SBI IT (Systems) Assistant Manager 2012 Question Paper
SBI IT (Systems) Assistant Manager 2012 Question Paper
SBI IT (Systems) Assistant Manager 2012 Question Paper
bankexamcareer.wordpress.com
d. LOCK
e. None of these
8. Which of the following term is related to the stack?
a. TOP
b. PUSH
c. POP
d. Rear
e. A, B and C.
9. In Queues, the end from where items inserted is called
a. Rear
b. Front
c. Top
d. Base
e. None of these
10. Which protocol is used for browsing website:
a. TCP
b. FITFP
c. FTP
d. TFTP
e. None of these
11. Which of the following is a browser?
a. Netscape Navigator
b. Mosaic
c. Mozilla Firefox
d. Google chrome
e. All of these
12. Black Box Testing sometime called -
a. Data flow testing
b. Loop testing
c. Behavioral testing
d. Graph based testing
e. None of these
13. The Objective of testing is
a. Debugging
b. To uncover errors
c. To gain modularity
d. To analyze system
e. None of these
14. Choose the right sequence of SDLC (Software development life cycle) steps
a. Design, Requirement Analysis, Coding, Testing
b. Requirement Analysis, Design, Coding, Testing
c. Requirement Analysis, Design, Testing, Coding
d. Requirement Analysis, Coding, Design, Testing
e. None of these
bankexamcareer.wordpress.com
15. The drawback of the binary tree sort are remedied by the
a. Linear Sort
b. Quick Sort
c. Heap Sort
d. Insertion Sort
e. All of these
16. Round robin scheduling is essentially the preemptive version of
a. FIFO
b. Shortest job first
c. Shortest remaining
d. Longest time first
e. None of these
17. ____ is the situation in which a process is waiting on another process, which is also
waiting on another process which is waiting on the first process. None of the
processes involved in this circular wait are making progress.
a. Deadlock
b. Starvation
c. Dormant
d. All of these
e. None of these
18. Assembly language is a _____
a. Low Level Language
b. Middle Level Language
c. High level Language
d. User Language
e. None of these
19. Which of the following is a type of translator?
a. Assembler
b. Compiler
c. Interpreter
d. All of the Above
e. None of these
20. Multiprogramming systems ___
a. Are easier to develop than single programming
b. Execute each job faster
c. Execute more jobs in the same time
d. Are used only on large main frame computers
e. None of these
21. The mechanism by which the data and functions are bound together with an
a. Inheritance
b. Encapsulation
c. Abstraction
d. Polymorphism
e. None of these
bankexamcareer.wordpress.com
22. The OSI model consists of ___layers.
a. Nine
b. Eight
c. Seven
d. Five
e. Eleven
23. Decryption & Encryption of data are the responsibility of the ___ layer.
a. Physical
b. Data link
c. Presentation
d. Session
e. Application
24. LANs can be connected by devices called ____ which operate in the data link layer?
a. Hub
b. Bridges
c. HDLC
d. Tunnel
e. None of these
25. In a ____ topology, if there are n devices in a network, each device has n-1 ports for
cable.
a. Mesh
b. Star
c. Bus
d. Ring
e. None of these
26. OLAP applications are widely used by ____ and it uses ____ Schema.
a. RDBMS , Bus
b. Operating System ,Star
c. Java , Bus
d. Data mining Techniques; Star or multidimensional
e. None of these
a. Database<File<Record<Field<Byte<Bit
b. Bit<Byte<Field<Record<File<Database
c. Bit>Byte>Record>Field>File>Database
d. Bit>Byte>File>Record>Field>Database
a. C language
b. .net programming
bankexamcareer.wordpress.com
c. RDBMS
d. C++ Language
e. Java byte Code
a. Increased security
b. Elimination data redundancy
c. Ability to associate related data ‘
d. Programming/data independence
e. All of the above
a. Tuple; Attribute
b. Attribute; Tuple
c. Tupple;Domain
d. Attribute; Domain
e. None of these
a. DELETE
b. UPDATE
c. DROP
d. ALTER
e. None of these
bankexamcareer.wordpress.com
34. Which of the following is record based logical model?
a. Network Model
b. Object oriented model
c. E-R Model
d. All of these
e. None of these
36. Which of the following virus overtake computer system when it boots and destroy
in-formation?
a. Trojan
b. System infectors
c. Boot infectors
d. Stealth virus
e. None of these
37. The relational model includes two general integrity rules. Integrity rule 1 is
concerned with ____ and integrity rule 2 is concerned with ____
38. ____ is person who has the central control over both data and application programs.
a. System engineer
b. Database administrator
c. Database manager
d. Technical analyst
e. None of these
39. An attribute of a relation that references the primary key of another relation is
known as the ____
bankexamcareer.wordpress.com
a. Foreign Key
b. Unique Key
c. Parent key
d. Child key
e. Index key
40. An entity set that does not have sufficient attributes to form a primary key is a
a. Three tiered
b. Multithread
c. Best for any platform
d. All of these
e. None of these
42. In a relational database, this is a data structure that organizes the information about
a single topic into row and columns.
a. Block
b. Record
c. Tuple
d. Table
e. None of these
bankexamcareer.wordpress.com
d. First Come First Served (FCFS)
e. None of the above
a. Unique Index
b. Composite Index
c. Single Index
d. Primary index
e. None of these
46. In SQL ,which command(s) is(are) used to remove rows from a table.
a. Delete
b. Remove
c. Truncate
d. Both
e. and (3)
f. None of the above
a. To create a table, defining its columns, integrity constraints, and storage allocation
b. To add a column/integrity constraint to a table.
c. To redefine a column
d. To change a table’s storage characteristics
e. All of the above
48. What is the abbreviation is used for a software package that permits the user to
create , retrieve and maintain records in a database?
a. DASD
b. CRMD
c. DBMS
d. All of these
e. None of the above
bankexamcareer.wordpress.com
50. In SQL, which command is used to add new rows to a table?
a. Alter Table
b. Add row
c. Insert
d. Append
e. None of the Above
bankexamcareer.wordpress.com