92
IBPS IT Specialist Officer professional knowledge Practice -13 1. ________ refers to a family of IEEE standards dealing with local area network and metropolitan area network. (A)802 (B)800 (C)801 (D)803 (E) None of these ANS:(A) 2. Which is the general network standard for the data link layer in the OSI Refe rence Model? (A) IEEE 802.1 (B)IEEE 802.2 (C)IEEE 802.3 (D)IEEE 802.4 (E) IEEE 802.6 ANS:(B) 3. _________ uses a standard called IEEE 802.6. (A)LAN (B)WAN (C)MAN (D)Internet (E) None of these ANS:(C) 4. Repeater operates in which layer of OSI model? (A) Application Layer (B)Presentation Layer (C)Physical Layer (D)Transport Layer

sbi ques

Embed Size (px)

Citation preview

Page 1: sbi ques

IBPS IT Specialist Officer professional knowledge Practice -13 1. ________ refers to a family of IEEE standards dealing with local area network and metropolitan area network.

(A)802

(B)800

(C)801

(D)803

(E) None of these

ANS:(A)

2. Which is the general network standard for the data link layer in the OSI Reference Model?

(A) IEEE 802.1

(B)IEEE 802.2

(C)IEEE 802.3

(D)IEEE 802.4

(E) IEEE 802.6

ANS:(B)

3. _________ uses a standard called IEEE 802.6.

(A)LAN

(B)WAN

(C)MAN

(D)Internet

(E) None of these

ANS:(C)

4. Repeater operates in which layer of OSI model?

(A) Application Layer

(B)Presentation Layer

(C)Physical Layer

(D)Transport Layer

Page 2: sbi ques

(E) Data link layer

ANS:(C)

5. Where does Bridge operate in OSI model?

(A) Physical layer

(B)Data link layer

(C)Both 1 and 2

(D)Application layer

(E) None of these

ANS:(C)

6. Which of the following uses the greatest number of layers in the OSI model?

(A) Bridge

(B)Repeater

(C)Router

(D)Gateway

(E) None of these

ANS:(D)

7. Routers operate in which layer of the OSI model?

(A) Physical layer

(B)Data link layer

(C)Network layer

(D)All of these

(E) None of these

ANS:(D)

8. Modem is a _______ that modulates and demodulate signals.

(A) DCE (Data circuit terminating equipment)

(B)DTE(Data terminal equipment)

Page 3: sbi ques

(C)DTE-DCE

(D)Both 1 and 2

(E) None of these

ANS:(A)

9. A communication network which is used by large organization over regional, national or global area is called_______

(A)LAN

(B)WAN

(C)MAN

(D)Internet

(E) None of these

ANS:(B)

10. At _______ layer, TCP/�IP defines two protocols: Transmission Control Protocol (TCP) and User Datagram Protocol (UDP)

(A) Transport layer

(B)Network layer

(C)Physical layer

(D)Application layer

(E) None of these

ANS:(A)

11. The _______ layer is the layer closest to transmission medium.

(A)Transport

(B)Network

(C)Data link

(D)Physical

(E) None of these

ANS:(D)

Page 4: sbi ques

12. End to end connectivity is provided from host to host in:

(A) Network layer

(B)Session layer

(C)Data link layer

(D)Transport layer

(E) None of these

ANS:(D)

13. Which of the following TCP/IP protocol is used for transferring electronic mail messages from one machine to another?

(A) SNMP

(B)SMTP

(C)RPC

(D)FTP

(E) None of these

ANS:(B)

14. Which of the following is an example of a client server model?

(A) FTP

(B)DNS

(C)TELNET

(D)All of these

(E) None of these

ANS:(D)

15. Which IEEE standards is used for Wi/Fi system?

(A)802.11

(2B802.1

(3C802.2

(4D802.3

Page 5: sbi ques

(5)E802.10

ANS:(A)

16. __________ is the continuous ability to send and receive data between interconnected networks

(A) FTP

(B)SMTP

(C)TNS

(D)Network Interoperability

(E) None of these

ANS:(D)

17. What is the default subnet mask for a class B network?

(A) 127.0.0.1

(B)255.0.0.0

(C)255.255.0.0

(D)255.255.255.0

(E) None of these

ANS:(C)

18. What is loopback address?

(A) 127.0.0.1

(B)255.0.0.0

(C)255.255.0.0

(D)127.0.0.0

(E) None of these

ANS:(A)

19. Internet like network within enterprises.

(A)Intranet

(2BSwitching alternating

Page 6: sbi ques

(3)Cnter organization networks

(4)Dxtranets

(5) Eone of these

ANS:(A)

20. A central computer surrounded by one or more satellite computers is called a

(A) Bus network

(B)Ring network

(C)Star network

(D)All the above

(E) None of these

ANS:(C)

21. With an IP address of 100, you currently have 80 subnets. What subnet mask should you use to maximize the number of available hosts?

(A) 192

(B)240

(C)248

(D)224

(E) 252

ANS:(E)

22. Encryption/decryption provides a network with __________

(A)Privacy

(B)Authenticity

(C)Contiguity

(D)on-repudiation

(E) None of these

ANS:(A)

Page 7: sbi ques

23. The data to be encrypted at the sender site is called ______. The data to be decrypted at receiver end is called _________.

(A) Secret key, public key

(B)Public key, secret key

(C)Plaintext, cipher text

(D)Cipher text, plaintext

(E) None of these

ANS:(C)

24. In digital signature the private key is used for ______ and the public key for ______.

(A) Encryption, decryption

(B)Decryption, encryption

(C)Plaintext, cipher text

(D)Cipher text, plaintext

(E) None of these

ANS:(A)

25. A __________ -�s main purpose is to prohibit unauthorized access to your computer via the Internet.

(A) Popup blocker

(B)Firewall

(C)Spyware

(D)Spam assassin

(E) None of these

ANS:(B)

26. To create a copy files in the event of system failure, you create a ________.

(A) Firewall

(B)Redundancy

(C)Backup

Page 8: sbi ques

(D)Restore file

(E) None of these

ANS:(C)

27. Print server uses _______ which is a buffer that holds before it is send to the printer.

(A) Queue

(B)Spool

(C)Node

(D)Stack

(E) None of these

ANS:(B)

28. Which of the following identifies specific web page and its computer on the web page?

(A) Website

(B)URL

(C)Web site address

(D)Domain Name

(E) None of these

ANS:(D)

29. __________ is the computer to computer exchange of routine business data between trading partners in standard data formats.

(A) CTS

(B)DSR

(C)VDR

(D)EDI

(E) None of these

ANS:(D)

30. Communication handler is basically an _______ 16 bit micro controller?

Page 9: sbi ques

(A) 8085

(B)8086

(C)8086A

(D)80C186

(E) None of these

ANS:(D)

31. Which uses a pre-shared key that is more than 7 and less than 64 characters in length?

(A) WPA-PSK

(B)TKIP

(C)AES

(D)All the above

(E) None of these

ANS:(D)

32. Ping command is used for what purpose?

(A) Test a device on a network whether it is reachable

(B)Test a hard disk fault

(C)Test a bug in the application

(D)Test a device scanning quality

(E) None of these

ANS:(A)

33. Two different kind of networks can be connected by using _____

(A) Bridges

(B)Satellite

(C)Gateway

(D)Routers

(E) None of these

Page 10: sbi ques

ANS:(C)

34. Full adder is used to ______

(A) 2 bit addition

(B)3 bit addition

(C)4 bit addition

(D)6 bit addition

(E) None of these

ANS:(B)

35. Most important advantages of an IC is its __________

(A) Easy replacement in case of circuit failure

(B)Low power consumption

(C)Extremely high reliability

(D)Reduced cost

(E) None of these

ANS:(C)

36. An IC contains 50 gates each of which consists of 6 components/ It�s belong to

(A) VLSI

(B)LSI

(C)MSI

(D)SSI

(E) None of these

ANS:(C)

37. Which type of computers use the 8 bit code called EBCDIC?

(A) Mini computers

(B)Mainframe computers

(C)Super computers

Page 11: sbi ques

(D)Micro computer

(E) None of these

ANS:(B)

38. An AND gate

(A) Implement logic addition

(B)Is equivalent to a series switching circuit

(C)Is any-or all gate

(D)Is equivalent to a parallel switching circuit

(E) None of these

ANS:(B)

39. The decimal equivalent of the binary number 11100001111 is

(A) 1806

(B)1807

(C)2806

(D)All the above

(E) None of these

ANS:(B)

