The Central Rice Research institute is located at

Options: Rajamundry,    Madra,    Cuttack,    Cochin


More Famous Places Related questions:

9.In Excel you can select a single range of cells by
Options: (A)Clicking the upper-left cell in a group of cells and then pressing the Shift key while clicking the lower right cell in a group of cells (B) Pressing the Ctrl key while dragging over the desired cells (C) Pressing the Shift key and an arrow key (D) Dragging over the desired cells 9

Ans:89. (D),89. (D)

Phawngpui Blue Mountain National Park
Options: Karnataka,Mizoram,Tripura,MadhyaPradesh


4.This hacker is a hacker of ambiguous ethics and/or borderline legality, often frankly admitted.
Options: (A)White hat (B) Grey hat (C) Blue hat (D) None of these

Ans:4. (B),4. (B)

What will be the output of the program? #include<stdio.h> #define MAN(x, y) ((x)>(y)) ? (x):(y); int main() { int i=10, j=5, k=0; k = MAN(++i, j++); printf("%d, %d, %d\n", i, j, k); return 0; }
Options: 12, 6, 12,    11, 5, 11,    11, 5, Garbage,    12, 6, Garbage

Ans:A ,A

6.Projection pursuit is
Options: (A)The result of the application of a theory or a rule in a specific case (B) One of several possible enters within a database table that is chosen by the designer as the primary means of accessing the data in the table. (C) Discipline in statistics that studies ways to find the most interesting projections of multi-dimensional spaces (D) None of these 6

Ans:66. (C),66. (C)

In Computer System Scanner is ______ Device?
Options: Input B. Output         C. Both D. None

Ans:– A ,

In Microsoft Word move the insertion point to the beginning of the next paragraph
Options: (A) Shortcut CTRL+RIGHT ARROW (B) Shortcut CTRL+LEFT ARROW (C) Shortcut CTRL+DOWN ARROW (D) None of these 23.

Ans:22. (A),22. (A)

When was Monopoly created?
Options: 1940s,    1930s,    1920s,    1950s


CORN FLAKES - Who made them first?
Options: Nabisco,    Kellogg,    Quaker,    Archers


A connection between two end points, either physical or logical, over which data may travel in both directions simultaneously is called _____
Options: Dump point,    Datalink,    Duplex,    Networks

Ans:C ,C

Point out the error in the program in 16-bit platform? #include<stdio.h> int main() { struct bits { int i:40; }bit; printf("%d\n", sizeof(bit)); return 0; }
Options: 4,    2,    Error: Bit field too large,    Error: Invalid member access in structure

Ans:C ,C

What was the bowling figures (O-M-R-W ) of Anil Kumble in his ODI debut against Sri Lanka?
Options: 1.1-0-27-0,    10-7-10-5,    10-0-42-1,    8.2-2-33-2


What will be the output of the program in DOS (Compiler - Turbo C)? #include<stdio.h> double i; int main() { (int)(float)(char) i; printf("%d", sizeof((int)(float)(char)i)); return 0; }
Options: 1,    2,    4,    8

Ans:B ,B

519. amarakantak kis nadee ka udgam sthal hai?
Options: NA

Ans: narmada, narmada

In India, inflation measured by the
Options: Wholesale Price Index number,    Consumers Price Index for urban non-manual workers,    Consumers Price Index for agricultural workers,    National Income Deflation


To which country did the first Secretary-General of the UN belong?
Options: Austria,    Sweden,    Burma,    Norway


The term hit wicket in cricket refers to
Options: when the bowler bowls out three batsman with three successive balls,    when the batsman intercepts the ball with his leg or any part of his body between the wicket,    when the batsman, while hitting the ball, strikes his own wicket with his bat or body and is declared out,    None of the above


. The program that is responsible for loading the operating system into RAM is called
Options: a. BIOS b. Bootstrap program c. Device driver d. Supervisor program

Ans:8 – b ,8 – b

Which command will clear all the translations active on your router?
Options: show ip nat translations,    show ip nat statistics,    debug ip nat,    clear ip nat translations *

Ans:D ,D

3.Rootkit is
Options: (A)an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network. (B) a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access. (C) a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators. (D) None of these 1

Ans:13. (B),13. (B)

114. hamaaree aakaashaganga ka naam kya hai ?
Options: NA

Ans: dugdh mekhala ya milkee ve, dugdh mekhala ya milkee ve

0.Hidden knowledge referred to
Options: (A)A set of databases from different vendors, possibly using different database paradigms (B) An approach to a problem that is not guaranteed to work but performs well in most cases. (C) Information that is hidden in a database and that cannot be recovered by a simple SQL query. (D) None of these 4

Ans:40. (C),40. (C)

