2023 2024 EduVark > Education Discussion > General Discussion


  #1  
June 16th, 2014, 05:09 PM
Super Moderator
 
Join Date: Mar 2012
SBI Specialist Officer Previous Year Question Papers

Will you please share the previous year question paper of [SBI] Specialist Assistant Manager (System) Exam???

Here is the previous year question paper of [SBI] Specialist Assistant Manager (System) Exam


In SQL, which of the following is not a data Manipulation Language Commands?
Delete
Select
Update
Create
None of the above

The value for an attribute or a column are drawn from a set of values known as -
Tuples
Attributes
Domain
Column
None of these
Entities having primary key are called
Primary Key
Strong entities
Weak entities
Primary Key
None Of these

Which of the following is not a type of SQL statement?
Data Manipulation Language (DML)
Data Definition Language (DDL)
Data Control Language (DCL)
Data Communication Language (DCL)
None of these

Which of the following is not included in DML (Data Manipulation Language)
INSERT
UPDATE
DELETE
CREATE
None of these

TRUNCATE statement in SQL is a -
DML statement
DDL statement
DCL statement
DSL statement
None of these

To discard all pending data changes
COMMIT
ROLLBACK
SAVEPOINT
LOCK
None of these
Which of the following term is related to the stack?
TOP
PUSH
POP
Rear
A, B and C.

In Queues, the end from where items inserted is called
Rear
Front
Top
Base
None of these

Which protocol is used for browsing website:
TCP
FITFP
FTP
TFTP
None of these

Which of the following is a browser?
Netscape Navigator
Mosaic
Mozilla Firefox
Google chrome
All of these

Black Box Testing sometime called -
Data flow testing
Loop testing
Behavioral testing
Graph based testing
None of these

The Objective of testing is
Debugging
To uncover errors
To gain modularity
To analyze system
None of these

Choose the right sequence of SDLC (Software development life cycle) steps
Design, Requirement Analysis, Coding, Testing
Requirement Analysis, Design, Coding, Testing
Requirement Analysis, Design, Testing, Coding
Requirement Analysis, Coding, Design, Testing
None of these


The drawback of the binary tree sort are remedied by the
Linear Sort
Quick Sort
Heap Sort
Insertion Sort
All of these

Round robin scheduling is essentially the preemptive version of
FIFO
Shortest job first
Shortest remaining
Longest time first
None of these

____ is the situation in which a process is waiting on another process, which is also waiting on another process which is waiting on the first process. None of the processes involved in this circular wait are making progress.
Deadlock
Starvation
Dormant
All of these
None of these


Assembly language is a _____
Low Level Language
Middle Level Language
High level Language
User Language
None of these

Which of the following is a type of translator?
Assembler
Compiler
Interpreter
All of the Above
None of these

Multiprogramming systems ___
Are easier to develop than single programming
Execute each job faster
Execute more jobs in the same time
Are used only on large main frame computers
None of these

The mechanism by which the data and functions are bound together with an
Inheritance
Encapsulation
Abstraction
Polymorphism
None of these

The OSI model consists of ___layers.
Nine
Eight
Seven
Five
Eleven

Decryption & Encryption of data are the responsibility of the ___ layer.
Physical
Data link
Presentation
Session
Application
LANs can be connected by devices called ____ which operate in the data link layer?
Hub
Bridges
HDLC
Tunnel
None of these

In a ____ topology, if there are n devices in a network, each device has n-1 ports for cable.
Mesh
Star
Bus
Ring
None of these



OLAP applications are widely used by ____ and it uses ____ Schema.
RDBMS , Bus
Operating System ,Star
Java , Bus
Data mining Techniques; Star or multidimensional
None of these

Arrange the following in increasing order of their size.

Database<File<Record<Field<Byte<Bit
Bit<Byte<Field<Record<File<Database
Bit>Byte>Record>Field>File>Database
Bit>Byte>File>Record>Field>Database

JVM is a virtual machine that can execute ___

C language
.net programming
RDBMS
C++ Language
Java byte Code

ODBC is based on ___.

Structured Query Language.
C language
C++ language
.net
None of these

Which of the following is not an advantage of the data-base approach?

Increased security
Elimination data redundancy
Ability to associate related data ‘
Programming/data independence
All of the above

In relational database row and column is called as ____and ____respectively.

Tuple; Attribute
Attribute; Tuple
Tupple;Domain
Attribute; Domain
None of these

To delete a particular column in a relation the command used is:

DELETE
UPDATE
DROP
ALTER
None of these

A primary key if combined with a foreign key creates

Parent-Child relationship between the tables that connect them.
Many to many relationship between the tables that connect them.
Network model between the tables that connect them.
All of the above
None of the above

Which of the following is record based logical model?

Network Model
Object oriented model
E-R Model
All of these
None of these

The full form of DDL is

Dynamic Data Language
Detailed Data Language
Data Definition Language
Data Derivation Language
All of these

Which of the following virus overtake computer system when it boots and destroy in-formation?

