Professional Documents
Culture Documents
in/
INDIAN BANK IT Officers EXAM Professional Knowledge QUESTIONS 1. Programs that automatically submit your search request to several search engines simultaneously are called (1) Metasearch engines (2) Webcrawlers (3) Spiders (4) Hits (5) None of these
2. Graphical diagrams used to represent different multiple perspectives of a system include (1) use-case, class, and state diagrams (2) state, interaction, derivative diagrams (3) interaction, relationship, and class diagrams (4) deployment, relationship, and use-case diagrams (5) None of these 3. Database redesign is not terribly difficult if the (1) database is structured (2) database is well-designed (3) database has no data (4) database is relatively small (5) database is relatively large
4. Which of the following are normally used to initialize a computer system's hardware?
5. If you wanted to locate the hardware address of a local device, which protocol would you use? (1) ARP (2) RARP (3) ICMP (4) PING (5) PONG
6. What is Internet 2? (1) A new type of cabling system for Wide Area Networks (2) A second local area network that can connect with another online LAN to share access (3) A new standard for Internet browsers (4) An association to develop advanced Internet technology (5) None of these 7. The term, "hypertext", means (1) Non-sequential writing (2) Hypermedia (3) Blinking text
9. Which kind of lock includes a keypad that can be used to control access into areas? (1) Cipher (2) Warded (3) Device (4) Tumbler (5) Typelock 10. A..sometimes called a boot sector virus, executes when a computer boots up because it resides in the boot sector of a floppy disk or the master boot record of a hard disk. (1) system virus (2) trojan horse virus (3) file virus (4) macro virus
2.Write short notes on each of the following: (a) Trojan Horse (b) Smart Cards
3. Write short notes on each of the following: (a) Trojan Horse (b) Smart Cards (c) Physical threats and security (d) PGP
4. Explain the DMA controller with block diagram. What is meant by a block transfer?
What are the various phases of an instruction cycle ? Give the micro operation of fetch and decode phases
7. What is a Socket ? Write two differences between a TCP Socket and a UDP Socket.
8. What are the standard port numbers for (i) Web Server (ii) Mail Server (iii) FTP Server (iv) Telnet ?
9 What is Network Address Translation (NAT) ? Give any two advantages and two disadvantages of NAT.
11. What is a Search Engine ? How is it useful for Internet/Intranet ? Give the names of any four Search engines.
12 What is WAP ? Give any two advantages and two limitations of WAP. Also explain its layered architecture?
(ii)Explain the concept of Stored Procedure and briefly describe the advantages of using Triggers. 1b (i) what is View? (ii) How it is related to data independence? 2a (i) what are distributed system?
(ii) What is life cycle of a servlet? 4b (i) Why is XML important to database application? 5a (i) discuss in detail the use of a computer network? 5b what is APR & RARP? 6a what security technique are used to protect computer system? 6b how is data protected during transmission over the network? 7a How is E-business changed the definition of enterprise system. 7b Distinguish between the various normal forms in database. 8a what are the different type of backup possible for the database? 8b (i) what is data Warehousing? (ii) How it is different form Database?