18
1. A special type gateway that can keep external users from accessing resources on the LAN users access the external info is called: A. Repeater B. Firewall C. Encryption D. Hub E. None of these 2. What is the name given to the exchange of control signals which is necessary for establishing a connection between a modem and a computer at one end of a line and another modem and computer at the other end? A. Handshaking B. Modem options C. Protocol D. All of these E. None of these 3. In SQL, which command is used to changes data in a data table? A. UPDATE B. INSERT C. BROWSE D. APPEND E. None of these 4. In SQL, which of the following is not a data definition language command? A. RENAME B. REVOKE C. GRANT D. UPDATE E. None of these 5. Which command(s) is (are) used to redefine a column of the table in SQL ? A. ALTER TABLE B. DEFINE TABLE C. MODIFY TABLE D. ALL of the these E. None of these 6. In a relational schema, each tuple is divided into fields called A. Relations B. Domains C. Queries D. All of the these E. None of these

[IBPS-SPL] IT-Specialist Officer Previous Question Papers From 2012 and 2013 Exam Professional Knowledge Information Technology Section MCQs « Mrunal

Embed Size (px)

DESCRIPTION

very good for spl officer exam

Citation preview

Page 1: [IBPS-SPL] IT-Specialist Officer Previous Question Papers From 2012 and 2013 Exam Professional Knowledge Information Technology Section MCQs « Mrunal

1. A special type gateway that can keep external users from accessingresources on the LAN users access the external info is called:

A. RepeaterB. FirewallC. EncryptionD. HubE. None of these

2. What is the name given to the exchange of control signals which isnecessary for establishing a connection between a modem and a computerat one end of a line and another modem and computer at the other end?

A. HandshakingB. Modem optionsC. ProtocolD. All of theseE. None of these

3. In SQL, which command is used to changes data in a data table?A. UPDATEB. INSERTC. BROWSED. APPENDE. None of these

4. In SQL, which of the following is not a data definition language command?A. RENAMEB. REVOKEC. GRANTD. UPDATEE. None of these

5. Which command(s) is (are) used to redefine a column of the table in SQL ?A. ALTER TABLEB. DEFINE TABLEC. MODIFY TABLED. ALL of the theseE. None of these

6. In a relational schema, each tuple is divided into fields calledA. RelationsB. DomainsC. QueriesD. All of the theseE. None of these

Page 2: [IBPS-SPL] IT-Specialist Officer Previous Question Papers From 2012 and 2013 Exam Professional Knowledge Information Technology Section MCQs « Mrunal

7. An indexing operationA. Sorts a file using a single keyB. Sorts file using two keysC. Establishes an index for a fileD. Both (1) and (3)E. None of these

8. Data security threats includeA. Hardware failureB. Privacy invasionC. Fraudulent manipulation of dataD. All of theseE. None of these

9. The language used in application programs to request data from the DBMSis referred to as the

A. DMLB. DDLC. Query languageD. DCLE. None of these

10. A ___ contains the smallest unit of meaningful data, so you might call it thebasic building block for a data file.

A. File structuresB. RecordsC. FieldsD. DatabaseE. None of these

11. A ___ means that one record in a particular record type is related to onlyone record of another record type.

A. One to one relationshipB. One to many relationshipC. Many toone relationshipD. Many to many relationshipE. None of these

12. Through linked list one can implementA. StackB. GraphC. QueueD. All of theseE. None of these

Page 3: [IBPS-SPL] IT-Specialist Officer Previous Question Papers From 2012 and 2013 Exam Professional Knowledge Information Technology Section MCQs « Mrunal

13. A heap allows a very efficient implementation of aA. Doubled ended queueB. Priority queueC. StackD. TreesE. None of these

14. In files, there is a key associated with each record which is used todifferentiate among different records. For every f ile there is at least one setof keys that is unique. Such a Key is called

A. Unique keyB. Prime attributeC. Index keyD. Primary KeyE. Null key

15. ____ is primarily used for mapping host names and email destinations to IPaddress but can also be used for other purposes.

