9789389573282 Flipbook PDF


29 downloads 98 Views 3MB Size

Recommend Stories


Porque. PDF Created with deskpdf PDF Writer - Trial ::
Porque tu hogar empieza desde adentro. www.avilainteriores.com PDF Created with deskPDF PDF Writer - Trial :: http://www.docudesk.com Avila Interi

EMPRESAS HEADHUNTERS CHILE PDF
Get Instant Access to eBook Empresas Headhunters Chile PDF at Our Huge Library EMPRESAS HEADHUNTERS CHILE PDF ==> Download: EMPRESAS HEADHUNTERS CHIL

Story Transcript

CL MEDIA (P) LTD. Edition : 2019 © PU BLI SH ER

Administrative and Production Offices

No part of this book may be reproduced in a retrieval system or tr ansmitt ed, in any form or by any means, electronics, mechani cal , phot ocopyi ng, r ecor ding, scanni ng and or without t he writ ten permission of the publisher.

Published by : CL Media (P) Ltd. A-45, Mohan Cooperative Industrial Area, Near Mohan Estate Metro Station, New Delhi - 110044 M arketed by : G.K. Publications (P) Ltd.

I SBN

: 978-93-89573-28-2

Typeset by : CL M edia DTP Unit

A-45, Mohan Cooperative Industrial Area, Near Mohan Estate Metro Station, New Delhi - 110044

For product information : I SBN -93-87444-84-3 Visit www.gkpublications.com or email to [email protected]

Contents •

I BPS - Specialist Officer (I T) Scale-I Paper-2018 (27-01-2019)

1– 6



I BPS - Specialist Officer (I T) Scale-I Paper-2017 (28-01-2018)

1– 5



SBI - Specialist Officer (I T) Paper-2017 (25-02-2018)

1– 6



I BPS - Specialist Officer (I T) Scale-I Paper-2016 (28-01-2017)

1– 4



SBI - Specialist Officer (I T) Paper-2016 (22-01-2017)

