Which was the first super computer purchased by India for medium range weather forecasting? (1) CrayXMP-14 (2) Medha - 930 (3) CDC Cyber 930-11 (4) Param 

1 Answer

Answer :

CrayXMP-14

Related questions

Description : Medium range weather forecasting is done for

Last Answer : Ans. 3-10 days

Description : Where is India’s super computer ‘PARAM’ located ? (1) Chennai (2) Pune (3) Bengaluru (4) Kolkata

Last Answer : Pune

Description : Which "SUPERCOMPUTER" is developed by Indian Scientist: a) SarvaShrestha b) Param c) Super 301 d) Super Power e) None of These

Last Answer : b) Param

Description : Which supercomputer is developed by the Indian Scientists? 1) Param 2) Super 301 3) Compaq Presario 4) CRAY YMP

Last Answer : 1) Param

Description : First super computer developed in India is a. PARAM b. Aryabhatt c. Buddha d. Ram

Last Answer : a. PARAM

Description : A Supercomputer would be used for which one of the following applications ? (1) Business Computing (2) Desktop Publishing (3) Weather Forecasting (4) Computer Aided Designing

Last Answer : Weather Forecasting

Description : The Indian Supercomputer built by CRL, Pune which ranked fourth fastest in the world and most powerful in Asia is called (1) Virgo (2) Param (3) EKA (4) SAGA

Last Answer : EKA

Description : In India, as per their 2001 Census, the sex-ratio (females per 1000 males) is – (1) 930 (2) 934 (3) 927 (4) 933

Last Answer : (4) 933 Explanation: As per the Census findings overall Sex ratio in India has declined over a period of time. It was 946 female per 1000 male in the year 1951 and declined to 927 in 1991. In the ... 1000 males. In India, as per their 2011 census, the sex-ratio (females per 1000 males) is 943.

Description : Which of the following is first generation of computer A) EDSAC B) IBM-1401 C) CDC-1604 D) ICL-2900

Last Answer : Answer : A

Description : Which of the following is first generation computer? A) EDSAC B) IBM 1401 C) CDC 1604 D) ICL 2950

Last Answer : Answer : A

Last Answer : Artificial satellites are playing a role in weather forecasting.

Description : What type of energy is monitored by forecasting future space weather?

Last Answer : Need answer

Description : What method is a forecasting method based on the idea that the weather ....?

Last Answer : Need answer

Description : Which are the application of vector processing: a Weather forecasting b. Artificial intelligence Experts system a 2 Images processing Seismology Gene mapping Aerodynamics All of these i None of

Last Answer : All of these

Description : First computer of the world a. CRAY-1 b. PARAM c. Tian d. IBM-370

Last Answer : a. CRAY-1

Description : The ratio of prices of 2 dresses is 10:15.If the price of the first dress is increased by 10% and that of the second dress by Rs.400 then the ratio of their prices is 4:7.What are the initial prices of the dresses ? A) 910,1375 B) 920,1380 C) 930,1395 D) 940, 1410 E) None of these

Last Answer : Answer: D Let the initial price of the dress = 10x and 15x Price of the 1st dress after increment = 10x × (110/100) = 11x Price of the 2nd dress after increment = 15x+400 [11x/(15x+400)] = 4/7 77x = 60x + 1600 17x = 1600 X = 1600/17 = 94.11 = 94 So dresses will be 940, 1410

Description : What happened after Solomon's death in 930 BC?

Last Answer : After Solomon's death in about 930 BC, revolts broke out overwho should be king. Within a year, conflict tore Israel apart.Israel split into two kingdoms called israel and called Judah. Thepeople of Judah became known as the Jews

Description : As per 2011 Census data, the overall sexratio in the country is - (1) 933 (2) 940 (3) 943 (4) 930

Last Answer : (2) 940 Explanation: As per 2011 Census, the overall sex-ratio in India is 943. The child sex ratio is 919.

Description : The mass and energy equivalent to 1 a.m.u. respectively are - (1) 1.67 x 10−27 g, 9.30 MeV (2) 1.67 x 10−27kg, 930 MeV (3) 1.67 x 10−27kg, 1 MeV (4) 1.67 x 10−34 kg, 1 MeV

Last Answer : (2) 1.67 x 10−27kg, 930 MeV Explanation: The mass and energy equivalent to 1 a.m.u. respectively are 1.67 x 10−27kg, 930 MeV.

Description : Who had played key role in the formation of Lokpal bill in India? (1) VI pin Hazarika (2) Anna Hajare (3) Baba Arnte (4) Medha Patekar

Last Answer : (2) Anna Hajare Explanation: Anna Hazare started an indefinite hunger strike on 5 April 2011 to exert pressure on the Indian government to enact a stringent anti-corruption law, The Lokpal Bill, 2011 ... power to deal with corruption in public places. The fast led to nation-wide protests in support.

Description : Name the Human Rights activist in India who is on hunger strike since 2 nd November 2000 against Armed Force Special Power act. ( AFSPA ). a. Medha Pathkar b. Shabnam Hashmi c. Teesta setalvad d. Irom Chanu Sharmila

Last Answer : d. Irom Chanu Sharmila

Description : First Supercomputer developed in India is a. Aryabhatt b. Cray-1 c. PARAM d. IBM-370

Last Answer : c. PARAM

Description : First Supercomputer developed in India is a. Aryabhatt b. Cray-1 c. PARAM d. IBM-370

Last Answer : c. PARAM

Description : In forecasting, it is not likely that you will take half of the sales unless a. the product positioning is ideal. b. the product meets the top 2 buying criteria and the price is low. c. the positioning ... d. the price is at the low end of the range and the positioning, age and MTBF are superior.

Last Answer : d. the price is at the low end of the range and the positioning, age and MTBF are superior.

