Solved Question Paper / Answer Key Of JOA IT By YS Parmar University Nauni Held on 24Th Oct 2021

Question Paper Official Answer Key Of JOA IT

JOA IT or Junior Office Assistant (IT) exam held on 24th October 2021 at different examination center in Himachal Pradesh conducted by nauni University Solan successfully. Many of candidates remain absent in this examination due to weather condition and other reasons like university has not alerted any candidates through SMS or mail for the coming exam due to which many aspirant have not appeared in this test. Go through solved paper of JOA Section wise and check for correct answers as per answer key provided by officials.

                   (Himachal Pradesh General Knowledge And Current Affairs Section)

Question1 : Choose The Correct statement for introduction of “Monk Fruit” in H.P?

  1. CSHPKV in Palampur
  2. UHF Nanuni in Kullu
  3. CSIR-IHBT in Kullu
  4. CSIR-IHBT in Kullu

Ans: C (CSIR-IHBT in Kullu)

Question2: In Himachal “Veerangana Souvenir” was released on International Women day celebrated on 8th March 2021 by which government body?

  1. Chief Minister
  2. Health Minister
  3. Education Minister
  4. Governor

Ans: D (Governor)

Question3: Which mountain Pass used to connects Himachal Pradesh With Tibet?

  1. Shingo La
  2. Baralacha La
  3. Shipki La
  4. Zoji la

Ans: C ( Shipki la)

Question4:  “Himalayan Pilgrimage” book Written by ?

  1. Kanchan Sharma
  2. Yashpal
  3. Ram Rahul
  4. BN Battar

Ans: (D) BN Dataar

Question5 : Choose The year in which National Great Himalayan Park Kulu was listed under UNESCO World Heritage site?

  1. 2010
  2. 2011
  3. 2014
  4. 2013

Ans:  C (2014)

Question6: In Which year Mukhya Mantri Gram Kaushal Yojana Launched in Himachal?

  1. 6 Jan 2021
  2. 6 Jan 2020
  3. 21 Jul 2021
  4. 21 Jul 2020

Ans: B (6 Jan 2020)

Question7: Average elevation altitude of Pir Panjal Mountain is ?

  1. 1400m-4100m
  2. 4225m-4889m
  3. 4775-5585m
  4. 4636-5565m

Ans: A (1400m-4100m)

Question8: Which of Guler Ruler was named as “Sher Afgan” by king Shahjahan?

  1. Vikram Singh
  2. Hari Chand
  3. Man Singh
  4. Prithvi Chand

Ans: C (Man Singh)

Question9: First Player belongs to Himachal who has won medal in National Para Table Tennis Sports?

  1. Nishad Kumar
  2. Piyush Sharma
  3. Varun
  4. Sharad Kumar

Ans: B (Piyush Sharma)

                                                        (English Section)

Question1: Choose Correct Synonym of embezzle ?

  1. Appropriate
  2. Remunerate
  3. Bequath
  4. Misappropriate

Ans: D (Misappropriate)

Question2: Kalam is mainly known for his wisdom. Here Wisdom is ?

  1. Proper noun
  2. Abstract noun
  3. Common noun
  4. Material Noun

Ans: B (Abstract noun)

Question3: Study on Economic evaluation is an eye opener and ”attempts to acquaint” everyone with the problems of poor nations. Choose correct sentence.

  1. Attempting to acquaint
  2. Attempted to acquaint
  3. Attempts at acquainting
  4. Attempt to acquaint

Ans: D

Question4 : Correct Meaning of idiom : He just him a “Left-Handed Compliment”?

  1. A well deserved
  2. An Honest
  3. An insincere
  4. A flattering

Ans: C (An insincere)

Question5 : Sheena Was —– by here employees as she often——-them for not working sincerely. Fill correct words?

  1. Disregarded, applauded
  2. Revered, hounded
  3. Scolded, adored
  4. Despised, reprimanded

Ans: A

Question6 : The action of Killing a King is known as ?

