You are on page 1of 67

Download Solved previous year question papers of SBI systems Manager Specialist

Officers examination in PDF format. Professional knowledge questions for morning and
afternoon sessions are attached. Questions are asked mainly from areas like
Basic Concept of Computer
Computer Architecture and Origination
Data Structure
Data Communication and Networking
Networking Security
Operating systems
Digital Circuits and System
Systems security
Both are memory based question papers ..

1. What is the full form of VIRUS?


1) Various Information Resources Under Siege
2) Vital Information Resources Under Suspicion
3) Vital Information Resources Under Siege
4) Various Information Resources Under Sabotage
5) None of these
4. An ad hoc query is a
1) pre-planned question
2) prescheduled question
3) spur(urge) of the moment question
4) question that will not return any results
5) None of these

A non-standard inquiry. An ad hoc query is created to obtain information as


the need arises. Contrast with a query that is predefined and routinely
processed.
What is the process of copying software programs from secondary storage
media to the hard disk called?
1) Configuration
2) Download
3) Storage
4) Upload
5) Installation
A MODEM is connected in between a telephone line and a
1) Internet
2) Computer
3) Interface card

4) Microphone
5) Network
A proxy server is used for which of the following?
1) To provide security against unauthorized users
2) To process client requests for web pages.*
3) To process client requests for database access
4) To provide TCP/IP
5) None of these
A proxy server is computer that functions as an intermediary between a
web browser (such as Internet Explorer) and the Internet. Proxy servers
help improve web performance by storing a copy of frequently used
webpages. When a browser requests a webpage stored in the proxy
server's collection (its cache), it is provided by the proxy server, which is
faster than going to the web. Proxy servers also help improve security by
filtering out some web content and malicious software.
Proxy servers are used mostly by networks in organizations and
companies. Typically, people connecting to the Internet from home will not
use a proxy server.
A(n) ___________ is a small, wirless handheld computer that scans items, tags and pulls up
the current price (and any special offer) as you shop.
1) PSS
2) PoS
3) Inventory
4) Data mining
5) None of these
Personal Shopping System (PSS)
1. Which of the following services use TCP?
a. DHCP
b. SMTP
c. HTTP
d. TFTP
e. FTP
A. a and b
B. b, c and e
C. a, b and d
D. a, c and d

TCP- SMTP, HTTP, FTP, DNS, RIP


2. What layer in the TCP/IP stack is equivalent to the Transport layer of the OSI
model?
A. Application
B. Host-to-Host(Transport Layer)
C. Internet
D. Network Access

3. Which of the following describe the DHCP Discover message?


a. It uses FF:FF:FF:FF:FF:FF as a layer 2 broadcast.
b. It uses UDP as the Transport layer protocol.
c. It uses TCP as the Transport layer protocol.
d. It does not use a layer 2 destination address.
A. a only
B. a and b
C. c and d
D. d only
4. You want to implement a mechanism that automates the IP configuration,
including IP address, subnet mask, default gateway, and DNS information. Which
protocol will you use to accomplish this?
A. SMTP
B. SNMP
C. DHCP (Dynamic Host Configuration Protocol)
D. ARP
5. Which of the following is private IP address?
A.12.0.0.1
B. 168.172.19.39
C. 172.15.14.36
D. 192.168.24.43
These are known as private IP addresses, and are found in the following
ranges: From 10.0.0.0 to 10.255.255.255. From 172.16.0.0 to 172.31.255.255.
From 192.168.0.0 to 192.168.255.255.
6. Which of the following allows a router to respond to an ARP request that is
intended for a remote host?
A. Gateway DP

B. Reverse ARP (RARP)


C. Proxy ARP
D. Inverse ARP (IARP)
7. Which of the following services use UDP?
a. DHCP
b. SMTP
c. SNMP(Simple Network Management Protocol)
d. FTP
e. HTTP
f. TFTP(Trivial File Transfer Protocol)
A. a, c and f
B. b and d
C. a, b and d
D. All of the above
8. Which class of IP address provides a maximum of only 254 host addresses per
network ID?
A. Class A -224
B. Class B -216
C. Class C -28
D. Class D
9. The relational model feature is that there

(A) is no need for primary key data.


(B) is much more data independence than some other database models.
(C) are explicit relationships among records.
(D) are tables with many dimensions.
10. Conceptual design
(A) is a documentation technique.
(B) needs data volume and processing frequencies to determine the size of the
database.
(C) involves modelling independent of the DBMS.
(D) is designing the relational model.

11. 1) ________is hardware and/or software that is used to protect a computer or private
network resources from intruders or hackers.
12. 2)Some Oracle 9i buffer question

13. 3) Firewall decision making Always deny or deny by delay & Accept by
exception???
14. 4) Encapsulating data inside data link layer with header and trailer
15. 5) Project estimation techniques uses the standards of prior proj experience-???
(options function point,cocomo)
16. 6) RSA Asymmetric protocol
17. 7) VPN also called as Tunnel [other options Pipeline,packet switched]
18. 8) One question about compliance validation and compliance monitoring
19. 9) OLTP real time reporting tool Dashboard
20. 10) Cryptogrphy is not concerned about Availability [other options
Integrity,privacy,confidentiality]
21. 11) Cryptanalysis refers to the study of ciphers, ciphertext, or cryptosystems (that
is, to secret code systems) with a view to finding weaknesses in them that will permit
retrieval of the plaintext from the ciphertext
22. 12) How public keys are shared via email or digital signature???
23. 13) Oracle procedure does not contain RETURN [other options BEGIN END INTO]
24. 14) Shutdown method in oracle for a consistent backup Normal
[ABORT,Inconsistent..]
25. 15) encrypt using receivers public key decrypt using receiver private key public
key and asymmetric key encryption
26. 16) Providing application access via third party Software as a service(saas)
27. 17) Notify all stations before transmitting data CSMA/CD or CSMA/CA
28. 18) Removing redundancy in DB Normalization
29. 19) Which of the following provide network redundancy in a local network
environment?Dual backbone

