1. MICR devices can read:
[A] Letters
[B] Numbers
[C] Both of these
[D] All of these
[E] None of these
(Ans):-B
2. Auxiliary storage consists of
[A] Magnetic tapes
[B] CDs
[C] Both of these
[D] All of these
[E] None of these
(Ans):-A
3. Who can provides access rights to users?
[A] Data custodian
[B] Data owner
[C] The data base administrator
[D] Management
[E] None of these
(Ans):-C
4. Security policy of an organization need not have
[A] The overall security philosophy of the organization
[B] The authorization procedure for accessing data
[C] Security awareness program
[D] Highlights and identity of the sensitive security features
[E] None of these
(Ans):-D
5. In case of a virus getting into computer, which of the following will help?
[A] Encryption
[B] NORTON
[C] Police complaint
[D] All of these
[E] None of these
(Ans):-B
6. Which of the following do you think is NOT necessary for computerization system in a bank?
[A] Effective customer service
[B] Effective back office integration
[C] Focus on manual records
[D] All of these
[E] None of these
(Ans):-C
7. BCNF is needed because:
[A] Otherwise tuples may be duplicated
[B] When a data is deleted tuples may be lost
[C] Updating is otherwise is difficult
[D] When there is dependent attributes in two possible composite keys one of the attribute is unnecessarily duplicated in the tuples
[E] None of these
(Ans):-D
8. Which of the following is reliable service?
[A] TCP
[B] UDP
[C] Both [A] & (2)
[D] Either [A] nor (2)
[E] None of these
(Ans):-A
9. Firewall is used in PC for
[A] Security
[B] Authentication
[C] Data transmission
[D] All of these
[E] None of these
(Ans):-A
10. A transmission in which receiver receives the data simultaneously as it is relayed is called
[A] Video-conferencing
[B] Online transmission
[C] Real-time transmission
[D] Offline transmission
[E] None of these
(Ans):-C
11. A protocol is:
[A] Service that helps in communicating
[B] Rules that help computer talk
[C] Way of transmission data over the net
[D] All of these
[E] None of these
(Ans):-B
12. Which of the following are relational integrity constraints?
[A] Null value
[B] Prim any key
[C] Referential integrity
[D] All the above
[E] None of these
(Ans):-D
13. Which of the following do think is NOT to develop an application for computer?
[A] Feasibility study
[B] Designing
[C] Testing
[D] All the above
[E] None of these
(Ans):-D
14. Binary equivalent to 87 is:
[A] 1010111
[B] 1101111
[C] 1011111
[D] 10111111
[E] None of these
(Ans):-A
15. In binary system the highest value of an 8-bit number is
[A] 255
[B] 256
[C] 253
[D] 259
[E] None of these
(Ans):-A
16. Which of them is true?
[A] Data can be facts / figures / letters / words symbols etc. that represent an idea or object
[B] Data is raw material from which information is derived.
[C] Data is numbers, alphabets
[D] All the above
[E] None of these
(Ans):-A
17. Maximum storage space is available on
[A] CDs
[B] Floppies
[C] ROM
[D] Hard disc
[E] None of these
(Ans):-D
18. ____________ deals with the restructuring of existing source code in reverse engineering.
[A] Abstraction
[B] Completeness
[C] User’s screen
[D] Directionality
[E] None of these
(Ans):-D
19. Which of the following person should be made responsible for reporting maintenance problems in a LAN?
[A] Network administrator
[B] Users
[C] Security officer
[D] All the above
[E] None of these
(Ans):-B
20. Software change management decides:
[A] How to manage alternations, irrespective of the stage of the life cycle of a product
[B] Development stages working
[C] Maintenance stages working
[D] All the above
[E] None of these
(Ans):-A
6 comments:
thanks
Thanks for these questions,what type of questions will be in professional knowledge for IT officer as i belongs to electronics and communication
thnx for these questions...really helpful
hi sir how to download the above information
The information is very useful thank u sir....
thanks for sharing IBPS notification
Post a Comment