Friday, 20 November 2015
Friday, 13 November 2015
Wednesday, 11 November 2015
Friday, 6 November 2015
Indian constitution objective questions
General Knowledge : The Const itut ion of India (Part -1)
1. Through which const itut ional amendment in art icle 359, it has been laid down that Fundamental Rights
u n der ar t ic l es 2 0 an d 2 1 ar e en f o r c e ab l e du r in g t h e o per at io n o f em er g en c y â€
1. Through which const itut ional amendment in art icle 359, it has been laid down that Fundamental Rights
u n der ar t ic l es 2 0 an d 2 1 ar e en f o r c e ab l e du r in g t h e o per at io n o f em er g en c y â€
A) 44th Amendment Act
(B) 46th Amendment Act
(C) 45th Amendment Act
(D) 48th Amendment Act
2. On whose sat isfact ion period of emergency shal l be extended for operat ion in case security of India or any
par t o f t h e I n d ian t e r r it o r y i s t h r eat en ed †”
(A) Prime Minister
(B) Home Minister
(C) Pres ident of India
(D) Vice-Pres ident of India
3 . A r t ic l e 2 0 o f t h e Fu n d ame n t al R igh t s r epr es en t s wh ic h su b j ec t †”
(A) Equal ity of opportunity in mat ters of publ ic employment
(B) Protect ion in respect of Convict ion of Of fence
(C) Protect ion of l ife and personal l iberty
(D) None of the above
4. A r t ic l e 2 1 o f t h e Fu n d ame n t al R igh t s d eal s wit h wh ic h su b j ec t †”
(A) Protect ion of certain rights regarding freedom of speech,
(B) Protect ion in respect of convict ion of of fence
(C) Protect ion against arres t and detent ion in certain cases
(D) Protect ion of l ife and personal l iberty
5 . Wh o dec l ar es t h e f in an c ia l emer g en c y â € ”
(A) President
(B) Prime Minister
(C) Finance Minister
(D) None of the above
6. Af ter declarat ion of f inancial emergency by the Pres ident , what is the period of operat ion without appro val
b y t h e Par l iam en t †”
(A) Three Months
(B) Four Months
(C) Two Months
(D) One Month
7 . Wit h in wh at per i o d, t h e P ar l i amen t h as t o ap pr o v e Fi n an c i al em er g en c y d ec l ar ed b y t h e Pr es id en t †”
(A) Six Months
(B) Two Months
(C) Three Months
(D) Four Months
8. I n Fin an c i al Em er g en c y , s al ar ie s an d al l ow an c e s o f wh ic h gr o u ps get r e du c t io n †”
(A) Central Government Employees
(B) Judges of the Supreme Court and High Courts
(C) A & B
(D) None of the above
9. Raj Pramukh represents whom under the Indian Const i tut ion †”
(A) President
(B) Governor
(C) A & B
(D) None of the above
1 0 . U n der t h e I n d ian Co n st it u t io n , wh at is t h e c o n c ept b e h in d t h e pr o t ec t io n o f Pr e sid en t an d G o v er n o r s †”
(A) President & Governors are above the law
(B) Pres ident & Governors make any law for the Const itut ion
(C) Pres ident and Governors are answerable to Prime Minister
(D) President and Governors shal l not be answerable to any court to the exercise and performance of the
powers and dut ies of their of f ice
11. By which Const itut ional amendment , t h e ap pel l at io n R aj pr amu kh wa s omit t ed †”
(A) 7th Amendment Act 1956
(B) 4th Amendment Act 1955
(C) 6th Amendment Act 1956
(D) 10th Amendment Act 1961
12. Which const itut ional art icle provides personal immunity for President and Governors for of f icial a c t †”
(A) Art icle 362
(B) Art icle 363
(C) Art icle 368
(D) Art icle 361
13. Which const itut ional art icle provides personal immunity to the head of the states for his of f icial act from
l eg al ac t io n , in c l u din g pr o c e edi n gs f o r c o n t empt o f Co u r t †”
(A) Art icle 361
(B) Art icle 362
(C) Art icle 368
(D) Art icle 369
14. Under which const itut ional art icles , newspapers do not have the right to publ ish report of the proceedings
of a secret session of either of the Houses of Parl iament or Legislat ive As sembly & Legislat iv e Co u n c i l †”
(A) 361
(B) 361A
(C) 361B
(C) 361C
15. Spel l out the condit ion under Art icle 361A by which any person or newspaper cannot be sued for legal
pr o c e ed in g if an y r e po r t o f p r o c ee din gs o f P ar l iam en t an d St at e L eg isl at u r e i s pu b l is h ed†”
(A) The report must be a report of the `procedings' of a House of the Union or a State Legislature. Hence, it
must be relevant to a mot ion or other busines s before the House, and must not have been expunged
(B ) I t mu st b e a †˜r epo r t †™ as di st in gu ish ed f r om o n e a rt icle or `Comment ' .