A. TCP(transfer control protocol)B. DNS(Domain Name System)C. SHA (Secure Hash Algorithm)D. Simple Network Management Protocol (SNMP)E. None of these

16. Override is a methodA. For an operation that replaces an inherited method for the same

operationB. For a data that replaces an inherited method for the same operationC. For an operation that takes arguments form library functionD. All of theseE. None of these

17. Local variablesA. Are created outside a blockB. Are known only to that blockC. Continue to exist when their block endsD. Are illegal in C++E. None of these

18. ____ is virus that inserts itself into a system’s memory. Then it take numberof actions when an infected file is executed.

A. Web scripting virusB. Polymorphic virusC. Macro virus

Page 4: [IBPS-SPL] IT-Specialist Officer Previous Question Papers From 2012 and 2013 Exam Professional Knowledge Information Technology Section MCQs « Mrunal

D. Boot sector virusE. Resident virus

19. This ___ data mining technique derives rules from real world caseexamples.

A. Waterfall modelB. RADC. White BoxD. Spiral modelE. Case based reasoning

20. The ___ remains operative until the software is required.1. Waterfall model2. Incremental model3. Spiral model4. Prototyping model5. Incremental model

21. Data mining evolve as a mechanism to cater the limitations of ___ systemsto deal massive data sets with high dimensionality, new data type, multipleheterogeneous data resource etc.

A. OLTPB. OLAPC. DSSD. DWHE. None of these

22. An important application of cryptography, used in computerized commercialand financial transaction

A. Data miningB. Data warehousingC. Digital signatureD. Media convergenceE. None of these

23. Rows of a relation are called:A. RelationB. TuplesC. Data structureD. An entityE. None of these

24. The drawbacks of the binary tree sort are remedied by theA. Linear sortB. Quick Sort

Page 5: [IBPS-SPL] IT-Specialist Officer Previous Question Papers From 2012 and 2013 Exam Professional Knowledge Information Technology Section MCQs « Mrunal

C. Heap SortD. Insertion SortE. None of these

25. Which layer of OSI determines the interface of the system with the user?A. NetworkB. ApplicationC. Data linkD. SessionE. None of these

Question 26-50

26. The tracks on a disk which can be accused without repositioning the R/Wheads is

A. SurfaceB. CylinderC. ClusterD. All of theseE. None of these

27. Which of the following is true about GUIs?A. They make computers easier to use for nonprofessionalsB. They use icons and menus that users can select with a mouseC. Both (1) and (2)D. All of the theseE. None of these

28. A computer system consisting of its processor, memory and I/O devicesaccepts data, processes it and produces the output results .Can you tell inwhich component is the raw data fed?

A. Mass MemoryB. Main MemoryC. Logic UnitD. Arithmetic unitE. None of these

29. The mechanical diskette drive in which you insert your diskette is connectedto the computer’s—bus

A. DataB. CommunicationC. AddressD. ParallelE. None of these

Page 6: [IBPS-SPL] IT-Specialist Officer Previous Question Papers From 2012 and 2013 Exam Professional Knowledge Information Technology Section MCQs « Mrunal

30. A set of programs that handle firm’s database responsibilities is called aA. Data base Management System (DBMS)B. Data Base Processing System (DBPS)C. Data Management System (DMS)D. All of theseE. None of these

31. You are in the process of analyzing a problem that requires you to collectand store TCP/ IP Packets. Which of the following utilities is best suited forthis purpose?

A. NBTSTATB. Performance MonitorC. NETSTATD. Network MonitorE. DHCP Management Console

32. A top to bottom relationship among the items in a database is establishedby a

A. Hierarchical SchemaB. Network SchemaC. Relational SchemaD. All of the aboveE. None of these

33. The process of transferring data intended for a peripheral device into a disk(or intermediate store) so that it can be transferred to peripheral at a moreconvenient time or in bulk is known as

A. MultiprogrammingB. SpoolingC. CachingD. Virtual programmingE. None of these

34. Which of the following system program forgoes the production of objectcode to generate absolute machine code and load it into the physical mainstorage location from which it will be executed immediately upon completionof the assembly?

