Ibps IT Officer 2012 Paper Part 1

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Appliedjobz
A
Appliedjobz
Community Contributor
Quizzes Created: 20 | Total Attempts: 16,446
| Attempts: 1,027 | Questions: 25
Please wait...
Question 1 / 25
0 %
0/100
Score 0/100
1. Which of the following is easiest software development process model?

Explanation

The Waterfall model is considered the easiest software development process model because it follows a linear and sequential approach. It consists of distinct phases such as requirements gathering, design, implementation, testing, and maintenance, with each phase being completed before moving on to the next. This model is easy to understand and implement as it provides a clear structure and defined steps to follow, making it ideal for small and straightforward projects where requirements are well-defined and unlikely to change.

Submit
Please wait...
About This Quiz
Online Exam Quizzes & Trivia

The Questions give you a fair idea of the IBPS IT Officer Exam Question Paper Pattern and help you prepare better. The written examination consists of objective type... see morepaper including 3 parts that are as follows: General Intelligence Quantitative Aptitude General Awareness Related to Banking
Professional Knowledge
English Total Duration 25 min By: Appliedjobz To download Previous year IBPS Examination Please Visit http://appliedmocks. Blogspot. In see less

2.  Binding the same name to multiple operations whose signatures differ in number or types of arguments?

Explanation

Overloading refers to the practice of binding the same name to multiple operations whose signatures differ in the number or types of arguments. This allows programmers to create multiple methods with the same name but different parameters, improving code readability and reusability. Overloading is an important concept in object-oriented programming and is used to provide multiple ways of performing a similar operation based on different input parameters.

Submit
3. A linear list of elements in which deletion can be done from one end and insertion can take place only at other end (rear) is known as

Explanation

A linear list of elements in which deletion can be done from one end and insertion can take place only at the other end (rear) is known as a queue. In a queue, the elements follow the First-In-First-Out (FIFO) principle, meaning the element that is inserted first will be the first one to be removed. This makes queues suitable for scenarios where order matters, such as processing tasks in the order they are received. Stacks, on the other hand, follow the Last-In-First-Out (LIFO) principle, where the last element inserted is the first one to be removed. Trees and branches are different data structures used for organizing and representing hierarchical relationships between elements.

Submit
4. Which of the following is not included in DML (data manipulation language)?

Explanation

The correct answer is "CAREATE". This option is not included in DML (data manipulation language). DML is used to manipulate data in a database, such as inserting new data using the INSERT statement or updating existing data using the UPDATE statement. However, "CAREATE" is not a valid DML statement. It seems to be a typo or misspelling of the CREATE statement, which is actually a part of DDL (data definition language) used to create database objects like tables, views, or indexes.

Submit
5. A central computer surrounded by one or more satellite computers is called

Explanation

A star network consists of a central computer (also known as a hub or switch) that is connected to multiple satellite computers or devices. The central computer acts as a central point of control and communication, facilitating the exchange of data between the satellite computers. This network configuration is commonly used in modern computer networks as it provides a high level of reliability and scalability.

Submit
6. Which of the following is not used as a data structure?

Explanation

The directory is not typically used as a data structure in computer science. It is a hierarchical structure used in file systems to organize and store files and folders. While it can be used to organize and retrieve data, it is not commonly referred to as a data structure in the context of computer science. Instead, data structures such as arrays, linked lists, and graphs are commonly used to store and manipulate data in various algorithms and applications.

Submit
7. The C declaration in A [3] [5] of containing …….. elements is itself an array containing …… integers.

Explanation

The answer 3,5 suggests that the declaration A[3][5] creates an array of 3 elements, where each element is an array of 5 integers. This means that A is a two-dimensional array with 3 rows and 5 columns, where each element in the array can hold an integer value.

Submit
8. Data are followed to be transmitted in only one direction in a:

Explanation

A simplex channel is a communication channel that allows data to be transmitted in only one direction. In this type of channel, information flows from the sender to the receiver, but not in the opposite direction. This means that data can only be sent or received, but not both simultaneously. Therefore, the correct answer is a simplex channel.

