Nuclear fission is caused by the impact of


Options: neutron,    proton,    deuteron,    electron

Ans:A,A

More General Science Related questions:


2.In iterative process model, software process represents
Options: (A)Sequential activities (B) Cycle of activities (C) Random activities (D) None of these 3

Ans:32. (B),32. (B)


. If 4/6 entered in a cell without applying any formats, Excel will treat this as
Options: a. Fraction b. Number c. Text d. Date

Ans:– d,– d


Dot-matrix is a type of
Options: Tape,    Printer,    Disk,    Bus

Ans:B ,B


Soda water contains
Options: carbonic acid,    sulphuric acid,    carbon dioxide,    nitrous acid

Ans:C,C


where is army trainign command
Options: kangra, shimla, bilaspur, hamirpur, kullu

Ans:shimla,shimla


Human beings are referred to as Homosapiens. Which device is called Silico sapiens?
Options: Monitor,    Hardware,    Robot,    Computer

Ans:D,D


83. Ctrl + O
Options: a. Save Document b. Print Document c. Close Document d. Open Document

Ans:–  D ,–  D


To select text by shading as you drag the mouse arrow over the text is known as...
Options: Clip art,    To highlight,    To fetch,    To decode

Ans:B,B


once installed on a device, each Android Application lives in ...?
Options: NA

Ans:Security Sandbox ,Security Sandbox


8.What is the name of the Visual Basic Editor utility that allows you to view the Microsoft Access type library’s available objects and members?
Options: (A)Object Viewer (B) Object Browser (C) Type Library Spy (D)None of above 13

Ans:138. (B),138. (B)


The ancient Olympics Games came to a sudden end when the Roman Emperor Theodosius banned them as paper manifestations. The modern Olympic Games were received after a lapse of nearly
Options: ten centuries,    twelve centuries,    fifteen centuries,    eighteen centuries

Ans:C,C


A consideration evaluated by management when planning to convert to a computer system is :
Options: maintenance,    available software,    CPU sized speed,    All of the above

Ans:D ,D


2.In Batch processing
Options: (A)Several computer programs runs one after another without human interaction to run each program individually. (B) Several computer programs runs one after another with human interaction to run each program individually (C) Selected computer programs runs one after another with human interaction to run each program individually (D) None is true 16

Ans:162. (A),162. (A)


How many devices does USB support?
Options: 127,    125,    100,    225

Ans:A ,A


Which of the following divides the high speed signal into frequency bands?
Options: t-switch,    modem,    frequency-division multiplexer,    time-division multiplexer

Ans:C ,C


What will be the output of the program? #include<stdio.h> #include<math.h> int main() { float n=1.54; printf("%f, %f\n", ceil(n), floor(n)); return 0; }
Options: 2.000000, 1.000000,    1.500000, 1.500000,    1.550000, 2.000000,    1.000000, 2.000000

Ans:A ,A


. Clear the contents by pressing “DELETE” key from a keyboard will clear
Options: Text Only B. Format Only C. Contents Only D. Both Contents and Format

Ans:– C ,


14. While working with MS-DOS, which command is used to rename a file named file1.doc to file2.doc from a different directory called dir1?
Options: a. Ren2.doc dirfile1.doc b. Ren file1.doc file2.doc c. Ren .docdir.doc d. Ren dir1file1.doc file2.doc

Ans:Correct Answer: d,Correct Answer: d


Encryption is being used primarily with
Options: file retention,    transaction entry,    computer processing,    data communication

Ans:D ,D


What is the recommended way to fix the registry description for the printer driver
Options: Delete the spool file,    Run regedit.exe and remove any reference to the printers,    Run sysedit.exe and remove any reference to the printers,    Remove the printer driver and re¬install it

Ans:D ,D


kadchham vangtu
Options:

Ans:kinnaur,kinnaur


A number which is stored and processed but not in the standard exponential form is called
Options: Floating point number,    Fixed point number,    Octal number,    Decimal number

Ans:B,(Banswer


5.The way a particular application views the data from the database that the applicaton uses is a
Options: (A)Module (B) Relational model (C) Schema (D) Sub-schema 13

Ans:135. (D),135. (D)


The bubbles in a bubble memory pack are created with the help of?
Options: Laser beam,    Magnetic field,    Electric field,    X-ray

Ans:B,B


IBM's Micro Channel Architecture (MCA) specifies which type of the following bit access widths?
Options: 8 bit & 16 bit,    16 bit & 24 bit,    16 bit & 32 bit,    32 bit & 64 bit

Ans:C ,C


A microcomputer is a computer that uses a _____ for its CPU.
Options: chips,    registers,    microprocessor,    vacuum tube