A. Two pass assemblerB. Load and go assemblerC. Macro processorD. CompilerE. None of these

35. Relocation bits used by relocating loader are specifically (generated) by:

Page 7: [IBPS-SPL] IT-Specialist Officer Previous Question Papers From 2012 and 2013 Exam Professional Knowledge Information Technology Section MCQs « Mrunal

A. Relocating loader itselfB. LinkerC. Assembler or translatorD. Macro processorE. None of these

36. From what location are the 1st computer instructions available on boot up ?A. ROM BIOSB. CPUC. Boot.iniD. CONFIG.SYSE. None of these

37. Abstraction isA. The act of representing the essential features of something without

including much detail.B. The act of representing the features of something much detailC. A tree structureD. All of theseE. None of these

38. Aggregation is a special for ofA. GeneralizationB. SpecializationC. AssociationD. ObjectE. None of these

39. Consider an operation of addition. For two numbers, the operating willgenerate a sum. If the operand are strings, and the same operation wouldproduce a third string by concatenation. This features is called ____.

A. InheritanceB. EncapsulationC. PolymorphismD. BindingE. None of these

40. In ER diagrams, the term cardinality is a synonym for the term—A. AttributeB. DegreeC. EntitiesD. CartesianE. None of these

41. An oracle server index—

Page 8: [IBPS-SPL] IT-Specialist Officer Previous Question Papers From 2012 and 2013 Exam Professional Knowledge Information Technology Section MCQs « Mrunal

A. Is a schema objectB. Is used to speed up the retrieval of rows by using a pointerC. Is independent of the table it indexesD. All of theseE. None of these

42. Which of the following is not a context free grammar components?A. Terminal symbolsB. Nonterminal symbolC. Production lineD. ListE. None of these

43. Which of the following is a phase of RAD model?A. Business modelingB. Data modelingC. Application generationD. All of the aboveE. None of these

44. ____ is a set design steps that allows a DFD with transform flowcharacteristics to be mapped into a predefined template for programstructure.

A. Transaction flowB. ContributorC. Transform mappingD. Design evaluationE. None of these

45. A combinational logic circuit which is used to send data coming from asingle source to two or more separate destinations is called as

A. DecoderB. EncoderC. MultiplexerD. DemultiplexerE. None of these

46. Which of the following is a universal gate?A. ANDB. ORC. EXORD. NANDE. None of these

47. The two’s compliment of binary number 010111.1100 is

Page 9: [IBPS-SPL] IT-Specialist Officer Previous Question Papers From 2012 and 2013 Exam Professional Knowledge Information Technology Section MCQs « Mrunal

A. 101001.1100B. 101000.0100C. 010111.0011D. 101000.0011E. None of these

48. In 8086 the overflow flag is set whenA. The sum is more than 16 bitsB. Signed numbers go out their range after an arithmetic operationC. Carry and sign flags are setD. During subtractionE. None of these

49. What does microprocessor speed depends on?A. ClockB. Data bus widthC. Address bus widthD. All of theseE. None of these

50. The TRAP is one of the interrupts available its INTEL 8085. Which onestatement is true of TRAP?

A. It is level triggeredB. It is negative edge triggered It is positive edge triggeredC. It is positive edge triggeredD. It is both positive edge triggered and level triggeredE. None of these

IBPS Specialist IT Officer Previous Paper 2013

Question 1 to 25

1. Which of the following microprocessors is not 8bit microprocessor?1. 80852. 65023. Z804. 680005. None of these

2. Microprocessor 8085 is the enhanced version of which essentially the sameconstruction set

1. 68002. 80803. 6800A4. 8000

Page 10: [IBPS-SPL] IT-Specialist Officer Previous Question Papers From 2012 and 2013 Exam Professional Knowledge Information Technology Section MCQs « Mrunal

5. All of these3. Which of the following interrupts has the lowest priority?

1. RST 5.52. RST 7.53. TRAP4. INTR5. None of these

4. The Data control language (DCL).1. is used to manage user access to data bases2. is used to manipulate the contents of a database in some form3. Both (1) and (2)4. Used for inserting, deleting and updating data in a database5. None of these

