IBPS IT Officer Question Paper – Specialist Officer Recruitment Examination 2014

1. An audit log ……………….
(1) simply records the time

(2) user

(3) type of all access to an object

(4) all the above

(5) None of these
2. A network schema …………..
(1) restricts the structure to a one to many relationship

(2) permits many to many relationship

(3) stores data in table

(4) all the above

(5) None of these
3. How many OSI layers are converted in the X.25 Standard?
(1) Two

(2) Three

(3) Seven

(4) Six

(5) Eight
4. The purpose of the command EXIT in a DBMS package is ………
(1) to get out of a conditional loop

(2) to get out of the package

(3) to transfer control to a different procedure

(4) both (1) and (2)

(5) None of these
5. In client/server system, the important measure of the performance of the server system is ….
(1) Million instructions per second (MIPS)

(2) Clock speed (MHz)

(3) Transaction per sections (IPS)

(4) Pixel per Second

(5) None of these

6. Link encryption …………….
(1) is more secure than end-to-end encryption

(2) is less secure than end-to-end encryption

(3) cannot be used in public network

(4) is used only to debug

(5) None of these
7. Which of the following command allows us to add data to our database file?
(1) CLEAR

(2) CREATE

(3) APPEND

(4) APPEND BLANK

(5) None of these
8. A long term process display should …………..
(1) show which processes use the most processor time

(2) show process activity by time interval

(3) show resources used by the most active process

(4) all the above

(5) None of these
9. The graph that shows the basic blocks and their success of relationship is called ………
(1) DAG

(2) Flow graph

(3) Control graph

(4) Hamiltonian graph

(5) None of these
10. If you get both local and remote echoes every character your type will appear on the screen ……….
(1) Once

(2) Twice

(3) Thrice

(4) Four times

(5) Never
QuestionsQ1Q2Q3Q4Q5Q6Q7Q8Q9Q10
Answers4221323422