28th February 2015 11:39 AM | |
Kiran Chandar | Re: State Bank of India Specialist Officer previous year question papers As per as your request, I am forwarding you State Bank of India Specialist Officer IT officer previous year questions. In SQL, which of the following is not a data Manipulation Language Commands? Delete Select Update Create None of the above The value for an attribute or a column are drawn from a set of values known as – Tuples Attributes Domain Column None of these Entities having primary key are called Primary Key Strong entities Weak entities Primary Key None Of these Which of the following is not a type of SQL statement? Data Manipulation Language (DML) Data Definition Language (DDL) Data Control Language (DCL) Data Communication Language (DCL) None of these Which of the following is not included in DML (Data Manipulation Language) INSERT UPDATE DELETE CREATE None of these TRUNCATE statement in SQL is a – DML statement DDL statement DCL statement DSL statement None of these To discard all pending data changes COMMIT ROLLBACK SAVEPOINT LOCK None of these Which of the following term is related to the stack? TOP PUSH POP Rear A, B and C. In Queues, the end from where items inserted is called Rear Front Top Base None of these Which protocol is used for browsing website: TCP FITFP FTP TFTP None of these Which of the following is a browser? Netscape Navigator Mosaic Mozilla Firefox Google chrome All of these Black Box Testing sometime called – Data flow testing Loop testing Behavioral testing Graph based testing None of these The Objective of testing is Debugging To uncover errors To gain modularity To analyze system None of these Choose the right sequence of SDLC (Software development life cycle) steps Design, Requirement Analysis, Coding, Testing Requirement Analysis, Design, Coding, Testing Requirement Analysis, Design, Testing, Coding Requirement Analysis, Coding, Design, Testing None of these The drawback of the binary tree sort are remedied by the Linear Sort Quick Sort Heap Sort Insertion Sort All of these Round robin scheduling is essentially the preemptive version of FIFO Shortest job first Shortest remaining Longest time first None of these ____ is the situation in which a process is waiting on another process, which is also waiting on another process which is waiting on the first process. None of the processes involved in this circular wait are making progress. Deadlock Starvation Dormant All of these None of these Assembly language is a _____ Low Level Language Middle Level Language High level Language User Language None of these Which of the following is a type of translator? Assembler Compiler Interpreter All of the Above None of these Multiprogramming systems ___ Are easier to develop than single programming Execute each job faster Execute more jobs in the same time Are used only on large main frame computers None of these The mechanism by which the data and functions are bound together with an Inheritance Encapsulation Abstraction Polymorphism None of these The OSI model consists of ___layers. Nine Eight Seven Five Eleven Decryption & Encryption of data are the responsibility of the ___ layer. Physical Data link Presentation Session Application LANs can be connected by devices called ____ which operate in the data link layer? Hub Bridges HDLC Tunnel None of these In a ____ topology, if there are n devices in a network, each device has n-1 ports for cable. Mesh Star Bus Ring None of these OLAP applications are widely used by ____ and it uses ____ Schema. RDBMS , Bus Operating System ,Star Java , Bus Data mining Techniques; Star or multidimensional None of these Arrange the following in increasing order of their size. Database<File<Record<Field<Byte<Bit Bit<Byte<Field<Record<File<Database Bit>Byte>Record>Field>File>Database Bit>Byte>File>Record>Field>Database JVM is a virtual machine that can execute ___ C language .net programming RDBMS C++ Language Java byte Code ODBC is based on ___. Structured Query Language. C language C++ language .net None of these Which of the following is not an advantage of the data-base approach? Increased security Elimination data redundancy Ability to associate related data ‘ Programming/data independence All of the above In relational database row and column is called as ____and ____respectively. Tuple; Attribute Attribute; Tuple Tupple;Domain Attribute; Domain None of these To delete a particular column in a relation the command used is: DELETE UPDATE DROP ALTER None of these A primary key if combined with a foreign key creates Parent-Child relationship between the tables that connect them. Many to many relationship between the tables that connect them. Network model between the tables that connect them. All of the above None of the above Which of the following is record based logical model? Network Model Object oriented model E-R Model All of these None of these The full form of DDL is Dynamic Data Language Detailed Data Language Data Definition Language Data Derivation Language All of these Which of the following virus overtake computer system when it boots and destroy in-formation? Trojan System infectors Boot infectors Stealth virus None of these The relational model includes two general