# Ibps IT Officer 2012 Paper Part 1

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
| By Appliedjobz
A
Appliedjobz
Community Contributor
Quizzes Created: 20 | Total Attempts: 16,365
Questions: 25 | Attempts: 1,024

Settings

The Questions give you a fair idea of the IBPS IT Officer Exam Question Paper Pattern and help you prepare better. The written examination consists of objective type paper including 3 parts that are as follows: General Intelligence Quantitative Aptitude General Awareness Related to Banking
Professional Knowledge
English Total Duration 25 min By: Appliedjobz To download Previous year IBPS Examination Please Visit http://appliedmocks. Blogspot. In

• 1.

### A floating point is said to be normalized if the most significant digit of the mantissa is —–

• A.

Zero

• B.

Non Zero

• C.

Negative

• D.

Positive

B. Non Zero
Explanation
A floating point number is said to be normalized if the most significant digit of the mantissa is non-zero. This means that the mantissa, which represents the significant digits of the number, starts with a non-zero digit. Normalizing a floating point number helps to represent it in a standardized form and allows for efficient arithmetic operations.

Rate this question:

• 2.

### Which of the following applications is suitable for FIFO Queue?

• A.

An inventory of parts is to be processed by part number

• B.

A dictionary of words used by a spelling checker id to be created.

• C.

A program to solve a maze is to back track to an earlier position when a dead end position is reached.

• D.

A program to keep track of patients as the check into clinic, assigning them to doctors a first come, first served basis

C. A program to solve a maze is to back track to an earlier position when a dead end position is reached.
Explanation
A FIFO (First-In-First-Out) queue is suitable for the program to solve a maze and backtrack to an earlier position when a dead end position is reached. This is because the queue follows the principle of processing elements in the order they were added, which aligns with the concept of backtracking in a maze. Each time a dead end is reached, the previous positions can be stored in the queue, and then the program can backtrack by retrieving and processing the positions in the order they were added.

Rate this question:

• 3.

### The field that investigates the mechanics of human intelligence is:

• A.

Cognitive science

• B.

Artificial science

• C.

Psychology

• D.

Sociology

A. Cognitive science
Explanation
Cognitive science is the field that investigates the mechanics of human intelligence. It combines various disciplines such as psychology, neuroscience, linguistics, and computer science to understand how the mind works, how people perceive, think, learn, and solve problems. This interdisciplinary approach allows researchers to study human intelligence from multiple angles, using both empirical data and computational models. By studying cognitive processes, cognitive scientists aim to gain insights into human intelligence and develop applications in areas such as artificial intelligence, human-computer interaction, and education.

Rate this question:

• 4.

### Which data structure is needed to convert infix notation to post fix notation is

• A.

Branch

• B.

Queue

• C.

Tree

• D.

Stack

D. Stack
Explanation
To convert infix notation to postfix notation, a stack data structure is needed. In infix notation, operators are placed between operands, which makes it difficult to evaluate expressions. However, in postfix notation, operators are placed after operands, making it easier to evaluate expressions using a stack. The stack is used to store operators temporarily and to determine the order of operations. When encountering an operator, it is pushed onto the stack, and when encountering an operand, it is added to the postfix expression. The operators in the stack are then popped and added to the postfix expression based on their precedence. This process continues until the entire infix expression is converted to postfix notation.

Rate this question:

• 5.

### Data are followed to be transmitted in only one direction in a:

• A.

Simplex channel

• B.

Full Duplex

• C.

Half Duplex

• D.

Dump Channel

A. Simplex channel
Explanation
A simplex channel is a communication channel that allows data to be transmitted in only one direction. In this type of channel, information flows from the sender to the receiver, but not in the opposite direction. This means that data can only be sent or received, but not both simultaneously. Therefore, the correct answer is a simplex channel.

Rate this question:

• 6.

### Which of the following statement is not true regarding graph?

• A.

Graphs can be directed

• B.

A graph is a tree

• C.

A tree is a graph

• D.

A graph consists of set of nodes and a set of arcs

C. A tree is a grapH
Explanation
A tree is a special type of graph that does not contain any cycles or loops. While all trees are graphs, not all graphs are trees. Therefore, the statement "A tree is a graph" is true, and the statement "A graph is a tree" is false.

Rate this question:

• 7.

### Implementation of an inverted list to maintain the record list for each value for a given attribute can be done by —

• A.

Sequential file

• B.

Direct file

• C.

Indexed file

• D.

Indexed sequential

A. Sequential file
Explanation
An inverted list is a data structure that stores a list of records for each unique value of a given attribute. In this case, the implementation of an inverted list can be done using a sequential file. A sequential file stores records in a sequential order, allowing for efficient insertion and retrieval of records. By organizing the records sequentially, it becomes easier to maintain the record list for each value of the attribute. Therefore, a sequential file is a suitable choice for implementing an inverted list in this scenario.

