Showing posts with label Bank IT OFFICER / Specialist Exam paper. Show all posts
Showing posts with label Bank IT OFFICER / Specialist Exam paper. Show all posts

Wednesday, 29 February 2012

Bank IT OFFICER / Specialist Exam PracticePaper -8 (DBMS -Database Management Systems )

1 Consider the join of relation R with a relation S. If R has m tuples and S has n tuples, then the maximum and minimum size of the join respectively are
(A) m+n and 0 (B) m+n and |m-n|
(C) mn and 0 (D) mn and m+n


2 Maximum height of a B+ tree of order m with n key values is
(A) Logm(n) (B) (m+n)/2
(C) Logm/2(m+n) (D) None of these


3 Which one is true statement :
(A) With finer degree of granularity of locking a high degree of concurrency is
possible.
(B) Locking prevents non – serializable schedules.
(C) Locking cannot take place at field level.
(D) An exclusive lock on data item X is granted even if a shared lock is already
held on X.


4 Which of the following statement on the view concept in SQL is invalid?
(A) All views are not updateable
(B) The views may be referenced in an SQL statement whenever tables are
referenced.
(C) The views are instantiated at the time they are referenced and not when they
are defined.
(D) The definition of a view should not have GROUP BY clause in it.


5 Which of the following concurrency control schemes is not based on the serializability property?
(A) Two – phase locking (B) Graph-based locking
(C) Time-stamp based locking (D) None of these .


6 Which of the following is a reason to model data?
(A) Understand each user’s perspective of data
(B) Understand the data itself irrespective of the physical representation
(C) Understand the use of data across application areas
(D) All of the above


7 If an entity can belong to only one lower level entity then the constraint is
(A) disjoint (B) partial
(C) overlapping (D) single


8 The common column is eliminated in
(A) theta join (B) outer joinAC14/AT11
(C) natural join (D) composed join


9 In SQL, testing whether a subquery is empty is done using
(A) DISTINCT (B) UNIQUE
(C) NULL (D) EXISTS


10. Use of UNIQUE while defining an attribute of a table in SQL means that the attribute
values are
(A) distinct values (B) cannot have NULL
(C) both (A) & (B) (D) same as primary key


11 .The cost of reading and writing temporary files while evaluating a query can be reduced
by
(A) building indices (B) pipelining
(C) join ordering (D) none of the above


12. A transaction is in __________ state after the final statement has been executed.
(A) partially committed (B) active
(C) committed (D) none of the above


13. In multiple granularity of locks SIX lock is compatible with
(A) IX (B) IS
(C) S (D) SIX


14. The statement that is executed automatically by the system as a side effect of the
modification of the database is
(A) backup (B) assertion
(C) recovery (D) trigger


15 .The normal form that is not necessarily dependency preserving is
(A) 2NF (B) 3NF
(C) BCNF (D) 4NF


16. A functional dependency of the form x → y is trivial if AC14/AT11 Database Management Systems
9
(A) y ⊆ x (B) y ⊂ x
(C) x ⊆ y (D) x ⊂ y

17. The normalization was first proposed by ______________.
(A) Code (B) Codd
(C) Boyce Codd (D) Boyce


18. The division operator divides a dividend A of degree m+n by a divisor relation B of
degree n and produces a result of degree
(A) m – 1 (B) m + 1
(C) m * m (D) m


19 .Which of the following is not a characteristic of a relational database model?
(A) Table (B) Tree like structure
(C) Complex logical relationship (D) Records


20. Assume transaction A holds a shared lock R. If transaction B also requests for a shared
lock on R.
(A) It will result in a deadlock situation.
(B) It will immediately be rejected.
(C) It will immediately be granted.
(D) It will be granted as soon as it is released by A .


Tuesday, 28 February 2012

Bank IT OFFICER / Specialist Exam PracticePaper -7 (DBMS -Database Management Systems )

1 In SQL the statement select * from R, S is equivalent to
(A) Select * from R natural join S. (B) Select * from R cross join S.
(C) Select * from R union join S. (D) Select * from R inner join S.


2 Which of the following is not a consequence of concurrent operations?
(A) Lost update problem. (B) Update anomaly.
(C) Unrepeatable read. (D) Dirty read.


3 As per equivalence rules for query transformation, selection operation distributes over
(A) Union. (B) Intersection.
(C) Set difference. (D) All of the above.