(C) Such report must be subs tant ial ly true. Hence, an ext ract or a garbed or perverted report would not be
protected. The report ing must not be actuated by mal ice
(D) Al l of the above
16. Any Court including Supreme Court does not hav e const itut ional right under Art icle 143 to exercise
jurisdict ion over any dispute aris ing out of any provision of which agreements that were in operat ion before
c ommen c em en t o f t h e Co n st i t u t io n †”
(A) Treaty, Agrrement
(B) Covenant , Engagement
(C) Sanad
(D) Al l of the above
1 7 . Wh at is t h e mean i n g o f I n dia n St at e in t h e Co n st it u t i o n †”
(A) Any territory recognised by Pres ident of India
(B) Any territory before commencement of Indian Const itut ion by the Brit ish ruler
(C) Any territory which government of the Dominion of India recognised
(D) B & C
18. Before which Const itut ional Amendment , Prince, Chief or other person were recognised by the Pres ident of
I n dia as t h e R u l er o f t h e I n d i an St at e †”
(A) 26th Amendment Act 1971
(B) 24th Amendment Act 1971
(C) 16th Amendment Act 1963
(D) 17th Amendment Act 1964
1 9 . U n der wh ic h Co n st it u t io n al Amen dmen t Pr iv y Pu r ses wer e ab o l i sh ed †”
(A) 36th Amendment Act 1975
(B) 26th Amendment Act 1971
(C) 16th Amendment Act 1963
(D) 17th Amendment Act 1964
20. Under which Cons t itut ional Art icle, Union Government has the power to give direct ion to the State Govt .
r ega r di n g an y o f t h e pr o v is i o n s o f t h e Co n st it u t io n †”
(A) Art icle 368
(B) Art icle 362
(C) Art icle 365
(D) Art icle 367
Ans.
1.(A) 2. (C) 3.(B) 4. (D) 5. (A) 6.(C) 7.(B) 8. (C) 9.(C) 10.(D) 11.(A) 12.(D) 13. (A) 14.(B) 15.(D) 16.(D) 17.(D)
18.(A) 19.(B) 20.(c)
Ans.
1.(A) 2. (C) 3.(B) 4. (D) 5. (A) 6.(C) 7.(B) 8. (C) 9.(C) 10.(D) 11.(A) 12.(D) 13. (A) 14.(B) 15.(D) 16.(D) 17.(D)
18.(A) 19.(B) 20.(c)
Thursday, 5 November 2015
Metal, alloys and ores for exam
Important About Metal and Alloys
act to remember
|
Name of the metal
|
Metal most abundant in earth’s crust
|
Aluminium
|
Metal which forms amalgam with other elements
|
Mercury
|
Metal used in a fuse wire and also in solder
|
Lead-tin alloy
|
Metal used in the filament of a bulb
|
Tungsten
|
Metal which pollutes the air of cities having large
number of vehicles
|
Lead (reason for using unleaded petrol)
|
Metal used in the filaments of electric heaters
|
Nichrome
|
Metal used as radiation shield
|
Lead
|
Metal into which Uranium turns when it loses all its
radioactivity
|
Lead
|
Metal used for making boats because it does not corrode
by seawater
|
Titanium
|
Important Alloys
Alloy
|
Combination of
|
Duralumin
|
Aluminium and Copper
|
Brass
|
Copper and Zinc
|
Bronze
|
Copper and Tin
|
Invar
|
Iron and Nickel
|
Stainless steel
|
Iron, Chromium and Nickel
|
German Silver
|
Copper, Nickel and Zinc
|
Gunmetal
|
Copper, Tin and Zinc
|
Solder
|
Lead and Tin
|
Electrum
|
Gold and Silver
|
Constantan
|
Copper and Nickel
|
Manganin
|
Copper, Manganese and Nickel
|
Manganin is a trademarked name.
