2023 2024 EduVark > Education Discussion > General Discussion


  #1  
July 4th, 2014, 10:24 AM
Super Moderator
 
Join Date: Mar 2012
SBI Specialist Officers Exam Previous year Question Paper

Kindly provide me the SBI Specialist Officers Exam Previous year Question Paper.

When a cracker attempts to misuse or steal data from a system, it is called
Stealing
Intrusion
Virus
Worm
None of these
To modify existing rows of the table ____ statement is used.
ALTER
MODIFY
UPDATE
COMMIT
DELETE

Q26 to 50

____ refers to a family of IEEE standards dealing with local area network and metropolitan area network.
802
800
801
803
None of these
Which is the general network standard for the data link layer in the OSI Reference Model?
IEEE 802.1
IEEE 802.2
IEEE 802.3
IEEE 802.4
IEEE 802.6
____ uses a standard called IEEE 802.6.
LAN
WAN
MAN
Internet
None of these
Repeater operates in which layer of OSI model?
Application layer
Presentation layer
Physical layer
Transport layer
Data link layer
Where does Bridge operate in OSI model?
Physical layer
Data link layer
Both (1)and (2)
Application layer
None of these
Which of the following uses the greatest number of layers in the OSI model?
Bridge
Repeater
Router
Gateway
None of these
Routers operate in which layer of the OSI model?
Physical layer
Data link layer
Network Layer
All of these
None of these
Modem is a _____ that modulates and demodulate signals
DCE (Data circuit-terminating equipment)
DTE (Data terminal equipment)
DTE-DCE
Both (1)and (2)
None of these
A communication network which is used by large organizations over regional, national or global area is called ___
LAN
WAN
MAN
Internet
None of these
At ___ layer, TCP/IP defines two protocols :Transmission Control Protocol (TCP) and User Datagram Protocol(UDP).
Transport layer
Network layer
Physical layer
Application layer
None of these
The ___ layer is the layer closest to transmission medium.
Transport
Network
Data link
Physical
None of the above
End to end connectivity is provided from host to host in :
Network layer
Session layer
Data link layer
Transport layer
None of these
Which of the following TCP/ IP protocol is used for transferring electronic mail messages from one machine to another?
SNMP
SMTP
RPC
FTP
None of these
Which of the following is an example of a client-server model?
FTP
DNS
TELNET
All of these
None of these
Which IEEE Standards is usz for Wi/Fi systems?
802.11
802.1
802.2
802.3
802.10
_____ is the continuous ability to send and receive data between interconnected networks.
FTP
SMTP
TNS
Network Interoperability
None of these
What is the default subnet mask for a class B network?
127.0.0.1
2550.0.0
255.255.0.0
255.255.255.0
None of these
What is loopback address?
127.0.0.1
255.0.0.0
255.255.0.0
127.0.0.0
None of these
Internet-like networks within enterprises.
Intranets
Switching alternating
Inter organizational networks
Extranets
None of these
A central computer surrounded by one or more satellite computers is called a
Bus network
Ring network
Star network
All of the above
None of these
With an IP address of 100,you currently have 80 subnets.What subnet mask should you use to maximize the number of available hosts?
192
240
248
224
252
Encryption/decryption provides a network with____
Privacy
Authenticity
Integrity
Non-reputation
None of these
The data to be encrypted at the sender site is called ___.The data to be decrypted at receiver end is called ____
Secret key, public key
Public key, secret key
Plaintext, ciphertext
Ciphertext, plaintext
None of these
In digital signature the private key is used for ___ and the public key for ____
Encryption, decryption
Decryption, encryption
Plaintext, ciphertext
Ciphertext, plaintext
None of these
A ___ s main purpose is to prohibit unauthorized access to your computer via the Internet.
Popup blocker
Firewall
Spyware
Spam assassin
None of these

