Dear Readers, IBPS is going to conduct Online
written examination for recruitment to the posts of Specialist Officers on 30th,
31st January and 14 february 2016.
Here We are providing some sample questions of Information Technology (IT) that will be useful for the candidates preparing for written examination. These questions will help candidate to know the style of questions being asked in online exam.
Sample Questions
1. Which of the following Operating System’s response time is very
crucial?
a. Real Time Operating
system
b. Batch operating System
c. Unix Operating System
d. Network Operating System
e. All of the above
Ans.:- (a.)
2. One method of programming a computer to exhibit human intelligence is called modeling or?
b. Batch operating System
c. Unix Operating System
d. Network Operating System
e. All of the above
Ans.:- (a.)
2. One method of programming a computer to exhibit human intelligence is called modeling or?
a. Cognition
b. Duplication
c. Simulation
d. Psychic amelioration
e. None of the above
Ans.:- (c.)
b. Duplication
c. Simulation
d. Psychic amelioration
e. None of the above
Ans.:- (c.)
3. Which among the following Interrupt is non-maskable?
a. TRAP
b. INTR
c. RST 7.5
d. RST 6.5
e. None of the above
Ans.:- (a.)
b. INTR
c. RST 7.5
d. RST 6.5
e. None of the above
Ans.:- (a.)
4. Which of the following is not used as data structure?
a. Graph
b. Directory
c. Array
d. Linked List
e. None of the above
Ans.:- (b.)
b. Directory
c. Array
d. Linked List
e. None of the above
Ans.:- (b.)
5. Choose one of the following logic family, to which maximum
clock rate is applied?
a. Flip-flop
b. Shift Register
c. Counter
d. Single logic gate
e. None of the above
Ans.:- (a.)
b. Shift Register
c. Counter
d. Single logic gate
e. None of the above
Ans.:- (a.)
6. Name the process in which updating of Master files is exercised
for reflecting the effects of current transactions?
a. File processing
b. Direct Processing
c. Front end processing
d. Flow Chart
e. Back end Algorithm
Ans.:- (a.)
7. Which of the following term is associated with the rearrangement data in a new sequence?
b. Direct Processing
c. Front end processing
d. Flow Chart
e. Back end Algorithm
Ans.:- (a.)
7. Which of the following term is associated with the rearrangement data in a new sequence?
a. Summarizing
b. Updating
c. Sorting
d. Batching
e. None of the above
Ans.:- (d.)
8. Which among the following manages the execution of user programs to avoid errors and improper use of the computer?
b. Updating
c. Sorting
d. Batching
e. None of the above
Ans.:- (d.)
8. Which among the following manages the execution of user programs to avoid errors and improper use of the computer?
a. Hardware
b. Microprocessor
c. ALU
d. System Software
e. Control Program
Ans.:- (e.)
b. Microprocessor
c. ALU
d. System Software
e. Control Program
Ans.:- (e.)
9. Which of the following is a standard way for a Web server to
pass a Web user's request to an application program and to receive data back to
forward to the user?
a. FTP
b. Data link layer
c. Forward DNS Look Up
d. Interrupt request
e. Common gateway interface
Ans.:- (e.)
10. Choose among the following that will not eliminate the ambiguities of a null value?
b. Data link layer
c. Forward DNS Look Up
d. Interrupt request
e. Common gateway interface
Ans.:- (e.)
10. Choose among the following that will not eliminate the ambiguities of a null value?
a. Define Sub types
b. Define the required attribute
c. Define each attribute as having an initial value that is recognized as blank.
d. Defining Super types
e. None of the above
Ans.:- (d.)
11. Which of the following rule states that a foreign key must either match a primary key value in another relation or it must be null?
b. Define the required attribute
c. Define each attribute as having an initial value that is recognized as blank.
d. Defining Super types
e. None of the above
Ans.:- (d.)
11. Which of the following rule states that a foreign key must either match a primary key value in another relation or it must be null?
a. Action assertion
b. Composite Attribute
c. Referential integrity constraint
d. Entity integrity rule
e. None of the above
Ans.:- (d.)
