IBPS SO Examination 2013 IT Officer Professional Knowledge Question Paper

Similar documents
COMPUTER MCQs. 1. DOS floppy disk does not have 1) a boot record 2) a file allocation table 3) a root directory

Syllabus for Computer Science General Part I

1 Adda247 No. 1 APP for Banking & SSC Preparation Website:store.adda247.com

1) What is information system? Describe the basic concepts of information systems.

2c. Content of Computer systems (Component 01)

5. (a) What is secondary storage? How does it differ from a primary storage? (b) Explain the functions of (i) cache memory (ii) Register

M.C.A. DEGREE EXAMINATION, DEC First Year. Time : 03 Hours Maximum Marks : 75

Oracle Database 10g: Introduction to SQL

INFORMATION TECHNOLOGY

ASSIGNMENT-1 M.Sc. DEGREE EXAMINATION, MAY 2018 (First Year) INFORMATION TECHNOLOGY Basics of Information Technology

Seth Jai Parkash Polytechnic, Damla

Lesson Plan for Even semester

SESSION M12-S12 INTERNAL ASSIGNMENT

1. a) Discuss primitive recursive functions with an example? 15M Or b) Statements and applications of Euler s and Fermat s Theorems?

COURSE OUTCOMES OF M.Sc(IT)

Total No. of Questions : 18] [Total No. of Pages : 02. M.Sc. DEGREE EXAMINATION, DEC First Year INFORMATION TECHNOLOGY.

Department Curriculum and Assessment Outline

SRI VENKATESWARA COLLEGE OF ENGINEERING AND TECHNOLOGY DEPARTMENT OF ECE EC6504 MICROPROCESSOR AND MICROCONTROLLER (REGULATION 2013)

VARDHAMAN COLLEGE OF ENGINEERING (AUTONOMOUS) Shamshabad, Hyderabad

M.Sc. (Previous) DEGREE EXAMINATION, MAY First Year Information Technology. Time : 03 Hours Maximum Marks : 75

BSNL TTA Question Paper-Computers Specialization 2007

M.Sc. (Computer Science) I Year Assignments for May Paper I DATA STRUCTURES Assignment I

Borland 105, 278, 361, 1135 Bounded array Branch instruction 7 break statement 170 BTree 873 Building a project 117 Built in data types 126

Introduction... ix. Chapter 1: Exploring Fundamental Programming Concepts... 1

Learning objectives. Computer principles The characteristics of contemporary processors, input, output and storage devices

Total No. of Questions : 18] [Total No. of Pages : 02. M.Sc. DEGREE EXAMINATION, DEC First Year COMPUTER SCIENCE.

Fundamental of I.T. (c) Application of computer *************

1 Adda247 No. 1 APP for Banking & SSC Preparation Website: bankersadda.com sscadda.com store.adda247.com

ACADEMIC YEAR PLANNING - F.Y.J.C. ( ) F.Y.J.C. COMPUTER SCIENCE (Theory)

Week. Lecture Topic day (including assignment/test) 1 st 1 st Introduction to Module 1 st. Practical

Advanced Parallel Architecture Lesson 3. Annalisa Massini /2015

JAIPUR NATIONAL UNIVERSITY, JAIPUR

What Operating Systems Do An operating system is a program hardware that manages the computer provides a basis for application programs acts as an int

SPLIT-UP SYLLABUS ----CHENNAI REGION COMPUTER SCIENCE (Code: 083) Class-XII Academic Session

Course Outline Faculty of Computing and Information Technology

SIR C R REDDY COLLEGE OF ENGINEERING

LIST OF EXPERIMENTS. (1) (Office Automation)

Nepal Telecom Nepal Doorsanchar Company Ltd.

