33
1. The _____ states that a foreign key must either match a primary key value in another relation or it must be null. (a) entity integrity rule (b) referential integrity constraint (c) action assertion (d) composite attribute (e) None of these 2. An applet __________ (a) is an interpreted program that runs on the client (b) tracks the number of visitors to a Website (c) is a compiled program that usually runs on the client (d) collects data from visitors to a Website (e) None of these 3. A _____ sometimes called a boot sector virus, executes when a computer boots up because it resides in the boot sector of a floppy disk or the master boot record of a hard disk. (a) system virus (b) Trojan horse virus (c) file virus (d) macro virus (e) None of these 4. Which error detection method uses one's complement arithmetic? (a) Simply parity check

Bank IT Officer Paper

Embed Size (px)

Citation preview

Page 1: Bank IT Officer Paper

1. The _____ states that a foreign key must either match a primary key value in another relation or it must be null.

(a) entity integrity rule

(b) referential integrity constraint

(c) action assertion

(d) composite attribute

(e) None of these

2. An applet __________

(a) is an interpreted program that runs on the client

(b) tracks the number of visitors to a Website

(c) is a compiled program that usually runs on the client

(d) collects data from visitors to a Website

(e) None of these

3. A _____ sometimes called a boot sector virus, executes when a computer boots up because it resides in the boot sector of a floppy disk or the master boot record of a hard disk.

(a) system virus

(b) Trojan horse virus

(c) file virus

(d) macro virus

(e) None of these

4. Which error detection method uses one's complement arithmetic?

(a) Simply parity check

(b) Checksum

(c) Two-dimensional parity check

(d) CRC

(e) None of these

Page 2: Bank IT Officer Paper

5. A result of a computer virus can not lead to ___.

(a) Disk Crash

(b) Mother Board Crash

(c) Corruption of program

(d) Deletion of files

(e) None of these

6. The network interface card of LAN is related to following layer of OSI Model-

(a) Transport

(b) Network

(c) Data Link

(d) Physical

(e) All of these

7. Which of the following does not describe a data warehouse?

(a) Subject-oriented

(b) Integrated

(c) Time-variant

(d) Updateable

(e) None of these

8. Which of the following is true ?

(a) Logical design is software-dependent

(b) In a distributed database, database is stored in one physical location

(c) Conceptual design translates the logical design into internal model

(d) Logical design is software independent

(e) None of these

9. A range check _____

Page 3: Bank IT Officer Paper

(a) ensures that only the correct data type is entered into a field

(b) verifies that all required data is present

(c) determines whether a number is within a specified limit

(d) tests if the data in two or more associated fields is logical

(e) None of these

10. The total set of interlinked hypertext documents worldwide is-

(a) HTTP

(b) Browser

(c) WWW

(d) B2B

(e) None of these

11. With the object-oriented (OO) approach, an object encapsulates, or_____.a programmer.

(a) carries out, the details of an object for

(b) hides, the details of an object from

(c) reveals, the details of an object to

(d) extends, the details of an object beyond

(e) None of these

12. Every computer connected to an intranet or extranet must have a distinct_____

(a) firewall

(b) proxy server

(c) IP address

(d) domain name

(e) None of these

13. A table of bits in which each row represents the distinct values of a key?

(a) Join index

Page 4: Bank IT Officer Paper

(b) Bitmap index

(c) B + Tree

(d) Hierarchical index

(e) None of these

14. The degree of detail that should be incorporated into a database depends on what?

(a) Data integrity

(b) The type of database

(c) The user's perspective

(d) The business practices and policies

(e) None of these

15. The ___.converts digital signals to analog signals for the purpose of transmitting data over telephone lines.

(a) Modem

(b) Router

(c) Gateway

(d) Bridge

(e) All of these

16. Before a package can be used in a java program it must be___.

(a) executed

(b) referenced

(c) imported

(d) declared

(e) None of these

17. Choose the correct way to indicate that a line in a C++ program is a comment line, that is, a line the will not be executed as an instruction___.