IBPS specialist Question paper 2012 and 2013 Exam

Already given. Click me

For entire Archive of all IBPS/Banking related articles, visit Mrunal.org/IBPS

If any senior player/ maestro wants to share wisdom- please post it under the comments.
Ads by RemoveTheAdAppAd Options
Previously in this category

[IBPS] finally Result of both Bank PO/MT and Clerk CWE is out, provisional & reserve list declared,validity till 31st March 2015
[IBPS] Interview Preparation (Part 1 of 5) Stop Feeling Guilty and Tell me about yourself, Stupid cutoffs and Insecurities about Profile
[IBPS] Interview Preparation (Part 2 of 5) Why BankPO? Preparing the Sales Pitch: Career growth, job satisfaction, negative factors, work-profile, Promotion, hierarchy, Sample Answers
[IBPS] Interview Preparation (Part 3 of 5) Banking, Economy, Current Affairs, HR and GK related questions for BankPO/MT
[IBPS] Interview Preparation (Part 4 of 5) Graduation related Questions: IT, B.E., B.Tech, Biotech, B.Com, BBA, Arts, sample questions from previous interviews

Subscribe by Email || / Print || PDF This Post (Need Chrome Browser)
अब तक 197 कमेंट्स लिखी गयी

priyanka
13/04/2014 at 21:49

Sir,
Is their is negative marking in the SBI SO Exam…??
Reply
Sumeet
01/05/2014 at 13:09

yes. for every wrong answer 0.25 of marks will be deducted from your score. So it’s always better to leave those questions you’re not sure & attempt only when you’re confident.
Reply
Kitty
14/04/2014 at 00:26

Plz sir send me other practice paper of PK…plz sir….
Reply
Kitty
14/04/2014 at 00:28

Plz sir send me other practice paper with solution of PK…plz sir….
Plz it’s urgent
Reply
Mahesh
14/04/2014 at 00:57

Hi sir I want previous question paper of sbi so it off.with answer and model paper for pracitce with answer.
Reply
Mahesh
14/04/2014 at 00:58

Hi sir I want previous question paper of sbi so it off.with answer and model paper for practice with answer.
Reply
jaiprakash
14/04/2014 at 10:39

is there is negative marking in sbi specialist exam?
Reply
devD
14/04/2014 at 13:21

hello guys.. Plan well before appearing in the exam. It becomes easy if you plan how to distribute the time for solving each sections. Dont waste too much time on a single section. Focus more on the IT .. thats the fate changer.. good luck.
Reply
Divya
14/04/2014 at 19:23

Plz provide answers for the given questions
which helps in preparation.
Reply
Rohit
15/04/2014 at 14:26

sir pls send me previous paper for the post of asst manager (system).
Reply
Shiraj
16/04/2014 at 00:03

Thanks for the SBI (Systems) paper sir.. Please provide the key if anyone have.. my email id is shiraj.146@gmail.com
Thank you..
Reply
satender
16/04/2014 at 13:47

Please send answer of above question and also send practise paper
Reply
Arvindpshah
17/04/2014 at 20:23

Howdy Hope you may be fine, Since it is not mentioned in the advertisement , So Stay Guarded
Reply
Kitty
16/04/2014 at 14:05

Sir u r nt replied ….plz help me….answer and practices paper of PK…and is there negative Marking
Reply
Danny
16/04/2014 at 16:19

Plz give the solution for that
Reply
sk
17/04/2014 at 23:01

thanks for the valuable info
Reply
Kitty
17/04/2014 at 23:28

In advertise nt mention negative marking…..tell me exact
Reply
manjusha
18/04/2014 at 08:19

pls send me answers to it …
Reply
anurag
18/04/2014 at 12:19

Can u plz send me answers of all these questions
Reply
Rekha
18/04/2014 at 12:25

vry valueble info i get through ur site…
can i get whole paper of previous yr 2 summerrize
plz send me on my id..
thank u
Reply
hi sir...
18/04/2014 at 15:22

i started reading ur model papers … but it wil be more helpfull if u can provide us with answer
Reply
ratish
18/04/2014 at 17:19

sir ………….plz send me ansr key [ bachhaoratu@gmail.com]
Reply
Ashum
19/04/2014 at 15:43

