IBPS CWE IT Officers Online Mocks 3

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Appliedjobz
A
Appliedjobz
Community Contributor
Quizzes Created: 20 | Total Attempts: 16,446
| Attempts: 1,490 | Questions: 25
Please wait...
Question 1 / 25
0 %
0/100
Score 0/100
1.  In SQL which command is used to changes data in data table?   

Explanation

The correct answer is UPDATE. In SQL, the UPDATE command is used to modify or change data in a data table. It allows you to update specific columns or rows in a table based on certain conditions or criteria. This command is essential for making changes to existing data in a database.

Submit
Please wait...
About This Quiz
IT Officers Quizzes & Trivia

The Questions give you a fair idea of the IBPS IT Officer Exam Question Paper Pattern and help you prepare better. The written examination consists of objective type... see morepaper including 5 parts that are as follows: General Intelligence Quantitative Aptitude General Awareness Related to Banking
Professional Knowledge
English Total Duraion 25 min By: Appliedjobz To download Previous year IBPS Examination Please Visit http://appliedmocks. Blogspot. In see less

2. A _______ means that one record in a particular record type is related to only one record of another record type    

Explanation

A one-to-one relationship means that each record in one record type is related to only one record in another record type. This type of relationship ensures that there is a unique and direct connection between the two record types, allowing for a specific and exclusive association between them.

Submit
3. Local variables _________     

Explanation

Local variables are known only to the block in which they are declared. They are not accessible or visible outside of that block. Once the block ends, the local variables are no longer in scope and cannot be accessed. This is a fundamental concept in programming languages like C++ where variables have limited visibility and can only be used within the block they are declared in.

Submit
4. Row of a relation are called   

Explanation

The rows of a relation are called tuples. In a relational database, a tuple represents a single record or row of data that contains a set of related attributes or fields. Each tuple in a relation is unique and can be identified by a primary key. Tuples are used to store and organize data in a structured manner, allowing for efficient retrieval and manipulation of information.

Submit
5. A special Type Of gateway that can keep external users from accessing resources   on the LAN users access the external info is called_______  

Explanation

A firewall is a special type of gateway that can keep external users from accessing resources on the LAN that users access the external info. It acts as a barrier between the internal network and the external network, monitoring and controlling incoming and outgoing network traffic based on predetermined security rules. By examining the data packets and determining whether they meet the specified criteria, a firewall can prevent unauthorized access, protect against malicious attacks, and ensure the security and privacy of the network.

Submit
6. An important application of cryptography , used in computerized commercial and financial transaction

Explanation

A digital signature is a cryptographic technique used in computerized commercial and financial transactions to ensure the authenticity, integrity, and non-repudiation of digital messages or documents. It provides a way to verify the identity of the sender and ensure that the message or document has not been tampered with during transmission. This is crucial in secure online transactions where the parties involved need to have trust and confidence in the authenticity and integrity of the exchanged data.

Submit
7. Which layer of OSI determines the interface of the system with the users? 

Explanation

The application layer of the OSI model determines the interface of the system with the users. This layer provides services directly to the user, such as email, file transfer, and web browsing. It is responsible for managing communication between the application and the network, and it ensures that the data is properly formatted and presented to the user.

Submit
8. An Operating System is a _________

Explanation

The correct answer is "System Software". An Operating System is a type of system software that manages computer hardware and software resources, provides common services for computer programs, and allows users to interact with the computer system. It acts as an intermediary between the users and the computer hardware, enabling the execution of application software and providing functions such as file management, memory management, and device management.

Submit
9. In files, there is a key associated with each record which is used to differentiate among different record. For every file there is at least one set of a key that is unique. Such a key is called _______  

Explanation

A primary key is a key associated with each record in a file that is used to differentiate among different records. It is a unique key, meaning that there is at least one set of a key that is unique for every file. The primary key is used to uniquely identify each record in the file and is crucial for maintaining data integrity and ensuring the accuracy of data retrieval and manipulation operations.

Submit
10. Which Command/s is/are used to redefine a column of the table in SQL?

