#1
July 4th, 2014, 10:24 AM
| |||
| |||
SBI Specialist Officers Exam Previous year Question Paper
Kindly provide me the SBI Specialist Officers Exam Previous year Question Paper. When a cracker attempts to misuse or steal data from a system, it is called Stealing Intrusion Virus Worm None of these To modify existing rows of the table ____ statement is used. ALTER MODIFY UPDATE COMMIT DELETE Q26 to 50 ____ refers to a family of IEEE standards dealing with local area network and metropolitan area network. 802 800 801 803 None of these Which is the general network standard for the data link layer in the OSI Reference Model? IEEE 802.1 IEEE 802.2 IEEE 802.3 IEEE 802.4 IEEE 802.6 ____ uses a standard called IEEE 802.6. LAN WAN MAN Internet None of these Repeater operates in which layer of OSI model? Application layer Presentation layer Physical layer Transport layer Data link layer Where does Bridge operate in OSI model? Physical layer Data link layer Both (1)and (2) Application layer None of these Which of the following uses the greatest number of layers in the OSI model? Bridge Repeater Router Gateway None of these Routers operate in which layer of the OSI model? Physical layer Data link layer Network Layer All of these None of these Modem is a _____ that modulates and demodulate signals DCE (Data circuit-terminating equipment) DTE (Data terminal equipment) DTE-DCE Both (1)and (2) None of these A communication network which is used by large organizations over regional, national or global area is called ___ LAN WAN MAN Internet None of these At ___ layer, TCP/IP defines two protocols :Transmission Control Protocol (TCP) and User Datagram Protocol(UDP). Transport layer Network layer Physical layer Application layer None of these The ___ layer is the layer closest to transmission medium. Transport Network Data link Physical None of the above End to end connectivity is provided from host to host in : Network layer Session layer Data link layer Transport layer None of these Which of the following TCP/ IP protocol is used for transferring electronic mail messages from one machine to another? SNMP SMTP RPC FTP None of these Which of the following is an example of a client-server model? FTP DNS TELNET All of these None of these Which IEEE Standards is usz for Wi/Fi systems? 802.11 802.1 802.2 802.3 802.10 _____ is the continuous ability to send and receive data between interconnected networks. FTP SMTP TNS Network Interoperability None of these What is the default subnet mask for a class B network? 127.0.0.1 2550.0.0 255.255.0.0 255.255.255.0 None of these What is loopback address? 127.0.0.1 255.0.0.0 255.255.0.0 127.0.0.0 None of these Internet-like networks within enterprises. Intranets Switching alternating Inter organizational networks Extranets None of these A central computer surrounded by one or more satellite computers is called a Bus network Ring network Star network All of the above None of these With an IP address of 100,you currently have 80 subnets.What subnet mask should you use to maximize the number of available hosts? 192 240 248 224 252 Encryption/decryption provides a network with____ Privacy Authenticity Integrity Non-reputation None of these The data to be encrypted at the sender site is called ___.The data to be decrypted at receiver end is called ____ Secret key, public key Public key, secret key Plaintext, ciphertext Ciphertext, plaintext None of these In digital signature the private key is used for ___ and the public key for ____ Encryption, decryption Decryption, encryption Plaintext, ciphertext Ciphertext, plaintext None of these A ___ s main purpose is to prohibit unauthorized access to your computer via the Internet. Popup blocker Firewall Spyware Spam assassin None of these IBPS specialist Question paper 2012 and 2013 Exam Already given. Click me For entire Archive of all IBPS/Banking related articles, visit Mrunal.org/IBPS If any senior player/ maestro wants to share wisdom- please post it under the comments. Ads by RemoveTheAdAppAd Options Previously in this category [IBPS] finally Result of both Bank PO/MT and Clerk CWE is out, provisional & reserve list declared,validity till 31st March 2015 [IBPS] Interview Preparation (Part 1 of 5) Stop Feeling Guilty and Tell me about yourself, Stupid cutoffs and Insecurities about Profile [IBPS] Interview Preparation (Part 2 of 5) Why