S.B.I. IT Officer Model Paper

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Prashant_kr
P
Prashant_kr
Community Contributor
Quizzes Created: 3 | Total Attempts: 1,519
| Attempts: 777 | Questions: 50
Please wait...
Question 1 / 50
0 %
0/100
Score 0/100
1. A _______'s main purpose if to prohibit unathorized access to your computer via Internet

Explanation

A firewall's main purpose is to prohibit unauthorized access to your computer via the Internet. It acts as a barrier between your computer and the outside world, monitoring and controlling incoming and outgoing network traffic based on predetermined security rules. By analyzing data packets and determining whether they should be allowed or blocked, a firewall helps protect your computer from potential threats, such as hackers, malware, and unauthorized access attempts.

Submit
Please wait...
About This Quiz
S.B.I. IT Officer Model Paper - Quiz

Are you a network administrator or networking student? Do you know anything about an I. T officer model and networking in the work place? If yes take this quiz to find out how much you know.

Personalize your quiz and earn a certificate with your name on it!
2. Which of the following is not a type of database language?

Explanation

Data Standard Language is not a type of database language. The other options listed - Data Manipulation Language, Data Definition Language, and Data Control Language - are all types of database languages that are used for different purposes in managing and manipulating data within a database. Data Standard Language, on the other hand, is not a recognized type of database language and does not have a specific function or purpose in database management.

Submit
3. Programs in which of the following can't be erased?

Explanation

ROM stands for Read-Only Memory, which is a type of computer memory that is non-volatile and cannot be erased or modified. Unlike RAM (Random Access Memory) which is volatile and can be both read from and written to, ROM is designed to store permanent data or instructions that are essential for the computer's operation. Therefore, programs stored in ROM cannot be erased.

Submit
4. Internet-like network within enterprises are called________

Explanation

Intranets are internet-like networks within enterprises. They are private networks that use internet protocols and technologies to securely share information and resources within an organization. Intranets are designed to be accessible only to authorized users within the organization, providing a secure and controlled environment for communication, collaboration, and information sharing. Intranets are commonly used to facilitate internal communication, document sharing, employee collaboration, and access to company resources such as databases and applications.

Submit
5. Ping command is used for what purpose?

Explanation

The ping command is used to test whether a device on a network is reachable or not. It sends a small packet of data to the specified IP address or domain name and waits for a response. If a response is received, it indicates that the device is reachable and functioning properly. This command is commonly used for network troubleshooting and diagnosing connectivity issues.

Submit
6. Which of the following activity is associated with data warehouse?

Explanation

Data mining is the correct answer because it is a process of discovering patterns and extracting useful information from large datasets. Data warehouses are specifically designed to store and organize large amounts of data from various sources, making it easier to perform data mining activities. EDI, credit card transactions, ATM transactions, and payment gateways are all related to data processing and transactions, but they are not directly associated with data warehousing or the process of data mining.

Submit
7. A central computer surrounded by one or more satellite computers is called___ 

Explanation

A central computer surrounded by one or more satellite computers is known as a Star Network. In this network topology, all the satellite computers are connected to the central computer, forming a star-like structure. The central computer acts as a hub, facilitating communication between the satellite computers. This arrangement allows for easy management and troubleshooting as each satellite computer can be individually connected or disconnected without affecting the rest of the network.

Submit
8. A communication network which is used by large organizations over regional, national or global area are called

Explanation

A Wide Area Network (WAN) is a communication network that is used by large organizations over a regional, national, or global area. It allows for the connection of multiple Local Area Networks (LANs) and enables the sharing of resources and information across different geographical locations. Unlike LANs, which are limited to a specific area such as a building or campus, WANs provide connectivity over larger distances. The Internet is a type of WAN that connects networks globally, making it possible for users to access information and services from anywhere in the world. Therefore, the correct answer is WAN.

