google.com, pub-4617457846989927, DIRECT, f08c47fec0942fa0 Learn to enjoy every minute of your life.Only I can change my life.: July 2014

Wednesday, July 30, 2014

Question and answer




1. Name the components of CPU
Answer:
a) ALU    b) PC   c) Accumulator   d) MAR   e) IR    f) ID   g) MDR



2. What is the use of registers in CPU?
Answer:
It is used to store intermediate data and instructions.



3. What is the function of MAR?
Answer:
It specifies the address of memory location from which data or instruction is to be accessed or to which the data is to be stored.



4. What is the function of MDR / MBR?
Answer:
It contains the data to be written into or read from memory location addressed by MAR.



5. What is program counter?
Answer:
It keeps track of the memory address of the instruction that is to be executed next.


6. What is the function of IR?
Answer:
It contains the instruction that is being executed.


7. What is the purpose of Instruction Decoder?
Answer:
It decodes the instructions.


8. What is a data bus?
Answer:
It carries a word to or from memory.


9. What is an address bus?
Answer:
It carries memory address. The width of address bus equals the number of bits in the MAR.


10. What is the function of control bus?
Answer:
It carries signals between the units of the computer.


11. Name different I/O ports.
Answer:
Port is a socket on the back of computer. Different types of ports are serial ports, parallel ports and USB ports.


12. What is meant by plug and play cards?
Answer:
It enables the user to add devices to computer.


13. Expand SD RAM.
Answer:
Synchronous Dynamic Random Access Memory.


14. Expand DDR RAM.
Answer:
Double Data Rate Random Access Memory.


15. Write a note on components of motherboard.
Answer:
1) Bus : -
a. Address Bus
b. Data Bus
c. Control Bus
2) Expansion slots: They serve the purpose of adding functionality to the computer.
a. ISA : Industrial standard architecture.
b. PCI : Peripheral component interface
c. AGP : Accelerated Graphic port.
3) CACHE Memory: It is a small fast memory that resides between CPU and main memory.
4) CMOS : Complementary Metal Oxide Semiconductor Battery
5) I-O Ports ( Input –Output Ports ): Serial , Parallel , USB etc.


16. Explain the different factors affecting the processing speed of CPU.
Answer:-
CPU Speed/Clock speed: Speed of CPU also known as clock speed. The clock speed is the
number of instructions executed by the CPU in one second It is measured in megahertz(million
instructions per second). The average speed of a new CPU is about 1000MHz to 4000 MHz.(1 to 4 gigahertz).
Instruction set: The number of instructions decide the efficiency of a CPU. More the instructions, less efficient is the CPU and less the instructions, More efficient is the CPU.
Word size/Register size: The size of registers determines the amount of data the computer can work with at a time. Normally it is 32 bits. Smaller the size of register, slower will be the computer. . It is also known as Word size. It varies from 16 bits to 128 bits.
Data bus capacity: Width of a data bus determines the largest number of bits that can be transported at one time.
Cache Memory size: Cache memory is a high speed memory. Greater the cache, faster a processor runs. Most modern processors can execute multiple instructions per clock cycle which speeds up a program. Some CPU’s have storage for instructions and data built inside the processor chip . This is called internal cache or L1 cache memory.
Memory Size: The amount of PRIMARY STORAGE (RAM) determines the size of program that can be kept in primary storage, which is faster than secondary storage. There by the speed of computer increases. The size of RAM varies from 64 MB to 4 GB.


17. Explain USB Port (Universal Serial Bus).
Answer:
a. It is a high speed serial bus
b. It is a plug and play interface between computers and add on devices.


18. Give the specifications of Laser printer.
Answer:
a. Resolution varies from 600 to 1200 dots per inch.
b. Speed varies from 4 PPM to 24 PPM.
c. Buffer size varies from 4MB to 32 MB
d. Can print color images.


19. Give the specifications of dot matrix printer.
Answer:
a. Print head normally has 9 pins to 24 pins.
b. Speed varies from 30 to 300 characters per second.
c. Buffer size varies from 1K to 64 K.


20. Give the specifications of inkjet printer.
Answer:
a. Resolution is around 300 dots per inch.
b. Speed varies from 1PPM to 12 PPM
c. Buffer size varies from 1 MB to 4 MB.


21. Write a note on computer maintenance.
Answer:
a. Avoid heat dust and noise
b. Periodic updates and enhancements
c. Installing fire walls and anti virus.
d. In house software maintenance
e. Computer periodic checkup.


22. What are the possible threats to a computer system and how to provide security?
Answer:
Threats
a. Privacy
b. Integrity
c. Environmental damage
d. Human threats
e. Software threats
f. Unauthorized access
g. Computer viruses
Security
a. Physical protection of machine and media.
b. Giving passwords and users ID
c. Using Licensed software
d. Use of Cryptography
e. Use of Spike busters and UPS


23. Explain the typical causes of computer failures.
Answer:
a. Break down of components.
b. Excessive dust or humidity
c. Virus
d. Voltage fluctuation
e. Corrosion


24.Write a note on Computer virus.
Answer:
Viruses are collection of coded instructions which are self replicating. When a virus attaches itself to another file it infects it. They are normally inactive until infected program is run.
They are broadly classified into three categories.
a. Boot infectors
b. System infectors
c. Executable program infectors
a.Boot infectors: Create bad sectors. They remain in the memory until the system is shutdown.
b.System infectors: It infects the hard disk or boot-able floppies which may contain system files.
c.Executable program infectors: These are dangerous and devastating. They spread to almost any executable program attaching themselves to programming files.


25. Explain the General Structure of CPU.
Answer:
Program counter: This register stores address of next instruction to be executed.
Memory address register (MAR): This register specifies address in memory where information can be found. This register is also used to point to a memory locations where information can be stored.
Memory buffer register: This register acts as an interface between CPU and memory. When CPU issues a Read Memory command, instruction is fetched and placed in MB register.
Instruction register:This stores a copy of current instruction.
Instruction decoder (ID): ID is an electronic hardware, which decodes instructions. The instructions are further broken down into a set of micro operations, so that they can be executed directly.
General purpose registers: They are used to store data. There are 6 GP registers. These are used for storage of data as needed by the program.
Arithmetic Logic Unit: The basic arithmetic operations such as addition, subtraction, multiplication and division are carried out here. These operations need at least two operands, one which is stored in accumulator and the other in the MBR. After the manipulation of data in ALU, the result is transferred to accumulator.
Accumulator: During processing the intermediate data needed for future processing is stored in
accumulator. The contents of ACC are used by ALU for operations and later by MBR holds the final result for further action.


26. Explain the cache memory in detail.
Answer: 
Cache memory is a small and fast memory between CPU and main memory. It is extremely fast compared to normal memory. Transferring data between main memory and CPU causes delay because RAM is slower than CPU. Cache memory stores copies of data from most frequently used main memory locations. When processor needs to read from or write to a location in main memory, it first checks whether a copy of data is in the cache. If so processor immediately reads or writes to cache. Computers use multilevel of cache such as Level1(smallest)and Level2 cache.CPU resident cache is known as L1 or primary cache (16 to 32 KB) to 512 KB.Cache is also added to mother board also known as L2 cache (512 KB to 1024 KB). Higher end systems can have as much as 2 MB of L2 cache on mother board.



