*You get free practice please send message your email id to
our facebook page before like and share
our facebook page.
1.Statue of unity situated at:
A.Gujarath
B.Delhi
C.Punjab
D.Calcutta
Ans:A
2.First Eye Donation Village in Kerala:
A.Pampady
B.Amballur
C.Cherukulathur
D.Poopara
Ans:C
3.Which city named as City of Wind?
A.London
B.Lisbon
C.Chicago
D.Rome
Ans:C
4.Who was the organiser of Desa Sevaika Sangh in
Travancore?
A.Arya Pallam
B.A.V.Kuttimalu Amma
C.Mary Poonam Lukose
D.Accamma Cheriyan
Ans:D
5.Rajatarangini,written by the Kalhana describes the
history of:
A.Malwa
B.Punjab
C.Kashmir
D.Rajasthan
Ans:C
6.The constitution of India came in to effect from:
A.01 January 1950
B.26 January 1950
C.15 August 1947
D.16 August 1947
Ans:B
7.The Preamble of the Indian Constitution was for
the first time amended by the:
A.41 Amendment
B.42 Amendments
C.43 Amendments
D.44 Amendments
Ans:B
8.Which of the following is not a Fundamental
Rights?
A.Right against exploitation
B.Right to liberty
C.Right to equality
D.Right to property
Ans:D
9.What is the fees to be paid along with the
application for getting information under RTI Act?
A.Rs.10
B.Rs.20
C.Rs.50
D.Rs.100
Ans:A
10.Who was the first Foreign Minister of free India?
A.Jawaharlal Nehru
B.Lal Bahadur Sastri
C.Gulsari Lal Nanda
D.I.K.Gujaral
Ans:A
11.________________set up printing press at Cochin
and Vaipicotta.
A.English
B.French
C.Portuguese
D.Dutch
Ans:C
12.Nivarthana movement was started as a protest
against the constitutional reforms of:
A.Reforms of 1919
B.Reforms of 1932
C.Reforms of 1935
D.Reforms of 1946
Ans:B
13.Who was the founder of Atma Vida Sangham?
A.Agamananda Swami
B.Brahmananda Sivayogi
C.Vaikunta Swami
D.Vagbhatananda Swami
Ans:D
14.The first temple consecrated by Sri.Narayana Guru
in:
A.Aruvipuram
B.Varkkala
C.Sivagiri
D.Kollam
Ans:A
15.Dalawa Kulam is associated with which historical
incident of Kerala?
A.Salt Satyagraha
B.Khilafat movement
C.Kundara proclamation
D.Vaikom Satyagraha
Ans:D
16.Which one of the novels depicts jail life before
Indian Independence?
A.Agni kinavukal
B.Adikaram
C.Mathilukal
D.Aarachaar
Ans:C
17.Who presided over the belgaum session of Indian
national congress in 1924?
A.Mottilal Nehru
B.Mahatma Gandhi
C.Jawaharlal Nehru
D.Sarojini Naidu
Ans:B
18.Beti Bachao Beti Padhao programme was launched at
Panipat on:
A.15 August 2014
B.26 August 2015
C.22 January 2015
D.10 December 2015
Ans:C
19.Kyoto protocol is related to:
A.Ozone depletion
B.Climate change
C.Water pollution
D.Nuclear energy
Ans:B
20.Lionel Messi represents which country in
international Foot ball?
A.Argentina
B.Portugal
C.Brazil
D.Spain
Ans:A
21.Application layer provides basis for:
A.Email services
B.Frame Division
C.File Making
D.None of the above
Ans:A
22.UDP is _________protocol.
A.Connection oriented
B.Connectionless
C.Neither
D.Both
Ans:B
23.Layer that are used to deal with mechanical and
electrical specifications are:
A.Data Link Layer
B.Network Layer
C.Transport Layer
D.Physical Layer
Ans:D
24.If a hub fails in this type of network,the whole
system will shout down:
A.Tree
B.Star
C.Mesh
D.Bus
Ans:B
25.Which of the following cloud concept is related
to pooling and sharing of resources?
A.Polymorphism
B.Abstraction
C.Virtualization
D.None of above
Ans:C
26.__________is used for cache memory.