Explanation

The correct answer is "Alter Table". The ALTER TABLE command is used to modify the structure of an existing table in SQL. It allows you to add, delete, or modify columns in the table. This command is commonly used to redefine a column by changing its data type, size, or constraints. Therefore, "Alter Table" is the correct command to use when redefining a column in SQL.

Submit
11.  _______ is primarily used for mapping host names and email destinations to IP address but can also be used for other purposes    

Explanation

The correct answer is DNS (Domain Name System). DNS is primarily used for mapping host names and email destinations to IP addresses. It allows users to easily access websites or send emails by using domain names instead of IP addresses. DNS also provides other functionalities such as load balancing, caching, and security. TCP is a protocol used for establishing a reliable connection between two devices, SHA is a cryptographic hash function, and SNMP is a protocol used for managing and monitoring network devices.

Submit
12. What is the name given to the exchange of control signals which is necessary for establishing a connection between a modem and computer at one end of the line and another modem and computer at other end of the line?   

Explanation

Handshaking is the name given to the exchange of control signals necessary for establishing a connection between a modem and computer at one end of the line and another modem and computer at the other end of the line. Handshaking involves a series of signals that are sent back and forth between the devices to ensure proper synchronization and communication. This process allows the devices to establish a connection and negotiate the parameters of the data transfer. Therefore, the correct answer is handshaking.

Submit
13. The Drawbacks of binary Tree sort are remedied by the

Explanation

Heap Sort is the correct answer because it addresses the drawbacks of binary tree sort. Binary tree sort has a worst-case time complexity of O(n^2), which can be inefficient for large datasets. Heap Sort, on the other hand, has a worst-case time complexity of O(n log n), making it more efficient. It uses a binary heap data structure to sort the elements, ensuring that the largest element is always at the root of the heap. This allows for efficient removal of the root element and maintaining the heap property, resulting in a sorted array.

Submit
14. Through Linked list one can implement    

Explanation

A linked list is a data structure that consists of nodes, where each node contains a value and a reference to the next node. This data structure allows for dynamic memory allocation and efficient insertion and deletion operations. By utilizing the concept of a linked list, one can implement various data structures such as a stack, graph, and queue. Therefore, the correct answer is "All Of these".

Submit
15.  In a relational schema, each tuple is divided into fields called.      

Explanation

In a relational schema, each tuple is divided into fields called "domains". Domains define the data type and constraints of the values that can be stored in each field of a tuple. This ensures that the data stored in the database is consistent and follows the specified rules for each field. Therefore, the correct answer is "Domains".

Submit
16. An indexing operation

Explanation

The correct answer is "Establishes an index for a file." An indexing operation refers to the process of creating an index for a file. An index is a data structure that allows for efficient searching and retrieval of data from a file. It typically contains key-value pairs, where the key is a specific attribute or field in the file, and the value is the corresponding record or location of that attribute in the file. By establishing an index for a file, it becomes easier and faster to locate and access specific data within the file.

Submit
17. A _______ contains the smallest unit of meaning full data , so you might call it basic building  blocks for the data file    

Explanation

Fields contain the smallest unit of meaningful data in a data file. They are the basic building blocks that make up the structure of the file. Each field represents a specific piece of information and is typically assigned a data type that defines the kind of data it can hold. Fields allow for the organization and storage of data in a structured and meaningful way, enabling efficient data retrieval and manipulation.

Submit
18. In SQL which of the following isn't a data definition language command?    

Explanation

The UPDATE command in SQL is not a data definition language (DDL) command. DDL commands are used to define or modify the structure of the database, such as creating or altering tables, while the UPDATE command is used to modify the data within the tables. Therefore, the correct answer is Update.

Submit
19. The _______ model remains operative until the software is required.

Explanation

The Spiral Model remains operative until the software is required. The Spiral Model is a risk-driven software development process model that combines elements of both waterfall and iterative development models. It emphasizes on continuous risk analysis and mitigation throughout the software development lifecycle. The model consists of multiple iterations, each involving planning, risk analysis, development, and evaluation. This iterative approach allows the software to be continuously updated and improved, making it suitable for projects where the requirements are not completely known or may change over time.

