24
LD CLERK (TVM) 1998 1. The first effective vaccine against polio was prepared by Jonas E. Salk. 2. World AIDS day is observed on December 1 3. Television was started in the year 1959. 4. Where is the national Environment Engineering Research Institute located ? Nagpur. 5. National Science day is observed on 28th February to commemorate The day of declaration of Raman effect. 6. The science dealing with the study of the heart and its diseases is known as cardiology. 7. When was the first Atomic Energy Commission set up in India? August10, 1948 8. India conducted the first nuclear explosion in the year May 18, 1974. 9. What does the abbreviation ANERT stand for Agency for non-conventional Energy and Rural Technology LD CLERK –(KOTTAYAM) 1998. 10. The scientist who discovered that the earth revolves round the sun Copernicus. 11. ECG is an instrument used in the study of Heart. 12. Ecology is the branch of science which deals with Balance of Nature 13. The district in which the central root research institute is situated. Thiruvananthapuram 14. Rainbow is caused due to Refraction and dispersion . 15. What is the full form of LPG? Liquified Petroleum Gas.

MS Word 2003[1]

Embed Size (px)

Citation preview

Page 1: MS Word 2003[1]

LD CLERK (TVM) 1998

1. The first effective vaccine against polio was prepared by Jonas E. Salk.2. World AIDS day is observed on December 1 3. Television was started in the year 1959.4. Where is the national Environment Engineering Research Institute located ?Nagpur.5. National Science day is observed on 28th February to commemorateThe day of declaration of Raman effect.6. The science dealing with the study of the heart and its diseases is known as cardiology.7. When was the first Atomic Energy Commission set up in India?August10, 19488. India conducted the first nuclear explosion in the yearMay 18, 1974.9. What does the abbreviation ANERT stand for Agency for non-conventional Energy and Rural Technology

LD CLERK –(KOTTAYAM) 1998.

10. The scientist who discovered that the earth revolves round the sunCopernicus.11. ECG is an instrument used in the study of Heart.12. Ecology is the branch of science which deals with Balance of Nature 13. The district in which the central root research institute is situated.Thiruvananthapuram14. Rainbow is caused due to Refraction and dispersion .15. What is the full form of LPG?Liquified Petroleum Gas. 16. Leaves are green due to the presence of Chlorophyll.

LD CLERK (WAYANAD)

17. What drug does tobacco contain Nicotine.18. What does talcum power consists ofMagnesium silicate.19. The main consistent of gobar gasMethane. 20. A gland known as the gland of emergencyAdrenal gland.21. The largest flower in the world?

Page 2: MS Word 2003[1]

Rafflesia22. The smallest bone in the human body?Stapes.23. The colouring substance present in bile Bilirubin.24. The hormones helps to ripen fruits.Ethylene.25. Milk is an example of suspension.26. Which sector in India uses coal in maximum quantity?Thermal plants.27. Who discovered Natural Radioactivity?Henry Becquerel28. The acid present in orangescitric acid29. The density of water is maximum in 4 degree Centigrade.30. The material used in the manufacture of lead pencilsgraphite.31. Which bird found in New Zealand is uable to fly and has hair instead of feathers and a very long beakKiwi.32. Who found out Radio Activity?Henry Becquerel33.The instrument which is used for measuring blood pressure?Spygmomanometer34.What is always contained in amalgams?Mercury

L D Clerk (Kollam)-1998

35.Decimel system of number originated in:India36.Father of cloning:Dr.IanWilmut37.According to WHO, the disease which causes the death of the largest number of people today is:Tuberculosis38.Hydrogen Bomb is based on:Nuclear fusion39. Liquefied Petroleum Gas consists of mainly:Methane, Butane andPropane40.Diamond is the purest form ofCrystalline rock41.The exact copy of a written or printed message is transmitted to distant places through adevice attached to a telephone. What is it called?Fax

L D Clerk (Alappuzha & Pathanamthitta)

Page 3: MS Word 2003[1]

