2023 2024 Student Forum > Management Forum > Main Forum

 
  #1  
2nd September 2014, 08:50 AM
Unregistered
Guest
 
Central Bureau of Investigation IT officer previous year question papers

Will you please share with me the Central Bureau of Investigation IT officer previous year question papers?
Similar Threads
Thread
Previous year question papers of Central bank of India IT officer
Intelligence Bureau Security Assistant exam previous year question papers
Intelligence Bureau Security Assistance model or previous year question papers
Intelligence Bureau (India) ACIO (IB) grade II previous year question papers
Process to join Central Bureau of Investigation as a Crime Branch Officer
Intelligence Bureau (India) ACIO exam grade II previous year question papers
Last year papers of Intelligence Bureau Assistant Central Intelligence Officer Exam g
Central Intelligence Bureau for Executive Grade II Exam Previous year question paper
Intelligence Bureau (India) ACIO group II previous year question papers
Previous year question papers of post of Security Assistant of Intelligence Bureau
Intelligence Bureau ACIO previous year question papers of grade II
Intelligence Bureau ACIO previous year question papers
Intelligence Bureau (India) Assistant Central Intelligence Officer last year papers
Eligibility criteria to become a Central Bureau of Investigation Officer
Syllabus of Central Bureau of Investigation officer exam
Central Intelligence Bureau for Executive Grade II Exam last year question papers
Process to become Central Bureau of Investigation officer after B.Com
Previous year question papers of Assistant Central Intelligence Officer-Grade II of I
Last year question papers of Central Assistant Intelligence Bureau Grade II(Executive
Intelligence Bureau previous year question papers of Security Assistant (Executive)
  #2  
2nd September 2014, 10:16 AM
Super Moderator
 
Join Date: Apr 2013
Re: Central Bureau of Investigation IT officer previous year question papers

As you want to get the Central Bureau of Investigation IT officer previous year question papers so here it is for you:

The output of the following program
main( )
{ int a[ ] = { 2,3,4,6,5};
int *p = a;
for (int i = 0; i < 5; i++)
printf(“%d,”,++*p);
}
is
(A) 3, 4, 5, 6, 7
(B) 3, 4, 5, 7, 6
(C) 3, 4, 6, 5, 0
(D) 3, 4, 5, 6, 6

The program
main( )
{ int a = 256, *p=&a;
printf(“%d”,*p>>5);
}
prints
(A) 2
(B) 4
(C) 6
(D) 8

A computer program that converts an entire program into machine language at one time is called a/an

(A) interpreter (B) simulator
(C) compiler (D) commander

All the keys on the IBM PC key board repeat as long as we hold them down. Such type of keys are known as

(A) typematic keys
(B) functional keys
(C) automatic keys
(D) alphabetic keys

The output of the following program
main( )
{
int a[ ] = “computation”;
char *p = a, b=’ ‘;
for (int i = 1; i < 12; i++)
if(i%4) continue;
else a[i]=b;
puts(p);
}
is
(A) comp
(B) comp tat on
(C) com utat on
(D) comp tati n

What does the acronym ISDN stands for

(A) Indian Standard Digital Network
(B) Integrated Services Digital Network
(C) Intelligent Service Digital Network
(D) Integrated Services Data Network

Two basic types of operating system are

(A) sequential and direct
(B) batch and time sharing
(C) direct and interactive
(D) batch and interactive

Which of the following entity does not belong to word processing

(A) characters (B) words
(C) cells (D) paragraphs

The natural mask for class C IP address is _______ .
(A) 255.255.255.0 (B) 255.255.0.0
(C) 255.0.0.0 (D) 255.255.255.255

In C++, if a catch statement is written to catch exception objects of a base class type, it
can also catch all ______ derived from that base class.
(A) Exceptions for objects (B) Objects of classes
(C) Arguments (D) Errors

A schema describes

(A) data elements
(B) records and filer
(C) record relationship
(D) all of the above

Which of the following is not a tool used to manage and control schedule performance

(A) CAD (B) PERT
(C) CPM (D) Gantt Chart

An expert system differs from a data base program in that only an expert system

(A) contains declarative knowledge
(B) contains procedural knowledge
(C) features the retrieval of stored information
(D) experts users to draw own conclusion

The virtual memory addressing capability of 80386 is

(A) 4 GB (B) 16 GB
(C) 64 GB (D) 64 TB

The 80486 microprocessor from Intel consists of

(A) a fast 32 bit CPU but no coprocessor
(B) a 32 bit CPU and an 80387 coprocessor only
(C) a 32 bit CPU, a 80387 coprocessor and memory management unit (MMU) only
(D) a 32 bit CPU, a 80387 coprocessor, memory management unit and a cache memory

