Follow @chandresh1970
IISGNII गुरुर ब्रह्मा गुरुर विष्णु गुरुर देवो महेश्वरः गुरुः साक्षात्परब्रह्मा तस्मै श्री गुरुवे नमः

Free Previous Years' Papers*

Bank IT  Officer Competition Arena

1.     A floating point is said to be normalized if the most significant digit of the mantissa is—

        (a) Zero               (b) Non-zero

        (c) Negative         (d) Positive

        (e) None of the above

2.     Which of the following application is suitable for FIFO Queue ?

        (a) An inventory of parts is to be processed by part number

        (b) A dictionary of words used by a spelling checker is to be created

        (c) A program to solve a maze is to back track to an earlier position when a dead end position is reached

        (d) A program to keep track of patients as the check into clinic, assigning them to doctors on first come, first served basis

        (e) None of the above

3.     The field that investigates the mechanics of human intelligence is—

        (a) Artificial Science

        (b) Cognitive Science

        (c) Psychology      (d) Sociology

        (e) None of the above

4.     Which data structure is needed to convert infix notation to post-fix notation ?

        (a) Branch     (b) Queue      (c) Tree             (d) Stack      (e) None of the above

5.     Data are followed to be transmitted in only one direction in a—

        (a) Simplex Channel

        (b) Duplex Channel

        (c) Half-Duplex Channel

        (d) Full-Duplex Channel

        (e) None of the above

6.     Which of the following statement is not true regarding graph ?

        (a) A graph consists of set of nodes and a set of arcs

        (b) A graph is a tree

        (c) A tree is a graph

        (d) Graphs can be directed

        (e) None of the above

7.     Implementation of an inverted list to maintain the record list for each value for a given attribute can be done by—

        (a) Sequential file   (b) Direct file

        (c) Indexed file   (d) Indexed sequential

        (e) None of the above

8.     A 6-MHz channel is used by digital signaling system utilizing 4-level signals. What is maximum possible transmission rate ?

        (a) 1-5 M band/sec (b) 6 M band/sec

        (c) 12 M band/sec (d) 24 M band/sec

        (e)  None of the above

9.     Which of the following is a type of ISDN (Integrated Services Digital Network) ?

        (a) Narrow Band     (b) Broad Band

        (c) Both (a) and (b) (d) Medium Band

        (e) None of the above

10.    Which of the following is easiest software  development process model ?

        (a) Waterfall Model (b) Prototyping

        (c) Interactive enhancement

        (d) Spiral Model   (e) None of the above

11.    Which of the following feature is related to virtual circuit ?

        (a) Connection oriented

        (b) Each packet sent is routed independently of its predecessors

        (c) Successive packets may follow different routes

        (d) Congestion control is diffi­cult

        (e)  None of the above

12.    Which one of the following interrupt is non-makeable ?

        (a) TRAP             (b) RST 7.5

        (c) INTR              (d) RST 6.5

        (e) None of the above

13.   Binding the same name to multiple operations whose signature differ in number or types of arguments ?

        (a) Overloading    (b) Origin class

        (c) Object model  (d) Package

        (e)  None of the above

14.  The C declaration in A[3][5] of containing ........... elements is itself an array containing ....... integers.

        (a) 3,5         (b) 5,3                     (c) 3,3                   (d) 5,5         (e) None of the above

15.    What is the drawback of infrared and millimeter waves ?

        (a) They are directional

        (b) They cannot pass through solid objects

        (c) License is needed

        (d) Can be used outdoor

        (e) None of the above

16.    Indexes created from a sequential (or sorted) set of primary keys are referred to as—

        (a) Indexed file organisation

        (b) Sequential file

        (c) Index sequential

        (d) All of the above

        (e) None of the above

17.    A central computer surrounded by one or more satellite computers is called-

        (a) Bus Network   (b) Ring Network

        (c) Star Network   (d) Both (a) & (b)

        (e) None of the above

18.    Which of the following is a major component of the telephone system ?

        (a) Local loop         (b) Trunks

        (c) Switching Office  (d) All of the above

        (e) None of the above

19.   A linear list of elements in which deletion can be done from one end and insertion can take place only at other end (rear), is known as—

        (a) Queues          (b) Stacks

        (c) Trees             (d) Branch

        (e) None of the above

20.    For tree, which of the following list traversing through the entire list is not necessary ?

        (a) Circular list     (b) Singly linked list

        (c) Doubly linked list

        (d) Both (b) and (c)            

        (e) None of the above

21.    Which of the following is not included in DML (Data Manipu­lation Language) ?

        (a) INSERT         (b) UPDATE

        (c) DELETE         (d) CAREATE

        (e) None of the above

22.    Which of the following communication service provides messages preparation and transmission facilities ?

        (a) Teletex           (b) Teletext

        (c)  X 400            (d) Fax

        (e) None of the above

23.    Which of the following schedular is  in  charge  of handling  the swapped out process ?

        (a) Short term      (b) Medium term

        (c) Long term       (d) Both (a) and (b)

        (e) None of the above

24.    Which of the following is not used as a data structure ?

        (a) Arrary             (b) Linked List  

        (c) Graph             (d) Directory

        (e) None of the above

25.    Which of the following statement is not true in context of strings in C language ?

        (a) It is array of characters

        (b) Last character of character array is always ‘10’

        (c) C inserts the null character automatically

        (d) Any string in C can be read by the function get char ‘0’.

        (e) None of the above

26.    Which command will be used with vi editor to append text at end of line ?

        (a) A       (b) a        (c) i                   (d) I

        (e) None of the above

27.    Which of the following result of a computation depends on the speed of the processes involved there is said to be ?

