IBPS CWE IT Officers Online Mocks 1

25 Questions | Total Attempts: 654

SettingsSettingsSettings
IBPS CWE Quizzes & Trivia

The Questions give you a fair idea of the IBPS IT Officer Exam Question Paper Pattern and help you prepare better. The written examination consists of objective type paper including 5 parts that are as follows: General Intelligence Quantitative Aptitude General Awareness Related to Banking Professional Knowledge English Total Duraion 25 min By: Appliedjobz To download Previous year IBPS Examination Please Visit http://appliedmocks. Blogspot. In


Questions and Answers
  • 1. 
     The ________ states that a foreign key must either match a primary key value in another relation or it must be null.
    • A. 

      Entity integrity rule

    • B. 

      Referential integrity constraint

    • C. 

      Action assertion

    • D. 

      Composite attribute

    • E. 

      None Of these

  • 2. 
    An applet ________
    • A. 

      is an interpreted program that runs on the client

    • B. 

      tracks the number of visitors to a Website

    • C. 

      Is a compiled program that usually runs on the client

    • D. 

      Collects data from visitors to a Website

    • E. 

      None of these

  • 3. 
    A ________ sometimes called a boot sector virus, executes when a computer boots up because it resides in the boot sector of a floppy disk or the master boot record of a hard disk.
    • A. 

      System virus

    • B. 

      Trojan horse virus

    • C. 

      File virus

    • D. 

      Macro virus

    • E. 

      None Of these

  • 4. 
    This is a group of servers that share work and may be able to back each other up if one server fails.
    • A. 

      Channel bank

    • B. 

      Cluster

    • C. 

      Tiger team

    • D. 

      Serverless Backup

    • E. 

      Logical unit

  • 5. 
    The ________ directory is mandatory for every disk.
    • A. 

      Root

    • B. 

      Base

    • C. 

      Sub

    • D. 

      Case

    • E. 

      None Of these

  • 6. 
    Which of the following will NOT eliminates the ambiguities of a null value?
    • A. 

      Define the attribute as required

    • B. 

      Define subtypes

    • C. 

      Define each attribute as having an initial value that is recognized as blank

    • D. 

      Define supertypes

    • E. 

      None of these

  • 7. 
    Data are ________ in client/server computing.
    • A. 

      Never sent to the client machine

    • B. 

      Sent in very large sections to save processing time

    • C. 

      Sent only upon the client's request

    • D. 

      Sent in complete copies for the client to filter and sort

    • E. 

      None of these

  • 8. 
    Three SQL, DDL, CREATE commands are ________ .
    • A. 

      Schema, Base and Table

    • B. 

      Base, Table and Schema

    • C. 

      Key, Base and Table

    • D. 

      Schema, Table and View

    • E. 

      None of these

  • 9. 
    This is a standard way for a Web server to pass a Web user's request to an application program and to receive data back to forward to the user-
    • A. 

      Interrupt request

    • B. 

      Forward DNS lookup

    • C. 

      Data-Link layer

    • D. 

      File Transfer Protocol

    • E. 

      Common gateway interface

  • 10. 
    Firewalls are used to protect against ________ .
    • A. 

      Unauthorized attacks

    • B. 

      Virus attacks

    • C. 

      Fire attacks

    • D. 

      Data Driven attacks

    • E. 

      All Of these

  • 11. 
     Programming language built into user programs such as Word and Excel are known as ________
    • A. 

      4GLs

    • B. 

      Macro languages

    • C. 

      Object-oriented languages

    • D. 

      Visual programming languages

    • E. 

      None Of these

  • 12. 
    Choose the correct way to indicate that a line in a C++ program is a comment line, that is, a line the will not be executed as an instruction ________ .
    • A. 

      Begin the line with a # sign

    • B. 

      Begin the line with double slashes (/ /)

    • C. 

      Begin and end the line with double hyphens (- _ -)

    • D. 

      Indent the line

    • E. 

      None Of these

  • 13. 
    Before a package can be used in a java program it must be ________ .
    • A. 

      Executed

    • B. 

      Referenced

    • C. 

      Declared

    • D. 

      Imported

    • E. 

      None

  • 14. 
    The ________ converts digital signals to analog signals for the purpose of transmitting data over telephone lines.
    • A. 

      Router

    • B. 

      Modem

    • C. 

      Bridge

    • D. 

      Mux

    • E. 

      Switches

  • 15. 
    The degree of detail that should be incorporated into a database depends on what?
    • A. 

      Data integrity

    • B. 

      The type of database

    • C. 

      The user's perspective

    • D. 

      The business practices and policies

    • E. 

      None of these

  • 16. 
    A table of bits in which each row represents the distinct values of a key?
    • A. 

      Join index

    • B. 

      Bitmap index

    • C. 

      B + Tree

    • D. 

      Hierarchical index

    • E. 

      None of these

  • 17. 
     Every computer connected to an intranet or extranet must have a distinct ________
    • A. 

      Firewall

    • B. 

      Proxy server

    • C. 

      IP address

    • D. 

      Domain name

    • E. 

      None of these

  • 18. 
    With the object-oriented (OO) approach, an object encapsulates, or ________ a programmer.
    • A. 

      Carries out, the details of an object for

    • B. 

      Hides, the details of an object from

    • C. 

      Reveals, the details of an object to

    • D. 

      Extends, the details of an object beyond

    • E. 

      None of these

  • 19. 
    The total set of interlinked hypertext documents worldwide is-
    • A. 

      HTTP

    • B. 

      Browser

    • C. 

      WWW

    • D. 

      B2B

    • E. 

      None of these

  • 20. 
    A range check ________
    • A. 

      Ensures that only the correct data type is entered into a field

    • B. 

      Verifies that all required data is present

    • C. 

      Determines whether a number is within a specified limit

    • D. 

      (d) tests if the data in two or more associated fields is logical tests if the data in two or more associated fields is logical

    • E. 

      None of these

  • 21. 
     Which of the following is TRUE ?
    • A. 

      Logical design is software-dependent

    • B. 

      In a distributed database, database is stored in one physical location

    • C. 

      Conceptual design translates the logical design into internal model

    • D. 

      Logical design is software independent

    • E. 

      None of these

  • 22. 
     Which of the following does NOT describe a data warehouse?
    • A. 

      Subject-oriented

    • B. 

      Integrated

    • C. 

      Time-variant

    • D. 

      Updateable

    • E. 

      None Of these

  • 23. 
    The network interface card of LAN is related to following layer of OSI Model
    • A. 

      Transport

    • B. 

      DATA

    • C. 

      Network

    • D. 

      Physical

    • E. 

      None

  • 24. 
    A result of a computer virus can NOT lead to ________ .
    • A. 

      Disk Crash

    • B. 

      Mother Board Crash

    • C. 

      Corruption of program

    • D. 

      Deletion of files

    • E. 

      None of these

  • 25. 
    Which error detection method uses one's complement arithmetic?
    • A. 

      Simply parity check

    • B. 

      Checksum

    • C. 

      Two-dimensional parity check

    • D. 

      CRC

    • E. 

      None

Back to Top Back to top