Monday, July 28, 2014

Functions based Qs and answer in C programming

1. What is a function?
Answer:-
A function is a small segment of the program(sub program) designed to perform a specific task and return a result to the main or calling program.


2. What are the different types of functions supported in “C” language?
Answer:-
C supports two types of functions. They are
1. Built-in / Library functions
2. User defined functions



3. What are library functions?
Answer:-
Some of the operations are programmed and stored in C library so that they can be called in the program. These functions are called as library functions.
Eg : printf(), sqrt(), pow()


4. What is a user defined function?
Answer:-
A user-defined function is a complete and independent program unit, which can be used(or invoked) by the main program or by other sub-programs.



5. Mention the need for a function
Answer:-
If there are a number of statements that are repeatedly needed in the same program at different locations,then a function may be used.




6. What do you mean by a calling function?
Answer:-
Once the function is created it can be called from the main program or from any other function. This main program or the function which calls another function is called calling function.




7. What is a called function?
Answer:-
The user-defined function which is called by the main program or from any other function is known as called function.




8. What does the return-type-specifier of a function identify?
Answer:-
It identifies the type of value, which will be sent back after the function has performed its task (eg: int, float).




9. Why is the return type void used?
Answer:-
The return type void is used if the function does not return any value to the calling function.




10. What is an argument?
Answer:-
Information or values are passed to the function through special identifiers are called arguments.




11. What are actual parameters?
Answer:-
The arguments (values) which are passed to the function when a function call is made are called actual parameters.



12. What are formal parameters?
Answer:-
The arguments which are used in the argument list of the function header to receive the values from the calling program are called formal parameters or dummy parameters.




13. Give the syntax of a function call?
Answer:-
A function call has the following syntax:
variable = function_name(arg1,arg2…);
where arg1, arg2… are the actual parameters.




14. How is a function invoked?
Answer:-
A function is invoked(or called) through an output statement or through an assignment statement by using the function name followed by the list of arguments.Example: p = prod(x, y);



15. What is the use of the return statement?
Answer:-
The return statement is used in the body of the function which contains the value that has to be sent back to the main program.




16. Give the syntax of return statement?
Answer:-
The return statement can take one of the following forms return; Or return(expression);The first form does not return any value, where the second function returns the value of the expression.




17. What are local variables?
Answer:-
Variables declared inside a block or function are said to belong only to that block and these are called as local variables. Values of these variables are valid only in that block.




18. What are global variables?
Answer:-
Variables declared before the main function block are called global variables. Values of these variables are available in every block of that program.




19. What is function prototype?
Answer:-
A function must be declared before it is actually called. The declaration of a function is known as function prototype.




20. Give the syntax of a function prototype.
Answer:-
return-type function-name (type1, type2);
Ex: float power(float, int);




21. Define the term recursion.
Answer:-
A function which calls itself directly or indirectly again and again until a condition is satisfied is called as recursive function. This process is called recursion.




22. How do we pass an entire array to a function?
Answer:-
To pass an entire array to a called function only the array name without a subscript is used as argument(actual parameter).
Ex: void main( )
{
int a[100], n;
. . . . . . . . . .
sort(a, n); (where sort is the function name)
}




23 What is meant by scope of a variable?
Answer:-
1. The name of the variable.
2. The amount of space required to store that variable.
3. Address of the memory location.
4. The possible operations, which can be performed with the variable.




24. What are storage classes?
Answer:-
A storage class refers to the scope and life time of a variable i.e., the portion of program where the variable is valid and how long a variable can retain its value is defined
in the storage class.




25. What are the different types of storage classes?
Answer:-
1. Automatic storage class
2. External storage class
3. Static storage class
4. Register storage class



26 does Register variable have address?
Answer:-
No. (CPU registers do not have addresses).




27. Give the differences between library functions and user-defined functions.

Answer:-
Library functions :-
i. Some of the operations are programmed and stored in C library so that they can be called in the program. These functions are called as library functions.
ii. Library functions are in-built functions.

User-defined functions :-
i. Large programs can be broken down into smaller sub programs or modules. These sub programs are called user-defined functions.
ii. User-defined functions are created by the user.




28. What is a function call? What is the syntax of a function call?
Answer:-
To execute a function we will have to call the function. A function call establishes a link between the called function and the calling program.
A function call has the following syntax:
variable = Function_name (arg1, arg2…);
where arg1, arg2… are the actual parameters.




29. Why is the return statement is required in a function body?
Answer:-
When a function is called control is transferred from the calling function (main program) to the called function (sub-program). The statements of the called function are executed and finally the called function is terminated and sends the required result back to the calling function. The return statement is used to send the result from the function to the main program, thus terminating the called function.
The syntax is: return;
Or
return(expression);
The first form does not return any value, where the second function returns the value of the expression.




30. What is a function prototype? When is a function prototype necessary?
Answer:-
The declaration of a function before it is used is called as function prototype. A function prototype contains the data type of arguments sent as input to the function and data type of the result sent back from the function
Syntax: data_type function_name(data_type1,data_type2,….);
Example: float power(float, int);




31. Explain user defined function with an example
Answer:-
User defined function is a subprogram that is called by a main() function or any other function.
A user defined function may appear before or after the main() function. The general syntax of function definition is as follows:
Return_type_ specifier Function_name (type arg1, type arg2….)
{
local variable declarations; argument list
statement1;
statement2;
… Body of the function
statement n;
return (expression);
}
Return data type- indicates the data type of variable sent back from called
function to calling function
Function name- indicates the name of the function .It is an identifier
Argument list- list of input variables and their data-types received from calling
function
Local variable declaration-list of data that required only for the function block in which they are declared.
Body of the function-It includes declaration part (local variables) and a set
of executable statements which will perform the required task.
Return statement- indicates termination of function and transfer of control from called
function to calling function
Example:
int sum(int a,int b)
{
int c;
c=a+b;
return(c);
}




32. Mention different types of functions.
Answer:-
The different types of functions are
1. functions with no input and no return value
2. functions with input and no return value
3. Functions with input and return value
4. Recursive functions




33. What are storage classes? Mention different types of storage classes. Explain
Answer:-
A storage class refers to the scope of data in a program. Scope of data means the portion of the program in which the variable is valid(mian() as well as sub
programs) and lifetime of the variable.i.e., the length of time to which the variable
retains its value.

A variable must belong to any one of the following storage classes.
1. Automatic storage class
2. External storage class
3. Register storage class
4. Static storage class

Automatic storage class :-
Automatic storage class is similar to local variable declaration
Key word auto precedes the declaration
Ex:
auto int x,y,z;
• Automatic variables are local variables
• The variables are stored in memory(RAM)
• The key word auto is implicit(it means even without the word auto the
variable is automatic)
• Initial value stored is junk

External storage class :-
External storage class is similar to global variables.
Keyword extern precedes the declaration
Ex:
Extern int m,n;
• Scope of the variable is global
• The variables are stored in memory
• Needs explicit(must use the keyword)declaration
• Initial value stored is junk

Register storage class :-
Register storage class is used when data is needed in cpu registers
Key word register must precede the declaration
Ex:
register int x,y;
• Scope of the variable is local
• The variables are stored in registers
• Needs explicit declaration
• Initial value is not known

Static storage class:-
Static storage class is used in function blocks. The static variable can be initialized exactly once when the function is called for the first time. For subsequent calls to the same function, the static variable stores the most recent value.
Key word static precedes the variable declaration
Ex: static int x,y,z;
• Scope of the variable is local
• The variables are stored in memory
• Needs explicit declaration
• Default Initial value is stored is 0.