42.The energy possessed by the water collected in the reservoir of a damPotential Energy43.Bleaching powder is produced by passing chlorine over this substance:Solid slaked lime44.The most important raw material for generation of power in India:Coal45.Maximum yield of milk is obtained from ----variety of cowsRed Sindhi46.Deforestation causes the following:Drought,flood and soil erosion47.The most abundant substance on earth is :Water48.The unit of power is:Watt49.The world famous mineral region in India:Chotanagpur50.The gas which causes acid rain industrial area:Sulphurdioxide

PSC Questions asked for EDP Manager 2009

1. In a memory, the minimum time delay between the initiation of successive memory operations is : cycle time

2. The first Operating System used in Microprocessor based system was : CP/M

C is independent of the+A3. The Boolean expression A(B+C)+AB Boolean variable : B

4. A byte addressable computer has memory capacity of 4096 KB and can perform 64 operations. An instruction involving 3 memory operands and one operator needs :72 bits

5. Which addressing mode used in an instruction of the form ADD X, Y : Absolute

6. The addressing mode used in the stack related instruction PUSH B is : Register indirect

7. Parallel printers use : Centronics interface

8. An assembler that runs on one machine, but generating code for another machine is called : Cross assembler

9. A computer with a 32 bit wide data bus implements its memory using 8 K x 8 static RAM chips. The smallest memory that this computer can have is : 32 KB

10. To construct a binary Mod-N counter, the number of flip-flops needs is : Log2N

11. The total number of possible ordered trees using 3 nodes A,B,C is : 12

12. The binary search algorithm is of order : log n

Page 4: MS Word 2003[1]

13. The minimum number of edges in a connected cyclic graph on N vertices is : N

14. The execution time of a recursive algorithm is given as ; T(n)=c+T(n-1), if n>1 =d, if n≤1. The order of the algorithm is : n

15. Assuming 2 sorted lists of sizes ‘S1 ’ and ‘S2’, the worst case number of comparisons needed by the merge sort algorithm is : S1+S2 -1

16. If an M x N matrix is stored in column major form, the index calculation required to access the (i, j)th entry is : M .(j-1)+i

17. Four different algorithms L1, L2, L3 and L4 with orders of log(n), log{log(n)}, n log(n) and n/log(n) respectively have been proposed to solve a specified problem.

Which of these is the best one : L2

18. The principle of locality of reference is cited to justify the usage of : Cache memory

19. On a particular system, using Quick sort, if it takes 100 msec to sort 1000 records, time taken to sort 100 records will be : 6.7msec

20. In traversing a tree using Breadth First Search, the data structure used is : Queue

21. In a data base, the column of a table is referred to as the : Attribute

22. The part of a program which accesses a shared resource and which should be executed indivisibly is called : Critical section

23. In a database design, if every non-key attribute is functionally dependent on the primary key, then the relation will be in : Third normal form

24. An attribute of one table matching the primary key of another table is known as : Foreign Key

25. Given the functional dependencies X →Y; Y→Z; X →W and Z →AB, which of the following does not hold good : W → Z

26. SQL stands for ------------ Query Language : Structured

27. In SQL databases, the memory area used for internal processing is called : Cursor

28. The number of relationships in which an entity can appear in an E-R diagram is called its : Cardinality

29. The process of analyzing, archived data to obtain tactical and strategic information is often called : Data mining

30. If a relation is in Boyce-Codd normal form, then it is also in : 3rd Normal form

31. RAID is a standard used in the design of : Disk Memory

32. In an OS, the process of buffering data intended for a peripheral device, onto a disk area, for later bulk transfer is known as : Spooling

33. Kernel in Operating System is : A set of primitive functions upon which OS functions are

Page 5: MS Word 2003[1]

built.

