who was founder of kahloor riyasat


Options: shivram chand, veer chand chandel, hari chand, datar chand

Ans:veer chand chandel,veer chand chandel

More Founders Of Teretories Related questions:


Nuclear power is ____ thermal power.
Options: cheaper than,    costlier than,    equal in amount,    they cannot be related

Ans:A,A


In an absolute loading scheme, which loader function is accomplished by assembler.
Options: Reallocation,    Allocation,    Linking,    Loading

Ans:A ,A


The use of packaged data models can offer which of the following benefits?
Options: Reduce implementation time and costs,    Higher quality models,    Both A and B.,    Neither A nor B.

Ans:C ,C


In which of the following is a single-entity instance of one type of related to a single-entity instance of another type?
Options: One-to-One Relationship,    One-to-Many Relationship,    Many-to-Many Relationship,    Composite Relationship

Ans:A ,A


7.Software validation is
Options: (A)Checking system conformations to its specifications (B) Developing system conformations to its specifications (C) Operating system (D) None of these 4

Ans:47. (A),47. (A)


Todar Mal was
Options: revenue minister in the court of Akbar,    one of the nine gems in the court of Akbar,    known for his reforms in policies of land revenue during Akbar's reign,    All of the above

Ans:D,D


The average salinity of sea water is
Options: 3%,    3.5%,    2.5%,    2%

Ans:B,B


. The first microprocessor built by the Intel corporation was called
Options: A) 8008 B) 8080 C) 4004 D) 8800

Ans:C,C


1.A large collections of files are called
Options: (A)Fields (B) Records (C) Databases (D) File system 8

Ans:81. (B),81. (B)


Sirohi National Park
Options: Karnataka,Kerala,Tripura,Manipur

Ans:Manipur,


17. Which command is used to create root directory and FAT on disk?
Options: a. Chkdsk b. Command.com c. Format d. Fat

Ans:Correct Answer: c ,Correct Answer: c


The cell reference for cell range of G2 to M12 is _______
Options: A. G2.M12 B. G2;M12 C. G2:M12 D. G2-M12

Ans:– C ,G2:M12


The command that can be used to restrict incoming messages to a user is
Options: mesg,    grep,    halt,    sleep

Ans:A ,A


Who is the author of the book 'No Full Stops in India'?
Options: Raj Mohan Gandhi,    Shyam lal,    E.M. Forster,    Mark Tully

Ans:D,D


. Which is not an option for Filter on a text field?
Options: a. Begins With b. Between c. Contains d. End With

Ans:5 – b ,5 – b


What are the IRQ's for sound card?
Options: IRQ8,    IRQ4,    IRQ5,    IRQ7

Ans:C ,C


How to remove the unwanted action from recorded macro without recording the whole macro again?
Options: By using the Find and Edit Action Option B. By clicking on the Refresh button in the Macro toolbar C. By edit the macro in the Visual Basic Editor D. Macro cannot be edited.

Ans:– C ,


After doing a low-level format, what would be the next step in configuring the hard drive in a system?
Options: Format DOS partition,    Install operating system,    Configure DMA channel and back-up interrupt,    Partition had disk

Ans:A ,A


. How can you update the values of formula cells if Auto Calculate mode of Excel is disabled?
Options: a.  F8 b.  F9 c.  F10 d.  F11

Ans:– b,– b


Tirthan sanctury is located at ?
Options: NA

Ans:Kullu ,Kullu


Which of the following are the members of CARICOM?
Options: Angrilla, Antigua, Trinidad, Tobago,    Barbados, Belize, St. Lucia, St. Vincent,    Dommica, Grenade, Guyana, Jamaica,    All of the above

Ans:D,D


8.Match the following in RAID scheme : AParallel access array, B-Independent access array, 1- All member disks participate in the execution of every I/O request. 2- Each member disk participates separately in the execution of every I/O request. 3- Here spindles of the individual drives are synchronized so that each disk head is in the same position on each disk at any given time.
Options: (A)A – 1, 3 and B – 2 (B) A – 1, and B – 2, 3 (C) A – 2 and B – 1, 3 (D) A – 1, 2 and B – 3 15

Ans:158. (A),158. (A)


where is shakti devi mandir in Hp
Options: kinnaur , lahul, kullu, chamba

Ans:chamba,chamba


The purpose of an application program is to
Options: Convert program written in high level language to machine language,    Meet specific user needs,    Allow the operating system to control resources better,    Make off-line equpment run better