1– 4

1. Overview of Computer System and Data Processing 1.1 – 1.4

9. M icroprocessor

9.1 – 9.12



Exer ci se-I

9.1



Exer ci se-I

1.1



Exer ci se-I I

9.6



Exer ci se-I I

1.2



An swer s



An swer s

1.4

2. I ntroduction to Computers

2.1 – 2.6

10. M emory Organisation

9.12

10.1 – 10.12



Exer ci se-I

10.1



Exer ci se-I

2.1



Exer ci se-I I

10.6



Exer ci se-I I

2.3



An swer s



An swer s

2.6

3. Evolution of Computers

3.1 – 3.8

11. I nput and Output System

10.12

11.1 – 11.6



Exer ci se-I

11.1



Exer ci se-I

3.1



Exer ci se-I I

11.5



Exer ci se-I I

3.5



An swer s

11.6



An swer s

3.8

4. Digital Logic Families

4.1 – 4.8

12. System Programming

12.1 – 12.8



Exer ci se-I

12.1



Exer ci se-I

4.1



Exer ci se-I I

12.5



Exer ci se-I I

4.5



An swer s

12.8



An swer s

4.8

5. N umber System and Arithmetic

5.1 – 5.14

13. Data Structure and Algorithm

13.1 – 13.16



Exer ci se-I

13.1



Exer ci se-I

5.1



Exer ci se-I I

13.10



Exer ci se-I I

5.7



An swer s

13.16



An swer s

6. Boolean Algebra and Logic Gates

5.12

6.1 – 6.18

14. Database M anagement System 14.1 – 14.34 –

Exer ci se-I

14.1



Exer ci se-I

6.1



Exer ci se-I I

14.11



Exer ci se-I I

6.7



An swer s

14.25



An swer s

7. Combinational Logic Design

6.13

7.1 – 7.22

15. Principle of Compiler Construction 15.1 – 15.20



Exer ci se-I

7.1



Exer ci se-I



Exer ci se-I I

7.10



Exer ci se-I I

7.18



An swer s



An swer s

8. Computer System

8.1 – 8.12

16. Operating System



Exer ci se-I

8.1



Exer ci se-I



Exer ci se-I I

8.6



Exer ci se-I I

8.12



An swer s



An swer s

15.1 15.8 15.17

16.1 – 16.10 16.1 16.6 16.10

17. Process, Scheduling, Deadlocks and I nter Process Communication 17.1 – 17.6

26. Statistical Techniques in Computer Science 26.1 – 26.10



Exer ci se-I

17.1



Exer ci se-I

26.1



Exer ci se-I I

17.4



Exer ci se-I I

26.4



An swer s

17.6



An swer s

18. File System

18.1 – 18.6

27. System Analysis and Design

26.10

27.1 – 27.16



Exer ci se-I

18.1



Exer ci se-I

27.1



Exer ci se-I I

18.4



Exer ci se-I I

27.8



An swer s

18.6



An swer s

19. M emory M anagement

19.1 – 19.10

28. Programming Languages

27.16

28.1 – 28.12



Exer ci se-I

19.1



Exer ci se-I

28.1



Exer ci se-I I

19.5



Exer ci se-I I

28.7



An swer s

19.10



An swer s

20. Security, Protection, System Performance 20.1 – 20.8 –

Exer ci se-I

20.1



Exer ci se-I I

20.5



An swer s

20.8

21. Computer Communication

21.1 – 21.18



Exer ci se-I

21.1



Exer ci se-I I

21.9



An swer s

22. Computer N etwork

21.17

22.1 – 22.24



Exer ci se-I

22.1



Exer ci se-I I

22.11



An swer s

22.22

23. Language Theory and Automata 23.1 – 23.12 –

Exer ci se-I

23.1



Exer ci se-I I

23.5



An swer s

24. Graph Theory

23.12

24.1 – 24.6



Exer ci se-I

24.1



Exer ci se-I I

24.3



An swer s

24.6

25. Discrete Structures

25.1 – 25.6

28.12

29. Software Engineering and Program Development 29.1 – 29.14 –

Exer ci se-I

29.1



Exer ci se-I I

29.6



An swer s

29.13

30. Object Oriented Programming and C ++ 30.1 – 30.10 –

Exer ci se-I

30.1



Exer ci se-I I

30.6



An swer s

31. Word Processing

30.10

31.1 – 31.6



Exer ci se-I

31.1



Exer ci se-I I

31.3



An swer s

31.6

32. ‘C’ Programming

32.1 – 32.22



Exer ci se-I

32.1



Exer ci se-I I

32.13



An swer s

32.22

33. M athematical Foundation of Computer Science 33.1 – 33.4 –

Exer ci se-I

33.1



Exer ci se-I I

33.2



An swer s

33.4

34. Spreadsheet Software

34.1 – 34.8



Exer ci se-I

25.1



Exer ci se-I

34.1



Exer ci se-I I

25.4



Exer ci se-I I

34.4



An swer s

25.6



An swer s

34.8

35. Application Software

35.1 – 35.6

39. Program Logic

39.1 – 39.8



Exer ci se-I

35.1



Exer ci se-I

39.1



Exer ci se-I I

35.3



Exer ci se-I I

39.4



An swer s

35.6



An swer s

39.8

36. I ndustrial Application and Automation Systems 36.1 – 36.12

40. Java

40.1 – 40.6



Exer ci se-I

40.1



Exer ci se-I

36.1



Exer ci se-I I

40.3



Exer ci se-I I

36.7



An swer s

40.6



An swer s

37. M anagement I nformation System

36.12

37.1 – 37.8



Exer ci se-I

37.1



Exer ci se-I I

37.4



An swer s

37.8

38. Computer Graphics

38.1 – 38.6



Exer ci se-I

38.1



Exer ci se-I I

38.4



An swer s

38.6

41. I nformation Systems

41.1 – 41.18



Exer ci se-I

41.1



Exer ci se-I I

41.9



An swer s

42. Software Engineering

41.18

42.1 – 42.6



Exer ci se-I

42.1



Exer ci se-I I

42.5



An swer s

42.6

43. WEB Technology

43.1 – 43.4



Exer ci se-I

43.1



Exer ci se-I I

43.3



An swer s

43.4

PAPERS

PAPER - 2018 I BPS - SPECI ALI ST OFFI CER (I T) SCALE-I (H ELD ON - 27-01-2019)

1. Microprocessor 8085 is the enhanced version of the following, having essentially the same construction set.

7. Data security threats include (1) Hardware Failure (2) Privacy Invasion

(1) 6800

(2) 8080

(3) Fraudulent Manipulation of Data

(3) 6800A

(4) 8000

(4) All of (1), (2) and (3)

(5) All of these

(5) None of these

2. Multiplexer means

8. Local variables ___

(1) one into many

(2) many into one

(1) are created outside a block

(3) many into many

(4) All of (1), (2) and (3)

(2) are known only to that block

(5) None of these

(3) continue to exist when their block ends

3. Which gate is known as universal gate? (1) NOT

(2) NAND

(3) AND

(4) XOR

(5) None of the above 4. EEPROMstands for (1) Extended Erasable and Packtable Read Only Memory (2) Electrically Erasable and Packtable Read Only Memory

(4) are illegal in C++ (5) None of these 9. What is the built in library function to adjust the allocated dynamic memory size. (1) malloc

(2) realloc

(3) calloc

(4) resize

(5) free 10. End-to-end delivery of data is performed by which of the following layer of OSI Model?

