SlideShare a Scribd company logo
1 of 17
Download to read offline
SBI IT (Systems) Assistant Manager 2012 Question Paper 1. In SQL, which of the following is not a data Manipulation Language Commands? a. Delete b. Select c. Update d. Create e. None of the above 2. The value for an attribute or a column are drawn from a set of values known as – a. Tuples b. Attributes c. Domain d. Column e. None of these 3. Entities having primary key are called a. Primary Key b. Strong entities c. Weak entities d. Primary Key e. None Of these 4. Which of the following is not a type of SQL statement? a. Data Manipulation Language (DML) b. Data Definition Language (DDL) c. Data Control Language (DCL) d. Data Communication Language (DCL) e. None of these 5. Which of the following is not included in DML (Data Manipulation Language) a. INSERT b. UPDATE c. DELETE d. CREATE e. None of these 6. TRUNCATE statement in SQL is a – a. DML statement b. DDL statement c. DCL statement d. DSL statement e. None of these 7. To discard all pending data changes a. COMMIT
b. ROLLBACK c. SAVEPOINT d. LOCK e. None of these 8. Which of the following term is related to the stack? a. TOP b. PUSH c. POP d. Rear e. A, B and C. 9. In Queues, the end from where items inserted is called a. Rear b. Front c. Top d. Base e. None of these 10. Which protocol is used for browsing website: a. TCP b. FITFP c. FTP d. TFTP e. None of these 11. Which of the following is a browser? a. Netscape Navigator b. Mosaic c. Mozilla Firefox d. Google chrome e. All of these 12. Black Box Testing sometime called – a. Data flow testing b. Loop testing c. Behavioral testing d. Graph based testing e. None of these 13. The Objective of testing is a. Debugging b. To uncover errors c. To gain modularity d. To analyze system e. None of these 14. Choose the right sequence of SDLC (Software development life cycle) steps
a. Design, Requirement Analysis, Coding, Testing b. Requirement Analysis, Design, Coding, Testing c. Requirement Analysis, Design, Testing, Coding d. Requirement Analysis, Coding, Design, Testing e. None of these 15. The drawback of the binary tree sort are remedied by the a. Linear Sort b. Quick Sort c. Heap Sort d. Insertion Sort e. All of these 16. Round robin scheduling is essentially the preemptive version of a. FIFO b. Shortest job first c. Shortest remaining d. Longest time first e. None of these 17. ____ is the situation in which a process is waiting on another process, which is also waiting on another process which is waiting on the first process. None of the processes involved in this circular wait are making progress. a. Deadlock b. Starvation c. Dormant d. All of these e. None of these 18. Assembly language is a _____ a. Low Level Language b. Middle Level Language c. High level Language d. User Language e. None of these 19. Which of the following is a type of translator? a. Assembler b. Compiler c. Interpreter d. All of the Above e. None of these 20. Multiprogramming systems ___ a. Are easier to develop than single programming b. Execute each job faster c. Execute more jobs in the same time
d. Are used only on large main frame computers e. None of these 21. The mechanism by which the data and functions are bound together with an a. Inheritance b. Encapsulation c. Abstraction d. Polymorphism e. None of these 22. The OSI model consists of ___layers. a. Nine b. Eight c. Seven d. Five e. Eleven 23. Decryption & Encryption of data are the responsibility of the ___ layer. a. Physical b. Data link c. Presentation d. Session e. Application 24. LANs can be connected by devices called ____ which operate in the data link layer? a. Hub b. Bridges c. HDLC d. Tunnel e. None of these 25. In a ____ topology, if there are n devices in a network, each device has n-1 ports for cable. a. Mesh b. Star c. Bus d. Ring e. None of these Question 26 to 50 26. OLAP applications are widely used by ____ and it uses ____ Schema. a. RDBMS , Bus b. Operating System ,Star c. Java , Bus
d. Data mining Techniques; Star or multidimensional e. None of these 27. Arrange the following in increasing order of their size. a. Database<File<Record<Field<Byte<Bit b. Bit<Byte<Field<Record<File<Database c. Bit>Byte>Record>Field>File>Database d. Bit>Byte>File>Record>Field>Database 28. JVM is a virtual machine that can execute ___ a. C language b. .net programming c. RDBMS d. C++ Language e. Java byte Code 29. ODBC is based on ___. a. Structured Query Language. b. C language c. C++ language d. .net e. None of these 30. Which of the following is not an advantage of the data-base approach? a. Increased security b. Elimination data redundancy c. Ability to associate related data ‘ d. Programming/data independence e. All of the above 31. In relational database row and column is called as ____and ____respectively. a. Tuple; Attribute b. Attribute; Tuple c. Tupple;Domain d. Attribute; Domain e. None of these