The paper was tougher compared to previous ones. reasoning and english were easy. maths was tough as extensive calculations were required. professsional paper was on expected lines. however automata was a surprise entrant in the paper which inspired many questions. my attempts are as follows — reasoning 29 maths 10 english 22 and technical 42.
Reply
icecool11
20/04/2014 at 11:22

I think we should make an effort to recall and recompile the professional knowledge paper and thereafter discuss the answers . The questions I recall are as follows-
1. Belady’s Anomaly
2. Most used scheduling- Pre emptive scheduling.
3. select from where arrangement
4. S-> ASbc..AB->BA…wala.. ans was abc.
5. Hub level
6.coulmn attribute
7. relational algebra and calculus procedural and non procedural
8. paging in segmentation
9. primary key is selected from candidate key
10. Foreign key..DRQ
11. Foreign key..DRQ
12. Subnet address
13. some symbol in automata kind
14. top down parser
15. Relation/Table..DRQ
16. Highest no. of network addresses
17. summtion(1,3,4…) Kaurnaugh map
18. sorting of 200 words in 200 s, 800s
19. Distributed Operating System
20. ADD X Y
21. Protocol used in sthg– SNMP/SMTP/ARP/RARP
22. DSP full form
23. Transport layer corresponds to Internet layer in TCP
24. Human intervention topology- T based something

DRQ means Dont remember question.

Kindly help in recalling rest of the questions too.
Reply
Gunjan
24/04/2014 at 13:01

ISP full form?
Reply
venkatesh.j
06/05/2014 at 19:35

Internet service provider
Reply
Apurv
20/04/2014 at 19:49

Hello Sir,

I have given the SBI Assistant Manager System on 19th April.Here are my attempt:

Quant:-10
Reasoning:-15
Pk:-33
These with about 95% accuracy
English:-22
With 80-90% accuracy.

What are my chances??
Reply
Vishal
22/04/2014 at 21:35

bhai i have done , 10 – quant , 14 reasoning , 18 english 100 percent accuracy , and professional me 36 may be out of which 5 are wrong
Reply
egogambit
23/04/2014 at 19:03

NO chance what so ever, as-FOR UR candidates
10+15+(33*1.5)=49.5+11=86maxx these exams have less seats and cutoffs over 100
but u may clear sectional cutoffs!
Reply
icecool11
24/04/2014 at 23:38

10+14+18+31*2-5*0.5=101.8 @vishal
Reply
chandresh
20/04/2014 at 23:21

Sir , is there overall cutoff of partI or maths ,resn , and eng. , have their own cutoff ?
Reply
Nideena
24/04/2014 at 16:50

no overall cutoff…u juz need to clear min cut off in each section (not each part).
Reply
icecool11
24/04/2014 at 23:40

nideena ..you are on pagalguy too.right?
Reply
Nideena
25/04/2014 at 19:19

yup…
Reply
angel
21/04/2014 at 02:34

Hello all!

I remember some of questions , i appeared on 19 april 9:30 session…. in addition to what icecool11 has posted…

1. SQL full form…
2. real time os uses which scheduling
….. kindly all of us put forward some questions…
Reply
basavaraj
21/04/2014 at 10:45

this post is very useful. thanks providing this info…
Reply
chandni ji
22/04/2014 at 01:42

when is d result expected ….???
anybody any idea….???

wat tym result took in sbi so 2012 exam…..???
bhai khub tukke mare h……22-reasoning 19-maths 18-english 44-proffesional …..it think mera profesional part easy tha….so is there any role of scaling here……do any one knw dis……coz i c some differnt ques in some comnts….
Reply
Prashant Kumar
22/04/2014 at 08:03

For the Paper Held on 19.04.14 and its solutions refer to Road to PSU
Reply
Utkarsh
22/04/2014 at 10:17

