Which of the following is NOT written by Munshi Premchand?

Options: Gaban,    Godan,    Guide,    Manasorovar


More Books and Authors Related questions:

What will be the output of the program (sample.c) given below if it is executed from the command line? cmd> sample Jan Feb Mar /* sample.c */ #include<stdio.h> #include<dos.h> int main(int arc, char *arv[]) { int i; for(i=1; i<_argc; i++) printf("%s ", _argv[i]); return 0; }
Options: No output,    sample Jan Feb Mar,    Jan Feb Mar,    Error

Ans:C ,C

If you do not know the current time, which command will you use to display the time?
Options: COPY,    VER,    TIME,    FORMAT

Ans:C ,C

3.In Windows operating system move the insertion point to the beginning of the previous word
Options: (A)Shortcut CTRL+RIGHT ARROW (B) Shortcut CTRL+LEFT ARROW (C) Shortcut CTRL+DOWN ARROW (D) None of these 3

Ans:33. (B),33. (B)

50. Tabs stop position cannot be the following alignment
Options: a. Decimal Alignment b. Center Alignment c. Bar Alignment d. Justify Alignment

Ans:–  D ,–  D

What is a URL?
Options: A computer software program,    A type of UFO,    The address of a document or "page" on the World Wide Web,    An acronym for Uniform Resources Learning


In what year did the Symantec Corporation first release Norton Antivirus?
Options: 1990,    1995,    1988,    1997


The file structure that redefines its first record at a base of zero uses the term:
Options: relative organization,    key fielding,    dynamic reallocation,    hashing

Ans:A ,A

The mean distance of the earth from the sun is approximately
Options: 149,502,000 km,    150,503,000 km,    148,000,000 km,    150,000,000 km


9.Cost of operation is
Options: (A)Process of estimating the costs associated with software development projects that include the effort, time, and labor required. (B) Overall cost of maintaining a computer system that includes the costs associated with personnel / training/ maintenance of hardware and software/ requirements growth. (C) Overall cost of operating a computer system that includes the costs associated with personnel / training / system operations. (D) Overall cost of a computer system to an organization that includes the costs associated with operating/ maintaining the system, and the lifetime of operational use of the system. 16

Ans:159. (C),159. (C)

You have a class A network address with 40 subnets, but are required to add 60 new subnets very soon. You would like to still allow for the largest possible number of host IDs per subnet. Which subnet mask should you assign?

Ans:D ,D

In which language did 'Dr. Masti Venkatesh Iyengar' write?
Options: Malayalam,    Tamil,    Telugu,    Kannada


_____is an abbreviation for binary digit.
Options: 0 and 1,    bingit,    base,    bit

Ans:D ,D

HMP (Host Monitoring Protocol) is:
Options: a TCP/IP protocol used to dynamically bind a high level IP Address to a low-level physical hardware address,    a TCP/IP high level protocol for transferring files from one machine to another.,    a protocol used to monitor computers,    a protocol that handles error and control messages

Ans:C ,C

. Underlined character on the menu or dialog box known as
Options: a. Hot spot b. Hot key c. Pane d. Underline word

Ans:4 – b ,4 – b

7.Case-based learning is
Options: (A)A class of learning algorithm that tries to find an optimum classification of a set of examples using the probabilistic theory. (B) Any mechanism employed by a learning system to constrain the search space of a hypothesis. 116 | (C) An approach to the design of learning algorithms that is inspired by the fact that when people encounter new situations, they often explain them by reference to familiar experiences, adapting the explanations to fit the new situation. (D) None of these

Ans:7. (C),7. (C)

Which of the following toolbars provide different options in various master views?
Options: a. Common tasks toolbar b. Drawing toolbar c. Formatting toolbar d. Standard toolbar

Ans: – A , – A

Optic fibres are mainly used for which of the following?
Options: Musical instruments,    Food industry,    Weaving,    Communication


. How to create columns in Word 2010?
Options: Columns button on the Page Setup group in Page Layout ribbon B. Columns button on the Pages group in Insert ribbon C. Columns button on the Styles group in Home ribbon D. Columns button on the Show group in View ribbon

Ans:– A ,

ODL supports which of the following types of association relationships?
Options: Unary,    Unary and Binary,    Unary and Binary and Ternary,    Unary and Binary and Ternary and higher

Ans:B ,B

Status indicators are located on the
Options: a. Vertical scroll bar b. Horizontal scroll bar c. Formula bar d. Standard toolbar

Ans:#8211; c,#8211; c

. An operating system version designed for use with a tablet PC is Microsoft Windows XP
Options: a. Home edition b. Media center edition c. Tablet PC edition d. None of the above

Ans: c, c

23. What is the default font size of a new Word document based on Normal template in Word 2003?
Options: a. 10 pt b. 12 pt c. 14 pt d. None of above

Ans:– B ,– B

winner of first veer chakra in HP
Options: shri gangveer sing, sunil sharma, jaidev kiran,havaldar topge

Ans:havaldar topge,havaldar topge

69. eks-re ka aavishkaar kisane kiya tha?
Options: NA

Ans: raantajan, raantajan

. when working in the page break preview, you can
Options: a. view exactly where each page break occurs b. add or remove page breaks c. change the print area d. all of above

Ans:– d,– d

peer panjaal surang (jammoo-kashmeer)
Options: NA

Ans: 877. kshetraphal kee drshti se bhaarat ka sabase bada jila kaun-sa hai?, 877. kshetraphal kee drshti se bhaarat ka sabase bada jila kaun-sa hai?