40. Programs in which of the following memories can�t be erased?

(A) RAM

(B)ROM

(C)Cache memory

(D)Virtual memory

(E) None of these

ANS:(B)

41. The IP address 135.0.10.27 belongs to address class?

(A) A

Page 12: sbi ques

(B)B

(C)C

(D)D

(E) None of these

ANS:(B)

42. Which are not used in case of applet?

(A)Read/write

(B)Internet

(C)Search engine

(D)All the above

(E) None of these

ANS:(A)

43. Which of the following is not a type of database?

(A) Hierarchical

(B)Relational

(C)Network

(D)Transition

(E) None of these

ANS:(D)

44. Which of the following is not a type of SQL statement?

(A) Data Manipulation Language

(B)Data Definition language

(C)Data control language

(D)Data standard language

(E) None of these

ANS:(D)

Page 13: sbi ques

45. In QUEUE, the item deleted at one end is called_____

(A) Rear

(B)Front

(C)Top

(D)Base

(E) None of these

ANS:(B)

46. The drawback of the binary tree sort are remedied by the_______

(A) Linear sort

(B)Heap sort

(C)Insertion sort

(D)Quick sort

(E) None of these

ANS:(B)

47. White Box testing a software testing technique is sometimes called_____

(A) Graph testing

(B)Basis path

(C)Glass box testing

(D)Data flow testing

(E) Loop testing

ANS:(C)

48. Which of the following is used with database?

(A) EDI

(B)Credit card

(C)ATM

(D)Payment gateway

(E) Data mining

Page 14: sbi ques

ANS:(E)

49. When a cracker attempts to misuse or steal data from a system, it is called_______

(A) Stealing

(B)Intrusion

(C)Virus

(D)Worm

(E) None of these

ANS:(A)

50. To modify existing rows of the table __________ statement is used.

(A) ALTER

(B)MODIFY

(C)UPDATE

(D)COMMIT

(E) DELETE

ANS:(C)IBPS IT Specialist Officer professional knowledge Practice -13 1. ________ refers to a family of IEEE standards dealing with local area network and metropolitan area network.

(A)802

(B)800

(C)801

(D)803

(E) None of these

ANS:(A)

2. Which is the general network standard for the data link layer in the OSI Reference Model?

(A) IEEE 802.1

(B)IEEE 802.2

(C)IEEE 802.3

Page 15: sbi ques

(D)IEEE 802.4

(E) IEEE 802.6

ANS:(B)

3. _________ uses a standard called IEEE 802.6.

(A)LAN

(B)WAN

(C)MAN

(D)Internet

(E) None of these

ANS:(C)

4. Repeater operates in which layer of OSI model?

(A) Application Layer

(B)Presentation Layer

(C)Physical Layer

(D)Transport Layer

(E) Data link layer

ANS:(C)

5. Where does Bridge operate in OSI model?

(A) Physical layer

(B)Data link layer

(C)Both 1 and 2

(D)Application layer

(E) None of these

ANS:(C)

6. Which of the following uses the greatest number of layers in the OSI model?

(A) Bridge

Page 16: sbi ques

(B)Repeater

(C)Router

(D)Gateway

(E) None of these

ANS:(D)

7. Routers operate in which layer of the OSI model?

(A) Physical layer

(B)Data link layer

(C)Network layer

(D)All of these

(E) None of these

ANS:(D)

8. Modem is a _______ that modulates and demodulate signals.

(A) DCE (Data circuit terminating equipment)

(B)DTE(Data terminal equipment)

(C)DTE-DCE

(D)Both 1 and 2

(E) None of these

ANS:(A)

9. A communication network which is used by large organization over regional, national or global area is called_______

(A)LAN

(B)WAN

(C)MAN

(D)Internet

(E) None of these

ANS:(B)

Page 17: sbi ques

10. At _______ layer, TCP/�IP defines two protocols: Transmission Control Protocol (TCP) and User Datagram Protocol (UDP)

(A) Transport layer

(B)Network layer

(C)Physical layer

(D)Application layer

(E) None of these

ANS:(A)

11. The _______ layer is the layer closest to transmission medium.

(A)Transport

(B)Network

(C)Data link

(D)Physical

(E) None of these

ANS:(D)

12. End to end connectivity is provided from host to host in:

(A) Network layer

(B)Session layer

(C)Data link layer

(D)Transport layer

(E) None of these

ANS:(D)

13. Which of the following TCP/IP protocol is used for transferring electronic mail messages from one machine to another?

(A) SNMP

(B)SMTP

(C)RPC

Page 18: sbi ques

(D)FTP

(E) None of these

ANS:(B)

14. Which of the following is an example of a client server model?

(A) FTP

(B)DNS

(C)TELNET

(D)All of these

(E) None of these

ANS:(D)

15. Which IEEE standards is used for Wi/Fi system?

(A)802.11

(2B802.1

(3C802.2

(4D802.3

(5)E802.10

ANS:(A)

16. __________ is the continuous ability to send and receive data between interconnected networks

(A) FTP

(B)SMTP

(C)TNS

(D)Network Interoperability

(E) None of these

ANS:(D)

17. What is the default subnet mask for a class B network?

(A) 127.0.0.1

Page 19: sbi ques

(B)255.0.0.0

(C)255.255.0.0

(D)255.255.255.0

(E) None of these

ANS:(C)

18. What is loopback address?

(A) 127.0.0.1

(B)255.0.0.0

(C)255.255.0.0

(D)127.0.0.0

(E) None of these

ANS:(A)

19. Internet like network within enterprises.

(A)Intranet

(2BSwitching alternating

(3)Cnter organization networks

(4)Dxtranets

(5) Eone of these

ANS:(A)

20. A central computer surrounded by one or more satellite computers is called a

(A) Bus network

(B)Ring network

(C)Star network

(D)All the above

(E) None of these

ANS:(C)

Page 20: sbi ques

21. With an IP address of 100, you currently have 80 subnets. What subnet mask should you use to maximize the number of available hosts?

(A) 192

(B)240

(C)248

(D)224

(E) 252

ANS:(E)

22. Encryption/decryption provides a network with __________

(A)Privacy

(B)Authenticity

(C)Contiguity

(D)on-repudiation

(E) None of these

ANS:(A)

23. The data to be encrypted at the sender site is called ______. The data to be decrypted at receiver end is called _________.

(A) Secret key, public key

(B)Public key, secret key

(C)Plaintext, cipher text

(D)Cipher text, plaintext

(E) None of these

ANS:(C)

24. In digital signature the private key is used for ______ and the public key for ______.

(A) Encryption, decryption

(B)Decryption, encryption

(C)Plaintext, cipher text

Page 21: sbi ques

(D)Cipher text, plaintext

(E) None of these

ANS:(A)

25. A __________ -�s main purpose is to prohibit unauthorized access to your computer via the Internet.

(A) Popup blocker

(B)Firewall

(C)Spyware

(D)Spam assassin

(E) None of these

ANS:(B)

26. To create a copy files in the event of system failure, you create a ________.

(A) Firewall

(B)Redundancy

(C)Backup

(D)Restore file

(E) None of these

ANS:(C)

27. Print server uses _______ which is a buffer that holds before it is send to the printer.

(A) Queue

(B)Spool

(C)Node

(D)Stack

(E) None of these

ANS:(B)

28. Which of the following identifies specific web page and its computer on the

Page 22: sbi ques

web page?

(A) Website

(B)URL

(C)Web site address

(D)Domain Name

(E) None of these

ANS:(D)

29. __________ is the computer to computer exchange of routine business data between trading partners in standard data formats.

