sbicomputer-2012

Upload: utagore58

Post on 03-Jun-2018

218 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/12/2019 SBICOMPuter-2012

    1/38

    SBI IT (Systems) Assistant Manager 2012 Question Paper

    Question 1 to 25

    1. In SQL, which of the following is not a data Manipulation Language Commands?

    1. Delete

    2. Select

    3. Update

    4. Create

    5. None of the above

    The value for an attribute or a column are drawn from a set of values known as -

    0. Tuples

    1. Attributes

    2. Domain

    3. Column

    4. None of these

    Entities having primary key are called

    0. Primary Key

    1. Strong entities

    2. Weak entities

    3. Primary Key

    4. None Of these

    Which of the following is not a type of SQL statement?

    0. Data Manipulation Language (DML)

    1. Data Definition Language (DDL)

    2. Data Control Language (DCL)

    3. Data Communication Language (DCL)

    4. None of these

    Which of the following is not included in DML (Data Manipulation Language)

    0. INSERT

    1. UPDATE

    2. DELETE

    3. CREATE

    4. None of these

    TRUNCATE statement in SQL is a -

    0. DML statement1. DDL statement

    2. DCL statement

    3. DSL statement

    4. None of these

    To discard all pending data changes

    0. COMMIT

  • 8/12/2019 SBICOMPuter-2012

    2/38

    1. ROLLBACK

    2. SAVEPOINT

    3. LOCK

    4. None of these

    Which of the following term is related to the stack?

    0. TOP

    1. PUSH

    2. POP

    3. Rear

    4. A, B and C.

    In Queues, the end from where items inserted is called

    0. Rear

    1. Front

    2. Top

    3. Base

    4. None of these

    Which protocol is used for browsing website:

    0. TCP

    1. FITFP

    2. FTP

    3. TFTP

    4. None of these

    Which of the following is a browser?

    0. Netscape Navigator

    1. Mosaic

    2. Mozilla Firefox

    3. Google chrome

    4. All of these

    Black Box Testing sometime called -

    0. Data flow testing

    1. Loop testing

    2. Behavioral testing

    3. Graph based testing

    4. None of these

    The Objective of testing is0. Debugging

    1. To uncover errors

    2. To gain modularity

    3. To analyze system

    4. None of these

    Choose the right sequence of SDLC (Software development life cycle) steps

  • 8/12/2019 SBICOMPuter-2012

    3/38

    0. Design, Requirement Analysis, Coding, Testing

    1. Requirement Analysis, Design, Coding, Testing

    2. Requirement Analysis, Design, Testing, Coding

    3. Requirement Analysis, Coding, Design, Testing

    4. None of these

    The drawback of the binary tree sort are remedied by the

    0. Linear Sort

    1. Quick Sort

    2. Heap Sort

    3. Insertion Sort

    4. All of these

    Round robin scheduling is essentially the preemptive version of

    0. FIFO

    1. Shortest job first

    2. Shortest remaining

    3. Longest time first

    4. None of these

    ____ is the situation in which a process is waiting on another process, which is also waiting on another process

    which is waiting on the first process. None of the processes involved in this circular wait are making progress.

    0. Deadlock

    1. Starvation

    2. Dormant

    3. All of these

    4. None of these

    Assembly language is a _____

    0. Low Level Language

    1. Middle Level Language

    2. High level Language

    3. User Language

    4. None of these

    Which of the following is a type of translator?

