Friday, March 9, 2012

REASONING SECTION - Part -I IBPS EXAM - BANK APTITUDE TEST

Latest Updated Exam / Guess Papers - http://syllabus123.blogspot.com/
Bank Exam Paper / Model Paper for Upcoming Exams IBPS
(Institute of Banking Personal Selection Board)

REASONING SECTION (PART - I)

What Type of questions -

Reasoning Based on Logic -
(A)  Argument
Argument is fundamental to all logic.
Posible type -
(i) What is ith inference of this argument ?
(ii) What are the assumptions of this argument ?
(iii) What are the strengthening points of this argument ?
(iv) Whether this argument is weak OR strong ?

Standard ways of arguing -
Argument by example
Argument by Analogy
Casual Argument
Salesman's Argument
Argument Based on Chronology

e.g - Computer was invented many years after radio.. Therefore computer has a technology superior to that of Radio.
The movie "London Paris Newyork ABC " was released two months earlier than "  XYZ".
So the former could not be a copy of latter.
.........
To identify conclusions , You should identify following -
therefore , thus , so, hence , consequently , as a result , it follows that, it can be inferred that, which shows that, which proves that, which means that

If you are UNABLE to find out these, then ask yourself Where can I use / put such words.
-------------------
Learn to identify Key words -
all, always, at least, at most, but can be, can not be, consecutive, directly, each, every, exactly,
except, if, immediately, impossible , must be, never, no fewer than, no mre than, none, only, only once, perfectly, possible, certain, sure, probably, same, some, the least, the most, unless, in spite off, despite, because of
-------------------
Visit Regularily to this Blog, We try to give you a lot of examples, practice to tackle bank examinations.
----------------

(B) ASSUMPTIONS
Format of the problem -
1) If only assumption I is implicit
2) If only assumption II is implicit
3) Either assumption I OR assumption II is implicit
(4) Neither of the assumptions is implicit
(5) Both the assumptions are implicit.

Statement - Advertisement - Beware of Cheaters
Assumptions - I. Peiople will listen it.
II. People will not listen it.
Ans.  I ,  If advt. is given, it means people will listen else it is of No use. 
(As I believe)
.....
(i) Always put your eye on such words - Only, Best. Strongest, All, Definitely, Certainly etc.

(ii) Conjunctions -
(a) A (because / as a result of ) B -->> It is assumed that B leads to A
Students result improved after Mr. Anil teaches.
Valid assumption -> Mr. Anil is a good teacher.

(b) A (therefore / hence ) B -->> It is assumed that A leads to B
This Noble prize wins by an Indian, therefore all Indians must be feeling very proud.
Valid assumption->> Geting a prize by fellow countryman makes other citizens proud.


(c) A (even after / in spite of / despite ) B -->> It is asumed that usually A does not occur when B occurs.
India looses Cricket match with Bangladesh even after having good players.
Valid Assumption -> Good players usually sufficient to make victory

(d) not A ( even after / in spite of / despite ) B -->> It is assumed that usually A occurs when B does.
Statement - There was no injury to any person  even after heavy stampede in temple.
Valid assumption- > Heavy stampede usually leads to injury to public.

(iii) Connovative( Slightly indirect) phrases - Some times a person says in indirect way and you may miss to understand.
eg. - "It is true" can be written as  :
(a) It can be claimed with resonable degree of truth that -
(b) It would be correct to say that -
(c) Even the most sceptic of men would agree that...

Similarily -
"It is false " can be written as -
(a) It is baseless to say that....
(b) Nothing could be farther from truth than.....
(c) It would be highly misleading to say that...

