IBPS CWE Specialist Officers(IT) 2013 Professional Knowledge Question Paper

Leave a Comment
IBPS Common Written Examination(CWE) for Specialist officers is a recruitment examination to recruit professionals to fill up the positions in public sector banks in India in various specialized areas. These covers IT officers, Law Officers, Agricultural Officers etc.
The test is a 2 hour online test covering Logical Reasoning, Quantitative Aptitude, General English and professional Knowledge. Following questions are from the first IBPS CWE-II Specialist Officers held on 2013 covering the Professional Knowledge section.
Also Read: IBPS CWE Specialist Officers(IT) 2012>> 

What is the Syllabus?
IBPS has not published a detailed syllabus for Professional Knowledge part of the test. But analyzing the pattern of previous question papers of the test carefully, we have compiled a list of most important topics for Professional Knowledge section. These topics are:

  • Basics of Operating Systems
  • Basics of computer organizations and computer operations
  • Input/Output system, Microprocessors, Logical circuit degin
  • SQL, Relational Database Management Systems(RDBMS), Data Mining and Data Warehousing
  • Data communication, Networking, Network and System security
  • Basic Software engineering
  • Basic Linux System Administration(Not seen much importance)
  • Current advancement in IT, social networks, trends, virus and worms etc.
If you study this topics carefully, you can be much assured about getting through the IBPS Specialist Officers(IT) exam.