Submit
9. ___________________refers to a family of IEEE standards dealing with local area network with metropolitan area network

Explanation

The correct answer is 802. The 802 family of IEEE standards includes various specifications for local area networks (LANs) and metropolitan area networks (MANs). These standards cover different aspects such as network protocols, data transfer rates, and physical media. Examples of well-known standards within the 802 family include 802.11 for wireless LANs (Wi-Fi) and 802.3 for Ethernet.

Submit
10. IEEE standard for Wi-Fi Systems is_____

Explanation

The correct answer is 802.11. This is the IEEE standard for Wi-Fi systems. It specifies the protocols and technologies used for wireless local area networks (WLANs). The 802.11 standard defines different variations such as 802.11a, 802.11b, 802.11g, 802.11n, 802.11ac, and 802.11ax, each with its own specifications and capabilities.

Submit
11. The drawback of binary tree sort are remedied by:-

Explanation

Heap Sort is the correct answer because it overcomes the drawbacks of binary tree sort. Binary tree sort has a drawback of having an unbalanced tree, which can lead to inefficient sorting. Heap Sort, on the other hand, uses a binary heap data structure that ensures a balanced tree and guarantees efficient sorting. It achieves this by creating a heap from the given array and then repeatedly removing the root element (which is the largest) and placing it at the end of the sorted array.

Submit
12. Second generation computers used___language

Explanation

Second generation computers used assembly language. Assembly language is a low-level programming language that is specific to a particular computer architecture. It uses mnemonic codes and symbols to represent the machine instructions and data. Assembly language is easier for humans to understand and write compared to machine code, which is in binary format. However, it still requires a deep understanding of the computer's architecture and instruction set. Second generation computers, which were developed in the 1950s and 1960s, used assembly language as a means of programming and controlling the computer's operations.

Submit
13. White box testing, a software testing technique is sometimes called____

Explanation

White box testing is a software testing technique that involves testing the internal structure and implementation of a software system. It is also known as glass box testing because it allows the tester to see and understand the internal workings of the system, similar to looking inside a glass box. This technique involves examining the code, logic paths, and data flows to ensure that all components of the system are functioning correctly. Therefore, the correct answer is Glass Box Testing.

Submit
14. IP address 135.0.10.27 belongs to class_____

Explanation

The IP address 135.0.10.27 belongs to class B. In classful IP addressing, the first octet of the IP address determines the class. Class B addresses have a range of 128.0.0.0 to 191.255.255.255, with the first two octets used for network identification and the last two for host identification. The given IP address falls within this range, hence it belongs to class B.

Submit
15. In Queue, the items deleted at one end called___

Explanation

In a queue, the items are deleted from the front end. The front represents the first item that was inserted into the queue, and as items are deleted, the front moves towards the rear. Therefore, the correct answer is "Front".

Submit
16. Default Subnet mask for class B network is______

Explanation

The default subnet mask for a class B network is 255.255.0.0. This subnet mask allows for a network portion of 16 bits and a host portion of 16 bits. It can support up to 65,534 hosts on each network.

Submit
17. _____________is a computer to computer exchange of routine business data between trading partners in a standard data formats.

Explanation

EDI stands for Electronic Data Interchange. It is a computer-to-computer exchange of routine business data between trading partners in a standard data format. This allows for the seamless transmission of information such as purchase orders, invoices, and shipping notices, eliminating the need for manual data entry and reducing errors. EDI is widely used in various industries to streamline business processes, increase efficiency, and improve communication between trading partners.

Submit
18. At ___ layer TCP/IP defines two protocols: Transmission Control Protocol (TCP) and User Datagram Protocol (UDP)

Explanation

TCP/IP is a protocol suite that defines how data is transmitted over networks. At the Transport layer, TCP/IP defines two protocols: Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). TCP is a reliable protocol that ensures the delivery of data packets in the correct order and guarantees error-free transmission. UDP, on the other hand, is a connectionless protocol that does not guarantee the delivery of data packets or their order. Both TCP and UDP are used for different types of network communication, and their functions are defined at the Transport layer of the TCP/IP model.

