Which of the following groups of rivers originate from the Himachal mountains?

Options: Beas, Ravi and Chenab,    Ravi, Chenab and Jhelum,    Sutlej, Beas and Ravi,    Sutlej, Ravi and Jhelum


More Indian Geography Related questions:

Which industry is the leading user of robots?
Options: Chemical industry,    Automobile industry,    Electronic industry,    Shipping industry

Ans:B ,B

The data-link layer, in reference to the OSI model, specifies
Options: data link procedures that provide for the exchange of data via frames that can be sent and received,    the interface between the X.25 network and packet mode device,    the virtual circuit interface to packet-switched service,    All of the above

Ans:A ,A

. Dot-matrix is a type of
Options: A) Tape B) Printer C) Disk D) Bus


232. netradaan mein netr ke kis bhaag ka daan kiya jaata hai?
Options: NA

Ans: korniya, korniya

9.In Excel data marker on a chart are linked to data points in a worksheet, therefore,
Options: (A)You can automatically apply formatting to a data series (B) You can change the position of a data marker and automatically change the data point value in the worksheet (C) You can change a data print value and automatically are draw the chart (D) (A)and (B)

Ans:9. (B),9. (B)

0.Window class, onKeyUp/3, defines
Options: (A)a key on the keyboard is pressed (B) a key on the keyboard is released (C) a mouse button was double clicked (D) the user clicks on a window 3

Ans:30. (B),30. (B)

A feasibility study
Options: includes a statement of the problems,    considers a single solutions,    both (a) and (b),    a list of alternative solution considered

Ans:A ,A

Which of the following is not a basic element within the microprocessor?
Options: microcontroller,    arithmetic-logic unit (ALU),    temporary register,    accumulator

Ans:A ,A

The velocity of sound in air (under normal condition) is
Options: 30 m/sec,    320 m/sec,    343 m/sec,    3,320 m/sec


A byte is consist of _____ bits
Options: two,    four,    eight,    ten

Ans:C ,C

8.Change-oriented identification
Options: (A)One system is designed as the system controller and has responsibility for managing the execution of other subsystems. (B) Each system is named as in attributebased identification and associated with one or more change requests. (C) An object class inheritance diagram, how entities have common characteristics. (D) The objective of this software development is zero-defect software. 13

Ans:138. (B),138. (B)

1.A vulnerability scanner is
Options: (A)a prepared application that takes advantage of a known weakness. (B) a tool used to quickly check computers on a network for known weaknesses. (C) an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network. (D) a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.

Ans:. (B),. (B)

The hardware in which data may be stored for a computer system is called
Options: Registers,    Bus,    Control unit,    Memory

Ans:D ,D

252. vishv mein chaandee ka sabase bada utpaadak desh kaunasa hai?
Options: NA

Ans: maiksiko, maiksiko

. Which of the following function will use to find the highest number in a series of number?
Options: a. MAX(B1:B3) b. MAXIMUM (B1:B3) c. HIGH (B1:B3) d. HIGHEST(B1:B3)

Ans:– a,– a

who was last rular of sibba rajya
Options: shyam singh, durga singh, bhoop singh, umed singh

Ans:shyam singh,shyam singh

The largest gold producing country in the world(in 2006) is
Options: China,    Canada,    South Africa,    USA


The expert system developed at MIT to solve mathematical problems is known as:
Options: RAND,    ISIS,    MACSYMA,    MOLGEN

Ans:C ,C

. The box on …. that allows you to choose where to go and is located below the standard toolbar
Options: a. System menu b. Address bar c. Menu bar d. None of these

Ans:7 – b ,7 – b

The Memory Buffer Register (MBR)
Options: is a hardware memory device which denotes the location of the current instruction being executed.,    is a group of electrical circuits (hardware), that performs the intent of instructions fetched from memory.,    contains the address of the memory location that is to be read from or stored into.,    contains a copy of the designated memory location specified by the MAR after a "read" or the new contents of the memory prior to a "write".

Ans:D ,D

9.ASCII is
Options: (A)A standard coding system for computers (B) Hardware device (C) Software (D) None of these 9

Ans:89. (A),89. (A)

The headquarters of UNHCR is located at
Options: New York,    Rome,    Geneva,    London


9.If all the application processing and data management is carried out on the server and client is only responsible for running the system then this is referred as
Options: (A)Client-server model (B) Thin client server model (C) Thick client server model (D) None of these 10

Ans:99. (B),99. (B)

Options: kangra, chamba, lahul, kinnaur


If you wanted to deny FTP access from network to network but allow everything else, which of the following command strings is valid?
Options: access-list 110 deny to network eq ftp access-list 111 permit ip any,    access-list 1 deny ftp any any,    access-list 100 deny tcp eq ftp,    access-list 198 deny tcp eq ftp access-list 198 permit ip any

