ARPANET, the precursor to the Internet, was developed by:


Options: FAA,    Department of Defence,    NATO,    UART

Ans:B,B

More technology Related questions:


9.Role is
Options: (A)Avoiding catastrophic moment (B) Ease with which a system or component are modified to fit the problem area. (C) It is a bounded area of responsibility (D) None of these 24

Ans:239. (C),239. (C)


3.Retirement phase is
Options: (A)Reason for a computer program to resume execution after a failure, using status and results recorded at a checkpoint. (B) Period of time in the software life cycle during which support for a software product is terminated. | 105 (C) The fault detection mechanism is initiated after the system state has been changed to check if a fault has occurred. (D) None of these 22

Ans:223. (B),223. (B)


A primary key is which of the following?
Options: Any attribute,    An attribute that uniquely identifies each row,    An attribute that uniquely identifies each column,    A derived attribute

Ans:B ,B


The access method used for cassette tape is
Options: Direct,    Random,    Sequential,    All of the above

Ans:C,C


5.In Excel got functions? No? You need the insert function dialog box. How do you get it?
Options: (A)Right click a cell and then click insert (B) Click the insert menu and then click function (C) Type = in a cell (D) All of the above 13

Ans:135. (B),135. (B)


switching between portrait and landscape modes involves the:
Options: header and footer toolbar,print layout view, page setup dialog box, none of the above

Ans:C,page setup dialog box


What Enrico Fermi invented?
Options: X ray machine,    Betatron,    Cyclotron,    Nuclear reactor

Ans:D,D


. The Third Generation Computer was made with ________.
Options: A) Vacuum Tube B) Discrete Components C) IC D) Bio Chips

Ans:C,C


Filename extensions help identify certain files. What filename extension identifies command files?
Options: COM,    BAT,    EXE,    SYS

Ans:A ,A


You have your laptop directly connected into a router's Ethernet port. Which of the following are among the requirements for the copy flash tftp command to be successful? TFTP server software must be running on the router. TFTP server software must be running on your laptop. The Ethernet cable connecting the laptop directly into the router's Ethernet port must be a straight-through cable. The laptop must be on the same subnet as the router's Ethernet interface. The copy flash tftp command must be supplied the IP address of the laptop.
Options: 1, 3 and 4,    2, 4 and 5,    3 and 5 only,    5 only

Ans:B ,B


. When adding an image, which size mode will change the height or width of the image fit the control?
Options: a. Clip b. Stretch c. Zoom d. Crop

Ans:7 – b ,7 – b


. How do you tell one cell from another?
Options: a. By numbers b. By letters c. By its address d. by color

Ans:– c,– c


braazeel
Options: NA

Ans: 901. bhaarateey antariksh anusandhaan sangathan (isro) ka mukhyaalay kahaan hai ?, 901. bhaarateey antariksh anusandhaan sangathan (isro) ka mukhyaalay kahaan hai ?


Fathometer is used to measure
Options: Earthquakes,    Rainfall,    Ocean depth,    Sound intensity

Ans:C,C


The temperature inversion is
Options: whenever the normal decrease of atmospheric temperature,    when the decrease in temperature or moisture or both takes place,    whenever the normal decrease of atmospheric temperature or moisture or both change with height over a short vertical interval,    All of the above

Ans:C,C


All Operating Systems get their total memory initialized from?
Options: CPU,    BIOS,    ROM,    RAM

Ans:B ,B


How many ODI matches had Farokh Engineer played throughout his career?
Options: 5,    10,    15,    9

Ans:A,A


Most algorithms follow the format of
Options: Entering the input items, then displaying the input items, and then processing the output items,    Entering the input items, then processing the output items, and then displaying the output items,    Entering the input items, then processing the input items, and then displaying the output items,    Entering the output items, then displaying the output items, and then processing the output items

Ans:C ,C


. An organized collection of logically related data is known as 
Options: a. Data b. Meta data c. Database d. Information

Ans:– c,– c


The DBMS acts as an interface between what two components of an enterprise-class database system?
Options: Database application and the database,    Data and the database,    The user and the database application,    Database application and SQL

Ans:A ,A


The process that may cause physical weathering or mechanical rupture are
Options: abrasion, crystallization, pressure release,    abrasion, oxidation, hydrolysis,    crystallization, carbonation, thermal insolation,    None of the above

Ans:A,A


An Enterprise Resource Planning application is an example of a(n) ________ .
Options: single-user database application,    multiuser database application,    e-commerce database application,    data mining database application

Ans:B ,B


Which state of India became the first state to launch Rotavirus Vaccination Project ?
Options: NA

Ans:Himachal Pradesh,Himachal Pradesh


The list of coded instructions is called
Options: Computer program,    Algorithm,    Flowchart,    Utility programs