Array based Qs and answers

1) What is an array?

Answer:-
An array is a group of data of the same data type stored in successive storage locations.



2)How are elements of an array accessed?

Answer:-
Elements of an array are accessed using subscripts.



3)What is a subscript?

Answer:-
A subscript or an index is a positive integer value that identifies the storage position of
an element in the array.



4)Which is the smallest subscript?

Answer:-
0 (zero)



5)How many subscripts does a one and two dimensional array have?

Answer:-
one dimensional array has one subscript and a two dimensional array has two
subscripts( row and a column subscript).



6)Write the syntax for declaring a one dimensional array.

Answer:-
syntax: datatype arrayname [size];



7) Write the syntax for declaring a two dimensional array.

Answer:-
Syntax: datatype arrayname [row size] [column size];



8) What do you mean by initializing an array?

Answer:-
Initializing of an array means storing data in to an array at the design time.



9) How one dimensional array is initialized?

Answer:-
The initialization can be done two ways –
• Initialization at design level- in this method of initialization the data values are
stored in to the array at the time of array declaration. 
Example: 
int a [0]={10,-50,20,300,5};
• Initialization at run time- to initialize an array at run time means to input data values
in to the array at the time of execution of the program.
Example:
int a[10];
for (i=0;i<10;i++)
scanf(“%d”,&a[i]);



10) How to output the elements of one dimensional array?

Answer:-
To print elements of an array a for loop is used.
Example:
int a[10];
for(i=0;i<10;i++)
printf(“%d\n”,a[i]);



11) How two dimensional arrays are initialized?

Answer:-
• initialization at design time- the data element are stored in to the array at the time
of declaration of the array. The elements of each row and each column are
represented within the pair of flower brackets.
Example : int a[3][3]={1,3,5,3,7,82,5,8};
• initialization of the array at the time of execution- to input data in to two
dimensional array, two for loops are used foe every value of the outer loop index.
The inner loop is executed a specified number of times.
Example: int a[4][5];
for(i=0;i<4;i++)
for(j=0;j<5;j++)
scanf(“%d”,&a[i][j]);



12) How do you print a matrix? Give ex.

Answer:-
A two dimensional array can be printed as follows-
int a[3][4];
for(i=0;i<3;i++)
{
for(j=0;j<4;j++)
{
printf(“%d\t”,a[i][j]);
}
printf(“\n”);
}





Unix based Qs and ans


1. What are the events done by the Kernel after a process is being swapped out from the main memory?

Answer :-
1.Kernel decrements the Reference Count of each region of the process. If the reference count becomes zero, swaps the region out of the main memory,
2.Kernel allocates the space for the swapping process in the swap device,
3.Kernel locks the other swapping process while the current swapping operation is going on,
4.The Kernel saves the swap address of the region in the region table.



2.Is the Process before and after the swap are the same? Give reason.

Answer :-
1.Process before swapping is residing in the primary memory in its original form. The regions (text, data and stack) may not be occupied fully by the process, there may be few empty slots in any of the regions and while swapping Kernel do not bother about the empty slots while swapping the process out.
2.After swapping the process resides in the swap (secondary memory) device. The regions swapped out will be present but only the occupied region slots but not the empty slots that were present before assigning.
3.While swapping the process once again into the main memory, the Kernel referring to the Process Memory Map, it assigns the main memory accordingly taking care of the empty slots in the regions.




3.What is Fork swap?

Answer :-
"fork()" is a system call to create a child process. When the parent process calls "fork()" system call, the child process is created and if there is short of memory then the child process is sent to the read-to-run state in the swap device, and return to the user state without swapping the parent process. When the memory will be available the child process will be swapped into the main memory.




4.What are the entities that are swapped out of the main memory while swapping the process out of the main memory?

Answer :-
1.All memory space occupied by the process, process's u-area, and Kernel stack are swapped out, theoretically.
2.Practically, if the process's u-area contains the Address Translation Tables for the process then Kernel implementations do not swap the u-area.




5.What is Expansion swap?

Answer :-
At the time when any process requires more memory than it is currently allocated, the Kernel performs Expansion swap. To do this Kernel reserves enough space in the swap device. Then the address translation mapping is adjusted for the new virtual address space but the physical memory is not allocated. At last Kernel swaps the process into the assigned space in the swap device. Later when the Kernel swaps the process into the main memory this assigns memory according to the new address translation mapping.




Friday, July 25, 2014

Install Windows

To install Windows XP operating system follow steps :-

Minimum System Requirements:-
  • 300 MHz Intel or AMD CPU
  • 128 megabytes (MB) of system RAM
  • 1.5 gigabytes (GB) of available drive space
  • Super VGA (800x600) or higher display adapter
  • CD or DVD-ROM
  • Keyboard and mouse, or other pointing devices
  • Network Interface Adapter required for Internet and Network Connectivity
Turn your computer on then press Del or F2 to enter the system BIOS
Go to Boot menu and choose Boot From CD/DVD.
Press F10 to save the configuration and exit BIOS then reset your computer.
Insert Windows XP DVD into your DVD drive then start up your computer,

Step 1:-Load the installer.
 Once your Boot Order is set, insert the Windows XP CD into your drive and Save and Exit from the BIOS. Your computer will reboot and you will be presented with the message: Press any key to boot from CD. Press any key on your keyboard to start the Setup program.
Setup will load files necessary to begin the installation, which may take a few moments. Once the loading is complete, you will be taken to the Welcome screen.


Step 2:- Press ENTER to begin installation.
Once the loading is complete, you will be taken to the Welcome screen. You are given several options, but if you are installing or reinstalling Windows XP, you’ll want to press ENTER to start the installation configuration.


Step 3 :-Read the License Agreement.
 This document tells you what you can and can’t do with Windows, and your rights as the consumer. After reading, press F8 indicating you agree to the terms.

Step 4 :- Select the partition you want to install on.
You will see a list of available partitions on your installed hard drives. If you are installing Windows XP on a new hard drive, you should see only one entry labeled "Unpartitioned space." If you have a previous version of Windows or Linux installed on your computer, you will potentially have multiple partitions.
Installing Windows XP will erase all of the data on the partition that you choose. Select a partition that is empty or that contains data that you do not care to lose.
You can delete your partitions with the “D” key. This will return them to “Unpartitioned space”. Any data on the partition will be lost when it is deleted

Step 5 :-Create a new partition.
 Select the Unparititioned space and press “C”. This will open a new screen where you can set the partition’s size from the available space. Enter the size in megabytes (MB) for the new partition and then press ENTER.

