Dr YSP University Solan Junior Office Assistant IT Exam 2021 Solved


Dr. YSP University Solan Junior Office Assistant IT Exam 2021 Solved Paper

The Dr. YSP University Solan Junior Office Assistant IT Exam 2021 Solved Paper is a vital resource for candidates preparing for the Junior Office Assistant position in the Information Technology department. This solved paper provides comprehensive answers to the exam questions, offering insights into the exam pattern and essential topics covered in the syllabus. By reviewing this resource, candidates can strengthen their understanding of key concepts, identify areas that need more focus, and enhance their exam preparation strategies.

Junior Office Assistant IT Exam 2021

For those aspiring to succeed in the Junior Office Assistant IT Exam 2021, this solved paper serves as an effective study aid. Each question is accompanied by clear, structured answers that align with the exam standards, making it ideal for both in-depth study and last-minute revisions. With this guide, candidates can build their confidence and be well-prepared to tackle the challenges of the exam, ensuring they are ready to showcase their skills and knowledge effectively.

Dr. YSP University Solan Junior Office Assistant IT Exam 2021 Solved Paper

➤ The action of killing a king is :

  • Fratricide
  • Matricide
  • Regicide
  • Genocide

Regicide refers to the act of killing a king.

➤ Find out the part of speech written in bold: Sit beside

  • Preposition
  • Conjunction
  • Adverb
  • Adjective

“Beside” is a preposition because it shows the relationship between two entities.

➤ Select the pair which has the same relationship – indigent: wealthy

  • Cultural : civilized
  • Lrate : vexed
  • Gawky : dignified
  • Indigenous : aboriginal

The pair “Gawky : dignified” shares the same contrasting relationship as “indigent : wealthy.”

➤ Bolt from the blue:

  • Thundering
  • A complete surprise
  • Inform something bad
  • Unconcerned

“Bolt from the blue” means “a complete surprise.”

➤ Arrange the following words in order to complete the sentence: All such students…

  • in every walk of life
  • and get recognition
  • who are diligent and honest
  • flourish
  • cdba
  • abcd
  • adcb
  • cabd

The correct arrangement is “cdba” to complete the sentence as: “All such students who are diligent and honest flourish and get recognition in every walk of life.”

➤ Synonym of embezzle is :

  • appropriate
  • remunerate
  • bequeath
  • misappropriate

“Misappropriate” is a synonym for “embezzle,” which means to steal or misuse funds.

➤ Kalam is known for his wisdom. Wisdom is a/an:

  • proper noun
  • abstract noun
  • common noun
  • material noun

Wisdom” is an abstract noun as it represents an idea or concept rather than a physical object.

➤ The study on economic evaluation is an eye-opener and attempts to acquaint everyone with the problems of poor nations: Correct the sentence

  • attempting to acquaint
  • attempted to acquaint
  • attempts at acquainting
  • attempt to acquaint

The correct phrase is “attempts at acquainting,” making the sentence grammatically correct.

➤ Choose the correct meaning of the idiom given in bold: He just paid him a left-handed compliment:

  • A well deserved
  • An honest
  • An insincere
  • A flattering

A left-handed compliment” means an insincere or backhanded compliment.

➤ Sheena was ……………….. by her employees as she often ……………. them for not working sincerely.

  • Disregarded, applauded
  • Revered, hounded
  • Scolded, adored
  • Despised, reprimanded

Despised” and “reprimanded” correctly describe the relationship where Sheena is disliked and often scolds her employees.

➤ भाषा की सबसे छोटी सार्थक इकाई क्या है

  • ध्वनि
  • वर्ण
  • शब्द
  • वाक्य

“वर्ण” (letter) is the smallest meaningful unit in a language.

➤ निष्कपट का संधि विछेद है

  • नि+ कपट
  • निः+कपट
  • निष् + कपट
  • निस +कपट

The sandhi vichhed (split) of ‘निष्कपट’ is ‘निः+कपट’.

