The first recipient of Nehru Award was


Options: Martin Luther King,    Khan Abdul Ghaffar Khan,    Mother Teresa,    U Thant

Ans:D,D

More Honours and Awards Related questions:


John Napier invented Logarithm in
Options: A) 1614 B) 1617 C) 1620 D) None of above

Ans:-A,-A


1.Method of defining a collection of hardware and software components and their interfaces to establish the framework for the development of a computer system
Options: (A)As low as reasonably practical (ALARP) risk (B) Architectural design (C) Attack (D) None of these 12

Ans:121. (B),121. (B)


Which of the following is a special purpose language used to describe to a computer's operating system.
Options: LOGO,    APL,    ICL,    CORAL

Ans:C ,C


. What was the main disadvantage of vacuum tubes?
Options: A) They were larger in size B) They consumed a lot of electricity C) They produced heat and often burned out D) The operation cost was high

Ans:C,C


Who is largely responsible for breaking the German Enigma codes, created a test that provided a foundation for artificial intelligence?
Options: Alan Turing,    Jeff Bezos,    George Boole,    Charles Babbage

Ans:A,A


596. kisake shaasanakaal mein morakko ka yaatree ibnabatoota bhaarat aaya?
Options: NA

Ans: mohammad bin tugalak, mohammad bin tugalak


What command is used to hang up a MODEM when using the "AT Command set"?
Options: ATZ,    ATD,    ATR,    ATH

Ans:D ,D


6.An identification field in a record. Select the best fit for answer
Options: (A)Record (B) File (C) Database (D) Key field 4

Ans:46. (C),46. (C)


The ASCII code for the character J is:
Options: 1001 0001,    1001 1010,    0100 1010,    1010 0001

Ans:C ,C


2.In Microsoft PowerPoint the following will not advance the slides in a slide show view
Options: (A)Esc key (B) The spacebar (C) The Enter key (D) The mouse button

Ans:2. (A),2. (A)


5.Fault tree analysis is
Options: (A)It is the process of modifying the state space of the system so that the effects of the fault are minimized and system can continue in operation in some degraded state. (B) Capacity of a system or component to continue normal operation despite the presence of hardware or software faults. | 103 (C) It is the widely used hazard technique (D) Incorrect step, process, or data definition in a computer program 20

Ans:205. (C),205. (C)


The component of an ICAI (Intelligent Computer-Asslsted Instruction) presenting information to the student is the:
Options: student model,    problem-solving expertise,    tutoring module,    All of the above

Ans:C ,C


. By default we can save the file in
Options: a. Desktop b. Recycle bin c. My document d. My computer

Ans:7 – c ,7 – c


Where is a hub specified in the OSI model?
Options: Session layer,    Physical layer,    Data Link layer,    Application layer

Ans:B ,B


Which of the following commands displays the configurable parameters and statistics of all interfaces on a router?
Options: show running-config,    show startup-config,    show interfaces,    show versions

Ans:C ,C


where is NCERT
Options: kangra, shimla, bilaspur, hamirpur, kullu

Ans:solan,solan


Which of the following is a part of the Central Processing Unit?
Options: Printer,    Keyboard,    ) Mouse,    Arithmetic Logic Unit

Ans:D ,D


fist internation crecket stadium of HP
Options: dharamshala, chail, naggar, gaggal

Ans:dharamshala,dharamshala


The transport fleet of Air Force consists of
Options: IL-765,    Boeing-731,    AN-352,    All of the above

Ans:D,D


8.Checkbox in window programming
Options: (A)displays text and can be clicked with the mouse or spacebar (B) a checkmark which the user can select (C) a list from which one item can be selected. (D) area in which text may be entered.

Ans:8. (B),8. (B)


The tropical easterlies wind lie at
Options: 0-30? latitude,    30-60? latitude,    60-90? latitude,    10-40? latitude

Ans:A,A


4.Communications device, combines transmissions from several devices into on line is
Options: (A)concentrator (B) modifier (C) multiplexer (D) full-duplex line 6

Ans:64. (C),64. (C)


6.This data structure allows deletions at both ends of the list but insertion at only one end.
Options: (A)Input-restricted deque (B) Output-restricted deque (C) Priority queues (D) None of the above 1

Ans:16. (A),16. (A)


Match the device driver HIMEM.SYS to its operation
Options: Supports (ANSI) terminal emulation,    Manages the use of extended memory,    Uses expanded memory on an 80386 processor,    Supports code page switching

