0% found this document useful (0 votes)
35 views5 pages

2018 Ibps It

2018-ibps-it

Uploaded by

aayush talesara
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
35 views5 pages

2018 Ibps It

2018-ibps-it

Uploaded by

aayush talesara
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

DEL SOLVED

MODEL VED
VED
SOLV ED P
PAPER
PAP R
40 IBPS SO IT CWE
ExamDate: 28.01.2018
(Main) Exam
Based on Memory
which of the following (4) Information Service Rou-
1, In SQL
is mainly used to tine (1) application
commands
a user-defined object (2) accessibility
remove (5) None of these
from a database?
5. In Oracle, which data
(3) atomicity
(1) RemOve
type is (4) Advanced
used to store unstructured bi-
(2) Drop nary data? (5) Automatic
10. Unique IP
(3) Delete (1) INT address is
assigned
to each host in
(4) Erase (2) VARCHAR which of the
(5) Rollback
following layer?
(3) DOUBLE
(1) Network Layer
2. Which of the following phases (4) BLOB
does not belongto the software (2) Data Link Layer
(5) None of these (3) Transport Layer
development life cycle?
6. Which layer of the OSI model 4) Application Layer
(1) Testing defines the language and syn
(2) Maintenance (5) physical layer
tax for programs?
11. What is the default value for
(3) Marketing (1) Data link layer Boolean variable in an array?
(4) Coding (2) Presentation layer (1) Null (2) Zero
(5) None of these (3) Application layer (3) False (4) True
3. Consider the following encryp- (4) Session layer (5) Bit
tion alogorithms?
(5) Transport layer 12. Which of the following library
I. Data Encryption Standard
7. UDP and TCP are categorised function is used to concate-
(DES) under the layer of the nate in aC
I. Advanced Encryption Standard tw strings pro
OSI model. gram?
(AES) (2) strlwr
(1) physical (1) strcpy
II. Rivest Shamir Adleman (RSA)
(2) data link (3) strcmp (4) strcat
Choose the option that cor
(3) application 5) strempP
rectly matches the given algo 13. Which of the following func-
rithms with the type of cryp (4) transport
tions is used to copy one mem
tography (public-key of private (5) network
key) utilised by them. ory location to another in C++?
8. Which of the following topol
(1) memnmove
(1)DES& AES: private-key: ogies mainly use hub for in-
(2) memchr
RSA: public-key terconnection of resources?
(2) AES & RSA: (1) Ring topology (3) memcmp
private-key
DES: public-key (4) memcPy
(2) Bus topology
3) DES & RSA : private-key (3) Tree topology (5) memset
AES: public-key following is not
14. Which of the
(4) Star topology true regarding an OLTP sys
4) RSA: private-key; DES && (5) Mesh topology
AES public-key tem?
9. 'ACID is a set of properties of
5) AES (1) OLTP is generally regarded
private-key; DES & database transactions intend- for data
4.
RSA public-key ed to guarantee validity even
as
unsuitable
The full form warehousing.
of ISR is in the event of errors, power an be repoS-
)Information Service Re failures.etc. The alphabet 'A' in (2) OLTP systems
histori-
itories of facts and
quest the abbreviation 'ACID' stands
2) cal data of business analy-
3)
Information Select Routine for sis.
Interrupt Service Routine
ISIT-513
PRACTICE WORK BOUR
OFFICER
KIRAN'S IBPS
IT
is the execution
26. of
(1) U P D A T E series of programs each on
(3) The purpose of an OLTP sys- (2) I N S E R T
set or "batch" of nputs, rath
tem is to run day-to-day op- er than a single input.
(3) C R E A T E
erations. (1) Bath gathering
model of an OLTP (4) TRUNCATE
(4) The data (2) Bath processing
s y s t e m is n o r m a l i s e d . None of
these
(5)
amounts oriented pro- (3) Batch channelling
(5) OLTP oflers large 21. TCP is a .
of raw data. tocol.
(4) Batch networking
None of these
15. In which of the following joins, (1) Data (5)
the result is generated only (2) Network
27. Which one of the following is
when variable matches from 11sed as a synchronization toi
(3) S e s s i o n s
both tables? in a multiprogramming envi
(4) C o n n e c t i o n
(1) Inner join ronment?
(2) Cross join (5) Application
(1) Semaphore
following algo-
22. Which of the (2) Address bus
(3) Equi-join to efficient-
rithm can be used
(4) Natural join source
(3) ICs
5) Outer join ly c a l c u l a t e single Directed
shortest paths in a (4) Logic gate
16. The weakening of a signal over
graph? (5) None of these
