Monday, 4 March 2013

IBPS IT Specialist officer professional knowledge solved paper

Model Solved Paper

For More practice questions here

professional knowledge questions for IBPS Specialist IT Officer

1. ________ refers to a family of IEEE standards dealing with local area network and metropolitan area network.

(A)802

(B)800

(C)801

(D)803

(E) None of these

ANS:(A)

2. Which is the general network standard for the data link layer in the OSI Reference Model?

(A) IEEE 802.1

(B)IEEE 802.2

(C)IEEE 802.3

(D)IEEE 802.4

(E) IEEE 802.6

ANS:(B)

3. _________ uses a standard called IEEE 802.6.

(A)LAN

(B)WAN

(C)MAN

(D)Internet

(E) None of these

ANS:(C)

4. Repeater operates in which layer of OSI model?

(A) Application Layer

(B)Presentation Layer

(C)Physical Layer

(D)Transport Layer

(E) Data link layer

ANS:(C)

5. Where does Bridge operate in OSI model?

(A) Physical layer

(B)Data link layer

(C)Both 1 and 2

(D)Application layer

(E) None of these

ANS:(C)

6. Which of the following uses the greatest number of layers in the OSI model?

(A) Bridge

(B)Repeater

(C)Router

(D)Gateway

(E) None of these

ANS:(D)

7. Routers operate in which layer of the OSI model?

(A) Physical layer

(B)Data link layer

(C)Network layer

(D)All of these

(E) None of these

ANS:(D)

8. Modem is a _______ that modulates and demodulate signals.

(A) DCE (Data circuit terminating equipment)

(B)DTE(Data terminal equipment)

(C)DTE-DCE

(D)Both 1 and 2

(E) None of these

ANS:(A)

9. A communication network which is used by large organization over regional, national or global area is called_______

(A)LAN

(B)WAN

(C)MAN

(D)Internet

(E) None of these

ANS:(B)

10. At _______ layer, TCP/’IP defines two protocols: Transmission Control Protocol (TCP) and User Datagram Protocol (UDP)

(A) Transport layer

(B)Network layer

(C)Physical layer

(D)Application layer

(E) None of these

ANS:(A)

11. The _______ layer is the layer closest to transmission medium.

(A)Transport

(B)Network

(C)Data link

(D)Physical

(E) None of these

ANS:(D)

12. End to end connectivity is provided from host to host in:

(A) Network layer

(B)Session layer

(C)Data link layer

(D)Transport layer

(E) None of these

ANS:(D)

13. Which of the following TCP/IP protocol is used for transferring electronic mail messages from one machine to another?

(A) SNMP

(B)SMTP

(C)RPC

(D)FTP

(E) None of these

ANS:(B)

14. Which of the following is an example of a client server model?

(A) FTP

(B)DNS

(C)TELNET

(D)All of these

(E) None of these

ANS:(D)

15. Which IEEE standards is used for Wi/Fi system?

(A)802.11

(2B802.1

(3C802.2

(4D802.3

(5)E802.10

ANS:(A)

16. __________ is the continuous ability to send and receive data between interconnected networks

(A) FTP

(B)SMTP

(C)TNS

(D)Network Interoperability

(E) None of these

ANS:(D)

17. What is the default subnet mask for a class B network?

(A) 127.0.0.1

(B)255.0.0.0

(C)255.255.0.0

(D)255.255.255.0

(E) None of these

ANS:(C)

18. What is loopback address?

(A) 127.0.0.1

(B)255.0.0.0

(C)255.255.0.0

(D)127.0.0.0

(E) None of these

ANS:(A)

19. Internet like network within enterprises.

(A)Intranet

(2BSwitching alternating

(3)Cnter organization networks

(4)Dxtranets

(5) Eone of these

ANS:(A)

20. A central computer surrounded by one or more satellite computers is called a

(A) Bus network

(B)Ring network

(C)Star network

(D)All the above

(E) None of these

ANS:(C)

21. With an IP address of 100, you currently have 80 subnets. What subnet mask should you use to maximize the number of available hosts?

(A) 192

(B)240

(C)248

(D)224

(E) 252

ANS:(E)

22. Encryption/decryption provides a network with __________

(A)Privacy

(B)Authenticity

(C)Contiguity

(D)on-repudiation

(E) None of these

ANS:(A)

23. The data to be encrypted at the sender site is called ______. The data to be decrypted at receiver end is called _________.