A.DRAM
B.SRAM
C.EPROM
D.Flash Memory
Ans:B
27.The highest data availability in which RAID
level:
A.RAID 1
B.RAID 2
C.RAID 4
D.RAID 6
Ans:D
28.Which of the following is lowest in memory
hierarchy?
A.Cache memory
B.Secondary memory
C.Registers
D.RAM
Ans:B
29.In DMA transfers,the required signals and addresses
are given by the:
A.Processor
B.Device Drivers
C.DMA Controllers
D.The Program itself
Ans:C
30.The ___________unit is capable of mimicking the
processor and indeed of taking over control of the system from the processor.
A.Programmed I/O
B.Interrupt driven I/O
C.Direct Memory Access
D.Virtual Memory Access
Ans:C
31.When displayign a web page,the application layer
uses:
A.HTTP Protocol
B.FTP Protocol
C.SMTP Protocol
D.None of the above
Ans:A
32.The transmission data rate is decided by which
layer:
A.Network layer
B.Physical layer
C.Data link layer
D.Transport layer
Ans:B
33.The DMA Controller has ________registers.
A.3
B.2
C.4
D.1
Ans:A
34.Control and Status Registers are used by the
Processor to control:
A.Design of the Processor
B.Execution of the Processor
C.Speed of the Processor
D.Operation of the Processor
Ans:D
35.Which of the architecture is power efficient?
A.ISA
B.RISC
C.CISC
D.IANA
Ans:B
36.Which feature of cloud computing that allows the
service to change in size or volume in order to meet a user’s needs?
A.Scalability
B.Virtualization
C.Security
D.Cost savings
Ans:A
37.Which Register is used to store values of
arithmetic and logical operations?
A.Arithmetic Register
B.Accumulator
C.Logical Register
D.Controller
Ans:B
38.__________is not a true member of RAID
family,because it does not include redundancy to improve performance.
A.RAID Level 0
B.RAID Level 1
C.RAID Level 2
D.RAID Level 3
Ans:A
39.End to end connectivity is provided from host to
host in __________layer.
A.Physical layer
B.Data Link layer
C.Transport layer
D.Network layer
Ans:C
40.Transport layer protocol deals with:
A.Application to application communication
B.Process to process communication
C.Node to node communication
D.None of the above
Ans:B
41.Which type of e-commerce focuses on consumers
dealing with each other?
A.B2B
B.B2C
C.C2B
D.C2C
Ans:D
42.Which of the following was the first commercial
Web browser?
A.Mosaic
B.Netscape Navigator
C.Mozilla
D.Internet Explorer
Ans:B
43.KYC means:
A.Know your customer
B.Know your character
C.Know your chance
D.None of the above
Ans:A
44.What is meant by Aadhaar seeding?
A.Linking of Aadhaar with Bank Account
B.Duplicate issuance of Aadhaar
C.Transfer of Aadhaar
D.None of the above
Ans:A
45.Intellectual Property Rights(IPR) protect the use
of information and ideas that are of:
A.Ethical Value
B.Moral Value
C.Social Value
D.Commercial Value
Ans:D
46.Hall Mark is:
A.Trademark
B.Certification Mark
C.Collective Mark
D.Both(A) and (B)
Ans:B
47.Which type of firewall includes in a router to direct
the flow of network traffic?
A.Packet Filtering
B.IP Spoofing
C.Circuit Level
D.Application Level
Ans:A
48.A firewall is used in a system connected to wide
area network to:
A.Prevent spread of fire in the network
B.Prevent unauthorized access by hackers
C.To scan for viruses in files
D.To extinguish fire spreading via network cables
Ans:B
49.An encryption algorithm transforms plaintext
into:
A.Cipher text
B.Simple text
C.Plain text
D.Empty text
Ans:A
50.The code segment that misuses its environment is
called a:
A.Internal thief
B.Code stacker
C.Trojan horse
D.None of the above
Ans:C
51.Certification mark can be registered in:
A.Trademark Registry
B.Certification Board
C.Quality Control Board
D.MHRD
Ans:A
52.How many types of permissions a file has in UNIX?
