Ibps I.t. Officer Scale-I 2013.

50 Questions

Settings
Please wait...
Scale Quizzes & Trivia

Test consists of 50 Questions 75 Marks. Total Time=30 minutes


Questions and Answers
  • 1. 
    Which of the following microprocessors is not 8bit microprocessor?
    • A. 

      8085

    • B. 

      6502

    • C. 

      Z80

    • D. 

      68000

    • E. 

      None of these

  • 2. 
    Which of the following interrupts has the lowest priority?
    • A. 

      RST 5.5

    • B. 

      RST 7.5

    • C. 

      TRAP

    • D. 

      INTR

    • E. 

      None of These

  • 3. 
    The Data control language (DCL).
    • A. 

      Is used to manage user access to data bases

    • B. 

      Is used to manipulate the contents of a database in some form

    • C. 

      Both (A) and (B)

    • D. 

      Used for inserting, deleting and updating data in a database

    • E. 

      None of these

  • 4. 
    Microprocessor 8085 is the enhanced version of which essentially the same construction set
    • A. 

      6800

    • B. 

      8080

    • C. 

      6800A

    • D. 

      8000

    • E. 

      All of these

  • 5. 
    A collection of fields is called a record with respect of DBMS, a record corresponds to
    • A. 

      Tuple

    • B. 

      Relation

    • C. 

      File

    • D. 

      Attribute

    • E. 

      None of these

  • 6. 
    Multiplexer means
    • A. 

      One into many

    • B. 

      Many into one

    • C. 

      Many into many

    • D. 

      All of the above

    • E. 

      None of these

  • 7. 
    Which gate is known as universal gate ?
    • A. 

      NOT gate

    • B. 

      NAND gate

    • C. 

      AND gate

    • D. 

      XOR gate

    • E. 

      None of these

  • 8. 
    Which of the following is the first integrated logic family?
    • A. 

      TCL

    • B. 

      TIL

    • C. 

      DTL

    • D. 

      MOS

    • E. 

      RTL

  • 9. 
    In the relational schema, each tuple is divided into fields called.
    • A. 

      Relations

    • B. 

      Domains

    • C. 

      Queries

    • D. 

      Both (A) and (B)

    • E. 

      Both (A) and (C)

  • 10. 
    A top to bottom relationship among the items in a database is established by a
    • A. 

      Hierarchical schema

    • B. 

      Network Schema

    • C. 

      Relational Schema

    • D. 

      Both (A) and (B)

    • E. 

      Both (B) and (C)

  • 11. 
    The modify operation is likely to be done after.
    • A. 

      Delete

    • B. 

      Insert

    • C. 

      Look up

    • D. 

      All of the above

    • E. 

      None of these

  • 12. 
    The way a particular application views the data from the database that the application uses is a :
    • A. 

      Module

    • B. 

      Relational model

    • C. 

      Schema

    • D. 

      Subschema

    • E. 

      None of these

  • 13. 
    Which two files are used during operation of the DBMS?
    • A. 

      Query language and utilities

    • B. 

      Data manipulation language and query language:

    • C. 

      Data dictionary and transaction log

    • D. 

      Data dictionary and query language

    • E. 

      None of these

  • 14. 
     Which normal form is considered adequate for relational da   tabase design?  
    • A. 

      2 NF

    • B. 

      3 NF

    • C. 

      4 NF

    • D. 

      5 NF

    • E. 

      BCNF

  • 15. 
    An attribute of one matching the primary key another table, is called as
    • A. 

      Foreign key

    • B. 

      Secondary key

    • C. 

      Candidate key

    • D. 

      Composite key

    • E. 

      None of these

  • 16. 
    Which of the following SQL commands can be used modify existing data in a database table?
    • A. 

      MODIFY

    • B. 

      UPDATE

    • C. 

      CHANGE

    • D. 

      NEW

    • E. 

      None of these

  • 17. 
    The average number of key comparisons done in a successful sequential search in a list of length “n” is
    • A. 

