The last major glacial period began about 2,000,000 years before present and is commonly known as

Options: Pleistocene or ice age,    Paleocene or ice age,    Pliocene or ice age,    Holocene or ice age


More World Geography Related questions:

Which is not true of a correlated subquery?
Options: EXISTS/NOT EXISTS is a form of a correlated subquery.,    The processing of the SELECT statements is nested.,    They can be used to verify functional dependencies.,    They are very similar to a regular subquery.

Ans:D ,D

Sariska Tiger Reserve
Options: Karnataka,Kerala,Rajasthan,MadhyaPradesh


718. 42ven sanvidhaan sanshodhan dvaara kaunase 2 shabd prastaavana mein jode gae?
Options: NA

Ans: dharmanirapeksh aur samaajavaadee, dharmanirapeksh aur samaajavaadee

6.Lehman’s Fourth Law (Lehman and Belady 1985) is
Options: (A)Organizational stability: Over a program’s lifetime, its rate of development is approximately constant and independent of the resources devoted to system development. (B) Increase complexity: As an evolving program change, its strictures tend to become more complex. Extra resources must be devoted to preserving and simplifying the structure. (C) Large program evolution: Program evolution is a self-regulating process. (D) None of these 20

Ans:206. (A),206. (A)

86. A letterhead should contain all of the following EXCEPT ____.
Options: a. full street address b. logo c. complete legal name of the company, group, or individual d. None of the above

Ans:– D ,– D

107. prthvee apanee dhuree par kis disha mein ghoomatee hai ?
Options: NA

Ans: pashchim se poorv , pashchim se poorv

. Which of the following is the largest manufacturer of Hard Disk Drives?

Options: A) IBM B) Seagate C) Microsoft D) 3M


Which of the following typically uses a keyboard for input?
Options: desktop terminal,    point-of-sale terminal,    financial transaction terminal,    All of the above

Ans:D,All of the above

Can you name of the major Operating System used in computers?
Options: MS DOS,    OS/2,    UNIX,    All of the above

Ans:D ,D

7.The memory allocation scheme subject to external fragmentation is
Options: (A)segmentation (B) swapping (C) pure demand paging (D) multiple contiguous fixed partitions | 83 27

Ans:277. (A),277. (A)

A functional dependency between two or more non-key attributes is called
Options: Transitive dependency B. Partial transitive dependency C. Functional dependency D. Partial functional dependency

Ans:– A ,

986. arthashaastr ka janak kaun kahalaata hai?
Options: NA

Ans: edam smith, edam smith

Which configuration command must be in effect to allow the use of 8 subnets if the Class C subnet mask is
Options: Router(config)#ip classless,    Router(config)#no ip classful,    Router(config)#ip unnumbered,    Router(config)#ip subnet-zero

Ans:D ,D

where is raja ka talab
Options: kangra, chamba, bilaspur, hamirpur, kullu


An Information system that responds immediately to the needs of the physical system is called a(n)
Options: inline system,    on line system,    offline system,    realtime system

Ans:D ,D

951. san 1906 mein dhaaka mein muslim leeg kee sthaapana kisane kee?
Options: NA

Ans: aaga khaan aur salimulla khaan ne, aaga khaan aur salimulla khaan ne

. How do you change column width to fit the contents?
Options: a. Single-click the boundary to the left to the column heading b. Double click the boundary to the right of the column heading c. Press Alt and single click anywhere in the column d. All of above

Ans:– b,– b

Which of the following terms could be used to describe the concurrent processing of computer programs, via CRTs, on one computer system?
Options: Time-sharing,    Online processing,    Interactive processing,    All the above processing

Ans:D ,D

Conversion of a hexadecimal number 4E16 to binary number is
Options: 10011012,    10011102,    11011002,    1101112

Ans:B ,B

Gabriel Daniel Fahrenheit was
Options: a German Physicist,    developed the mercury thermometer in 1714,    devised temperature scale,    All of the above


6.Bias is
Options: (A)A class of learning algorithm that tries to find an optimum classification of a set of examples using the probabilistic theory. (B) Any mechanism employed by a learning system to constrain the search space of a hypothesis. (C) An approach to the design of learning algorithms that is inspired by the fact that when people encounter new situations, they often explain them by reference to familiar experiences, adapting the explanations to fit the new situation. (D) None of these

Ans:6. (B),6. (B)

Giri Vata


bandar valley in which district
Options: kinnaur , lahul, kullu, chamba


All inputs must be in ON position to have an output is known as
Options: NOT gate,    AND gate,    OR gate,    XOR gate

Ans:B ,B

Which JDBC driver Type(s) can you use in a three-tier architecture and if the Web server and the DBMS are running on the same machine?
Options: Type 1 only,    Type 2 only,    Both Type 3 and Type 4,    All of Type 1, Type 2, Type 3 and Type 4

