National Remote Sensing Agency (NRSA) was setup in

Options: 1980,    1985,    1990,    1995


More Basic General Knowledge Related questions:

An aeroplane is flying horizontally with a velocity of 600 km/h and at a height of 1960 m. When it is vertically at a point A on the ground a bomb is released from it. The bomb strikes the ground at point B. The distance AB is
Options: 1200 m,    0.33 km,    3.33 km,    33 km


Want your logo in the same position on every slide, automatically? Insert it on the
Options: a. Handout master b. Notes master c. Slide master d. All of the above

Ans: – C , – C

People often call ______ as the brain of computer system
Options: A) Control Unit B) Arithmetic Logic Unit C) Central Processing Unit D) Storage Unit


The modern enterprise is interconnected internally and externally by the Internet, intranets, and other networks. Select the best fit for answer:
Options: Internetworked enterprise,    Information super highway,    Business applications of telecommunications,    Client/Server networks

Ans:A ,A

The river Godavari is often referred to as Vridha Ganga because
Options: it is the older river of India,    of its large size and extent among the peninsular rivers,    there are a fairly large number of pilgrimage centres situated on its banks,    its length is nearly the same as that of the river Ganges


The southernmost part of the world is
Options: Cape of Good Hope, Africa,    Cape of Horn, S. America,    Colombo, Sri Lanka,    Wellington, New Zealand


. Which of the following is required when more than one person uses a central computer at the same time?

Options: A) Terminal B) Light pen C) Digitizer D) Mouse


Which of the following is done in order a data in phase 1 of the system development life cycle?
Options: reviewing policies and procedures,    conducting interviews,    using questionnaires to conduct surveys.,    All of the above

Ans:D ,D

Vinod Kambli on his Test debut made 28 runs having a strike rate of :
Options: 63.58,    46.66,    12.55,    91.07


From which generation operating systems were developed?
Options: A) First B) Second C) Third D) Fourth


What is the best way to create another copy of a slide?
Options: a. Click the slide then press Ctrl+A and paste in new slide b. From Insert Menu choose Duplicate Slide c. Redo everything on a new slide that you had done on previous slide d. None of above

Ans: – B , – B

What command is used to display the top of the file?
Options: grep,    more,    head,    cat

Ans:C ,C

In which season do we need more fat?
Options: Rainy season,    Spring,    Winter,    Summer


Your customer tells you the print quality of their dot matrix printer is light then dark. Which of the following could cause the problem.
Options: Paper slippage,    Improper ribbon advancement,    Paper thickness,    Head position

Ans:B ,B

6.Which of the following is a database management system?
Options: (A)Ms-Word (B) Lotus 1-2-3 (C) Oracle (D) None of above 13

Ans:136. (C),136. (C)

The number of a topographic map is 47A/16/NW. Its scale must be
Options: 1 : 250,000,    1 : 100,000,    1 : 50,000,    1 : 25,000


bhoo-raajasv vyavastha
Options: NA

Ans: 835. mahaaraaja ranajeet sinh kee raajadhaanee kaunasee thee?, 835. mahaaraaja ranajeet sinh kee raajadhaanee kaunasee thee?

717. andamaan nikobaar dveep samooh mein kitane dveep hain?
Options: NA

Ans: 324, 324

When an input electrical signal A=10100 is applied to a NOT gate, its output signal is
Options: 01011,    10001,    10101,    00101

Ans:A ,A

. .... runs on a computer hardware and serves as a platform for other system to run on
Options: a. Operating system b. Application system c. System software d. All of above

Ans: a, a

4.Spoofing attack is
Options: (A)an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network. (B) a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access. (C) a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators. (D) None of these 1

Ans:14. (C),14. (C)

doon valley in which district
Options: solan, kullu, lahaul , kinnaur


leh (jammoo-kashmeer)
Options: NA

Ans: 824. kaunasa grah prthvee kee judavaan bahan kahalaata hai?, 824. kaunasa grah prthvee kee judavaan bahan kahalaata hai?

