General Knowledge 284

General Knowledge – General Awareness Quiz – Questions and Answers, GK 2010

Please enter your email:

1. Who among the following functions as a Constitutional Ruler and an agent of the centre?

 
 
 
 
 

2. Which of the following is the name of the organization created to provide full employment and self reliance to the womenfolk in India?

 
 
 
 

3. Which of the following city was known as Avanti in ancient India?

 
 
 
 
 

4. Which among the following two countries have formally inaugurated the biggest wind farm in Antarctica in January 2010?

 
 
 
 
 

5. Poverty and Un-British Rule in India by Dadabhai Naoroji , was the original classic work on poverty in India. In which year this work was published?

 
 
 
 
 

6. From which of the following countries India is due to receive Nerpa submarine ?

 
 
 
 
 

7. Which among the following accord is known to led the formation of Palestinian Authority?

 
 
 
 
 

8. In which of the following states in India , the first megawatt scale capacity grid-interactive Solar Photovoltaic Power Plant of the country has been setup ?

 
 
 
 
 

9. In which year Tax Reforms committee was constituted by Government of India?

 
 
 
 
 

10. M3 is the most important component among all money stock measures . What is the common name of M3?

 
 
 
 
 

Back to Top


Precautions while using Securing Email

Passwords

At the very least your password should consist of a jumble of letters and numbers. It should not be a word. There are a few important steps that you can take in order to increase the security of your email communication. The first is to make sure that only the person to whom you send a given message is able to read it. This is discussed in the Keeping your webmail private and Switching to a more secure emailaccount sections, below. Going beyond the basics, it is sometimes critical that your email contacts have the ability to verify that a particular message truly came from you and not from someone who might be attempting to impersonate you. One way to accomplish this is described under Advanced email security, in the Encrypting and authenticating individual email messages section.