32. To delete a particular column in a relation the command used is: a. DELETE b. UPDATE c. DROP d. ALTER e. None of these 33. A primary key if combined with a foreign key creates a. Parent-Child relationship between the tables that connect them. b. Many to many relationship between the tables that connect them. c. Network model between the tables that connect them. d. All of the above e. None of the above 34. Which of the following is record based logical model? a. Network Model b. Object oriented model c. E-R Model d. All of these e. None of these 35. The full form of DDL is a. Dynamic Data Language b. Detailed Data Language c. Data Definition Language d. Data Derivation Language e. All of these 36. Which of the following virus overtake computer system when it boots and destroy in-formation? a. Trojan b. System infectors c. Boot infectors d. Stealth virus e. None of these
37. The relational model includes two general integrity rules. Integrity rule 1 is concerned with ____ and integrity rule 2 is concerned with ____ a. Primary Key, Foreign key b. Primary Key, composite key c. Unique key, Foreign key d. Composite Key, Foreign key e. None of these 38. ____ is person who has the central control over both data and application programs. a. System engineer b. Database administrator c. Database manager d. Technical analyst e. None of these 39. An attribute of a relation that references the primary key of another relation is known as the ____ a. Foreign Key b. Unique Key c. Parent key d. Child key e. Index key 40. An entity set that does not have sufficient attributes to form a primary key is a a. strong entity set b. weak entity set c. simple entity set d. primary entity set. e. None of these 41. The JDBC-ODBC bridge is a. Three tiered b. Multithread c. Best for any platform d. All of these e. None of these
42. In a relational database, this is a data structure that organizes the information about a single topic into row and columns. a. Block b. Record c. Tuple d. Table e. None of these 43. Which statements about the Java language are true? a. Java supports both procedural and object-oriented programming b. Java is only a procedural language. c. Java is only an Object-Oriented. d. Java is related to e. None of the above. 44. Stack is also called ____ a. First In First Out (LIFO) b. Last In First Out (FIFO) c. First In Last Out (FILO) d. First Come First Served (FCFS) e. None of the above 45. The index created by primary key column is called _____ a. Unique Index b. Composite Index c. Single Index d. Primary index e. None of these 46. In SQL ,which command(s) is(are) used to remove rows from a table. a. Delete b. Remove c. Truncate d. Both e. and (3) f. None of the above
47. In SQL, the CREATE TABLE is used a. To create a table, defining its columns, integrity constraints, and storage allocation b. To add a column/integrity constraint to a table. c. To redefine a column d. To change a table’s storage characteristics e. All of the above 48. What is the abbreviation is used for a software package that permits the user to create , retrieve and maintain records in a database? a. DASD b. CRMD c. DBMS d. All of these e. None of the above 49. Choose the right sequence of virus stages - a. Triggering, Damage ,Dormancy, propagation b. Damage, Triggering ,Dormancy, propagation c. Damage, Triggering, propagation ,Dormancy d. Triggering, Damage, propagation, Dormancy e. Dormancy, Propagation,. Triggering, Damage 50. In SQL, which command is used to add new rows to a table? a. Alter Table b. Add row c. Insert d. Append e. None of the Above SBI Specialist (Computer & Communication) 2012 Question Paper 1. To create a copy files in the event of system failure, you create a ___ a. Firewall b. Redundancy c. Backup d. Restore file e. None of these 2. Print server uses___ which is a buffler that holds before it is send to the printer.
a. Queue b. Spool c. Node d. Stack e. None of these 3. Which of the following identifies specific web page and its computer on the web page? a. Web site b. URL c. Web site address d. Domain Name e. None of these 4. _____ is the computer to computer exchange of routine business data between trading partners in standard data formats. a. CTS b. DSR c. VDR d. EDI (Electronic data interchange) e. None of these 5. Communication handler is basically an ____ 16 bit micro controller? a. 8085 b. 8086 c. 8086A d. 80C186 e. None of these 6. Which uses a Pre-Shared Key that is more than 7 and less than 64 characters in length? a. WPA-PSK b. TKIP c. AES d. All of these e. None of these 7. Ping command is used for what purpose? a. Test a device on a network whether it is reachable b. Test a hard disk fault c. Test a bug in the application d. Test devices scanning quality e. None of these 8. Two different kind of networks can be connected by using— a. Bridges b. Satellite
c. Gateway d. Routers e. None of these 9. Full adder is used to— a. 2 bit addition b. 3 bit addition c. 4 bit addition d. 6 bit addition e. None of these 10. Most important advantage of an IC is its— a. Easy replacement in case of circuit failure b. Low power consumption c. Extremely high reliability d. Reduced cost e. None of these 11. An 1C contains 50 gates each of which consists of 6 components. Its belongs to a. VLSI b. LSI c. MS1 d. SSI e. None of these 12. Which type of computers use the 8 bit code called EBCDIC? a. Minicomputers b. Mainframe computers c. Super computer d. Microcomputer e. None of these 13. An AND gate a. Implements logic addition b. Is equivalent to a series switching circuit c. Is any-or all gate d. Is equivalent to a parallel switching circuit e. None of these 14. The decimal equivalent of the binary number 11100001111 is a. 1806 b. 1807 c. 2806 d. All of these e. None of these 15. Programs in which of the following memories can’t be erased ? a. RAM