Step 6 :-Select your new partition.
 Once you’ve created your installation partition, you will be returned to the partition selection screen. Select your new partition, usually labeled "C: Partition 1 [Raw]" and press ENTER.

Step 7 :- Select "Format the Partition using the NTFS File System" and press ENTER.

Step 8:- Wait for the format and Setup files to copy and for for the installation to proceed.

Step 9:- Choose your language and region settings.Click the Next button when that is completed.Enter your full name if you want. This will be set as the “owner” of Windows, and will be attached to certain things, such as Document creation.

Step 10:- Enter your Product Key. You will not be able to complete the installation process without a valid Product Key. Click "Next" to continue.

Step 11:-Set your computer’s name. This will be the name that represents the computer on a network. Windows sets a default name, but you can change it if you would like. You can also set a password for the Administrator account. This is optional, but recommended for public computers.

Step 12:-Select your time zone. Ensure that the date/time are correct. Click "Next" to continue.

Step 13:- Choose your network settings.

Step 14:- Wait for the installation to finalize.
This will only take a few minutes, and the computer will reboot when it is finished installing. Once the computer reboots, you will be taken to the Windows XP desktop. At this point, installation is complete, though there are a few things left to do before Windows is completely usable.



To install Windows 7 operating system follow these steps:-

Check Hardware requirements:-
  • 1 GHz CPU with 32 bits or 64 bits
  • 1 GB Ram for 32 bits or 2 GB Ram for 64 bits.
  • 16 GB empty space hard disk for 32 bits or 20 GB for 64 bits.
  • DVD drive
Step 1:-Turn your computer on then press Del or F2 (depend on your computer’s mainboard) to enter the system BIOS

Step 2:-Go to Boot menu and choose Boot From CD/DVD.

Step 3:-Press F10 to save the configuration and exit BIOS then reset your computer.

Step 4:- Insert Windows 7 DVD into your DVD drive then start up your computer, Windows 7 will be loading files.

Step 5:- Select these parts: Language to Install,Time and currency format, Keyboard or input method. Then click Next.

Step 6:-Choose Install Now if you want to install Windows 7. Choose the Windows 7 version that you want to install in 'Select the operating system you want to install' . Here we choose Windows 7 Ultimate then click next (depending on your Windows DVD, this step is an option).

Step 7 :-Click 'I accept the license terms' in 'Please read the license' then click Next.

Step 8:-Choose 'Upgrade' in 'Which type of installation do you want' if you want to upgrade from an older Windows version to Windows 7, 'Custom (advance)' if you want to install a new version of Windows.

Step 9:- Choose Partition for installation, if your computer has only one hard disk, it will be easy for selection, but if it has some Partition, you will have to consider which Partition to choose.

Step 10:-Wait for Installing Windows to progress. Your computer might be restarted during the process.

Step 11:- Type you’re a user account and computer name. After click Next.

Step 12:-Type a password for your account, you can also Type a password hint to help in case of forgetting the password in the future, and then click Next.

Step 13:-Type in activation code or key for your license in Product key box if you have any. Click Next.

Step 14 :-Choose how to protect your Windows. Here we choose Use recommended settings.

Step 15 :-Set up your Time zone then click Next.

Step 16:- Choose an option from 3 choices: Public Network, Work Network, Home Network. Choose Home Network for using Internet at home.

Solve Computer Science Questions

1. With four programs in memory and with 80% average I/O wait , the CPU utilization is?

A) 60 %
B) 70 %
C) 90 %
D) 100 %




2. To employ multi - access in GSM , users are given different:


A) time slots
B) bandpass filters
C) handsets
D) frequency bands




3.What will be the value of 'b' after the execution of the following code statements:
c = 10;
b = ++c + ++c;


A) 20
B) 22
C) 23
D) None




4. What of the following does not represent a valid storage class in 'c'?

A) automatic
B) static
C) union
D) extern




5. Find the odd man out :

A) tail
B) cut
C) wart
D) sed




6. We can not delete the ____icon but we can made it invisible.

A) Recycle
B) My computer
C) Internet explorer
D) None of the above




7. The device which connects dissimilar LAN's of different topologies using different sets of communication protocols so that information can flow from one to another is called:

A) Router
B) Bridge
C) Gateway
D) Switch




8. Capability Maturity Model is meant for;

A) Product
B) Process
C) Product and Process
D) None of the above




9. In the light of software engineering software consists of:


A) Programs
B) Data
C) Documentation
D) All the above




10. Variable partition memory management technique with compaction results in:

A) Reduction of fragmentation
B) Minimal wastage
C) Segment sharing
D) None of the above




Solve Questions on GK and common


1. Find out the wrong number in the sequence.
52, 51, 48, 43, 34, 27, 16
A) 27
B) 34
C) 43
D) 48



2. The letters in the first set have a certain relationship.
On the basis of this relationship mark the right choice for the second set:
A) FHJL
B) RPNL
C) LNPR
D) LJHF



3.Insert the missing number in the following:
3, 8, 18, 23, 33, ?, 48
A) 37
B) 40
C) 38
D) 45



4.In a certain code ,CLOCK is written as KCOLC.How would STEPS be written in that code?
A) SPEST
B) SPSET
C) SPETS
D) SEPTS



5. 'No man are mortal'  is contradictory of:
A) Some man are mortal
B) Some man are not mortal
C) All men are mortal
D) No mortal is man



6.Two ladies and two men are playing bridge and seated at North, East, South and West of a table.
No lady is facing East.Persons sitting opposite to each other are not of the same sex. One man is facing South. Which direction are the laddies facing to?
A) East and West
B) North and West
C) South East
D) None of these



7. What is blog?
A) Online music
B) Intranet
C) A personal or corporate website in the form of an online journal
D) A personal or corporate Google search



8. Bog is a wetland that receives water from :
A) nearby water bodies
B) melting
C) rain fall only
D) sea only



9. Action-research  is:
A) An applied research
B) A research carried out to solve immediate problems
C) A longitudinal research
D) All the above



10.How can the objectivity of the research be enhanced ?
A) Through its impartiality
B) Through its reliability
C) Through its validity
D) All the above

Thursday, July 24, 2014

SEO

SEO: Search Engine Optimization
Search engine optimization (SEO) is the process of affecting the visibility of a website or a web page in a search engine's "natural" or un-paid ("organic") search results.



There are two ways of doing SEO
On-Page SEO- This includes providing good content, good keywords selection. putting keywords on correct places, giving appropriate title to every page etc.
Off-Page SEO - This includes link building, increasing link popularity by submitting in open directories, search engines, link exchange etc.

SEO may target different kinds of search, including image search, local search, video search, academic search,news search and industry-specific vertical search engines.