BankPO? Preparing the Sales Pitch: Career growth, job satisfaction, negative factors, work-profile, Promotion, hierarchy, Sample Answers [IBPS] Interview Preparation (Part 3 of 5) Banking, Economy, Current Affairs, HR and GK related questions for BankPO/MT [IBPS] Interview Preparation (Part 4 of 5) Graduation related Questions: IT, B.E., B.Tech, Biotech, B.Com, BBA, Arts, sample questions from previous interviews Subscribe by Email || / Print || PDF This Post (Need Chrome Browser) अब तक 197 कमेंट्स लिखी गयी priyanka 13/04/2014 at 21:49 Sir, Is their is negative marking in the SBI SO Exam…?? Reply Sumeet 01/05/2014 at 13:09 yes. for every wrong answer 0.25 of marks will be deducted from your score. So it’s always better to leave those questions you’re not sure & attempt only when you’re confident. Reply Kitty 14/04/2014 at 00:26 Plz sir send me other practice paper of PK…plz sir…. Reply Kitty 14/04/2014 at 00:28 Plz sir send me other practice paper with solution of PK…plz sir…. Plz it’s urgent Reply Mahesh 14/04/2014 at 00:57 Hi sir I want previous question paper of sbi so it off.with answer and model paper for pracitce with answer. Reply Mahesh 14/04/2014 at 00:58 Hi sir I want previous question paper of sbi so it off.with answer and model paper for practice with answer. Reply jaiprakash 14/04/2014 at 10:39 is there is negative marking in sbi specialist exam? Reply devD 14/04/2014 at 13:21 hello guys.. Plan well before appearing in the exam. It becomes easy if you plan how to distribute the time for solving each sections. Dont waste too much time on a single section. Focus more on the IT .. thats the fate changer.. good luck. Reply Divya 14/04/2014 at 19:23 Plz provide answers for the given questions which helps in preparation. Reply Rohit 15/04/2014 at 14:26 sir pls send me previous paper for the post of asst manager (system). Reply Shiraj 16/04/2014 at 00:03 Thanks for the SBI (Systems) paper sir.. Please provide the key if anyone have.. my email id is shiraj.146@gmail.com Thank you.. Reply satender 16/04/2014 at 13:47 Please send answer of above question and also send practise paper Reply Arvindpshah 17/04/2014 at 20:23 Howdy Hope you may be fine, Since it is not mentioned in the advertisement , So Stay Guarded Reply Kitty 16/04/2014 at 14:05 Sir u r nt replied ….plz help me….answer and practices paper of PK…and is there negative Marking Reply Danny 16/04/2014 at 16:19 Plz give the solution for that Reply sk 17/04/2014 at 23:01 thanks for the valuable info Reply Kitty 17/04/2014 at 23:28 In advertise nt mention negative marking…..tell me exact Reply manjusha 18/04/2014 at 08:19 pls send me answers to it … Reply anurag 18/04/2014 at 12:19 Can u plz send me answers of all these questions Reply Rekha 18/04/2014 at 12:25 vry valueble info i get through ur site… can i get whole paper of previous yr 2 summerrize plz send me on my id.. thank u Reply hi sir... 18/04/2014 at 15:22 i started reading ur model papers … but it wil be more helpfull if u can provide us with answer Reply ratish 18/04/2014 at 17:19 sir ………….plz send me ansr key [ bachhaoratu@gmail.com] Reply Ashum 19/04/2014 at 15:43 The paper was tougher compared to previous ones. reasoning and english were easy. maths was tough as extensive calculations were required. professsional paper was on expected lines. however automata was a surprise entrant in the paper which inspired many questions. my attempts are as follows — reasoning 29 maths 10 english 22 and technical 42. Reply icecool11 20/04/2014 at 11:22 I think we should make an effort to recall and recompile the professional knowledge paper and thereafter discuss the answers . The questions I recall are as follows- 1. Belady’s Anomaly 2. Most used scheduling- Pre emptive scheduling. 