(A) CTS

(B)DSR

(C)VDR

(D)EDI

(E) None of these

ANS:(D)

30. Communication handler is basically an _______ 16 bit micro controller?

(A) 8085

(B)8086

(C)8086A

(D)80C186

(E) None of these

ANS:(D)

31. Which uses a pre-shared key that is more than 7 and less than 64 characters in length?

(A) WPA-PSK

(B)TKIP

(C)AES

(D)All the above

Page 23: sbi ques

(E) None of these

ANS:(D)

32. Ping command is used for what purpose?

(A) Test a device on a network whether it is reachable

(B)Test a hard disk fault

(C)Test a bug in the application

(D)Test a device scanning quality

(E) None of these

ANS:(A)

33. Two different kind of networks can be connected by using _____

(A) Bridges

(B)Satellite

(C)Gateway

(D)Routers

(E) None of these

ANS:(C)

34. Full adder is used to ______

(A) 2 bit addition

(B)3 bit addition

(C)4 bit addition

(D)6 bit addition

(E) None of these

ANS:(B)

35. Most important advantages of an IC is its __________

(A) Easy replacement in case of circuit failure

(B)Low power consumption

Page 24: sbi ques

(C)Extremely high reliability

(D)Reduced cost

(E) None of these

ANS:(C)

36. An IC contains 50 gates each of which consists of 6 components/ It�s belong to

(A) VLSI

(B)LSI

(C)MSI

(D)SSI

(E) None of these

ANS:(C)

37. Which type of computers use the 8 bit code called EBCDIC?

(A) Mini computers

(B)Mainframe computers

(C)Super computers

(D)Micro computer

(E) None of these

ANS:(B)

38. An AND gate

(A) Implement logic addition

(B)Is equivalent to a series switching circuit

(C)Is any-or all gate

(D)Is equivalent to a parallel switching circuit

(E) None of these

ANS:(B)

39. The decimal equivalent of the binary number 11100001111 is

Page 25: sbi ques

(A) 1806

(B)1807

(C)2806

(D)All the above

(E) None of these

ANS:(B)

40. Programs in which of the following memories can�t be erased?

(A) RAM

(B)ROM

(C)Cache memory

(D)Virtual memory

(E) None of these

ANS:(B)

41. The IP address 135.0.10.27 belongs to address class?

(A) A

(B)B

(C)C

(D)D

(E) None of these

ANS:(B)

42. Which are not used in case of applet?

(A)Read/write

(B)Internet

(C)Search engine

(D)All the above

(E) None of these

ANS:(A)

Page 26: sbi ques

43. Which of the following is not a type of database?

(A) Hierarchical

(B)Relational

(C)Network

(D)Transition

(E) None of these

ANS:(D)

44. Which of the following is not a type of SQL statement?

(A) Data Manipulation Language

(B)Data Definition language

(C)Data control language

(D)Data standard language

(E) None of these

ANS:(D)

45. In QUEUE, the item deleted at one end is called_____

(A) Rear

(B)Front

(C)Top

(D)Base

(E) None of these

ANS:(B)

46. The drawback of the binary tree sort are remedied by the_______

(A) Linear sort

(B)Heap sort

(C)Insertion sort

(D)Quick sort

Page 27: sbi ques

(E) None of these

ANS:(B)

47. White Box testing a software testing technique is sometimes called_____

(A) Graph testing

(B)Basis path

(C)Glass box testing

(D)Data flow testing

(E) Loop testing

ANS:(C)

48. Which of the following is used with database?

(A) EDI

(B)Credit card

(C)ATM

(D)Payment gateway

(E) Data mining

ANS:(E)

49. When a cracker attempts to misuse or steal data from a system, it is called_______

(A) Stealing

(B)Intrusion

(C)Virus

(D)Worm

(E) None of these

ANS:(A)

50. To modify existing rows of the table __________ statement is used.

(A) ALTER

(B)MODIFY

Page 28: sbi ques

(C)UPDATE

(D)COMMIT

(E) DELETE

ANS:(C)Posted by ibpssbi po at 21:34 No comments: Email ThisBlogThis!Share to TwitterShare to FacebookShare to PinterestIBPS IT Specialist Officer professional knowledge Practice -12 1. In order to save a world documents as a web page you need to

[A] Put the appropriate graphics and links on the documents

[B] Save the document in simple text format

[C] Use your web browser as editor and save URL

[D] Save as HTML

[E] None of these

(Ans):-D

2. Which of the following displays to the space where the text will be inserted when you type?

[A] Screen tip

[B] Insertion point

[C] Rulers

[D] Office Assistant

[E] None of these

(Ans):-E

3. Something which has easily understood instructions is said to be

[A] User friendly

[B] Information

[C] Word processing

[D] Icon

[E] None of these

(Ans):-A

Page 29: sbi ques

4. The copy command saves to

[A] The desktop

[B] The clipboard

[C] Microsoft word

[D] Paste

[E] None of these

(Ans):-B

5. An example of non-numeric data is

[A] Bank balance

[B] Examination marks

[C] Real Numbers

[D] Employee Address

[E] None of these

(Ans):-D

6. Which of the following displays the button for changing text style, Alignment and size?

[A] Standard toolbar

[B] Status bar

[C] Drawing tool bar

[D] Formatting tool bar

[E] None of these

(Ans):-D

7. Arranging of data in a logical sequence is known as

[A] Classifying

[B] Searching

[C] Sorting

[D] Reproducing

[E] None of these

Page 30: sbi ques

(Ans):-C

8. Which of the following tools is not normally used during system analysis?

[A] Program flow chart

[B] Grid flow chart

[C] System flow chart

[D] Question check list

[E] None of these

(Ans):-D

9. A single application that combines the major features of several types of application is called

[A] Integrated software

[B] A suite

[C] A combo package

[D] High end

[E] None of these

(Ans):-A

10. The word processing task associated with changing the appearance of documents is

[A] Writing

[B] Formatting

[C] Editing

[D] Storing

[E] None of these

(Ans):-B

11. I n order to save an existing document with a different name you need to

[A] Retype the document and give it a different name

[B] Use the save as command

Page 31: sbi ques

[C] Copy and paste the original document to a new document and then rename it

[D] Use windows explorer to copy the document to a different location and then rename it

[E] None of these

(Ans):-B

12. It is better to copy a file from as floppy disk, and then open the copy on the hard disk because

[A] A floppy disk is easily moved from one computer to another

[B] you can store more on a hard disk

[C] The computer cannot open a file stored on a floppy disk

[D] Reading a hard disk is much faster and safer

[E] None of these

(Ans):-D

13. The best reason that a computer needs to have a hard disk is because

[A] It can then use the same program as computers

[B] It would not work without one

[C] It can store information when it is switched off

[D] It can store information while it is working

[E] None of these

(Ans):-B

14. Firewalls are used to protect against________

[A] Unauthorized attacks

[B] Virus Attacks

[C] Data driven attacks

[D] Fire attacks

[E] None of these

(Ans):-B

Page 32: sbi ques

15. The _________ directory is mandatory for every disk

[A] Root

[B] Base

[C] Sub

[D] Case

[E] None of these

(Ans):-A

16. �WWW� stands for ________

[A] World word web

[B] World Wide Web

[C] World white web

[D] World work web

[E] None of these

(Ans):-B

17. Which of the following is NOT associated with computer?

[A] Bit

[B] Binary

[C] Pencil

[D] Mouse

[E] Screen

(Ans):-C

18. �MICR� technology used for clearance of cheques by banks refers to____

[A] Magnetic ink character recognition

[B] Magnetic intelligence character recognition

[C] Magnetic information cable recognition

[D] Magnetic insurance cases recognition

[E] None of these

Page 33: sbi ques

(Ans):-APosted by ibpssbi po at 21:32 No comments: Email ThisBlogThis!Share to TwitterShare to FacebookShare to PinterestIBPS IT Specialist Officer professional knowledge Practice -11 1. When cutting and pasting, the item cut is temporarily stored in

