What drink was invented by Charles Leiper Grigg in 1929?


Options: 7-Up,    Yoo-Hoo,    Pepsi,    Hawaiian Punch

Ans:A,A

More inventions Related questions:


Full adder has
Options: 4 inputs,    8 inputs,    10 inputs,    3 inputs

Ans:D ,D


A program in execution is called
Options:  A Paging B.  A Process C.  A virtual memory D.  A Demand Page

Ans: – B ,


The Plio-Pleistocene boundary lies about ____ years ago, at the beginning of the interval of warming after the last Pleistocene glaciations.
Options: 1,00,000,    1,000,    10,000,    100

Ans:C,C


The main active constituent of tea and coffee is
Options: nicotine,    chlorophyll,    caffeine,    aspirin

Ans:C,C


Which of the following database activities require a specific knowledge of a DBMS?
Options: Enterprise modeling,    Conceptual data modeling,    Logical database design,    Physical database design and definition

Ans:D ,D


. Which is not external command?
Options: a. Doskey b. Verify c. Print d. Find

Ans:4 – b ,4 – b


6.A set of programs that handle firm’s data base responsibilities is called a
Options: (A)Database Management System (DBMS) (B) Database Processing System (DBPS) (C) Data Management System (DMS) (D) All of above 10

Ans:106. (D),106. (D)


What is the name of the visible silver rectangle which separates the take-up portion of the magnetic tape from the data recording portion?
Options: Load maker,    Load marker,    Tape separator,    Tape marker

Ans:B ,B


7.Human error is
Options: (A)It is concerned with the design, evaluation, and implementation of interactive computing systems for human use and with the study of major phenomena surrounding them. (B) Extent to which a software product fulfills its purpose without wasting user’s time/ energy/degrading their morale. (C) Human behavior that results in the introduction of faults into a system. (D) None of these 20

Ans:207. (C),207. (C)


The nature of the anti-Imperialist struggle was
Options: always peaceful and constitutional,    initially constitutional and by large non-violent,    based on continuous armed resistance,    largely supported by foreign powers

Ans:B,B


The initials JCB on earth-moving equipment are those of the founder of the company that makes it. What is his name?
Options: John Christopher Ballantyne,    Joseph Cyril Bamford,    John Christopher Baxter,    Jack Croxford Baker

Ans:B,B


The largest gulf in the world is
Options: Gulf of Mexico,    Persian Gulf,    Gulf of Carpentaria,    Gulf of Mannar

Ans:A,A


The member of a State Public Service Commission can be removed on the ground of misbehavior only after an enquiry has been conducted by the
Options: Supreme Court of India,    High Court of the state,    committee appointed by the president,    None of the above

Ans:A,A


What will be the output of the program? #include<stdio.h> #include<stdlib.h> union employee { char name[15]; int age; float salary; }; const union employee e1; int main() { strcpy(e1.name, "K"); printf("%s %d %f", e1.name, e1.age, e1.salary); return 0; }
Options: Error: RValue required,    Error: cannot convert from 'const int *' to 'int *const',    Error: LValue required in strcpy,    No error

Ans:D ,D


430. paarasek (parsaich) kisakee ikaee hai?
Options: NA

Ans: khagoleey dooree kee, khagoleey dooree kee


6.Search space
Options: (A)The large set of candidate solutions possible for a problem (B) The information stored in a database that can be, retrieved with a single query. (C) Worth of the output of a machinelearning program that makes it understandable for humans (D) None of these 8

Ans:86. (A),86. (A)


Which of the following statement is incorrect?
Options: The Addresses Resolution Protocol, ARP, allows a host to find the physical address of a target host on the same physical network, given only the target IP address.,    The sender's IP - to- physical address binding is included in every ARP broadcast; receivers update the IP-to-Physical address binding information in their cache before processing an ARP packet.,    ARP is a low-level protocol that hides the underlying network physical addressing, permitting us to assign IP-addresses of our choice to every machine.,    All of the above

Ans:D ,D


The engineering change control system makes changes in the
Options: operations file,    production schedule,    work force data,    All of the above

Ans:A ,A


Communication between computers using standard telephone service
Options: Requires a change to an anolog signal,    Is most efficient,    Produces little noise and few disturbances,    All of the above

Ans:A ,A


7.ANSI (American National Standards Institute) is
Options: (A)It supports system modeling during the analysis and design stages of the software process (B) Organization responsible for approving U.S. standards (C) Stimuli that occurs irregularly (D) Formalized set of software calls and routines that can be referenced by an application program in order to access supporting system or network services 3

Ans:37. (B),37. (B)


1.Which of the following is not a limitation of binary search algorithm ?
Options: (A)binary search algorithm is not efficient when the data elements are more than 1000 (B)must use a sorted array (C) requirement of sorted array is expensive when a lot of insertion and deletions are needed (D) there must be a mechanism to access middle element directly 4

Ans:41. (A),41. (A)


You can show the shortcut menu during the slide show by
Options: a. Clicking the shortcut button on the formatting toolbar b. Right clicking the current slide c. Clicking an icon on the current slide d. a and b

