who was founder of kunihar riyasat


Options: abhoj dev, ajay dev, dhruv dev, padam dev

Ans:abhoj dev,abhoj dev

More Founders Of Teretories Related questions:


In cricket, a run taken when the ball passes the batsman without touching his bat or body is called
Options: leg bye,    bye,    bosie,    drive

Ans:B,B


Resolution of externally defined symbols is performed by
Options: Linker,    Loader,    Compiler,    Assembler

Ans:A ,A


. To insert slide numbers
Options: a.  Insert a text box and select Insert >> Page Number b.  Insert a textbox and select Insert >> Number >> PageNumber c.  Choose Insert >> Slide Number d.  Insert a new text box and select Insert >> slide Number

Ans:8 – D ,8 – D


. The commonly used standard data code to represent alphabetical, numerical and punctuation characters used in electronic data processing system is called
Options: A) ASCII B) EBCDIC C) BCD D) All of above

Ans:D,D


.   A chart can be put as a part of the presentation using
Options: a. Insert -> Chart b. Insert -> Pictures -> Chart c. Edit -> Chart d. View -> Chart

Ans:9 – B ,9 – B


. How do you magnify your document?
Options: a. View, Zoom b. Format, Font c. Tools, Options d. Tools, Customize

Ans: –  A , –  A


An attribute name should be which of the following?
Options: Singular verb or verb phrase,    Follow a standard format,    Use a alias,    All of the above.

Ans:B ,B


Which 8-bit chip was used in many of Tandy's TRS-80 computers?
Options: Z-8000,    Motorola 6809,    Z-8088,    Z-80

Ans:D ,D


3.Processor-bound tasks
Options: (A)use the processor more often (B) use more processor time (C) use less processor time (D) always take longer to execute 22

Ans:223. (B),223. (B)


Which function positive logic is equivalent to OR function in negative logic?
Options: NOT,    AND,    OR,    NOR

Ans:B ,B


. Which of the following generation computers had expensive operation cost?
Options: A) First B) Second C) Third D) Fourth

Ans:A,A


SCSI must be terminated with?
Options: Dip switch,    Resistor,    BNC,    All of the above

Ans:B ,B


A system design is said to be functionally modular if
Options: the system is able to handle all the function of the application,    each module performs a specific function and can be developed relatively independently by programmers,    the system makes extensive use of function. keys for maximum user assistance,    the system is developed using structured programming through COBOL or PASCAL

Ans:B ,B


6.In Access press ALT+F4 to
Options: (A)Open a new database (B) Open an existing database (C) Exit Office Access 2007Access (D) None of these

Ans:6. (C),6. (C)


The research and development department at your office has been experimenting with different technologies to help improve the performance of the network. One group has been examining the use of a broadband network versus a based band network. Select the correct statement about broadband and baseband.
Options: Broadband networks carry several channels on a single cable, whereas in a baseband network several cables carry one channel,    Baseband networks carry a single channel on a single cable, whereas broadband networks carry several channels on a single cable,    Baseband refers to local area networks, and broadband refers to wide area networks.,    Baseband operates at a standard bit rate, whereas broadband may operate at different rates as needed

Ans:B ,B


Short-term finance is usually for a period ranging up to
Options: 5 months,    10 months,    12 months,    15 months

Ans:C,C


. Which of the following is the system tool?
Options: a. Backup b. Disk defragmenter c. Both of above d. File

Ans:6 – c ,6 – c


Locations in the main memory of a computer are called
Options: Alphabets,    Words,    Data,    Characters

Ans:B ,B


The percentage of India's total population employed in agriculture is nearly
Options: 40%,    50%,    60%,    70%

Ans:D,D


. How many types of storage loops exists in magnetic bubble memory
Options: A) 8 B) 4 C) 16 D) 2

Ans:D,D


With which sport is the Jules Rimet trophy associated?
Options: Basketball,    Football,    Hockey,    Golf

Ans:B,B


Which of the following transmission systems provides the highest data rate to an individual device
Options: Computer bus,    Telephone lines,    Voice band modem,    leased lines

Ans:A ,A


On a class B network, how many hosts are available at each site with a subnet mask of 248?
Options: 16,382,    8,190,    4,094,    2,046

Ans:D ,D


Which of the following is not a relational database?
Options: a . dBase IV b. 4th Dimension c. FoxPro d. Reflex

Ans:.d,.d


9.A good query system
Options: (A)Can accept English language commands (B) Allows non-programmers to access information stored in a database (C) Can be accessed only by data prssing professionals (D) Both (A)and (B) 7

Ans:69. (B),69. (B)


If no multivalued attributes exist and no partial dependencies exist in a relation, then the relation is in what normal form?
Options: First normal form,    Second normal form,    Third normal form,    Fourth normal form

Ans:B ,B


The strongest bonds exist between the particles found within
Options: metamorphic rocks,    igneous rocks,    sedimentary rock,    all have similar strength of bonds