Ans:D ,D

9.Match the following: A- Formal mathematical transformation: B- Formal process model: C-Formal Specifications: D-Formal System development: 1- Here the formal mathematical representation of the system takes place. 2- It is a starting point for process analysis. It is abstract and only defines the principal process activities and deliverables. 3-Specifications expressed in a language whose vocabulary, syntax and semantics are formally defined. 4-It is more common to waterfall model, but here the development process is based on formal mathematical transformation of a system specification to an exactable program.
Options: (A)A-1,B-2,C-3,D-4 (B) A-4,B-2,C-3,D-1 (C) A-2,B-1,C-3,D-4 (D) A-1,B-3,C-2,D-4 21

Ans:209. (A),209. (A)

Control Unit of a digital computer is often called the
Options: Clock,    Nerve center,    ICs,    All of the above

Ans:B ,B

To which of the republic of Buddha belong?
Options: Licchavis,    Sakyas,    Mallas,    None of the above


Who received he Wisden Award for the 'Indian Cricketer of the Century' (20th Century)
Options: Kapil Dev,    Sachin Tendulkar,    Ajit Wadekar,    Sunil Gavaskar


Thirot is tributery river for which river and in which district it is.
Options: lahaul spiti, chammba, kinnaur, shimla

Ans:A,lahaul spiti

1.In Access press TAB
Options: (A)Move up one line (B) Move up one page (C) Exit the combo box or list box (D) None of these 3

Ans:31. (C),31. (C)

From which mineral is radium obtained?
Options: Rutile,    Haematite,    Limestone,    Pitchblende


To insert slide numbers
Options: a. Insert a text box and select Insert >> Page Number b. Insert a textbox and select Insert >> Number >> PageNumber c. Choose Insert >> Slide Number d. Insert a new text box and select Insert >> slide Number

Ans: – D , – D

What are reasons for creating OSPF in a hierarchical design? To decrease routing overhead To speed up convergence To confine network instability to single areas of the network To make configuring OSPF easier
Options: 1, 2 and 3,    3 only,    3 and 4,    2, 3 nd 4

Ans:A ,A

Tab scrolling button
Options: a. Allow you to view a different worksheet b. Allow you to view additional worksheet rows down c. Allow you to view additional worksheet columns to the right d. Allow you to view additional sheets tabs

Ans:#8211; d,#8211; d

Which of the following is the 1's complement of 10?
Options: 01,    110,    11,    10


Superscript, subscript, outline, emboss, engrave are known as
Options:  A) font styles, B) font effects, C) word art, D) text effects, 


A regular TV set can be hooked up to a computer so as to received computer signal instead of a television program. This hooking up is achieved with the help of a
Options: modem,    adapter,    cable,    aerial

Ans:B ,B

Memory management is :
Options: not used in modern operating system,    replaced with virtual memory on current systems,    not used on multiprogramming systems,    critical for even the simplest operating systems

Ans:D ,D

The most important part of a multiple DHCP configurations is to make sure you don't have which of the following in the different scopes? Select the best answer.
Options: Duplicate addresses,    Duplicate pools,    Duplicate subnets,    Duplicate default gateways

Ans:A ,A

Piyush walked 7 cm the direction of North and than he turned to his right and walked 6 m. After this he turned to his right and moved 15m. Now how far is he from the starting points ?
Options: NA

Ans:10 m,10 m

origin of chinab river in HP
Options: rohtang darra, peer panjal, bada bhangaal, baralacha darra


5.Security exploit is
Options: (A)a prepared application that takes advantage of a known weakness. (B) a tool used to quickly check computers on a network for known weaknesses. (C) an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network. (D) a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access. 1

Ans:15. (A),15. (A)

Plants hormone that induces cell division is
Options: auxins,    gibberellins,    kinins,    domins


The basic operations performed by a computer are
Options: A) Arithmetic operation B) Logical operation C) Storage and relative D) All the above


The period of a waveform is:
Options: the time required to complete one full cycle,    the number of cycles completed in one second,    the time required for the voltage to rise from 10% to 90% of the peak amplitude,    equal to 0.707 times the peak amplitude

Ans:A ,A

CSMA (Carrier Sense Multiple Access) is
Options: a method of determining which device has access to the transmission medium at any time,    a method access control technique for multiple-access transmission media.,    a very common bit-oriented data link protocol issued by ISO.,    network access standard for connecting stations to a circuit-switched network

Ans:B ,B

The estimation of the value of a function at a point beyond the interval in which the data lies is called known as
Options: Interpolation,    Simulation,    Emulation,    Extra polation

Ans:A ,A

A Processor
Options: is a device that performs a sequence of operations specified by instructions in memory.,    is the device where information is stored,    is a sequence of instructions,    is typically characterized by interactive processing and time of the CPU's time to allow quick response to each user.

Ans:A ,A

2.Match the following access rights :A-Specific user, B-User group, C-All ; 1- Individual user who are designated by user I, 2-A set of users who are individually defined, 3-Every user has access to the system.
Options: (A)A – 1, B – 2, C – 3 (B) A – 2, B – 1, C – 3 (C) A – 1, B – 3, C – 2 (D) A – 3, B – 2, C – 1 18

Ans:182. (A),182. (A)