[A] ROM

[B] Hard drive

[C] Diskette

[D] Dashboard

[E] Clipboard

(Ans):-E

2. The hardware device that acts as both a switching and connecting unit is called

[A] RS-232 C port

[B] Concentrator

[C] Multiplexer

[D] Communication processor

[E] None of these

(Ans):-C

3. The device that assembles groups of characters into complete messages prior to their entering the CPU is called

[A] An interpreter

[B] A compiler

[C] A communication processor

[D] An editor

[E] A Translator

(Ans):-C

4. Data structure includes

[A] Array

[B] Execution statement

Page 34: sbi ques

[C] Interaction

[D] Both 2 and 3

[E] List

(Ans):-A

5. What is the name of logic circuits which can add two binary digits?

[A] Hal adder

[B] Full adder

[C] Parallel adder

[D] Serial adder

[E] None of these

(Ans):-A

6. A program embedded in a semiconductor chip during their manufacture is called

[A] Humanware

[B] Firmware

[C] Liveware

[D] Hardware

[E] Software

(Ans):-B

7. A collection of related fields in data organization is called

[A] Group

[B] File

[C] Information

[D] Register

[E] Record

(Ans):-C

8. Plotter accuracy is measured in terms of repeatability and

Page 35: sbi ques

[A] Vertical dimension

[B] Intelligence

[C] Resolution

[D] Pixels

[E] Buffer size

(Ans):-E

9. The data base III plus is mostly used for

[A] Office automation

[B] Database management problems

[C] Scientific problems

[D] Calculations only

[E] None of these

(Ans):-B

10. In the ��C�� language the function scant ( ) reads

[A] Single character

[B] Character and strings

[C] Any possible number

[D] Any possible variable type

[E] Limited variable types

(Ans):-D

11. BIOS stand for

[A] Basic Input Output services

[B] Basic inner outer services

[C] Better input output services

[D] Better inner and outer services

[E] BIOS-Basic input/output system

(Ans):-E

Page 36: sbi ques

12. A commonly used graphic format for the web is

[A] GIF

[B] BMP

[C] Text

[D] IMP

[E] TIF

(Ans):-A

13. The HTML code written in a text editor to make web-pages is

[A] HTML coding tags

[B] Source code

[C] Source element

[D] Tags

[E] None of these

(Ans):-B

14. The basic building block of a database that contains related records is

[A] Query

[B] Form

[C] Table

[D] Edited page

[E] Report

(Ans):-E

15. A set of rules that computer on a network use to communicate with each other are called

[A] Rules

[B] Regulations

[C] Protocol

Page 37: sbi ques

[D] Netiquettes

[E] None of these

(Ans):-C

16. The process of connecting to the internet account is

[A] LOG IN

[B] LOG OUT

[C] SIGN IN

[D] SIGN OUT

[E] None of these

(Ans):-A

17. An image editing software in which we can draw and edit images, is

[A] Page maker

[B] MS-paint

[C] Photo image

[D] Front page

[E] Corel draw

(Ans):-E

18. Which out of the following is not DBMS software?

[A] DBASE

[B] FOXPRO

[C] ORACLE

[D] Sybase

[E] Data base 2000

(Ans):-E

19. The _____ of a system includes the programs or instructions.

[A] Hardware

Page 38: sbi ques

[B] Icon

[C] Information

[D] Software

[E] None of these

(Ans):-D

20. Which of the following displays programs that are currently running? A single click on one of the program icons

[A] Menu bar

[B] Task bar

[C] Title bar

[D] Status bar

[E] None of these

(Ans):-BPosted by ibpssbi po at 21:31 No comments: Email ThisBlogThis!Share to TwitterShare to FacebookShare to PinterestIBPS IT Specialist Officer professional knowledge Practice -10 1. Which type of switching uses the entire capacity of a dedicated link?

[A] Circuit switching

[B] Virtual circuit packet switching

[C] Datagram packet switching

[D] Message switching

[E] None of these

(Ans):-C

2. The _____is a device that connects n input to m output.

[A] Crossword

[B] Crossbar

[C] Modem

[D] RAM

[E] None of these

(Ans):-B

Page 39: sbi ques

3. In _____each packet of a message follows the same path from sender to receiver.

[A] Circuit switching

[B] Message switching

[C] The virtual approach to packet switching

[D] All the above

[E] None of these

(Ans):-D

4. A permanent virtual circuit involves

[A] Connection establishment

[B] Data transfer

[C] Connection release

[D] All the above

[E] None of these

(Ans):C

5. The search tool used to text that appears in gotherspace is

[A] Gobbler

[B] Archie

[C] Mikky

[D] Veronica

[E] None of these

(Ans):-D

6. X.21 protocol consists of

[A] Physical and frame levels

[B] Frame and packet levels

[C] Physical, frame and packet levels

[D] Only physical level

Page 40: sbi ques

[E] None of these

(Ans):-D

7. Array is ______

[A] Linear data structure

[B] Non-linear data structure

[C] Complex data structure

[D] Simple data structure

[E] None of these

(Ans):-A

8. How many options does binary choice offer?

[A] None

[B] One

[C] Two

[D] It depends on the amount of memory in the computer

[E] It depends on the speed of the computer�s processor

(Ans):-C

9. Data going into the computer is called

[A] Output

[B] Algorithm

[C] Input

[D] Calculations

[E] Flow chart

(Ans):-C

10. Transformation of input into output is performed by

[A] Peripherals

[B] Memory

Page 41: sbi ques

[C] Storage

[D] The input �output unit

[E] The CPU

(Ans):-E

11. Devices drivers are

[A] Tiny power cords for external storage devices

[B] Experts who know to maximize the performance of devices

[C] Small, special-purpose programs

[D] The innermost part of the operating system

[E] Substitutes for operating systems

(Ans):-C

12. A collection of program that controls how your computer system runs and processes information is called

[A] Operating system

[B] Computer

[C] Office

[D] Compiler

[E] Interpreter

(Ans):-A

13. A set of instructions telling the computer what to do is called

[A] Mentor

[B] Instructor

[C] Compiler

[D] Program

[E] Debugger

(Ans):-D

14. If you receive an e-mail form someone you don�t know, what should you do?

Page 42: sbi ques

[A] Forward it to the police immediately

[B] Delete it without opening it

[C] Open it and respond to them saying you don�t know them

[D] Reply and ask them for their personal information

[E] Reply and tell them in touch with them

(Ans):-B

15. Which of the following can handle most system functions that aren�t handled directly by the operating system?

[A] Vertical market applications

[B] Utilities

[C] Algorithms

[D] Integrated software

[E] Compilers

(Ans):-B

16. Computer connected to a LAN (Local Area Network) can

[A] Run faster

[B] Go on line

[C] Share information and/or share peripheral equipment

[D] E-MAIL

[E] None of these

(Ans):-C

17. Which of the following refers to the memory in your computer?

[A] RAM

[B] DSL

[C] USB

[D] LAN

[E] CPU

Page 43: sbi ques

(Ans):-A

18. One megabyte equals approximately

[A] 1000 bits

[B] 1000 bytes

[C] 1 million bytes

[D] 1 million bits

[E] 2000 bytes

(Ans):-C

19. When you are working on a document on PC, where is the document temporarily stored?

[A] RAM

[B] ROM

[C] The CPU

[D] Flash memory

[E] The CD-ROM

(Ans):-A

20. Magnetic tape is not practical for applications where data must be quickly recalled because tape is

[A] A random access medium

[B] A sequential access medium

[C] A read only medium

[D] Fragile and easily damaged

[E] An expensive storage medium

(Ans):-BPosted by ibpssbi po at 21:29 No comments: Email ThisBlogThis!Share to TwitterShare to FacebookShare to PinterestIBPS IT Specialist Officer professional knowledge Practice -9 1. This component is required to process data into information and consists of integrated circuits.

[A] Hard disk

[B] RAM

Page 44: sbi ques

[C] CPU

[D] ROM

[E] None of these

(Ans):-C

2. What is backup?

[A] Adding more components to your network

[B] Protecting data by copying it from the original source to a different destination

[C] Filtering old data from the new data

[D] Accessing data on tape

[E] None of these

(Ans):-B

3. Network components are connected to the same cable in the _____ topology.

[A] Star

[B] Ring

[C] Bus

[D] Mesh

[E] Mixed

(Ans):-A

4. Two or more computers connected to each other for sharing information from a_______

[A] Network

[B] Router

[C] Server

[D] Tunnel

[E] Pipeline

(Ans):-A

Page 45: sbi ques

5. What is the term for unsolicited E-mail?

[A] Newsgroup

[B] Usenet

[C] Backbone

[D] Flaming

[E] None of these

(Ans):-E

6. What type of program controls the various computer parts and allows the user to interact with the computer?

[A] Utility software

[B] Operating system

[C] Word processing software

[D] Database program

[E] None of these

(Ans):-B

7. Each cell in a Microsoft office Excel document is referred to by its cell address, which is the ____

[A] Cell�s column label

[B] Cell�s column label and worksheet tab name

[C] Cell�s row label

[D] Cell�s row and column labels

[E] None of these

(Ans):-D

8 . What is the process of copying software from secondary storage media to the hard disk called?

[A] Configuration

[B] Download

[C] Storage

Page 46: sbi ques

[D] Upload

[E] Installation

(Ans):-C

9. The code for a web page is written using_________

[A] A fifth generation language

[B] Win zip

[C] Peri

[D] Hypertext Markup Language

[E] URL

(Ans):-D

10. Small application programs that run on a web page and may ensure a form is completed properly or provide animation are known as__________

[A] Flash

[B] Spiders

[C] Cookies

[D] Applets

[E] Sparks

(Ans):-A

11. In a relation database, this is a data structure that organizes the information about a single topic into rows and columns.

