ibps specialist officer previous year question

Embed Size (px)

Citation preview

  • 8/13/2019 ibps specialist officer previous year question

    1/28

    2012 question

    1. A special type gateway that can keep external users fromaccessing resources on the LAN users access the external info iscalled:

    A. epeater

    !. "irewall

    #. $ncryption

    %. &u'

    $. None of these2. (hat is the name gi)en to the exchange of control signals which is

    necessary for esta'lishing a connection 'etween a modem and acomputer at one end of a line and another modem and computer atthe other end*

    A. &andshaking

    !. +odem options

    #. ,rotocol

    %. All of these

    $. None of these

    -. n /L which command is used to changes data in a data ta'le*

    A. ,%A3$

    !. N/$3

    #. !4(/$

    %. A,,$N%

    $. None of these

  • 8/13/2019 ibps specialist officer previous year question

    2/28

    5. n /L which of the following is not a data definition languagecommand*

    A. $NA+$

    !. $647$

    #. 8AN3

    %. ,%A3$

    $. None of these

    9. (hich commands; is are; used to redefine a column of the ta'lein /L *

    A. AL3$ 3A!L$!. %$"N$ 3A!L$

    #. +4%"< 3A!L$

    %. ALL of the these

    $. None of these

    =. n a relational schema each tuple is di)ided into fields called

    A. elations

    !. %omains

    #. ueries

    %. All of the these

    $. None of these

    >. An indexing operation

    A. /orts a file using a single key

    !. /orts file using two keys

    #. $sta'lishes an index for a file

    %. !oth 1; and -;

  • 8/13/2019 ibps specialist officer previous year question

    3/28

    $. None of these

    ?. %ata security threats include

    A. &ardware failure

    !. ,ri)acy in)asion

    #. "raudulent manipulation of data

    %. All of these

    $. None of these

    @. 3he language used in application programs to request data fromthe %!+/ is referred to as the

    A. %+L

    !. %%L

    #. uery language

    %. %#L

    $. None of these

    10. A contains the smallest unit of meaningful data so you

    might call it the 'asic 'uilding 'lock for a data file.

    A. "ile structures

    !. ecords

    #. "ields

    %. %ata'ase

    $. None of these

    11. A means that one record in a particular record type isrelated to only one record of another record type.

    A. 4ne to one relationship

    !. 4ne to many relationship

  • 8/13/2019 ibps specialist officer previous year question

    4/28

    #. +any toone relationship

    %. +any to many relationship

    $. None of these

    12. 3hrough linked list one can implement

    A. /tack

    !. 8raph

    #. ueue

    %. All of these

    $. None of these

    1-. A heap allows a )ery efficient implementation of a

    A. %ou'led ended queue

    !. ,riority queue

    #. /tack

    %. 3rees

    $. None of these

    15. n files there is a key associated with each record which isused to differentiate among different records. "or e)ery file there isat least one set of keys that is unique. /uch a 7ey is called

    A. nique key

    !. ,rime attri'ute

    #. ndex key

    %. ,rimary 7ey

    $. Null key

    19. is primarily used for mapping host names and emaildestinations to , address 'ut can also 'e used for other purposes.

  • 8/13/2019 ibps specialist officer previous year question

    5/28

    A. 3#,transfer control protocol;

    !. %N/%omain Name /ystem;

    #. /&A /ecure &ash Algorithm;

    %. /imple Network +anagement ,rotocol /N+,;

    $. None of these

    1=. 4)erride is a method

    A. "or an operation that replaces an inherited method for thesame operation

    !. "or a data that replaces an inherited method for the same

    operation#. "or an operation that takes arguments form li'rary function

    %. All of these

    $. None of these

    1>. Local )aria'les

    A. Are created outside a 'lock

    !. Are known only to that 'lock

    #. #ontinue to exist when their 'lock ends

    %. Are illegal in #BB

    $. None of these

    1?. is )irus that inserts itself into a systemCs memory. 3henit take num'er of actions when an infected file is executed.

    A. (e' scripting )irus

    !. ,olymorphic )irus

    #. +acro )irus

    %. !oot sector )irus

  • 8/13/2019 ibps specialist officer previous year question

    6/28

    $. esident )irus

    1@. 3his data mining technique deri)es rules from real worldcase examples.

