#1
| |||
| |||
![]()
Will you please give me the Central Bank of India IT officer previous year question papers as I want to give this exam?
|
#2
| ||||
| ||||
![]()
As you want to get the Central Bank of India IT officer previous year question papers so here is the information of the same for you: The output of the following program main( ) { int a[ ] = { 2,3,4,6,5}; int *p = a; for (int i = 0; i < 5; i++) printf(“%d,”,++*p); } is (A) 3, 4, 5, 6, 7 (B) 3, 4, 5, 7, 6 (C) 3, 4, 6, 5, 0 (D) 3, 4, 5, 6, 6 The program main( ) { int a = 256, *p=&a; printf(“%d”,*p>>5); } prints (A) 2 (B) 4 (C) 6 (D) 8 A computer program that converts an entire program into machine language at one time is called a/an (A) interpreter (B) simulator (C) compiler (D) commander All the keys on the IBM PC key board repeat as long as we hold them down. Such type of keys are known as (A) typematic keys (B) functional keys (C) automatic keys (D) alphabetic keys The output of the following program main( ) { int a[ ] = “computation”; char *p = a, b=’ ‘; for (int i = 1; i < 12; i++) if(i%4) continue; else a[i]=b; puts(p); } is (A) comp (B) comp tat on (C) com utat on (D) comp tati n What does the acronym ISDN stands for (A) Indian Standard Digital Network (B) Integrated Services Digital Network (C) Intelligent Service Digital Network (D) Integrated Services Data Network Two basic types of operating system are (A) sequential and direct (B) batch and time sharing (C) direct and interactive (D) batch and interactive Which of the following entity does not belong to word processing (A) characters (B) words (C) cells (D) paragraphs The natural mask for class C IP address is _______ . (A) 255.255.255.0 (B) 255.255.0.0 (C) 255.0.0.0 (D) 255.255.255.255 In C++, if a catch statement is written to catch exception objects of a base class type, it can also catch all ______ derived from that base class. (A) Exceptions for objects (B) Objects of classes (C) Arguments (D) Errors A schema describes (A) data elements (B) records and filer (C) record relationship (D) all of the above Which of the following is not a tool used to manage and control schedule performance (A) CAD (B) PERT (C) CPM (D) Gantt Chart An expert system differs from a data base program in that only an expert system (A) contains declarative knowledge (B) contains procedural knowledge (C) features the retrieval of stored information (D) experts users to draw own conclusion The virtual memory addressing capability of 80386 is (A) 4 GB (B) 16 GB (C) 64 GB (D) 64 TB The 80486 microprocessor from Intel consists of (A) a fast 32 bit CPU but no coprocessor (B) a 32 bit CPU and an 80387 coprocessor only (C) a 32 bit CPU, a 80387 coprocessor and memory management unit (MMU) only (D) a 32 bit CPU, a 80387 coprocessor, memory management unit and a cache memory Which of the following file transfer protocols use TCP and establishes two virtual circuits between the local and remote server ? (A) FTP (B) TFTP (C) TELNET (D) NFS Frequency shift keying is used mostly in (A) Radio transmission (B) Telegraphy (C) Telephone (D) None of the above The baud rate is (A) always equal to the bit transfer rate (B) equal to twice the bandwidth of an ideal channel (C) not equal to the signalling rate (D) equal to half of the bandwidth of an ideal channel Object code is the output of ______. (A) Operating System (B) Compiler or Assembler (C) only Assembler (D) only Compiler ‘Macro’ in an assembly level program is _______. (A) sub program (B) a complete program (C) a hardware portion (D) relative coding Advantage of synchronous sequential circuits over asynchronous ones is (A) faster operation (B) ease of avoiding problems due to hazard (C) lower hardware requirement (D) better noise immunity What is the transitive voltage for the voltage input of a CMOS operating from 10V supply ? (A) 1V (B) 2V (C) 5V (D) 10 V What is decimal equivalent of BCD 11011.1100 ? (A) 22.0 (B) 22.2 (C) 20.2 (D) 21.2 What will be the output of the following c-code ? void main ( ) { char *P = “ayqm” ; char c; c = ++*p ; printf (“%c”, c); } (A) a (B) c (C) b (D) q The data type created by the data abstraction process is called (A) class (B) structure (C) abstract data type (D) user defined data type An entity instance is a single occurrence of an _______. (A) entity type (B) relationship type (C) entity and relationship type (D) None of these Grammar of the programming is checked at ________ phase of compiler. (A) semantic analysis (B) code generation (C) syntax analysis (D) code optimization WINDOWS is a _________ operating. (A) Real time (B) Multi-user (C) Preemptive (D) Non-preemptive Generalization is _______ process. (A) top-down (B) bottom up (C) both (A) & (B) (D) None of these Which data management language component enabled the DBA to define the schema components ? (A) DML (B) Sub-schema DLL (C) Schema DLL (D) All of these The ______ field is the SNMP PDV reports an error in a response message. (A) error index (B) error status (C) set request (D) agent index End-to-End connectivity is provided from Last-to-Last in (A) Network layer (B) Session layer (C) Transport layer (D) Data link layer Page making process from main memory to disk is called (A) Interruption (B) Termination (C) Swapping (D) None of the above A Dead-lock in an Operating System is (A) Desirable process (B) Undesirable process (C) Definite waiting process (D) All of the above The dynamic allocation of storage areas with VSAM files is accomplished by (A) Hashing (B) Control splits (C) Overflow areas (D) Relative recoding Which of the following is the most general phase structured grammar ? (A) Regular (B) Context-sensitive (C) Context free (D) None of the above What is the maximum operating rate of a wireless LAN using infrared communication ? (A) 1 mbps (B) 2 mbps (C) 5 mbps (D) 11mbps What services does the internet layer provide ? 