Go Back   2023 2024 MBA > MBA > Online MBA Discussions

  #1  
Old 17th November 2015, 11:12 AM
Unregistered
Guest
 
Default Institute of Banking Personnel Selection Specialist Officer question papers pf previo

Hello sir I want to do preparation for IBPS specialist officer so here can you please provide mw its paper pattern along with its qus paper?
Reply With Quote Quick reply to this message
  #2  
Old 17th November 2015, 11:42 AM
Super Moderator
 
Join Date: May 2012
Default Re: Institute of Banking Personnel Selection Specialist Officer question papers pf pr

As per my knowledge Institute of Banking Personnel Selection (IBPS) is an organization, which recruits banking personnel for various posts in public sector banks


IBPS SO Online Examination Pattern
Logical Reasoning 50

General English 25

General Awareness 50

Professional Knowledge (Field Specific) 75

Total 200



Total time is given that is 120 min


Here I am giving paper of professional knowledge:-

• A special type gateway that can keep external users from accessing resources on the LAN users access the external info is called:
A. Repeater
B. Firewall
C. Encryption
D. Hub
E. None of these
• What is the name given to the exchange of control signals which is necessary for establishing a connection between a modem and a computer at one end of a line and another modem and computer at the other end?
A. Handshaking
B. Modem options
C. Protocol
D. All of these
E. None of these
• In SQL, which command is used to changes data in a data table?
A. UPDATE
B. INSERT
C. BROWSE
D. APPEND
E. None of these
• In SQL, which of the following is not a data definition language command?
A. RENAME
B. REVOKE
C. GRANT
D. UPDATE
E. None of these
• Which command(s) is (are) used to redefine a column of the table in SQL ?
A. ALTER TABLE
B. DEFINE TABLE
C. MODIFY TABLE
D. ALL of the these
E. None of these