    A. (aterfall model

    !. A%

    #. (hite !ox

    %. /piral model

    $. #ase 'ased reasoning

    20. 3he remains operati)e until the software is required.

    A. (aterfall model

    !. ncremental model

    #. /piral model

    %. ,rototyping model

    $. ncremental model

    21. %ata mining e)ol)e as a mechanism to cater the limitations of systems to deal massi)e data sets with high dimensionalitynew data type multiple heterogeneous data resource etc.

    A. 4L3,

    !. 4LA,

    #. %//

    %. %(&

    $. None of these

    22. An important application of cryptography used incomputeriDed commercial and financial transaction

    ". %ata mining

  • 8/13/2019 ibps specialist officer previous year question

    7/28

    8. %ata warehousing

    &. %igital signature

    . +edia con)ergence

    E. None of these

    2-. ows of a relation are called:

    7. elation

    L. 3uples

    +.%ata structure

    N. An entity

    4. None of these

    25. 3he draw'acks of the 'inary tree sort are remedied 'y the

    ,. Linear sort

    . uick /ort

    . &eap /ort

    /. nsertion /ort

    3. None of these

    29. (hich layer of 4/ determines the interface of the systemwith the user*

    . Network

    6. Application

    (.%ata link

    F. /ession

  • 8/13/2019 ibps specialist officer previous year question

    8/28

    Question 26-50

    GHIJ;1K 3he tracks on a disk which can 'e accused withoutrepositioning the ( heads is

    A. /urface

    !. #ylinder

    #. #luster

    %. All of these

    $. None of these

    1. (hich of the following is true a'out 8s*

    A. 3hey make computers easier to use for nonprofessionals

    !. 3hey use icons and menus that users can select with amouse

    #. !oth 1; and 2;

    %. All of the these

    $. None of these

    2. A computer system consisting of its processor memory and 4de)ices accepts data processes it and produces the output results.#an you tell in which component is the raw data fed*

    A. +ass +emory

    !. +ain +emory

    #. Logic nit

    %. Arithmetic unit$. None of these

    -. 3he mechanical diskette dri)e in which you insert your diskette isconnected to the computerCsM'us

    A. %ata

  • 8/13/2019 ibps specialist officer previous year question

    9/28

    !. #ommunication

    #. Address

    %. ,arallel

    $. None of these

    5. A set of programs that handle firmCs data'ase responsi'ilities iscalled a

    A. %ata 'ase +anagement /ystem %!+/;

    !. %ata !ase ,rocessing /ystem %!,/;

    #. %ata +anagement /ystem %+/;

    %. All of these

    $. None of these

    9.

  • 8/13/2019 ibps specialist officer previous year question

    10/28

    $. None of these

    >. 3he process of transferring data intended for a peripheral de)iceinto a disk or intermediate store; so that it can 'e transferred to

    peripheral at a more con)enient time or in 'ulk is known asA. +ultiprogramming

    !. /pooling

    #. #aching

    %. 6irtual programming

    $. None of these

    ?. (hich of the following system program forgoes the production ofo'ect code to generate a'solute machine code and load it into thephysical main storage location from which it will 'e executedimmediately upon completion of the assem'ly*

    A. 3wo pass assem'ler

    !. Load and go assem'ler

    #. +acro processor

    %. #ompiler

    $. None of these

    1. elocation 'its used 'y relocating loader are specificallygenerated; 'y:

