#1
29th October 2014, 12:29 PM
| |||
| |||
IT Officer Exam Sample Papers of Central Bank of India
Please provide me the last year IT officer exam question papers of the Central bank of India ?
|
#2
29th October 2014, 02:01 PM
| |||
| |||
Re: IT Officer Exam Sample Papers of Central Bank of India
As you want I am here providing you the question paper of the IT officer exam of central bank of India. Sample questions : The output of the following program main( ) { int a[ ] = { 2,3,4,6,5}; int *p = a; for (int i = 0; i < 5; i++) printf(“%d,”,++*p); } is (A) 3, 4, 5, 6, 7 (B) 3, 4, 5, 7, 6 (C) 3, 4, 6, 5, 0 (D) 3, 4, 5, 6, 6 The program main( ) { int a = 256, *p=&a; printf(“%d”,*p>>5); } prints (A) 2 (B) 4 (C) 6 (D) 8 A computer program that converts an entire program into machine language at one time is called a/an (A) interpreter (B) simulator (C) compiler (D) commander All the keys on the IBM PC key board repeat as long as we hold them down. Such type of keys are known as (A) typematic keys (B) functional keys (C) automatic keys (D) alphabetic keys The output of the following program main( ) { int a[ ] = “computation”; char *p = a, b=’ ‘; for (int i = 1; i < 12; i++) if(i%4) continue; else a[i]=b; puts(p); } is (A) comp (B) comp tat on (C) com utat on (D) comp tati n What does the acronym ISDN stands for (A) Indian Standard Digital Network (B) Integrated Services Digital Network (C) Intelligent Service Digital Network (D) Integrated Services Data Network Two basic types of operating system are (A) sequential and direct (B) batch and time sharing (C) direct and interactive (D) batch and interactive Which of the following entity does not belong to word processing (A) characters (B) words (C) cells (D) paragraphs The natural mask for class C IP address is _______ . (A) 255.255.255.0 (B) 255.255.0.0 (C) 255.0.0.0 (D) 255.255.255.255 In C++, if a catch statement is written to catch exception objects of a base class type, it can also catch all ______ derived from that base class. (A) Exceptions for objects (B) Objects of classes (C) Arguments (D) Errors A schema describes (A) data elements (B) records and filer (C) record relationship (D) all of the above Which of the following is not a tool used to manage and control schedule performance (A) CAD (B) PERT (C) CPM (D) Gantt Chart An expert system differs from a data base program in that only an expert system (A) contains declarative knowledge (B) contains procedural knowledge (C) features the retrieval of stored information (D) experts users to draw own conclusion The virtual memory addressing capability of 80386 is (A) 4 GB (B) 16 GB (C) 64 GB (D) 64 TB The 80486 microprocessor from Intel consists of (A) a fast 32 bit CPU but no coprocessor (B) a 32 bit CPU and an 80387 coprocessor only (C) a 32 bit CPU, a 80387 coprocessor and memory management unit (MMU) only (D) a 32 bit CPU, a 80387 coprocessor, memory management unit and a cache memory Which of the following file transfer protocols use TCP and establishes two virtual circuits between the local and remote server ? (A) FTP (B) TFTP (C) TELNET (D) NFS Frequency shift keying is used mostly in (A) Radio transmission (B) Telegraphy (C) Telephone (D) None of the above The baud rate is (A) always equal to the bit transfer rate (B) equal to twice the bandwidth of an ideal channel (C) not equal to the signalling rate (D) equal to half of the bandwidth of an ideal channel Object code is the output of ______. (A) Operating System (B) Compiler or Assembler (C) only Assembler (D) only Compiler ‘Macro’ in an assembly level program is _______. (A) sub program (B) a complete program (C) a hardware portion (D) relative coding Advantage of synchronous sequential circuits over asynchronous ones is (A) faster operation (B) ease of avoiding problems due to hazard (C) lower hardware requirement (D) better noise immunity What is the transitive voltage for the voltage input of a CMOS operating from 10V supply ? (A) 1V (B) 2V (C) 5V (D) 10 V What is decimal equivalent of BCD 11011.1100 ? (A) 22.0 (B) 22.2 (C) 20.2 (D) 21.2 What will be the output of the following c-code ? void main ( ) { char *P = “ayqm” ; char c; c = ++*p ; printf (“%c”, c); } (A) a (B) c (C) b (D) q The data type created by the data abstraction process is called (A) class (B) structure (C) abstract data type (D) user defined data type An entity