      Log n

    • B. 

      (n-1)/2

    • C. 

      N/2

    • D. 

      (n+1)/2

    • E. 

      None of these

  • 18. 
    Each node in a linked list must contain at least:
    • A. 

      Three fields

    • B. 

      Five fields

    • C. 

      Four fields

    • D. 

      Two Fields

    • E. 

      One Field

  • 19. 
    The order of the binary search algorithm is
    • A. 

      N

    • B. 

      N^2

    • C. 

      Nlog(n)

    • D. 

      Log(n)

    • E. 

      None of these

  • 20. 
    Which of the following is useful in implementing quick sort using recursion?
    • A. 

      Stack

    • B. 

      Set

    • C. 

      List

    • D. 

      Queue

    • E. 

      None of these

  • 21. 
    Which data communication method is used to transmit the data over a serial communication link.
    • A. 

      Simplex

    • B. 

      Full duplex

    • C. 

      Half duplex

    • D. 

      Both (a) and (b)

    • E. 

      Both (b) and (c)

  • 22. 
    OSI model consists of ____ layers
    • A. 

      3

    • B. 

      4

    • C. 

      5

    • D. 

      6

    • E. 

      7

  • 23. 
    Encryption and decryption are functions of the ____ layer.
    • A. 

      Transport

    • B. 

      Session

    • C. 

      Application

    • D. 

      Physical

    • E. 

      Presentation

  • 24. 
    Which of the following is not a connecting device?
    • A. 

      Bridge

    • B. 

      Trans receiver

    • C. 

      Router

    • D. 

      Repeater

    • E. 

      None of these

  • 25. 
    How many hosts are attached to each of the local area network at your site?
    • A. 

      128

    • B. 

      256

    • C. 

      254

    • D. 

      64

    • E. 

      None of these

  • 26. 
    Which of the following types of software should we use if we often need to create, edit and print documents?
    • A. 

      Word processing

    • B. 

      Spread sheet

    • C. 

      Object program

    • D. 

      UNIX

    • E. 

      None of these

  • 27. 
    _____ is present in spiral model
    • A. 

      Code generator

    • B. 

      Risk analysis

    • C. 

      Code optimizer

    • D. 

      Reengineering

    • E. 

      None of these

  • 28. 
    The approach used in top down analysis and design is :
    • A. 

      To identify the top level functions by combining many smaller components into a single entity

    • B. 

      To identify a top level function and then create hierarchy of lower level modules and components

    • C. 

      To prepare flowcharts after programming has been completed

    • D. 

      All of these

    • E. 

      None of these

  • 29. 
    B2C ecommerce focuses on customer ___.
    • A. 

      Respond to customer

    • B. 

      Obtain customer feedback

    • C. 

      Establish buyerseller transaction

    • D. 

      All of these

    • E. 

      None of these

  • 30. 
    OLAP stands for
    • A. 

      Online Analytical project

    • B. 

      Online Analytical problem

    • C. 

      Online Application process

    • D. 

      Online Application Problem

    • E. 

      Online Analytical processing

  • 31. 
    • A. 

      Can always be avoided by swapping

    • B. 

      Is a natural consequence of virtual memory system Always occurs on large computers

    • C. 

      Can be caused by poor paging algorithms

    • D. 

      None of these

  • 32. 
    Data mining is
    • A. 

      Storing data when in need

    • B. 

      Automatic extraction of patters of information

    • C. 

      Searching data on Internet

    • D. 

      All of these

    • E. 

      None of these

  • 33. 
    Decision support system are based on ____ analysis
    • A. 

      Query and reporting

    • B. 

      Data mining

    • C. 

      OLAP

    • D. 

      All of these

    • E. 

      None of these

  • 34. 
    Backup procedure helps in
    • A. 

      Restoring the operation whenever there is a disk failure

    • B. 

      Restoring both application and system software whenever there is disk corruption

    • C. 

      Restoring the data sites whenever there is a system crash

    • D. 