4 The metadata is created by the
(A) DML compiler (B) DML pre-processor
(C) DDL interpreter (D) Query interpreter


5 When an E-R diagram is mapped to tables, the representation is redundant for
(A) weak entity sets (B) weak relationship sets
(C) strong entity sets (D) strong relationship sets


6 When ∩ S = φ R , then the cost of computing R >< S is
 (A) the same as R × S (B) greater the R × S (C) less than R × S (D) cannot say anything
 

7 .In SQL the word ‘natural’ can be used with
(A) inner join (B) full outer join
(C) right outer join (D) all of the above


8 The default level of consistency in SQL is
(A) repeatable read (B) read committed
(C) read uncommitted (D) serializable


9 If a transaction T has obtained an exclusive lock on item Q, then T can
(A) read Q (B) write Q
(C) both read and write Q (D) write Q but not read Q


10 .Shadow paging has
(A) no redo (B) no undo
(C) redo but no undo (D) neither redo nor undo


11 . If the closure of an attribute set is the entire relation then the attribute set is a
(A) superkey (B) candidate key
(C) primary key (D) not a key


12 .DROP is a ______________ statement in SQL.
(A) Query (B) Embedded SQL
(C) DDL (D) DCL


13 .If two relations R and S are joined, then the non matching tuples of both R and S are
ignored in
(A) left outer join (B) right outer join
(C) full outer join (D) inner join


14 . The keyword to eliminate duplicate rows from the query result in SQL is
(A) DISTINCT (B) NO DUPLICATE
(C) UNIQUE (D) None of the above
`

15 .In 2NF
(A) No functional dependencies (FDs) exist.
(B) No multivalued dependencies (MVDs) exist.
(C) No partial FDs exist.
(D) No partial MVDs exist. AC14/AT11


16 . Which one is correct statement?
Logical data independence provides following without changing application programs:
(i) Changes in access methods.
(ii) Adding new entities in database
(iii) Splitting an existing record into two or more records
(iv) Changing storage medium
(A) (i) and (ii) (B) (iv) only, (C) (i) and (iv) (D) (ii) and (iii)


17 . In an E-R, Y is the dominant entity and X is a subordinate entity. Then which of the
following is incorrect :
(A) Operationally, if Y is deleted, so is X
(B) existence is dependent on Y.
(C) Operationally, if X is deleted, so is Y.
(D) Operationally, if X is deleted, & remains the same.


18 .Relational Algebra is
(A) Data Definition Language .
(B) Meta Language
(C) Procedural query Language
(D) None of the above


19. Which of the following aggregate functions does not ignore nulls in its results?.
(A) COUNT . (B) COUNT (*)
(C) MAX (D) MIN


20 .R (A,B,C,D) is a relation. Which of the following does not have a lossless join
dependency preserving BCNF decomposition
(A) A B, B CD (B) A B, B C, C D .
(C) AB C, C AD (D) A BCD

Bank IT OFFICER / Specialist Exam PracticePaper -6 (DBMS -Database Management Systems )

Q.1 Which of the following relational algebra operations do not require the participating
tables to be union-compatible?
(A) Union (B) Intersection
(C) Difference (D) Join


Q.2 Which of the following is not a property of transactions?
(A) Atomicity (B) Concurrency
(C) Isolation (D) Durability


Q.3 Relational Algebra does not have
(A) Selection operator. (B) Projection operator.
(C) Aggre gation operators. (D) Division operator.


Q.4 Checkpoints are a part of
(A) Recovery measures. (B) Security measures.
(C ) Concurrency measures. (D) Authorization measures.


Q.5 Tree structures are used to store data in
(A) Network model. (B) Relational model.
(C) Hierarchical model. (D) File based system.


Q.6 The language that requires a user to specify the data to be retrieved without specifying
exactly how to get it is
(A) Procedural DML. (B) Non-Procedural DML.
(C) Procedural DDL. (D) Non-Procedural DDL.


Q.7 Precedence graphs help to find a AC14/AT11
(A) Serializable schedule. (B) Recoverable schedule.
(C) Deadlock free schedule. (D) Cascadeless schedule.


Q.8 The rule that a value of a foreign key must appear as a value of some specific table is
called a
(A) Referential constraint. (B) Index.
(C) Integrity constraint. (D) Functional dependency.