Submit
20. Data mining evolve as a mechanism to cater the limitations of  _______   system to deal massive data sets with high dimensionality, new data type, multiple heterogeneous data resources etc. 

Explanation

Data mining evolved as a mechanism to cater to the limitations of the OLTP (Online Transaction Processing) system. OLTP systems are designed to handle real-time transactional data, but they are not well-suited for dealing with massive data sets with high dimensionality, new data types, and multiple heterogeneous data resources. Data mining, on the other hand, is a process of discovering patterns and relationships in large datasets, enabling organizations to extract valuable insights and make informed decisions.

Submit
21. A heap allows a very efficient implementation of a _______   

Explanation

A heap allows a very efficient implementation of a Priority Queue. A heap is a complete binary tree that satisfies the heap property, which means that the value of each node is greater than or equal to the values of its children. This property allows for efficient insertion and removal of the highest priority element, making it an ideal data structure for implementing a priority queue.

Submit
22. This _______ data mining techniques derivess rules from real world case examples   

Explanation

Case-based reasoning is a data mining technique that derives rules from real-world case examples. It involves solving new problems by applying solutions that were used to solve similar past problems. In this approach, a database of previously solved cases is created, and when a new problem arises, the system retrieves the most similar cases from the database and adapts their solutions to fit the current problem. This allows for the reuse of knowledge and experience to solve new problems efficiently.

Submit
23.  Data security threats include

Explanation

The correct answer is "Privacy Invasion". This refers to unauthorized access or intrusion into an individual's personal information, leading to a breach of privacy. It can involve activities such as hacking, identity theft, or unauthorized surveillance. In the context of data security threats, privacy invasion poses a significant risk as it can result in the exposure of sensitive information and potential misuse by malicious actors.

Submit
24. The Language used in the application Programs to request a data from the DBMS is referred to as       

Explanation

The correct answer is DML. DML stands for Data Manipulation Language and it is used to retrieve, insert, update, and delete data from a database. In the context of application programs, DML is the language used to send requests to the DBMS (Database Management System) to perform these data manipulation operations. DDL (Data Definition Language) is used to define the database structure, Query Language is a general term for any language used to query databases, and DCL (Data Control Language) is used to control access and permissions on the database. None of these options accurately describe the language used in application programs to request data from the DBMS.

Submit
25. ____________ is virus that inserts itself into a system's memory. Then it takes number of actions when an infected file is executed.  

Explanation

A resident virus is a type of virus that inserts itself into a system's memory, allowing it to remain active even after the infected file has been executed. Once in memory, the resident virus can perform a variety of actions, such as infecting other files or corrupting data. Unlike other types of viruses, a resident virus does not need to be executed again in order to carry out its actions. Therefore, it is considered to be a particularly dangerous and persistent type of virus.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 05, 2013
    Quiz Created by
    Appliedjobz
Cancel
  • All
    All (25)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
 In SQL which command is used to changes data in data...
A _______ means that one record in a particular record type is related...
Local variables _________     
Row of a relation are called   
A special Type Of gateway that can keep external users from accessing...
An important application of cryptography , used in computerized...
Which layer of OSI determines the interface of the system with the...
An Operating System is a _________
In files, there is a key associated with each record which is used to...
Which Command/s is/are used to redefine a column of the table in SQL?
 _______ is primarily used for mapping host names and email...
What is the name given to the exchange of control signals which is...
The Drawbacks of binary Tree sort are remedied by the
Through Linked list one can implement    
 In a relational schema, each tuple is divided into fields...
An indexing operation
A _______ contains the smallest unit of meaning full data , so you...
In SQL which of the following isn't a data definition language...
The _______ model remains operative until the software is required.
Data mining evolve as a mechanism to cater the limitations of...
A heap allows a very efficient implementation of a _______ ...
This _______ data mining techniques derivess rules from real world...
 Data security threats include
The Language used in the application Programs to request a data from...
____________ is virus that inserts itself into a system's memory....
Alert!

Advertisement