marianmedicalcentre.commarianmedicalcentre.com/source/career/201705041625… · Web...

28
BIO-DATA NAME : ASHA MOHAN FATHER’S NAME : P. V Mohana Das AGE &DATE OF BIRTH : 25, 16.12.1990 RELIGION& CASTE : Hindu, Ezhava SEX : Female NATIONALITY : Indian MARITAL STATUS : Married LANGUAGE KNOWN : Malayalam English, Hindi PERMANENT ADDRESS : KOTTARATHIL (H) ELAMPALLY (P. O) ELAMPALLY , KOTTAYAM CONTACT No. : 8289851148 EDUCATIONAL QUALIFICATION QUALIFICATION BOARD/UNIVERSITY YEAR OF PASSING SSLC Board of Secondary Education kerala 2006 PLUS TWO Board of Higher Secondary 2008 Diploma in General Nursing and Midwifery Kerala Nurses and Midwives Council 2012

Transcript of marianmedicalcentre.commarianmedicalcentre.com/source/career/201705041625… · Web...

BIO-DATA

NAME : ASHA MOHAN

FATHER’S NAME : P. V Mohana Das

AGE &DATE OF BIRTH : 25, 16.12.1990

RELIGION& CASTE : Hindu, Ezhava

SEX : Female

NATIONALITY : Indian

MARITAL STATUS : Married

LANGUAGE KNOWN : Malayalam English, Hindi

PERMANENT ADDRESS : KOTTARATHIL (H)ELAMPALLY (P. O)

ELAMPALLY , KOTTAYAM CONTACT No. : 8289851148

EDUCATIONAL QUALIFICATION

QUALIFICATION BOARD/UNIVERSITY YEAR OF PASSING

SSLC Board of Secondary Education kerala

2006

PLUS TWO Board of Higher Secondary 2008Diploma in General Nursing and Midwifery

Kerala Nurses and Midwives Council

2012

PROFFESSIONAL REGISTRATION:-

1. Registered Nurses and Midwifery in Kerala Nursing Council, Reg. No. 82637

Working Experience:- One year and One month.

Designation Duration Hospital Department

Staff Nurse 06/08/2012 TO 19/09/2013

Ramkrishna Care Hospital (NABH Accredited hospital). RAIPUR

Staff Nurse in Surgical ICU.

DECLARATION

I HEREBY DECLARE THAT THE ABOVE INFORMATIONS ARE TRUE AND CORRECT TO THE BEST OF MY KNOWLEDGE AND BELIEF.

PLACE : ELAMPALLY

DATE : 05/05/2017

The beneficiaries of Indira Awaas Yojana (IAY) are selected from  a) The list of members of ST community approved by the Gramasabha. b) The poorest of the poor list approved by the Grama Sabha. c) The below poverty line(BPL) list approved by the GramaSabha. d) None of the Sabha

KSRTC 2015

The below poverty line(BPL) list approved by the GramaSabha.

Insurance protection to BPL is known as :  a) Am admi yojana b) Jawahar Rozgar Yojana c) Janashree Bima Yojana d) None of the above

KSRTC 2015

Janashree Bima Yojana

In which year was the Integrated Child Development Services (ICDS) Introduced?  a) 1965 b) 1975 c) 1985 d) 1995

KSRTC 2015

1975

Indira Awaas Yojana was launched in the year:  a) 1984 b) 1985 c) 1986 d) 1987

Muncipal Secratary 2015

1985

Balika Samridhi Yojana is:  a) Fully Centrally Sponsored Scheme b) Fully State Sponsored Scheme c) 50:50 is shared by Centre and State concerned d) None of the above

 Muncipal Secratary 2015

Fully Centrally Sponsored Scheme

PMAGY is:  a) Prime Minister Adharsh Grameen Yojana b) Pradhan Mantri Adharsh Grameen Yojana c) Prime Mahila Aadhar Grama Yojana d) Primary Maha Aadhar Grama Yojana

Muncipal Secratary 2015

Pradhan Mantri Adharsh Grameen Yojana

The National Rural Employment Gurantee Act was passed in the year:  a) 2005 b) 2003 c) 2006 d) 2001

Muncipal Secratary 2015

2005

JRY was started in 1989 by merging two erstwhile employment programs.Which were those?  a) Bharat Nirman and NREGP b) Prime Minister’s Rozgar Yojana and Bharat Nirman c) National Rural Employment Programme(NREP)and Rural Landless Employment Guarantee Programme(RLEGP) d) NRDP and National Food for Work Program

Muncipal Secratary 2015

National Rural Employment Programme(NREP)and Rural Landless Employment Guarantee Programme(RLEGP)r

Which one of the following statements with regard to the 'Make in India' initiative of the Government of India is not correct?  a) Inorder to guide the foreign investors, a body named 'Invest India' has been created. b) The Government has identified key sectors with potential to attract investment. c) The initiative also aims to identify selected domestic companies having leadership in innovation and new technology for turning them into global champion. d) The programme is being implemented by the Ministry of Finance.

