Ibps I.T. Officer Scale-I 2012

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Prashant_kr
P
Prashant_kr
Community Contributor
Quizzes Created: 3 | Total Attempts: 1,519
| Attempts: 352 | Questions: 50
Please wait...
Question 1 / 50
0 %
0/100
Score 0/100
1. In SQL, which command is used to changes data in a data table?

Explanation

The correct answer is UPDATE. The UPDATE command in SQL is used to modify or change existing data in a data table. It allows you to update specific columns or rows in a table based on certain conditions or criteria. This command is essential for making changes to data within a database and is commonly used in conjunction with the WHERE clause to specify which rows should be updated. The other options, INSERT, BROWSE, and APPEND, are not used for modifying existing data but rather for inserting new data or browsing and viewing data. Therefore, the correct command for changing data in a data table is UPDATE.

Submit
Please wait...
About This Quiz
Security Quizzes & Trivia

This IBPS I. T. Officer Scale-I 2012 quiz assesses knowledge in IT and database management, focusing on SQL commands, firewall security, and data handling. It's tailored for IT... see moreprofessionals preparing for competitive exams, enhancing both their theoretical and practical IT skills. see less

2. A special type gateway that can keep external users from accessing resources on the LAN users access the external info is called:

Explanation

A firewall is a special type of gateway that is designed to prevent unauthorized access to resources on a LAN (Local Area Network) from external users. It acts as a barrier between the internal network and the external network, monitoring and controlling incoming and outgoing network traffic based on predetermined security rules. By enforcing these rules, a firewall can effectively protect the LAN from potential threats and unauthorized access attempts. Therefore, a firewall is the correct answer in this case.

Submit
3. Local variables

Explanation

Local variables are known only to the block in which they are created. They have a limited scope and are not accessible outside of that block. Once the block ends, the local variables cease to exist. This is a fundamental concept in programming languages like C++ where variables are used to store and manipulate data within a specific context or block of code.

Submit
4. Abstraction is

Explanation

Abstraction refers to the process of representing the fundamental aspects or characteristics of something while omitting unnecessary details. It involves focusing on the key elements or concepts that are essential for understanding or working with the subject matter at hand. This allows for a simplified and generalized representation that can be easily comprehended and utilized.

Submit
5. What is the name given to the exchange of control signals which is necessary for establishing a connection between a modem and a computer at one end of a line and another modem and computer at the other end?

Explanation

Handshaking is the name given to the exchange of control signals that is necessary for establishing a connection between a modem and a computer at one end of a line and another modem and computer at the other end. Handshaking involves the exchange of signals to ensure that both devices are ready to communicate and to establish the parameters of the connection, such as data rate and error control. This process is crucial for the successful establishment of a connection between the two devices.

Submit
6. Which layer of OSI determines the interface of the system with the user?

Explanation

The application layer of the OSI model determines the interface of the system with the user. This layer provides services for user applications to access the network and interact with it. It includes protocols such as HTTP, FTP, SMTP, and Telnet, which allow users to access web pages, transfer files, send emails, and establish remote connections. The application layer is responsible for presenting data to the user in a meaningful way and providing a platform for user interaction with the network.

Submit
7. Rows of a relation are called:

Explanation

The rows of a relation are called tuples. In a relational database, a tuple represents a single record or row of data. It contains a set of attributes or fields, each of which holds a specific piece of information. Tuples are used to organize and store data in a structured manner, allowing for efficient retrieval and manipulation of information.

Submit
8. Which command(s) is (are) used to redefine a column of the table in SQL ?

Explanation

The correct answer is ALTER TABLE. The ALTER TABLE command is used in SQL to modify the structure of a table, including redefining columns. This command allows you to add, modify, or delete columns in an existing table. It is a commonly used command when you need to make changes to the structure of your database table.

Submit
9. In files, there is a key associated with each record which is used to differentiate among different records. For every file there is at least one set of keys that is unique. Such a Key is called

Explanation

A primary key is a unique identifier for each record in a file. It ensures that each record in the file can be uniquely identified and differentiated from other records. The primary key is used to enforce data integrity and ensure that there are no duplicate or null values in the key field. It is a fundamental concept in database design and is essential for maintaining the integrity and consistency of the data.

Submit
10. Which of the following is true about GUIs?

Explanation

GUIs, or Graphical User Interfaces, are interfaces that use visual elements such as icons and menus to allow users to interact with a computer system. This makes computers easier to use for nonprofessionals, as they can navigate through the system by selecting these visual elements with a mouse. Therefore, both statements (1) and (2) are true about GUIs.

Submit
11. A ___ means that one record in a particular record type is related to only one record of another record type.

