The non-permanent members of the Security Council of the UN elected by the General Assembly for two years term at present include (2-year term which begins on the January 1, 2011)

Options: Japan, India, Hungary, Venezuela,    Morocco, Cape, Verde, Belgium, Russia,    Zimbabwe, Venezuela, India, France,    Colombia, Germany, India, Portugal, South Africa


More World Organisations Related questions:

Eritrea, which became the 182nd member of the UN in 1993, is in the continent of
Options: Asia,    Africa,    Europe,    Australia


What is the most likely cause of an "FDD controller Failure" error message?
Options: you did not set the jumper on the floppy drive to drive A,    you forgot to flash CMOS,    you installed the floppy disk drive cable backward,    your computer's floppy drive is defective

Ans:C ,C

3.A storage devices where the access time is effectively independent of the location of the data is referred as
Options: (A)Direct access (B) Secondary storage (C) Primary storage(D) None of these 2

Ans:23. (A),23. (A)

7.In Microsoft PowerPoint size of an organization chart object
Options: (A)Is determined by the presentation design and cannot be changed (B) Is determined by the presentation design but can be changed in PowerPoint (C) Is dependent on the amount of text within the organization chart (D) Both (A)and (C) are true 4

Ans:47. (D),47. (D)

A co-processor
Options: a. Is relatively easy to support in software b. Causes all processor to function equally c. Works with any application d. Is quite common in modern computer


The space factor when determining the efficiency of algorithm is measured by
Options: a. Counting the maximum memory needed by the algorithm b. Counting the minimum memory needed by the algorithm c. Counting the average memory needed by the algorithm d. Counting the maximum disk space needed by the algorithm  


Regarding a VDU, Which statement is more correct?
Options: A) It is an output device B) It is an input device C) It is a peripheral device D) It is hardware item


. The _____ is a special toolbar that displays a series of names, each of which represents a list of commands that can be used to perform tasks.
Options: a. scroll bar b. status bar c. title bar d. menu bar

Ans: – D , – D

Options: (A)Extent to which a system or component performs a broad range of functions. (B) The objective of an organization to achieve. (C) Methods and techniques for converting data to or from graphic display via computers. (D) None of these 21

Ans:211. (C),211. (C)

The register which keeps track of the execution of a program and which contains the memory address of the instruction currently being executed is known as
Options: Index register,    Memory address register,    Program counter,    Instruction register

Ans:C ,C

Which of the following function is used to find the first occurrence of a given string in another string?
Options: strchr(),    strrchr(),    strstr(),    strnset()

Ans:C ,C

What can greatly reduce TCP/IP configuration problems?
Options: WINS Server,    WINS Proxy,    DHCP Server,    PDC

Ans:C ,C

Which one of the following equations most directly determines the amount of current flowing through a resistor when you know the value of the resistor and the voltage drop across it?
Options: E = PR,    E = I2R,    I = E/R,    I = ER

Ans:C ,C

. when you print preview a worksheet
Options: a. the entire worksheet is displayed b. the selected range is displayed c. the active portion of the worksheet is displayed d. a, b and c

Ans:– d,– d

On the feasibility committee, department representatives serve as:
Options: direct users of the new system,    liaison to their departments,    ready sources of information,    All of the above

Ans:D ,D

3.In Data flow (Activity model)
Options: (A)It shows the software process as a set of activities each of which carries out data transformation. (B) Data and associated programs are reengineered to remove limits on the data processing. (C) It is responsible for the definition, operation, protection, performance, and recovery of a database. (D) Development of a database to meet a user’s requirements. 16

Ans:163. (A),163. (A)

The world famous Ajanta caves are situated in
Options: Orissa,    Andhra Pradesh,    Kerala,    Maharashtra


Which utility is an all-purpose tool for troubleshooting TCP/IP problems?
Options: NBTSTAT,    Netstat,    PING,    Hostname

Ans:C ,C

The steady or initial phase of the magnetic storms is
Options: preceded by storm sudden commencement,    magnetic storm at middle and low altitudes,    a sharp increase of the field,    None of the above


Shaurya Chakra made up of bronze is awarded for
Options: gallantry otherwise than in the face of the enemy,    most conspicuous bravery for some act of self sacrifice,    gallantry in the presence of enemy,    None of the above


The blocking factor is:
Options: a group of fields stored in adjacent memory.,    the number of physical records per page.,    attributes grouped together by the same primary key.,    attributes grouped together by the same secondary key.