Guess Paper Bank Officer Exam for 11th March 2012

Latest Updated Exam / Guess Papers - http://syllabus123.blogspot.com/

Bank Exam Paper / Model Paper for Specialist Computer / IT Officer Scale - I /II
(EXAMINATION to be held on 11th March 2012 )
1. The _____ states that a foreign key must either match a primary key value in another relation or it must be null.
(a) entity integrity rule


2. An applet __________
(c) is a compiled program that usually runs on the client

3. A _____ sometimes called a boot sector virus, executes when a computer boots up because it resides in the boot sector of a floppy disk or the master boot record of a hard disk.
(e) None of these

4. Which error detection method uses one’s complement arithmetic?
(b) Checksum

5. A result of a computer virus can not lead to ___.
(b) Mother Board Crash

6. The network interface card of LAN is related to following layer of OSI Model-
(e) All of these

7. Which of the following does not describe a data warehouse?
(d) Updateable

8. Which of the following is true ?
(a) Logical design is software-dependent

9. A range check _____
(c) determines whether a number is within a specified limit

10. The total set of interlinked hypertext documents worldwide is-
(c) WWW

11. With the object-oriented (OO) approach, an object encapsulates, or_____.a programmer.
(b) hides, the details of an object from

12. Every computer connected to an intranet or extranet must have a distinct_____
(c) IP address

13. A table of bits in which each row represents the distinct values of a key?
(b) Bitmap index

14. The degree of detail that should be incorporated into a database depends on what?
(b) The type of database

15. The ___ converts digital signals to analog signals for the purpose of transmitting data over telephone lines.
(a) Modem

16. Before a package can be used in a java program it must be___.
(c) imported

17. Choose the correct way to indicate that a line in a C++ program is a comment line, that is, a line the will not be executed as an instruction___.
(b) begin the line with double slashes (/ /)

18. Programming language built into user programs such as Word and Excel are known as____
(c) object-oriented languages

19. Firewalls are used to protect against___.
(a) Unauthorized Attacks

20. This is a standard way for a Web server to pass a Web user’s request to an application program and to receive data back to forward to the user-
(e) Common gateway interface

21. Three SQL, DDL, CREATE commands are__.
(d) Schema, Table and View

22. Data are ________ in client/server computing.
(c) sent only upon the client’s request

23. Which of the following will not eliminates the ambiguities of a null value?
(d) Define supertypes

24. The____directory is mandatory for every disk.
(a) Root

25. This is a group of servers that share work and may be able to back each other up if one server fails.
(b) Cluster


Bank Exam Paper / Model Paper for Specialist Computer / IT Officer Scale - I /II (EXAM to be held on 11th March 2012 )

Latest Updated Exam / Guess Papers - http://syllabus123.blogspot.com/Bank Exam Paper / Model Paper for Specialist  Computer / IT Officer Scale - I /II
(EXAMINATION to be held on 11th March 2012 )


1. The ________ states that a foreign key must either match a primary key value in another relation or it must be null.

(a) entity integrity rule

(b) referential integrity constraint

(c) action assertion

(d) composite attribute

(e) None of these






2. An applet ________

(a) is an interpreted program that runs on the client

(b) tracks the number of visitors to a Website

(c) is a compiled program that usually runs on the client

(d) collects data from visitors to a Website

(e) None of these


3. A ________ sometimes called a boot sector virus, executes when a computer boots up because it resides in the boot sector of a floppy disk or the master boot record of a hard disk.