    0. Assembler

    1. Compiler

    2. Interpreter

    3. All of the Above4. None of these

    Multiprogramming systems ___

    0. Are easier to develop than single programming

    1. Execute each job faster

    2. Execute more jobs in the same time

    3. Are used only on large main frame computers

  • 8/12/2019 SBICOMPuter-2012

    4/38

  • 8/12/2019 SBICOMPuter-2012

    5/38

    3. Bit>Byte>Record>Field>File>Database

    4. Bit>Byte>File>Record>Field>Database

    28. JVM is a virtual machine that can execute ___

    1. C language

    2. .net programming

    3. RDBMS

    4. C++ Language

    5. Java byte Code

    29. ODBC is based on ___.

    1. Structured Query Language.

    2. C language

    3. C++ language

    4. .net

    5. None of these

    30. Which of the following is not an advantage of the data-base approach?

    1. Increased security

    2. Elimination data redundancy

    3. Ability to associate related data

    4. Programming/data independence

    5. All of the above

    31. In relational database row and column is called as ____and ____respectively.

    1. Tuple; Attribute

    2. Attribute; Tuple

    3. Tupple;Domain

    4. Attribute; Domain

    5. None of these

    32. To delete a particular column in a relation the command used is:

    1. DELETE

    2. UPDATE

    3. DROP

    4. ALTER

    5. None of these

    33. A primary key if combined with a foreign key creates

    1. Parent-Child relationship between the tables that connect them.

    2. Many to many relationship between the tables that connect them.3. Network model between the tables that connect them.

    4. All of the above

    5. None of the above

    34. Which of the following is record based logical model?

    1. Network Model

    2. Object oriented model

  • 8/12/2019 SBICOMPuter-2012

    6/38

  • 8/12/2019 SBICOMPuter-2012

    7/38

    1. Three tiered

    2. Multithread

    3. Best for any platform

    4. All of these

    5. None of these

    42. In a relational database, this is a data structure that organizes the information about a single topic into row and

    columns.

    1. Block

    2. Record

    3. Tuple

    4. Table

    5. None of these

    43. Which statements about the Java language are true?

    1. Java supports both procedural and object-oriented programming

    2. Java is only a procedural language.

    3. Java is only an Object-Oriented.

    4. Java is related to

    5. None of the above.

    44. Stack is also called ____

    1. First In First Out (LIFO)

    2. Last In First Out (FIFO)

    3. First In Last Out (FILO)

    4. First Come First Served (FCFS)

    5. None of the above

    45. The index created by primary key column is called _____

    1. Unique Index

    2. Composite Index

    3. Single Index

    4. Primary index

    5. None of these

    46. In SQL ,which command(s) is(are) used to remove rows from a table.

    1. Delete

    2. Remove

    3. Truncate

    4. Both5. and (3)

    6. None of the above

    47. In SQL, the CREATE TABLE is used

    1. To create a table, defining its columns, integrity constraints, and storage allocation

    2. To add a column/integrity constraint to a table.

    3. To redefine a column

  • 8/12/2019 SBICOMPuter-2012

    8/38

    4. To change a tables storage characteristics

    5. All of the above

    48. What is the abbreviation is used for a software package that permits the user to create , retrieve and maintain records

    in a database?

    1. DASD

    2. CRMD

    3. DBMS

    4. All of these

    5. None of the above

    49. Choose the right sequence of virus stages -

    1. Triggering, Damage ,Dormancy, propagation

    2. Damage, Triggering ,Dormancy, propagation

    3. Damage, Triggering, propagation ,Dormancy

    4. Triggering, Damage, propagation, Dormancy

    5. Dormancy, Propagation,. Triggering, Damage

    50. In SQL, which command is used to add new rows to a table?

    1. Alter Table

    2. Add row

    3. Insert

    4. Append

    5. None of the Above

    SBI Specialist (Computer & Communication) 2012 Question Paper

    Q1 to 25

    1. To create a copy files in the event of system failure, you create a ___

    1. Firewall

    2. Redundancy

    3. Backup

    4. Restore file

    5. None of these

    Print server uses___ which is a buffler that holds before it is send to the printer.

    0. Queue

    1. Spool

    2. Node

    3. Stack

    4. None of these

    Which of the following identifies specific web page and its computer on the web page?

    0. Web site

    1. URL

    2. Web site address

    3. Domain Name

    4. None of these

  • 8/12/2019 SBICOMPuter-2012

    9/38

    _____ is the computer to computer exchange of routine business data between trading partners in standard data

    formats.

    0. CTS

    1. DSR

    2. VDR

    3. EDI (Electronic data interchange)

    4. None of these

    Communication handler is basically an ____ 16 bit micro controller?

    0. 8085

    1. 8086

    2. 8086A

    3. 80C186

    4. None of these

    Which uses a Pre-Shared Key that is more than 7 and less than 64 characters in length?

    0. WPA-PSK

    1. TKIP

    2. AES

    3. All of these

    4. None of these

    Ping command is used for what purpose?