CAPF 2015

Option (d)

Which is the thrust area of Prime minister's Rozgar Yojana?  a)Old age people b)Unemployed youth c)Destitute woman d)Differentially able population

Block Panchayat 2015Unemployed youth

Expand IAY :  a)Indian Antipoverty Yojana b)Integrated Antipoverty Yojana c)Indian Awaas Yojana d)Indira Awaas Yojana

Block Panchayat 2015Indira Awaas Yojana

When did 'Pradhan Mantri Adarsh Gram Yojana' formally launched?  a)2008 b)2010 c)2014 d)2012

Block Panchayat 20152010

Which is the grass root functionary of Kudambasree?

 a)N.H.G b)C.D.S c)A.D.S

BlocK Panchayat 2015N.H.G

Expand NREGP:  a)National Rural Education Growth Programme b)National Road and Electricity Generating Programme c)National Rural Employment Guarantee Programme d)National Railway Engineering Growth Project

Block Panchayat 2015National Rural Employment Guarantee Programme

When was 'Antyodaya Anna Yojana' launched?  a)August 15, 2000 b)August 15, 2010 c)December 25, 2000 d)December 25, 2010

Block Panchayat 2015December 25, 2000

Rajeev Awas Yojana aims at:  a)Poverty free India b)Slum free India c)Rural Employment d)Rural Road development

Block Panchayat 2015Slum free India

What is the thrust area of Valmiki Ambedkar Awaas Yojana? a)Rural areas b)Urban slums c)Tribal ares d)None of these

Block Panchayat 2015Urban slumsWhich is not included in bharat Nirman? a)Rural Roads b)Rural housing

 c)Rural water Supply d)Rural Health

Block Panchayat 2015Rural Health

What is Xbox?  a) Aircraft b) Ship c) Video Gaming console d) Mobile Phone

Video Gaming console.

SQL in Computer Science stands for  a) Sorted Query Language b) Structured Quick Language c) Structured Query Language d) Structured Quick Launch

SSC

Structured Query Language.

The brain of a computer is known as  a) SCSI b) CPU c) SDRAM d) CSS

KPSC ComputerGr2-2016

CPU.

The process of converting analogue signal to digital information is done by:  a) BUS BAR b) ROUTER c) SCSI DRIVE d) MODEM

KPSC ComputerGr2-2016

MODEM.

The capacity of a 3.5 inch floppy disk is:  a) 1.40 MB b) 1.44 GB c) 1.44 MB d) 1.40 GB

ICRB-Assistant-14

1.44 MB.

Which Indian state launched the first 'Cyber Grameen' project?  a) Rajasthan b) Maharashtra c) Andhra Pradesh d) Kerala

Andhra Pradesh.

Which award is considered as Nobel prize of computing?  a) Tuning b) Pulitzer c) Merlin d) Magsaysay

Tuning Award.

The Indian who designed hotmail:  a) Satya Nadella b) Sabeer Bhatia c) Sachin Bansal d) Vishal Sikka

Sabeer Bhatia.

Bing is a search engine from:  a) Microsoft b) Linux c) iOS d) Samsung

Microsoft.

The simplest CPU Scheduling algorithm is _____.  a) SJF Scheduling algorithm b) Round robin Scheduling algorithm c) Multilevel Scheduling algorithm d) FCFS Scheduling algorithm

SSC CHSL-2015

FCFS Scheduling algorithm.

Gopher is a ___?  a) Web application b) Protocol c) Virus d) Worm

Protocol.

Block and buffer caches are used:  a) to handle interrupts b) to increase capacity of main memory c) to improve disk performance d) to speed up main memory read operation

to improve disk performance.

The first computer game:  a) Spacecraft b) Space bar

 c) Space War d) Space Shuttle

Space War.

A person who spends large amounts of leisure time to operating a computer:  a) Mouse Tomato b) Mouse slept c) Mouse Potato d) Computerologist

KPSC-2015

Mouse Potato.

Third Generation Computers are built with:  a) Vacuum Tubes b) Transistors c) Integrated Circuits(ICs) d) VLSI

KPSC Confidential Asst.G2-15

Integrated Circuits(ICs).

Which of the following is not a Web Browser?  a) Mosaic b) Opera c) Mozilla Firefox d) Redcliff

KPSC Confidential Asst.G2-15

Redcliff.

The act of creating misleading websites for the purpose of online theft is called:  a) Spoofing b) Phishing

 c) Cheating d) Hacking

KPSC SI Exam-15

Spoofing.

