PROFESSIONAL KNOWLEDGE ( SBI SO ( IT Officer ) Exam , 17-01-2016- Previous Year Paper)

2

                                Reasoning  ||  Quantitative Aptitude  ||  English  || Professional Knowledge

 

PROFESSIONAL KNOWLEDGE

DOWNLOAD ALL PAPERS IN PDF

 

    1. How many types of dimensions exist in Cloud cube model ?
      (1) 6
      (2) 3
      (3) 4
      (4) 2
      (5) 1

      Show Answer


      Solution :  3
    2. System analysts work with end users to determine the features that must be included in a new IT application. These are called … .
      (1) implications
      (2) requirements
      (3) effects
      (4) core functions
      (5) critical processes

      Show Answer


      Solution :  2
    3. What is full form of SOA, a method to improve availability in ITL ?
      (1) Service ability of Applications
      (2) Service Outage Analysis
      (3) Service Offer Adjustment
      (4) Systematic Operational Adjustment
      (5) System Optimization Approach

      Show Answer


      Solution :  2
    4. Which of the following is not a Web App interface mechanism ?
      (1) Cookies
      (2) Forms
      (3) Browser
      (4) Cookies and Links
      (5) Links

      Show Answer


      Solution :  2
    5. Which of the following is true of three-tier data worehouses ?
      (1) Once created, the data marts will directly receive their new data from the operational databases.
      (2) The data mart combines all the tables of the data warehouse.
      (3) The data marts are different groups of tables in the data warehouse.
      (4) Once created,- the data marts will keep on being updated from the data warehouse at periodic times.
      (5) A data mart becomes a data warehouse when it reaches a critical size.

      Show Answer


      Solution :  4
    6. Which of the following can help to detect transmission errors by appending specially calculated bits into the each segment of data ?
      (1) Parity check
      (2) Integrity check
      (3) Accuracy check
      (4) Redundancy check
      (5) Completeness check

      Show Answer


      Solution :  4
    7. SQL security issues include which of the following ?
      (1) The complexity of key structures
      (2) The number of records
      (3) The size of databases
      (4) The number of candidate key elements
      (5) Granularity of administration

      Show Answer


      Solution :  5
    8. What is the technical name of a wireless network ?
      (1) SSID
      (2) SSO
      (3) WPAD
      (4) WPA
      (5) BSSID

      Show Answer


      Solution :  1
    9. If you are connected to your internal network, what should you check if you cannot connect to with servers on the internet ?
      (1) Administrative rights
      (2) NTFS permissions
      (3) Browser settings
      (4) Proxy settings
      (5) UAC

      Show Answer


      Solution :  4
    10. To define what columns should be displayed in an SQL, SELECT statement ………………..
      (1) use USING to name the source table(s).
      (2) use SELECT to name the source table(s) and list the columns to be shown after USING.
      (3) use USING to name the source table(s) and list the columns to be shown after SELECT.
      (4) use FROM to name the source table(s) and list the columns to be shown after SELECT.
      (5) use USING to name the source table(s) and list the columns to be shown after WHERE.

      Show Answer


      Solution :  4



    1. Which method of database recovery involves frequent simultaneous copying of the database to maintain two or more to complete copies of the database ?
      (1) Rollback
      (2) Mirroring
      (3) Reprocessing
      (4) Rollforward
      (5) Rolling

      Show Answer


      Solution :  1
    2. Which of the following is a CASE SQL statement ?
      (1) A way to establish a data definition in SQL.
      (2) A way to establish an IF-THEN-ELSE in SQL.
      (3) Establish a loop in SQL or establish an IF-THEN-ELSE in SQL.
      (4) A way to establish a loop in SQL.
      (5) A way to establish a data definition in SQL or establish a loop in SQL.

      Show Answer


      Solution :  3
    3. Which script you must query in Oracle to display the code associated with RMAN stored scripts ?
      A. RC_STORED_SCR1PT_LINE
      B. RC_STORED_SCRIPT
      C. RC_STORED_LINE_SCRIPT
      D. RC_SCRIPT S
      E. RC_SCRIPTS in RC STORED SCRIPT
      (1) Both A & C
      (2) Both A & B
      (3) Both B & D
      (4) Only A
      (5) Only B

      Show Answer


      Solution :  2
    4. Which of the following is a dynamic analysis tool for the purpose of testing software modules ?
      (1) Black box test
      (2) Design and code
      (3) Structured walk through
      (4) Green box testing
      (5) Desk checking

      Show Answer


      Solution :  1
    5. Which of the following accesses the database and data dictionary in a database as they exist on a storage device ?
      (1) DBMS engine
      (2) Data administration system
      (3) Application generation subsystem
      (4) Data definition subsystem
      (5) Data manipulation subsystem

