Central Bank of India IT Officer Model Question Paper Answer Download.
Central Bank of India IT Officer Model | Sample | Mock Test Question Paper for 2019-20 Exam, This Central Bank of India IT Officer Question are based on the syllabus but here some of the question may out of syllabus, just for your better exam preparation.
This Central Bank of India IT Officer Paper will help all the students for their preparation, here the question type is MCQ i.e multiple choice question answers, if this Central Bank of India IT Officer question paper in pdf file format you can download it in FREE, if Central Bank of India paper in text format you can download Central Bank of India page also just Go to menu bar, Click on File->then Save.
Central Bank of India IT Officer Model Question Paper Answer Download.
If you need more Central Bank of India IT Officer Sample | Model Paper for 2019-20 or Central Bank of India Mock Test Paper with or with out solutions for 2019-20
exam, you can request us just post a comment (Check end of this page), For better preparation you can also check Central Bank of India reference books.
The output of the following program
main( )
{ int a[ ] = { 2,3,4,6,5};
int *p = a;
for (int i = 0; i < 5; i++)
printf(“%d,”,++*p);
}
is
(A) 3, 4, 5, 6, 7
(B) 3, 4, 5, 7, 6
(C) 3, 4, 6, 5, 0
(D) 3, 4, 5, 6, 6
The program
main( )
{ int a = 256, *p=&a;
printf(“%d”,*p>>5);
}
prints
(A) 2
(B) 4
(C) 6
(D) 8
A computer program that converts an entire program into machine language at one time is called a/an
(A) interpreter (B) simulator
(C) compiler (D) commander
All the keys on the IBM PC key board repeat as long as we hold them down. Such type of keys are known as
(A) typematic keys
(B) functional keys
(C) automatic keys
(D) alphabetic keys
The output of the following program
main( )
{
int a[ ] = “computation”;
char *p = a, b=’ ‘;
for (int i = 1; i < 12; i++)
if(i%4) continue;
else a[i]=b;
puts(p);
}
is
(A) comp
(B) comp tat on
(C) com utat on
(D) comp tati n
What does the acronym ISDN stands for
(A) Indian Standard Digital Network
(B) Integrated Services Digital Network
(C) Intelligent Service Digital Network
(D) Integrated Services Data Network
Two basic types of operating system are
(A) sequential and direct
(B) batch and time sharing
(C) direct and interactive
(D) batch and interactive
Which of the following entity does not belong to word processing
(A) characters (B) words
(C) cells (D) paragraphs
The natural mask for class C IP address is _______ .
(A) 255.255.255.0 (B) 255.255.0.0
(C) 255.0.0.0 (D) 255.255.255.255
In C++, if a catch statement is written to catch exception objects of a base class type, it
can also catch all ______ derived from that base class.
(A) Exceptions for objects (B) Objects of classes
(C) Arguments (D) Errors
A schema describes
(A) data elements
(B) records and filer
(C) record relationship
(D) all of the above
Which of the following is not a tool used to manage and control schedule performance
(A) CAD (B) PERT
(C) CPM (D) Gantt Chart
An expert system differs from a data base program in that only an expert system
(A) contains declarative knowledge
(B) contains procedural knowledge
(C) features the retrieval of stored information
(D) experts users to draw own conclusion
The virtual memory addressing capability of 80386 is
(A) 4 GB (B) 16 GB
(C) 64 GB (D) 64 TB
The 80486 microprocessor from Intel consists of
(A) a fast 32 bit CPU but no coprocessor
(B) a 32 bit CPU and an 80387 coprocessor only
(C) a 32 bit CPU, a 80387 coprocessor and memory management unit (MMU) only
(D) a 32 bit CPU, a 80387 coprocessor, memory management unit and a cache memory
Which of the following file transfer protocols use TCP and establishes two virtual circuits between the local
and remote server ?