Explanation

A one-to-one relationship means that each record in a particular record type is associated with only one record in another record type. This implies a unique and direct correspondence between the two record types, where each record in one type is linked to a single record in the other type. This type of relationship ensures a one-to-one mapping between the records of the two types, allowing for a specific and individual connection between them.

Submit
12. An important application of cryptography, used in computerized commercial and financial transaction

Explanation

A digital signature is an important application of cryptography that is used in computerized commercial and financial transactions. It provides a way to verify the authenticity and integrity of digital documents or messages. It uses encryption techniques to create a unique digital signature that can be used to verify the identity of the sender and ensure that the message has not been tampered with during transmission. This is crucial in ensuring the security and trustworthiness of online transactions. Therefore, the correct answer is digital signature.

Submit
13. ____ is primarily used for mapping host names and email destinations to IP address but can also be used for other purposes.

Explanation

DNS (Domain Name System) is primarily used for mapping host names and email destinations to IP addresses. It serves as a directory that translates human-readable domain names into machine-readable IP addresses. However, DNS can also be used for other purposes, such as mapping other types of network resources or providing additional information about a domain.

Submit
14. Which of the following is a universal gate?

Explanation

A universal gate is a gate that can be used to implement any logic function. The NAND gate is a universal gate because it can be used to implement all other logic gates such as AND, OR, and EXOR. By connecting multiple NAND gates together, any logic function can be realized. Therefore, the NAND gate is considered a universal gate.

Submit
15. In a relational schema, each tuple is divided into fields called

Explanation

In a relational schema, each tuple is divided into fields called domains. A domain represents the set of possible values that a particular attribute can have. It defines the data type and constraints for the attribute, ensuring that only valid values are stored in the database. Therefore, the correct answer is "Domains".

Submit
16. Each node in a linked list must contain at least:

Explanation

A linked list is a data structure where each node contains two fields: one for storing the data and another for storing the reference to the next node in the list. These two fields are essential for the linked list to maintain the connectivity between nodes and to store the actual data being stored in the list. Therefore, each node in a linked list must contain at least two fields.

Submit
17. A ___ contains the smallest unit of meaningful data, so you might call it the basic building block for a data file.

Explanation

Fields contain the smallest unit of meaningful data in a data file. They are the basic building blocks for organizing and storing data. A field represents a single piece of information, such as a name, age, or address, within a record. Records, on the other hand, are collections of fields that are grouped together to represent a complete set of related data. File structures and databases are broader concepts that encompass multiple records and fields. Therefore, the correct answer is Fields.

Submit
18. Which of the following is not a connecting device?

Explanation

A transceiver is a device that combines both a transmitter and receiver in one unit, allowing for bidirectional communication. It is commonly used in networking to connect devices to a network, making it a connecting device. Therefore, the correct answer is "None of these," as all the other options listed (Bridge, Router, and Repeater) are indeed connecting devices.

Submit
19. Through linked list one can implement

Explanation

A linked list is a data structure that consists of a sequence of nodes, where each node contains a reference to the next node in the sequence. This allows for efficient insertion and deletion operations. By utilizing the concept of linked lists, one can implement various data structures such as a stack, graph, and queue.

In a stack, elements are added and removed from one end only, making it suitable for implementing a Last-In-First-Out (LIFO) behavior. A linked list can be used to represent the stack efficiently.

A graph can be represented using linked lists by storing each vertex as a node and connecting them through edges. This allows for efficient traversal and manipulation of the graph.

A queue follows the First-In-First-Out (FIFO) behavior, where elements are added at one end and removed from the other end. Linked lists can be used to efficiently implement a queue by maintaining references to the first and last nodes.

Therefore, all of the above options can be implemented using linked lists.

Submit
20. A computer system consisting of its processor, memory and I/O devices accepts data, processes it and produces the output results .Can you tell in which component is the raw data fed?

Explanation

The raw data is fed into the Main Memory component of the computer system. Main Memory, also known as RAM (Random Access Memory), is a volatile storage device that temporarily holds data and instructions that are currently being processed by the processor. It is directly accessible by the processor and is used to store both the input data and the intermediate results during the processing.

Submit
21. From what location are the 1st computer instructions available on boot up ?

Explanation

The 1st computer instructions are available on boot up from ROM BIOS. ROM BIOS stands for Read-Only Memory Basic Input Output System. It is a firmware that is stored in a chip on the motherboard of a computer. During the boot up process, the ROM BIOS initializes the hardware components of the computer and loads the operating system. It contains the initial instructions that are necessary for the computer to start up and perform basic functions.

Submit
22. Which of the following is not a context free grammar components?