      Show Answer


      Solution :  1
    6. What is a reliable technique for estimating the scope and cost of a software-development project ?
      (1) PERT
      (2) GANTT
      (3) Function Point Analysis (FPA)
      (4) Regression
      (5) Feature Point Analysis (FPA)

      Show Answer


      Solution :  3
    7. Which of the following is not one of the elements that needs to be considered when constructing
      WebApp server side configuration hosts ?
      (1) System security measures
      (2) Browser compatibility
      (3) Operating system compatibility
      (4) Database software integration
      (5) System security measures and OS compatibility

      Show Answer


      Solution :  2
    8. What is the main purpose of NCS software ?
      (1) To prevent viruses from entering a network
      (2) To ensure all users know how to use Windows
      (3) To prevent worms from entering a network
      (4) To control and coordinate activities and provide security in a network
      (5) To monitor the router settings

      Show Answer


      Solution :  4
    9.  Online banking transactions are being posted to the database when processing suddenly comes to a hat. The integrity of the transaction processing is best ensured by ………………….
      (1) accuracy checks
      (2) database integrity checks
      (3) input controls
      (4) validation checks
      (5) Database commits and rollbacks

      Show Answer


      Solution :  5
    10. Which one is not a phase of the systems development life cycle ?
      (1) Problem analysis
      (2) Decision analysis
      (3) Requirements analysis
      (4) Post-implementation review
      (5) Scope definition

      Show Answer


      Solution :  4



    1. Who is more concerned about the conceptual level at DBMS ?
      (1) The system programmer
      (2) Database viewer
      (3) DBA
      (4) The end user 151 Client

      Show Answer


      Solution :  3
    2. The simplest model in software development is ……………….
      (1) Iterative
      (2) COCOBC model
      (3) spiral
      (4) waterfall model
      (5) prototyping

      Show Answer


      Solution :  4
    3. Which of the following are effective controls for detecting duplicate transactions such as payments made or received ?
      (1) Time stamps
      (2) Concurrency controls
      (3) Referential integrity controls
      (4) Concurrency controls and referential integrity controls
      (5) Reasonableness checks

      Show Answer


      Solution :  1
    4. Which of the following statements is false ?
      (1) Pointers are very useful.
      (2) Pointers store the next data element of a list
      (3) Data elements in linked lists need not be stored in adjacent space in memory
      (4) Linked lists are collection of the nodes that contain information part and next pointer
      (5) Arrays are dense lists and static data structure.

      Show Answer


      Solution :  2
    5. ………………..is a standard for security that is located at the network or packet processing layer of network communications, as opposed to the application layer.
      (1) TCP
      (2) SQL
      (3) IPsec
      (4) S-HTTP
      (5) passive FTP

      Show Answer


      Solution :  3
    6. A thin, credit-card size device used principally on Laptop computers to expand its capabilities is……………
      (1) special card
      (2) smart card
      (3) expansion card
      (4) flash card
      (5) PC card

      Show Answer


      Solution :  5
    7. In the concept of object orientation, …………………….
      (1) Users change properties and cell functions
      (2) Designers can only call functions
      (3) Designers can only call calculations
      (4) Users change properties with their input devices
      (5) Designers convert binary data into object functions

      Show Answer


      Solution :  5
    8. Which OSI layer defines the standards for cabling and connectors ?
      (1) Layer 5, 6 or 7
      (2) Layer 3
      (3) Layer 2
      (4) Layer 1
      (5) Layer 4

      Show Answer


      Solution :  4
    9. Of the three major types of off-site processing facilities, what type is often an acceptable solution for preparing for recovery of noncritical systems and data ?
      (1) Cold site
      (2) Hot site
      (3) Alternate site
      (4) Warm site
      (5) None of the above

      Show Answer


      Solution :  1
    10. What type of BCP test user adjusts resources to simulate a system crash and validate the plan’s effectiveness ?
      (1) Paper
      (2) Preparedness
      (3) Walk-through
      (4) Parallel
      (5) None of the above

      Show Answer


      Solution :  2
    11.  Data mining is used to aid in………………………..
      (1) analyzing current decisions made by managers.
      (2) operational management
      (3) retrieving archival data
      (4) analysing past decisions made by managers
      (5) detecting patterns in operational data

      Show Answer


      Solution :  5



  1. Which of the following is best characterized by unauthorized modification of data before or during systems data entry ?
    (1) Data modelling
    (2) Salami attack
    (3) Data corruption
    (4) Data diddling
    (5) Skimming

    Show Answer


    Solution :  4
  2. Which of the following provid network redundancy in a local network environment ?
    (1) Shadowing
    (2) Mirroring
    (3) Mirroring and Shadowing
    (4) Duplexing
    (5) Dual backbones