b. ROM c. Cache Memory d. Virtual Memory e. None of these 16. The IP address 135.0.10.27 belongs to address class? a. A b. B c. C d. D e. None of these 17. Which are not used in case of applet? a. Read /write b. Internet c. Search engine d. All of these e. None of these 18. Which of the following is not a type of database? a. Hierarchical b. Relational c. Network d. Transition e. None of these 19. Which of the following is not a type of SQL statement? a. Data Manipulation Language b. Data Definition language c. Data control language d. Data Standard language e. None of these 20. In Queue , the items deleted at one end is called a. Rear b. Front c. Top d. Base e. None of these 21. The drawback of the binary tree sort are remedied by the a. Linear sort b. Heap Sort c. Insertion sort d. Quick Sort e. None of these 22. White Box testing, a software testing technique is sometimes called
a. Graph testing b. Basis path c. Glass box testing d. Data flow testing e. Loop testing 23. Which of the following is used with database? a. EDI b. Credit card c. ATM d. Payment gateway e. Data mining 24. When a cracker attempts to misuse or steal data from a system, it is called a. Stealing b. Intrusion c. Virus d. Worm e. None of these 25. To modify existing rows of the table ____ statement is used. a. ALTER b. MODIFY c. UPDATE d. COMMIT e. DELETE 26. ____ refers to a family of IEEE standards dealing with local area network and metropolitan area network. a. 802 b. 800 c. 801 d. 803 e. None of these 27. Which is the general network standard for the data link layer in the OSI Reference Model? a. IEEE 802.1 b. IEEE 802.2 c. IEEE 802.3 d. IEEE 802.4 e. IEEE 802.6 28. ____ uses a standard called IEEE 802.6. a. LAN
b. WAN c. MAN d. Internet e. None of these 29. Repeater operates in which layer of OSI model? a. Application layer b. Presentation layer c. Physical layer d. Transport layer e. Data link layer 30. Where does Bridge operate in OSI model? a. Physical layer b. Data link layer c. Both (1)and (2) d. Application layer e. None of these 31. Which of the following uses the greatest number of layers in the OSI model? a. Bridge b. Repeater c. Router d. Gateway e. None of these 32. Routers operate in which layer of the OSI model? a. Physical layer b. Data link layer c. Network Layer d. All of these e. None of these 33. Modem is a _____ that modulates and demodulate signals a. DCE (Data circuit-terminating equipment) b. DTE (Data terminal equipment) c. DTE-DCE d. Both (1)and (2) e. None of these 34. A communication network which is used by large organizations over regional, national or global area is called ___
a. LAN b. WAN c. MAN d. Internet e. None of these 35. At ___ layer, TCP/IP defines two protocols :Transmission Control Protocol (TCP) and User Datagram Protocol(UDP). a. Transport layer b. Network layer c. Physical layer d. Application layer e. None of these 36. The ___ layer is the layer closest to transmission medium. a. Transport b. Network c. Data link d. Physical e. None of the above 37. End to end connectivity is provided from host to host in : a. Network layer b. Session layer c. Data link layer d. Transport layer e. None of these 38. Which of the following TCP/ IP protocol is used for transferring electronic mail messages from one machine to another? a. SNMP b. SMTP c. RPC d. FTP e. None of these 39. Which of the following is an example of a client-server model? a. FTP b. DNS c. TELNET d. All of these e. None of these
40. Which IEEE Standards is usz for Wi/Fi systems? a. 802.11 b. 802.1 c. 802.2 d. 802.3 e. 802.10 41. _____ is the continuous ability to send and receive data between interconnected networks. a. FTP b. SMTP c. TNS d. Network Interoperability e. None of these 42. What is the default subnet mask for a class B network? a. 127.0.0.1 b. 2550.0.0 c. 255.255.0.0 d. 255.255.255.0 e. None of these 43. What is loopback address? a. 127.0.0.1 b. 255.0.0.0 c. 255.255.0.0 d. 127.0.0.0 e. None of these 44. Internet-like networks within enterprises. a. Intranets b. Switching alternating c. Inter organizational networks d. Extranets e. None of these 45. A central computer surrounded by one or more satellite computers is called a a. Bus network b. Ring network c. Star network d. All of the above e. None of these
46. With an IP address of 100,you currently have 80 subnets.What subnet mask should you use to maximize the number of available hosts? a. 192 b. 240 c. 248 d. 224 e. 252 47. Encryption/decryption provides a network with____ a. Privacy b. Authenticity c. Integrity d. Non-reputation e. None of these 48. The data to be encrypted at the sender site is called ___.The data to be decrypted at receiver end is called ____ a. Secret key, public key b. Public key, secret key c. Plaintext, ciphertext d. Ciphertext, plaintext e. None of these 49. In digital signature the private key is used for ___ and the public key for ____ a. Encryption, decryption b. Decryption, encryption c. Plaintext, ciphertext d. Ciphertext, plaintext e. None of these 50. A ___ ‘s main purpose is to prohibit unauthorized access to your computer via the Internet. a. Popup blocker b. Firewall c. Spyware d. Spam assassin e. None of these

