previous year papers it officer
TRANSCRIPT
-
8/13/2019 previous year papers it officer
1/26
A special type gateway that can keep external users from accessing resources on the
LAN users access the external info is called:
Repeater
Firewall
Encryption
Hub
None of these
hat is the name gi!en to the exchange of control signals which is necessary for
establishing a connection between a modem and a computer at one end of a line and
another modem and computer at the other end"
Handshaking
#odem options
$rotocol
All of these
None of these
%n &'L( which command is used to changes data in a data table"
)$*A+E
%N&ER+
,R-&E
A$$EN*
None of these
%n &'L( which of the following is not a data definition language command"
RENA#E
RE.-/E
0RAN+
)$*A+E
None of these
-
8/13/2019 previous year papers it officer
2/26
hich command1s2 is 1are2 used to redefine a column of the table in &'L "
AL+ER +A,LE
*EF%NE +A,LE
#-*%F3 +A,LE
ALL of the these
None of these
%n a relational schema( each tuple is di!ided into fields called
Relations
*omains
'ueries
All of the these
None of these
An indexing operation
&orts a file using a single key
&orts file using two keys
Establishes an index for a file
,oth 142 and 152
None of these
*ata security threats include
Hardware failure
$ri!acy in!asion
Fraudulent manipulation of data
All of these
None of these
+he language used in application programs to re6uest data from the *,#& is referred
to as the
*#L
-
8/13/2019 previous year papers it officer
3/26
**L
'uery language
*7L
None of these
A 888 contains the smallest unit of meaningful data( so you might call it the basic
building block for a data file9
File structures
Records
Fields
*atabase
None of these
A 888 means that one record in a particular record type is related to only one record of
another record type9
-ne to one relationship
-ne to many relationship
#any toone relationship
#any to many relationship
None of these
+hrough linked list one can implement
&tack
0raph
'ueue
All of these
None of these
A heap allows a !ery efficient implementation of a
*oubled ended 6ueue
$riority 6ueue
-
8/13/2019 previous year papers it officer
4/26
&tack
+rees
None of these
%n files( there is a key associated with each record which is used to differentiateamong different records9 For e!ery file there is at least one set of keys that is uni6ue9
&uch a /ey is called
)ni6ue key
$rime attribute
%ndex key
$rimary /ey
Null key
8888 is primarily used for mapping host names and email destinations to %$ address
but can also be used for other purposes9
+7$1transfer control protocol2
*N&1*omain Name &ystem2
&HA 1&ecure Hash Algorithm2
&imple Network #anagement $rotocol 1&N#$2
None of these
-!erride is a method
For an operation that replaces an inherited method for the same operation
For a data that replaces an inherited method for the same operation
For an operation that takes arguments form library function
All of these
None of these
Local !ariables
Are created outside a block
Are known only to that block
7ontinue to exist when their block ends
-
8/13/2019 previous year papers it officer
5/26
Are illegal in 7
None of these
8888 is !irus that inserts itself into a system;s memory9 +hen it take number of actions
when an infected file is executed9
eb scripting !irus
$olymorphic !irus
#acro !irus
,oot sector !irus
Resident !irus
+his 888 data mining techni6ue deri!es rules from real world case examples9
aterfall model
RA*
hite ,ox
&piral model
7ase based reasoning
+he 888 remains operati!e until the software is re6uired9
aterfall model
%ncremental model
&piral model
$rototyping model
%ncremental model
*ata mining e!ol!e as a mechanism to cater the limitations of 888 systems to deal
massi!e data sets with high dimensionality( new data type( multiple heterogeneous data
resource etc9
-L+$
-LA$
*&&
*H
-
8/13/2019 previous year papers it officer
6/26
None of these
An important application of cryptography( used in computeri
-
8/13/2019 previous year papers it officer
7/26
'uestion =>?@
+he tracks on a disk which can be accused without repositioning the RB heads is
&urface
7ylinder
7luster
All of these
None of these
hich of the following is true about 0)%s"
+hey make computers easier to use for nonprofessionals
+hey use icons and menus that users can select with a mouse
,oth 142 and 1=2
All of the these
None of these
A computer system consisting of its processor( memory and %B- de!ices accepts data(
processes it and produces the output results 97an you tell in which component is the raw
data fed"
#ass #emory
#ain #emory
Logic )nit
Arithmetic unit
None of these
+he mechanical diskette dri!e in which you insert your diskette is connected to the
computer;sCbus
*ata
7ommunication
Address
$arallel
-
8/13/2019 previous year papers it officer
8/26
None of these
A set of programs that handle firm;s database responsibilities is called a
*ata base #anagement &ystem 1*,#&2
*ata ,ase $rocessing &ystem 1*,$&2
*ata #anagement &ystem 1*#&2
All of these
None of these
3ou are in the process of analy
-
8/13/2019 previous year papers it officer