the distance it travels is called
(1) Djikstra 28. What is the sub-network num-
(1) attenuation
(2) Bellman-Ford ber of a host with an IP ad-
(2) modulation
(3) Topological Sort dress of 172.16.66.0/21?
(3) demodulation
(1) 172.16.64.0
(4) Strongly Connected Compo-
(4) conditioning (2) 172.16.48.0
nent
(5) transduction
(5) None of these (3) 172.16.36.0
17. What is the command used to
23. In SQL, which command is (4) 172.16.0.0
access top element of a stack
used to change data in a data
without deleting it? (5) None of these
table?
(1) peek 29. Which type of members of a
(1) UPDATE
(2) is Empty base class is never accessible
(2) INSERT to a derived class?
(3) top Element
(3) BROWSE (1) Public
(4) is full
(4) APPEND (2) Private
(5) pop
(5) None of these
18. How many layers are present (3) Protected
in a data warehouse system? 24. The language used in applica-
(4) Unique
tion programs to request data
(1)8 (2) 7
from the DBMS is referred to (5) All of the above
(3) 9 (4)6 as the 30. When you start up the co
(5) 5 puter the bootup storage a
(1) DML
19. If h is any hashing function which the BIOS versions, mar
and is used to hash n keys in
(2) DDL
ufacturer and data are as
to a table of size M, where (3) Query Language the monitor is calleu
played on
n=m,,the expected number of (4) DCL
collisions involving a particu-
(1) Bootstrap
(5) None of these
(2) Power on self test (POSI)
lar key x is
25. Which of the
(1) less than 1 following
col is connectionless, lowproto- (3) System configuration
over-
(2) less than n head and high (4) Kernel loading
speed?
(3) less than m (1) ARP (5) None of these
(4) less than n/2 31. A. that one recor
(2) TCP and ARP means
e
is
(5) greater than n (3) ICMP
in a particular record iyP
20. Which of the related to only one reco
following SgL (4) UDP
statement is used to another record type
data in
changed (5) TCP relationshp
a database table? (1) One to one
ship
relations
(2) One to many
ISIT-514
KIRAN'S IBPS IT OFFICER PRACTICE WORK BooK
(3) Many to one relationship 36. Rows of a relation are called 41. Whlch of the
following is not
to many relationship (1) Relation a context free
(4) Many grammar com
(5) None of these (2) Tuples ponents?
32. In files. there is a key associ- (3) Data structure (1)Terminal symbols
ated with each record which is (4) An entity (2) Nonterminal symbol
used to differentiate among| (5) None of these (3) Production line
different records. For every lile | 37. A computer system consisting (4) List
there is at least one set of a of its processor, memory and (5) None of these
key that is unique. Such a Key 1/O devices accepts data, pro 42. TLB is a high speed cache used
is called cesses it and produces the out to hold recently referenced
(1) Unique key put results. Can you tell in page table entries a part of
(2) Prime attribute which component is the raw
paged virtual memory. Invert
data fed?
(3) Index key ed page table scheme uses a
(1) Mass Memory page table that contains an
(4) Primary key (2) Main Memory entry for each physical frame.
(5) Null key not for each logical page. This
(3) Logic Unit
33. is primarily used for ensures that the table occu-
(4) Arithmetic Unit
mapping host names and pies a fixed fraction of memo-
(5) None of these
email destinations to IP ad- ry. The size is proportional to
dress but can also be used for 38. The mechanical diskette drive
physical memory. not the vir
other purposes. in which we insert our diskette tual address space.
is connected to the comput-
(1) TCP (Transfer Control Pro- (1) Three (2) Four
er's-bus.
tocol) (3) Five (4) Six
(1) Data
(2) DNS (Domain Name Sys- (5) More than six
(2) Communication
tem) 43. Which one is capable of over
(3) Address (4) Parallel
3) SHA (Secure hash Algo- lapping I/0 operation for one
(5) None of these
rithm) job with processor operations
39. The process of transferring for another job?
(4) Simle Network management
data intended for a peripheral
Protocol (SNMP) 1) Register
device into a disk (or interme-
(5) None of these diate store) so that it can be (2) Operating Systemn
34. Override is a method. transferred to peripheral at a (3) Spooling
(1)for an operation that re more convenient time or in (4) Buffering
places an inherited meth- bulk is known as (5) None of these
od for the same