More Related Content

What's hot

Giáo trình c++ full tiếng việt
Giáo trình c++ full tiếng việtGiáo trình c++ full tiếng việt
Giáo trình c++ full tiếng việtMôi Trường Việt
 
Modèle en v
 Modèle en v Modèle en v
Modèle en vbouye2209
 
systems programming lab programs in c
systems programming lab programs in csystems programming lab programs in c
systems programming lab programs in cMeghna Roy
 
QCM système d'information
QCM système d'informationQCM système d'information
QCM système d'informationFrust Rados
 
NCNM question and answer 6.docx
NCNM question and answer  6.docxNCNM question and answer  6.docx
NCNM question and answer 6.docxRBGroup
 
concour ministre de santé
concour ministre de santéconcour ministre de santé
concour ministre de santéfast xp
 
Rwanda National council Ncnm. 2.docx
Rwanda National council Ncnm. 2.docxRwanda National council Ncnm. 2.docx
Rwanda National council Ncnm. 2.docxRBGroup
 
Presentation formation en ligne 2014 (eLearning)
Presentation formation en ligne 2014 (eLearning)Presentation formation en ligne 2014 (eLearning)
Presentation formation en ligne 2014 (eLearning)Simon Hénault
 
NCNM Council EXAMEN QUESTION ET COORRECTION.doc
NCNM Council EXAMEN  QUESTION ET COORRECTION.docNCNM Council EXAMEN  QUESTION ET COORRECTION.doc
NCNM Council EXAMEN QUESTION ET COORRECTION.docRBGroup
 
Détection communautaire dans des réseaux complexe a l'aide de l'algorithme gé...
Détection communautaire dans des réseaux complexe a l'aide de l'algorithme gé...Détection communautaire dans des réseaux complexe a l'aide de l'algorithme gé...
Détection communautaire dans des réseaux complexe a l'aide de l'algorithme gé...AHMEDBELGHITH4
 
Corrigé qcm initiation informatique sgbd - réseau - internet - architectu...
Corrigé qcm   initiation informatique   sgbd - réseau - internet - architectu...Corrigé qcm   initiation informatique   sgbd - réseau - internet - architectu...
Corrigé qcm initiation informatique sgbd - réseau - internet - architectu...Sofien Zarrouki
 
C program report tips
C program report tipsC program report tips
C program report tipsHarry Pott
 
Hướng dẫn giải toán trên máy tính Casio fx-570VN PLUS
Hướng dẫn giải toán trên máy tính Casio fx-570VN PLUSHướng dẫn giải toán trên máy tính Casio fx-570VN PLUS
Hướng dẫn giải toán trên máy tính Casio fx-570VN PLUSBình Tây Bitex
 
Mid term sem 2 1415 sol
Mid term sem 2 1415 solMid term sem 2 1415 sol
Mid term sem 2 1415 solIIUM
 
Software testing quiz questions and answers
Software testing quiz questions and answersSoftware testing quiz questions and answers
Software testing quiz questions and answersRajendraG
 
L’algorithme 1.pptx
L’algorithme 1.pptxL’algorithme 1.pptx
L’algorithme 1.pptxOkanimegamers
 

What's hot (20)

Giáo trình c++ full tiếng việt
Giáo trình c++ full tiếng việtGiáo trình c++ full tiếng việt
Giáo trình c++ full tiếng việt
 
Modèle en v
 Modèle en v Modèle en v
Modèle en v
 
systems programming lab programs in c
systems programming lab programs in csystems programming lab programs in c
systems programming lab programs in c
 
QCM système d'information
QCM système d'informationQCM système d'information
QCM système d'information
 
NCNM question and answer 6.docx
NCNM question and answer  6.docxNCNM question and answer  6.docx
NCNM question and answer 6.docx
 
concour ministre de santé
concour ministre de santéconcour ministre de santé
concour ministre de santé
 
Rwanda National council Ncnm. 2.docx
Rwanda National council Ncnm. 2.docxRwanda National council Ncnm. 2.docx
Rwanda National council Ncnm. 2.docx
 
Presentation formation en ligne 2014 (eLearning)
Presentation formation en ligne 2014 (eLearning)Presentation formation en ligne 2014 (eLearning)
Presentation formation en ligne 2014 (eLearning)
 
Developpement Web.pptx
Developpement Web.pptxDeveloppement Web.pptx
Developpement Web.pptx
 
Bece 2012
Bece 2012Bece 2012
Bece 2012
 
NCNM Council EXAMEN QUESTION ET COORRECTION.doc
NCNM Council EXAMEN  QUESTION ET COORRECTION.docNCNM Council EXAMEN  QUESTION ET COORRECTION.doc
NCNM Council EXAMEN QUESTION ET COORRECTION.doc
 
Détection communautaire dans des réseaux complexe a l'aide de l'algorithme gé...
Détection communautaire dans des réseaux complexe a l'aide de l'algorithme gé...Détection communautaire dans des réseaux complexe a l'aide de l'algorithme gé...
Détection communautaire dans des réseaux complexe a l'aide de l'algorithme gé...
 
Corrigé qcm initiation informatique sgbd - réseau - internet - architectu...
Corrigé qcm   initiation informatique   sgbd - réseau - internet - architectu...Corrigé qcm   initiation informatique   sgbd - réseau - internet - architectu...
Corrigé qcm initiation informatique sgbd - réseau - internet - architectu...
 
C program report tips
C program report tipsC program report tips
C program report tips
 
Polymorphisme, interface et classe abstraite
Polymorphisme, interface et classe abstraitePolymorphisme, interface et classe abstraite
Polymorphisme, interface et classe abstraite
 
Access
AccessAccess
Access
 
Hướng dẫn giải toán trên máy tính Casio fx-570VN PLUS
Hướng dẫn giải toán trên máy tính Casio fx-570VN PLUSHướng dẫn giải toán trên máy tính Casio fx-570VN PLUS
Hướng dẫn giải toán trên máy tính Casio fx-570VN PLUS
 
Mid term sem 2 1415 sol
Mid term sem 2 1415 solMid term sem 2 1415 sol
Mid term sem 2 1415 sol
 
Software testing quiz questions and answers
Software testing quiz questions and answersSoftware testing quiz questions and answers
Software testing quiz questions and answers
 
L’algorithme 1.pptx
L’algorithme 1.pptxL’algorithme 1.pptx
L’algorithme 1.pptx
 

Similar to SBI IT (Systems) Assistant Manager Question Paper

Basic computer mcqs
Basic computer mcqsBasic computer mcqs
Basic computer mcqsAsadMehboob4
 