(a) system virus

(b) Trojan horse virus

(c) file virus

(d) macro virus

(e) None of these

4. Which error detection method uses one's complement arithmetic?

(a) Simply parity check

(b) Checksum

(c) Two-dimensional parity check

(d) CRC

(e) None of these

5. A result of a computer virus can NOT lead to ________ .

(a) Disk Crash

(b) Mother Board Crash

(c) Corruption of program

(d) Deletion of files

(e) None of these

6. The network interface card of LAN is related to following layer of OSI Model

(a) Transport

(b) Network

(c) Data Link

(d) Physical

(e) All of these

7. Which of the following does NOT describe a data warehouse?

(a) Subject-oriented

(b) Integrated

(c) Time-variant

(d) Updateable

(e) None of these

8. Which of the following is TRUE ?

(a) Logical design is software-dependent

(b) In a distributed database, database is stored in one physical location

(c) Conceptual design translates the logical design into internal model

(d) Logical design is software independent

(e) None of these

9. A range check ________

(a) ensures that only the correct data type is entered into a field

(b) verifies that all required data is present

(c) determines whether a number is within a specified limit

(d) tests if the data in two or more associated fields is logical

(e) None of these

10. The total set of interlinked hypertext documents worldwide is-

(a) HTTP

(b) Browser

(c) WWW

(d) B2B

(e) None of these

11. With the object-oriented (OO) approach, an object encapsulates, or ________ .a programmer.

(a) carries out, the details of an object for

(b) hides, the details of an object from

(c) reveals, the details of an object to

(d) extends, the details of an object beyond

(e) None of these

12. Every computer connected to an intranet or extranet must have a distinct ________

(a) firewall

(b) proxy server

(c) IP address

(d) domain name

(e) None of these

13. A table of bits in which each row represents the distinct values of a key?

(a) Join index

(b) Bitmap index

(c) B + Tree

(d) Hierarchical index

(e) None of these

14. The degree of detail that should be incorporated into a database depends on what?

(a) Data integrity

(b) The type of database

(c) The user's perspective

(d) The business practices and policies

(e) None of these

15. The ________ converts digital signals to analog signals for the purpose of transmitting data over telephone lines.

(a) Modem

(b) Router

(c) Gateway

(d) Bridge

(e) All of these

16. Before a package can be used in a java program it must be ________ .

(a) executed

(b) referenced

(c) imported

(d) declared

(e) None of these

17. Choose the correct way to indicate that a line in a C++ program is a comment line, that is, a line the will not be executed as an instruction ________ .

(a) begin the line with a # sign

(b) begin the line with double slashes (/ /)

(c) begin and end the line with double hyphens (- _ -)

(d) indent the line

(e) None of these

18. Programming language built into user programs such as Word and Excel are known as ________

(a) 4GLs

(b) macro languages

(c) object-oriented languages

(d) visual programming languages

(e) None of these

19. Firewalls are used to protect against ________ .

(a) Unauthorized Attacks

(b) Virus Attacks

(c) Data Driven Attacks

(d) Fire Attacks

(e) All of these

20. This is a standard way for a Web server to pass a Web user's request to an application program and to receive data back to forward to the user-

(a) Interrupt request

(b) Forward DNS lookup

(c) Data-Link layer

(d) File Transfer Protocol

(e) Common gateway interface

21. Three SQL, DDL, CREATE commands are ________ .

(a) Schema, Base and Table

(b) Base, Table and Schema

(c) Key, Base and Table

(d) Schema, Table and View

(e) None of these

22. Data are ________ in client/server computing.

(a) never sent to the client machine

(b) sent in very large sections to save processing time

(c) sent only upon the client's request

(d) sent in complete copies for the client to filter and sort

(e) sent from the client to the server for processing

23. Which of the following will NOT eliminates the ambiguities of a null value?

(a) Define the attribute as required

(b) Define subtypes

(c) Define each attribute as having an initial value that is recognized as blank

(d) Define supertypes

(e) None of these

24. The ________ directory is mandatory for every disk.

(a) Root

(b) Base

(c) Sub

(d) Case

(e) None of these

25. This is a group of servers that share work and may be able to back each other up if one server fails.

(a) Channel bank

(b) Cluster

(c) Tiger team

(d) Serverless backup

(e) Logical unit

ANSWERS

1. (a), 2. (c), 3. (e), 4. (b), 5. (b)
6. (e), 7. (d), 8. (a), 9. (c), 10. (a)
11. (b), 12. (c), 13. (b), 14. (b), 15. (a)
16. (c), 17. (b), 18. (d), 19. (a), 20. (e)
21. (d), 22. (c), 23. (d), 24. (c), 25. (b)

Wednesday, March 7, 2012

Bank IT Officer (Specialist Oficer ) - Computer Awarenes Exam Paper

Latest Updated Exam / Guess Papers - http://syllabus123.blogspot.com/
Bank IT Officer (Specialist Oficer ) - Computer Awarenes Exam Paper


