IBPS : Specialist Officers Exam Paper Held On 14.02.2016 - (Computer Knowledge)


IBPS : Specialist Officers Exam Paper Held On 14.02.2016 - (Computer Knowledge)


Q151. What are code generators?

a) CASE tools that enable the automatic generation of program and database definition code directly from the design documents diagrams, forms and reports stored in the repository.
b) CASE tools that support the circulation of graphical representations of various system elements such as process flow, data relationships, and program structures.
c) CASE tools that enable the easy production of user documentation in standard formats.
d) CASE tools that enable the easy production of technical documentation in standard formats.
e) CASE tools that support the production of systems forms and reports in order to prototype how systems will ‘look and feel’ to users.

Q152. The Web layout View is available in, which Office 2013 application?

a) Excel
b) Word
c) Access
d) PowerPoint
e) Webmaker

Q153. ………….. produces printout of a data in user-defined manner

a) Query language
b) DML
c) Report generator
d) DCL
e) Metadata

Q154. Which security model is used in a peer-to-peer network?

a) Password-protected Shares
b) Access Control Lists
c) Share-level Security
d) User-level Security
e) Access Control Entries (ACEs)

Q155. A hierarchical data model combines records and fields that are

a) cross structure and relational structure
b) tree structure
c) logical manner
d) cross structure
e) relational structure

Q156. Which protocol is used for transferring data and information from one network to the other network?

a) Internet Protocol
b) Transmission Control Protocol
c) File Transfer Protocol
d) Hyper-Text Transfer Protocol
e) Ethernet Protocol

Q157. What does ios ate mean as an argument in ofstream in C++ ?

a) Open file for read access only
b) Open file, create
c) Open file, but do not create
d) Open file, set the position to the end
e) Open file, for write access only

Q158. An object-oriented database does not depend upon …… for interactions.

a) data dictionary
b) Oracle
c) SQL
d) index
e) DBMS

Q159. What is a brownout in an electrical supply system?

a) A slightly elevated voltage lasting from seconds to minute.
b) Alternating power out, power on lasting a few minutes.
c) Has nothing to do with electricity.
d) Complete power out lasting a few minutes.
e) A slightly decreased voltage lasting from seconds to minutes or more.

Q160. Which common backstage view task creates a PDF file from an existing file?

a) Export
b) Account
c) Create
d) Options
e) Info

Q161. Which device operates at the internet layer of the TCP/IP model?

a) Switch and Hub
b) Router
c) Switch
d) PBX
e) Firewall

Q162. A coding scheme recognized by system software for representing organizational data best defines a

a) data type
b) data size
c) tuple
d) hyperlink
e) hashing algorithms

Q163. Which phase of the SDLC involves converting to the new system?

a) Systems design
b) Systems implementation
c) Systems analysis
d) Systems development
e) Other than those mentioned as options

Q164. What is the purpose of ARP?

a) To resolve know IP addresses to unknown physical addresses.
b) To resolve domain names to unknown IP addresses.
c) To resolve MAC addresses and NetBIOS names to IP addresses.
d) To resolve known MAC addresses to unknown IP addresses.
e) To resolve NetBIOS names to IP addresses.

Q165. In Java, communication between objects is done by

a) calling a method
b) creating a class hierarchy
c) defining a Java class
d) creating a class
e) running a program

Q166. Which of the following CASE tools generate reports that help you identify possible inconsistencies, redundancies and omissions in diagrams, forms and reports?

a) Form generators
b) Report generators
c) Diagramming tools
d) Analysis tools
e) Documentation generators

Q167. An attribute whose value is unique across all occurrences

a) primary key
b) recursive key
c) join attribute
d) data marker
e) single-valued key

Q168. AN IP protocol field of 0 × 06 indicates that IP is carrying what as its payload?

a) UDP or IGRP
b) UDP
c) ICMP
d) TCP
e) IGRP

Q169. A named set of table rows stored in a contiguous section of secondary memory best describes a

a) entity
b) collection
c) physical file
d) pointer
e) relation

Q170. Which of the following attributes makes TCP reliable?

a) Connectionless establishment
b) Low overhead and Null sessions
c) Null sessions
d) Connection establishment
e) Low overhead

Q171. Which shortcut will create a new folder in a Windows folder?

a) Ctrl + C
b) Ctrl + Shift + N
c) Ctrl + V
d) Ctrl + Alt
e) Ctrl + O

Q172. Which of the following is not a benefit of networks?

a) Increased data integrity
b) Sharing of peripheral devices
c) Sharing of programs and data
d) Access to databases
e) Better communications

Q173. Which type of software is best used with specific questions to verify hypotheses?

a) Data fusion tools
b) Intelligent agents
c) Data cleansing tools
d) Query and reporting tools
e) Multidimensional-analysis tools

Q174. Which method of database recovery involves undoing unwanted changes to the database, such as undoing a partially completed transition interrupted by a power failure?