Qus paper of professional knowledge

A special type gateway that can keep external users from accessing resources on the LAN users access the external info is called:
Repeater
Firewall
Encryption
Hub
None of these
What is the name given to the exchange of control signals which is necessary for establishing a connection between a modem and a computer at one end of a line and another modem and computer at the other end?
Handshaking
Modem options
Protocol
All of these
None of these
In SQL, which command is used to changes data in a data table?
UPDATE
INSERT
BROWSE
APPEND
None of these
In SQL, which of the following is not a data definition language command?
RENAME
REVOKE
GRANT
UPDATE
None of these
Which command(s) is (are) used to redefine a column of the table in SQL ?
ALTER TABLE
DEFINE TABLE
MODIFY TABLE
ALL of the these
None of these
In a relational schema, each tuple is divided into fields called
Relations
Domains
Queries
All of the these
None of these
An indexing operation
Sorts a file using a single key
Sorts file using two keys
Establishes an index for a file
Both (1) and (3)
None of these
Data security threats include
Hardware failure
Privacy invasion
Fraudulent manipulation of data
All of these
None of these
The language used in application programs to request data from the DBMS is referred to as the
DML
DDL
Query language
DCL
None of these
A ___ contains the smallest unit of meaningful data, so you might call it the basic building block for a data file.
File structures
Records
Fields
Database
None of these
A ___ means that one record in a particular record type is related to only one record of another record type.
One to one relationship
One to many relationship
Many toone relationship
Many to many relationship
None of these
Through linked list one can implement
Stack
Graph
Queue
All of these
None of these
A heap allows a very efficient implementation of a
Doubled ended queue
Priority queue
Stack
Trees
None of these
In files, there is a key associated with each record which is used to differentiate among different records. For every file there is at least one set of keys that is unique. Such a Key is called
Unique key
Prime attribute
Index key
Primary Key
Null key
____ is primarily used for mapping host names and email destinations to IP address but can also be used for other purposes.
TCP(transfer control protocol)
DNS(Domain Name System)
SHA (Secure Hash Algorithm)
Simple Network Management Protocol (SNMP)
None of these
Override is a method
For an operation that replaces an inherited method for the same operation
For a data that replaces an inherited method for the same operation
For an operation that takes arguments form library function
All of these
None of these
Local variables
Are created outside a block
Are known only to that block
Continue to exist when their block ends
Are illegal in C++
None of these
____ is virus that inserts itself into a system’s memory. Then it take number of actions when an infected file is executed.
Web scripting virus
Polymorphic virus
Macro virus
Boot sector virus
Resident virus
This ___ data mining technique derives rules from real world case examples.
Waterfall model
RAD
White Box
Spiral model
Case based reasoning
The ___ remains operative until the software is required.
Waterfall model
Incremental model
Spiral model
Prototyping model
Incremental model
Data mining evolve as a mechanism to cater the limitations of ___ systems to deal massive data sets with high dimensionality, new data type, multiple heterogeneous data resource etc.
OLTP
OLAP
DSS
DWH
None of these
An important application of cryptography, used in computerized commercial and financial transaction
Data mining
Data warehousing
Digital signature
Media convergence
None of these
Rows of a relation are called:
Relation
Tuples
Data structure
An entity
None of these
The drawbacks of the binary tree sort are remedied by the
Linear sort
Quick Sort
Heap Sort
Insertion Sort
None of these
Which layer of OSI determines the interface of the system with the user?
Network
Application
Data link
Session
None of these
Question 26-50
The tracks on a disk which can be accused without repositioning the R/W heads is
Surface
Cylinder
Cluster
All of these
None of these
Which of the following is true about GUIs?
They make computers easier to use for nonprofessionals
They use icons and menus that users can select with a mouse
Both (1) and (2)
All of the these
None of these
A computer system consisting of its processor, memory and I/O devices accepts data, processes it and produces the output results .Can you tell in which component is the raw data fed?
Mass Memory
Main Memory
Logic Unit
Arithmetic unit
None of these
The mechanical diskette drive in which you insert your diskette is connected to the computer’s—bus
Data
Communication
Address
Parallel
None of these
A set of programs that handle firm’s database responsibilities is called a
Data base Management System (DBMS)
Data Base Processing System (DBPS)
Data Management System (DMS)
All of these
None of these
You are in the process of analyzing a problem that requires you to collect and store TCP/ IP Packets. Which of the following utilities is best suited for this purpose?
NBTSTAT
Performance Monitor
NETSTAT
Network Monitor
DHCP Management Console
A top to bottom relationship among the items in a database is established by a
Hierarchical Schema
Network Schema
Relational Schema
All of the above
None of these
The process of transferring data intended for a peripheral device into a disk (or intermediate store) so that it can be transferred to peripheral at a more convenient time or in bulk is known as
Multiprogramming
Spooling
Caching
Virtual programming
None of these
Which of the following system program forgoes the production of object code to generate absolute machine code and load it into the physical main storage location from which it will be executed immediately upon completion of the assembly?
Two pass assembler
Load and go assembler
Macro processor
Compiler
None of these
Relocation bits used by relocating loader are specifically (generated) by:
Relocating loader itself
Linker
Assembler or translator
Macro processor
None of these
From what location are the 1st computer instructions available on boot up ?
ROM BIOS
CPU
Boot.ini
CONFIG.SYS
None of these
Abstraction is
The act of representing the essential features of something without including much detail.
The act of representing the features of something much detail
A tree structure
All of these
None of these
Aggregation is a special for of
Generalization
Specialization
Association
Object
None of these
Consider an operation of addition. For two numbers, the operating will generate a sum. If the operand are strings, and the same operation would produce a third string by concatenation. This features is called ____.
Inheritance
Encapsulation
Polymorphism
Binding
None of these
In ER diagrams, the term cardinality is a synonym for the term—
Attribute
Degree
Entities
Cartesian
None of these
An oracle server index—
Is a schema object
Is used to speed up the retrieval of rows by using a pointer
Is independent of the table it indexes
All of these
None of these
Which of the following is not a context free grammar components?
Terminal symbols
Nonterminal symbol
Production line
List
None of these
Which of the following is a phase of RAD model?
Business modeling
Data modeling
Application generation
All of the above
None of these
____ is a set design steps that allows a DFD with transform flow characteristics to be mapped into a predefined template for program structure.
Transaction flow
Contributor
Transform mapping
Design evaluation
None of these
A combinational logic circuit which is used to send data coming from a single source to two or more separate destinations is called as
Decoder
Encoder
Multiplexer
