Raj Kapoor received Dada Saheb Phalke Award in


Options: 1986,    1987,    1988,    1989

Ans:B,B

More Basic General Knowledge Related questions:


Compression of digital data for efficient storage is
Options: Buffer,    CPU,    Packing,    Field

Ans:C,(Canswer


The emitter diode is usually
Options: Forward-biased,    Reverse-biased,    Nonconducting,    Operating in the breakdwon region

Ans:A ,A


For a memory system, the cycle time is
Options: same as the access time,    longer than the access time,    shorter than the access time,    submultiple of the access time

Ans:B ,B


9.In multi processor scheduling, independent parallelism indicates
Options: (A)There is synchronization among processes at gross level. (B) There is no explicit synchronization among processes. (C) A parallel processing or multi tasking is done within a single application. (D) None of these. 13

Ans:129. (B),129. (B)


To build a modularized kernel, the kernel-headers and kernel-source packages must first be installed. Where will you find the kernel-headers and kernel-source?
Options: /usr/local,    /usr/src/linux,    /usr/sre/redhat,    /usr/bin

Ans:B ,B


471. paudhon mein jeevan hota hai’ yah kis bhaarateey vaigyaanik ne bataaya tha?
Options: NA

Ans: jagadeesh chandr basu, jagadeesh chandr basu


What Enrico Fermi invented?
Options: X ray machine,    Betatron,    Cyclotron,    Nuclear reactor

Ans:D,D


253. kshetraphal ke anusaar vishv ka sabase chhota desh kaunasa hai?
Options: NA

Ans: vaitikan sitee, vaitikan sitee


The feasibilities studied in preliminary investigation is (are):
Options: technical feasibility,    economic feasibility,    operational feasibility,    All of the above

Ans:D ,D


The function(s) of the Syntax phase is(are)
Options: to recognize the major constructs of the language and to call the appropriate action routines that will generate the intermediate form or matrix for these constructs.,    to build a literal table and an identifier table,    to build a uniform symbol table,    to parse the source program into the basic elements or tokens of the language.

Ans:A ,A


The ELECTRIC BATTERY, who's charged with inventing this one?
Options: Hertz,    Amper,    Galvani,    Volta

Ans:D,D


Halda utsav belongs to which district
Options: kinnaur , lahul, kullu, mandi

Ans:Lahaul spiti,Lahaul spiti


What command will display the line, protocol, DLCI, and LMI information of an interface?
Options: sh pvc,    show interface,    show frame-relay pvc,    show run

Ans:B ,B


. .... runs on a computer hardware and serves as a platform for other system to run on
Options: a. Operating system b. Application system c. System software d. All of above

Ans: a, a


What do you mean by Memory Compaction?
Options: Combine multiple equal memory holes into one big hole B. Combine multiple small memory holes into one big hole C. Divide big memory hole into small holes D. Divide memory hole by 2

Ans:– B ,


8.Change-oriented identification
Options: (A)One system is designed as the system controller and has responsibility for managing the execution of other subsystems. (B) Each system is named as in attributebased identification and associated with one or more change requests. (C) An object class inheritance diagram, how entities have common characteristics. (D) The objective of this software development is zero-defect software. 13

Ans:138. (B),138. (B)


. A small part of taskbar that has icons of background running applications is
Options: a. Start button b. Quick launch c. Task bar d. System tray

Ans: d, d


How many Dynes are there in 1 gram weight?
Options: 900,    375,    981,    250

Ans:C,C


The computer code for the interchange of information between terminals is
Options: ASCII,    BCD,    EBCDIC,    All of the above

Ans:A ,A


What will be the output of the program #include<stdio.h> void fun(int); int main(int argc) { printf("%d ", argc); fun(argc); return 0; } void fun(int i) { if(i!=4) main(++i); }
Options: 1 2 3,    1 2 3 4,    2 3 4,    1

Ans:B ,B


Which gate only sends one through if neither of its terminals receives a pulse.
Options: NOT,    NOR,    OR,    NAND

Ans:B ,B


4.A critical section is a program segment
Options: (A)which should run in a certain specified amount of time (B) which avoids deadlocks (C) where shared resources are accessed (D) which must be enclosed by a pair of semaphore operations. 24

Ans:244. (C),244. (C)


Which is not necessary when using bar codes in supermarkets?
Options: Point-of sale (POS) terminal,    Check digit on the bar code,    Price on the shelf,    Price on the goods

Ans:C ,C


Rong Tong
Options:

Ans:lahaul spiti,lahaul spiti


You need to jump to the next column breaking current column right at the cursor position. How can you break column?
Options:  A) Pressing Ctrl+Enter, B) Pressing Alt+Shift+Enter, C) Break command from Insert menu, D) Both b and c, 

Ans:-C,-C


Which monitor would provide the highest level of performance?
Options: VGA,    XGA,    CGA,    SVGA

