IA Solved Question Paper 2013 Exam
25. Nihal chand belongs to which style of painting of Rajasthan ?
A. Marwar
B. Mewar
C. Bundi
D. Kishangar
26. From which place the publication of news papers started in Rajasthan?
A. Jodhpur
B. Alwar
C. Udaipur
D. Ajmer
27. Where was the first Praja Mandal founded in Rajasthan ?
A. Alwar
B. Jodhpur
C. Bharatpur
D. Bundi
28. Which princely state was not included in Matsya Sangh?
A. Alwar
B. Bharatpur
C. Dholpur
D. Jaipur
29. The religious sect which performs Agni Nritya is
A. Laldasi
B. Jasnathi
C. Vishnoi
D. Nath
30. Which Folk‐Devta is related to Kolu Village ?
A. Pabuji
B. Tejaji
C. Ramdev ji
D. Goga ji
31. A database management system (DBMS) is a:
A. Hardware system used to create, maintain, and provide controlled access to a database.
B. Hardware system used to create, maintain, and provide uncontrolled access to a database.
C. Software system used to create, maintain, and provide controlled access to a database.
D. Software system used to create, maintain, and provide uncontrolled access to a database.
32. The property / properties of a database is / are :
A. It is an integrated collection of logically related records.
B. It consolidates separate files into a common pool of data records.
C. Data stored in a database is independent of the application programs using it.
D. All of these.
33. Gigabit Ethernet has a data rate of ________Mbps
A. 10
B. 100
C. 1000
D. 10000
34. Identify the class of the following IPv4 address: 229.1.2.3.
A. A
B. B
C. C
D. D
35. A layer-4 firewall (a device that can look at all protocol headers up to the transport layer) CANNOT
A. block entire HTTP traffic between 9:00PM and 5:00AM
B. block all ICMP traffic
C. stop incoming traffic from a specific IP address but allow outgoing traffic to the same IP address
D. block TCP traffic from a specific user on a multiuser system between 9:00PM and 5:00AM
36. Digital signature cannot provide ________ for the message.
A. Integrity
B. Confidentiality
C. Nonrepudiation
D. Authentication
37. Find the angle between the hour hand and the minute hand of a clock in degrees, when the time is 25 minutes to 8.
A. 12.5
B. 17.5
C. 20
D. 22.5
38. A bootstrap is:
A. A memory device
B. A device to support the computer
C. A small initialisation program to start up a computer
D. An error correction technique
39. What will be the decimal equivalent of the binary number (111011.101), given in base 2:
A. 59.750
B. 59.487
C. 59.875
D. 59.625
40. What will be the hexadecimal equivalent of decimal number 54977
A. D6C1
B. DC61
C. D6C5
D. None
41. A hexa decimal number 'A0' has the decimal value
A. 80
B. 256
C. 100
D. 160
42. Which technique is preferable for transferring a large amount of data to and from a memory in a short time ?
A. DMA
B. Interrupt driven I/O
C. programmed I/O
D. None of these
43. The simultaneous transmission of data to a number of stations is known as
A. Broad cast
B. Bandwidth
C. Aloha
D. Analog transmission
44. For each instruction of program in memory the CPU goes through a
A. decode - fetch - execute sequence
B. execute - store - decode sequence
C. fetch - decode - execute sequence
D. fetch - execute - decode sequence
45. What is the default subnet mask for a class C network?
A. 127.0.0.1
B. 255.0.0.0
C. 255.255.0.0
D. 255.255.255.0
46. The Internet Control Message Protocol (ICMP)
A. Allows gateways to send error and control messages to other
B. Provides communication between the Internet Protocol Software on one machine and the Internet Protocol Software on another
C. Reports error conditions to the original source, the source must relate errors to individual application programs and take action to correct the problem
D. All of these
47. Which of the following TCP/IP protocols are used for transferring electronic mail messages from one machine to another?
A. FTP
B. SNMP
C. SMTP
D. RPC
48. What can greatly reduce TCP/IP configuration problems?
A. WINS Server
B. WINS Proxy
C. DHCP Server
D. PDC
49. What is the port number for NNTP?
A. 119
B. 80
C. 79
D. 70
50. When the compiler cannot differentiate between two overloaded constructors, they are called
A. Overloaded
B. Destructed
C. Ambiguous
D. Dubious
<<< IA Question Paper (Q. No. 1 to 24) <<<
>>> IA Question Paper (Q.No. 51 to 100) >>>