Ibps I.T. Officer Scale-I 2012

50 Questions | Total Attempts: 177

SettingsSettingsSettings
Please wait...
Scale Quizzes & Trivia

Test consists of 50 Questions 75 Marks. Total Time=30 minutes


Questions and Answers
  • 1. 
    A special type gateway that can keep external users from accessing resources on the LAN users access the external info is called:
    • A. 

      Repeater

    • B. 

      Firewall

    • C. 

      Encryption

    • D. 

      Hub

    • E. 

      None of these

  • 2. 
    In SQL, which command is used to changes data in a data table?
    • A. 

      UPDATE

    • B. 

      INSERT

    • C. 

      BROWSE

    • D. 

      APPEND

    • E. 

      None of These

  • 3. 
    In SQL, which of the following is not a data definition language command?
    • A. 

      RENAME

    • B. 

      REVOKE

    • C. 

      GRANT

    • D. 

      UPDATE

    • E. 

      None of these

  • 4. 
    What is the name given to the exchange of control signals which is necessary for establishing a connection between a modem and a computer at one end of a line and another modem and computer at the other end?
    • A. 

      Handshaking

    • B. 

      Modem

    • C. 

      Protocol

    • D. 

      All of These

    • E. 

      None of these

  • 5. 
    Which command(s) is (are) used to redefine a column of the table in SQL ?
    • A. 

      ALTER TABLE

    • B. 

      DEFINE TABLE

    • C. 

      MODIFY TABLE

    • D. 

      All of these

    • E. 

      None of these

  • 6. 
    In a relational schema, each tuple is divided into fields called
    • A. 

      Relations

    • B. 

      Domains

    • C. 

      Queries

    • D. 

      All of the above

    • E. 

      None of these

  • 7. 
    An indexing operation
    • A. 

      Sorts a file using a single key

    • B. 

      Sorts file using two keys

    • C. 

      Establishes an index for a file

    • D. 

      Both (A) and (C)

    • E. 

      None of these

  • 8. 
    Data security threats include
    • A. 

      Hardware failure

    • B. 

      Privacy invasion

    • C. 

      Fraudulent manipulation of data

    • D. 

      All of these

    • E. 

      RTL

  • 9. 
    A ___ means that one record in a particular record type is related to only one record of another record type.
    • A. 

      One to one relationship

    • B. 

      One to many relationship

    • C. 

      Many to one relationship

    • D. 

      Many to many relationship

    • E. 

      Both (A) and (C)

  • 10. 
    A ___ contains the smallest unit of meaningful data, so you might call it the basic building block for a data file.
    • A. 

      File structures

    • B. 

      Records

    • C. 

      Fields

    • D. 

      Database

    • E. 

      None of These

  • 11. 
    Through linked list one can implement
    • A. 

      Stack

    • B. 

      Graph

    • C. 

      Queue

    • D. 

      All of the above

    • E. 

      None of these

  • 12. 
    A heap allows a very efficient implementation of a
    • A. 

      Doubled ended queue

    • B. 

      Priority queue

    • C. 

      Stacks

    • D. 

      Trees

    • E. 

      None of these

  • 13. 
    In files, there is a key associated with each record which is used to differentiate among different records. For every file there is at least one set of keys that is unique. Such a Key is called
    • A. 

      Unique key

    • B. 

      Prime attribute

    • C. 

      Index key

    • D. 

      Primary Key

    • E. 

      Null key

  • 14. 
    ____ is primarily used for mapping host names and email destinations to IP address but can also be used for other purposes.
    • A. 

      TCP(transfer control protocol)

    • B. 

      DNS(Domain Name System)

    • C. 

      SHA (Secure Hash Algorithm)

    • D. 

      Simple Network Management Protocol (SNMP)

    • E. 

      None of these

  • 15. 
    Override is a method
    • A. 

      For an operation that replaces an inherited method for the same operation

    • B. 

      For a data that replaces an inherited method for the same operation

    • C. 

      For an operation that takes arguments form library function

    • D. 

      All of these

    • E. 

      None of these

  • 16. 
    Local variables
    • A. 

      Are created outside a block

    • B. 

      Are known only to that block

    • C. 

      Continue to exist when their block ends

    • D. 

      Are illegal in C++

    • E. 

      None of these

  • 17. 
    ____ is virus that inserts itself into a system’s memory. Then it take number of actions when an infected file is executed.
    • A. 

      Web scripting virus

    • B. 

      Polymorphic virus

    • C. 

      Macro virus

    • D. 

      Boot sector virus

    • E. 

      Resident virus

  • 18. 
    Each node in a linked list must contain at least:
    • A. 

      Three fields

    • B. 

      Five fields

    • C. 

      Four fields

    • D. 

      Two Fields

    • E. 

      One Field

  • 19. 
    This ___ data mining technique derives rules from real world case examples.
    • A. 

      Waterfall model

    • B. 

      RAD

    • C. 

      White Box

    • D. 

      Spiral model

    • E. 

      Case Based Reasoning

  • 20. 
    The ___ remains operative until the software is required.
    • A. 

      Waterfall model

    • B. 

      Incremental Model

    • C. 

      Spiral Model

    • D. 

      Any Model

    • E. 

      Prototyping model

  • 21. 
    An important application of cryptography, used in computerized commercial and financial transaction
    • A. 

      Data mining

    • B. 

      Data warehousing

    • C. 

      Digital signature

    • D. 

      Media convergence

    • E. 

      Both (b) and (c)

  • 22. 
    Data mining evolve as a mechanism to cater the limitations of ___ systems to deal massive data sets with high dimensionality, new data type, multiple heterogeneous data resource etc.
    • A. 

      OLTP

    • B. 

      OLAP

    • C. 

      DSS

    • D. 

      Data Warehouse

    • E. 

      None of these

  • 23. 
    Rows of a relation are called:
    • A. 

      Relation

    • B. 

      Tuples

    • C. 

      Data structure

    • D. 

      An entity

    • E. 

      None of these

  • 24. 
    Which of the following is not a connecting device?
    • A. 

      Bridge

    • B. 

      Trans receiver

    • C. 

      Router

    • D. 

      Repeater

    • E. 

      None of these

  • 25. 
    Which layer of OSI determines the interface of the system with the user?
    • A. 

      Network

    • B. 

      Application

    • C. 

      Data link

    • D. 

      Session

    • E. 

      None of these