Ibps I.T. Officer Scale-I 2013.

50 Questions | Total Attempts: 235

SettingsSettingsSettings
Please wait...
Scale Quizzes & Trivia

Test consists of 50 Questions 75 Marks. Total Time=30 minutes


Questions and Answers
  • 1. 
    Which of the following microprocessors is not 8bit microprocessor?
    • A. 

      8085

    • B. 

      6502

    • C. 

      Z80

    • D. 

      68000

    • E. 

      None of these

  • 2. 
    Which of the following interrupts has the lowest priority?
    • A. 

      RST 5.5

    • B. 

      RST 7.5

    • C. 

      TRAP

    • D. 

      INTR

    • E. 

      None of These

  • 3. 
    The Data control language (DCL).
    • A. 

      Is used to manage user access to data bases

    • B. 

      Is used to manipulate the contents of a database in some form

    • C. 

      Both (A) and (B)

    • D. 

      Used for inserting, deleting and updating data in a database

    • E. 

      None of these

  • 4. 
    Microprocessor 8085 is the enhanced version of which essentially the same construction set
    • A. 

      6800

    • B. 

      8080

    • C. 

      6800A

    • D. 

      8000

    • E. 

      All of these

  • 5. 
    A collection of fields is called a record with respect of DBMS, a record corresponds to
    • A. 

      Tuple

    • B. 

      Relation

    • C. 

      File

    • D. 

      Attribute

    • E. 

      None of these

  • 6. 
    Multiplexer means
    • A. 

      One into many

    • B. 

      Many into one

    • C. 

      Many into many

    • D. 

      All of the above

    • E. 

      None of these

  • 7. 
    Which gate is known as universal gate ?
    • A. 

      NOT gate

    • B. 

      NAND gate

    • C. 

      AND gate

    • D. 

      XOR gate

    • E. 

      None of these

  • 8. 
    Which of the following is the first integrated logic family?
    • A. 

      TCL

    • B. 

      TIL

    • C. 

      DTL

    • D. 

      MOS

    • E. 

      RTL

  • 9. 
    In the relational schema, each tuple is divided into fields called.
    • A. 

      Relations

    • B. 

      Domains

    • C. 

      Queries

    • D. 

      Both (A) and (B)

    • E. 

      Both (A) and (C)

  • 10. 
    A top to bottom relationship among the items in a database is established by a
    • A. 

      Hierarchical schema

    • B. 

      Network Schema

    • C. 

      Relational Schema

    • D. 

      Both (A) and (B)

    • E. 

      Both (B) and (C)

  • 11. 
    The modify operation is likely to be done after.
    • A. 

      Delete

    • B. 

      Insert

    • C. 

      Look up

    • D. 

      All of the above

    • E. 

      None of these

  • 12. 
    The way a particular application views the data from the database that the application uses is a :
    • A. 

      Module

    • B. 

      Relational model

    • C. 

      Schema

    • D. 

      Subschema

    • E. 

      None of these

  • 13. 
    Which two files are used during operation of the DBMS?
    • A. 

      Query language and utilities

    • B. 

      Data manipulation language and query language:

    • C. 

      Data dictionary and transaction log

    • D. 

      Data dictionary and query language

    • E. 

      None of these

  • 14. 
     Which normal form is considered adequate for relational da   tabase design?  
    • A. 

      2 NF

    • B. 

      3 NF

    • C. 

      4 NF

    • D. 

      5 NF

    • E. 

      BCNF

  • 15. 
    An attribute of one matching the primary key another table, is called as
    • A. 

      Foreign key

    • B. 

      Secondary key

    • C. 

      Candidate key

    • D. 

      Composite key

    • E. 

      None of these

  • 16. 
    Which of the following SQL commands can be used modify existing data in a database table?
    • A. 

      MODIFY

    • B. 

      UPDATE

    • C. 

      CHANGE

    • D. 

      NEW

    • E. 

      None of these

  • 17. 
    The average number of key comparisons done in a successful sequential search in a list of length “n” is
    • A. 

      Log n

    • B. 

      (n-1)/2

    • C. 

      N/2

    • D. 

      (n+1)/2

    • E. 

      None of these

  • 18. 
    Each node in a linked list must contain at least:
    • A. 

      Three fields

    • B. 

      Five fields

    • C. 

      Four fields

    • D. 

      Two Fields

    • E. 

      One Field

  • 19. 
    The order of the binary search algorithm is
    • A. 

      N

    • B. 

      N^2

    • C. 

      Nlog(n)

    • D. 

      Log(n)

    • E. 

      None of these

  • 20. 
    Which of the following is useful in implementing quick sort using recursion?
    • A. 

      Stack

    • B. 

      Set

    • C. 

      List

    • D. 

      Queue

    • E. 

      None of these

  • 21. 
    Which data communication method is used to transmit the data over a serial communication link.
    • A. 

      Simplex

    • B. 

      Full duplex

    • C. 

      Half duplex

    • D. 

      Both (a) and (b)

    • E. 

      Both (b) and (c)

  • 22. 
    OSI model consists of ____ layers
    • A. 

      3

    • B. 

      4

    • C. 

      5

    • D. 

      6

    • E. 

      7

  • 23. 
    Encryption and decryption are functions of the ____ layer.
    • A. 

      Transport

    • B. 

      Session

    • C. 

      Application

    • D. 

      Physical

    • E. 

      Presentation

  • 24. 
    Which of the following is not a connecting device?
    • A. 

      Bridge

    • B. 

      Trans receiver

    • C. 

      Router

    • D. 

      Repeater

    • E. 

      None of these

  • 25. 
    How many hosts are attached to each of the local area network at your site?
    • A. 

      128

    • B. 

      256

    • C. 

      254

    • D. 

      64

    • E. 

      None of these