  1. Fratricide
  2. Matricide
  3. Regicide
  4. Genocide

Ans: A ( Fratricide)

Question7 : Choose Part of speech which is correct : Sit “besides” me.

  1. Preposition
  2. Conjunction
  3. Adverb
  4. Adjective

Ans: A (Preposition)

Question8: Select the which has same relation as – indigent : Wealthy

  1. Cultural : civilized
  2. Irate : Vexed
  3. Gawky : Dignified
  4. Indigenous : Aboriginal

Ans: A (Cultural :  Civilized)

Question9 : Bolt From the blue is:

  1. Thundering
  2. A complete surprise
  3. Inform something bad
  4. Unconcerned

Ans: B (A complete surprise)

Question10: Arrange the following words to complete sentence “All such students”

  1. In every walk of life
  2. And get recognition
  3. Who are diligent and honest
  4. Flourish

Ans: D

(Computer Science Section)

Question1 : Which is not a part of a unguided media?

  1. Microwave
  2. Satellite
  3. Wi-fi
  4. Twisted Pair

Ans: A

Question2 : the function that is a created from a call to a template function is called

  1. Generated
  2. Inherited
  3. Spawned
  4. Declassified

Ans: C

Question3: Which of network protocol is used to sent e-mail?

  1. STP
  2. SSH
  3. POP3
  4. SMTP

Ans: D (SMTP)

Question 4 : Various Computers connected to a LAN by a cable and——–?

  1. Modem
  2. Network Interface card
  3. Special Wires
  4. Telephones Lines

Ans: B (Network Interface Card)

Question 5: Integer division ina a “C” program results in —————?

  1. Overflow
  2. Rounding
  3. Underflow
  4. Truncation

Ans: D

Question 6: ———-denotes error in computer program?

  1. Bit
  2. Bug
  3. Spam
  4. Byte

Ans: B (Bug)

Question 7:  CLR is .net equivalent of —————-?

  1. Common type system
  2. Common runtime language
  3. Java virtual machine
  4. Common language specification

Ans: C

Question8: Video Consists of sequence of:

  1. Frames
  2. Signal
  3. Packets
  4. Slots

Ans: A (Frames)

Question9 : Ip of TCP/IP is:

  1. Connection Oriented Protocol
  2. Connectionless Protocol
  3. Breaks the data into packets
  4. Verifies the data

Ans: A

Question10: Cryptography techniques Encryption and Decryption works at which layer of OSI model?

  1. Physical Layer
  2. Network Layer
  3. Data Link Layer
  4. Presentation Layer

Ans: D

Question11: select the incorrect option

  1. Transmitting data from one source host to one destination host is called a Unicast
  2. Transmitting data from one source host to all other hosts residing in the same network is called a limited broadcast.
  3. Transmitting data from one source host to a particular group of hosts having interest in receiving the data is called Multicast.
  4. Multicast is one to one transmission.

Ans: D(Multicast is one to one transmission)

Question12: A physical path is established in all the way from sender to the receiver is known as?

  1. Message switching
  2. Packet switching
  3. Circuit switching
  4. All above are true

Ans: C (circuit switching)

Question13: Select the incorrect option.

  1. Both sender and receiver use a common key to encrypt and decrypt the message in public key cryptography.
  2. If N people in the world wants to use symmetric key cryptography, then there needs to be N(N-1)/2 secret key.
  3. In Asymmetric key cryptography the sender and receiver both use different keys to encrypt and decrypt the message.
  4.  For n individuals to communicate by asymmetric key cryptography, number of keys required =2*n =2n keys.

