2023 2024 Student Forum > Management Forum > Main Forum

 
  #2  
20th November 2014, 09:58 AM
Super Moderator
 
Join Date: Apr 2013
Re: Question papers of SBI assistant manager

As you need the Question papers of SBI assistant manager exam so here it is given below:

1. At which layer does Hub Work?
Ans. Layer 1
2. Belady’s Anomaly occurs in which Scheduling Technique?
Ans. First In First Out (FIFO)


3. One question on Compiler Design having rules such as S->ABC; A->BC…have to trace the string.
4. Relational Algebra and Relational Calculus are:
(A) Both Procedural languages
(B) Procedural and Non Procedural Respectively
(C) Non Procedural and Procedural Respectively
(D) Both are Non-Procedural
(E) None of These
Ans. (B)
5. Primary key is selected from a set of
(A) Alternate Keys (C) Foreign Keys (E) Both A and C
(B) Candidate Keys (D) None of These
Ans. (B)
6. Which class IP Address has highest number of Network Addresses?
Ans. Class C
7. The Transport layer corresponds to which layer in TCP Model?
Ans. Transport (Both Models have layer with same name)

8. A Type of Topology requiring Human Intervention
Ans. T-MAN
9. How do Toggle Flip-Flops divide Clock frequency of size n MHz?
(A) n (B) 2n
(C) log n (D) None
Ans. Log n
When T is held high, the toggle flip-flop divides the clock frequency by two; that is, if clock frequency is 4 MHz, the output frequency obtained from the flip-flop will be 2 MHz.
10. Full form of SQL is:
Ans. Structured Query language
11. What is the function of Quarter Adder?
Ans. A quarter adder is a circuit that can add two binary digits but will not produce a carry. This circuit
will produce the following results:
0 plus 0 = 0
0 plus 1 = 1
1 plus 0 = 1
1 plus 1 = 0 (no carry)
12. There are 7 bits in ____________ system
(A) ASCII
(B) EBCDIC
(C) BCD
(D) Unicode
(E) None of These
Ans. (A) ASCII
13. Which of the following is not true about the memory management?
(A) virtual memory is used only in multi-user systems
(B) segmentation suffers from external fragmentation
(C) paging suffers from internal fragmentation
(D) segmented memory can be paged
(E) None of the above
Ans. (A)
14. Data integrity control
(A) is used to set upper and lower limits on numeric data
(B) requires the use of passwords to prohibit unauthorized access to the file
(C) has the data dictionary keep the date and time of last access last back-up, and most recent modification for all files
(D) All of the above
(E) None of the above
Ans. (C)
15. What does Bottom up Parser generates?
Ans. Rightmost Derivation in Reverse
16. What command is used to assign only read permission to all three categories of the file ‘letter’?
(A) chmod u + r, g + r, o – x letter
(B) chmod ugo = r letter
(C) chmod a – rw letter
(D) chmod go + r letter
(E) None of the above
Ans. (B)
17. Collection of fields is called —
(A) Information (B) Object (C) Record (D) File (E) None
Ans. (C)
18. In an E-R diagram ellipse is used to represent
(A) attributes (B) Relationships
(C) Entity (D) Tuple
(E) None
Ans (A)
19. One question on why Compiler is better than interpreter.
20. Which of the following is the loopback address?
Ans. 127.0.0.1
21. Which two files are used during operation of the DBMS?
(A) query language and utilities
(B) data manipulation language and query language
(C) data dictionary and transaction log
(D) data dictionary and query language
(E) None
Ans. (C)
22. Access time of symbol table will be logarithmic, if it is implemented by
(A) Liner List
(B) Search Trees
(C) Hash table
(D) Self Organizing List
(E) Either (B) or (C)
Ans (B)
23. Manager’s salary details are to be hidden from Employee Table. This Technique is called as
(A) Conceptual level Datahiding
(B) Physical level Datahiding
(C) External level Datahiding
(D) Logical level Datahiding
Ans. (C)
24. Which of the following addresses is used to deliver a message to the correct application program running on a host?
(A) Port
(B) IP
(C) Logical
(D) Physical
Ans. (A) Port
25. In classful addressing, the IP address 190.255.254.254 belongs to
(A) Class A
(B) Class B
(C) Class C
(D) None of These
Ans. (B)
26. While estimating the cost of software, Lines of Code (LOC) and Function Points (FP) are used to measure which one of the following?
(A) Length of code
(B) Size of software
(C) Functionality of software
(D) None of the above
Ans. (B)
