#1
20th November 2014, 09:06 AM
| |||
| |||
Question papers of SBI assistant manager
Here I am looking for the Question papers of SBI assistant manager can you please provide me?
|
#2
20th November 2014, 09:58 AM
| |||
| |||
Re: Question papers of SBI assistant manager
As you need the Question papers of SBI assistant manager exam so here it is given below: 1. At which layer does Hub Work? Ans. Layer 1 2. Belady’s Anomaly occurs in which Scheduling Technique? Ans. First In First Out (FIFO) 3. One question on Compiler Design having rules such as S->ABC; A->BC…have to trace the string. 4. Relational Algebra and Relational Calculus are: (A) Both Procedural languages (B) Procedural and Non Procedural Respectively (C) Non Procedural and Procedural Respectively (D) Both are Non-Procedural (E) None of These Ans. (B) 5. Primary key is selected from a set of (A) Alternate Keys (C) Foreign Keys (E) Both A and C (B) Candidate Keys (D) None of These Ans. (B) 6. Which class IP Address has highest number of Network Addresses? Ans. Class C 7. The Transport layer corresponds to which layer in TCP Model? Ans. Transport (Both Models have layer with same name) 8. A Type of Topology requiring Human Intervention Ans. T-MAN 9. How do Toggle Flip-Flops divide Clock frequency of size n MHz? (A) n (B) 2n (C) log n (D) None Ans. Log n When T is held high, the toggle flip-flop divides the clock frequency by two; that is, if clock frequency is 4 MHz, the output frequency obtained from the flip-flop will be 2 MHz. 10. Full form of SQL is: Ans. Structured Query language 11. What is the function of Quarter Adder? Ans. A quarter adder is a circuit that can add two binary digits but will not produce a carry. This circuit will produce the following results: 0 plus 0 = 0 0 plus 1 = 1 1 plus 0 = 1 1 plus 1 = 0 (no carry) 12. There are 7 bits in ____________ system (A) ASCII (B) EBCDIC (C) BCD (D) Unicode (E) None of These Ans. (A) ASCII 13. Which of the following is not true about the memory management? (A) virtual memory is used only in multi-user systems (B) segmentation suffers from external fragmentation (C) paging suffers from internal fragmentation (D) segmented memory can be paged (E) None of the above Ans. (A) 14. Data integrity control (A) is used to set upper and lower limits on numeric data (B) requires the use of passwords to prohibit unauthorized access to the file (C) has the data dictionary keep the date and time of last access last back-up, and most recent modification for all files (D) All of the above (E) None of the above Ans. (C) 15. What does Bottom up Parser generates? Ans. Rightmost Derivation in Reverse 16. What command is used to assign only read permission to all three categories of the file ‘letter’? (A) chmod u + r, g + r, o – x letter (B) chmod ugo = r letter (C) chmod a – rw letter (D) chmod go + r letter (E) None of the above Ans. (B) 17. Collection of fields is called — (A) Information (B) Object (C) Record (D) File (E) None Ans. (C) 18. In an E-R diagram ellipse is used to represent (A) attributes (B) Relationships (C) Entity (D) Tuple (E) None Ans (A) 19. One question on why Compiler is better than interpreter. 20. Which of the following is the loopback address? Ans. 127.0.0.1 21. Which two files are used during operation of the DBMS? (A) query language and utilities (B) data manipulation language and query language (C) data dictionary and transaction log (D) data dictionary and query language (E) None Ans. (C) 22. Access time of symbol table will be logarithmic, if it is implemented by (A) Liner List (B) Search Trees (C) Hash table (D) Self Organizing List (E) Either (B) or (C) Ans (B) 23. Manager’s salary details are to be hidden from Employee Table. This Technique is called as (A) Conceptual level Datahiding (B) Physical level Datahiding (C) External level Datahiding (D) Logical level Datahiding Ans. (C) 24. Which of the following addresses is used to deliver a message to the correct application program running on a host? (A) Port (B) IP (C) Logical (D) Physical Ans. (A) Port 25. In classful addressing, the IP address 190.255.254.254 belongs to (A) Class A (B) Class B (C) Class C (D) None of These Ans. (B) 26. While estimating the cost of software, Lines of Code (LOC) and Function Points (FP) are used to measure which one of the following? (A) Length