23
Engistan.com Professional Knowledge Questions for IBPS CWE(IT-Officer) [ ] Professional Knowledge Questions Q.1. In SQL, which command is used to change data in a data table? A. UPDATE B. INSERT C. BROWSE D. APPEND E. None of these Q.2. Local variables A. Are created outside a block B. Are known only to that block C. Continue to exist when their block ends D. Are illegal in C++ E. None of these Q.3. This ___ data mining technique derives rules from real world case examples. A. Waterfall model B. RAD C. White Box D. Spiral model E. Case based reasoning Q.4. Rows of a relation are called: A. Relation B. Tuples C. Data structure D. An entity E. None of these Q.5. Which layer of OSI determines the interface of the system with the user? A. Network B. Application C. Data link D. Session E. None of these Q.6. Aggregation is a special form of A. Generalization B. Specialization C. Association D. Object E. None of these Q.7. Which of the following is a universal gate? A. AND B. OR C. EXOR D. NAND E. None of these Q.8. A collection of fields is called a record with respect of DBMS, a record corresponds to A. Tuple B. Relation C. File D. Attribute E. None of these. Q.9. Multiplexer means Engistan.com | Engineer’s Community 1

Professional Knowledge for IBPS

Embed Size (px)

Citation preview

  • Engistan.com Professional Knowledge Questions for IBPS CWE(IT-Officer)[ ]

    Professional Knowledge Questions

    Q.1. In SQL, which command is used to change data in a data table?

    A. UPDATE B. INSERT C. BROWSE

    D. APPEND E. None of these

    Q.2. Local variables

    A. Are created outside a block B. Are known only to that block

    C. Continue to exist when their block ends D. Are illegal in C++

    E. None of these

    Q.3. This ___ data mining technique derives rules from real world case examples.

    A. Waterfall model B. RAD C. White Box

    D. Spiral model E. Case based reasoning

    Q.4. Rows of a relation are called:

    A. Relation B. Tuples C. Data structure

    D. An entity E. None of these

    Q.5. Which layer of OSI determines the interface of the system with the user?

    A. Network B. Application C. Data link

    D. Session E. None of these

    Q.6. Aggregation is a special form of

    A. Generalization B. Specialization C. Association

    D. Object E. None of these

    Q.7. Which of the following is a universal gate?

    A. AND B. OR C. EXOR

    D. NAND E. None of these

    Q.8. A collection of fields is called a record with respect of DBMS, a record corresponds to

    A. Tuple B. Relation C. File

    D. Attribute E. None of these.

    Q.9. Multiplexer means

    Engistan.com | Engineers Community

    1

  • Engistan.com Professional Knowledge Questions for IBPS CWE(IT-Officer)[ ] A. One into many B. Many into one C. Many into many

    D. All of these E. None of these

    Q.10. Each node in a linked list must contain at least:

    A. Three fields B. Five fields C. Four fields

    D. One fields E. Two fields

    Q.11. OSI model consists of ____ layers

    A. Three B. Five C. Six

    D. Eight E. Seven

    Q.12. Encryption and decryption are functions of the ____ layer.

    A. Transport B. Session C. Application

    D. Physical E. Presentation

    Q.13. Which of the following is not a connecting device?

    A. Bridge B. Trans receiver C. Router

    D. Repeater E. None of these

    Q.14. OLAP stands for

    A. Online Analytical project B. Online Analytical problem

    C. Online Application process D. Online Application Problem

    E. Online Analytical processing

    Q.15. The term push and pop is related to the

    A. Array B. Lists C. Stacks

    D. All of the above E. None of these

    Q.16. Pointer is used in

    A. Direct Addressing (address filed contain address of operand)

    B. Indirect Addressing (address filed contain address of memory filed where operand is present)

    C. Indexed mode (EA is generated by adding an index)

    D. Immediate Addressing (address filed contain operand)

    E. None of these

    Engistan.com | Engineers Community

    2

  • Engistan.com Professional Knowledge Questions for IBPS CWE(IT-Officer)[ ] Q.17. HTTP refers to

    A. Hyper Text Transmission Protocol B. Hyper Text Transfer Protocol

    C. Hyper Text Tie Protocol D. Hyper Text Total Protocol

    E. None of these

    Q.18. An email account includes a storage area, often called a (n)

    A. Attachment B. Hyperlink C. Mailbox

    D. Ip address E. None of these

    Q.19. To print a document

    A. Select the print command and then select OK

    B. Select the Ready printer and then select OK

    C. Type PRINT and then press Enter

    D. Close the document, select the print command then select OK

    E. None of these

    Q.20. Which part of the computer provides only temporary storage of files?

    A. ROM memory B. Processor C. Hard drive

    D. Mother board E. RAM memory

    Q.21. Which normal form is considered adequate for relational database design?

    A. 2 NF B. 3 NF C. 4 NF

    D. BCNF E. None of these

    Q.22. Which of the following SQL commands can be used modify existing data in a database table?

    A. MODIFY B. UPDATE C. CHANGE

    D. NEW E. None of these

    Q.23. A special type gateway that can keep external users from accessing resources on the LAN users access the external info is called:

    A. Repeater B. Firewall C. Encryption

    D. Hub E. None of these

    Q.24. Which command(s) is (are) used to redefine a column of the table in SQL?

    A. ALTER TABLE B. DEFINE TABLE C. MODIFY TABLE

    Engistan.com | Engineers Community

    3

  • Engistan.com Professional Knowledge Questions for IBPS CWE(IT-Officer)[ ] D. ALL of these E. None of these

    Q.25. The order of the binary search algorithm is

    A. n B. n2 C. nlog(n)

    D. log(n) E. None of these

    Q.26. The break statement causes an exit.

    A. From the innermost loop only B. Only from the innermost switch

    C. From the loops and switches D. From the innermost loop or switch

    E. None of these

    Q.27. Backup procedure helps in

    A. Restoring the operation whenever there is a disk failure

    B. Restoring both application and system software whenever there is disk corruption

    C. Restoring the data sites whenever there is a system crash

    D. All of the above

    E. None of these

    Q.28. In SQL, which of the following is not a data definition language command?

    A. RENAME B. REVOKE C. GRANT

    D. UPDATE E. None of these

    Q.29. In a relational schema, each tuple is divided into fields called

    A. Relations B. Domains C. Queries

    D. All of these E. None of these

    Q.30. Data security threats include

    A. Hardware failure B. Privacy invasion

    C. Fraudulent manipulation of data D. All of these

    E. None of these

    Q.31. The language used in application programs to request data from the DBMS is referred to as the

    A. DML B. DDL C. Query language

    D. DCL E. None of these

    Engistan.com | Engineers Community

    4

  • Engistan.com Professional Knowledge Questions for IBPS CWE(IT-Officer)[ ] Q.32. Through linked list one can implement

    A. Stack B. Graph C. Queue

    D. All of these E. None of these

    Q.33. A heap allows a very efficient implementation of a

    A. Doubled ended queue B. Priority queue C. Stack

    D. Trees E. None of these

    Q.34. Which of the following microprocessors is not 8bit microprocessor?