Ans: C

Question14: Consider the following pseudo-code of data structure:

 struct node{

                                int data

                                struct node*prev, struct node* next

                }

  1. Single linked list
  2. Doubly linked list
  3. Circular linked list
  4. STACK

Ans: A

Question 15: In a stack, if a user tries to remove an element from empty stack it is called as

  1. Underflow
  2. Empty collection
  3. Overflow
  4. Garbage collection

Ans: A (Underflow)

Question16: The relation R(A,B,C,D) with fuctional dependencies as {A->B,A->C,C->D,C->A.} is in the following Normal form(NF)

  1. BCNF
  2. 3NF but not BCNF
  3. Only 2nd NF
  4. 1st NF

Ans: A

Question17: By default, the ASP.net stores the Session ID’s in

  1. Cache
  2. Cookies
  3. Databases
  4. Global Variables

Ans. B (Cookies)

Question18: The LINUX OS command to give read, write and execute permission to all i.e., user, group and others is

  1. Chmod777
  2. Chmod 767
  3. Chmod 655
  4. Chmod a+x

Ans: A

Question19: Arrays can be intialised  provided they are

  1. Automatic
  2. External
  3. Static
  4. Both B and C

Ans:  B

Question20: Which of the following is not a DBMS software?

  1. MS Access
  2. MySQL
  3. Oracle
  4. MS Excel

Ans: D (MS Excel)

Question21: Consider the following four processes with arrival times ( in milliseconds) and their length of CPU bursts (in milliseconds) as shown below:

ProcessP1P2P3P4
Arrival Time0134
CPU Burst Time313Z

These processes are running on a single processor using preemptive Shortest Remaining Time First scheduling algorithm. If the average waiting time if the processes is 1 millisecond, then the value of Z is

  1. 1
  2. 2
  3. 3
  4. 4

Ans: B (2)

Question22: Choose the correct statement

  1. Optical Character Reader(OCR) and Optical Mark Recognition(OMR) are examples of Input devices.
  2. Optical Character Reader(OCR) and Optical Mark Recognition(OMR) are examples of Output devices.
  3. Optical Character Reader(OCR) is Input device whereas Optical Mark Recognition(OMR) is example of Output devices.
  4. Optical Mark Recognition(OMR) is example of Input device whereas Optical Character Reader(OCR) is Output device. .

Ans: C (Optical Character Reader(OCR) is Input device whereas Optical Mark Recognition(OMR) is example of Output devices)

Question23: Which among the following statements is wrong?

  1. Machine language and Assembly language are examples of high level language.
  2. Machine language some time also refers to Object code.
  3. Assembly language uses the Mnemonics to represent instructions.
  4. Java is platform independent language.

Ans: A (Machine language and Assembly language are examples of high level language)

Question24: The data in excel sheet should be in which of the following format to use it in order to create a “Mail Merge” in Microsoft Word Document.

  1. Table format, without headers on each column only with the necessary information in each column.
  2. Table format, with each headers on each column and then the necessary information in each column.
  3. Both above options (A) and (B) are correct for mail merge.
  4. None of above.

Ans: B

Question25: Switching the CPU to another process requires

  1. Saving the state of the new process and loading the saved state for the old process.
  2. Saving the state of the old process and loading the saved state for the new process.
  3. Saving the state of the old process and loading the saved for the old process.
  4. Saving the state of the new process and loading the saved state for the new process.

Ans: B

Question26: With respect to the statement ‘ MS word is running on a Windows machine’, which of the following statement is correct?

  1. Application software load before System software
  2. Application software cannot load after system software
  3. System Software load before Application software
  4. System software load after application software

Ans: C (System software load before Application software)

Question27: …………Refers to a reversible step by step process in which a given set of relation is replaced by successive collections of relations that have a progressively simpler and more regular structure.

  1. Normalization
  2. Primary key
  3. Pattern Matching
  4. Table

Ans: A (Normalization)

Question28: Select the correct option for the Distance Vector Routing

  1. Only distance vectors are exchanged. ‘Next hop’ values are not exchanged. This is because it results in exchanging the large amount of data which consumes more bandwidth.
  2. While preparing a new routing table- A router takes into consideration only the distance vectors it has obtained from its neighboring routers. It does bot take into consideration its old routing table.
  3. The algorithm keeps on repeating periodically and never stops. This is to update the shortest path in case any link goes down or topology changes.
  4. All above options are correct.