Trojan
System infectors
Boot infectors
Stealth virus
None of these

The relational model includes two general integrity rules. Integrity rule 1 is concerned with ____ and integrity rule 2 is concerned with ____

Primary Key, Foreign key
Primary Key, composite key
Unique key, Foreign key
Composite Key, Foreign key
None of these

____ is person who has the central control over both data and application programs.

System engineer
Database administrator
Database manager
Technical analyst
None of these

An attribute of a relation that references the primary key of another relation is known as the ____

Foreign Key
Unique Key
Parent key
Child key
Index key

An entity set that does not have sufficient attributes to form a primary key is a

strong entity set
weak entity set
simple entity set
primary entity set.
None of these

The JDBC-ODBC bridge is

Three tiered
Multithread
Best for any platform
All of these
None of these

In a relational database, this is a data structure that organizes the information about a single topic into row and columns.

Block
Record
Tuple
Table
None of these

Which statements about the Java language are true?

Java supports both procedural and object-oriented programming
Java is only a procedural language.
Java is only an Object-Oriented.
Java is related to
None of the above.

Stack is also called ____

First In First Out (LIFO)
Last In First Out (FIFO)
First In Last Out (FILO)
First Come First Served (FCFS)
None of the above

The index created by primary key column is called _____

Unique Index
Composite Index
Single Index
Primary index
None of these

In SQL ,which command(s) is(are) used to remove rows from a table.

Delete
Remove
Truncate
Both
and (3)
None of the above

In SQL, the CREATE TABLE is used

To create a table, defining its columns, integrity constraints, and storage allocation
To add a column/integrity constraint to a table.
To redefine a column
To change a table’s storage characteristics
All of the above

What is the abbreviation is used for a software package that permits the user to create , retrieve and maintain records in a database?

DASD
CRMD
DBMS
All of these
None of the above

Choose the right sequence of virus stages -

Triggering, Damage ,Dormancy, propagation
Damage, Triggering ,Dormancy, propagation
Damage, Triggering, propagation ,Dormancy
Triggering, Damage, propagation, Dormancy
Dormancy, Propagation,. Triggering, Damage

In SQL, which command is used to add new rows to a table?

Alter Table
Add row
Insert
Append
None of the Above

To create a copy files in the event of system failure, you create a ___
Firewall
Redundancy
Backup
Restore file
None of these

Print server uses___ which is a buffler that holds before it is send to the printer.
Queue
Spool
Node
Stack
None of these

Which of the following identifies specific web page and its computer on the web page?
Web site
URL
Web site address
Domain Name
None of these

_____ is the computer to computer exchange of routine business data between trading partners in standard data formats.
CTS
DSR
VDR
EDI (Electronic data interchange)
None of these

Communication handler is basically an ____ 16 bit micro controller?
8085
8086
8086A
80C186
None of these

Which uses a Pre-Shared Key that is more than 7 and less than 64 characters in length?
WPA-PSK
TKIP
AES
All of these
None of these

Ping command is used for what purpose?
Test a device on a network whether it is reachable
Test a hard disk fault
Test a bug in the application
Test devices scanning quality
None of these

Two different kind of networks can be connected by using—
Bridges
Satellite
Gateway
Routers
None of these

Full adder is used to—
2 bit addition
3 bit addition
4 bit addition
6 bit addition
None of these

Most important advantage of an IC is its—
Easy replacement in case of circuit failure
Low power consumption
Extremely high reliability
Reduced cost
None of these

An 1C contains 50 gates each of which consists of 6 components. Its belongs to
VLSI
LSI
MS1
SSI
None of these

Which type of computers use the 8 bit code called EBCDIC?
Minicomputers
Mainframe computers
Super computer
Microcomputer
None of these

An AND gate
Implements logic addition
Is equivalent to a series switching circuit
Is any-or all gate
Is equivalent to a parallel switching circuit
None of these

The decimal equivalent of the binary number 11100001111 is
1806
1807
2806
All of these
None of these

Programs in which of the following memories can’t be erased ?
RAM
ROM
Cache Memory
Virtual Memory
None of these

The IP address 135.0.10.27 belongs to address class?
A
B
C
D
None of these

Which are not used in case of applet?
Read /write
Internet
Search engine
All of these
None of these

Which of the following is not a type of database?
Hierarchical
Relational
Network
Transition
None of these

Which of the following is not a type of SQL statement?
Data Manipulation Language
Data Definition language
Data control language
Data Standard language
None of these

In Queue , the items deleted at one end is called
Rear
Front
Top
Base
None of these

The drawback of the binary tree sort are remedied by the
Linear sort
Heap Sort
Insertion sort
Quick Sort
None of these

White Box testing, a software testing technique is sometimes called
Graph testing
Basis path
Glass box testing
Data flow testing
Loop testing

