Sunteți pe pagina 1din 44

IBPS IT Officer(Specialist officer) Professional Knowledge Question Paper with answers 2012 Professional Knowledge Section Plays crucial

role in IBPS IT Officer exam,This section has more weight age than other sections.Candidates need to prepare each and every section in order to get qualify in IBPS Specialist officer exam 2012.The bold option is the answer for question.Here aptitude9.com providing you 50 Professional Knowledge questions for IT Officer exam Professional Knowledge question Paper 2012 for IT Officer 1. A floating point is said to be normalized if the most significant digit of the mantissa is a) b) c) d) e) a) b) c) d) e) a) b) c) d) Zero Non-Zero Negative Positive None of these An inventory of parts is to be processed by part number A dictionary of words used by a spelling checker id to be created. A program to solve a maze is to back track to an earlier position when a dead end A program to keep track of patients as the check into clinic, assigning them to doctors a first None of these Artificial science Cognitive science Psychology Sociology

2. Which of the following applications is suitable for FIFO Queue?

position is reached. come, first served basis 3. The field that investigates the mechanics of human intelligence is:

e)

None of these

4. Which data structure is needed to convert infix notation to post fix notation is a) Branch b) c) d) e) Queue Tree Stack None of these

5. Data are followed to be transmitted in only one direction in a: a) Simplex channel b) Dump channel c) Half-Duplex channel d) Full duplex channel e) None of these 6. Which of the following statement is not true regarding graph? a) A graph consists of set of nodes and a set of arcs b) A graph is a tree 1

c)

A tree is a graph

d) Graphs can be directed e) None of these 7. Implementation of an inverted list to maintain the record list for each value for a given attribute can be done by a) Sequential file b) Direct file c) Indexed file d) Indexed sequential e) None of these 8. A 6-MHz channel is used by digital signaling system utilizing 4 level signals. What is maximum possible transmission rate? a) 1.5 M band/sec b) 6 M band/sec c) 12 M band/sec d) 24 M band/sec e) None of these 9. Which of the following is a type of ISDN (Integrated Services Digital Network)? a) Narrow band b) Broad band c) Both (a) and (b) d) e) Medium band None of these

10. Which of the following is easiest software development process model? a) Waterfall model b) c) d) e) Prototyping Interactive enhancement Spiral model None of these

11. Which of the following feature is related to virtual circuit? a) Connection oriented b) c) d) e) Each packet sent is routed independently of its predecessors Successive packets may follow different routes Congestion control is difficult None of these

12. Which one of the following interrupt is non-makeable? a) TRAP b) c) d) e) RST 7.5 INTR RST 6.5 None of these

13. Binding the same name to multiple operations whose signatures differ in number or types of arguments? a) Overloading b) Origin class c) Object model d) Package e) None of these 14. The C declaration in A [3] [5] of containing .. elements is itself an array containing integers. a) 3, 5 b) 5, 3 c) 3, 3 d) 5, 5 15. What is the drawback of infrared and millimeter waves? a) They are directional b) They cannot pass throught solid objects. c) License is needed d) Can be used outdoor e) None of these 16. Indexes created from a sequential (or sorted) set of primary keys are referred to as a) Indexed file organization b) Sequential file c) Index sequential d) All of the above e) None of these 17. A central computer surrounded by one or more satellite computers is called a) Bus network b) c) d) e) Ring network Star network All of the above None of these

18. Which of the following is a major component of the telephone system? a) Local loop b) c) d) Trunks Switching office All of these

e) None of these 19. A linear list of elements in which deletion can be done from one end and insertion can take place only at other end (rear) is known as a) Queues b) Stacks c) Trees 3

d)

Branch

e) None of these 20. For tree, which of the following list traversing through the entire list is not necessary? a) Circular list b) Singly linked list c) Doubly linked list d) Both (2) and (3) above e) None of these 21. Which of the following is not included in DML (data manipulation language)? (a)INSERT (b) UPDATE (c) DELETE (d) CAREATE (e) None of these 22. Which of the following communications service provides messages preparation And transmission facilities (a) Teletex (b) Teletext (c) x.400 (d) fax (e) none of these 23. Which of the following scheduler is in charge of handling the swapped out process? (a) Short term (b) Long term (c) Medium term (d) Both(1) and(2) (e)none of these 24. Which of the following is not used as a data structure? (a)Array (b) Linked list (c) Graph (d) Directory (e) none of these 25. Which of the following statement is not true in context of strings in c language? (a) It is array of characters (b) last character of character array is always /o (c) C inserts the null character automatically (d) Any string in c can be read by the function getchar 0 (e) None of these 26. Which command will be used with vi editor to append text at end of line? (a) A (b) a (c) i 4