34. Which of the following scheduling policy is most suited for a time sharing OS : Round Robin

35. For real time OS, which of the following is the most suitable scheduling scheme : Preemptive

36. In a paged memory, access times of primary and secondary memories are 10ns and 100ns respectively. If the average access time is 23.5 nsec, hit ratio is : .85

37. The size of the virtual memory depends on the size of : Address bus

38. Three processes A, B, C have peak time demands of 3, 4, 6 resource units respectively of a particular type. What is the minimum number of resources to be provided

to ensure that deadlock never occurs : 11

39. A computer has 8 MB in main memory, 128 KB cache with block size of 4KB. If direct mapping scheme is used, how many different main memory blocks can map into

a given physical cache block : 64

40. The technique that allows only one user to work with a file at a particular time is called : Locking

41. The UNIX operating system was first installed in : PDP/7

42. MS-DOS makes use of a hardware ROM containing device drivers called : BIOS

43. In UNIX, which of the following system calls transform an executable binary file into a process : Exec

44. Berkeley UNIX is popularly known as : BSD Unix

45. In UNIX, ‘grep’ program is used for implementing : Filters

46. TSR software refers to : Terminate and Stay Resident

47. Unix and MS-DOS file system differ in the following feature : Mounted file systems

48. In DOS, file allocation is carried out using : FAT

49. In UNIX ‘link’ refers to : New directory entry pointing to an existing file

50. For implementing recursion in a programming language, its compiler uses the following data structure extensively : Stack

51. In a hypothetical language, assume that all arithmetic operators have equal precedence and associate to the left. The expression 6x3-2-1x2 evaluates to : 18

52. Which of the following instructions is redundant (can be implemented by other conventional ones) : Clear x

53. BNF is a meta language for : Specifying a context free grammar

Page 6: MS Word 2003[1]

54. In JAVA language, what will be result of evaluating the expression 25 & 13 : 9

55. In JAVA , after execution of the following statements, the values of x, m, and n will be :int x, m, n;m=10;n=15;x=++m +n++; : x=26, m=11,n=16

56. What will be the output of the following JAVA code :

byte x=64, y;y=(byte)(x<<2);system.out.println(y); : 0

57. Hot Java is a : Web browser

58. Which of the following typecasts result in loss of information : float to int

59. JAVA toolkit package containing classes that implement platform independent GUI is : AWT

60. The JAVA language was originally called : OAK

61. A program Graph has ‘start’ and ‘end’ nodes. The total number of paths from start to end is equivalent to the -----------set of test data required to test the software

: minimum

62. In a Program Graph, ‘X’ is an if-then-else node. If the number of paths from start node to X is ‘p’ number of paths from if part to end node is ‘q’ and from else part

to end node is ’r’, the total number of possible paths through X is : P(q+r)

63. The quality of a software which causes it to continue to operate despite application of invalid input is called : Robustness

64. A program P calls 2 subprograms P1 and P2. If P1 can fail 50% of the times and P2, 40% of the times, P can fail -----------of the times : 70%

65. Consider a Program Graph (PG) with statements as nodes and control as edges. Which of the following is not true for any PG : Always acyclic

66. In program design, if the number of conditions in a decision table is ‘n’, the maximum number of rules(columns) possible is : 2n

67. In Data Flow Diagrams(DFD), the procedure of expanding a process in the DFD into a set of equivalent smaller processes is called : levelling

68. In programming languages, literal means : String Constant

69. In Object Oriented Software Design, which of the following is not true : An object can belong to 2 classes

70. Consider the program segment comprising of 3 statements :

Page 7: MS Word 2003[1]

y=x+y;x=y-xy=y-x where x and y are integers. Execution of these 3 statements do the following : Swap the contents of x and y

71. What will be the output of execution of the following statements in C :for (i=3;i<15;i+=3){printf(“% d”, i);++i;} : 3 7 11

72. In C, puts (arg V[0]; prints the : File name of executable code file

73. Who is credited with the creation of WWW : Tim Berners-Lee

74. Which of the following is not a web browser : HTML

75. MIME is associated with the following : E mail

76. The mode of communication in which transmission can be bidirectional. But in only one direction at a time is called : Half Duplex