operation. (1) Multiprogramming 44. The TRAP is one of the inter-
(2) for a data that replaces an (2) Spooling rupts available in INT'EL
inherited method for the (3) Caching 8085. Which of the following
same operation. (4) Virtual programming statements is true regarding
(3) for an operation that takes (5) None of these TRAP?
arguments form library 40. Consider an operation ot ad- (1) It is level triggered
function. dition. For two numbers, the (2) It is negative edge triggered
4) All of these operating will generate a s u m . as well as positive edge trig-
5) None of these If the operand are strings, and gered
35. The word the same operation would pro (3) It is positive edge triggered
means the duce a third string by concat-
ability to take many forms. enation. This features is called
(4) lt is both positive edge trig-
gered and level triggered
(1)Polymorphism
(2) Overloader
(1) Inherltance
(5) None of these
(2) Encapsulation 45. They way a particular applica-
13) Overnider
4) Aggregation (3) Polymorphism tion views the data from the
5) Generalization (4) Binding database that the application
(5) None of these uses is a :
ISIT-515
OFFICER PRACTICE WORR
KIRAN'S IBPS IT 56. A program that neither reni
printfod". a): cates or copies itself, but
damage or compromises th
does
(1) Module printfbd". a);
(2) Relational model security of the computen
return O: Which of the followi ng is that
(3) Schenma
computer virus?
(4) S u b s c h e m a
of these
(1) 2020 (1)Joke program
(5) None
(2) 10 20
linked list (2) Worm
46. Each node in
a
(4) 10 10
at least
(3) 20 10
must contain
(5) C o m p i l a t i o n error
(3) Trojan
(1) Thee fields (4) Hoax
is used
computer
(2) Five fields 52. Firewall in
(5) None of these
(3) Four ficlds for
57. Which of the following state.
(4) One fields (1) Security ments should be used to oh
(2) D a t a transmission
(5) Two fields tain a remainder after dividing
(3) A u t h e n t i c a t i o n
47. Encryption and decryption are 3.14 by 2.1?
functions of the layer. (4) Monitoring (1) rem = 3.14%2.1;
(1) Transport (2) Session (5) None of these
(2) rem=modf{3. 14. 2.1):
is their
(3) Application 53. What is ISP and what
(3) rem=fmod(3.14.2.1):
(4) Presentation function?
(4) Remainder cannot be ob-
48. Banker's algorithm for resource (1) Internal Service Provider: A
in- tain in floating point deci
allocation deals with company which provide
ternet connection for a fee. sion
(1) Deadlock prevention
(2) Internet Service Provider: A 58. What should be the output of
(2) Deadlock avoidance
company which provide in- the following program?
(3) Deadlock recoveryy
ternal transferring data ser- #include<stdio.h>
(4) Mutual exclusion
vice to an organization.
int main0
5) All of these
(3) Internet Service Provider: A
49. Aln) is a collection of in- company which provide in-
formation that determines int i = 3, j . k:
ternet connection to other
which files you can access and people for a fee. j &i;
which setting you use.
(1) Network
(4) Internal Service Provider: A printf ("6d\n". i*ji+*j):
company provide internal return 0:
(2) User account connection to transfer data
(3) Operating system between two company.
(4) File system 5) None of these (1) 30 (2) 27
(5) None of these 54. Once the active medium is (3) 15 (4)9
ex-
50. Which part of the computer cited. the first photons of (5) 3
light
provides only temporary stor- are
produced by which
physi- 59. Which of the following state
age of files? cal process? ments are correct about the
(1) ROM memory (1) Blackbody radiation given program?
(2) Processor (2) Spontaneous enisslon #include<stdio.h>
(3) Hard drive (3) Synchrotron radtation int main)
(4) Mother board (4) Plank's oscillatlon
(5) RAM Memory 55. Which of the
51. What will be a
type of
tollowing is not int size, i:
the output of "a"| expansion slot
bus or
scantd".& size):
in following code? design used in
#include <stdio.h> Advanced-tech
nology class systenms? int arrlsizel:
) PCMCIAa for (1=1: k=size:
int main) it+
int a 20 (2) ISA
(3) PROM scanf(od". arr|lil):
int a=10: (4) EISA printtod". larr|il):
(5) None of these
return O0;
ISIT-516
KIRAN'S IBPS IT OFFICER PRACTICE wORK BOOK
9.
(31'software development lile 10. (1)
since cycle.' these six steps include At the network layer,
(1) The code
