Go Back   StudyChaCha 2024 2025 > StudyChaCha Discussion Forum > General Topics

  #1  
Old May 30th, 2014, 09:27 AM
Unregistered
Guest
 
Default Central Bank of India IT officer previous year question papers

Will you please give me the Central Bank of India IT officer previous year question papers as I want to give this exam?
Reply With Quote
Other Discussions related to this topic
Thread
Previous year question papers of exam of BDO officer
State Bank Of India Previous Year Question Papers For Clerical Exam
Union Bank Of India Previous Year Question Papers
State Bank Of India Clerical Exam Previous Year Question Papers
Central Bank Of India Specialist Officer Previous Year Question Paper
State Bank of India Previous Year Question Papers for PO
Previous year question papers of Union Bank of India of Probationary Officers exam
State Bank of India clerk exam previous year question papers
Reserve Bank of India grade B officer exam previous year question papers
Union Bank of India Previous year question papers
Reserve Bank of India Grade B officer previous year question papers
Question papers for IT officer of central bank of India
Previous year question papers of India Insurance Administrative Officer
Past years question papers of Central Bank of India IT officer
Previous year question papers of exam of Assistant Central Intelligence Officer/Grade
Central Bank of India IT officer solved question papers
Central Bank Of India Question Papers For IT Officer
Central Bureau of Investigation IT officer question papers of previous years
Central bank of India Agriculture Officer Question Papers
LIC Development Officer Previous Year Question Papers






  #2  
Old May 30th, 2014, 02:43 PM
Sashwat's Avatar
Super Moderator
 
Join Date: Jun 2011
Default Re: Central Bank of India IT officer previous year question papers

As you want to get the Central Bank of India IT officer previous year question papers so here is the information of the same for you:

The output of the following program
main( )
{ int a[ ] = { 2,3,4,6,5};
int *p = a;
for (int i = 0; i < 5; i++)
printf(“%d,”,++*p);
}
is
(A) 3, 4, 5, 6, 7
(B) 3, 4, 5, 7, 6
(C) 3, 4, 6, 5, 0
(D) 3, 4, 5, 6, 6

The program
main( )
{ int a = 256, *p=&a;
printf(“%d”,*p>>5);
}
prints
(A) 2
(B) 4
(C) 6
(D) 8

A computer program that converts an entire program into machine language at one time is called a/an

(A) interpreter (B) simulator
(C) compiler (D) commander

All the keys on the IBM PC key board repeat as long as we hold them down. Such type of keys are known as

(A) typematic keys
(B) functional keys
(C) automatic keys
(D) alphabetic keys

The output of the following program
main( )
{
int a[ ] = “computation”;
char *p = a, b=’ ‘;
for (int i = 1; i < 12; i++)
if(i%4) continue;
else a[i]=b;
puts(p);
}
is
(A) comp
(B) comp tat on
(C) com utat on
(D) comp tati n

What does the acronym ISDN stands for

(A) Indian Standard Digital Network
(B) Integrated Services Digital Network
(C) Intelligent Service Digital Network
(D) Integrated Services Data Network

Two basic types of operating system are

(A) sequential and direct
(B) batch and time sharing
(C) direct and interactive
(D) batch and interactive

Which of the following entity does not belong to word processing

(A) characters (B) words
(C) cells (D) paragraphs

The natural mask for class C IP address is _______ .
(A) 255.255.255.0 (B) 255.255.0.0
(C) 255.0.0.0 (D) 255.255.255.255

In C++, if a catch statement is written to catch exception objects of a base class type, it
can also catch all ______ derived from that base class.
(A) Exceptions for objects (B) Objects of classes
(C) Arguments (D) Errors

A schema describes

(A) data elements
(B) records and filer
(C) record relationship
(D) all of the above

Which of the following is not a tool used to manage and control schedule performance

(A) CAD (B) PERT
(C) CPM (D) Gantt Chart

An expert system differs from a data base program in that only an expert system

(A) contains declarative knowledge
(B) contains procedural knowledge
(C) features the retrieval of stored information
(D) experts users to draw own conclusion