77. Error detection at the data link layer is achieved using : CRC codes

78. In Serial communication, start and stop bits are used for : Synchronization

79. In a transmitter, the unmodulated signal is known as : Baseband signal

80. In a computer network, routing issues are handled in : Network Layer

81. In a computer network, functions of dialog management and synchronization are taken care of in the : Session’s layer

82. Which of the following topologies has the highest reliability : Mesh

83. In data communications, bauds signify ---------- rate : Signaling

84. ADSL is abbreviation for : Asymmetric Digital Subscriber Line

85. The topmost layer in the ISO model that needs to be implemented in an intermediate node is the -----------layer : Network

86. VPN denotes a : Virtual Private Network

87. Data rate of a ring network is 20Mbps and signal propagates at 200m/µsec. The number of bits that can be placed on the channel of length 200km is : 20000bits

88. The frequency range over which coaxial cables are typically used is : 106 to 108 Hz

89. In internet, the well known port 21 refers to the application : FTP

90. The maximum data rate possible through a noise free 4 kHz binary channel is : 8000 bps

91. The transparency provided in a distributed system where users cannot tell how many copies of a resource exist is termed as : Replication transparency

Page 8: MS Word 2003[1]

92. Which of the following configurations can be said to be tightly coupled : Shared memory multiprocessors

93. In distributed systems, RPC stands for : Remote Procedure Call

94. Assume there are 4 file servers each with a 0.95 chance of being up at any instant. Probability of at least one being available is : 1-(.05)4

95. Which of the following category of classification of multiple computer systems is not generally used in practice : MISD

96. In a distributed system, to ensure that concurrent transactions do not interfere with each other, the transactions must have the following specific property :

Serializability

97. Translation Lookaside Buffer(TLB) is also called : Associative Memory

98. In Internet Standards Terminology, RFC refers to : Request For Comments

99. Which of the following denotes a network management protocol in an internet : SNMP

100. IEEE 802.11 is an IEEE standard for : Wireless LAN

Disclaimer : E & OE The informations furnished here is based on various media like Newspaper, Radio, Television & web. Make sure that the answers are correct.

Posted by Faisal qblpindia at 5:51 AM 0 comments SUNDAY, JUNE 7, 2009

Computer Science Questions Asked in SSC Data Entry Operator Exam

Computer Science Questions Asked in SSC Data Entry Operator Exam

1. The banks use ................ device to minimize conversion process.(a) Keyboard(b) MICR(c) OCR(d) Scanner2. .................. can't be used for source of data automation.(a) POS terminal(b) OCR(c) Keyboard(d) UPC3. Under which case will intranet be an effective networking tool?(a) In a distributed decision-making environment(b) Where heterogeneous applications are involved(c) In a centralised organization(d) In a decentralised organization4. When an organization gives contract for development of software, it has to give data to the service provider. In Such cases, the ownership of data should be_________(a) Transferred to the service provider

Page 9: MS Word 2003[1]

(b) With the client/organization that outsource services(c) Shared by both parties(d) Not transferred5. A modem performs_________(a) Modulation(b) Demodulation(c) Data compression(d) All of these6. Which of the following is NOT done by modem?(a) Transmission Speed(b) Data Accuracy(b) Error detection and Correction(d) Data Compression7. A program coded in programming language is____________.(a) Target code(b) Source code(c) Block(d) None of these8. "Platform" in computer world means___________.(a) Computer hardware used(b) Operating Systems used(c) Both of these(d) None of these9. Which of these biometric tools use thermal sensors along with infrared rays for identification?(a) Key stroke dynamics(b) Iris Retinal scans(c) Speech recognition(d)Fingerprint scanning10. What is incorrect about software?(a) It can manipulate computer(b) It has programs, instructions(c) It can be touched(d) It can be touched11. Disadvantage of distributed database is.(a) Unreliability(b) Easy implementation(c) Insecurity(d) High communication cost12. Which of the following transmission techniques let computer to alternatively send and receive data?(a) Simplex(b) Half duplex(c) Full duplex(d) Multiplexing13. What is NOT a feature of networking?(a) Reliability(b) Greater storage space(c) Connectivity(d) All are features of networking14. Taking back-up of a file against crash is a(a) Preventive measure(b) Curative measure(c) Decisive measure(d) None of these

Page 10: MS Word 2003[1]