. UNIVAC was a first generation computer. What is its full form?

Options: A) Universal Automatic Computer B) Universal Array Computer C) Unique Automatic Computer D) Unvalued Automatic Computer


0.To import text from a word document that uses headings into a PowerPoint presentation:
Options: (A)This can not be done in PowerPoint (B) Click Insert, Slides from Outline (C) Click Import, Word Document Headings (D) Click File, New, Presentation from Word Headings 8

Ans:80. (B),80. (B)

. Which setting you must modify to print a report using letterhead?
Options: a. Group b. Margin c. Section d. Orientation

Ans:– b,– b

1.Which of the following was (were) not used in first-generation computers?
Options: (A)vacuum tubes (B) punch cards (C) magnetic core (D) all of the above 13

Ans:131. (C),131. (C)

A smart solid-state sensor is:
Options: one that integrates both logic and a solid-state sensor into one unit.,    one that has two or three substrates,    not available today,    All of the above

Ans:A ,A

7.In Excel the following will not cut information
Options: (A)Pressing Ctrl + C (B) Selecting Edit>Cut from the menu (C) Clicking the Cut button on the standard (D) Pressing Ctrl+X 9

Ans:97. (A),97. (A)

. If you select Insert >> Picture >> From File
Options: a.  You can insert pictures and clipArts b.  You can insert clipArts only c.  You can insert pictures only d.  None of above

Ans:6 – C ,6 – C

. Which is the first electronic digital computer?
Options: A) ENIAC B) MARK I C) Z3 D) ABC


4.User-visible register
Options: (A)Enables machine language programmer to minimize main memory reference by optimizing register use. (B) Enables assembly language programmer to minimize main memory reference by optimizing register use. (C) A and B both true. (D) A and B both false. 1

Ans:14. (C),14. (C)

. Which is the valid data type in Access?
Options: a. Number b. Text c. Currency d. All of the above

Ans:– d,– d

Which transmission mode is used for data communication along telephone lines?
Options: Parallel,    Serial,    Synchronous,    Asynchronous

Ans:B ,B

A characteristic of card systems is:
Options: slowness in processing data,    using cards as records of transactions,    needing a larger DP staff,    all the above


Many data communication networks have been established which provide a wealth of on-demand information services to people at home. What is the name of the system which provides an interactive, graphics-rich service that permits user to select what they want?
Options: Teletex system,    Fax system,    Videotex system,    Microwave system

Ans:C ,C

How does a host on an Ethernet LAN know when to transmit after a collision has occurred? In a CSMA/CD collision domain, multiple stations can successfully transmit data simultaneously. In a CSMA/CD collision domain, stations must wait until the media is not in use before transmitting. You can improve the CSMA/CD network by adding more hubs. After a collision, the station that detected the collision has first priority to resend the lost data. After a collision, all stations run a random backoff algorithm. When the backoff delay period has expired, all stations have equal priority to transmit data.
Options: 1 and 3,    2 and 4,    1,3 and 4,    2 and 5

Ans:D ,D

. Which of the following is considered first computer in the world?

Options: A) Z3 B) ABC C) Mark I D) None of abobe


In the language of the computer profession, one thousand position of main storage is represented with the letter
Options: K,    L,    M,    C

Ans:A ,A

Rainbow is due to
Options: absorption of sunlight in minute water droplets,    diffusion of sunlight through water droplets,    ionisation of water deposits,    refraction and reflection of sunlight by water droplets


Command Interpreter is also known as
Options: Prompt B. Shell C. Command D. DOS Prompt

Ans:– B ,

A software that allows a personal computer to pretend it as a terminal is
Options: auto-dialing,    bulletin board,    modem,    terminal emulation

Ans:A ,A

Who founded Chhatipur Kila
Options: jagat singh, vijay chand, heera chand, jai chand

Ans:B,Vijay chand

Which of the following cups/trophies is associated with football?
Options: Davis Cup,    Champions trophy,    Santosh Trophy,    Deodhar Trophy


A memory that holds micro programs is
Options: Core memory,    ROM,    RAM,    Control memory

Ans:B ,B

8.Grey hat is
Options: (A)hacker breaks security for altruistic or at least non-malicious reasons. (B) hacker of ambiguous ethics and/or borderline legality, often frankly admitted. (C) someone outside computer security consulting firms that are used to bug test a system prior to its launch, looking for exploits so they can be closed. (D) None of these 16 | 1

Ans:18. (B),18. (B)

600. odisee’ kis raajy ka shaastreey nrty hai?
Options: NA

Ans: odisa , odisa