One should not connect a number of electrical appliances to the same power socket because


Options: this can damage the appliances due to overloading,    this can damage the domestic wiring due to overloading,    this can damage the electrical meter,    the appliance will not get full voltage

Ans:B,B

More physics Related questions:


A 2000-character text file has to be transmitted by using a 1,200 baud modem. Can you tell how long will it take?
Options: 2 seconds,    20 seconds,    120 seconds,    12 seconds

Ans:B ,B


Singalila National Park
Options: Karnataka,West Bengal,Tripura,MadhyaPradesh

Ans:West Bengal,


8.In Excel how can you find specific information in a list?
Options: (A)Select Tools > Finder from the menu (B) Click the Find button on the standard toolbar (C) Select Insert > Find from the menu (D) Select Data > Form from the menu to open the Data Form dialog box and click the Criteria button 10

Ans:108. (D),108. (D)


. An organized collection of logically related data is known as 
Options: a. Data b. Meta data c. Database d. Information

Ans:– c,– c


. Which control type do you use to create a calculated control?
Options: a. command button b. combo box c. text box d. list box

Ans:– c,– c


A data flow diagram is
Options: the modern version of flowchart,    mainly used at the systems specification stage.,    the primary output of the systems design phase,    All of the above

Ans:B ,B


. What are the benefits of network?
Options: a. To share hardware components b. To share information and share software c. It reduces cost d. All of above

Ans:4 – d ,4 – d


A PC with a 486DX2 processor runs internally at SOMhz. What speed would its external logic be running?
Options: l0Mhz,    25Mhz,    50Mhz,    100 Mhz

Ans:B ,B


0.Black hat is
Options: (A)someone who subverts computer security without authorization or who uses technology (usually a computer or the Internet) for terrorism, vandalism (malicious destruction), credit card fraud, identity theft, intellectual property theft, or many other types of crime. (B) a person, usually not an expert in computer security, who breaks into computer systems by using prepackaged automated tools written by others. (C) hacker who utilizes technology to announce a political message. (D) None of these 2

Ans:20. (A),20. (A)


232. netradaan mein netr ke kis bhaag ka daan kiya jaata hai?
Options: NA

Ans: korniya, korniya


Research scientists all over the world are taking steps towards building computers with circuits patterned after the complex inter connections existing among the human brain's nerve cells. What name is given to such type of computers?
Options: Intelligent computers,    Supercomputers,    Neural network computers,    Smart computers

Ans:C ,C


INTERPOL means
Options: International Political Conference,    International Criminal Police Organisation,    None of these,    International Association of Police Officers

Ans:B,B


who was founder of mughal dynasty?
Options:

Ans:babar,


Which of the following is not an important principle for evaluating the raw data for decision-making:
Options: selection,    pattern,    everage,    overview

Ans:C ,C


Static electricity thrives is which type of environment?
Options: cold and humid,    warm and humid,    warm and dry, cold and dry

Ans:cold and dry,D


Multi user systems provided cost savings for small business because they use a single processing unit to link several
Options: A) Personal computers B) Workstations C) Dumb terminals D) Mainframes

Ans:-C,-C


. You have field ‘Sex’ of type Byte Number. How to limit its value to 0 and 1 only?
Options: a. By setting required to ‘Yes’ b. By using default value c. By defining validation rule d. By using format

Ans:– c,– c


khab pariyona
Options:

Ans:kinnaur,kinnaur


Sultanpur National Park
Options: Karnataka,Haryana,Tripura,MadhyaPradesh

Ans:Haryana,


Which of the following is not a member of G-15?
Options: Pakistan,    Malaysia,    Indonesia,    India

Ans:A,A


Main circuit board in a computer is...
Options: Decoder,    Highlight,    Select,    Mother board

Ans:D,D


To produce sound it is necessary that
Options: the source should execute longitudinal vibrations,    the source should execute transverse vibrations,    the source may execute any type of vibrations,    the vibrations of source are not necessary

Ans:C,C


Which command will clear all the translations active on your router?
Options: show ip nat translations,    show ip nat statistics,    debug ip nat,    clear ip nat translations *

Ans:D ,D


2.The Worst case occur in linear search algorithm when
Options: (A)Item is not in the array at all (B) Item is the last element in the array (C) Item is the last element in the array or is not there at all (D) None of above 1

Ans:12. (C),12. (C)


What TCP/IP protocol is used for remote terminal connection service?
Options: UDP,    RARP,    FTP,    TELNET

Ans:D ,D


In order to edit a chart, you can
Options: a. Triple click the chart object b. Click and drag the chart object c. Double click the chart object d. Click the chart object