30. 20) best technologies for in indoors are IEEE 802.11 a/ IEEE 802.11 b/IEEE 802.11
n/???
31. 21) In the relationship between course and faculty, the course entity would be Child
22) When overriding a method method inheritance/method signature/method name
???
32. 23) In java Objects can communicate with each other using methods and can call
methods in other classes
33. 24) Security threat associated with java applet when downloaded and run at
client.
34. 25) Connecoin oriented protocol TCP
35. 26) Bridge operated in data link layer
36. 27) Forcing client package without users knowledge/permission PUSH
37. 28) Which one is NOT a phase of the systems development life cycle? Post
Implementation review
38. 29) Which is not a information analysis system DBMS?
39. 30) DBMS not doing programming data
40. 31) A hacker that changes or forges information altering raw data just before a
computer processes it and then changing it back after the processing is completed,
is engaging in Data didling
41. 32) Not a part of disaster recovery Proximity of alternate site near primary site???
42. 33) Most important thing in disaster recovery?personnel safety???
43. 34) Disaster recovery risk assessment and business impact analysis (BIA) are
crucial steps in the development of a disaster recovery plan.
44. 35) Strong password/authentication mechanism Hybrid/static/dynamic/brutal???
45. 36) Which of the following statements is not true about two-tier client-server
database architecture? SQL stmnts may be processed on some of the clients

46. 37) ER diagram presenting minimum and maximum relation cardinality


47. 38) what happens when a error is encounterd during online transaction processing?
review and report??
48. 39) Permissible operation when there is a shared lock on DB? Read
49. 40) Polymorphic virus associated with code modified differently each time.
50. 41) UML Public symbol = +
51. 42) Realtime ids system N/w based IDS??
52. 43) VLAN referred to as TRUNKS/ SUBNET???
53. 44) Identification who is this, authentication what action he has been authorized
to perform
54. 45) Check digit can detect transcription error/substitution error..
55. 46) The entity relationship diagram Depicts relationship between data objects
56. 47) Attack done by checking all possible combinations of letters, numbers and
symbols Brute force attack
57. 48)An OLAP tool provides for
58. (a) Multidimensional analysis
(b) Roll-up and drill-down
(c) Slicing and dicing
(d) Rotation
(e) Setting up only relations.
59. 49) Which of the below is not an Information system.
60. Database Management System.
61. 50)Which background process performs a checkpoint in the database by writing
modified blocks from the database buffer cache in the SGA to the data files? DBWn

1.

2.

In SQL, which of the following is not a data Manipulation Language


Commands?
a.

Delete

b.

Select

c.

Update

d.

Create

e.

None of the above

The value for an attribute or a column are drawn from a set of values known
as
a.

Tuples

b.

Attributes

c.

Domain

d.

Column

e.

None of these

3.

Entities having primary key are called


a.

Primary Key

b.

Strong entities

c.

Weak entities

d.

Primary Key

e.

None Of these

4.

Which of the following is not a type of SQL statement?


a.

Data Manipulation Language (DML)

b.

Data Definition Language (DDL)

c.

Data Control Language (DCL)

d.

Data Communication Language (DCL)

e.

None of these

5.

Which of the following is not included in DML (Data Manipulation Language)


a.

INSERT

b.

UPDATE

c.

DELETE

d.

CREATE

e.

None of these

6.

TRUNCATE statement in SQL is a


a.

DML statement

b.

DDL statement

c.

DCL statement

d.

DSL statement

e.

None of these

7.

To discard all pending data changes


a.

COMMIT

b.

ROLLBACK

c.

SAVEPOINT

d.

LOCK

e.
8.

None of these
Which of the following term is related to the stack?

a.

TOP

b.

PUSH

c.

POP

d.

Rear

e.

A, B and C.

9.

In Queues, the end from where items inserted is called


a.

Rear

b.

Front

c.

Top

d.

Base

e.

None of these

10.

Which protocol is used for browsing website:


a.

TCP

b.

FITFP

c.

FTP

d.

TFTP

e.

None of these

11.

Which of the following is a browser?


a.

Netscape Navigator

b.

Mosaic

c.

Mozilla Firefox

d.

Google chrome

e.

All of these

12.

Black Box Testing sometime called


a.

Data flow testing

b.

Loop testing

c.

Behavioral testing

d.

Graph based testing

e.

None of these

13.

The Objective of testing is


a.

Debugging

b.

To uncover errors

c.

To gain modularity

d.

To analyze system

e.

None of these

14.

Choose the right sequence of SDLC (Software development life cycle) steps
a.

Design, Requirement Analysis, Coding, Testing

b.

Requirement Analysis, Design, Coding, Testing

c.

Requirement Analysis, Design, Testing, Coding

d.

Requirement Analysis, Coding, Design, Testing

e.
15.

The drawback of the binary tree sort are remedied by the


a.

Linear Sort

b.

Quick Sort

c.

Heap Sort

d.

Insertion Sort

e.

All of these

16.