integrity rules. Integrity rule 1 is concerned with ____ and integrity rule 2 is concerned with ____ Primary Key, Foreign key Primary Key, composite key Unique key, Foreign key Composite Key, Foreign key None of these ____ is person who has the central control over both data and application programs. System engineer Database administrator Database manager Technical analyst None of these An attribute of a relation that references the primary key of another relation is known as the ____ Foreign Key Unique Key Parent key Child key Index key An entity set that does not have sufficient attributes to form a primary key is a strong entity set weak entity set simple entity set primary entity set. None of these The JDBC-ODBC bridge is Three tiered Multithread Best for any platform All of these None of these In a relational database, this is a data structure that organizes the information about a single topic into row and columns. Block Record Tuple Table None of these Which statements about the Java language are true? Java supports both procedural and object-oriented programming Java is only a procedural language. Java is only an Object-Oriented. Java is related to None of the above. Stack is also called ____ First In First Out (LIFO) Last In First Out (FIFO) First In Last Out (FILO) First Come First Served (FCFS) None of the above The index created by primary key column is called _____ Unique Index Composite Index Single Index Primary index None of these In SQL ,which command(s) is(are) used to remove rows from a table. Delete Remove Truncate Both and (3) None of the above In SQL, the CREATE TABLE is used To create a table, defining its columns, integrity constraints, and storage allocation To add a column/integrity constraint to a table. To redefine a column To change a table’s storage characteristics All of the above What is the abbreviation is used for a software package that permits the user to create , retrieve and maintain records in a database? DASD CRMD DBMS All of these None of the above Choose the right sequence of virus stages - Triggering, Damage ,Dormancy, propagation Damage, Triggering ,Dormancy, propagation Damage, Triggering, propagation ,Dormancy Triggering, Damage, propagation, Dormancy Dormancy, Propagation,. Triggering, Damage In SQL, which command is used to add new rows to a table? Alter Table Add row Insert Append None of the Above |
28th February 2015 11:01 AM | |
Unregistered | Re: State Bank of India Specialist Officer previous year question papers My friend and I are preparing for the SBI Specialist Officer IT officer paper, will you please forward me previous year paper for same? |
7th August 2014 10:03 AM | |
Kiran Chandar | Re: State Bank of India Specialist Officer previous year question papers As you want to get the State Bank of India Specialist Officer previous year question papers so here it is for you: In SQL, which of the following is not a data Manipulation Language Commands? Delete Select Update Create None of the above The value for an attribute or a column are drawn from a set of values known as - Tuples Attributes Domain Column None of these Entities having primary key are called Primary Key Strong entities Weak entities Primary Key None Of these Which of the following is not a type of SQL statement? Data Manipulation Language (DML) Data Definition Language (DDL) Data Control Language (DCL) Data Communication Language (DCL) None of these Which of the following is not included in DML (Data Manipulation Language) INSERT UPDATE DELETE CREATE None of these TRUNCATE statement in SQL is a - DML statement DDL statement DCL statement DSL statement None of these To discard all pending data changes COMMIT ROLLBACK SAVEPOINT LOCK None of these Which of the following term is related to the stack? TOP PUSH POP Rear A, B and C. In Queues, the end from where items inserted is called Rear Front Top Base None of these Which protocol is used for browsing website: TCP FITFP FTP TFTP None of these Which of the following is a browser? Netscape Navigator Mosaic Mozilla Firefox Google chrome All of these Black Box Testing sometime called - Data flow testing Loop testing Behavioral testing Graph based testing None of these The Objective of testing is Debugging To uncover errors To gain modularity To analyze system None of these Choose the right sequence of SDLC (Software development life cycle) steps Design, Requirement Analysis, Coding, Testing Requirement Analysis, Design, Coding, Testing Requirement Analysis, Design, Testing, Coding Requirement Analysis, Coding, Design, Testing None of these The drawback of the binary tree sort are remedied by the Linear Sort Quick Sort Heap Sort Insertion Sort All of these Round robin scheduling is essentially the preemptive version of FIFO Shortest job first Shortest remaining Longest time first None of these ____ is the situation in which a process is waiting on another process, which is also waiting on another process which is waiting on the first process. None of the processes involved in this circular wait are making progress. Deadlock Starvation Dormant All of these None of these Assembly language is a _____ Low Level Language Middle Level Language High level Language User Language None of these Which