Hello Sir,

I have given the SBI Assistant Manager System on 19th April. Here are my attempt:

Quant:- 14
Reasoning:- ~22

These with about 95% accuracy

English:- ~17 With about 80% accuracy

Pk:-40 with ~80% accuracy

What are my chances?
Reply
pankaj
23/04/2014 at 12:14

Maths was lengthier.paper was tougher than previous one.cut-off should be less for part 1…any idea guys in how many days the result will out???
Reply
susmitha
23/04/2014 at 18:41

i too gave my sbi spl exam 19th
paper1-62
paper2-40
Reply
Danish Ahmad Khan
24/04/2014 at 09:21

@admin I must thank you for doing this commendable work Sir. The instructions and questions provided above helped immensely in the exam. I just wanna wish you luck for the future.
Reply
pankaj
24/04/2014 at 09:26

But I got different questions.did it vary for candidateso candidates???
Reply
Sribharath
25/04/2014 at 18:49

SBI SO Eve-Shift Q&A
(based on memory)
1.which two files are used during operation of the DBMS?
Ans:data dictionary and transaction log
2.Fragmentation is -
Ans: fragments of memory words unused in a page
3.Virtual memory is -
Ans: an illusion of an extremely large memory
4.Access time of symbol table will be logarithmic if it is implemented using
Ans: Search Trees
5.Manager’s salary details are to be hidden from Employee Table. This Technique is called as(UGC NET)
Ans: External level Datahiding or Conceptual level hiding(?)
6.Which of the following addresses is used to deliver a message to the correct application program running on a host?(UGC NET)
Ans: Port
7.In classful addressing, the IP address 190.255.254.254 belongs to(UGC NET)
Ans: Class B
8.While estimating the cost of software, Lines of Code (LOC) and Function Points (FP) are used to measure which one of the following?(UGC NET)
Ans: Size of software
9.Page stealing is_____
Ans: Taking page frame from another working set
10.XOR Gate is ideal for testing parity because even parity produce____ and odd parity produce____ output?
Ans: Low,High(as in Indiabix site)
11.Question related to Data link layer error detection
Ans: Cyclic Redundancy check
12.Virus __
Ans:Vital Information Resource under siege
13. Eclipse in ER diagram represents___
Ans: Attributes
14. Similar term for related records
Ans: File
15. Railway track best suits___
Ans: Half-Duplex
16. students and course enrolled relationship of
Ans: Many to Many (Doubtful whether the question was Student to course relation?)
17.Tuple is a
Ans: Row level attribute
18.A table is synonym for___
Ans: Relation
19. Thrasing is most significantly affected by___
Ans: Program structure(?)
20.End to end and Host to Host delivery is a reposibility of ___ Layer
Ans: Transport Layer
21. Device which Compiles the code in system which wil be used in another system
Ans: Cross compiler
22.First operator used in microprocessor is__
(Question is wrong it seems. Operating system should be in place of operator )
Ans: CP/M
23. What is multiprogrmming operating system?
Ans: Single user can run mulpile programs…
24. three types of authorities of user category can be updated using which command
chuser,chgrp,cat….
Ans:?

25. What uses 7 bits to represent each character
Ans: Ascii
26. Data integrity conrol is__
Ans: has the data dictionary keep the date and time of last access last back-up, and most recent modification for all files
27.There are certain packages that allow people to define data items, place these items in particular records, combine the records into designated files and then manipulate and retrieve the stored data. What are they called?
Ans: DBMS
28.Which of the following derivations does a bottom-up parser use while parsing an input string ? The input is scanned from left to right.
29.Compiler is preferred over intrepretter because
A. It can generate stand-alone programs that often take less time
for execution.
B. It is much helpful in the initial stages of program development.
C. Debugging can be faster and easier.
D. If one changes a statement, only that statement needs
recompilation.
Ans: (B)It can generate stand-alone programs that often take less time
for execution.(?)
30.What utility do you use to transfer files and exchange messages?
Ans : EMAIL
31.The main difference between a DFSA and an NDFSA is
Ans: in DFSA, from any given state, there can’t be any alphabet leading to two diferent states
32.190.255.254.254 is of which class
Ans Class B
33.The number of instructions needed to add ‘n’ numbers and store the result in memory using
only one address instruction is
A)N+1 B)N-1 c)independent of n
Ans : A or C (?)
34From a given tautology, another tautology can be derived by interchanging.
A). 0 and 1
B) And and OR
C) 0 and 1; ANd and OR
D) Impossible to derive
Ans: C
35.Number of symbols necessary to simulate a TM with m symbols and n states is
ANs: 4mn +m