Ans:B,B


9.In Microsoft PowerPoint you were giving your presentation, and you need to click a slide that’s few slides back. How do you get there?
Options: (A)Press ESC to get back into a normal view; click the slide thumbnail in normal view; then click the resume slide show button (B) Press backspace until your desired slide (C) Right click, point to go on the shortcut menu, point to by title, and click the slide you want to go to (D) All of above 13

Ans:129. (C),129. (C)


There are several careers within data processing operations, including data-entry operator.
Options: Computer operator,    Programmer,    System Analyst,    Key-punch operator

Ans:A ,A


. Who is credited with the idea of using punch cards to control patterns in a waving machine?
Options: A) Pascal B) Hollerith C) Babbage D) Jacquard

Ans:D,D


Which of the following is not a characteristic of a system?
Options: operates for some purpose,    has homogeneous components,    operates within a boundary,    has interacting components

Ans:B ,B


The typical area of sal forest in the Indian peninsular upland occurs
Options: on the western ghats,    between the Tapti and the Narmada,    to the north-east of the Godavari,    on the Malwa plateau

Ans:D,D


An application where only one user accesses the database at a given time is an example of a(n) ________ .
Options: single-user database application,    multiuser database application,    e-commerce database application,    data mining database application

Ans:A ,A


Which of the following statement is valid?
Options: A) Lady Augusta is the first programmer B) Ada is the daughter of Lord Byron, a famous English poet C) ADA is a programming language developed by US Defense D) All of above

Ans:-D,-D


. Which is the latest version of MS Windows?
Options: a. Windows 2007 b. Windows 8.1 c. Windows 2008 d.Windows 7

Ans: b, b


The word processing task associated with changing the appearance of a document is
Options: A) Editing B) Writing C) Formatting D) All of above

Ans:-C,-C


Before a disk drive can access any sector record, a computer program has to provide the record's disk address. What information does this address specify?
Options: Track number,    Sector number,    Surface number,    All of the above

Ans:D,D


5.The quickest way to create a PowerPoint presentation is to use the
Options: (A)Word for windows templates (B) Auto creation wizard (C) Auto content wizard (D) Presentation wizard 8

Ans:85. (C),85. (C)


.   Format painter
Options: a. To paint pretty pictures on your slides b. To copy formatting from one object or piece of text and then apply it elsewhere c. To change the background color of your slides d. To paint pretty pictures on background of slides

Ans:3 – B ,3 – B


1.Method of defining a collection of hardware and software components and their interfaces to establish the framework for the development of a computer system
Options: (A)As low as reasonably practical (ALARP) risk (B) Architectural design (C) Attack (D) None of these 12

Ans:121. (B),121. (B)


What kind of battery is most likely included in a cordless electric knife?
Options: Zinc-carbon battery,    Mercury-cell battery,    Nicad battery,    Lead-acid battery

Ans:B ,B


Which of the following conditions is used to transmit two packets over a medium at the same time?
Options: Contention,    Collision,    Synchronous,    Asynchronous

Ans:B ,B


The radiation belts are zones in space around the
Options: Earth,    Jupiter and Saturn,    Mercury,    Earth, Jupiter and Saturn

Ans:D,D


You need to allow one host to be permitted to attach dynamically to each switch interface. Which two commands must you configure on your catalyst switch to meet this policy? Switch(config-if)# ip access-group 10 Switch(config-if)# switchport port-security maximum 1 Switch(config)# access-list 10 permit ip host 1 Switch(config-if)# switchport port-security violation shutdown Switch(config)# mac-address-table secure
Options: 1 and 3,    2 and 4,    2, 3 and 5,    4 and 5

Ans:B ,B


1.Evolutionary Development
Options: (A)It describes the basic entities in the design and relation between them. (B) Observational techniques used to understand social and organizational requirements. | 99 (C) It is based on the idea of developing an initial implementation, exposing it uses on requirement and refining it through many versions until an adequate system has been developed (D) Based on an idea of developing an initial implementation, exposing this to uses comment and retiring it until and adequate system has been developed. 17

Ans:171. (B),171. (B)


6.In shortest service time first policy, applied on disk scheduling, the disk request is selected
Options: (A)That requires the least movement of disk arm from its current position. (B) That requires the maximum movement of disk arm from its current position. (C) That is recently received. (D) On random. 15

Ans:156. (A),156. (A)


. Which report section prints once at the bottom of every printed page?
Options: a. Detail b. Page Header c. Page Footer d. Report Header

Ans:5 – c ,5 – c


Data security threats include
Options: hardware failure,    privacy invasion,    fraudulent manipulation of data,    All of the above

Ans:B ,B


4.In Excel you can use the horizontal and vertical scroll bars to
Options: (A)Split a worksheet into two panes (B) View different rows and columns (C) Edit the contents of a cell (D) View different worksheets 18

Ans:184. (B),184. (B)


_____ are knowledge based system to which present rules are applied to solve a particular problem.
Options: ES,    AI,    KBS,    Base rule 0

Ans:A ,A

www.000webhost.com