Database Design 1. What is a data model A. method of sto.docx
Database Design 1.  What is a data model A. method of sto.docxDatabase Design 1.  What is a data model A. method of sto.docx
Database Design 1. What is a data model A. method of sto.docxtheodorelove43763
 
Database Design 1. What is a data model A. method of sto.docx
Database Design 1.  What is a data model A. method of sto.docxDatabase Design 1.  What is a data model A. method of sto.docx
Database Design 1. What is a data model A. method of sto.docxwhittemorelucilla
 
300+ top database management system questions and answers 2020
300+ top database management system questions and answers 2020300+ top database management system questions and answers 2020
300+ top database management system questions and answers 2020tadeseguchi
 
Database Management System And Design Questions
Database Management System And Design QuestionsDatabase Management System And Design Questions
Database Management System And Design QuestionsSamir Sabry
 
Software Engineering Question Bank.docx
Software Engineering Question Bank.docxSoftware Engineering Question Bank.docx
Software Engineering Question Bank.docxkarthikaparthasarath
 
Specialist marketing officer professional knowledge questions.pdf(1)
Specialist marketing officer professional knowledge questions.pdf(1)Specialist marketing officer professional knowledge questions.pdf(1)
Specialist marketing officer professional knowledge questions.pdf(1)Nivi Mohanty
 
Chapter 1 Introduction to Computers- Programs- and Java 1- A Java prog.pdf
Chapter 1 Introduction to Computers- Programs- and Java 1- A Java prog.pdfChapter 1 Introduction to Computers- Programs- and Java 1- A Java prog.pdf
Chapter 1 Introduction to Computers- Programs- and Java 1- A Java prog.pdfakknit
 
DIGITAL FLUENCY MULTIPLE QUESTION ANSWERS
DIGITAL FLUENCY MULTIPLE QUESTION ANSWERSDIGITAL FLUENCY MULTIPLE QUESTION ANSWERS
DIGITAL FLUENCY MULTIPLE QUESTION ANSWERSsddppml
 
Computer awareness With Answers
Computer awareness With AnswersComputer awareness With Answers
Computer awareness With AnswersBankExamsToday.com
 
Computer awareness question bank
Computer awareness question bankComputer awareness question bank
Computer awareness question bankBankExamsToday.com
 
Mcq+questions+cxc+it
Mcq+questions+cxc+itMcq+questions+cxc+it
Mcq+questions+cxc+itjimkana13
 
Bt0062 fundamentals of it model question paper
Bt0062 fundamentals of it model question paperBt0062 fundamentals of it model question paper
Bt0062 fundamentals of it model question paperAnimish Puttu
 
choose dm.pdf
choose dm.pdfchoose dm.pdf
choose dm.pdfzelalem28
 
Computer knowledge-old-papers
Computer knowledge-old-papersComputer knowledge-old-papers
Computer knowledge-old-papersneha rawat
 
Basic computer question
Basic computer questionBasic computer question
Basic computer questionABHISHEK KUMAR
 
100 Computer MCQ.pdf
100 Computer MCQ.pdf100 Computer MCQ.pdf
100 Computer MCQ.pdfFAWAD KHAN
 

Similar to SBI IT (Systems) Assistant Manager Question Paper (20)

Basic computer mcqs
Basic computer mcqsBasic computer mcqs
Basic computer mcqs
 
Database Design 1. What is a data model A. method of sto.docx
Database Design 1.  What is a data model A. method of sto.docxDatabase Design 1.  What is a data model A. method of sto.docx
Database Design 1. What is a data model A. method of sto.docx
 
Database Design 1. What is a data model A. method of sto.docx
Database Design 1.  What is a data model A. method of sto.docxDatabase Design 1.  What is a data model A. method of sto.docx
Database Design 1. What is a data model A. method of sto.docx
 
Mcq in int
Mcq in intMcq in int
Mcq in int
 
Java Programming.pdf
Java Programming.pdfJava Programming.pdf
Java Programming.pdf
 
300+ top database management system questions and answers 2020
300+ top database management system questions and answers 2020300+ top database management system questions and answers 2020
300+ top database management system questions and answers 2020
 
Database Management System And Design Questions
Database Management System And Design QuestionsDatabase Management System And Design Questions
Database Management System And Design Questions
 
Software Engineering Question Bank.docx
Software Engineering Question Bank.docxSoftware Engineering Question Bank.docx
Software Engineering Question Bank.docx
 
Specialist marketing officer professional knowledge questions.pdf(1)
Specialist marketing officer professional knowledge questions.pdf(1)Specialist marketing officer professional knowledge questions.pdf(1)
Specialist marketing officer professional knowledge questions.pdf(1)
 
Chapter 1 Introduction to Computers- Programs- and Java 1- A Java prog.pdf
Chapter 1 Introduction to Computers- Programs- and Java 1- A Java prog.pdfChapter 1 Introduction to Computers- Programs- and Java 1- A Java prog.pdf
Chapter 1 Introduction to Computers- Programs- and Java 1- A Java prog.pdf
 
DIGITAL FLUENCY MULTIPLE QUESTION ANSWERS
DIGITAL FLUENCY MULTIPLE QUESTION ANSWERSDIGITAL FLUENCY MULTIPLE QUESTION ANSWERS
DIGITAL FLUENCY MULTIPLE QUESTION ANSWERS
 
Computer awareness With Answers
Computer awareness With AnswersComputer awareness With Answers
Computer awareness With Answers
 