3. select from where arrangement 4. S-> ASbc..AB->BA…wala.. ans was abc. 5. Hub level 6.coulmn attribute 7. relational algebra and calculus procedural and non procedural 8. paging in segmentation 9. primary key is selected from candidate key 10. Foreign key..DRQ 11. Foreign key..DRQ 12. Subnet address 13. some symbol in automata kind 14. top down parser 15. Relation/Table..DRQ 16. Highest no. of network addresses 17. summtion(1,3,4…) Kaurnaugh map 18. sorting of 200 words in 200 s, 800s 19. Distributed Operating System 20. ADD X Y 21. Protocol used in sthg– SNMP/SMTP/ARP/RARP 22. DSP full form 23. Transport layer corresponds to Internet layer in TCP 24. Human intervention topology- T based something DRQ means Dont remember question. Kindly help in recalling rest of the questions too. Reply Gunjan 24/04/2014 at 13:01 ISP full form? Reply venkatesh.j 06/05/2014 at 19:35 Internet service provider Reply Apurv 20/04/2014 at 19:49 Hello Sir, I have given the SBI Assistant Manager System on 19th April.Here are my attempt: Quant:-10 Reasoning:-15 Pk:-33 These with about 95% accuracy English:-22 With 80-90% accuracy. What are my chances?? Reply Vishal 22/04/2014 at 21:35 bhai i have done , 10 – quant , 14 reasoning , 18 english 100 percent accuracy , and professional me 36 may be out of which 5 are wrong Reply egogambit 23/04/2014 at 19:03 NO chance what so ever, as-FOR UR candidates 10+15+(33*1.5)=49.5+11=86maxx these exams have less seats and cutoffs over 100 but u may clear sectional cutoffs! Reply icecool11 24/04/2014 at 23:38 10+14+18+31*2-5*0.5=101.8 @vishal Reply chandresh 20/04/2014 at 23:21 Sir , is there overall cutoff of partI or maths ,resn , and eng. , have their own cutoff ? Reply Nideena 24/04/2014 at 16:50 no overall cutoff…u juz need to clear min cut off in each section (not each part). Reply icecool11 24/04/2014 at 23:40 nideena ..you are on pagalguy too.right? Reply Nideena 25/04/2014 at 19:19 yup… Reply angel 21/04/2014 at 02:34 Hello all! I remember some of questions , i appeared on 19 april 9:30 session…. in addition to what icecool11 has posted… 1. SQL full form… 2. real time os uses which scheduling ….. kindly all of us put forward some questions… Reply basavaraj 21/04/2014 at 10:45 this post is very useful. thanks providing this info… Reply chandni ji 22/04/2014 at 01:42 when is d result expected ….??? anybody any idea….??? wat tym result took in sbi so 2012 exam…..??? bhai khub tukke mare h……22-reasoning 19-maths 18-english 44-proffesional …..it think mera profesional part easy tha….so is there any role of scaling here……do any one knw dis……coz i c some differnt ques in some comnts…. Reply Prashant Kumar 22/04/2014 at 08:03 For the Paper Held on 19.04.14 and its solutions refer to Road to PSU Reply Utkarsh 22/04/2014 at 10:17 Hello Sir, I have given the SBI Assistant Manager System on 19th April. Here are my attempt: Quant:- 14 Reasoning:- ~22 These with about 95% accuracy English:- ~17 With about 80% accuracy Pk:-40 with ~80% accuracy What are my chances? Reply pankaj 23/04/2014 at 12:14 Maths was lengthier.paper was tougher than previous one.cut-off should be less for part 1…any idea guys in how many days the result will out??? Reply susmitha 23/04/2014 at 18:41 i too gave my sbi spl exam 19th paper1-62 paper2-40 Reply Danish Ahmad Khan 24/04/2014 at 09:21 @admin I must thank you for doing this commendable work Sir. The instructions and questions provided above helped immensely in the exam. I just wanna wish you luck for the future. Reply pankaj 24/04/2014 at 09:26 But I got different questions.did it vary for candidateso candidates??? Reply Sribharath 25/04/2014 at 18:49 SBI SO Eve-Shift Q&A (based on memory) 1.which two files are used during operation of the DBMS? Ans:data dictionary and transaction log 2.Fragmentation is - Ans: fragments of memory words unused in a page 3.Virtual memory is - Ans: an illusion of an extremely large memory 4.Access time of symbol table will be logarithmic if it is implemented using Ans: Search Trees 5.Manager’s salary details are to be hidden from Employee Table. This Technique is called as(UGC NET) Ans: External level Datahiding or Conceptual level hiding(?) 6.Which of the following addresses is used to deliver a message to the correct application program running on a host?(UGC NET) Ans: Port 7.In classful addressing, the IP address 190.255.254.254 belongs to(UGC NET) Ans: Class B 8.While estimating the cost of software, Lines of Code (LOC) and Function Points (FP) are used to measure which one of the following?(UGC NET) Ans: Size of software 9.Page stealing is_____ Ans: Taking page frame from another working set 10.XOR Gate is ideal for testing parity because even parity produce____ and odd parity produce____ output? Ans: Low,High(as in Indiabix site) 11.Question related to Data link layer error detection Ans: Cyclic Redundancy check 12.Virus __ Ans:Vital Information Resource under siege 13. Eclipse in ER diagram represents___ Ans: Attributes 14. Similar term for related records Ans: File 15. Railway track best suits___ Ans: Half-Duplex 16. students and course enrolled relationship of Ans: Many to Many (Doubtful whether the question was Student to course relation?) 