Q.9 The clause in SQL that specifies that the query result should be sorted in ascending or
descending order based on the values of one or more columns is
(A) View (B) Order by
(C) Group by (D) Having


Q.10 What is a disjoint less constraint?
(A) It requires that an entity belongs to no more than one level entity set.
(B) The same entity may belong to more than one level.
(C) The database must contain an unmatched foreign key value.
(D) An entity can be joined with another entity in the same level entity set.


Q.11 According to the levels of abstraction, the schema at the intermediate level is called
(A) Logical schema. (B) Physical schema.
(C) Subschema. (D) Super schema.
e. none


Q.12 It is an abstraction through which relationships are treated as higher level entities
(A) Generalization. (B) Specialization.
(C) Aggregation. (D) Inheritance.


Q.13 A relation is in ____________ if an attribute of a composite key is dependent on an
attribute of other composite key.
(A) 2NF (B) 3NF
(C) BCNF (D) 1NF



Q.14 What is data integrity?
(A) It is the data contained in database that is non redundant.
(B) It is the data contained in database that is accurate and consistent.
(C) It is the data contained in database that is secured.
(D) It is the data contained in database that is shared.



Q.15 What are the desirable properties of a decomposition
(A) Partition constraint. (B) Dependency preservation.
(C) Redundancy. (D) Security.


Q.16 In an E-R diagram double lines indicate
(A) Total participation. (B) Multiple participation.
(C) Cardinality N. (D) None of the above.


Q.17 The operation which is not considered a basic operation of relational algebra is
(A) Join. (B) Selection.
(C) Union. (D) Cross product.


Q.18 Fifth Normal form is concerned with
(A) Functional dependency. (B) Multivalued dependency.
(C) Join dependency. (D) Domain-key.


Q.19 Block-interleaved distributed parity is RAID level
(A) 2. (B) 3
(C) 4. (D) 5.



Q.20 Immediate database modification technique uses
(A) Both undo and redo. (B) Undo but no redo.
(C) Redo but no undo. (D) Neither undo nor redo.

Bank IT OFFICER / Specialist Exam some Topics


Q1. What is Client-server Computing?

Ans: The short answer: Client/server is a computational architecture that involves client processes
requesting service from server processes.
The long answer: Client/server computing is the logical extension of modular programming. Modular programming has as its fundamental assumption that separation of a large piece of software into its constituent parts ("modules") creates the possibility for easier development and better maintainability. Client/server computing takes this a step farther by recognizing that those modules need not all be executed within the same memory space.

With this architecture, the calling module becomes the "client" (that which requests a service), and the called module becomes the "server" (that which provides the service). The logical extension of this is to have clients and servers running on the appropriate hardware and software platforms for their functions. For example, database management system servers running on platforms specially designed and configured to perform queries, or file servers running on platforms with special elements for managing files. It is this latter perspective that has created the widely-believed myth that client/server has something to do with PCs or Unix machines.

Q2 What is a Client process?

Ans: The client is a process (program) that sends a message to a server process (program), requesting that the server perform a task (service). Client programs usually manage the user-interface portion of the application, validate data entered by the user, dispatch requests to server programs, and sometimes execute business logic. The client-basedprocess is the front- end of the application that the user sees and interacts with. The client process contains solution-specific logic and provides the interface between the user and the rest of the application system. The client process also manages the local resources that the user interacts with such as the monitor, keyboard, workstation CPU and peripherals. One of the key elements of a client workstation is the graphical user interface (GUI). Normally a part of operating system i.e. the window manager detects user actions, manages the windows on the display and displays the data in the windows.

Q3 What is a Server process?

Ans : A server process (program) fulfills the client request by performing the task requested. Server programs generally receive requests from client programs, execute database retrieval and updates, manage data integrity and dispatch responses to client requests. Sometimes server programs execute common or complex business logic. The server-based process "may" run on another machine on the network. This server could be the host operating system or network file server; the server is then provided both file system services and application services. Or in some cases, another desktop machine provides the application services. The server process acts as a software engine that manages shared resources such as databases, printers, communication links, or high powered-processors. The server process performs the back-end tasks that are common to similar applications.

Q4 What is a Two-Tier Architecture?

Ans : A two-tier architecture is where a client talks directly to a server, with no intervening server. It is typically used in small environments (less than 50 users). A common error in client/server development is to prototype an application in a small, two-tier environment, and then scale up by simply adding more users to the server. This approach will usually result in an ineffective system, as the server becomes overwhelmed. To properly scale to hundreds or thousands of users, it is usually necessary to move to a three-tier architecture.