(a) begin the line with a # sign

Page 5: Bank IT Officer Paper

(b) begin the line with double slashes (/ /)

(c) begin and end the line with double hyphens (-_-)

(d) indent the line

(e) None of these

18. Programming language built into user programs such as Word and Excel are known as____

(a) 4GLs

(b) macro languages

(c) object-oriented languages

(d) visual programming languages

(e) None of these

19. Firewalls are used to protect against___.

(a) Unauthorized Attacks

(b) Virus Attacks

(c) Data Driven Attacks

(d) Fire Attacks

(e) All of these

20. This is a standard way for a Web server to pass a Web user's request to an application program and to receive data back to forward to the user-

(a) Interrupt request

(b) Forward DNS lookup

(c) Data-Link layer

(d) File Transfer Protocol

(e) Common gateway interface

21. Three SQL, DDL, CREATE commands are__.

(a) Schema, Base and Table

Page 6: Bank IT Officer Paper

(b) Base, Table and Schema

(c) Key, Base and Table

(d) Schema, Table and View

(e) None of these

22. Data are ________ in client/server computing.

(a) never sent to the client machine

(b) sent in very large sections to save processing time

(c) sent only upon the client's request

(d) sent in complete copies for the client to filter and sort

(e) sent from the client to the server for processing

23. Which of the following will not eliminates the ambiguities of a null value?

(a) Define the attribute as required

(b) Define subtypes

(c) Define each attribute as having an initial value that is recognized as blank

(d) Define supertypes

(e) None of these

24. The____directory is mandatory for every disk.

(a) Root

(b) Base

(c) Sub

(d) Case

(e) None of these

25. This is a group of servers that share work and may be able to back each other up if one server fails.

(a) Channel bank

(b) Cluster

Page 7: Bank IT Officer Paper

(c) Tiger team

(d) Serverless backup

(e) Logical unit

ANSWERS

1. (a) (c) (e) (b) (b)

6. (e) (d) (a) (c) (a)

11. (b) (c) (b) (b) (a)

16. (c) (b) (d) (a) (e)

21. (d) (c) (d) (c) (b)

1. The model which provides a concrete expression of these concepts by means of two fundamental ideas — logical records and links, is called a

A. relationship modelB. network modelC. hicrachical modelD. none of the above

2. The network model has been established by

A. CODASYL committeeB. IBMC. ECAD. none of the above

3. A link may be defined as the representation of an

A. objects B, programsC. association D. none of the above

4. DML is intended provide operations which ope- rate upon data stored in the

A, file B. recordC. database

Page 8: Bank IT Officer Paper

D. none of the above

5. In the hierarchical model a hierarchical schema is defined by a tree whose nodes are

A. database B. logical record typesC. links D. none of the above

6. The set of all values in the relations represents the contents of the

A. database B. record fileC. table D. none of the above

7. In hierarchical data model, the database is represented by

A. a directed graph B. tree structuresC. relation D, none of the above

8. A Database Management System (DBMS) is a software system capable of supporting and managing any number of independent

A. resultsB. relationsc. none of the above

9. Support for data independence is arguably the most important feature of a

A system B. database systemC. relation D. none of the above

10. Distinct levels of data independence arc

A. two B. threeC. four D. none of the above

Page 9: Bank IT Officer Paper

11. Database software may be divided into

A. four distinct categoriesB. three distinct categoriesC. two distinct categoriesD. none of the above

12. Any large software project may be divided into several

A. project phasesB. sub projectsC. hardware D. none of the above

13. Data modeling occupies an important position in the

A. database file B. database life cycleC. relation D. none of the above

14. The term "software engineering" implies the application of scientific knowledge and discipline to the construction of

A. database recordB. computer hardware systemC. computer software systemD. none of the above

15. Program correctness has been a strong motivation for much of the work in software engineering and

A. high-level language programmingB. programming language designC. PascalD. none of the above

ANS:1. B

2. A

3. B

4. B

Page 10: Bank IT Officer Paper

5. B

6. A

7. B

8. C

9. Do Yourselves

10. Do Yourselves

11. B

12. A

13. B

14. C

15. B

1. The _____ states that a foreign key must either match a primary key value in another relation or it must be null.

(a) entity integrity rule

(b) referential integrity constraint

(c) action assertion

(d) composite attribute

(e) None of these

2. An applet __________

(a) is an interpreted program that runs on the client

(b) tracks the number of visitors to a Website

(c) is a compiled program that usually runs on the client

(d) collects data from visitors to a Website

Page 11: Bank IT Officer Paper

(e) None of these

3. A _____ sometimes called a boot sector virus, executes when a computer boots up because it resides in the boot sector of a floppy disk or the master boot record of a hard disk.