Demultiplexer
None of these
Which of the following is a universal gate?
AND
OR
EXOR
NAND
None of these
The two’s compliment of binary number 010111.1100 is
101001.1100
101000.0100
010111.0011
101000.0011
None of these
In 8086 the overflow flag is set when
The sum is more than 16 bits
Signed numbers go out their range after an arithmetic operation
Carry and sign flags are set
During subtraction
None of these
What does microprocessor speed depends on?
Clock
Data bus width
Address bus width
All of these
None of these
The TRAP is one of the interrupts available its INTEL 8085. Which one statement is true of TRAP?
It is level triggered
It is negative edge triggered It is positive edge triggered
It is positive edge triggered
It is both positive edge triggered and level triggered
None of these
IBPS Specialist IT Officer Previous Paper 2013
Question 1 to 25
Which of the following microprocessors is not 8bit microprocessor?
8085
6502
Z80
68000
None of these
Microprocessor 8085 is the enhanced version of which essentially the same construction set
6800
8080
6800A
8000
All of these
Which of the following interrupts has the lowest priority?
RST 5.5
RST 7.5
TRAP
INTR
None of these
The Data control language (DCL).
is used to manage user access to data bases
is used to manipulate the contents of a database in some form
Both (1) and (2)
Used for inserting, deleting and updating data in a database
None of these
A collection of fields is called a record with respect of DBMS, a record corresponds to
Tuple
Relation
File
Attribute
None of these.
Multiplexer means
One into many
Many into one
Many into many
All of these
None of these
Which gate is known as universal gate ?
NOT gate
NAND gate
AND gate
XOR gate
None of the above
Which of the following is the first integrated logic family?
TCL
T1L
DTL
MOS
RTL
A top to bottom relationship among the items in a database is established by a
Hierarchical schema
Network Schema
Relational Schema
Both (1) and (2)
Both (2) and (3)
In the relational schema, each tuple is divided into fields called.
Relations
Domains
Queries
Both (1) and (2)
Both (1) and (3)
The modify operation is likely to be done after.
Delete
Insert
Look up
All of the above
None of these
The way a particular application views the data from the database that the application uses is a :
Module
Relational model
Schema
Subschema
None of these
Which two files are used during operation of the DMBS?
Query language and utilities
Data manipulation language and query language:
Data dictionary and transaction log
Data dictionary and query language
None of these
Which normal form is considered adequate for relational database design?
2 NF
3 NF
4 NF
BCNF
None of these
An attribute of one matching the primary key another table, is called as
Foreign key
Secondary key
Candidate key
Composite key
None of these
Which of the following SQL commands can be used modify existing data in a database table?
MODIFY
UPDATE
CHANGE
NEW
None of these
Each node in a linked list must contain at least:
Three fields
Five fields
Four fields
One fields
Two fields
The average number of key comparisons done in a successful sequential search in a list of length “n” is
Log n
(n-1)/2
n/2
(n+1)/2
None of these
The order of the binary search algorithm is
n
n2
nlog(n)
log(n)
None of these
Which of the following is useful in implementing quick sort?
Stack
Set
List
Queue
None of these
OSI model consists of ____ layers
Three
Five
Six
Eight
Seven
Which data communication method is used to transmit the data over a serial communication link.
Simplex
Full duplex
Half duplex
Both (1) and (2)
Both (2) and (3)
Encryption and decryption are functions of the ____ layer.
Transport
Session
Application
Physical
Presentation
Which of the following is not a connecting device?
Bridge
Trans receiver
Router
Repeater
None of these
Repeaters function in the ___ layer
Physical
Data link
Network
Both (1) and (2)
None of these
Question 26-50
How many hosts are attached to each of the local area network at your site?
128
256
254
64
None of these
Which of the following types of software should we use if we often need to create, edit and print documents?
Word processing
Spread sheet
Object program
UNIX
None of these
Thrashing
Can always be avoided by swapping
Is a natural consequence of virtual memory system Always occurs on large computers
Can be caused by poor paging algorithms
None of these
_____ is present in spiral model
Code generator
Risk analysis
Code optimizer
Reengineering
None of these
The approach used in top down analysis and design is :
To identify the top level functions by combining many smaller components into a single entity
To identify a top level function and then create hierarchy of lower level modules and components
To prepare flowcharts after programming has been completed
All of these
None of these
B2C ecommerce focuses on customer ___.
Respond to customer
Obtain customer feedback
Establish buyerseller transaction
All of the above
None of these
OLAP stands for
Online Analytical project
Online Analytical problem
Online Application process
Online Application Problem
Online Analytical processing
Data mining is
Storing data when in need
Automatic extraction of patters of information
Searching data on Internet
All of these
None of these
Decision support system are based on ____ analysis
Query and reporting
Data mining
OLAP
All of the above
None of these
The term push and pop is related to the
Array
Lists
Stacks
All of the above
None of these
The break statement causes an exit.
From the innermost loop only
Only from the innermost switch
From the loops and switches
From the innermost loop or switch
None of these
Backup procedure helps in
Restoring the operation whenever there is a disk failure
Restoring both application and system software whenever there is disk corruption
Restoring the data sites whenever there is a system crash
All of the above
None of these
Software testing is
The process of demonstrating that error are not present
One process of establishing confidence that a program does what it is supposed to do
The process of executing a program to show that it is working as per specifications
The process of executing a program with the intent of finding errors
None of these
Regression testing in primarily related to
Functional testing
Data flow testing
Development testing
Maintenance testing
None of these
Which of the following is easiest software development process model?
Waterfall Model
Prototyping
Interactive enhancement
Spiral model
All of these
Banker’s algorithm for resource allocation deals with
Deadlock prevention
Deadlock avoidance
Deadlock recovery
Mutual exclusion
All of these
In Queues, the items deleted at one end is called.
Rear
Front
Top
Base
None of these
Pointer is used in
Direct Addressing
Indirect Addressing
Indexed mode
Immediate Addressing
None of these
An array can be passed in a functions in C language through
‘Call by value’ only
‘Call by reference’ only
Both (1) & (2)
Call by preference
None of these
HTTP refers to
Hyper Text Transmission Protocol
Hyper Text Transfer Protocol
Hyper Text Tie Protocol
Hyper Text Total Protocol
None of these
An email account includes a storage area, often called a (n)
Attachment
Hyperlink
Mailbox
Ip address
None of these
A(n) ____ is a collection of information that determines which files you can access and which setting you use.
Network
User account
Operating system
File system
None of these
To print a document
Select the print command and then select OK
Select the Ready printer and then select OK
Type PRINT and then press Enter
Close the document, select the print command then select OK
None of these
Which part of the computer provides only temporary storage of files?
ROM memory
Processor
Hard drive
Mother board
RAM memory
What will be the output of “a” in following code?
#include<stdio.h>