The virtual memory addressing capability of 80386 is

(A) 4 GB (B) 16 GB
(C) 64 GB (D) 64 TB

The 80486 microprocessor from Intel consists of

(A) a fast 32 bit CPU but no coprocessor
(B) a 32 bit CPU and an 80387 coprocessor only
(C) a 32 bit CPU, a 80387 coprocessor and memory management unit (MMU) only
(D) a 32 bit CPU, a 80387 coprocessor, memory management unit and a cache memory

Which of the following file transfer protocols use TCP and establishes two virtual circuits between the local
and remote server ?
(A) FTP
(B) TFTP
(C) TELNET
(D) NFS

Frequency shift keying is used mostly in
(A) Radio transmission
(B) Telegraphy
(C) Telephone
(D) None of the above

The baud rate is
(A) always equal to the bit transfer
rate
(B) equal to twice the bandwidth
of an ideal channel
(C) not equal to the signalling rate
(D) equal to half of the bandwidth
of an ideal channel

Object code is the output of ______.
(A) Operating System
(B) Compiler or Assembler
(C) only Assembler
(D) only Compiler

‘Macro’ in an assembly level
program is _______.
(A) sub program
(B) a complete program
(C) a hardware portion
(D) relative coding

Advantage of synchronous sequential circuits over
asynchronous ones is

(A) faster operation
(B) ease of avoiding problems due to hazard
(C) lower hardware requirement
(D) better noise immunity

What is the transitive voltage for the voltage input of a CMOS operating from 10V supply ?
(A) 1V (B) 2V
(C) 5V (D) 10 V

What is decimal equivalent of BCD 11011.1100 ?
(A) 22.0 (B) 22.2
(C) 20.2 (D) 21.2

What will be the output of the following c-code ?
void main ( )
{
char *P = “ayqm” ;
char c;
c = ++*p ;
printf (“%c”, c);
}

(A) a (B) c
(C) b (D) q

The data type created by the data
abstraction process is called
(A) class
(B) structure
(C) abstract data type
(D) user defined data type

An entity instance is a single
occurrence of an _______.
(A) entity type
(B) relationship type
(C) entity and relationship type
(D) None of these

Grammar of the programming is checked at ________ phase of
compiler.

(A) semantic analysis
(B) code generation
(C) syntax analysis
(D) code optimization

WINDOWS is a _________ operating.
(A) Real time
(B) Multi-user
(C) Preemptive
(D) Non-preemptive

Generalization is _______ process.
(A) top-down
(B) bottom up
(C) both (A) & (B)
(D) None of these

Which data management language component enabled the DBA to define the schema components ?
(A) DML
(B) Sub-schema DLL
(C) Schema DLL
(D) All of these

The ______ field is the SNMP PDV reports an error in a response
message.
(A) error index
(B) error status
(C) set request
(D) agent index

End-to-End connectivity is provided from Last-to-Last in
(A) Network layer
(B) Session layer
(C) Transport layer
(D) Data link layer

Page making process from main
memory to disk is called
(A) Interruption
(B) Termination
(C) Swapping
(D) None of the above

A Dead-lock in an Operating System
is
(A) Desirable process
(B) Undesirable process
(C) Definite waiting process
(D) All of the above

The dynamic allocation of storage
areas with VSAM files is
accomplished by
(A) Hashing
(B) Control splits
(C) Overflow areas
(D) Relative recoding

Which of the following is the most general phase structured grammar ?
(A) Regular
(B) Context-sensitive
(C) Context free
(D) None of the above

What is the maximum operating rate of a wireless LAN using infrared
communication ?
(A) 1 mbps (B) 2 mbps
(C) 5 mbps (D) 11mbps

What services does the internet layer provide ?
1. Quality of service
2. Routing
3. Addressing
4. Connection oriented delivery
5. Framing bits
(A) 1, 2, 3 (B) 2, 3, 4
(C) 1, 3, 4, 5 (D) 2, 3, 4, 5

The cost of the network is usually determined by
(A) time complexity
(B) switching complexity
(C) circuit complexity
(D) none of these

A binary tree with 27 nodes has
_______ null branches.
(A) 54
(B) 27
(C) 26
(D) None of the above

Which of the following is an optimistic concurrency control
method ?
(A) Validation based
(B) Time stamp ordering
(C) Lock-based
(D) None of these

The time complexity to build a heap of n elements is
(A) 0(1)
(B) 0(lgn)
(C) 0(n)
(D) 0(nlgn)