Q5 What is a Three-Tier Architecture?

A three-tier architecture introduces a server (or an "agent") between the client and the server. The role of the agent is manyfold. It can provide translation services (as in adapting a legacy application on a mainframe to a client/server environment), metering services (as in acting as a transaction monitor to limit the number of simultaneous requests to a given server), or intellegent agent services (as in mapping a request to a number of different servers, collating the results, and returning a single response to the client.

Monday, 27 February 2012

Bank IT OFFICER / Specialist Exam PracticePaper -5

1.Which of the following packages is used for composition in printing press?
(a) Lotus (b) dBase (c) Page Maker (d) Word Perfect


2. Which one of the following is not a computer language?
(a) BASIC (b) COBOL (c) LOTUS (d) FORTRAN


4. An advantage of a distributed word processing network is
(a) increased number of reports handled
(b) less delay in inter-office communications
(c) greater corporate control over outputs
(d) All of these


5.The retrieval of information from the computer is defined as
(a) collection of data (b) data retrieval operations
(c) output (d) data output collection


6. Which of the following terms could be used to describe the concurrent processing of computer programs via CRTs, on one computer system?
(a) Time sharing (b) On-line processing
(c) Interactive processing (d) All of these


7.The daily processing of corrections to customer accounts best exemplifies the processing mode of
(a) batch processing (b) real-time processing
(c) time-sharing (d) off-line processing


8. A characteristic of card system is
(a) slowness in processing data
(b) using cards as records of transactions
(c) needing a larger data staff
(d) All of these

9. Which of the following floppy sizes exists?
(a) 5.25 inches (b) 4.75 inches (c) 6 inches (d) 8 inches


10. MS-DOS is the name of a/an
(a) Application software (b) Hardware
(c) System software (d) None of these


11. A peripheral device used in a word processing system is
(a) Floppy disk (b) Magnetic card reader
(c) CRT (d) All of these


12. A term used interchangeably with diskette is
(a) Disk cartridge (b) Disk pack
(c) Floppy disk (d) Packette disk


13. An I/O device which provides photographic outputs for printing galleys, is the
(a) Camera printer (b) Automatic typesetter
(c) Radix printer (d) All of these


14. Which one of the following a file?
(a) Floppy disk (b) Magnetic drum (c) magnetic tape (d) None of these


15.A decimal equivalent of m second is
(a) 0.000001 sec (b) 1000000 sec (c) 0.001 sec (d) 1000 sec


16. A characteristic of the ASCII code is
(a) its limitation to a maximum of 96 character configuration
(b) its use of the zone codes 1010, 1011 and 1100
(c) its independence from Hollerith code
(d) All of these


17. A temporary storage area, attached to the CPU, for I/O operations, is a
(a) Channel (b) Buffer (c) Register (d) Core


18. The computer code for interchange of information between terminals is
(a) ASCII (b) BCD (c) BCDIC (d) Hollerith


19. ROM is composed of
(a) Magnetic cores (b) Micro-processors
(c) Photoelectric cells (d) Floppy disks


20. Which of the following is true?
(a) Plotters are not available for microcomputer systems
(b) Micro-computer are not programmed like conventional computers
(c) Mini-computers are task-oriented
(d) The contents of ROM are easily changed


21. Magnetic disk a medium known as
(a) Serial access (b) Direct access (c) Sequential access (d) Sequential and rotational access


22. A dot-matrix printer
(a) is an input-output device (b) is an output device only
(c) is an input device only (d) None of these


23.An octal number 237 is equal to the binary number
(a) 010 011 111 (b) 010 111 011
(c) 011 101 101 (d) 011 000 001


24. A term associated with the comparison of processing speed is
(a) FFTS (b) MPG (c) MIPS (d) CPS


25. The maximum size of a memory addressed by 12 bits is
(a) 1 K bytes (b) 16 K bytes (c) 32 K bytes (d) 4 K bytes

Bank IT OFFICER / Specialist Exam PracticePaper -4

1. Register is a
(a) Set of capacitors used to register input instructions in a digital computer
(b) Set of paper tapes and cards put in a file
(c) Temporary storage unit within the CPU having dedicated or general purpose use
(d) part of the auxiliary memory
(e) device to convert current signal into voltage signal


2. Errors in computer results could be due to
(a) encoding of data (b) transmission of data
(c) manipulation of data (d) all of the above
(e) none of above


