The headquarters of World Intellectual Property Organisation (WIPO) is located in


Options: Paris,    Madrid,    New York,    Geneva

Ans:D,D

More World Organisations Related questions:


The inverter OR gate and AND gate are called decision-making elements because they can recognize some input _____ while disregarding others. A gate recognizes a word when its output is _____
Options: words, high,    bytes, low,    bytes, high,    character, low

Ans:A ,A


The process of particle detach ment by moving glacial ice is called
Options: plucking,    abrasion,    scouring,    None of the above

Ans:A,A


When mapping a binary many-to-many relationship into a relation which of the following is true?
Options: One relation is created.,    Two relations are created.,    Three relations are created.,    Four relations are created.

Ans:C ,C


A server cannot serve on which of the following levels?
Options: Client Layer,    Business Layer,    Database Layer,    All of the above.

Ans:A ,A


Match the device driver HIMEM.SYS to its operation.
Options: Supports (ANSI) terminal emulation,    Manages the use of extended memory,    Uses expanded memory on a 80386 processor,    Supports code page switching

Ans:B ,B


When determining the efficiency of algorithm, the space factor is measured by
Options: A)Counting the maximum memory needed by the algorithm b.Counting the minimum memory needed by the algorithm c.Counting the average memory needed by the algorithm d.Counting the maximum disk space needed by the algorithm

Ans:A,Counting the maximum memory needed by the


Point out the correct statement which correctly allocates memory dynamically for 2D array following program? #include<stdio.h> #include<stdlib.h> int main() { int *p, i, j; /* Add statement here */ for(i=0; i<3; i++) { for(j=0; j<4; j++) { p[i*4+j] = i; printf("%d", p[i*4+j]); } } return 0; }
Options: p = (int*) malloc(3, 4);,    p = (int*) malloc(3*sizeof(int));,    p = malloc(3*4*sizeof(int));,    p = (int*) malloc(3*4*sizeof(int));

Ans:D ,D


What will be the output of the program? #include<stdio.h> #include<stdarg.h> void fun1(char, int, int *, float *, char *); void fun2(char ch, ...); void (*p1)(char, int, int *, float *, char *); void (*p2)(char ch, ...); int main() { char ch='A'; int i=10; float f=3.14; char *p="Hello"; p1=fun1; p2=fun2; (*p1)(ch, i, &i, &f, p); (*p2)(ch, i, &i, &f, p); return 0; } void fun1(char ch, int i, int *pi, float *pf, char *p) { printf("%c %d %d %f %s \n", ch, i, *pi, *pf, p); } void fun2(char ch, ...) { int i, *pi; float *pf; char *p; va_list list; printf("%c ", ch); va_start(list, ch); i = va_arg(list, int); printf("%d ", i); pi = va_arg(list, int*); printf("%d ", *pi); pf = va_arg(list, float*); printf("%f ", *pf); p = va_arg(list, char *); printf("%s", p); }
Options: A 10 3.14 A 10 3.14,    A 10 10 3.140000 Hello A 10 10 3.140000 Hello,    A 10 Hello A 10 Hello,    Error

Ans:B ,B


Which of the following technique is used for encapsulation?
Options: a technique used in best-effort delivery systems to avoid endlessly looping packets.,    a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame.,    One of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size,    All of the above

Ans:B ,B


. A ….allows you to write on screen with a digital pen and convert that writing into characters that the PC can process
Options: a. Monitor RS b. Tablet PC c. Database manager d. Media Center

Ans:7 – b ,7 – b


Nalanda is located at
Options: Gujarat,    Varanasi, Uttar Pradesh,    Near Patna, Bihar,    Near Bhopal, Madhya Pradesh

Ans:C,C


The command to remove rows from a table 'CUSTOMER' is:
Options: REMOVE FROM CUSTOMER ...,    DROP FROM CUSTOMER ...,    DELETE FROM CUSTOMER WHERE ...,    UPDATE FROM CUSTOMER ...

Ans:C ,C


baingaluru
Options: NA

Ans: 902. bhaarat ka pratham paramaanu oorja riektar kaunasa tha?, 902. bhaarat ka pratham paramaanu oorja riektar kaunasa tha?


Which of the following operations are INCORRECT?
Options: int i = 35; i = i%5;,    short int j = 255; j = j;,    long int k = 365L; k = k;,    float a = 3.14; a = a%3;

Ans:D ,D


The president can assign any of the functions of the union government to the state government
Options: in consultation with the chief justice of India,    in consultation with the state governor,    in his discretion,    in consultation with the government of the state

Ans:D,D


. A utility that can be used to minimize the number of fragmented files and enhance the speed
Options: a. Disk space b. Defrag c. Scandisk d. Double space

Ans:4 – b ,4 – b


. RD command are used to
Options: a. Remove an empty directory b. Remove non empty directory c. Remove directory including files d. None of the above

Ans:9 – a ,9 – a


When was the game Frisbee invented?
Options: 1920s,    1900s,    1870s,    1890s

Ans:C,C


. In Excel, by default Numeric Values appears in
Options: a. Left aligned b. Right aligned c. Center aligned d. Justify aligned

Ans:– b,– b


What do you mean by one to many relationship between Student and Class table?
Options: a. One student can have many classes b. One class may have many student c. Many classes may have many students d. Many students may have many classes

Ans:ndash; a,ndash; a


Which of the following uses ATM as the Data Link layer protocol that's terminated at what's known as the DSLAM?
Options: DSL,    PPPoE,    Frame Relay,    Dedicated T1

Ans:A ,A


A seed is ripened
Options: Oule,Luoe,Ovule, Ovuli

Ans:Ovule,Ovule


7.Button in window programming
Options: (A)displays text and can be clicked with the mouse or spacebar (B) a checkmark which the user can select (C) a list from which one item can be selected. (D) area in which text may be entered.