Computer awareness question bank
Computer awareness question bankComputer awareness question bank
Computer awareness question bank
 
ASSIGNMENT
ASSIGNMENTASSIGNMENT
ASSIGNMENT
 
Mcq+questions+cxc+it
Mcq+questions+cxc+itMcq+questions+cxc+it
Mcq+questions+cxc+it
 
Bt0062 fundamentals of it model question paper
Bt0062 fundamentals of it model question paperBt0062 fundamentals of it model question paper
Bt0062 fundamentals of it model question paper
 
choose dm.pdf
choose dm.pdfchoose dm.pdf
choose dm.pdf
 
Computer knowledge-old-papers
Computer knowledge-old-papersComputer knowledge-old-papers
Computer knowledge-old-papers
 
Basic computer question
Basic computer questionBasic computer question
Basic computer question
 
100 Computer MCQ.pdf
100 Computer MCQ.pdf100 Computer MCQ.pdf
100 Computer MCQ.pdf
 

Recently uploaded

Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 

Recently uploaded (20)

Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 

SBI IT (Systems) Assistant Manager Question Paper

  • 1. SBI IT (Systems) Assistant Manager 2012 Question Paper 1. In SQL, which of the following is not a data Manipulation Language Commands? a. Delete b. Select c. Update d. Create e. None of the above 2. The value for an attribute or a column are drawn from a set of values known as – a. Tuples b. Attributes c. Domain d. Column e. None of these 3. Entities having primary key are called a. Primary Key b. Strong entities c. Weak entities d. Primary Key e. None Of these 4. Which of the following is not a type of SQL statement? a. Data Manipulation Language (DML) b. Data Definition Language (DDL) c. Data Control Language (DCL) d. Data Communication Language (DCL) e. None of these 5. Which of the following is not included in DML (Data Manipulation Language) a. INSERT b. UPDATE c. DELETE d. CREATE e. None of these 6. TRUNCATE statement in SQL is a – a. DML statement b. DDL statement c. DCL statement d. DSL statement e. None of these 7. To discard all pending data changes a. COMMIT
  • 2. b. ROLLBACK c. SAVEPOINT d. LOCK e. None of these 8. Which of the following term is related to the stack? a. TOP b. PUSH c. POP d. Rear e. A, B and C. 9. In Queues, the end from where items inserted is called a. Rear b. Front c. Top d. Base e. None of these 10. Which protocol is used for browsing website: a. TCP b. FITFP c. FTP d. TFTP e. None of these 11. Which of the following is a browser? a. Netscape Navigator b. Mosaic c. Mozilla Firefox d. Google chrome e. All of these 12. Black Box Testing sometime called – a. Data flow testing b. Loop testing c. Behavioral testing d. Graph based testing e. None of these 13. The Objective of testing is a. Debugging b. To uncover errors c. To gain modularity d. To analyze system e. None of these 14. Choose the right sequence of SDLC (Software development life cycle) steps
  • 3. a. Design, Requirement Analysis, Coding, Testing b. Requirement Analysis, Design, Coding, Testing c. Requirement Analysis, Design, Testing, Coding d. Requirement Analysis, Coding, Design, Testing e. None of these 15. The drawback of the binary tree sort are remedied by the a. Linear Sort b. Quick Sort c. Heap Sort d. Insertion Sort e. All of these 16. Round robin scheduling is essentially the preemptive version of a. FIFO b. Shortest job first c. Shortest remaining d. Longest time first e. None of these 17. ____ is the situation in which a process is waiting on another process, which is also waiting on another process which is waiting on the first process. None of the processes involved in this circular wait are making progress. a. Deadlock b. Starvation c. Dormant d. All of these e. None of these 18. Assembly language is a _____ a. Low Level Language b. Middle Level Language c. High level Language d. User Language e. None of these 19. Which of the following is a type of translator? a. Assembler b. Compiler c. Interpreter d. All of the Above e. None of these 20. Multiprogramming systems ___ a. Are easier to develop than single programming b. Execute each job faster c. Execute more jobs in the same time
  • 4. d. Are used only on large main frame computers e. None of these 21. The mechanism by which the data and functions are bound together with an a. Inheritance b. Encapsulation c. Abstraction d. Polymorphism e. None of these 22. The OSI model consists of ___layers. a. Nine b. Eight c. Seven d. Five e. Eleven 23. Decryption & Encryption of data are the responsibility of the ___ layer. a. Physical b. Data link c. Presentation d. Session e. Application 24. LANs can be connected by devices called ____ which operate in the data link layer? a. Hub b. Bridges c. HDLC d. Tunnel e. None of these 25. In a ____ topology, if there are n devices in a network, each device has n-1 ports for cable. a. Mesh b. Star c. Bus d. Ring e. None of these Question 26 to 50 26. OLAP applications are widely used by ____ and it uses ____ Schema. a. RDBMS , Bus b. Operating System ,Star c. Java , Bus
  • 5. d. Data mining Techniques; Star or multidimensional e. None of these 27. Arrange the following in increasing order of their size. a. Database<File<Record<Field<Byte<Bit b. Bit<Byte<Field<Record<File<Database c. Bit>Byte>Record>Field>File>Database d. Bit>Byte>File>Record>Field>Database 28. JVM is a virtual machine that can execute ___ a. C language b. .net programming c. RDBMS d. C++ Language e. Java byte Code 29. ODBC is based on ___. a. Structured Query Language. b. C language c. C++ language d. .net e. None of these 30. Which of the following is not an advantage of the data-base approach? a. Increased security b. Elimination data redundancy c. Ability to associate related data ‘ d. Programming/data independence e. All of the above 31. In relational database row and column is called as ____and ____respectively. a. Tuple; Attribute b. Attribute; Tuple c. Tupple;Domain d. Attribute; Domain e. None of these