The Indian Computer Emergency Response Team serves as:  a) The National Nodal Agency in respect of Critical Information Infrastructure Protection b) The Cyber Regulations Advisory Authority c) The National Agency for incident response d) None of the above

KPSC Asst.Jailor-15

The National Nodal Agency in respect of Critical Information Infrastructure Protection.

GNU Privacy Guard (GPG) is:  a) An intrusion detection system b) A cryptographic protocol providing communications security over the internet c) A firewall d) A cryptographic software which provides for key based asymmetric cryptography for encryption and authentification.

KPSC SI Exam-15

A cryptographic software which provides for key based asymmetric cryptography for encryption and authentification..

The activity of creating sectors and tracks on a hard disk is called :  a) Tracking b) Sectorng c) Plattering d) Formatting

KPSC SI Exam-15

Formatting.

Which among the following is a malware programme that replicate itself inorder to spread to other computers?  a) Computer virus b) Computer worm c) Trojan d) Rootkit

KPSC SI Exam-15

computer worm.

What is the speciality of Windows NT?  a) Supports real time processing b) Supports batch processing c) Supports multi processing d) Supports LAN and WAN

SSC CGL-15

Supports multi processing.Windows NT is a It is a processor-independent, multiprocessing, multi-user operating system.The first version of Windows NT was Windows NT 3.1 which was released in 1993.

The term used for transferring files from one computer to another computer or server:  a) Download b) Decode c) Encode d) Upload

KWA-2015

UploadTransferring (data) from one computer to another, typically to one that is larger or remote from the user or functioning as a server.

CSS stands for:  a) Comprehensive Style Sheets b) Collecting Style sheets

 c) Comparative style sheets d) Cascading Style sheets

KWA-2015

Cascading Style sheets.Cascading Style Sheets (CSS) is a) is a style sheet language used for describing the look and formatting of a document written in a markup language.(e.g., fonts, colors, spacing) to Web documents.

The Technology used in the electronic printer is called:  a) Micromillimetric b) Microoncapsulation c) Microtechnology d) Microarray

SSC CGL-2015Microencapsulation.Microencapsulation:Definition: It is the process by which individual particles or droplets of solid or liquid material (the core) are surrounded or coated with a continuous film of polymeric material (the shell) to produce capsules in the micrometer to millimetre range, known as microcapsules.

PSW stands for:  a) Processor Status Word b) Program Status Word c) Primitive Status Word d) Process Status Word

SSC CGL-15

Program Status Word. The Program status word (PSW) is an IBM System/360 architecture and successors control register which performs the function of a Status register and Program counter in other architectures, and more.

The father of computer is:  a) Love lice b) Charles Dikens c) Oliver twist d) Charles Babbage

SSC CGL-15

Charles Babbage

Rearranging and allocating space in memory to provide for multiple computing tasks is called :  a) Multiprogramming b) Multitasking c) Memory Management d) Networking

SSC CGL-15

Memory Management

What is used to identify whether a data word has an odd or even number of 1’s ?  a) Sign bit b) Zero bit c) Parity bit d) Carry bit

SSC CGL-15

Parity bit

Which is the new Browser relased along with 'Windows 10' by Microsoft?  a) Microsoft Scan b) Microsoft Netgate c) Microsoft Edge d) Microsoft Spartan

Microsoft Edge

PNG is a raster graphics file format that supports lossless data compression.Expand PNG.  a) Picture Node Graphics b) Printable Neat Graphics c) Portable Network Graphics d) Peripheral Node Graphics

Portable Network Graphics

Which of the following is not an example of Non-volatile memory?  a) ROM b) RAM c) F-RAM d) Flash Memory

RAM

Ice Cream Sandwich and Jelly bean,Lollipop are the latest versions of which Operating System?  a) Ubuntu b) Android c) Apple d) Unix

Bevco AsstGrII-15

Android

A collection of four bits is called :  a) Nibble b) Byte c) Word d) Double word

Bevco AsstGrII-15

Nibble

When did Information Technology Act come into force in India?  a) Oct 17th 2000   b) Oct 17th 2001 c) June 4th 2000 d) June 4th 2001

Bevco AsstGrII-15

Oct 17th 2000

The Walkie Talkie is an example of which mode of communication?  a) Simplex b) HalfDuplex c) Duplex d) None of the above

Bevco AsstGrII-15

HalfDuplex

First generation computer systems used :  a) Vacuum tubes b) Transistors c) Magnetic cores d) Silicon chips

Vacuum tubes

Which one of the following is not a computer language?  a) COBOL b) Java c) LOTUS d) PROLOG

LOTUS

Who is known as inventor World Wide Web (WWW) ?  a) Tim Berners Lee b) Charles Babbage c) Richard Stallman d) Bill Gates

