Which of the following statements are correct about the program? #include<stdio.h> int main() { printf("%p\n", main()); return 0; }

Options: It prints garbage values infinitely,    Runs infinitely without printing anything,    Error: main() cannot be called inside printf(),    No Error and print nothing

Ans:B ,B

More C Language Related questions:

. How many characters can be entered in a single command line?
Options: a. 64 b. 127 c. 80 d. 90

Ans:6 – b ,6 – b

Which of the following is true concerning personal computers?
Options: They decrease the demand for mainframe computers,    They have been most successful in the home,    The electronic spreadsheet has been a primary reason for their popularity,    Their future is not so bright owning to the improved cost-performance ratio of minis and mainframes

Ans:C ,C

first railway line in HP
Options: pathankot-jogender nagar, kalka-shimla, Nangal-una-charudu, bhanupali-bilaspur


474. chandragrahan kab lagata hai?
Options: NA

Ans: poornima, poornima

8.Synchronous communications
Options: (A)It require some type of handshaking between tasks that are sharing data . This can be explicitly structured in code by the programmer, or it may happen at a lower level unknown to the programmer. (B) It involves data sharing between more than two tasks, which are often specified as being members in a common group, or collective. (C) It involves two tasks with one task acting as the sender/producer of data, and the other acting as the receiver/consumer. (D) It allows tasks to transfer data independently from one another. 1

Ans:18. (A),18. (A)

5.Fault tree analysis is
Options: (A)It is the process of modifying the state space of the system so that the effects of the fault are minimized and system can continue in operation in some degraded state. (B) Capacity of a system or component to continue normal operation despite the presence of hardware or software faults. | 103 (C) It is the widely used hazard technique (D) Incorrect step, process, or data definition in a computer program 20

Ans:205. (C),205. (C)

"The three most important inventions of this century are the nuclear bomb, the high yield hybrid speed, and the computer". Can you name the person who made this statement?
Options: Harry R Jordan,    Buckminster Fuller,    Jack Smith,    Jan Timmer

Ans:B ,B

The Token-Ring architecture was developed for a more efficient way to determine who should be transmitting at any one time. With Ethernet, collisions may take place, causing the transmitting computers to have to retransmit their data. The use of token guarantees that only one computer can transmit at a time. What happens as the network increases in size? Choose the best answer
Options: An additional token is added for every 1,000 nodes,    The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500,    The network becomes less efficient,    After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device

Ans:E ,E

The first mechanical calculating machine was made by
Options: William Oughtred,    Gottfried Leibnitz,    Blaise Pascal,    Charles Babbage

Ans:C ,C

Which of the following is not true about modifying table columns?
Options: You can drop a column at any time.,    You can add a column at any time as long as it is a NULL column.,    You can increase the number of characters in character columns or the number of digits in numeric columns,    You cannot increase or decrease the number of decimal places.

Ans:D ,D

. Which of the following is not an electronic computer?


Which key is used to increase left indent?
Options: Ctrl+I B. Ctrl+M C. Alt+I D. F10

Ans:– B ,

Piyush walked 7 cm the direction of North and than he turned to his right and walked 6 m. After this he turned to his right and moved 15m. Now how far is he from the starting points ?
Options: NA

Ans:10 m,10 m

. A ….allows you to write on screen with a digital pen and convert that writing into characters that the PC can process
Options: a. Monitor RS b. Tablet PC c. Database manager d. Media Center

Ans:7 – b ,7 – b

What type of join is needed when you wish to return rows that do have matching values?
Options: Equi-join,    Natural join,    Outer join,    All of the above.

Ans:D ,D

For some relations, changing the data can have undesirable consequences called:
Options: referential integrity constraints.,    modification anomalies.,    normal forms.,    transitive dependencies.

Ans:B ,B

9.Window class, onShow/2, defines
Options: (A)is executed when a window is becoming visible or is being hidden (B) when a window is being disabled or enabled this event is executed (C) this event is executed when the user switches to another window of the same application (D) when a window receives the keyboard focus this event is executed 2

Ans:19. (A),19. (A)

The rectangular boundary around a specific area on the display is called
Options: a window,    a conic section,    a view point,    a view plane

Ans:A ,A

The systems conversion technique of totally removing the existing system and immediately implementing the new system is called as
Options: crash conversion,    phased conversion,    pilot conversion,    parallel run

Ans:A ,A

50. sabase chamakeela grah kaunasa hai ?
Options: NA

Ans: shukr , shukr

2.In Microsoft PowerPoint view can be used to enter speaker comments
Options: (A)Normal (B) Slide show (C) Slide sorter (D) Notes page view 17

Ans:172. (D),172. (D)

Documentation is prepared
Options: at every stage,    at system design,    at system analysis,    at system development

Ans:A ,A

A binary adder is a logic circuit that can add _____ binary numbers at a time.
Options: Hundreds,    Thousands,    One,    Two

Ans:D ,D

In SQL, which command(s) is(are) used to issue multiple CREATE TABLE, CREATE VIEW, and GRANT statements in a single transaction?
Options: CREATE PACKAGE,    CREATE SCHEMA,    CREATE CLUSTER,    All of the above

Ans:B ,B

Client/server security includes which of the following?
Options: Physical security,    Change control security,    Measures taken to secure all systems,    All of the above.

