Search your Topic HERE....

March 15, 2013

IBPS IT Officers Model Papers - Set 2

7 comments

sponsored links

1.  Project management will be made a separate division on the basis of _____
a.       Interdependencies among departments
b.      Sharing of resources
c.       Size of the project
d.      All of the above
e.       None of these



2.      Depending upon the traffic handling capacity of class A, B, C network which of the following is true ?
ibps it officers model paprsa.      Large, moderate, small
b.      Small, Moderate, Large
c.       Moderate, Small, Large
d.      All are same
e.       None of these




3.      Unit record machines are actually
a.       Machines that can record unit data
b.      Initial form of tape recorder
c.       A sort of punching machine
d.      All of the above
e.       None of these




4.      Which of the following is equivalent to 7 in binary system?
a.       110
b.      111
c.       101
d.      All of these
e.       None of these




5.      In object oriented technology, hiding the complexity of characteristics is  called _________
a.      Abstraction
b.      Object
c.       Inheritance
d.      Polymorphism
e.       None of these




6.      Which of the following programming languages is exclusively used for artificial intelligence ?
a.       C
b.      J2EE
c.       Prolog
d.      Java
e.       None of these




7.      Which of the following is false about change in computer from one generation to the next ?
a.       Computer size is decreased
b.      Speed of processing increase
c.       Memory / Storage capacities decreases
d.      All of these
e.       None of these




8.      Synchronous transmission may be defined as :
a.       Communication where the receiver clock must be in approximate synchronism with that of the transmitter.
b.      Communication where the receiver will operate satisfactorily, even if its clock frequency is appreciably different to that of the transmitter.
c.       Communication where the receiver clock is arranged to be in exact synchronism with that of the receiver.
d.      All of the above
e.       None of these




9.      The strategy for testing a function when developing a software is made at
a.       Test strategy
b.      Test plans
c.       Test case design
d.      All of these
e.       None of these




10.  When talking of software budget
a.       It includes only direct development costs
b.      Productivity loss (of an end-user) that occurs during IT training
c.       Indirect costs of the budget include training costs and productivity
d.      All of these
e.       None of these




11.  To make a program safe we should take care of :
a.      Strong authentication and access controls
b.      Error checking controls
c.       Do risk analysis
d.      All of these
e.       None of these




12.  We are shifting towards computerization because
a.       Current technologies are available
b.      Technologies help in meeting the business objectives
c.       Hire the employees that are expert in the latest technologies are available
d.      All of these
e.       None of these




13.  Who is responsible for developing the intranet strategy and monitoring its policies?
a.      Intranet administrator
b.      Webmaster
c.       Editor
d.      All of these
e.       None of these




14.  Network layer’s function is to
a.      Select path for data transfer
b.      Break the Network in to subnet
c.       Determine the IP
d.      All of these
e.       None of these




15.  Which of the following makes a network insecure?
a.       Encryption
b.      Network interface card (NIC)
c.       Static keys
d.      All of these
e.       None of these




16.  If the network of the company is to be protected from remote access that may damage company’s reputation due to misuse of information then security policy should include ________
a.       All employees
b.      Only the employer
c.       Contractors
d.      All of the above
e.       None of these




17.  Telnet helps in
a.      Remote log in
b.      Connecting to television
c.       Transferring files across net
d.      All of these
e.       None of these




18.  Which of the following is NOT true aobut FTP?
a.       It is a protocol
b.      It is a program or command
c.       It transfers files over net
d.      All are true
e.       None are true




19.  TCP/IP protocol stack is
a.       Combination of TCP & IP protocols
b.      A family of protocols that connect to PCs
c.       Part of Internet
d.      All of these
e.       None




20.  Who amongst the following is called the father of modern computing?
a.      Charles Babbage
b.      Hollerith
c.       Gottfried Von Leibnitz
d.      Joseph. M. Jacquard
e.       None of these
 



Read more Model Papers and Study Materials of IBPS IT Officers Here

7 comments:

  1. thanks for the post.. Please provide some more professional knowledge paper

    ReplyDelete
  2. friends concentrate more on reasoning questions they are really time consuming ,, I had my exam today. rest of 3 sections were good

    ReplyDelete
    Replies
    1. hello.. r u from IT.. can you tell me what came in professional knowledge paper?

      Delete
    2. hw was d xam?easy or moderate?

      Delete
  3. Friends.. Today IT prof knowledge qns are asked only based on computers. In other way u can call it as Computer Knowledge like IBPS clerical paper.
    ALL THE BEST :-)

    ReplyDelete
    Replies
    1. Thank you so much for the update friend. All the best.

      Delete
  4. Frnd IT officer Scale II paper have different questions from scale I? Can anybody clarify me on this

    ReplyDelete

Related Posts Plugin for WordPress, Blogger...