SBI Asst. Manager (IT Systems) Solved Paper 2012 (Part1)

S. Sujith
1
1. In SQL, which of the following is not a data Manipulation Language Commands?
Choose the right option

[A] Delete
[B] Select
[C] Update
[D] Create
[E] None of the above

2. The value for an attribute or a column are drawn from a set of values known as -
Choose the right option

[A] Tuples
[B] Attributes
[C] Domain
[D] Column
[E] None of these

3. Entities having primary key are called
Choose the right option

[A] Primary Key
[B] Strong entities
[C] Weak entities
[D] Primary Key
[E] None Of these

4. Which of the following is not a type of SQL statement?
Choose the right option

[A] Data Manipulation Language (DML)
[B] Data Definition Language (DDL)
[C] Data Control Language (DCL)
[D] Data Communication Language (DCL)
[E] None of these

5. Which of the following is not included in DML (Data Manipulation Language)
Choose the right option

[A] INSERT
[B] UPDATE
[C] DELETE
[D] CREATE
[E] None of these

6. TRUNCATE statement in SQL is a -
Choose the right option

[A] DML statement
[B] DDL statement
[C] DCL statement
[D] DSL statement
[E] None of these

7. To discard all pending data changes
Choose the right option

[A] COMMIT
[B] ROLLBACK
[C] SAVEPOINT
[D] LOCK
[E] None of these

8. Which of the following term is related to the stack?
Choose the right option

[A] TOP
[B] PUSH
[C] POP
[D] Rear
[E] A, B and C.

9. In Queues, the end from where items inserted is called
Choose the right option

[A] Rear
[B] Front
[C] Top
[D] Base
[E] None of these

10. Which protocol is used for browsing website:
Choose the right option

[A] TCP
[B] HTTP
[C] FTP
[D] TFTP
[E] None of these

11. Which of the following is a browser?
Choose the right option

[A] Netscape Navigator
[B] Mosaic
[C] Mozilla Firefox
[D] Google chrome
[E] All of these

12. Black Box Testing sometime called -
Choose the right option

[A] Data flow testing
[B] Loop testing
[C] Behavioral testing
[D] Graph based testing
[E] None of these
>

13. The Objective of testing is
Choose the right option

[A] Debugging
[B] To uncover errors
[C] To gain modularity
[D] To analyze system
[E] None of these


14. Choose the right sequence of SDLC (Software development life cycle) steps
Choose the right option

[A] Design, Requirement Analysis, Coding, Testing
[B] Requirement Analysis, Design, Coding, Testing
[C] Requirement Analysis, Design, Testing, Coding
[D] Requirement Analysis, Coding, Design, Testing
[E] None of these


15. The drawback of the binary tree sort are remedied by the
Choose the right option

[A] Linear Sort
[B] Quick Sort
[C] Heap Sort
[D] Insertion Sort
[E] All of these


16. Round robin scheduling is essentially the preemptive version of
Choose the right option

[A] FIFO
[B] Shortest job first
[C] Shortest remaining
[D] Longest time first
[E] None of these


17. ____ is the situation in which a process is waiting on another process, which is also waiting on another process which is waiting on the first process. None of the processes involved in this circular wait are making progress.
Choose the right option

[A] Deadlock
[B] Starvation
[C] Dormant
[D] All of these
[E] None of these


18. Assembly language is a _____
Choose the right option

[A] Low Level Language
[B] Middle Level Language
[C] High level Language
[D] User Language
[E] None of these


19. Which of the following is a type of translator?
Choose the right option

[A] Assembler
[B] Compiler
[C] Interpreter
[D] All of the Above
[E] None of these


20. Multiprogramming systems ___
Choose the right option

[A] Are easier to develop than single programming
[B] Execute each job faster
[C] Execute more jobs in the same time
[d} Are used only on large main frame computers
[E] None of these


21. The mechanism by which the data and functions are bound together with an
Choose the right option

[A] Inheritance
[B] Encapsulation
[C] Abstraction
[D] Polymorphism
[E] None of these


22. The OSI model consists of ___layers.
Choose the right option

[A] Nine
[B] Eight
[C] Seven
[D] Five
[E] Eleven


23. Decryption & Encryption of data are the responsibility of the ___ layer.
Choose the right option

[A] Physical
[B] Data link
[C] Presentation
[E] Application


24. LANs can be connected by devices called ____ which operate in the data link layer?
Choose the right option

[A] Hub
[B] Bridges
[C] HDLC
[D] Tunnel
[E] None of these


25. In a ____ topology, if there are n devices in a network, each device has n-1 ports for cable.
Choose the right option

[A] Mesh
[B] Star
[C] Bus
[D] Ring
[E] None of these


Post a Comment

1 Comments
  1. I think Q:23 and Q:18 are wrong answered:
    Answers Should be:
    Q:23: C Presentation Layer
    Q:18: A Low level Language

    ReplyDelete
Post a Comment
To Top