The pyramidal peaks that form when several cirques chisel a mountain form three more sides are called

Options: horns,    cirques,    aretes,    medial moraines


More World Geography Related questions:

When the minimum and maximum number of instances of an entity is one, you know which of the following?
Options: Mandatory one,    Optional one,    Mandatory many,    Cannot tell

Ans:A ,A

What is a motion path?
Options: a. A type of animation entrance effect b. A method of advancing slides c. A method of moving items on a slide d. All of the above

Ans: – C , – C

The mountains that separate European and Arctic Russia are
Options: the Pyranees,    the Balkans,    the Carpathians,    the Urals


Who founded Chhatipur Kila
Options: jagat singh, vijay chand, heera chand, jai chand

Ans:B,Vijay chand

85. A _____ contains buttons, boxes, and menus that allow tasks to be performed more quickly than using the menu bar.
Options: a. format bar b. status bar c. command bar d. toolbar

Ans:– D ,– D

The process that involves the eroded material being dissolved and carried along in water as individual ions is called
Options: solution,    suspension,    saltation,    traction


The elements of an array are stored successively in memory cells because
Options: a. by this way computer can keep track only the address of the first element and the addresses of other elements can be calculated b. the architecture of computer memory does not allow arrays to store other than serially c. both of above d. none of above


Gugamal National Park
Options: Karnataka,Kerala,Tripura,Maharashtra


Conversion of decimal number 4210 to it's octal number equivalent is
Options: 578,    428,    478,    528

Ans:D ,D

304. dee.en.e. kee dvigunit kundalee ka pata kisane lagaaya?
Options: NA

Ans: vaatasan aur krik, vaatasan aur krik

Inductive reactance is measured in units of:
Options: volts per second,    amperes per second,    Ohm,    henrys

Ans:C ,C

How can you find specific information in a list?
Options: a. Select Tools > Finder from the menu b. Click the Find button on the standard toolbar c. Select Insert > Find from the menu d. Select Data > Form from the menu to open the Data Form dialog box and click the Criteria button

Ans:#8211; d,#8211; d

You configure the following access list: access-list 110 deny tcp any eq smtp access-list 110 deny tcp any eq 23 int ethernet 0 ip access-group 110 out What will the result of this access list be?
Options: Email and Telnet will be allowed out E0.,    Email and Telnet will be allowed in E0.,    Everything but email and Telnet will be allowed out E0.,    No IP traffic will be allowed out E0.

Ans:D ,D

The major geological events of the Palaeozoic era include
Options: Caledonian mountain rise, life comes ashore,    Appalachians and Central European mountains come up,    both (a) and (b),    None of the above


Which amongst the following mammals has the highest metabolic rate in terms of oxygen consumption (mm3/g hour)?
Options: Dog,    Mouse,    Rabbit,    Rat


A byte is comprised of:
Options: One bit,    Four bits,    Eight bits,    Sixteen bits

Ans:C ,C

. How do you rearrange the data in ascending or descending order?
Options: Data, Sort B. Data, Form C. Data, Table D. Data Subtotals

Ans: – A ,

which of the following is not an Aggregate function?
Options: Min B. Max C. Select D. Avg

Ans:– C ,

What is the maximum distance with maximum data rate for 802.11a?
Options: About 65-75 feet,    About 90-100 feet,    About 150 feet,    Over 200 feet

Ans:A ,A

After doing a low-level format, what would be the next step in configuring the hard drive in a system?
Options: Format DOS partition,    Install operating system,    Configure DMA channel and back-up interrupt,    Partition had disk

Ans:A ,A

4.Spoofing attack is
Options: (A)an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network. (B) a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access. (C) a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators. (D) None of these 1

Ans:14. (C),14. (C)

What Henry Bessemer invented?
Options: Aluminum,    Electroplating,    Steel Converter,    Steel rolling mill


Permanent hardness of water may be removed by the addition of
Options: sodium carbonate,    alum,    potassium permanganate,    lime


9.To represent hierarchical relationship between elements, the following data structure is not suitable
Options: (A)Deque (B) Priority (C) Tree (D) All of above 2

Ans:19. (C),19. (C)

. The ability of an operating system to control the activities of multiple program at the same time is called
Options: a. Multitasking b. Multiprocessing c. Multioperating d. Multipaging

Ans:3 – a ,3 – a

Sound of frequency below 20 Hz is called
Options: audio sounds,    infrasonic,    ultrasonic,    supersonics