Submit
19. Print Server uses___________which is a buffer that holds data before it is send to printer

Explanation

A Print Server uses a spool, which is a buffer that holds data before it is sent to the printer. This allows the print server to receive and process print jobs from multiple users simultaneously, storing them in the spool until the printer is ready to print. This helps in improving the efficiency and speed of printing by allowing users to continue working without having to wait for their print job to be completed immediately.

Submit
20. SONET uses

Explanation

SONET (Synchronous Optical Network) is a high-speed telecommunications network that is widely used for transmitting voice, data, and video over long distances. It uses fiber optic cables for transmission. Fiber optic cables are made of thin strands of glass or plastic that transmit data as pulses of light. These cables offer high bandwidth, low signal loss, and immunity to electromagnetic interference, making them ideal for long-distance and high-speed data transmission. Therefore, the correct answer is Fiber Optic Cable.

Submit
21. The __________ layer is closest to transmission medium

Explanation

The physical layer is closest to the transmission medium because it is responsible for transmitting raw bits over a physical medium such as copper wires, fiber optic cables, or wireless signals. It deals with the physical characteristics of the transmission medium, such as voltage levels, signaling rates, and physical connectors. This layer ensures that the bits are transmitted reliably and accurately across the network.

Submit
22. To modify existing ROWS of table_____command is used

Explanation

The correct answer is UPDATE because the UPDATE command is used to modify existing rows of a table. This command allows you to change the values of specific columns in one or more rows of a table based on specified conditions. It provides a way to update the data in a table without having to delete and reinsert the entire row.

Submit
23. Repeater operates in which layer of OSI model?

Explanation

The correct answer is Physical Layer because the repeater operates at the physical layer of the OSI model. The physical layer is responsible for transmitting raw data bits over a communication channel without any processing or interpretation. A repeater is a device that regenerates and amplifies signals to extend the range of a network by boosting the signal strength. Therefore, it operates at the physical layer to ensure the proper transmission of signals.

Submit
24. Which of the following uses the greatest number of layers in OSI model?

Explanation

A gateway uses the greatest number of layers in the OSI model because it operates at all seven layers. It acts as a translator between different protocols and network architectures, allowing communication between networks that use different protocols. This requires it to understand and process data at each layer of the OSI model, making it the option that uses the greatest number of layers.

Submit
25. Encryption/Decryption provides a network with______

Explanation

Encryption/Decryption provides a network with privacy by ensuring that the information being transmitted is only accessible to authorized individuals. It involves encoding the data in such a way that it cannot be understood by anyone who does not have the decryption key. This ensures that sensitive information remains confidential and protected from unauthorized access or interception.

Submit
26. Which type of computers use 8 bit EBCDIC code?

Explanation

Mainframes use 8-bit EBCDIC code. EBCDIC stands for Extended Binary Coded Decimal Interchange Code, which is a character encoding used mainly on IBM mainframe computers. EBCDIC uses 8 bits to represent each character, allowing for a larger character set than ASCII. Therefore, the correct answer is Mainframes.

Submit
27. In digital signature, the private key is used for___________ and public key for________

Explanation

In digital signature, the private key is used for encryption and the public key is used for decryption. This is because the private key is known only to the owner and is used to encrypt the data, ensuring its integrity and authenticity. The public key, on the other hand, is freely available to anyone and is used to decrypt the data, verifying the digital signature and ensuring that it was indeed created by the owner of the private key.

Submit
28. Decimal equivalent of 11100001111 is

Explanation

The decimal equivalent of a binary number can be found by multiplying each digit by the corresponding power of 2 and then summing the results. In this case, starting from the rightmost digit, we have 1 * 2^0 + 1 * 2^1 + 1 * 2^2 + 0 * 2^3 + 0 * 2^4 + 0 * 2^5 + 0 * 2^6 + 1 * 2^7 + 1 * 2^8 + 1 * 2^9 + 1 * 2^10. Simplifying this expression gives us 1 + 2 + 4 + 0 + 0 + 0 + 0 + 128 + 256 + 512 + 1024 = 1807. Therefore, the correct answer is 1807.