(d) I (e)none these 27. Which the result of a computation depends on the speed of the processes involved there Is said to be (a)cycle stealing (b) race condition (c)a time look (d) a deadlock (e) None of these 28. Which of the following feature is true regarding concatenated virtual circuits? (a) A sequence of virtual circuits is set up from source through one or more gate ways to the destination (b) Each gateway maintains table telling which virtual circuit pass through it (c) The scheme works best when all the networks have roughly the same properties (D) All of the above (e) None these 29. A compiler which runs on one machine and generates a code for another machine (a)Bootstrap (b) Cross-compiler (c) Lexical analyzer (d) All of the above (e) None of these 30. Bankers algorithm for resource allocation deals with (a) Dead look preventation (b) Dead look avoidance (c) Dead look recovery (e) Mutual exclusion (f) None of these 31. A method, which transfers the entire block of data from its own buffer to main memory takes place without intervention by cup. (a) Programmed input/output (b) Interrupt driven input/output (c) Direct memory access (DMA) (d) Resident monitor (e) None of these 32. Which the maximum clock rate is quoted for a logic family, it applies to a (a) Shift register (b) Flip-flop (c) Counter (d) Single logic gate (e) None of these

33. Which of the following table helps in representing the previous and next state of the sequential circuit prior to and after the clock pulse respectively? (a) Truth table (b) Characteristic table (c)Excitation table (d)Both (1) and (2) (e) None of these 34. A large computer information system maintains many different computer files. Which among them is called a perpetual file? (a) Specialized file (b)Log file (c)Master file (d)History file (e)None these 35. One method of programming a computer to exhibit intelligence is called modeling (a)Simulation (b)Cognitization (c)Psychic amelioration (d)Duplication (e)None these 46. In fiber optics the attenuation of light through glass depends on the (a)Wave length of light (b) Frequency of light (c) Speed of light (d)All of the above (e)None these 37. Ap-channel enhancement type MOSFET performs much the same function as a PNP Transistor except that (a)It operates much faster (b)It is considerably larger (c)It is controlled by voltage larger than current (d)It is controlled by current rather than a voltage like a bipolar transistor (e)None these 38. Among directory entry-node and the file contents, Which will be changed when a file Is updated? (a)Only directory entry and file contents (b)Only inode and file contents (c)Both (1) and (2) (d)Only directory entry (e)None these 39. Which of the following is an important component of semantic analysis? (a) Symbol table 6

(b) Type checking (c)Lex (d)Yacc (e)None these 40. Which of the following systems implementation approaches should be used if you want to run the old system and the new system at the same time for a specified period? (a)Direct (b) Pilot (c) Phased (d) Parallel (e) None of these 41. Which of the following derivation does a top-down parser? The input is assumed to be scanned in left to right order. (a) Left most derivation (b) Left most derivation traced out in reverse (c) Right most derivation (d) Right most derivation traced out in reverse (e) None of these 42. CIDR (Classless Inter Domain Routing) (a) It is used in class C Net works (b) It is used in class B Net works (c) It is used in class A Net works (d) All of the above (e) None of these 43. Internal auditors should review data system design before they are (a) Developed (b)Implemented (c) Modified (d) All of the above (e) None of these 44. Which language has recently become the defector standard for interfacing application programs with relational database system? (a) oracle (b) SQL (c) Dbase (d) 4 GL (e) None of these 45. A program that places programs into main memory and prepares them for execution(a) Linker (b) Assembler (c) Loader (d) Absolute entity 7

(e) None of these 46. A generalizations of the Boyce Codd Normal Form to relation schemes which includes the mulltivated dependencies is called a) Second Normal Form b) Third Normal Form c) Fourth Normal Form d) Fifth Normal Form e) None of these 47. Lexical Analyzer transforms an input streams in to a) Regular expression b) Sequence of tokens c) Binary d) Symbols e) None of these 48. If we traverse s binary search tree, in which manner that we get in ascending manner a) Inorder b) Preorder c) Postorder d) Graph e) None of these 49. Binary number 10 11 10 000 is equivalent to decimal a) 716 b) 718 c) 722 d) 724 e) None of these 50. The collection of communication line and routers from the a) b) c) d) e) Router Bridge Subnet Packet None of these

Professional Knowledge
1. One of the following is not included in the 7 Ps of Marketing. Find the same_____________ (A). Placement (B). Price (C). Production (D). Promotion

(E). Product Ans. (C). Production

2. Analysis of marketing problem helps in ______________ (A). Evaluating marketing opportunities (B). Reducing marketing staff (C). Reducing profits (E). Motivation Ans. (A). Evaluation Marketing Opportunities

3. Innovation is marketing is same as _________________ (A). Motivation (B). Perspiration (C). Aspiration (D). Creativity (E). Team work Ans. (D). Creativity

4.Market Segmentation is required for _________________ (A). preferential market (B). OTC Marketing (C). Internal Marketing (D). Identifying sales persons (E). Identifying prospects Ans. (E). Identifying prospects

5. Bank ATMs are__________________

(A). Delivery outlets (B). market plans (C). Personalized Products (D). Tools for overcoming buyers resistance (E). Motivating tools Ans. (C). Personalized Products

