@miseera
RC of the day 19/03/2013
c
a
c
b
b
RC of the day 19/03/2013
c a
c
b
b
OAs SET 19/03/2013

86. c
The first paragraph mentions this change: “The regime
… … their own followers or clients”. This makes
choice (c) correct and the rest of the options are not
corroborated by the paragraph.
… … their own followers or clients”. This makes
choice (c) correct and the rest of the options are not
corroborated by the paragraph.
87. a
The two methods are mentioned in the second
paragraph where the author explicitly states “In the
process…..exploited”. This clearly makes choice (a)
correct.
paragraph where the author explicitly states “In the
process…..exploited”. This clearly makes choice (a)
correct.
88. c
The fourth paragraph mentions this viewpoint. The
author says that: “Since the 1960s … different
communities”. This makes choice (c) correct.
author says that: “Since the 1960s … different
communities”. This makes choice (c) correct.
89. b
This statement appears towards the end of the seventh
paragraph and the author clearly mentions “However,
elements …... current situation”. This makes choice
(b) correct.
paragraph and the author clearly mentions “However,
elements …... current situation”. This makes choice
(b) correct.
90. b
This issue is mentioned in the last paragraph: “Whether
this was …… not clear”. This obviously makes choice
(b) correct.
this was …… not clear”. This obviously makes choice
(b) correct.
Happy CATing 

@miseera said:OAs SET 19/03/2013 86. c The first paragraph mentions this change: “The regime… … their own followers or clients”. This makeschoice (c) correct and the rest of the options are notcorroborated by the paragraph.87. a The two methods are mentioned in the secondparagraph where the author explicitly states “In theprocess…..exploited”. This clearly makes choice (a)correct.88. c The fourth paragraph mentions this viewpoint. Theauthor says that: “Since the 1960s … differentcommunities”. This makes choice (c) correct.89. b This statement appears towards the end of the seventhparagraph and the author clearly mentions “However,elements …... current situation”. This makes choice(b) correct.90. b This issue is mentioned in the last paragraph: “Whetherthis was …… not clear”. This obviously makes choice(b) correct.Happy CATing
for 89 y not a??
. However, elements of communal
organization remained, reconstructed 'not necessarily in terms of historical continuities with traditional
formations, but on that bases favoured by the current situation.'
organization remained, reconstructed 'not necessarily in terms of historical continuities with traditional
formations, but on that bases favoured by the current situation.'
doesnt this mean they are kind of continuing the traditional formation and making that as a bases favoured by current situation??
@Subhashdec2 said:for 89 y not a??. However, elements of communalorganization remained, reconstructed €˜not necessarily in terms of historical continuities with traditionalformations, but on that bases favoured by the current situation. €™doesnt this mean they are kind of continuing the traditional formation and making that as a bases favoured by current situation??
The also in a makes it wrong..the passage says that historical communal elements were eroded...so its just the current situation that is responsible and not both...as stated in option a ...
RC of the Day 20/03/2013

For as long as it has existed, fashion, being a language, has always been used as a means of communication.
This very peculiar kind of communication takes place on two levels: an open one, and a hidden one. There
is in fact an underlying fact, a creative value left to each individual that allows the transmission of ambiguous
and equivocal messages; think of the eroticism of neglected lace, the hardness of riding boots or the
provocative-ness of some metal details.
If we agree that fashion is a language we should emphasize that it is a very sophisticated one and in a way,
a complementary one — a tool for articulating and supporting words rather than substituting them. And if
we agree that fashion is distinct from style, we must admit that its acknowledged codes are variable. This
variation can occur at different levels mainly, but not only, visually, often revamping outdated meanings. The
system of constantly shifting meanings, codes and values is in fact fundamental to fashion, as we understand
it in our culture. Designers know this well and they are the first to perceive signs of instability. The instabilities,
ambiguities and ambivalences, described by Fred Davis in his excellent book on the subject drive creativity
to and fro between opposites such as young/old, male/female, work/play, simplicity/complexity, revelation/
concealment, freedom/constraint, conformism/rebellion, eroticism/chastity, discretion/overstatement and
so on. The field where the game of change is played is framed within couples of constantly recurring
antithetic meanings. Fashion delights us by playing on the tensions between these couples — we derive
a frisson from the contradictions they suggest. We may tire of a look but whenever one of these themes
returns, its freshness is restored; our fascination with them seems endless. James Carse, a professor of
philosophy at New York University, and a friend of mine, in one of his books divides the world of human
relations into 'finite and infinite games'. What is the difference? In the former case the goal of the game is
to select a winner, in the latter it is to play the game forever. Incidentally, the latter is typical of the game of
children, which were in fact the author's chief source of inspiration. Without doubt, fashion is an infinite
game, since nobody is interested in starting the ultimate trend, the final one.