Ans: D

Question29: What is the full form of SMTP?

  1. Simplex Mail Transfer Protocol
  2. Single Mail Transfer Protocol
  3. Simple Mail Transfer Protocol
  4. Simple Mail Transmission Protocol

Ans: C (Simple Mail Transfer Protocol)

Question30: Consider following C program

                                #include<stdio.h>

                                Int main(){

                                Int arr[]={1,2,3,4,5,6,7,8,9,0,1,2,5}, *ip=arr+4;

                             printf(“%d\n”,ip[2]);

return0;

}

The number that will be displayed on execution of the program is

  1. 5
  2. 6
  3. 3
  4. 7

Ans: B (6)

Question31: The command in LINUX OS to check the Bad Sectors in your pen drive is

  1. Fsck-1/dev/sdc1
  2. Fdisk-1
  3. Fscan/dev/sdc1
  4. Fix-1/dev/sdc1

Ans: C (fscan/dev/sdc1)

Question32: Combination of multimedia and hyperlinks is called as

  1. Hypertext
  2. Media
  3. Multitask
  4. Hyper task

Ans: A (Hypertext)

Question33: The standard protocol of the Internet is

  1. HTML
  2. Java
  3. TCP/IP
  4. Flash

Ans: C (TCP/IP)

Question34: Which escape character can be used to begin a new line in C?

  1. \a
  2. \b
  3. m
  4. \n

Ans: D (\n)

Question35: The operator && is  a ………….. operator.

  1. Assignment
  2. Increment
  3. Logical
  4. Rational

Ans: C (Logical)

Question36: the text color on a presentation should contrast with the color of

  1. Background
  2. Frame
  3. Stack
  4. None of these

Ans: A (Background)

Question37: Select the option which does not represent example of multicast

  1. Sending a message to a particular group of people on WhatsApp
  2. Video conference or teleconference
  3. Class taken by a faculty using MS team/google meet app
  4. Transmission of a television channel

Ans: A

Question38: Select the correct option for the given IP address 300.1.2.3.

  1. This is not a valid IP Address.
  2. First and Last IP Addresses are reserved.
  3. This is because for any given IP Address, the range of its octet is always [1, 254]
  4. All above options are correct

Ans: A (This is not valid IP address)

Question39: The following statement is false with respect to Hamming code

  1. If there is  a hamming distanced between two code words then it will require d single- biot errors to convert one into the other.
  2. The parity bit is chosen so that the number of 1 bits in the codeword is even (or odd).
  3. The bits that are powers of 2(1,2,4,8,16, etc.) are message bits.
  4. None of above.

Ans: B

Question40: Given a message 1010000 with a generators polynomial x3+1, then what should be the transmitted message using this generator polynomial

  1. 1010000001
  2. 1010000011
  3. 1010000100
  4. 1010000101

Ans: A

Question41: If the bandwidth if the line is 1.5 Mbps, RTT is 45 msec and packet size is 1KB, then find the link utilization in stop and wait flow control protocol

  1. 10.8%
  2. 9.2%
  3. 12.3%
  4. 5.2%

Ans: A (10.8%)

Question42: The maximum window size for data transmission using the selective repeat protocol with n bit frame sequence numbers is

  1. 2n
  2. 2(n-1)
  3. 2n-1
  4. 2(n-2)

Ans: B

Question43: Select the correct option:

  1. Flooding is static routing algorithm in which every incoming packet is sent  out on every outgoing line except the one it arrived on.
  2.  Static algorithm do not take the current network load into account whereas Distance vector routing algorithm operate by having each router maintain a table giving the best known distance to each destination and which line to use to get there.
  3. In flow control routing algorithm, the route is decided based on traffic, i.e., if traffic is heavy in a shortest path, then it is diverted to low traffic route even if it us longest path to reach the destination.
  4. All above options are correct.