(a) system virus

(b) Trojan horse virus

(c) file virus

(d) macro virus

(e) None of these

4. Which error detection method uses one’s complement arithmetic?

(a) Simply parity check

(b) Checksum

(c) Two-dimensional parity check

(d) CRC

(e) None of these

5. A result of a computer virus can not lead to ___.

(a) Disk Crash

(b) Mother Board Crash

(c) Corruption of program

(d) Deletion of files

(e) None of these

6. The network interface card of LAN is related to following layer of OSI Model-

(a) Transport

(b) Network

(c) Data Link

Page 12: Bank IT Officer Paper

(d) Physical

(e) All of these

7. Which of the following does not describe a data warehouse?

(a) Subject-oriented

(b) Integrated

(c) Time-variant

(d) Updateable

(e) None of these

8. Which of the following is true ?

(a) Logical design is software-dependent

(b) In a distributed database, database is stored in one physical location

(c) Conceptual design translates the logical design into internal model

(d) Logical design is software independent

(e) None of these

9. A range check _____

(a) ensures that only the correct data type is entered into a field

(b) verifies that all required data is present

(c) determines whether a number is within a specified limit

(d) tests if the data in two or more associated fields is logical

(e) None of these

10. The total set of interlinked hypertext documents worldwide is-

(a) HTTP

(b) Browser

(c) WWW

(d) B2B

Page 13: Bank IT Officer Paper

(e) None of these

11. With the object-oriented (OO) approach, an object encapsulates, or_____.a programmer.

(a) carries out, the details of an object for

(b) hides, the details of an object from

(c) reveals, the details of an object to

(d) extends, the details of an object beyond

(e) None of these

12. Every computer connected to an intranet or extranet must have a distinct_____

(a) firewall

(b) proxy server

(c) IP address

(d) domain name

(e) None of these

13. A table of bits in which each row represents the distinct values of a key?

(a) Join index

(b) Bitmap index

(c) B + Tree

(d) Hierarchical index

(e) None of these

14. The degree of detail that should be incorporated into a database depends on what?

(a) Data integrity

(b) The type of database

(c) The user’s perspective

Page 14: Bank IT Officer Paper

(d) The business practices and policies

(e) None of these

15. The ___.converts digital signals to analog signals for the purpose of transmitting data over telephone lines.

(a) Modem

(b) Router

(c) Gateway

(d) Bridge

(e) All of these

16. Before a package can be used in a java program it must be___.

(a) executed

(b) referenced

(c) imported

(d) declared

(e) None of these

17. Choose the correct way to indicate that a line in a C++ program is a comment line, that is, a line the will not be executed as an instruction___.

(a) begin the line with a # sign

(b) begin the line with double slashes (/ /)

(c) begin and end the line with double hyphens (-_-)

(d) indent the line

(e) None of these

18. Programming language built into user programs such as Word and Excel are known as____

(a) 4GLs

(b) macro languages

Page 15: Bank IT Officer Paper

(c) object-oriented languages

(d) visual programming languages

(e) None of these

19. Firewalls are used to protect against___.

(a) Unauthorized Attacks

(b) Virus Attacks

(c) Data Driven Attacks

(d) Fire Attacks

(e) All of these

20. This is a standard way for a Web server to pass a Web user’s request to an application program and to receive data back to forward to the user-

(a) Interrupt request

(b) Forward DNS lookup

(c) Data-Link layer

(d) File Transfer Protocol

(e) Common gateway interface

21. Three SQL, DDL, CREATE commands are__.

(a) Schema, Base and Table

(b) Base, Table and Schema

(c) Key, Base and Table

(d) Schema, Table and View

(e) None of these

22. Data are ________ in client/server computing.

(a) never sent to the client machine

(b) sent in very large sections to save processing time

(c) sent only upon the client’s request

Page 16: Bank IT Officer Paper

(d) sent in complete copies for the client to filter and sort

(e) sent from the client to the server for processing

23. Which of the following will not eliminates the ambiguities of a null value?

(a) Define the attribute as required

(b) Define subtypes

(c) Define each attribute as having an initial value that is recognized as blank

(d) Define supertypes

(e) None of these

24. The____directory is mandatory for every disk.

(a) Root

(b) Base

(c) Sub

(d) Case

(e) None of these

25. This is a group of servers that share work and may be able to back each other up if one server fails.

(a) Channel bank

(b) Cluster

(c) Tiger team

(d) Serverless backup

(e) Logical unit

ANSWERS

1. (a) (c) (e) (b) (b) 6. (e) (d) (a) (c) (a) 11. (b) (c) (b) (b) (a) 16. (c) (b) (d) (a) (e) 21. (d) (c) (d) (c) (b)

Page 17: Bank IT Officer Paper

Programming Languages and Language Processors Set 1.