➤ ‘मेहनत करो ताकि सफलता आपके कदम चूमे’ वाक्य में ताकि क्या है

  • सबंध बोधक अव्य
  • समानिधिकरण समुच्यबोधक
  • वाधिकार समुच्यबोधक
  • क्रियाविसेसण अव्य

“ताकि” (so that) is a वाधिकार समुच्यबोधक (purpose conjunction) used to indicate the purpose of the action.

➤ ‘पुत्र को देख माता का चेहरा खिल गया’ वाक्य में विधेय है

  • पुत्र को देखकर
  • माता का चेहरा खिल उठा
  • चेहरा खिल उठा पुत्र को
  • पुत्र

The correct vidhay (phrase) is ‘पुत्र को देखकर’, which means ‘Seeing the son.’

➤ वाक्य को तत्काल विषय देकर विचारो को क्रमवद्ध रूप से आयोजित कर प्रभारी रीती से प्रस्तुत करना, कहलाता है ?

  • साक्षताकर देना
  • आशुभाषण
  • सभा – संचालन
  • परिचर्चा

“आशुभाषण” (speech) is the process of presenting thoughts in a systematic manner.

➤ When was MukhyaMantri Gram KaushalYojna Started in HP?

  • 6 January 2021
  • 6 January 2020
  • 21 July 2021
  • 21 July 2020

The MukhyaMantri Gram KaushalYojna was started on 6 January 2020.

➤ Select the incorrect statement in respect of Seabuckthorn:

  • Rich source of vitamins and minerals
  • This is a shrub which produces edible berries of crimson colour
  • Commonly known as chharma in HP
  • Fruit berries are acidic in nature

“Seabuckthorn” is not a shrub that produces crimson-colored berries; it is known for its orange berries.

➤ The average elevation of PirPanjal Mountain Range is :

  • 1400-4100m
  • 4775-5585m
  • 4225-4889m
  • 4636-5565m

The average elevation of the PirPanjal Mountain Range is between 1400 and 4100 meters.

➤ Which of the following Guler Ruler was named as ‘SherAfgan’ by Shahjahan?

  • Vikram Singh
  • Hari Chand
  • Man Singh
  • Prithvi Chander

Man Singh” was the Guler ruler who was named “SherAfgan” by Shahjahan.

➤ Name the first player from HP state who won a medal in National Para Table Tennis?

  • Nishad Kumar
  • Piyush Sharma
  • Varun
  • Sharad

Piyush Sharma” is the first player from HP who won a medal in National Para Table Tennis.

➤ Select the right statement for the introduction of ‘Monk fruit’ in HP.?

  • CSKHPKV in Palampur
  • UHF in Kullu
  • CSIR-IHBT in Kullu
  • CSIR-IHBT in Mandi

CSIR-IHBT in Kullu” is the correct institution for introducing ‘Monk fruit’ in HP.

➤ By whom in HP, the ‘Veerangana Souvenir’ was released on International Women’s Day celebrated on 8 March 2021?

  • Chief Minister
  • Education Minister
  • Health Minister
  • Governor

The ‘Veerangana Souvenir’ was released by the Governor on International Women’s Day.”

➤ Which of the following Mountain Pass connects Himachal with Tibet?

  • Shingo La
  • Baralacha La
  • Shipki La
  • Zoji La

Shipki La” is the mountain pass that connects Himachal Pradesh with Tibet.

➤ Who wrote the book named ‘Himalayan Pilgrimage’?

  • Kanchan Sharma
  • Ram Rahul
  • Yashpal
  • BN Dataar

BN Dataar” is the author of the book “Himalayan Pilgrimage.”

➤ In which year National Great Himalayan Park, Kullu was listed under UNESCO World heritage?

  • 2010
  • 2011
  • 2014
  • 2013

National Great Himalayan Park, Kullu” was listed as a UNESCO World Heritage site in 2014.

➤ Choose the correct statement :

  • Optical Character Reader and Optical Mark Recognition are examples of Input devices.
  • Optical Character Reader and Optical Mark Recognition are examples of Output devices.
  • Optical Character Reader is input device whereas Optical Mark Recognition is example of Output device.
  • Optical Mark Recognition is example of input device whereas Optical Character Reader is output device.

