IBPS Specialist Officer Solved Question Paper - 2018-2019 StudyChaCha

Go Back   2018-2019 StudyChaCha > StudyChaCha Discussion Forum > General Topics

Old January 12th, 2017, 11:30 AM
Posts: n/a
Default IBPS Specialist Officer Solved Question Paper

Can you please get the IBPS Specialist IT Officer exam paper, so that I can prepare hard?
Reply With Quote Quick reply to this message
Old January 12th, 2017, 12:42 PM
Educhamp's Avatar
Super Moderator
Join Date: May 2011
Location: Delhi
Posts: 38,280
Default Re: IBPS Specialist Officer Solved Question Paper

I will get the IBPS Specialist IT Officer exam paper, so that it could be easy for you to prepare hard.

Here is the exam paper

1. Which of the following IEEE standards are deals with LAN and MAN(metropolitan area network) ?
(a) 801
(b) 803
(d) 800

2.What is the use of Firewalls?
(a) protect against unauthorized attacks
(b) against fire attacks
(c) against virus attack
(d) against data driven attacks

3. Which of the following is not related to computer ?
(a) mouse
(c) bit
(d) pen

4. During cutting and pasting,the item cut is temporarily stored in:
(a) hard drive
(b) clipboard
(d) diskette

5. A set of programs that handle firm's database responsibilities is called a

(A) Data Base Management System (DBMS)

(B) Data Base Processing System (DBPS)
(B) Data Base Processing System (DBPS)

(C) Data Management System (DMS)

(D) All of these

(E) None of these

6. You are in the process of analyzing a problem that requires you to collect and store TCP/IP Packets.

Which of the following utilities is best suited for this purpose?


(B) Performance Monitor


(D) Network Monitor

(E) DHCP Management Console

7. A top to bottom relationship among the items in a database is established by a

(A) Hierarchical Schema

(B) Network Schema

(C) Relational Schema

(D) All of the above

(E) None of these

8. The process of transferring data intended for a peripheral device into a disk (or intermediate store)

so that it can be transferred to peripheral at a more convenient time or in bulk is known as

(A) Multiprogramming

(B) Spooling

(C) Caching

(D) Virtual programming

(E) None of these

9. Which of the following system program forgoes the production of object code to generate absolute

machine code and load it into the physical main storage location from which it will be executed im-
mediately upon completion of the assembly?

(A) Two pass assembler

(B) Load-and-go assembler

(C) Macro processor

(D) Compiler

(E) None of these

10. Relocation bits used by relocating loader are specified (generated) by

Page 2 of 10 Page 2 of 11 www.exampundit.in www.exampundit.in

(A) Relocating loader itself

(B) Linker

(C) Assembler or translator

(D) Macro processor

(E) None of these

11. From what location are the 1st computer instructions available on boot up ?



(C) Boot.ini


(E) None of these

12. Abstraction is_

(A) The act of representing the essential features of some-
thing without including much detail.

(B) The act of representing the features of something much detail

(C) A tree structure

(D) All of these

(E) None of these

13. Aggregation is a special form of

(A) Generalization

(B) Specialization

(C) Association

(D) Object

(E) None of these

14. Consider an operation of addition. For two numbers, the operating will generate a sum. If the

operand are strings, and the same operation would produce a third string by concatenation. This

features is called_ .

(A) Inheritance

(B) Encapsulation

(C) Polymorphism

(D) Binding

(E) None of these

15. In E-R diagrams , the term cardinality is a synonym for the term __________

(A) Attribute (B) Degree (C) Entities (D) Cartesian (E) None of these

16. An oracle server index—

(A) is a schema object

(B) is used to speed up the retrieval of rows by using a pointer

(C) is independent of the table it indexes

(D) All of these

(E) None of these

17. Which of the following is not a context free grammar components?

(A) Terminal symbols

(B) Non-terminal symbol

(C) Production line

(D) List

(E) None of these

18. Which of the following is a phase of RAD model?

(A) Business modeling

(B) Data modeling

(C) Application generation

(D) All of the above

(E) None of these

19.__________is a set design steps that allows a DFD with transform flow characteristics to be

mapped into a predefined template for program structure.

(A) Transaction flow

(B) Contributor

(C) Transform mapping

(D) Design evaluation

(E) None of these

20. A combinational logic circuit which is used to send data coming from a single source to two or

more separate destinations is called as

(A) Decoder

(B) Encoder

(C) Multiplexer

(D) Demultiplexer

(E) None of these

21. Which of the following is a universal gate?

(A) AND (B) OR (C) EX-OR (D) NAND (E) None of these

22. The two's compliment of binary number 010111.1100 is

(A) 101001.1100

(B) 101000.0100

(C) 010111.0011

(D) 101000.0011

(E) None of these

23. In 8086 the overflow flag is set when

(A) the sum is more than 16 bits

(B) aigned numbers go out their range after an arithmetic operation

(C) carry and sign flags are set

(D) during subtraction

(E) None of these

24. What does microprocessor speed depends on?

(A) Clock

(B) Data bus width

(C) Address bus width

(D) All of these

(E) None of these

25. The TRAP is one of the interrupts available its INTEL 8085 Which one statement is true of TRAP?

(A) It is level triggered

(B) It is negative edge triggered

(C) It is positive edge triggered

(D) It is both positive edge triggered and level triggered

(E) None of these

26. A special type gateway that can keep external users from accessing resources on the LAN users

access the external info is called_.

(A) Repeater

(B) Firewall

(C) Encryption

(D) Hub

(E) None of these

27. What is the name given to the exchange of control signals which is necessary for establishing a

connection between a modem and a computer at one end of a line and another modem ,and

computer at the other end?