9/26
hich of the following system program forgoes the production of obDect code to
generate absolute machine code and load it into the physical main storage location from
which it will be executed immediately upon completion of the assembly"
+wo pass assembler
Load and go assembler
#acro processor
7ompiler
None of these
Relocation bits used by relocating loader are specifically 1generated2 by:
Relocating loader itself
Linker
Assembler or translator
#acro processor
None of these
From what location are the 4st computer instructions a!ailable on boot up "
R-# ,%-&
7$)
,oot9ini
7-NF%09&3&
None of these
Abstraction is
+he act of representing the essential features of something without including much
detail9
+he act of representing the features of something much detail
A tree structure
All of these
None of these
Aggregation is a special for of
-
8/13/2019 previous year papers it officer
10/26
0enerali
-
8/13/2019 previous year papers it officer
11/26
Nonterminal symbol
$roduction line
List
None of these
hich of the following is a phase of RA* model"
,usiness modeling
*ata modeling
Application generation
All of the abo!e
None of these
8888 is a set design steps that allows a *F* with transform flow characteristics to be
mapped into a predefined template for program structure9
+ransaction flow
7ontributor
+ransform mapping
*esign e!aluation
None of these
A combinational logic circuit which is used to send data coming from a single source
to two or more separate destinations is called as
*ecoder
Encoder
#ultiplexer
*emultiplexer
None of these
hich of the following is a uni!ersal gate"
AN*
-R
-
8/13/2019 previous year papers it officer
12/26
E-R
NAN*
None of these
+he two;s compliment of binary number 4444944 is
444944
4494
4444944
44944
None of these
%n > the o!erflow flag is set when
+he sum is more than 4> bits
&igned numbers go out their range after an arithmetic operation
7arry and sign flags are set
*uring subtraction
None of these
hat does microprocessor speed depends on"
7lock
*ata bus width
Address bus width
All of these
None of these
+he +RA$ is one of the interrupts a!ailable its %N+EL @9 hich one statement is
true of +RA$"
%t is le!el triggered
%t is negati!e edge triggered %t is positi!e edge triggered
%t is positi!e edge triggered
%t is both positi!e edge triggered and le!el triggered
-
8/13/2019 previous year papers it officer
13/26
None of these
%,$& &pecialist %+ -fficer $re!ious $aper =45
'uestion 4 to =@
hich of the following microprocessors is not bit microprocessor"
@
>@=
G
>
None of these
#icroprocessor @ is the enhanced !ersion of which essentially the same
construction set
>
>A
All of these
hich of the following interrupts has the lowest priority"
R&+ @9@
R&+ 9@
+RA$
%N+R
None of these
+he *ata control language 1*7L29
is used to manage user access to data bases
is used to manipulate the contents of a database in some form
-
8/13/2019 previous year papers it officer
14/26
,oth 142 and 1=2
)sed for inserting( deleting and updating data in a database
None of these
A collection of fields is called a record with respect of *,#&( a record corresponds to
+uple
Relation
File
Attribute
None of these9
#ultiplexer means
-ne into many
#any into one
#any into many
All of these
None of these
hich gate is known as uni!ersal gate "
N-+ gate
NAN* gate
AN* gate
-R gate
None of the abo!e
hich of the following is the first integrated logic family"
+7L
+4L
*+L
#-&
-
8/13/2019 previous year papers it officer
15/26
R+L
A top to bottom relationship among the items in a database is established by a
Hierarchical schema
Network &chema
Relational &chema
,oth 142 and 1=2
,oth 1=2 and 152
%n the relational schema( each tuple is di!ided into fields called9
Relations
*omains
'ueries
,oth 142 and 1=2
,oth 142 and 152
+he modify operation is likely to be done after9
*elete
%nsert
Look up
All of the abo!e
None of these
+he way a particular application !iews the data from the database that the application
uses is a :
#odule
Relational model
&chema
&ubschema
None of these
hich two files are used during operation of the *#,&"
-
8/13/2019 previous year papers it officer
16/26
'uery language and utilities
*ata manipulation language and 6uery language:
*ata dictionary and transaction log
*ata dictionary and 6uery language
None of these
hich normal form is considered ade6uate for relational database design"
= NF
5 NF
I NF
,7NF
None of these
An attribute of one matching the primary key another table( is called as
Foreign key
&econdary key
7andidate key
7omposite key
None of these
hich of the following &'L commands can be used modify existing data in a
database table"
#-*%F3
)$*A+E
7HAN0E
NE
None of these
Each node in a linked list must contain at least:
+hree fields
Fi!e fields
-
8/13/2019 previous year papers it officer
17/26
Four fields
-ne fields
+wo fields
+he a!erage number of key comparisons done in a successful se6uential search in alist of length JnK is
Log n
1n?42B=
nB=
1n42B=
None of these
+he order of the binary search algorithm is
n
n=
nlog1n2
log1n2
None of these