Ans:D ,D


Which of the following is intended to be used in all applications runs on mainframe computers.
Options: LOGO,    APL,    PL/1,    OCCAM

Ans:C,(Canswer


1.Match the following for file system architecture : A-Basic file system, B-Logical I/O module, 1- Deals with blocks of data, 2Deals with file records, 3- Provides general purpose record I/O capacity.
Options: (A)A – 1, B – 2, 3 (B) A – 1, 2, B – 3 (C) A – 2, 3, B – 1 (D) A – 1, 3, B – 2 18

Ans:181. (A),181. (A)


5.In Microsoft PowerPoint the following features should you use when typing in he notes text box
Options: (A)Slide shows (B) Insert (C) Slide master (D) Zoom 2

Ans:25. (D),25. (D)


6.It is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.
Options: (A)security exploit (B) vulnerability scanner (C) packet sniffer (D) rootkit Answer Sheet

Ans:26. (A),26. (A)


The Ziegler-Nichols method:
Options: is a graphical solution method,    can be used to determine gain factors of a PI loop,    is a method of control,    a and b above

Ans:D ,D


The number of writs that can be prayed for and issued by the Supreme Court and/or a High Court is
Options: 3,    4,    5,    6

Ans:C,C


The advantage of Purchase Option is (are)
Options: No financing is requird. The risk of system obsolescence is shifted to the lessor,    the flexibility of modifying the system at will,    Insurances, maintenance, and other expenses are included in the rental charge,    All of the above

Ans:B ,B


5.Match the following : A- Maintenance control: B- Maintenance prediction: C- Maintenance process: 1-Cost of planning and scheduling hardware preventive maintenance, and software maintenance and upgrades, managing the hardware and software baselines, and providing response for hardware corrective maintenance. 2Predicting the number of change requires a system understanding and the relationship between the system and external environment. 3- It is triggered by a set of change requests from system users, management or customers.
Options: (A)A-1, B-3,C-2 (B) A-1,B-2,C-3 (C) A-2,B-3,C-1 (D) A-3,B-2,C-1 21

Ans:215. (B),215. (B)


7. bihoo kis raajy ka prasiddh tyohaar hai ?
Options: NA

Ans: aasaam, aasaam


405. vanaspati tel jisaka nirmaan gais hai mein kiya jaata hai?
Options: NA

Ans: haidrojan, haidrojan


Standards are provided by
Options: standards organizations,    user groups,    computer vendors,    All of the above

Ans:D ,D


. An error in software or hardware is called a bug. What is the alternative computer jargon for it?
Options: A) Leech B) Squid C) Slug D) Glitch

Ans:D,D


Can you combine the following two statements into one? char *p; p = (char*) malloc(100);
Options: char p = *malloc(100);,    char *p = (char) malloc(100);,    char *p = (char*)malloc(100);,    char *p = (char *)(malloc*)(100);

Ans:C ,C


6.Bias is
Options: (A)A class of learning algorithm that tries to find an optimum classification of a set of examples using the probabilistic theory. (B) Any mechanism employed by a learning system to constrain the search space of a hypothesis. (C) An approach to the design of learning algorithms that is inspired by the fact that when people encounter new situations, they often explain them by reference to familiar experiences, adapting the explanations to fit the new situation. (D) None of these

Ans:6. (B),6. (B)


The nucleus of the copper atom contains how many protons?
Options: 1,    4,    18,    29

Ans:D ,D


'The Naked Face', a very popular book is written by
Options: Dominique Lapierre,    Larry Collins,    Sidney Sheldon,    Juan Benet

Ans:C,C


535. kathak kis raajy ka shaastreey nrty hai?
Options: NA

Ans: uttar pradesh, uttar pradesh


3.A device used for transmission of images scanned at a transmitting point and duplicated at a receiving point is
Options: (A)Facsimile (FAX) (B) Telephone (C) Photocopier (D) None of these 7

Ans:73. (A),73. (A)


700. kis sanvidhaan sanshodhan dvaara panchaayatee raaj vyavastha laagu kee gayee?
Options: NA

Ans: 73ven , 73ven


. Which one is the largest space?
Options: A) kilobyte B) petabyte C) terrabyte D) gigabyte

Ans:B,B


How many gold medals did P.T.Usha win in the 1986 Seoul Asian Games?
Options: 1,    2,    3,    4

Ans:D,D


What command can be used to get information about yourself?
Options: which,    pwd,    i /4,    who am i

Ans:D ,D


741. sherashaah sooree ko kahaan daphanaaya gaya?
Options: NA

Ans: saasaaraam (bihaar), saasaaraam (bihaar)


The 'Black flag' signifies
Options: revolution/danger,    peace,    protest,    truce

Ans:C,C

www.000webhost.com