of code (B) Size of software (C) Functionality of software (D) None of the above Ans. (B) 27. The XOR gates are ideal for testing parity because even-parity words produce a _____ output and odd-parity words produce a _____ output (A) low, high (B) high, low (C) odd, even (D) Even,Odd Ans. (A) 28. Error detection at the data link level is achieved by? (A) Bit stuffing (B) Hamming codes (C) Cyclic Redundancy codes (D) Equalization (E) None of These Ans (C) 29. What is the full form of VIRUS commonly used in terms of computer technology? (A) Various Information Resource Under Siege (B) Vital Information Resource Under Siege. (C) Viirtual Information Resource Under Secured (D) Very Imoprtant Resource Under Seiege Ans. (B) 30. Railway track is an example of what type of communication? (A) simplex (B) half-duplex (C) full-duplex (D) All of these (E) None of these Ans. (B) 31. Synonym of Table is___ Ans. Relation 32. The problem of thrashing is affected significantly by: (A) program structure. (B) program size. (C) primary-storage size. (D) all of the above. Ans., (A) 33. End to end and Host to Host delivery is a reponsibility of which Layer? Ans. Transport Layer 34. System that Compiles the code in system which wil be used in another system Ans. Cross-Compiler 35. A good software design must have (A) High module coupling, High module cohesion (B) High module coupling, Low module cohesion (C) Low module coupling, High module cohesion (D) Low module coupling, Low module cohesion Ans. (C) 36. application to application delivery is guaranteed by which layer? Ans. Application layer 37. What SQL keyword must be used to remove duplicate rows from the result? Ans, SELECT DISTINCT Statement 38. DML command that modifies rows (tuples) of your tables ____ Ans. UPDATE 39. How many times the word ‘print’ shall be printed by the following program segment? for(i=1, i≤2, i++) for(j=1, J≤2, J++) for(k=l, k≤2, k++) printf(“print/n”) (A) 1 (B) 3 (C) 6 (D) 8 Ans.: D 40. Which of the following is not a type of Database Management System? (A) Hierarchical (B) Network (C) Relational (D) Sequential Ans.: D.) 41. Consider the following statements for priority queue: S1 : It is a data structure in which the intrinsic ordering of the elements does determine the result of its basic operations. S2: The elements of a priority queue may be complex structures that are ordered on one or several fields. Which of the following is correct? (A) Both S1 and S2 are incorrect. (B) S1 is correct and S2 is incorrect. (C) SI is incorrect and S2 is correct. (D) Both S1 and S2 are correct. Ans: (D) 42. The task of correcting and pre processing data is called as (A) Data streaming (B) Data cleaning (C) Data mining (D) Data storming Ans: (B) 43. COCOMO stands for (A) Composite Cost Model (B) Constructive Cost Model (C) Constructive Composite Model (D) Comprehensive Construction Model Ans: (B) 44. The mv command changes (A) the inode (B) the inode-number (C) the directory entry (D) both the directory entry and the inode Ans: (C) 45. Dirty bit is used to show the (a) Page with corrupted data (b) The wrong page in the memory (c) Page that is modified after being loaded into cache memory (d) Page that is less frequently accessed Ans (C) 46. The first-fit, best-fit and the worst-fit algorithm can be used for (A) contiguous allocation of memory (B) linked allocation of memory (C) indexed allocation of memory (D) all of thes Ans (B) 47. Routers operate at layer _____. LAN switches operate at layer _____. Ethernet hubs operate at layer _____. Word processing operates at layer _____. Ans. 3, 2 , 1 , None 48. A receiving host has failed to receive all of the segments that it should acknowledge. What can the host do to improve the reliability of this communication session? (A) Send a different source port number. (B) Restart the virtual circuit. (C) Decrease the sequence number. (D) Decrease the window size. Ans. Option D Reason: A receiving host can control the transmitter by using flow control (TCP uses Windowing by default). By decreasing the window size, the receiving host can slow down the transmitting host so the receiving host does not overflow its buffers. 49. What is the full form of ISP? Ans. Internet Service Provider 50. What is the full form of DSP? Ans. Digital Signal Processing |
|