IBPS CWE IT Officers Online Mocks 3

25 Questions | Total Attempts: 1448

SettingsSettingsSettings
IBPS CWE Quizzes & Trivia

The Questions give you a fair idea of the IBPS IT Officer Exam Question Paper Pattern and help you prepare better. The written examination consists of objective type paper including 5 parts that are as follows: General Intelligence Quantitative Aptitude General Awareness Related to Banking Professional Knowledge English Total Duraion 25 min By: Appliedjobz To download Previous year IBPS Examination Please Visit http://appliedmocks. Blogspot. In


Questions and Answers
  • 1. 
    A special Type Of gateway that can keep external users from accessing resources   on the LAN users access the external info is called_______  
    • A. 

      Repeater

    • B. 

      Firewall

    • C. 

      Hub

    • D. 

      Extension

    • E. 

      None Of these

  • 2. 
    What is the name given to the exchange of control signals which is necessary for establishing a connection between a modem and computer at one end of the line and another modem and computer at other end of the line?   
    • A. 

      Hand shaking

    • B. 

      Modem option

    • C. 

      Protocols

    • D. 

      All of these

    • E. 

      None of these

  • 3. 
     In SQL which command is used to changes data in data table?   
    • A. 

      UPDATE

    • B. 

      Browse

    • C. 

      Insert

    • D. 

      Append

    • E. 

      None of these

  • 4. 
    In SQL which of the following isn’t a data definition language command?    
    • A. 

      Update

    • B. 

      Rename

    • C. 

      Revoke

    • D. 

      Grant

    • E. 

      None of these

  • 5. 
    Which Command/s is/are used to redefine a column of the table in SQL?
    • A. 

      Define Table

    • B. 

      Modify Table

    • C. 

      Alter Table

    • D. 

      All of these

    • E. 

      None of these

  • 6. 
     In a relational schema, each tuple is divided into fields called.      
    • A. 

      Relations

    • B. 

      Domains

    • C. 

      Queries

    • D. 

      All of these

    • E. 

      None of these

  • 7. 
    An indexing operation
    • A. 

      Sorts a file using a single key

    • B. 

      Sorts file using two keys

    • C. 

      Establishes an index for a file

    • D. 

      Both a and b

    • E. 

      None of these

  • 8. 
     Data security threats include
    • A. 

      Hardware failure

    • B. 

      Privacy Invasion

    • C. 

      Fraudulent manipulation of data

    • D. 

      All of these

    • E. 

      None of these

  • 9. 
    The Language used in the application Programs to request a data from the DBMS is referred to as       
    • A. 

      DML

    • B. 

      DDL

    • C. 

      Query Language

    • D. 

      DCL

    • E. 

      None Of these

  • 10. 
    A _______ contains the smallest unit of meaning full data , so you might call it basic building  blocks for the data file    
    • A. 

      File Structure

    • B. 

      Record

    • C. 

      Fields

    • D. 

      Data Base

    • E. 

      None Of these

  • 11. 
    A _______ means that one record in a particular record type is related to only one record of another record type    
    • A. 

      One to one relationship

    • B. 

      One to many relationship

    • C. 

      Many to one relationship

    • D. 

      Many to many relationship

    • E. 

      None Of these

  • 12. 
    Through Linked list one can implement    
    • A. 

      Stack

    • B. 

      Graph

    • C. 

      Queue

    • D. 

      All Of these

    • E. 

      None Of these

  • 13. 
    A heap allows a very efficient implementation of a _______   
    • A. 

      Double ended Queue

    • B. 

      Priority Queue

    • C. 

      Stack

    • D. 

      Trees

    • E. 

      None of these

  • 14. 
    In files, there is a key associated with each record which is used to differentiate among different record. For every file there is at least one set of a key that is unique. Such a key is called _______  
    • A. 

      Unique key

    • B. 

      Prime Attribute

    • C. 

      Index Key

    • D. 

      Primary Key

    • E. 

      Null Key

  • 15. 
     _______ is primarily used for mapping host names and email destinations to IP address but can also be used for other purposes    
    • A. 

      TCP (Transfer Control Protocol)

    • B. 

      DNS ( Domain Name System)

    • C. 

      SHA (secure hash Algorithm)

    • D. 

      SNMP(simple Network management Protocol)

    • E. 

      None of these

  • 16. 
    Which layer of OSI determines the interface of the system with the users? 
    • A. 

      Network

    • B. 

      Application

    • C. 

      Data link

    • D. 

      Session

    • E. 

      None

  • 17. 
    The Drawbacks of binary Tree sort are remedied by the
    • A. 

      Linear sort

    • B. 

      Quicker sort

    • C. 

      Heap Sort

    • D. 

      Insertion Sort

    • E. 

      None

  • 18. 
    Row of a relation are called   
    • A. 

      Relation

    • B. 

      Tuples

    • C. 

      Data Structure

    • D. 

      An entity

    • E. 

      None of these

  • 19. 
    An important application of cryptography , used in computerized commercial and financial transaction
    • A. 

      Data mining

    • B. 

      Data warehousing

    • C. 

      Digital Signature

    • D. 

      Media Convergence

    • E. 

      None of these

  • 20. 
    Data mining evolve as a mechanism to cater the limitations of  _______   system to deal massive data sets with high dimensionality, new data type, multiple heterogeneous data resources etc. 
    • A. 

      OLTP

    • B. 

      OLAP

    • C. 

      DSS

    • D. 

      DWH

    • E. 

      None of these

  • 21. 
    The _______ model remains operative until the software is required.
    • A. 

      Incremental Model

    • B. 

      Spiral Model

    • C. 

      Prototyping Model

    • D. 

      Waterfall Model

    • E. 

      None of these

  • 22. 
    This _______ data mining techniques derivess rules from real world case examples   
    • A. 

      Waterfall Model

    • B. 

      RAD

    • C. 

      White Box

    • D. 

      Spiral Model

    • E. 

      Case based reasoning

  • 23. 
    Local variables _________     
    • A. 

      Are created outside a block

    • B. 

      Are known only to that block

    • C. 

      Continue to exist when their block ends

    • D. 

      Area illegal in C++

    • E. 

      None of these

  • 24. 
    ____________ is virus that inserts itself into a system's memory. Then it takes number of actions when an infected file is executed.  
    • A. 

      Web scripting virus

    • B. 

      Polymorphic virus

    • C. 

      Macro virus

    • D. 

      Boot sector virus

    • E. 

      Resident virus

  • 25. 
    An Operating System is a _________
    • A. 

      System Softawre

    • B. 

      Application Software

    • C. 

      Hardware

    • D. 

      I/o devics

    • E. 

      Utility Software

Back to Top Back to top