17.

18.

None of these

Round robin scheduling is essentially the preemptive version of


a.

FIFO

b.

Shortest job first

c.

Shortest remaining

d.

Longest time first

e.

None of these

____ is the situation in which a process is waiting on another process, which is


also waiting on another process which is waiting on the first process. None of
the processes involved in this circular wait are making progress.
a.

Deadlock

b.

Starvation

c.

Dormant

d.

All of these

e.

None of these
Assembly language is a _____

a.

Low Level Language

b.

Middle Level Language

c.

High level Language

d.

User Language

e.

None of these

19.

Which of the following is a type of translator?


a.

Assembler

b.

Compiler

c.

Interpreter

d.

All of the Above

e.

None of these

20.

Multiprogramming systems ___


a.

Are easier to develop than single programming

b.

Execute each job faster

c.

Execute more jobs in the same time

d.

Are used only on large main frame computers

e.

None of these

21.

The mechanism by which the data and functions are bound together with an
a.

Inheritance

b.

Encapsulation

c.

Abstraction

d.

Polymorphism

e.

None of these

22.

The OSI model consists of ___layers.


a.

Nine

b.

Eight

c.

Seven

d.

Five

e.

Eleven

23.

24.

Decryption & Encryption of data are the responsibility of the ___ layer.
a.

Physical

b.

Data link

c.

Presentation

d.

Session

e.

Application

LANs can be connected by devices called ____ which operate in the data link
layer?
a.

Hub

b.

Bridges

c.

HDLC

d.

Tunnel

e.

None of these

25.

In a ____ topology, if there are n devices in a network, each device has n-1
ports for cable.
a.

Mesh

b.

Star

c.

Bus

d.

Ring

e.

None of these

Question 26 to 50
1 OLAP applications are widely used by ____ and it uses ____ Schema.
a.

RDBMS , Bus

b.

Operating System ,Star

c.

Java , Bus

d.

Data mining Techniques; Star or multidimensional

e.

None of these

1 Arrange the following in increasing order of their size.


a.

Database<File<Record<Field<Byte<Bit

b.

Bit<Byte<Field<Record<File<Database

c.

Bit>Byte>Record>Field>File>Database

d.

Bit>Byte>File>Record>Field>Database

1 JVM is a virtual machine that can execute ___


a.

C language

b.

.net programming

c.

RDBMS

d.

C++ Language

e.

Java byte Code

1 ODBC is based on ___.


a.

Structured Query Language.

b.

C language

c.

C++ language

d.

.net

e.

None of these

1 Which of the following is not an advantage of the data-base approach?


a.

Increased security

b.

Elimination data redundancy

c.

Ability to associate related data

d.

Programming/data independence

e.

All of the above

1 In relational database row and column is called as ____and ____respectively.


a.

Tuple; Attribute

b.

Attribute; Tuple

c.

Tupple;Domain

d.

Attribute; Domain

e.

None of these

1 To delete a particular column in a relation the command used is:


a.

DELETE

b.

UPDATE

c.

DROP

d.

ALTER

e.

None of these

1 A primary key if combined with a foreign key creates


a.

Parent-Child relationship between the tables that connect them.

b.

Many to many relationship between the tables that connect them.

c.

Network model between the tables that connect them.

d.

All of the above

e.

None of the above

1 Which of the following is record based logical model?


a.

Network Model

b.

Object oriented model

c.

E-R Model

d.

All of these

e.

None of these

1 The full form of DDL is


a.

Dynamic Data Language

b.

Detailed Data Language

c.

Data Definition Language

d.

Data Derivation Language

e.

All of these

1 Which of the following virus overtake computer system when it boots and
destroy in-formation?
a.

Trojan

b.

System infectors

c.

Boot infectors

d.

Stealth virus

e.

None of these

1 The relational model includes two general integrity rules. Integrity rule 1 is
concerned with ____ and integrity rule 2 is concerned with ____
a.

Primary Key, Foreign key

b.

Primary Key, composite key

c.

Unique key, Foreign key

d.

Composite Key, Foreign key

e.

None of these

1 ____ is person who has the central control over both data and application
programs.
a.

System engineer

b.

Database administrator

c.

Database manager

d.

Technical analyst

e.

None of these

1 An attribute of a relation that references the primary key of another relation is


known as the ____
a.

Foreign Key

b.

Unique Key

c.

Parent key

d.

Child key

e.

Index key

1 An entity set that does not have sufficient attributes to form a primary key is a
a.

strong entity set

b.

weak entity set

c.

simple entity set

d.

primary entity set.

e.

None of these

1 The JDBC-ODBC bridge is


a.

Three tiered

b.

Multithread

c.

Best for any platform

d.

All of these

e.

None of these

1 In a relational database, this is a data structure that organizes the information


about a single topic into row and columns.
a.

Block

b.

Record

c.

Tuple

d.

Table

e.

None of these

1 Which statements about the Java language are true?


a.

Java supports both procedural and object-oriented programming

b.

Java is only a procedural language.

c.

Java is only an Object-Oriented.

d.

Java is related to

e.

None of the above.

1 Stack is also called ____


a.

First In First Out (LIFO)

b.

Last In First Out (FIFO)

c.

First In Last Out (FILO)

d.

First Come First Served (FCFS)

e.

None of the above

1 The index created by primary key column is called _____


a.

Unique Index

b.

Composite Index

c.

Single Index

d.

Primary index

e.

None of these

1 In SQL ,which command(s) is(are) used to remove rows from a table.


a.