of the following is a type of translator? Assembler Compiler Interpreter All of the Above None of these Multiprogramming systems ___ Are easier to develop than single programming Execute each job faster Execute more jobs in the same time Are used only on large main frame computers None of these The mechanism by which the data and functions are bound together with an Inheritance Encapsulation Abstraction Polymorphism None of these The OSI model consists of ___layers. Nine Eight Seven Five Eleven Decryption & Encryption of data are the responsibility of the ___ layer. Physical Data link Presentation Session Application LANs can be connected by devices called ____ which operate in the data link layer? Hub Bridges HDLC Tunnel None of these In a ____ topology, if there are n devices in a network, each device has n-1 ports for cable. Mesh Star Bus Ring None of these OLAP applications are widely used by ____ and it uses ____ Schema. RDBMS , Bus Operating System ,Star Java , Bus Data mining Techniques; Star or multidimensional None of these Arrange the following in increasing order of their size. Database<File<Record<Field<Byte<Bit Bit<Byte<Field<Record<File<Database Bit>Byte>Record>Field>File>Database Bit>Byte>File>Record>Field>Database JVM is a virtual machine that can execute ___ C language .net programming RDBMS C++ Language Java byte Code ODBC is based on ___. Structured Query Language. C language C++ language .net None of these Which of the following is not an advantage of the data-base approach? Increased security Elimination data redundancy Ability to associate related data ‘ Programming/data independence All of the above In relational database row and column is called as ____and ____respectively. Tuple; Attribute Attribute; Tuple Tupple;Domain Attribute; Domain None of these To delete a particular column in a relation the command used is: DELETE UPDATE DROP ALTER None of these A primary key if combined with a foreign key creates Parent-Child relationship between the tables that connect them. Many to many relationship between the tables that connect them. Network model between the tables that connect them. All of the above None of the above Which of the following is record based logical model? Network Model Object oriented model E-R Model All of these None of these The full form of DDL is Dynamic Data Language Detailed Data Language Data Definition Language Data Derivation Language All of these Which of the following virus overtake computer system when it boots and destroy in-formation? Trojan System infectors Boot infectors Stealth virus None of these The relational model includes two general integrity rules. Integrity rule 1 is concerned with ____ and integrity rule 2 is concerned with ____ Primary Key, Foreign key Primary Key, composite key Unique key, Foreign key Composite Key, Foreign key None of these ____ is person who has the central control over both data and application programs. System engineer Database administrator Database manager Technical analyst None of these An attribute of a relation that references the primary key of another relation is known as the ____ Foreign Key Unique Key Parent key Child key Index key An entity set that does not have sufficient attributes to form a primary key is a strong entity set weak entity set simple entity set primary entity set. None of these The JDBC-ODBC bridge is Three tiered Multithread Best for any platform All of these None of these In a relational database, this is a data structure that organizes the information about a single topic into row and columns. Block Record Tuple Table None of these Which statements about the Java language are true? Java supports both procedural and object-oriented programming Java is only a procedural language. Java is only an Object-Oriented. Java is related to None of the above. Stack is also called ____ First In First Out (LIFO) Last In First Out (FIFO) First In Last Out (FILO) First Come First Served (FCFS) None of the above The index created by primary key column is called _____ Unique Index Composite Index Single Index Primary index None of these In SQL ,which command(s) is(are) used to remove rows from a table. Delete Remove Truncate Both and (3) None of the above In SQL, the CREATE TABLE is used To create a table, defining its columns, integrity constraints, and storage allocation To add a column/integrity constraint to a table. To redefine a column To change a table’s storage characteristics All of the above What is the abbreviation is used for a software package that permits the user to create , retrieve and maintain records in a database? DASD CRMD DBMS All of these None of the above Choose the right sequence of virus stages - Triggering, Damage ,Dormancy, propagation Damage, Triggering ,Dormancy, propagation Damage, Triggering, propagation ,Dormancy Triggering, Damage, propagation, Dormancy Dormancy, Propagation,. Triggering, Damage In SQL, which command is used to add new rows to a table? Alter Table Add row Insert Append None of the Above |
6th August 2014 03:53 PM | |
Unregistered | State Bank of India Specialist Officer previous year question papers Will you please share with me the State Bank of India Specialist Officer previous year question papers? |