Search engines perform several activities in order to deliver search results like,
1.Crawling
2.Indexing
3.Processing
4.Calculating Relevancy
5.Retrieving Results

SEO techniques are classified into two broad categories:
1.Techniques that search engines recommend as part of good design referred to as White Hat SEO, and
2.Techniques that search engines do not approve and attempt to minimize the effect of referred to as Black Hat or spamdexing.
1.White Hat SEO:-
An SEO technique is considered white hat if it conforms to the search engines guidelines and involves no deception.
As the search engine guidelines are not written as a series of rules or commandments, this is an important distinction to note.
White hat SEO is not just about following guidelines, but is about ensuring that the content a search engine indexes and
subsequently ranks is the same content a user will see.
 White hat advice is generally summed up as creating content for users, not for search engines,
and then making that content easily accessible to the spiders, rather than attempting to trick the algorithm from its intended purpose.
 White hat SEO is in many ways similar to web development that promotes accessibility, although the two are not identical.


2.Black Hat SEO :-
Black hat SEO attempts to improve rankings in ways that are disapproved of by the search engines, or involve deception.
One black hat technique uses text that is hidden, either as text colored similar to the background, in an invisible div, or positioned off screen.
Another method gives a different page depending on whether the page is being requested by a human visitor or a search engine, a technique known as cloaking.


In optimizing keywords on a web page are:-
Keyword Frequency:
This is calculated as how often does a keyword appear in a site's title or description. You don't want to go overboard with frequency, however, since on some engines if you repeat a word too many times, you'll be penalized for "spamming" or keyword stuffing.
In general though, repeat your keyword in the document as many times as you can get away with, and up to 3-7 times in your META tags.

Keyword Weight:
This refers to the number of keywords appearing on your Web page compared to the total number of words appearing on that same page. Some search engines consider this when determining the rank of your Web site for a particular keyword search.
One technique that often works well is to create some smaller pages, generally just a paragraph long, which emphasize a particular keyword. By keeping the overall number of words to a minimum, you will increase the "weight" of the keyword you are emphasizing.

Keyword Proximity:
This refers to the placement of keywords on a Web page in relation to each other or, in some cases, in relation to other words with a similar meaning as the queried keyword.
For search engines that grade a keyword match by keyword proximity, the connected phrase .home loans. will outrank a citation that mentions .home mortgage loans. assuming that you are searching only for the phrase "home loans".

Keyword Prominence:
A measure of how early or high up on a page the keywords are found. Having keywords in the first heading and in the first paragraph (first 20 words or so) on a page are best.

Keyword Placement:
WHERE your keywords are placed on a page is very important. For example, in most engines, placing the keywords in the Title of the page or in the Heading tags will give it more relevancy. On some engines, placing keywords in the link text, the part that is underlined on the screen in a browser, can add more relevancy to those words.

Best Places to Put Keywords:
Here is a list of places where you should try to use your main keywords.
1.Keywords in the <title> tag(s).
2.Keywords in the <meta name="description">
3.Keywords in the <meta name="keyword">
4. Keywords in <h1> or other headline tags.
5.Keywords in the <a href="http://yourcompany.com">keywords</a> link tags.
6.Keywords in the body copy.
7.Keywords in alt tags.
8.Keywords in <!-- insert comments here> comments tags.
9.Keywords contained in the URL or site address, e.g., http://www.keyword.com/keywordkeyword.htm.


Finding Keywords:

There are many different ways to find keywords for your website. Some good keyword ideas are:
1.Words people would search for to find your product or service.
2.Problems your prospective customers may be trying to solve with your product or service.
3.Keyword tags on competitors websites.
4.Visible page copy on competitors websites.
5.Related search suggestions on top search engines.
6.By using an online tools like: Google Keyword Tool
7.By analyzing your website carefully and finding out proper keywords. This task can be done by expert SEO Copywriters.
8.Pay attention to stemming for your keywords - Particularly to what the root word is and what Google considers to be a match for that word when optimizing pages over time.
9.You can do brainstorming to identify correct keywords for your site.

Wednesday, July 23, 2014

To learn Multiplication tables

Multiplication Tables:-



012345 6

 0 * 1 = 0 
0 * 2 = 0
0 * 3  = 0
0 * 4 = 0
0 * 5 = 0
0 * 6 = 0
0 * 7= 0
0 * 8 = 0
0 * 9 = 0
0 * 10 = 0
0 * 11 = 0
0 * 12 = 0

1 * 1 = 1
1 * 2  = 2
1 * 3  = 3
1 * 4 = 4
1 * 5= 5
1 * 6 = 6
1 * 7 = 7
1 * 8 = 8
1 * 9 = 9
1 * 10 = 10
1 * 11 = 11
1 * 12 = 12
 
2 * 1 = 02
2 * 2 = 04
2 * 3 = 06
2 * 4 = 08
2 * 5 = 10
2 * 6 = 12
2 * 7 = 14
2 * 8 = 16
2 * 9 = 18
2 * 10 = 20
2 * 11 = 22
2 * 12 = 24

3 * 1 = 03
3 * 2 = 06
3 * 3 = 09
3 * 4 = 12
3 * 5 = 15
3 *  6 = 18
3 * 7 = 21
3 * 8 = 24
3 * 9 = 27
3 * 10 = 30
3 * 11 = 33
3 * 12 = 36

4 * 1 = 04
4 * 2 = 08
4 * 3 =  12
4 * 4 = 16
4 * 5 = 20
4 * 6 = 24
4 * 7 = 28
4 *  8 = 32
4 * 9 = 36
4 * 10 = 40
4 * 11 = 44
4 * 12 = 48

5 * 1 = 05
5 * 2 = 10
5 * 3 = 15
5 * 4 = 20
5 * 5 = 25
5 * 6 = 30
5 * 7 = 35
5 * 8 = 40
5 * 9 = 45
5 * 10 = 50
5 * 11 = 55
5 * 12 = 60

6 * 1 = 06
6 * 2 = 12
6 * 3 = 18
6 * 4 = 24
6 * 5 = 30
6 * 6 = 36
6 * 7 = 42
6 * 8 = 48
6* 9 = 54
6 * 10 = 60
6 * 11 = 66
6 * 12 = 72


789101112

7 * 1 = 07
7 * 2 = 14
7 * 3 = 21
7 * 4 = 28
7 * 5 = 35
7 * 6 = 42
7 * 7 = 49
7 * 8 = 56
7* 9 = 63
7 * 10 = 70
7 * 11 = 77
7 * 12 = 84

8 * 1 = 08
8 * 2 = 16
8 * 3 = 24
8 * 4 = 32
8 * 5 = 40
8 * 6 = 48
8  * 7 = 56
8 * 8 = 64
8 * 9 = 72
8 * 10 = 80
8 * 11 = 88
8 * 12 = 96

9 * 1 = 09
9 * 2 = 18
9 * 3 = 27
9 * 4 = 36
9 * 5 = 45
9 * 6 = 54
9 * 7 = 63
9 * 8 = 72
9 * 9 = 81
9 * 10 = 90
9 * 11 = 99
9 * 12 = 108

10 * 1 = 10
10 * 2 = 20
10 * 3 = 30
10 * 4 = 40
10 * 5 = 50
10 * 6 = 60
10 * 7 = 70
10 * 8 = 80
10 * 9 = 90
10 * 10 = 100
10 * 11 = 110
10 * 12 = 120