    A. 8085 B. 6502 C. Z80

    D. 68000 E. None of these

    Q.35. The modify operation is likely to be done after

    A. Delete B. Insert C. Look up

    D. All of the above E. None of these

    Q.36. Which two files are used during operation of the DMBS?

    A. Query language and utilities

    B. Data manipulation language and query language:

    C. Data dictionary and transaction log

    D. Data dictionary and query language

    E. None of these

    Q.37. Which of the following is useful in implementing quick sort?

    A. Stack B. Set C. List

    D. Queue E. None of these

    Q.38. The drawbacks of the binary tree sort are remedied by the

    A. Linear sort B. Quick Sort C. Heap Sort

    D. Insertion Sort E. None of these

    Q.39. A top to bottom relationship among the items in a database is established by a

    A. Hierarchical Schema B. Network Schema

    C. Relational Schema D. All of the above

    Engistan.com | Engineers Community

    5

  • Engistan.com Professional Knowledge Questions for IBPS CWE(IT-Officer)[ ] E. None of these

    Q.40. If you want to organize a file in multiple ways, it is better to _____ the data rather than to sort it.

    A. Delete B. Update C. Sort Key

    D. Index E. None of the above

    Q.41. One approach to standardizing storing of data

    A. MIS B. Structured programming

    C. CODASYL specifications D. All of the above

    E. None of the above

    Q.42. What software packages are commonly used for businesses that have to track extensive lists of clients and inventory?

    A. Special purpose packages B. Custom made programs

    C. Single function application packages D. Data management packages

    E. None of the above

    Q.43. In a _____ a parent record type can be linked to one or more "child" record types, but a child record type can have only one parent.

    A. Network database B. Relational database

    C. Distributed database D. Hierarchical database

    E. None of the above

    Q.44. A network schema

    A. restricts the structure to a one-to-many relationship

    B. permits many-to-many relationships

    C. stores data in tables

    D. All of the above

    E. None of the above

    Q.45. A scheme describes

    A. data elements B. records and files

    C. record relationships D. All of the above

    Engistan.com | Engineers Community

    6

  • Engistan.com Professional Knowledge Questions for IBPS CWE(IT-Officer)[ ] E. None of the above

    Q.46. A report form

    A. appears on the computer monitor during data entry

    B. is used during report generation to format data

    C. both (a) and (b)

    D. All of the above

    E. None of the above

    Q.47. A multiple-form file management system

    A. lets you define different forms for different operations

    B. lets you create a look-up form with an associated read-only password to prevent access by unauthorized users

    C. both (a) and (b)

    D. allow you to entry data in all the forms

    E. None of the above

    Q.48. Embedded pointer provide

    A. a secondary access path

    B. a physical record key

    C. an inverted index

    D. All of the above

    E. None of the above

    Q.49. Versatile report generators can provide

    A. Columnar totals B. Subtotals C. Calculations

    D. All of the above E. None of the above

    Q.50. In SQL, the _____ command is used to recompile a view

    A. COMPILE VIEW B. DEFINE VIEW C. CREATE VIEW

    D. ALTER VIEW E. None of these

    Q.51. A list in alphabetical order

    A. is in descending order

    Engistan.com | Engineers Community

    7

  • Engistan.com Professional Knowledge Questions for IBPS CWE(IT-Officer)[ ] B. is in ascending order

    C. is the result of a sort operation

    D. both (b) and (c)

    E. None of the above

    Q.52. If a piece of data is stored in two places in the database, then

    A. storage space is wasted

    B. changing the data is one spot will cause data inconsistency

    C. it can be more easily accessed

    D. both (a) and (b)

    E. None of the above

    Q.53. A file that is organized in uniform format is formally referred to as a _____ or a database file.

    A. Document

    B. Database

    C. Record

    D. Structured data file

    E. None of the above

    Q.54. In SQL, the CREATE TABLE is used

    A. to create a table, defining its columns, integrity constrains, and storage allocation

    B. to add a column/integrity constraint to a table

    C. to redefine a column

    D. to change a table's storage characteristics

    E. All of the above

    Q.55. Batch processing is appropriate if

    A. a large computer system is available

    B. only a small computer system is available

    C. only a few transactions are involved

    D. All of the above

    Engistan.com | Engineers Community

    8

  • Engistan.com Professional Knowledge Questions for IBPS CWE(IT-Officer)[ ] E. None of the above

    Q.56. Which of the following is not an advantage of the data-base approach?

    A. elimination of the data redundancy

    B. ability to associate related data

    C. increased security

    D. program/data independence

    E. All of the above are advantages

    Q.57. A data dictionary doesn't provide information about:

    A. where data is located

    B. the size of the disk storage device

    C. It allows a many-to-many relationship

    D. It is conceptually simple

    E. It will be the dominant data base of the future

    Q.58. ________ refers to a family of IEEE standards dealing with local area network and metropolitan area network.

    A. 802 B. 800 C. 801

    D. 803 E. None of these

    Q.59. Which is the general network standard for the data link layer in the OSI Reference Model?

    A. IEEE 802.1 B. IEEE 802.2 C. IEEE 802.3

    D. IEEE 802.4 E. IEEE 802.6

    Q.60. _________ uses a standard called IEEE 802.6.

    A. LAN B. WAN C. MAN

    D. Internet E. None of these

    Q.61. Repeater operates in which layer of OSI model?

    A. Application Layer B. Presentation Layer C. Physical Layer

    D. Transport Layer E. Data link layer

    Q.62. Where does Bridge operate in OSI model?

    A. Physical layer B. Data link layer C. Both 1 and 2

    Engistan.com | Engineers Community

    9

  • Engistan.com Professional Knowledge Questions for IBPS CWE(IT-Officer)[ ] D. Application layer E. None of these

    Q.63. Which of the following uses the greatest number of layers in the OSI model?

    A. Bridge B. Repeater C. Router

    D. Gateway E. None of these

    Q.64. Routers operate in which layer of the OSI model?

    A. Physical layer B. Data link layer C. Network layer

    D. All of these E. None of these

    Q.65. Modem is a _______ that modulates and demodulate signals.

    A. DCE (Data circuit terminating equipment)

    B. DTE(Data terminal equipment)

    C. DTE-DCE

    D. Both 1 and 2

    E. None of these

    Q.66. A communication network which is used by large organization over regional, national or global area is called_______

    A. LAN B. WAN C. MAN

    D. Internet E. None of these

    Q.67. At _______ layer, TCP/IP defines two protocols: Transmission Control Protocol (TCP) and User Datagram Protocol (UDP)

    A. Transport layer B. Network layer C. Physical layer

    D. Application layer E. None of these

    Q.68. End to end connectivity is provided from host to host in:

    A. Network layer B. Session layer C. Data link layer

    D. Transport layer E. None of these

    Q.69. Which of the following TCP/IP protocol is used for transferring electronic mail messages from one machine to another?

    A. SNMP B. SMTP C. RPC

    D. FTP E. None of these

    Q.70. Which of the following is an example of a client server model?