(A) Secret key, public key

(B)Public key, secret key

(C)Plaintext, cipher text

(D)Cipher text, plaintext

(E) None of these

ANS:(C)

24. In digital signature the private key is used for ______ and the public key for ______.

(A) Encryption, decryption

(B)Decryption, encryption

(C)Plaintext, cipher text

(D)Cipher text, plaintext

(E) None of these

ANS:(A)

25. A __________ -‘s main purpose is to prohibit unauthorized access to your computer via the Internet.

(A) Popup blocker

(B)Firewall

(C)Spyware

(D)Spam assassin

(E) None of these

ANS:(B)

26. To create a copy files in the event of system failure, you create a ________.

(A) Firewall

(B)Redundancy

(C)Backup

(D)Restore file

(E) None of these

ANS:(C)

27. Print server uses _______ which is a buffer that holds before it is send to the printer.

(A) Queue

(B)Spool

(C)Node

(D)Stack

(E) None of these

ANS:(B)

28. Which of the following identifies specific web page and its computer on the web page?

(A) Website

(B)URL

(C)Web site address

(D)Domain Name

(E) None of these

ANS:(D)

29. __________ is the computer to computer exchange of routine business data between trading partners in standard data formats.

(A) CTS

(B)DSR

(C)VDR

(D)EDI

(E) None of these

ANS:(D)

30. Communication handler is basically an _______ 16 bit micro controller?

(A) 8085

(B)8086

(C)8086A

(D)80C186

(E) None of these

ANS:(D)

31. Which uses a pre-shared key that is more than 7 and less than 64 characters in length?

(A) WPA-PSK

(B)TKIP

(C)AES

(D)All the above

(E) None of these

ANS:(D)

32. Ping command is used for what purpose?

(A) Test a device on a network whether it is reachable

(B)Test a hard disk fault

(C)Test a bug in the application

(D)Test a device scanning quality

(E) None of these

ANS:(A)

33. Two different kind of networks can be connected by using _____

(A) Bridges

(B)Satellite

(C)Gateway

(D)Routers

(E) None of these

ANS:(C)

34. Full adder is used to ______

(A) 2 bit addition

(B)3 bit addition

(C)4 bit addition

(D)6 bit addition

(E) None of these

ANS:(B)

35. Most important advantages of an IC is its __________

(A) Easy replacement in case of circuit failure

(B)Low power consumption

(C)Extremely high reliability

(D)Reduced cost

(E) None of these

ANS:(C)

36. An IC contains 50 gates each of which consists of 6 components/ It’s belong to

(A) VLSI

(B)LSI

(C)MSI

(D)SSI

(E) None of these

ANS:(C)

37. Which type of computers use the 8 bit code called EBCDIC?

(A) Mini computers

(B)Mainframe computers

(C)Super computers

(D)Micro computer

(E) None of these

ANS:(B)

38. An AND gate

(A) Implement logic addition

(B)Is equivalent to a series switching circuit

(C)Is any-or all gate

(D)Is equivalent to a parallel switching circuit

(E) None of these

ANS:(B)

39. The decimal equivalent of the binary number 11100001111 is

(A) 1806

(B)1807

(C)2806

(D)All the above

(E) None of these

ANS:(B)

40. Programs in which of the following memories can’t be erased?

(A) RAM

(B)ROM

(C)Cache memory

(D)Virtual memory

(E) None of these

ANS:(B)

41. The IP address 135.0.10.27 belongs to address class?

(A) A

(B)B

(C)C

(D)D

(E) None of these

ANS:(B)

42. Which are not used in case of applet?

(A)Read/write

(B)Internet

(C)Search engine

(D)All the above

(E) None of these

ANS:(A)

43. Which of the following is not a type of database?

(A) Hierarchical

(B)Relational

(C)Network

(D)Transition

(E) None of these

ANS:(D)

44. Which of the following is not a type of SQL statement?

(A) Data Manipulation Language

(B)Data Definition language

(C)Data control language

(D)Data standard language

(E) None of these

ANS:(D)

45. In QUEUE, the item deleted at one end is called_____

(A) Rear

(B)Front

(C)Top

(D)Base

(E) None of these

ANS:(B)

46. The drawback of the binary tree sort are remedied by the_______

(A) Linear sort

(B)Heap sort

(C)Insertion sort

(D)Quick sort

(E) None of these

ANS:(B)

47. White Box testing a software testing technique is sometimes called_____

(A) Graph testing

(B)Basis path

(C)Glass box testing

(D)Data flow testing

(E) Loop testing

ANS:(C)

