Tuesday, 4 February 2014

IBPS SPECIALIST OFFICER III :: IBPS IT-OFFICER 2014 MODEL QUESTIONS AND ANSWERS

PROFESSIONAL KNOWLEDGE (IT)
===================================================
1. Computer read which type code I
(1 Ans.) binary code (2) English letter (3) character
(4) integer
(5) None of these

2. Hamming distance is’
(1 Ans.) a theoretical way of measuring errors
(2) a technique for assigning codes to a set of items known to occur with a given probability
(3) a technique for optimizing the intermediate code
(4) All of the above
(5) None of these

3. To find the shortest-path in a weighted graph or network, which of the following algp-rithm is
not used?
(1 Ans.) Warshall’s algorithm
(2) Dijkastra algorithm
(3) Kruskal algorithm
(4) All of the above
(5) None of these

4. The page replacement policy that some times leads to more page faults when the size of the
memory is increased, is
(1 Ans.) FIFO
(2) LRU
(3) MRU
(4) Optimal
(5) None of these

5. The PPP replaced.............
(1) HDLC
(2) OSPF
(3 Ans.) SLIP
(4) PAP
(5) None of these

6. The gate whose output is low if and only if all inputs are high, is
(1 Ans.) NAND
(2) AND
(3) OR
(4) All of these
(5) None of these

7. The ABC bank has implemented WLAN in its network when two or more devices in the network
send data at the same time to another device, the network faces the media access problem.
Which algorithm should the network administrator use to resolve the problem?
(1 Ans.) CSMA/CA
(2) CSMA/CD
(3) SSID Cloaking
(4) MAC Address Filtering
(5) None of these

8. Virtual functions allows you to
(1) create an array of type pointer to base class that can hold pointers to derived classes
(2 Ans.) use the same function call to execute member functions of objects from different classes.
(3) create function that have no body.
(4) group objects of different classes so they can all be accessed by the same function code.
(5) None of these

9. Communication circuits that transmit data in both directions but not at the same time are
operating in :
(1) a simplex mode
(2 Ans.) a half duplex mode
(3) a full duplex mode
(4) an asynchronous mode
(5) None of these

10. Critical section is a program segment
(1) which should run in a certain specified amount of time
(2) which avoids deadlock
(3 Ans.) where shared resources are accessed
(4) which must be endorsed by pair of semaphore operation P and V
(5) None of these

11. A Recurrence Relation
(1) Fibonacci sequence of numbers are type of Recurrence relation
(2) It is called difference equation when two terms will be used interchangeably.
(3) Numeric function is ref-ered to as the solution of the recurrence relation
(4 Ans.) All of the above
(5) None of these

12. Non planar graph with minimum number of vertices have
(1) 9 edges, 6 vertices
(2) 6 edges, 4 vertices
(3) 10 edges, 5 vertices
(4 Ans.) 9 edges, 5 vertices
(5) None of these

13. A language is regular if and only if it is accepted by a finite automation’.
(1 Ans.) The given statement is true
(2) The given statement is false
(3) The given statement is partially true
(4) Sometimes true, sometimes false(5) None of these

14. Which of the following have Fastest speed
(1 Ans.) FDDI ring
(2) None of these
(3) LAN
(4) token bus
(5) ring

15. .................modifies source code and/or data in an effort to make it amenable to future changes.
(1) Reverse engineering
(2 Ans.) Software restructuring
(3) Forward engineering
(4) Software maintenance
(5) None of these

16. Once object oriented programming has been accomplished, unit testing is applied for each
class. Class tests include-
(1) Fault-based testing
(2) Random testing
(3) Partition testing
(4 Ans.) All of the above (5) None of these

17. There are occasions when it does not matter if the function produces 0 or 1 for a given minterm.
Minterms that may produce either 0 or 1 for the function are said to be
(1) Careless conditions
(2 Ans.) Don’t care condition
(3) Maxterm condition
(4) None of these
(5) Minterm condition

18. All the vertices of a walk except very first and very last vertex, is called-
(1 Ans.) Internal vertices
(2) External vertices
(3) Intermediate vertices
(4) Adjacent vertices
(5) None of these

19. The library* files’ that come with C are
(1) Text editor for program development
(2) the compiler and linear
(3) program examples
(4 Ans.) files that contain functions which carry out various commonly used operations and calcula
tions
(5) None of these

20. Which of the follwing are valid characters constant?
(1) ‘in’
(2) ‘11’
(3) ‘10’
(4 Ans.) all of the above (5) None of these

21. In problem analysis, what is to be done?
(1) Structure information
(2 Ans.) Data flow diagram and data dictionary
(3) Structured analysis & prototyping
(4) All of the above
(5) None of these

22. Which of the following is a phase of RAD model?
(1) Business modeling
(2) Data modeling
(3) Application generation
(4 Ans.) All of the above (5) None of these

23. A comment
(1) is a note that can be put into the source code
(2) is ignored by the compiler
(3) starts with the/* character pair (4 Ans.) All of the above (5) None of the above

24. Which of the following is not relevant to networking
(1) low end stand along hubs
(2) stackable hubs
(3) meshnetwork
(4 Ans.) bus hubs
(5) None of these

