South Africa joined the Commonwealth as 51st member in


Options: May 1993,    May 1994,    May 1995,    May 1996

Ans:B,B

More Basic General Knowledge Related questions:


6.Virtual memory is
Options: (A)simple to implement (B) used on all major commercial operating systems (C) less efficient in utilization of memory (D) useful when fast I/O devices are not available 23

Ans:236. (C),236. (C)


. Page stealing
Options: a. Is a sign of an efficient system b. Is taking page frame from other working sets c. Should be the turning goal d. Is taking layer disk space for page in page out

Ans:9 – b ,9 – b


Order-filling activity in the physical system is triggered by the
Options: manufacturing information system,    order entry subsystem,    billing subsystem,    accounts receivable subsystem

Ans:C ,C


4.A critical section is a program segment
Options: (A)which should run in a certain specified amount of time (B) which avoids deadlocks (C) where shared resources are accessed (D) which must be enclosed by a pair of semaphore operations. 24

Ans:244. (C),244. (C)


This part-time race car driver invented the bucket seat in 1969. Who was he??
Options: Steve McQueen,    Harrison Frazier,    Paul Newman,    John Wayne

Ans:A,A


.   The boxes that are displayed to indicate that the text, pictures or objects are placed in it is called ….
Options: a. Placeholder b. Auto text c. Text box d. Word art

Ans:6 – A ,6 – A


22. panjaab kesaree’ kise kaha jaata hai ?
Options: NA

Ans: laala laajapat raay , laala laajapat raay


A report form
Options: appears on the computer monitor during data entry,    is used during report generation to format data,    both (a) and (b),    All of the above

Ans:B ,B


. In a computer _____ is capable to store single binary bit.
Options: A) Capacitor B) Flip flop C) Register D) Inductor

Ans:B,B


What logic function is obtained by adding an inverter to the inputs of an AND gate?
Options: OR,    NAND,    XOR,    NOR

Ans:D ,D


Several objectives are required to achieve a successful data base management program. These are availability of data, quality of data, and
Options: compatibility of data,    transmission of data,    desirability of data,    up-to-date data

Ans:D ,D


. Which is not utility program?
Options: a. Backup b. Scandisk c. Data recovery d. XCOPY

Ans:8 – d ,8 – d


What George Westinghouse invented?
Options: Light bulb,    Electric razor,    Refrigerator,    Railway air brakes

Ans:D,D


319. kainsar ke upachaar mein prayukt utkrsht gais kaunasee hai?
Options: NA

Ans: redaan, redaan


Point out the error in the program? #include<stdio.h> int main() { struct emp { char name[25]; int age; float bs; }; struct emp e; e.name = "Suresh"; e.age = 25; printf("%s %d\n", e.name, e.age); return 0; }
Options: Error: Lvalue required/incompatible types in assignment,    Error: invalid constant expression,    Error: Rvalue required,    No error, Output: Suresh 25

Ans:A ,A


8.Subject to probability of hazard, arising will not raise cost factors is referred as
Options: (A)Abstractness (B) Acceptable risk (C) Acceptance testing (D) None of these 10

Ans:108. (B),108. (B)


Using the following illustration, what would be the IP address of E0 if you were using the eighth subnet? The network ID is 192.168.10.0/28 and you need to use the last available IP address in the range. The zero subnet should not be considered valid for this question.
Options: 192.168.10.142,    192.168.10.66,    192.168.100.254,    192.168.10.143

Ans:A ,A


One advantage of a PC in industrial control is that it:
Options: has a reliable long life compared to relay logic,    is very difficult for the inexperienced programmer to understand,    is unreliable because there are no moving parts,    All of the above

Ans:A ,A


7.In Access to Move down one line
Options: (A)F4 or ALT+DOWN ARROW (B) DOWN ARROW (C) PAGE DOWN (D) F9

Ans:17. (B),17. (B)


. To change the screen saver you can go from
Options: a. Control panel display b. Right click in desktop and properties c. Both of above d. None of these

Ans:0 – c ,0 – c


. What are the columns in a Microsoft Access table called?
Options: a. Rows b. Records c. Fields d. Columns

Ans:1 – c ,1 – c


What will be the output of the program (sample.c) given below if it is executed from the command line (Turbo C in DOS)? cmd> sample 1 2 3 /* sample.c */ #include<stdio.h> int main(int argc, char *argv[]) { int j; j = argv[1] + argv[2] + argv[3]; printf("%d", j); return 0; }
Options: 6,    sample 6,    Error,    Garbage value

Ans:C ,C


A program used to detect overall system malfunction is
Options: System analysis,    System software,    Utilities,    System diagnostics

Ans:D ,D


A collection of 8 bits is called
Options: a . byte b . word c . record c . bit

Ans:1.a,1.a


. Which of the following is a program group?
Options: a. Word pad b. Paint brush c. Accessories d. None of the above