Ans:D ,D

The entity integrity rule states that:
Options: no primary key attribute may be null.,    no primary key can be composite.,    no primary key may be unique.,    no primary key may be equal to a value in a foreign key.

Ans:A ,A

. The ….command is used to open windows based application directly from DOS prompt
Options: a. Run b. Start c. Load d. Execute

Ans:9 – b ,9 – b

Which was the first country to withdraw from CENTO?
Options: Iraq,    Afghanistan,    Turkey,    U.K.


Example of non-numerical data is
Options: Employee address,    Examination score,    Bank balance,    All of the above

Ans:A ,A

. Networking such as LAN, MAN started from

Options: A) First generation B) Second generation C) Third generation D) Fourth generation


615. bhagavaan buddh dvaara saaranaath mein diya gaya pahala pravachan boddh dharm mein kya kahalaata hai?
Options: NA

Ans: dharmachakrapravartan, dharmachakrapravartan

Integrated Circuits (Ics) are related to which generation of computers?
Options: A) First generation B) Second generation C) Third generation D) Fourth generation


ISDN stands for:
Options: internal select data nulls,    integrated services digital network,    interval set down next,    interior sector direct none

Ans:B ,B

6.In Excel if you begin typing an entry into a cell and then realize that you don’t want your entry placed into a cell, you
Options: (A)Press the Erase key (B) Press Esc (C) Press the Enter button (D) Press the Edit Formula button 16

Ans:166. (B),166. (B)

The Centre for Cellular and Molecular Biology is situated at
Options: Patna,    Jaipur,    Hyderabad,    New Delhi


87. sanyukt raashtr sangh ke vartamaan mahaasachiv kaun hai ?
Options: NA

Ans: baan-kee-moon , baan-kee-moon

A device that converts light energy to electrical energy is called a:
Options: thermocouple,    solar cell,    photodiode,    photo transistor

Ans:B ,B

A memory bus is mainly used for communication between
Options: processor and memory,    processor and I/O devices,    I/O devices and memory,    input device and output device


. Before creating a master document, you must switch to _________ 
Options: a. Normal View b. Outline View c. Web Layout View d. Print Layout View

Ans: –  B , –  B

In which year was UK's premier computing event called "The Which Computer" started?
Options: 1980,    1985,    1986,    1987


Charging of a capacitor through a resistance obeys?
Options: NA

Ans:Exponential Law ,Exponential Law

writers of kangra ghati aur himachal ki kala
Options: dr, bansi ram sharma, Dr parmanand, narayan chand, M. S. randhava

Ans:ms randhava,ms randhava

When a bearing in the power supply fan goes out, what should you replace?
Options: fan,    case,    bearing,    power supply

Ans:D ,D

Large computer system typically uses:
Options: Line printers,    Ink-jet printers,    Dot-matrix printers,    Daisy wheel printers


You have your laptop directly connected into a router's Ethernet port. Which of the following are among the requirements for the copy flash tftp command to be successful? TFTP server software must be running on the router. TFTP server software must be running on your laptop. The Ethernet cable connecting the laptop directly into the router's Ethernet port must be a straight-through cable. The laptop must be on the same subnet as the router's Ethernet interface. The copy flash tftp command must be supplied the IP address of the laptop.
Options: 1, 3 and 4,    2, 4 and 5,    3 and 5 only,    5 only

Ans:B ,B

. Which PowerPoint feature allows the user to create a simple presentation without having to spend too much time on it?
Options: a. AutoContent Wizard b. Animation c. Color Schemes d. Chart Wizard

Ans:1 – A ,1 – A

A computer program that converts assembly language to machine language is
Options: Compiler,    Interpreter,    Assembler,    Comparator

Ans:C ,C

Data is gathered, describing what is happening in the
Options: input area,    transformation,    output area,    All of the above

Ans:D ,D

A general purpose single-user microcomputer designed to be operated by one person at a time is
Options: Special-purpose computer,    KIPS,    M,    PC

Ans:D ,D

7.Which of the following is not a relational database?
Options: (A)dBase IV (B) 4th Dimension (C) FoxPro (D) Reflex 10

Ans:107. (D),107. (D)