Rate this question:

• 8.

### A 6-MHz channel is used by digital signaling system utilizing 4 – level signals. What is maximum possible transmission rate?

• A.

1.5 M band/sec

• B.

6 M band/sec

• C.

12 M band/sec

• D.

24 M band/sec

C. 12 M band/sec
Explanation
The maximum possible transmission rate in a digital signaling system utilizing 4-level signals on a 6-MHz channel is 12 M band/sec. This is because each level can transmit 2 bits of information, and since there are 4 levels, the total transmission rate is 4 times the channel bandwidth. Therefore, 4 * 6 MHz = 24 M band/sec is the maximum possible transmission rate.

Rate this question:

• 9.

### Which of the following is a type of ISDN (Integrated Services Digital Network)?

• A.

Narrow band

• B.

• C.

Medium band

• D.

Both 1 and 2

D. Both 1 and 2
Explanation
Both narrow band and broadband are types of ISDN (Integrated Services Digital Network). ISDN is a telecommunications network that allows for the transmission of voice, video, and data over digital lines. Narrow band ISDN refers to a lower bandwidth connection, typically used for voice communications. Broadband ISDN, on the other hand, provides a higher bandwidth connection, capable of transmitting larger amounts of data at faster speeds. Therefore, the correct answer is "Both 1 and 2" because both narrow band and broadband are types of ISDN.

Rate this question:

• 10.

### Which of the following is easiest software development process model?

• A.

Waterfall model

• B.

Prototyping

• C.

Interactive enhancement

• D.

Spiral model

A. Waterfall model
Explanation
The Waterfall model is considered the easiest software development process model because it follows a linear and sequential approach. It consists of distinct phases such as requirements gathering, design, implementation, testing, and maintenance, with each phase being completed before moving on to the next. This model is easy to understand and implement as it provides a clear structure and defined steps to follow, making it ideal for small and straightforward projects where requirements are well-defined and unlikely to change.

Rate this question:

• 11.

### Which of the following feature is related to virtual circuit?

• A.

Connection oriented

• B.

Each packet sent is routed independently of its predecessors

• C.

Successive packets may follow different routes

• D.

Congestion control is difficult

A. Connection oriented
Explanation
The feature related to virtual circuit is "Connection oriented". This means that before any data transfer occurs, a dedicated path or circuit is established between the sender and receiver. This ensures that all packets follow the same route and are delivered in the correct order. Connection-oriented communication provides reliability and guarantees that the data will be delivered without errors.

Rate this question:

• 12.

### Which one of the following interrupt is non-makeable?

• A.

TRAP

• B.

RST 7.5

• C.

INTR

• D.

RST 6.5

A. TRAP
Explanation
The TRAP interrupt is non-makeable because it is a non-maskable interrupt. Non-maskable interrupts cannot be disabled or ignored by the processor, and they have the highest priority. The TRAP interrupt is typically used for critical system events that require immediate attention and cannot be delayed or interrupted by other interrupts.

Rate this question:

• 13.

### Binding the same name to multiple operations whose signatures differ in number or types of arguments?

• A.

• B.

Origin class

• C.

Object model

• D.

Package

Explanation
Overloading refers to the practice of binding the same name to multiple operations whose signatures differ in the number or types of arguments. This allows programmers to create multiple methods with the same name but different parameters, improving code readability and reusability. Overloading is an important concept in object-oriented programming and is used to provide multiple ways of performing a similar operation based on different input parameters.

Rate this question:

• 14.

### The C declaration in A [3] [5] of containing …….. elements is itself an array containing …… integers.

• A.

3,5

• B.

3,3

• C.

5,5

• D.

5,3

A. 3,5
Explanation
The answer 3,5 suggests that the declaration A[3][5] creates an array of 3 elements, where each element is an array of 5 integers. This means that A is a two-dimensional array with 3 rows and 5 columns, where each element in the array can hold an integer value.

Rate this question:

• 15.

### What is the drawback of infrared and millimeter waves?

• A.

They are directional

• B.

They cannot pass through solid objects.

• C.

• D.

Can be used outdoor

B. They cannot pass through solid objects.
Explanation
The drawback of infrared and millimeter waves is that they cannot pass through solid objects. This limitation restricts their ability to penetrate obstacles and limits their range and effectiveness in certain applications.

Rate this question:

• 16.

### Indexes created from a sequential (or sorted) set of primary keys are referred to as —

• A.

Indexed file organization

• B.

Sequential file

• C.

Index sequential

• D.

All of the above

C. Index sequential
Explanation
Indexes created from a sequential set of primary keys are referred to as index sequential. This type of index combines the benefits of both sequential file organization and indexed file organization. It allows for efficient retrieval of records based on the primary key values while also maintaining the sequential order of the records. This makes it suitable for applications that require both sequential access and direct access to records.

Rate this question:

• 17.