5. A collection of fields is called a record with respect of DBMS, a recordcorresponds to

1. Tuple2. Relation3. File4. Attribute5. None of these.

6. Multiplexer means1. One into many2. Many into one3. Many into many4. All of these5. None of these

7. Which gate is known as universal gate ?1. NOT gate2. NAND gate3. AND gate4. XOR gate5. None of the above

8. Which of the following is the first integrated logic family?1. TCL2. T1L3. DTL4. MOS5. RTL

9. A top to bottom relationship among the items in a database is established

Page 11: [IBPS-SPL] IT-Specialist Officer Previous Question Papers From 2012 and 2013 Exam Professional Knowledge Information Technology Section MCQs « Mrunal

by a1. Hierarchical schema2. Network Schema3. Relational Schema4. Both (1) and (2)5. Both (2) and (3)

10. In the relational schema, each tuple is divided into fields called.1. Relations2. Domains3. Queries4. Both (1) and (2)5. Both (1) and (3)

11. The modify operation is likely to be done after.1. Delete2. Insert3. Look up4. All of the above5. None of these

12. The way a particular application views the data from the database that theapplication uses is a :

1. Module2. Relational model3. Schema4. Subschema5. None of these

13. Which two files are used during operation of the DMBS?1. Query language and utilities2. Data manipulation language and query language:3. Data dictionary and transaction log4. Data dictionary and query language5. None of these

14. Which normal form is considered adequate for relational database design?1. 2 NF2. 3 NF3. 4 NF4. BCNF5. None of these

15. An attribute of one matching the primary key another table, is called as1. Foreign key

Page 12: [IBPS-SPL] IT-Specialist Officer Previous Question Papers From 2012 and 2013 Exam Professional Knowledge Information Technology Section MCQs « Mrunal

2. Secondary key3. Candidate key4. Composite key5. None of these

16. Which of the following SQL commands can be used modify existing data ina database table?

1. MODIFY2. UPDATE3. CHANGE4. NEW5. None of these

17. Each node in a linked list must contain at least:1. Three fields2. Five fields3. Four fields4. One fields5. Two fields

18. The average number of key comparisons done in a successful sequentialsearch in a list of length “n” is

1. Log n2. (n-1)/23. n/24. (n+1)/25. None of these

19. The order of the binary search algorithm is1. n

2. n2

3. nlog(n)4. log(n)5. None of these

20. Which of the following is useful in implementing quick sort?1. Stack2. Set3. List4. Queue5. None of these

21. OSI model consists of ____ layers1. Three2. Five

Page 13: [IBPS-SPL] IT-Specialist Officer Previous Question Papers From 2012 and 2013 Exam Professional Knowledge Information Technology Section MCQs « Mrunal

3. Six4. Eight5. Seven

22. Which data communication method is used to transmit the data over a serialcommunication link.

1. Simplex2. Full duplex3. Half duplex4. Both (1) and (2)5. Both (2) and (3)

23. Encryption and decryption are functions of the ____ layer.1. Transport2. Session3. Application4. Physical5. Presentation

24. Which of the following is not a connecting device?1. Bridge2. Trans receiver3. Router4. Repeater5. None of these

25. Repeaters function in the ___ layer1. Physical2. Data link3. Network4. Both (1) and (2)5. None of these

Question 26-50

26. How many hosts are attached to each of the local area network at your site?1. 1282. 2563. 2544. 645. None of these

27. Which of the following types of software should we use if we often need tocreate, edit and print documents?

1. Word processing

Page 14: [IBPS-SPL] IT-Specialist Officer Previous Question Papers From 2012 and 2013 Exam Professional Knowledge Information Technology Section MCQs « Mrunal

2. Spread sheet3. Object program4. UNIX5. None of these

28. Thrashing1. Can always be avoided by swapping2. Is a natural consequence of virtual memory system Always occurs on

large computers3. Can be caused by poor paging algorithms4. None of these

29. _____ is present in spiral model1. Code generator2. Risk analysis3. Code optimizer4. Reengineering5. None of these