(A) FTP
(B) TFTP
(C) TELNET
(D) NFS
Frequency shift keying is used mostly in
(A) Radio transmission
(B) Telegraphy
(C) Telephone
(D) None of the above
The baud rate is
(A) always equal to the bit transfer
rate
(B) equal to twice the bandwidth
of an ideal channel
(C) not equal to the signalling rate
(D) equal to half of the bandwidth
of an ideal channel
Object code is the output of ______.
(A) Operating System
(B) Compiler or Assembler
(C) only Assembler
(D) only Compiler
‘Macro’ in an assembly level
program is _______.
(A) sub program
(B) a complete program
(C) a hardware portion
(D) relative coding
Advantage of synchronous sequential circuits over
asynchronous ones is
(A) faster operation
(B) ease of avoiding problems due to hazard
(C) lower hardware requirement
(D) better noise immunity
What is the transitive voltage for the voltage input of a CMOS operating from 10V supply ?
(A) 1V (B) 2V
(C) 5V (D) 10 V
What is decimal equivalent of BCD 11011.1100 ?
(A) 22.0 (B) 22.2
(C) 20.2 (D) 21.2
What will be the output of the following c-code ?
void main ( )
{
char *P = “ayqm” ;
char c;
c = ++*p ;
printf (“%c”, c);
}
(A) a (B) c
(C) b (D) q
The data type created by the data
abstraction process is called
(A) class
(B) structure
(C) abstract data type
(D) user defined data type
An entity instance is a single
occurrence of an _______.
(A) entity type
(B) relationship type
(C) entity and relationship type
(D) None of these
Grammar of the programming is checked at ________ phase of
compiler.
(A) semantic analysis
(B) code generation
(C) syntax analysis
(D) code optimization
WINDOWS is a _________ operating.
(A) Real time
(B) Multi-user
(C) Preemptive
(D) Non-preemptive
Generalization is _______ process.
(A) top-down
(B) bottom up
(C) both (A) & (B)
(D) None of these
Which data management language component enabled the DBA to define the schema components ?
(A) DML
(B) Sub-schema DLL
(C) Schema DLL
(D) All of these
The ______ field is the SNMP PDV reports an error in a response
message.
(A) error index
(B) error status
(C) set request
(D) agent index
End-to-End connectivity is provided from Last-to-Last in
(A) Network layer
(B) Session layer
(C) Transport layer
(D) Data link layer
Page making process from main
memory to disk is called
(A) Interruption
(B) Termination
(C) Swapping
(D) None of the above
A Dead-lock in an Operating System
is
(A) Desirable process
(B) Undesirable process
(C) Definite waiting process
(D) All of the above
The dynamic allocation of storage
areas with VSAM files is
accomplished by
(A) Hashing
(B) Control splits
(C) Overflow areas
(D) Relative recoding
Which of the following is the most general phase structured grammar ?
(A) Regular
(B) Context-sensitive
(C) Context free
(D) None of the above
What is the maximum operating rate of a wireless LAN using infrared
communication ?
(A) 1 mbps (B) 2 mbps
(C) 5 mbps (D) 11mbps
What services does the internet layer provide ?
1. Quality of service
2. Routing
3. Addressing
4. Connection oriented delivery
5. Framing bits
(A) 1, 2, 3 (B) 2, 3, 4
(C) 1, 3, 4, 5 (D) 2, 3, 4, 5
The cost of the network is usually determined by
(A) time complexity
(B) switching complexity
(C) circuit complexity
(D) none of these
A binary tree with 27 nodes has
_______ null branches.
(A) 54
(B) 27
(C) 26
(D) None of the above
Which of the following is an optimistic concurrency control
method ?
(A) Validation based
(B) Time stamp ordering
(C) Lock-based
(D) None of these
The time complexity to build a heap of n elements is
(A) 0(1)
(B) 0(lgn)
(C) 0(n)
(D) 0(nlgn)
Linear probing suffers from a problem known as
(A) Secondary clustering
(B) Primary clustering
(C) Both (A) and (B)
(D) None of these
Similar Pages..
See Also……