11 * 1 = 11
11 * 2 = 22
11 * 3 = 33
11 * 4 = 44
11 * 5 = 55
11 * 6 = 66
11 * 7 = 77
11 * 8 = 88
11 * 9 = 99
11 * 10 = 110
11 * 11 = 121
11 * 12 = 132

12 * 1 = 12
12 * 2 = 24
12 * 3 = 36
12 * 4 = 48
12 * 5 = 60
12 * 6 = 72
12 * 7 = 84
12 * 8 = 96
12 * 9 = 108
12 * 10 = 120
12 * 11 = 132
12 * 12 = 144
  where,
* means multiplication(to multiply). 
To write table of  9 is very simple:-
First write 0 to 9
0
1
2
3
4
5
6
7
8
9
then next from downwards that is from 9 write, 0 to 9 numbers in front of them.
09
18
27
36
45
54
63
72
81
90

Java

Java Programming Language:

 Java is a computer programming language that is concurrent, class-based, object-oriented, and specifically designed to have as few implementation dependencies as possible. It is intended to let application developers "write once, run anywhere" (WORA), meaning that code that runs on one platform does not need to be recompiled to run on another. Java applications are typically compiled to byte-code (class file) that can run on any Java virtual machine (JVM) regardless of computer architecture. Java is, as of 2014, one of the most popular programming languages in use, particularly for client-server web applications, with a reported 9 million developers.
Figure :-Java Logo 

Java is:

Architectural-neutral: Java compiler generates an architecture-neutral object file format which makes the compiled code to be executable on many processors, with the presence of Java run-time system.

Distributed: Java is designed for the distributed environment of the internet.

Dynamic: Java is considered to be more dynamic than C or C++ since it is designed to adapt to an evolving environment. Java programs can carry extensive amount of run-time information that can be used to verify and resolve accesses to objects on run-time.

High Performance: With the use of Just-In-Time compilers, Java enables high performance.

Interpreted: Java byte code is translated on the fly to native machine instructions and is not stored anywhere. The development process is more rapid and analytical since the linking is an incremental and light weight process.

Multi-threaded: With Java's multi-threaded feature it is possible to write programs that can do many tasks simultaneously. This design feature allows developers to construct smoothly running interactive applications.

Object Oriented: In Java, everything is an Object. Java can be easily extended since it is based on the Object model.

Platform independent: Unlike many other programming languages including C and C++, when Java is compiled, it is not compiled into platform specific machine, rather into platform independent byte code. This byte code is distributed over the web and interpreted by virtual Machine (JVM) on whichever platform it is being run.
 

Portable: Being architectural-neutral and having no implementation dependent aspects of the specification makes Java portable. Compiler in Java is written in ANSI C with a clean portability boundary which is a PO SIX subset.

Robust: Java makes an effort to eliminate error prone situations by emphasizing mainly on compile time error checking and run-time checking.

Secure: With Java's secure feature it enables to develop virus-free, tamper-free systems. Authentication techniques are based on public-key encryption.

Simple: Java is designed to be easy to learn. If you understand the basic concept of OOP Java would be easy to master.


History of Java:
James Gosling initiated the Java language project in June 1991 for use in one of his many set-top box projects. The language, initially called Oak after an oak tree that stood outside Gosling's office, also went by the name Green and ended up later being renamed as Java, from a list of random words.
Sun released the first public implementation as Java 1.0 in 1995. It promised Write Once, Run Anywhere (WORA), providing no-cost run-times on popular platforms.
On 13 November 2006, Sun released much of Java as free and open source software under the terms of the GNU General Public License (GPL).
On 8 May 2007, Sun finished the process, making all of Java's core code free and open-source, aside from a small portion of code to which Sun did not hold the copyright.


Software:
Linux 7.1 or Windows 95/98/2000/XP/7/8 operating system.
Java JDK 5
Microsoft Notepad or any other text editor

Java programming language was originally developed by Sun Micro-systems which was initiated by James Gosling and released in 1995 as core component of Sun Micro-systems Java platform (Java 1.0 [J2SE]).

As of December 2008, the latest release of the Java Standard Edition is 6 (J2SE).
With the advancement of Java and its widespread popularity, multiple configurations were built to suite various types of platforms. Ex: J2EE for Enterprise Applications, J2ME for Mobile Applications.

Sun Micro-systems has renamed the new J2 versions as Java SE, Java EE and Java ME respectively.
Java is guaranteed to be Write Once, Run Anywhere.
 

Tuesday, July 22, 2014

PHP

PHP

  1. PHP is a recursive acronym for "Hypertext Preprocessor".
  2. PHP is a widely-used, open source scripting language.
  3. PHP scripts are executed on the server.
  4. PHP costs nothing, it is free to download and use.
  5. PHP files can contain text, HTML, CSS, JavaScript, and PHP code.
  6. PHP code are executed on the server, and the result is returned to the browser as plain HTML.
  7. PHP files have extension ".php".
  8. PHP can generate dynamic page content.
  9. PHP can create, open, read, write, delete, and close files on the server.
  10. PHP can collect form data.
  11. PHP can send and receive cookies.
  12. PHP can add, delete, modify data in your database.
  13. PHP can restrict users to access some pages on your website.
  14. PHP can encrypt data.
  15. PHP runs on various platforms (Windows, Linux, Unix, Mac OS X, etc.).
  16. PHP is compatible with almost all servers used today (Apache, IIS, etc.).
  17. PHP supports a wide range of databases.
  18. PHP is easy to learn and runs efficiently on the server side.
  19. With PHP you are not limited to output HTML. You can output images, PDF files, and even Flash movies.
  20. You can also output any text, such as XHTML and XML.
  21. In PHP, all user-defined functions, classes, and keywords (e.g. if, else, while, echo, etc.) are NOT case-sensitive.However; in PHP, all variables are case-sensitive.
  22. PHP is a Loosely Typed Language.PHP automatically converts the variable to the correct data type, depending on its value.In other languages such as C, C++, and Java, the programmer must declare the name and type of the variable before using it.


PHP Variables:-

As with algebra, PHP variables can be used to hold values (x=5) or expressions (z=x+y).

A variable can have a short name (like x and y) or a more descriptive name (age, carname, total_volume).

Rules for PHP variables:
  1. A variable starts with the $ sign, followed by the name of the variable
  2. A variable name must start with a letter or the underscore character
  3. A variable name cannot start with a number
  4. A variable name can only contain alpha-numeric characters and underscores (A-z, 0-9, and _ )
  5. Variable names are case sensitive ($y and $Y are two different variables)



PHP Variables Scope:-

In PHP, variables can be declared anywhere in the script.

The scope of a variable is the part of the script where the variable can be referenced/used.

PHP has three different variable scopes:
  1. local
  2. global
  3. static

PHP Data Types:-
PHP Integers:

An integer is a number without decimals.