[A] Block

[B] Record

[C] Tuple

[D] Table

[E] Command the interface

(Ans):-D

12. The first computers were programmed using_______

Page 47: sbi ques

[A] Assembly language

[B] Machine language

[C] Source code

[D] Object code

[E] Formatting error

(Ans):-B

13. When the pointer is positioned on a ______, it is shaped like a hand.

[A] Grammar error

[B] Hyperlink

[C] Screen tip

[D] Spelling error

[E] For mating error

(Ans):-B

14. Dos and windows 3.x support file names upto______charecters in length

[A] Two

[B] Four

[C] Six

[D] Eight

[E] None of these

(Ans):-D

15. ______ is collection of web pages and ______ is the very first page that we see on opening of a website

[A] Home page, web- page

[B] Web-site, home-page

[C] Web-page, home -page

[D] Web-site, web-page

[E] None of these

(Ans):-B

Page 48: sbi ques

16. When we run a program in HTML coding,_____ is used as backend and ____ works as frontend.

[A] Notepad-Internet-Explorer

[B] Notepad-Msn-messenger

[C] MS-word-Internet explorer

[D] Both 1 and 2

[E] None of these

(Ans):-A

17. If the _______ bit in X.25 standard is to 1. It means that there is more than one packet.

[A] Q

[B] D

[C] M

[D] J

[E] None of these

(Ans):-C

18. A device operating at the physical layer is called a

[A] Bridge

[B] Router

[C] Repeater

[D] All the above

[E] None of these

(Ans):-C

19. For separating channels in FDM, it is necessary to use

[A] Time slots

[B] Band pass filters

[C] Differentiation

Page 49: sbi ques

[D] All the above

[E] None of these

(Ans):-B

20. Encryption and decryption are function of

[A] Transport layer

[B] Session layer

[C] Presentation layer

[D] All the above

[E] None of these

(Ans):-BPosted by ibpssbi po at 21:27 No comments: Email ThisBlogThis!Share to TwitterShare to FacebookShare to PinterestIBPS IT Specialist Officer professional knowledge Practice -8 1. One advantage of dial-up internet access is__________

[A] It utilizes broadband technology

[B] It utilizes existing telephone service

[C] It uses a router for security

[D] Modem speeds are very fast

[E] None of these

(Ans):-B

2. A computer checks the _____of user names and password for a match before granting access.

[A] Website

[B] Network

[C] Backup file

[D] Database

[E] None of these

(Ans):-D

3. Computer that is potable and convenient for users who travel is known as_______

Page 50: sbi ques

[A] Super computers

[B] Laptops

[C] Mini computers

[D] File server

[E] None of these

(Ans):-B

4. Which of the following is true?

[A] Byte is a single digit in a binary number

[B] Bit represents a grouping of digital numbers

[C] Eight digit binary numbers is called a byte

[D] Eight digit binary numbers is called a bit

[E] None of these

(Ans):-C

5. Office LAN�s that are spread geographically apart on a large scale can be connected using a corporate________

[A] CAN

[B] LAN

[C] DAN

[D] VAN

[E] TAN

(Ans):-D

6. Which process check to ensure the components of the computer are operating and connected properly?

[A] Booting

[B] Processing

[C] Saving

[D] Editing

[E] None of these

Page 51: sbi ques

(Ans):-A

7. How can the user determine what programs are available on a computer?

[A] Checking the hard disk properties

[B] Viewing the installed programs during the booting process

[C] Checking the operating system for a list of installed programs

[D] Checking the existing files saved on the disk

[E] None of these

(Ans):-D

8. In Dos, the ��Label�� command is used to

[A] Display the label of disk

[B] Change the label of disk

[C] Remove the label of disk

[D] Both 1 and 2

[E] None of these

(Ans):-D

9. The subsystem of the kernel and hardware that virtual to physical addresses comprises.

[A] Process management sub-system

[B] Memory management sub-system

[C] Input/output management sub-system

[D] All the above

[E] None of these

(Ans):-B

10. Which of the following computer language is a mathematically oriented languages used for scientific problems?

[A] FORTRAN

[B] LISP

Page 52: sbi ques

[C] COBOL

[D] APPLE

[E] None of these

(Ans):-A

11. Which of the following types of table�s constraints will prevent the entry of duplicate rows?

[A] Primary key

[B] Unique

[C] Null

[D] Foreign key

[E] None of these

(Ans):-A

12. The sharing of a medium and its path by 21 or more devices is called

[A] Modulation

[B] Encoding

[C] Line discipline

[D] Multiplexing

[E] None of these

(Ans):-D

13. Which multiplexing technique transmits along signals?

[A] FDM

[B] Synchronous TDM

[C] Asynchronous TDM

[D] Both 2 and 3

[E] None of these

(Ans):-A

Page 53: sbi ques

14. How many values can be represented by a single byte?

[A] 4

[B] 16

[C] 64

[D] 256

[E] 512

(Ans):-D

15. Which of the following refers to a small, single-site network?

[A] LAN

[B] DSL

[C] RAM

[D] USB

[E] CPU

(Ans):-A

16. Microsoft office is

[A] Shareware

[B] Public-domain software

[C] Open-source software

[D] A vertical market application

[E] An application suite

(Ans):-E

17. Information travels between components on the mother board through

[A] Flash memory

[B] CMOS

[C] Bays

[D] Buses

[E] Peripherals

Page 54: sbi ques

(Ans):-5

16. How are data organized in a spreadsheet?

[A] Lines and spaces

[B] Layers and planes

[C] Height and width

[D] Rows and columns

[E] None of these

(Ans):-D

17. The blinking symbol on the computer screen is called the

[A] Mouse

[B] Logo

[C] Hand

[D] Palm

[E] Cursor

(Ans):-E

18. Application software

[A] is used to control operating system

[B] is designed to help programmers

[C] Performs specific task for computer users

[D] is used for making design only

[E] All the above

(Ans):-C

19. The person contributing the idea of the stored program was

[A] John Neumann

[B] Charles Babbage

[C] Howard Aiken

Page 55: sbi ques

[D] Daniel Thomas

[E] Dennis Ritenie

(Ans):-A

20.The speed at which the monitor accepts data is called

[A] Bandwidth

[B] Interlacing

[C] Response time

[D] Scanning

[E] Maximum speed

(Ans):-APosted by ibpssbi po at 21:26 No comments: Email ThisBlogThis!Share to TwitterShare to FacebookShare to PinterestIBPS IT Specialist Officer professional knowledge Practice -7 1. 253.45.67.9 is a class---------

[A] D

[B] A

[C] C

[D] E

[E] None of these

(Ans):-D

2. Internal auditors should review data system design before they are

[A] Developed

[B] Implemented

[C] Modified

[D] All the above

[E] None of these

(Ans):-B

3. Artifact based authentication method includes___

[A] Machine readable badges

Page 56: sbi ques

[B] Electronic smart cards

[C] Both 1 and 2

[D] Vault cards

[E] None of these

(Ans):-C

4. What is the memory from 1K-640K called?

[A] Extended memory

[B] Normal memory

[C] Low memory

[D] Conventional memory

[E] None of these

(Ans):-D

5. I n most WANs, the network contains numerous cables or telephone lines,each one connecting a pair of______

[A] Packet

[B] Star topology

[C] Router

[D] Antennas

[E] None of these

(Ans):-C

6. Which of the following operators in �C� does not associated from the right?

[A] ,

[B] =

[C] +=

[D] ++

[E] None of these

(Ans):-A

Page 57: sbi ques

7. Which of the following is a variation of frequency division multiplexing (FDM)?

[A] Time Division Multiplexing (TDM)

[B] Pulse Code Multiplexing (PCM)

[C] Wave length Division Multiplexing (WDM)

[D] All the above

[E] None of these

(Ans):-C

8. Race condition occur in which flip-flop

[A] RS flip-flop

[B] JK flip-flop

[C] D flip-flop

[D] T flip-flop

[E] None of these

(Ans):-A

9. The expansion of E-R diagram is:

[A] Entity-Relation diagram

[B] Entity-Relative diagram

[C] Entity-Relation diagram

[D] All the above

[E] None of these

(Ans):-A

10. BNF is a meta-language for

[A] Specifying the syntax of a language

[B] Specifying a context free language

[C] Shell programming

[D] Both 1 and 2

Page 58: sbi ques

[E] None of these

(Ans):-D

11. What is the language used by most of the DBM�s for helping their users to access data?

[A] High level language

[B] Query language

[C] SQL

[D] 4 GL

[E] None of these

(Ans):B

12. An expression_____

[A] Usually evaluates to a numerical value

[B] Indicate state of the program

[C] May be part of statement

[D] Both 1 and 2

[E] None of these

(Ans):-D

13. HTTP refers to_____

[A] Hyper text transmission protocol

[B] Hyper text transfer protocol

[C] Hyper text tie protocol

[D] Hyper text talent protocol

[E] None of these

(Ans):-B

14. Which language has recently become the difacto standard for interfacing application programs with relational database system?