    Engistan.com | Engineers Community

    10

  • Engistan.com Professional Knowledge Questions for IBPS CWE(IT-Officer)[ ] A. FTP B. DNS C. TELNET

    D. All of these E. None of these

    Q.71. Which IEEE standards is used for Wi/Fi system?

    A. 802.11 B. 802.1 C. 802.2

    D. 802.3 E. 802.10

    Q.72. __________ is the continuous ability to send and receive data between interconnected networks

    A. FTP B. SMTP C. TNS

    D. Network Interoperability E. None of these

    Q.73. What is the default subnet mask for a class B network?

    A. 127.0.0.1 B. 255.0.0.0 C. 255.255.0.0

    D. 255.255.255.0 E. None of these

    Q.74. Which of the following is not a relational database?

    A. dBASE IV B. 4th Dimension C. FoxPro

    D. Reflex E. None of the above

    Q.75. Which command is used to remove a table from the database in SQL?

    A. DELETE TABLE B. DROP TABLE C. ERASE TABLE

    D. UNATTACH TABLE E. None of the above

    Q.76. A file produced by a spreadsheet

    A. is generally stored on disk in an ASCII text format

    B. can be used as it by the DBMS

    C. can be used for graphic

    D. All of the above

    E. None of the above

    Q.77. A form defines

    A. where data is placed on the screen

    B. the width of each field

    C. both (a) and (b)

    Engistan.com | Engineers Community

    11

  • Engistan.com Professional Knowledge Questions for IBPS CWE(IT-Officer)[ ] D. All of the above

    E. None of the above

    Q.78. What is loopback address?

    A. 127.0.0.1 B. 255.0.0.0 C. 255.255.0.0

    D. 127.0.0.0 E. None of these

    Q.79. A central computer surrounded by one or more satellite computers is called a

    A. Bus network B. Ring network C. Star network

    D. All the above E. None of these

    Q.80. With an IP address of 100, you currently have 80 subnets. What subnet mask should you use to maximize the number of available hosts?

    A. 192 B. 240 C. 248

    D. 224 E. 252

    Q.81. Print server uses _______ which is a buffer that holds before it is send to the printer.

    A. Queue B. Spool C. Node

    D. Stack E. None of these

    Q.82. In SQL, GRANT command is used to

    A. allow user to access databases

    B. allow user to create databases

    C. grant system privileges, roles, and object privileges to uses and roles

    D. choose auditing for specific SQL commands

    E. None of the above

    Q.83. Which of the following identifies specific web page and its computer on the web page?

    A. Website B. URL C. Web site address

    D. Domain Name E. None of these

    Q.84. __________ is the computer to computer exchange of routine business data between trading partners in standard data formats.

    A. CTS B. DSR C. VDR

    D. EDI E. None of these

    Engistan.com | Engineers Community

    12

  • Engistan.com Professional Knowledge Questions for IBPS CWE(IT-Officer)[ ] Q.85. The highest level in the hierarchy of data organization is called

    A. data bank B. database C. data file

    D. data record E. None of the above

    Q.86. Communication handler is basically an _______ 16 bit micro controller?

    A. 8085 B. 8086 C. 8086A

    D. 80C186 E. None of these

    Q.87. The logical data structure with a one-to-many relationship is a:

    A. network B. tree C. chain

    D. relational E. None of the above

    Q.88. Updating a database means

    A. revising the file structure

    B. reorganizing the database

    C. modifying or adding record occurrences

    D. All of the above

    E. None of the above

    Q.89. Which uses a pre-shared key that is more than 7 and less than 64 characters in length?

    A. WPA-PSK B. TKIP C. AES

    D. All the above E. None of these

    Q.90. When you have finished entering information into a form

    A. the template is written to the data file

    B. the contents of the form are written to the data file

    C. the contents of the form can be printed

    D. All of the above

    E. None of the above

    Q.91. A list consists of last names, first names, addresses, and pin codes if all people in the list have the same last and the same pin code, a useful key would be

    A. the pin code

    B. the last name

    Engistan.com | Engineers Community

    13

  • Engistan.com Professional Knowledge Questions for IBPS CWE(IT-Officer)[ ] C. a compound key consisting of the first name and the last name

    D. All of the above

    E. None of the above

    Q.92. If you want to group the records in the abc database, you could use the Jobcode as the

    _____.

    A. Delete B. Update C. Sort Key

    D. Index E. None of the above

    Q.93. Full adder is used to ______

    A. 2 bit addition B. 3 bit addition C. 4 bit addition

    D. 6 bit addition E. None of these

    Q.94. Most important advantages of an IC is its __________

    A. Easy replacement in case of circuit failure

    B. Low power consumption

    C. Extremely high reliability

    D. Reduced cost

    E. None of these

    Q.95. An IC contains 50 gates each of which consists of 6 components/ Its belong to

    A. VLSI B. LSI C. MSI

    D. SSI E. None of these

    Q.96. Which type of computers use the 8 bit code called EBCDIC?

    A. Mini computers B. Mainframe computers C. Super computers

    D. Micro computer E. None of these

    Q.97. An AND gate

    A. Implement logic addition

    B. Is equivalent to a series switching circuit

    C. Is any-or all gate

    D. Is equivalent to a parallel switching circuit

    Engistan.com | Engineers Community

    14

  • Engistan.com Professional Knowledge Questions for IBPS CWE(IT-Officer)[ ] E. None of these

    Q.98. The Management Information system (MIS) structure with one main computer system is called

    A. hierarchical MIS structure

    B. distributed MIS structure

    C. centralized MIS structure

    D. decentralized MIS structure

    E. None of the above

    Q.99. The decimal equivalent of the binary number 11100001111 is

    A. 1806 B. 1807 C. 2806

    D. All the above E. None of these

    Q.100. Which are not used in case of applet?

    A. Read/write B. Internet C. Search engine

    D. All the above E. None of these

    Q.101. After you _____ a record, many data management the environments require you to issue a command to save the changes you made.

    A. Delete B. Update C. Sort key

    D. Index E. None of the above

    Q.102. Data item characteristics that are important in data management include

    A. punctuation B. language C. spelling

    D. width E. None of the above

    Q.103. A locked file can be

    A. accessed by only one user

    B. modified by users with the correct password

    C. is used to hide sensitive information

    D. both (b) and (c)

    E. None of the above

    Q.104. In SQL, which command is used to make permanent changes made by statements issue since the beginning of a transaction?

    Engistan.com | Engineers Community

    15

  • Engistan.com Professional Knowledge Questions for IBPS CWE(IT-Officer)[ ] A. ZIP B. PACK C. COMMIT

    D. SAVE E. None of the above

    Q.105. If the _______ bit in X.25 standard is to 1. It means that there is more than one packet.

    A. Q B. D C. M

    D. J E. None of these

    Q.106. Dos and windows 3.x support file names upto______charecters in length

    A. Two B. Four C. Six

    D. Eight E. None of these

    Q.107. What is the name given to the exchange of control signals which is necessary for establishing a connection between a modem and a computer at one end of a line and another modem and computer at the other end?