Though changes in fashion correspond to macro-changes in cultures or societies, they nevertheless require
human action, the work of creative people, of industry and the complicity of consumers. Fashion, after all,
does not happen by accident.
The fashion industry purposefully identifies garments and accessories as indicators of social status. Historians
have suggested that this has been so since the fourteenth century. Nowadays, this identification has
become a carefully planned and greatly accelerated activity. In the eternal ping-pong game between antithetical
meanings, the motivating force for creativity within fashion is nearly always, or often, cultural. When Chanel
urged her wealthy clients to dress like their maids, she was playing on the dialectics between the rich and
the poor, the high and the low status; but the reason for her attraction to these particular themes, and the
reason for the fashion's success, was her ability to intuit the predominant social tensions of the moment
(in this case ideas about the uncertainties of wealth and power initiated by the economic unrest of the
1930s).
97. According to the passage, which of the following statements correctly states one of the levels of
communication of fashion?
a. The open level leads to creative value which is easily understood by everyone but is shrouded in
transmission of ambiguous and equivocal messages.
b. The close level leads to creative value left for the individual which needs to be straddled with the
open level communication.
c. The hidden level communicates creative value which leads to transmission of ambiguous and
equivocal messages.
d. All of the above
98. According to the passage, what is the relevance of distinguishing between fashion and style?
a. To understand the variability of fashion codes that are used by the designers
b. To understand the variability style codes that are used by designers.
c. To understand the variability of fashion codes making it versatile.
d. All of the above
99. According to the passage, what is the role of contradictions as mentioned by Fred Davis?
a. Designers avoid these contradictions so as not to be controversial.
b. Designers use these well-known contradictions to be creative.
c. Designers pick these contradictions to be known to specialize in a genre.
d. Designers collude with fashion magazines to resolve these contradictions.
This very peculiar kind of communication takes place on two levels: an open one, and a hidden one. There
is in fact an underlying fact, a creative value left to each individual that allows the transmission of ambiguous
and equivocal messages; think of the eroticism of neglected lace, the hardness of riding boots or the
provocative-ness of some metal details.
If we agree that fashion is a language we should emphasize that it is a very sophisticated one and in a way,
a complementary one — a tool for articulating and supporting words rather than substituting them. And if
we agree that fashion is distinct from style, we must admit that its acknowledged codes are variable. This
variation can occur at different levels mainly, but not only, visually, often revamping outdated meanings. The
system of constantly shifting meanings, codes and values is in fact fundamental to fashion, as we understand
it in our culture. Designers know this well and they are the first to perceive signs of instability. The instabilities,
ambiguities and ambivalences, described by Fred Davis in his excellent book on the subject drive creativity
to and fro between opposites such as young/old, male/female, work/play, simplicity/complexity, revelation/
concealment, freedom/constraint, conformism/rebellion, eroticism/chastity, discretion/overstatement and
so on. The field where the game of change is played is framed within couples of constantly recurring
antithetic meanings. Fashion delights us by playing on the tensions between these couples — we derive
a frisson from the contradictions they suggest. We may tire of a look but whenever one of these themes
returns, its freshness is restored; our fascination with them seems endless. James Carse, a professor of
philosophy at New York University, and a friend of mine, in one of his books divides the world of human
relations into 'finite and infinite games'. What is the difference? In the former case the goal of the game is
to select a winner, in the latter it is to play the game forever. Incidentally, the latter is typical of the game of
children, which were in fact the author's chief source of inspiration. Without doubt, fashion is an infinite
game, since nobody is interested in starting the ultimate trend, the final one.