    Show Answer


    Solution :  5
  3. On point-to-point networks, OSPF hello packets are addressed to which address ?
    (1) 27.0.0.1
    (2) 172.16.0.1
    (3) 224.0.0.5
    (4) 192.168.0.5
    (5) 224.255.255.255

    Show Answer


    Solution :  3
  4. The first phase of software development is…………………
    (1) Testing
    (2) Coding
    (3) Implementation
    (4) Design
    (5) Requirement analysis

    Show Answer


    Solution :  5
  5.  What is a scripting language ?
    (1) A powerful type of programming language
    (2) A programming language for creating websites
    (3) A more complex programming language
    (4) A programming language for writing operating systems
    (5) A programming language used within another application or domain

    Show Answer


    Solution :  3
  6. Which of the following do digital signatures provide ?
    (1) Authentication and integrity of data
    (2) Confidentiality and availability of data
    (3) Authentication and confidentiality of data
    (4) Confidentiality and integrity of data
    (5) Authentication and availability of data

    Show Answer


    Solution :  1
  7. SQL commands do not include which of the following ?
    (1) Delete, Insert
    (2) Select, Update
    (3) Select, Revoke
    (4) Grant, Revoke
    (5) Select, Revoke

    Show Answer


    Solution :  4
  8. Which of the following is a primary high level used when reviewing a system development project ?
    (1) Ensure that business objectives are achieved
    (2) Ensure that proper approval for this project has been obtained
    (3) Ensure that programming and processing environments are segregated
    (4) Ensure that projects are monitored and administrated effectively
    (5) Costs have been identified correctly

    Show Answer


    Solution :  1
  9. Which of the following codes must be granted to an Oracle 9x to perform a full database import ?
    (1) CONNECT
    (2) RESOURCE
    (3) FULL_REPORT_PREVS
    (4) FULL_REPORT_PRINS
    (5) IMP_FULL_DATABASE

    Show Answer


    Solution :  5
  10. The Oracle environment of database is called as ……………..
    (1) Data types
    (2) Data structure
    (3) Database. instances
    (4) Database schema
    (5) Data values

    Show Answer


    Solution :  4
  11. Which of the following are true of Enterprise Systems ?
    (1) They include servers, databases and networks
    (2) They require specialized computer hardware
    (3) They are limited to access within the physical building
    (4) They require special locations
    (5) They require specialized computer software

    Show Answer


    Solution :  1
  12.  What does CIDR, a method of allocating IP addresses, stand for ?
    (1) Classless Inter-domain Routing
    (2) Classless IP Default Routing
    (3) Glassful IP D-class Routing
    (4) Classless IP D-class Routing
    (5) Glassful Information Routing

    Show Answer


    Solution :  1
  13. What tool is used to view the hardware and software loaded on a Windows server ?
    (1) KB Tool
    (2) System Information
    (3) System configuration
    (4) POST
    (5) Device manager

    Show Answer


    Solution :  2
  14. Which of the following is not one of the objectives of the WebApp content testing ?
    (1) Identify linking errors
    (2) Uncover semantic errors
    (3) Uncover syntactic errors
    (4) Uncover semantic and syntactic errors
    (5) Find organizational Or structure errors

    Show Answer


    Solution :  1
  15. A server farm is an example of……………………..
    (1) Multiple servers
    (2) Redundant servers
    (3) Server clustering
    (4) Stand-alone server
    (5) Serve fault tolerance

    Show Answer


    Solution :  3
  16. Map entities, attributes and relations in Oracle is represented by …………………
    (1) Special Schema
    (2) Conceptual and Physical Schema
    (3) Logical Schema
    (4) Physical Schema
    (5) Conceptual Schema

    Show Answer


    Solution :  2
  17. Which of the following cloud concept is related to posting and sharing of resources ?
    (1) Visualization
    (2) Abstraction
    (3) Virtualisation
    (4) Polymorphism
    (5) Collectivism

    Show Answer


    Solution :  3
  18. A systems analysis test used to display how data moves through a new program design is called a(n)………….
    (1) data logic chart
    (2) dataflow diagram
    (3) system flowchart
    (4) software logic diagram
    (5) web-relationship illustration

    Show Answer


    Solution :  2
  19. Which one of the following control steps is usually not performed in data warehousing applications ?
    (1) Monitor summary tables for regular use
    (2) Cleaning up the data
    (3) Control meta data from being used interactively.
    (4) Reconcile data moved between the operations environment and data warehouse
    (5) Monitor the data purging plan

    Show Answer


    Solution :  1

Leave A Reply

Your email address will not be published.

2 Comments

  1. Ashi says

    share more questions of previous year papers….

  2. Anonymous says

    Answer to the 11th question is Mirroring.