    A. Handshaking B. Modem options C. Protocol

    D. All of these E. None of these

    Q.108. A ___ contains the smallest unit of meaningful data, so you might call it the basic building block for a data file.

    A. File structures B. Records C. Fields

    D. Database E. None of these

    Q.109. A ___ means that one record in a particular record type is related to only one record of another record type.

    A. One to one relationship B. One to many relationship

    C. Many to one relationship D. Many to many relationship

    E. None of these

    Q.110. In files, there is a key associated with each record which is used to differentiate among different records. For every file there is at least one set of keys that is unique. Such a Key is called

    A. Unique key B. Prime attribute C. Index key

    D. Primary Key E. Null key

    Q.111. ____ is primarily used for mapping host names and email destinations to IP address but can also be used for other purposes.

    A. TCP(Transfer control protocol) B. DNS(Domain Name System)

    C. SHA (Secure Hash Algorithm) D. Simple Network Management Protocol (SNMP)

    Engistan.com | Engineers Community

    16

  • Engistan.com Professional Knowledge Questions for IBPS CWE(IT-Officer)[ ] E. None of these

    Q.112. Override is a method

    A. For an operation that replaces an inherited method for the same operation

    B. For a data that replaces an inherited method for the same operation

    C. For an operation that takes arguments form library function

    D. All of these

    E. None of these

    Q.113. ____ is virus that inserts itself into a systems memory. Then it takes number of actions when an infected file is executed.

    A. Web scripting virus B. Polymorphic virus

    C. Macro virus D. Boot sector virus

    E. Resident virus

    Q.114. The ___ remains operative until the software is required.

    A. Waterfall model B. Incremental model

    C. Spiral model D. Prototyping model

    E. Incremental model

    Q.115. Data mining evolve as a mechanism to cater the limitations of ___ systems to deal massive data sets with high dimensionality, new data type, multiple heterogeneous data resource etc.

    A. OLTP B. OLAP C. DSS

    D. DWH E. None of these

    Q.116. An important application of cryptography, used in computerized commercial and financial transaction

    A. Data mining B. Data warehousing

    C. Digital signature D. Media convergence

    E. None of these

    Q.117. An indexing operation

    A. Sorts a file using a single key B. Sorts file using two keys

    C. Establishes an index for a file D. Both (1) and (3)

    E. None of these

    Engistan.com | Engineers Community

    17

  • Engistan.com Professional Knowledge Questions for IBPS CWE(IT-Officer)[ ] Q.118. A computer system consisting of its processor, memory and I/O devices accepts data, processes it and produces the output results .Can you tell in which component is the raw data fed?

    A. Mass Memory B. Main Memory

    C. Logic Unit D. Arithmetic unit

    E. None of these

    Q.119. You are in the process of analyzing a problem that requires you to collect and store TCP/ IP Packets. Which of the following utilities is best suited for this purpose?

    A. NBTSTAT B. Performance Monitor C. NETSTAT

    D. Network Monitor E. DHCP Management Console

    Q.120. Which of the following system program forgoes the production of object code to generate absolute machine code and load it into the physical main storage location from which it will be executed immediately upon completion of the assembly?

    A. Two pass assembler B. Load and go assembler

    C. Macro processor D. Compiler

    E. None of these

    Q.121. From what location are the 1st computer instructions available on boot up?

    A. ROM BIOS B. CPU C. Boot.ini

    D. CONFIG.SYS E. None of these

    Q.122. Abstraction is

    A. The act of representing the essential features of something without including much detail.

    B. The act of representing the features of something much detail

    C. A tree structure

    D. All of these

    E. None of these

    Q.123. Consider an operation of addition. For two numbers, the operating will generate a sum. If the operand are strings, and the same operation would produce a third string by concatenation. This feature is called ____.

    A. Inheritance B. Encapsulation C. Polymorphism

    D. Binding E. None of these

    Q.124. In ER diagrams, the term cardinality is a synonym for the term

    Engistan.com | Engineers Community

    18

  • Engistan.com Professional Knowledge Questions for IBPS CWE(IT-Officer)[ ] A. Attribute B. Degree C. Entities

    D. Cartesian E. None of these

    Q.125. Which of the following is not a context free grammar components?

    A. Terminal symbols B. Nonterminal symbol C. Production line

    D. List E. None of these

    Q.126. Which of the following is a phase of RAD model?

    A. Business modelling B. Data modelling

    C. Application generation D. All of the above

    E. None of these

    Q.127. A combinational logic circuit which is used to send data coming from a single source to two or more separate destinations is called as

    A. Decoder B. Encoder C. Multiplexer

    D. Demultiplexer E. None of these

    Q.128. ____ is a set design steps that allows a DFD with transform flow characteristics to be mapped into a predefined template for program structure.

    A. Transaction flow B. Contributor

    C. Transform mapping D. Design evaluation

    E. None of these

    Q.129. The twos compliment of binary number 010111.1100 is

    A. 101001.1100 B. 101000.0100 C. 010111.0011

    D. 101000.0011 E. None of these

    Q.130. In 8086 the overflow flag is set when

    A. The sum is more than 16 bits

    B. Signed numbers go out their range after an arithmetic operation

    C. Carry and sign flags are set

    D. During subtraction

    E. None of these

    Q.131. What does microprocessor speed depends on?

    Engistan.com | Engineers Community

    19

  • Engistan.com Professional Knowledge Questions for IBPS CWE(IT-Officer)[ ] A. Clock B. Data bus width

    C. Address bus width D. All of these

    E. None of these

    Q.132. The TRAP is one of the interrupts available its INTEL 8085. Which one statement is true of TRAP?

    A. It is level triggered

    B. It is negative edge triggered It is positive edge triggered

    C. It is positive edge triggered

    D. It is both positive edge triggered and level triggered

    E. None of these

    Q.133. A top to bottom relationship among the items in a database is established by a

    A. Hierarchical schema B. Network Schema

    C. Relational Schema D. Both (1) and (2)

    E. Both (2) and (3)

    Q.134. An attribute of one matching the primary key another table, is called as

    A. Foreign key B. Secondary key C. Candidate key

    D. Composite key E. None of these

    Q.135. Repeaters function in the ___ layer

    A. Physical B. Data link C. Network

    D. Both (1) and (2) E. None of these

    Q.136. Which of the following types of software should we use if we often need to create, edit and print documents?

    A. Word processing B. Spread sheet C. Object program

    D. UNIX E. None of these

    Q.137. In Queues, the items deleted at one end is called.

    A. Rear B. Front C. Top

    D. Base E. None of these

    Q.138. What will be the output of a in following code?

    Engistan.com | Engineers Community

    20

  • Engistan.com Professional Knowledge Questions for IBPS CWE(IT-Officer)[ ] #include

    int main()

    int a=20;

    {

    int a=10;

    printf(%d,a);

    printf(%d,a); return 0;

    }

    A. 20 20 B. 10 20 C. 20 10

    D. 10 10 E. Compilation Error

    Q.139. Which of the following is not a property of transactions?