Rules for integers:

  1. An integer must have at least one digit (0-9)
  2. An integer cannot contain comma or blanks
  3. An integer must not have a decimal point
  4. An integer can be either positive or negative
  5. Integers can be specified in three formats: decimal (10-based), hexadecimal (16-based - prefixed with 0x) or octal (8-based - prefixed with 0)

Example
<?php
$x = 5985;
var_dump($x);
echo "<br>";
$x = -345; // negative number
var_dump($x);
echo "<br>";
$x = 0x8C; // hexadecimal number
var_dump($x);
echo "<br>";
$x = 047; // octal number
var_dump($x);
?>

Basic PHP Syntax:-
A PHP script can be placed anywhere in the document.
A PHP script starts with <?php and ends with ?>

Example:

<!DOCTYPE html>
<html>
<body>

<h1>My first PHP page</h1>

<?php
echo "Hello World!";
?>

</body>
</html>

PHP statements are terminated by semicolon (;).
The closing tag of a block of PHP code also automatically implies a semicolon.
So you do not have to have a semicolon terminating the last line of a PHP block.

Mac OS

The Mac OS is designed to run on Machintosh computers .
It is a very powerful and easy-to-use operating system .It is the world most advanced operating system and the newest version of OS X is free with strongest security.
The latest version of the Machintosh operating system is OS X. This operating system provides a number of unique features:

  • Aqua  is an intuitive user interface.
  • Dock provides a flexible tool for organizing files.
  • Sherlock locates information on the Web as well as on the user's computer system.

                                                      Figure :- OS X

OS X:-
OS X is the line of graphical operating systems developed, marketed, and sold by Apple Inc.
which succeeded the original Mac OS, which had been Apple's primary operating system since 1984.

Unlike the earlier Macintosh operating system, OS X is a Unix-based operating system built on
technology developed at NeXT from the second half of the 1980s until early 1997,
when Apple purchased the company.

Latest version of OS X is OS X Yosemite  (version 10.10) is the upcoming eleventh major release of OS X, Apple Inc.'s desktop and server operating system for Macintosh computers. OS X Yosemite was announced and released to developers and beta testers on June 2, 2014, at WWDC 2014. Yosemite will be released to consumers in late 2014.Following the new naming scheme introduced with OS X Mavericks, Yosemite is named after the national park in California.
System requirements:-No changes in system requirements have been made for Yosemite, meaning that all Macintosh products capable of running OS X Mavericks will be supported by Yosemite; as with Mavericks, 2 GB of RAM, 8 GB of available storage, and OS X 10.6.8 (Snow Leopard) or later are required.









Device Drivers

What are Device drivers? How are device drivers updated?
 Answer:-

Device drivers  are specialized programs that allow device such as mouse, printer, scanner or keyboard to communicate with the rest of the computer system.

Every device, such as a mouse or printer , that is connected to a computer system, has a special program associated with it. This program , called a device driver or simply a driver, works with the operating system to allow communication between the device and the rest of the computer system.
Each time the computer system is started, the operating system loads all the device drivers into memory.

Whenever a new device is added to a computer system, a new device driver must be installed before the device can be used .
Windows supplies hundreds of different device drivers with its system software. If a particular device driver is not included , the product's manufacturer will supply one.
Many time these drivers are available directly form manufacturer's website.

You probably never think abut the drivers in your computer.
However when your computer behaves unpredictably , you find updating your drivers solves your problems.
Windows makes it easy to update the drivers on your computer using Windows Update.

Sunday, July 20, 2014

Process States and Transitions

List containing complete set of process states:
1. The process is executing in user mode.
2. The process is executing in kernel mode.
3. The process is not executing but is ready to run as soon as the kernel schedules it.
4. The process is sleeping and resides in main memory .
5. The process is ready to run , but swapper (process 0) must swap the process into main memory before the kernel can schedule it to execute.
6. The process is sleeping, and the swapper has swapped the process to secondary storage to make room for other processes in main memory.
7. The process is returning from the kernel to user mode ,but the kernel preemprts it and does a context switch to schedule another process.The distinction between this state and state 3 (ready to run) will be brought out shortly.
8. The process is newly created and is in a transition state ; the process exists, but it is not ready to run , nor is it sleeping . This state  is the start for all processes except process 0.
9. The process executed the exit system call and is in the zombie state. The process no longer exists , but it leaves a record containing an exit code and some timing statistics for its parent process to collect .The zombie state is the final state of a process.

Buffer

Definition :-
The kernel could read and write directly to and from the disk for all file system accesses,but system response time and throughput would be poor because of the slow disk transfer rate . The kernel therefore attempts to minimize frequency of disk access by keeping a pool  of internal data buffers,called the buffer cache which contains the data in recently used disk blocks.

A buffer contains two parts:
a memory array that contains data from the disk and
a buffer header that identifies the buffer.

The status of buffer is a combination of the following conditions:
1. The buffer is  currently locked.
2. The buffer contains valid data 
3. The kernel must write the buffer contents to disk before reassigning the buffer this condition is known as "delayed-write"
4. The kernel is currently reading or writing the contents of the buffer to disk.
5. A process is currently waiting for the buffer to become free

Structure of the buffer pool:
The kernel caches data in the buffer pool according to a least recently used algorithm .
The kernel maintains a free list of buffers that preserves the last recently used order.
The free list is a doubly linked circular list of buffers with a dummy buffer header that marks its beginning and end .
Kernel organizes the buffer into separate queues, hashed as a function of the device and block number.

Five typical scenarios the kernel may follow in getblk to allocate a buffer for a disk block
1. The kernel finds the block on its hash queue, and its buffer is free.
2. The kernel cannot find the block on the hash queue,so it allocates a buffer from the free list .
3. The kernel cannot find the block on the hash queue and in attempting to allocate a buffer from the free list ,finds a buffer on the free list that has been marked "delayed write." The kernel must write the "delayed write" buffer to disk and allocate another buffer.
4. The kernel cannot find the block on the hash queue , and the free list of buffers is empty.
5. The kernel finds the block on the hash queue , but its buffer is currently busy.


 

Monday, July 14, 2014

Solve and Test Arithmetic questions

Q1. The  base of a  triangular field is three times its altitude.If the cost of cultivating the field at Rs.24 per hectare be Rs.324, find its base and height.

Ans. Height = 300m , base= 900m


Q2 The average monthly expenditure of a family was Rs.4,050 during first 3 months, Rs. 4,260 during next 4 month and Rs.4,346 during last 5 month of the year. If the total saving during the year be Rs.8,720, find the average monthly income.

Ans. Rs. 4,970


Q3 The student in three classes are in the ratios 2:3:5. If 20 students are increased in each class ,the ratios changes to4:5:7. What is the total number of student before the increase?

Ans. 100


Q4 A papaya tree was planted 2 year ago. It increase at the rate of 20% every year . If  at present , the height of the tree is 540 cm, What was it when the tree was planted?

Ans. 375 cm


Q5 The sum of the ages of a father and son is 45 year. Five year ago , the product of their ages was 4 times the  father's age at that time.Find the present ages of the father and son.

Ans. Father's age i.s 36 year and son 's age is 9 years


Q6. A man sold an article for Rs.161, gaining 1/6th of his outlay. Find the cost price of the article.

Ans. Rs. 138


Q7. Divide Rs.560 among A,Band C so that A may get half as much as C and B may get half as much as C.

Ans. A's shave =Rs. 140, B's shave =Rs. 140, C 's shave= Rs.280


Q8. If in a long division sum ,the dividend is 380606 and the successive remainders from the first to the last are 434,125 and 413,find the divisor.

