#1
20th December 2014, 01:59 PM
| |||
| |||
CBI IT officer JMG scale Model Paper
Tell me how can I get Central Bank of India-IT officer JMG scale exam model question paper???
|
#2
20th December 2014, 02:47 PM
| |||
| |||
Re: CBI IT officer JMG scale Model Paper
Central Bank of India-IT officer JMG scale Selection will be on the basis of Written Test and/or Group Discussions, Interview. Written Test will comprise (i) Objective Test on Quantitative Aptitude, Reasoning, General Awareness and English & (ii) Descriptive Test The Descriptive Test shall be to assess the candidates’ knowledge on Socio- economic development and Communication Skills. Questions: A special type gateway that can keep external users from accessing resources on the LAN users access the external info is called: Repeater Firewall Encryption Hub None of these What is the name given to the exchange of control signals which is necessary for establishing a connection between a modem and a computer at one end of a line and another modem and computer at the other end? Handshaking Modem options Protocol All of these None of these In SQL, which command is used to changes data in a data table? UPDATE INSERT BROWSE APPEND None of these In SQL, which of the following is not a data definition language command? RENAME REVOKE GRANT UPDATE None of these Which command(s) is (are) used to redefine a column of the table in SQL ? ALTER TABLE DEFINE TABLE MODIFY TABLE ALL of the these None of these In a relational schema, each tuple is divided into fields called Relations Domains Queries All of the these None of these An indexing operation Sorts a file using a single key Sorts file using two keys Establishes an index for a file Both (1) and (3) None of these Data security threats include Hardware failure Privacy invasion Fraudulent manipulation of data All of these None of these The language used in application programs to request data from the DBMS is referred to as the DML DDL Query language DCL None of these A ___ contains the smallest unit of meaningful data, so you might call it the basic building block for a data file. File structures Records Fields Database None of these A ___ means that one record in a particular record type is related to only one record of another record type. One to one relationship One to many relationship Many toone relationship Many to many relationship None of these Through linked list one can implement Stack Graph Queue All of these None of these A heap allows a very efficient implementation of a Doubled ended queue Priority queue Stack Trees None of these In files, there is a key associated with each record which is used to differentiate among different records. For every file there is at least one set of keys that is unique. Such a Key is called Unique key Prime attribute Index key Primary Key Null key ____ is primarily used for mapping host names and email destinations to IP address but can also be used for other purposes. TCP(transfer control protocol) DNS(Domain Name System) SHA (Secure Hash Algorithm) Simple Network Management Protocol (SNMP) None of these Override is a method For an operation that replaces an inherited method for the same operation For a data that replaces an inherited method for the same operation For an operation that takes arguments form library function All of these None of these Local variables Are created outside a block Are known only to that block Continue to exist when their block ends Are illegal in C++ None of these ____ is virus that inserts itself into a system’s memory. Then it take number of actions when an infected file is executed. Web scripting virus Polymorphic virus Macro virus Boot sector virus Resident virus This ___ data mining technique derives rules from real world case examples. Waterfall model RAD White Box Spiral model Case based reasoning The ___ remains operative until the software is required. Waterfall model Incremental model Spiral model Prototyping model Incremental model Data mining evolve as a mechanism to cater the limitations of ___ systems to deal massive data sets with high dimensionality, new data type, multiple heterogeneous data resource etc. OLTP OLAP DSS DWH None of these An important application of cryptography, used in computerized commercial and financial transaction Data mining Data warehousing Digital signature Media convergence None of these Rows of a relation are called: Relation Tuples Data structure An entity None of these The drawbacks of the binary tree sort are remedied by the Linear sort Quick Sort Heap Sort Insertion Sort None of these Which layer of OSI determines the interface of the system with the user? Network Application Data link Session None of these |