Indian Bank It Officer-2011 Scale-II

50 Questions

Settings
Please wait...
Scale Quizzes & Trivia

Test consists of 50 Questions 75 Marks. Total Time=30 minutes


Questions and Answers
  • 1. 
    A passive threat to computer security is____
    • A. 

      Malicious Intent

    • B. 

      Sabotage

    • C. 

      Accidental Errors

    • D. 

      Espionage Agents

    • E. 

      None of these

  • 2. 
    _______allows wireless mobile devices to access the internet and its services such as Web and e-mail
    • A. 

      TCP/IP

    • B. 

      Ethernet

    • C. 

      WAP

    • D. 

      Token Ring

    • E. 

      None of These

  • 3. 
    DOS Floppy Disk does not have______
    • A. 

      A boot record

    • B. 

      A File Allocation System

    • C. 

      A Root Directory

    • D. 

      Virtual Memory

    • E. 

      BIOS

  • 4. 
    The Secure Electronic Transaction(SET) specification
    • A. 

      Is a notice, issued and verified by a certificate authority, that guarantees a user or Web Site is ligitimate

    • B. 

      Provides private-key encryption of all data that passes between a client and server

    • C. 

      Uses a public key encryption to secure credit card transaction systems

    • D. 

      None of These

    • E. 

      None of these

  • 5. 
    MICR Technology used for clearance of cheques by banks refers to___
    • A. 

      Magnetic Ink Character Recognition

    • B. 

      Magnetic Intelligence Character Recognition

    • C. 

      Magnetic Information Character Recognition

    • D. 

      Magnetic Insurance Case Recognition

    • E. 

      None of these

  • 6. 
    All the information collected during database development is stored in a__________-
    • A. 

      Repository

    • B. 

      Data Warehouse

    • C. 

      RAD

    • D. 

      CASE

    • E. 

      None of these

  • 7. 
    The__________component is used by data analyst to create queries that access the database.
    • A. 

      Data extraction

    • B. 

      End-user query tool

    • C. 

      End-user-presentation tool

    • D. 

      Data store

    • E. 

      None of these

  • 8. 
    A(n)_____allows network users to share a single copy of software, which resides on the network server
    • A. 

      Single-User-License Agreement

    • B. 

      Network-Site License

    • C. 

      End-User License Agreement

    • D. 

      Business software License

    • E. 

      None of These

  • 9. 
    Microwave transmission is used in environments where installing physical media is____
    • A. 

      Diffiicult or impossible and where line-of sight transmission is unavailable

    • B. 

      Easy or promising and where line-of sight transmission is unavailable

    • C. 

      Difficult or impossible and where line-of sight transmission is available

    • D. 

      Easy or promising and where line-of sight transmission is available

    • E. 

      Both (A) and (C)

  • 10. 
    A polymorphic virus_________
    • A. 

      Modifies its program code each time it attaches itself to another program or file.

    • B. 

      Is a malicious logic program that copies itself repeatedly in memory or on a disk drive until no memory or space remains

    • C. 

      A malicious program that hides within or looks like a legitimate program.

    • D. 

      All of these

    • E. 

      None of These

  • 11. 
    Which is NOT a good Web Security strategy?
    • A. 

      Restrict Access to a web server; keep a minimum number of ports opened.

    • B. 

      Limit the users who can load software, edit and add files

    • C. 

      Add demo programs so users can test system without accessing production data

    • D. 

      Remove unnecessary compilers and interpreters

    • E. 

      None of these

  • 12. 
    The altering of data so that it is not usable unless the changes are undone is
    • A. 

      Biometrics

    • B. 

      Compression

    • C. 

      Encryption

    • D. 

      Ergonomics

    • E. 

      None of these

  • 13. 
    FTP stands for
    • A. 

      File Translate Protocol

    • B. 

      File Transit Protocol

    • C. 

      File Typing Protocol

    • D. 

      File Transfer Protocol

    • E. 

      None of above

  • 14. 
    Voice Mail_____________-
    • A. 

      Is the exchange of text messages and computer files transmitted via a communication network such as local area network or Internet

    • B. 

      Permits users to converse in real time with each other via the computer while connected to internet

    • C. 

      Functions much like answering machine allows callers to leave a message for the called party

    • D. 

      Both (B) and (C)

    • E. 

      None of these

  • 15. 
    A communciations processor that connects dissimilar networks by providing the translation form one set of protocols to another is______
    • A. 

      Bridge

    • B. 

      Gateway

    • C. 

      Router

    • D. 

      Modem

    • E. 

      None of these

  • 16. 
    Which of the following is a general purpose programming language designed by Sun Microsystems and well suited for the Web?
    • A. 