 

Questions

Question 1:

Electronic spreadsheets are most useful in a situation where relatively .... data must be input but ...... calculations are requied.

a. little; simple

b. large; simple

c. large; complex

d. little; complex

 

Question 2:

The two basic types of record access methods are

a. sequential and randon

b. direct and immediate

c. sequential and indexed

d. on-line and real-time

e. none of above

 

Question 3:

Which file organization is allowed by a direct access storage device?

a. direct only

b. sequential and direct only

c. indexed and direct only

d. sequential, indexed and direct

e. none of above

Page 18: Bank IT Officer Paper

 

Question 4:

Sequential file organization is most appropriate for which of following applications?

a. Grocery store checkout

b. bank checking account

c. payroll

d. airline reservations

e. none of above

 

Question 5:

Which of the following file organization is most effieient for a file with a high degree of file activity?

a. sequential

b. ISAM

c. VSAM

d. B-Tree

e. All of above

 

Question 6:

One disadvantage of a direct access file is:

a. the delay in computiong the storage address

b. duplication of address locations

c. unsued, but available, storage locations

d. all of above

 

Question 7:

All computers execute

Page 19: Bank IT Officer Paper

a. BASIC programs

b. COBOL programs

c. Machine language program

d. FORTRAN programs

e. PL/1 programs

 

Question 8:

Which of the following is most oriented to scientific programming?

a. FORTRAN

b. COBOL

c. BASIC

d. PL/1

e. RPG

 

Question 9:

All of the following are disadvantage of RPG except:

a. it is a very machine dependent language

b. it is very limited in scope

c. is not suited for complex problems requiring extensive programming logic

d. it has larger storage requierments

e. all of the above are disadvantages

 

Question 10:

Which of the following is not one of the process that a high level language program msut go through before it is ready to be executed?

a. translation

b. controlling

Page 20: Bank IT Officer Paper

c. lading

d. linking

e. all of the above are necessary process

 

Answers:

1. d     2. a     3. d     4. c     5. a     6. a     7. c   8. a     9. b.     10.a

Programming Languages and Language Processors Set 2.

 

Questions

Question 1:

Which of the following is not true of FORTRAN?

a. it was developed for scientific and mathematical applications

b. it is one of the oldest high-level languages

c. it is a problem oriented language

d. it requires extensive internal documentation

e. all of above

 

Question 2:

All of the following are divisions of the COBOL program except:

a. input-output

b. indentification

c. procedure

d. data

e. all of above divisions

 

Question 3:

Page 21: Bank IT Officer Paper

In a COBOL program, the input output section is within the .... division

a. identification

b. procedure

c. configuration

d. environment

e. none of above

 

Question 4:

Which of hte following is not characteristic of COBOL

a. it is a very standardized language

b. it is a very efficient in terms of coding and execution

c. it has limited facilities for mathematical notation

d. it is very readable language

e. all of the above are characteristics

 

Question 5:

Which of the following is an example of problem oriented language?

a. BASIC

b. PL/1

c. FORTRAN

d. All of above

e. none of above

 

Question 6:

In the evaluation of a computer language, all of the following characteristics should be considered except?

a. application oriented features

Page 22: Bank IT Officer Paper

b. efficiency

c. readability

d. softare development aids

e. hardware maintainance costs

 

Question 7:

A factor in the selection of a source language is 

a. programmer skill

b. language availability

c. program compatibility with other software

d. all of athe above

 

Question 8:

A computer generated output that lets programmer follow the execution of their programs line by line is a 

a. core dump

b. trace routine

c. detail listing

d. source listing

 

Question 9:

In BASIC, description comments are put in the source program with the 

a. PRINT statement

b. REMARK statement

c. INPUT statement

d. DATA statement

 

Page 23: Bank IT Officer Paper

Question 10:

Which of the following generations of language will likely include the languages of the featuer?

a. first generation

b. second dgeneration or third generation

c. fourth generation

d. fifth generation

 

Answers:

1. b       2.a       3.d       4.b       5.d       6.e       7.d      8.b       9.b       10.c

Page 24: Bank IT Officer Paper

1. The _____ states that a foreign key must either match a primary key value in another relation or it must be null.

(a) entity integrity rule

(b) referential integrity constraint

(c) action assertion

(d) composite attribute

(e) None of these

2. An applet __________

(a) is an interpreted program that runs on the client

(b) tracks the number of visitors to a Website

(c) is a compiled program that usually runs on the client

(d) collects data from visitors to a Website

(e) None of these

3. A _____ sometimes called a boot sector virus, executes when a computer boots up because it resides in the boot sector of a floppy disk or the master boot record of a hard disk.

