IBPS SO_MODEL_01

13
BSC ACADEMY SINCE1993 Specialist Officer (IT Officer) Model Question 1 Given references to the following pages by a program 0,1,4,2,0,2,6,5,1,2,3,2,1,2,6,2,1,3,6,2 Number of page faults will occur, if the program has 3 page frames available to it and uses. What is optimal replacement? a) 7 b) 9 c) 11 d) 13 e) 15 Ans: b 2 The graph K (3, 4) is complete bipartite graph has a) 3 edges b) 4 edges c) 8 edges d) 10 edges e) 12 edges Ans e 3. The database schema is written in a) HLL b) DML c) DDL d) DCL e) None of these Ans C) 4. What is average waiting time in FCFS of given process p1, p2, p3, p4 if execution time 5, 10, 8, 3 and turnaround time are 5, 15, 23, 26 a) 10

description

About SO Exam to have a clear idea about IBPS so exam

Transcript of IBPS SO_MODEL_01

Page 1: IBPS SO_MODEL_01

BSC ACADEMY SINCE1993

Specialist Officer (IT Officer) Model Question

1 Given references to the following pages by a program

0,1,4,2,0,2,6,5,1,2,3,2,1,2,6,2,1,3,6,2

Number of page faults will occur, if the program has 3 page frames available to it and uses.

What is optimal replacement?

a) 7

b) 9

c) 11

d) 13

e) 15

Ans: b

2 The graph K (3, 4) is complete bipartite graph has

a) 3 edges

b) 4 edges

c) 8 edges

d) 10 edges

e) 12 edges

Ans e

3. The database schema is written in

a) HLL

b) DML

c) DDL

d) DCL

e) None of these

Ans – C)

4. What is average waiting time in FCFS of given process p1, p2, p3, p4 if execution time 5,

10, 8, 3 and turnaround time are 5, 15, 23, 26

a) 10

Page 2: IBPS SO_MODEL_01

BSC ACADEMY SINCE1993

b) 10.75

c) 12

d) 12.75

e) 13

Ans b

5. In an architecture of a database system external level is the

a) Physical level

b) Logical level

c) Conceptual level

d) View level

e) None of these

Ans d) view level

6. In a circular linked list

a) Components are all linked together in some sequential manner

b) There is no beginning and no end

c) Components are arranged hierarchically

d) Forward and backward transversal within the list is permitted

e) None of the above

Ans b

7. The statement in SQL which allows to change the definition of a table is

a) Alter

b) Update

c) Create

d) Select

e) None of these

Ans a )Alter

Page 3: IBPS SO_MODEL_01

BSC ACADEMY SINCE1993

8 . A technique for direct searching is

a) binary seache

b) linear search

c) Tree search

d) Hashing

e) None of these

Ans- d)

9. Maximum number of nodes in B-tree at depth h and order t ( root of depth 0)

a) t (h+1)

b) 2t (h-1)

c) t ( h-1)

d) 2t (h+1)

e) none of these

Ans – b)

10. which of the following can be sequence of nodes examined in a binary search tree while

searching for key 98?

a) 100, 50, 75, 60, 98

b) 100, 120, 90, 95, 98

c) 200, 70, 100, 95, 98

d) 75, 150, 90, 80, 98

e) None of these

Ans c

11. What protocol is used between E- mail servers?

a) FTP

b) SMTP

c) SNMP

d) POP3

e) None of these

Page 4: IBPS SO_MODEL_01

BSC ACADEMY SINCE1993

Ans- b) SMTP

12. The way a card game player arranges his cards as he picks them up one by one , is an

example of

a) Bubble sort

b) Selection sort

c) Insertion sort

d) Merge sort

e) None of above

Ans c

13. Which phase is not available in software life cycle?

a) Coding

b) Testing

c) Design

d) Abstraction

e) Maintenance

Ans- d)

14. Which type of error detection uses binary divasion?

a) Parity check

b) Longitudinal Redundancy checking ( LRC)

c) Checksum checking

d) Cyclic Redundancy Checking (CRC)

e) None of the above

Ans d

15. Basis path testing is

a) both Black and white box

b) White box testing method

c) Black box testing method

Page 5: IBPS SO_MODEL_01

BSC ACADEMY SINCE1993

d) unique testing

e) none of the above

ans b

16. If you wanted to tell the database management system that a specific attribute contained numbers only,

what would you need to set?