Though changes in fashion correspond to macro-changes in cultures or societies, they nevertheless require
human action, the work of creative people, of industry and the complicity of consumers. Fashion, after all,
does not happen by accident.
The fashion industry purposefully identifies garments and accessories as indicators of social status. Historians
have suggested that this has been so since the fourteenth century. Nowadays, this identification has
become a carefully planned and greatly accelerated activity. In the eternal ping-pong game between antithetical
meanings, the motivating force for creativity within fashion is nearly always, or often, cultural. When Chanel
urged her wealthy clients to dress like their maids, she was playing on the dialectics between the rich and
the poor, the high and the low status; but the reason for her attraction to these particular themes, and the
reason for the fashion's success, was her ability to intuit the predominant social tensions of the moment
(in this case ideas about the uncertainties of wealth and power initiated by the economic unrest of the
1930s).
97. According to the passage, which of the following statements correctly states one of the levels of
communication of fashion?
a. The open level leads to creative value which is easily understood by everyone but is shrouded in
transmission of ambiguous and equivocal messages.
b. The close level leads to creative value left for the individual which needs to be straddled with the
open level communication.
c. The hidden level communicates creative value which leads to transmission of ambiguous and
equivocal messages.
d. All of the above
98. According to the passage, what is the relevance of distinguishing between fashion and style?
a. To understand the variability of fashion codes that are used by the designers
b. To understand the variability style codes that are used by designers.
c. To understand the variability of fashion codes making it versatile.
d. All of the above
99. According to the passage, what is the role of contradictions as mentioned by Fred Davis?
a. Designers avoid these contradictions so as not to be controversial.
b. Designers use these well-known contradictions to be creative.
c. Designers pick these contradictions to be known to specialize in a genre.
d. Designers collude with fashion magazines to resolve these contradictions.
100. What logic does the author extend when he calls fashion an infinite game?
a. Fashion trends are numerous and cyclic
b. No one in fashion talks about the ultimate trend.
c. Though designers mention the ultimate trend, the fashion magazines do not agree.
d. The author calls the fashion an infinite game based on its fast acceptability.
a. Fashion trends are numerous and cyclic
b. No one in fashion talks about the ultimate trend.
c. Though designers mention the ultimate trend, the fashion magazines do not agree.
d. The author calls the fashion an infinite game based on its fast acceptability.
Happy CATing 

hello everybody. i'm varatharaj doing pre final year in mechanical engineering in coimbatore(tamilnadu).Right from the day i know about cat i started dreaming being an IIM er! MBA is my passion. im preparing for CAT 2013. As i was from a lower middle class background i cant afford to pay the coaching class fee. now iam preparing for CAT using the books from my college library.
but those books are really confusing and deviated from the actual CAT questions.i dont have a pc too. so i cant refer any online materials. i spend 4 hours daily for preparing CAT. my friend advised me that 4 hours of such preparations=1 hour of preparation by using standard materials like TIME,IMS. i went to TIME and ask them whether i can get the materials alone for a cheaper price. they said they will provide material only along with a course. and that course costs 20000! i was heart broken! i desperately need some standard books. i would be greatly thankful if someone is will to donate extra materials or old materials! PG is my only hope. so please help me! thank you all
but those books are really confusing and deviated from the actual CAT questions.i dont have a pc too. so i cant refer any online materials. i spend 4 hours daily for preparing CAT. my friend advised me that 4 hours of such preparations=1 hour of preparation by using standard materials like TIME,IMS. i went to TIME and ask them whether i can get the materials alone for a cheaper price. they said they will provide material only along with a course. and that course costs 20000! i was heart broken! i desperately need some standard books. i would be greatly thankful if someone is will to donate extra materials or old materials! PG is my only hope. so please help me! thank you all
There is dedicated thread to request/donate study materials. I hope you will find some materials here http://www.pagalguy.com/forums/prep-resources/2010-requests-offers-donate-your-old-cat-material-strictly-no-buying-slash-selling-t-39056/p-1489185?page=155
ATB 

OAs RC 20/03/2013

97. c
The author mentions this in the first paragraph where
he talks about the open and the hidden levels and the
underlying meaning which is understandably hidden:
“There is in fact…..details'. This makes choice (c)
correct.
he talks about the open and the hidden levels and the
underlying meaning which is understandably hidden:
“There is in fact…..details'. This makes choice (c)
correct.
