Latest Updated Exam / Guess Papers - http://syllabus123.blogspot.com/
(a) entity integrity rule
Bank Exam Paper / Model Paper for Specialist Computer / IT Officer Scale - I /II
(EXAMINATION to be held on 11th March 2012 )
1. The _____ states that a foreign key must either match a primary key value in another relation or it must be null.(EXAMINATION to be held on 11th March 2012 )
(a) entity integrity rule
2. An applet __________
(c) is a compiled program that usually runs on the client
(c) is a compiled program that usually runs on the client
3. A _____ sometimes called a boot sector virus, executes when a computer boots up because it resides in the boot sector of a floppy disk or the master boot record of a hard disk.
(e) None of these
(e) None of these
4. Which error detection method uses one’s complement arithmetic?
(b) Checksum
(b) Checksum
5. A result of a computer virus can not lead to ___.
(b) Mother Board Crash
(b) Mother Board Crash
6. The network interface card of LAN is related to following layer of OSI Model-
(e) All of these
(e) All of these
7. Which of the following does not describe a data warehouse?
(d) Updateable
(d) Updateable
8. Which of the following is true ?
(a) Logical design is software-dependent
(a) Logical design is software-dependent
9. A range check _____
(c) determines whether a number is within a specified limit
(c) determines whether a number is within a specified limit
10. The total set of interlinked hypertext documents worldwide is-
(c) WWW
(c) WWW
11. With the object-oriented (OO) approach, an object encapsulates, or_____.a programmer.
(b) hides, the details of an object from
(b) hides, the details of an object from
12. Every computer connected to an intranet or extranet must have a distinct_____
(c) IP address
(c) IP address
13. A table of bits in which each row represents the distinct values of a key?
(b) Bitmap index
(b) Bitmap index
14. The degree of detail that should be incorporated into a database depends on what?
(b) The type of database
(b) The type of database
15. The ___ converts digital signals to analog signals for the purpose of transmitting data over telephone lines.
(a) Modem
16. Before a package can be used in a java program it must be___.
(c) imported
(c) imported
17. Choose the correct way to indicate that a line in a C++ program is a comment line, that is, a line the will not be executed as an instruction___.
(b) begin the line with double slashes (/ /)
(b) begin the line with double slashes (/ /)
18. Programming language built into user programs such as Word and Excel are known as____
(c) object-oriented languages
(c) object-oriented languages
19. Firewalls are used to protect against___.
(a) Unauthorized Attacks
(a) Unauthorized Attacks
20. This is a standard way for a Web server to pass a Web user’s request to an application program and to receive data back to forward to the user-
(e) Common gateway interface
(e) Common gateway interface
21. Three SQL, DDL, CREATE commands are__.
(d) Schema, Table and View
(d) Schema, Table and View
22. Data are ________ in client/server computing.
(c) sent only upon the client’s request
(c) sent only upon the client’s request
23. Which of the following will not eliminates the ambiguities of a null value?
(d) Define supertypes
(d) Define supertypes
24. The____directory is mandatory for every disk.
(a) Root
(a) Root
25. This is a group of servers that share work and may be able to back each other up if one server fails.
(b) Cluster
(b) Cluster