Submit
29. What is loopback address?

Explanation

The loopback address is a special IP address that is used to test network connections on a local device. It is commonly represented as 127.0.0.1. When a device sends data to this address, it loops back to itself, allowing the device to communicate with itself. This is often used for troubleshooting and testing purposes, as it allows the device to simulate network communication without actually sending data over a physical network.

Submit
30. Two different kinds of networks can be connected via

Explanation

Gateways are devices that connect two different kinds of networks, allowing communication between them. They act as a bridge between networks that use different protocols or have different architectures. Unlike bridges, which connect similar networks, gateways handle the translation of data and protocols between the networks, enabling seamless communication. Satellites, routers, and bridges may also connect networks, but gateways specifically address the connectivity between different network types. Therefore, gateways are the correct answer for connecting two different kinds of networks.

Submit
31. Which of the following is an example of Client/Server Model?

Explanation

All of the options listed (FTP, DNS, and TELNET) are examples of the client/server model. In the client/server model, a client computer requests services or resources from a server computer. FTP (File Transfer Protocol) allows clients to transfer files to and from a server. DNS (Domain Name System) translates domain names into IP addresses, with clients requesting this information from DNS servers. TELNET allows clients to remotely access and control servers. Therefore, all of these options demonstrate the client/server model.

Submit
32. ____________is the continuous ability to send and recieve data between interconnected networks 

Explanation

Network interoperability refers to the continuous ability to send and receive data between interconnected networks. It ensures that different networks, systems, and devices can seamlessly communicate and exchange information without any compatibility or connectivity issues. This is essential for the smooth functioning of the internet and other interconnected networks, allowing users to access and share data across different platforms and environments. FTP (File Transfer Protocol), SMTP (Simple Mail Transfer Protocol), and TNS (Transparent Network Substrate) are specific protocols or technologies used for specific purposes within network interoperability, but the term "network interoperability" encompasses the broader concept of seamless data exchange between interconnected networks.

Submit
33. Which are not used in case of applet?

Explanation

Applets are small applications that run within a web browser. They are designed to be lightweight and portable, and therefore do not have direct access to the user's disk. Applets are typically used to enhance the functionality of a web page by providing interactive content or multimedia. They can communicate with the internet to retrieve data or interact with web services, but they do not have the capability to read or write data from the user's disk. Therefore, "Read/Write data from disk" is not used in the case of applets.

Submit
34. The data encrypted at the sender site is called_____. The data to be decrypted at reciever end is called___

Explanation

The data encrypted at the sender site is called plaintext, while the data to be decrypted at the receiver end is called ciphertext.

Submit
35. End to End connectivity is provided in____layer

Explanation

The correct answer is Transport because the Transport layer is responsible for providing end-to-end connectivity and ensuring reliable communication between the source and destination hosts. It is responsible for segmenting data, adding sequence numbers, and providing flow control and error recovery mechanisms. The Network layer is responsible for routing packets, the Data Link layer is responsible for framing and error detection, and the Application layer is responsible for providing services to the end-users. The Session layer is responsible for establishing, managing, and terminating sessions between applications.

Submit
36. Full adder is used for

Explanation

A full adder is a digital circuit that performs addition of three bits: two input bits and a carry bit. It is capable of adding two 1-bit numbers along with the carry generated from the previous stage. Therefore, it is commonly used for 3-bit addition, where three bits are added together to produce a sum and a carry output. This allows for the addition of numbers that are represented in 3 bits, providing a wider range of possible values compared to 2-bit addition.

Submit
37. With an IP address of 100, you currently have 80 subnets. What subnet mask you should use to maximize number of hosts?

Explanation

To maximize the number of hosts, a subnet mask with a larger number of host bits should be used. The subnet mask 252 has 4 host bits, which allows for a maximum of 14 hosts per subnet (2^4 - 2). This is the largest number of hosts possible among the given subnet masks (192, 240, 248, 224, and 252). Therefore, the subnet mask 252 should be used to maximize the number of hosts.