1.In Microsoft PowerPoint Line spacing refers to
Options: (A)The space between the lines of text (B) The height of the line (C) The length of the line (D) (A)and (C) both 11

Ans:111. (D),111. (D)

. Which of these is a quick way to copy formatting from a selected cell to two other cells on the same worksheet?
Options: a. Use Ctrl to select all three cells, then click the paste button on the standard toolbar b. Copy the selected cell, then select the other two cells, click style on the Format menu, then click Modify c. Click format painter on the Formatting toolbar twice then click in each cell you want to copy the formatting to d. All of above

Ans:– c,– c

As a general rule.
Options: MIS performance criteria determine management information needs, and these needs determine the objectives of the firm.,    the firm's objective determine management information needs, and these needs determine MIS performance criteria,    management information needs determine MIS performance criteria, and these criteria determine the firm's objectives,    the firm's objectives determine MIS performance criteria, and these criteria determine manage¬ment information needs.

Ans:B ,B

0. Data access time is depends on
Options: Seek time B. Rotational delay C. Operating frequency D. All of the above

Ans: – D ,

. Most of the first generation computers were
Options: A) Special purpose computers B) General purpose computers C) Both of above D) None of above


To be successful in implementing DSS, organizations should have the following characteristics except:
Options: a well-controlled data-processing system,    willingness to commit dollars and personnel to the project.,    education and training by the organization,    powerful central computer groups to initiate and manage system projects

Ans:D ,D

Which language is used in the areas of pattern recognition, artificial intelligence & for simulation of games.
Options: APL,    FORTH,    LISP,    CORAL

Ans:C ,C

6.Computer output which is displayed on the screen of a terminal without a permanent copy is called
Options: (A)Soft copy (B) Hard copy (C) Hardware (D) None of these 9

Ans:96. (A),96. (A)

A consideration evaluated by management when planning to convert to a computer system is :
Options: maintenance,    available software,    CPU sized speed,    All of the above

Ans:D ,D

746. amajad alee khaan konasa vaady yantr bajaate hain?
Options: NA

Ans: sarod, sarod

0. End Key
Options: Moves the cursor end of the line B. Moves the cursor end of the document C. Moves the cursor end of the paragraph D. Moves the cursor end of the screen

Ans: – A ,

What should the configuration register value be after you successfully complete the password recovery procedure and return the router to normal operation?
Options: 0x2100,    0x2101,    0x2102,    0x2142

Ans:C ,C

A stack pointer is 
Options: a . a 16-bit register in the microprocessor that indicate the beginning of the stack memory. b . a register that decodes and executes 16-bit arithmetic expression. c. The first memory location where a subroutine address is stored. d . a register in which flag bits are stored


The real "brain" of an artificial intelligence system is referred to as:
Options: bubble memory,    the expert system,    recursive technology,    natural language interfaces

Ans:B ,B

In ________ mode, the communication channel is used in both directions at the same time?
Options: Full-duplex B. Simplex C. Half-duplex D. None of the above

Ans:– A ,

In fireworks, the green flame is produced because of
Options: sodium,    barium,    mercury,    potassium


The first step in systems Development Life Cycle is
Options: database design,    system design,    preliminary investigation and analysis,    graphical user interface

Ans:C ,C

A periodic report can facilitate management by exception by
Options: including complete alphabetic descriptions for each numeric entry,    including only those transactions that fall within predetermined limits of acceptable performance,    consolidation of multiple transactions into a summary form,    comparing actual performance with acceptable standards

Ans:D ,D

A translator is best described as
Options: an application software,    a system software,    a hardware component,    all of the above

Ans:B ,B

Which of the following NIS clients returns the name of the NIS server used by the NIS client?
Options: ypwhich,    ypbind,    ypcat,    yppoll

Ans:A ,A

short cut for satluj sub rivers
Options: Banaspati swaha

Ans:b-no spiti swan,b-no spiti swan

. The computer code for the interchange of information between terminals is
Options: A) ASCII B) BCD C) EBCDIC D) All of above


A step-up transformer has a turns ratio of 1:4. If the line voltage is 115 V rms, what is the peak secondary voltage?
Options: 700 V,    707 V,    651 V,    208 V

Ans:C ,C

Most algorithms follow the format of
Options: Entering the input items, then displaying the input items, and then processing the output items,    Entering the input items, then processing the output items, and then displaying the output items,    Entering the input items, then processing the input items, and then displaying the output items,    Entering the output items, then displaying the output items, and then processing the output items

Ans:C ,C