  • 6. 32. To delete a particular column in a relation the command used is: a. DELETE b. UPDATE c. DROP d. ALTER e. None of these 33. A primary key if combined with a foreign key creates a. Parent-Child relationship between the tables that connect them. b. Many to many relationship between the tables that connect them. c. Network model between the tables that connect them. d. All of the above e. None of the above 34. Which of the following is record based logical model? a. Network Model b. Object oriented model c. E-R Model d. All of these e. None of these 35. The full form of DDL is a. Dynamic Data Language b. Detailed Data Language c. Data Definition Language d. Data Derivation Language e. All of these 36. Which of the following virus overtake computer system when it boots and destroy in-formation? a. Trojan b. System infectors c. Boot infectors d. Stealth virus e. None of these
  • 7. 37. The relational model includes two general integrity rules. Integrity rule 1 is concerned with ____ and integrity rule 2 is concerned with ____ a. Primary Key, Foreign key b. Primary Key, composite key c. Unique key, Foreign key d. Composite Key, Foreign key e. None of these 38. ____ is person who has the central control over both data and application programs. a. System engineer b. Database administrator c. Database manager d. Technical analyst e. None of these 39. An attribute of a relation that references the primary key of another relation is known as the ____ a. Foreign Key b. Unique Key c. Parent key d. Child key e. Index key 40. An entity set that does not have sufficient attributes to form a primary key is a a. strong entity set b. weak entity set c. simple entity set d. primary entity set. e. None of these 41. The JDBC-ODBC bridge is a. Three tiered b. Multithread c. Best for any platform d. All of these e. None of these
  • 8. 42. In a relational database, this is a data structure that organizes the information about a single topic into row and columns. a. Block b. Record c. Tuple d. Table e. None of these 43. Which statements about the Java language are true? a. Java supports both procedural and object-oriented programming b. Java is only a procedural language. c. Java is only an Object-Oriented. d. Java is related to e. None of the above. 44. Stack is also called ____ a. First In First Out (LIFO) b. Last In First Out (FIFO) c. First In Last Out (FILO) d. First Come First Served (FCFS) e. None of the above 45. The index created by primary key column is called _____ a. Unique Index b. Composite Index c. Single Index d. Primary index e. None of these 46. In SQL ,which command(s) is(are) used to remove rows from a table. a. Delete b. Remove c. Truncate d. Both e. and (3) f. None of the above
  • 9. 47. In SQL, the CREATE TABLE is used a. To create a table, defining its columns, integrity constraints, and storage allocation b. To add a column/integrity constraint to a table. c. To redefine a column d. To change a table’s storage characteristics e. All of the above 48. What is the abbreviation is used for a software package that permits the user to create , retrieve and maintain records in a database? a. DASD b. CRMD c. DBMS d. All of these e. None of the above 49. Choose the right sequence of virus stages - a. Triggering, Damage ,Dormancy, propagation b. Damage, Triggering ,Dormancy, propagation c. Damage, Triggering, propagation ,Dormancy d. Triggering, Damage, propagation, Dormancy e. Dormancy, Propagation,. Triggering, Damage 50. In SQL, which command is used to add new rows to a table? a. Alter Table b. Add row c. Insert d. Append e. None of the Above SBI Specialist (Computer & Communication) 2012 Question Paper 1. To create a copy files in the event of system failure, you create a ___ a. Firewall b. Redundancy c. Backup d. Restore file e. None of these 2. Print server uses___ which is a buffler that holds before it is send to the printer.
  • 10. a. Queue b. Spool c. Node d. Stack e. None of these 3. Which of the following identifies specific web page and its computer on the web page? a. Web site b. URL c. Web site address d. Domain Name e. None of these 4. _____ is the computer to computer exchange of routine business data between trading partners in standard data formats. a. CTS b. DSR c. VDR d. EDI (Electronic data interchange) e. None of these 5. Communication handler is basically an ____ 16 bit micro controller? a. 8085 b. 8086 c. 8086A d. 80C186 e. None of these 6. Which uses a Pre-Shared Key that is more than 7 and less than 64 characters in length? a. WPA-PSK b. TKIP c. AES d. All of these e. None of these 7. Ping command is used for what purpose? a. Test a device on a network whether it is reachable b. Test a hard disk fault c. Test a bug in the application d. Test devices scanning quality e. None of these 8. Two different kind of networks can be connected by using— a. Bridges b. Satellite
  • 11. c. Gateway d. Routers e. None of these 9. Full adder is used to— a. 2 bit addition b. 3 bit addition c. 4 bit addition d. 6 bit addition e. None of these 10. Most important advantage of an IC is its— a. Easy replacement in case of circuit failure b. Low power consumption c. Extremely high reliability d. Reduced cost e. None of these 11. An 1C contains 50 gates each of which consists of 6 components. Its belongs to a. VLSI b. LSI c. MS1 d. SSI e. None of these 12. Which type of computers use the 8 bit code called EBCDIC? a. Minicomputers b. Mainframe computers c. Super computer d. Microcomputer e. None of these 13. An AND gate a. Implements logic addition b. Is equivalent to a series switching circuit c. Is any-or all gate d. Is equivalent to a parallel switching circuit e. None of these 14. The decimal equivalent of the binary number 11100001111 is a. 1806 b. 1807 c. 2806 d. All of these e. None of these 15. Programs in which of the following memories can’t be erased ? a. RAM
