Naina Devi mela



More Fairs and Festivals Related questions:

All Operating Systems get their total memory initialized from?
Options: CPU,    BIOS,    ROM,    RAM

Ans:B ,B

695. arthashaastr ka nobal puraskaar kis varsh shuru hua?
Options: NA

Ans: 1969, 1969

You are testing the resistance in Ohms of a fuse on a 15K amp system. If the fuse is good, the meter should read?
Options: 0.0,    0.2,    5.0,    2.0

Ans:A ,A

7.What method can you use to add a new table to your database?
Options: (A)Use Design View to create a table (B) Enter data directly by using a datasheet (C) Both of above (D) All of the above 7

Ans:77. (C),77. (C)

Maximum length of DOS command using any optional parameter is
Options: a. 26 characters b. 87 characters c. 127 characters d. None of above

Ans:Correct Answer: c ,Correct Answer: c

'A Secular Agenda' is a book written by
Options: Arun Shourie,    Mani Shankar Aiyar,    Prem Shankar Jha,    M.J. Akbar


File record length
Options: should always be fixed,    Should always be variable,    depends upon the size of the file,    should be chosen to match the data characteristics

Ans:D ,D

Point out the error in the program (in Turbo-C). #include<stdio.h> #define MAX 128 int main() { const int max=128; char array[max]; char string[MAX]; array[0] = string[0] = 'A'; printf("%c %c\n", array[0], string[0]); return 0; }
Options: Error: unknown max in declaration/Constant expression required,    Error: invalid array string,    None of above,    No error. It prints A A

Ans:A ,A

In phase 1 of the system development life cycle, which of the following aspects are usually analyzed?
Options: outputs,    input (transactions),    controls,    All of the above

Ans:D ,D

. A function inside another function is called a ….. function.
Options: a. Nested b. Round c. Sum d. Text

Ans:– a,– a

Which function positive logic is equivalent to OR function in negative logic?
Options: NOT,    AND,    OR,    NOR

Ans:B ,B

India's first fast breeder neutron reactor was
Options: Zerlina,    Apsara,    Purnima-I,    Kamini


Who developed the idea of Crop Rotation?
Options: Potato Peterson,    Turnip Townsend,    Cabbage Carlson,    Swede Svenson


Which of the following TCP/IP protocol is used for remote terminal connection service?
Options: TELNET,    FTP,    RARP,    UDP

Ans:A ,A

. What is the shortcut key to insert new sheet in current workbook?
Options: F11 B. Alt + F11 C. Ctrl + F11 D. Shift + F11

Ans:– D ,

chhabia darra
Options: lahaul, chamba-pangi, lahol-bharmaur, kullu-kangra


5.In Microsoft PowerPoint material consisting of text and numbers is best presented as
Options: (A)A table slide (B) A bullet slide (C) A title slide (D) All of above 11

Ans:115. (A),115. (A)

The imitation of a systems investigation may result from:
Options: a manager's formal request,    a scheduled system's review,    an analyst's investigation,    All of the above

Ans:D ,D

1.In Microsoft PowerPoint you can edit an embedded organization chart object by
Options: (A)Clicking the edit object (B) Double clicking the organization chart object (C) Right clicking the chart object, then clicking edit MS-Organization Chart object (D) (B) and (C) both are true 12

Ans:121. (D),121. (D)

What expansion types do most pll/plll motherboards support?
Options: MCA, PCI,    ISA, EISA,    ISA, PCI, AGP,    ISA, VESA, PCI

Ans:C ,C

Mercury is commonly used as a thermometric fluid rather than water because
Options: specific heat of mercury is less than water,    specific heat of mercury is more than water,    mercury has greater visibility than water,    density of mercury is more than the water


Who is the first Indian woman to win an Asian Games gold in 400m run?
Options: M.L.Valsamma,    P.T.Usha,    Kamaljit Sandhu,    K.Malleshwari


The reserved word enum is used for which of the following?
Options: To define a range for an attribute.,    To define a range for a class.,    To define a range for a relationship.,    All of the above.

