ہندوستانی سیاست دانوں اور برطانوی حکومت کے درمیان پہلی گول میز کانفرنس کس سال ہوئی؟
A. 1933
B. 1930
C. 1932
D. 1931
Explanation
The first Round Table Conference convened from 12 November 1930 to 19 January 1931 **** The Second Round table conference was held from 7 September 1931 to 1 December 1931 in London. **** The Third Round Table Conference was held in 1932 between November and December. **** First round table conference: 1930
2nd: 1931
3rd:1932
All in London
All three round table conferences were attended by Dr. B.R. Ambedkar and Tej Bahadur Sapru.
Show/Hide Explanation
A. Viewing Web Pages
B. Listning Music
C. None
D. Viewing Movie
Explanation
Internet Explorer is a free web browser, commonly called IE or MSIE, that allows users to view web pages on the internet.
Show/Hide Explanation
بی۔آئی۔اع۔ایس میں کوڈ شدہ سافٹ ویئر کو کہا جاتا ہے؟
A. Farmware
B. Firmware
C. Freeware
D. Malware
Explanation
Software that is permanently stored in the BIOS (Basic Input/Output System) of a computer is called Firmware . This type of software is typically used to control and configure the hardware components of a computer , such as the keyboard, display, and storage devices.
Show/Hide Explanation
درج ذیل میں سے کس کو پہلی نسل کا کمپیوٹر کہا جاتا ہے؟
A. Cray
B. Leo
C. Apple
D. Plato
Explanation
The main electronic component used in first-generation counterparts was Vacuum Tubes and Valves.
Leo is called the first-generation computer.
The five generations of computers:
First Generation (1946-1959 or 1940-1956): Vacuum tube-based technology (e.g., ENIAC). Second Generation (1959-1965 or 1956-1963): Transistor-based technology. Third Generation (1965-1971 or 1964-1971): Integrated circuit -based technology. Fourth Generation (1972-1980): VLSI microprocessor-based technology. Fifth Generation (1980-present): ULSI microprocessor-based technology, with a focus on artificial intelligence.
Show/Hide Explanation
A. Carry out arithmetic operations
B. Carry out logical operations
C. Accept and process by implementation sequentially a set of stored instructions
D. Do complicated calculations
Explanation
A computer is an electronic device that manipulates information or data.
It has the ability to store, retrieve, and process data.
****
ND8-1-2023
Show/Hide Explanation
مندرجہ ذیل میں سے کون سا ہارڈ ویئر نہیں ہے؟
A. RAM
B. CPU
C. Chip
D. Compiler
Explanation
In computing, a compiler is a computer program that translates computer code written in one programming language into another language.
The name "compiler" is primarily used for programs that translate source code from a high-level programming language to a lower level language to create an executable program.
*********
RY 13-12-202
Show/Hide Explanation
مندرجہ ذیل میں سے کون سا فائر وال کا کلیدی کام ہے؟
A. Moving
B. Deleting
C. Copying
D. Monitoring
Explanation
Blocking Unauthorized access for security purposes is a key function of a firewall.
Key function of firewall: Monitoring
Mechanism to protect the network from outside attack is: firewall
Show/Hide Explanation
A. The fire was lit by someone
B. The fire had been lit by someone
C. You are requested to light the fire by someone
D. The fire has been lit by someone
Explanation
The given sentence is in active voice and it is in Present Perfect Tense.
Rule : Subject + (has /have) + been + V3 + Other agents.
Show/Hide Explanation
A. None of these
B. Premature
C. Important
D. Unimportant
Explanation
Foremost means سب سے اہم
Show/Hide Explanation
A. on
B. to
C. in
D. into
Explanation
He threw the latter into the fire .
Show/Hide Explanation
✅ Correct: 0 |
❌ Wrong: 0 |
📊 Total Attempted: 0