Ibps Specialist Officer IT Sample Questions And Answers - Part 1 2015
Here are 20 sample questions that are asked in IBPS specialist officers IT exam.Q: The special gateway which prevents external users from accessing resources on the LAN users from accessing the external informaion is known as
1) Firewall
2) Encryption
3) Repeater
4) Hub
5) None of these
Answer : 1
Q: The name given to exchange of control signals that is necessary to establish a connection between modem & computer at line's one end and another modem and computer at the other end is called as
1) Modem options
2) Protocol
3) Handshaking
4) All of these
5) None of these
Answer: 3
Q: The SQL command which is used to changes data in a table is
1) INSERT
2) BROWSE
3) UPDATE
4) APPEND
5) None of these
Answer: 3
Q: Which command is not a data definition language command in SQL
1) RENAME
2) REVOKE
3) GRANT
4) UPDATE
5) None of these
Answer: 4
Q: The command Which is used to redefine a column of the table in SQL is called as
1) DEFINE TABLE
2) MODIFY TABLE
3) ALTER TABLE
4) ALL of the these
5) None of these
Answe: 3
Q: The Data security threats includes
1) Hardware failure
2) Privacy invasion
3) Fraudulent manipulation of data
4) All of these
5) None of these
Answer: 4
Q: An indexing operation does
1) Sorts a file using a single key
2) Sorts file using two keys
3) Establishes an index for a file
4) Both 1 and 3
5) None of these
Answer: 4
Q: Language used in application programs to request data(s) from DBMS is called as
1) Query language
2) DDL
3) DM
4) DCL
5) None of these
Answer : 1
Q: Which contains the smallest unit of useful data, which we call as basic building block for a data
1) Fields
2) File structures
3) Records
4) Database
5) None of these
Answer: 1
Q: One record in a record type which is related to only one particular record of an another record type is called as
1) One to one relationship
2) Many toone relationship
3) One to many relationship
4) Many to many relationship
5) None of these
Answer: 1
Q: With linked list you can implement
1) Stack
2) Graph
3) Queue
4) All of these
5) None of these
Answer: 4
Q: Heap allows very efficient implementation of
1) Stack
2) Trees
3) Doubled ended queue
4) Priority queue
5) None of these
Answer: 4
Q: There is a key which is associated with each record and it is used to differentiate among different records in a file. In every file, at least one set of keys which is unique. That key is known as
1) Unique key
2) Prime attribute
3) Index key
4) Primary Key
5) Null key
Anwer: 4
Q: Which is used for mapping host names and email destinations to IP address and it can also be used for some other purposes.
1) TCP(transfer control protocol)
2) DNS(Domain Name System)
3) SHA (Secure Hash Algorithm)
4) Simple Network Management Protocol (SNMP)
5) None of these
Answer: 2
Q: The method Override is used for
1) An operation which replaces an inherited method for same operation
2) A data which replaces an inherited method for same operation
3) An operation which takes arguments form the library function
4) All of these
5) None of these
Answer : 1
Q: Local variables are
1) created outside a block
2) known only to that block
3) Continue to exist when their block ends
4) illegal in C++
5) None of these
Answer: 2
Q: Important application of cryptography which is used in computerized commercial & financial transaction is
1) Data mining
2) Data warehousing
3) Digital signature
4) Media convergence
5) None of these
Answer: 2
Q: Rows of relation are kown as
1) Relation
2) Tuples
3) Data structure
4) An entity
5) None of these
Answer: 2
Q: Drawbacks of the binary tree sort are remedied by
1) Linear sort
2) Quick Sort
3) Heap Sort
4) Insertion Sort
5) None of these
Answer: 3
Q: Which layer of OSI determines the interface of the system with the user?
1) Network
2) Application
3) Data link
4) Session
5) None of these
Answer: 2
No comments:
Post a Comment