Central Bank of India IT Officer Model Question Paper Answer Download

Central Bank of India IT Officer Model Question Paper Answer DownloadCentral Bank of India IT Officer Model Question Paper Answer Download.

Central Bank of India IT Officer Model | Sample | Mock Test Question Paper for 2019-20 Exam, This Central Bank of India IT Officer Question are based on the syllabus but here some of the question may out of syllabus, just for your better exam preparation.

This Central Bank of India IT Officer Paper will help all the students for their preparation, here the question type is MCQ i.e multiple choice question answers, if this Central Bank of India IT Officer question paper in pdf file format you can download it in FREE, if Central Bank of India paper in text format you can download Central Bank of India page also just Go to menu bar, Click on File->then Save.

Central Bank of India IT Officer Model Question Paper Answer Download.

If you need more Central Bank of India IT Officer Sample | Model Paper for 2019-20 or Central Bank of India Mock Test Paper with or with out solutions for 2019-20

exam, you can request us just post a comment (Check end of this page), For better preparation you can also check Central Bank of India reference books.

 

The output of the following program
main( )
{ int a[ ] = { 2,3,4,6,5};
int *p = a;
for (int i = 0; i < 5; i++)
printf(“%d,”,++*p);
}
is
(A) 3, 4, 5, 6, 7
(B) 3, 4, 5, 7, 6
(C) 3, 4, 6, 5, 0
(D) 3, 4, 5, 6, 6

The program
main( )
{ int a = 256, *p=&a;
printf(“%d”,*p>>5);
}
prints
(A) 2
(B) 4
(C) 6
(D) 8

A computer program that converts an entire program into machine language at one time is called a/an

(A) interpreter (B) simulator
(C) compiler (D) commander

All the keys on the IBM PC key board repeat as long as we hold them down. Such type of keys are known as

(A) typematic keys
(B) functional keys
(C) automatic keys
(D) alphabetic keys

The output of the following program
main( )
{
int a[ ] = “computation”;
char *p = a, b=’ ‘;
for (int i = 1; i < 12; i++)
if(i%4) continue;
else a[i]=b;
puts(p);
}
is
(A) comp
(B) comp tat on
(C) com utat on
(D) comp tati n

What does the acronym ISDN stands for

(A) Indian Standard Digital Network
(B) Integrated Services Digital Network
(C) Intelligent Service Digital Network
(D) Integrated Services Data Network

 

Two basic types of operating system are

(A) sequential and direct
(B) batch and time sharing
(C) direct and interactive
(D) batch and interactive

Which of the following entity does not belong to word processing

(A) characters (B) words
(C) cells (D) paragraphs

The natural mask for class C IP address is _______ .
(A) 255.255.255.0 (B) 255.255.0.0
(C) 255.0.0.0 (D) 255.255.255.255

In C++, if a catch statement is written to catch exception objects of a base class type, it
can also catch all ______ derived from that base class.
(A) Exceptions for objects (B) Objects of classes
(C) Arguments (D) Errors

A schema describes

(A) data elements
(B) records and filer
(C) record relationship
(D) all of the above

Which of the following is not a tool used to manage and control schedule performance

(A) CAD (B) PERT
(C) CPM (D) Gantt Chart

An expert system differs from a data base program in that only an expert system

(A) contains declarative knowledge
(B) contains procedural knowledge
(C) features the retrieval of stored information
(D) experts users to draw own conclusion

The virtual memory addressing capability of 80386 is

(A) 4 GB (B) 16 GB
(C) 64 GB (D) 64 TB

The 80486 microprocessor from Intel consists of

(A) a fast 32 bit CPU but no coprocessor
(B) a 32 bit CPU and an 80387 coprocessor only
(C) a 32 bit CPU, a 80387 coprocessor and memory management unit (MMU) only
(D) a 32 bit CPU, a 80387 coprocessor, memory management unit and a cache memory

Which of the following file transfer protocols use TCP and establishes two virtual circuits between the local
and remote server ?
(A) FTP
(B) TFTP
(C) TELNET
(D) NFS