(3) Electrically Erasable and Programmable Read Only Memory

(1) Physical

(2) Transport

(3) Data Link

(4) Network

(4) Electonically Erasable and Programmable Read Only Memory

(5) Session

(5) Electrically Erasable and Programmable Read Only Memory 5. Which IEEE standard is used for Wi/Fi system? (1) 802.11 (3) 802.2

(2) 802.1 (4) 802.3

(5) 802.10 6. An Indexing Operation (1) Sorts file using a single key (2) Sorts file using two keys (3) Establishes an index for a file (4) Both (1) and (3) (5) None of these

11. The char(n) is a _____ length and varchar(n) is _____ length character data type. (1) fixed, equal

(2) fixed, variable

(3) equal, variable

(4) variable, equal

(5) variable, fixed 12. Which of the following is not an assignment operator in C programming? (1) %=

(2) !=

(3) *=

(4) +=

(5) = 13. A hierarchical database organizes data in a (n)__ (1) flat file

(2) tuple

(3) OODBMS

(4) relational file

(5) tree like structure

PAPER - 2018 (HELD ON - 27-01-2019)

2

14. Bookmarks can be organized by using___. (1) Containers

(2) Folders

(3) Menus

(4) Tables

(5) Structures 15. Modem is a ______ that modulates and demodulate signals (1) DCE (Data circuit-terminating equipment)

23. In Relational Schema, each tuple is divided into fields called ________. (1) Relations

(2) Domains

(3) Queries

(4) Both (1) and (2)

(5) None of these 24. The payment processing system offered by Google is

(2) DTE (Data terminal equipment)

(1) PayU

(2) CitrusPay

(3) DTE-DCE

(3) Checkout

(4) CCAvenue

(4) Either (1) or (2)

(5) None of these

(5) None of these 16. Class B default subnet mask is

25. An attribute of one table matching the primary key of another table, is called as

(1) 255.0.0.0

(2) 255.0.1.0

(1) Foreign key

(2) Secondary key

(3) 255.255.1.0

(4) 255.255.0.0

(3) Candidate key

(4) Composite key

(5) 255.255.255.0

(5) None of these

17. Which of the following is an example of a client-server model? (1) FTP

(2) DNS

(3) TELNET

(4) All of these

(5) None of these

26. In a list of length n, the average number of key comparisons done in a successful sequential search is ________. (1) log n

(2)

n 1 2

n 2

(4)

n 1 2

18. Encryption/decryption provides a networks with ___. (1) Privacy

(2) Authenticity

(3) Integrity

(4) Non-repudiation

(5) None of these

(3)

(5) None of these

19. Print server uses _____ which is a buffer that holds before it is send to the printer.

27. The order of the binary search algorithm is (1) n

(2) n2 (4) log(n)

(1) Queue

(2) Spool

(3) nlog(n)

(3) Node

(4) Stack

(5) None of these

(5) None of these 20. Communication handler is basically an ____ 16 bit micro controller? (1) 8085

(2) 8086

(3) 8086A

(4) 80C186

(5) None of these 21. Which of the following interrupts has the lowest priority in 8085 microprocessor? (1) RST 5.5

(2) RST 7.5

(3) TRAP

(4) INTR

(5) None of these 22. Which of the following is the first integrated logic family? (1) TCL

(2) TTL

(3) DTL

(4) MOS

(5) RTL

28. In the OSI model, encryption and decryption are functions of the ____ layer. (1) Transport

(2) Session

(3) Application

(4) Physical

(5) Presentation 29. DARPANet stands for (1) Digital Advanced Research Programme Agency Network (2) Defense Advanced Research Project Agency Network (3) Defense Advanced Research Programme Address Networking (4) Digital Advanced Research Project Administrator Network (5) Defense Advanced Research Programme Administrator Networking

PAPER - 2018 (HELD ON - 27-01-2019)

3

30. In SQL, which command is used to change a data in a data table?

37. Which of the following uses the greatest number of layers in the OSI model?

(1) UPDATE

(2) INSERT

(1) Bridge

(2) Gateway

(3) BROWSE

(4) APPEND

(3) Repeater

(4) Router

(5) None of these

(5) None of these

31. Which of the following is not a standard predefined macros in C++? (1) __LINE__

(2) __FILE__

(3) __DATE__

(4) __CHAR__

(5) __TIME__ 32. Which command(s) is/are used to redefine a column of the table in SQL? (1) ALTER TABLE

(2) DEFINE TABLE

(3) MODIFY TABLE

(4) All (1), (2) and (3)

38. _____ refers to a family of IEEE standards dealing with Local Area Network and Metropolitan area Network. (1) 802

(2) 800

(3) 801

(4) 803

(5) None of these 39. Which of the following is not true for Spiral Model of SDLC? (I) It is suitable for smaller projects. (II) It has high level of risk analysis.