Delete

b.

Remove

c.

Truncate

d.

Both

e.

and (3)

f.

None of the above

1 In SQL, the CREATE TABLE is used


a.

To create a table, defining its columns, integrity constraints, and storage


allocation

b.

To add a column/integrity constraint to a table.

c.

To redefine a column

d.

To change a tables storage characteristics

e.

All of the above

1 What is the abbreviation is used for a software package that permits the user to
create , retrieve and maintain records in a database?
a.

DASD

b.

CRMD

c.

DBMS

d.

All of these

e.

None of the above

1 Choose the right sequence of virus stages


a.

Triggering, Damage ,Dormancy, propagation

b.

Damage, Triggering ,Dormancy, propagation

c.

Damage, Triggering, propagation ,Dormancy

d.

Triggering, Damage, propagation, Dormancy

e.

Dormancy, Propagation,. Triggering, Damage

1 In SQL, which command is used to add new rows to a table?


a.

Alter Table

b.

Add row

c.

Insert

d.

Append

e.

None of the Above

SBI Specialist (Computer & Communication) 2012 Question


Paper
Q1 to 25
1.

To create a copy files in the event of system failure, you create a ___
a.

Firewall

b.

Redundancy

c.

Backup

2.

3.

4.

d.

Restore file

e.

None of these

Print server uses___ which is a buffler that holds before it is send to the
printer.
a.

Queue

b.

Spool

c.

Node

d.

Stack

e.

None of these

Which of the following identifies specific web page and its computer on the
web page?
a.

Web site

b.

URL

c.

Web site address

d.

Domain Name

e.

None of these

_____ is the computer to computer exchange of routine business data


between trading partners in standard data formats.
a.

CTS

b.

DSR

c.

VDR

d.

EDI (Electronic data interchange)

e.

None of these

5.

6.

Communication handler is basically an ____ 16 bit micro controller?


a.

8085

b.

8086

c.

8086A

d.

80C186

e.

None of these

Which uses a Pre-Shared Key that is more than 7 and less than 64 characters
in length?
a.

WPA-PSK

b.

TKIP

c.

AES

d.

All of these

e.

None of these

7.

Ping command is used for what purpose?


a.

Test a device on a network whether it is reachable

b.

Test a hard disk fault

c.

Test a bug in the application

d.

Test devices scanning quality

e.

None of these

8.

Two different kind of networks can be connected by using


a.

Bridges

b.

Satellite

c.

Gateway

d.

Routers

e.

None of these

9.

Full adder is used to


a.

2 bit addition

b.

3 bit addition

c.

4 bit addition

d.

6 bit addition

e.

None of these

10.

Most important advantage of an IC is its


a.

Easy replacement in case of circuit failure

b.

Low power consumption

c.

Extremely high reliability

d.

Reduced cost

e.

None of these

11.

An 1C contains 50 gates each of which consists of 6 components. Its belongs


to
a.

VLSI

b.

LSI

c.

MS1

d.

SSI

e.

None of these

12.

Which type of computers use the 8 bit code called EBCDIC?


a.

Minicomputers

b.

Mainframe computers

c.

Super computer

d.

Microcomputer

e.

None of these

13.

An AND gate
a.

Implements logic addition

b.

Is equivalent to a series switching circuit

c.

Is any-or all gate

d.

Is equivalent to a parallel switching circuit

e.

None of these

14.

The decimal equivalent of the binary number 11100001111 is


a.

1806

b.

1807

c.

2806

d.

All of these

e.

None of these

15.

Programs in which of the following memories cant be erased ?


a.

RAM

b.

ROM

c.

Cache Memory

d.

Virtual Memory

e.

None of these

16.

The IP address 135.0.10.27 belongs to address class?


a.

b.

c.

d.

e.

None of these

17.

Which are not used in case of applet?


a.

Read /write

b.

Internet

c.

Search engine

d.

All of these

e.

None of these

18.

Which of the following is not a type of database?


a.

Hierarchical

b.

Relational

c.

Network

d.

Transition

e.

None of these

19.

Which of the following is not a type of SQL statement?


a.

Data Manipulation Language

b.

Data Definition language

c.

Data control language

d.

Data Standard language

e.

None of these

20.

In Queue , the items deleted at one end is called


a.

Rear

b.

Front

c.

Top

d.

Base

e.

None of these

21.

The drawback of the binary tree sort are remedied by the


a.

Linear sort

b.

Heap Sort

c.

Insertion sort

d.

Quick Sort

e.

None of these

22.

White Box testing, a software testing technique is sometimes called


a.

Graph testing

b.

Basis path

c.

Glass box testing

d.

Data flow testing

e.

Loop testing

23.

Which of the following is used with database?


a.

EDI

b.

Credit card

c.

ATM

d.

Payment gateway

e.

Data mining

24.

When a cracker attempts to misuse or steal data from a system, it is called


a.

Stealing

b.

Intrusion

c.

Virus

d.

Worm

e.

None of these

25.

To modify existing rows of the table ____ statement is used.


a.

ALTER

b.

MODIFY

c.

UPDATE

d.

COMMIT

e.

DELETE

Q26 to 50
1 ____ refers to a family of IEEE standards dealing with local area network and
metropolitan area network.
a.

802

b.

800

c.

801

d.

803

e.

None of these

1 Which is the general network standard for the data link layer in the OSI
Reference Model?
a.

IEEE 802.1

b.

IEEE 802.2

c.

IEEE 802.3

d.

IEEE 802.4

e.