    0. Test a device on a network whether it is reachable

    1. Test a hard disk fault

    2. Test a bug in the application

    3. Test devices scanning quality

    4. None of these

    Two different kind of networks can be connected by using

    0. Bridges

    1. Satellite

    2. Gateway

    3. Routers

    4. None of these

    Full adder is used to

    0. 2 bit addition

    1. 3 bit addition

    2. 4 bit addition3. 6 bit addition

    4. None of these

    Most important advantage of an IC is its

    0. Easy replacement in case of circuit failure

    1. Low power consumption

    2. Extremely high reliability

  • 8/12/2019 SBICOMPuter-2012

    10/38

    3. Reduced cost

    4. None of these

    An 1C contains 50 gates each of which consists of 6 components. Its belongs to

    0. VLSI

    1. LSI

    2. MS1

    3. SSI

    4. None of these

    Which type of computers use the 8 bit code called EBCDIC?

    0. Minicomputers

    1. Mainframe computers

    2. Super computer

    3. Microcomputer

    4. None of these

    An AND gate

    0. Implements logic addition

    1. Is equivalent to a series switching circuit

    2. Is any-or all gate

    3. Is equivalent to a parallel switching circuit

    4. None of these

    The decimal equivalent of the binary number 11100001111 is

    0. 1806

    1. 1807

    2. 2806

    3. All of these

    4. None of these

    Programs in which of the following memories cant be erased ?

    0. RAM

    1. ROM

    2. Cache Memory

    3. Virtual Memory

    4. None of these

    The IP address 135.5.15.27 belongs to address class?

    0. A

    1. B2. C

    3. D

    4. None of these

    Which are not used in case of applet?

    0. Read /write

    1. Internet

  • 8/12/2019 SBICOMPuter-2012

    11/38

    2. Search engine

    3. All of these

    4. None of these

    Which of the following is not a type of database?

    0. Hierarchical

    1. Relational

    2. Network

    3. Transition

    4. None of these

    Which of the following is not a type of SQL statement?

    0. Data Manipulation Language

    1. Data Definition language

    2. Data control language

    3. Data Standard language

    4. None of these

    In Queue , the items deleted at one end is called

    0. Rear

    1. Front

    2. Top

    3. Base

    4. None of these

    The drawback of the binary tree sort are remedied by the

    0. Linear sort

    1. Heap Sort

    2. Insertion sort

    3. Quick Sort

    4. None of these

    White Box testing, a software testing technique is sometimes called

    0. Graph testing

    1. Basis path

    2. Glass box testing

    3. Data flow testing

    4. Loop testing

    Which of the following is used with database?

    0. EDI1. Credit card

    2. ATM

    3. Payment gateway

    4. Data mining

    When a cracker attempts to misuse or steal data from a system, it is called

    0. Stealing

  • 8/12/2019 SBICOMPuter-2012

    12/38

    1. Intrusion

    2. Virus

    3. Worm

    4. None of these

    To modify existing rows of the table ____ statement is used.

    0. ALTER

    1. MODIFY

    2. UPDATE

    3. COMMIT

    4. DELETE

    Q26 to 50

    26. ____ refers to a family of IEEE standards dealing with local area network and metropolitan area network.

    1. 802

    2. 800

    3. 8014. 803

    5. None of these

    Which is the general network standard for the data link layer in the OSI Reference Model?

    0. IEEE 802.1

    1. IEEE 802.2

    2. IEEE 802.3

    3. IEEE 802.4

    4. IEEE 802.6

    ____ uses a standard called IEEE 802.6.

    0. LAN1. WAN

    2. MAN

    3. Internet

    4. None of these

    Repeater operates in which layer of OSI model?

    0. Application layer

    1. Presentation layer

    2. Physical layer

    3. Transport layer

    4. Data link layer

    Where does Bridge operate in OSI model?

    0. Physical layer

    1. Data link layer

    2. Both (1)and (2)

    3. Application layer

    4. None of these

  • 8/12/2019 SBICOMPuter-2012

    13/38

    Which of the following uses the greatest number of layers in the OSI model?

    0. Bridge

    1. Repeater

    2. Router

    3. Gateway

    4. None of these

    Routers operate in which layer of the OSI model?

    0. Physical layer

    1. Data link layer

    2. Network Layer

    3. All of these

    4. None of these

    Modem is a _____ that modulates and demodulate signals

    0. DCE (Data circuit-terminating equipment)

    1. DTE (Data terminal equipment)

    2. DTE-DCE

    3. Both (1)and (2)

    4. None of these

    A communication network which is used by large organizations over regional, national or global area is called

    ___

    0. LAN

    1. WAN

    2. MAN

    3. Internet

    4. None of these

    At ___ layer, TCP/IP defines two protocols :Transmission Control Protocol (TCP) and User Datagram

    Protocol(UDP).