98. a
The second paragraph delves into this difference and
the author mentions that: “And if we
agree……pervading society”. These lines make it
obvious that choice (a) is correct.
the author mentions that: “And if we
agree……pervading society”. These lines make it
obvious that choice (a) is correct.
99. b
The author mentions these in the second paragraph
and then explicates: “The field…..they suggest”. This
makes choice (b) correct.
and then explicates: “The field…..they suggest”. This
makes choice (b) correct.
100. b
The author makes this point in paragraph two when
he talks about the work of James Carse. In the last
line, he mentions: “Without doubt….final one.”. This
makes choice (b) correct.
he talks about the work of James Carse. In the last
line, he mentions: “Without doubt….final one.”. This
makes choice (b) correct.
Happy CATing 

RC of the Day 21/03/2013
21. Which one of these is incorrect regarding surveillance?
a. Coordination and control are important to the understanding of surveillance.
b. Computers have recently become the most vital medium for this.
c. Many developments related to computers were funded by institutions interested in surveillance.
d. They might possibly result in greater benefits for consumers and citizens.
Cyberspace is often thought of as a realm of freedom, even of fun. At least until recently, few would have
associated surveillance with cyberspace. The “cyber” prefix has been attached to fiction (“cyberpunk”), and
to fashion, as well as to entertainment, education, finance, architecture, and city planning. Cyberjaya,
within the Malaysian multimedia Super Corridor, is one of the world's first cities to include “cyber” in its
name. This in itself is paradoxical, because at first cyberspace was popularly associated with the immaterial,
the virtual, the displaced, and the disembodied. In William Gibson's novel, Neuromancer, cyberspace
seems to be apart from the corporeal, institutional world. But in Cyberjaya, the integration of the built
environment and the global economy with 'cyberspace' is taken for granted. The fibre-optic broadband links
that provide the infrastructure for cyberspace are tied to government plans and a changing economy, but
not necessarily to surveillance.
In Asian countries, no less than in others outside Asia, cyberspace is a realm of surveillance. Personal
data is gathered, sorted, stored, traded and processed for the purpose of management, influence, and
social control. Most innocent, seemingly, would be the efforts of e-commerce online marketers to use
customer profiles to create consumer clusters in order to target specific persons and groups for advertising
and solicitation. Most sharply, perhaps, would be the use of Internet data tracking techniques to discover
the whereabouts and plans of Al Qaeda members since the devastating “terrorist” attacks of September 11,
2001. In March, 2002, for instance, American Internet intelligence experts detected Al Qaeda email-use
patterns in Malaysia as well as Afghanistan and Pakistan. At either end of this spectrum, I shall argue, that some critical questions are raised about the “hidden face” of the Internet. Although it is acknowledged that
civil society may use the Internet, in reality it is used in Asian countries as elsewhere for repressive and
illiberal surveillance purposes.
Whatever freedom and fun may be generated in cyberspace, the reality is that the Internet does not create
a “space apart”, a realm of technologically enabled liberty. Rather, as the Internet is increasingly integrated
with everyday life, it provides some new ways of engaging in old practices. It may well be that our relationship
to our bodies alters, subtly, as we are able to do more things at a distance. Organizational behaviours and
expectations may also develop in new ways as the Internet and its associated intranets become embedded
in bureaucratic routines. It may well be that we can discern changes in the very notions of time and space
that structure human social activity. But none of this means that fundamental changes in social relationships,
and especially in the political economy of power, are occurring. It is easy to forget that even in Gibson's
novel, however much utopian cyberpunks may have been.