Ans:A ,A

3.Rootkit is
Options: (A)an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network. (B) a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access. (C) a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators. (D) None of these 1

Ans:13. (B),13. (B)

Trojan-Horse programs
Options: are legitimate programs that allow unauthorized access,    do not usually work,    are hidden programs that do not show up on the system,    usually are immediately discovered

Ans:A ,A

The absorption of ink by blotting paper involves
Options: viscosity of ink,    capillary action phenomenon,    diffusion of ink through the blotting,    siphon action


Which of the following is/are Protocols of Application?
Options: FTP B. DNS C. Telnet D. All of above

Ans:– D ,

The CPU of a computer transfers print output to a temporary disk memory at high speed and then gets back to processing another job without waiting for the output to got to the printer. In this way, the CPU does not remain idle due to its own high speed as compared to the low speed of the printer. What is the name of this memory?
Options: External memory,    I/O memory,    ROM,    Buffer memory

Ans:D ,D

You set the console password, but when you display the configuration, the password doesn't show up; it looks like this: [output cut] Line console 0 Exec-timeout 1 44 Password 7098C0BQR Login [output cut] What cause the password to be stored like this?
Options: encrypt password,    service password-encryption,    service-password-encryption,    exec-timeout 1 35

Ans:B ,B

. The _____, or typeface, defines the appearance and shape of letters, numbers, and special characters.
Options: a. font b. font size c. point d. paragraph formatting

Ans:– A,– A

973. phyooj kee taar kis padaarth kee banee hotee hai?
Options: NA

Ans: tin aur seese kee mishradhaatu, tin aur seese kee mishradhaatu

where is hari roy mandir in hp
Options: kinnaur , lahul, kullu, chamba


. The _____ is a special toolbar that displays a series of names, each of which represents a list of commands that can be used to perform tasks.
Options: a. scroll bar b. status bar c. title bar d. menu bar

Ans: – D , – D

Determine the resistance value and tolerance of a resistor that has the following color bands; first band is red, second band is red, third band is orange, and the fourth band is gold
Options: 220 Ohm, 5%,    220 Ohm, 10%,    22,000 Ohm, 5%,    22, 000 Ohm, 10%

Ans:C ,C

Stars appears to move from east to west because
Options: all stars move from east to west,    the earth rotates from west to east,    the earth rotates from east to west,    the background of the stars moves from west to east


Which TTL sub-family has maximum speed?
Options: standard TTL,    schottky-clamped TTL,    high speed TTL,    low power TTL

Ans:B ,B

. In a query, using the keyword _______________ will return records in which the field value is between two numbers.
Options: a. Between b. Is Null c. Like d. Not

Ans:7 – a ,7 – a

Prince Charles and Princess Diana of Britain announce their separation in
Options: 1990,    1991,    1996,    1997


District with highest number of village panchayats?
Options: shimla, mandi, kangra, una


If a variable is a pointer to a structure, then which of the following operator is used to access data members of the structure through the pointer variable?
Options: .,    &,    *,    ->

Ans:D ,D

A floppy disk contains
Options: Circular tracks only,    Sectors only,    Both circular tracks and sector,    All of the above

Ans:C ,C

. What does FAT stands for?
Options: a. File attribute type b. File allocation table c. Format All Tabs settings d. File for all type

Ans:0 – b ,0 – b

Customer data (name and address, shipping instructions, credit terms, etc.) is provided by the:
Options: manufacturing information system,    order entry subsystem,    billing subsystem,    marketing information system

Ans:C ,C

Pointers are useful in
Options: Locating a particular sector of a magnetic disk,    Pointing mistakes in input data,    Traversing a linked list,    All of the above

Ans:C ,C

What is the frequency range of the IEEE 802.11g standard?
Options: 2.4Gbps,    5Gbps,    2.4GHz,    5GHz

Ans:C ,C

1.In Access press to Open the Visual Basic Editor from a selected property in the property sheet for a form or report
Options: (A)F6 (B) F7 (C) F8 (D) None of these 4

Ans:41. (B),41. (B)

Which of the following is the expansion of EBCDIC
Options: Extended bit comparable to digital interface for computer,    Extended bootable computerised digital infrared calculator,    Extended binary coded decimal interchange code,    Extended binary coded decimal information code

Ans:C ,C

. Which OS deos not support networking between computers?
Options: a. Windows 3.1 b. Windows 95 c. Windows 2000 d. Windows NT

Ans: a, a

The Asian Games were held in Delhi for the first time in...?
Options: 1951,    1963,    1971,    1982


The hardware device Jhat acts as both a switching and connecting unit is called a(n):
Options: concentrator,    RS-232C port,    multiplexer,    communications processor

Ans:C ,C