A.1
B.2
C.3
D.4
Ans:C
53.Unique identification Authority of India(UIDAI)
scheme was launched in the year:
A.2009
B.2011
C.2013
D.2015
Ans:A
54.UJALA scheme is related to:
A.Solar Panel distribution
B.LED Bulbs distribution
C.LPG Cylinder distribution
D.None of the above
Ans:B
55.Which one of the following is not an attack,but a
search for vulnerabilities to attack?
A.Denial of service
B.Dumpster diving
C.Memory access violation
D.Port scanning
Ans:D
56.What is a trap door in a program?
A.A security hole inserted at programming time in
the system for later use
B.A type of antivirus
C.Security hole in a
network
D.None of the above
Ans:A
57.The DMA controller is connected to the:
A.Processor bus
B.System bus
C.External bus
D.None of the above
Ans:B
58.Which mechanism is used by worm process?
A.Trap process
B.Fake process
C.VAX process
D.Spawn process
Ans:D
59.Which of the following is used to provide a
baseline measure for comparison of IDSs?
A.Crossover error rate
B.False negative rate
C.False positive rate
D.Bit error rate
Ans:A
60.A method used by an IDS that involves checking
for a pattern to identify unauthorized activity:
A.Session Splicing
B.Protocol Decoding
C.Pattern Matching
D.State Table
Ans:C
61.The bar which displays information about the
current page number is:
A.Title bar
B.Status bar
C.Standard bar
D.Formatting bar
Ans:B
62.Home key uses for:
A.Moves the cursor beginning of the document
B.Moves the cursor beginning of the paragraph
C.Moves the cursor beginning of the screen
D.Moves the cursor beginning of the line
Ans:D
63.Portrait and Landscape are:
A.Page orientation
B.Page Size
C.Page Layout
D.All of the above
Ans:A
64.Background color or effects applied on a document is not visible in:
A.Web Layout View
B.Print Layout View
C.Print Preview
D.Reading View
Ans:C
65.Statistical calculations and preparations of
tables and graphs can be done using:
A.Adobe Photoshop
B.Excel
C.Notepad
D.Power Point
Ans:B
66.A subquery in an SQL SELECT statement is enclosed
in:
A.Braces-{…}
B.CAPITAL LETTERS
C.Parenthesis-{…}
D.Brackets-{…}
Ans:C
67.The SQL ALTER statement can be used to:
A.Change the table structure
B.Change the table data
C.Add rows to the table
D.Delete rows from the table
Ans:A
68.What is the keyboard shortcut for creating a
chart from the selected cell range?
A.F2
B.F4
C.F8
D.F11
Ans:D
69.What shortcut key to enter current date in cell
in excel?
A.Ctrl+;
B.Alt+;
C.Home+;
D.Shift+;
Ans:A
70.Which Function is used to calculate Remainder in
MS Excel?
A.INT( )
B.FACT( )
C.MOD ( )
D.DIV( )
Ans:C
71.Short cut “Ctrl+R” is used to:
A.Re-Open the last closed document
B.Re-Print the last printed page
C.Re-Apply the paragraph formatting
D.Right align the selected paragraph
Ans:D
72.Which one
of the following sorts rows in SQL?
A.SORT BY
B.ORDER BY
C.ALIGN BY
D.GROUP BY
Ans:B
73.Tables in second normal form(2NF):
A.Eliminate all hidden dependencies
B.Eliminate the possibility of a insertion anomalies
C.Have a composite key
D.Have all non key fields depend on the whole
primary key
Ans:A
74.How to select all data from student table
starting the name with letter ‘R’?
A.SELECT * FROM student WHERE name LIKE’R%’;
B.SELECT * FROM student WHERE name LIKE’%R’;
C.SELECT * FROM student WHERE name LIKE’R%_’;
D.SELECT * FROM student WHERE name LIKE’_R%’;
Ans:A
75.You can detect spelling and grammar errors by:
A.Press Shift+F7
B.Press F7
C.Press Ctrl+F7
D.Press Alt+F7
Ans:B
76.Functional Dependencies are the types of
constraints that are based on:
A.Superset key
B.Key revisited
C.Key
D.None of the above
Ans:C
77.The full form of OLAP is:
A.Online Analytical Processing
B.Online Advanced Processing
C.Online Advanced Preparation
D.Online Analytical Performance
Ans:A
78.Which SELECT statement will the result ‘ello
world’ from the string ‘Hello World’?