Following are the questions and correct answers of those questions:

1. The _____ states that a foreign key must either match a primary key value in another relation or it must be null.
(a) entity integrity rule

2. An applet __________
(c) is a compiled program that usually runs on the client

3. A _____ sometimes called a boot sector virus, executes when a computer boots up because it resides in the boot sector of a floppy disk or the master boot record of a hard disk.
(e) None of these

4. Which error detection method uses one’s complement arithmetic?
(b) Checksum

5. A result of a computer virus can not lead to ___.
(b) Mother Board Crash

6. The network interface card of LAN is related to following layer of OSI Model-
(e) All of these

7. Which of the following does not describe a data warehouse?
(d) Updateable

8. Which of the following is true ?
(a) Logical design is software-dependent

9. A range check _____
(c) determines whether a number is within a specified limit

10. The total set of interlinked hypertext documents worldwide is-
(c) WWW

11. With the object-oriented (OO) approach, an object encapsulates, or_____.a programmer.
(b) hides, the details of an object from

12. Every computer connected to an intranet or extranet must have a distinct_____
(c) IP address

13. A table of bits in which each row represents the distinct values of a key?
(b) Bitmap index

14. The degree of detail that should be incorporated into a database depends on what?
(b) The type of database

15. The ___ converts digital signals to analog signals for the purpose of transmitting data over telephone lines.

(a) Modem

16. Before a package can be used in a java program it must be___.
(c) imported

17. Choose the correct way to indicate that a line in a C++ program is a comment line, that is, a line the will not be executed as an instruction___.
(b) begin the line with double slashes (/ /)

18. Programming language built into user programs such as Word and Excel are known as____
(c) object-oriented languages

19. Firewalls are used to protect against___.
(a) Unauthorized Attacks

20. This is a standard way for a Web server to pass a Web user’s request to an application program and to receive data back to forward to the user-
(e) Common gateway interface

21. Three SQL, DDL, CREATE commands are__.
(d) Schema, Table and View

22. Data are ________ in client/server computing.
(c) sent only upon the client’s request

23. Which of the following will not eliminates the ambiguities of a null value?
(d) Define supertypes

24. The____directory is mandatory for every disk.
(a) Root

25. This is a group of servers that share work and may be able to back each other up if one server fails.
(b) Cluster

Bank IT Officer (Specialist Oficer ) - Computer Awarenes Exam Paper

Latest Updated Exam / Guess Papers - http://syllabus123.blogspot.com/
Bank IT Officer (Specialist Oficer ) - Computer Awarenes Exam Paper


1. The ________ states that a foreign key must either match a primary key value in another relation or it must be null.

(a) entity integrity rule

(b) referential integrity constraint

(c) action assertion

(d) composite attribute

(e) None of these






2. An applet ________

(a) is an interpreted program that runs on the client

(b) tracks the number of visitors to a Website

(c) is a compiled program that usually runs on the client

(d) collects data from visitors to a Website

(e) None of these


3. A ________ sometimes called a boot sector virus, executes when a computer boots up because it resides in the boot sector of a floppy disk or the master boot record of a hard disk.

