IBPS : Specialist Officers Exam Paper Held On 14.02.2016 - (Computer Knowledge)
IBPS : Specialist Officers Exam Paper Held On 14.02.2016 - (Computer Knowledge)
Q151. What are code generators?
a) CASE tools that enable the automatic generation of program and database
definition code directly from the design documents diagrams, forms and reports
stored in the repository.
b) CASE tools that support the circulation of graphical representations of
various system elements such as process flow, data relationships, and program
structures.
c) CASE tools that enable the easy production of user documentation in standard
formats.
d) CASE tools that enable the easy production of technical documentation in
standard formats.
e) CASE tools that support the production of systems forms and reports in order
to prototype how systems will ‘look and feel’ to users.
Q152. The Web layout View is available in, which Office 2013 application?
a) Excel
b) Word
c) Access
d) PowerPoint
e) Webmaker
Q153. ………….. produces printout of a data in user-defined manner
a) Query language
b) DML
c) Report generator
d) DCL
e) Metadata
Q154. Which security model is used in a peer-to-peer network?
a) Password-protected Shares
b) Access Control Lists
c) Share-level Security
d) User-level Security
e) Access Control Entries (ACEs)
Q155. A hierarchical data model combines records and fields that are
a) cross structure and relational structure
b) tree structure
c) logical manner
d) cross structure
e) relational structure
Q156. Which protocol is used for transferring data and information from one network to the other network?
a) Internet Protocol
b) Transmission Control Protocol
c) File Transfer Protocol
d) Hyper-Text Transfer Protocol
e) Ethernet Protocol
Q157. What does ios ate mean as an argument in ofstream in C++ ?
a) Open file for read access only
b) Open file, create
c) Open file, but do not create
d) Open file, set the position to the end
e) Open file, for write access only
Q158. An object-oriented database does not depend upon …… for interactions.
a) data dictionary
b) Oracle
c) SQL
d) index
e) DBMS
Q159. What is a brownout in an electrical supply system?
a) A slightly elevated voltage lasting from seconds to minute.
b) Alternating power out, power on lasting a few minutes.
c) Has nothing to do with electricity.
d) Complete power out lasting a few minutes.
e) A slightly decreased voltage lasting from seconds to minutes or more.
Q160. Which common backstage view task creates a PDF file from an existing file?
a) Export
b) Account
c) Create
d) Options
e) Info
Q161. Which device operates at the internet layer of the TCP/IP model?
a) Switch and Hub
b) Router
c) Switch
d) PBX
e) Firewall
Q162. A coding scheme recognized by system software for representing organizational data best defines a
a) data type
b) data size
c) tuple
d) hyperlink
e) hashing algorithms
Q163. Which phase of the SDLC involves converting to the new system?
a) Systems design
b) Systems implementation
c) Systems analysis
d) Systems development
e) Other than those mentioned as options
Q164. What is the purpose of ARP?
a) To resolve know IP addresses to unknown physical addresses.
b) To resolve domain names to unknown IP addresses.
c) To resolve MAC addresses and NetBIOS names to IP addresses.
d) To resolve known MAC addresses to unknown IP addresses.
e) To resolve NetBIOS names to IP addresses.
Q165. In Java, communication between objects is done by
a) calling a method
b) creating a class hierarchy
c) defining a Java class
d) creating a class
e) running a program
Q166. Which of the following CASE tools generate reports that help you identify possible inconsistencies, redundancies and omissions in diagrams, forms and reports?
a) Form generators
b) Report generators
c) Diagramming tools
d) Analysis tools
e) Documentation generators
Q167. An attribute whose value is unique across all occurrences
a) primary key
b) recursive key
c) join attribute
d) data marker
e) single-valued key
Q168. AN IP protocol field of 0 × 06 indicates that IP is carrying what as its payload?
a) UDP or IGRP
b) UDP
c) ICMP
d) TCP
e) IGRP
Q169. A named set of table rows stored in a contiguous section of secondary memory best describes a
a) entity
b) collection
c) physical file
d) pointer
e) relation
Q170. Which of the following attributes makes TCP reliable?
a) Connectionless establishment
b) Low overhead and Null sessions
c) Null sessions
d) Connection establishment
e) Low overhead
Q171. Which shortcut will create a new folder in a Windows folder?
a) Ctrl + C
b) Ctrl + Shift + N
c) Ctrl + V
d) Ctrl + Alt
e) Ctrl + O
Q172. Which of the following is not a benefit of networks?
a) Increased data integrity
b) Sharing of peripheral devices
c) Sharing of programs and data
d) Access to databases
e) Better communications
Q173. Which type of software is best used with specific questions to verify hypotheses?
a) Data fusion tools
b) Intelligent agents
c) Data cleansing tools
d) Query and reporting tools
e) Multidimensional-analysis tools
Q174. Which method of database recovery involves undoing unwanted changes to the database, such as undoing a partially completed transition interrupted by a power failure?