Explanation

A context-free grammar consists of terminal symbols, nonterminal symbols, and production rules. Terminal symbols represent the basic elements or tokens of the language, while nonterminal symbols represent groups of symbols. Production rules define how symbols can be replaced or rearranged. However, "List" is not a component of a context-free grammar. It is not a commonly used term in the context of grammar components.

Submit
23. The process of transferring data intended for a peripheral device into a disk (or intermediate store) so that it can be transferred to peripheral at a more convenient time or in bulk is known as

Explanation

Spooling is the correct answer because it refers to the process of transferring data intended for a peripheral device, such as a printer, into a disk or intermediate store. This allows the data to be held temporarily until the peripheral device is ready to process it. Spooling helps to improve efficiency by allowing the computer to continue processing other tasks while the peripheral device is busy.

Submit
24. Consider an operation of addition. For two numbers, the operating will generate a sum. If the operand are strings, and the same operation would produce a third string by concatenation. This features is called ____.

Explanation

Polymorphism is the correct answer because it refers to the ability of an operation to behave differently depending on the type of operands. In this case, the operation of addition can produce different results (a sum or a concatenated string) depending on whether the operands are numbers or strings. Polymorphism allows for flexibility and adaptability in programming, as it allows the same operation to be applied to different types of data.

Submit
25. Override is a method

Explanation

Override is a method that replaces an inherited method for the same operation. This means that when a subclass inherits a method from its superclass, it can override that method by providing its own implementation. This allows the subclass to customize the behavior of the method to suit its own needs. By overriding the inherited method, the subclass can effectively replace the implementation of the method in the superclass.

Submit
26. In ER diagrams, the term cardinality is a synonym for the term—

Explanation

In ER diagrams, the term "cardinality" refers to the number of instances of one entity that can be associated with the number of instances of another entity. This is also known as the "degree" of the relationship between entities. Therefore, the correct answer is "Degree".

Submit
27. Aggregation is a special form of

Explanation

Aggregation is a special form of association in object-oriented programming. It represents a "has-a" relationship between classes, where one class contains a reference to another class as a member variable. Unlike generalization and specialization, which represent "is-a" relationships, aggregation does not involve inheritance. Instead, it emphasizes the concept of composition, where one class is composed of one or more instances of another class.

Submit
28. Which of the following is a phase of RAD model?

Explanation

The RAD (Rapid Application Development) model is a software development methodology that consists of several phases. Business modeling is one of these phases, which involves understanding and defining the business processes and requirements. Data modeling is another phase, where the data structures and relationships are designed. Application generation is also a phase in RAD, where the actual software application is developed using various tools and techniques. Therefore, all of the above options (Business modeling, Data modeling, and Application generation) are phases of the RAD model.

Submit
29. In SQL, which of the following is not a data definition language command?

Explanation

UPDATE is a DML Command

Submit
30. The tracks on a disk which can be accused without repositioning the R/W heads is

Explanation

A cylinder is a set of tracks on a disk that are at the same distance from the center of the disk. The R/W (Read/Write) heads can move from one track to another within a cylinder without repositioning, as they are all at the same distance. Therefore, the correct answer is "Cylinder."

Submit
31. An oracle server index—

Explanation

An oracle server index is a schema object that is used to speed up the retrieval of rows by using a pointer. It is also independent of the table it indexes, meaning it can exist separately from the table it is associated with. Therefore, all of these statements are correct.

Submit
32. A heap allows a very efficient implementation of a

Explanation

A heap allows a very efficient implementation of a priority queue because it ensures that the element with the highest priority is always at the root of the heap. This allows for quick access to the highest priority element and efficient insertion and deletion operations. A priority queue is a data structure where each element has a priority assigned to it, and elements with higher priority are dequeued first. Therefore, using a heap data structure to implement a priority queue ensures efficient operations and maintains the desired order of elements based on their priority.

Submit
33. Data security threats include

Explanation

Data security threats include privacy invasion, which refers to unauthorized access or disclosure of sensitive information. This can occur when individuals or organizations gain access to personal data without consent or use it for malicious purposes. Privacy invasion can lead to identity theft, financial fraud, or reputational damage. It is crucial for organizations to implement robust security measures, such as encryption and access controls, to protect against privacy invasion and ensure the confidentiality and integrity of data.

Submit
34. ____ is virus that inserts itself into a system's memory. Then it take number of actions when an infected file is executed.

Explanation

A resident virus is a type of virus that inserts itself into a system's memory. Once it is in the memory, it can take a number of actions when an infected file is executed. This type of virus remains in the computer's memory even after the initial execution, allowing it to continue its malicious activities. Unlike other types of viruses that may only infect specific files or sectors, a resident virus has the ability to infect multiple files and can be difficult to detect and remove.