Ans:D ,D

. If you want to have a blank line after the title in a worksheet, what is the best thing for you to do?
Options: a. Re-format the spreadsheet b. Insert a row c. Increase the column width d. Use the spacebar

Ans:– b,– b

What is the general name of the device which produces hardcopy graphics?
Options: COM,    Plotter,    Printer,    Microfilm


. You can use the format painter multiple times before you turn it off by
Options: a. You can use the format painter button only one time when you click it b. Double clicking the format painter button c. Pressing the Ctrl key and clicking the format painter button d. Pressing Alt key and clicking the format painter button

Ans:– b,– b

Binary search algorithm can not be applied to
Options: a. sorted linked list b. sorted binary trees c. sorted linear array d. pointer array

Ans:- a,- a

During preventative maintenance on a dot matrix printer, do NOT lubricate:
Options: Platen assembly,    Print head pulley,    Print head pins,    Paper advance gear bushings

Ans:C ,C

Who invented Fountain Pen?
Options: John J. Loud,    Sir Frank Whittle,    Lewis E. Waterman,    Kirkpatrick Macmillan


Top-down programming is
Options: a group of related fields,    a map of the programmer's view of the data,    an approach in which the top module is first tested then program modules are added from the highest level to the lowest level,    a series or group of components that perform one or more operations of a more complex system

Ans:C ,C

Which file is used to configure which filesystems are mounted?
Options: /etc/mount.sys,    /etc/filesys,    /etc/sysconfig,    /etc/fstab

Ans:D ,D

The memory address of fifth element of an array can be calculated by the formula
Options: a. LOC(Array[5]=Base(Array)+w(5-lower bound), where w is the number of words per memory cell for the array b. LOC(Array[5])=Base(Array[5])+(5-lower bound), where w is the number of words per memory cell for the array c. LOC(Array[5])=Base(Array[4])+(5-Upper bound), where w is the number of words per memory cell for the array d. None of above

Ans:- a,- a

darang ghati 1 and darang ghati 2 wild life senctuary is in which district
Options: kangra, shimla, solan, sirmour


Which is NOT an acceptable method of distributing small power outlets throughout an open plan office area?
Options: Power Poles,    Power Skirting,    Flush Floor Ducting,    Extension Cords


. Which of the following options is appropriate to show the numbers 9779851089510 in a cell?
Options: a. Enclose the number is brackets b. Place the character T before the number c. Place the character TX before the number d. Apply the Text format in the cell and type the numbers

Ans:– d,– d

. The ability to combine name and addresses with a standard document is called _________ 
Options: a. document formatting b. database management c. mail merge d. form letters

Ans:–  C,–  C

5.Which of the following methods cannot be used to edit the contents of a cell In Excel?
Options: (A)Press the Alt key (B) Clicking the formula bar (C) Pressing the F2 key (D) Double clicking the cell 16

Ans:165. (A),165. (A)

A language for simulating models of business activity is:
Options: SPSS,    DL/1,    GPSS,    COBOL

Ans:C ,C

8.In Windows operating system the shortcut key CTRL+I is used for
Options: (A)Open the Favorites bar (B) Open the Open dialog box (C) Start another instance of the browser with the same Web address (D) Open the Open dialog box, the same as CTRL+L 4

Ans:48. (A),48. (A)

The first two steps in the ____ process are to establish goals or standards, and then measure actual performance.
Options: expert,    centers,    control,    MIS

Ans:C ,C

In C, if you pass an array as an argument to a function, what actually gets passed?
Options: Value of elements in array,    First element of the array,    Base address of the array,    Address of the last element of array

Ans:C ,C

7.The FIFO algorithm
Options: (A)executes first the job that last entered the queue (B) executes first the job that first entered the queue (C) executes first the job with the least processor needs (D) executes first the job that has been in the queue the longest 22

Ans:227. (B),227. (B)

‘Encryption’ in cyber world means
Options: NA

Ans:Algorithmic alteration of password into scrabbled date to prevent access,Algorithmic alteration of password into scrabbled date to prevent access

Of the gross tax revenue of the Union Government the indirect taxes account for nearly
Options: 70 per cent,    75 percent,    65 percent,    60 percent


Dull mela belongs to which district
Options: kangra, shimla, solan, sirmour


5.In Access to switch between Edit mode (with insertion point displaye(D)
Options: (A)F2 (B) F4 (C) F5 (D) F6 3

Ans:35. (A),35. (A)

You are working with a class C network. You are required to configure it for five subnets, each of which will support 25 nodes. What subnet should you use?

Ans:B ,B

Writer of himalaya putra kinnaur ki lok gathaye
Options: akshar singh, shanta kumar, gareeb khan, sharab negi

Ans:sharab negi,sharab negi