“Optical Character Reader and Optical Mark Recognition” are input devices used to read text and marks, respectively.

➤ Which among the following statements is wrong?

  • Machine language and Assembly language are examples of High level Language
  • Machine Language sometimes also refers to Object code.
  • Assembly language uses the Mnemonics to represent instructions.
  • Java is a platform-independent language.

“Machine language and Assembly language” are low-level languages, not high-level languages.

➤ The data in excel sheet should be in which of the following format to use it in order to create a ‘Mail Merge’’ in Microsoft Word Document.

  • Table format, without headers on each column only with the necessary information in each column.
  • Table format, with headers on each column and then the necessary information in each column
  • Both a and b
  • None of these

“For mail merge in Microsoft Word, the data should be in table format with headers on each column.”

➤ Switching the CPU to another process requires:

  • Saving the state of the new process and loading the saved state for the old process.
  • Saving the state of the old process and loading the saved state for the new process.
  • Saving the state of the old process and loading the saved state for the old process.
  • Saving the state of the new process and loading the saved state for the new process.

“Switching the CPU to another process requires saving the state of the old process and loading the saved state for the new process.”

➤ With respect to the statement ‘MS Word is running on a Windows machine’, which of the following statement is correct?

  • Application software load before system software
  • Application software cannot load after System Software
  • System software load before application Software
  • System Software load after Application Software

“System software, like Windows, must load before application software like MS Word can run.”

➤ ……………………….refers to a reversible step by step process in which a given set of relation is replaced by successive collections of relations that have a progressively simpler and more regular structure.

  • Normalization
  • Primary Key
  • Pattern matching
  • Table

“Normalization” is a process in databases to simplify data structures by eliminating redundancy.

➤ Select the correct option for the Distance Vector Routing?

  • Only distance vectors are exchanged. ‘next hop’ values are not exchanged. This is because it results in exchanging the large amount of data which consumes more bandwidth.
  • While preparing a new routing table-A router takes into consideration only the distance vectors it has obtained from its neighboring routers. It does not take into consideration is old routing table.
  • The algorithm keeps on repeating periodically and never stops. This is to update the shortest path in case any link goes down or topology changes.
  • All above options are correct.

“All the options provided describe aspects of Distance Vector Routing.”

➤ What is the full form of SMTP?

  • Simplex Mail Transfer Protocol.
  • Single Mail Transfer Protocol.
  • Simple mail transfer Protocol.
  • Simple Mail Transmission Protocol.

“SMTP” stands for Simple Mail Transfer Protocol, used for sending emails.

➤ Consider following C Program:

#include <stdio.h>

Int main (){

Int arr[]={1,2,3,4,5,6,7,8,9,0,1,2,5}, *ip=arr+4;

printf(‘%d/n’,ip [2]);

Return 0;

}

The number that will be displayed on the execution of the program is ……………….

  • 5
  • 6
  • 3
  • 4

“The program will display ‘4’, which is the value at index 6 of the array starting from the pointer position 4.”

➤ The command in LINUX OS to check the Bad Sectors in your pen drive is:

  • Fsck-1/dev/sdc 1
  • Fdisk-1
  • Fscan/dev/sdc 1
  • Fix-1 /dev/sdc1

“The command ‘fsck -l /dev/sdc1’ is used to check for bad sectors in a pen drive on a Linux OS.”

➤ Combination of multimedia and hyperlinks is called as :

  • Hypertext
  • Media
  • Multitask
  • Hyper task

“Hypertext” refers to the combination of multimedia elements and hyperlinks.

➤ The standard protocol of the Internet is :

  • HTML
  • Java
  • TCP/IP
  • Flash

“TCP/IP” is the fundamental protocol suite for Internet communication.

➤ Which escape character can be used to begin a new line in C?

  • /a
  • /b
  • m
  • /n

“/n” is the escape character used to begin a new line in C programming.

➤ The operator && is a ………………. Operator :

  • Assignment
  • Increment
  • Logical
  • Rational

“&&” is a logical operator used for logical conjunction (AND) in programming.