    A. elocating loader itself

    !. Linker#. Assem'ler or translator

    %. +acro processor

    $. None of these

  • 8/13/2019 ibps specialist officer previous year question

    11/28

    2. "rom what location are the 1st computer instructions a)aila'le on'oot up *

    A. 4+ !4/

    !. #,

    #. !oot.ini

    %. #4N"8./

  • 8/13/2019 ibps specialist officer previous year question

    12/28

    !. $ncapsulation

    #. ,olymorphism

    %. !inding

    $. None of these

    2. n $ diagrams the term cardinality is a synonym for the termM

    A. Attri'ute

    !. %egree

    #. $ntities

    %. #artesian

    $. None of these

    1. An oracle ser)er indexM

    A. s a schema o'ect

    !. s used to speed up the retrie)al of rows 'y using a pointer

    #. s independent of the ta'le it indexes

    %. All of these

    $. None of these

    2. (hich of the following is not a context free grammar components*

    A. 3erminal sym'ols

    !. Nonterminal sym'ol

    #. ,roduction line

    %. List

    $. None of these

    1. (hich of the following is a phase of A% model*

  • 8/13/2019 ibps specialist officer previous year question

    13/28

    A. !usiness modeling

    !. %ata modeling

    #. Application generation

    %. All of the a'o)e

    $. None of these

    1. is a set design steps that allows a %"% with transform flowcharacteristics to 'e mapped into a predefined template forprogram structure.

    A. 3ransaction flow

    !. #ontri'utor

    #. 3ransform mapping

    %. %esign e)aluation

    $. None of these

    1. A com'inational logic circuit which is used to send data comingfrom a single source to two or more separate destinations is called

    as

    A. %ecoder

    !. $ncoder

    #. +ultiplexer

    %. %emultiplexer

    $. None of these

    1. (hich of the following is a uni)ersal gate*

    A. AN%

    !. 4

    #. $F4

  • 8/13/2019 ibps specialist officer previous year question

    14/28

    %. NAN%

    $. None of these

    1. 3he twoCs compliment of 'inary num'er 010111.1100 is

    A. 101001.1100

    !. 101000.0100

    #. 010111.0011

    %. 101000.0011

    $. None of these

    1. n ?0?= the o)erflow flag is set when

    A. 3he sum is more than 1= 'its

    !. /igned num'ers go out their range after an arithmeticoperation

    #. #arry and sign flags are set

    %. %uring su'traction

    $. None of these

    1. (hat does microprocessor speed depends on*

    A. #lock

    !. %ata 'us width

    #. Address 'us width

    %. All of these

    $. None of these

    1. 3he 3A, is one of the interrupts a)aila'le its N3$L ?0?9. (hichone statement is true of 3A,*

    A. t is le)el triggered

  • 8/13/2019 ibps specialist officer previous year question

    15/28

    !. t is negati)e edge triggered t is positi)e edge triggered

    #. t is positi)e edge triggered

    %. t is 'oth positi)e edge triggered and le)el triggered

    $. None of these

    201- question

    1. (hich of the following microprocessors is not ?'it microprocessor*1. ?0?9

    2. =902

    -. O?0

    5. =?000

    9. None of these

    2. +icroprocessor ?0?9 is the enhanced )ersion of which essentiallythe same construction set

    1. =?00

    2. ?0?0

    -. =?00A

    5. ?000

    9. All of these

    -. (hich of the following interrupts has the lowest priority*

    1. /3 9.9

    2. /3 >.9

    -. 3A,

    5. N3

    9. None of these

    5. 3he %ata control language %#L;.

  • 8/13/2019 ibps specialist officer previous year question

    16/28

    1. is used to manage user access to data 'ases

    2. is used to manipulate the contents of a data'ase in someform

    -. !oth 1; and 2;

    5. sed for inserting deleting and updating data in a data'ase

    9. None of these

    9. A collection of fields is called a record with respect of %!+/ arecord corresponds to

    1. 3uple

    2. elation-. "ile

    5. Attri'ute

    9. None of these.

    =. +ultiplexer means

    1. 4ne into many

    2. +any into one

    -. +any into many

    5. All of these

    9. None of these

    >. (hich gate is known as uni)ersal gate *

    1. N43 gate

    2. NAN% gate

    -. AN% gate

    5. F4 gate

    9. None of the a'o)e

  • 8/13/2019 ibps specialist officer previous year question

    17/28

    ?. (hich of the following is the first integrated logic family*

    1. 3#L

    2. 31L

    -. %3L

    5. +4/

    9. 3L

    @. A top to 'ottom relationship among the items in a data'ase isesta'lished 'y a

    1. &ierarchical schema

    2. Network /chema

    -. elational /chema

    5. !oth 1; and 2;

    9. !oth 2; and -;

    10. n the relational schema each tuple is di)ided into fieldscalled.