17.Tuple is a Ans: Row level attribute 18.A table is synonym for___ Ans: Relation 19. Thrasing is most significantly affected by___ Ans: Program structure(?) 20.End to end and Host to Host delivery is a reposibility of ___ Layer Ans: Transport Layer 21. Device which Compiles the code in system which wil be used in another system Ans: Cross compiler 22.First operator used in microprocessor is__ (Question is wrong it seems. Operating system should be in place of operator ) Ans: CP/M 23. What is multiprogrmming operating system? Ans: Single user can run mulpile programs… 24. three types of authorities of user category can be updated using which command chuser,chgrp,cat…. Ans:? 25. What uses 7 bits to represent each character Ans: Ascii 26. Data integrity conrol is__ Ans: has the data dictionary keep the date and time of last access last back-up, and most recent modification for all files 27.There are certain packages that allow people to define data items, place these items in particular records, combine the records into designated files and then manipulate and retrieve the stored data. What are they called? Ans: DBMS 28.Which of the following derivations does a bottom-up parser use while parsing an input string ? The input is scanned from left to right. 29.Compiler is preferred over intrepretter because A. It can generate stand-alone programs that often take less time for execution. B. It is much helpful in the initial stages of program development. C. Debugging can be faster and easier. D. If one changes a statement, only that statement needs recompilation. Ans: (B)It can generate stand-alone programs that often take less time for execution.(?) 30.What utility do you use to transfer files and exchange messages? Ans : EMAIL 31.The main difference between a DFSA and an NDFSA is Ans: in DFSA, from any given state, there can’t be any alphabet leading to two diferent states 32.190.255.254.254 is of which class Ans Class B 33.The number of instructions needed to add ‘n’ numbers and store the result in memory using only one address instruction is A)N+1 B)N-1 c)independent of n Ans : A or C (?) 34From a given tautology, another tautology can be derived by interchanging. A). 0 and 1 B) And and OR C) 0 and 1; ANd and OR D) Impossible to derive Ans: C 35.Number of symbols necessary to simulate a TM with m symbols and n states is ANs: 4mn +m Last edited by Neelurk; February 22nd, 2020 at 11:08 AM. |
#2
July 5th, 2014, 08:48 AM
| |||
| |||
Re: SBI Specialist Officers Exam Previous year Question Paper
This is the SBI Specialist Officers Exam Previous year Question Paper: In SQL, which of the following is not a data Manipulation Language Commands? Delete Select Update Create None of the above The value for an attribute or a column are drawn from a set of values known as - Tuples Attributes Domain Column None of these Entities having primary key are called Primary Key Strong entities Weak entities Primary Key None Of these Which of the following is not a type of SQL statement? Data Manipulation Language (DML) Data Definition Language (DDL) Data Control Language (DCL) Data Communication Language (DCL) None of these Which of the following is not included in DML (Data Manipulation Language) INSERT UPDATE DELETE CREATE None of these TRUNCATE statement in SQL is a - DML statement DDL statement DCL statement DSL statement None of these To discard all pending data changes COMMIT ROLLBACK SAVEPOINT LOCK None of these Which of the following term is related to the stack? TOP PUSH POP Rear A, B and C. In Queues, the end from where items inserted is called Rear Front Top Base None of these Which protocol is used for browsing website: TCP FITFP FTP TFTP None of these Which of the following is a browser? Netscape Navigator Mosaic Mozilla Firefox Google chrome All of these Black Box Testing sometime called - Data flow testing Loop testing Behavioral testing Graph based testing None of these The Objective of testing is Debugging To uncover errors To gain modularity To analyze system None of these Choose the right sequence of SDLC (Software development life cycle) steps Design, Requirement Analysis, Coding, Testing Requirement