12. What is an applet?
b. Composite Attribute
c. Referential integrity constraint
d. Entity integrity rule
e. None of the above
Ans.:- (d.)
12. What is an applet?
a. It tracks the number of
visitors on the website.
b. It is a compiled program that executes on the client side.
c. It is an interpreted program that runs on the client side.
d. Collects data from visitors to a website.
e. None of the above
Ans.:- (b.)
13. Which error detection method uses 1’s complement arithmetic?
b. It is a compiled program that executes on the client side.
c. It is an interpreted program that runs on the client side.
d. Collects data from visitors to a website.
e. None of the above
Ans.:- (b.)
13. Which error detection method uses 1’s complement arithmetic?
a. Simple parity check
b. CRC
c. Check Sum
d. Two dimensional parity check
e. None of the above
Ans.:- (c.)
14. Which of the following defines A range Check?
b. CRC
c. Check Sum
d. Two dimensional parity check
e. None of the above
Ans.:- (c.)
14. Which of the following defines A range Check?
a. It verifies that all
required data is present.
b. It ensures that only the correct data type is entered into the field.
c. It determines whether a number is within a specified limit.
d. It tests if the data in two or more associated fields is logical
e. None of the above
Ans.:- (c.)
15. CIDR is known for Classless Inter Domain Routing & in which of the following type of networks it is used?
b. It ensures that only the correct data type is entered into the field.
c. It determines whether a number is within a specified limit.
d. It tests if the data in two or more associated fields is logical
e. None of the above
Ans.:- (c.)
15. CIDR is known for Classless Inter Domain Routing & in which of the following type of networks it is used?
a. Class A
b. Class B
c. Class C
d. All of the above
e. None of the above
Ans.:- (d.)
16. In A computer information system maintains several computer files. Which among them is called a perpetual file?
b. Class B
c. Class C
d. All of the above
e. None of the above
Ans.:- (d.)
16. In A computer information system maintains several computer files. Which among them is called a perpetual file?
a. Log file
b. History File
c. Specialized file
d. Master file
e. Back Up File
Ans.:- (d.)
17. An input stream transformation is done into _______ by the lexical analyzer?
b. History File
c. Specialized file
d. Master file
e. Back Up File
Ans.:- (d.)
17. An input stream transformation is done into _______ by the lexical analyzer?
a. Binary
b. Symbols
c. Regular expressions
d. Sequence of Tokens
e. All of the above
Ans.:- (d.)
18. A p- channel enhancement type MOSFET performs much the same function a PNP transistor except which of the following?
b. Symbols
c. Regular expressions
d. Sequence of Tokens
e. All of the above
Ans.:- (d.)
18. A p- channel enhancement type MOSFET performs much the same function a PNP transistor except which of the following?
a. Its operating speed is
very fast.
b. It is considerably larger.
c. It is operated by voltage rather than by a current.
d. It is operated by the current.
e. All of the above
Ans.:- (c.)
19. If NMOS dominates the LSI field, then_____ is used extensively where lowest power consumption is necessary.
b. It is considerably larger.
c. It is operated by voltage rather than by a current.
d. It is operated by the current.
e. All of the above
Ans.:- (c.)
19. If NMOS dominates the LSI field, then_____ is used extensively where lowest power consumption is necessary.
a. MOSFET
b. PMOS
c. NMOS
d. CMOS
e. All of the above
Ans.:- (d.)
b. PMOS
c. NMOS
d. CMOS
e. All of the above
Ans.:- (d.)
20. Which of the following family dissipates the minimum power?
a. CMOS
b. ECL
c. DTL
d. TTL
e. None of the above
b. ECL
c. DTL
d. TTL
e. None of the above
Stay with STUDY ROCKET more updates for
upcoming IBPS, RRB PO/Clerk 2015 examinations. We need your supports so please
send your valuable thoughts of our site.
No comments:
Post a Comment