Tim Berners Lee

The arranging of data in a logical sequence is called:  a) Classifying b) Summarizing

 c) Reproducing d) Sorting

FCI 2015

Sorting

A half byte is known as :  a) Bit b) Nibble c) Data d) None of these

FCI 2015

Nibble

Which language is used to create macros in MS Excel ?  a) Visual C++ b) Java c) Visual Basic d) C++

FCI 2015

Visual Basic

MICR stands for :  a) Magnetic Input Character Reader b) Magnetic Ink Character Recognition c) Medium Ink Character Reader d) Medium Input Character Recognition

FCI 2015

Magnetic Ink Character Recognition Code

Which of the following circuits is used as Memory device in a Computers?  a) Rectifier b) Attenuator c) Flip-Flop d) Comparator

FCI 2015

Flip-flop

What is the full form of the first Electronic Computer ENIAC?  a) Electrical Numerical Integrator and Calculator b) Electronic Numeric Integrator and Calculator c) Electrical Numerical Integrated Computer d) Electro Numeric Integrity Computer

 Secratariat Assistant 2015

Electronic Numeric Integrator and Calculator

Which was the first search engine in the Internet?  a) Google b) Archie c) Alta vista d) WATS

Secratariat Assistant 2015

Archie

When is World Computer Literacy Day celebrated?  a) January 22nd b) March 5th c) May 20th d) December 2nd

Secratariat Assistant 2015

December 2nd

Which virus is treated as the first computer virus?  a) Trojan horse b) SCA virus c) Creeper virus d) Rabbit

Secratariat Assistant 2015

Creeper virus

Which technology is used in the processor of a computer to simulate a single processor into two virtual processors to the operating system?  a) Hyper threading technology b) Multi core technology c) Simulation technology d) Multi threading technology

Secratariat Assistant 2015

Hyper threading technology

What is the process of loading the operating system files into dynamic random access memory?  a) Formatting b) Automatic data exchange c) Data sharing d) Booting

Secratariat Assistant 2015

Booting

The translator program that translates each line of source program as it runs is called:  a) Compiler b) Interpreter c) Editor d) Linker

KSRTC 2015

Interpreter

The protocol used for retrieving email from a mail browser is  a) POP b) SNMP c) SMTP d) FTP

KSRTC 2015

POP

Section 66F of IT Act deals with :  a) Cyber Stalking b) Child pornography c) Phishing d) Cyber terrorism

KSRTC 2015

Cyber terrorism

India's first cyber crime police station is located in:  a) Bangalore b) Hyderabad c) Delhi d) Mumbai

KSRTC 2015

Bangalore

1 megabyte is equal to __ bytes.  a) 106

 b) 109

 c) 108

 d) 104

KSRTC 2015

The small pictures on the window screen is called :  a) Commands b) Menus c) Tabs d) Icons

KSRTC 2015

Icons

DNS stands for:

 a) Digital Number System b) Domain Name Service c) Domain Name Server d) Domain Name System

Muncipal Secratary 2015

Domain Name System

In IT Act 2008,section 65 deals with:  a) Hacking with Computer System b) Punishment for Identity theft c) Punishment for cheating by personation by using computer resource d) Tampering with computer source documents

Muncipal Secratary 2015

Punishment for cheating by personation by using computer resource

Find out the odd item: a) Internet Explorerb) Windows explorerc) Mozilla firefoxd) Navigator

Muncipal Secratary 2015

In terms of access speed,the ____ memory is the fastest.  a) Cache b) DRAM c) SRAM d) Processor Register

Muncipal Secratary 2015

Cache

ISP stands for:  a) Internet  Service Provider b) Internet Standard Program c) Internet Site Provider d) None of these

Muncipal Secratary 2015

Internet Service Provider

IBM 1401 is ____ generation computer.  a)First b)Second c)Third d)Fourth

Block Panchayat 2015Second

Which one is a text editor for Microsoft Windows?  a)MS Word b)MS Excel c)Wordpad d)Notepad

Block Panchayat 2015Wordpad

Unauthorized attempts to bypass the security mechanisms of an information system or network is called:  a)Spoofing b)Blocking c)Hacking d)Resisting

Block Panchayat 2015

In 1983, who defined the term 'Computer Virus'? a)Fred Cohen b)Mcafee c)Smith d)Norton

Block Panchayat 2015Fred CohenWhich of the following language is used for artificial intelligence? a)FORTAN b)PROLOG c)C d)COBOL

Block Panchayat 2015PROLOGProgrammed intructions to computer is known as : a)Data b)Code c)Documentation d)Database

Block Panchayat 2015CodeThe term associated with processing of computers: a)FFTS b)MPG c)MIPS d)CPS

Block Panchayat 2015MIPSRichard Stallman is in connection with : a)Internet b)Free operating system c)Computer virus d)Search Engine

Block panchayat 2015Free Operating System