[A] Oracle

Page 59: sbi ques

[B] SQL

[C] D base

[D] 4 GL

[E] None of these

(Ans):-B

15. A program that place programs into main memory and prepares them for execution____

[A] Linker

[B] Assembler

[C] Loader

[D] Absolute entity

[E] None of these

(Ans):-C

16. Given v (224)p = (13)p the value of the radix r is

[A] 10

[B] 8

[C] 6

[D] 5

[E] None of these

(Ans):-D

17. In a Third Normal Form relation, every �. Attribute is non-transitively and fully dependent on the every candidate key Z

[A] Prime

[B] Non-prime

[C] Unique

[D] Network

[E] None of these

(Ans):-B

Page 60: sbi ques

18. Sockets are used in

[A] Physical layer

[B] Data link layer

[C] Network layer

[D] Transport layer

[E] None of these

(Ans):-B

19. A generalization of the Boyce Code Normal Form to relation schemes which includes the multi valued dependencies is called�

[A] Second normal form

[B] Third normal form

[C] Fourth normal form

[D] Fifth normal form

[E] None of these

(Ans):-C

20. The metal oxide semiconductor (MOS) is a ���.transistor that depends on the flow of only one type of carrier, which may be electrons or holes?

[A] Unipolar

[B] Bipolar

[C] n-polar

[D] s-polar

[E] None of these

(Ans):-A

21. Lexical Analyzer transforms an input streams into---

[A] Regular expression

[B] Sequence of tokens

[C] Binary

Page 61: sbi ques

[D] Symbols

[E] None of these

(Ans):-B

22. IEEE 802-3

[A] Analog based deterministic

[B] Analog based non deterministic

[C] Digital based deterministic

[D] All the above

[E] None of these

(Ans):-B

23. Depth first search is

[A] Stack

[B] Queue

[C] Link list

[D] Tree search

[E] None of these

(Ans):-A

24. If we traverse a binary search tree, in which manner that we get in ascending manner

[A] In order

[B] Preorder

[C] Post order

[D] Graph

[E] None of these

(Ans):-A

25. Which is the world�s number #1 company for core banking solutions?

[A] Fidelity

Page 62: sbi ques

[B] Fiserv

[C] Infosys

[D] Oracle

[E] None of these

(Ans):-BPosted by ibpssbi po at 21:24 No comments: Email ThisBlogThis!Share to TwitterShare to FacebookShare to PinterestIBPS IT Specialist Officer professional knowledge Practice -6 1. What are the safest ways to edit registry in win 95?

[A] Edit

[B] REGEDIT

[C] DEVICE MANAGER

[D] Control Panel Applets

[E] None of these

(Ans):-D

2. Input of Lex is -----

[A] Set a regular expression

[B] Statement

[C] Numeric data

[D] ASCII code

[E] None of these

(Ans):-A

3. Stack is �������� structure.

[A] Last in first out (LIFO)

[B] First in First out (FIFO)

[C] First in Last out (FILO)

[D] First come First served (FCFS)

[E] None of these

(Ans):-A

Page 63: sbi ques

4. A language L allows declaration of arrays whose sizes are not known during compilation. It is required to use efficient use of memory, which one of the following is true?

[A] A compiler using static memory, allocation can be written for L.

[B] A compiler cannot be written L: an interpreter must be used

[C] A compiler using dynamic memory allocation can be written

[D] All of the above

[E] None of these

(Ans):-C

5. Which of the following systems implementation approaches should be used if you want to run the old system and the new system at the same time for a specified period?

[A] Direct

[B] Pilot

(3)Phased

(4)Parallel

[E] None of these

(Ans):-D

6. In open (), the mode, that opens a binary file for readings is

[A] r

[B] r+

[C] rb

(4)r+b

[E] None of these

(Ans):-C

7. Dirty bit for a page in a page table

[A] Helps avoid unnecessary writers on a paging device

[B] Helps maintain LRU information

(3)Allows only read on as page

Page 64: sbi ques

[D] All the above

[E] None of these

(Ans):-A

8. Which of the following is not a logical database structure?

[A] Tree

[B] Relational

[C] Network

[D] Chain

[E] None of these

(Ans):-D

9. Which is not included in the UNIX file system?

[A] Bin

[B] Usr

[C] Dev

[D] All the above

[E] None of these

(Ans):-D

9. The idea of automation with a stack as auxiliary storage----

[A] Finite automata

[B] Pushdown automata

[C] Deterministic automata

[D] All the above

[E] None of these

(Ans):-B

11. Which of the following derivations does a top-down parser while parsing an input string? The input is assumed to be scanned in left to right order.

Page 65: sbi ques

[A] Left most derivation

[B] Left most derivation traced out in reverse

[C] Right most derivation

[D] Right most derivation traced out in reverse

[E] None of these

(Ans):-A

12. Layer one of the OSI model is:

[A] Physical layer

[B] Link layer

[C] Transport layer

[D] Network layer

[E] None of these

(Ans):-A

13. IE uses ��������

[A] Active X controls for interaction between browser and third party application and the operating system

[B] Active X control for browser and operating system

[C] Both 1 and 2

[D] Active X controls for only operating system

[E] None of these

(Ans):-A

14. Parsing is also known as ----------

[A] Lexical analysis

[B] Syntax analysis

[C] Semantic analysis

[D] Code generation

[E] None of these

(Ans):-B

Page 66: sbi ques

15. The derivation will be called a �������.derivation if the non-terminal symmbol replaced at every step is the left most non-terminal symbol in the string.

[A] Left shifting

[B] Left recursion

[C] Left most

[D] Left pushdown

[E] None of these

(Ans):-C

16. Who provide the leased line?

[A] WWW

(2)TCP/IP

[C] ISDN

[D] ISP

[E] None of these

(Ans):-D

17. Master slave flip-flop is also referred to as the����.

[A] Level triggered flip-flop

[B] Pulse triggered flip-flop

[C] Edge triggered flip-flop

[D] All the above

[E] None of these

(Ans):-B

18. Which of the following circuit type is based up on time or clock pulse?

[A] Combinational circuit

[B] Sequential circuit

[C] Full adder

Page 67: sbi ques

[D] All the above

[E] None of these

(Ans):-B

19. A solution to the problem were the source and destination hosts are on the same type of network, but there is a different network in between------

[A] Data link

[B] Packet

[C] Tunneling

[D] Hopping

[E] None of these

(Ans):-C

20. Which is true?

[A] Functional testing is called black box testing

[B] Structure testing is called glass box testing

[C] Glass box testing is called white box testing

(D) All the above

[E] None of these

(Ans):-D

21. Storage class defines

[A] The data type

[B] The scope

[C] The scope and perfomance

[D] The scope, performance and data type

[E] None of these

(Ans):-C

22. 128.167.152.2 is a class________ address

[A] A

Page 68: sbi ques

[B] B

[C] C

[D] D

[E] None of these

(Ans):-B

23. DMA is

[A] High speed I/O devices

[B] It transfers blocks of data directly to and from its own buffer storage to memory

[C] In DMA transfer for I/O, CPU has no intervention

[D] All the above

[E] None of these

(Ans):-D

24. Randomized quick sort is an extension of quick sort where the pivot is chosen randomly. What is the worst case complexity of sorting n numbers using randomized quick sort?

[A] 0 (n)

[B] 0 (n log n)

[C] 0 (n2)

[D] 0 (log n)

[E] None of these

(Ans):-B

25. CIDR (Classless inter Domain Routing)

[A] It is used in class C Networks

[B] It is used in class B Networks

[C] It is used in class A Network

[D] All the above

[E] None of these

Page 69: sbi ques

(Ans):-APosted by ibpssbi po at 21:22 No comments: Email ThisBlogThis!Share to TwitterShare to FacebookShare to PinterestIBPS IT Specialist Officer professional knowledge Practice -5 1. Which department people can best help in auditing?