27. The XOR gates are ideal for testing parity because even-parity words produce a _____ output and odd-parity words produce a _____ output
(A) low, high (B) high, low
(C) odd, even (D) Even,Odd
Ans. (A)
28. Error detection at the data link level is achieved by?
(A) Bit stuffing (B) Hamming codes
(C) Cyclic Redundancy codes (D) Equalization
(E) None of These
Ans (C)
29. What is the full form of VIRUS commonly used in terms of computer technology?
(A) Various Information Resource Under Siege
(B) Vital Information Resource Under Siege.
(C) Viirtual Information Resource Under Secured
(D) Very Imoprtant Resource Under Seiege
Ans. (B)
30. Railway track is an example of what type of communication?
(A) simplex (B) half-duplex (C) full-duplex (D) All of these (E) None of these
Ans. (B)
31. Synonym of Table is___
Ans. Relation
32. The problem of thrashing is affected significantly by:
(A) program structure. (B) program size. (C) primary-storage size. (D) all of the above.
Ans., (A)
33. End to end and Host to Host delivery is a reponsibility of which Layer?
Ans. Transport Layer
34. System that Compiles the code in system which wil be used in another system
Ans. Cross-Compiler
35. A good software design must have
(A) High module coupling, High module cohesion
(B) High module coupling, Low module cohesion
(C) Low module coupling, High module cohesion
(D) Low module coupling, Low module cohesion
Ans. (C)
36. application to application delivery is guaranteed by which layer?
Ans. Application layer
37. What SQL keyword must be used to remove duplicate rows from the result?
Ans, SELECT DISTINCT Statement
38. DML command that modifies rows (tuples) of your tables ____
Ans. UPDATE
39. How many times the word ‘print’ shall be printed by the following program segment?
for(i=1, i≤2, i++)
for(j=1, J≤2, J++)
for(k=l, k≤2, k++)
printf(“print/n”)
(A) 1
(B) 3
(C) 6
(D) 8
Ans.: D
40. Which of the following is not a type of Database Management System?
(A) Hierarchical
(B) Network
(C) Relational
(D) Sequential
Ans.: D.)
41. Consider the following statements for priority queue:
S1 : It is a data structure in which the intrinsic ordering of the elements does determine the result of its basic operations.
S2: The elements of a priority queue may be complex structures that are ordered on one or several fields.
Which of the following is correct?
(A) Both S1 and S2 are incorrect.
(B) S1 is correct and S2 is incorrect.
(C) SI is incorrect and S2 is correct.
(D) Both S1 and S2 are correct.
Ans: (D)
42. The task of correcting and pre processing data is called as
(A) Data streaming
(B) Data cleaning
(C) Data mining
(D) Data storming
Ans: (B)
43. COCOMO stands for
(A) Composite Cost Model
(B) Constructive Cost Model
(C) Constructive Composite Model
(D) Comprehensive Construction Model
Ans: (B)
44. The mv command changes
(A) the inode
(B) the inode-number
(C) the directory entry
(D) both the directory entry and the inode
Ans: (C)
45. Dirty bit is used to show the
(a) Page with corrupted data
(b) The wrong page in the memory
(c) Page that is modified after being loaded into cache memory
(d) Page that is less frequently accessed
Ans (C)
46. The first-fit, best-fit and the worst-fit algorithm can be used for
(A) contiguous allocation of memory
(B) linked allocation of memory
(C) indexed allocation of memory
(D) all of thes
Ans (B)
47. Routers operate at layer _____. LAN switches operate at layer _____. Ethernet hubs operate at
layer _____. Word processing operates at layer _____.
Ans. 3, 2 , 1 , None
48. A receiving host has failed to receive all of the segments that it should acknowledge. What can the host do to improve the reliability of this communication session?
(A) Send a different source port number.
(B) Restart the virtual circuit.
(C) Decrease the sequence number.
(D) Decrease the window size.
Ans. Option D
Reason: A receiving host can control the transmitter by using flow control (TCP uses Windowing by default). By decreasing the window size, the receiving host can slow down the transmitting host so the receiving host does not overflow its buffers.
49. What is the full form of ISP?
Ans. Internet Service Provider
50. What is the full form of DSP?
Ans. Digital Signal Processing


Quick Reply
Your Username: Click here to log in

Message:
Options




All times are GMT +5. The time now is 01:10 PM.


Powered by vBulletin® Version 3.8.11
Copyright ©2000 - 2024, vBulletin Solutions Inc.
SEO by vBSEO 3.6.0 PL2

1 2 3 4