      VBScript

    • B. 

      JavaScript

    • C. 

      CSS

    • D. 

      Java

    • E. 

      None of these

  • 17. 
    RSA is_____________--
    • A. 

      Symmetric Cryptosystem

    • B. 

      Asymmetric Cryptosystem

    • C. 

      Block Cipher

    • D. 

      Digital Signature

    • E. 

      None of these

  • 18. 
    This___________that processes HTTP protocol, scripting tasks, performs calculations and provides access to data
    • A. 

      Client

    • B. 

      Applications/Web Server

    • C. 

      Enterprise Server

    • D. 

      DBA

    • E. 

      None of these

  • 19. 
    A DVD RAM is similar to__________except it has storage capacity of 5.2 GB
    • A. 

      CD-R

    • B. 

      Floppy Disk

    • C. 

      CD-RW

    • D. 

      Hard Disk

    • E. 

      None of these

  • 20. 
    When u are selecting mouse for a particular computer system, what is the most important consideration?
    • A. 

      The type of drivers that come with the mouse

    • B. 

      The length of mouse cord

    • C. 

      The type of connector mouse is equipped with

    • D. 

      The number of buttons

    • E. 

      None of these

  • 21. 
    All of the following are basic principles of networks, except
    • A. 

      Each computer must have network card

    • B. 

      There must be a communications media connecting network hardware devices

    • C. 

      There must be atleast one connecting device

    • D. 

      Each computer must have software that supports the movement of information

    • E. 

      None of these

  • 22. 
    How is power supplied to a low-power USB device?
    • A. 

      Through a power cable

    • B. 

      From an external power supply

    • C. 

      Directly from Computer's power supply

    • D. 

      Through the USB cable

    • E. 

      None of these

  • 23. 
    _____________-are used to identify a user who returns to a web site
    • A. 

      Cookies

    • B. 

      Plug-Ins

    • C. 

      Scripts

    • D. 

      ASPs

    • E. 

      None of these

  • 24. 
    Which of the following statements is not true about two-tier cleint-server database architecture?
    • A. 

      SQL statements are processed on Server

    • B. 

      SQL statements may be processed on some clients

    • C. 

      Business logic is processed on Client

    • D. 

      Business logic may be processed on server

    • E. 

      None of these

  • 25. 
    Which of the following objects is passed to a Java bean when one of its properties is set via a JSP action?
    • A. 

      ServletRequest

    • B. 

      HttpServletRequest

    • C. 

      ServletResponse

    • D. 

      HttpServletResponse

    • E. 

      None of these

  • 26. 
    Programs that automatically submit your search request to several search engines simultaneously are called
    • A. 

      Metasearch engines

    • B. 

      Web Crawlers

    • C. 

      Spiders

    • D. 

      Hits

    • E. 

      None of these

  • 27. 
    A computer system consisting of its processor, memory and I/O devices accepts data, processes it and produces the output results .Can you tell in which component is the raw data fed?
    • A. 

      Mass Memory

    • B. 

      Main Memory

    • C. 

      Logic Unit

    • D. 

      Arithmetic unit

    • E. 

      None of these

  • 28. 
    The mechanical diskette drive in which you insert your diskette is connected to the computer’s—bus
    • A. 

      Data

    • B. 

      Communication

    • C. 

      Address

    • D. 

      Parallel

    • E. 

      None of these

  • 29. 
    Graphical Diagrams used to represent multiple perspectives of system include____
    • A. 

      Use-case, class and state diagrams

    • B. 

      State, interaction and derivative diagrams

    • C. 

      Interaction, Relationship and class diagrams

    • D. 

      Deployment, Relationship and use case diagrams

    • E. 

      None of these

  • 30. 
    You are in the process of analyzing a problem that requires you to collect and store TCP/ IP Packets. Which of the following utilities is best suited for this purpose
    • A. 

      NBTSTAT

    • B. 

      Performance Monitor

    • C. 

      NETSTAT

    • D. 

      Network Monitor

    • E. 

      DHCP Management Console

  • 31. 
    In Oracle, which statement is true about segments?
    • A. 

      Each table has its own segments

    • B. 

      A segment is created every time a table is created

    • C. 

      A segment is created everytime when an extent is created, extended or altered

    • D. 

      A segment is deleted every time a table is truncated

    • E. 

      None of these

  • 32. 
    The process of transferring data intended for a peripheral device into a disk (or intermediate store) so that it can be transferred to peripheral at a more convenient time or in bulk is known as
    • A. 

      Multiprogramming

    • B. 

      Spooling

    • C. 

      Caching

    • D. 