IT Sample Paper 1. The ________ states that a foreign key must either match a primary key value in another relation or it must be null. (a) entity integrity rule (b) referential integrity constraint (c) action assertion (d) composite attribute

(e) None of these 2. An applet ________ (a) is an interpreted program that runs on the client (b) tracks the number of visitors to a Website (c) is a compiled program that usually runs on the client (d) collects data from visitors to a Website (e) None of these

3. A ________ sometimes called a boot sector virus, executes when a computer boots up because it resides in the boot sector of a floppy disk or the master boot record of a hard disk. (a) system virus (b) Trojan horse virus (c) file virus (d) macro virus (e) None of these 4. Which error detection method uses one's complement arithmetic? (a) Simply parity check (b) Checksum (c) Two-dimensional parity check (d) CRC (e) None of these 5. A result of a computer virus can NOT lead to ________ . (a) Disk Crash (b) Mother Board Crash (c) Corruption of program (d) Deletion of files (e) None of these 6. The network interface card of LAN is related to following layer of OSI Model (a) Transport (b) Network (c) Data Link (d) Physical (e) All of these 7. Which of the following does NOT describe a data warehouse? (a) Subject-oriented (b) Integrated (c) Time-variant (d) Updateable (e) None of these 8. Which of the following is TRUE ? (a) Logical design is software-dependent (b) In a distributed database, database is stored in one physical location (c) Conceptual design translates the logical design into internal model (d) Logical design is software independent (e) None of these 9. A range check ________ (a) ensures that only the correct data type is entered into a field (b) verifies that all required data is present

10

(c) determines whether a number is within a specified limit (d) tests if the data in two or more associated fields is logical (e) None of these 10. The total set of interlinked hypertext documents worldwide is(a) HTTP (b) Browser (c) WWW (d) B2B (e) None of these 11. With the object-oriented (OO) approach, an object encapsulates, or ________ .a programmer. (a) carries out, the details of an object for (b) hides, the details of an object from (c) reveals, the details of an object to (d) extends, the details of an object beyond (e) None of these 12. Every computer connected to an intranet or extranet must have a distinct ________ (a) firewall (b) proxy server (c) IP address (d) domain name (e) None of these 13. A table of bits in which each row represents the distinct values of a key? (a) Join index (b) Bitmap index (c) B + Tree (d) Hierarchical index (e) None of these 14. The degree of detail that should be incorporated into a database depends on what? (a) Data integrity (b) The type of database (c) The user's perspective (d) The business practices and policies (e) None of these 15. The ________ converts digital signals to analog signals for the purpose of transmitting data over telephone lines. (a) Modem (b) Router (c) Gateway (d) Bridge (e) All of these 16. Before a package can be used in a java program it must be ________ . (a) executed (b) referenced (c) imported (d) declared (e) None of these 17. Choose the correct way to indicate that a line in a C++ program is a comment line, that is, a line the will not be executed as an instruction ________ . (a) begin the line with a # sign (b) begin the line with double slashes (/ /)

11

(c) begin and end the line with double hyphens (- _ -) (d) indent the line (e) None of these 18. Programming language built into user programs such as Word and Excel are known as ________ (a) 4GLs (b) macro languages (c) object-oriented languages (d) visual programming languages (e) None of these 19. Firewalls are used to protect against ________ . (a) Unauthorized Attacks (b) Virus Attacks (c) Data Driven Attacks (d) Fire Attacks (e) All of these 20. This is a standard way for a Web server to pass a Web user's request to an application program and to receive data back to forward to the user(a) Interrupt request (b) Forward DNS lookup (c) Data-Link layer (d) File Transfer Protocol (e) Common gateway interface 21. Three SQL, DDL, CREATE commands are ________ . (a) Schema, Base and Table (b) Base, Table and Schema (c) Key, Base and Table (d) Schema, Table and View (e) None of these 22. Data are ________ in client/server computing. (a) never sent to the client machine (b) sent in very large sections to save processing time (c) sent only upon the client's request (d) sent in complete copies for the client to filter and sort (e) sent from the client to the server for processing 23. Which of the following will NOT eliminates the ambiguities of a null value? (a) Define the attribute as required (b) Define subtypes (c) Define each attribute as having an initial value that is recognized as blank (d) Define supertypes (e) None of these 24. The ________ directory is mandatory for every disk. (a) Root (b) Base (c) Sub (d) Case (e) None of these 25. This is a group of servers that share work and may be able to back each other up if one server fails. (a) Channel bank (b) Cluster