A.SELECT INITCAP(TRIM (‘Hello World’,1,1) FROM dual;
B.SELECT LOWER(SUBSTER(‘Hello World’,1,1) FROM dual;
C.SELECT LOWER(SUBSTER(‘Hello World’,2,1) FROM dual;
D.SELECT LOWER(TRIM(‘H’FROM’Hello World’)) FROM
dual;
Ans:D
79.The DROP TABLE statement:
A.Deletes the table structure only
B.Deletes the table structure along with the table
data
C.Works whether or not referential Integrity
constraints would be violated
D.Is not an SQL statement
Ans:B
80.”Ctrl+W” is used to:
A.Save and Close Document
B.Save and Print the Document
C.Save and Close Word Application
D.Without Save,Close Document
Ans:A
81.Ipv6 addressed have a size of:
A.32 bits
B.64 bits
C.128 bits
D.256 bits
Ans:C
82._________to transmit information on the World
Wide Web.
A.TPPH
B.HTTP
C.HTML
D.HTPT
Ans:B
83.Each IP packet must contain:
A.Source and destination address
B.Source or destination address
C.Only destination address
D.Only source address
Ans:A
84.MIME stands for:
A.Multipurpose Internet Mail Extra
B.Multipurpose Internet Mail End
C.Multipurpose Internet Mail Extensions
D.Multipurpose Internet Mail Extensions
Ans:D
85.Which of the following is the first web browser?
A.Netscape Navigator
B.Nexus
C.Internet Explorer
D.Mosaic
Ans:B
86.Who created the first web browser?
A.Tim Berners Lee
B.Jacobs Lan
C.Marc Andreessen
D.Mozilla foundation
Ans:A
87.The delay that occur during the playback of a
stream is called:
A.Stream delay
B.Playback delay
C.Jitter
D.Event delay
Ans:C
88.An applet is a program written in Java on the:
A.Web
B.Server
C.Domain
D.Client
Ans:B
89.The ________tag defines an Image in an HTML page.
A.<image>
B.<pic>
C.<imge>
D.<img>
Ans:D
90.Software mistakes during coding are known as:
A.Errors
B.Failurs
C.Bugs
D.Defects
Ans:C
91.Cyclomatic Complexity method comes under which
testing method:
A.Yellow box
B.White box
C.Gray box
D.Black box
Ans:B
92.Which of the following is/are not a verification
activity?
A.Inspection
B.Technical Review
C.Walkthrough
D.Testing
Ans:D
93.Verification and Validation uses:
A.Internal and External resources respectively
B.Internal resources only
C.External resources only
D.External and Internal resources respectively
Ans:A
94.What is the order of Priority Testing?
A.Unit>>Integration>>System Testing
B.Unit>>System>>Acceptance Testing
C.System>>Integration>>Acceptance
Testing
D.System>>Acceptance>>Integration
Ans:A
95.Validation is the responsibility of:
A.Developer
B.Designer
C.Tester
D.QA Team
Ans:C
96.Choose the correct HTML tag to make the text
bold:
A.<B>
B.<BOLD>
C.<STRONG>
D.Both(A) and (C)
Ans:D
97.For using subscription web documents which tag is
used?
A.<sup></sup>
B.<sub></sub>
C.<subscript></subscript>
D.<superscript></superscript>
Ans:B
98.A web address is also called a:
A.URL
B.ULR
C.RLU
D.LUR
Ans:A
99.Internet uses:
A.Circuit switching
B.Telephone switching
C.Telex switching
D.Packet switching
Ans:D
100.Which of the following is used to read a HTML
page and render it?
A.Web matrix
B.Web server
C.Web browser
D.None of the mentioned
Ans:C
The men who try to do something and fail are infinitely better than those who try to do nothing and succeed.-Lloyd Jones.
ReplyDelete