3. Terminal is a
(a) device used to give supply to a computer
(b) Point at which data may leave or enter the computer
(c) ending point in a program
(d) point where wires are interconnected
(e) an input/output device


4. A computer programmer
(a) enters data into computer
(b) writes programs
(c) changes flow chart into instructions
(d) provides solutions to complex problems
(e) does total planning and thinking for a computer


5.Pickup wrong definition
(a) Off line – is a system peripheral equipment not controlled by CPU
(b) Online – is system in which peripheral equipment is in direct contact with CPU
(c) Peripherals – are hardware under the control of CPU, like punched card readers, tapes, drums, disk, output devices
(d) PL/I is the acronym Peripheral Listing /Index
(e) Program or routine is a set sequence of instructions given to computer for problem solving


6. When a CD (Compact Disc used in audio and Video system) is seen in sunlight, rainbow like colours are seen. This can be explained on the basis of phenomenon of
(a) reflection and diffraction
(b) reflection and transmission
(c) diffraction and transmission
(d) refraction, diffraction and transmission
(e) none of these


7. For reproducing sound, a CD (Compact Disc) audio player uses a
(a) quartz crystal
(b) titanium needle
(c) laser beam
(d) barium titanium ceramic
(e) none of these


8. The memory of a computer is commonly expressed in terms of Kilobytes or Megabytes. A byte is made up of
(a) eight decimal digits (b) eight binary digits
(c) two binary digits (d) two decimal digits (e) none of these


9. Which of the following circuit is used as a ‘Memory device’ in computers?
(a) Rectifier (b) Flip-Flop (c) Comparator (d) Attenuator (e) none of these


10. Which is/are the main provisions of Information Technology (IT) Act, 2000?
(a) Legal recognition to digital signatures and documents.
(b) Finalisation of contracts through electronic media.
(c) Making hacking with computer system an office.
(d) All of the above


11. Consider the following statements about Internet facility:
I. It serves as the largest one-line information system.
II. It provides the most dependable and latest mode for sending E-mail.
III. Recurring expenditure on communication E-mail is very high.
IV. It is often misused and has triggered cyber-crimes.
Which of these statements are correct?
(a) I, II and IV (b) I and IV (c) II, III and IV (d) II and III


12. The computer device primarily used to provide hard copy is the
(a) CRT (b) Line Printer (c) Computer Console (d) Card Reader


13. The unit of hardware, which an operator uses to monitor computer processing, is the
(a) Card Reader (b) CPU (c) Line Printer (d) Console


14. Computers can be classified in which of the following hierarchical orders?
(a) PC, Large, Super Micro, Super Computer
(b) Super Micro, PC, Large, Super Computer
(c) PC, Super Micro, Large, Super Computer
(d) Large, Super Micro, Super Computer, PC


15. Which one of the following is a stored program machine?
(a) Micro-processor (b) Calculator
(c) Analog-computer (d) Micro-computer


16. First generation computer systems used
(a) Transistors (b) Vacuum tubes
(c) Magnetic cores (d) Silicon chips


17. Transistors are associated with which computer system?
(a) First generation (b) Fifth generation
(c) Second generation (d) None of these


18. Charles Babbage invented
(a) ENIAC (b) Difference engine (c) Electronic computer (d) Punched card


19. Who wrote the book ‘Computer Liberation and Dream Machine’, the first book on personal computers?
(a) John McCarthy (b) Ted Nelson (c) Niklaus Wirth (d) Karl Capek


20. Who was the inventor of mechanical calculator for adding numbers?
(a) Charles Babbage (b) Peano (c) Newton (d) Pascal


21. The most widely used commercial programming computer language is
(a) BASIC (b) COBOL (c) FORTRAN (d) PASCAL


22.The brain of a computer is
(a) CPU (b) CD (c) Floppy disc (d) Megabyte


23. Foxpro’ is
(a) a medicine (b) a disease (c) a computer language (d) an animal


24.In computer language, one kilobyte equals
(a) 1000 bytes (b) 1024 bytes (c) 100 bytes (d) 8 bytes


25. Which one of the following is not a programming language of a computer?
(a) BASIC (b) FORTRAN (c) LASER (d) PASCAL



Bank IT OFFICER / Specialist Exam PracticePaper -3

1: Which of the following is the largest unit of data?
A.Bit
b.Byte
c.Nibble
d.Word
e.None of these