Ans:B ,B


. You can switch from one program to another on the desktop by clicking within the desired program’s window or by clicking on its ….button
Options: a. Icon b. Taskbar button c. Folder d. None of above

Ans:8 – b ,8 – b


The largest continent in the world is
Options: Africa,    Asia,    Australia,    Antarctica

Ans:B,B


Who said "God helps those who help themselves"?
Options: Andre Maurois,    Andre Gide,    Algernon Sidney,    Swami Vivekananda

Ans:C,C


7.Distributed Memory
Options: (A)A computer architecture where all processors have direct access to common physical memory (B) It refers to network based memory access for physical memory that is not common (C) Parallel tasks typically need to exchange data. There are several ways this can be accomplished, such as through, a shared memory bus or over a network, however the actual event of data exchange is commonly referred to as communications regardless of the method employe(D) (D) None of these

Ans:7. (B),7. (B)


Where is trilokinath temple in himachal
Options: NA

Ans:Lahaul Spiti,Mandi


A word processor would most likely be used to do
Options: a. keep an account of money spent b. do a computer search in media center c. maintain an inventory d. type a biography

Ans:– D,D


3.Expert systems
Options: (A)Combining different types of method or information (B) Approach to the design of learning algorithms that is structured along the lines of the theory of evolution. (C) Decision support systems that contain an Information base filled with the knowledge of an expert formulated in terms of if-then rules (D) None of these 4

Ans:43. (C),43. (C)


5.Falsification is
Options: (A)Modular design of a software application that facilitates the integration of new modules (B) Showing a universal law or rule to be invalid by providing a counter example (C) A set of attributes in a database table that refers to data in another table (D) None of these 4

Ans:45. (B),45. (B)


sanjay jal vidhut
Options:

Ans:kinnaur,kinnaur


which is at the apex of the three tier system of Panchayati Raj system in India?
Options: NA

Ans:Zilla Parishad ,Zilla Parishad


Michael Ferraria is associated with which games/sports?
Options: Billiards,    Karate,    Hockey,    Tennis

Ans:A,A


Helping people keep track of things is the purpose of a(n) ________ .
Options: database,    table,    instance,    relationship

Ans:A ,A


6.Auxiliary storage is
Options: (A)Secondary storage (B) Primary storage (C) Processing device (D) None of these 8

Ans:86. (A),86. (A)


The BIOS is the abbreviation of ________.
Options: Basic Input Output System B. Best Input Output System C. Basic Input Output Symbol D. Base Input Output System

Ans:– A ,


5.In Microsoft PowerPoint the following features should you use when typing in he notes text box
Options: (A)Slide shows (B) Insert (C) Slide master (D) Zoom 2

Ans:25. (D),25. (D)


Which of the following is true concerning a procedure?
Options: You do not create them with SQL.,    They do not need to have a unique name.,    They include procedural and SQL statements.,    They are the same thing as a function.

Ans:C ,C


In order to increase the amount of memory available for a system, what is the maximum size of a swap partition (with kernel version 2.2.x)?
Options: 2GB,    128MB,    64MB,    32MB

Ans:A ,A


Which of the following commands is not the vi Input mode command?
Options: rch,    R,    S,    j

Ans:D ,D


In which decade was the telephone invented?
Options: 1850s,    1860s,    1870s,    1880s

Ans:C,C


Which county did speedster Javagal Srinath play for in 1995?
Options: Kent,    Glamorgan,    Gloucestershire,    Leicestershire

Ans:C,C


You are working with a class C network. You are required to configure it for five subnets, each of which will support 25 nodes. What subnet should you use?
Options: 255.255.255.0,    255.255.255.224,    255.255.255.240,    255.255.255.248

Ans:B ,B


If you are to use [Control-c] as the interrupt key instead of [Del], then you will have to use
Options: tty ^c,    stty intr \^c,    stty echoe,    stty echo \^a

Ans:B ,B


. … controls the way in which the computer system functions and provides a means by which users can interact with the computer
Options: a. The platform b. The operating system c. Application software d. The motherboard

Ans:1 – b ,1 – b


What is the acronym for Single In-Line Memory Module?
Options: SIMM,    SILMM,    SM,    SMM

Ans:A ,A


. We need system files to run
Options: a. MS Word b. MS Excel c. MS Dos d. MS Access

Ans:0 – c ,0 – c


Within a database, the sequential organization of data by a common key is called:
Options: logical structure,    inverted structure,    simple structure,    All of the above

Ans:C ,C

www.000webhost.com