A)Data category B) Data type C) Data dictionary D) Data definition E) data Integrity

Ans:b

17. When you link one database table to another database table, what are you creating?

A) Primary link B) Connectivity C) Relationships D) Referential integrity E) foreign key

Ans: c

18. The process known as ----------- is used by large retailers to study trends.

a) Data mining

b) Data selection

c) POS

d) Data conversion

e) None of the above

Ans a

19 . Accessing records from a file directly without

searching from the beginning of the file is (a) Time sharing

(b) Random (c) Direct access

(d) Access time

(e) None of above

Ans: (c)

20. Banker’s algorithm for resource allocation deals with

(a) Dead look preventation

(b) Dead look avoidance

(c) Dead look recovery

Page 6: IBPS SO_MODEL_01

BSC ACADEMY SINCE1993

(e) Mutual exclusion

(f) None of these

Ans b

21. Which of the following performs modulation and demodulation ?

(a) Coaxial cable

(b) Satellite (c) Modem

(d) Optical fiber

(e) Router

Ans: (c)

22. In TCP/IP protocol check sum field contains ------------ bit value that use for --------------.

a) 32 bit, dead lock avoidance

b) 48 bit , error detection

c) 16 bit, error detection

d) 16 bit dead lock avoidance

e) None of these.

Ans c

23. Granting an outside organisation access to Internet web pages is often implemented using a (an)

(a) Extranet

(b) Intranet

(c) Internet

(d) Hacker

(e) None of these

ANS: (a)

24. The advantage of packet switching over message switching

a) The first packet of multipacket message can be forwarded before the second one has fully

arrived

b) reduce delay and improving throughput

c) not required advance setup

d) All of the above

e) None of the above

Page 7: IBPS SO_MODEL_01

BSC ACADEMY SINCE1993

Ans d

25. The Third generation computers were based upon

(a) transistors

(b) ICs

(c) valves

(d) chips

(e) none of the above

Ans : b

26. Generalization is _________ process.

a) Top-down

b) Bottom-up

c) Both(a) and (b)

d) vertical process

e) None of the above

Ans:- b)

27 Spooling is most beneficial in a multiprogramming environment where:

a) Most jobs are CPU-bound b) Most jobs are I/O –bound c) Jobs are evenly divided as I/O- bound and CPU- bound d) There is limited primary memory and need for secondary memory e) None of the above Ans c

*28. A Flip-flop can store

a) one bit of data

b) Two bits of data

c) Three bits of data

d) Any number of bits of data

e) All of above

Ans: a)

Page 8: IBPS SO_MODEL_01

BSC ACADEMY SINCE1993

29. ----------- command displays the contents of the file specified. a) $ mkdir b) $cp c ) $ Is-1 d) $ cat e) None of the above Ans d 30. Data warehouse environment architecture a) A data warehouse methodology, analysis design, construction and administration. b) The increasing processing power and sophistication of analytical tools and techniques have resulted in the development of data warehouses. c) Provide Storage, functionality, and responsiveness to queries beyond the capabilities of transaction- oriented databases. d) All of the above e) None of the above. Ans d

31. Altering of data so that it is not usable unless the changes are undone is ____.

(a) Biometrics

(b) Compression

(c) Encryption

(d) Ergonomics

(e) None of these

Ans c

*32. A __________’s main purpose is to prohibit unauthorized access to your computer via the Internet.

