IBPS Specialist IT Officer (SPL)
Exam Paper - Year 2013
(Question Based on Professional Knowledge "Information Technology")
Which of the following microprocessors is not 8bit microprocessor?
- 8085
- 6502
- Z80
- 68000
- None of these
Microprocessor 8085 is the enhanced version of which essentially the same construction set
- 6800
- 8080
- 6800A
- 8000
- All of these
Which of the following interrupts has the lowest priority?
- RST 5.5
- RST 7.5
- TRAP
- INTR
- None of these
The Data control language (DCL).
- is used to manage user access to data bases
- is used to manipulate the contents of a database in some form
- Both (1) and (2)
- Used for inserting, deleting and updating data in a database
- None of these
A collection of fields is called a record with respect of DBMS, a record corresponds to
- Tuple
- Relation
- File
- Attribute
- None of these.
Multiplexer means
- One into many
- Many into one
- Many into many
- All of these
- None of these
Which gate is known as universal gate ?
- NOT gate
- NAND gate
- AND gate
- XOR gate
- None of the above
Which of the following is the first integrated logic family?
- TCL
- T1L
- DTL
- MOS
- RTL
A top to bottom relationship among the items in a database is established by a
- Hierarchical schema
- Network Schema
- Relational Schema
- Both (1) and (2)
- Both (2) and (3)
In the relational schema, each tuple is divided into fields called.
- Relations
- Domains
- Queries
- Both (1) and (2)
- Both (1) and (3)
The modify operation is likely to be done after.
- Delete
- Insert
- Look up
- All of the above
- None of these
The way a particular application views the data from the database that the application uses is a :
- Module
- Relational model
- Schema
- Subschema
- None of these
Which two files are used during operation of the DMBS?
- Query language and utilities
- Data manipulation language and query language:
- Data dictionary and transaction log
- Data dictionary and query language
- None of these
Which normal form is considered adequate for relational database design?
- 2 NF
- 3 NF
- 4 NF
- BCNF
- None of these
An attribute of one matching the primary key another table, is called as
- Foreign key
- Secondary key
- Candidate key
- Composite key
- None of these
Which of the following SQL commands can be used modify existing data in a database table?
- MODIFY
- UPDATE
- CHANGE
- NEW
- None of these
Each node in a linked list must contain at least:
- Three fields
- Five fields
- Four fields
- One fields
- Two fields
The average number of key comparisons done in a successful sequential search in a list of length “n” is
- Log n
- (n-1)/2
- n/2
- (n+1)/2
- None of these
The order of the binary search algorithm is
- n
- n2
- nlog(n)
- log(n)
- None of these
Which of the following is useful in implementing quick sort?
- Stack
- Set
- List
- Queue
- None of these
OSI model consists of ____ layers
- Three
- Five
- Six
- Eight
- Seven
Which data communication method is used to transmit the data over a serial communication link.
- Simplex
- Full duplex
- Half duplex
- Both (1) and (2)
- Both (2) and (3)
Encryption and decryption are functions of the ____ layer.
- Transport
- Session
- Application
- Physical
- Presentation
Which of the following is not a connecting device?
- Bridge
- Trans receiver
- Router
- Repeater
- None of these
Repeaters function in the ___ layer
- Physical
- Data link
- Network
- Both (1) and (2)
- None of these
How many hosts are attached to each of the local area network at your site?
- 128
- 256
- 254
- 64
- None of these
Which of the following types of software should we use if we often need to create, edit and print documents?
- Word processing
- Spread sheet
- Object program
- UNIX
- None of these
Thrashing
- Can always be avoided by swapping
- Is a natural consequence of virtual memory system Always occurs on large computers
- Can be caused by poor paging algorithms
- None of these
_____ is present in spiral model
- Code generator
- Risk analysis
- Code optimizer
- Reengineering
- None of these
The approach used in top down analysis and design is :
- To identify the top level functions by combining many smaller components into a single entity
- To identify a top level function and then create hierarchy of lower level modules and components
- To prepare flowcharts after programming has been completed
- All of these
- None of these
B2C ecommerce focuses on customer ___.
- Respond to customer
- Obtain customer feedback
- Establish buyerseller transaction
- All of the above
- None of these
OLAP stands for
- Online Analytical project
- Online Analytical problem
- Online Application process
- Online Application Problem
- Online Analytical processing
Data mining is
- Storing data when in need
- Automatic extraction of patters of information
- Searching data on Internet
- All of these
- None of these
Decision support system are based on ____ analysis
- Query and reporting
- Data mining
- OLAP
- All of the above
- None of these
The term push and pop is related to the
- Array
- Lists
- Stacks
- All of the above
- None of these
The break statement causes an exit.
- From the innermost loop only
- Only from the innermost switch
- From the loops and switches
- From the innermost loop or switch
- None of these
Backup procedure helps in
- Restoring the operation whenever there is a disk failure
- Restoring both application and system software whenever there is disk corruption
- Restoring the data sites whenever there is a system crash
- All of the above
- None of these
Software testing is
- The process of demonstrating that error are not present
- One process of establishing confidence that a program does what it is supposed to do
- The process of executing a program to show that it is working as per specifications
- The process of executing a program with the intent of finding errors
- None of these
Regression testing in primarily related to
- Functional testing
- Data flow testing
- Development testing
- Maintenance testing
- None of these
Which of the following is easiest software development process model?
- Waterfall Model
- Prototyping
- Interactive enhancement
- Spiral model
- All of these
Banker’s algorithm for resource allocation deals with
- Deadlock prevention
- Deadlock avoidance
- Deadlock recovery
- Mutual exclusion
- All of these
In Queues, the items deleted at one end is called.
- Rear
- Front
- Top
- Base
- None of these
Pointer is used in
- Direct Addressing
- Indirect Addressing
- Indexed mode
- Immediate Addressing
- None of these
An array can be passed in a functions in C language through
- ‘Call by value’ only
- ‘Call by reference’ only
- Both (1) & (2)
- Call by preference
- None of these
HTTP refers to
- Hyper Text Transmission Protocol
- Hyper Text Transfer Protocol
- Hyper Text Tie Protocol
- Hyper Text Total Protocol
- None of these
An email account includes a storage area, often called a (n)
- Attachment
- Hyperlink
- Mailbox
- Ip address
- None of these
A(n) ____ is a collection of information that determines which files you can access and which setting you use.
- Network
- User account
- Operating system
- File system
- None of these
To print a document
- Select the print command and then select OK
- Select the Ready printer and then select OK
- Type PRINT and then press Enter
- Close the document, select the print command then select OK
- None of these
Which part of the computer provides only temporary storage of files?
- ROM memory
- Processor
- Hard drive
- Mother board
- RAM memory
What will be the output of “a” in following code?
#include<stdio.h>
int main()
int a=20;
{
int a=10;
printf(“%d”,a);
printf(“%d”,a); return 0;
}
int main()
int a=20;
{
int a=10;
printf(“%d”,a);
printf(“%d”,a); return 0;
}
answer choices
- 20 20
- 10 20
- 20 10
- 10 10
- Compilation Error
No comments:
Post a Comment