Ans: – B , – B


. Which of the following dialog boxes enables users to enforce referential integrity in a One-To-Many relationship?
Options: a. Edit Relationships b. Indexes c. Option d. Show Table

Ans:6 – a ,6 – a


What is the subnetwork number of a host with an IP address of 172.16.66.0/21?
Options: 172.16.36.0,    172.16.48.0,    172.16.64.0,    172.16.0.0

Ans:C ,C


India's first atomic power station was set up at
Options: Surat (Gujarat),    Tarapur (Maharashtra),    Trombay (Maharashtra),    Solapur (Maharashtra)

Ans:B,B


How many bits in a byte?
Options: 16,    8,    255,    10

Ans:B ,B


DOS uses letters of the alphabet to designate disk drives. How many disk drives can DOS address (recognize)?
Options: 4,    26,    1,    16

Ans:B ,B


Which is the artificial port of India?
Options: NA

Ans:Chennai,Chennai


. The original ASCII code used__bits of each byte, reserving that last bit for error checking
Options: A) 5 B) 6 C) 7 D) 8

Ans:C,C


tenajing norke (bhaarat) aur edamand hileree (nyoojeelaind)
Options: NA

Ans: 775. padamaavat kee rachana kisane kee?, 775. padamaavat kee rachana kisane kee?


The process where the particle moves from the surface to the medium in quick, continuous, repeated cycles is called
Options: saltation,    suspension,    traction,    solution

Ans:A,A


How many players are there in Kabbadi team?
Options: 11,    9,    5,    7

Ans:D,D


The bubbles in a bubble memory pack are created with the help of?
Options: Laser beam,    Magnetic field,    Electric field,    X-ray

Ans:B,B


writer of sirmour lok sahihtya
Options: dr, bansi ram sharma, , dr, parmanand, narayan chand, mahak ali

Ans:dr, bansi ram sharma,dr, bansi ram sharma


Creating a read-only database is a task that is ________ assigned to beginning database professionals.
Options: always,    commonly,    seldom,    never

Ans:B ,B


Which multiplexing technique shifts each signal to a different carrier frequency?
Options: FDM,    synchronous TDM,    asynchronous TDM,    All of the above

Ans:A ,A


Which of the following are the two main components of the CPU?
Options: control unit and registers,    registers and main memory,    control unit and ALU,    ALU and bus

Ans:C,C


7.The FIFO algorithm
Options: (A)executes first the job that last entered the queue (B) executes first the job that first entered the queue (C) executes first the job with the least processor needs (D) executes first the job that has been in the queue the longest 22

Ans:227. (B),227. (B)


UNIVAC is
Options: A) Universal Automatic Computer B) Universal Array Computer C) Unique Automatic Computer D) Unvalued Automatic Computer

Ans:A,A


What is the main purpose of the secondary storage device?
Options: To increase the speed of Computer B. To Install Operating System C. To Networking D. To Store Data

Ans:– D ,


What will be the output of the program? #include<stdio.h> typedef struct error {int warning, err, exception;} ERROR; int main() { ERROR e; e.err=1; printf("%d\n", e.err); return 0; }
Options: 0,    1,    2,    Error

Ans:B ,B


Different components on the motherboard of a PC processor unit are linked together by sets of parallel electrical conducting lines. What are these lines called?
Options: Conductors,    Buses,    Connectors,    Connectively

Ans:B ,B


Which gate sends on a pulse when it receives one at either or both of its terminals.
Options: NOR,    NOT,    OR,    NAND

Ans:C ,C


An algorithm is best described as
Options: A computer language,    A step by step procedure for solving a problem,    A branch of mathematics,    All of the above

Ans:B ,B


Sir Thomas Fearnley Cup is awarded to
Options: a club or a local sport association for remarkable achievements,    amateur athlete, not necessarily an Olympian,    National Olympic Committee for outstanding work,    None of the above

Ans:,


9.The memory management, y one clock policy is applied then the page first loaded into a frame in memory its use bit is set to
Options: (A)Zero (B) One (C) Two (D) Three 11

Ans:109. (B),109. (B)


The examination and changing of single bits or small groups of his within a word is called
Options: Bit,    Byte,    Bit manipulation,    Bit slice

Ans:C ,C


Binary numbers need more places for counting because:
Options: 0's and 1's can be added in front of them,    0's and 1's have to be properly placed,    They are always big numbers,    Binary base is small

Ans:D,D


Point out the correct statement which correctly allocates memory dynamically for 2D array following program? #include<stdio.h> #include<stdlib.h> int main() { int *p, i, j; /* Add statement here */ for(i=0; i<3; i++) { for(j=0; j<4; j++) { p[i*4+j] = i; printf("%d", p[i*4+j]); } } return 0; }
Options: p = (int*) malloc(3, 4);,    p = (int*) malloc(3*sizeof(int));,    p = malloc(3*4*sizeof(int));,    p = (int*) malloc(3*4*sizeof(int));

Ans:D ,D


Which command is used to remove the read permission of the file 'note' from both the group and others?
Options: chmod go+r note,    chmod go+rw note,    chmod go-x note,    chmod go-r note

Ans:D ,D

www.000webhost.com