Linear probing suffers from a problem known as
(A) Secondary clustering
(B) Primary clustering
(C) Both (A) and (B)
(D) None of these

Contact Details:
Central Bank of India
Lodi Estate,
Chanakyapuri,
New Delhi,
Delhi
Haryana 110001 ‎
1800 200 1911 ‎
India

Map Location:
__________________
Answered By StudyChaCha Member
Reply With Quote
  #3  
Old October 22nd, 2015, 10:09 AM
Unregistered
Guest
 
Default Re: Central Bank of India IT officer previous year question papers

Hello sir I am Atul, can you please provide me Previous Year Question Paper of IT Officer of Central Bank of India???
Reply With Quote
  #4  
Old October 22nd, 2015, 10:09 AM
Super Moderator
 
Join Date: Dec 2012
Default Re: Central Bank of India IT officer previous year question papers

Here as per your demand I am providing you Question Paper of IT Officer of Central Bank of India
A special type gateway that can keep external users from accessing resources on the LAN users access the external info is called:
Repeater
Firewall
Encryption
Hub
None of these
What is the name given to the exchange of control signals which is necessary for establishing a connection between a modem and a computer at one end of a line and another modem and computer at the other end?
Handshaking
Modem options
Protocol
All of these
None of these
In SQL, which command is used to changes data in a data table?
UPDATE
INSERT
BROWSE
APPEND
None of these
In SQL, which of the following is not a data definition language command?
RENAME
REVOKE
GRANT
UPDATE
None of these
Which command(s) is (are) used to redefine a column of the table in SQL ?
ALTER TABLE
DEFINE TABLE
MODIFY TABLE
ALL of the these
None of these
In a relational schema, each tuple is divided into fields called
Relations
Domains
Queries
All of the these
None of these
An indexing operation
Sorts a file using a single key
Sorts file using two keys
Establishes an index for a file
Both (1) and (3)
None of these
Data security threats include
Hardware failure
Privacy invasion
Fraudulent manipulation of data
All of these
None of these
The language used in application programs to request data from the DBMS is referred to as the
DML
DDL
Query language
DCL
None of these
A ___ contains the smallest unit of meaningful data, so you might call it the basic building block for a data file.
File structures
Records
Fields
Database
None of these
A ___ means that one record in a particular record type is related to only one record of another record type.
One to one relationship
One to many relationship
Many toone relationship
Many to many relationship
None of these
Through linked list one can implement
Stack
Graph
Queue
All of these
None of these
A heap allows a very efficient implementation of a
Doubled ended queue
Priority queue
Stack
Trees
None of these
In files, there is a key associated with each record which is used to differentiate among different records. For every file there is at least one set of keys that is unique. Such a Key is called
Unique key
Prime attribute
Index key
Primary Key
Null key
____ is primarily used for mapping host names and email destinations to IP address but can also be used for other purposes.
TCP(transfer control protocol)
DNS(Domain Name System)
SHA (Secure Hash Algorithm)
Simple Network Management Protocol (SNMP)
None of these
Override is a method
For an operation that replaces an inherited method for the same operation
For a data that replaces an inherited method for the same operation
For an operation that takes arguments form library function
All of these
None of these
Local variables
Are created outside a block
Are known only to that block
Continue to exist when their block ends
Are illegal in C++
None of these
____ is virus that inserts itself into a system’s memory. Then it take number of actions when an infected file is executed.
Web scripting virus
Polymorphic virus
Macro virus
Boot sector virus
Resident virus
This ___ data mining technique derives rules from real world case examples.
Waterfall model
RAD
White Box
Spiral model
Case based reasoning
The ___ remains operative until the software is required.
Waterfall model
Incremental model
Spiral model
Prototyping model
Incremental model
Data mining evolve as a mechanism to cater the limitations of ___ systems to deal massive data sets with high dimensionality, new data type, multiple heterogeneous data resource etc.
OLTP
OLAP
DSS
DWH
None of these
An important application of cryptography, used in computerized commercial and financial transaction
Data mining
Data warehousing
Digital signature
Media convergence
None of these
Rows of a relation are called:
Relation
Tuples
Data structure
An entity
None of these
The drawbacks of the binary tree sort are remedied by the
Linear sort
Quick Sort
Heap Sort
Insertion Sort
None of these
Which layer of OSI determines the interface of the system with the user?
Network
Application
Data link
Session
None of these