➤ The text color in a presentation should contrast with the colour of:

  • Background
  • Frame
  • Stack
  • None of these

“The text color should contrast with the background color for better readability in a presentation.”

➤ Select the option which does not represent an example of multicast:

  • Sending a message to a particular group of people on WhatsApp
  • Video conference or teleconference
  • Class taken by a faculty using MS Teams/Google Meet app
  • Transmission of a television channel

Transmission of a television channel is typically broadcast, not multicast.

➤ Select the correct option for the given IP address 300.1.2.3:

  • This is not a valid IP address.
  • First and Last IP Address are reserved.
  • This is because for any given IP Address, the range of its first octet is always [1,254].
  • All above options are correct

300.1.2.3 is not a valid IP address because the first octet must be in the range [0,255].

➤ The following statement is false with respect to Hamming Code:

  • If there is a Hamming distance between two codewords, then it will require d single-bit errors to convert one into the other.
  • The parity bit is chosen so that the number of 1 bits in the codeword is even (or odd)
  • The bits that are powers of 2 (1,2,4,8,16, etc.) are message bits.
  • None of these

In Hamming Code, bits that are powers of 2 are parity bits, not message bits.

➤ Given a message 1010000 with a generator polynomial x3+1, then what should be the transmitted message using this generator polynomial:

  • 1010000001
  • 101000011
  • 1010000100
  • 1010000101

101000011 is the CRC-encoded message with the given generator polynomial.

➤ If the bandwidth of the line is 1.5 Mbps, RTT is 45 msec and packet size is 1 KB, then find the link utilization in stop and wait flow control protocol:

  • 8%
  • 2%
  • 3%
  • 2%

Utilization is calculated using the formula: (Packet Size / (Packet Size + 2 * Bandwidth * RTT)). For the given values, it results in 8%.

➤ The maximum window size for data transmission using the selective repeat protocol with n bit frame sequence number is:

  • 2n
  • 2(n-1)
  • 2n-1
  • 2(n-2)

The maximum window size is 2(n-1) for selective repeat protocols.

➤ Select the correct Option:

  • Flooding is a static routing algorithm in which every incoming packet is sent out on every outgoing line except the one it arrived on.
  • Static algorithms do not take the current network load into account, whereas Distance vector routing algorithms operate by having each router maintain a table (i.e., a vector) giving the best-known distance to each destination and which line to use to get there.
  • In flow control routing algorithms, the route is decided based on traffic. If traffic is heavy in a short path, then it is diverted to a low traffic route even if it is the longest path to reach the destination node.
  • All above options are correct.

All statements accurately describe different routing and flow control algorithms.

➤ Let an array A be defined as int A[3][5]={1..5,6..10,11..15}, where an integer takes 4 bytes of memory. If the base address of A is 1000, then the memory location of A[1][4] will be:

  • 1036
  • 1032
  • 1028
  • 1020

The memory location of A[1][4] is calculated as base address + (number of rows * number of columns + column index) * size of element = 1000 + (1 * 5 + 4) * 4 = 1036.

➤ What is the value of the postfix expression 6 3 2 4+-*:

  • 1
  • 40
  • 18
  • -18

Evaluating the postfix expression 6 3 2 4 +- * gives -18.

➤ A graphics card has onboard memory of MB. Which of the following modes can the card not support?

  • 1600×400 resolution with 256 colors on a 17-inch monitor
  • 1600×400 resolution with 16 million colors on a 14-inch monitor
  • 800×400 resolution with 16 million colors on a 17-inch monitor
  • 800×800 resolution with 256 colors on a 14-inch monitor

The resolution of 1600×400 with 16 million colors on a 14-inch monitor is likely to be unsupported due to memory constraints.

➤ The shortcut to add multiple rows/columns above/below a row in a Microsoft Word document is:

  • Select multiple ROWS/COLUMNS then press right-click mouse button and choose option Insert rows above/below
  • CTRL+1
  • CTRL+A
  • CTRL+J

Selecting multiple rows/columns and using the context menu to insert rows/columns is the correct method.

➤ The ‘Mail Merge’ option in a Microsoft Word document is found under which option?