Submit
9. What is the drawback of infrared and millimeter waves?

Explanation

The drawback of infrared and millimeter waves is that they cannot pass through solid objects. This limitation restricts their ability to penetrate obstacles and limits their range and effectiveness in certain applications.

Submit
10. Which of the following is a major component of the telephone system?

Explanation

All of these options are major components of the telephone system. The local loop refers to the physical connection between the telephone exchange and the subscriber's premises. Trunks are the high-capacity lines that connect different telephone exchanges. The switching office is a central location where calls are routed and switched between different lines. Therefore, all of these components are essential for the functioning of the telephone system.

Submit
11. Which one of the following interrupt is non-makeable?

Explanation

The TRAP interrupt is non-makeable because it is a non-maskable interrupt. Non-maskable interrupts cannot be disabled or ignored by the processor, and they have the highest priority. The TRAP interrupt is typically used for critical system events that require immediate attention and cannot be delayed or interrupted by other interrupts.

Submit
12. Which data structure is needed to convert infix notation to post fix notation is

Explanation

To convert infix notation to postfix notation, a stack data structure is needed. In infix notation, operators are placed between operands, which makes it difficult to evaluate expressions. However, in postfix notation, operators are placed after operands, making it easier to evaluate expressions using a stack. The stack is used to store operators temporarily and to determine the order of operations. When encountering an operator, it is pushed onto the stack, and when encountering an operand, it is added to the postfix expression. The operators in the stack are then popped and added to the postfix expression based on their precedence. This process continues until the entire infix expression is converted to postfix notation.

Submit
13. Which of the following statement is not true in context of strings in c language?

Explanation

The statement "Any string in c can be read by the function getchar 0" is not true in the context of strings in the C language. The function `getchar()` is used to read a single character from the standard input, not an entire string. To read a string in C, the function `gets()` or `fgets()` is typically used.

Submit
14. Which of the following is a type of ISDN (Integrated Services Digital Network)?

Explanation

Both narrow band and broadband are types of ISDN (Integrated Services Digital Network). ISDN is a telecommunications network that allows for the transmission of voice, video, and data over digital lines. Narrow band ISDN refers to a lower bandwidth connection, typically used for voice communications. Broadband ISDN, on the other hand, provides a higher bandwidth connection, capable of transmitting larger amounts of data at faster speeds. Therefore, the correct answer is "Both 1 and 2" because both narrow band and broadband are types of ISDN.

Submit
15. A floating point is said to be normalized if the most significant digit of the mantissa is —–

Explanation

A floating point number is said to be normalized if the most significant digit of the mantissa is non-zero. This means that the mantissa, which represents the significant digits of the number, starts with a non-zero digit. Normalizing a floating point number helps to represent it in a standardized form and allows for efficient arithmetic operations.

Submit
16. Which of the following statement is not true regarding graph?

Explanation

A tree is a special type of graph that does not contain any cycles or loops. While all trees are graphs, not all graphs are trees. Therefore, the statement "A tree is a graph" is true, and the statement "A graph is a tree" is false.

Submit
17. A 6-MHz channel is used by digital signaling system utilizing 4 – level signals. What is maximum possible transmission rate?

Explanation

The maximum possible transmission rate in a digital signaling system utilizing 4-level signals on a 6-MHz channel is 12 M band/sec. This is because each level can transmit 2 bits of information, and since there are 4 levels, the total transmission rate is 4 times the channel bandwidth. Therefore, 4 * 6 MHz = 24 M band/sec is the maximum possible transmission rate.

Submit
18. Indexes created from a sequential (or sorted) set of primary keys are referred to as —

Explanation

Indexes created from a sequential set of primary keys are referred to as index sequential. This type of index combines the benefits of both sequential file organization and indexed file organization. It allows for efficient retrieval of records based on the primary key values while also maintaining the sequential order of the records. This makes it suitable for applications that require both sequential access and direct access to records.

Submit
19.  For tree, which of the following list traversing through the entire list is not necessary?