Analysis, Design, Coding, Testing Requirement Analysis, Design, Testing, Coding Requirement Analysis, Coding, Design, Testing None of these The drawback of the binary tree sort are remedied by the Linear Sort Quick Sort Heap Sort Insertion Sort All of these Round robin scheduling is essentially the preemptive version of FIFO Shortest job first Shortest remaining Longest time first None of these ____ is the situation in which a process is waiting on another process, which is also waiting on another process which is waiting on the first process. None of the processes involved in this circular wait are making progress. Deadlock Starvation Dormant All of these None of these Assembly language is a _____ Low Level Language Middle Level Language High level Language User Language None of these Which of the following is a type of translator? Assembler Compiler Interpreter All of the Above None of these Multiprogramming systems ___ Are easier to develop than single programming Execute each job faster Execute more jobs in the same time Are used only on large main frame computers None of these The mechanism by which the data and functions are bound together with an Inheritance Encapsulation Abstraction Polymorphism None of these The OSI model consists of ___layers. Nine Eight Seven Five Eleven Decryption & Encryption of data are the responsibility of the ___ layer. Physical Data link Presentation Session Application LANs can be connected by devices called ____ which operate in the data link layer? Hub Bridges HDLC Tunnel None of these In a ____ topology, if there are n devices in a network, each device has n-1 ports for cable. Mesh Star Bus Ring None of these Question 26 to 50 OLAP applications are widely used by ____ and it uses ____ Schema. RDBMS , Bus Operating System ,Star Java , Bus Data mining Techniques; Star or multidimensional None of these Arrange the following in increasing order of their size. Database<File<Record<Field<Byte<Bit Bit<Byte<Field<Record<File<Database Bit>Byte>Record>Field>File>Database Bit>Byte>File>Record>Field>Database JVM is a virtual machine that can execute ___ C language .net programming RDBMS C++ Language Java byte Code ODBC is based on ___. Structured Query Language. C language C++ language .net None of these Which of the following is not an advantage of the data-base approach? Increased security Elimination data redundancy Ability to associate related data ‘ Programming/data independence All of the above In relational database row and column is called as ____and ____respectively. Tuple; Attribute Attribute; Tuple Tupple;Domain Attribute; Domain None of these To delete a particular column in a relation the command used is: DELETE UPDATE DROP ALTER None of these A primary key if combined with a foreign key creates Parent-Child relationship between the tables that connect them. Many to many relationship between the tables that connect them. Network model between the tables that connect them. All of the above None of the above Which of the following is record based logical model? Network Model Object oriented model E-R Model All of these None of these The full form of DDL is Dynamic Data Language Detailed Data Language Data Definition Language Data Derivation Language All of these Which of the following virus overtake computer system when it boots and destroy in-formation? Trojan System infectors Boot infectors Stealth virus None of these The relational model includes two general integrity rules. Integrity rule 1 is concerned with ____ and integrity rule 2 is concerned with ____ Primary Key, Foreign key Primary Key, composite key Unique key, Foreign key Composite Key, Foreign key None of these ____ is person who has the central control over both data and application programs. System engineer Database administrator Database manager Technical analyst None of these An attribute of a relation that references the primary key of another relation is known as the ____ Foreign Key Unique Key Parent key Child key Index key An entity set that does not have sufficient attributes to form a primary key is a strong entity set weak entity set simple entity set primary entity set. None of these The JDBC-ODBC bridge is Three tiered Multithread Best for any platform All of these None of these In a relational database, this is a data structure that organizes the information about a single topic into row and columns. Block