Bank SO IT Officer Sample Papers for Professional Knowledge

Bank SO IT Officer Sample Papers for Professional Knowledge

Dec 8 • Bank Sample Papers • 5718 Views • 1 Comment on Bank SO IT Officer Sample Papers for Professional Knowledge

Bank SO IT Officer Sample Papers consists of four section namely Reasoning Section, English Language Section, Quantitative Aptitude section and the last one is Professional Knowledge. This post includes Latest Bank SO IT Officer Sample Papers for Professional Knowledge for Computer Science and Engineering candidates with answers. This Bank SO IT Officer Examination is conducted by IBPS.  Interested aspirants take a preview of sample paper to judge their preparation level before going for exam in order to perform well in this exam.

Click on Whatapp logo to join oureducation banking group with many students

SECTION – Professional Knowledge:

1. The instructions that tell a computer how to carry out the processing tasks are referred to as Computer.

Bank SO IT Officer Sample Papers

Bank SO IT Officer Recruitment Sample Papers

a) programs
b) processors
c) input devices
d) memory modules
e) None of these

Answer- a)

2. An applet __________

(a) is an interpreted program that runs on the client
(b) tracks the number of visitors to a Website
(c) is a compiled program that usually runs on the client
(d) collects data from visitors to a Website
(e) None of these

Answer: a)

3. A _____ sometimes called a boot sector virus, executes when a computer boots up because it resides in the boot sector of a floppy disk or the master boot record of a hard disk.

(a) system virus
(b) Trojan horse virus
(c) file virus
(d) macro virus
(e) None of these

Answer: e)

4. The network interface card of LAN is related to following layer of OSI Model-

(a) Transport
(b) Network
(c) Data Link
(d) Physical
(e) All of these

Answer: e)

5. Where does most data go first with in a computer memory hierarchy ?

a) RAM
b) ROM
c) BIOS
d) CACHE
e) None of these

Answer: a)

6. Which of the following will not eliminates the ambiguities of a null value?

(a) Define the attribute as required
(b) Define subtypes
(c) Define each attribute as having an initial value that is recognized as blank
(d) Define supertypes
(e) None of these

Answer: d)

7. Computers process data into information by working exclusively with :

a) multimedia
b) words
c) characters
d) numbers
e) None of these

Answer: d)

8. The____directory is mandatory for every disk.

(a) Root
(b) Base
(c) Sub
(d) Case
(e) None of these

Answer: c)

9. Before a package can be used in a java program it must be___.

(a) executed
(b) referenced
(c) imported
(d) declared
(e) None of these

Answer: c)

10. The difference between people with access to computers and the Internet and those without this access is known as the :

a) digital divide
b) Internet divide
c) Web divide
d) broadband divide
e) None of these

Answer: d)

11. Data are ________ in client/server computing.

(a) never sent to the client machine
(b) sent in very large sections to save processing time
(c) sent only upon the client’s request
(d) sent in complete copies for the client to filter and sort
(e) sent from the client to the server for processing

Answer: c)

12. The CPU and memory are located on the :

a) expansion board
b) motherboard
c) storage device
d) output device
e) display board

Answer: b)

13. Three SQL, DDL, CREATE commands are__.

(a) Schema, Base and Table
(b) Base, Table and Schema
(c) Key, Base and Table
(d) Schema, Table and View
(e) None of these

Answer: d)

14. All of the following are examples of real security and privacy risks EXCEPT

a) hackers
b) Spam
c) viruses
d) identity theft
e) None of these

Answer: b)

15. ………… Store data or information temporarily and pass it on as directed by the control unit

a) Address
b) Register
c) Number
d) Memory
e) None of these

35. Select the Odd one

a) Operating system
b) Interpreter
c) Compiler
d) Assembler
e) None of these

Answer: b)

16. Firewalls are used to protect against___.

(a) Unauthorized Attacks
(b) Virus Attacks
(c) Data Driven Attacks
(d) Fire Attacks
(e) All of these

Answer: a)

17. This is a standard way for a Web server to pass a Web user’s request to an application program and to receive data back to forward to the user-

(a) Interrupt request
(b) Forward DNS lookup
(c) Data-Link layer
(d) File Transfer Protocol
(e) Common gateway interface

Answer: e)

18. Programming language built into user programs such as Word and Excel are known as____

(a) 4GLs
(b) macro languages
(c) object-oriented languages
(d) visual programming languages
(e) None of these

Answer: d)

19. The instructions that tell a computer how to carry out the processing tasks are referred to as computer ………

a) programs
b) processors
c) input devices
d) memory modules
e) None of these

Answer: a)

20. The _____ states that a foreign key must either match a primary key value in another relation or it must be null.

(a) entity integrity rule
(b) referential integrity constraint
(c) action assertion
(d) composite attribute
(e) None of these

Answer: c)

21. An area of a computer that temporarily holds data waiting to be processed is ……….

a) CPU
b) Memory
c) Storage
d) File
e) None of these

Answer: b)

23. Every computer connected to an intranet or extranet must have a distinct_____

(a) firewall
(b) proxy server
(c) IP address
(d) domain name
(e) None of these

Answer: c)

24. With the object-oriented (OO) approach, an object encapsulates, or_____.a programmer.

(a) carries out, the details of an object for
(b) hides, the details of an object from
(c) reveals, the details of an object to
(d) extends, the details of an object beyond
(e) None of these

