# Ibps IT Officer 2012 Paper Part 2

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
| By Appliedjobz
A
Appliedjobz
Community Contributor
Quizzes Created: 20 | Total Attempts: 16,316
Questions: 25 | Attempts: 341

Settings

The Questions give you a fair idea of the IBPS IT Officer Exam Question Paper Pattern and help you prepare better. The written examination consists of objective type paper including 5 parts that are as follows: General Intelligence Quantitative Aptitude General Awareness Related to Banking
Professional Knowledge
English Total Duraion 25 min By: Appliedjobz To download Previous year IBPS Examination Please Visit http://appliedmocks. Blogspot. In

• 1.

### Which command will be used with vi editor to append text at end of line?

• A.

A

• B.

A

• C.

I

• D.

I

A. A
Explanation
The command "A" will be used with the vi editor to append text at the end of a line.

Rate this question:

• 2.

### Which the result of a computation depends on the speed of the processes involved there is said to be

• A.

Cycle stealing

• B.

Race condition

• C.

A time look

• D.

B. Race condition
Explanation
A race condition occurs when the behavior or outcome of a program depends on the relative timing of events, specifically when multiple processes or threads access shared resources simultaneously and the order of execution becomes unpredictable. In such a scenario, the result of the computation can vary depending on which process or thread executes first, leading to inconsistent or incorrect results. Therefore, the correct answer is "race condition".

Rate this question:

• 3.

### Which of the following feature is true regarding concatenated virtual circuits?

• A.

A sequence of virtual circuits is set up from source through one or more gate ways to the destination

• B.

Each gateway maintains table telling which virtual circuit pass through it

• C.

The scheme works best when all the networks have roughly the same properties

• D.

None

D. None
Explanation
Concatenated virtual circuits refer to a series of virtual circuits that are established from the source to the destination, passing through one or more gateways. Each gateway maintains a table that keeps track of which virtual circuits pass through it. However, the given answer states that none of the features are true regarding concatenated virtual circuits. This suggests that none of the options provided accurately describe the true feature of concatenated virtual circuits.

Rate this question:

• 4.

### A compiler which runs on one machine and generates a code for another machine

• A.

Bootstrap

• B.

Cross-compiler

• C.

Lexical analyzer

• D.

All of the above

B. Cross-compiler
Explanation
A cross-compiler is a type of compiler that runs on one machine and generates code for another machine. It is used to compile programs for a different target platform than the one it is running on. This allows developers to write code on one machine and compile it for a different architecture or operating system. Cross-compilers are commonly used in the development of software for embedded systems or cross-platform applications.

Rate this question:

• 5.

### Banker’s algorithm for resource allocation deals with

• A.

• B.

• C.

• D.

Mutual exclusion

Explanation
The Banker's algorithm for resource allocation deals with dead lock avoidance. Dead lock is a situation where two or more processes are unable to proceed because each is waiting for resources held by the other. The Banker's algorithm ensures that resources are allocated in a way that prevents deadlocks from occurring. It does this by considering the current allocation, maximum needs, and available resources to determine if a request for resources can be granted without leading to a deadlock.

Rate this question:

• 6.

### A method, which transfers the entire block of data from its own buffer to main memory takes place without intervention by cup.

• A.

Programmed input/output

• B.

Interrupt driven input/output

• C.

Direct memory access (DMA)

• D.

Resident monitor

C. Direct memory access (DMA)
Explanation
Direct memory access (DMA) is the correct answer because it is a method that allows data to be transferred directly from a device's buffer to main memory without the intervention of the CPU. This means that the CPU does not need to be involved in every transfer, which can greatly improve efficiency and performance. DMA is commonly used for high-speed data transfer in devices such as hard drives, network cards, and graphics cards.

Rate this question:

• 7.

### Which the maximum clock rate is quoted for a logic family, it applies to a

• A.

Shift register

• B.

Single Logic Gate

• C.

Flip-Flop

• D.

Counter

A. Shift register
Explanation
The maximum clock rate quoted for a logic family applies to a shift register. A shift register is a sequential logic circuit that can store and shift data bits. The clock rate refers to the speed at which the circuit can operate, and in the case of a shift register, it determines how quickly data can be shifted through the register. Therefore, the maximum clock rate quoted for a logic family would indicate the highest speed at which a shift register within that family can function.

Rate this question:

• 8.

### Which of the following table helps in representing the previous and next state of the sequential circuit prior to and after the clock pulse respectively?

• A.

Truth table

• B.

Characteristic table

• C.

Excitation table

• D.

Both (1) and (2)

C. Excitation table
Explanation
An excitation table helps in representing the previous and next state of a sequential circuit prior to and after the clock pulse respectively. It provides information about the inputs required to transition from one state to another. A truth table, on the other hand, represents the relationship between the inputs and outputs of a combinational circuit. A characteristic table describes the behavior of a sequential circuit by showing the inputs, outputs, and next state for each possible combination of inputs and current state. Therefore, the correct answer is the excitation table.

Rate this question:

• 9.