Frequency shift keying is used mostly in
(A) Radio transmission
(B) Telegraphy
(C) Telephone
(D) None of the above

The baud rate is
(A) always equal to the bit transfer
rate
(B) equal to twice the bandwidth
of an ideal channel
(C) not equal to the signalling rate
(D) equal to half of the bandwidth
of an ideal channel

Object code is the output of ______.
(A) Operating System
(B) Compiler or Assembler
(C) only Assembler
(D) only Compiler

‘Macro’ in an assembly level
program is _______.
(A) sub program
(B) a complete program
(C) a hardware portion
(D) relative coding

Advantage of synchronous sequential circuits over
asynchronous ones is

(A) faster operation
(B) ease of avoiding problems due to hazard
(C) lower hardware requirement
(D) better noise immunity

What is the transitive voltage for the voltage input of a CMOS operating from 10V supply ?
(A) 1V (B) 2V
(C) 5V (D) 10 V

What is decimal equivalent of BCD 11011.1100 ?
(A) 22.0 (B) 22.2
(C) 20.2 (D) 21.2

What will be the output of the following c-code ?
void main ( )
{
char *P = “ayqm” ;
char c;
c = ++*p ;
printf (“%c”, c);
}

(A) a (B) c
(C) b (D) q

The data type created by the data
abstraction process is called
(A) class
(B) structure
(C) abstract data type
(D) user defined data type

An entity instance is a single
occurrence of an _______.
(A) entity type
(B) relationship type
(C) entity and relationship type
(D) None of these

Grammar of the programming is checked at ________ phase of
compiler.

(A) semantic analysis
(B) code generation
(C) syntax analysis
(D) code optimization

WINDOWS is a _________ operating.
(A) Real time
(B) Multi-user
(C) Preemptive
(D) Non-preemptive

Generalization is _______ process.
(A) top-down
(B) bottom up
(C) both (A) & (B)
(D) None of these

Which data management language component enabled the DBA to define the schema components ?
(A) DML
(B) Sub-schema DLL
(C) Schema DLL
(D) All of these

The ______ field is the SNMP PDV reports an error in a response
message.
(A) error index
(B) error status
(C) set request
(D) agent index

End-to-End connectivity is provided from Last-to-Last in
(A) Network layer
(B) Session layer
(C) Transport layer
(D) Data link layer

Page making process from main
memory to disk is called
(A) Interruption
(B) Termination
(C) Swapping
(D) None of the above

A Dead-lock in an Operating System
is
(A) Desirable process
(B) Undesirable process
(C) Definite waiting process
(D) All of the above

The dynamic allocation of storage
areas with VSAM files is
accomplished by
(A) Hashing
(B) Control splits
(C) Overflow areas
(D) Relative recoding

Which of the following is the most general phase structured grammar ?
(A) Regular
(B) Context-sensitive
(C) Context free
(D) None of the above

What is the maximum operating rate of a wireless LAN using infrared
communication ?
(A) 1 mbps (B) 2 mbps
(C) 5 mbps (D) 11mbps

What services does the internet layer provide ?
1. Quality of service
2. Routing
3. Addressing
4. Connection oriented delivery
5. Framing bits
(A) 1, 2, 3 (B) 2, 3, 4
(C) 1, 3, 4, 5 (D) 2, 3, 4, 5

The cost of the network is usually determined by
(A) time complexity
(B) switching complexity
(C) circuit complexity
(D) none of these

A binary tree with 27 nodes has
_______ null branches.
(A) 54
(B) 27
(C) 26
(D) None of the above

Which of the following is an optimistic concurrency control
method ?
(A) Validation based
(B) Time stamp ordering
(C) Lock-based
(D) None of these

The time complexity to build a heap of n elements is
(A) 0(1)
(B) 0(lgn)
(C) 0(n)
(D) 0(nlgn)

Linear probing suffers from a problem known as
(A) Secondary clustering
(B) Primary clustering
(C) Both (A) and (B)
(D) None of these

Similar Pages..

See Also……