Submit
38. Most important advantage of IC is its______

Explanation

The most important advantage of an Integrated Circuit (IC) is its extremely high reliability. This means that ICs are less likely to fail or malfunction compared to other circuit components. This reliability is achieved through the miniaturization and integration of multiple electronic components onto a single chip, reducing the chances of physical damage or external interference. The high reliability of ICs makes them ideal for use in critical applications where failure could have severe consequences, such as in aerospace or medical devices.

Submit
39. ______uses a standard called IEEE 802.6 

Explanation

MAN (Metropolitan Area Network) uses a standard called IEEE 802.6. MAN is a network that covers a larger geographic area than a LAN (Local Area Network) but smaller than a WAN (Wide Area Network). It is typically used to connect multiple LANs within a city or metropolitan area.

Submit
40. Which is the general network standard for the data link layer in the OSI Reference Model?

Explanation

The correct answer is IEEE 802.2. IEEE 802.2 is the general network standard for the data link layer in the OSI Reference Model. It defines the Logical Link Control (LLC) sublayer, which provides services to the network layer and handles the flow and error control mechanisms. The other options (IEEE 802.1, IEEE 802.3, IEEE 802.4, and IEEE 802.6) are also standards within the IEEE 802 series, but they are specific to other layers or different network technologies.

Submit
41. An IC contains 50 gates each of which consists of 6 components. It belongs to____

Explanation

The IC containing 50 gates, each consisting of 6 components, belongs to the MSI (Medium Scale Integration) category. MSI refers to integrated circuits that have a moderate level of complexity and are capable of accommodating a higher number of gates and components compared to SSI (Small Scale Integration) circuits. VLSI (Very Large Scale Integration) and LSI (Large Scale Integration) are used to describe circuits with even greater complexity and higher gate and component counts. Therefore, the correct answer is MSI.

Submit
42. Communication handler is basically an____ 16 bit micro controller?

Explanation

The correct answer is 80C186. The 80C186 is a 16-bit microcontroller that can handle communication tasks. It is specifically designed for communication applications and includes features such as UART, DMA, and interrupt controllers. It is a popular choice for applications that require reliable and efficient communication handling.

Submit
43. Which of the following identifies a specific web page and its computer on the web page?

Explanation

A domain name is a unique name that identifies a specific website and its computer on the internet. It is used in the URL (Uniform Resource Locator) to access a specific web page. A domain name is easier to remember and use than the actual IP address of the computer hosting the website. Therefore, the domain name is the correct answer as it specifically identifies a web page and its computer on the web.

Submit
44. Where does Bridge operate in OSI model?

Explanation

The correct answer is "Both (1) and (2)". A bridge operates in both the Physical Layer and the Data Link Layer of the OSI model. In the Physical Layer, it forwards data packets based on the physical addresses of the devices. In the Data Link Layer, it examines the MAC addresses of the devices to determine whether to forward or filter the packets. Therefore, a bridge operates at both layers to facilitate the communication between different network segments.

Submit
45. What is a Pre-Shared Key that is more than 7 and less than 64 characters in length.

Explanation

A Pre-Shared Key (PSK) is a password used to authenticate wireless devices and secure the network. In the context of this question, the correct answer is "All of these" because all three options (WPA-PSK, TKIP, and AES) can be used with a PSK that is more than 7 and less than 64 characters in length. WPA-PSK is a security protocol that uses a PSK, while TKIP and AES are encryption algorithms that can be used with a PSK to secure the wireless network.

Submit
46. MODEM is a___________that modulates and demodulates signals

Explanation

A MODEM is a device that modulates and demodulates signals. DCE (Data Circuit-Terminating Equipment) is the correct answer because it refers to the equipment that terminates a digital circuit, such as a MODEM. DTE (Data terminal equipment) refers to the equipment that originates or terminates data, such as a computer or a terminal. The answer "Both (1) and (2)" is incorrect because it includes both DCE and DTE, which are two separate entities. "DTE-DCE" is also incorrect because it combines both DCE and DTE into one term. "None of these" is also incorrect because DCE is the correct answer.