15. A memory that is referred by its contents instead of physical address is called ________(a) Associative memory(b) Content addressable storage(c) Both (a) and (b)(d) None of these16. Most dangerous risk in leaking of information is :(a) Ready access to online terminals(b) Online processing of data(c) Ignorance about the existence of risk(d) All of these17. A camera is an(a) Input device(b) Can be either input or output(c) Processing machine(b) Output device18. Using anti-virus software is(a) Preventive measure(b) Detective measure(c) Corrective measure(d) All the above19. An online transaction is(a) One that is done in real time(b) Transaction done via internet(c) One that is done via telephone(d) None of these20. A clerk in a bank has to access data n customer account. Logical access control for these users would be.(a) Use of individual passwords(b) Use of an Accounts Receivable Section password(c) Use of individual passwords plus separate access passwords for customer data and product data(d) Can't say21. To stop unauthorized access to the computer system we should(a) Have a trustworthy system administrator(b) Have a good passwords policy(c) Have a sound encryption policy(d) All of the above22. Which cannot assure data accuracy in an application?(a) Limit and reasonableness test(b) Echo checking(c) Control total(d) None of these23. Maximum storage space is available on(a) CDs(b) ROM(c) Hard disks(d) Floppies24. Jon Von Neumann developed:(a) First electronic chip flip flop(b) Stored-program concept(c) The first electronic computer(d) None of these25. Which of the following is single user computer with many features and good processing power?(a) Minicomputer

Page 11: MS Word 2003[1]

(b) Workstation(c) Macintosh(d) None of these

Posted by Faisal qblpindia at 1:50 AM 2 comments THURSDAY, JULY 3, 2008

Some words about Google

Google's Chairman and Chief Executive Officer : Eric Schmidt.

Google Founded in 1998 by Stanford Ph.D. students Larry Page and Sergey Brin.

Posted by Faisal qblpindia at 4:15 AM 0 comments WEDNESDAY, JULY 2, 2008

Computer Objective Questions

PSC Solved Paper.

1. _________ is a powder used in laser printers to form the images on a paper.

Toner

<!--[if !supportEmptyParas]-->

2. Worms and Trojan Horses are examples of:

Malware

<!--[if !supportEmptyParas]-->

3. ___________ Printers work by selectively heating regions of special heat-sensitive paper.

<!--[if !supportEmptyParas]--> <!--[endif]-->

Thermal

<!--[if !supportEmptyParas]--> <!--[endif]-->

4.The ISI mark is given by:

BIS

<!--[if !supportEmptyParas]-->

5. The laser printer was invented at:

Page 12: MS Word 2003[1]

<!--[if !supportEmptyParas]-->

Xerox

<!--[endif]-->

<!--[if !supportEmptyParas]-->

7. A flaw in a system whereby the output is unexpectedly dependent on the sequence or timing of other events is called a:

<!--[if !supportEmptyParas]-->

Race condition

<!--[if !supportEmptyParas]-->

8. A 56k modem can transfer data at up to bits per second over the phone line.

56000

<!--[if !supportEmptyParas]-->

9. The original implementation of the C programming language was standardized by :

<!--[if !supportEmptyParas]-->

ANSI

<!--[endif]-->

10. ________Is a signaling method that handles a relatively wide range of frequencies.

<!--[if !supportEmptyParas]-->

Broadband

11. The port number used by SMTP is:

25

<!--[if !supportEmptyParas]-->

13. A packet filter is a type of

Firewall

Page 13: MS Word 2003[1]

<!--[if !supportEmptyParas]-->

<!--[if !supportEmptyParas]-->

15. Which among the following utilities can detect a bad sector?

<!--[if !supportEmptyParas]-->

CHKDSK and SCANDISK

<!--[if !supportEmptyParas]-->

16. In 100BASE-T, 'T' stands for:

Twisted pair

<!--[if !supportEmptyParas]-->

17. A head crash is said to occur when the read-write head of a hard disk drive:

<!--[if !supportEmptyParas]--> <!--[endif]-->

Touches the magnetic media

<!--[if !supportEmptyParas]-->

18. Category 5 cable includes ---twisted pairs in a single cable jacket.

4

19. The port number used by the HTTP protocol is

80

<!--[if !supportEmptyParas]-->

20. In PowerPoint presentations, individual pages are called:

<!--[if !supportEmptyParas]-->

Slides

21. Power-on-self-test is built into the:

<!--[if !supportEmptyParas]-->

Page 14: MS Word 2003[1]