      Virtual programming

    • E. 

      None of these

  • 33. 
    Decision support system are based on ____ analysis
    • A. 

      Query and reporting

    • B. 

      Data mining

    • C. 

      OLAP

    • D. 

      All of these

    • E. 

      None of these

  • 34. 
    In Oracle, what is the default number of transactions that MAXTRANS is set?
    • A. 

      512

    • B. 

      10

    • C. 

      40

    • D. 

      1

    • E. 

      None of these

  • 35. 
    To which pin on RAM chip does address decoder connect in order to signal which memory chip is accessing?
    • A. 

      Address input pin

    • B. 

      Ouput enable pin

    • C. 

      Chip Enable pin

    • D. 

      Data input pin

    • E. 

      Data output pin

  • 36. 
    Aggregation is a special form of
    • A. 

      Generalization

    • B. 

      Specialization

    • C. 

      Association

    • D. 

      Object

    • E. 

      None of these

  • 37. 
    An oracle server index—
    • A. 

      Is a schema object

    • B. 

      Is used to speed up the retrieval of rows by using a pointer

    • C. 

      Is independent of the table it indexes

    • D. 

      All of these

    • E. 

      None of these

  • 38. 
    Which of the following switching methods provides greates frame throughput?
    • A. 

      Store and forward switching

    • B. 

      Frame-tag switching

    • C. 

      Cut-through switching

    • D. 

      ISL Switching

    • E. 

      Store and backward switching

  • 39. 
    Which of the following system program forgoes the production of object code to generate absolute machine code and load it into the physical main storage location from which it will be executed immediately upon completion of the assembly?
    • A. 

      Two pass assembler

    • B. 

      Load and go assembler

    • C. 

      Macro processor

    • D. 

      Compiler

    • E. 

      None of these

  • 40. 
    Abstraction is
    • A. 

      The act of representing the essential features of something without including much detail.

    • B. 

      The act of representing the features of something much detail

    • C. 

      A tree structure

    • D. 

      All of these

    • E. 

      None of these

  • 41. 
    Which of the following is a phase of RAD model?
    • A. 

      Business modeling

    • B. 

      Data modeling

    • C. 

      Application generation

    • D. 

      All of the above

    • E. 

      None of these

  • 42. 
    Which of the following is not a context free grammar components?
    • A. 

      Terminal symbols

    • B. 

      Nonterminal symbol

    • C. 

      Production line

    • D. 

      List

    • E. 

      None of these

  • 43. 
    The reason that data outputs of most ROM ICs are tri-state outputs is due to_____
    • A. 

      Allow for three separate data input lines

    • B. 

      All bidirectional flow of data between bus lines and ROM registers

    • C. 

      Permits connections of many ROM chips to a common data bus

    • D. 

      Isolate the registers from data bus during read operations

    • E. 

      All of these

  • 44. 
    A combinational logic circuit which is used to send data coming from a single source to two or more separate destinations is called as
    • A. 

      Decoder

    • B. 

      Encoder

    • C. 

      Multiplexer

    • D. 

      Demultiplexer

    • E. 

      None of these

  • 45. 
    In Oracle, who own data dictionary?
    • A. 

      Oracle

    • B. 

      SYS

    • C. 

      DBA

    • D. 

      SYSTEM

    • E. 

      None of these

  • 46. 
    You need to configure a switch on the remote subnet. Which of these must be configured on the switch?
    • A. 

      Console Port

    • B. 

      IP

    • C. 

      Hostname

    • D. 

      SNMP

    • E. 

      Default Gateway

  • 47. 
    In 8086 the overflow flag is set when
    • A. 

      The sum is more than 16 bits

    • B. 

      Signed numbers go out their range after an arithmetic operation

    • C. 

      Carry and sign flags are set

    • D. 

      During subtraction

    • E. 

      None of above

  • 48. 
    What does microprocessor speed depends on?
    • A. 

      Clock

    • B. 

      Data bus width

    • C. 

      Address bus width

    • D. 

      All of these

    • E. 

      None of these

  • 49. 
    The TRAP is one of the interrupts available its INTEL 8085. Which one statement is true of TRAP?
    • A. 

      It is level triggered

    • B. 

      It is negative edge triggered It is positive edge triggered

    • C. 

      It is positive edge triggered

    • D. 

      It is both positive edge triggered and level triggered

    • E. 

      None of these

  • 50. 
    ____ is a set design steps that allows a DFD with transform flow characteristics to be mapped into a predefined template for program structure.
    • A. 

      Transaction flow

    • B. 

      Contributor

    • C. 

      Transform mapping

    • D. 

      Design evaluation

    • E. 

      None of these