48. Which of the following is used with database?

(A) EDI

(B)Credit card

(C)ATM

(D)Payment gateway

(E) Data mining

ANS:(E)

49. When a cracker attempts to misuse or steal data from a system, it is called_______

(A) Stealing

(B)Intrusion

(C)Virus

(D)Worm

(E) None of these

ANS:(A)

50. To modify existing rows of the table __________ statement is used.

(A) ALTER

(B)MODIFY

(C)UPDATE

(D)COMMIT

(E) DELETE

ANS:(C)

Thursday, 28 February 2013

IBPS IT Specialist Officer professional knowledge Practice - 12

IBPS IT Specialist Officer professional knowledge Practice – 10

IBPS IT Specialist Officer professional knowledge Practice – 9

IBPS IT Specialist Officer professional knowledge Practice – 8

IBPS IT Specialist Officer professional knowledge Practice – 7

IBPS IT Specialist Officer professional knowledge Practice – 6

IBPS IT Specialist Officer professional knowledge Practice – 5

IBPS IT Specialist Officer professional knowledge Practice – 4

IBPS IT Specialist Officer professional knowledge Practice – 3

IBPS IT Specialist Officer professional knowledge Practice – 2

IBPS IT Specialist Officer professional knowledge Practice – 1

 

professional knowledge questions for IBPS Specialist IT Officer

 

1. In order to save a world documents as a web page you need to

[A] Put the appropriate graphics and links on the documents

[B] Save the document in simple text format

[C] Use your web browser as editor and save URL

[D] Save as HTML

[E] None of these

(Ans):-D

 

2. Which of the following displays to the space where the text will be inserted when you type?

[A] Screen tip

[B] Insertion point

[C] Rulers

[D] Office Assistant

[E] None of these

(Ans):-E

 

3. Something which has easily understood instructions is said to be

[A] User friendly

[B] Information

[C] Word processing

[D] Icon

[E] None of these

(Ans):-A

 

4. The copy command saves to

[A] The desktop

[B] The clipboard

[C] Microsoft word

[D] Paste

[E] None of these

(Ans):-B

 

5. An example of non-numeric data is

[A] Bank balance

[B] Examination marks

[C] Real Numbers

[D] Employee Address

[E] None of these

(Ans):-D

 

6. Which of the following displays the button for changing text style, Alignment and size?

[A] Standard toolbar

[B] Status bar

[C] Drawing tool bar

[D] Formatting tool bar

[E] None of these

(Ans):-D

 

7. Arranging of data in a logical sequence is known as

[A] Classifying

[B] Searching

[C] Sorting

[D] Reproducing

[E] None of these

(Ans):-C

 

8. Which of the following tools is not normally used during system analysis?

[A] Program flow chart

[B] Grid flow chart

[C] System flow chart

[D] Question check list

[E] None of these

(Ans):-D

 

9. A single application that combines the major features of several types of application is called

[A] Integrated software

[B] A suite

[C] A combo package

[D] High end

[E] None of these

(Ans):-A

 

10. The word processing task associated with changing the appearance of documents is

[A] Writing

[B] Formatting

[C] Editing

[D] Storing

[E] None of these

(Ans):-B

 

11. I n order to save an existing document with a different name you need to

[A] Retype the document and give it a different name

[B] Use the save as command

[C] Copy and paste the original document to a new document and then rename it

[D] Use windows explorer to copy the document to a different location and then rename it

[E] None of these

(Ans):-B

 

12. It is better to copy a file from as floppy disk, and then open the copy on the hard disk because

[A] A floppy disk is easily moved from one computer to another

[B] you can store more on a hard disk

[C] The computer cannot open a file stored on a floppy disk

[D] Reading a hard disk is much faster and safer

[E] None of these

(Ans):-D

 

13. The best reason that a computer needs to have a hard disk is because

[A] It can then use the same program as computers

[B] It would not work without one

[C] It can store information when it is switched off

[D] It can store information while it is working

[E] None of these

(Ans):-B

 

14. Firewalls are used to protect against________

[A] Unauthorized attacks

[B] Virus Attacks

[C] Data driven attacks

[D] Fire attacks

[E] None of these

(Ans):-B

 

15. The _________ directory is mandatory for every disk

[A] Root

[B] Base

[C] Sub

[D] Case

[E] None of these

(Ans):-A

 

16. ‘WWW’ stands for ________

[A] World word web

[B] World Wide Web

[C] World white web

[D] World work web

[E] None of these

(Ans):-B

 