While not wishing to promote dystopian perspectives on the Internet, it would be irresponsible to ignore
what might be thought of as a dark side, a hidden face of cyberspace. This has to do with how we conceive
of cyberspace. For a brief period in the 1990s, it seemed to some that cyberspace had only a bright side.
Sociologically, however, it is appropriate to use the term “cyberspace” to connote the convergence of what
were once thought of as different spheres: information technologies and telecommunications. The computing
machinery provides the media with flows of information. Cyberspace, then, refers to the social and cultural
relations involved in computer-mediated communication. Even if we avoid referring to cyberspace and use the more precise-sounding term “Internet'” there is no escaping the social shaping and thus mixed influences
on its development.
The Internet is by definition a techno-social, evolving medium. It is in many ways a process rather than a
“thing.” Janet Abbate says, “The turbulent history of the Internet may be a reminder of the very real material
consideration that lie behind this technology and of their political and economic consequences.” Abbate
has in mind in particular the American military concerns built into the Internet at its origin, but also networking
philosophies in other countries, and end users everywhere, which help to shape the Internet as a medium
of communication, using electronic mail and the World Wide Web. Like other technological innovations,
the Internet represents human social activity, and as such manifests all the ambiguities and contradictions
that are common to such activity.
The particular “material considerations” discussed here are ones that relate to the coordination and control
capacities of the Internet. Just as it is a mistake to focus on the supposedly virtual aspects of the Internet,
as if these were separate from bodily life in geographical places, so it is wrong to think of cyberspace as a
new domain of human activity. Rather, the Internet is superimposed upon and integrated with already
existing forms of communication. In a world where nation states have simultaneously been trying to shore
up their cultural and social defences while ceding much power of regulation to the marketplace, new media
of communication such as the Internet have become increasingly significant. The capacities of cyberspace
for information processing have a huge impact both on how nation states govern their populations and how
corporations marshal the behaviour of consumers. These are the processes that I refer to as “surveillance”.
Surveillance is personal data processing for particular purposes. Put another way, surveillance is focused
attention on behaviours and trends of persons and of populations with a view to manage, control, protect,
or influence them. Coordination and control are thus built into this understanding of surveillance. In the last
quarter of the twentieth century, computers became the vital medium of surveillance, allowing collected
data to be stored, matched, retrieved, processed, marketed, and circulated. Above all searchable databases
became the key to surveillance practices, permitting new levels of classifying, categorizing and cataloguing
of personal data. This is generated by systems of the kind that permit citizens to gain online access to
government departments or that seek niche' markets in specific neighbourhoods of people with similar
socio-economic characteristics. Similarly, these systems have an impact on organizational practices of
human resource management and of policing. It is worth stressing that activities such as these may be
construed positively. They permit greater efficiency and speed, and may well result in increased benefit for
citizens and consumers, who experience them as enhancing their comfort, convenience, and safety.
Without suggesting that surveillance is intrinsically sinister, however, it must be admitted that all forms of
human categorizing and classifying carry risks. During the same quarter century as computers became
established in administration, questions were raised, protests mounted, and regulation emerged, mainly in
an effort to protect personal data and to try to safeguard privacy. Laudable results of this include the
development of Fair Information Practices, the European Data Protection Directive, and the OECD Guidelines
for handling personal data. Several Asian countries, including Java and Korea, base their management of
computer-based personal information held by government departments on the OECD Guidelines, while
others such as Malaysia and Hong Kong refer positively to those Guidelines.
But by the 1990s, the emergence of the Internet as a medium for commercial, management, policing, and
government activities including military intelligence and war-making spelled the birth of cyberspace.
associated surveillance with cyberspace. The “cyber” prefix has been attached to fiction (“cyberpunk”), and
to fashion, as well as to entertainment, education, finance, architecture, and city planning. Cyberjaya,
within the Malaysian multimedia Super Corridor, is one of the world's first cities to include “cyber” in its
name. This in itself is paradoxical, because at first cyberspace was popularly associated with the immaterial,
the virtual, the displaced, and the disembodied. In William Gibson's novel, Neuromancer, cyberspace
seems to be apart from the corporeal, institutional world. But in Cyberjaya, the integration of the built
environment and the global economy with 'cyberspace' is taken for granted. The fibre-optic broadband links
that provide the infrastructure for cyberspace are tied to government plans and a changing economy, but
not necessarily to surveillance.