  • References
  • View
  • Review
  • Mailings

The ‘Mail Merge’ feature is located under the ‘Mailings’ tab.

➤ The correct option for Primary Key and Unique Key is:

  • Both are selected from candidate key
  • The Primary Key can be only one for a table whereas Unique Key can be more than one
  • Both option (A) and (B) are True
  • Either option (A) is True or (B) is True

Both statements about Primary Key and Unique Key are correct.

➤ Find the decimal equivalent of the binary number:

  • 12.437510
  • 13.437510
  • 13.754310
  • 12.754310

The binary number converts to 13.4375 in decimal.

➤ In ASP.NET, the ‘web.config’ file is used for which of the following?

  • To store the global information and variable definitions for the application
  • To configure the web server
  • Configures the time that the server-side code behind the module is called
  • To configure the web browser

The ‘web.config’ file stores global settings and variable definitions for an ASP.NET application.

➤ The default web server used in LINUX OS based machines is:

  • Gunicorn
  • Apache
  • IIS
  • Kestrel

Apache is the default web server for many LINUX distributions.

➤ An 1 GHz CPU (Central Processing Unit) can carry how many maximum instructions per second:

  • 1 billion
  • 10 billion
  • 1 million
  • 10 million

A 1 GHz CPU can execute up to 1 billion instructions per second.

➤ The function sprint() works like printf() but operates on:

  • Data in a file
  • stderr
  • stdin
  • string

The sprint() function operates on a string, unlike printf() which outputs to standard output.

➤ Which of the following command is used to delete a table from the database?

  • Delete Audio
  • Drop
  • Alter
  • Truncate

The `Drop` command is used to delete a table from the database, removing both the table structure and its data.

➤ The core of the LINUX Operating System is called as :

  • Kernel
  • Shell
  • Application
  • System Utility

The Kernel is the core component of the Linux Operating System, managing system resources and communication between hardware and software.

➤ Which one of the following is not a part of network topologies?

  • Bus
  • Moon
  • Tree
  • Star

The term “Moon” is not a recognized network topology. Common topologies include Bus, Tree, and Star.

➤ Maintaining and assuring the accuracy and consistency of data is called :

  • Data Cleansing
  • Data Compiling
  • Data Integrity
  • Data Manipulation

Data Integrity refers to the accuracy and consistency of data, ensuring that data remains accurate and reliable throughout its lifecycle.

➤ What is the full form of AVI?

  • Video Interchange
  • Audio Video Intercept
  • Audio Video Intersect
  • Audio Video Interleave

AVI stands for Audio Video Interleave, a multimedia container format used for storing video and audio data.

➤ Which of the following shortcut key is used to set 1.5-line spacing in MS Word?

  • Ctrl+1
  • Ctrl+2
  • Ctrl+5
  • Ctrl+3

In MS Word, the shortcut Ctrl+5 sets the line spacing to 1.5 lines.

➤ Which is not a part of unguided media?

  • Microwave
  • Satellite
  • Wi-Fi
  • Twisted Pair

Twisted Pair is a type of guided media, while Microwave, Satellite, and Wi-Fi are forms of unguided media.

➤ The function that is created from a call to a template function is known as :

  • generated
  • inherited
  • spawned
  • declassified

A function created from a template function is referred to as a spawned function, generated from the template’s parameters.

➤ Which of the following network protocols is used to send e-mail?

  • STP
  • SSH
  • POP3
  • SMTP

SMTP (Simple Mail Transfer Protocol) is used for sending emails over the network.

➤ Difference computers are connected to LAN by a cable and ……….. :

  • Modem
  • Network Interface Card
  • Special wires
  • Telephone lines

Computers are connected to a LAN (Local Area Network) using a Network Interface Card (NIC) and a cable.

➤ Integer division in a ‘C’ program results in ……………… :

  • Overflow
  • Network Interface Card
  • Special wires
  • Telephone lines

Integer division in C programs results in the quotient of the division operation, discarding the remainder.

➤ …………….. denotes an error in a computer program :

  • Bit
  • Bug
  • Spam
  • Byte

A “Bug” denotes an error or flaw in a computer program that causes it to behave unexpectedly.