hich of the following is useful in implementing 6uick sort"
&tack
&et
List
'ueue
None of these
-&% model consists of 8888 layers
+hree
Fi!e
&ix
Eight
-
8/13/2019 previous year papers it officer
18/26
&e!en
hich data communication method is used to transmit the data o!er a serial
communication link9
&implex
Full duplex
Half duplex
,oth 142 and 1=2
,oth 1=2 and 152
Encryption and decryption are functions of the 8888 layer9
+ransport
&ession
Application
$hysical
$resentation
hich of the following is not a connecting de!ice"
,ridge
+rans recei!er
Router
Repeater
None of these
Repeaters function in the 888 layer
$hysical
*ata link
Network
,oth 142 and 1=2
None of these
-
8/13/2019 previous year papers it officer
19/26
'uestion =>?@
How many hosts are attached to each of the local area network at your site"
4=
=@>
=@I
>I
None of these
hich of the following types of software should we use if we often need to create( edit
and print documents"
ord processing
&pread sheet
-bDect program
)N%
None of these
+hrashing
7an always be a!oided by swapping
%s a natural conse6uence of !irtual memory system Always occurs on large
computers
7an be caused by poor paging algorithms
None of these
88888 is present in spiral model
7ode generator
Risk analysis
7ode optimi
-
8/13/2019 previous year papers it officer
20/26
-
8/13/2019 previous year papers it officer
21/26
'uery and reporting
*ata mining
-LA$
All of the abo!e
None of these
+he term push and pop is related to the
Array
Lists
&tacks
All of the abo!e
None of these
+he break statement causes an exit9
From the innermost loop only
-nly from the innermost switch
From the loops and switches
From the innermost loop or switch
None of these
,ackup procedure helps in
Restoring the operation whene!er there is a disk failure
Restoring both application and system software whene!er there is disk corruption
Restoring the data sites whene!er there is a system crash
All of the abo!e
None of these
&oftware testing is
+he process of demonstrating that error are not present
-ne process of establishing confidence that a program does what it is supposed to
do
-
8/13/2019 previous year papers it officer
22/26
-
8/13/2019 previous year papers it officer
23/26
None of these
$ointer is used in
*irect Addressing
%ndirect Addressing
%ndexed mode
%mmediate Addressing
None of these
An array can be passed in a functions in 7 language through
7all by !alue; only
7all by reference; only
,oth 142 M 1=2
7all by preference
None of these
H++$ refers to
Hyper +ext +ransmission $rotocol
Hyper +ext +ransfer $rotocol
Hyper +ext +ie $rotocol
Hyper +ext +otal $rotocol
None of these
An email account includes a storage area( often called a 1n2
Attachment
Hyperlink
#ailbox
%p address
None of these
A1n2 8888 is a collection of information that determines which files you can access
and which setting you use9
-
8/13/2019 previous year papers it officer
24/26
Network
)ser account
-perating system
File system
None of these
+o print a document
&elect the print command and then select -/
&elect the Ready printer and then select -/
+ype $R%N+ and then press Enter
7lose the document( select the print command then select -/
None of these
hich part of the computer pro!ides only temporary storage of files"
R-# memory
$rocessor
Hard dri!e
#other board
RA# memory
hat will be the output of JaK in following code"
includeOstdio9hP
int main12
int aQ=
S
-
8/13/2019 previous year papers it officer
25/26
int aQ4
printf1JTdK(a2
printf1JTdK(a2 return
U
answer choices
= =
4 =
= 4
4 4
7ompilation Error
hat topics to prepare: &yllabus for %+ section"
-fficial notification doesn;t mention full syllabus for the %+ topics9 Hence leads to
confusion especially since candidates from parallel graduation streams are permitted:
electronics( communication( and %+9
As a result( market is also flooded with !ariety of books for the %+ topics? to 6uicklymint money from this confusion and uncertainty9 1&ame thing happens in A$F7 labour
commissioner( F7% and so on29
o!erall these readymade books deal with following topics:
basics of hardware software and operating system
%B- system( microprocessors( circuits
-
8/13/2019 previous year papers it officer
26/26
&'L( database management( data mining
7ommunication( networking( security9
,usiness?0/ related social networking sites( smartphones( i$hone etc9
7ommon sense suggests that you;re better off going through your college text books B0A+E guidebooks from reputed authors( rather than putting your future in such randomly
copy pasted =?=@ pages9 After all those @ #7's are worth @ marks9
As per %,$& official notification( *-EAA7 J,K certificate is also !alid for %+ officer post9
+his *-EA77 &ociety is under HR* ministry and its J,K certificate is professionally
e6ui!alent to #7A *egree course9 &o( you can use its syllabus as the common ground;(
and do selecti!e study accordingly from your college books9
&yllabus link: http:BBwww9nielit9inBpdfBsyllabus8b9pdf1E!en contains #ock #7's2
http://www.nielit.in/pdf/syllabus_b.pdfhttp://www.nielit.in/pdf/syllabus_b.pdf