In Asian countries, no less than in others outside Asia, cyberspace is a realm of surveillance. Personal
data is gathered, sorted, stored, traded and processed for the purpose of management, influence, and
social control. Most innocent, seemingly, would be the efforts of e-commerce online marketers to use
customer profiles to create consumer clusters in order to target specific persons and groups for advertising
and solicitation. Most sharply, perhaps, would be the use of Internet data tracking techniques to discover
the whereabouts and plans of Al Qaeda members since the devastating “terrorist” attacks of September 11,
2001. In March, 2002, for instance, American Internet intelligence experts detected Al Qaeda email-use
patterns in Malaysia as well as Afghanistan and Pakistan. At either end of this spectrum, I shall argue, that some critical questions are raised about the “hidden face” of the Internet. Although it is acknowledged that
civil society may use the Internet, in reality it is used in Asian countries as elsewhere for repressive and
illiberal surveillance purposes.
Whatever freedom and fun may be generated in cyberspace, the reality is that the Internet does not create
a “space apart”, a realm of technologically enabled liberty. Rather, as the Internet is increasingly integrated
with everyday life, it provides some new ways of engaging in old practices. It may well be that our relationship
to our bodies alters, subtly, as we are able to do more things at a distance. Organizational behaviours and
expectations may also develop in new ways as the Internet and its associated intranets become embedded
in bureaucratic routines. It may well be that we can discern changes in the very notions of time and space
that structure human social activity. But none of this means that fundamental changes in social relationships,
and especially in the political economy of power, are occurring. It is easy to forget that even in Gibson's
novel, however much utopian cyberpunks may have been.
While not wishing to promote dystopian perspectives on the Internet, it would be irresponsible to ignore
what might be thought of as a dark side, a hidden face of cyberspace. This has to do with how we conceive
of cyberspace. For a brief period in the 1990s, it seemed to some that cyberspace had only a bright side.
Sociologically, however, it is appropriate to use the term “cyberspace” to connote the convergence of what
were once thought of as different spheres: information technologies and telecommunications. The computing
machinery provides the media with flows of information. Cyberspace, then, refers to the social and cultural
relations involved in computer-mediated communication. Even if we avoid referring to cyberspace and use the more precise-sounding term “Internet'” there is no escaping the social shaping and thus mixed influences
on its development.
The Internet is by definition a techno-social, evolving medium. It is in many ways a process rather than a
“thing.” Janet Abbate says, “The turbulent history of the Internet may be a reminder of the very real material
consideration that lie behind this technology and of their political and economic consequences.” Abbate
has in mind in particular the American military concerns built into the Internet at its origin, but also networking
philosophies in other countries, and end users everywhere, which help to shape the Internet as a medium
of communication, using electronic mail and the World Wide Web. Like other technological innovations,
the Internet represents human social activity, and as such manifests all the ambiguities and contradictions
that are common to such activity.
The particular “material considerations” discussed here are ones that relate to the coordination and control
capacities of the Internet. Just as it is a mistake to focus on the supposedly virtual aspects of the Internet,
as if these were separate from bodily life in geographical places, so it is wrong to think of cyberspace as a
new domain of human activity. Rather, the Internet is superimposed upon and integrated with already
existing forms of communication. In a world where nation states have simultaneously been trying to shore
up their cultural and social defences while ceding much power of regulation to the marketplace, new media
of communication such as the Internet have become increasingly significant. The capacities of cyberspace
for information processing have a huge impact both on how nation states govern their populations and how
corporations marshal the behaviour of consumers. These are the processes that I refer to as “surveillance”.