|
Ores of Metals
Metal
|
Ore
|
Aluminium
|
Bauxite
|
Beryllium
|
Beryl
|
Chromium
|
Chromite
|
Cobalt
|
Cobaltite
|
Copper
|
Bornite, Chalcocite
|
Gold
|
Quartz
|
Iron
|
Magnetite
|
Lead
|
Galena
|
Manganese
|
Pyrolusite
|
Mercury
|
Cinnabar
|
Nickel
|
Pentlandite
|
Tin
|
Casseterite
|
Tungsten
|
Wolframite, Scheelite
|
Silver
|
Argentite
|
Uranium
|
Uraninite
|
Zinc
|
Sphalerite
|
Metals
Feature
|
Metal
|
The metal with highest melting point
|
Tungsten
|
The metal with highest thermal conductivity
|
Silver
|
The metal with highest electrical conductivity
|
Silver
|
The metal with highest density
|
Osmium
|
The metal with the lowest density
|
Lithium
|
The most malleable and ductile metal
|
Gold
|
The metal with the highest melting point
|
Tungsten
|
The least reactive metal
|
Platinum
|
Wednesday, 4 November 2015
COMPUTER KNOWLEDGE
BRIEF COMPUTER GK
A collection of 8 bits is called Byte. A bit is the smallest unit of storage.
The first computer architecture was introduced by John Von Neumann.
A website containing periodic posts is called Blog.
Starting up on operating system is called Booting.
Restarting a computer that is already on, is referred to as Warm Booting.
A program used to browse the web is called Browser.
The code for a Web page is written using Hypertext Markup language (HTML).
A series of instructions that tells a computer what to do and how to do it is called a Program.
The device which is used with a computer to display or store data is called Peripherals.
The mechanical, magnetic, electronic and electrical components that comprises a computer system such as the Central Processing Unit (CPU), monitor, keyboard, etc. is known as Hardware.
A set of instructions that tells the computer about the tasks to be performed and how these tasks are to performed, is known as Software.
Executing is the process of carrying out commands.
The rectangular area of the screen that displays a program, data, and or information is a Window. Downloading means to receive data to a local system from a remote system, or to initiate such a data transfer.
Uploading refers to the sending of data from a local system to a remote system such as a server or another client with the intent that the remote system should store a copy of the data being transferred. An email attachment is a computer file sent along with an email message. One or more files can be attached to any email message, and be sent along with it to the recipient.
CC (Carbon Copy) in e – mail indicates those who are to receive a copy of a message addressed primarily to another. The list of CCed recipients is visible to all other recipients of the message.
An additional BCC (Blind Carbon Copy) field is available for hidden notification; recipients listed in the BCC field receive a copy of the message, but are not shown on any other recipient's copy (including other BCC recipients).
Disk drive is the part of the computer helps to store information.
Arithmetic operations include addition, subtraction, multiplication, and division.
The most important or powerful computer in a typical network is Network Server.
The primary purpose of software is to turn data into information.
A collection of related files is called Record.
Storage that retains its data after the power is turned off is referred to as Non-Volatile Storage. ROM is an example of this type of storage.
Virtual memory is memory on the hard disk that the CPU uses as an extended RAM.
Computers use the Binary Number System to store data and perform calculations.
When sending an e-mail, the Subject line describe the contents of the message.
The Operating System tells the computer how to use its components.
During the cutting and pasting of an item, the part which is cut, is temporarily stored in Clipboard. The blinking symbol on the computer screen is called the Cursor.
Magnetic tape is not practical for applications where data must be quickly recalled because tape is a sequential access medium.