The tracks on a disk which can be accused without repositioning the R/W heads is
Surface
Cylinder
Cluster
All of these
None of these
Which of the following is true about GUIs?
They make computers easier to use for nonprofessionals
They use icons and menus that users can select with a mouse
Both (1) and (2)
All of the these
None of these
A computer system consisting of its processor, memory and I/O devices accepts data, processes it and produces the output results .Can you tell in which component is the raw data fed?
Mass Memory
Main Memory
Logic Unit
Arithmetic unit
None of these
The mechanical diskette drive in which you insert your diskette is connected to the computer’s—bus
Data
Communication
Address
Parallel
None of these
A set of programs that handle firm’s database responsibilities is called a
Data base Management System (DBMS)
Data Base Processing System (DBPS)
Data Management System (DMS)
All of these
None of these
You are in the process of analyzing a problem that requires you to collect and store TCP/ IP Packets. Which of the following utilities is best suited for this purpose?
NBTSTAT
Performance Monitor
NETSTAT
Network Monitor
DHCP Management Console
A top to bottom relationship among the items in a database is established by a
Hierarchical Schema
Network Schema
Relational Schema
All of the above
None of these
The process of transferring data intended for a peripheral device into a disk (or intermediate store) so that it can be transferred to peripheral at a more convenient time or in bulk is known as
Multiprogramming
Spooling
Caching
Virtual programming
None of these
Which of the following system program forgoes the production of object code to generate absolute machine code and load it into the physical main storage location from which it will be executed immediately upon completion of the assembly?
Two pass assembler
Load and go assembler
Macro processor
Compiler
None of these
Relocation bits used by relocating loader are specifically (generated) by:
Relocating loader itself
Linker
Assembler or translator
Macro processor
None of these
From what location are the 1st computer instructions available on boot up ?
ROM BIOS
CPU
Boot.ini
CONFIG.SYS
None of these
Abstraction is
The act of representing the essential features of something without including much detail.
The act of representing the features of something much detail
A tree structure
All of these
None of these
Aggregation is a special for of
Generalization
Specialization
Association
Object
None of these
Consider an operation of addition. For two numbers, the operating will generate a sum. If the operand are strings, and the same operation would produce a third string by concatenation. This features is called ____.
Inheritance
Encapsulation
Polymorphism
Binding
None of these
In ER diagrams, the term cardinality is a synonym for the term—
Attribute
Degree
Entities
Cartesian
None of these
An oracle server index—
Is a schema object
Is used to speed up the retrieval of rows by using a pointer
Is independent of the table it indexes
All of these
None of these
Which of the following is not a context free grammar components?
Terminal symbols
Nonterminal symbol
Production line
List
None of these
Which of the following is a phase of RAD model?
Business modeling
Data modeling
Application generation
All of the above
None of these
____ is a set design steps that allows a DFD with transform flow characteristics to be mapped into a predefined template for program structure.
Transaction flow
Contributor
Transform mapping
Design evaluation
None of these
A combinational logic circuit which is used to send data coming from a single source to two or more separate destinations is called as
Decoder
Encoder
Multiplexer
Demultiplexer
None of these
Which of the following is a universal gate?
AND
OR
EXOR
NAND
None of these
The two’s compliment of binary number 010111.1100 is
101001.1100
101000.0100
010111.0011
101000.0011
None of these
In 8086 the overflow flag is set when
The sum is more than 16 bits
Signed numbers go out their range after an arithmetic operation
Carry and sign flags are set
During subtraction
None of these
What does microprocessor speed depends on?
Clock
Data bus width
Address bus width
All of these
None of these
The TRAP is one of the interrupts available its INTEL 8085. Which one statement is true of TRAP?
It is level triggered
It is negative edge triggered It is positive edge triggered
It is positive edge triggered
It is both positive edge triggered and level triggered
None of these
__________________
Answered By StudyChaCha Member
Reply With Quote
Reply




All times are GMT +6. The time now is 01:30 PM.


Powered by vBulletin® Version 3.8.11
Copyright ©2000 - 2024, vBulletin Solutions Inc.
Search Engine Friendly URLs by vBSEO 3.6.0 PL2

1 2 3 4 5 6 7 8