Which of the following file transfer protocols use TCP and establishes two virtual circuits between the local
and remote server ?
(A) FTP
(B) TFTP
(C) TELNET
(D) NFS

Frequency shift keying is used mostly in
(A) Radio transmission
(B) Telegraphy
(C) Telephone
(D) None of the above

The baud rate is
(A) always equal to the bit transfer
rate
(B) equal to twice the bandwidth
of an ideal channel
(C) not equal to the signalling rate
(D) equal to half of the bandwidth
of an ideal channel

Object code is the output of ______.
(A) Operating System
(B) Compiler or Assembler
(C) only Assembler
(D) only Compiler

‘Macro’ in an assembly level
program is _______.
(A) sub program
(B) a complete program
(C) a hardware portion
(D) relative coding

Advantage of synchronous sequential circuits over
asynchronous ones is

(A) faster operation
(B) ease of avoiding problems due to hazard
(C) lower hardware requirement
(D) better noise immunity

What is the transitive voltage for the voltage input of a CMOS operating from 10V supply ?
(A) 1V (B) 2V
(C) 5V (D) 10 V

What is decimal equivalent of BCD 11011.1100 ?
(A) 22.0 (B) 22.2
(C) 20.2 (D) 21.2

What will be the output of the following c-code ?
void main ( )
{
char *P = “ayqm” ;
char c;
c = ++*p ;
printf (“%c”, c);
}

(A) a (B) c
(C) b (D) q

The data type created by the data
abstraction process is called
(A) class
(B) structure
(C) abstract data type
(D) user defined data type

An entity instance is a single
occurrence of an _______.
(A) entity type
(B) relationship type
(C) entity and relationship type
(D) None of these

Grammar of the programming is checked at ________ phase of
compiler.

(A) semantic analysis
(B) code generation
(C) syntax analysis
(D) code optimization

WINDOWS is a _________ operating.
(A) Real time
(B) Multi-user
(C) Preemptive
(D) Non-preemptive

Generalization is _______ process.
(A) top-down
(B) bottom up
(C) both (A) & (B)
(D) None of these

Which data management language component enabled the DBA to define the schema components ?
(A) DML
(B) Sub-schema DLL
(C) Schema DLL
(D) All of these

The ______ field is the SNMP PDV reports an error in a response
message.
(A) error index
(B) error status
(C) set request
(D) agent index

End-to-End connectivity is provided from Last-to-Last in
(A) Network layer
(B) Session layer
(C) Transport layer
(D) Data link layer

Page making process from main
memory to disk is called
(A) Interruption
(B) Termination
(C) Swapping
(D) None of the above

A Dead-lock in an Operating System
is
(A) Desirable process
(B) Undesirable process
(C) Definite waiting process
(D) All of the above

The dynamic allocation of storage
areas with VSAM files is
accomplished by
(A) Hashing
(B) Control splits
(C) Overflow areas
(D) Relative recoding

Which of the following is the most general phase structured grammar ?
(A) Regular
(B) Context-sensitive
(C) Context free
(D) None of the above

What is the maximum operating rate of a wireless LAN using infrared
communication ?
(A) 1 mbps (B) 2 mbps
(C) 5 mbps (D) 11mbps

What services does the internet layer provide ?
1. Quality of service
2. Routing
3. Addressing
4. Connection oriented delivery
5. Framing bits
(A) 1, 2, 3 (B) 2, 3, 4
(C) 1, 3, 4, 5 (D) 2, 3, 4, 5

The cost of the network is usually determined by
(A) time complexity
(B) switching complexity
(C) circuit complexity
(D) none of these

A binary tree with 27 nodes has
_______ null branches.
(A) 54
(B) 27
(C) 26
(D) None of the above

Which of the following is an optimistic concurrency control
method ?
(A) Validation based
(B) Time stamp ordering
(C) Lock-based
(D) None of these

The time complexity to build a heap of n elements is
(A) 0(1)
(B) 0(lgn)
(C) 0(n)
(D) 0(nlgn)

Linear probing suffers from a problem known as
(A) Secondary clustering
(B) Primary clustering
(C) Both (A) and (B)
(D) None of these


Quick Reply
Your Username: Click here to log in

Message:
Options

Thread Tools Search this Thread



All times are GMT +5. The time now is 09:18 PM.


Powered by vBulletin® Version 3.8.11
Copyright ©2000 - 2024, vBulletin Solutions Inc.
SEO by vBSEO 3.6.0 PL2

1 2 3 4