(a) system virus

(b) Trojan horse virus

(c) file virus

(d) macro virus

(e) None of these

4. Which error detection method uses one's complement arithmetic?

(a) Simply parity check

(b) Checksum

(c) Two-dimensional parity check

(d) CRC

(e) None of these

5. A result of a computer virus can NOT lead to ________ .

(a) Disk Crash

(b) Mother Board Crash

(c) Corruption of program

(d) Deletion of files

(e) None of these

6. The network interface card of LAN is related to following layer of OSI Model

(a) Transport

(b) Network

(c) Data Link

(d) Physical

(e) All of these

7. Which of the following does NOT describe a data warehouse?

(a) Subject-oriented

(b) Integrated

(c) Time-variant

(d) Updateable

(e) None of these

8. Which of the following is TRUE ?

(a) Logical design is software-dependent

(b) In a distributed database, database is stored in one physical location

(c) Conceptual design translates the logical design into internal model

(d) Logical design is software independent

(e) None of these

9. A range check ________

(a) ensures that only the correct data type is entered into a field

(b) verifies that all required data is present

(c) determines whether a number is within a specified limit

(d) tests if the data in two or more associated fields is logical

(e) None of these

10. The total set of interlinked hypertext documents worldwide is-

(a) HTTP

(b) Browser

(c) WWW

(d) B2B

(e) None of these

11. With the object-oriented (OO) approach, an object encapsulates, or ________ .a programmer.

(a) carries out, the details of an object for

(b) hides, the details of an object from

(c) reveals, the details of an object to

(d) extends, the details of an object beyond

(e) None of these

12. Every computer connected to an intranet or extranet must have a distinct ________

(a) firewall

(b) proxy server

(c) IP address

(d) domain name

(e) None of these

13. A table of bits in which each row represents the distinct values of a key?

(a) Join index

(b) Bitmap index

(c) B + Tree

(d) Hierarchical index

(e) None of these

14. The degree of detail that should be incorporated into a database depends on what?

(a) Data integrity

(b) The type of database

(c) The user's perspective

(d) The business practices and policies

(e) None of these

15. The ________ converts digital signals to analog signals for the purpose of transmitting data over telephone lines.

(a) Modem

(b) Router

(c) Gateway

(d) Bridge

(e) All of these

16. Before a package can be used in a java program it must be ________ .

(a) executed

(b) referenced

(c) imported

(d) declared

(e) None of these

17. Choose the correct way to indicate that a line in a C++ program is a comment line, that is, a line the will not be executed as an instruction ________ .

(a) begin the line with a # sign

(b) begin the line with double slashes (/ /)

(c) begin and end the line with double hyphens (- _ -)

(d) indent the line

(e) None of these

18. Programming language built into user programs such as Word and Excel are known as ________

(a) 4GLs

(b) macro languages

(c) object-oriented languages

(d) visual programming languages

(e) None of these

19. Firewalls are used to protect against ________ .

(a) Unauthorized Attacks

(b) Virus Attacks

(c) Data Driven Attacks

(d) Fire Attacks

(e) All of these

20. This is a standard way for a Web server to pass a Web user's request to an application program and to receive data back to forward to the user-

(a) Interrupt request

(b) Forward DNS lookup

(c) Data-Link layer

(d) File Transfer Protocol

(e) Common gateway interface

21. Three SQL, DDL, CREATE commands are ________ .

(a) Schema, Base and Table

(b) Base, Table and Schema

(c) Key, Base and Table

(d) Schema, Table and View

(e) None of these

22. Data are ________ in client/server computing.

(a) never sent to the client machine

(b) sent in very large sections to save processing time

(c) sent only upon the client's request

(d) sent in complete copies for the client to filter and sort

(e) sent from the client to the server for processing

23. Which of the following will NOT eliminates the ambiguities of a null value?

(a) Define the attribute as required

(b) Define subtypes

(c) Define each attribute as having an initial value that is recognized as blank

(d) Define supertypes

(e) None of these

24. The ________ directory is mandatory for every disk.

(a) Root

(b) Base

(c) Sub

(d) Case

(e) None of these

25. This is a group of servers that share work and may be able to back each other up if one server fails.

(a) Channel bank

(b) Cluster

(c) Tiger team

(d) Serverless backup

(e) Logical unit

ANSWERS

1. (a), 2. (c), 3. (e), 4. (b), 5. (b)
6. (e), 7. (d), 8. (a), 9. (c), 10. (a)
11. (b), 12. (c), 13. (b), 14. (b), 15. (a)
16. (c), 17. (b), 18. (d), 19. (a), 20. (e)
21. (d), 22. (c), 23. (d), 24. (c), 25. (b)