The function(s) of the Storage Assignment is (are)
Options: to assign storage to all variables referenced in the source program.,    to assign storage to all temporary locations that are necessary for intermediate results.,    to assign storage to literals, and to ensure that the storage is allocate and appropriate locations are initialized.,    all of the above

Ans:D ,D

A logical description of some portion of database that is required by a user to perform task is called as
Options: System View B. User View C. Logical View D. Data View

Ans:– B ,

Programming a robot by physically moving it through the trajectory you want it to follow is called:
Options: contact sensing control,    continuous-path control,    robot vision control,    pick-and-place control

Ans:B ,B

Who suggested that most of the mass of the atom is located in the nucleus?
Options: Thompson,    Bohr,    Rutherford,    Einstein


There were widespread risings against the British in the 1820s. Which one of the following did not revolt in the 1820s?
Options: Santhals,    Ahoms,    Pagal Panthis,    Ramosi


Which of the following is not an advantage of magnetic disk storage?
Options: The access time of magnetic disk is much less than that of magnetic tape,    Disk storage is longer lasting than magnetic tape,    Disk storage is less expensive than tape storage,   None of the above

Ans:D,None of the above

What is the population density of Manipur?
Options: 107/sq. km,    207/sq. km,    307/sq. km,    407/sq. km


The National Chemical Laboratory is situated in
Options: New Delhi,    Bangalore,    Pune,    Patna


. Fifth generation computer is also known as
Options: A) Knowledge information processing system B) Very large scale integration (VLSI) C) Both of above D) None of above


Which of the following is not a valid data type in Excel?
Options: Number B. Character C. Label D. Date/Time

Ans:– B ,

The strongest bonds exist between the particles found within
Options: metamorphic rocks,    igneous rocks,    sedimentary rock,    all have similar strength of bonds


9.An unpaged cache associates disk domains with the address of the read and continues for a specific length. The major disadvantage of unpaged cache is that
Options: (A)it allows cache domain to contain redundant data (B) it does not allow writes to be cached (C) its access time is greater than that of paged caching (D) read ahead cache domain blocks are necessarily fixed in size 84 | 29

Ans:289. (A),289. (A)

Ctrl + S
Options: a. Save Document with different name b. Save Document with same name c. Save Document and Close Word Application d. Save Document and Print whole Pages

Ans:–  B,–  B

Which term is not used to describe the memory component of a computer?
Options: ROM,    PROM,    RAM,    SAM

Ans:D ,D

A computer performs operations by comparing data items and then, depending on the results, follows predetermined course of action. What are such operations called?
Options: Sequential,    Logical,    Digital,    Physical

Ans:B ,B

4.Human Computer Interaction is
Options: (A)It is concerned with the design, evaluation, and implementation of interactive computing systems for human use and with the study of major phenomena surrounding them. (B) Extent to which a software product fulfills its purpose without wasting user’s time/ energy/degrading their morale. (C) Human behavior that results in the introduction of faults into a system. (D) None of these 21

Ans:214. (A),214. (A)

Which of the following is not Modification of the Database
Options: Deletion B. Insertion C. Sorting D. Updating

Ans:– C ,

An up/down counter used in a TI510PC has three inputs. Which of the following is not one of them?
Options: Count up,    Count out,    Reset.,    Count down

Ans:B ,B

When was the International Monetary Fund established?
Options: 1945,    1946,    1947,    1950


Vadik name of raviriver
Options: arjikia, asikini, purushani, sutudri, kaalindi


Thevenin theorem replaces a complicated circuit facing a load by an
Options: Ideal voltage source and parallel resistor,    Ideal current source and parallel resistor,    Ideal voltage source and series resistor,    Ideal current source and series resistor

Ans:C ,C

Ctrl + J
Options: a. Align Justify b. Insert Hyperlink c. Search d. Print

Ans:–  A,–  A

Which of the following connectivity devices is used to extend a network on a purely mechanical basis?
Options: Gateway,    Switch,    Router,    Active hub

Ans:D ,D

Primary storage is _____ as compared to secondary storage.
Options: Slow and inexpensive,    Fast and inexpensive,    Fast and expensive,    Slow and expensive

Ans:C ,C

In CRC the quotient at the sender
Options: becomes the dividend at the receiver,    becomes the divisor at the receiver,    is discarded,    is the remainder

Ans:C ,C

The salary of the Governor is charged on
Options: NA

Ans:The consolidated fund of the state,The consolidated fund of the state

Which of the following memory is capable of operating at electronics speed?
Options: Semiconductor memory,    Magnetic disks,    Magnetic drums,    Magnetic tapes


6.An identification field in a record. Select the best fit for answer
Options: (A)Record (B) File (C) Database (D) Key field 4

Ans:46. (C),46. (C)