Ans:7. (A),7. (A)


Vietnam joined the U.N.O in the year
Options: 1977,    1970,    1976,    1974

Ans:A,A


Which statement will you add in the following program to work it correctly? #include<stdio.h> int main() { printf("%f\n", log(36.0)); return 0; }
Options: #include<conio.h>,    #include<math.h>,    #include<stdlib.h>,    #include<dos.h>

Ans:B ,B


5.Database administration
Options: (A)It shows the software process as a set of activities each of which carries out data transformation. (B) Data and associated programs are reengineered to remove limits on the data processing. (C) It is responsible for the definition, operation, protection, performance, and recovery of a database. (D) Development of a database to meet a user’s requirements 16

Ans:165. (C),165. (C)


The person communicating with the manager to identify information needs is the
Options: executive vice-president,    vice- president of information system,    programmer,    system analyst

Ans:D ,D


The HBJ Upgradation project, upgraded the capacity of HBJ pipeline from 18.2 MM SC MD to
Options: 20 MM SC MD,    33.4 MM SC MD,    22.3 MM SC MD,    29.6 MM SC MD

Ans:B,B


Compilers and interpreters are themselves
Options: High-level language,    Codes,    Programs,    Mnemonics

Ans:C ,C


RAM is also known as
Options: Read-only memory,    Programmable read-only memory,    Read/Write memory,    Erasable programmable read-only memory

Ans:C ,C


Rajkumari Amrit Kaur
Options:

Ans:Kapoor Thala,Kapoor Thala


Communication circuits that transmit data in both directions but not at the same time are operating in
Options: a simplex mode,    a half-duplex mode,    a full-duplex mode,    an asynchronous mode

Ans:B ,B


8.In Excel you can copy data or formulas
Options: (A)With the copy, paste and cut commands on the edit menu (B) With commands on a shortcut menu (C) With buttons on the standard toolbar (D) All of the above 21

Ans:218. (D),218. (D)


Microphone is used to convert
Options: sound waves into electrical energy,    sound waves into light rays,    electrical energy into sound waves,    sound waves into magnetic currents

Ans:A,A


Operational budgeting require how many data files that would not otherwise be needed?
Options: 3,    2,    1,    0

Ans:D ,D


Which elements of a worksheet can be protected from accidental modification?
Options: Contents B. Objects C. Scenarios D. All of the above

Ans:– D ,


The task of arranging data in order is called
Options: a. Searching b. Sorting c. Ordering d. Shorting

Ans:ndash; b,ndash; b


Web servers should be configured in which of the following ways?
Options: unauthorized access is restricted.,    unauthorized access is unrestricted.,    unauthorized access is impossible.,    unauthorized access is possible.

Ans:A ,A


Which one of the following properties of a magnetic circuit can be directly compared to resistance in an electrical circuit?
Options: Reluctance,    Permeability,    Permeance,    Retentivity

Ans:A ,A


The air we inhale is mixture of gases. Which of the following gases in the mixture is highest in percentage?
Options: Carbon dioxide,    Nitrogen,    Oxygen,    Ozone

Ans:B,B


A magnetic storage device on which data is stored on a cylindrical drum, subdivided into tracks is known as
Options: Punched card,    Magnetic disk,    Magnetic tape,    Drum

Ans:D ,D


0.The overall design, construction, organization and interconnecting of the various components of a computer system is referred as
Options: (A)Computer Architecture (B) Computer Flow chart (C) Computer Algorithm (D) None of these 17

Ans:170. (A),170. (A)


The core of an electromagnet is said to be in saturation when:
Options: the core is permitted to move freely within the coil,    an increase in current through the coil causes no further increase in the mmf,    frequent changes in the direction of current through the coil causes heating effects in the core material,    changing the polarity of the current in the coil changes the polarity of the magnetic field around the core

Ans:B ,B


The output will be a LOW for any case when one or more inputs are zero in a(n):
Options: OR gate,    NOT gate,    AND gate,    NAND gate

Ans:C ,C


319. kainsar ke upachaar mein prayukt utkrsht gais kaunasee hai?
Options: NA

Ans: redaan, redaan


. The information stored in storage devices can be accessed in _________
Options: RAM access & ROM access B. Memory access & Disk access C. Random access & shift access D. Sequential access & Direct access

Ans:– D ,


Parity bit is
Options: an error-detecting code based on a summation operation performed on the bits to be checked.,    a check bit appended to an array of binary digits to make the sum of all the binary digits.,    a code in which each expression conforms to specific rules of construction, so that if certain errors occur in an expression, the resulting expression will not conform to the rules of construction and thus the presence of the errors in detected,    the ratio of the number of data units in error to the total number of data units

Ans:B ,B


. B7:B9 indicates:
Options: a. Cells B7 and cell B9 only. b. Cells B7 through B9. c. Cell B8 only. d. None of the above.

Ans:– b,– b


. Who invented the high level language C?

Options: A) Dennis M. Ritchie B) Niklaus Writh C) Seymour Papert D) Donald Kunth

Ans:A,A


Data manipulation language (DML)
Options: describes how data are structured in the data base,    specifies for the DBMS what is required; the techniques used to process data,    determine how data must be structured to produce the user's view,    All of the above

Ans:B ,B

www.000webhost.com