Description : In July, the UK government s development finance unit, CDC announced to infuse Rs 1,000 crore into its Finance unit in India to boost people s access to affordable housing. This finance unit is A) ... Finance C) IDF Financial Services Pvt Ltd D) YVU Financial Services Pvt Ltd E) None of these

Last Answer : B) India Infoline Finance Explanation: Diversified financial services company IIFL Holdings announced that UK governmentowned CDC Group will invest about Rs 1,000 crore in its unit India Infoline ... needs of under-served segments through diversified offerings, IIFL Holdings said in a release.

Description : ‘Chipko’ movement was first started by (A) Arundhati Roy (B) Medha Patkar (C) Ila Bhatt (D) Sunderlal Bahuguna

Last Answer : (D) Sunderlal Bahuguna

Description : The famous activist Medha Patakar is associated with which movement

Last Answer : Narmda Bachao Movement

Description : Who launched the ‘Chipko Movement’ in the hills of Garhwal during 1980s? a) Sundarlal Bahuguna b) Baba Amte c) Medha Patkar d) Dr. B.R. Ambedkar

Last Answer : a) Sundarlal Bahuguna

Description : Who is associated with Narmada Bachao Andolan? (a) Aruna Roy (b) Medha Patkar (c) Arundhati Roy (d) None of these

Last Answer : (b) Medha Patkar

Description : The ‘Chipko Movement’ was launched in Himalayan regions by [A] Baba Amte [B] Sunderlal Bahuguna [C] Medha Patkarti [D] Arundhati Roy

Last Answer : [B] Sunderlal Bahuguna

Description : Who among the following has been conferred the ‘Climate Protection Award’ by the Environment Protection Agency of the US ? (1) Medha Patkar (2) Rajendra Singh (3) R. K. Pachauri (4) Arundhati Roy

Last Answer : R. K. Pachauri

Description : Which computers are used as servers for any medium sized organizations? A) Mainframe Computer B) Mini Computers C) Micro Computers D) Super Computers

Last Answer : Answer : B

Description : An IBM system/38 represents the computer class of: A) Small-scale computer B) Medium-scale computer C) Large-scale computer D) Super computer

Last Answer : Answer : A

Description : What is xsl:param ?

Last Answer : The element is used to declare a local or global parameter. The parameter is global if it's declared as a top-level element, and local if it's declared within a template.

Description : The Indian National Grid Computing Initiative for Scientific Engineering and Academic Community is named (1) Ganga (2) SAGA (3) Garuda (4) PARAM

Last Answer : Garuda

Description : Computer crime or Cyber crime is crime that involves: a) Computer b) Network c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : Computer crime or Cyber crime is crime that involves: a) Computer b) Network c) Both of Above d) None of These ✐ 386. Net crim

Last Answer : c) Both of Above

Description : Physical security is concerned with protecting computer hardware from human tampering and natural disasters and _____security is concerned with protecting software from unauthorized tampering or damage: a) Data b) Cyber c) Internet d) Meta Physical e) Publicity

Last Answer : b) Cyber

Description : the range of the data 13, 18, 20, 15, 12, 17, 9, 14, 11, and 16 is ________.

Last Answer : the range of the data 13, 18, 20, 15, 12, 17, 9, 14, 11, and 16 is ________.

Description : Which of the following is first generation of computer a. EDSAC b. IBM-1401 c. CDC-1604 d. ICL-2900

Last Answer : EDSAC

Description : Which of the following is first generation of computer a. EDSAC b. IBM-1401 c. CDC-1604 d. ICL-2900

Last Answer : a. EDSAC

Description : Which of the following is first generation of computer a. EDSAC b. IBM-1401 c. CDC-1604 d. ICL-2900

Last Answer : a. EDSAC

Description : CVE stands for: a) Common Vulnerabilities Exposures b) Cyber Vulnerabilities Exposures c) Cycolic Vulnerabilities Exposures d) None of These

Last Answer : a) Common Vulnerabilities Exposures

Description : Consider the following statements about Internet facility: 1) It serves as the largest one-line information system. 2) It provides the most dependable and latest mode for sending E-mail. 3) Recurring ... communication E-mail is very high. 4) It is often misused and has triggered cyber-crimes.

Last Answer : 1) It serves as the largest one-line information system

Description : Governments hired some highly skilled hackers. These types of hackers are termed as _______ a) Special Hackers b) Government Hackers c) Cyber Intelligence Agents d) Nation / State sponsored hackers

Last Answer : d) Nation / State sponsored hackers

Description : . _________ are those individuals who maintain and handles IT security in any firm or organization. a) IT Security Engineer b) Cyber Security Interns c) Software Security Specialist d) Security Auditor

Last Answer : a) IT Security Engineer

Description : Criminal minded individuals who work for terrorist organizations and steal information of nations and other secret intelligence are _________ a) State sponsored hackers b) Blue Hat Hackers c) Cyber Terrorists d) Red Hat Hackers

Last Answer : c) Cyber Terrorists

Description : They are nefarious hackers, and their main motive is to gain financial profit by doing cyber crimes. Who are “they” referred to here? a) Gray Hat Hackers b) White Hat Hackers c) Hactivists d) Black Hat Hackers

Last Answer : d) Black Hat Hackers

Description : __________ is the branch of cyber security that deals with morality and provides different theories and a principle regarding the view-points about what is right and wrong. a) Social ethics b) Ethics in cyber-security c) Corporate ethics d) Ethics in black hat hacking

Last Answer : d) Ethics in black hat hacking

Description : To whom is the IP addresses were traced ? a. Internet Service Provider b. Cyber Crime Office c. Only (a) d. None of the above

Last Answer : a. Internet Service Provider