      All of the above

    • E. 

      None of these

  • 35. 
    Banker’s algorithm for resource allocation deals with
    • A. 

      Deadlock prevention

    • B. 

      Deadlock avoidance

    • C. 

      Deadlock recovery

    • D. 

      Mutual exclusion

    • E. 

      All of these

  • 36. 
    Regression testing in primarily related to
    • A. 

      Functional testing

    • B. 

      Data flow testing

    • C. 

      Development testing

    • D. 

      Maintenance testing

    • E. 

      None of these

  • 37. 
    Pointer is used in
    • A. 

      Direct Addressing

    • B. 

      Indirect Addressing

    • C. 

      Indexed mode

    • D. 

      Immediate Addressing

    • E. 

      None of these

  • 38. 
    The break statement causes an exit.
    • A. 

      From the innermost loop only

    • B. 

      Only from the innermost switch

    • C. 

      From the loops and switches

    • D. 

      From the innermost loop or switch

    • E. 

      None of these

  • 39. 
    The term push and pop is related to the
    • A. 

      Array

    • B. 

      Lists

    • C. 

      Stacks

    • D. 

      All of the above

    • E. 

      None of these

  • 40. 
    Software testing is
    • A. 

      The process of demonstrating that error are not present

    • B. 

      One process of establishing confidence that a program does what it is supposed to do

    • C. 

      The process of executing a program to show that it is working as per specifications

    • D. 

      The process of executing a program with the intent of finding errors

    • E. 

      None of these

  • 41. 
    HTTP refers to
    • A. 

      Hyper Text Transmission Protocol

    • B. 

      Hyper Text Transfer Protocol

    • C. 

      Hyper Text Tie Protocol

    • D. 

      Hyper Text Total Protocol

    • E. 

      None of these

  • 42. 
    Array can be passed in a functions in C language through
    • A. 

      ‘Call by value’ only

    • B. 

      ‘Call by reference’ only

    • C. 

      Both (1) & (2)

    • D. 

      Call by preference

    • E. 

      None of these

  • 43. 
    Which of the following is easiest software development process model?
    • A. 

      Waterfall Model

    • B. 

      Prototyping

    • C. 

      Interactive enhancement

    • D. 

      Spiral Model

    • E. 

      All of these

  • 44. 
    An email account includes a storage area, often called a (n)
    • A. 

      Attachment

    • B. 

      Hyperlink

    • C. 

      Mailbox

    • D. 

      IP Address

    • E. 

      None of these

  • 45. 
    A(n) ____  is a collection of information that determines which files you can access and which setting you use.
    • A. 

      Network

    • B. 

      User account

    • C. 

      Operating system

    • D. 

      File System

    • E. 

      None of these

  • 46. 
    To print a document
    • A. 

      Select the print command and then select OK

    • B. 

      Select the Ready printer and then select OK

    • C. 

      Type PRINT and then press Enter

    • D. 

      Close the document, select the print command then select OK

    • E. 

      None of these

  • 47. 
    Which part of the computer provides only temporary storage of files?
    • A. 

      ROM memory

    • B. 

      Processor

    • C. 

      Hard drive

    • D. 

      Mother board

    • E. 

      RAM memory

  • 48. 
    SONET uses
    • A. 

      Twisted Pair Cable

    • B. 

      Fiber Optic Cable

    • C. 

      Co-Axial Cable

    • D. 

      All of these

    • E. 

      None of these

  • 49. 
    1. What will be the output of “a” in following code?
    #include int main() int a=20; { int a=10; printf(“%d”,a); printf(“%d”,a);  return 0; }
    • A. 

      20 20

    • B. 

      10 20

    • C. 

      20 10

    • D. 

      10 10

    • E. 

      Compilation Error

  • 50. 
    In Queue, the items deleted at one end called___
    • A. 

      Rear

    • B. 

      Front

    • C. 

      Top

    • D. 

      Bottom

    • E. 

      None of these