Submit
47. An OR gate___

Explanation

An OR gate is a digital logic gate that outputs a true value if any of its inputs are true. It can be seen as an "any-or-all" gate because it produces a true output if any or all of its inputs are true. This means that even if only one input is true, the output will be true. Therefore, the correct answer is "is any-or-all gate".

Submit
48. Which of the following is not a type of database?

Explanation

The given options are all types of databases except for "Transition." Transition is not a commonly recognized type of database. Hierarchical, relational, and network databases are all well-known and widely used types of databases. Synthetic is not a type of database either, but it is not as commonly recognized as the other options. Therefore, the correct answer is Transition.

Submit
49. Routers operate in which layer of OSI?

Explanation

Routers operate in all of these layers of the OSI model. In the physical layer, routers transmit and receive signals over physical media such as cables. In the data link layer, routers use MAC addresses to forward data packets between devices on the same network. In the network layer, routers use IP addresses to route data packets between different networks. Therefore, routers play a role in all three layers of the OSI model.

Submit
50. Which of the following Transport layer protocol is used for transferring Electronic mail messages from one machine to anoher

Explanation

TCP (Transmission Control Protocol) is the correct answer for this question. TCP is a reliable and connection-oriented transport layer protocol that is commonly used for transferring electronic mail messages from one machine to another. It ensures that the data is delivered in the correct order and without any errors. SMTP (Simple Mail Transfer Protocol) is an application layer protocol that uses TCP to transfer email messages between mail servers. Therefore, TCP is the appropriate choice for this scenario.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Feb 02, 2014
    Quiz Created by
    Prashant_kr
Cancel
  • All
    All (50)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
A _______'s main purpose if to prohibit unathorized access to your...
Which of the following is not a type of database language?
Programs in which of the following can't be erased?
Internet-like network within enterprises are called________
Ping command is used for what purpose?
Which of the following activity is associated with data warehouse?
A central computer surrounded by one or more satellite computers is...
A communication network which is used by large organizations over...
___________________refers to a family of IEEE standards dealing with...
IEEE standard for Wi-Fi Systems is_____
The drawback of binary tree sort are remedied by:-
Second generation computers used___language
White box testing, a software testing technique is sometimes...
IP address 135.0.10.27 belongs to class_____
In Queue, the items deleted at one end called___
Default Subnet mask for class B network is______
_____________is a computer to computer exchange of routine business...
At ___ layer TCP/IP defines two protocols: Transmission Control...
Print Server uses___________which is a buffer that holds data before...
SONET uses
The __________ layer is closest to transmission medium
To modify existing ROWS of table_____command is used
Repeater operates in which layer of OSI model?
Which of the following uses the greatest number of layers in OSI...
Encryption/Decryption provides a network with______
Which type of computers use 8 bit EBCDIC code?
In digital signature, the private key is used for___________ and...
Decimal equivalent of 11100001111 is
What is loopback address?
Two different kinds of networks can be connected via
Which of the following is an example of Client/Server Model?
____________is the continuous ability to send and recieve data between...
Which are not used in case of applet?
The data encrypted at the sender site is called_____. The data to be...
End to End connectivity is provided in____layer
Full adder is used for
With an IP address of 100, you currently have 80 subnets. What subnet...
Most important advantage of IC is its______
______uses a standard called IEEE 802.6 
Which is the general network standard for the data link layer in the...
An IC contains 50 gates each of which consists of 6 components. It...
Communication handler is basically an____ 16 bit micro controller?
Which of the following identifies a specific web page and its computer...
Where does Bridge operate in OSI model?
What is a Pre-Shared Key that is more than 7 and less than 64...
MODEM is a___________that modulates and demodulates signals
An OR gate___
Which of the following is not a type of database?
Routers operate in which layer of OSI?
Which of the following Transport layer protocol is used for...
Alert!

Advertisement