    A. Atomicity B. Concurrency C. Isolation

    D. Durability E. None of these

    Q.140. The clause in SQL that specifies that the query result should be sorted in ascending or

    descending order based on the values of one or more columns is

    A. View B. Order by C. Group by

    D. Having E. None of these

    Q.141. What is a disjoint less constraint?

    A. It requires that an entity belongs to no more than one level entity set.

    B. The same entity may belong to more than one level.

    C. The database must contain an unmatched foreign key value.

    D. An entity can be joined with another entity in the same level entity set.

    E. None of these

    Q.142. According to the levels of abstraction, the schema at the intermediate level is called

    A. Logical schema B. Physical schema. C. Subschema.

    D. Super schema. E. Conceptual Schema

    Q.143. Fifth Normal form is concerned with

    Engistan.com | Engineers Community

    21

  • Engistan.com Professional Knowledge Questions for IBPS CWE(IT-Officer)[ ] A. Functional dependency. B. Multivalued dependency. C. Join dependency.

    D. Domain-key. E. None of these

    Q.144. When an E-R diagram is mapped to tables, the representation is redundant for

    A. weak entity sets B. weak relationship sets

    C. strong entity sets D. strong relationship sets

    E. None of these

    Q.145. In SQL the word natural can be used with

    A. inner join B. full outer join C. right outer join

    D. all of the above E. None of these

    Q.146. DROP is a ______________ statement in SQL.

    A. Query B. Embedded SQL C. DDL

    D. DCL E. None of these

    Q.147. Relational Algebra is

    A. Data Definition Language . B. Meta Language

    C. Procedural query Language D. None of the above

    Q.148. Which of the following concurrency control schemes is not based on the serializability

    property?

    A. Two phase locking B. Graph-based locking

    C. Time-stamp based locking D. None of these

    Q.149. If an entity can belong to only one lower level entity then the constraint is

    A. disjoint B. partial C. overlapping

    D. single E. None of these

    Q.150. The normal form that is not necessarily dependency preserving is

    A. 2NF B. 3NF C. BCNF

    D. 4NF E. None of these

    Engistan.com | Engineers Community

    22

  • Engistan.com Professional Knowledge Questions for IBPS CWE(IT-Officer)[ ] Answers:

    1. A 2. B 3. E 4. B 5. B

    6. C 7. D 8. A 9. B 10. E

    11. E 12. E 13. B 14. E 15. C

    16. B 17. B 18. C 19. A 20. E

    21. B 22. B 23. B 24. A 25. D

    26. D 27. C 28. E 29. B 30. B

    31. C 32. D 33. B 34. D 35. C

    36. C 37. A 38. C 39. A 40. D

    41. C 42. D 43. D 44. B 45. D

    46. B 47. C 48. A 49. D 50. D

    51. D 52. D 53. D 54. A 55. E

    56. E 57. B 58. A 59. B 60. C

    61. C 62. C 63. D 64. D 65. A

    66. B 67. A 68. D 69. B 70. D

    71. A 72. D 73. C 74. D 75. B

    76. A 77. C 78. A 79. C 80. E

    81. B 82. C 83. D 84. D 85. B

    86. D 87. B 88. C 89. D 90. B

    91. C 92. C 93. B 94. C 95. C

    96. B 97. B 98. C 99. B 100. A

    101. B 102. D 103. A 104. C 105. C

    106. D 107. A 108. C 109. A 110. A

    111. B 112. A 113. E 114. C 115. A

    116. C 117. C 118. B 119. D 120. B

    121. A 122. A 123. C 124. B 125. D

    126. D 127. D 128. C 129. B 130. B

    131. A 132. D 133. A 134. A 135. A

    136. A 137. B 138. E 139. B 140. B

    141. A 142. E 143. C 144. B 145. A

    146. C 147. C 148. D 149. B 150. A

    Engistan.com | Engineers Community

    23

    Professional Knowledge QuestionsQ.1. In SQL, which command is used to change data in a data table?A. UPDATE B. INSERT C. BROWSED. APPEND E. None of theseQ.2. Local variablesA. Are created outside a block B. Are known only to that blockC. Continue to exist when their block ends D. Are illegal in C++E. None of theseQ.3. This ___ data mining technique derives rules from real world case examples.A. Waterfall model B. RAD C. White BoxD. Spiral model E. Case based reasoningQ.4. Rows of a relation are called:A. Relation B. Tuples C. Data structureD. An entity E. None of theseQ.5. Which layer of OSI determines the interface of the system with the user?A. Network B. Application C. Data linkD. Session E. None of theseQ.6. Aggregation is a special form ofA. Generalization B. Specialization C. AssociationD. Object E. None of theseQ.7. Which of the following is a universal gate?A. AND B. OR C. EXORD. NAND E. None of theseQ.8. A collection of fields is called a record with respect of DBMS, a record corresponds toA. Tuple B. Relation C. File D. Attribute E. None of these.Q.9. Multiplexer meansA. One into many B. Many into one C. Many into manyD. All of these E. None of theseQ.10. Each node in a linked list must contain at least:A. Three fields B. Five fields C. Four fieldsD. One fields E. Two fieldsQ.11. OSI model consists of ____ layersA. Three B. Five C. SixD. Eight E. SevenQ.12. Encryption and decryption are functions of the ____ layer.A. Transport B. Session C. Application D. Physical E. PresentationQ.13. Which of the following is not a connecting device?A. Bridge B. Trans receiver C. RouterD. Repeater E. None of theseQ.14. OLAP stands forA. Online Analytical project B. Online Analytical problemC. Online Application process D. Online Application ProblemE. Online Analytical processingQ.15. The term push and pop is related to theA. Array B. Lists C. StacksD. All of the above E. None of theseQ.16. Pointer is used inA. Direct Addressing (address filed contain address of operand)B. Indirect Addressing (address filed contain address of memory filed where operand is present)C. Indexed mode (EA is generated by adding an index)D. Immediate Addressing (address filed contain operand)E. None of theseQ.17. HTTP refers toA. Hyper Text Transmission Protocol B. Hyper Text Transfer ProtocolC. Hyper Text Tie Protocol D. Hyper Text Total ProtocolE. None of theseQ.18. An email account includes a storage area, often called a (n)A. Attachment B. Hyperlink C. MailboxD. Ip address E. None of theseQ.19. To print a documentA. Select the print command and then select OKB. Select the Ready printer and then select OKC. Type PRINT and then press EnterD. Close the document, select the print command then select OKE. None of these Q.20. Which part of the computer provides only temporary storage of files?A. ROM memory B. Processor C. Hard driveD. Mother board E. RAM memoryQ.21. Which normal form is considered adequate for relational database design?A. 2 NF B. 3 NF C. 4 NFD. BCNF E. None of theseQ.22. Which of the following SQL commands can be used modify existing data in a database table?A. MODIFY B. UPDATE C. CHANGED. NEW E. None of theseQ.23. A special type gateway that can keep external users from accessing resources on the LAN users access the external info is called:A. Repeater B. Firewall C. EncryptionD. Hub E. None of theseQ.24. Which command(s) is (are) used to redefine a column of the table in SQL?A. ALTER TABLE B. DEFINE TABLE C. MODIFY TABLED. ALL of these E. None of theseQ.25. The order of the binary search algorithm isA. n B. n2 C. nlog(n)D. log(n) E. None of theseQ.26. The break statement causes an exit.A. From the innermost loop only B. Only from the innermost switchC. From the loops and switches D. From the innermost loop or switchE. None of theseQ.27. Backup procedure helps inA. Restoring the operation whenever there is a disk failureB. Restoring both application and system software whenever there is disk corruptionC. Restoring the data sites whenever there is a system crashD. All of the aboveE. None of theseQ.28. In SQL, which of the following is not a data definition language command?A. RENAME B. REVOKE C. GRANTD. UPDATE E. None of theseQ.29. In a relational schema, each tuple is divided into fields calledA. Relations B. Domains C. QueriesD. All of these E. None of theseQ.30. Data security threats includeA. Hardware failure B. Privacy invasion C. Fraudulent manipulation of data D. All of theseE. None of theseQ.31. The language used in application programs to request data from the DBMS is referred to as theA. DML B. DDL C. Query languageD. DCL E. None of theseQ.32. Through linked list one can implementA. Stack B. Graph C. QueueD. All of these E. None of theseQ.33. A heap allows a very efficient implementation of aA. Doubled ended queue B. Priority queue C. StackD. Trees E. None of theseQ.34. Which of the following microprocessors is not 8bit microprocessor?A. 8085 B. 6502 C. Z80D. 68000 E. None of theseQ.35. The modify operation is likely to be done afterA. Delete B. Insert C. Look upD. All of the above E. None of theseQ.36. Which two files are used during operation of the DMBS?A. Query language and utilitiesB. Data manipulation language and query language:C. Data dictionary and transaction logD. Data dictionary and query languageE. None of theseQ.37. Which of the following is useful in implementing quick sort?A. Stack B. Set C. ListD. Queue E. None of theseQ.38. The drawbacks of the binary tree sort are remedied by theA. Linear sort B. Quick Sort C. Heap SortD. Insertion Sort E. None of theseQ.39. A top to bottom relationship among the items in a database is established by aA. Hierarchical Schema B. Network Schema C. Relational Schema D. All of the aboveE. None of theseQ.40. If you want to organize a file in multiple ways, it is better to _____ the data rather than to sort it.A. Delete B. Update C. Sort KeyD. Index E. None of the aboveQ.41. One approach to standardizing storing of dataA. MIS B. Structured programming C. CODASYL specifications D. All of the above E. None of the aboveQ.42. What software packages are commonly used for businesses that have to track extensive lists of clients and inventory?A. Special purpose packages B. Custom made programsC. Single function application packages D. Data management packagesE. None of the aboveQ.43. In a _____ a parent record type can be linked to one or more "child" record types, but a child record type can have only one parent.A. Network database B. Relational databaseC. Distributed database D. Hierarchical databaseE. None of the aboveQ.44. A network schemaA. restricts the structure to a one-to-many relationshipB. permits many-to-many relationshipsC. stores data in tablesD. All of the aboveE. None of the aboveQ.45. A scheme describesA. data elements B. records and filesC. record relationships D. All of the aboveE. None of the aboveQ.46. A report formA. appears on the computer monitor during data entryB. is used during report generation to format dataC. both (a) and (b)D. All of the aboveE. None of the aboveQ.47. A multiple-form file management systemA. lets you define different forms for different operationsB. lets you create a look-up form with an associated read-only password to prevent access by unauthorized usersC. both (a) and (b)D. allow you to entry data in all the formsE. None of the aboveQ.48. Embedded pointer provideA. a secondary access pathB. a physical record keyC. an inverted indexD. All of the aboveE. None of the aboveQ.49. Versatile report generators can provideA. Columnar totals B. Subtotals C. CalculationsD. All of the above E. None of the aboveQ.50. In SQL, the _____ command is used to recompile a viewA. COMPILE VIEW B. DEFINE VIEW C. CREATE VIEWD. ALTER VIEW E. None of theseQ.51. A list in alphabetical orderA. is in descending orderB. is in ascending orderC. is the result of a sort