17. Which of the following is NOT associated with computer?

[A] Bit

[B] Binary

[C] Pencil

[D] Mouse

[E] Screen

(Ans):-C

 

18. ‘MICR’ technology used for clearance of cheques by banks refers to____

[A] Magnetic ink character recognition

[B] Magnetic intelligence character recognition

[C] Magnetic information cable recognition

[D] Magnetic insurance cases recognition

[E] None of these

(Ans):-A

 

feel good about this material drop a comment for us

Wednesday, 27 February 2013

IBPS IT Specialist Officer professional knowledge Practice - 11

Check previous Practice Sets below

IBPS IT Specialist Officer professional knowledge Practice – 10

IBPS IT Specialist Officer professional knowledge Practice – 9

IBPS IT Specialist Officer professional knowledge Practice – 8

IBPS IT Specialist Officer professional knowledge Practice – 7

IBPS IT Specialist Officer professional knowledge Practice – 6

IBPS IT Specialist Officer professional knowledge Practice – 5

IBPS IT Specialist Officer professional knowledge Practice – 4

IBPS IT Specialist Officer professional knowledge Practice – 3

IBPS IT Specialist Officer professional knowledge Practice – 2

IBPS IT Specialist Officer professional knowledge Practice – 1

 

professional knowledge questions for IBPS Specialist IT Officer

 

1. When cutting and pasting, the item cut is temporarily stored in

[A] ROM

[B] Hard drive

[C] Diskette

[D] Dashboard

[E] Clipboard

(Ans):-E

 

2. The hardware device that acts as both a switching and connecting unit is called

[A] RS-232 C port

[B] Concentrator

[C] Multiplexer

[D] Communication processor

[E] None of these

(Ans):-C

 

3. The device that assembles groups of characters into complete messages prior to their entering the CPU is called

[A] An interpreter

[B] A compiler

[C] A communication processor

[D] An editor

[E] A Translator

(Ans):-C

 

4. Data structure includes

[A] Array

[B] Execution statement

[C] Interaction

[D] Both 2 and 3

[E] List

(Ans):-A

 

5. What is the name of logic circuits which can add two binary digits?

[A] Hal adder

[B] Full adder

[C] Parallel adder

[D] Serial adder

[E] None of these

(Ans):-A

 

6. A program embedded in a semiconductor chip during their manufacture is called

[A] Humanware

[B] Firmware

[C] Liveware

[D] Hardware

[E] Software

(Ans):-B

 

7. A collection of related fields in data organization is called

[A] Group

[B] File

[C] Information

[D] Register

[E] Record

(Ans):-C

 

8. Plotter accuracy is measured in terms of repeatability and

[A] Vertical dimension

[B] Intelligence

[C] Resolution

[D] Pixels

[E] Buffer size

(Ans):-E

 

9. The data base III plus is mostly used for

[A] Office automation

[B] Database management problems

[C] Scientific problems

[D] Calculations only

[E] None of these

(Ans):-B

 

10. In the ‘’C’’ language the function scant ( ) reads

[A] Single character

[B] Character and strings

[C] Any possible number

[D] Any possible variable type

[E] Limited variable types

(Ans):-D

 

11. BIOS stand for

[A] Basic Input Output services

[B] Basic inner outer services

[C] Better input output services

[D] Better inner and outer services

[E] BIOS-Basic input/output system

(Ans):-E

 

12. A commonly used graphic format for the web is

[A] GIF

[B] BMP

[C] Text

[D] IMP

[E] TIF

(Ans):-A

 

13. The HTML code written in a text editor to make web-pages is

[A] HTML coding tags

[B] Source code

[C] Source element

[D] Tags

[E] None of these

(Ans):-B

 

14. The basic building block of a database that contains related records is

[A] Query

[B] Form

[C] Table

[D] Edited page

[E] Report

(Ans):-E

 

15. A set of rules that computer on a network use to communicate with each other are called

[A] Rules

[B] Regulations

[C] Protocol

[D] Netiquettes

[E] None of these

(Ans):-C

 

16. The process of connecting to the internet account is

[A] LOG IN

[B] LOG OUT

[C] SIGN IN

[D] SIGN OUT

[E] None of these

(Ans):-A

 

17. An image editing software in which we can draw and edit images, is

[A] Page maker

[B] MS-paint

[C] Photo image

[D] Front page

[E] Corel draw

(Ans):-E

 

18. Which out of the following is not DBMS software?

[A] DBASE

[B] FOXPRO

[C] ORACLE

[D] Sybase

[E] Data base 2000

(Ans):-E

 