IEEE 802.6

1 ____ uses a standard called IEEE 802.6.


a.

LAN

b.

WAN

c.

MAN

d.

Internet

e.

None of these

1 Repeater operates in which layer of OSI model?

a.

Application layer

b.

Presentation layer

c.

Physical layer

d.

Transport layer

e.

Data link layer

1 Where does Bridge operate in OSI model?


a.

Physical layer

b.

Data link layer

c.

Both (1)and (2)

d.

Application layer

e.

None of these

1 Which of the following uses the greatest number of layers in the OSI model?
a.

Bridge

b.

Repeater

c.

Router

d.

Gateway

e.

None of these

1 Routers operate in which layer of the OSI model?


a.

Physical layer

b.

Data link layer

c.

Network Layer

d.

All of these

e.

None of these

1 Modem is a _____ that modulates and demodulate signals


a.

DCE (Data circuit-terminating equipment)

b.

DTE (Data terminal equipment)

c.

DTE-DCE

d.

Both (1)and (2)

e.

None of these

1 A communication network which is used by large organizations over regional,


national or global area is called ___
a.

LAN

b.

WAN

c.

MAN

d.

Internet

e.

None of these

1 At ___ layer, TCP/IP defines two protocols :Transmission Control Protocol (TCP)
and User Datagram Protocol(UDP).
a.

Transport layer

b.

Network layer

c.

Physical layer

d.

Application layer

e.

None of these

1 The ___ layer is the layer closest to transmission medium.


a.

Transport

b.

Network

c.

Data link

d.

Physical

e.

None of the above

1 End to end connectivity is provided from host to host in :


a.

Network layer

b.

Session layer

c.

Data link layer

d.

Transport layer

e.

None of these

1 Which of the following TCP/ IP protocol is used for transferring electronic mail
messages from one machine to another?
a.

SNMP

b.

SMTP

c.

RPC

d.

FTP

e.

None of these

1 Which of the following is an example of a client-server model?


a.

FTP

b.

DNS

c.

TELNET

d.

All of these

e.

None of these

1 Which IEEE Standards is usz for Wi/Fi systems?


a.

802.11

b.

802.1

c.

802.2

d.

802.3

e.

802.10

1 _____ is the continuous ability to send and receive data between interconnected
networks.
a.

FTP

b.

SMTP

c.

TNS

d.

Network Interoperability

e.

None of these

1 What is the default subnet mask for a class B network?


a.

127.0.0.1

b.

2550.0.0

c.

255.255.0.0

d.

255.255.255.0

e.

None of these

1 What is loopback address?


a.

127.0.0.1

b.

255.0.0.0

c.

255.255.0.0

d.

127.0.0.0

e.

None of these

1 Internet-like networks within enterprises.


a.

Intranets

b.

Switching alternating

c.

Inter organizational networks

d.

Extranets

e.

None of these

1 A central computer surrounded by one or more satellite computers is called a


a.

Bus network

b.

Ring network

c.

Star network

d.

All of the above

e.

None of these

1 With an IP address of 100,you currently have 80 subnets.What subnet mask


should you use to maximize the number of available hosts?
a.

192

b.

240

c.

248

d.

224

e.

252

1 Encryption/decryption provides a network with____


a.

Privacy

b.

Authenticity

c.

Integrity

d.

Non-reputation

e.

None of these

1 The data to be encrypted at the sender site is called ___.The data to be


decrypted at receiver end is called ____
a.

Secret key, public key

b.

Public key, secret key

c.

Plaintext, ciphertext

d.

Ciphertext, plaintext

e.

None of these

1 In digital signature the private key is used for ___ and the public key for ____
a.

Encryption, decryption

b.

Decryption, encryption

c.

Plaintext, ciphertext

d.

Ciphertext, plaintext

e.

None of these

1 A ___ s main purpose is to prohibit unauthorized access to your computer via


the Internet.
a.

Popup blocker

b.

Firewall

c.

Spyware

d.

Spam assassin

e.

None of these

Question 1 to 25
1.

2.

A special type gateway that can keep external users from accessing
resources on the LAN users access the external info is called:
A.

Repeater

B.

Firewall

C.

Encryption

D.

Hub

E.

None of these

What is the name given to the exchange of control signals which is necessary
for establishing a connection between a modem and a computer at one end of
a line and another modem and computer at the other end?
A.

Handshaking

B.

Modem options

C.

Protocol

D.

All of these

E.
3.

None of these
In SQL, which command is used to changes data in a data table?

A.

UPDATE

B.

INSERT

C.

BROWSE

D.

APPEND

E.

None of these

4.

In SQL, which of the following is not a data definition language command?


A.

RENAME

B.

REVOKE

C.

GRANT

D.

UPDATE

E.

None of these

5.

Which command(s) is (are) used to redefine a column of the table in SQL ?


A.

ALTER TABLE

B.

DEFINE TABLE

C.

MODIFY TABLE

D.

ALL of the these

E.

None of these

6.

In a relational schema, each tuple is divided into fields called


A.

Relations

B.

Domains

C.

Queries

D.

All of the these

E.

None of these

7.

An indexing operation
A.

Sorts a file using a single key

B.

Sorts file using two keys

C.

Establishes an index for a file

D.

Both (1) and (3)

E.

None of these

8.

9.

Data security threats include


A.

Hardware failure

B.

Privacy invasion

C.

Fraudulent manipulation of data

D.

All of these

E.

None of these

The language used in application programs to request data from the DBMS is
referred to as the
A.