        (a) Cycle stealing (b) Race condition

        (c) A time look     (d) A dead lock

        (e) None of the above

28.    Which of the following feature/s is/are true regarding concatenated virtual circuits ?

        (a) A sequence of virtual circuits is set up from source through one or more gateways to the destination

        (b) Each gateway maintains table telling which virtual circle pass through it

        (c) The scheme works best when all the networks have roughly the same properties

        (d) All of the above

        (e) None of the above

29.    A compiler which runs on one machine and generates a code for another machine, is known as —

        (a) Bootstrap      

        (b) Cross-compiler

        (c) Lexical analyzer

        (d) All of the above

        (e) None of the above

30.    Banker’s algorithm for resource allocation deals with —

        (a) Dead lock prevention

        (b) Dead lock avoidance

        (c) Dead lock recovery

        (d) Mutual exclusion

        (e) None of the above

31.       A method, which transfers the entire block of data from its own buffer to main memory takes place without intervention by cup —

        (a) Programmed input/output

        (b) Interrupt  driven  input / output

        (c) Direct Memory Access (dma)

        (d) Resident Monitor

        (e) None of the above

32.    the maximum clock rate is quoted for a logic family, it applies to a—

        (a) Shiftregister    (b) Flip-flop

        (c) Counter          (d) Single logic gate

        (e) None of the above

33.    Which of the following table helps in representing the previous and next state of the sequential circuit prior to and after the clock pulse respectively?

        (a) Truth table     

        (b) Characteristic table

        (c) Excitation table

        (d) Both (a) and (b)

        (e) None of the above

34.    A large computer information system maintains many different computer files. Which among them is called a perpetual file ?

        (a) Specialized file (b) Log file

        (c) Master file        (d) History file

        (e) None of the above

35.    One method of programming a computer to exhibit intelligence is called modeling —

        (a) Simulation      (b) Cognitization

        (c) Psychic amelioration

        (d) Duplication     (e) None of the above

36.    In fiber optics the attenuation of light through glass depends on the—

        (a) Wavelength of light

        (b) Frequency of light

        (c) Speed of light

        (d) All of the above

        (e) None of the above

37.    Ap-channel enhancement type MOSFET performs much the same function a PNP Transistor except that-

        (a) It operates much faster

        (b) It is considerably larger

        (c) It is controlled by voltage larger than current

        (d) It is controlled by current rather than a voltage like a bipolar transistor

        (e) None of the above

38.    Among directory entry-node and file contents, which will be changed when a file is updated ?

        (a) Only directory entry and file contents

        (b) Only inode and file contents

        (c)  Both (a) and (b)

        (d) Only directory entry

        (e) None of the above

39.   Which of the following is an important component of semantic analysis ?

        (a) Symbol table (b) Type checking

        (c) Lex                (d) Yacc

        (e) None of the above

40.    Which of the following systems implementation approaches should be used if you want to run the old system and the new system at the same time for a specified period ?

        (a) Direct             (b) Pilot

        (c) Phased          (d) Parallel

        (e) None of the above

41.    Which of the following derivation does a topdown parser ? The input is assumed to be scanned in left to right order ?

        (a) Left most derivation

        (b) Left most derivation traced out in reverse

        (c) Right most derivation

        (d) Right most derivation traced out in reverse

        (e) None of the above

42.    CIDR (Classless Inter Domain Routing)—

        (a) It is used in class C Networks

        (b) It is used in class B Networks

        (c) It is used in class A Networks

        (d) All of the above

        (e) None of the above

43.    Internal auditors should review data system design before they are—

        (a) Developed      (b) Implemented

        (c) Modified         (d) All of the above

        (e) None of the above

44.    Which language has recently become the defector standard for interfacing application programs with relational database system ?

        (a) Oracle            (b) SQL

        (c) Dbase            (d) 4GL

        (e) None of the above

45.    A program that places programs into main memory and prepares them for execution-

        (a) Linker             (b) Assembler

        (c) Loader            (d) Absolute entity

        (e) None of these

46.    A generalization of the Boyce Codd Normal Form to relation schemes which includes the multivated dependencies is called —

        (a) Second Normal Form

        (b) Third Normal Form

        (c) Fourth Normal Form

        (d) Fifth Normal Form

        (e) None of the above

47.   Lexical Analyzer transforms as input streams into—

        (a) Regular Expression

        (b) Sequence of tokens

        (c) Binary            (d) Symbols

        (e) None of the above

48.    If we traverse binary search tree, in which manner that we get in ascending manner—

        (a) Inorder           (b) Preorder

        (c) Post order      (d) Graph

        (e) None of the above

49.    Blnary number 101110000   is equivalent to decimal—

        (a) 716   (b) 712   (c) 718    (d) 724

50.    The collection of communication line and routers form the—

        (a) Router            (b) Bridge

        (c) Subnet           (d) Packet

Answer Sheet

  1. (b)   2. (c)     3. (b)     4. (d)   5. (a)

  6. (c)  7. (a)       8. (c)     9. (c)   10. (a)

11. (a)   12. (a)    13. (a)    14. (a)  15. (b)

16. (c)   17. (c)    18. (d)    19. (a)  20. (a)

21. (d)   22. (a)    23. (b)    24. (d)  25. (d)

26. (a)   27. (b)    28. (e)    29. (b)  30. (b)

31. (c)   32. (a)    33. (c)    34. (c)  35. (a)

36. (a)   37. (c)    38. (b)    39. (b)  40. (d)

41. (a)   42. (a)    43. (b)    44. (b)  45. (c)

46. (c)   47. (b)   48. (a)   49. (a)   50. (c)  

Follow @chandresh1970