Ans:C ,C


Hibra is tribtry river of which river and in which district
Options: Chamba, kangra, mandi

Ans:A,Chamba


A chart comprised of bars, each representing a period of time, is called a
Options: cent chart,    gault chart,    gantt chart,    grand chart

Ans:C ,C


If you delete the contents of NVRAM and reboot the router, what mode will you be in?
Options: Privileged mode,    Global mode,    Setup mode,    NVRAM loaded mode

Ans:C ,C


Heavy water is
Options: deuterium oxide,    PH7,    rain water,    tritium oxide

Ans:A,A


2.Window class, onKBFocus/3, defines
Options: (A)is executed when a window is becoming visible or is being hidden (B) when a window is being disabled or enabled this event is executed (C) this event is executed when the user switches to another window of the same application (D) when a window receives the keyboard focus this event is executed 2

Ans:22. (D),22. (D)


A computer program that converts assembly language to machine language is
Options: Compiler,    Interpreter,    Assembler,    Comparator

Ans:C ,C


If N1/N2 = 2, and the primary voltage is 120 V, what is the secondary voltage?
Options: 0 V,    36 V,    40 V,    60 V

Ans:D ,D


The microcomputer, Intel MCS-80 is based on the widely used Intel
Options: 8080 microprocessor,    8085 microprocessor,    8086 microprocessor,    8082 microprocessor

Ans:A,(Aanswer


The language used in application programs to request data from the DBMS is referred to as the
Options: DML,    DDL,    query language,    All of the above

Ans:A ,A


6.In Excel when you want to insert a blank imbedded excel object in a word document you can
Options: (A)Click the object command on the insert menu (B) Click the office links button on the standard toolbar (C) Click the create worksheet button on the formatting toolbar (D) Click the import excel command on the file menu 8

Ans:86. (A),86. (A)


3.Which of the following type s of queries are action queries?
Options: (A)Update queries. (B) Crosstab Queries (C) Parameter queries (D) Append Queries 6

Ans:63. (D),63. (D)


The difference between a multiplexer and a statistical multiplexer is
Options: Statistical multiplexers need buffers while multiplexers do not need buffers,    Multiplexer use X.25 protocol, while statistical multiplexers use the Aloha protocol,    Multiplexers often waste the output link capacity while statistical multiplexers optimize its use,    Multiplexers use Time Division Multiplexing (TDM) while statistical multiplexers use Frequency Division Multiplexing (FDM)

Ans:A ,A


A microprocessor unit, a memory unit, and an input/output unit form a:
Options: CPU,    compiler,    microcomputer,    ALU

Ans:C ,C


what is percentage of male pupultion in himachal
Options: 50.72, 50.27, 50.77, 50.22

Ans:50.72,50.72


Which of the following shows the masses of the three elementary particles in decreasing order?
Options: Leptons, Baryons, Mesons,    Mesons, Baryons, Leptons,    Baryons, Mesons, Leptons,    Leptons, Mesons Baryons

Ans:C,C


Modem is used in data transmission. When was it invented and in which country?
Options: 1963, USA,    1965, Germany,    1950, USA,    1950, Japan

Ans:C ,C


Which best describes a fragmented hard drive?
Options: The platters are bad,    Data files are corrupted,    Clusters of data are damaged,    Files are not stored in consecutive clusters

Ans:D ,D


RS-449/442-A/423-A is
Options: a set of physical layer standards developed by EIA and intended to replace RS-232-C.,    a check bit appended to an array of binary digits to make the sum of the all the binary digits,    a code in which each expression conforms to specific rules of construction, so that if certain errors occur in an expression the resulting expression will not conform to the rules of construction and thus the presence of the errors is detected,    the ratio of the number of data units in error to the total number of data units

Ans:A ,A


where is manu mandir in HP
Options: kinnaur , lahul, kullu, mandi

Ans:kullu,kullu


Which option will be used with touch command to change the access time?
Options: -a,    -b,    -t,    -h

Ans:A ,A


A file that includes an index directory to facilitate random access is
Options: Sequential file,    Indexed file,    Random file,    Serial file

Ans:B ,B


2.An accident is
Options: (A)Unplanned events, which results in injury, damage to property, or to the environment (B) Quantitative measure of the magnitude of error (C) Period that starts when a system is considered and ends when the product meets its initial operational capability (D) All the above 11

Ans:112. (A),112. (A)


Which of the following name does not relate to stacks?
Options: a. FIFO lists b. LIFO list c. Piles d. Push-down lists

Ans: a, a


constituency with smallest area in HP
Options: shimla, dharam shala, kasauli,gagret

Ans:shimla shahari,shimla shahari

www.000webhost.com