(A) Handshaking

(B) Modem options

(C) Protocol

(D) All of these

(E) None of these

28. In SQL, which command is used to changes data in a data table?

(A) UPDATE (B) INSERT (C) BROWSE (D) APPEND (E) None of these

29. In SQL, which of the following is not a data definition language command?

(A) RENAME (B) REVOKE (C) GRANT (D) UPDATE (E) None of these

30. Which command(s) is / are used to redefine a column of the table in SQL ?




(D) ALL of the these

(E) None of these

31. In a relational schema, each tuple is divided into fields called

(A) Relations

(B) Domains

(C) Queries

(D) All of the these

(E) None of these

32. An indexing operation

(A) Sorts a file using a single key

(B) Sorts file using two keys

(C) Establishes an index for a file

(D) Both (A) and (C)

(E) None of these

33. Data security threats include

(A) Hardware failure

(B) Privacy invasion

(C) Fraudulent manipulation of data

(D) All of these

(E) None of these

34. The language used in application programs to request data from the DBMS is referred to as the



(C) Query language


(E) None of these

35. A___________contains the smallest unit of meaningful data, so you might call it the basic

building block for a data file.

(A) File structures

(B) Records

(C) Fields

(D) Database

(E) None of these

36. A_means that one record in a particular record type is related to only one record of another

record type.

(A) One-to-one relationship

(B) One-to-many relationship

(C) Many-to-one relationship

(D) Many-to-many relationship

(E) None of these

37. Through linked list one can implement—

(A) Stack

(B) Graph

(C) Queue

(D) All of these

(E) None of these

38. A heap allows a very efficient implementation of a—

(A) Doubled ended queue

(B) Priority queue

(C) Stack

(D) Trees

(E) None of these

39. In files, there is a key associated with each record which is used to differentiate among different

records. For every file there is at least one set of keys that is unique. Such a Key is called—

(A) Unique key

(B) Prime attribute

(C) Index key

(D) Primary Key

(E) Null key

40. _______is primarily used for mapping host names and e-mail destinations to TP address but can

also be used for other purposes.

(A) TCP(transfer control protocol)

(B) DNS(Domain Name System)

(C) SHA (Secure Hash Algorithm)

(D) Simple Network Management Protocol (SNMP)

(E) None of these

41. Override is a method___________

(A) for an operation that replaces an inherited method for the same operation

(B) for a data that replaces an inherited method for the same operation

(C) for an operation that takes arguments form library function

(D) All of these

(E) None of these

42. Local variables______________

(A) are created outside a block

(B) are known only to that block

(C) continue to exist when their block ends

(D) are illegal in C++

(E) None of these

43. _____________is virus that inserts itself

into a system's memory. Then it take number of actions when an infected file is executed.

(A) Web scripting virus

(B) Polymorphic virus

(C) Macro virus

(D) Boot sector virus

(E) Resident virus

44., This_______________data mining technique derives rules from real world case examples.

(A) Waterfall model


(C) White Box

(D) Spiral model

(E) Case based reasoning

45. The ______________ model remains operative until the software is required.

(A) Waterfall model

(B) Incremental model

(C) Spiral model

(D) Prototyping model

(E) Incremental model

46. Data mining evolve as a mechanism to cater the limitations of ________systems to deal massive

data sets with high dimensionality, new data type, multiple heterogeneous data resource etc.





(E) None of these

47. An important application of cryptography, used in computerized commercial and financial


(A) Data mining

(B) Data warehousing

(C) Digital signature

(D) Media convergence

(E) None of these

48. Rows of a relation are called:

(A) Relation

(B) Tuples

(C) Data structure

(D) An entity

(E) None of these

49. The drawbacks of the binary tree sort are remedied by the

(A) Linear sort

(B) Quick Sort

(C) Heap Sort

(D) Insertion Sort

(E) None of these

50. Which layer of OSI determines the interface of the system with the user?

(A) Network (B) Application (C) Data link (D) Session (E) None of these

For full information please check the file
Attached Files
File Type: pdf IBPS Specialist IT Officer exam paper.pdf (1.13 MB, 0 views)
Answered By StudyChaCha Member
Reply With Quote Quick reply to this message
Sponsored Links

Other Discussions related to this topic
Model question paper for IBPS Specialist Officer Exam
IBPS specialist officer law scale 1 solved question papers of last years
IBPS Specialist Officer Professional Knowledge Question Papers With Answers Pdf
Previous Year Question Paper Of Ibps Specialist Officer Hr
IBPS Specialist Officer Previous year Question Papers with Answers PDF
Paper Pattern for IBPS Specialist Officer Exam
Free Download IBPS Specialist Officer Question Papers
Central Bank of India Specialist Officer Solved Question Paper
Paper Of IBPS Specialist Officer
IBPS Specialist Officer Technical Question Paper Pdf
IBPS Specialist Officer Question Paper with Answer Key
Marketing Paper for IBPS Specialist Officer
IBPS Specialist Officer Exam Old Question Papers
Question papers for IBPS Specialist Officer Exam
IBPS Specialist officer previous question papers
Solved Papers IBPS Specialist Officer IT
IBPS Specialist IT Officer Previous Paper
IBPS Specialist officer Model question papers
IBPS IT Specialist Officer Exam Question Paper
IBPS HR specialist officer previous years question papers

Have a Facebook Account? Ask your Question Here


Reply to this Question / Ask Another Question
Your Name: Click here to log in


Forum Jump

All times are GMT +6.5. The time now is 01:59 PM.

Powered by vBulletin® Version 3.8.7
Copyright ©2000 - 2018, vBulletin Solutions, Inc.
Search Engine Friendly URLs by vBSEO 3.6.0 PL2

1 2 3 4 5 6 7 8 9