Description : Medium range weather forecasting is done for
Last Answer : Ans. 3-10 days
Description : Where is India’s super computer ‘PARAM’ located ? (1) Chennai (2) Pune (3) Bengaluru (4) Kolkata
Last Answer : Pune
Description : Which "SUPERCOMPUTER" is developed by Indian Scientist: a) SarvaShrestha b) Param c) Super 301 d) Super Power e) None of These
Last Answer : b) Param
Description : Which supercomputer is developed by the Indian Scientists? 1) Param 2) Super 301 3) Compaq Presario 4) CRAY YMP
Last Answer : 1) Param
Description : First super computer developed in India is a. PARAM b. Aryabhatt c. Buddha d. Ram
Last Answer : a. PARAM
Description : A Supercomputer would be used for which one of the following applications ? (1) Business Computing (2) Desktop Publishing (3) Weather Forecasting (4) Computer Aided Designing
Last Answer : Weather Forecasting
Description : The Indian Supercomputer built by CRL, Pune which ranked fourth fastest in the world and most powerful in Asia is called (1) Virgo (2) Param (3) EKA (4) SAGA
Last Answer : EKA
Description : In India, as per their 2001 Census, the sex-ratio (females per 1000 males) is – (1) 930 (2) 934 (3) 927 (4) 933
Last Answer : (4) 933 Explanation: As per the Census findings overall Sex ratio in India has declined over a period of time. It was 946 female per 1000 male in the year 1951 and declined to 927 in 1991. In the ... 1000 males. In India, as per their 2011 census, the sex-ratio (females per 1000 males) is 943.
Description : Which of the following is first generation of computer A) EDSAC B) IBM-1401 C) CDC-1604 D) ICL-2900
Last Answer : Answer : A
Description : Which of the following is first generation computer? A) EDSAC B) IBM 1401 C) CDC 1604 D) ICL 2950
Last Answer : Artificial satellites are playing a role in weather forecasting.
Description : What type of energy is monitored by forecasting future space weather?
Last Answer : Need answer
Description : What method is a forecasting method based on the idea that the weather ....?
Description : Which are the application of vector processing: a Weather forecasting b. Artificial intelligence Experts system a 2 Images processing Seismology Gene mapping Aerodynamics All of these i None of
Last Answer : All of these
Description : First computer of the world a. CRAY-1 b. PARAM c. Tian d. IBM-370
Last Answer : a. CRAY-1
Description : The ratio of prices of 2 dresses is 10:15.If the price of the first dress is increased by 10% and that of the second dress by Rs.400 then the ratio of their prices is 4:7.What are the initial prices of the dresses ? A) 910,1375 B) 920,1380 C) 930,1395 D) 940, 1410 E) None of these
Last Answer : Answer: D Let the initial price of the dress = 10x and 15x Price of the 1st dress after increment = 10x × (110/100) = 11x Price of the 2nd dress after increment = 15x+400 [11x/(15x+400)] = 4/7 77x = 60x + 1600 17x = 1600 X = 1600/17 = 94.11 = 94 So dresses will be 940, 1410
Description : What happened after Solomon's death in 930 BC?
Last Answer : After Solomon's death in about 930 BC, revolts broke out overwho should be king. Within a year, conflict tore Israel apart.Israel split into two kingdoms called israel and called Judah. Thepeople of Judah became known as the Jews
Description : As per 2011 Census data, the overall sexratio in the country is - (1) 933 (2) 940 (3) 943 (4) 930
Last Answer : (2) 940 Explanation: As per 2011 Census, the overall sex-ratio in India is 943. The child sex ratio is 919.
Description : The mass and energy equivalent to 1 a.m.u. respectively are - (1) 1.67 x 10−27 g, 9.30 MeV (2) 1.67 x 10−27kg, 930 MeV (3) 1.67 x 10−27kg, 1 MeV (4) 1.67 x 10−34 kg, 1 MeV
Last Answer : (2) 1.67 x 10−27kg, 930 MeV Explanation: The mass and energy equivalent to 1 a.m.u. respectively are 1.67 x 10−27kg, 930 MeV.
Description : Who had played key role in the formation of Lokpal bill in India? (1) VI pin Hazarika (2) Anna Hajare (3) Baba Arnte (4) Medha Patekar
Last Answer : (2) Anna Hajare Explanation: Anna Hazare started an indefinite hunger strike on 5 April 2011 to exert pressure on the Indian government to enact a stringent anti-corruption law, The Lokpal Bill, 2011 ... power to deal with corruption in public places. The fast led to nation-wide protests in support.
Description : Name the Human Rights activist in India who is on hunger strike since 2 nd November 2000 against Armed Force Special Power act. ( AFSPA ). a. Medha Pathkar b. Shabnam Hashmi c. Teesta setalvad d. Irom Chanu Sharmila
Last Answer : d. Irom Chanu Sharmila
Description : First Supercomputer developed in India is a. Aryabhatt b. Cray-1 c. PARAM d. IBM-370
Last Answer : c. PARAM
Description : In forecasting, it is not likely that you will take half of the sales unless a. the product positioning is ideal. b. the product meets the top 2 buying criteria and the price is low. c. the positioning ... d. the price is at the low end of the range and the positioning, age and MTBF are superior.
Last Answer : d. the price is at the low end of the range and the positioning, age and MTBF are superior.
