2023 2024 Student Forum > Management Forum > Main Forum

 
  #2  
20th December 2014, 02:47 PM
Super Moderator
 
Join Date: Apr 2013
Re: CBI IT officer JMG scale Model Paper

Central Bank of India-IT officer JMG scale Selection will be on the basis of Written Test and/or Group Discussions, Interview.

Written Test will comprise
(i) Objective Test on Quantitative Aptitude, Reasoning, General Awareness and English &
(ii) Descriptive Test

The Descriptive Test shall be to assess the candidates’ knowledge on Socio- economic development and Communication Skills.

Questions:

A special type gateway that can keep external users from accessing resources on the LAN users access the external info is called:
Repeater
Firewall
Encryption
Hub
None of these
What is the name given to the exchange of control signals which is necessary for establishing a connection between a modem and a computer at one end of a line and another modem and computer at the other end?
Handshaking
Modem options
Protocol
All of these
None of these
In SQL, which command is used to changes data in a data table?
UPDATE
INSERT
BROWSE
APPEND
None of these
In SQL, which of the following is not a data definition language command?
RENAME
REVOKE
GRANT
UPDATE
None of these
Which command(s) is (are) used to redefine a column of the table in SQL ?
ALTER TABLE
DEFINE TABLE
MODIFY TABLE
ALL of the these
None of these
In a relational schema, each tuple is divided into fields called
Relations
Domains
Queries
All of the these
None of these
An indexing operation
Sorts a file using a single key
Sorts file using two keys
Establishes an index for a file
Both (1) and (3)
None of these
Data security threats include
Hardware failure
Privacy invasion
Fraudulent manipulation of data
All of these
None of these
The language used in application programs to request data from the DBMS is referred to as the
DML
DDL
Query language
DCL
None of these
A ___ contains the smallest unit of meaningful data, so you might call it the basic building block for a data file.
File structures
Records
Fields
Database
None of these
A ___ means that one record in a particular record type is related to only one record of another record type.
One to one relationship
One to many relationship
Many toone relationship
Many to many relationship
None of these
Through linked list one can implement
Stack
Graph
Queue
All of these
None of these
A heap allows a very efficient implementation of a
Doubled ended queue
Priority queue
Stack
Trees
None of these
In files, there is a key associated with each record which is used to differentiate among different records. For every file there is at least one set of keys that is unique. Such a Key is called
Unique key
Prime attribute
Index key
Primary Key
Null key
____ is primarily used for mapping host names and email destinations to IP address but can also be used for other purposes.
TCP(transfer control protocol)
DNS(Domain Name System)
SHA (Secure Hash Algorithm)
Simple Network Management Protocol (SNMP)
None of these
Override is a method
For an operation that replaces an inherited method for the same operation
For a data that replaces an inherited method for the same operation
For an operation that takes arguments form library function
All of these
None of these
Local variables
Are created outside a block
Are known only to that block
Continue to exist when their block ends
Are illegal in C++
None of these
____ is virus that inserts itself into a system’s memory. Then it take number of actions when an infected file is executed.
Web scripting virus
Polymorphic virus
Macro virus
Boot sector virus
Resident virus
This ___ data mining technique derives rules from real world case examples.
Waterfall model
RAD
White Box
Spiral model
Case based reasoning
The ___ remains operative until the software is required.
Waterfall model
Incremental model
Spiral model
Prototyping model
Incremental model
Data mining evolve as a mechanism to cater the limitations of ___ systems to deal massive data sets with high dimensionality, new data type, multiple heterogeneous data resource etc.
OLTP
OLAP
DSS
DWH
None of these
An important application of cryptography, used in computerized commercial and financial transaction
Data mining
Data warehousing
Digital signature
Media convergence
None of these
Rows of a relation are called:
Relation
Tuples
Data structure
An entity
None of these
The drawbacks of the binary tree sort are remedied by the
Linear sort
Quick Sort
Heap Sort
Insertion Sort
None of these
Which layer of OSI determines the interface of the system with the user?
Network
Application
Data link
Session
None of these


Quick Reply
Your Username: Click here to log in

Message:
Options

Thread Tools Search this Thread



All times are GMT +5. The time now is 04:27 AM.


Powered by vBulletin® Version 3.8.11
Copyright ©2000 - 2024, vBulletin Solutions Inc.
SEO by vBSEO 3.6.0 PL2

1 2 3 4