Submit
35. Decision support system are based on ____ analysis

Explanation

Decision support systems (DSS) are tools that help in making informed decisions by analyzing data. These systems are based on various types of analysis, including query and reporting, data mining, and online analytical processing (OLAP). Query and reporting involve retrieving specific data and generating reports, while data mining focuses on discovering patterns and relationships in large datasets. OLAP enables multidimensional analysis of data, allowing users to drill down and explore data from different perspectives. Therefore, all of these analysis techniques are utilized in decision support systems to provide valuable insights and support decision-making processes.

Submit
36. A combinational logic circuit which is used to send data coming from a single source to two or more separate destinations is called as

Explanation

A demultiplexer is a combinational logic circuit that takes input from a single source and sends it to multiple separate destinations. It is the opposite of a multiplexer, which takes multiple inputs and sends them to a single output. In this case, the demultiplexer is the correct answer because it fits the description of a circuit used to send data from a single source to two or more separate destinations.

Submit
37. Which of the following system program forgoes the production of object code to generate absolute machine code and load it into the physical main storage location from which it will be executed immediately upon completion of the assembly?

Explanation

A load and go assembler is a system program that forgoes the production of object code and directly generates absolute machine code. It then loads this machine code into the physical main storage location, from which it can be executed immediately after the assembly process is completed. This approach eliminates the need for separate steps of generating and loading object code, making the assembly process more efficient.

Submit
38. In 8086 the overflow flag is set when

Explanation

The correct answer is that the overflow flag is set when signed numbers go out of their range after an arithmetic operation. In the 8086 processor, the overflow flag is used to indicate when the result of a signed arithmetic operation exceeds the range that can be represented with the available number of bits. This can occur when adding or subtracting signed numbers and the result is too large or too small to fit within the designated number of bits. The overflow flag helps to detect and handle these cases appropriately.

Submit
39. The TRAP is one of the interrupts available its INTEL 8085. Which one statement is true of TRAP?

Explanation

The TRAP interrupt in the INTEL 8085 is unique in that it can be triggered by both a positive edge and a level. This means that it can be activated either when the signal transitions from low to high (positive edge) or when the signal remains consistently high (level). This flexibility allows for more versatile interrupt handling in the system.

Submit
40. Relocation bits used by relocating loader are specifically (generated) by:

Explanation

The relocation bits used by a relocating loader are specifically generated by the linker. The linker is responsible for combining object files and resolving external references, ensuring that the final executable code can be loaded and executed correctly. As part of this process, the linker generates relocation information, which specifies the memory locations that need to be adjusted during the loading process. This allows the relocating loader to modify the object code and adapt it to the actual memory layout of the system, enabling the program to run correctly regardless of its load address.

Submit
41. ____ is a set design steps that allows a DFD with transform flow characteristics to be mapped into a predefined template for program structure.

Explanation

Transform mapping is a set of design steps that allows a DFD with transform flow characteristics to be mapped into a predefined template for program structure. This process helps in converting the data flow diagram into an actual program by identifying the modules, functions, and procedures required for the transformation of inputs to outputs. It ensures that the program structure aligns with the flow of data and transforms specified in the DFD.

Submit
42. This ___ data mining technique derives rules from real world case examples.

Explanation

Case Based Reasoning is a data mining technique that derives rules from real-world case examples. It involves solving new problems by finding similar cases from past experiences and using their solutions as a guide. This approach is useful when there is a lack of explicit rules or knowledge about a problem domain, as it relies on the similarity of cases to make decisions. By analyzing and comparing previous cases, Case Based Reasoning can provide valuable insights and solutions for new situations.

Submit
43. The ___ remains operative until the software is required.

Explanation

The Spiral Model remains operative until the software is required. The Spiral Model is an iterative software development process that combines elements of both waterfall and incremental models. It involves a series of iterations, each consisting of planning, risk analysis, development, and evaluation. This model is suitable for projects where risks need to be identified and mitigated early on, and where there is a need for frequent feedback and adaptation. Therefore, the Spiral Model continues to be used throughout the software development process until the final product is required.

Submit
44. The mechanical diskette drive in which you insert your diskette is connected to the computer's—bus

Explanation

The mechanical diskette drive is connected to the computer's communication bus. The communication bus is responsible for transferring data between different components of the computer, including the diskette drive. This allows the computer to read and write data to the diskette inserted in the drive.