### A central computer surrounded by one or more satellite computers is called

• A.

Bus network

• B.

Ring network

• C.

Star network

• D.

None of these

C. Star network
Explanation
A star network consists of a central computer (also known as a hub or switch) that is connected to multiple satellite computers or devices. The central computer acts as a central point of control and communication, facilitating the exchange of data between the satellite computers. This network configuration is commonly used in modern computer networks as it provides a high level of reliability and scalability.

Rate this question:

• 18.

### Which of the following is a major component of the telephone system?

• A.

Local loop

• B.

Trunks

• C.

Switching office

• D.

All of these

D. All of these
Explanation
All of these options are major components of the telephone system. The local loop refers to the physical connection between the telephone exchange and the subscriber's premises. Trunks are the high-capacity lines that connect different telephone exchanges. The switching office is a central location where calls are routed and switched between different lines. Therefore, all of these components are essential for the functioning of the telephone system.

Rate this question:

• 19.

### A linear list of elements in which deletion can be done from one end and insertion can take place only at other end (rear) is known as

• A.

Queues

• B.

Stacks

• C.

Trees

• D.

Branch

A. Queues
Explanation
A linear list of elements in which deletion can be done from one end and insertion can take place only at the other end (rear) is known as a queue. In a queue, the elements follow the First-In-First-Out (FIFO) principle, meaning the element that is inserted first will be the first one to be removed. This makes queues suitable for scenarios where order matters, such as processing tasks in the order they are received. Stacks, on the other hand, follow the Last-In-First-Out (LIFO) principle, where the last element inserted is the first one to be removed. Trees and branches are different data structures used for organizing and representing hierarchical relationships between elements.

Rate this question:

• 20.

### For tree, which of the following list traversing through the entire list is not necessary?

• A.

Circular list

• B.

• C.

• D.

Both (2) and (3) above

A. Circular list
Explanation
In a circular list, every node is connected to the next node and the last node is connected back to the first node, forming a loop. Therefore, traversing through the entire list is not necessary because starting from any node, we can reach all other nodes by following the links.

Rate this question:

• 21.

### Which of the following communications service provides messages preparation and transmission facilities

• A.

Teletex

• B.

Teletext

• C.

X.400

• D.

Fax

A. Teletex
Explanation
Teletex is the correct answer because it is a communication service that provides facilities for preparing and transmitting messages. Teletex allows users to create and send text-based messages electronically, similar to faxing but with additional features such as the ability to include graphics and formatting. Teletex was commonly used for business communications and was widely adopted in the 1980s and 1990s before being replaced by email and other digital communication methods.

Rate this question:

• 22.

### Which of the following is not included in DML (data manipulation language)?

• A.

INSERT

• B.

UPDATE

• C.

UPDATE

• D.

CAREATE

D. CAREATE
Explanation
The correct answer is "CAREATE". This option is not included in DML (data manipulation language). DML is used to manipulate data in a database, such as inserting new data using the INSERT statement or updating existing data using the UPDATE statement. However, "CAREATE" is not a valid DML statement. It seems to be a typo or misspelling of the CREATE statement, which is actually a part of DDL (data definition language) used to create database objects like tables, views, or indexes.

Rate this question:

• 23.

### Which of the following scheduler is in charge of handling the swapped out process?

• A.

Short term

• B.

Long term

• C.

Medium term

• D.

None Of These

C. Medium term
Explanation
The medium term scheduler is responsible for handling the swapped out process. This scheduler is responsible for selecting processes from the job pool and bringing them into main memory for execution. It decides which processes should be swapped in and out of main memory based on factors such as memory availability and process priority. Therefore, it is the medium term scheduler that handles the swapped out process.

Rate this question:

• 24.

### Which of the following is not used as a data structure?

• A.

Array

• B.

• C.

Graph

• D.

Directory

D. Directory
Explanation
The directory is not typically used as a data structure in computer science. It is a hierarchical structure used in file systems to organize and store files and folders. While it can be used to organize and retrieve data, it is not commonly referred to as a data structure in the context of computer science. Instead, data structures such as arrays, linked lists, and graphs are commonly used to store and manipulate data in various algorithms and applications.

Rate this question:

• 25.

### Which of the following statement is not true in context of strings in c language?

• A.

It is array of characters

• B.

Last character of character array is always ‘/o’

• C.

C inserts the null character automatically

• D.

Any string in c can be read by the function getchar 0

D. Any string in c can be read by the function getchar 0
Explanation
The statement "Any string in c can be read by the function getchar 0" is not true in the context of strings in the C language. The function `getchar()` is used to read a single character from the standard input, not an entire string. To read a string in C, the function `gets()` or `fgets()` is typically used.

Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

• Current Version
• Mar 20, 2023
Quiz Edited by
ProProfs Editorial Team
• Feb 20, 2013
Quiz Created by
Appliedjobz

Related Topics