(5) None of these 33. Given below is a binary search tree. In-order traversal of this tree is

(III) It gives strong approval and documentation control. (IV)Additional Functionality can be added to it at a later date.

A

B

(1) Only (I) and (IV)

(2) Only (I)

(3) Only (II)

(4) Only (I) and (III)

(5) Only (IV)

C

40. CRM uses information about to establish long-term relationships with D

E

F

G

(1) A B D E C F G

(2) D E B F G C A

(3) D B E A F C G

(4) D B E F C G A

(5) A B C D E F G 34. Through Linked List one can implement -

(1) industry contacts

(2) Customers

(3) Competition

(4) Countries

(5) Culture 41. The address changes temporarily as the applications connect to the Internet. (1) Static IP address

(1) Stack

(2) Graph

(2) Unique IP address

(3) Queue

(4) All of (1), (2) and (3)

(3) Dynamic IP address

(5) None of these

(4) Common name and number

35. A heap allows a very efficient implementation of a (1) Doubled Ended Queue(2) Priority Queue (3) Stack

(4) Trees

(5) None of these 36. The ___ remains operative until the software is retired.

(5) Derived IP address 42. The testing process in which programming code is checked is called (I) Black box testing (II) White box testing

(1) Waterfall Model

(III) Green box testing

(2) Incremental Model

(IV)Glass box

(3) Spiral Model

(1) Only (I) and (IV)

(2) Only (II) and (IV)

(4) Prototyping Model

(3) Only (I)

(4) Only (II) and (III)

(5) None of these

(5) Only (II)

PAPER - 2018 (HELD ON - 27-01-2019)

4

43. Select the correct statement: (I) Shortest remaining time first scheduling is a preemptive version of shortest job scheduling.

49. MPEG is a well known formate for audio and video streaming. MPEG stands for (1) Multiple Picture Experts Group

(II) Preemption may cause starvation.

(2) Music and Picture Encoding Group

(III) Process level thread cannot be scheduled by the kernel.

(3) Moving Picture Experts Group

(1) Only (I)

(2) Only (I) and (II)

(3) Only (II)

(4) Only (I) and (III)

(5) All 44. A communication network which is used by large organizations over regional, national or global area is called-

(5) Music and Picture Experts Group 50. Which type of computers use the 8 bit code called EBCDIC? (1) Minicomputers

(2) Mainframe computers

(3) Super computers

(4) Microcomputer

(5) None of these

(1) LAN (2) WAN

(4) Moving Picture Encoding Group

(3) MAN

(4) Internet(5) None of these 45. End to end connectivity is provided from host to host in: (1) Network layer

(2) Session layer

(3) Data link layer

(4) Transport layer

51. From a given tautology, another tautology can be derived by interchanging. (1) 0 and 1

(2) And and OR

(3) 0 and 1: AND and OR(4) Impossible to derive (5) high and low 52. A bottom-up parser generates (1) right-most derivation

(5) None of these 46. Which of the following TCP/IP protocol is used for transferring electronic mail messages from one machine to another? (1) SNMP

(2) SMTP

(3) RPC

(4) FTP

(5) None of these 47. _____ is the continuous ability to send and receive data between interconnected networks.

(2) right-most derivation in reverse (3) left most derivation (4) left- most derivation in reverse (5) both 1 and 3 possible 53. SIMD stands for .... (1) Single Instruction Multiple Data (2) Single Instruction Minimum Data

(1) FTP

(3) Simple Instruction Multiple Data

(2) SMTP

(4) Single Instruction Media Data

(3) TNS

(5) Single Instruction Maximum Data

(4) Network Interoperability (5) None of these 48. How one can select all the records from a table named "Persons" where the value of the column "FirstName" starts with an "mk"? (1) SELECT * FROM Persons WHERE FirstName = '%mk%' (2) SELECT * FROM Persons WHERE FirstName = 'mk#' (3) SELECT * FROM Persons WHERE FirstName LIKE 'mk%' (4) SELECT * FROM Persons WHERE FirstName LIKE '%mk' (5) SELECT * FROM Persons WHERE FirstName START WITH '%mk'

54. Which of the following property will check whether all the operation of a transaction completed or none? (1) Consistency

(2) Isolation

(3) Durability

(4) Atomicity

(5) All of the above 55. Which of the following is not comparison operator? (1) =<

(2)

(3) <

(4) >=

(5)

Get in touch

Social

© Copyright 2013 - 2024 MYDOKUMENT.COM - All rights reserved.