Information travels between components on the motherboard through Buses.
A Website Address is a unique name that identifies a specific web site on the web.
Alt, Ctrl & Shift keys in a keyboard are known as: Modifier keys.
Caps lock, Num lock & Scroll lock in a keyboard are known as: Toggle keys.
F1 to F12 keys in a keyboard are known as: Function keys.
A person who uses his or her expertise to gain access to other people‘s computers to get information illegally or do damage is a Hacker.
A Computer Virus is a malware program that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive; when this replication succeeds, the affected areas are then said to be "infected".
Antivirus Software is used to scan the hard disk to remove the virus from them.
The assembly language program is translated into machine code by a separate program known as an Assembler.
A Backup, or the process of backing up, refers to the copying and archiving of computer data so it may be used to restore the original after a data loss event. It contains a copy of every program data and system file on a computer
A collection of 8 bits is called Byte. A bit is the smallest unit of storage.
The first computer architecture was introduced by John Von Neumann.
A website containing periodic posts is called Blog.
Starting up on operating system is called Booting.
Restarting a computer that is already on, is referred to as Warm Booting.
A program used to browse the web is called Browser.
The code for a Web page is written using Hypertext Markup language (HTML).
A series of instructions that tells a computer what to do and how to do it is called a Program.
The device which is used with a computer to display or store data is called Peripherals.
The mechanical, magnetic, electronic and electrical components that comprises a computer system such as the Central Processing Unit (CPU), monitor, keyboard, etc. is known as Hardware.
A set of instructions that tells the computer about the tasks to be performed and how these tasks are to performed, is known as Software.
Executing is the process of carrying out commands.
The rectangular area of the screen that displays a program, data, and or information is a Window. Downloading means to receive data to a local system from a remote system, or to initiate such a data transfer.
Uploading refers to the sending of data from a local system to a remote system such as a server or another client with the intent that the remote system should store a copy of the data being transferred. An email attachment is a computer file sent along with an email message. One or more files can be attached to any email message, and be sent along with it to the recipient.
CC (Carbon Copy) in e – mail indicates those who are to receive a copy of a message addressed primarily to another. The list of CCed recipients is visible to all other recipients of the message.
An additional BCC (Blind Carbon Copy) field is available for hidden notification; recipients listed in the BCC field receive a copy of the message, but are not shown on any other recipient's copy (including other BCC recipients).
Disk drive is the part of the computer helps to store information.
Arithmetic operations include addition, subtraction, multiplication, and division.
The most important or powerful computer in a typical network is Network Server.
The primary purpose of software is to turn data into information.
A collection of related files is called Record.
Storage that retains its data after the power is turned off is referred to as Non-Volatile Storage. ROM is an example of this type of storage.
Virtual memory is memory on the hard disk that the CPU uses as an extended RAM.
Computers use the Binary Number System to store data and perform calculations.
When sending an e-mail, the Subject line describe the contents of the message.
The Operating System tells the computer how to use its components.
During the cutting and pasting of an item, the part which is cut, is temporarily stored in Clipboard. The blinking symbol on the computer screen is called the Cursor.
Magnetic tape is not practical for applications where data must be quickly recalled because tape is a sequential access medium.
Information travels between components on the motherboard through Buses.
A Website Address is a unique name that identifies a specific web site on the web.
Alt, Ctrl & Shift keys in a keyboard are known as: Modifier keys.
Caps lock, Num lock & Scroll lock in a keyboard are known as: Toggle keys.
F1 to F12 keys in a keyboard are known as: Function keys.
A person who uses his or her expertise to gain access to other people‘s computers to get information illegally or do damage is a Hacker.
A Computer Virus is a malware program that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive; when this replication succeeds, the affected areas are then said to be "infected".
Antivirus Software is used to scan the hard disk to remove the virus from them.
The assembly language program is translated into machine code by a separate program known as an Assembler.
A Backup, or the process of backing up, refers to the copying and archiving of computer data so it may be used to restore the original after a data loss event. It contains a copy of every program data and system file on a computer
IDIOMS AND PHRASES
Subscribe to:
Posts (Atom)