Computer Engineering Syllabus 2017

OCR Level 3 Advanced GCE in Computer Science (H446)

Business Analytics. SQL PL SQL [Oracle 10 g] P r i n c e S e t h i w w w. x l m a c r o. w e b s. c o m

Bonus Content. Glossary

INFORMATION TECHNOLOGY COURSE OBJECTIVE AND OUTCOME

Name of the Assistant/ Associate Professor:Annu Saini Class and Section:BCA 1 st sem Subject:Computer and Programming Fundamentals July 2018

«Computer Science» Requirements for applicants by Innopolis University

(DMCA 101) M.C.A.(Previous) DEGREE EXAMINATION, MAY 2006 PAPER - I - INFORMATION TECHNOLOGY

Microprocessors and Microcontrollers. Assignment 1:

QUESTION BANK CS2252 MICROPROCESSOR AND MICROCONTROLLERS

Chapter 2 Operating-System Structures

DEPARTMENT OF COMPUTER APPLICATIONS CO 2009 REGULATION

Basant Group of Institution


SAMPLE CURRICULUM GUIDE June 2014

Mahathma Gandhi University

Government of Karnataka SYLLABUS FOR SECOND PUC - COMPUTER SCIENCE (41) SUB-UNITS

m ~~I Rt'6"'lcl ati1j4#11'" ~ silttli71 h1 ~

CHAPTER 5 : Introduction to Intel 8085 Microprocessor Hardware BENG 2223 MICROPROCESSOR TECHNOLOGY

Advanced Diploma in Computer Science (907) Computer Systems Architecture

CS401 - Computer Architecture and Assembly Language Programming Glossary By

Lesson Plan for Even semester Govt. Polytechnic Education Society, Lisana (Rewari) Name of the Faculty: Sh. Praveen Kumar Discipline:

SUBJECT COMPUTER APPLICATION PAGE 1

C86 80C88 DS-186

Introduction to Microprocessor

Computer Architecture

Model Answer of System Software B. Tech. (4 th Semester Examination) Paper Code: AR Branch: Information Technology

Chapter 1 SQL and Data

Oracle Database 11g: SQL and PL/SQL Fundamentals

ADMINISTRATIVE MANAGEMENT COLLEGE

4 Categories Of 8085 Instructions That Manipulate Data

In 8086 Carry flag, Parity flag, Auxiliary carry flag, Zero flag, Overflow flag, Trace flag, Interrupt flag, Direction flag, and Sign flag.


SCIENCE ENTRANCE ACADEMY III PREPARATORY EXAMINATION SCHEME OF VALUATION

Practical Malware Analysis

Computer Architecture 2/26/01 Lecture #

Chapter 8 & Chapter 9 Main Memory & Virtual Memory

UNIVERSITY OF MALTA THE MATRICULATION CERTIFICATE EXAMINATION ADVANCED LEVEL. COMPUTING May 2011 MARKING SCHEME

A Unit of SequelGate Innovative Technologies Pvt. Ltd. All Training Sessions are Completely Practical & Real-time

Q1. Describe C.P.U and its subunits with the help of diagram?

Rajiv GandhiCollegeof Engineering& Technology, Kirumampakkam.Page 1 of 10

Computer System Overview. Chapter 1

Main Points of the Computer Organization and System Software Module

Previous Year Questions

P.G.D.C.A. EXAMINATION, 2009

Run time environment of a MIPS program


BACHELORS IN COMPUTER APPLICATIONS COMPUTER NETWORKS PAPER CODE: BCA-401

Basic characteristics & features of 8086 Microprocessor Dr. M. Hebaishy

Assignment Session : July-March

5. Single-row function

UNIT-IV (Relational Database Language, PL/SQL)

II B.Sc(IT) [ BATCH] IV SEMESTER CORE: RELATIONAL DATABASE MANAGEMENT SYSTEM - 412A Multiple Choice Questions.