Record Tuple Table None of these Which statements about the Java language are true? Java supports both procedural and object-oriented programming Java is only a procedural language. Java is only an Object-Oriented. Java is related to None of the above. Stack is also called ____ First In First Out (LIFO) Last In First Out (FIFO) First In Last Out (FILO) First Come First Served (FCFS) None of the above The index created by primary key column is called _____ Unique Index Composite Index Single Index Primary index None of these In SQL ,which command(s) is(are) used to remove rows from a table. Delete Remove Truncate Both and (3) None of the above In SQL, the CREATE TABLE is used To create a table, defining its columns, integrity constraints, and storage allocation To add a column/integrity constraint to a table. To redefine a column To change a table’s storage characteristics All of the above What is the abbreviation is used for a software package that permits the user to create , retrieve and maintain records in a database? DASD CRMD DBMS All of these None of the above Choose the right sequence of virus stages - Triggering, Damage ,Dormancy, propagation Damage, Triggering ,Dormancy, propagation Damage, Triggering, propagation ,Dormancy Triggering, Damage, propagation, Dormancy Dormancy, Propagation,. Triggering, Damage In SQL, which command is used to add new rows to a table? Alter Table Add row Insert Append None of the Above SBI Specialist (Computer & Communication) 2012 Question Paper Q1 to 25 To create a copy files in the event of system failure, you create a ___ Firewall Redundancy Backup Restore file None of these Print server uses___ which is a buffler that holds before it is send to the printer. Queue Spool Node Stack None of these Which of the following identifies specific web page and its computer on the web page? Web site URL Web site address Domain Name None of these _____ is the computer to computer exchange of routine business data between trading partners in standard data formats. CTS DSR VDR EDI (Electronic data interchange) None of these Communication handler is basically an ____ 16 bit micro controller? 8085 8086 8086A 80C186 None of these Which uses a Pre-Shared Key that is more than 7 and less than 64 characters in length? WPA-PSK TKIP AES All of these None of these Ping command is used for what purpose? Test a device on a network whether it is reachable Test a hard disk fault Test a bug in the application Test devices scanning quality None of these Two different kind of networks can be connected by using— Bridges Satellite Gateway Routers None of these Full adder is used to— 2 bit addition 3 bit addition 4 bit addition 6 bit addition None of these Most important advantage of an IC is its— Easy replacement in case of circuit failure Low power consumption Extremely high reliability Reduced cost None of these An 1C contains 50 gates each of which consists of 6 components. Its belongs to VLSI LSI MS1 SSI None of these Which type of computers use the 8 bit code called EBCDIC? Minicomputers Mainframe computers Super computer Microcomputer None of these An AND gate Implements logic addition Is equivalent to a series switching circuit Is any-or all gate Is equivalent to a parallel switching circuit None of these The decimal equivalent of the binary number 11100001111 is 1806 1807 2806 All of these None of these Programs in which of the following memories can’t be erased ? RAM ROM Cache Memory Virtual Memory None of these The IP address 135.0.10.27 belongs to address class? A B C D None of these Which are not used in case of applet? Read /write Internet Search engine All of these None of these Which of the following is not a type of database? Hierarchical Relational Network Transition None of these Which of the following is not a type of SQL statement? Data Manipulation Language Data Definition language Data control language Data Standard language None of these In Queue , the items deleted at one end is called Rear Front Top Base None of these The drawback of the binary tree sort are remedied by the Linear sort Heap Sort Insertion sort Quick Sort None of these White Box testing, a software testing technique is sometimes called Graph testing Basis path Glass box testing Data flow testing Loop testing Which of the following is used with database? EDI Credit card ATM Payment gateway Data mining |
|