25. In C++, a function contained within a class is called a-
(1) In built function
(2) User defined function
(3 Ans.) Member function
(4) All of these
(5) None of these

26. A template can be used to create a family of-
(1) Classes
(2) Functions
(3 Ans.) Class and function
(4) All of these
(5) None of these

27. Context free grammar is
(1) A compiler
(2 Ans.) A language generator
(3) A regular expression
(4) All of these
(5) None of these

28. Chaining and Indexing are the starategies of
(1) Contiguous allocation
(2 Ans.) Non-contiguous allocation
(3) Partition allocation
(4) None of these
(5) Static allocation

29. The POST is a series of......... tests.
(1 Ans.) 14
(2) 13
(3) 12
(4) 11
(5) None of these

30. A path in graph G, which contains every vertex of G once and only once?
(1) Eular tour
(2 Ans.) Hamiltonian path
(3) None of these
(4) Eular trail
(5) Hamailtonian tour

31. A tree structured file directory system:
(1 Ans.) allows easy storage and retrieval of file names
(2) is a much debated unnecessary feature
(3) is not essential when we have millions of files
(4) All of the above
(5) None of these

32. The scope resolution operater usually
(1 Ans.) Specifies a particular class
(2) one base class and more than one derived class
(3) resolve ambiguities
(4) All of the above (5) None of these

33. ‘Person’ is
(1) Object
(2 Ans.) Class
(3) Attribute
(4) Structure
(5) None of these

34. Zero has two representations in
(1) 1’s complement
(2 Ans.) sign magnitude
(3) 2'scomplement
(4) All of the above (5) None of these

35. Which are. not property of Binary relations
(1) reflexive relation, symmetric relation, anti symmetrical relation
(2) reflexive, transitive, equivalence relations
(3) transitive, partial ordering relation, symmetric
(4 Ans.) reflexive, partial, chain relation
(5) None of these

36. Which of the following are loaded into main memory when the computer is booted?
(1 Ans.) Internal Command instructions (2) External Command Instructions
(3) Utility programs
(4) Word Processing Instruction
(5) None of these

37. A relation is said to be in INF if:
(1) there is no duplication of data
(2 Ans.) there are no composite attributes in the relation
(3) there are only a few composite attributes
(4) all attributes are of uniform type
(5) None of these

38. Which is false
(1) QBE is based on domain relational calculus.
(2) QUEL is based on tuple relational calculus.
(3) Datalog is based on logical programming language
(4 Ans.) All of the above
(5) None of these

39. The number of flip-flops required in a modulo N counter is
(1) log2(N)+l
(2) Ilog2(N)]
(3 Ans.) [log2(N)l
(4)log2(N-l)
(5) None of these

40. A linker is given object modules for a set of programs that were compiled separately. What
information need not be included in the object module?
(1) Object module
(2) Relocation bits
(3) names and locations of all external symbols defined in the object module
(4 Ans.) Absoulte address of internal symbols
(5) None of these

41. Clipping
(1) It identifies those portion of a picture that are either inside or outside of specified region of
space is referred to as clipping algorithm
(2) There are five types of clipping
(3) Point clipping, Line clipping, Area clipping, Curve clipping Text clipping are examples of
clipping
(4 Ans.) All of the above
(5) None of these

42. In operand
(1) data to be operated
(2) Operand include 8 bit 16 bit data an internal resigters, a memory location
(3) It include also 8 bit or 16 bit address
(4 Ans.) All of the above (5) None of these

43. The PPP frame consists of .............. fields.
(1 Ans.) 7
(2) 5
(3) 6
(4) 8
(5) None of these

44. The ‘end’ manipulator?
(1) appends null character to the stream and flushes it.
(2) causes the next output to be on new line
(3 Ans.) just flushes the stream
(4) All of the above (5) None of these

45. The minimum number of inter chnges needed to convert the array
89, 19, 40, 17, 12, 10, 2, 5, 7, 11,6, 9,70 into heap with maximum element at the root is
(1) 0
(2) 1
(3 Ans.) 2
(4) 3
(5) None of these

46. Which of the following does not form part of an ATM ?
(1) Processor, Card Reader and Printer
(2) Customer Interface. Panel
(3 Ans.) Key Board
(4) Dispenser and Depositor
(5) All of the above.

47. An important application of cryptography, used in computerized commercial and financial
transaction-
(1) Data mining (2) Data warehousing
(3 Ans.) Digital signature
(5) None of these
(4) Media convergence

48. White Box testing, a software testing technique is sometimes called-
(1) Basis path
(2) Graph testing (3) Data flow
(4 Ans.) Glass box testing
(5) None of these

49. Which normal form is considered adequate for normal relational database design?
(1) 5NF
(2) 4NF
(3 Ans.) 3NF
(4) None of these
(5) 2NF

50. In a circular linked list, insertion of a record involves modification of
(1) One pointer
(2 Ans.) two pointer
(3) Multiple pointer
(4) no pointer
(5) None of these


No comments:

Post a Comment

Oracle Reserved Words

Oracle  Reserved Words The following words are reserved by Oracle. That is, they have a special meaning to Oracle and so cannot be redefi...