19. The _____ of a system includes the programs or instructions.

[A] Hardware

[B] Icon

[C] Information

[D] Software

[E] None of these

(Ans):-D

 

20. Which of the following displays programs that are currently running? A single click on one of the program icons

[A] Menu bar

[B] Task bar

[C] Title bar

[D] Status bar

[E] None of these

(Ans):-B

Tuesday, 26 February 2013

IBPS IT Specialist Officer professional knowledge Practice - 10

professional knowledge questions for IBPS Specialist IT Officer

 

1. Which type of switching uses the entire capacity of a dedicated link?

[A] Circuit switching

[B] Virtual circuit packet switching

[C] Datagram packet switching

[D] Message switching

[E] None of these

(Ans):-C

 

2. The _____is a device that connects n input to m output.

[A] Crossword

[B] Crossbar

[C] Modem

[D] RAM

[E] None of these

(Ans):-B

 

3. In _____each packet of a message follows the same path from sender to receiver.

[A] Circuit switching

[B] Message switching

[C] The virtual approach to packet switching

[D] All the above

[E] None of these

(Ans):-D

 

4. A permanent virtual circuit involves

[A] Connection establishment

[B] Data transfer

[C] Connection release

[D] All the above

[E] None of these

(Ans):C

 

5. The search tool used to text that appears in gotherspace is

[A] Gobbler

[B] Archie

[C] Mikky

[D] Veronica

[E] None of these

(Ans):-D

 

6. X.21 protocol consists of

[A] Physical and frame levels

[B] Frame and packet levels

[C] Physical, frame and packet levels

[D] Only physical level

[E] None of these

(Ans):-D

 

7. Array is ______

[A] Linear data structure

[B] Non-linear data structure

[C] Complex data structure

[D] Simple data structure

[E] None of these

(Ans):-A

 

8. How many options does binary choice offer?

[A] None

[B] One

[C] Two

[D] It depends on the amount of memory in the computer

[E] It depends on the speed of the computer’s processor

(Ans):-C

 

9. Data going into the computer is called

[A] Output

[B] Algorithm

[C] Input

[D] Calculations

[E] Flow chart

(Ans):-C

 

10. Transformation of input into output is performed by

[A] Peripherals

[B] Memory

[C] Storage

[D] The input –output unit

[E] The CPU

(Ans):-E

 

11. Devices drivers are

[A] Tiny power cords for external storage devices

[B] Experts who know to maximize the performance of devices

[C] Small, special-purpose programs

[D] The innermost part of the operating system

[E] Substitutes for operating systems

(Ans):-C

 

12. A collection of program that controls how your computer system runs and processes information is called

[A] Operating system

[B] Computer

[C] Office

[D] Compiler

[E] Interpreter

(Ans):-A

 

13. A set of instructions telling the computer what to do is called

[A] Mentor

[B] Instructor

[C] Compiler

[D] Program

[E] Debugger

(Ans):-D

 

14. If you receive an e-mail form someone you don’t know, what should you do?

[A] Forward it to the police immediately

[B] Delete it without opening it

[C] Open it and respond to them saying you don’t know them

[D] Reply and ask them for their personal information

[E] Reply and tell them in touch with them

(Ans):-B

 

15. Which of the following can handle most system functions that aren’t handled directly by the operating system?

[A] Vertical market applications

[B] Utilities

[C] Algorithms

[D] Integrated software

[E] Compilers

(Ans):-B

 

16. Computer connected to a LAN (Local Area Network) can

[A] Run faster

[B] Go on line

[C] Share information and/or share peripheral equipment

[D] E-MAIL

[E] None of these

(Ans):-C

 

17. Which of the following refers to the memory in your computer?

[A] RAM

[B] DSL

[C] USB

[D] LAN

[E] CPU

(Ans):-A

 

18. One megabyte equals approximately

[A] 1000 bits

[B] 1000 bytes

[C] 1 million bytes

[D] 1 million bits

[E] 2000 bytes

(Ans):-C

 

19. When you are working on a document on PC, where is the document temporarily stored?

[A] RAM

[B] ROM

[C] The CPU

[D] Flash memory

[E] The CD-ROM

(Ans):-A

 