    0. Transport layer

    1. Network layer

    2. Physical layer

    3. Application layer

    4. None of these

    The ___ layer is the layer closest to transmission medium.

    0. Transport

    1. Network2. Data link

    3. Physical

    4. None of the above

    End to end connectivity is provided from host to host in :

    0. Network layer

    1. Session layer

  • 8/12/2019 SBICOMPuter-2012

    14/38

    2. Data link layer

    3. Transport layer

    4. None of these

    Which of the following TCP/ IP protocol is used for transferring electronic mail messages from one machine to

    another?

    0. SNMP

    1. SMTP

    2. RPC

    3. FTP

    4. None of these

    Which of the following is an example of a client-server model?

    0. FTP

    1. DNS

    2. TELNET

    3. All of these

    4. None of these

    Which IEEE Standards is usz for Wi/Fi systems?

    0. 802.11

    1. 802.1

    2. 802.2

    3. 802.3

    4. 802.10

    _____ is the continuous ability to send and receive data between interconnected networks.

    0. FTP

    1. SMTP

    2. TNS

    3. Network Interoperability

    4. None of these

    What is the default subnet mask for a class B network?

    0. 127.5.5.1

    1. 2555.5.0

    2. 255.255.5.0

    3. 255.255.255.0

    4. None of these

    What is loopback address?0. 127.5.5.1

    1. 255.5.5.0

    2. 255.255.5.0

    3. 127.5.5.0

    4. None of these

    Internet-like networks within enterprises.

  • 8/12/2019 SBICOMPuter-2012

    15/38

    0. Intranets

    1. Switching alternating

    2. Inter organizational networks

    3. Extranets

    4. None of these

    A central computer surrounded by one or more satellite computers is called a

    0. Bus network

    1. Ring network

    2. Star network

    3. All of the above

    4. None of these

    With an IP address of 100,you currently have 80 subnets.What subnet mask should you use to maximize the

    number of available hosts?

    0. 192

    1. 240

    2. 248

    3. 224

    4. 252

    Encryption/decryption provides a network with____

    0. Privacy

    1. Authenticity

    2. Integrity

    3. Non-reputation

    4. None of these

    The data to be encrypted at the sender site is called ___.The data to be decrypted at receiver end is called ____

    0. Secret key, public key

    1. Public key, secret key

    2. Plaintext, ciphertext

    3. Ciphertext, plaintext

    4. None of these

    In digital signature the private key is used for ___ and the public key for ____

    0. Encryption, decryption

    1. Decryption, encryption

    2. Plaintext, ciphertext

    3. Ciphertext, plaintext4. None of these

    A ___ s main purpose is to prohibit unauthorized access to your computer via the Internet.

    0. Popup blocker

    1. Firewall

    2. Spyware

    3. Spam assassin

  • 8/12/2019 SBICOMPuter-2012

    16/38

    4. None of these

    IBPS Specialist IT Officer Previous Paper 2012

    Important:A specialist IT officer has to face four sections: Reasoning,

    English, Maths and Professional knowledge (IT). Following contains only the

    MCQs from Professional Section (total 50). Remaining sections to be

    uploaded soon.

    Question 1 to 25

    1. A special type gateway that can keep external users from accessing resources on

    the LAN users accessthe external info is called:

    1. Repeater

    2. Firewall

    3. Encryption

    4. Hub

    5.None of these

    What is the name given to the exchange of control signals which is necessary

    for establishing a connection between a modem and a computer at one end of a

    line and another modem and computer at the other end?

    0. Handshaking

    1. Modem options

    2. Protocol

    3. All of these

    4.None of these

    In SQL, which command is used to changes data in a data table?

    0. UPDATE1. INSERT

    2. BROWSE

    3. APPEND

    4.None of these

  • 8/12/2019 SBICOMPuter-2012

    17/38

    In SQL, which of the following is not a data definition language command?

    0. RENAME

    1. REVOKE

    2. GRANT3. UPDATE

    4.None of these

    Which command(s) is (are) used to redefine a column of the table in SQL ?