12

(c) Tiger team (d) Serverless backup (e) Logical unit Also check out IBPS IT Officer Sample Questions for more questions based on the Professional Knowledge section. IT Officer Study Material is also provided by GJ Tutorial. ANSWERS 1. (a), 2. (c), 3. (e), 4. (b), 5. (b) 6. (e), 7. (d), 8. (a), 9. (c), 10. (a) 11. (b), 12. (c), 13. (b), 14. (b), 15. (a) 16. (c), 17. (b), 18. (d), 19. (a), 20. (e) 21. (d), 22. (c), 23. (d), 24. (c), 25. (b) Source: IBPS Specialist Officer IT scale I Professional Knowledge question paper with answer? | Government Jobs 2012 http://governmentjobsalerts.com/ibps-specialist-officer-scale-i-professionalknowledge-question-paper-answer-27923.html#ixzz2IOgjoZiQ

dear friend The professional knowledge in a newly added section in IBPS common written examination. Most of the candidates does not know that what type of questions will be asked under professional knowledge section. Actually under this section the question will be asked will be related to marketting knowledge,banking awareness etc. Here is some questions with sollution which will help you-

1. One of the following is not included in the 7 Ps of Marketing. Find the same (A). Placement (B). Price (C). Production (D). Promotion (E). Product Ans. (C). 2. Analysis of marketing problem helps in (A). Evaluating marketing opportunities (B). Reducing marketing staff (C). Reducing profits (D). Good communication (E). Motivation Ans. (A).

3. Innovation is marketing is same as (A). Motivation (B). Perspiration (C). Aspiration (D). Creativity (E). Team work Ans. (D). 4.Market Segmentation is required for

13

(A). preferential market (B). OTC Marketing (C). Internal Marketing (D). Identifying sales persons (E). Identifying prospects Ans. (E). Identifying prospects 5. Bank ATMs are (A). Delivery outlets (B). market plans (C). Personalized Products (D). Tools for overcoming buyers resistance (E). Motivating tools Ans. (C). 6. Internet Banking helps in A). door-to-door canvasing (B). Making more number of cold calls (C). Easy access to customer transections (D). Market Survey (E).Market research Ans. (C). 7.Cross-selling means (A). selling by a cross-section of people (B). selling to HNIs (C). selling to a cross-section of people (D).Selling to NRIs (E).Selling other products to existing customers Ans. (E). 8.The USP of current account is (A). High minimum balance (B). no restrictions on transactions (C). no internet payable (D). restricted deposits (E). Easy credits Ans. (B). no restrictions on transactions 9. The USP of a car loan is (A). High rate of interest (B).Easy EMIs (C).Lump-sum loans (D).Available only to doctors (E). available only to businessmen Ans. (B). 10.Leads for home loans can be obtained from (A). cooperative societies (B). Existing borrows (C). builders

14

(D). builders e .Traders Ans. (C). 11. Leads for industrial loans can be obtained from (A). Reserve bank of India (B). District industrial centers (C). colleges (D). Export houses (E). Trade centers Ans. (B). 12. SME Means____________ (A). Selling and Marketing Establishment (B). Selling and managing employees (C). Sales and Marketing entity (D). small and medium enterprises (E).small and micro entities Ans. (C). 13.The target group for SME Loan is _______________ (A).All salaried persons (B). government undertakings (C). all entrepreneurs (D). all students (E). all housewives Ans. (C). 14.Leads for tractor loans can be availed from_______________ (A). farm laborers (B). Authorized dealers of tractors and farm equipments (C). Bullock cart owners (D). Marginal land owners (E). RTA Officers Ans. (B). 15. Customization result in ________________ (A). Customer exodus (B). Customer retention (C). Customer complaints (D). Training of staff (E). varying the interest rates Ans. (B). 16.Find the correct sentence__________ (A).Higher the price, higher are the sales (B).More number of sales pesons leads to more sales (C). mission statement is part of market plan (D). better sales incentives means better performance (E). all customers are profitable customers Ans. (C).

15

17. Banc assurance can be sold to ____________ (A).all banks (B). all insurance companies (C). insurance agents (D). all existing and prospective bank customers (E). stock brokers Ans. (D). 18. The target group for bulk deposits is _____________ (A). salaried persons (B). small traders (C). corporate MNCs (D). Housewives (E). Minor children Ans. (C). 19. Debit cards can be best sold to_____________ (A). Existing customers (B). school childrens (C). trusts (D). waqf board e .Educations institutes Ans. (A). 20.A low EMI indicates___________ (A). high loan burden (B). long repayment period (C). cheap loans (D). costly loans (E). very short repayment period Ans. (C). 21. EMI can be marketing tool when________________ (A). EMI is very low (B). EMI is very high (C). EMI is fluctuating (D). EMI is constant (E). EMI is ballooning Ans. (A). 22. Advertisements are necessary for ______________ (A). only old products (B). launching new products (C). only costly products (D). only obsolete products (E). advertisements are wasteful expenses Ans. (B). 23. Publicity is required for ____________________ (A). Generating more number of leads