Description : In July, the UK government s development finance unit, CDC announced to infuse Rs 1,000 crore into its Finance unit in India to boost people s access to affordable housing. This finance unit is A) ... Finance C) IDF Financial Services Pvt Ltd D) YVU Financial Services Pvt Ltd E) None of these
Last Answer : B) India Infoline Finance Explanation: Diversified financial services company IIFL Holdings announced that UK governmentowned CDC Group will invest about Rs 1,000 crore in its unit India Infoline ... needs of under-served segments through diversified offerings, IIFL Holdings said in a release.
Description : ‘Chipko’ movement was first started by (A) Arundhati Roy (B) Medha Patkar (C) Ila Bhatt (D) Sunderlal Bahuguna
Last Answer : (D) Sunderlal Bahuguna
Description : The famous activist Medha Patakar is associated with which movement
Last Answer : Narmda Bachao Movement
Description : Who launched the ‘Chipko Movement’ in the hills of Garhwal during 1980s? a) Sundarlal Bahuguna b) Baba Amte c) Medha Patkar d) Dr. B.R. Ambedkar
Last Answer : a) Sundarlal Bahuguna
Description : Who is associated with Narmada Bachao Andolan? (a) Aruna Roy (b) Medha Patkar (c) Arundhati Roy (d) None of these
Last Answer : (b) Medha Patkar
Description : The ‘Chipko Movement’ was launched in Himalayan regions by [A] Baba Amte [B] Sunderlal Bahuguna [C] Medha Patkarti [D] Arundhati Roy
Last Answer : [B] Sunderlal Bahuguna
Description : Who among the following has been conferred the ‘Climate Protection Award’ by the Environment Protection Agency of the US ? (1) Medha Patkar (2) Rajendra Singh (3) R. K. Pachauri (4) Arundhati Roy
Last Answer : R. K. Pachauri
Description : Which computers are used as servers for any medium sized organizations? A) Mainframe Computer B) Mini Computers C) Micro Computers D) Super Computers
Last Answer : Answer : B
Description : An IBM system/38 represents the computer class of: A) Small-scale computer B) Medium-scale computer C) Large-scale computer D) Super computer
Description : What is xsl:param ?
Last Answer : The element is used to declare a local or global parameter. The parameter is global if it's declared as a top-level element, and local if it's declared within a template.
Description : The Indian National Grid Computing Initiative for Scientific Engineering and Academic Community is named (1) Ganga (2) SAGA (3) Garuda (4) PARAM
Last Answer : Garuda
Description : Computer crime or Cyber crime is crime that involves: a) Computer b) Network c) Both of Above d) None of These
Last Answer : c) Both of Above
Description : Computer crime or Cyber crime is crime that involves: a) Computer b) Network c) Both of Above d) None of These ✐ 386. Net crim
Description : Physical security is concerned with protecting computer hardware from human tampering and natural disasters and _____security is concerned with protecting software from unauthorized tampering or damage: a) Data b) Cyber c) Internet d) Meta Physical e) Publicity
Last Answer : b) Cyber
Description : the range of the data 13, 18, 20, 15, 12, 17, 9, 14, 11, and 16 is ________.
Last Answer : the range of the data 13, 18, 20, 15, 12, 17, 9, 14, 11, and 16 is ________.
Description : Which of the following is first generation of computer a. EDSAC b. IBM-1401 c. CDC-1604 d. ICL-2900
Last Answer : EDSAC
Last Answer : a. EDSAC
Description : CVE stands for: a) Common Vulnerabilities Exposures b) Cyber Vulnerabilities Exposures c) Cycolic Vulnerabilities Exposures d) None of These
Last Answer : a) Common Vulnerabilities Exposures
Description : Consider the following statements about Internet facility: 1) It serves as the largest one-line information system. 2) It provides the most dependable and latest mode for sending E-mail. 3) Recurring ... communication E-mail is very high. 4) It is often misused and has triggered cyber-crimes.
Last Answer : 1) It serves as the largest one-line information system
Description : Governments hired some highly skilled hackers. These types of hackers are termed as _______ a) Special Hackers b) Government Hackers c) Cyber Intelligence Agents d) Nation / State sponsored hackers
Last Answer : d) Nation / State sponsored hackers
Description : . _________ are those individuals who maintain and handles IT security in any firm or organization. a) IT Security Engineer b) Cyber Security Interns c) Software Security Specialist d) Security Auditor
Last Answer : a) IT Security Engineer
Description : Criminal minded individuals who work for terrorist organizations and steal information of nations and other secret intelligence are _________ a) State sponsored hackers b) Blue Hat Hackers c) Cyber Terrorists d) Red Hat Hackers
Last Answer : c) Cyber Terrorists
Description : They are nefarious hackers, and their main motive is to gain financial profit by doing cyber crimes. Who are “they” referred to here? a) Gray Hat Hackers b) White Hat Hackers c) Hactivists d) Black Hat Hackers
Last Answer : d) Black Hat Hackers
Description : __________ is the branch of cyber security that deals with morality and provides different theories and a principle regarding the view-points about what is right and wrong. a) Social ethics b) Ethics in cyber-security c) Corporate ethics d) Ethics in black hat hacking
Last Answer : d) Ethics in black hat hacking
Description : To whom is the IP addresses were traced ? a. Internet Service Provider b. Cyber Crime Office c. Only (a) d. None of the above
Last Answer : a. Internet Service Provider