  • 12. b. ROM c. Cache Memory d. Virtual Memory e. None of these 16. The IP address 135.0.10.27 belongs to address class? a. A b. B c. C d. D e. None of these 17. Which are not used in case of applet? a. Read /write b. Internet c. Search engine d. All of these e. None of these 18. Which of the following is not a type of database? a. Hierarchical b. Relational c. Network d. Transition e. None of these 19. Which of the following is not a type of SQL statement? a. Data Manipulation Language b. Data Definition language c. Data control language d. Data Standard language e. None of these 20. In Queue , the items deleted at one end is called a. Rear b. Front c. Top d. Base e. None of these 21. The drawback of the binary tree sort are remedied by the a. Linear sort b. Heap Sort c. Insertion sort d. Quick Sort e. None of these 22. White Box testing, a software testing technique is sometimes called
  • 13. a. Graph testing b. Basis path c. Glass box testing d. Data flow testing e. Loop testing 23. Which of the following is used with database? a. EDI b. Credit card c. ATM d. Payment gateway e. Data mining 24. When a cracker attempts to misuse or steal data from a system, it is called a. Stealing b. Intrusion c. Virus d. Worm e. None of these 25. To modify existing rows of the table ____ statement is used. a. ALTER b. MODIFY c. UPDATE d. COMMIT e. DELETE 26. ____ refers to a family of IEEE standards dealing with local area network and metropolitan area network. a. 802 b. 800 c. 801 d. 803 e. None of these 27. Which is the general network standard for the data link layer in the OSI Reference Model? a. IEEE 802.1 b. IEEE 802.2 c. IEEE 802.3 d. IEEE 802.4 e. IEEE 802.6 28. ____ uses a standard called IEEE 802.6. a. LAN
  • 14. b. WAN c. MAN d. Internet e. None of these 29. Repeater operates in which layer of OSI model? a. Application layer b. Presentation layer c. Physical layer d. Transport layer e. Data link layer 30. Where does Bridge operate in OSI model? a. Physical layer b. Data link layer c. Both (1)and (2) d. Application layer e. None of these 31. Which of the following uses the greatest number of layers in the OSI model? a. Bridge b. Repeater c. Router d. Gateway e. None of these 32. Routers operate in which layer of the OSI model? a. Physical layer b. Data link layer c. Network Layer d. All of these e. None of these 33. Modem is a _____ that modulates and demodulate signals a. DCE (Data circuit-terminating equipment) b. DTE (Data terminal equipment) c. DTE-DCE d. Both (1)and (2) e. None of these 34. A communication network which is used by large organizations over regional, national or global area is called ___
  • 15. a. LAN b. WAN c. MAN d. Internet e. None of these 35. At ___ layer, TCP/IP defines two protocols :Transmission Control Protocol (TCP) and User Datagram Protocol(UDP). a. Transport layer b. Network layer c. Physical layer d. Application layer e. None of these 36. The ___ layer is the layer closest to transmission medium. a. Transport b. Network c. Data link d. Physical e. None of the above 37. End to end connectivity is provided from host to host in : a. Network layer b. Session layer c. Data link layer d. Transport layer e. None of these 38. Which of the following TCP/ IP protocol is used for transferring electronic mail messages from one machine to another? a. SNMP b. SMTP c. RPC d. FTP e. None of these 39. Which of the following is an example of a client-server model? a. FTP b. DNS c. TELNET d. All of these e. None of these
  • 16. 40. Which IEEE Standards is usz for Wi/Fi systems? a. 802.11 b. 802.1 c. 802.2 d. 802.3 e. 802.10 41. _____ is the continuous ability to send and receive data between interconnected networks. a. FTP b. SMTP c. TNS d. Network Interoperability e. None of these 42. What is the default subnet mask for a class B network? a. 127.0.0.1 b. 2550.0.0 c. 255.255.0.0 d. 255.255.255.0 e. None of these 43. What is loopback address? a. 127.0.0.1 b. 255.0.0.0 c. 255.255.0.0 d. 127.0.0.0 e. None of these 44. Internet-like networks within enterprises. a. Intranets b. Switching alternating c. Inter organizational networks d. Extranets e. None of these 45. A central computer surrounded by one or more satellite computers is called a a. Bus network b. Ring network c. Star network d. All of the above e. None of these
  • 17. 46. With an IP address of 100,you currently have 80 subnets.What subnet mask should you use to maximize the number of available hosts? a. 192 b. 240 c. 248 d. 224 e. 252 47. Encryption/decryption provides a network with____ a. Privacy b. Authenticity c. Integrity d. Non-reputation e. None of these 48. The data to be encrypted at the sender site is called ___.The data to be decrypted at receiver end is called ____ a. Secret key, public key b. Public key, secret key c. Plaintext, ciphertext d. Ciphertext, plaintext e. None of these 49. In digital signature the private key is used for ___ and the public key for ____ a. Encryption, decryption b. Decryption, encryption c. Plaintext, ciphertext d. Ciphertext, plaintext e. None of these 50. A ___ ‘s main purpose is to prohibit unauthorized access to your computer via the Internet. a. Popup blocker b. Firewall c. Spyware d. Spam assassin e. None of these