Rong Tong


Options:

Ans:lahaul spiti,lahaul spiti

More Power Corp. in Himachal Pradesh Related questions:


5.Match the following : A- Maintenance control: B- Maintenance prediction: C- Maintenance process: 1-Cost of planning and scheduling hardware preventive maintenance, and software maintenance and upgrades, managing the hardware and software baselines, and providing response for hardware corrective maintenance. 2Predicting the number of change requires a system understanding and the relationship between the system and external environment. 3- It is triggered by a set of change requests from system users, management or customers.
Options: (A)A-1, B-3,C-2 (B) A-1,B-2,C-3 (C) A-2,B-3,C-1 (D) A-3,B-2,C-1 21

Ans:215. (B),215. (B)


raana kumbha ne
Options: NA

Ans: 857. naalanda vishvavidhaalay kee sthaapana kisane kee thee?, 857. naalanda vishvavidhaalay kee sthaapana kisane kee thee?


. Which computers used operating systems by Microsoft?
Options: A) IBM PCs B) Apple/Macintosh PCs C) IBM Compatibles D) Both A & C

Ans:D,D


The functional area showing the greatest interest in the concept of functional information systems is the
Options: financial function,    manufacturing function,    both (a) and (6),    neither (a) nor (b)

Ans:D ,D


526. aaryasamaaj kee sthaapana kab aur kahaan kee gayee thee?
Options: NA

Ans: mumbee mein 1875 mein, mumbee mein 1875 mein


Pakistan which rejoined the Commonwealth, had pulled itself out of it in the year
Options: 1978,    1975,    1972,    1982

Ans:C,C


Conversion of a hexadecimal number 4E16 to binary number is
Options: 10011012,    10011102,    11011002,    1101112

Ans:B ,B


Set of premitted values of each attribute is called
Options: Domain B. Tuple C. Relation D. Schema

Ans:– A ,


A T-switch is used to
Options: control how messages are passed between computers,    echo every character that is received,    transmit characters one at a time,    rearrange the connections between computing equipment

Ans:D ,D


0.In Microsoft PowerPoint toolbars that are displayed by default in the PowerPoint window includes
Options: (A)Menu bar, standard toolbar, formatting toolbar, drawing toolbar, status bar (B) Menu bar, standard toolbar, formatting toolbar, drawing toolbar, status bar (C) Standard toolbar, formatting toolbar, drawing toolbar, status bar (D) Menu bar, standard toolbar, status bar, drawing toolbar 3

Ans:30. (B),30. (B)


. To change the volume label
Options: a. Vol b. Label c. Scandisk d. None

Ans:5 – b ,5 – b


Outer covering of virus made up of protein is
Options: capsid,    coat,    virion,    viriod

Ans:A,A


0.Execution time
Options: (A)where the process will reside in memory, then absolute code can be generated (B) where the process will reside in memory, then the compiler must generate relocatable code (C) if the process can be moved during its execution from one memory segment to another (D) all of the above 27

Ans:270. (C),270. (C)


. 1 nibble equals to
Options: A) 1 bits B) 2 bits C) 4 bits D) 8 bits

Ans:8-C,8-C


Which key should be pressed to start a new paragraph in MS-Word?
Options: Down Cursor Key B. Enter Key C. Shift + Enter D. Ctrl + Enter

Ans:– B ,


Which of the following is an example of a client-server model?
Options: TELNET,    FTP,    DNS,    All of the above

Ans:D ,D


Tolkappiyam is associated with the
Options: first Sangam period,    second Sangam period,    third Sangam period,    post-third Sangam period

Ans:B,B


A common reason for changing an information system is
Options: new requirements,    new technology,    problems in the existing system,    All of the above

Ans:D ,D


116. tulaseedaasakrt raamacharitamaanas hindee bhaasha kee kis bolee mein likhee gayee hai ?
Options: NA

Ans: avadhee, avadhee


1.Script kiddie is
Options: (A)someone who subverts computer security without authorization or who uses technology (usually a computer or the Internet) for terrorism, vandalism (malicious destruction), credit card fraud, identity theft, intellectual property theft, or many other types of crime. (B) a person, usually not an expert in computer security, who breaks into computer systems by using prepackaged automated tools written by others. (C) hacker who utilizes technology to announce a political message. (D) None of these 2

Ans:21. (B),21. (B)


in which year was UK’s premier computing event called ?The which computer? started?
Options: A) 1980 B) 1985 C) 1986 D) 1987

Ans:-A,-A


9.FORTRAN is
Options: (A)Formula Translation (B) A high-level mathematically oriented programming language (C) Both A & B (D) None of these 3

Ans:29. (C),29. (C)


Which of the following is not functionally a complete set?
Options: AND, OR,    NAND,    NOR,    AND, OR, NOT