Explanation

In a circular list, every node is connected to the next node and the last node is connected back to the first node, forming a loop. Therefore, traversing through the entire list is not necessary because starting from any node, we can reach all other nodes by following the links.

Submit
20. Which of the following scheduler is in charge of handling the swapped out process?

Explanation

The medium term scheduler is responsible for handling the swapped out process. This scheduler is responsible for selecting processes from the job pool and bringing them into main memory for execution. It decides which processes should be swapped in and out of main memory based on factors such as memory availability and process priority. Therefore, it is the medium term scheduler that handles the swapped out process.

Submit
21. Which of the following feature is related to virtual circuit?

Explanation

The feature related to virtual circuit is "Connection oriented". This means that before any data transfer occurs, a dedicated path or circuit is established between the sender and receiver. This ensures that all packets follow the same route and are delivered in the correct order. Connection-oriented communication provides reliability and guarantees that the data will be delivered without errors.

Submit
22. Which of the following communications service provides messages preparation and transmission facilities

Explanation

Teletex is the correct answer because it is a communication service that provides facilities for preparing and transmitting messages. Teletex allows users to create and send text-based messages electronically, similar to faxing but with additional features such as the ability to include graphics and formatting. Teletex was commonly used for business communications and was widely adopted in the 1980s and 1990s before being replaced by email and other digital communication methods.

Submit
23. Which of the following applications is suitable for FIFO Queue?

Explanation

A FIFO (First-In-First-Out) queue is suitable for the program to solve a maze and backtrack to an earlier position when a dead end position is reached. This is because the queue follows the principle of processing elements in the order they were added, which aligns with the concept of backtracking in a maze. Each time a dead end is reached, the previous positions can be stored in the queue, and then the program can backtrack by retrieving and processing the positions in the order they were added.

Submit
24. The field that investigates the mechanics of human intelligence is:

Explanation

Cognitive science is the field that investigates the mechanics of human intelligence. It combines various disciplines such as psychology, neuroscience, linguistics, and computer science to understand how the mind works, how people perceive, think, learn, and solve problems. This interdisciplinary approach allows researchers to study human intelligence from multiple angles, using both empirical data and computational models. By studying cognitive processes, cognitive scientists aim to gain insights into human intelligence and develop applications in areas such as artificial intelligence, human-computer interaction, and education.

Submit
25. Implementation of an inverted list to maintain the record list for each value for a given attribute can be done by —

Explanation

An inverted list is a data structure that stores a list of records for each unique value of a given attribute. In this case, the implementation of an inverted list can be done using a sequential file. A sequential file stores records in a sequential order, allowing for efficient insertion and retrieval of records. By organizing the records sequentially, it becomes easier to maintain the record list for each value of the attribute. Therefore, a sequential file is a suitable choice for implementing an inverted list in this scenario.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 20, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Feb 20, 2013
    Quiz Created by
    Appliedjobz
Cancel
  • All
    All (25)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Which of the following is easiest software development process model?
 Binding the same name to multiple operations whose signatures...
A linear list of elements in which deletion can be done from one end...
Which of the following is not included in DML (data manipulation...
A central computer surrounded by one or more satellite computers is...
Which of the following is not used as a data structure?
The C declaration in A [3] [5] of containing …….....
Data are followed to be transmitted in only one direction in a:
What is the drawback of infrared and millimeter waves?
Which of the following is a major component of the telephone system?
Which one of the following interrupt is non-makeable?
Which data structure is needed to convert infix notation to post fix...
Which of the following statement is not true in context of strings in...
Which of the following is a type of ISDN (Integrated Services Digital...
A floating point is said to be normalized if the most significant...
Which of the following statement is not true regarding graph?
A 6-MHz channel is used by digital signaling system utilizing 4...
Indexes created from a sequential (or sorted) set of primary keys are...
 For tree, which of the following list traversing through the...
Which of the following scheduler is in charge of handling the swapped...
Which of the following feature is related to virtual circuit?
Which of the following communications service provides messages...
Which of the following applications is suitable for FIFO Queue?
The field that investigates the mechanics of human intelligence is:
Implementation of an inverted list to maintain the record list for...
Alert!

Advertisement