    1. elations

    2. %omains

    -. ueries

    5. !oth 1; and 2;

    9. !oth 1; and -;

    11. 3he modify operation is likely to 'e done after.

    1. %elete

    2. nsert

    -. Look up

    5. All of the a'o)e

  • 8/13/2019 ibps specialist officer previous year question

    18/28

    9. None of these

    12. 3he way a particular application )iews the data from thedata'ase that the application uses is a :

    1. +odule

    2. elational model

    -. /chema

    5. /u'schema

    9. None of these

    1-. (hich two files are used during operation of the %+!/*

    1. uery language and utilities

    2. %ata manipulation language and query language:

    -. %ata dictionary and transaction log

    5. %ata dictionary and query language

    9. None of these

    15. (hich normal form is considered adequate for relational

    data'ase design*

    1. 2 N"

    2. - N"

    -. 5 N"

    5. !#N"

    9. None of these

    19. An attri'ute of one matching the primary key another ta'le iscalled as

    1. "oreign key

    2. /econdary key

  • 8/13/2019 ibps specialist officer previous year question

    19/28

    -. #andidate key

    5. #omposite key

    9. None of these

    1=. (hich of the following /L commands can 'e used modifyexisting data in a data'ase ta'le*

    1. +4%". $ach node in a linked list must contain at least:

    1. 3hree fields

    2. "i)e fields

    -. "our fields

    5. 4ne fields

    9. 3wo fields

    1?. 3he a)erage num'er of key comparisons done in asuccessful sequential search in a list of length PnQ is

    1. Log n

    2. nR1;2

    -. n2

    5. nB1;2

    9. None of these

    1@. 3he order of the 'inary search algorithm is

    1. n

  • 8/13/2019 ibps specialist officer previous year question

    20/28

    2. n2

    -. nlogn;

    5. logn;

    9. None of these

    20. (hich of the following is useful in implementing quick sort*

    1. /tack

    2. /et

    -. List

    5. ueue

    9. None of these

    21. 4/ model consists of layers

    1. 3hree

    2. "i)e

    -. /ix

    5. $ight

    9. /e)en

    22. (hich data communication method is used to transmit thedata o)er a serial communication link.

    1. /implex

    2. "ull duplex

    -. &alf duplex5. !oth 1; and 2;

    9. !oth 2; and -;

    2-. $ncryption and decryption are functions of the layer.

    1. 3ransport

  • 8/13/2019 ibps specialist officer previous year question

    21/28

    2. /ession

    -. Application

    5. ,hysical

    9. ,resentation

    25. (hich of the following is not a connecting de)ice*

    1. !ridge

    2. 3rans recei)er

    -. outer

    5. epeater

    9. None of these

    29. epeaters function in the layer

    1. ,hysical

    2. %ata link

    -. Network

    5. !oth 1; and 2;

    9. None of these

    Question 26-50

    1. &ow many hosts are attached to each of the local area network atyour site*

    1. 12?

    2. 29=

    -. 295

    5. =5

    9. None of these

  • 8/13/2019 ibps specialist officer previous year question

    22/28

    1. (hich of the following types of software should we use if we oftenneed to create edit and print documents*

    1. (ord processing

    2. /pread sheet

    -. 4'ect program

    5. NF

    9. None of these

    1. 3hrashing

    1. #an always 'e a)oided 'y swapping

    2. s a natural consequence of )irtual memory system Alwaysoccurs on large computers

    -. #an 'e caused 'y poor paging algorithms

    5. None of these

    1. is present in spiral model

    1. #ode generator

    2. isk analysis

    -. #ode optimiDer

    5. eengineering

    9. None of these

    1. 3he approach used in top down analysis and design is :

    1. 3o identify the top le)el functions 'y com'ining many smallercomponents into a single entity

    2. 3o identify a top le)el function and then create hierarchy oflower le)el modules and components

  • 8/13/2019 ibps specialist officer previous year question

    23/28

    -. 3o prepare flowcharts after programming has 'eencompleted

    5. All of these

    9. None of these

    1. !2# ecommerce focuses on customer .