DML

B.

DDL

C.

Query language

D.

DCL

E.
10.

11.

A ___ contains the smallest unit of meaningful data, so you might call it the
basic building block for a data file.
A.

File structures

B.

Records

C.

Fields

D.

Database

E.

None of these

A ___ means that one record in a particular record type is related to only one
record of another record type.
A.

One to one relationship

B.

One to many relationship

C.

Many toone relationship

D.

Many to many relationship

E.

None of these

12.

13.

None of these

Through linked list one can implement


A.

Stack

B.

Graph

C.

Queue

D.

All of these

E.

None of these
A heap allows a very efficient implementation of a

14.

15.

A.

Doubled ended queue

B.

Priority queue

C.

Stack

D.

Trees

E.

None of these

In files, there is a key associated with each record which is used to


differentiate among different records. For every file there is at least one set of
keys that is unique. Such a Key is called
A.

Unique key

B.

Prime attribute

C.

Index key

D.

Primary Key

E.

Null key

____ is primarily used for mapping host names and email destinations to IP
address but can also be used for other purposes.
A.

TCP(transfer control protocol)

B.

DNS(Domain Name System)

C.

SHA (Secure Hash Algorithm)

D.

Simple Network Management Protocol (SNMP)

E.

None of these

16.

Override is a method
A.

For an operation that replaces an inherited method for the same


operation

B.

For a data that replaces an inherited method for the same operation

C.

For an operation that takes arguments form library function

D.

All of these

E.

None of these

17.

18.

Local variables
A.

Are created outside a block

B.

Are known only to that block

C.

Continue to exist when their block ends

D.

Are illegal in C++

E.

None of these

____ is virus that inserts itself into a systems memory. Then it take number of
actions when an infected file is executed.
A.

Web scripting virus

B.

Polymorphic virus

C.

Macro virus

D.

Boot sector virus

E.

Resident virus

19.

This ___ data mining technique derives rules from real world case examples.
A.

Waterfall model

B.

RAD

C.

White Box

D.

Spiral model

E.
20.

Case based reasoning


The ___ remains operative until the software is required.

A.

Waterfall model

B.

Incremental model

C.

Spiral model

D.

Prototyping model

E.

Incremental model

2. Data mining evolve as a mechanism to cater the limitations of ___ systems to


deal massive data sets with high dimensionality, new data type, multiple
heterogeneous data resource etc.
A.

OLTP

B.

OLAP

C.

DSS

D.

DWH

E.

None of these

B. An important application of cryptography, used in computerized commercial


and financial transaction
A.

Data mining

B.

Data warehousing

C.

Digital signature

D.

Media convergence

E.

None of these

C. Rows of a relation are called:

A.

Relation

B.

Tuples

C.

Data structure

D.

An entity

E.

None of these

D. The drawbacks of the binary tree sort are remedied by the


A.

Linear sort

B.

Quick Sort

C.

Heap Sort

D.

Insertion Sort

E.

None of these

E. Which layer of OSI determines the interface of the system with the user?
A.

Network

B.

Application

C.

Data link

D.

Session

E.

None of these

Question 26-50
1 The tracks on a disk which can be accused without repositioning the R/W heads
is
A.

Surface

B.

Cylinder

C.

Cluster

D.

All of these

E.

None of these

1 Which of the following is true about GUIs?


A.

They make computers easier to use for nonprofessionals

B.

They use icons and menus that users can select with a mouse

C.

Both (1) and (2)

D.

All of the these

E.

None of these

1 A computer system consisting of its processor, memory and I/O devices accepts
data, processes it and produces the output results .Can you tell in which
component is the raw data fed?
A.

Mass Memory

B.

Main Memory

C.

Logic Unit

D.

Arithmetic unit

E.

None of these

1 The mechanical diskette drive in which you insert your diskette is connected to
the computersbus
A.

Data

B.

Communication

C.

Address

D.

Parallel

E.

None of these

1 A set of programs that handle firms database responsibilities is called a


A.

Data base Management System (DBMS)

B.

Data Base Processing System (DBPS)

C.

Data Management System (DMS)

D.

All of these

E.

None of these

1 You are in the process of analyzing a problem that requires you to collect and
store TCP/ IP Packets. Which of the following utilities is best suited for this
purpose?
A.

NBTSTAT

B.

Performance Monitor

C.

NETSTAT

D.

Network Monitor

E.

DHCP Management Console

1 A top to bottom relationship among the items in a database is established by a


A.

Hierarchical Schema

B.

Network Schema

C.

Relational Schema

D.

All of the above

E.

None of these

1 The process of transferring data intended for a peripheral device into a disk (or
intermediate store) so that it can be transferred to peripheral at a more
convenient time or in bulk is known as
A.

Multiprogramming

B.

Spooling

C.

Caching

D.

Virtual programming

E.

None of these

1 Which of the following system program forgoes the production of object code to
generate absolute machine code and load it into the physical main storage
location from which it will be executed immediately upon completion of the
assembly?
A.

Two pass assembler

B.

Load and go assembler

C.

Macro processor

D.

Compiler

E.

None of these

1 Relocation bits used by relocating loader are specifically (generated) by:


A.

Relocating loader itself

B.

Linker

C.

Assembler or translator

D.

Macro processor

E.

None of these

1 From what location are the 1st computer instructions available on boot up ?

A.

ROM BIOS

B.

CPU

C.

Boot.ini

D.

CONFIG.SYS

E.

None of these

1 Abstraction is
A.

The act of representing the essential features of something without


including much detail.