1. Quality of service 2. Routing 3. Addressing 4. Connection oriented delivery 5. Framing bits (A) 1, 2, 3 (B) 2, 3, 4 (C) 1, 3, 4, 5 (D) 2, 3, 4, 5 The cost of the network is usually determined by (A) time complexity (B) switching complexity (C) circuit complexity (D) none of these A binary tree with 27 nodes has _______ null branches. (A) 54 (B) 27 (C) 26 (D) None of the above Which of the following is an optimistic concurrency control method ? (A) Validation based (B) Time stamp ordering (C) Lock-based (D) None of these The time complexity to build a heap of n elements is (A) 0(1) (B) 0(lgn) (C) 0(n) (D) 0(nlgn) Linear probing suffers from a problem known as (A) Secondary clustering (B) Primary clustering (C) Both (A) and (B) (D) None of these Contact Details: Central Bank of India Lodi Estate, Chanakyapuri, New Delhi, Delhi Haryana 110001 1800 200 1911 India Map Location:
__________________ Answered By StudyChaCha Member |
#4
| |||
| |||
![]()
Here as per your demand I am providing you Question Paper of IT Officer of Central Bank of India A special type gateway that can keep external users from accessing resources on the LAN users access the external info is called: Repeater Firewall Encryption Hub None of these What is the name given to the exchange of control signals which is necessary for establishing a connection between a modem and a computer at one end of a line and another modem and computer at the other end? Handshaking Modem options Protocol All of these None of these In SQL, which command is used to changes data in a data table? UPDATE INSERT BROWSE APPEND None of these In SQL, which of the following is not a data definition language command? RENAME REVOKE GRANT UPDATE None of these Which command(s) is (are) used to redefine a column of the table in SQL ? ALTER TABLE DEFINE TABLE MODIFY TABLE ALL of the these None of these In a relational schema, each tuple is divided into fields called Relations Domains Queries All of the these None of these An indexing operation Sorts a file using a single key Sorts file using two keys Establishes an index for a file Both (1) and (3) None of these Data security threats include Hardware failure Privacy invasion Fraudulent manipulation of data All of these None of these The language used in application programs to request data from the DBMS is referred to as the DML DDL Query language DCL None of these A ___ contains the smallest unit of meaningful data, so you might call it the basic building block for a data file. File structures Records Fields Database None of these A ___ means that one record in a particular record type is related to only one record of another record type. One to one relationship One to many relationship Many toone relationship Many to many relationship None of these Through linked list one can implement Stack Graph Queue All of these None of these A heap allows a very efficient implementation of a Doubled ended queue Priority queue Stack Trees None of these In files, there is a key associated with each record which is used to differentiate among different records. For every file there is at least one set of keys that is unique. Such a Key is called Unique key Prime attribute Index key Primary Key Null key ____ is primarily used for mapping host names and email destinations to IP address but can also be used for other purposes. TCP(transfer control protocol) DNS(Domain Name System) SHA (Secure Hash Algorithm) Simple Network Management Protocol (SNMP) None of these Override is a method For an operation that replaces an inherited method for the same operation For a data that replaces an inherited method for the same operation For an operation that takes arguments form library function All of these None of these Local variables Are created outside a block Are known only to that block Continue to exist when their block ends Are illegal in C++ None of these ____ is virus that inserts itself into a system’s memory. Then it take number of actions when an infected file is executed. Web scripting virus Polymorphic virus Macro virus Boot sector virus Resident virus This ___ data mining technique derives rules from real world case examples. Waterfall model RAD White Box Spiral model Case based reasoning The ___ remains operative until the software is required. Waterfall model Incremental model Spiral model Prototyping model Incremental model Data mining evolve as a mechanism to cater the limitations of ___ systems to deal massive data sets with high