(a) system virus

(b) Trojan horse virus

(c) file virus

(d) macro virus

(e) None of these

4. Which error detection method uses one's complement arithmetic?

(a) Simply parity check

(b) Checksum

(c) Two-dimensional parity check

(d) CRC

(e) None of these

Page 25: Bank IT Officer Paper

1. What do you understand by 'Authentication' and 'Encryption' in the context of system

security? In this context explain

(i) Kerberos

(ii) IP Security

(iii) RSA Encryption

2.Write short notes on each of the following:

(a) Trojan Horse

(b) Smart Cards

3. Write short notes on each of the following:

(a) Trojan Horse

(b) Smart Cards

(c) Physical threats and security

(d) PGP

4. Explain the DMA controller with block diagram. What is meant by a block transfer?

What are the various phases of an instruction cycle ? Give the micro operation of fetch and

decode phases

Compare Static RAM with Dynamic RAM.

5. Using NAND gate generate the AND and NOR functions

6. Which of the following services should be enabled in a secure workstation connected in an

Ethernet LAN ? Give reasons for your answer.

Anacron, ftp, netfs, nfs, telnet, sendmail, SSH, syslog, SNMP, time. (Assume the LAN is

connected to the Internet but is not connected via Firewall nor is Kerberos used).

7. What is a Socket ? Write two differences between a TCP Socket and a UDP Socket.

8. What are the standard port numbers for (i) Web Server (ii) Mail Server (iii) FTP Server (iv)

Telnet ?

9 What is Network Address Translation (NAT) ? Give any two advantages and two

disadvantages of NAT.

10 What is VPN ? How is it useful for an organization ?

11. What is a Search Engine ? How is it useful for Internet/Intranet ? Give the names of any

four Search engines.

12 What is WAP ? Give any two advantages and two limitations of WAP. Also explain its

layered architecture.

Page 26: Bank IT Officer Paper

Q1. What is Client-server Computing?

Ans: The short answer: Client/server is a computational architecture that involves client processes

requesting service from server processes.

The long answer: Client/server computing is the logical extension of modular programming.

Modular programming has as its fundamental assumption that separation of a large piece of software into its constituent parts (“modules”) creates the possibility for easier development and better maintainability.

Client/server computing takes this a step farther

by recognizing that those modules need not all be executed within the same memory space.

With this architecture, the calling module becomes the “client” (that which requests a service), and the called module becomes the “server” (that which provides the service).

The logical extension of this is to have clients and servers running on the appropriate hardware and software platforms for their functions.

For example, database management system servers running on platforms specially designed and configured to perform queries, or file servers running on platforms with special elements for managing files.

It is this latter perspective that has created the widely-believed myth that client/server has something to do with PCs or Unix machines.

Q2 What is a Client process?

Ans: The client is a process (program) that sends a message to a server process (program), requesting that the server perform a task (service). Client programs usually manage the user-interface portion of the application, validate data entered by the user,

dispatch requests to server programs, and sometimes execute business logic. The client-basedprocess is the front- end of the application that the user sees and interacts with.

The client process contains solution-specific logic and provides the interface between the user and the rest of the application system.

The client process also manages the local resources that the user interacts with such as the monitor, keyboard, workstation CPU and peripherals. One of the key elements of a client workstation is the graphical user interface (GUI).

Page 27: Bank IT Officer Paper

Normally a part of operating system i.e. the window manager detects user actions, manages the windows on the display and displays the data in the windows.

Q3 What is a Server process?

Ans : A server process (program) fulfills the client request by performing the task requested.

Server programs generally receive requests from client programs, execute database retrieval and updates, manage data integrity and dispatch responses to client requests. Sometimes server programs execute common or complex business logic.

The server-based process “may” run on another machine on the network. This server could be the host operating system or network file server; the server is then provided both file system services and application services. Or in some cases, another desktop machine provides the application services.

The server process acts as a software engine that manages shared resources such as databases, printers, communication links, or high powered-processors. The server process performs the back-end tasks that are common to similar applications.

Q4 What is a Two-Tier Architecture?

Ans : A two-tier architecture is where a client talks directly to a server, with no intervening server.

It is typically used in small environments (less than 50 users). A common error in client/server development is to prototype an application in a small, two-tier environment, and then scale up by simply adding more users to the server.

This approach will usually result in an ineffective system, as the server becomes overwhelmed. To properly scale to hundreds or thousands of users, it is usually necessary to move to a three-tier architecture.

Q5 What is a Three-Tier Architecture?

A three-tier architecture introduces a server (or an “agent”) between the client and the server. The role of the agent is manyfold.

It can provide translation services (as in adapting a legacy application on a mainframe to a client/server environment), metering services (as in acting as a transaction monitor to limit the number of simultaneous requests to a given server), or intellegent agent

services (as in mapping a request to a number of different servers, collating the results, and returning a single response to the client.