Surveillance is personal data processing for particular purposes. Put another way, surveillance is focused
attention on behaviours and trends of persons and of populations with a view to manage, control, protect,
or influence them. Coordination and control are thus built into this understanding of surveillance. In the last
quarter of the twentieth century, computers became the vital medium of surveillance, allowing collected
data to be stored, matched, retrieved, processed, marketed, and circulated. Above all searchable databases
became the key to surveillance practices, permitting new levels of classifying, categorizing and cataloguing
of personal data. This is generated by systems of the kind that permit citizens to gain online access to
government departments or that seek niche' markets in specific neighbourhoods of people with similar
socio-economic characteristics. Similarly, these systems have an impact on organizational practices of
human resource management and of policing. It is worth stressing that activities such as these may be
construed positively. They permit greater efficiency and speed, and may well result in increased benefit for
citizens and consumers, who experience them as enhancing their comfort, convenience, and safety.
Without suggesting that surveillance is intrinsically sinister, however, it must be admitted that all forms of
human categorizing and classifying carry risks. During the same quarter century as computers became
established in administration, questions were raised, protests mounted, and regulation emerged, mainly in
an effort to protect personal data and to try to safeguard privacy. Laudable results of this include the
development of Fair Information Practices, the European Data Protection Directive, and the OECD Guidelines
for handling personal data. Several Asian countries, including Java and Korea, base their management of
computer-based personal information held by government departments on the OECD Guidelines, while
others such as Malaysia and Hong Kong refer positively to those Guidelines.
But by the 1990s, the emergence of the Internet as a medium for commercial, management, policing, and
government activities including military intelligence and war-making spelled the birth of cyberspace.
16. What does the author find interesting about Cyberjava?
a. A South East Asian country has built a Multimedia Super Corridor before any of the developed
countries.
b. 'Cyber' was coined to build to refer to the virtual world and Cyberjava is a concrete reality.
c. William Gibson coined the term with a negative association and in this case it is used positively.
d. The name is used for a corridor linking the third world countries with the first world.
a. A South East Asian country has built a Multimedia Super Corridor before any of the developed
countries.
b. 'Cyber' was coined to build to refer to the virtual world and Cyberjava is a concrete reality.
c. William Gibson coined the term with a negative association and in this case it is used positively.
d. The name is used for a corridor linking the third world countries with the first world.
17. The author used the term “hidden face” of the Internet to mean?
a. The use of internet by the civil society to extend freedoms.
b. The potent yet untapped power of the Internet.
c. The use of Internet for illiberal surveillance purposes.
d. The use of Internet to track terrorists.
a. The use of internet by the civil society to extend freedoms.
b. The potent yet untapped power of the Internet.
c. The use of Internet for illiberal surveillance purposes.
d. The use of Internet to track terrorists.
18. Why does the author think that the Internet does not create a “space apart”?
a. It merely facilitates newer ways of doing old things.
b. It allows organizational behaviours to be developed in new ways.
c. Internet is a creation of energy running through fibre optics which by itself, cannot create any
space.
d. Its ability to fundamentally alter social relationships has been cured by various regulations.
a. It merely facilitates newer ways of doing old things.
b. It allows organizational behaviours to be developed in new ways.
c. Internet is a creation of energy running through fibre optics which by itself, cannot create any
space.
d. Its ability to fundamentally alter social relationships has been cured by various regulations.
19. According to Janet Abbate, what is not an instance of the “turbulent history” of the Internet?
a. The American military concerns built into the Internet at its origin.
b. Networking philosophies in countries.
c. End users who are present all over the world.
d. The network between small corporations and the US government.
a. The American military concerns built into the Internet at its origin.
b. Networking philosophies in countries.
c. End users who are present all over the world.
d. The network between small corporations and the US government.
20. What is the strongest reason against proclaiming cyberspace as a new domain of human activity?
a. It merely falls into place with the rest of the forms of communication.
b. It is possible when there are two end users who cease to exist in isolation.
c. It superimposes and dominates the existing forms of communication.
d. It is impossible to separately delineate the domain of the cyberspace as it is not the dominant
paradigm in all aspects of life.
a. It merely falls into place with the rest of the forms of communication.
b. It is possible when there are two end users who cease to exist in isolation.
c. It superimposes and dominates the existing forms of communication.
d. It is impossible to separately delineate the domain of the cyberspace as it is not the dominant
paradigm in all aspects of life.