Ans: – C , – C


. The central processing unit (CPU) consists of
Options: A) Input, output and processing B) Control unit, primary storage, and secondary storage C) Control unit, arithmetic-logic unit and primary storage D) Control unit, processing, and primary storage

Ans:C,C


Point out the error in the program. #include<stdio.h> #define MAX 128 int main() { char mybuf[] = "India"; char yourbuf[] = "BIX"; char const *ptr = mybuf; *ptr = 'a'; ptr = yourbuf; return 0; }
Options: Error: cannot convert ptr const value,    Error: unknown pointer conversion,    No error,    None of above

Ans:A ,A


4.To display sales grouped by country, region, and salesperson, all at the same time
Options: (A)Use the Sort Descending command. (B) Use the Pivot table view command (C) Use the find command on specified groups (D) All of above 60 | 8

Ans:84. (B),84. (B)


Point out the error in the program? struct emp { int ecode; struct emp *e; };
Options: Error: in structure declaration,    Linker Error,    No Error,    None of above

Ans:C ,C


A characteristic of a file server is which of the following?
Options: Manages file operations and is shared on a network.,    Manages file operations and is limited to one PC.,    Acts as a fat client and is shared on a network.,    Acts as a fat client and is limited to one PC.

Ans:A ,A


A form defined 
Options: a. where data is placed on the screen b. the width of each field c. both a and b d. none of the above

Ans:.a,.a


amar sonaar baangla jo raveendranaath taigor ne likha hai
Options: NA

Ans: 383. lodhee vansh ke sansthaapak kaun the?, 383. lodhee vansh ke sansthaapak kaun the?


Which of the following columns is(are) are required in a table?
Options: A foreign key,    An alternate key,    A primary key,    A surrogate key.

Ans:C ,C


Which standard govern parallel communications?
Options: RS232,    RS-232a,    CAT 5,    IEEE 1284

Ans:D ,D


A ________ is a stored program that is attached to a table or a view.
Options: pseudofile,    embedded SELECT statement,    trigger,    None of the above is correct.

Ans:C ,C


Which of the following is correct regarding the Background of slides
Options: Background color of slides can be change B. Picture can be set as Slide Background C. Texture can be set as Slide Background D. All of the Above

Ans:– D ,


A memory space used for the temporary storage of data is
Options: PROM,    SAM,    Scratchpad storage,    Buffer

Ans:C ,C


An operating system intended for use on microprocessor based systems that support a single user is
Options: PC-DOS,    MS-DOS,    UNIX,    CP/M

Ans:D ,D


The Shimla Convention is an agreement that sets
Options: Shimla as a tourist spot,    Shimla as the capital of Himachal Pradesh,    boundary between India and Tibet,    None of the above

Ans:C,C


Which of the following terminals' output most closely resembles the output produced by a plotter?
Options: graphics terminal,    POS terminal,    hardcopy terminal,    all the above

Ans:A,A


Pulakesin II was the most famous ruler of
Options: Chalukyas,    Cholas,    Pallavas,    Satavahanas

Ans:A,A


Which of the following languages is more suited to a structured program?
Options: PL/1,    FORTRAN,    BASIC,    PASCAL

Ans:D,(Danswer


. Which of the following views displays the field name, description, and properties of a table?
Options: a. Datasheet View b. Design View c. Layout View d. Table View

Ans:4 – b ,4 – b


0.In Microsoft PowerPoint to create a PowerPoint presentation from a template
Options: (A)Click File, New, select the presentations tab and choose a template (B) Click File, New Template and choose a template (C) Import a presentation template from PowerPoint’s template wizard (D) Click Create Template from scratch, Now 14

Ans:140. (A),140. (A)


Express -7 as 16-bit signed binary numbers.
Options: 0000 0000 0000 0111,    1000 0000 0000 0111,    . 0111 0000 0000 0001,    0111 0000 0000 0000

Ans:B ,B


235. laal rakt kanikaon ka nirmaan hamaare shareer ke kis bhaag mein hota hai?
Options: NA

Ans: asthi majja (bonai marrow), asthi majja (bonai marrow)


The highest mountains in Africa, which is not part of any mountains chain, is
Options: Mt. Aconcagua,    Mr. Kilimanjaro,    Mt. Kosciuszko,    Mont Blanc

Ans:B,B


'The General Happiness is the end of the state' who said this?
Options: Hegel,    Benthem,    Plato,    Green

Ans:B,B


. What is the first stage in software development?
Options: A) Specification and design B) Testing C) System Analysis D) Maintenance

Ans:C,C

www.000webhost.com