Which of the following is used with database?
EDI
Credit card
ATM
Payment gateway
Data mining

When a cracker attempts to misuse or steal data from a system, it is called
Stealing
Intrusion
Virus
Worm
None of these

To modify existing rows of the table ____ statement is used.
ALTER
MODIFY
UPDATE
COMMIT
DELETE



____ refers to a family of IEEE standards dealing with local area network and metropolitan area network.
802
800
801
803
None of these
Which is the general network standard for the data link layer in the OSI Reference Model?
IEEE 802.1
IEEE 802.2
IEEE 802.3
IEEE 802.4
IEEE 802.6

____ uses a standard called IEEE 802.6.
LAN
WAN
MAN
Internet
None of these

Repeater operates in which layer of OSI model?
Application layer
Presentation layer
Physical layer
Transport layer
Data link layer

Where does Bridge operate in OSI model?
Physical layer
Data link layer
Both (1)and (2)
Application layer
None of these

Which of the following uses the greatest number of layers in the OSI model?
Bridge
Repeater
Router
Gateway
None of these

Routers operate in which layer of the OSI model?
Physical layer
Data link layer
Network Layer
All of these
None of these
Modem is a _____ that modulates and demodulate signals
DCE (Data circuit-terminating equipment)
DTE (Data terminal equipment)
DTE-DCE
Both (1)and (2)
None of these

A communication network which is used by large organizations over regional, national or global area is called ___
LAN
WAN
MAN
Internet
None of these

At ___ layer, TCP/IP defines two protocols :Transmission Control Protocol (TCP) and User Datagram Protocol(UDP).
Transport layer
Network layer
Physical layer
Application layer
None of these

The ___ layer is the layer closest to transmission medium.
Transport
Network
Data link
Physical
None of the above

End to end connectivity is provided from host to host in :
Network layer
Session layer
Data link layer
Transport layer
None of these

Which of the following TCP/ IP protocol is used for transferring electronic mail messages from one machine to another?
SNMP
SMTP
RPC
FTP
None of these

Which of the following is an example of a client-server model?
FTP
DNS
TELNET
All of these
None of these

Which IEEE Standards is usz for Wi/Fi systems?
802.11
802.1
802.2
802.3
802.10

_____ is the continuous ability to send and receive data between interconnected networks.
FTP
SMTP
TNS
Network Interoperability
None of these

What is the default subnet mask for a class B network?
127.0.0.1
2550.0.0
255.255.0.0
255.255.255.0
None of these

What is loopback address?
127.0.0.1
255.0.0.0
255.255.0.0
127.0.0.0
None of these
Internet-like networks within enterprises.
Intranets
Switching alternating
Inter organizational networks
Extranets
None of these

A central computer surrounded by one or more satellite computers is called a
Bus network
Ring network
Star network
All of the above
None of these

With an IP address of 100,you currently have 80 subnets.What subnet mask should you use to maximize the number of available hosts?
192
240
248
224
252

Encryption/decryption provides a network with____
Privacy
Authenticity
Integrity
Non-reputation
None of these

The data to be encrypted at the sender site is called ___.The data to be decrypted at receiver end is called ____
Secret key, public key
Public key, secret key
Plaintext, ciphertext
Ciphertext, plaintext
None of these

In digital signature the private key is used for ___ and the public key for ____
Encryption, decryption
Decryption, encryption
Plaintext, ciphertext
Ciphertext, plaintext
None of these

A ___ ‘s main purpose is to prohibit unauthorized access to your computer via the Internet.
Popup blocker
Firewall
Spyware
Spam assassin
None of these

Last edited by Neelurk; April 25th, 2020 at 04:35 PM.
Similar Threads
Thread
IBPS RRB Specialist Officer Previous Year Question Papers
Previous Year Solved Question Paper Of IBPS Specialist Officer
Punjab National Bank Specialist Officer Previous Year Question Paper
IBPS Specialist Officer Previous Year Question Paper
IBPS Specialist Officer Law Previous Year Question Paper
Central Bank Of India Specialist Officer Previous Year Question Paper
IBPS Specialist Officer Previous Year Papers With Answers
Previous Year Question Paper Of IBPS Specialist Officer
SBI Specialist Officer Previous Year Question Paper with Answers
Punjab National Bank Specialist Officer Previous Question Papers
Previous Year Question Papers of SBI Specialist Cadre Officer
IBPS-SPL Law Specialist officer previous question papers
Last year question papers of specialist officer exam of Cooperative Bank
Previous Year Question papers for LIC development officer
Indian Institute of Banking And Finance specialist officer past year question papers



Quick Reply
Your Username: Click here to log in

Message:
Options



All times are GMT +5. The time now is 07:10 AM.


Powered by vBulletin® Version 3.8.11
Copyright ©2000 - 2024, vBulletin Solutions Inc.
Content Relevant URLs by vBSEO 3.6.0

1 2 3 4 5 6 7 8