B.

The act of representing the features of something much detail

C.

A tree structure

D.

All of these

E.

None of these

1 Aggregation is a special for of


A.

Generalization

B.

Specialization

C.

Association

D.

Object

E.

None of these

1 Consider an operation of addition. For two numbers, the operating will generate
a sum. If the operand are strings, and the same operation would produce a
third string by concatenation. This features is called ____.
A.

Inheritance

B.

Encapsulation

C.

Polymorphism

D.

Binding

E.

None of these

1 In ER diagrams, the term cardinality is a synonym for the term


A.

Attribute

B.

Degree

C.

Entities

D.

Cartesian

E.

None of these

1 An oracle server index


A.

Is a schema object

B.

Is used to speed up the retrieval of rows by using a pointer

C.

Is independent of the table it indexes

D.

All of these

E.

None of these

1 Which of the following is not a context free grammar components?


A.

Terminal symbols

B.

Nonterminal symbol

C.

Production line

D.

List

E.

None of these

1 Which of the following is a phase of RAD model?


A.

Business modeling

B.

Data modeling

C.

Application generation

D.

All of the above

E.

None of these

1 ____ is a set design steps that allows a DFD with transform flow characteristics to
be mapped into a predefined template for program structure.
A.

Transaction flow

B.

Contributor

C.

Transform mapping

D.

Design evaluation

E.

None of these

1 A combinational logic circuit which is used to send data coming from a single
source to two or more separate destinations is called as
A.

Decoder

B.

Encoder

C.

Multiplexer

D.

Demultiplexer

E.

None of these

1 Which of the following is a universal gate?


A.

AND

B.

OR

C.

EXOR

D.

NAND

E.

None of these

1 The twos compliment of binary number 010111.1100 is


A.

101001.1100

B.

101000.0100

C.

010111.0011

D.

101000.0011

E.

None of these

1 In 8086 the overflow flag is set when


A.

The sum is more than 16 bits

B.

Signed numbers go out their range after an arithmetic operation

C.

Carry and sign flags are set

D.

During subtraction

E.

None of these

1 What does microprocessor speed depends on?


A.

Clock

B.

Data bus width

C.

Address bus width

D.

All of these

E.

None of these

1 The TRAP is one of the interrupts available its INTEL 8085. Which one statement
is true of TRAP?
A.

It is level triggered

B.

It is negative edge triggered It is positive edge triggered

C.

It is positive edge triggered

D.

It is both positive edge triggered and level triggered

E.

None of these

IBPS Specialist IT Officer Previous Paper 2013


Question 1 to 25
1.

2.

Which of the following microprocessors is not 8bit microprocessor?


1.

8085

2.

6502

3.

Z80

4.

68000

5.

None of these

Microprocessor 8085 is the enhanced version of which essentially the same


construction set
1.

6800

2.

8080

3.

6800A

4.

8000

5.
3.

Which of the following interrupts has the lowest priority?


1.

RST 5.5

2.

RST 7.5

3.

TRAP

4.

INTR

5.

None of these

4.

5.

All of these

The Data control language (DCL).


1.

is used to manage user access to data bases

2.

is used to manipulate the contents of a database in some form

3.

Both (1) and (2)

4.

Used for inserting, deleting and updating data in a database

5.

None of these

A collection of fields is called a record with respect of DBMS, a record


corresponds to
1.

Tuple

2.

Relation

3.

File

4.

Attribute

5.

None of these.

6.

Multiplexer means
1.

One into many

2.

Many into one

3.

Many into many

4.

All of these

5.

None of these

7.

Which gate is known as universal gate ?


1.

NOT gate

2.

NAND gate

3.

AND gate

4.

XOR gate

5.

None of the above

8.

9.

Which of the following is the first integrated logic family?


1.

TCL

2.

T1L

3.

DTL

4.

MOS

5.

RTL

A top to bottom relationship among the items in a database is established by

1.

Hierarchical schema

2.

Network Schema

3.

Relational Schema

4.

Both (1) and (2)

5.
10.

In the relational schema, each tuple is divided into fields called.


1.

Relations

2.

Domains

3.

Queries

4.

Both (1) and (2)

5.

Both (1) and (3)

11.

12.

Both (2) and (3)

The modify operation is likely to be done after.


1.

Delete

2.

Insert

3.

Look up

4.

All of the above

5.

None of these

The way a particular application views the data from the database that the
application uses is a :
1.

Module

2.

Relational model

3.

Schema

4.

Subschema

5.

None of these

13.

Which two files are used during operation of the DMBS?


1.

Query language and utilities

2.

Data manipulation language and query language:

3.

Data dictionary and transaction log

4.

Data dictionary and query language

5.

None of these

14.

Which normal form is considered adequate for relational database design?


1.

2 NF

2.

3 NF

3.

4 NF

4.

BCNF

5.

None of these

15.

16.

An attribute of one matching the primary key another table, is called as


1.

Foreign key

2.

Secondary key

3.

Candidate key

4.

Composite key

5.

None of these

Which of the following SQL commands can be used modify existing data in a
database table?
1.

MODIFY

2.

UPDATE

3.

CHANGE

4.

NEW

5.
17.

18.

None of these
Each node in a linked list must contain at least:

1.

Three fields

2.

Five fields

3.

Four fields

4.

One fields

5.

Two fields

The average number of key comparisons done in a successful sequential


search in a list of length n is
1.

Log n

2.

(n-1)/2

3.

n/2

4.