a) Rollforward
b) Mirroring
c) Reprocessing
d) Rollback
e) Other than those given as options
Q175. What is the default maximum number of processes that can exist in Linux (with a 32-bit platform)?
a) 1024
b) 32768
c) Unlimited
d) 4096
e) 99999
Study Kit for IBPS Specialist Officer Exam
Q176. The network database model uses
a) rows and fields
b) data elements
c) keys
d) records and sets
e) data dictionary
Q177. ………. Is a communication medium where data are transformed into light pulses.
a) Twisted-pair cable
b) Optical fibre
c) Coaxial cable
d) Copper cable
e) Satellite
Q178. ……….. is a computer with a web server that serves the pages for one or more websites.
a) Portal
b) backbone
c) Business Service Provider
d) Host
e) Gateway
Q179. the database management software creates and reads the data dictionary to ascription what ………. exits and checks to see if specific users have the proper access rights to view them.
a) data element definitions
b) schema objects
c) meta data
d) reference keys
e) metadata and data element definitions
Q180. the foreign key is not necessarily the …… in its current table.
a) report generator
b) foreign key
c) primary key
d) data dictionary
e) schema objects
Q181. Hierarchical databases do not use ……. As relational databases do for searching procedures.
a) indexes
b) primary key
c) database dictionary
d) rows and columns
e) foreign key
Q182. A/an …….. can shield electronic equipment for power spikes.
a) UPS
b) surge protector
c) firewall
d) encryption program
e) antivirus
Q183. If there are no functional dependencies between two (or more) non-primary key attributes, this describes
a) third normal form
b) fifth normal form
c) second normal form
d) first normal form
e) fourth normal form
Q184. ………… is a special field value, distinct from 0, blank or any other value, that indicates that the value for the field is missing or otherwise unknown.
a) BLOB value
b) Designated value
c) Null value
d) Hashed value
e) Non specific value
Q185. The concept of ‘zero administration’ is associated with
a) Desktop computers
b) Mini computers
c) PDAs and organisers
d) Portable computers
e) Network computers
Q186. Collecting personal information and effectively posing as another individual is a crime known as
a) Spoofing
b) Identity theft
c) Hacking
d) Personality theft
e) Spooling
Q187. A relational database model uses ………… to contain and organize information.
a) records and fields
b) image, audio, documents
c) columns and rows
d) foreign key
e) data dictionary
Q188. Which of the following forms is used specifically to identify the entity created when encapsulating data inside data link layer headers and trailers?
a) Packet
b) Segment
c) Data
d) Chunk
e) Frame
Q189. Which of the following is a valid class declaration in C++ ?
a) Class B {}
b) public class A {}
c) Class B {} and public class A {}
d) Class A {int x:};
e) Object A {int x.};
Q190. ………… is a device that have been customized to perform few specialized computing tasks well with minimal effort.
a) Dedicate appliance
b) Information appliance
c) Shopping bot
d) Server appliance
e) Substandard device
Q191. A good example of an operating system that makes your computer function and controls the working environment is
a) Microsoft Account
b) File explorer
c) Microsoft Office 2013
d) Windows 8
e) Task Manager
Q192. ………….. are used to refer to Java methods or variables that belongs to other classes.
a) Simple names
b) Keywords
c) External names
d) Qualified names
e) Method calls
Q193. Which connectionless protocol is used for its low overhead and speed?
a) ARP
b) TCP & ARP
c) ICMP
d) UDP
e) TCP
Q194. Which spread spectrum technology does the BO2.11b standard define for operation?
a) IR, FHSS and DSSS
b) DSSS
c) DSSS and FHSS
d) FHSS
e) IR
Q195. Which of the following ensures that only authorized users can use or apply specific software applications?
a) Servicelevel agreement
b) Access log
c) Dongle
d) Private key
e) Authorised program analysis report
Q196. ………….. is an attempt to make a machine or network resource unavailable to its intended users, such as to temporarily or indefinitely interrupt or suspend service of a host connected to the internet due to bombardment of fake traffic.
a) Cracking
b) A Trojan horse
c) A virus
d) A denial of service attack
e) A worm
Q197. Which of the following best supports communication availability, acting as a counter-measure to the vulnerability of component failure?
a) Integrated corrective network controls
b) Simple component redundancy
c) High network throughput rate
d) Careful network monitoring with a dynamic real-time alerting system
e) Other than those given as options
Q198. Data transmission technologies vary. Which one does Ethernet use?
a) CSMA/CS
b) CSMA/CA or CSMA/CS
c) CSMA/CD
d) CSMA/CD
e) CSMA/CA
Q199. Applications communicate with kernel by using
a) unit calls
b) shell script
c) system calls
d) shell
e) C programs
Q200. In which of the following office applications, can you name a file at the same time you create it?
a) Access
b) PowerPoint
c) Paint
d) Word
e) Excel