    1. espond to customer

    2. 4'tain customer feed'ack

    -. $sta'lish 'uyerseller transaction

    5. All of the a'o)e

    9. None of these

    ;1K 4LA, stands for

    1. 4nline Analytical proect

    2. 4nline Analytical pro'lem

    -. 4nline Application process

    5. 4nline Application ,ro'lem

    9. 4nline Analytical processing

    2. %ata mining is

    1. /toring data when in need

    2. Automatic extraction of patters of information

    -. /earching data on nternet

    5. All of these

    9. None of these

    -. %ecision support system are 'ased on analysis

  • 8/13/2019 ibps specialist officer previous year question

    24/28

    1. uery and reporting

    2. %ata mining

    -. 4LA,

    5. All of the a'o)e

    9. None of these

    5. 3he term push and pop is related to the

    1. Array

    2. Lists

    -. /tacks

    5. All of the a'o)e

    9. None of these

    9. 3he 'reak statement causes an exit.

    1. "rom the innermost loop only

    2. 4nly from the innermost switch

    -. "rom the loops and switches

    5. "rom the innermost loop or switch

    9. None of these

    =. !ackup procedure helps in

    1. estoring the operation whene)er there is a disk failure

    2. estoring 'oth application and system software whene)erthere is disk corruption

    -. estoring the data sites whene)er there is a system crash

    5. All of the a'o)e

    9. None of these

  • 8/13/2019 ibps specialist officer previous year question

    25/28

    >. /oftware testing is

    1. 3he process of demonstrating that error are not present

    2. 4ne process of esta'lishing confidence that a program does

    what it is supposed to do

    -. 3he process of executing a program to show that it is workingas per specifications

    5. 3he process of executing a program with the intent of findingerrors

    9. None of these

    ?. egression testing in primarily related to

    1. "unctional testing

    2. %ata flow testing

    -. %e)elopment testing

    5. +aintenance testing

    9. None of these

    @. (hich of the following is easiest software de)elopment processmodel*

    1. (aterfall +odel

    2. ,rototyping

    -. nteracti)e enhancement

    5. /piral model

    9. All of these

    1. !ankerCs algorithm for resource allocation deals with

    1. %eadlock pre)ention

    2. %eadlock a)oidance

  • 8/13/2019 ibps specialist officer previous year question

    26/28

    -. %eadlock reco)ery

    5. +utual exclusion

    9. All of these

    1. n ueues the items deleted at one end is called.

    1. ear

    2. "ront

    -. 3op

    5. !ase

    9. None of these

    1. ,ointer is used in

    1. %irect Addressing

    2. ndirect Addressing

    -. ndexed mode

    5. mmediate Addressing

    9. None of these

    2. An array can 'e passed in a functions in # language through

    1. S#all 'y )alueC only

    2. S#all 'y referenceC only

    -. !oth 1; I 2;

    5. #all 'y preference

    9. None of these

    -. &33, refers to

    1. &yper 3ext 3ransmission ,rotocol

  • 8/13/2019 ibps specialist officer previous year question

    27/28

    2. &yper 3ext 3ransfer ,rotocol

    -. &yper 3ext 3ie ,rotocol

    5. &yper 3ext 3otal ,rotocol

    9. None of these

    5. An email account includes a storage area often called a n;

    1. Attachment

    2. &yperlink

    -. +ail'ox

    5. p address

    9. None of these

    1. An; is a collection of information that determines which filesyou can access and which setting you use.

    1. Network

    2. ser account

    -. 4perating system

    5. "ile system

    9. None of these

    1. 3o print a document

    1. /elect the print command and then select 47

    2. /elect the eady printer and then select 47

    -. 3ype ,N3 and then press $nter

    5. #lose the document select the print command then select47

    9. None of these

  • 8/13/2019 ibps specialist officer previous year question

    28/28

    1. (hich part of the computer pro)ides only temporary storage offiles*

    1. 4+ memory

    2. ,rocessor

    -. &ard dri)e

    5. +other 'oard

    9. A+ memory

    1. (hat will 'e the output of PaQ in following code*

    TincludeUstdio.hV

    int main;

    int aW20X

    Y

    int aW10X

    printfPHdQa;X

    printfPHdQa;X return 0X

    Z

    answer choices

    1. 20 202. 10 20

    -. 20 10

    5. 10 10

    9. #ompilation $rror