2: A standard keyboard used in personal computer has how many keys?
a.102
b.104
c.105
d.107
e.None of the above


3: A sequence of operations performed on data to convert it into useful information is called -
A. Program
B. Data mining
C. Data processing
D. Data cycle
E. None of the above


4: CD-ROM stands for :
A. Compact disk - read once memory
B.Compact disk - read only memory
C.Compressed data - read once memory
D.Compressed data - read only memory
E.None of the above


5: 8 bytes is equal to _______.
A.8 bits
B.1 KB
C.32 bits
D.48 bits
E.64 bits


6: Which of the following printer is an example of line printer?
A.Dot matrix
B.Bubble jet
C.Daisy wheel
D.Band printer
E.None of the above


7: A program's syntax errors are detected by _______.
A.CPU
B.Debugger
C.Compiler
D.Translator
E.None of the above


8: To enter sound signals inside the computer, a computer must have a_____.
A.Hard disk
B.Sound card
C.CD-ROM
D.Mouse
E.All the above


9: Data processing is also known as ______.
A.Calculating
B.Data mining
C.Data warehousing
D.Computing
E.None of the above


10: A computer's main function is ;
A.Display data
B.Convert data into information
C.Convert information into storage
D.Create data from information
E.None of the above

Bank IT OFFICER / Specialist Exam PracticePaper -2

1. A file containing relatively permanent data is
a)Random file b)Master file c)Transaction file d)Sequential file e) None


2. One million bytes of information is abbreviated as
a) Bit b) KB c) MB d) GB e) None


3. Bing is also known as
a) MSN Search a) Live Search b) Windows Live Search d)) All e) None


4. Microsoft’s latest operating system is
a)Vista b)Vista Advanced c)Windows XP d)Windows 8 e)None


5. AltaVista is a
a)Search engine b)Windows OS c)Browser d)Virus e)Vista Theme


6. What is other name of LAN Card
a)MODEM b)NIC c)Internet Card d)Network Connector e)None


7. Which is the latest type of printer interface?
a)Serial b)DVI c)Parallel d)USB e)none


8. In Windows XP, which shortcut is used you lock the computer?
a) Ctrl + L
b) Windows key + K
c) Ctrl + K
d) Scroll Lock key
e) Windows key + L


9. The maximum number of IDE devices that can be installed in an ATX computer is
a) 1 b) 2 c) 3 d) 4 e) 5


10. When using characters in Windows, what code does Windows use?
a)ASCII b)UNICODE c)MORSE d)IDBC e)WESTRN


11. Which protocol provides name resolution for host and domain names for a TCP/IP network?
a)HTTP b)TELNET c)SMTP d)DNS e)SNMP


12. How fast is Fast Ethernet?
a)10 Mbps b)100 Mbps c) 256 Kbps d)1 Gbps e)10 Gbps


13. YouTube service of streaming videos online is provided by
a)Google b)Microsoft c)IBM d)Apple e)Sony


14. Which one is not true?
a)Google is a search engine
b)Ubuntu is a system software
c)Windows XP launched in 2001
d)Buzz is an e-Commerce company
e) None


15. A Laptop or Notebook marked 802.11n in its feature, it means
device support
a)Bluetooth b)WiMAX c)USB d)Wi-Fi LAN e)3G


16. In EXCEL, the default workbook opens with
a) One worksheets
b) Two worksheets
c) Three worksheets
d) Four worksheets
e) None


17. In Excel, this surrounds an active cell.
a) Cell border
b) Cell outline
c) Cell rim
d) Cell selector
e) None


18. In H2O the figure 2 is appeared lowered. Which effect has been applied?
a)Superscript
b)Lowered
c)Subscript
d)Laid down
e)None


19. What is the Thesaurus used for?
a) Grammar options
b) Spelling options
c) Opposite Words
d) Synonyms and Antonyms
d) None


20. What is the shortcut of Research command in MS-Word?
a)Alt + click b) F3 c) Ctrl + F d) F7 e) None

Bank IT OFFICER / Specialist Exam PracticePaper -1

1. The _____ states that a foreign key must either match a primary key value in another relation or it must be null.
(a) entity integrity rule
(b) referential integrity constraint
(c) action assertion
(d) composite attribute
(e) None of these


2. An applet __________
(a) is an interpreted program that runs on the client
(b) tracks the number of visitors to a Website
(c) is a compiled program that usually runs on the client
(d) collects data from visitors to a Website
(e) None of these