instance is a single occurrence of an _______. (A) entity type (B) relationship type (C) entity and relationship type (D) None of these Grammar of the programming is checked at ________ phase of compiler. (A) semantic analysis (B) code generation (C) syntax analysis (D) code optimization WINDOWS is a _________ operating. (A) Real time (B) Multi-user (C) Preemptive (D) Non-preemptive Generalization is _______ process. (A) top-down (B) bottom up (C) both (A) & (B) (D) None of these Which data management language component enabled the DBA to define the schema components ? (A) DML (B) Sub-schema DLL (C) Schema DLL (D) All of these The ______ field is the SNMP PDV reports an error in a response message. (A) error index (B) error status (C) set request (D) agent index End-to-End connectivity is provided from Last-to-Last in (A) Network layer (B) Session layer (C) Transport layer (D) Data link layer Page making process from main memory to disk is called (A) Interruption (B) Termination (C) Swapping (D) None of the above A Dead-lock in an Operating System is (A) Desirable process (B) Undesirable process (C) Definite waiting process (D) All of the above The dynamic allocation of storage areas with VSAM files is accomplished by (A) Hashing (B) Control splits (C) Overflow areas (D) Relative recoding Which of the following is the most general phase structured grammar ? (A) Regular (B) Context-sensitive (C) Context free (D) None of the above What is the maximum operating rate of a wireless LAN using infrared communication ? (A) 1 mbps (B) 2 mbps (C) 5 mbps (D) 11mbps What services does the internet layer provide ? 1. Quality of service 2. Routing 3. Addressing 4. Connection oriented delivery 5. Framing bits (A) 1, 2, 3 (B) 2, 3, 4 (C) 1, 3, 4, 5 (D) 2, 3, 4, 5 The cost of the network is usually determined by (A) time complexity (B) switching complexity (C) circuit complexity (D) none of these A binary tree with 27 nodes has _______ null branches. (A) 54 (B) 27 (C) 26 (D) None of the above Which of the following is an optimistic concurrency control method ? (A) Validation based (B) Time stamp ordering (C) Lock-based (D) None of these The time complexity to build a heap of n elements is (A) 0(1) (B) 0(lgn) (C) 0(n) (D) 0(nlgn) Linear probing suffers from a problem known as (A) Secondary clustering (B) Primary clustering (C) Both (A) and (B) (D) None of these |
#3
20th November 2015, 03:09 PM
| |||
| |||
Re: IT Officer Exam Sample Papers of Central Bank of India
I would be appearing for the IT officer examination for Central Bank of India and for preparation need sample questions?
|
#4
20th November 2015, 03:11 PM
| |||
| |||
Re: IT Officer Exam Sample Papers of Central Bank of India
Since you are preparing for the IT officer examination for Central Bank of India, please find below the sample question: 1. What do you understand by 'Authentication' and 'Encryption' in the context of system security? In this context explain (i) Kerberos (ii) IP Security (iii) RSA Encryption 2.Write short notes on each of the following: (a) Trojan Horse (b) Smart Cards 3. Write short notes on each of the following: (a) Trojan Horse (b) Smart Cards (c) Physical threats and security (d) PGP 4. Explain the DMA controller with block diagram. What is meant by a block transfer? What are the various phases of an instruction cycle ? Give the micro operation of fetch and decode phases Compare Static RAM with Dynamic RAM. 5. Using NAND gate generate the AND and NOR functions 6. Which of the following services should be enabled in a secure workstation connected in an Ethernet LAN ? Give reasons for your answer. Anacron, ftp, netfs, nfs, telnet, sendmail, SSH, syslog, SNMP, time. (Assume the LAN is connected to the Internet but is not connected via Firewall nor is Kerberos used). 7. What is a Socket ? Write two differences between a TCP Socket and a UDP Socket. 8. What are the standard port numbers for (i) Web Server (ii) Mail Server (iii) FTP Server (iv) Telnet ? 9 What is Network Address Translation (NAT) ? Give any two advantages and two disadvantages of NAT. 10 What is VPN ? How is it useful for an organization ? 11. What is a Search Engine ? How is it useful for Internet/Intranet ? Give the names of any four Search engines. 12 What is WAP ? Give any two advantages and two limitations of WAP. Also explain its layered architecture. |
|