16

(B). better training of sales persons (C). market survey (D). Product designing (E). OTC Marketing Ans. (A). 24. NAV is the price of __________________ (A). Entire fund value (B). one unit of a fund (C). surrender value (D). average value of shares (E). dividends paid in a year Ans. (B). 25.A Master policy in the case of Life insurance indicates___________________ (A). policy is sale (B). policy is in the name of servant (C). only one life is assured (D). there are several beneficiaries (E). life assured should be a male Ans. (D). 26. Customer database is useful for ________ (A). advertisements (B). word-of-mouth publicity (C). CRM Functions (D). PR functions (E). Sales persons training Ans. (C). 27. CRM(Customer Relationship Management) is ______________ (A). A pre-sales activity (B). A tool for lead generation (C). an ongoing daily activity (D). the task of a DSA (E). back office duty Ans. (B). 28. Find the incorrect answer_________________ (A). cross-selling is an expensive way of marketing (B). market segmentation can boost lead generations (C). customer lifetime value is a marketing tool (D). surrogate marketing is a type of viral marketing (E). internet banking can replace ATMs Ans. (E). 29. Financial inclusion needs canvassing the accounts of ______________ (A). Financial Institutions (B). NRIs (C). HNIs (D). Housewives

17

(E). Persons below a specified income level Ans. (E). 30. Effective retail banking presupposes____________ (A). Large Premises (B). Huge kiosks (C). big sales force (D). coordination between marketing and front office staff (E). More products Ans. (D).

Source: IBPS Specialist Officer IT scale I Professional Knowledge question paper with answer? | Government Jobs 2012 http://governmentjobsalerts.com/ibps-specialist-officer-scale-i-professionalknowledge-question-paper-answer-27923.html#ixzz2IOhzeCEq

The raw data is processed in a computer system to obtain a meaningful ______.

Text Input Information Image


Ans- 3 Which one of the following networking types is wider in horizons?

Intranet Internet Both of these None of these


Ans -2 DSL is a product example of ____________ internet connection.

Broadband highspeed wireless


18

slow
Ans- 1

Which of the following manages the execution of user programs to prevent errors and improper use of the computer ?

Control Program System Software Hardware Program Manager None of these


Ans- 1

Computer software can be broadly divided in the following two main categories: transaction and application Windows and Mac OS System software and Application software Word processing and image processing Ans- 3 The new term used for cash registers in computer networked business system is called as _________. Point-of-sale (POS) Cash computer Sales computer None of these Ans- 1 RAID configurations of disks are used to provide:
19

Fault. tolerance High speed High data density None of the above Ans- 1 Consider a schema R(A, B, C, D) and functional dependencies A > B and C >D. Then the decomposition of R into R1(AB) and R2(CD) is Dependency preserving and lossless join Lossless join but not dependency preserving Dependency preserving but not loss less join Not dependency preserving and not lossless join None of the above Ans- 3 To have a file hold a list, it is necessary to identify the records in the list identify the name, width and type of the file of each record decide which fields will be used as sort or index keys All of the above Ans-4 Data management systems may be implemented as system software application software computer program all of the above None of the above Ans-4

20

The most efficient data set organization is: A sequential file An ISAM file Variable depending up'n the usage of the data set A partitioned data set None of the above Ans-3 Which of the following is not an advantage of the data-base approach? elimination of the data redundancy ability to associate related data increased security program/data independence All of the above Ans- 5 Which phase of the development cycle for a moderately-sized package of 100000 lines takes more than 505 of the overall time spent? Design (High-level and low-level) Implementation (Coding, compiling, unit testing) Testing (Integration and system tests) Maintenance (Fine-tuning and re-working) None of the above AnsWhat value RECOUNT(O) returns if no database is in use? Select Answer: Null

21

0 Space No value None of the above Ans-4 The master list of an indexed tile is sorted in ascending order contains only a list of keys and record numbers has a number assigned to each record both 2and 3 Ans- 3 Given the following relation instance xYZ 142 153 163 322 X Y > Z and Z > Y Y Z > X and Y >Z YZ> X and X --> Z XZ--- >SY and Y ---> 5 X Ans- 2 What is meant by "Computer Audit" used in Banking Industry? Practice of using computers to automate or simplify the audit process Practice of testing the computer security procedures and identification lapses before the banking operation is put to risk software designed to read, process and write data with the help of functions performing specific audit routines

22

Practice of financial statement audit with the help of Computers Ans- 1 What does CORE stand for with reference to Core Banking System ? Centralized Online Records Exchange Centralized Office Real-time Exchange Centralized Online Real-time Exchange Central Online Real-time Exchange Ans- 3 Human readable characters printed on documents such as cheques, can be entered into a CD by means of which of the following device? VDU Keyboard MICR OCR Ans- 3 Which type of parallel computer is scalable ? Shared Memory Parallel computer Distributed Memory Parallel computer Both of these None of these Ans- 2 Which computers are used by large organisations such as banks which require storage of data as large as several Gigabytes ? Laptop PCs Desktop PCs Workstations Mainframe Computers

23

Ans- 4 Which one of the following operation is commutative but not associative? OR NAND EX-OR AND None of these Ans- 2 A subnet has been assigned a subnet mask of 255.255.255.192. So how many maximum number of hosts that can belong to this subnet ? 62 14 45 126 Ans- 1 Which one is NOT shared by the threads of the same process ? Message Queue Address Space Stack None of these Ans- 3 Convert FAFAFA in hexadecimal into octal 76767676 76575372 76727672 676787672 Ans- 2 What is the minimum number of NAND gates required to implement a 2-input EXCLUSIVE-OR function without using any other logic gate ?