(n+1)/2

5.

None of these

19.

The order of the binary search algorithm is


1.

2.

n2

3.

nlog(n)

4.

log(n)

5.

None of these

20.

Which of the following is useful in implementing quick sort?


1.

Stack

2.

Set

3.

List

4.

Queue

5.

None of these

21.

22.

OSI model consists of ____ layers


1.

Three

2.

Five

3.

Six

4.

Eight

5.

Seven

Which data communication method is used to transmit the data over a serial
communication link.
1.

Simplex

2.

Full duplex

3.

Half duplex

4.

Both (1) and (2)

5.

Both (2) and (3)

23.

Encryption and decryption are functions of the ____ layer.


1.

Transport

2.

Session

3.

Application

4.

Physical

5.
24.

Presentation
Which of the following is not a connecting device?

1.

Bridge

2.

Trans receiver

3.

Router

4.

Repeater

5.

None of these

25.

Repeaters function in the ___ layer


1.

Physical

2.

Data link

3.

Network

4.

Both (1) and (2)

5.

None of these

Question 26-50
1 How many hosts are attached to each of the local area network at your site?
1.

128

2.

256

3.

254

4.

64

5.

None of these

1 Which of the following types of software should we use if we often need to


create, edit and print documents?
1.

Word processing

2.

Spread sheet

3.

Object program

4.

UNIX

5.

None of these

1 Thrashing
1.
2.

Can always be avoided by swapping


Is a natural consequence of virtual memory system Always occurs on
large computers

3.

Can be caused by poor paging algorithms

4.

None of these

1 _____ is present in spiral model


1.

Code generator

2.

Risk analysis

3.

Code optimizer

4.

Reengineering

5.

None of these

1 The approach used in top down analysis and design is :


1.

To identify the top level functions by combining many smaller


components into a single entity

2.

To identify a top level function and then create hierarchy of lower level
modules and components

3.

To prepare flowcharts after programming has been completed

4.

All of these

5.

None of these

1 B2C ecommerce focuses on customer ___.


1.

Respond to customer

2.

Obtain customer feedback

3.

Establish buyerseller transaction

4.

All of the above

5.

None of these

1 OLAP stands for


1.

Online Analytical project

2.

Online Analytical problem

3.

Online Application process

4.

Online Application Problem

5.

Online Analytical processing

1 Data mining is
1.

Storing data when in need

2.

Automatic extraction of patters of information

3.

Searching data on Internet

4.

All of these

5.

None of these

1 Decision support system are based on ____ analysis


1.

Query and reporting

2.

Data mining

3.

OLAP

4.

All of the above

5.

None of these

1 The term push and pop is related to the


1.

Array

2.

Lists

3.

Stacks

4.

All of the above

5.

None of these

1 The break statement causes an exit.


1.

From the innermost loop only

2.

Only from the innermost switch

3.

From the loops and switches

4.

From the innermost loop or switch

5.

None of these

1 Backup procedure helps in


1.

Restoring the operation whenever there is a disk failure

2.

Restoring both application and system software whenever there is disk


corruption

3.

Restoring the data sites whenever there is a system crash

4.

All of the above

5.

None of these

1 Software testing is
1.

The process of demonstrating that error are not present

2.

One process of establishing confidence that a program does what it is


supposed to do

3.

The process of executing a program to show that it is working as per


specifications

4.

The process of executing a program with the intent of finding errors

5.

None of these

1 Regression testing in primarily related to


1.

Functional testing

2.

Data flow testing

3.

Development testing

4.

Maintenance testing

5.

None of these

1 Which of the following is easiest software development process model?


1.

Waterfall Model

2.

Prototyping

3.

Interactive enhancement

4.

Spiral model

5.

All of these

1 Bankers algorithm for resource allocation deals with


1.

Deadlock prevention

2.

Deadlock avoidance

3.

Deadlock recovery

4.

Mutual exclusion

5.

All of these

1 In Queues, the items deleted at one end is called.


1.

Rear

2.

Front

3.

Top

4.

Base

5.

None of these

1 Pointer is used in
1.

Direct Addressing

2.

Indirect Addressing

3.

Indexed mode

4.

Immediate Addressing

5.

None of these

1 An array can be passed in a functions in C language through

1.

Call by value only

2.

Call by reference only

3.

Both (1) & (2)

4.

Call by preference

5.

None of these

1 HTTP refers to
1.

Hyper Text Transmission Protocol

2.

Hyper Text Transfer Protocol

3.

Hyper Text Tie Protocol

4.

Hyper Text Total Protocol

5.

None of these

1 An email account includes a storage area, often called a (n)


1.

Attachment

2.

Hyperlink

3.

Mailbox

4.

Ip address

5.

None of these

1 A(n) ____ is a collection of information that determines which files you can
access and which setting you use.
1.

Network

2.

User account

3.

Operating system

4.

File system

5.

None of these

1 To print a document
1.

Select the print command and then select OK

2.

Select the Ready printer and then select OK

3.

Type PRINT and then press Enter

4.

Close the document, select the print command then select OK

5.

None of these

1 Which part of the computer provides only temporary storage of files?


1.

ROM memory

2.

Processor

3.

Hard drive

4.

Mother board

5.

RAM memory

1 What will be the output of a in following code?


#include<stdio.h>
int main()
int a=20;
{
int a=10;

printf(%d,a);
printf(%d,a); return 0;
}
answer choices
1.

20 20

2.

10 20

3.

20 10

4.

10 10

5.

Compilation Error

You might also like