Ans:A ,A


where is yudh smarak
Options: kangra, chamba, bilaspur, hamirpur, kullu

Ans:kangra,kangra


Compilers and interpreters are themselves
Options: High-level language,    Codes,    Programs,    Mnemonics

Ans:C,(Canswer


What can he used to set up a firewall on a Linux system?
Options: netstat,    route,    trace,    ipchains

Ans:D ,D


The task(s) of the Lexial analysis phase is/are:
Options: to parse the source program into the basic elements or tokens of the language,    to build a literal table and an identifier table,    to build a uniform symbol table,    All of the above

Ans:D ,D


After you have compiled your kernel, what do you have to edit to boot your new kernel image?
Options: /boot/lilo.conf,    /etc/conf.modules,    /etc/named.boot,    /etc/lilo.conf

Ans:D ,D


What is the shortcut key for “Superscript ” the selected text?
Options: Ctrl + = B. Ctrl + – C. Ctrl + Shift + = D. Ctrl + Shift + –

Ans:– C ,


Which of the following are not done by Business Intelligence (BI) systems?
Options: Analyze past and current activities only,    Process and record transactions only,    Both of the above are correct.,    Neither of the above is correct.

Ans:B ,B


The transistor has a collector current of 10 mA and a base current of 40 mA. What is the current gain of the transistor?
Options: 250 μA,    350 μA,    0.25 μA,    300 μA

Ans:A ,A


. Which is not the function of “Edit, Clear” command?
Options: a. Delete contents b. Delete notes c. Delete cells d. Delete formats

Ans:– c,– c


6.In shortest service time first policy, applied on disk scheduling, the disk request is selected
Options: (A)That requires the least movement of disk arm from its current position. (B) That requires the maximum movement of disk arm from its current position. (C) That is recently received. (D) On random. 15

Ans:156. (A),156. (A)


Which one of the following is a statement of Kirchhoffs current law?
Options: The current through a resistance is proportional to the value of resistance and the IR drop across it,    The total current in a parallel circuit is less than the value of the smallest current,    The algebraic sum of currents in a loop is equal to zero,    The algebraic sum of currents entering and leaving a point is equal to zero

Ans:C ,C


In Microsoft Word shortcut DELETE is for
Options: (A) Undo something (B) Delete something (C) Paste something (D) None of these

Ans:3. (B),3. (B)


. What is an intersection of a row and a column?
Options: a. Form b. Cursor c. Cell d. Record

Ans:– c,– c


The intel 8086 microprocessor is a ___processor?
Options: NA

Ans:16 bit ,16 bit


5.The Least Recently Used (LRU) policy
Options: (A)Replaces the page in memory that has not been referenced for the least time. (B) Replaces the page in memory that has not been referenced for the longest time. (C) Replaces the page in memory in round robin fashion. (D) None of these. 10

Ans:105. (B),105. (B)


What hardware architectures are not supported by Red Hat?
Options: SPARC,    IBM-compatible,    Alpha,    Macintosh

Ans:D ,D


Writer of himachal predesh parichay
Options: D N majumdar, T S Negi, devraj sharma, J huchission, ranjor singh,

Ans:devraj sharma,devraj sharma


IDE cables have how many pins?
Options: 25,    50,    100,    40

Ans:D ,D


The low latitude zone of globe extends between
Options: Tropic of Capricorn and Cancer,    North pole to South pole,    Tropic of Capricorn and equator,    Equator and Tropic of Cancer

Ans:A,A


664. mausam sambandhit parivartan vaayumandal kee kis parat mein hote hain?
Options: NA

Ans: kshobhamandal, kshobhamandal


When configuring is a network interface cards without jumpers or plug and play, what is used to set the IRQs?
Options: DMA,    CMOS,    the OS,    configuration software

Ans:D ,D


. An online backing storage system capable of storing larger quantities of data is
Options: A) CPU B) Memory C) Mass storage D) Secondary storage

Ans:C,C


    Who invented Analytical engine?
Options: Blaise Pascal B. George Bool C. Charles Babbage D. Dr. Herman Hollerith

Ans:– C ,


7.In Excel Rounding errors can occur
Options: (A)When you use multiplication, division or exponentiation in a formula (B) When you use addition and subtraction in a formula (C) Because Excel uses hidden decimal places in computation (D) When you show the results of formulas with different decimal places than the calculated results 21

Ans:217. (A),217. (A)


The cp command uses:
Options: standard input file,    standard output file,    both input and output file,    neither standard input nor standard output file

Ans:D ,D


Kuther is tributery river of which river and in which district
Options:

Ans:Chamba,Chamba


Which of the following can be used to divide a web page into areas?
Options: frames B. theme C. table of contents D. none of the above

Ans:– A ,

www.000webhost.com