3.Which one is not true for risk analysis ?
Options: (A)It estimate risks (B) It removes risks (C) It reduces risks (D) It develops risks 5

Ans:53. (D),53. (D)

The largest and the oldest museum of India is located in the state/union territory of
Options: New Delhi,    West Bengal,    Andhra Pradesh,    Uttar Pradesh


3.Software testing is
Options: (A)Associated with functionality of software and constraints of operations defined. (B) It consists of computer programs, configuration files that are used to set up these programs system documentation for describing to structure of the system and used documentation that describes use of the system. | 109 (C) It involves executing an implementation of the software with test data and examines the outputs of the software and its operational behavior to check that it is performing as required (D) None of these 26

Ans:263. (C),263. (C)

. After entering all fields required for a table, if you realize that the third field is not needed, how will you remove?
Options: a. You need to delete the whole table. There is no method to remove a particular field only. b. Delete all the fields from third downwards and reenter the required fields again. c. Select the third column in datasheet view then delete d. Select the third row in table design view then delete

Ans:3 – d ,3 – d

.Arrays are best data structures
Options: A)for relatively permanent collections of data b.for the size of the structure and the data in the structure are constantly changing c.for both of above situation d.for none of above situation


. To instruct Word to stop bulleting paragraphs, do any of the following except _____.
Options: a. press the enter key twice b. click the Undo button on the Standard toolbar c. press the backspace key to remove the bullet d. click the Bullets button on the Formatting toolbar

Ans:– B,– B

28. svaamee dayaanand sarasvatee ka mool naam kya tha ?
Options: NA

Ans:moolashankar ,moolashankar

3.Relative address in memory management is
Options: (A)Independent of some known point (B) Dependent to some known point (C) Actual location in the main memory (D) None of these. 7

Ans:73. (B),73. (B)

Short-term finance is usually for a period ranging up to
Options: 5 months,    10 months,    12 months,    15 months


Neora Valley National Park
Options: West Bengal,Kerala,Tripura,MadhyaPradesh

Ans:West Bengal,

The soil used for cutting bricks, use in the construction of houses is
Options: black soil,    laterite soil,    alluvial soil,    saline and alkaline soils


Batch processing is appropriate if
Options: a . large computer system is available b . only a small computer system is avilbale c . only a few transactions are involved D . none of the above

Ans:D,none of the above

Plants synthesis protein from
Options: starch,    sugar,    amino acids,    fatty acids


The intel 8086 microprocessor is a ___processor?
Options: NA

Ans:16 bit ,16 bit

where is lippa matth temple
Options: chamba, kinnaur, lahul spiti, kullu


When connecting a ribbon cable to a connector, how do you know which direction to plug it in?
Options: The red line in the cable goes to the highest pin number,    The colored line in the cable goes to pin #1,    It does not matter,    The blue or red line in the cable goes away from the power connector

Ans:B ,B

490. sikh dharm kee sthaapana kisane kee thee?
Options: NA

Ans: guru naanakadev ne, guru naanakadev ne

Which one of the following principles best describes the basic operation of an electromagnet?
Options: Current is induced in a conductor that is moving through a magnetic field,    Like magnetic poles repel, while unlike poles attract,    Current flowing through a conductor generates a magnetic field,    Like magnetic poles attract, while unlike poles repel

Ans:C ,C

. Press the enter key in all of the following circumstances except _____.
Options: a. to insert a blank line into a document b. when the insertion point reaches the right margin c. to begin a new paragraph d. in response to certain Word commands

Ans: – B , – B

You are trying to decide which type of network you will use at your office, and you want the type that will provide communication and avoid collisions on the cable. Which of the following is the best choice?
Options: Token-Ring,    CSMA/CD,    Ethernet,    CSMA/CA

Ans:A ,A

The preamble declares India as a sovereign state which implies
Options: India is free to conduct her internal affairs,    India is free to conduct her external affairs,    India is free to conduct here internal as well as external affairs,    None of the above


The other Col# are inactive when you’ve select 3 columns. How will you activate those boxes?
Options: a. double click on spacing box b. double click on inactive Col# c. Remove mark from Line between checkbox d. Remove mark from Equal Column Width check box

Ans:– D,– D

The model base cannot be prepared until
Options: the computer has been selected,    the MIS staff has been acquired and organized,    the preparation of physical facilities,    both (a) and (b)

Ans:D ,D

Which of the following is a graphic representation of the modules in the System and the interconnection between them
Options: Pie chart,    Flow chart,    Structural chart,    System chart

Ans:C ,C

. Microsoft PowerPoint can insert objects from the following add-ins?
Options: a. Equation Editor b. Organization Chart c. Photo Album d. All of these

Ans:8 – D ,8 – D

Pyorrhoea is a disease of the
Options: nose,    gums,    heart,    lungs


Most commonly used operating system is the super computers is
Options: NA

Ans:Linux OS,Linux OS