[A] ERP

[B] EDP

[C] Finance

[D] Higher Mnagement

[E] None of these

(Ans):B

2. Which is not manual technique for computer assisted audit technique?

[A] Interviews

[B] Code Reviews

[C] Questionnaires

[D] Control Flow Chart

[E] None of these

(Ans):B

3. Which of the following is not a common standard for service level management?

[A] IEC2000

[B] ISO9000

[C] ISO2000

[D] COBIT

[E] None of these

(Ans):D

4. Which of the following BEST describes �Partner�in the phrase��People, Processes, Products and Partners��?

[A] Suppliers, manufactures and vendors

[B] Custemors

[C] Enternal department

Page 70: sbi ques

[D] The facilities management function

[E] None of these

(Ans):A

5. Which is the most important of SLM?

[A] Custemer service

[B] Custemer satisfaction

[C] 24*7 IT support

[D] Meeting the SLAs

[E] None of these

(Ans):B

6. Of the following which is not part of service lavel manegement?

(1)Service level recritement

[B] Service desk

[C] Service catalog

[D] Service improvement plan

[E] None of these

(Ans):B

7. What is the sub-process of capacity planning?

[A] Business capacity planning

[B] Service capacity planning

[C] Resource capacity planning

[D] All of these

[E] None of these

(Ans):D

8. Which of the following is not a part of Financial Mangement for IT Services?

[A] Charging

Page 71: sbi ques

[B] Budgeting

[C] Accounting

[D] Procurement

[E] None of these

(Ans):D

9. Understanding customer usage of services and how this varies over time is part of which process?

[A] Service protofolio Management

[B] Service level management

[C] Component capacity management

[D] Demand management

[E] None of these

(Ans):D

. 10. Which is not a charectaristics of a process?

[A] Process is always measurable

[B] Process always delivers specific results

[C] Process always responds to specific events

[D] Process always is necessary

[E] None of these

(Ans):D

11. What does a service always deliver to customer?

[A] Application

[B] Infrastructure

[C] Value

[D] Resouces

[E] None of these

(Ans):C

Page 72: sbi ques

12. Who owns the specific costs and risks assosiated with providing a service?

[A] The service provider

[B] The service level manger

[C] The customer

[D] Resources

[E] None of these

(Ans):A

13. ��Financial department needs higher security measures�� is example for which SLA?

[A] Corporate level SLA

[B] Customer level SLA

[C] Service level SLA

[D] All of these

[E] None of these

(Ans):B

14. Which of the following activities is NOT a part of the Deming cycle?

[A] Act

[B] Plan

[C] D o

[D] Coordinate

[E] None of these

(Ans):D

15. ��E-mail services for a particular department needs encryption and secure backups�� is example of:

[A] Corporate level SLA

[B] Customer level SLA

[C] Service level SLA

[D] All of these

Page 73: sbi ques

[E] None of these

(Ans):C

16. Which stage of the service life cycle is MOST concerned with defining policies andobjectives?

[A] Service design

[B] Service transition

[C] Service startegy

[D] Service operation

[E] None of these

(Ans):C

17. Which of the following should a service catelog contain?

[A] The version information of all software

[B] The organizational structure of the company

[C] The customer

[D] Resources

[E] None of these

(Ans):D

18. Which of the following do service metrics measyres?

[A] Processes and functions

[B] Maturity and cost

[C] The end to end service

[D] Infrastructure avalibility

[E] None of these

(Ans):C

19. What are the key issues in choosing the measurement process?

[A] Accuracy

Page 74: sbi ques

[B] Cost

[C] Visibility

[D] All of these

[E] None of these

(Ans):D

20. Which of these is critcal success for service level agreement?

[A] All services are met

[B] Users appreciate the costs of desired service levels

[C] Service perfomance measures are available

[D] All of the above

[E] None of these

(Ans):B Posted by ibpssbi po at 21:20 No comments: Email ThisBlogThis!Share to TwitterShare to FacebookShare to PinterestIBPS IT Specialist Officer professional knowledge Practice -4 1. What type of attack do some firewalls try to limit by enforcing rules on how long a GET or POST request can be?

[A] Smurf

[B] Denial of service

[C] Buffer overflow

[D] LAND

[E] None of these

(Ans):-C

2. This is a documents that states in writing how a company plans to protect the company�s physical and IT assets:

[A] Data Encryption Standard

[B] Security Policy

[C] Public Key Certificate

[D] Access Control List

[E] Copyright

(Ans):-B

Page 75: sbi ques

3. This is the process of determining whether someone or something os, in fact, who or what is declared to be?

[A] Conditional access

[B] Anonymizer

[C] Bypass

[D] User profile

[E] Authentication

(Ans):-E

4. This is an agreement a company may ask an employee to sign that specifies what is considered to be appropriate (or in appropriate) use of e-mail or web browsing?

[A] RSA

[B] AUP

[C] SET

[D] VPN

[E] None of these

(Ans):-B

5. Which are examples of IPS (Intrusion Protection system)?

[A] Solar Open Design Wall

[B] Grsecurity

[C] LOMAC

[D] All of the above

[E] None of these

(Ans):-D

6. Which of the following are methods of Network Security?

[A] VPN

[B] Encryption

[C] Honey pots

Page 76: sbi ques

[D] Firewall

[E] All of the above

(Ans):-E

7. This is a set of related programs, usually located at a network gateway server, that protects the resources of a private network from other network:

[A] Firewall

[B] Root kit

[C] Sandbox

[D] Password Cracker

[E] None of these

(Ans):-A

8. What happens if you digitally sign and inject footer on an e-mail message in the order?

[A] Nothing

[B] The message won�t be sent.

[C] The footer will invalidate the signature.

[D] The footer will be illegible.

[E] None of these

(Ans):-C

9. This is a class of programs that searches your hard drive and floppy disks for any known or potential virus:

[A] Intrusion Detection

[B] Security identifier

[C] Antigen

[D] Probe

[E] Antivirus software

(Ans):-E

Page 77: sbi ques

10. The basic objective of Audit is:

[A] Safeguard and Assets

[B] Maintain Data Integrity

[C] Maintain Process Integrity

[D] Achieve the goals organization effectively

[E] None of these

(Ans):-E

11. Which is not true about Computer audit?

[A] Computer audit does not focus on process integrity.

[B] It throws much light on system effectiveness.

[C] Scope is limited to system and procedure being followed.

[D] Computer audit is carried done mostly around the computer.

[E] None of these

(Ans):-B

12. Which of them is not an input control type?

[A] Unintentional entry of wrong data

[B] Preparation of false input forms

[C] Intentional entry of fraudulent data

[D] Use of unauthorized Input forms

[E] Password secrecy

(Ans):-E

13. What best defines audit Trail?

[A] Trailing of audit process

[B] Chronological record of all events on system are maintained

[C] Chronological record of all events on system are not maintained

[D] Its maintenance of audit process

[E] None of these

Page 78: sbi ques

(Ans):-B

14. Which of them forms a data items for audit trails?

[A] Unique identifier of source code

[B] Unique identifier of person

[C] Time and Date at which messages are dispatched

[D] Unique identifier for each node of network

[E] All the above

(Ans):-E

15. Which of them is not an approach for computer auditing?

[A] Audit around the computer

[B] Audit with computer

[C] Audit through the computer

[D] Audit on computer

[E] None of these

(Ans):-DPosted by ibpssbi po at 21:18 No comments: Email ThisBlogThis!Share to TwitterShare to FacebookShare to PinterestIBPS IT Specialist Officer professional knowledge Practice -3 1. Address Resolution Protocol (ARP) is used for:

[A] Relating IP Address to Ethernet addresses

[B] Preventing two computers from using the same IP address

[C] Enables a workstation to know its IP address by broad casting its local address

[D] All the above

[E] None of these

(Ans):-A

2. How many rollers are actually responsible for movement of the cursor in the mouse

[A] 1

[B] 2

Page 79: sbi ques

[C] 3

[D] Depends from mouse to mouse

[E] None of these

(Ans):-B

3. Which of there can have more than one value?

[A] A composite attribute

[B] A multi valued attribute

[C] A Derived attribute

[D] All the above

[E] None of these

(Ans):-A

4. Which of the following do you think is NOT true for SNMP?

[A] It is connection less protocol

[B] It guarantees data transmission

[C] It can accommodate devices from different vendors

[D] All the above

[E] None of these

(Ans):-C

5. What are the facilities offered by tele banking?

[A] Balance enquiries

[B] Enquiries about the specific transaction

[C] Transfer of funds

[D] All the above

[E] None of these

(Ans):-C

6. Approval for software projects has to be done by

Page 80: sbi ques

[A] The project head

[B] The user department head

[C] The senior management

[D] All the above

[E] None of these

(Ans):-C

7. The base line for a software in term if software configuration management

[A] Point of latest release of the software

[B] Point of latest change of the software

[C] Point of change approved in the software and added to the project data base

[D] All the above

[E] None of 1these

(Ans):-C

8. The purpose of using computer in an organization is _____________?

[A] To produce image , texts, reports etc.

