Himachal Pradesh,


If a computer's BIOS allows it, you can boot from a CD-ROM.
Options: True,    False,    ,    

Ans:A ,A


Backup and recovery procedures are primarily implemented to
Options: handle the contingency when a file gets corrupted,    to provide data redundancy,    to show different versions of data and programs,    All of the above

Ans:A ,A


With which network type will OSPF establish router adjacencies but not perform the DR/BDR election process?
Options: Point-to-point,    Backbone area 0,    Broadcast multi-access,    Non-broadcast multi-access

Ans:A ,A


The first mechanical calculator was invented in
Options: 1958,    1647,    1658,    1972

Ans:B ,B


Which of the following require large computer memory?
Options: Imaging,    Graphics,    Voice,    All of the above

Ans:D ,D

www.000webhost.com