### A large computer information system maintains many different computer files. Which among them is called a perpetual file?

• A.

Specialized file

• B.

Log file

• C.

Master File

• D.

History File

C. Master File
Explanation
A perpetual file in a computer information system refers to a master file. A master file is a central file that contains the most up-to-date and comprehensive information about a particular subject. It is continuously updated and serves as the primary source of data for various operations within the system. Other files, such as specialized files, log files, and history files, may contain specific or historical data, but they are not considered perpetual files as they do not hold the most current and complete information.

Rate this question:

• 10.

### One method of programming a computer to exhibit intelligence is called modeling

• A.

Simulation

• B.

Cognitization

• C.

Psychic amelioration

• D.

Duplication

A. Simulation
Explanation
Simulation is a method of programming a computer to exhibit intelligence. It involves creating a model or representation of a real-world system or process and using it to simulate or imitate the behavior of the system. By simulating different scenarios and analyzing the outcomes, the computer can demonstrate intelligent behavior and make decisions based on the simulated data. This approach allows the computer to learn and improve its performance over time, making it a viable method for achieving artificial intelligence.

Rate this question:

• 11.

### In fiber optics the attenuation of light through glass depends on the

• A.

Wave length of light

• B.

Frequency of light

• C.

Speed of the light

• D.

All of the above

A. Wave length of light
Explanation
The attenuation of light through glass in fiber optics depends on the wavelength of light. This is because different wavelengths of light interact differently with the glass material, causing varying levels of attenuation. The longer the wavelength, the higher the attenuation, and vice versa. Therefore, the wavelength of light is a crucial factor in determining the level of attenuation in fiber optics.

Rate this question:

• 12.

### Ap-channel enhancement type MOSFET performs much the same function as a PNP Transistor except that

• A.

It operates much faster

• B.

It is considerably larger

• C.

It is controlled by voltage larger than current

• D.

It is controlled by current rather than a voltage like a bipolar transistor

C. It is controlled by voltage larger than current
Explanation
The correct answer is that the Ap-channel enhancement type MOSFET is controlled by voltage larger than current. This means that the MOSFET operates based on the voltage applied to its gate terminal, rather than the current flowing through it. This is different from a PNP transistor, which is controlled by current rather than voltage.

Rate this question:

• 13.

### Among directory entry-node and the file contents, Which will be changed when a file Is updated ?

• A.

Only directory entry and file contents

• B.

Only inode and file contents

• C.

Both (1) and (2)

• D.

Only directory entry

B. Only inode and file contents
Explanation
When a file is updated, both the inode (index node) and the file contents will be changed. The inode is a data structure that stores important metadata about the file, such as its size, permissions, timestamps, and the location of its data blocks. Updating the file will result in changes to the inode to reflect the new information. Additionally, the actual content of the file will be modified to reflect the updates made to its data. Therefore, both the inode and file contents will be affected by the update.

Rate this question:

• 14.

### Which of the following is an important component of semantic analysis?

• A.

Symbol table

• B.

Type checking

• C.

Lex

• D.

Yacc

B. Type checking
Explanation
Type checking is an important component of semantic analysis because it ensures that the types of the variables and expressions in a program are compatible and consistent. It helps to detect and prevent type-related errors, such as assigning a value of one type to a variable of a different type. Type checking also helps in determining the correct interpretation and behavior of the program, as it enforces the rules and constraints specified by the programming language.

Rate this question:

• 15.

### Which of the following systems implementation approaches should be used if you want to run the old system and the new system at the same time for a specified period?

• A.

Direct

• B.

Pilot

• C.

Phased

• D.

Parallel

D. Parallel
Explanation
Parallel implementation approach should be used if you want to run the old system and the new system at the same time for a specified period. In parallel implementation, both the old and new systems are run simultaneously for a certain period of time to ensure that the new system functions properly and to minimize any potential disruptions or errors. This approach allows for a smooth transition from the old system to the new system, as any issues can be identified and resolved before fully transitioning to the new system.

Rate this question:

• 16.

### Which of the following derivation does a top-down parser? The input is assumed to be scanned in left to right order.

• A.

Left most derivation

• B.

Left most derivation traced out in reverse

• C.

Right most derivation

• D.

Right most derivation traced out in reverse

A. Left most derivation
Explanation
A top-down parser starts with the start symbol and tries to derive the input string by expanding non-terminals from left to right. In a leftmost derivation, the leftmost non-terminal is always expanded first. Therefore, a top-down parser uses a leftmost derivation to parse the input string.

Rate this question:

• 17.

### CIDR (Classless Inter Domain Routing)

• A.

It is used in class C Net works

• B.

It is used in class B Net works

• C.

It is used in class A Net works

• D.

All of the above

A. It is used in class C Net works
Explanation
CIDR (Classless Inter Domain Routing) is a routing technique that allows for more efficient allocation of IP addresses. It is used in classless networks, which means it can be used in class A, class B, and class C networks. CIDR eliminates the need for strict class-based addressing and allows for flexible allocation of IP addresses based on the actual network requirements. Therefore, the correct answer is "All of the above".