[B] To be able get on the internet

[C] To process data in to information

[D] All the above

[E] None of these

(Ans):-C

9. Which of the following mandatory parts of complete PC system?

[A] Hardware and software

[B] Input and Output

[C] Keyboard and Printer

[D] All the above

[E] None of these

(Ans):-A

Page 81: sbi ques

10. The elements of computer processing system are

[A] Hardware, software, information &people

[B] Hardware, programs, and people

[C] Hardware, Data, users, and procedures

[D] All the above

[E] None of these

(Ans):-CPosted by ibpssbi po at 21:16 No comments: Email ThisBlogThis!Share to TwitterShare to FacebookShare to PinterestIBPS IT Specialist Officer professional knowledge Practice-2 1. MICR devices can read:

[A] Letters

[B] Numbers

[C] Both of these

[D] All of these

[E] None of these

(Ans):-B

2. Auxiliary storage consists of

[A] Magnetic tapes

[B] CDs

[C] Both of these

[D] All of these

[E] None of these

(Ans):-A

3. Who can provides access rights to users?

[A] Data custodian

[B] Data owner

[C] The data base administrator

[D] Management

Page 82: sbi ques

[E] None of these

(Ans):-C

4. Security policy of an organization need not have

[A] The overall security philosophy of the organization

[B] The authorization procedure for accessing data

[C] Security awareness program

[D] Highlights and identity of the sensitive security features

[E] None of these

(Ans):-D

5. In case of a virus getting into computer, which of the following will help?

[A] Encryption

[B] NORTON

[C] Police complaint

[D] All of these

[E] None of these

(Ans):-B

6. Which of the following do you think is NOT necessary for computerization system in a bank?

[A] Effective customer service

[B] Effective back office integration

[C] Focus on manual records

[D] All of these

[E] None of these

(Ans):-C

7. BCNF is needed because:

[A] Otherwise tuples may be duplicated

[B] When a data is deleted tuples may be lost

Page 83: sbi ques

[C] Updating is otherwise is difficult

[D] When there is dependent attributes in two possible composite keys one of the attribute is unnecessarily duplicated in the tuples

[E] None of these

(Ans):-D

8. Which of the following is reliable service?

[A] TCP

[B] UDP

[C] Both [A] & (2)

[D] Either [A] nor (2)

[E] None of these

(Ans):-A

9. Firewall is used in PC for

[A] Security

[B] Authentication

[C] Data transmission

[D] All of these

[E] None of these

(Ans):-A

10. A transmission in which receiver receives the data simultaneously as it is relayed is called

[A] Video-conferencing

[B] Online transmission

[C] Real-time transmission

[D] Offline transmission

[E] None of these

(Ans):-C

Page 84: sbi ques

11. A protocol is:

[A] Service that helps in communicating

[B] Rules that help computer talk

[C] Way of transmission data over the net

[D] All of these

[E] None of these

(Ans):-B

12. Which of the following are relational integrity constraints?

[A] Null value

[B] Prim any key

[C] Referential integrity

[D] All the above

[E] None of these

(Ans):-D

13. Which of the following do think is NOT to develop an application for computer?

[A] Feasibility study

[B] Designing

[C] Testing

[D] All the above

[E] None of these

(Ans):-D

14. Binary equivalent to 87 is:

[A] 1010111

[B] 1101111

[C] 1011111

[D] 10111111

Page 85: sbi ques

[E] None of these

(Ans):-A

15. In binary system the highest value of an 8-bit number is

[A] 255

[B] 256

[C] 253

[D] 259

[E] None of these

(Ans):-A

16. Which of them is true?

[A] Data can be facts / figures / letters / words symbols etc. that represent an idea or object

[B] Data is raw material from which information is derived.

[C] Data is numbers, alphabets

[D] All the above

[E] None of these

(Ans):-A

17. Maximum storage space is available on

[A] CDs

[B] Floppies

[C] ROM

[D] Hard disc

[E] None of these

(Ans):-D

18. ____________ deals with the restructuring of existing source code in reverse engineering.

[A] Abstraction

Page 86: sbi ques

[B] Completeness

[C] User�s screen

[D] Directionality

[E] None of these

(Ans):-D

19. Which of the following person should be made responsible for reporting maintenance problems in a LAN?

[A] Network administrator

[B] Users

[C] Security officer

[D] All the above

[E] None of these

(Ans):-B

20. Software change management decides:

[A] How to manage alternations, irrespective of the stage of the life cycle of a product

[B] Development stages working

[C] Maintenance stages working

[D] All the above

[E] None of these

(Ans):-APosted by ibpssbi po at 21:15 No comments: Email ThisBlogThis!Share to TwitterShare to FacebookShare to PinterestIBPS Specialist IT Officer professional knowledge practice-1 1. Which of the following is to be done the auditor while internet banking services audit ?

[A] Tour the server room

[B] The user is not allowed to login after defined repeated failed attempts

[C] Contract clearly states the services that will be provided by the vendor

[D] All of the above

[E] None of these

(Ans):-A

Page 87: sbi ques

2. ___________ can be one of the approach used to tax online transactions .

[A] Permanent establishment

[B] Residence based

[C] Income based classification

[D] All of the above

[E] None of these

(Ans):-D

3. To stop unauthorized access to the computer systems we should :

[A] Have a trust worthy system administrator

[B] Have a sound encryption policy

[C] Have as good password policy

[D] All of the above

[E] None of these

(Ans):-C

4. An attack on network will not bother to do :

[A] Network Investigation

[B] Network Management

[C] Access Gaining

[D] Escaping

[E] None of these

(Ans):- B

5. Which of the following details do you think should be checked on security breaches?

[A] Authorized access to system resources

[B] Un-authorized access to system

[C] Un-authorized attempts to change security definitions

Page 88: sbi ques

[D] All of the above

[E] None of these

(Ans):-D

6. The internet is an example of a:

[A] Packet switched network

[B] Cell switched network

[C] Circuit switched network

[D] All of the above

[E] None of the above

(Ans):-A

7. Which of the following methods are NOT used by kerbaos to establish a secure connection between the client and the target server?

[A] OCR

[B] Secret key

[C] Password

[D] Al of these

[E] None of these

(Ans):-C

8. ____________ is the process of organizing data in tables with the object of elimination redundancy and inconsistent dependency.

[A] Data modeling

[B] Normalization

[C] Data mining

[D] All of these

[E] None of these

(Ans):-B

9. Which can be used for development for an application?

Page 89: sbi ques

[A] Data

[B] Human factor

[C] Technology

[D] All of these

[E] None of these

(Ans):-D

10. The security features of the application should be the time of

[A] Programming phase

[B] Conceptual design

[C] Testing phase

[D] All of these

[E] None of these

(Ans):-B

11. Which of the following statements is ��FALSE�� pegarding selection of hardware / software?

[A] Budget allocated for application is limited to hardware and software cost.

[B] The application should be easy to use by programming rather than by the end user

[C] The requirement for the application should be decided

[D] All of these are false

[E] None of these

(Ans):-B

12. A good data base should have

[A] Financial stability of the vendor

[B] Scope for achieves

[C] Provision for data integrity and system integrity

[D] All of the above

[E] None of these

Page 90: sbi ques

(Ans):-D

13. To check if data that is being entered does not have blanks, we have

[A] A mathematically calculated check digit

[B] Control check to verify if the data is in accordance to pre-determined criteria

[C] Competeness check

[D] All of these

[E] None of these

(Ans):-C

14. A detective control is used to check if correct numbers are keyed in

[A] Sequence check

[B] Manual check

[C] Check digits

[D] All of these

[E] None of these

(Ans):-C

15. On August 23,2005, an an accounting clreck prepared an invoice dated August 31,2005, Which control can check this ?

[A] Size check

[B] Hash total

[C] Range check

[D] All of the above

[E] None of these

(Ans):-C

16. Processing control procedures have

[A] Authorization and authentication of users

[B] Access control for online data

Page 91: sbi ques

[C] Reporting of before and after images

[D] All of these

[E] None of these

(Ans):-D

17. Which cannot assure data accuracy in an application?

[A] Control total

[B] Limit and reasonableness test

[C] Echo checking

[D] All of these

[E] None of these

(Ans):-C

18. A computer works faster with

[A] GUI

[B] Mouse

[C] Keyboard

[D] All of these

[E] None of these

(Ans):-C

19. SMTP protocol is used for

[A] Sending email messages between servers

[B] Sits between client server

[C] Transmit news to all clients

[D] All of the above

[E] None of these

(Ans):-A

20. Which form of job scheduling uses triggers?

Page 92: sbi ques

[A] Manual scheduling

[B] Distributed scheduling

[C] Mainframe scheduling

[D] Automated scheduling

[E] None of these

(Ans):-C