Last edited by Neelurk; February 22nd, 2020 at 11:08 AM.
Similar Threads
Thread
Previous Year Solved Question Paper Of IBPS Specialist Officer
Punjab National Bank Specialist Officer Previous Year Question Paper
IBPS Specialist Officer Previous Year Question Paper
IBPS Specialist Officer Law Previous Year Question Paper
Central Bank Of India Specialist Officer Previous Year Question Paper
Previous Year Question Paper Of IBPS Specialist Officer
SBI Specialist Officer Previous Year Question Paper with Answers
State Bank of India probationary officers exam previous year question papers
RBI Grade B officers Exam Previous year Question Paper
RBI Grade B Officers Exam Previous years question paper
Bank of Baroda probationary officers exam previous year question papers
State Bank of India probationary officers exam previous year question papers
MAT Exam Previous year Question Paper
Officers Training Academy UPSC Combines Defence Services previous year question paper
CAT Exam Previous year question paper

  #2  
July 5th, 2014, 08:48 AM
Super Moderator
 
Join Date: Mar 2012
Re: SBI Specialist Officers Exam Previous year Question Paper

This is the SBI Specialist Officers Exam Previous year Question Paper:


In SQL, which of the following is not a data Manipulation Language Commands?
Delete
Select
Update
Create
None of the above
The value for an attribute or a column are drawn from a set of values known as -
Tuples
Attributes
Domain
Column
None of these
Entities having primary key are called
Primary Key
Strong entities
Weak entities
Primary Key
None Of these
Which of the following is not a type of SQL statement?
Data Manipulation Language (DML)
Data Definition Language (DDL)
Data Control Language (DCL)
Data Communication Language (DCL)
None of these
Which of the following is not included in DML (Data Manipulation Language)
INSERT
UPDATE
DELETE
CREATE
None of these
TRUNCATE statement in SQL is a -
DML statement
DDL statement
DCL statement
DSL statement
None of these
To discard all pending data changes
COMMIT
ROLLBACK
SAVEPOINT
LOCK
None of these
Which of the following term is related to the stack?
TOP
PUSH
POP
Rear
A, B and C.
In Queues, the end from where items inserted is called
Rear
Front
Top
Base
None of these
Which protocol is used for browsing website:
TCP
FITFP
FTP
TFTP
None of these
Which of the following is a browser?
Netscape Navigator
Mosaic
Mozilla Firefox
Google chrome
All of these
Black Box Testing sometime called -
Data flow testing
Loop testing
Behavioral testing
Graph based testing
None of these
The Objective of testing is
Debugging
To uncover errors
To gain modularity
To analyze system
None of these
Choose the right sequence of SDLC (Software development life cycle) steps
Design, Requirement Analysis, Coding, Testing
Requirement Analysis, Design, Coding, Testing
Requirement Analysis, Design, Testing, Coding
Requirement Analysis, Coding, Design, Testing
None of these
The drawback of the binary tree sort are remedied by the
Linear Sort
Quick Sort
Heap Sort
Insertion Sort
All of these
Round robin scheduling is essentially the preemptive version of
FIFO
Shortest job first
Shortest remaining
Longest time first
None of these
____ is the situation in which a process is waiting on another process, which is also waiting on another process which is waiting on the first process. None of the processes involved in this circular wait are making progress.
Deadlock
Starvation
Dormant
All of these
None of these
Assembly language is a _____
Low Level Language
Middle Level Language
High level Language
User Language
None of these
Which of the following is a type of translator?
Assembler
Compiler
Interpreter
All of the Above
None of these
Multiprogramming systems ___
Are easier to develop than single programming
Execute each job faster
Execute more jobs in the same time
Are used only on large main frame computers
None of these
The mechanism by which the data and functions are bound together with an
Inheritance
Encapsulation
Abstraction
Polymorphism
None of these
The OSI model consists of ___layers.
Nine
Eight
Seven
Five
Eleven
Decryption & Encryption of data are the responsibility of the ___ layer.
Physical
Data link
Presentation
Session
Application
LANs can be connected by devices called ____ which operate in the data link layer?
Hub
Bridges
HDLC
Tunnel
None of these
In a ____ topology, if there are n devices in a network, each device has n-1 ports for cable.
Mesh
Star
Bus
Ring
None of these