24

4 3 5 6

Ans- 4 The updating of master files to reflect the effects of current transactions is called? Direct processing File Processing Flow chart Front-end processor

Ans- 2 One or more operations performed on data to achieve a desired objective is called? Database Data processing Data collection Data communication Ans- 2 The overall flow of information among the various departments of an institution is the responsibility of? The board of managers System analysts Computer programmer Computer operators Ans- 1 Arranging data in a specific order is called?
25

Verification Classification Sorting Merging Re-arranging data in a new sequence is known as? Summarizing Batching Updating Sorting

Ans- 2 Which of the following is the expansion of EBCDIC? Extended binary coded decimal information code Extended bootable computerised digital infrared calculator Extended binary coded decimal interchange code Extended bit comparable to digital interface for computer Ans- 3 .
A set of Sample Questions to prepare for IBPS IT Officer Common Written Exam. These questions will give you an idea of type of questions that will be asked in the test. These questions are general, not limited to a specific topic. The actual test has 50 questions under the professional knowledge section. 1. A _________ typically connects personal computers in a small area, usually within a single building. (i) LAN (ii) WAN (iii) TAN (iv) NAN (v) None of these 2. A Computer is a machine that manipulates data, and this manipulation of data is know as: (i) crunching (ii) batching (iii) installing

26

(iv) processing (v) None of these 3. An e-mail address typically consists of a user ID followed by the _________ sign and the name of the e-mail server that manages the users electronic post office box. (i) @ (ii) # (iii) & (iv) * (v) None of these 4. A Computer Software applies ______ , also called algorithms, to process data. (i) arithmetic (ii) procedures (iii) objects (iv) rules (v) None of these 5. A file extension is separated from the main file name with a(n) ______ , but no spaces. (i) question mark (ii) exclamation mark (iii) underscore (iv) period (v) None of these 6. An ad hoc query is a (i) pre-planned question (ii) pre-scheduled question (iii) spur-of-the-moment question (iv) question that will not return any results (v) None of these 7. A Web _________ consists of one or more Web pages located on a Web server. (i) hub (ii) site (iii) story (iv) template (v) None of these 8. A computer _________ is a set of program instructions that can attach itself to a file, reproduce itself, and spread to other files. (i) worm (ii) virus (iii) trojan horse (iv) phishing scam (v) None of these 9. The desktop contains small graphics called: (i) windows (ii) logos (iii) icons

27

(iv) pictures (v) None of these 10. C, BASIC, COBOL, and Java are examples of _________ languages. (i) low-level (ii) computer (iii) system programming (iv) high-level (v) None of these

Bank IT officer Quizzes


1. Which is Computer Memory that does not forget ? Ans: ROM 2. The computer memory holds data and ? Ans: program 3. What is means by term RAM ? Ans: Memory which can be both read and written to 4. Which computer memory is esentially empty ? Ans: RAM 5. The bubbles in a bubble memory pack are created with the help of ? Ans: magnetic field 6. Virtual memory is Ans: an illusion of an extremely large memory 7. Special locality refers to the problem that once a location is referenced Ans: a nearby location will be referenced soon 8. An example of a SPOOLED device Ans: A line printer used to print the output of a number of jobs 9. Page faults occurs when Ans: one tries to divide a number by 0 10. Overlay is Ans: a single contiguous memory that was used in the olden days for running large programs by swapping

28

Operating System Question Answer 11. Concurrent processes are processes that Ans: Overlap in time 12. The page replacement policy that sometimes leads to more page faults when the size of the memory is increased is Ans: FIFO 13. The only state transition that is initiated by the user process itself is Ans: Block 14. Fragmentation is Ans: fragments of memory words unused in a page 15. Give Example of real time systems Ans: Aircraft control system, A process control system PSU Papers for Computer Science 16. Dijkstras banking algorithm in an operating system solves the problem of Ans: Deadlock Avoidance 17. In a paged memory system, if the page size is increased, then the internal fragmentation generally Ans: Becomes more 18. An operating system contains 3 user processes each requiring 2 units of resources R. The minimum number of units of R such that no deadlock will ever occur is Ans: 4 19. Critical region is Ans: A set of instructions that access common shared resources which exclude one another in time 20. Kernel is Ans: The set of primitive functions upon which the rest of operating system functions are built up 21. Necessary conditions for deadlock are Ans: Non-preemption and circular wait, Mutual exclusion and partial allocation 22. In a time sharing operating system, when the time slot given to a process is completed, the process goes from the RUNNING state to the Ans: READY state