20. Magnetic tape is not practical for applications where data must be quickly recalled because tape is

[A] A random access medium

[B] A sequential access medium

[C] A read only medium

[D] Fragile and easily damaged

[E] An expensive storage medium

(Ans):-B

IBPS IT Specialist Officer professional knowledge Practice -9

professional knowledge questions for IBPS Specialist IT Officer

1. This component is required to process data into information and consists of integrated circuits.

[A] Hard disk

[B] RAM

[C] CPU

[D] ROM

[E] None of these

(Ans):-C

 

2. What is backup?

[A] Adding more components to your network

[B] Protecting data by copying it from the original source to a different destination

[C] Filtering old data from the new data

[D] Accessing data on tape

[E] None of these

(Ans):-B

 

3. Network components are connected to the same cable in the _____ topology.

[A] Star

[B] Ring

[C] Bus

[D] Mesh

[E] Mixed

(Ans):-A

 

4. Two or more computers connected to each other for sharing information from a_______

[A] Network

[B] Router

[C] Server

[D] Tunnel

[E] Pipeline

(Ans):-A

 

5. What is the term for unsolicited E-mail?

[A] Newsgroup

[B] Usenet

[C] Backbone

[D] Flaming

[E] None of these

(Ans):-E

 

6. What type of program controls the various computer parts and allows the user to interact with the computer?

[A] Utility software

[B] Operating system

[C] Word processing software

[D] Database program

[E] None of these

(Ans):-B

 

7. Each cell in a Microsoft office Excel document is referred to by its cell address, which is the ____

[A] Cell’s column label

[B] Cell’s column label and worksheet tab name

[C] Cell’s row label

[D] Cell’s row and column labels

[E] None of these

(Ans):-D

 

8 . What is the process of copying software from secondary storage media to the hard disk called?

[A] Configuration

[B] Download

[C] Storage

[D] Upload

[E] Installation

(Ans):-C

 

9. The code for a web page is written using_________

[A] A fifth generation language

[B] Win zip

[C] Peri

[D] Hypertext Markup Language

[E] URL

(Ans):-D

 

10. Small application programs that run on a web page and may ensure a form is completed properly or provide animation are known as__________

[A] Flash

[B] Spiders

[C] Cookies

[D] Applets

[E] Sparks

(Ans):-A

 

11. In a relation database, this is a data structure that organizes the information about a single topic into rows and columns.

[A] Block

[B] Record

[C] Tuple

[D] Table

[E] Command the interface

(Ans):-D

 

12. The first computers were programmed using_______

[A] Assembly language

[B] Machine language

[C] Source code

[D] Object code

[E] Formatting error

(Ans):-B

 

13. When the pointer is positioned on a ______, it is shaped like a hand.

[A] Grammar error

[B] Hyperlink

[C] Screen tip

[D] Spelling error

[E] For mating error

(Ans):-B

 

14. Dos and windows 3.x support file names upto______charecters in length

[A] Two

[B] Four

[C] Six

[D] Eight

[E] None of these

(Ans):-D

 

15. ______ is collection of web pages and ______ is the very first page that we see on opening of a website

[A] Home page, web- page

[B] Web-site, home-page

[C] Web-page, home -page

[D] Web-site, web-page

[E] None of these

(Ans):-B

 

16. When we run a program in HTML coding,_____ is used as backend and ____ works as frontend.

[A] Notepad-Internet-Explorer

[B] Notepad-Msn-messenger

[C] MS-word-Internet explorer

[D] Both 1 and 2

[E] None of these

(Ans):-A

 

17. If the _______ bit in X.25 standard is to 1. It means that there is more than one packet.

[A] Q

[B] D

[C] M

[D] J

[E] None of these

(Ans):-C

 

18. A device operating at the physical layer is called a

[A] Bridge

[B] Router

[C] Repeater

[D] All the above

[E] None of these

(Ans):-C

 

19. For separating channels in FDM, it is necessary to use

[A] Time slots

[B] Band pass filters

[C] Differentiation

[D] All the above

[E] None of these

(Ans):-B

 

20. Encryption and decryption are function of

[A] Transport layer

[B] Session layer

[C] Presentation layer

[D] All the above

[E] None of these

(Ans):-B

Sunday, 24 February 2013

IBPS IT Specialist Officer professional knowledge Practice -8

professional knowledge questions for IBPS Specialist IT Officer

1. One advantage of dial-up internet access is__________

[A] It utilizes broadband technology

[B] It utilizes existing telephone service

[C] It uses a router for security

[D] Modem speeds are very fast

[E] None of these

(Ans):-B

 

2. A computer checks the _____of user names and password for a match before granting access.

[A] Website

[B] Network

[C] Backup file

[D] Database

[E] None of these

(Ans):-D

 