Rate this question:

• 18.

### Internal auditors should review data system design before they are

• A.

Developed

• B.

Implemented

• C.

Modified

• D.

All of the above

B. Implemented
Explanation
Internal auditors should review data system design before they are implemented because this allows them to assess the effectiveness and efficiency of the design. By reviewing the design before implementation, auditors can identify any potential weaknesses or vulnerabilities in the system and recommend necessary improvements. This helps to ensure that the data system is robust, secure, and aligned with the organization's objectives. Reviewing the design also allows auditors to provide valuable insights and recommendations to enhance the system's performance and mitigate risks.

Rate this question:

• 19.

### Which language has recently become the defector standard for interfacing application programs with relational database system?

• A.

Oracle

• B.

SQL

• C.

Dbase

• D.

4 GL

B. SQL
Explanation
SQL (Structured Query Language) has recently become the defector standard for interfacing application programs with relational database systems. SQL is a programming language that is specifically designed for managing and manipulating data in relational databases. It allows users to create, modify, and retrieve data from databases using a standardized syntax. SQL is widely used in various database management systems, including Oracle, MySQL, and Microsoft SQL Server, making it the most common language for interacting with relational databases.

Rate this question:

• 20.

### A program that places programs into main memory and prepares them for execution-

• A.

• B.

Assembler

• C.

• D.

Absolute entity

Explanation
A loader is a program that places other programs into main memory and prepares them for execution. It loads the necessary program files from the secondary storage into the main memory, resolves any external references or dependencies, and performs any necessary address relocation. Once the loading process is complete, the program is ready to be executed by the computer's processor. Therefore, the correct answer is Loader.

Rate this question:

• 21.

### A generalizations of the Boyce Codd Normal Form to relation schemes which includes the mulltivated dependencies is called –

• A.

Second Normal Form

• B.

Third Normal Form

• C.

Fourth Normal Form

• D.

Fifth Normal Form

C. Fourth Normal Form
Explanation
The Boyce Codd Normal Form (BCNF) is a normal form in database normalization that eliminates redundancy and dependency issues. However, BCNF does not handle all types of dependencies, such as multivalued dependencies. The Fourth Normal Form (4NF) is an extension of BCNF that addresses these multivalued dependencies. It further eliminates redundancy by allowing the decomposition of relations into smaller ones, where each relation contains a single-valued attribute. Therefore, the correct answer is Fourth Normal Form.

Rate this question:

• 22.

### Lexical Analyzer transforms an input streams in to –

• A.

Regular expression

• B.

Sequence of tokens

• C.

Binary

• D.

Symbols

B. Sequence of tokens
Explanation
The correct answer is "Sequence of tokens" because a lexical analyzer is responsible for breaking down an input stream into smaller units called tokens. These tokens represent the different elements of the input, such as keywords, identifiers, operators, and literals. By transforming the input stream into a sequence of tokens, the lexical analyzer enables further processing and analysis of the input in subsequent stages of a compiler or interpreter.

Rate this question:

• 23.

### If we traverse s binary search tree, in which manner that we get in ascending manner

• A.

InOrder

• B.

Preorder

• C.

PostOrder

• D.

None

A. InOrder
Explanation
InOrder traversal of a binary search tree visits the nodes in ascending order. This means that when we traverse the tree in InOrder manner, we first visit the left subtree, then the root node, and finally the right subtree. Since a binary search tree follows the property that the left child of a node is always smaller than the node and the right child is always greater, traversing in InOrder allows us to visit the nodes in ascending order. Therefore, InOrder is the correct answer for getting the nodes in ascending manner.

Rate this question:

• 24.

### Binary number 10 11 10 000 is equivalent to decimal

• A.

716

• B.

718

• C.

722

• D.

724

A. 716
Explanation
The binary number 10 11 10 000 can be converted to decimal by multiplying each digit by its corresponding power of 2 and then summing the results. Starting from the rightmost digit, we have 0 * 2^0 = 0, 0 * 2^1 = 0, 0 * 2^2 = 0, 1 * 2^3 = 8, 1 * 2^4 = 16, 0 * 2^5 = 0, 1 * 2^6 = 64, and 0 * 2^7 = 0. Adding these values together, we get 0 + 0 + 0 + 8 + 16 + 0 + 64 + 0 = 88. Therefore, the binary number 10 11 10 000 is equivalent to decimal 88.

Rate this question:

• 25.

### The collection of communication line and routers from the –

• A.

Router

• B.

Bridge

• C.

Subnet

• D.

Packet

C. Subnet
Explanation
A subnet is a collection of communication lines and routers that are grouped together based on their IP address range. This allows for better organization and management of network traffic. Subnets help to divide a larger network into smaller, more manageable networks, which can improve network performance and security. By grouping communication lines and routers together, a subnet enables efficient routing of data packets within a network.

Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

• Current Version
• Mar 21, 2023
Quiz Edited by
ProProfs Editorial Team
• Feb 21, 2013
Quiz Created by
Appliedjobz

Related Topics