A) popup blocker B) firewall C) spyware blocker D) spam assassin E) None of the

above

Ans: b

33. When one computer provides services to another computer, the environment is a(n) _____ infrastructure.

A) Client/server

B) dependent

C) reliant

D) independent

e) None of the above

Ans: a

34. Object oriented programming relies on three basic concepts:

a) data abstraction, inheritance, and array

b) data abstraction, inheritance and polymorphism

c) I/O , Inheritance and polymorphism

Page 9: IBPS SO_MODEL_01

BSC ACADEMY SINCE1993

d) Inheritance, I/O, class

e) None of the above

Ans b

*35. A _______ can check the MAC addresses contained in the frame.

A) passive hub

B) repeater

C) bridge

D) router

E) All of above.

Ans: c

36. Each station on an Ethernet network has a unique _______ address imprinted on its network interface card

(NIC).

A) 5-byte

B) 32-bit

C) 48-bit

D) 64- bit

E) none of the above

Ans: c

37. Decryption and encryption of data are the responsibilities of the __________Layer?

a) Physical

b) Data link

c) Presentation

d) Application

e) Session

Ans: c)

38. The communication mode that supports data in both directions at the same time is

a) Simplex

b) Half duplex

c) Full duplex

Page 10: IBPS SO_MODEL_01

BSC ACADEMY SINCE1993

d) Multiplex

e) None of these

Ans: c

39. The function AVG, COUNT, MAX, and MIN

a) Supported only by SQL

b) Supported only by QBE

c) Supported both SQL and QBE

d) Supported by ORACLE

e) Supported by none

Ans: c

40. Multivalued dependency among attribute is checked at which level?

a) 2NF

b) 3NF

c) 4NF

d) 5NF

Ans: c

41. A full binary tree with n leaves contains

a) n nodes

b) log2n nodes

c) 2n-1 nodes

d) 2n nodes

e) None of the above

Ans: c) 2n-1 nodes.

42. The postfix form of a expression

(A+B)*(C*D-E)*F/G is

a) AB+CD*E-FG/**

b) AB+CD*E-F**G/

Page 11: IBPS SO_MODEL_01

BSC ACADEMY SINCE1993

c) AB+CD*E-*F*G/

d) AB+CDE*-*F*G/

Ans: a)

43 Slotted ALOHA a ) Divide time into discrete intervals b) Require global time synchronization c) Used for data transfer d) All of above e) None of above Ans a

44. What type of technology allows you to use your finger, eye, or voice print to secure your information

resources?

A) Haptics

B) Caves

C) Biometrics

D) RFID

E) None of the above

Ans: c) Biometrics

45. A _____ can be used as a connecting device between two internetworks that use different models.

A) repeater

B) bridge

C) router

D) gateway

E) hub

Ans: d) gateway

46. IP address classified into five classes A, B, C, D, E. what is address range of class B?

a) 0.0.0.0 to 126.255.255.255

b) 128.1.0.1 to 191.255.255.255

c) 244.0.0.0 to 239.255.255.255

d) 192.0.1.1 to 223. 255.255.255

Page 12: IBPS SO_MODEL_01

BSC ACADEMY SINCE1993

e) none of these

Ans: b

47. __________ uses thin coaxial cable.

A) 10Base5

B) 10Base2

C) 10Base-T

D) 10Base-F

E) None of these

Ans: b

48. Both Go-Back-N and Selective-Repeat Protocols use a _________.

A) sliding frame

B) sliding window

C) sliding packet

D) sliding data

E) None of the above.

Ans: b

49. which of the following TCP/IP protocol is used for remote terminal connection service ?

a) Telnet

b) RARP

c) FTP

d) None of the above

Ans a

50. RSA algorithm

a) Support Encryption and digital signature

b) Encrypt the checksum

c) Support Source authentication

Page 13: IBPS SO_MODEL_01

BSC ACADEMY SINCE1993

d) All of the above

e) None of the above

Ans a