CIS 21 Final Study Guide. Final covers ch. 1-20, except for 17. Need to know:

APPENDIX 1. Glossary of computer science terms

B.Sc II Year Computer Science (Optional)

Time : 03 Hours Maximum Marks : 75

Oracle Syllabus Course code-r10605 SQL

CHAPTER ASSEMBLY LANGUAGE PROGRAMMING

EC2304-MICROPROCESSOR AND MICROCONROLLERS 2 marks questions and answers UNIT-I

Oracle Database: SQL and PL/SQL Fundamentals NEW

Table of Contents. Oracle SQL PL/SQL Training Courses

Transcription:

IBPS SO Examination 2013 IT Officer Professional Knowledge Question Paper 1. The tracks on a disk which can be accused without repositioning the R/W heads is (A) Surface (B) Cylinder (C) Cluster 2. Which of the following is true about GUIs? (A) They make computers easier to use for nonprofessionals (B) They use icons and menus that users can select with a mouse (C) Both (A) and (B) (D) All of the these 3. A computer system consisting of its processor, memory and 170 devices accepts data, processes it and produces the output results. Can you tell in which component is the raw data fed? (A) Mass Memory (B) Main Memory (C) Logic Unit (D) Arithmetic unit 4. The mechanical diskette drive in which you insert your diskette is connected to the computer's bus (A) Data (B) Communication (C) Address (D) Parallel 5. A set of programs that handle firm's database responsibilities is called a (A) Data Base Management System (DBMS) (B) Data Base Processing System (DBPS)

(C) Data Management System (DMS) 6. You are in the process of analyzing a problem that requires you to collect and store TCP/IP Packets. Which of the following utilities is best suited for this purpose? (A) NBTSTAT (B) Performance Monitor (C) NETSTAT (D) Network Monitor (E) DHCP Management Console 7. A top to bottom relationship among the items in a database is established by a (A) Hierarchical Schema (B) Network Schema (C) Relational Schema (D) All of the above 8. The process of transferring data intended for a peripheral device into a disk (or intermediate store) so that it can be transferred to peripheral at a more convenient time or in bulk is known as (A) Multiprogramming (B) Spooling (C) Caching (D) Virtual programming 9. Which of the following system program forgoes the production of object code to generate absolute machine code and load it into the physical main storage location from which it will be executed immediately upon completion of the assembly? (A) Two pass assembler (B) Load-and-go assembler (C) Macro processor (D) Compiler 10. Relocation bits used by relocating loader are specified (generated) by

(A) Relocating loader itself (B) Linker (C) Assembler or translator (D) Macro processor 11. From what location are the 1st computer instructions available on boot up? (A) ROM BIOS (B) CPU (C) Boot.ini (D) CONFIG.SYS 12. Abstraction is_ (A) The act of representing the essential features of something without including much detail. (B) The act of representing the features of something much detail (C) A tree structure 13. Aggregation is a special form of (A) Generalization (B) Specialization (C) Association (D) Object 14. Consider an operation of addition. For two numbers, the operating will generate a sum. If the operand are strings, and the same operation would produce a third string by concatenation. This features is called_. (A) Inheritance (B) Encapsulation (C) Polymorphism (D) Binding

15. In E-R diagrams, the term cardinality is a synonym for the term (A) Attribute (B) Degree (C) Entities (D) Cartesian 16. An oracle server index (A) is a schema object (B) is used to speed up the retrieval of rows by using a pointer (C) is independent of the table it indexes 17. Which of the following is not a context free grammar components? (A) Terminal symbols (B) Non-terminal symbol (C) Production line (D) List 18. Which of the following is a phase of RAD model? (A) Business modeling (B) Data modeling (C) Application generation (D) All of the above 19. is a set design steps that allows a DFD with transform flow characteristics to be mapped into a predefined template for program structure. (A) Transaction flow (B) Contributor (C) Transform mapping (D) Design evaluation 20. A combinational logic circuit which is used to send data coming from a single source to two or more separate destinations is called as (A) Decoder (B) Encoder (C) Multiplexer

(D) Demultiplexer 21. Which of the following is a universal gate? (A) AND (B) OR (C) EX-OR (D) NAND 22. The two's compliment of binary number 010111.1100 is (A) 101001.1100 (B) 101000.0100 (C) 010111.0011 (D) 101000.0011 23. In 8086 the overflow flag is set when (A) the sum is more than 16 bits (B) aigned numbers go out their range after an arithmetic operation (C) carry and sign flags are set (D) during subtraction 24. What does microprocessor speed depends on? (A) Clock (B) Data bus width (C) Address bus width 25. The TRAP is one of the interrupts available its INTEL 8085 Which one statement is true of TRAP? (A) It is level triggered (B) It is negative edge triggered (C) It is positive edge triggered (D) It is both positive edge triggered and level triggered 26. A special type gateway that can keep external users from accessing resources on the LAN users access the external info is called_. (A) Repeater