3. Computer that is potable and convenient for users who travel is known as_______

[A] Super computers

[B] Laptops

[C] Mini computers

[D] File server

[E] None of these

(Ans):-B

 

4. Which of the following is true?

[A] Byte is a single digit in a binary number

[B] Bit represents a grouping of digital numbers

[C] Eight digit binary numbers is called a byte

[D] Eight digit binary numbers is called a bit

[E] None of these

(Ans):-C

 

5. Office LAN’s that are spread geographically apart on a large scale can be connected using a corporate________

[A] CAN

[B] LAN

[C] DAN

[D] VAN

[E] TAN

(Ans):-D

 

6. Which process check to ensure the components of the computer are operating and connected properly?

[A] Booting

[B] Processing

[C] Saving

[D] Editing

[E] None of these

(Ans):-A

 

7. How can the user determine what programs are available on a computer?

[A] Checking the hard disk properties

[B] Viewing the installed programs during the booting process

[C] Checking the operating system for a list of installed programs

[D] Checking the existing files saved on the disk

[E] None of these

(Ans):-D

 

8. In Dos, the ‘’Label’’ command is used to

[A] Display the label of disk

[B] Change the label of disk

[C] Remove the label of disk

[D] Both 1 and 2

[E] None of these

(Ans):-D

 

9. The subsystem of the kernel and hardware that virtual to physical addresses comprises.

[A] Process management sub-system

[B] Memory management sub-system

[C] Input/output management sub-system

[D] All the above

[E] None of these

(Ans):-B

 

10. Which of the following computer language is a mathematically oriented languages used for scientific problems?

[A] FORTRAN

[B] LISP

[C] COBOL

[D] APPLE

[E] None of these

(Ans):-A

 

11. Which of the following types of table’s constraints will prevent the entry of duplicate rows?

[A] Primary key

[B] Unique

[C] Null

[D] Foreign key

[E] None of these

(Ans):-A

 

12. The sharing of a medium and its path by 21 or more devices is called

[A] Modulation

[B] Encoding

[C] Line discipline

[D] Multiplexing

[E] None of these

(Ans):-D

 

13. Which multiplexing technique transmits along signals?

[A] FDM

[B] Synchronous TDM

[C] Asynchronous TDM

[D] Both 2 and 3

[E] None of these

(Ans):-A

 

14. How many values can be represented by a single byte?

[A] 4

[B] 16

[C] 64

[D] 256

[E] 512

(Ans):-D

 

15. Which of the following refers to a small, single-site network?

[A] LAN

[B] DSL

[C] RAM

[D] USB

[E] CPU

(Ans):-A

 

16. Microsoft office is

[A] Shareware

[B] Public-domain software

[C] Open-source software

[D] A vertical market application

[E] An application suite

(Ans):-E

 

17. Information travels between components on the mother board through

[A] Flash memory

[B] CMOS

[C] Bays

[D] Buses

[E] Peripherals

(Ans):-5

 

16. How are data organized in a spreadsheet?

[A] Lines and spaces

[B] Layers and planes

[C] Height and width

[D] Rows and columns

[E] None of these

(Ans):-D

 

17. The blinking symbol on the computer screen is called the

[A] Mouse

[B] Logo

[C] Hand

[D] Palm

[E] Cursor

(Ans):-E

 

18. Application software

[A] is used to control operating system

[B] is designed to help programmers

[C] Performs specific task for computer users

[D] is used for making design only

[E] All the above

(Ans):-C

 

19. The person contributing the idea of the stored program was

[A] John Neumann

[B] Charles Babbage

[C] Howard Aiken

[D] Daniel Thomas

[E] Dennis Ritenie

(Ans):-A

 

20.The speed at which the monitor accepts data is called

[A] Bandwidth

[B] Interlacing

[C] Response time

[D] Scanning

[E] Maximum speed

(Ans):-A

Friday, 22 February 2013

IBPS IT Specialist Officer professional knowledge Practice -7

professional knowledge questions for IBPS Specialist IT Officer

1. 253.45.67.9 is a class---------

[A] D

[B] A

[C] C

[D] E

[E] None of these

(Ans):-D

 

2. Internal auditors should review data system design before they are

[A] Developed

[B] Implemented

[C] Modified

[D] All the above

[E] None of these

(Ans):-B

 

3. Artifact based authentication method includes___

[A] Machine readable badges

[B] Electronic smart cards

[C] Both 1 and 2

[D] Vault cards

[E] None of these

(Ans):-C

 