29

23. Supervisor call Ans: Are privileged calls that are used to perform resource management functions, which are controlled by the operating system 24. Semaphores are used to solve the problem of Ans: Mutual exclusion, Process synchronization 25. If the property of locality of reference is well pronounced in a programAns: The number of page faults will be less Operating System Question Answer for Competitive Exams 26. Pre-emptive scheduling, is the strategy of temporarily suspending a running processAns: before the CPU time slice expires 27. Mutual exclusion problem occurs Ans: among processes that share resources 27. Sector interleaving in disks is done by Ans: the operating system 28. Disk scheduling involves decidingAns: the order in which disk access requests must be serviced 29. Dirty bit is used to show the Ans: page that is modified after being loaded into cache memory 30. Fence register is used forAns: memory protection. 31. The first-fit, best-fit and worst-fit algorithm can be used forAns: contiguous allocation of memory 32. Give example of single-user operating systemsAns: MS-DOS, XENIX 33. In Round Robin CPU Scheduling, as the time quantum is increased, the average turn around timeAns: varies irregulary 34. In a multiprogramming environmentAns: more than one process resides in the memory 35. The size of the virtual memory depends on the size of the Ans: Address Bus

30

36. Give example of Scheduling Policies in which context switching never take placeAns: Shortest Job First, First-cum-first-served 37. Suppose that a process is in BLOCKED state waiting for some I/O service. When the service is completed, it goes to theAns: READY State

1. An applet __________ (a) is an interpreted program that runs on the client (b) tracks the number of visitors to a Website (c) is a compiled program that usually runs on the client (d) collects data from visitors to a Website (e) None of these 2 The _____ states that a foreign key must either match a primary key value in another relation or it must be null. (a) entity integrity rule (b) referential integrity constraint (c) action assertion (d) composite attribute (e) None of these 3. A _____ sometimes called a boot sector virus, executes when a computer boots up because it resides in the boot sector of a floppy disk or the master boot record of a hard disk. (a) system virus (b) Trojan horse virus (c) file virus (d) macro virus (e) None of these 4. Which error detection method uses ones complement arithmetic? (a) Simply parity check (b) Checksum (c) Two-dimensional parity check (d) CRC

31

(e) None of these 5. A result of a computer virus can not lead to ___. (a) Disk Crash (b) Mother Board Crash (c) Corruption of program (d) Deletion of files (e) None of these 6. The network interface card of LAN is related to following layer of OSI Model(a) Transport (b) Network (c) Data Link (d) Physical (e) All of these 7. Which of the following does not describe a data warehouse? (a) Subject-oriented (b) Integrated (c) Time-variant (d) Updateable (e) None of these 8. Which of the following is true ? (a) Logical design is software-dependent (b) In a distributed database, database is stored in one physical location (c) Conceptual design translates the logical design into internal model (d) Logical design is software independent (e) None of these 9. A range check _____ (a) ensures that only the correct data type is entered into a field (b) verifies that all required data is present (c) determines whether a number is within a specified limit

32

(d) tests if the data in two or more associated fields is logical (e) None of these 10. The total set of interlinked hypertext documents worldwide is(a) HTTP (b) Browser (c) WWW (d) B2B (e) None of these 11. With the object-oriented (OO) approach, an object encapsulates, or_____.a programmer. (a) carries out, the details of an object for (b) hides, the details of an object from (c) reveals, the details of an object to (d) extends, the details of an object beyond (e) None of these 12. Every computer connected to an intranet or extranet must have a distinct_____ (a) firewall (b) proxy server (c) IP address (d) domain name (e) None of these 13. A table of bits in which each row represents the distinct values of a key? (a) Join index (b) Bitmap index (c) B + Tree (d) Hierarchical index (e) None of these 14. The degree of detail that should be incorporated into a database depends on what? (a) Data integrity (b) The type of database

33

(c) The users perspective (d) The business practices and policies (e) None of these 15. The ___.converts digital signals to analog signals for the purpose of transmitting data over telephone lines. (a) Modem (b) Router (c) Gateway (d) Bridge (e) All of these 16. Before a package can be used in a java program it must be___. (a) executed (b) referenced (c) imported (d) declared (e) None of these 17. Choose the correct way to indicate that a line in a C++ program is a comment line, that is, a line the will not be executed as an instruction___. (a) begin the line with a # sign (b) begin the line with double slashes (/ /) (c) begin and end the line with double hyphens (-_-) (d) indent the line (e) None of these 18. Programming language built into user programs such as Word and Excel are known as____ (a) 4GLs (b) macro languages (c) object-oriented languages (d) visual programming languages (e) None of these 19. Firewalls are used to protect against___. (a) Unauthorized Attacks