BIOS

<!--[if !supportEmptyParas]-->

22. PowerPoint can embed content from other applications through:

<!--[if !supportEmptyParas]-->

OLE

<!--[if !supportEmptyParas]-->

23. The latest release of Microsoft Windows is called:

<!--[if !supportEmptyParas]-->

Vista

<!--[if !supportEmptyParas]-->

24. GRUB is an:

Boot loader

<!--[if !supportEmptyParas]-->

25. __________Is a family of programmable interrupt controller chips.

8259

<!--[if !supportEmptyParas]-->

26.card allows television signals to be received by a computer.

<!--[if !supportEmptyParas]-->

TV tuner

27. ________Is an IEEE 1394 implementation.

Fire Wire

<!--[if !supportEmptyParas]-->

Page 15: MS Word 2003[1]

28 'Windows protection error' messages may result from:

<!--[if !supportEmptyParas]-->

Damage to the system registry

<!--[if !supportEmptyParas]-->

29 Sound Blaster line of audio cards were made by :

<!--[if !supportEmptyParas]-->

Creative Technology Ltd.

<!--[if !supportEmptyParas]-->

31 Indiscriminate sending of unsolicited bulk messages is known as :

<!--[if !supportEmptyParas]-->

Spamming

32 The 'blue screen of death' may occur due to:

<!--[if !supportEmptyParas]-->

All the above

<!--[if !supportEmptyParas]-->

33 FAT manages files in contiguous groups of sectors called:

<!--[if !supportEmptyParas]-->

Clusters

<!--[if !supportEmptyParas]-->

34 The utility which can be used to clean the windows registry is:

<!--[if !supportEmptyParas]-->

regedit

<!--[if !supportEmptyParas]-->

Page 16: MS Word 2003[1]

36. Ultra Wide SCSI had a throughput of: (A) 10 MB/s

40 MB/s

<!--[if !supportEmptyParas]-->

37. A dual-core processor has L1 cache.

2

<!--[if !supportEmptyParas]-->

<!--[if !supportEmptyParas]-->

<!--[if !supportEmptyParas]-->

40. Port 110 is used by _______

POP3

<!--[if !supportEmptyParas]-->

41. A file extension .ogg indicates an ______format

Audio codec

<!--[if !supportEmptyParas]-->

42. Kerberos ts a__________protocol.

Network authentication

43. Athlon series of processors are made by:

<!--[if !supportEmptyParas]-->

AMD

44. Which among the following is a real-time operating system?

QNX

<!--[if !supportEmptyParas]-->

45. The internet top level domain .cn refers to :

Page 17: MS Word 2003[1]

<!--[if !supportEmptyParas]-->

China

<!--[if !supportEmptyParas]-->

<!--[if !supportEmptyParas]-->

47. _____________ Is a protocol used by networked computers (clients) to obtain IP addresses and other parameters from a server.

<!--[if !supportEmptyParas]-->

DHCP

<!--[if !supportEmptyParas]-->

<!--[if !supportEmptyParas]-->

48. is the brand name for 64-bit Intel microprocessors with IA-64 architecture.

Itanium

<!--[if !supportEmptyParas]-->

49. is an organization which develops internet standards through RFCs.