Answer: b)

25. To select or unselect one word to the right

a) CTRL + SHIFT
b) CTRL + SHIFT + UP Arrow
c) CTRL + SHIFT + Down Arrow
d) CTRL + SHIFT + Right Arrow
e) None of these

Answer: d)

26. How many values can be represented by a single byte?

(a) 4
(b) 16
(c) 64
(d) 256
e) 234

Answer: d)

27. Which of the following is NOT one of the four major data processing functions of a computer?

a) gathering data
b) processing data into information
c) analyzing the data or information
d) storing the data or information
e) None of these

Answer: c)

28. Which error detection method uses one’s complement arithmetic?

(a) Simply parity check
(b) Checksum
(c) Two-dimensional parity check
(d) CRC
(e) None of these

Answer: b)

29. Magnetic disk is an example of

a) Secondary memory
b) Primary meory
c) Main memory
d) Both (1) and (2)
e) None of these

Answer: a)

30. A result of a computer virus can not lead to ___.

(a) Disk Crash
(b) Mother Board Crash
(c) Corruption of program
(d) Deletion of files
(e) None of these

Answer: b)

31. The ……… is the amount of data that a storage device can move from the storage medium to the Computer per second

a) data migration rate
b) data digitizing rate
c) data transfer rate
d) data access rate
e) None of these

Answer: c)

32.Which of the following IEEE standards are deals with LAN and MAN(metropolitan area network) ?

(a) 801
(b) 803
(c)802
(d) 800

Answer: c)

33. ………… is the functional key to display save-as box.

a) F5
b) F6
c) F9
d) F12
e) None of these

Answer: d)

34. The degree of detail that should be incorporated into a database depends on what?

(a) Data integrity
(b) The type of database
(c) The user’s perspective
(d) The business practices and policies
(e) None of these

Answer: b)

35. ……… is the key we use to run the selected command.

A) SHIFT
B) TAB
C) ENTER
d) CTRL
5)None of these

Answer: c)

36. The ___.converts digital signals to analog signals for the purpose of transmitting data over telephone lines.

(a) Modem
(b) Router
(c) Gateway
(d) Bridge
(e) All of these
Answer: a)

37. ………. is computer software designed to operate the computer hardware and to provide platform for running application software

1) Application software
2) System software
3) Software
4) Operating system
5) None of these

Answer: b)

38. Choose the correct way to indicate that a line in a C++ program is a comment line, that is, a line the will not be executed as an instruction___.

(a) begin the line with a # sign
(b) begin the line with double slashes (/ /)
(c) begin and end the line with double hyphens (-_-)
(d) indent the line
(e) None of these

Answer: b)

39. To move a copy of file from one computer to another over a communication channel is called ?

a) File transfer
b) File encryption
c) File modification
d) File copying
e) None of these

Answer: a)

40. A table of bits in which each row represents the distinct values of a key?

(a) Join index
(b) Bitmap index
(c) B + Tree
(d) Hierarchical index
(e) None of these

Answer: b)

41. Which of the following are the functions of a operating system

a) Allocates resources
b) Monitors Activities
c) Manages disks and files
d) All of the above
e) Only 1 and 2

Answer: d)

42. This is a group of servers that share work and may be able to back each other up if one server fails.

(a) Channel bank
(b) Cluster
(c) Tiger team
(d) Serverless backup
(e) Logical unit

Answer: c)

43. Data are ________ in client/server computing.

(a) never sent to the client machine
(b) sent in very large sections to save processing time
(c) sent only upon the client’s request
(d) sent in complete copies for the client to filter and sort
(e) sent from the client to the server for processing

 Answer: c)

44. The ________ states that a foreign key must either match a primary key value in another relation or it must be null.

(a) entity integrity rule
(b) referential integrity constraint
(c) action assertion
(d) composite attribute
(e) None of these

Answer: a)

45. A ________ sometimes called a boot sector virus, executes when a computer boots up because it resides in the boot sector of a floppy disk or the master boot record of a hard disk.

(a) system virus
(b) Trojan horse virus
(c) file virus
(d) macro virus
(e) None of these

Answer: e)

46. The network interface card of LAN is related to following layer of OSI Model

(a) Transport
(b) Network
(c) Data Link
(d) Physical
(e) All of these

Answer: e)

47. A range check ________

(a) ensures that only the correct data type is entered into a field
(b) verifies that all required data is present
(c) determines whether a number is within a specified limit
(d) tests if the data in two or more associated fields is logical
(e) None of these

Answer: c)

48. The total set of interlinked hypertext documents worldwide is-

(a) HTTP
(b) Browser
(c) WWW
(d) B2B
(e) None of these

Answer: a)

49. Every computer connected to an intranet or extranet must have a distinct ________

(a) firewall
(b) proxy server
(c) IP address
(d) domain name
(e) None of these

Answer: c)

50. Three SQL, DDL, CREATE commands are ________ .

(a) Schema, Base and Table
(b) Base, Table and Schema
(c) Key, Base and Table
(d) Schema, Table and View
(e) None of these

Answer: d)

Related Searches:

  • Bank PO Sample Papers
  • Bank SO Sample Papers for English Language
  • Bank IT Officer Sample Paper for Reasoning Section
  • Bank Specialist Officer Sample Papers for Quantitative Aptitude

Readers can share their views with us through comments

Tell us Your Queries, Suggestions and Feedback

Your email address will not be published.

« »