Ans:A ,A


0.Software processes are
Options: (A)Activities involved in producing software system (B) Activities involved in selling software systems | 87 (C) Activities involved in system design (D) Activities involved in managing systems 3

Ans:30. (A),30. (A)


You can have EISA and MCA devices in the same PC.
Options: True,    False,    ,    

Ans:B ,B


winner of first chandra dhar sharma guleri price in HP
Options: shri keshav, charanjeet singh, sunil sharma, surendernath

Ans:shri keshav,shri keshav


An internetworking protocol that provides virtual circuit service across multiple X.25 protocol, is
Options: X.75,    X.25,    X.400,    X.21

Ans:A ,A


What command is used with vi editor to move back to the beginning of a word?
Options: w,    e,    a,    b

Ans:D ,D


2.Exposure is
Options: (A)Trustworthiness with which a system or component can be modified to take advantage of new software or hardware technologies. (B) An error of some kind or an unexpected event occurs during the execution of a program (C) Here the objective of the process is to work with uses to explore their requirement and deliver a final system. (D) Possible loss or harm in computing system. 17

Ans:172. (C),172. (C)


De Morgan's first theorem says that a NOR gate is equivalent to a bubbled _____ gate.
Options: AND,    XAND,    XOR,    NOR

Ans:A ,A


The Average case occur in linear search algorithm
Options: a. When Item is somewhere in the middle of the array b. When Item is not in the array at all c. When Item is the last element in the array d. When Item is the last element in the array or is not there at all  

Ans:a,a


The computational technique used to compute the disk storage address of individual records is called:
Options: bubble memory,    key fielding,    dynamic reallocation,    hashing

Ans:D ,D


Chris Evert's name is associated with which sports?
Options: Tennis,    Swimming,    Skating,    Shooting

Ans:A,A


Computing systems can provide strategic information by
Options: making decision analysis possible,    providing corporate models for long-range planning,    causing managers to think,    All of the above

Ans:D ,D


Which two counties did Kapil Dev play?
Options: Northamptonshire & Worcestershire,    Northamptonshire & Warwickshire,    Nottinghamshire & Worcestershire,    Nottinghamshire & Warwickshire

Ans:A,A


What problem can occur if a printer cable is to close to a power cable?
Options: ESD Electrostatic Discharge,    EMI Electromagnetic Interference,    parity error,    no affect

Ans:B ,B


When and where athletics introduced in the Olympics?
Options: 1896 at Athens,    1900 at Paris,    1992 at Barcelona,    1995 at Athens

Ans:A,A


The percentage of earth surface covered by India is
Options: 2.4,    3.4,    4.4,    5.4

Ans:A,A


. Which of the following operating system reads and reacts in actual time?
Options: a. Quick Response System b. Real Time System c. Time Sharing System d. Batch Processing System

Ans: b, b


What technology is used for flat panel displays?
Options: Solid state,    RBG monitor,    VLSI,    Direct view storage tube

Ans:A,A


‘Encryption’ in cyber world means
Options: NA

Ans:Algorithmic alteration of password into scrabbled date to prevent access,Algorithmic alteration of password into scrabbled date to prevent access


The Central Processing Unit is an embeded chip that acts as the 'brains' of a computer. What Intel chip was used in the Altair (the first real personal computer)?
Options: 6502,    8080,    6400,    8286

Ans:B,B


malik mohammad jaayasee
Options: NA

Ans: this chontaint providaid u by subhash sund +919571691353, this chontaint providaid u by subhash sund +919571691353


What will be the output of the program? #include<stdio.h> int main() { const int i=0; printf("%d\n", i++); return 0; }
Options: 10,    11,    No output,    Error: ++needs a value

Ans:D ,D


In 1943, Franklin D. Roosevelt, Winston Churchill and Joseph Stalin met at Teheran primarily
Options: to discuss the strategy to be adopted by the Allies to invade Germany,    to consider a common plan of action by the Allies forces against the axis powers,    for creating an effective instrument for maintaining international peace,    to work out a common line of action against Japan

Ans:C,C


Uhal II is in which district and sub river of which river
Options:

Ans:Mandi,Mandi


2.Probability of an accident arising because of hazard is minimum subject of other costs
Options: (A)As low as reasonably practical (ALARP) risk (B) Architectural design (C) Attack (D) None of these 12

Ans:122. (A),122. (A)


Management's decision to rent a computer system may be based upon
Options: tax advantages,    desire to avoid a large one-time payment,    operational flexibility in changing hardware,    All of the above

Ans:D ,D


The table created by lexical analysis to describe all literals used in the source program, is:
Options: Terminal table,    Literal table,    Identifier table,    Reductions

Ans:B ,B

www.000webhost.com