Ans:B ,B


High-level languages:
Options: are "procedure-oriented",    are very difficult to use,    cannot be used with automatic systems.,    require knowledge of the computer design

Ans:A ,A


Which of the following program is not a utility?
Options: Debugger,    Editor,    Spooler,    All of the above

Ans:C ,C


The working language(s) of the UNESCO is/are
Options: French only,    English only,    English and French,    English, French and Russian

Ans:C,C


Digitizers can be converted from "dumb" to "smart" through the addition of:
Options: a microprocessor,    an electromagnetic coupling,    keyboard,    a scanner

Ans:A ,A


Which of the following statements is a true statement concerning the open database connectivity standard (ODBC)?
Options: Each vendor desiring to be ODBC-complaint provides an ODBC driver.,    Requires certain criteria to be met in order to establish an ODBC connection.,    Provides a programming interface that provides a common language for application programs to access and process SQL databases independent of the RDBMS accessed.,    All of the above.

Ans:D ,D


Routing tables of a router keeps track of
Options: MAC Address Assignments B. Port Assignments to network devices C. Distribute IP address to network devices D. Routes to use for forwarding data to its destination

Ans:– D ,


598. abhigyaan shaakuntalam’ ke lekhak kaun the?
Options: NA

Ans: kaalidaas, kaalidaas


Which of the following statements is true concerning routines and triggers?
Options: Both consist of procedural code.,    Both have to be called to operate.,    Both run automatically.,    Both are stored in the database.

Ans:A ,A


78. bhaarat kee pratham mahila mukhyamantree kaun thee ?
Options: NA

Ans: shreematee sucheta krpalaanee, shreematee sucheta krpalaanee


The core of an electromagnet is said to be in saturation when:
Options: the core is permitted to move freely within the coil,    an increase in current through the coil causes no further increase in the mmf,    frequent changes in the direction of current through the coil causes heating effects in the core material,    changing the polarity of the current in the coil changes the polarity of the magnetic field around the core

Ans:B ,B


During the MIS development process, progress reporting meeting are held
Options: daily,    weekly,    monthly,    all of the above

Ans:B ,B


751. bhaarateey sanvidhaan mein kitanee anusoochiyaan hain?
Options: NA

Ans: 12 anusoochee, 12 anusoochee


The headquarters of International Labour Organisation is at
Options: Paris,    New York,    Hague,    Geneva

Ans:D,D


short cut for satluj sub rivers
Options: Banaspati swaha

Ans:b-no spiti swan,b-no spiti swan


. Which of the following is first generation of computer
Options: A) EDSAC B) IBM-1401 C) CDC-1604 D) ICL-2900

Ans:9-A,9-A


Two of the great Mughals wrote their own memories. There were
Options: Babar and Humayun,    Humayun and Jahangir,    Babar and Jahangir,    Jahangir and Shahjahan

Ans:C,C


what is gender ration of hamirpur in HP?
Options:

Ans:1096,1096


Which one of the following is the first National Park established in India?
Options: NA

Ans:Corbett,Corbett


Which of the following is the largest and most powerful computer manufacture in the world
Options: IBM,    Intel,    Novel,    Microsoft

Ans:A ,A


. The word Abacus is derived from Abax, a word from
Options: A) Latin language B) Greek Language C) Sanskrit language D) Ancient Egypt

Ans:A,A


. Operating system is a ….
Options: a. System software b. Application software c. Presentation software d. Database software

Ans:7 – a ,7 – a


Which of the following technique is used for fragment?
Options: a technique used in best-effort delivery systems to avoid endlessly looping packets,    a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame,    one of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size,    All of the above

Ans:C ,C


9.A- Press DOWN ARROW or CTRL+DOWN ARROW , B- Press SHIFT+LEFT ARROW: 1Move the selected control down, 2- Reduce the width of the selected control.
Options: (A)A-1, B-2 (B) A-2, B-2 (C) A-1, B-1 (D) A-2, B-1 6

Ans:59. (A),59. (A)


. Windows 2000 server uses the
Options: a. FAT 16 b. NTFS c. FAT 64 d. FAT 32

Ans:3 – b ,3 – b


Which of the following presentation elements can you modify using the slide master?
Options: a. Slide comments b. Slide transitions c. Speaker note font and color d. All of above

Ans: – B , – B


The symbols used in an assembly language are
Options: Codes,    Mnemonics,    Assembler,    All of the above

Ans:B,(Banswer

www.000webhost.com