➤ CLR is .NET equivalent of …………… ?

  • Common type system
  • Common runtime language
  • Java Virtual Machine
  • Common Language Specification

CLR (Common Language Runtime) is .NET’s equivalent to the Java Virtual Machine (JVM) for managing the execution of .NET programs.

➤ A video consists of a sequence of :

  • Frames
  • Signal
  • Packets
  • Slots

A video is composed of a sequence of frames, which are individual images displayed in quick succession to create the appearance of motion.

➤ ‘IP’ of TCP/IP is :

  • Connection-oriented protocol
  • Connectionless protocol
  • Breaks the data into packets
  • Verifies the data

IP (Internet Protocol) is a connectionless protocol responsible for addressing and routing packets between devices.

➤ Select the incorrect option :

  • Transmitting data from one source host to one destination host is called a Unicast
  • Transmitting data from one source host to all other hosts residing in the same network is called a limited Broadcast.
  • Transmitting data from one source host to a particular group of hosts having interest in receiving the data is called multicast.
  • Multicast is a one-to-one transmission.

Multicast is not a one-to-one transmission; it is a one-to-many transmission to a specific group of hosts.

➤ The cryptography techniques Encryption and Decryption works at which layer of OSI model :

  • Physical Layer
  • Network Layer
  • Data Link Layer
  • Presentation Layer

Encryption and Decryption techniques operate at the Presentation Layer of the OSI model, ensuring data is securely formatted and readable.

➤ A physical path is established in all the way from sender to the receiver is known as :

  • Message Switching
  • Packet Switching
  • Circuit Switching
  • All above are True

Circuit Switching establishes a dedicated communication path between sender and receiver for the entire duration of the conversation.

➤ Select the incorrect option :

  • Both sender and receiver use a common key to encrypt and decrypt the message in public key cryptography.
  • If N people in the world want to use symmetric key cryptography, then there needs to be N (N-1)/2 secret keys.
  • In Asymmetric key cryptography, the sender and receiver both use different keys to encrypt and decrypt the message.
  • For n individuals to communicate by Asymmetric key cryptography, the number of keys required = 2xn = 2n keys.

In public key cryptography, different keys are used by the sender and receiver, so using a common key is incorrect.

➤ Consider the following pseudo-code of data structure :

Struct node {

Int data;

Struct node *prev, struct node *next

};

  • Single Linked List
  • Doubly Linked List
  • Circular Linked List
  • STACK

The given pseudo-code defines a doubly linked list where each node contains pointers to both the previous and next nodes.

➤ In a stack, if a user tries to remove an element from an empty stack it is called as :

  • Underflow
  • Empty collection
  • Overflow
  • Garbage Collection

Underflow occurs when an attempt is made to remove an element from an empty stack.

➤ The relation R (A,B,C,D) with functional dependencies as { A->B, A->C, C->D, C->A} is in following Normal Form (NF) ……………………. :

  • BCNF
  • 3NF but not BCNF
  • Only 2nd NF
  • 1st NF

BCNF (Boyce-Codd Normal Form) is the highest normal form, and the given relation satisfies its conditions.

➤ By default, the ASP .net stores the session ID’s in …………………………. :

  • Cache
  • Cookies
  • Database
  • Global Variable

By default, ASP.NET stores session IDs in cookies to maintain state between web requests.

➤ The LINUX OS command to give read, write, and execute permission to all i.e., user, group, and others is ………… :

  • chmod 777
  • chmod 767
  • chmod 655
  • chmod a+x

The `chmod 777` command sets read, write, and execute permissions for all users on a file or directory.

➤ Arrays can be initialized provided they are :

  • Automatic
  • External
  • Static
  • Both B and C

Arrays can be initialized if they are static or external, ensuring they have a defined value or space allocated at compile time.

➤ Which of the following is not a DBMS Software?

  • MS Access
  • MySQL
  • Oracle
  • MS Excel

MS Excel is a spreadsheet application, not a Database Management System (DBMS). MS Access, MySQL, and Oracle are examples of DBMS software.

Loading