IETF

50. The ability to replace components of a computer, while it is operating, is called:

Hot swapping

Kerala State Film Awards : 2008 – Malayalam Film Awards 2008

Minister for Education and Culture M A Baby announced Malayalam Film awards for 08-----------------------------------------------------------------------------------Best Film : ‘ Oru Pennum Randanum ‘ Best Director : Adoor GopalakrishnanBest script writer : Adoor GopalakrishnanBest Actor : Lal ( for his role as a policeman in 'Thalapavu' )Best Actress : Priyanka (for her role in 'Vilapangalkapuram' )Best second film: Bhomi Malayalam directed by T V ChandranSecond best actress : Praveena Second best actor: Anoop MenonBest story wrtiter: Aryadan Shoukath, VilapangalkappuramBest article on cinema : Vadakkan Pattu Cinimakal by P S Radhakrishanan

Page 18: MS Word 2003[1]

Best playback singer (Femala):Manjari ,VilapangalkappuramBest playback singer (Male): Shankar Mahadevan ( Madampi )Best music director: M Jayachandran ( Madampi )Best lyricist : ONV Kurup , GulmoharBest child artist: Nivedha Thomas ( Veruthe Oru Bharya )Best polpular film: Innathe Chintha Vishayam

Union Council of Ministers 2009 : Current Affairs 2009

Prime Minister : Dr. Manmohan Singh

Cabinet Ministers and their Assigned Departments

Pranab Mukherjee - FinanceGhulam Nabi Azad - Health and Family WelfareA.Raja - Communication and Information TechnologySelja - Housing and Urban Poverty Alleviation , TourismSharad Pawar - Agriculture, Food and Civil SuppliesSuhshil Kumar Shinde - PowerMurli Deora - Petroleum and Natural GasSuboh Kant Sahay - Food Processing IndustriesAmbika Soni - Information and BroadcastingM.Veerappa Moily - Law and JusticeFarooq Abdulla - New and Renewable EnergyA.K Antony - DefenceM.S Gill - Youth affairs and SportsP. Chidambaram - Home affairsS. Jaipal Reddy - Urban DevelopmentKapil Sibal - Human Resource DevelopmentG.K Vasan - ShippingMamata Banerjee - RailwaysKamal Nath - Road Transport and Highways Pawan K Bansal - Parliamentary AffairsS. M Krishna - External AffairsVayalar Ravi - Overseas Indian AffairsB.K Handique - Mine, Development of North Eastern RegionMukul Wasnik - Social Justice and EmpowermentVirbhadra Singh - SteelVilasrao Deshmukh - Heavy Industries and Public EnterprisesMeira Kumar - Water ResourcesDayanidhi Maran - Textiles Anand Sharma - Commerce and IndustryC.P Joshi - Rural Development and Panchayati RajKantilal Bhuria - Tribal AffairsM.K Azhagiri - Chemicals and FertilizersMallikarjun kharge - Labour and Employment

AIDS Acquired Immune Deficiency SyndromeBDO Block Development OfficerBSF Border Security Force

Page 19: MS Word 2003[1]

LPG Liquefied Petroleum GasCOFEPOSA Conservation of Foreign Exchange and Prevention of Smuggling ActCD Compact DiscCARE Co-operative for American Relief EverywhereCSO Central Statistical OrganisationESMA Essential Services Maintenance ActZPG Zero Population GrowthGATE Graduate Aptitude Test in EngineeringHUDCO Housing and Urban Development CorporationILO International Labour OrganizationNSE National Securities ExchangeVIRUS Vital Information Resources Under SiegeSAARC South Asian Association for Regional Co-operationFRCS Fellow of Royal College of Surgeons

The word means the opposite to the term ‘benevolent’?A: Malevolent 2. The word synonymous to the word ‘serious’?A: Grave3. Single term to mean “identification of disease by means of its symptom?A: Diagnosis4. Find out the meaning of the word ‘duel’?A: Combat5. Write the noun forms of the words ‘Accelerate’ and ‘Invest’?A: Acceleration and Investment6. Write the verbal forms of the words ‘ Choice’ and ‘Life’?A: Choose and Live7. Write the past tense forms of the verbs ‘ Abandon’ and ‘Go’?A: Abandoned and went8. Rewrite the sentence ‘ I like coffee better than tea ‘ using ‘prefer’?A: I prefer coffee to tea9. Rewrite the sentence ’ They are building a bridge across the river ‘ using the passive form of the verbA: A bridge is being built across the river by them