Question 26 to 50

OLAP applications are widely used by ____ and it uses ____ Schema.
RDBMS , Bus
Operating System ,Star
Java , Bus
Data mining Techniques; Star or multidimensional
None of these
Arrange the following in increasing order of their size.

Database<File<Record<Field<Byte<Bit
Bit<Byte<Field<Record<File<Database
Bit>Byte>Record>Field>File>Database
Bit>Byte>File>Record>Field>Database

JVM is a virtual machine that can execute ___

C language
.net programming
RDBMS
C++ Language
Java byte Code

ODBC is based on ___.

Structured Query Language.
C language
C++ language
.net
None of these

Which of the following is not an advantage of the data-base approach?

Increased security
Elimination data redundancy
Ability to associate related data ‘
Programming/data independence
All of the above

In relational database row and column is called as ____and ____respectively.

Tuple; Attribute
Attribute; Tuple
Tupple;Domain
Attribute; Domain
None of these

To delete a particular column in a relation the command used is:

DELETE
UPDATE
DROP
ALTER
None of these

A primary key if combined with a foreign key creates

Parent-Child relationship between the tables that connect them.
Many to many relationship between the tables that connect them.
Network model between the tables that connect them.
All of the above
None of the above

Which of the following is record based logical model?

Network Model
Object oriented model
E-R Model
All of these
None of these

The full form of DDL is

Dynamic Data Language
Detailed Data Language
Data Definition Language
Data Derivation Language
All of these

Which of the following virus overtake computer system when it boots and destroy in-formation?

Trojan
System infectors
Boot infectors
Stealth virus
None of these

The relational model includes two general integrity rules. Integrity rule 1 is concerned with ____ and integrity rule 2 is concerned with ____

Primary Key, Foreign key
Primary Key, composite key
Unique key, Foreign key
Composite Key, Foreign key
None of these

____ is person who has the central control over both data and application programs.

System engineer
Database administrator
Database manager
Technical analyst
None of these

An attribute of a relation that references the primary key of another relation is known as the ____

Foreign Key
Unique Key
Parent key
Child key
Index key

An entity set that does not have sufficient attributes to form a primary key is a

strong entity set
weak entity set
simple entity set
primary entity set.
None of these

The JDBC-ODBC bridge is

Three tiered
Multithread
Best for any platform
All of these
None of these

In a relational database, this is a data structure that organizes the information about a single topic into row and columns.

Block
Record
Tuple
Table
None of these

Which statements about the Java language are true?

Java supports both procedural and object-oriented programming
Java is only a procedural language.
Java is only an Object-Oriented.
Java is related to
None of the above.

Stack is also called ____

First In First Out (LIFO)
Last In First Out (FIFO)
First In Last Out (FILO)
First Come First Served (FCFS)
None of the above

The index created by primary key column is called _____

Unique Index
Composite Index
Single Index
Primary index
None of these

In SQL ,which command(s) is(are) used to remove rows from a table.

