61. Gujari Mahal was built by
Akbar
Shah Jahan
Man Singh
None of these
62. Which one of the following cities of Madhya Pradesh is not located on NH-3?
Sendhwa
Mhow
Sarangpur
Shujalpur
63. In Madhya Pradesh Budget, 2017-18, the provision for AMRUT Scheme is
500 crores
600 crores
700 crores
800 crores
64. Which one of the following districts of Madhya Pradesh has more than 1000 as sex ratio?
Anuppur
Burhanpur
Indore
Dindori
65. Who among the following was not acted as the Chief Secretary of Madhya Pradesh?
R.P. Naik
B.K. Dubey
R.S. Khanna
P.K. Noronha
66. In which year was Madhya Pradesh Zila Yojna Samiti Adhiniyam passed?
1997
1995
1993
1991
67. Which organization is giving financial support for ‘Tejaswini Rural Women’s Empowerment Programme’?
IMF
IFC
IFAD
IIMA
68. ‘Mukhya Mantri Gram Sadak Yojana’ in Madhya Pradesh was implemented from which year?
2008-09
2009-10
2010-11
2011-12
69. From which year was ‘MP Incubation and Startup Policy’ implemented?
2013
2014
2015
2016
70. In January 2018, ‘Friends of MP’ Conclave was held in which city?
Bhopal
Jabalpur
Indore
Gwalior
71. How many minimum hours of power supply is assured for rural agriculture purpose in ‘Atal Jyoti Yojana–2013’?
10
12
14
16
72. The collection of linked information residing on computers which is available through Internet is called
Web Server
Web Store
World Wide Web
Web Information
73. The first page displayed by Web browser after opening a Website is called
Home page
Browser page
Search page
Bookmark
74. ________ offers services such as search capabilities, e-mail news, stock price, weather information, sports and entertainment.
Hostel
Portal
Article
Newspaper
75. Which of the following acronyms is normally used to describe unsolicited junk e-mails?
CRAM
DRAM
JAM
SPAM
76. An intentionally disruptive software that spreads from computer to computer is known as
search engine
chat software
virus
77. Which of the following is not an essential component required for video-conferencing system?
Video camera
Display device
Telephone
Microphone
78. Which of the following are the two essential features of cybercrime?
Computer technology as modus operandi and intangibility of the environment
Offender computer skills and victim ignorance of computer technology
Hardware and software
Hackers and crackers
79. The term _________ refers to an individual who breaks into computer systems without authorisation, deliberately defaces Websites for fraudulent purpose.
white hat
hacker
cracker
stacker
80. When customers of a Website are unable to access it due to flooding of fake network traffic, it is known as
virus
Trojan horse
cracking
denial of service attack
12 Total Test
360 Total Question
Scientifically designed for PCS
A must have for Civil services aspirant
IAS PCS SCC and others
75 Total Test
2250 Total Question
Scientifically designed for PCS
A must have for Civil services aspirant
IAS PCS SCC and others
69 Total Test
2070 Total Question
Scientifically designed for PCS
A must have for Civil services aspirant
Timer for time management