Ans:B ,B

Brad is in charge of a small network and wants to make it simple but secure. The users want to have full control over their data and still be able to share data with the rest of the office. The networking knowledge of the office staff is excellent. Which network(s) would be the best to set up?
Options: Peer-to-peer,    Master domain,    Server-based,    Ethernet

Ans:A ,A

In which of the following years, the membership of the Security Council was increased from 11 to 15 (under Article 23)?
Options: 1960,    1965,    1972,    1975


7.The memory allocation scheme subject to external fragmentation is
Options: (A)segmentation (B) swapping (C) pure demand paging (D) multiple contiguous fixed partitions | 83 27

Ans:277. (A),277. (A)

800. kriket pich kee lambaee kitanee hotee hai?
Options: NA

Ans: 22 gaj ya 66 phut, 22 gaj ya 66 phut

In the following code, the P2 is Integer Pointer or Integer? typedef int *ptr; ptr p1, p2;
Options: Integer,    Integer pointer,    Error in declaration,    None of above

Ans:B ,B

The main properties of cosmic ray particles are
Options: its electric charge,    its rest mass,    its energy,    All of these are its properties


The process of soil development is called
Options: leaching,    illuviation,    eluviations,    pedogenesis


. Multiple calculations can be made in a single formula using…..
Options: Standard Formulas B. Array Formula C. Complex Formulas D. Smart Formula

Ans: – B ,

A competitor to the dominant Lotus 1-2-3 is
Options: (A) Microsoft Excel (B) Microsoft Word (C) Microsoft PowerPoint (D) None of these 10..

Ans:9. (A),9. (A)

The calculation of expected outcomes in intended to help the manager
Options: identify problems,    identify solutions,    evaluate solutions,    All of the above

Ans:C ,C

The UNSECO's 'Prix Jules Verne' prize has been given to which of the following serials of Doordarshan?
Options: The World This Week,    Surabhi,    Eye Witness,    Turning Point


. To display the content of the disk we use
Options: a. Format b. Dir c. Copy d. WinZip

Ans:6 – b ,6 – b

Wadia Institute of Himalayan Geology is located at
Options: Delhi,    Shimla,    Dehradun,    Kulu


Which of the following is a problem of file management system?
Options: a. difficult to update b. lack of data independence c. data redundancy d. All of above

Ans:d,All of above

who made Raani ka Kot Durg
Options: veer sen, rajender prakash, ajbar sen, Sevant Sen

Ans:D,Sevant Sen

What is the measurement of the volleyball court?
Options: 5 m x 4 m divided into two parts by a net,    8 m x 7 m divided into two parts by a net,    18 m x 9 m divided into two parts by a net,    12 m x 11 m divided into two parts by a net


battle of khanwa was fought between
Options: rana sanga and babur, ibrahim lodhi and babur, akbar and Ahmad shah abdali

Ans:rana sanga and babur,rana sanga and babur

654. kis bhaarateey raajy kee do raajadhaaniyaan hain?
Options: NA

Ans: jammoo-kashmeer, jammoo-kashmeer

4.It is a tool used to quickly check computers on a network for known weaknesses.
Options: (A)security exploit (B) vulnerability scanner (C) packet sniffer (D) rootkit 2

Ans:24. (B),24. (B)

The ozone layer restricts
Options: Visible light,    Infrared radiation,    X-rays and gamma rays,    Ultraviolet radiation


Which command displays the configuration register setting?
Options: show ip route,    show boot version,    show version,    show flash

Ans:C ,C

How can you add Amit, a new user, to your system?
Options: Using useradd,    Using adduser,    Using linuxconf,    All of the above

Ans:D ,D

. “Ctrl + Backspace” is used to
Options: Delete the single letter just before the cursor B. Delete the single letter just after the cursor C. Delete the word just before the cursor D. Delete the word just after the cursor

Ans:– C ,

How many characters form a secondary name for a file?
Options: a. 8 b. 12 c. 3 d. None of the above

Ans:b   ,12

How can you apply exactly the same formatting you did to another text?
Options:  A) Copy the text and paste in new location. Then type the new text again., B) Copy the text and click on Paste Special tool on new place, C) Select the text then click on Format Painter and select the new text, D) All of above,


Programmers refer to the items needed to reach a problem's goal as the _____
Options: Input,    Out put,    Processing,    Purpose

Ans:A ,A

0.Truthfulness with which software satisfies differing system constraints and user needs is
Options: (A)Active objects (B) Activity (C) Adaptability (D) None of these 11

Ans:110. (C),110. (C)

How much districts are there in Meghalaya?
Options: 11,    2,    5,    9


Which among the following is/are the major factor/factors responsible for the monsoon type of climate in India?LocationThermal contrastUpper air circulationInter-tropical convergence zone
Options: I,    II, III,    II, III and IV,    I, II, III and IV