Delete
Remove
Truncate
Both
and (3)
None of the above

In SQL, the CREATE TABLE is used

To create a table, defining its columns, integrity constraints, and storage allocation
To add a column/integrity constraint to a table.
To redefine a column
To change a table’s storage characteristics
All of the above

What is the abbreviation is used for a software package that permits the user to create , retrieve and maintain records in a database?

DASD
CRMD
DBMS
All of these
None of the above

Choose the right sequence of virus stages -

Triggering, Damage ,Dormancy, propagation
Damage, Triggering ,Dormancy, propagation
Damage, Triggering, propagation ,Dormancy
Triggering, Damage, propagation, Dormancy
Dormancy, Propagation,. Triggering, Damage

In SQL, which command is used to add new rows to a table?

Alter Table
Add row
Insert
Append
None of the Above

SBI Specialist (Computer & Communication) 2012 Question Paper
Q1 to 25

To create a copy files in the event of system failure, you create a ___
Firewall
Redundancy
Backup
Restore file
None of these
Print server uses___ which is a buffler that holds before it is send to the printer.
Queue
Spool
Node
Stack
None of these
Which of the following identifies specific web page and its computer on the web page?
Web site
URL
Web site address
Domain Name
None of these
_____ is the computer to computer exchange of routine business data between trading partners in standard data formats.
CTS
DSR
VDR
EDI (Electronic data interchange)
None of these
Communication handler is basically an ____ 16 bit micro controller?
8085
8086
8086A
80C186
None of these
Which uses a Pre-Shared Key that is more than 7 and less than 64 characters in length?
WPA-PSK
TKIP
AES
All of these
None of these
Ping command is used for what purpose?
Test a device on a network whether it is reachable
Test a hard disk fault
Test a bug in the application
Test devices scanning quality
None of these
Two different kind of networks can be connected by using—
Bridges
Satellite
Gateway
Routers
None of these
Full adder is used to—
2 bit addition
3 bit addition
4 bit addition
6 bit addition
None of these
Most important advantage of an IC is its—
Easy replacement in case of circuit failure
Low power consumption
Extremely high reliability
Reduced cost
None of these
An 1C contains 50 gates each of which consists of 6 components. Its belongs to
VLSI
LSI
MS1
SSI
None of these
Which type of computers use the 8 bit code called EBCDIC?
Minicomputers
Mainframe computers
Super computer
Microcomputer
None of these
An AND gate
Implements logic addition
Is equivalent to a series switching circuit
Is any-or all gate
Is equivalent to a parallel switching circuit
None of these
The decimal equivalent of the binary number 11100001111 is
1806
1807
2806
All of these
None of these
Programs in which of the following memories can’t be erased ?
RAM
ROM
Cache Memory
Virtual Memory
None of these
The IP address 135.0.10.27 belongs to address class?
A
B
C
D
None of these
Which are not used in case of applet?
Read /write
Internet
Search engine
All of these
None of these
Which of the following is not a type of database?
Hierarchical
Relational
Network
Transition
None of these
Which of the following is not a type of SQL statement?
Data Manipulation Language
Data Definition language
Data control language
Data Standard language
None of these
In Queue , the items deleted at one end is called
Rear
Front
Top
Base
None of these
The drawback of the binary tree sort are remedied by the
Linear sort
Heap Sort
Insertion sort
Quick Sort
None of these
White Box testing, a software testing technique is sometimes called
Graph testing
Basis path
Glass box testing
Data flow testing
Loop testing
Which of the following is used with database?
EDI
Credit card
ATM
Payment gateway
Data mining


Quick Reply
Your Username: Click here to log in

Message:
Options



All times are GMT +5. The time now is 08:30 AM.


Powered by vBulletin® Version 3.8.11
Copyright ©2000 - 2024, vBulletin Solutions Inc.
Content Relevant URLs by vBSEO 3.6.0

1 2 3 4 5 6 7 8