Gram Panchayat Haminpur Pilani Jhunjhunu

Haminpur

Gram Panchayat

IA Solved Question Paper 2013 Exam rsmssb.rajasthan.gov.in

IA Solved Question Paper 2013 Exam

25. Nihal chand belongs to which style of painting of Rajasthan ?
A. Marwar
B. Mewar
C. Bundi
D. Kishangar 

26. From which place the publication of news papers started in Rajasthan?
A. Jodhpur
B. Alwar
C. Udaipur
D. Ajmer

27. Where was the first Praja Mandal founded in Rajasthan ?
A. Alwar
B. Jodhpur
C. Bharatpur
D. Bundi

28. Which princely state was not included in Matsya Sangh?
A. Alwar
B. Bharatpur
C. Dholpur
D. Jaipur

29. The religious sect which performs Agni Nritya is
A. Laldasi
B. Jasnathi
C. Vishnoi
D. Nath

30. Which Folk‐Devta is related to Kolu Village ?
A. Pabuji
B. Tejaji
C. Ramdev ji
D. Goga ji

31. A database management system (DBMS) is a:
A. Hardware system used to create, maintain, and provide controlled access to a database.
B. Hardware system used to create, maintain, and provide uncontrolled access to a database.
C. Software system used to create, maintain, and provide controlled access to a database.
D. Software system used to create, maintain, and provide uncontrolled access to a database.

32. The property / properties of a database is / are :
A. It is an integrated collection of logically related records.
B. It consolidates separate files into a common pool of data records.
C. Data stored in a database is independent of the application programs using it.
D. All of these.

33. Gigabit Ethernet has a data rate of ________Mbps
A. 10
B. 100
C. 1000
D. 10000

34. Identify the class of the following IPv4 address: 229.1.2.3.
A. A
B. B
C. C
D. D

35. A layer-4 firewall (a device that can look at all protocol headers up to the transport layer) CANNOT
A. block entire HTTP traffic between 9:00PM and 5:00AM
B. block all ICMP traffic
C. stop incoming traffic from a specific IP address but allow outgoing traffic to the same IP address
D. block TCP traffic from a specific user on a multiuser system between 9:00PM and 5:00AM

36. Digital signature cannot provide ________ for the message.
A. Integrity
B. Confidentiality
C. Nonrepudiation
D. Authentication

37. Find the angle between the hour hand and the minute hand of a clock in degrees, when the time is 25 minutes to 8.
A. 12.5
B. 17.5
C. 20
D. 22.5

38. A bootstrap is:
A. A memory device
B. A device to support the computer
C. A small initialisation program to start up a computer
D. An error correction technique

39. What will be the decimal equivalent of the binary number (111011.101), given in base 2:
A. 59.750
B. 59.487
C. 59.875
D. 59.625

40. What will be the hexadecimal equivalent of decimal number 54977
A. D6C1
B. DC61
C. D6C5
D. None

41. A hexa decimal number 'A0' has the decimal value
A. 80
B. 256
C. 100
D. 160

42. Which technique is preferable for transferring a large amount of data to and from a memory in a short time ?
A. DMA
B. Interrupt driven I/O
C. programmed I/O
D. None of these

43. The simultaneous transmission of data to a number of stations is known as
A. Broad cast
B. Bandwidth
C. Aloha
D. Analog transmission

44. For each instruction of program in memory the CPU goes through a
A. decode - fetch - execute sequence
B. execute - store - decode sequence
C. fetch - decode - execute sequence
D. fetch - execute - decode sequence

45. What is the default subnet mask for a class C network?
A. 127.0.0.1
B. 255.0.0.0
C. 255.255.0.0
D. 255.255.255.0

46. The Internet Control Message Protocol (ICMP)
A. Allows gateways to send error and control messages to other
B. Provides communication between the Internet Protocol Software on one machine and the Internet Protocol Software on another
C. Reports error conditions to the original source, the source must relate errors to individual application programs and take action to correct the problem
D. All of these

47. Which of the following TCP/IP protocols are used for transferring electronic mail messages from one machine to another?
A. FTP
B. SNMP
C. SMTP
D. RPC

48. What can greatly reduce TCP/IP configuration problems?
A. WINS Server
B. WINS Proxy
C. DHCP Server
D. PDC

49. What is the port number for NNTP?
A. 119
B. 80
C. 79
D. 70

50. When the compiler cannot differentiate between two overloaded constructors, they are called
A. Overloaded
B. Destructed
C. Ambiguous
D. Dubious

 

<<< IA Question Paper (Q. No. 1 to 24) <<<

>>> IA Question Paper (Q.No. 51 to 100) >>>

Add comment