dimensionality, new data type, multiple heterogeneous data resource etc. OLTP OLAP DSS DWH None of these An important application of cryptography, used in computerized commercial and financial transaction Data mining Data warehousing Digital signature Media convergence None of these Rows of a relation are called: Relation Tuples Data structure An entity None of these The drawbacks of the binary tree sort are remedied by the Linear sort Quick Sort Heap Sort Insertion Sort None of these Which layer of OSI determines the interface of the system with the user? Network Application Data link Session None of these The tracks on a disk which can be accused without repositioning the R/W heads is Surface Cylinder Cluster All of these None of these Which of the following is true about GUIs? They make computers easier to use for nonprofessionals They use icons and menus that users can select with a mouse Both (1) and (2) All of the these None of these A computer system consisting of its processor, memory and I/O devices accepts data, processes it and produces the output results .Can you tell in which component is the raw data fed? Mass Memory Main Memory Logic Unit Arithmetic unit None of these The mechanical diskette drive in which you insert your diskette is connected to the computer’s—bus Data Communication Address Parallel None of these A set of programs that handle firm’s database responsibilities is called a Data base Management System (DBMS) Data Base Processing System (DBPS) Data Management System (DMS) All of these None of these You are in the process of analyzing a problem that requires you to collect and store TCP/ IP Packets. Which of the following utilities is best suited for this purpose? NBTSTAT Performance Monitor NETSTAT Network Monitor DHCP Management Console A top to bottom relationship among the items in a database is established by a Hierarchical Schema Network Schema Relational Schema All of the above None of these The process of transferring data intended for a peripheral device into a disk (or intermediate store) so that it can be transferred to peripheral at a more convenient time or in bulk is known as Multiprogramming Spooling Caching Virtual programming None of these Which of the following system program forgoes the production of object code to generate absolute machine code and load it into the physical main storage location from which it will be executed immediately upon completion of the assembly? Two pass assembler Load and go assembler Macro processor Compiler None of these Relocation bits used by relocating loader are specifically (generated) by: Relocating loader itself Linker Assembler or translator Macro processor None of these From what location are the 1st computer instructions available on boot up ? ROM BIOS CPU Boot.ini CONFIG.SYS None of these Abstraction is The act of representing the essential features of something without including much detail. The act of representing the features of something much detail A tree structure All of these None of these Aggregation is a special for of Generalization Specialization Association Object None of these Consider an operation of addition. For two numbers, the operating will generate a sum. If the operand are strings, and the same operation would produce a third string by concatenation. This features is called ____. Inheritance Encapsulation Polymorphism Binding None of these In ER diagrams, the term cardinality is a synonym for the term— Attribute Degree Entities Cartesian None of these An oracle server index— Is a schema object Is used to speed up the retrieval of rows by using a pointer Is independent of the table it indexes All of these None of these Which of the following is not a context free grammar components? Terminal symbols Nonterminal symbol Production line List None of these Which of the following is a phase of RAD model? Business modeling Data modeling Application generation All of the above None of these ____ is a set design steps that allows a DFD with transform flow characteristics to be mapped into a predefined template for program structure. Transaction flow Contributor Transform mapping Design evaluation None of these A combinational logic circuit which is used to send data coming from a single source to two or more separate destinations is called as Decoder Encoder Multiplexer Demultiplexer None of these Which of the following is a universal gate? AND OR EXOR NAND None of these The two’s compliment of binary number 010111.1100 is 101001.1100 101000.0100 010111.0011 101000.0011 None of these In 8086 the overflow flag is set when The sum is more than 16 bits Signed numbers go out their range after an arithmetic operation Carry and sign flags are set During subtraction None of these What does microprocessor speed depends on? Clock Data bus width Address bus width All of these None of these The TRAP is one of the interrupts available its INTEL 8085. Which one statement is true of TRAP? It is level triggered It is negative edge triggered It is positive edge triggered It is positive edge triggered It is both positive edge triggered and level triggered None of these
__________________ Answered By StudyChaCha Member |