operationD. both (b) and (c)E. None of the aboveQ.52. If a piece of data is stored in two places in the database, thenA. storage space is wastedB. changing the data is one spot will cause data inconsistencyC. it can be more easily accessedD. both (a) and (b)E. None of the aboveQ.53. A file that is organized in uniform format is formally referred to as a _____ or a database file.A. DocumentB. DatabaseC. RecordD. Structured data fileE. None of the aboveQ.54. In SQL, the CREATE TABLE is usedA. to create a table, defining its columns, integrity constrains, and storage allocationB. to add a column/integrity constraint to a tableC. to redefine a columnD. to change a table's storage characteristicsE. All of the aboveQ.55. Batch processing is appropriate ifA. a large computer system is availableB. only a small computer system is availableC. only a few transactions are involvedD. All of the aboveE. None of the aboveQ.56. Which of the following is not an advantage of the data-base approach?A. elimination of the data redundancyB. ability to associate related dataC. increased securityD. program/data independenceE. All of the above are advantagesQ.57. A data dictionary doesn't provide information about:A. where data is locatedB. the size of the disk storage deviceC. It allows a many-to-many relationshipD. It is conceptually simpleE. It will be the dominant data base of the futureQ.58. ________ refers to a family of IEEE standards dealing with local area network and metropolitan area network.A. 802 B. 800 C. 801D. 803 E. None of theseQ.59. Which is the general network standard for the data link layer in the OSI Reference Model?A. IEEE 802.1 B. IEEE 802.2 C. IEEE 802.3D. IEEE 802.4 E. IEEE 802.6Q.60. _________ uses a standard called IEEE 802.6.A. LAN B. WAN C. MAND. Internet E. None of theseQ.61. Repeater operates in which layer of OSI model?A. Application Layer B. Presentation Layer C. Physical LayerD. Transport Layer E. Data link layerQ.62. Where does Bridge operate in OSI model?A. Physical layer B. Data link layer C. Both 1 and 2D. Application layer E. None of theseQ.63. Which of the following uses the greatest number of layers in the OSI model?A. Bridge B. Repeater C. RouterD. Gateway E. None of theseQ.64. Routers operate in which layer of the OSI model?A. Physical layer B. Data link layer C. Network layerD. All of these E. None of theseQ.65. Modem is a _______ that modulates and demodulate signals.A. DCE (Data circuit terminating equipment)B. DTE(Data terminal equipment)C. DTE-DCED. Both 1 and 2E. None of theseQ.66. A communication network which is used by large organization over regional, national or global area is called_______A. LAN B. WAN C. MAND. Internet E. None of theseQ.67. At _______ layer, TCP/IP defines two protocols: Transmission Control Protocol (TCP) and User Datagram Protocol (UDP)A. Transport layer B. Network layer C. Physical layerD. Application layer E. None of theseQ.68. End to end connectivity is provided from host to host in:A. Network layer B. Session layer C. Data link layerD. Transport layer E. None of theseQ.69. Which of the following TCP/IP protocol is used for transferring electronic mail messages from one machine to another?A. SNMP B. SMTP C. RPCD. FTP E. None of theseQ.70. Which of the following is an example of a client server model?A. FTP B. DNS C. TELNETD. All of these E. None of theseQ.71. Which IEEE standards is used for Wi/Fi system?A. 802.11 B. 802.1 C. 802.2D. 802.3 E. 802.10Q.72. __________ is the continuous ability to send and receive data between interconnected networksA. FTP B. SMTP C. TNSD. Network Interoperability E. None of theseQ.73. What is the default subnet mask for a class B network?A. 127.0.0.1 B. 255.0.0.0 C. 255.255.0.0D. 255.255.255.0 E. None of theseQ.74. Which of the following is not a relational database?A. dBASE IV B. 4th Dimension C. FoxProD. Reflex E. None of the aboveQ.75. Which command is used to remove a table from the database in SQL?A. DELETE TABLE B. DROP TABLE C. ERASE TABLED. UNATTACH TABLE E. None of the aboveQ.76. A file produced by a spreadsheetA. is generally stored on disk in an ASCII text formatB. can be used as it by the DBMSC. can be used for graphicD. All of the aboveE. None of the aboveQ.77. A form definesA. where data is placed on the screenB. the width of each fieldC. both (a) and (b)D. All of the aboveE. None of the aboveQ.78. What is loopback address?A. 127.0.0.1 B. 255.0.0.0 C. 255.255.0.0D. 127.0.0.0 E. None of theseQ.79. A central computer surrounded by one or more satellite computers is called aA. Bus network B. Ring network C. Star networkD. All the above E. None of theseQ.80. With an IP address of 100, you currently have 80 subnets. What subnet mask should you use to maximize the number of available hosts?A. 192 B. 240 C. 248D. 224 E. 252Q.81. Print server uses _______ which is a buffer that holds before it is send to the printer.A. Queue B. Spool C. NodeD. Stack E. None of theseQ.82. In SQL, GRANT command is used toA. allow user to access databasesB. allow user to create databasesC. grant system privileges, roles, and object privileges to uses and rolesD. choose auditing for specific SQL commandsE. None of the aboveQ.83. Which of the following identifies specific web page and its computer on the web page?A. Website B. URL C. Web site addressD. Domain Name E. None of theseQ.84. __________ is the computer to computer exchange of routine business data between trading partners in standard data formats.A. CTS B. DSR C. VDRD. EDI E. None of theseQ.85. The highest level in the hierarchy of data organization is calledA. data bank B. database C. data fileD. data record E. None of the aboveQ.86. Communication handler is basically an _______ 16 bit micro controller?A. 8085 B. 8086 C. 8086AD. 80C186 E. None of theseQ.87. The logical data structure with a one-to-many relationship is a:A. network B. tree C. chainD. relational E. None of the aboveQ.88. Updating a database meansA. revising the file structureB. reorganizing the databaseC. modifying or adding record occurrencesD. All of the aboveE. None of the aboveQ.89. Which uses a pre-shared key that is more than 7 and less than 64 characters in length?A. WPA-PSK B. TKIP C. AESD. All the above E. None of theseQ.90. When you have finished entering information into a formA. the template is written to the data fileB. the contents of the form are written to the data fileC. the contents of the form can be printedD. All of the aboveE. None of the aboveQ.91. A list consists of last names, first names, addresses, and pin codes if all people in the list have the same last and the same pin code, a useful key would beA. the pin codeB. the last nameC. a compound key consisting of the first name and the last nameD. All of the aboveE. None of the aboveQ.92. If you want to group the records in the abc database, you could use the Jobcode as the_____.A. Delete B. Update C. Sort KeyD. Index E. None of the aboveQ.93. Full adder is used to ______A. 2 bit addition B. 3 bit addition C. 4 bit additionD. 6 bit addition E. None of theseQ.94. Most important advantages of an IC is its __________A. Easy replacement in case of circuit failureB. Low power consumptionC. Extremely high reliabilityD. Reduced costE. None of theseQ.95. An IC contains 50 gates each of which consists of 6 components/ Its belong toA. VLSI B. LSI C. MSID. SSI E. None of theseQ.96. Which type of computers use the 8 bit code called EBCDIC?A. Mini computers B. Mainframe computers C. Super computersD. Micro computer E. None of theseQ.97. An AND gateA. Implement logic additionB. Is equivalent to a series switching circuitC. Is any-or all gateD. Is equivalent to a parallel switching circuitE. None of theseQ.98. The Management Information system (MIS) structure with one main computer system is calledA. hierarchical MIS structureB. distributed MIS structureC. centralized MIS structureD. decentralized MIS structureE. None of the aboveQ.99. The decimal equivalent of the binary number 11100001111 isA. 1806 B. 1807 C. 2806D. All the above E. None of theseQ.100. Which are not used in case of applet?A. Read/write B. Internet C. Search engineD. All the above E. None of theseQ.101. After you _____ a record, many data management the environments require you to issue a command to save the changes you made.A. Delete B. Update C. Sort keyD. Index E. None of the aboveQ.102. Data item characteristics that are important in data management includeA. punctuation B. language C. spellingD. width E. None of the aboveQ.103. A locked file can beA. accessed by only one userB. modified by users with the correct passwordC. is used to hide sensitive informationD. both (b) and (c)E. None of the aboveQ.104. In SQL, which command is used to make permanent changes made by statements issue since the beginning of a transaction?A. ZIP B. PACK C. COMMITD. SAVE E. None of the aboveQ.105. If the _______ bit in X.25 standard is to 1. It means that there is more than one packet.A. Q B. D C. MD. J E. None of theseQ.106. Dos and