a) Rollforward
b) Mirroring
c) Reprocessing
d) Rollback
e) Other than those given as options

Q175. What is the default maximum number of processes that can exist in Linux (with a 32-bit platform)?

a) 1024
b) 32768
c) Unlimited
d) 4096
e) 99999

Study Kit for IBPS Specialist Officer Exam

Q176. The network database model uses

a) rows and fields
b) data elements
c) keys
d) records and sets
e) data dictionary

Q177. ………. Is a communication medium where data are transformed into light pulses.

a) Twisted-pair cable
b) Optical fibre
c) Coaxial cable
d) Copper cable
e) Satellite

Q178. ……….. is a computer with a web server that serves the pages for one or more websites.

a) Portal
b) backbone
c) Business Service Provider
d) Host
e) Gateway

Q179. the database management software creates and reads the data dictionary to ascription what ………. exits and checks to see if specific users have the proper access rights to view them.

a) data element definitions
b) schema objects
c) meta data
d) reference keys
e) metadata and data element definitions

Q180. the foreign key is not necessarily the …… in its current table.

a) report generator
b) foreign key
c) primary key
d) data dictionary
e) schema objects

Q181. Hierarchical databases do not use ……. As relational databases do for searching procedures.

a) indexes
b) primary key
c) database dictionary
d) rows and columns
e) foreign key

Q182. A/an …….. can shield electronic equipment for power spikes.

a) UPS
b) surge protector
c) firewall
d) encryption program
e) antivirus

Q183. If there are no functional dependencies between two (or more) non-primary key attributes, this describes

a) third normal form
b) fifth normal form
c) second normal form
d) first normal form
e) fourth normal form

Q184. ………… is a special field value, distinct from 0, blank or any other value, that indicates that the value for the field is missing or otherwise unknown.

a) BLOB value
b) Designated value
c) Null value
d) Hashed value
e) Non specific value

Q185. The concept of ‘zero administration’ is associated with

a) Desktop computers
b) Mini computers
c) PDAs and organisers
d) Portable computers
e) Network computers

Q186. Collecting personal information and effectively posing as another individual is a crime known as

a) Spoofing
b) Identity theft
c) Hacking
d) Personality theft
e) Spooling

Q187. A relational database model uses ………… to contain and organize information.

a) records and fields
b) image, audio, documents
c) columns and rows
d) foreign key
e) data dictionary

Q188. Which of the following forms is used specifically to identify the entity created when encapsulating data inside data link layer headers and trailers?

a) Packet
b) Segment
c) Data
d) Chunk
e) Frame

Q189. Which of the following is a valid class declaration in C++ ?

a) Class B {}
b) public class A {}
c) Class B {} and public class A {}
d) Class A {int x:};
e) Object A {int x.};

Q190. ………… is a device that have been customized to perform few specialized computing tasks well with minimal effort.

a) Dedicate appliance
b) Information appliance
c) Shopping bot
d) Server appliance
e) Substandard device

Q191. A good example of an operating system that makes your computer function and controls the working environment is

a) Microsoft Account
b) File explorer
c) Microsoft Office 2013
d) Windows 8
e) Task Manager

Q192. ………….. are used to refer to Java methods or variables that belongs to other classes.

a) Simple names
b) Keywords
c) External names
d) Qualified names
e) Method calls

Q193. Which connectionless protocol is used for its low overhead and speed?

a) ARP
b) TCP & ARP
c) ICMP
d) UDP
e) TCP

Q194. Which spread spectrum technology does the BO2.11b standard define for operation?

a) IR, FHSS and DSSS
b) DSSS
c) DSSS and FHSS
d) FHSS
e) IR

Q195. Which of the following ensures that only authorized users can use or apply specific software applications?

a) Servicelevel agreement
b) Access log
c) Dongle
d) Private key
e) Authorised program analysis report

Q196. ………….. is an attempt to make a machine or network resource unavailable to its intended users, such as to temporarily or indefinitely interrupt or suspend service of a host connected to the internet due to bombardment of fake traffic.

a) Cracking
b) A Trojan horse
c) A virus
d) A denial of service attack
e) A worm

Q197. Which of the following best supports communication availability, acting as a counter-measure to the vulnerability of component failure?

a) Integrated corrective network controls
b) Simple component redundancy
c) High network throughput rate
d) Careful network monitoring with a dynamic real-time alerting system
e) Other than those given as options

Q198. Data transmission technologies vary. Which one does Ethernet use?

a) CSMA/CS
b) CSMA/CA or CSMA/CS
c) CSMA/CD
d) CSMA/CD
e) CSMA/CA

Q199. Applications communicate with kernel by using

a) unit calls
b) shell script
c) system calls
d) shell
e) C programs

Q200. In which of the following office applications, can you name a file at the same time you create it?

a) Access
b) PowerPoint
c) Paint
d) Word
e) Excel

Study Kit for IBPS Specialist Officer Exam

Buy Printed Study Material for IBPS, Exams

Join Online Coaching for IBPS, Exams