Submit
45. An indexing operation

Explanation

The correct answer is "Both (A) and (C)". An indexing operation can refer to two different actions. Firstly, it can sort a file using a single key, which means organizing the file's records in a specific order based on a particular attribute. Secondly, it can establish an index for a file, which involves creating a separate data structure that allows for quicker access to specific records based on the chosen key. Therefore, both sorting a file using a single key and establishing an index for a file are valid explanations for an indexing operation.

Submit
46. The two's compliment of binary number 010111.1100 is

Explanation

The two's complement of a binary number is obtained by inverting all the bits and adding 1 to the least significant bit. In this case, the binary number is 010111.1100. Inverting all the bits gives 101000.0011. Adding 1 to the least significant bit gives the final answer of 101000.0100.

Submit
47. Data mining evolve as a mechanism to cater the limitations of ___ systems to deal massive data sets with high dimensionality, new data type, multiple heterogeneous data resource etc.

Explanation

Data mining evolved as a mechanism to cater to the limitations of OLTP systems. OLTP systems are designed to handle transactional processing and are not well-suited for dealing with massive data sets with high dimensionality, new data types, and multiple heterogeneous data resources. Data mining, on the other hand, is specifically designed to extract valuable insights and patterns from large and complex datasets, making it a more suitable approach for handling these challenges.

Submit
48. A set of programs that handle firm's database responsibilities is called a

Explanation

The correct answer is "All of these". This means that a set of programs that handle a firm's database responsibilities can be referred to as a Database Management System (DBMS), a Data Base Processing System (DBPS), or a Data Management System (DMS).

Submit
49. You are in the process of analyzing a problem that requires you to collect and store TCP/ IP Packets. Which of the following utilities is best suited for this purpose

Explanation

Network Monitor is the best utility for collecting and storing TCP/IP packets. NBTSTAT is used for NetBIOS over TCP/IP troubleshooting, Performance Monitor is used for monitoring system performance, NETSTAT is used for displaying active network connections and listening ports, and DHCP Management Console is used for managing DHCP servers. However, Network Monitor is specifically designed for capturing and analyzing network traffic, making it the most suitable utility for this purpose.

Submit
50. What does microprocessor speed depends on?

Explanation

The microprocessor speed depends on the address bus width. The address bus is responsible for carrying memory addresses from the microprocessor to the memory modules. A wider address bus allows the microprocessor to access a larger range of memory locations, which can result in faster processing speeds. Therefore, the speed of the microprocessor is directly influenced by the width of the address bus.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Feb 04, 2014
    Quiz Created by
    Prashant_kr
Cancel
  • All
    All (50)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
In SQL, which command is used to changes data in a data table?
A special type gateway that can keep external users from accessing...
Local variables
Abstraction is
What is the name given to the exchange of control signals which is...
Which layer of OSI determines the interface of the system with the...
Rows of a relation are called:
Which command(s) is (are) used to redefine a column of the table in...
In files, there is a key associated with each record which is used to...
Which of the following is true about GUIs?
A ___ means that one record in a particular record type is related to...
An important application of cryptography, used in computerized...
____ is primarily used for mapping host names and email destinations...
Which of the following is a universal gate?
In a relational schema, each tuple is divided into fields called
Each node in a linked list must contain at least:
A ___ contains the smallest unit of meaningful data, so you might call...
Which of the following is not a connecting device?
Through linked list one can implement
A computer system consisting of its processor, memory and I/O devices...
From what location are the 1st computer instructions available on boot...
Which of the following is not a context free grammar components?
The process of transferring data intended for a peripheral device into...
Consider an operation of addition. For two numbers, the operating will...
Override is a method
In ER diagrams, the term cardinality is a synonym for the term—
Aggregation is a special form of
Which of the following is a phase of RAD model?
In SQL, which of the following is not a data definition language...
The tracks on a disk which can be accused without repositioning the...
An oracle server index—
A heap allows a very efficient implementation of a
Data security threats include
____ is virus that inserts itself into a system's memory. Then it take...
Decision support system are based on ____ analysis
A combinational logic circuit which is used to send data coming from a...
Which of the following system program forgoes the production of object...
In 8086 the overflow flag is set when
The TRAP is one of the interrupts available its INTEL 8085. Which one...
Relocation bits used by relocating loader are specifically (generated)...
____ is a set design steps that allows a DFD with transform flow...
This ___ data mining technique derives rules from real world case...
The ___ remains operative until the software is required.
The mechanical diskette drive in which you insert your diskette is...
An indexing operation
The two's compliment of binary number 010111.1100 is
Data mining evolve as a mechanism to cater the limitations of ___...
A set of programs that handle firm's database responsibilities is...
You are in the process of analyzing a problem that requires you to...
What does microprocessor speed depends on?
Alert!

Advertisement