    0. ALTER TABLE

    1. DEFINE TABLE

    2. MODIFY TABLE

    3. ALL of the these4.None of these

    In a relational schema, each tuple is divided into fields called

    0. Relations

    1. Domains

    2. Queries

    3. All of the these

    4.None of theseAn indexing operation

    0. Sorts a file using a single key

    1. Sorts file using two keys

    2. Establishes an index for a file

    3. Both (1) and (3)

    4.None of these

    Data security threatsinclude0. Hardware failure

    1. Privacy invasion

    2. Fraudulent manipulation of data

    3. All of these

  • 8/12/2019 SBICOMPuter-2012

    18/38

    4.None of these

    The language used in application programsto request data from the DBMS is

    referred to as the

    0. DML1. DDL

    2. Query language

    3. DCL

    4.None of these

    A ___ contains the smallest unit of meaningful data, so you might call it the

    basic building block for a data file.

    0. File structures1. Records

    2. Fields

    3. Database

    4.None of these

    A ___ means that one record in a particular record type is related to only one

    record of another record type.

    0. One to one relationship1. One to many relationship

    2. Many toone relationship

    3. Many to many relationship

    4.None of these

    Through linked list one can implement

    0. Stack

    1. Graph2. Queue

    3. All of these

    4.None of these

    A heap allows a very efficient implementation of a

  • 8/12/2019 SBICOMPuter-2012

    19/38

    0. Doubled ended queue

    1. Priority queue

    2. Stack

    3. Trees4.None of these

    In files, there is a key associated with each record which is used to differentiate

    among different records. For every file there is at least one set of keys that is

    unique. Such a Key is called

    0. Unique key

    1. Prime attribute

    2. Index key3. Primary Key

    4.Null key

    ____ is primarily used for mapping host names and email destinations to IP

    address but can also be used for other purposes.

    0. TCP(transfer control protocol)

    1. DNS(Domain Name System)

    2. SHA (Secure Hash Algorithm)3. Simple Network Management Protocol (SNMP)

    4.None of these

    Override is a method

    0. For an operation that replaces an inherited method for the same operation

    1. For a data that replaces an inherited method for the same operation

    2. For an operation that takes arguments form library function

    3. All of these4.None of these

    Local variables

    0. Are created outside a block

    1. Are known only to that block

  • 8/12/2019 SBICOMPuter-2012

    20/38

    2. Continue to exist when their block ends

    3. Are illegal in C++

    4.None of these

    ____ is virus that inserts itself into a systems memory. Then it take number ofactions when an infected file is executed.

    0. Web scripting virus

    1. Polymorphic virus

    2. Macro virus

    3. Boot sector virus

    4. Resident virus

    This ___ data mining technique derives rules from real world case examples.0. Waterfall model

    1. RAD

    2. White Box

    3. Spiral model

    4. Case based reasoning

    The ___ remains operative until the software is required.

    0. Waterfall model1. Incremental model

    2. Spiral model

    3. Prototyping model

    4. Incremental model

    Data mining evolve as a mechanism to cater the limitations of ___ systems to

    deal massive data sets with high dimensionality, new data type, multiple

    heterogeneous data resource etc.0. OLTP

    1. OLAP

    2. DSS

    3. DWH

  • 8/12/2019 SBICOMPuter-2012

    21/38

    4.None of these

    An important application of cryptography, used in computerized commercial

    and financial transaction

    0. Data mining1. Data warehousing

    2. Digital signature

    3. Media convergence

    4.None of these

    Rows of a relation are called:

    0. Relation

    1. Tuples2. Data structure

    3. An entity

    4.None of these

    The drawbacks of the binary tree sort are remedied by the

    0. Linear sort

    1. Quick Sort

    2. Heap Sort3. Insertion Sort

    4.None of these

    Which layer of OSI determines the interface of the system with the user?

    0.Network

    1. Application

    2. Data link

    3. Session4.None of these

    Question 26-50

    26.The tracks on a disk which can be accused without repositioning the R/W heads is

    1. Surface

    2. Cylinder

  • 8/12/2019 SBICOMPuter-2012

    22/38

    3. Cluster

    4. All of these

    5.None of these

    Which of the following is true about GUIs?0. They make computers easier to use for nonprofessionals

    1. They use icons and menus that users can select with a mouse

    2. Both (1) and (2)

    3. All of the these

    4.None of these

    A computer system consisting of its processor, memory and I/O devices accepts

    data, processes it and produces the output results .Can you tell in whichcomponent is the raw data fed?