(B) Firewall (C) Encryption (D) Hub 27. What is the name given to the exchange of control signals which is necessary for establishing a connection between a modem and a computer at one end of a line and another modem,and computer at the other end? (A) Handshaking (B) Modem options (C) Protocol 28. In SQL, which command is used to changes data in a data table? (A) UPDATE (B) INSERT (C) BROWSE (D) APPEND 29. In SQL, which of the following is not a data definition language command? (A) RENAME (B) REVOKE (C) GRANT (D) UPDATE 30. Which command(s) is / are used to redefine a column of the table in SQL? (A) ALTER TABLE (B) DEFINE TABLE (C) MODIFY TABLE (D) ALL of the these 31. In a relational schema, each tuple is divided into fields called (A) Relations (B) Domains (C) Queries (D) All of the these 32. An indexing operation (A) Sorts a file using a single key (B) Sorts file using two keys

(C) Establishes an index for a file (D) Both (A) and (C) 33. Data security threats include (A) Hardware failure (B) Privacy invasion (C) Fraudulent manipulation of data 34. The language used in application programs to request data from the DBMS is referred to as the (A) DML (B) DDL (C) Query language (D) DCL 35. A contains the smallest unit of meaningful data, so you might call it the basic building block for a data file. (A) File structures (B) Records (C) Fields (D) Database 36. A_means that one record in a particular record type is related to only one record of another record type. (A) One-to-one relationship (B) One-to-many relationship (C) Many-to-one relationship (D) Many-to-many relationship 37. Through linked list one can implement (A) Stack (B) Graph

(C) Queue 38. A heap allows a very efficient implementation of a (A) Doubled ended queue (B) Priority queue (C) Stack (D) Trees 39. In files, there is a key associated with each record which is used to differentiate among different records. For every file there is at least one set of keys that is unique. Such a Key is called (A) Unique key (B) Prime attribute (C) Index key (D) Primary Key (E) Null key 40. is primarily used for mapping host names and e-mail destinations to TP address but can also be used for other purposes. (A) TCP(transfer control protocol) (B) DNS(Domain Name System) (C) SHA (Secure Hash Algorithm) (D) Simple Network Management Protocol (SNMP) 41. Override is a method (A) for an operation that replaces an inherited method for the same operation (B) for a data that replaces an inherited method for the same operation (C) for an operation that takes arguments form library function 42. Local variables (A) are created outside a block (B) are known only to that block

(C) continue to exist when their block ends (D) are illegal in C++ 43. is virus that inserts itself into a system's memory. Then it take number of actions when an infected file is executed. (A) Web scripting virus (B) Polymorphic virus (C) Macro virus (D) Boot sector virus (E) Resident virus 44., This data mining technique derives rules from real world case examples. (A) Waterfall model (B) RAD (C) White Box (D) Spiral model (E) Case based reasoning 45. The model remains operative until the software is required. (A) Waterfall model (B) Incremental model (C) Spiral model (D) Prototyping model (E) Incremental model 46. Data mining evolve as a mechanism to cater the limitations of systems to deal massive data sets with high dimensionality, new data type, multiple heterogeneous data resource etc. (A) OLTP (B) OLAP (C) DSS (D) DWH 47. An important application of cryptography, used in computerized commercial and financial transaction (A) Data mining

(B) Data warehousing (C) Digital signature (D) Media convergence 48. Rows of a relation are called: (A) Relation (B) Tuples (C) Data structure (D) An entity 49. The drawbacks of the binary tree sort are remedied by the (A) Linear sort (B) Quick Sort (C) Heap Sort (D) Insertion Sort 50. Which layer of OSI determines the interface of the system with the user? (A) Network (B) Application (C) Data link (D) Session