Thursday, 4 December 2014

Ibps Specialist Officer IT Sample Questions And Answers - Part 1 2015 | IBPS Specialist Officer IT Question Paper Part 1 - Download

Ibps Specialist Officer  IT Sample Questions And Answers - Part 1 2015

Here are 20 sample questions that are asked in IBPS specialist officers IT exam.


Q: The special gateway which prevents external users from accessing resources on the LAN users from accessing the external informaion is known as

1) Firewall
2) Encryption
3) Repeater
4) Hub
5) None of these

Answer : 1


Q: The name given to exchange of control signals that is necessary to establish a connection between modem & computer at line's one end and another modem and computer at the other end is called as

1) Modem options
2) Protocol
3) Handshaking
4) All of these
5) None of these

Answer: 3

Q: The SQL command which is used to changes data in a table is

1) INSERT
2) BROWSE
3) UPDATE
4) APPEND
5) None of these

Answer: 3

Q: Which command is not a data definition language command in SQL
1) RENAME
2) REVOKE
3) GRANT
4) UPDATE
5) None of these

Answer: 4

Q: The command Which is used to redefine a column of the table in SQL is called as

1) DEFINE TABLE
2) MODIFY TABLE
3) ALTER TABLE
4) ALL of the these
5) None of these

Answe: 3

Q: The Data security threats includes

1) Hardware failure
2) Privacy invasion
3) Fraudulent manipulation of data
4) All of these
5) None of these

Answer: 4

Q: An indexing operation does

1) Sorts a file using a single key
2) Sorts file using two keys
3) Establishes an index for a file
4) Both 1 and 3
5) None of these

Answer: 4

Q: Language used in application programs to request data(s) from DBMS is called as

1) Query language
2) DDL
3) DM
4) DCL
5) None of these

Answer : 1

Q: Which contains the smallest unit of useful data, which we call as basic building block for a data

1) Fields
2) File structures
3) Records
4) Database
5) None of these

Answer: 1

Q: One record in a record type which is related to only one particular record of an another record type is called as

1) One to one relationship
2) Many toone relationship
3) One to many relationship
4) Many to many relationship
5) None of these

Answer: 1

Q: With linked list you can implement

1) Stack
2) Graph
3) Queue
4) All of these
5) None of these

Answer: 4

Q: Heap allows very efficient implementation of

1) Stack
2) Trees
3) Doubled ended queue
4) Priority queue
5) None of these

Answer: 4

Q: There is a key which is associated with each record and it is used to differentiate among different records in a file. In every file, at least one set of keys which is unique. That key is known as

1) Unique key
2) Prime attribute
3) Index key
4) Primary Key
5) Null key

Anwer: 4

Q: Which is used for mapping host names and email destinations to IP address and it can also be used for some other purposes.

1) TCP(transfer control protocol)
2) DNS(Domain Name System)
3) SHA (Secure Hash Algorithm)
4) Simple Network Management Protocol (SNMP)
5) None of these

Answer: 2

Q: The method Override is used for

1) An operation which replaces an inherited method for same operation
2) A data which replaces an inherited method for same operation
3) An operation which takes arguments form the library function
4) All of these
5) None of these

Answer : 1

Q: Local variables are

1) created outside a block
2) known only to that block
3) Continue to exist when their block ends
4) illegal in C++
5) None of these

Answer: 2

Q: Important application of cryptography which is used in computerized commercial & financial transaction is

1) Data mining
2) Data warehousing
3) Digital signature
4) Media convergence
5) None of these

Answer: 2

Q: Rows of relation are kown as

1) Relation
2) Tuples
3) Data structure
4) An entity
5) None of these

Answer: 2

Q: Drawbacks of the binary tree sort are remedied by

1) Linear sort
2) Quick Sort
3) Heap Sort
4) Insertion Sort
5) None of these

Answer: 3

Q: Which layer of OSI determines the interface of the system with the user?
1) Network
2) Application
3) Data link
4) Session
5) None of these

Answer: 2

No comments:

Post a Comment