    0. Mass Memory

    1. Main Memory

    2. Logic Unit

    3. Arithmetic unit

    4.None of these

    The mechanical diskette drive in which you insert your diskette is connected tothe computersbus

    0. Data

    1. Communication

    2. Address

    3. Parallel

    4.None of these

    A set of programs that handle firms database responsibilities is called a0. Data base Management System (DBMS)

    1. Data Base Processing System (DBPS)

    2. Data Management System (DMS)

    3. All of these

  • 8/12/2019 SBICOMPuter-2012

    23/38

    4.None of these

    You are in the process of analyzing a problem that requires you to collect and

    store TCP/ IP Packets. Which of the following utilities is best suited for this

    purpose?0.NBTSTAT

    1. Performance Monitor

    2.NETSTAT

    3.Network Monitor

    4. DHCP Management Console

    A top to bottom relationship among the items in a database is established by a

    0. Hierarchical Schema1.Network Schema

    2. Relational Schema

    3. All of the above

    4.None of these

    The process of transferring data intended for a peripheral device into a disk (or

    intermediate store) so that it can be transferred to peripheral at a more convenient

    time or in bulk is known as0. Multiprogramming

    1. Spooling

    2. Caching

    3. Virtual programming

    4.None of these

    Which of the following system program forgoes the production of object code

    to generate absolute machine code and load it into the physical main storagelocation from which it will be executed immediately upon completion of the

    assembly?

    0. Two pass assembler

    1. Load and go assembler

  • 8/12/2019 SBICOMPuter-2012

    24/38

    2. Macro processor

    3. Compiler

    4.None of these

    Relocation bits used by relocating loader are specifically (generated) by:0. Relocating loader itself

    1. Linker

    2. Assembler or translator

    3. Macro processor

    4.None of these

    From what location are the 1st computer instructions available on boot up ?

    0. ROM BIOS1. CPU

    2. Boot.ini

    3. CONFIG.SYS

    4.None of these

    Abstraction is

    0. The act of representing the essential features of something without including

    much detail.1. The act of representing the features of something much detail

    2. A tree structure

    3. All of these

    4.None of these

    Aggregation is a special for of

    0. Generalization

    1. Specialization2. Association

    3. Object

    4.None of these

  • 8/12/2019 SBICOMPuter-2012

    25/38

    Consider an operation of addition. For two numbers, the operating will generate

    a sum. If the operand are strings, and the same operation would produce a third

    string by concatenation. This features is called ____.

    0. Inheritance1. Encapsulation

    2. Polymorphism

    3. Binding

    4.None of these

    In ER diagrams, the term cardinality is a synonym for the term

    0. Attribute

    1. Degree2. Entities

    3. Cartesian

    4.None of these

    An oracle server index

    0. Is a schema object

    1. Is used to speed up the retrieval of rows by using a pointer

    2. Is independent of the table it indexes3. All of these

    4.None of these

    Which of the following is not a context free grammar components?

    0. Terminal symbols

    1.Nonterminal symbol

    2. Production line

    3. List4.None of these

    Which of the following is a phase of RAD model?

    0. Business modeling

    1. Data modeling

  • 8/12/2019 SBICOMPuter-2012

    26/38

  • 8/12/2019 SBICOMPuter-2012

    27/38

    In 8086 the overflow flag is set when

    0. The sum is more than 16 bits

    1. Signed numbers go out their range after an arithmetic operation

    2. Carry and sign flags are set3. During subtraction

    4.None of these

    What does microprocessor speed depends on?

    0. Clock

    1. Data bus width

    2. Address bus width

    3. All of these4.None of these

    The TRAP is one of the interrupts available its INTEL 8085. Which one

    statement is true of TRAP?

    0. It is level triggered

    1. It is negative edge triggered It is positive edge triggered

    2. It is positive edge triggered

    3. It is both positive edge triggered and level triggered4.None of these

    IBPS Specialist IT Officer Previous Paper 2013

    Question 1 to 25

    1. Which of the following microprocessors is not 8bit microprocessor?

    1. 8085

    2. 6502

    3. Z80

    4. 68000

    5.None of these

    2. Microprocessor 8085 is the enhanced version of which essentially the same

    construction set

    1. 6800

  • 8/12/2019 SBICOMPuter-2012

    28/38

    2. 8080

    3. 6800A

    4. 8000

    5. All of these3. Which of the following interrupts has the lowest priority?

    1. RST 5.5

    2. RST 7.5

    3. TRAP

    4. INTR

    5.None of these

    4. The Data control language (DCL).1. is used to manage user access to data bases

    2. is used to manipulate the contents of a database in some form

    3. Both (1) and (2)

    4. Used for inserting, deleting and updating data in a database

    5.None of these

    5. A collection of fields is called a record with respect of DBMS, a record

    corresponds to1. Tuple

    2. Relation

    3. File

    4. Attribute

    5.None of these.