4. What is the memory from 1K-640K called?

[A] Extended memory

[B] Normal memory

[C] Low memory

[D] Conventional memory

[E] None of these

(Ans):-D

 

5. I n most WANs, the network contains numerous cables or telephone lines,each one connecting a pair of______

[A] Packet

[B] Star topology

[C] Router

[D] Antennas

[E] None of these

(Ans):-C

 

6. Which of the following operators in ‘C’ does not associated from the right?

[A] ,

[B] =

[C] +=

[D] ++

[E] None of these

(Ans):-A

 

7. Which of the following is a variation of frequency division multiplexing (FDM)?

[A] Time Division Multiplexing (TDM)

[B] Pulse Code Multiplexing (PCM)

[C] Wave length Division Multiplexing (WDM)

[D] All the above

[E] None of these

(Ans):-C

 

8. Race condition occur in which flip-flop

[A] RS flip-flop

[B] JK flip-flop

[C] D flip-flop

[D] T flip-flop

[E] None of these

(Ans):-A

 

9. The expansion of E-R diagram is:

[A] Entity-Relation diagram

[B] Entity-Relative diagram

[C] Entity-Relation diagram

[D] All the above

[E] None of these

(Ans):-A

 

10. BNF is a meta-language for

[A] Specifying the syntax of a language

[B] Specifying a context free language

[C] Shell programming

[D] Both 1 and 2

[E] None of these

(Ans):-D

 

11. What is the language used by most of the DBM’s for helping their users to access data?

[A] High level language

[B] Query language

[C] SQL

[D] 4 GL

[E] None of these

(Ans):B

 

12. An expression_____

[A] Usually evaluates to a numerical value

[B] Indicate state of the program

[C] May be part of statement

[D] Both 1 and 2

[E] None of these

(Ans):-D

 

13. HTTP refers to_____

[A] Hyper text transmission protocol

[B] Hyper text transfer protocol

[C] Hyper text tie protocol

[D] Hyper text talent protocol

[E] None of these

(Ans):-B

 

14. Which language has recently become the difacto standard for interfacing application programs with relational database system?

[A] Oracle

[B] SQL

[C] D base

[D] 4 GL

[E] None of these

(Ans):-B

 

15. A program that place programs into main memory and prepares them for execution____

[A] Linker

[B] Assembler

[C] Loader

[D] Absolute entity

[E] None of these

(Ans):-C

 

16. Given √ (224)π = (13)π the value of the radix r is

[A] 10

[B] 8

[C] 6

[D] 5

[E] None of these

(Ans):-D

 

17. In a Third Normal Form relation, every …. Attribute is non-transitively and fully dependent on the every candidate key Z

[A] Prime

[B] Non-prime

[C] Unique

[D] Network

[E] None of these

(Ans):-B

 

18. Sockets are used in

[A] Physical layer

[B] Data link layer

[C] Network layer

[D] Transport layer

[E] None of these

(Ans):-B

 

19. A generalization of the Boyce Code Normal Form to relation schemes which includes the multi valued dependencies is called—

[A] Second normal form

[B] Third normal form

[C] Fourth normal form

[D] Fifth normal form

[E] None of these

(Ans):-C

 

20. The metal oxide semiconductor (MOS) is a ……….transistor that depends on the flow of only one type of carrier, which may be electrons or holes?

[A] Unipolar

[B] Bipolar

[C] n-polar

[D] s-polar

[E] None of these

(Ans):-A

 

21. Lexical Analyzer transforms an input streams into---

[A] Regular expression

[B] Sequence of tokens

[C] Binary

[D] Symbols

[E] None of these

(Ans):-B

 

22. IEEE 802-3

[A] Analog based deterministic

[B] Analog based non deterministic

[C] Digital based deterministic

[D] All the above

[E] None of these

(Ans):-B

 

23. Depth first search is

[A] Stack

[B] Queue

[C] Link list

[D] Tree search

[E] None of these

(Ans):-A

 

24. If we traverse a binary search tree, in which manner that we get in ascending manner

[A] In order

[B] Preorder

[C] Post order

[D] Graph

[E] None of these

(Ans):-A

 

25. Which is the world’s number #1 company for core banking solutions?

[A] Fidelity

[B] Fiserv

[C] Infosys

[D] Oracle

[E] None of these

(Ans):-B

 

FEEL GOOD THIS MATERIAL COMMENT US UR WORDS

Twitter Delicious Facebook Digg Stumbleupon Favorites More