21. Which one of these is incorrect regarding surveillance?
a. Coordination and control are important to the understanding of surveillance.
b. Computers have recently become the most vital medium for this.
c. Many developments related to computers were funded by institutions interested in surveillance.
d. They might possibly result in greater benefits for consumers and citizens.
22. Which of these is not mentioned in the context of steps taken to safeguard privacy?
a. OECD Protection Directive
b. European Data Protection Directive
c. OECD Guidelines for handling personal data
d. Fair Information Practices
a. OECD Protection Directive
b. European Data Protection Directive
c. OECD Guidelines for handling personal data
d. Fair Information Practices
23. The author refers to the appropriate definition of terms such as Internet, Cyberspace, etc. to indicate
a. That the impact of computers has affected society so deeply, that its definitions are dynamic.
b. That besides the well-known bright side to the Internet, there is a dark side which should be
understood.
c. That the social and cultural skeins are so closely intertwined with our understanding of the
Internet that they have become extremely complicated.
d. None of the above
a. That the impact of computers has affected society so deeply, that its definitions are dynamic.
b. That besides the well-known bright side to the Internet, there is a dark side which should be
understood.
c. That the social and cultural skeins are so closely intertwined with our understanding of the
Internet that they have become extremely complicated.
d. None of the above
Happy CATing 

and Please Don't quote and Reply
Just Post and Wait For the answer
regards
Miseera
RC of the day 21/03/13
b
c
b
d
c
c
d
d
RC of the Day..
B
C
D
D
Left the rest....too big a passage to be read on my phone...
@miseera Bhai paragraphs ka pata bhi nai chal raha hai.....See if you can do something about the formatting before you post the RCs...agar possible hai toh thoda format kar diya karo...
Its important to know where the para ends and where a new para starts...
this passage seemed like on of those endless articles....
RC of the day 21/03/13
16)c
17)c
18)d
19)d
20)a
21)c
22)a
23)b
RC of the Day 21/03/2013
b
c
a
d
c
c
a
b
b
c
a
d
c
c
a
b
OAs RC 21/03/2013

16. b
The author mentions this in the first paragraph — “This
in itself….for granted”. This makes choice (b) correct.
in itself….for granted”. This makes choice (b) correct.
17. c
The author uses this term in the second paragraph.
Out of the options present, choice (c) is apt and
correct.
Out of the options present, choice (c) is apt and
correct.
18. a
The author uses the phrase in the third paragraph and
goes on to say — “Rather…old practices”, which is
best stated by choice (a). Therefore, this is the correct
choice.
goes on to say — “Rather…old practices”, which is
best stated by choice (a). Therefore, this is the correct
choice.
19. d
Janet Abbate is quoted as mentioning the significance
of the turbulent history of the Internet. Option (d) is not
mentioned in the passage, and hence is the correct
choice.
of the turbulent history of the Internet. Option (d) is not
mentioned in the passage, and hence is the correct
choice.
20. a
The author mentions this in paragraph 6. He says,
“Rather, the … communication”. Sentence (a) states
this most aptly, and is the correct choice.
“Rather, the … communication”. Sentence (a) states
this most aptly, and is the correct choice.
21. c
The various aspects of surveillance are dealt with in
paragraph7. The author mentions all of these except
choice (c), which is not mentioned. Hence, this is the
correct choice.
paragraph7. The author mentions all of these except
choice (c), which is not mentioned. Hence, this is the
correct choice.
22. a
The last paragraph mentions the various steps and
guidelines. OECD Protection Directive is not mentioned,
making it the correct choice.
guidelines. OECD Protection Directive is not mentioned,
making it the correct choice.
23. b
This issue is considered in the fourth paragraph and
the author states that —“While not wishing … we
conceive of cyberspace”. This makes choice (b) the
correct one.
the author states that —“While not wishing … we
conceive of cyberspace”. This makes choice (b) the
correct one.
Happy CATing 