    6. Multiplexer means

    1. One into many2. Many into one

    3. Many into many

    4. All of these

    5.None of these

  • 8/12/2019 SBICOMPuter-2012

    29/38

    7. Which gate is known as universal gate ?

    1.NOT gate

    2.NAND gate

    3. AND gate4. XOR gate

    5.None of the above

    8. Which of the following is the first integrated logic family?

    1. TCL

    2. T1L

    3. DTL

    4. MOS5. RTL

    9. A top to bottom relationship among the items in a database is established by a

    1. Hierarchical schema

    2.Network Schema

    3. Relational Schema

    4. Both (1) and (2)

    5. Both (2) and (3)10.In the relational schema, each tuple is divided into fields called.

    1. Relations

    2. Domains

    3. Queries

    4. Both (1) and (2)

    5. Both (1) and (3)

    11.The modify operation is likely to be done after.1. Delete

    2. Insert

    3. Look up

    4. All of the above

  • 8/12/2019 SBICOMPuter-2012

    30/38

    5.None of these

    12.The way a particular application views the data from the database that the

    application uses is a :

    1. Module2. Relational model

    3. Schema

    4. Subschema

    5.None of these

    13.Which two files are used during operation of the DMBS?

    1. Query language and utilities

    2. Data manipulation language and query language:3. Data dictionary and transaction log

    4. Data dictionary and query language

    5.None of these

    14.Which normal form is considered adequate for relational database design?

    1. 2 NF

    2. 3 NF

    3. 4 NF4. BCNF

    5.None of these

    15.An attribute of one matching the primary key another table, is called as

    1. Foreign key

    2. Secondary key

    3. Candidate key

    4. Composite key5.None of these

    16.Which of the following SQL commands can be used modify existing data in a

    database table?

    1. MODIFY

  • 8/12/2019 SBICOMPuter-2012

    31/38

    2. UPDATE

    3. CHANGE

    4.NEW

    5.None of these17.Each node in a linked list must contain at least:

    1. Three fields

    2. Five fields

    3. Four fields

    4. One fields

    5. Two fields

    18.The average number of key comparisons done in a successful sequential search ina list of length n is

    1. Log n

    2. (n-1)/2

    3. n/2

    4. (n+1)/2

    5.None of these

    19.The order of the binary search algorithm is1. n

    2. n2

    3. nlog(n)

    4. log(n)

    5.None of these

    20.Which of the following is useful in implementing quick sort?

    1. Stack2. Set

    3. List

    4. Queue

    5.None of these

  • 8/12/2019 SBICOMPuter-2012

    32/38

    21.OSI model consists of ____ layers

    1. Three

    2. Five

    3. Six4. Eight

    5. Seven

    22.Which data communication method is used to transmit the data over a serial

    communication link.

    1. Simplex

    2. Full duplex

    3. Half duplex4. Both (1) and (2)

    5. Both (2) and (3)

    23.Encryption and decryption are functions of the ____ layer.

    1. Transport

    2. Session

    3. Application

    4. Physical5. Presentation

    24.Which of the following is not a connecting device?

    1. Bridge

    2. Trans receiver

    3. Router

    4. Repeater

    5.None of these25.Repeaters function in the ___ layer

    1. Physical

    2. Data link

    3.Network

  • 8/12/2019 SBICOMPuter-2012

    33/38

    4. Both (1) and (2)

    5.None of these

    Question 26-50

    26.How many hosts are attached to each of the local area network at your site?1. 128

    2. 256

    3. 254

    4. 64

    5.None of these

    27.Which of the following types of software should we use if we often need to

    create, edit and print documents?1. Word processing

    2. Spread sheet

    3. Object program

    4. UNIX

    5.None of these

    28.Thrashing

    1. Can always be avoided by swapping2. Is a natural consequence of virtual memory system Always occurs on large

    computers

    3. Can be caused by poor paging algorithms

    4.None of these

    29._____ is present in spiral model

    1. Code generator

    2. Risk analysis

    3. Code optimizer

    4. Reengineering

    5.None of these

    30.The approach used in top down analysis and design is :

  • 8/12/2019 SBICOMPuter-2012

    34/38

    1. To identify the top level functions by combining many smaller components

    into a single entity

    2. To identify a top level function and then create hierarchy of lower level

    modules and components3. To prepare flowcharts after programming has been completed

    4. All of these

    5.None of these

    31.B2C ecommerce focuses on customer ___.