Ans. 843


Q9. In a hostel there were some students.Average expenditure on their meal was Rs.60.10 more students joined and the expenses increased by Rs.350 ,but average reduced by Rs. 5 .How many students were in the hostel originally?

Ans. 40


Q10. A grocer purchased 80 kg of rice at RS .13.50 per kg and mixed it with 120 kg available at Rs. 16 per kg.At what rate per kg should he sell the mixture to have a gain of 20 per cent?

Ans. Rs 18 per kg

Saturday, July 12, 2014

Solve More GK Qs

General Knowledge Questions :-

1) What should be the minimum interval between two successive blood donations?
A) 6 weeks
B) 3 months
C) 6 months
D) 8 months

Ans::- B) 3 months


2) Food is mainly digested in-
A) Liver
B) Large intestine
C) Small intestine
D) Mouth
 
Ans::- C) Small intestine


3) The large cell in the human body is -
A) Nerve Cell
B) Muscle Cell
C) Liver Cell
D) Kidney Cell

Ans::- A) Nerve Cell



4) Which of the following is a flightless bird?
A) Emu
B) Hen
C) Swan
D) None of these

Ans::- A) Emu


5) Meningitis is a disease which affects the -
A) Kidneys
B) Liver 
C) Heart
D) Brain

Ans::- D) Brain


6) Which of the following is a vector quantity?
A) Force
B) Momentum
C) Energy
D) Temperature

Ans ::- A) Force


7) The three famous Buddhist sites Ratanagiri ,Lalitgiri and Udaigiri  are located in which of the following States?
A) Bihar
B) Maharashtra
C) U.P.
D) Orissa

Ans:: - Orissa


8) Who among the following earned the title of a 'Liberator'?
A) Chandragupta Vikramaditya 
B) Ashoka
C) Chandragupta Maurya
D) Alexander

Ans::- C) Chandragupta Maurya


9) The strategy of  'Divide and Rule' was adopted by whom?
A) Lord Curzon
B) lord  Welleslely
C) Lord  Minto 
D) Lord  Canning

Ans:: - C) Lord Minto


10) Delhi became the Capital of India in -
A) 1910
B) 1911
C) 1916
D) 1923


Ans ::- B) 1911


11) The first President of independent India was -
A) Dr. Rajendra Prasad
B) M.K.Gandhi
C) Dr. S.Radhakrishnan
D) J.L.Nehru

Ans::- A) Dr. Rajendra Prasad


12) Who was the first European to translate the Bhagwad Gita into English?

A) William Jones
B) Charles Wilkins
C) James Prinsep
D) Sir Alexander Cunningham

Ans:: -B) Charles Wilkins


13. The  population of which of the following is maximum on  the earthA) Reptiles
B) Fishes
C) Birds
D) Beetles

Ans. B) Fishes



14. Which of the following is the largest living mammal?
A) Giraffe
B) White elephant
C) Rhinoceros
D) Blue Whale

Ans. D) Blue Whale



15. Which first is given by a herb?A) Mango
B) Banana
C) Apple
D) Jack-  fruit

Ans. D) Jack- fruit



16. Which of  the following is hereditary?
A) Dysentery
B) Tuberculosis
C) Haemophilia
D) Cancer


Ans. C) Haemophilia


17. Which of the following is knows as the jain Temple City?
A) Gimar
B) Rajagriha
C) Varanasi
D) Ilahabad


Ans. A) Gimar



18. Who was the first King  to conquer Malwa,Gujarat and Maharashtra?A) Skandagupta
B) Samudragupta
C) Chandragupta Maurya
D) Harshavardhena


Ans. C) Chandragupta Maurya




19. The slogan 'Inquilab Zindabhad' was raised by whom?A) Lokmanya Tilak
B) Veer Savarkar
C) Chandrashekar Azad
D) Bhagat Singh

Ans. D) Bhagat Singh



20. The Muslim League started demanding a separate nation for the Muslims from which year?
A) 1919
B) 1925
C) 1929
D) 1940


Ans. D) 1940


21. When did the British Parliament pass the Indian Independence Bill  ?
A) 20th February, 1947
B) 24th March, 1947
C) 1st July, 1947
D) 14th August,1947


Ans. C) 1st July,1947


22. Who among the following has the final power to maintain order within the House of People?A) Marshal of the People
B) Prime Minister
C) Speaker
D) Chief of Security Staff


Ans. C) Speaker


23. Which is laughing gas?
a) Carbon dioxide
b) Sulphur dioxide
c) Carbon monoxide
d) Nitrous  oxide

Ans. d) Nitrous  oxide




24. Detergents used for cleaning clothes and utensils contains-a) Nitrates
b) Bicarbonates
c) Sulphonates
d) Bismutnates

Ans. c) Sulphonates



25. Floppy disc in a computer system is-a) Compiler
b) Core memory
c) Software
d) Device for storage and retrieving data

Ans. d) Device for storage and retrieving data




26. The tooth with there roots is-a) Molar
b) Pre- Molar
c) Incisor
d) Canine
Ans. a) Molar



27. Bamboo is a-
a) Grass
b) Herb
c) Shrub
d) Tree


Ans. a) Grass


28. Which of the following cannot be controlled by vaccination?
a) Small pox
b) Diabetes
c) Polio
d) Whooping cough

Ans. b) Diabetes



29. Which of the following terms is used for several individuals of a species living together in a locality?a) Biosphere
b) Ecosystem
c) Bio- community
d) Population
Ans. c) Bio- community



30. Raman effect is associated with characteristics of-a) Heat
b) Light
c) Electricity
d) Magnetism

Ans. b) Light



31. Which of the following is known as the queen of  spices?
a) Coriander
b) Cardamom
c) Fenugreek
d) Chillies
Ans. b) Cardamom



32. The Peacock throne was made for -a) Jahangir
b) Akbar
c) Shahjehan
d) Aurangzeb

Ans. c) Shahjehan



33. Which of the following was built  by Akbar?
a) Agra fort
b) Fort of Daulatabad
c) Red fort
d) Fort of Ahmednagar
Ans. a) Agra fort



34. Ramayan refers to-a) Satyuga
b) Tretayuga
c) Dwaparyuga
d) Kalyuga

Ans. b) Tretayuga




35. Who is regarded as the greatest law giver of  ancient India?a) Kautilya
b) Manu
c) Panini
d) Patanjali

Ans. b) Manu



36. When did the Indian National Congress ask for the 'Dominion Status'?a) 1908
b) 1929
c) 1942
d) 1947

Ans. a) 1908



37. The first woman's university in India was founded by-a) Gandhiji
b) J.K.Kumarappa
c) Dhondo Keshave Karve
d) Rani Ahilya Devi

Ans. c) Dhondo Keshave Karve


शिव भोलेनाथ स्तुति

 जय शिवशंकर, जय गंगाधर, करुणा-कर करतार हरे,   जय कैलाशी, जय अविनाशी, सुखराशि, सुख-सार हरे जय शशि-शेखर, जय डमरू-धर जय-जय प्रेमागार हरे,   जय ...