int main()

int a=20;

{

int a=10;

printf(“%d”,a);

printf(“%d”,a); return 0;

}

answer choices

20 20
10 20
20 10
10 10
Compilation Error
Reply With Quote Quick reply to this message
Reply

Similar Threads
Thread Thread Starter Forum Replies Last Post
IBPS Specialist Officer Previous Year Question Paper Pdf Unregistered Main Forum 1 23rd December 2016 12:33 PM
IBPS Specialist Officer Model Papers Pdf Free Download Unregistered Main Forum 1 7th November 2016 10:44 AM
Corporation Bank Specialist Officer Exam Papers Unregistered Main Forum 1 1st November 2016 11:14 AM
Institute of Banking Personnel Selection clerk exam previous year question papers fre Unregistered Online MBA Discussions 1 23rd November 2015 10:51 AM
Central bank of India Agriculture Officer Question Papers Unregistered Main Forum 1 16th November 2015 12:27 PM
Syndicate Bank Probationary Officer Question Papers Unregistered Main Forum 1 14th November 2015 10:11 AM
Institute of Banking Personnel Selection Technical Officer previous 10 years question Unregistered Main Forum 1 10th November 2015 03:26 PM
Specialist Officer in PNB Unregistered Main Forum 0 17th July 2015 11:13 AM
SBI Specialist Officer Previous Year Papers Unregistered Main Forum 0 16th July 2015 06:31 PM
SBI specialist officer old papers Unregistered Main Forum 0 15th July 2015 05:27 PM
Staff Selection Commission Previous Solved Question Papers Unregistered Main Forum 0 15th July 2015 12:00 PM
SBI Specialist Officer Solved Question Paper Unregistered Main Forum 0 10th July 2015 11:57 AM
Previous year question papers of Delhi Subordinate Services Selection Board PGT (Sans Unregistered Main Forum 1 20th October 2014 02:34 PM
Previous year question papers of Indian Institute of Banking and Finance clerk exam p Unregistered Main Forum 1 20th October 2014 12:22 PM
IBPS specialist officer question paper Unregistered Main Forum 1 11th October 2014 11:05 AM
Section Officer Audit Question Papers vuhaaw Main Forum 1 28th January 2013 09:54 AM
Section Officer Audit Question Papers jitendarpall Main Forum 0 23rd January 2013 10:42 AM
National Institute of Personnel Management Calcutta kuldeep. Main Forum 1 19th September 2012 12:58 PM
Banking and Insurance Management Question Papers OliveetTom. Main Forum 1 6th September 2012 10:43 AM
Bank of India Specialist Officer Question Paper Melesse Befikadu Taye Main Forum 1 3rd August 2012 11:00 AM


Quick Reply
Your Username: Click here to log in

Message:
Options

Thread Tools Search this Thread



All times are GMT +5.5. The time now is 05:36 PM.


Powered by vBulletin® Version 3.8.7
Copyright ©2000 - 2024, vBulletin Solutions, Inc.
Search Engine Friendly URLs by vBSEO 3.6.0 PL2

1 2