    1. Respond to customer

    2. Obtain customer feedback

    3. Establish buyerseller transaction4. All of the above

    5.None of these

    32.OLAP stands for

    1. Online Analytical project

    2. Online Analytical problem

    3. Online Application process

    4. Online Application Problem5. Online Analytical processing

    33.Data mining is

    1. Storing data when in need

    2. Automatic extraction of patters of information

    3. Searching data on Internet

    4. All of these

    5.None of these34.Decision support system are based on ____ analysis

    1. Query and reporting

    2. Data mining

    3. OLAP

  • 8/12/2019 SBICOMPuter-2012

    35/38

    4. All of the above

    5.None of these

    35.The term push and pop is related to the

    1. Array2. Lists

    3. Stacks

    4. All of the above

    5.None of these

    36.The break statement causes an exit.

    1. From the innermost loop only

    2. Only from the innermost switch3. From the loops and switches

    4. From the innermost loop or switch

    5.None of these

    37.Backup procedure helps in

    1. Restoring the operation whenever there is a disk failure

    2. Restoring both application and system software whenever there is disk

    corruption3. Restoring the data sites whenever there is a system crash

    4. All of the above

    5.None of these

    38.Software testing is

    1. The process of demonstrating that error are not present

    2. One process of establishing confidence that a program does what it is

    supposed to do3. The process of executing a program to show that it is working as per

    specifications

    4. The process of executing a program with the intent of finding errors

    5.None of these

  • 8/12/2019 SBICOMPuter-2012

    36/38

    39.Regression testing in primarily related to

    1. Functional testing

    2. Data flow testing

    3. Development testing4. Maintenance testing

    5.None of these

    40.Which of the following is easiest software development process model?

    1. Waterfall Model

    2. Prototyping

    3. Interactive enhancement

    4. Spiral model5. All of these

    41.Bankers algorithm for resource allocation deals with

    1. Deadlock prevention

    2. Deadlock avoidance

    3. Deadlock recovery

    4. Mutual exclusion

    5. All of these42.In Queues, the items deleted at one end is called.

    1. Rear

    2. Front

    3. Top

    4. Base

    5.None of these

    43.Pointer is used in1. Direct Addressing

    2. Indirect Addressing

    3. Indexed mode

    4. Immediate Addressing

  • 8/12/2019 SBICOMPuter-2012

    37/38

    5.None of these

    44.An array can be passed in a functions in C language through

    1. Call by value only

    2. Call by reference only3. Both (1) & (2)

    4. Call by preference

    5.None of these

    45.HTTP refers to

    1. Hyper Text Transmission Protocol

    2. Hyper Text Transfer Protocol

    3. Hyper Text Tie Protocol4. Hyper Text Total Protocol

    5.None of these

    46.An email account includes a storage area, often called a (n)

    1. Attachment

    2. Hyperlink

    3. Mailbox

    4. Ip address5.None of these

    47.A(n) ____ is a collection of information that determines which files you can

    access and which setting you use.

    1.Network

    2. User account

    3. Operating system

    4. File system5.None of these

    48.To print a document

    1. Select the print command and then select OK

    2. Select the Ready printer and then select OK

  • 8/12/2019 SBICOMPuter-2012

    38/38

    3. Type PRINT and then press Enter

    4. Close the document, select the print command then select OK

    5.None of these

    49.Which part of the computer provides only temporary storage of files?1. ROM memory

    2. Processor

    3. Hard drive

    4. Mother board

    5. RAM memory

    50.What will be the output of a in following code?

    #include

    int main()

    int a=20;

    {

    int a=10;

    printf(%d,a);

    printf(%d,a); return 0;

    }

    answer choices

    1. 20 20

    2. 10 20

    3. 20 10

    4. 10 10

    5. Compilation Error