The Haryanka dynasty is mentioned in the ___________

1 Answer

Answer :

The Haryanka dynasty is mentioned in the ___________ (a) Mahabharata (b) Ramayana (c) Upanishads (d) Sangam literature

Related questions

Description : Maurya dynasty , Nanda dynasty , Haryanka dynasty, Shishunaga dynasty

Last Answer : Write the correct chronological order: (a) Maurya dynasty (b) Nanda dynasty (c) Haryanka dynasty (d) Shishunaga dynasty

Description : ___________ was the first well-known king of the Haryanka

Last Answer : ___________ was the first well-known king of the Haryanka dynasty. (a) Mahapadma (b) Bimbisara (c) Ajatashatru (d) Chandragupta Maurya

Description : ___________ is the founder of the Slave Dynasty. 

Last Answer : ___________ is the founder of the Slave Dynasty. (a) Qutubuddin Aibak (b) Mohd. Ghori (c) Sultan of Ghazni (d) Alauddin Khalji

Description : ___________ was the last king of the Mauryan dynasty. 

Last Answer : ___________ was the last king of the Mauryan dynasty. (a) Asoka (b) Pushyamitra (c) Brihadratha (d) Dhanananda

Description : ___________ was the founder of the Nanda dynasty. 

Last Answer : ___________ was the founder of the Nanda dynasty. (a) Shishunaga (b) Ashoka (c) Ajatashatru (d) Mahapadma

Description : In the 6th century BCE, the ___________ dynasty ruled over Magadha. 

Last Answer : In the 6th century BCE, the ___________ dynasty ruled over Magadha. (a) Maurya (b) Gupta (c) Haryanka (d) Sunga

Description : ___________ a port city is mentioned in the ‘Old Testament.

Last Answer : ___________ a port city is mentioned in the ‘Old Testament’. (a) Ophir (b) Lothal (c) Meluhha (d) Bet Dwaraka

Description : In AI programming, a list may contain ___________ a) cells b) fields c) pointers d) all of the mentioned

Last Answer : d) all of the mentioned

Description : A KES knowledge base contains information in the form of ___________ a) associations b) actions c) free text d) all of the mentioned

Last Answer : d) all of the mentioned

Description : Parts-of-Speech tagging determines ___________ a) part-of-speech for each word dynamically as per meaning of the sentence b) part-of-speech for each word dynamically as per sentence structure c) all part-of-speech for a specific word given as input d) all of the mentioned

Last Answer : d) all of the mentioned

Description : Decision trees are appropriate for the problems where ___________ a) Attributes are both numeric and nominal b) Target function takes on a discrete number of values. c) Data may have errors d) All of the mentioned

Last Answer : d) All of the mentioned

Description : MCC is investigating the improvement of the relationship between people and computers through a technology called ___________ a) computer-aided design b) human factors c) parallel processing d) all of the mentioned

Last Answer : b) human factors

Description : What among the following could the universal instantiation of ___________ For all x King(x) ^ Greedy(x) => Evil(x) a) King(John) ^ Greedy(John) => Evil(John) b) King(y) ^ Greedy(y) => Evil(y) c) King(Richard) ^ Greedy(Richard) => Evil(Richard) d) All of the mentioned

Last Answer : d) All of the mentioned

Description : First Order Logic is also known as ___________ a) First Order Predicate Calculus b) Quantification Theory c) Lower Order Calculus d) All of the mentioned

Last Answer : d) All of the mentioned

Description : Constraint satisfaction problems on finite domains are typically solved using a form of ___________ a) Search Algorithms b) Heuristic Search Algorithms c) Greedy Search Algorithms d) All of the mentioned

Last Answer : d) All of the mentioned

Description : A heuristic is a way of trying ___________ a) To discover something or an idea embedded in a program b) To search and measure how far a node in a search tree seems to be from a goal c) To compare two nodes in a search tree to see if one is better than another d) All of the mentioned

Last Answer : d) All of the mentioned

Description : Optimality of BFS is ___________ a) When there is less number of nodes b) When all step costs are equal c) When all step costs are unequal d) None of the mentioned

Last Answer : b) When all step costs are equal

Description : The Set of actions for a problem in a state space is formulated by a ___________ a) Intermediate states b) Initial state c) Successor function, which takes current action and returns next immediate state d) None of the mentioned

Last Answer : c) Successor function, which takes current action and returns next immediate state

Description : Transmission control protocol ___________ a. is a connection-oriented protocol b. uses a three way handshake to establish a connection c. receives data from application as a single stream d. all of the mentioned

Last Answer : d. all of the mentioned

Description : Transmission control protocol ___________ a. is a connection-oriented protocol b. uses a three way handshake to establish a connection c. receives data from application as a single stream d. all of the mentioned

Last Answer : d. all of the mentioned

Description : Wireless transmission of signals can be done via ___________ a. radio waves b. microwaves c. infrared d. all of the mentioned

Last Answer : d. all of the mentioned

Description : Transmission control protocol ___________ a) is a connection-oriented protocol b) is a connectionless protocol c) is a protocol working on application layer d) all of the mentioned

Last Answer : a) is a connection-oriented protoco

Description : ___________ is a function of the particular enterprise and application in an on-premises deployment. a) Vendor lock b) Vendor lock-in c) Vendor lock-ins d) None of the mentioned

Last Answer : Vendor lock-in

Description : The method of accessing the I/O devices by repeatedly checking the status flags is ___________ a) Program-controlled I/O b) Memory-mapped I/O c) I/O mapped CSE-R17.BLOGSPOT.COM d) None of the mentioned

Last Answer : Program-controlled I/O

Description : The capability of a system to adapt the increased service load is called ___________ a) scalability b) tolerance c) capacity d) none of the mentioned

Last Answer : scalability

Description : In distributed systems, link and site failure is detected by ___________ a) polling b) handshaking c) token passing d) none of the mentioned

Last Answer : handshaking

Description : In distributed system, each processor has its own ___________ a) local memory b) clock c) both local memory and clock d) none of the mentioned

Last Answer : both local memory and clock