Ans: D

Question44: Let an array A is defined as int A[3][5]={1..5,6..10,11..15}, where an integer takes 4 bytes of memory. If the base address of A is 1000 then the memory location of A[1][4] will be

  1. 1036
  2. 1032
  3. 1028
  4. 1020

Ans: A

Question45: What is the value of the postfix expression 6 3 2 4 +-* 😕

  1. 1
  2. 40
  3. 18
  4. -18

Ans: C

Question46: A graphics card has on board memory of 1 MB. Which of the following modes can the card not support?

  1. 1600 * 400 resolution with 256 colors on a 17 inch monitor.
  2. 1600* 400 resolution with 16 million colors on a 14 inch monitor.
  3. 800*400 resolution with 16 million colors on a 17 inch monitor.
  4. 800* 800 resolution with 256 colors on a 14 inch monitors.

Ans: B

Question47: The shortcut to Add multiple rows / columns above/ below of a row in a Microsoft Word Document is

  1. Select multiple Rows/ Columns then press right click mouse button and choose option insert rows above/below
  2. CTRL+I
  3. CTRL+A
  4. CTRL+J

Ans; A

Question48: The mail merge option in Microsoft Word Document is found under which option?

  1. References
  2. View
  3. Review
  4. Mailings

Ans: D (Mailings)

Question49: The correct option for Primary Key and Unique Key is:

  1. Both are selected from candidate key.
  2. The primary key cab be only one for a table whereas Unique can be more than one
  3. Both options (A) and (B)are true
  4. Either option (A) is true or (B) is true

Ans: B

Question50: Find the decimal equivalent of binary number

                (1101.0111)2=  ?

     a) 12.437510

     b) 13.437510

    c) 13.754310

    d) 12.7543­10

Ans: A

Question51: In ASP.net the web config file is used for which of the following?

  1. To store the global information and variable definitions for the application
  2. To configure the web server
  3. Configures the time that the server-side code behind the module is called
  4. To configure the web browser

Ans: B

Question52: The default web server used in LINUX OS based machine is

  1. Gunicorn
  2. Apache
  3. IIS
  4. Kestrel

Ans: B (Apache)

Question53: A 1GHz CPU (Central Processing Unit) can carry how much maximum instructions per second

  1. 1 billion
  2. 10 billion
  3. 1 million
  4. 10 million

Ans: C

Question54: The function sprint() works like printf() but operates on

  1. Data in a file
  2. Stderr
  3. Stdin
  4. String

Ans: D

Question55: Which of the following command is used to delete table from the database?

  1. Delete Audio
  2. Drop
  3. Alter
  4. Truncate

Ans; B(Drop)

Question 56: The core of LINUX Operating System is called as:

  1. Kernel
  2. Shell
  3. Application
  4. System Utility

Ans: A (Kernel)

Question57: Which one of the following is not a part of network topology?

  1. Bus
  2. Moon
  3. Tree
  4. Star

Ans: B( moon)

Question58: Maintaining and assuring the accuracy and consistency of data is called as

  1. Data cleansing
  2. Data Compiling
  3. Data Integrity
  4. Data Manipulation

Ans: C (Data Integrity)

Question59: What is the full form of AVI?

  1. Video Interchange
  2. Audio Video Intercept
  3. Audio Video Intersect
  4. Audio Video Interleave

Ans: D (Audio Video Interleave)

Question60: Which of the following is shortcut key is used to set 1.5- line spacing in MS Word?

  1. Ctrl+1
  2. Ctrl+2
  3. Ctrl+5
  4. Ctrl+3

Ans: C (ctrl+5)

Nauni University JOA IT Answer Key Download

University has also released the JOA IT Official answer key. You can download and view the answer as per official key and send your query at earliest before the final merit list prepared.

Leave a Comment

google.com, pub-8647292493314379, DIRECT, f08c47fec0942fa0