34

(b) Virus Attacks (c) Data Driven Attacks (d) Fire Attacks (e) All of these 20. This is a standard way for a Web server to pass a Web users request to an application program and to receive data back to forward to the user(a) Interrupt request (b) Forward DNS lookup (c) Data-Link layer (d) File Transfer Protocol (e) Common gateway interface 21. Three SQL, DDL, CREATE commands are__. (a) Schema, Base and Table (b) Base, Table and Schema (c) Key, Base and Table (d) Schema, Table and View (e) None of these 22. Data are ________ in client/server computing. (a) never sent to the client machine (b) sent in very large sections to save processing time (c) sent only upon the clients request (d) sent in complete copies for the client to filter and sort (e) sent from the client to the server for processing 23. Which of the following will not eliminates the ambiguities of a null value? (a) Define the attribute as required (b) Define subtypes (c) Define each attribute as having an initial value that is recognized as blank (d) Define supertypes (e) None of these

35

24. The____directory is mandatory for every disk. (a) Root (b) Base (c) Sub (d) Case (e) None of these 25. This is a group of servers that share work and may be able to back each other up if one server fails. (a) Channel bank (b) Cluster (c) Tiger team (d) Serverless backup (e) Logical unit ANSWERS 1. (a) 2.(c) 3.(e) 4. (b) 5.(b) 6. (e) 7. (d) 8. (a) 9. (c) 10.(a) 11. (b) 12 (c) 13 (b) 14 (b) 15(a) 16. (c) 17 (b) 18 (d) 19 (a) 20 (e) 21. (d) 22 (c) 23 (d) 24 (c) 25 (b)

Professional knowledge
1. What do you understand by 'Authentication' and 'Encryption' in the context of system security? In this context explain (i) Kerberos (ii) IP Security (iii) RSA Encryption 2.Write short notes on each of the following: (a) Trojan Horse (b) Smart Cards 3. Write short notes on each of the following: (a) Trojan Horse (b) Smart Cards (c) Physical threats and security (d) PGP 4. Explain the DMA controller with block diagram. What is meant by a block transfer? What are the various phases of an instruction cycle ? Give the micro operation of fetch and decode phases

36

Compare Static RAM with Dynamic RAM. 5. Using NAND gate generate the AND and NOR functions 6. Which of the following services should be enabled in a secure workstation connected in an Ethernet LAN ? Give reasons for your answer. Anacron, ftp, netfs, nfs, telnet, sendmail, SSH, syslog, SNMP, time. (Assume the LAN is connected to the Internet but is not connected via Firewall nor is Kerberos used). 7. What is a Socket ? Write two differences between a TCP Socket and a UDP Socket. 8. What are the standard port numbers for (i) Web Server (ii) Mail Server (iii) FTP Server (iv) Telnet ? 9 What is Network Address Translation (NAT) ? Give any two advantages and two disadvantages of NAT. 10 What is VPN ? How is it useful for an organization ? 11. What is a Search Engine ? How is it useful for Internet/Intranet ? Give the names of any four Search engines. 12 What is WAP ? Give any two advantages and two limitations of WAP. Also explain its layered architecture.

. 1. Data will remain intact even when the computer is turned off, if it is stored on __________.

1. RAM 2. motherboard 3. secondary storage device 4. primary storage device 5. None of these

2. The motherboard is the:

1. circuit board that houses peripheral devices 2. same as the CPU chip 3. the first chip that is accessed when the computer is turned on 4. circuit board that contains a CPU and other chips 5. None of these

37

3. A(n) __________ converts and executes one statement at a time. 1. compiler 2. instructor 3. converter 4. interpreter 5. None of these

4. A(n) __________ is equipment that might be added to a computer to enhance its functionality. 1. digital device 2. system add-on 3. disk pack 4. peripheral device 5. None of these

5. Approximately how many bytes make one megabyte? 1. One thousand 2. Ten thousand 3. One hundred 4. One million 5. None of these

6. When you delete files on a Windows Computer, they go to 1. Recycle Bin 2. Task Bar 3. Tool Bar 4. My Computer

38

5. None of these

7. A directory inside a directory is called: 1. Mini Directory 2. Junior Directory 3. Part Directory 4. Sub Directory 5. None of these

8. Which is the best definition of a software package? 1. An add-on for your computer such as additional memory 2. A set of computer programs used for a certain function such as word processing 3. A protection you can buy for a computer 4. The box, manual and license agreement that accompany commercial software 5. None of these

9. In MICR, C stands for __________. 1. Code 2. Colour 3. Computer 4. Character 5. None of these

10. Fax machines and imaging systems are examples of: 1. bar-code readers 2. imaging systems 3. scanning devices

39

4. pen-based systems 5. None of these Answers: 1. 6. . 3 1 2. 7. 4 4 3. 8. 4 2 4. 9. 4 4 5. 10. 4 2

40

41

42

43

44

S-ar putea să vă placă și