is e r r o n e o u s
used planning. analysis, design.
bal
addressing
a
gdo-
the subscript for array
is in the range 1
development & implementa uniquely icdentifiessystem
every
that
host
in for loop and router is
tion, testing & deployment necessary
to size.
and maintenance.
delivery of packet from netfor
a
The code is erToneous since
work to
network. The Internet
(2) 3. (1) DES and AES
the values of array are get- uses
sym address (or IP address) is
32
the metric or Secret or private key bits (for IPv4) that
ting scanned through and uniuely
loop.
cryptography. RSA and DSS universally defines a host
are the most widely used pub- or router on the internet.
(3) The code is e r r o n e o u s since
lic key encryption algorithms. 11. (3) By default, the value of
the statement declaring ar-
4. (3) ISR. Stands for "Interrupt boolean primitive type is
ray is invalid.
Service Routine." An ISR (also false
(4) The correct and runs suc-
called an interrupt handler) is 12. (4) You can concatenate two
cessfully. a software process invoked by strings easily using standard
(5) None of these an interrupt request from a library function strcat(jof
string. h header file.
60. Which of the following two li- hardware device.
brary functions are used to dy- 13. (4) The memcpy function is
5. (4) SQL data types that are
namically allocate memory? ideal for large amounts of un- used to copy a block of data
structured binary data in- from a source address to a des-
(1) malloc and memalloc
clude the BLOB data type (Bi tination address.
(2) alloc and memalloc
nary Large Object)
and the 14. (1) DBMS built for online
(3) malloc and callooc transaction processing (OLTP)
BFILE data type (Binary File
(4) memalloc and faralloc is generally regarded as un-
object).
(5) None of these suitable for
6. (3) The application layer of the
data warehousing because
OSI model provides a frame-
-ANSWERS work to run application pro- each system is designed with
a differing set of requirements
the language
1. (2) 2. (3) 3. (1) 4. (3) grams. It defines are
and syntax used by programs in mind e.g.: OLTP systems
5. (4) 6. (3) 7. (4) 8. to communicate with supple- design to maximize the trans-
9. 13) 10. (1)| 11. (3) 12. (4)| mentary programs.
action processing capacity.
13.(4) 14. (1) | 15. (1) 16. (1)| data
OLTP holds c u r r e n t
7. (4) The transport layer
con-
whereas data warehousing
17.(1) 18. (1) 19.() 20.(1) reliability of c o m m u -
trols the OLTP
holds historical data.
21. 4) 22. (3) 23..(1) 24. (1)| nicationsthrough flow c o n - supports day-to-day decisions
25. (4) |26. (2) 27. (1) 28. (1) | and error
trol, segmentation, number of
of and serves large
29. (2) 30.(2) 31. (1)| 32. (4)| control. Two great examples clerical/operation users.
TCP
33. 2) 34. (1) 36. (2)
35. (1) transport protocols
are
UDP. TCP, 15. (1) IfC =
innerjoin| A.B ) cre-
37. (2) 38. (2) 39. (2) 40. (3) (as in TCP/IP) and timetable. C.
Control ates the table or
41. 14) 42. (") 43. (3) 44. (4) or the Transmission between A
a s the inner join
Protocol, is connection orlent
45. 14) 46. (5) 47. 14) 48. (2) and B by matching up
rows
ed. UDP, o r the User Datagram variables with the
49. (2) 5o. (5)51.(4)|52. (1) Protocol, is not
connection using all the variables.
55. (3) 56.(3)| as key
53.(1) 54.(2) oriented.
same nane
pertorm
inner joins
57. (3) 58. (3) 59. (3) 60.(3)| 8. (4) Star network
consists ot You can
certan
combinations
acts as only o n Itf A
central hub which timetables.
-EXPLANATIONS- one
a conduit to transmit messag
of tables and
be a
table, then B must
host is a
(2) The SQI. DROP command In star topology, every returns C as
es.
table. innerjoin
is used to remove an object central hub.
Is connected to a
a table.
from the datäbase. If you drop 9. (3) In the context of transac Attenuation is a general
a table, all the rows in the ta- 16. (1)
acronyim reduc-
l o n processing. the term that relers to any
ble is deleted and the table the four key tion in the strength of a sig
ACID refers to
structure is removed from the properties of a transactlion occurs with
nal. Attenuation
database. When a table is alomlcity, conslsteney, Isola whether
any type of signal,
dropped all the references to thon, and durability
he table will not be valid.
ISIT-517

You might also like