3. A _____ sometimes called a boot sector virus, executes when a computer boots up because it resides in the boot sector of a floppy disk or the master boot record of a hard disk.
(a) system virus
(b) Trojan horse virus
(c) file virus
(d) macro virus
(e) None of these



4. Which error detection method uses one’s complement arithmetic?
(a) Simply parity check
(b) Checksum
(c) Two-dimensional parity check
(d) CRC
(e) None of these



5. A result of a computer virus can not lead to ___.
(a) Disk Crash
(b) Mother Board Crash
(c) Corruption of program
(d) Deletion of files
(e) None of these



6. The network interface card of LAN is related to following layer of OSI Model-
(a) Transport
(b) Network
(c) Data Link
(d) Physical
(e) All of these



7. Which of the following does not describe a data warehouse?
(a) Subject-oriented
(b) Integrated
(c) Time-variant
(d) Updateable
(e) None of these



8. Which of the following is true ?
(a) Logical design is software-dependent
(b) In a distributed database, database is stored in one physical location
(c) Conceptual design translates the logical design into internal model
(d) Logical design is software independent
(e) None of these



9. A range check _____
(a) ensures that only the correct data type is entered into a field
(b) verifies that all required data is present
(c) determines whether a number is within a specified limit
(d) tests if the data in two or more associated fields is logical
(e) None of these



10. The total set of interlinked hypertext documents worldwide is-
(a) HTTP
(b) Browser
(c) WWW
(d) B2B
(e) None of these



11. With the object-oriented (OO) approach, an object encapsulates, or_____.a programmer.
(a) carries out, the details of an object for
(b) hides, the details of an object from
(c) reveals, the details of an object to
(d) extends, the details of an object beyond
(e) None of these



12. Every computer connected to an intranet or extranet must have a distinct_____
(a) firewall
(b) proxy server
(c) IP address
(d) domain name
(e) None of these



13. A table of bits in which each row represents the distinct values of a key?
(a) Join index
(b) Bitmap index
(c) B + Tree
(d) Hierarchical index
(e) None of these



14. The degree of detail that should be incorporated into a database depends on what?
(a) Data integrity
(b) The type of database
(c) The user’s perspective
(d) The business practices and policies
(e) None of these



15. The ___.converts digital signals to analog signals for the purpose of transmitting data over telephone lines.
(a) Modem
(b) Router
(c) Gateway
(d) Bridge
(e) All of these



16. Before a package can be used in a java program it must be___.
(a) executed
(b) referenced
(c) imported
(d) declared
(e) None of these



17. Choose the correct way to indicate that a line in a C++ program is a comment line, that is, a line the will not be executed as an instruction___.
(a) begin the line with a # sign
(b) begin the line with double slashes (/ /)
(c) begin and end the line with double hyphens (-_-)
(d) indent the line
(e) None of these



18. Programming language built into user programs such as Word and Excel are known as____
(a) 4GLs
(b) macro languages
(c) object-oriented languages
(d) visual programming languages
(e) None of these



19. Firewalls are used to protect against___.
(a) Unauthorized Attacks
(b) Virus Attacks
(c) Data Driven Attacks
(d) Fire Attacks
(e) All of these



20. This is a standard way for a Web server to pass a Web user’s request to an application program and to receive data back to forward to the user-
(a) Interrupt request
(b) Forward DNS lookup
(c) Data-Link layer
(d) File Transfer Protocol
(e) Common gateway interface



21. Three SQL, DDL, CREATE commands are__.
(a) Schema, Base and Table
(b) Base, Table and Schema
(c) Key, Base and Table
(d) Schema, Table and View
(e) None of these



22. Data are ________ in client/server computing.
(a) never sent to the client machine
(b) sent in very large sections to save processing time
(c) sent only upon the client’s request
(d) sent in complete copies for the client to filter and sort
(e) sent from the client to the server for processing



23. Which of the following will not eliminates the ambiguities of a null value?
(a) Define the attribute as required
(b) Define subtypes
(c) Define each attribute as having an initial value that is recognized as blank
(d) Define supertypes
(e) None of these



24. The____directory is mandatory for every disk.
(a) Root
(b) Base
(c) Sub
(d) Case
(e) None of these



25. This is a group of servers that share work and may be able to back each other up if one server fails.
(a) Channel bank
(b) Cluster
(c) Tiger team
(d) Serverless backup
(e) Logical unit