Ans:5 – c ,5 – c


7.What is the maximum character field size you can set for a field that has a text data type?
Options: (A)64 (B) 255 (C) 512 (D) All of above 9

Ans:97. (B),97. (B)


The birthplace of the World Wide Web is considered to be
Options: the Department of Defense,    CERN,    ARPA,    Netscape

Ans:B ,B


A lockbox service is used for
Options: depositing cash when bank is closed,    paying bank customer bills automatically,    storing papers in a bank vault,    depositing payments to bank customers

Ans:D ,D


The register which holds the address of the location to or from which data are to be transferred is known as
Options: index register,    instruction register,    memory address register,    memory data register

Ans:C,C


1.The checking operation performed on input is called
Options: (A)validation of data (B) verification of data (C) vilification of data (D) control of data 4

Ans:41. (A),41. (A)


The apex body for formulating plans and coordinating research work in agriculture and allied fields is
Options: State Trading Corporation,    Regional Rural Banks,    National Bank for Agriculture and Rural Development (NABARD),    Indian Council of Agricultural Research

Ans:D,D


The strategy of allowing processes that are logically runnable to be temporarily suspended is called
Options: preemptive scheduling,    non preemptive scheduling,    shortest job first,    first come first served

Ans:A ,A


2.The Worst case occur in linear search algorithm when
Options: (A)Item is not in the array at all (B) Item is the last element in the array (C) Item is the last element in the array or is not there at all (D) None of above 1

Ans:12. (C),12. (C)


A transistor has how many doped regions?
Options: 1,    2,    3,    4

Ans:C ,C


First governer of HP
Options: Jayvant ram, genral himmat singh, S Chakravati, N C mehta

Ans:S Chakravati,S Chakravati


954. paaneepat kee pahalee ladaee 1526 mein kisake beech ladee gayee?
Options: NA

Ans: baabar aur ibraaheem lodhee, baabar aur ibraaheem lodhee


9.Rules are
Options: (A)Constraints define for system models (B) Input data (C) Out put data (D) Activities in involved in the system 7

Ans:69. (A),69. (A)


apsara
Options: NA

Ans: 903. vikram saaraabhaee antariksh kendr kahaan par sthit hai?, 903. vikram saaraabhaee antariksh kendr kahaan par sthit hai?


A relation is considered a:
Options: Column.,    one-dimensional table.,    two-dimensional table.,    three-dimensional table.

Ans:C ,C


Which of the following provides a printed copy of your presentation?
Options: a. Outline b. Speaker notes c. Audience handouts d. All of the above

Ans: – C , – C


Point out the error in the following program. #include<stdio.h> #include<stdarg.h> int main() { void display(char *s, int num1, int num2, ...); display("Hello", 4, 2, 12.5, 13.5, 14.5, 44.0); return 0; } void display(char *s, int num1, int num2, ...) { double c; char s; va_list ptr; va_start(ptr, s); c = va_arg(ptr, double); printf("%f", c); }
Options: Error: invalid arguments in function display(),    Error: too many parameters,    Error: in va_start(ptr, s);,    No error

Ans:C ,C


3.Safety validation is
Options: (A)Associated with the role of people involved in software process and the activities for which they are responsible. (B) The most effective technique for demonstrating the safety of a system is proof by contradiction. (C) It is concerned with establishing a confidence level in the system that might vary from low to high (D) None of these | 107 24

Ans:243. (C),243. (C)


who was founder of kulloot riyasat
Options: mani pal , jhet pal, gobind pal, jas pal

Ans:vihangam mani pal,vihangam mani pal


. Today’s computer giant IBM was earlier known by different name which was changed in 1924. What was that name?
Options: A) Computer Tabulating Recording Co. B) The Tabulator Ltd. C) International Computer Ltd. D) None of above

Ans:A,A


. Which elements of a worksheet can be protected from accidental modification?
Options: a. Contents b. Objects c. Scenarios d. All of the above

Ans:– d,– d


. An operating system is a program or a group of programs that
Options: a. Helps in checking the spelling of Word b. Maintain the relationship in Database c. Manages the resources of the Computer d. Performs the calculations of cells in Excel

Ans:2 – c ,2 – c


Tadoba National Park
Options: Karnataka,Kerala,Tripura,Maharashtra

Ans:Maharashtra,


What file contains commands that configure systems devices?
Options: Command.com,    Config.sys,    Autoexec.bat,    Win.ini

Ans:B ,B


Which of the following products was the first to implement true relational algebra in a PC DBMS?
Options: IDMS,    Oracle,    dBase-II,    R:base

Ans:D ,D


Which of the following is not a characteristic of structured system development?
Options: partitioning of systems into manageable levels of detail,    specification of the interfaces between modules,    the use of graphical tools, such as data-flow diagrams, to model system,    All of the above are characteristics

Ans:D ,D

www.000webhost.com