General Knowledge - General Awareness Quiz - Questions and Answers, GK 2010

1. Bring out the incorrect statement:

2. Which among the following constitutional amendment bills is known for establishment of administrative tribunals?

3. In context with the history of Jammu & Kashmir who among the following had written "Rajavalipataka"?

4. A Fire temple is a place of worship for _____?

5. From which of the following, East India Company aquired Bombay on a lease on 27 March 1668?

6. Which among the following end the life of the popular house?

7. Khasi and Garo languages are mostly spoken in which of the following states of India?

8. Bring out the incorrectly matched pair:

9. Which among the following statement is NOT correct about the Reserve Bank of India ?

10. Which among the following is not located in Rajasthan?

General Knowledge

1. World Geography -Test-01
2. World Geography -Test-02
3. World Geography -Test-03
4. Geography of India -Test-01
5. Geography of India -Test-02
6. Geography of India -Test-03
7. Geography of India -Test-04
8. Geography of India -Test-05
9. History of India - Test - 01
10. History of India - Test - 02
11. History of India - Test - 03
12. History of India - Test - 04
13. History of India - Test - 05
14. History of India - Test - 06
15. History of India - Test - 07
16. INM-Test-01
17. INM-Test-02
18. INM-Test-03
19. INM-Test-04
20. INM-Test-05
  • Tips to get ready for Vacation
  • One Pocket Pool
  • What to Eat in Himachal Pradesh
  • The Worlds Most Beautiful Buildings
  • Tips to succeed in Exams
  • Top Players in MLB History

  • Precautions while using Computer and Laptops

    Protecting data in transit

    Almost all Internet traffic is sent in the clear. This means that it can be read by software on any host computer through which the network packets are routed without having to be de crypted. This should be of little concern to most Internet users because most of the packets traveling on the Internet contain data that is not sensitive from the users viewpoint, and is of no interest to Internet attackers.Several types of information traveling across the network that are sensitive to users, and of interest to Internet attackers, are discussed in the following sections.

    Chourishi Systems