30. The approach used in top down analysis and design is :1. To identify the top level functions by combining many smaller

components into a single entity2. To identify a top level function and then create hierarchy of lower level

modules and components3. To prepare flowcharts after programming has been completed4. All of these5. None of these

31. B2C ecommerce focuses on customer ___.1. Respond to customer2. Obtain customer feedback3. Establish buyerseller transaction4. All of the above5. None of these

32. OLAP stands for1. Online Analytical project2. Online Analytical problem3. Online Application process4. Online Application Problem5. Online Analytical processing

33. Data mining is1. Storing data when in need2. Automatic extraction of patters of information

Page 15: [IBPS-SPL] IT-Specialist Officer Previous Question Papers From 2012 and 2013 Exam Professional Knowledge Information Technology Section MCQs « Mrunal

3. Searching data on Internet4. All of these5. None of these

34. Decision support system are based on ____ analysis1. Query and reporting2. Data mining3. OLAP4. All of the above5. None of these

35. The term push and pop is related to the1. Array2. Lists3. Stacks4. All of the above5. None of these

36. The break statement causes an exit.1. From the innermost loop only2. Only from the innermost switch3. From the loops and switches4. From the innermost loop or switch5. None of these

37. Backup procedure helps in1. Restoring the operation whenever there is a disk failure2. Restoring both application and system software whenever there is disk

corruption3. Restoring the data sites whenever there is a system crash4. All of the above5. None of these

38. Software testing is1. The process of demonstrating that error are not present2. One process of establishing confidence that a program does what it is

supposed to do3. The process of executing a program to show that it is working as per

specifications4. The process of executing a program with the intent of finding errors5. None of these

39. Regression testing in primarily related to1. Functional testing2. Data flow testing

Page 16: [IBPS-SPL] IT-Specialist Officer Previous Question Papers From 2012 and 2013 Exam Professional Knowledge Information Technology Section MCQs « Mrunal

3. Development testing4. Maintenance testing5. None of these

40. Which of the following is easiest software development process model?1. Waterfall Model2. Prototyping3. Interactive enhancement4. Spiral model5. All of these

41. Banker’s algorithm for resource allocation deals with1. Deadlock prevention2. Deadlock avoidance3. Deadlock recovery4. Mutual exclusion5. All of these

42. In Queues, the items deleted at one end is called.1. Rear2. Front3. Top4. Base5. None of these

43. Pointer is used in1. Direct Addressing2. Indirect Addressing3. Indexed mode4. Immediate Addressing5. None of these

44. An array can be passed in a functions in C language through1. ‘Call by value’ only2. ‘Call by reference’ only3. Both (1) & (2)4. Call by preference5. None of these

45. HTTP refers to1. Hyper Text Transmission Protocol2. Hyper Text Transfer Protocol3. Hyper Text Tie Protocol4. Hyper Text Total Protocol5. None of these

Page 17: [IBPS-SPL] IT-Specialist Officer Previous Question Papers From 2012 and 2013 Exam Professional Knowledge Information Technology Section MCQs « Mrunal

46. An email account includes a storage area, often called a (n)1. Attachment2. Hyperlink3. Mailbox4. Ip address5. None of these

47. A(n) ____ is a collection of information that determines which files you canaccess and which setting you use.

1. Network2. User account3. Operating system4. File system5. None of these

48. To print a document1. Select the print command and then select OK2. Select the Ready printer and then select OK3. Type PRINT and then press Enter4. Close the document, select the print command then select OK5. None of these

49. Which part of the computer provides only temporary storage of files?1. ROM memory2. Processor3. Hard drive4. Mother board5. RAM memory

50. What will be the output of “a” in following code?

#include<stdio.h>

int main()

int a=20;

{

int a=10;

printf(“%d”,a);

printf(“%d”,a); return 0;

Page 18: [IBPS-SPL] IT-Specialist Officer Previous Question Papers From 2012 and 2013 Exam Professional Knowledge Information Technology Section MCQs « Mrunal

}

answer choices

1. 20 202. 10 203. 20 104. 10 105. Compilation Error