           --IBPS CWE Specialist IT Officers 2012 Professional Knowledge Questions--



  1. Which of the following microprocessors is not 8bit microprocessor?
    1. 8085
    2. 6502
    3. Z80
    4. 68000
    5. None of these
  2. Microprocessor 8085 is the enhanced version of which essentially the same construction set
    1. 6800
    2. 8080
    3. 6800A
    4. 8000
    5. All of these
  3. Which of the following interrupts has the lowest priority?
    1. RST 5.5
    2. RST 7.5
    3. TRAP
    4. INTR
    5. None of these
  4. The Data control language (DCL).
    1. is used to manage user access to data bases
    2. is used to manipulate the contents of a database in some form
    3. Both (1) and (2)
    4. Used for inserting, deleting and updating data in a database
    5. None of these
  5. A collection of fields is called a record with respect of DBMS, a record corresponds to
    1. Tuple
    2. Relation
    3. File
    4. Attribute
    5. None of these.
  6. Multiplexer means
    1. One into many
    2. Many into one
    3. Many into many
    4. All of these
    5. None of these
  7. Which gate is known as universal gate ?
    1. NOT gate
    2. NAND gate
    3. AND gate
    4. XOR gate
    5. None of the above
  8. Which of the following is the first integrated logic family?
    1. TCL
    2. T1L
    3. DTL
    4. MOS
    5. RTL
  9. A top to bottom relationship among the items in a database is established by a
    1. Hierarchical schema
    2. Network Schema
    3. Relational Schema
    4. Both (1) and (2)
    5. Both (2) and (3)
  10. In the relational schema, each tuple is divided into fields called.
    1. Relations
    2. Domains
    3. Queries
    4. Both (1) and (2)
    5. Both (1) and (3)
  11. The modify operation is likely to be done after.
    1. Delete
    2. Insert
    3. Look up
    4. All of the above
    5. None of these
  12. The way a particular application views the data from the database that the application uses is a :
    1. Module
    2. Relational model
    3. Schema
    4. Subschema
    5. None of these
  13. Which two files are used during operation of the DMBS?
    1. Query language and utilities
    2. Data manipulation language and query language:
    3. Data dictionary and transaction log
    4. Data dictionary and query language
    5. None of these
  14. Which normal form is considered adequate for relational database design?
    1. 2 NF
    2. 3 NF
    3. 4 NF
    4. BCNF
    5. None of these
  15. An attribute of one matching the primary key another table, is called as
    1. Foreign key
    2. Secondary key
    3. Candidate key
    4. Composite key
    5. None of these
  16. Which of the following SQL commands can be used modify existing data in a database table?
    1. MODIFY
    2. UPDATE
    3. CHANGE
    4. NEW
    5. None of these
  17. Each node in a linked list must contain at least:
    1. Three fields
    2. Five fields
    3. Four fields
    4. One fields
    5. Two fields
  18. The average number of key comparisons done in a successful sequential search in a list of length “n” is
    1. Log n
    2. (n-1)/2
    3. n/2
    4. (n+1)/2
    5. None of these
  19. The order of the binary search algorithm is
    1. n
    2. n2
    3. nlog(n)
    4. log(n)
    5. None of these
  20. Which of the following is useful in implementing quick sort?
    1. Stack
    2. Set
    3. List
    4. Queue
    5. None of these
  21. OSI model consists of ____ layers
    1. Three
    2. Five
    3. Six
    4. Eight
    5. Seven
  22. Which data communication method is used to transmit the data over a serial communication link.
    1. Simplex
    2. Full duplex
    3. Half duplex
    4. Both (1) and (2)
    5. Both (2) and (3)
  23. Encryption and decryption are functions of the ____ layer.
    1. Transport
    2. Session
    3. Application
    4. Physical
    5. Presentation
  24. Which of the following is not a connecting device?
    1. Bridge
    2. Trans receiver
    3. Router
    4. Repeater
    5. None of these
  25. Repeaters function in the ___ layer
    1. Physical
    2. Data link
    3. Network
    4. Both (1) and (2)
    5. None of these
  1. How many hosts are attached to each of the local area network at your site?
    1. 128
    2. 256
    3. 254
    4. 64
    5. None of these
  2. Which of the following types of software should we use if we often need to create, edit and print documents?
    1. Word processing
    2. Spread sheet
    3. Object program
    4. UNIX
    5. None of these
  3. Thrashing
    1. Can always be avoided by swapping
    2. Is a natural consequence of virtual memory system Always occurs on large computers
    3. Can be caused by poor paging algorithms
    4. None of these
  4. _____ is present in spiral model
    1. Code generator
    2. Risk analysis
    3. Code optimizer
    4. Reengineering
    5. None of these
  5. The approach used in top down analysis and design is :
    1. To identify the top level functions by combining many smaller components into a single entity
    2. To identify a top level function and then create hierarchy of lower level modules and components
    3. To prepare flowcharts after programming has been completed
    4. All of these
    5. None of these
  6. B2C ecommerce focuses on customer ___.
    1. Respond to customer
    2. Obtain customer feedback
    3. Establish buyerseller transaction
    4. All of the above
    5. None of these
  7. OLAP stands for
    1. Online Analytical project
    2. Online Analytical problem
    3. Online Application process
    4. Online Application Problem
    5. Online Analytical processing
  8. Data mining is
    1. Storing data when in need
    2. Automatic extraction of patters of information
    3. Searching data on Internet
    4. All of these
    5. None of these
  9. Decision support system are based on ____ analysis
    1. Query and reporting
    2. Data mining
    3. OLAP
    4. All of the above
    5. None of these
  10. The term push and pop is related to the
    1. Array
    2. Lists
    3. Stacks
    4. All of the above
    5. None of these
  11. The break statement causes an exit.
    1. From the innermost loop only
    2. Only from the innermost switch
    3. From the loops and switches
    4. From the innermost loop or switch
    5. None of these
  12. Backup procedure helps in
    1. Restoring the operation whenever there is a disk failure
    2. Restoring both application and system software whenever there is disk corruption
    3. Restoring the data sites whenever there is a system crash
    4. All of the above
    5. None of these
  13. Software testing is
    1. The process of demonstrating that error are not present
    2. One process of establishing confidence that a program does what it is supposed to do
    3. The process of executing a program to show that it is working as per specifications
    4. The process of executing a program with the intent of finding errors
    5. None of these
  14. Regression testing in primarily related to
    1. Functional testing
    2. Data flow testing
    3. Development testing
    4. Maintenance testing
    5. None of these
  15. Which of the following is easiest software development process model?
    1. Waterfall Model
    2. Prototyping
    3. Interactive enhancement
    4. Spiral model
    5. All of these
  16. Banker’s algorithm for resource allocation deals with
    1. Deadlock prevention
    2. Deadlock avoidance
    3. Deadlock recovery
    4. Mutual exclusion
    5. All of these
  17. In Queues, the items deleted at one end is called.
    1. Rear
    2. Front
    3. Top
    4. Base
    5. None of these
  18. Pointer is used in
    1. Direct Addressing
    2. Indirect Addressing
    3. Indexed mode
    4. Immediate Addressing
    5. None of these
  19. An array can be passed in a functions in C language through
    1. ‘Call by value’ only
    2. ‘Call by reference’ only
    3. Both (1) & (2)
    4. Call by preference
    5. None of these
  20. HTTP refers to
    1. Hyper Text Transmission Protocol
    2. Hyper Text Transfer Protocol
    3. Hyper Text Tie Protocol
    4. Hyper Text Total Protocol
    5. None of these
  21. An email account includes a storage area, often called a (n)
    1. Attachment
    2. Hyperlink
    3. Mailbox
    4. Ip address
    5. None of these
  22. A(n) ____  is a collection of information that determines which files you can access and which setting you use.
    1. Network
    2. User account
    3. Operating system
    4. File system
    5. None of these
  23. To print a document
    1. Select the print command and then select OK
    2. Select the Ready printer and then select OK
    3. Type PRINT and then press Enter
    4. Close the document, select the print command then select OK
    5. None of these
  24. Which part of the computer provides only temporary storage of files?
    1. ROM memory
    2. Processor
    3. Hard drive
    4. Mother board
    5. RAM memory
  25. What will be the output of “a” in following code?
#include<stdio.h>
int main()
int a=20;
{
int a=10;
printf(“%d”,a);
printf(“%d”,a); return 0;
}
Ans.
  1. 20 20
  2. 10 20
  3. 20 10
  4. 10 10
  5. Compilation Error

0 comments:

Post a Comment