windows 3.x support file names upto______charecters in lengthA. Two B. Four C. SixD. Eight E. None of theseQ.107. What is the name given to the exchange of control signals which is necessary for establishing a connection between a modem and a computer at one end of a line and another modem and computer at the other end?A. Handshaking B. Modem options C. ProtocolD. All of these E. None of theseQ.108. A ___ contains the smallest unit of meaningful data, so you might call it the basic building block for a data file.A. File structures B. Records C. FieldsD. Database E. None of theseQ.109. A ___ means that one record in a particular record type is related to only one record of another record type.A. One to one relationship B. One to many relationshipC. Many to one relationship D. Many to many relationshipE. None of theseQ.110. In files, there is a key associated with each record which is used to differentiate among different records. For every file there is at least one set of keys that is unique. Such a Key is calledA. Unique key B. Prime attribute C. Index keyD. Primary Key E. Null keyQ.111. ____ is primarily used for mapping host names and email destinations to IP address but can also be used for other purposes.A. TCP(Transfer control protocol) B. DNS(Domain Name System)C. SHA (Secure Hash Algorithm) D. Simple Network Management Protocol (SNMP)E. None of theseQ.112. Override is a methodA. For an operation that replaces an inherited method for the same operationB. For a data that replaces an inherited method for the same operationC. For an operation that takes arguments form library functionD. All of theseE. None of theseQ.113. ____ is virus that inserts itself into a systems memory. Then it takes number of actions when an infected file is executed.A. Web scripting virus B. Polymorphic virusC. Macro virus D. Boot sector virusE. Resident virusQ.114. The ___ remains operative until the software is required.A. Waterfall model B. Incremental model C. Spiral model D. Prototyping modelE. Incremental modelQ.115. Data mining evolve as a mechanism to cater the limitations of ___ systems to deal massive data sets with high dimensionality, new data type, multiple heterogeneous data resource etc.A. OLTP B. OLAP C. DSSD. DWH E. None of theseQ.116. An important application of cryptography, used in computerized commercial and financial transactionA. Data mining B. Data warehousingC. Digital signature D. Media convergenceE. None of theseQ.117. An indexing operationA. Sorts a file using a single key B. Sorts file using two keysC. Establishes an index for a file D. Both (1) and (3)E. None of theseQ.118. A computer system consisting of its processor, memory and I/O devices accepts data, processes it and produces the output results .Can you tell in which component is the raw data fed?A. Mass Memory B. Main MemoryC. Logic Unit D. Arithmetic unitE. None of theseQ.119. You are in the process of analyzing a problem that requires you to collect and store TCP/ IP Packets. Which of the following utilities is best suited for this purpose?A. NBTSTAT B. Performance Monitor C. NETSTATD. Network Monitor E. DHCP Management ConsoleQ.120. Which of the following system program forgoes the production of object code to generate absolute machine code and load it into the physical main storage location from which it will be executed immediately upon completion of the assembly?A. Two pass assembler B. Load and go assembler C. Macro processor D. CompilerE. None of theseQ.121. From what location are the 1st computer instructions available on boot up?A. ROM BIOS B. CPU C. Boot.iniD. CONFIG.SYS E. None of theseQ.122. Abstraction isA. The act of representing the essential features of something without including much detail.B. The act of representing the features of something much detailC. A tree structureD. All of theseE. None of theseQ.123. Consider an operation of addition. For two numbers, the operating will generate a sum. If the operand are strings, and the same operation would produce a third string by concatenation. This feature is called ____.A. Inheritance B. Encapsulation C. PolymorphismD. Binding E. None of theseQ.124. In ER diagrams, the term cardinality is a synonym for the termA. Attribute B. Degree C. EntitiesD. Cartesian E. None of theseQ.125. Which of the following is not a context free grammar components?A. Terminal symbols B. Nonterminal symbol C. Production lineD. List E. None of theseQ.126. Which of the following is a phase of RAD model?A. Business modelling B. Data modelling C. Application generation D. All of the aboveE. None of theseQ.127. A combinational logic circuit which is used to send data coming from a single source to two or more separate destinations is called asA. Decoder B. Encoder C. MultiplexerD. Demultiplexer E. None of theseQ.128. ____ is a set design steps that allows a DFD with transform flow characteristics to be mapped into a predefined template for program structure.A. Transaction flow B. Contributor C. Transform mapping D. Design evaluationE. None of theseQ.129. The twos compliment of binary number 010111.1100 isA. 101001.1100 B. 101000.0100 C. 010111.0011D. 101000.0011 E. None of theseQ.130. In 8086 the overflow flag is set whenA. The sum is more than 16 bitsB. Signed numbers go out their range after an arithmetic operationC. Carry and sign flags are setD. During subtractionE. None of theseQ.131. What does microprocessor speed depends on?A. Clock B. Data bus width C. Address bus width D. All of theseE. None of theseQ.132. The TRAP is one of the interrupts available its INTEL 8085. Which one statement is true of TRAP?A. It is level triggeredB. It is negative edge triggered It is positive edge triggeredC. It is positive edge triggeredD. It is both positive edge triggered and level triggeredE. None of theseQ.133. A top to bottom relationship among the items in a database is established by aA. Hierarchical schema B. Network SchemaC. Relational Schema D. Both (1) and (2)E. Both (2) and (3)Q.134. An attribute of one matching the primary key another table, is called asA. Foreign key B. Secondary key C. Candidate keyD. Composite key E. None of theseQ.135. Repeaters function in the ___ layerA. Physical B. Data link C. NetworkD. Both (1) and (2) E. None of theseQ.136. Which of the following types of software should we use if we often need to create, edit and print documents?A. Word processing B. Spread sheet C. Object programD. UNIX E. None of theseQ.137. In Queues, the items deleted at one end is called.A. Rear B. Front C. TopD. Base E. None of theseQ.138. What will be the output of a in following code?#includeint main()int a=20;{int a=10;printf(%d,a);printf(%d,a); return 0;}A. 20 20 B. 10 20 C. 20 10D. 10 10 E. Compilation ErrorQ.139. Which of the following is not a property of transactions?A. Atomicity B. Concurrency C. Isolation D. Durability E. None of theseQ.140. The clause in SQL that specifies that the query result should be sorted in ascending ordescending order based on the values of one or more columns isA. View B. Order by C. Group by D. Having E. None of theseQ.141. What is a disjoint less constraint?A. It requires that an entity belongs to no more than one level entity set.B. The same entity may belong to more than one level.C. The database must contain an unmatched foreign key value.D. An entity can be joined with another entity in the same level entity set.E. None of theseQ.142. According to the levels of abstraction, the schema at the intermediate level is calledA. Logical schema B. Physical schema. C. Subschema. D. Super schema. E. Conceptual SchemaQ.143. Fifth Normal form is concerned withA. Functional dependency. B. Multivalued dependency. C. Join dependency. D. Domain-key. E. None of theseQ.144. When an E-R diagram is mapped to tables, the representation is redundant forA. weak entity sets B. weak relationship setsC. strong entity sets D. strong relationship setsE. None of theseQ.145. In SQL the word natural can be used withA. inner join B. full outer join C. right outer join D. all of the above E. None of theseQ.146. DROP is a ______________ statement in SQL.A. Query B. Embedded SQL C. DDL D. DCL E. None of theseQ.147. Relational Algebra isA. Data Definition Language . B. Meta LanguageC. Procedural query Language D. None of the aboveQ.148. Which of the following concurrency control schemes is not based on the serializabilityproperty?A. Two phase locking B. Graph-based lockingC. Time-stamp based locking D. None of these Q.149. If an entity can belong to only one lower level entity then the constraint isA. disjoint B. partial C. overlapping D. single E. None of theseQ.150. The normal form that is not necessarily dependency preserving isA. 2NF B. 3NF C. BCNF D. 4NF E. None of theseAnswers:CCADB105.104.103.102.101.AACAD110.109.108.107.106.ACEAB115.114.113.112.111.BDBCC120.119.118.117.116.DBCAA125.124.123.122.121.BBCDD130.129.128.127.126.AAADA135.134.133.132.131.BBEBA140.139.138.137.136.ABCEA145.144.143.142.141.ABDCC150.149.148.147.146.