mahendras

| Join Mahendras Telegram Channel | Like Mahendras Facebook Page | Online Admission | Download Mahendras App

Now Subscribe for Free videos

Subscribe Now

IBPS - SO - IT : 04.01.2016

Bankers Guru

1. In general, the binary search method needs no more than ……………. comparisons.

(1) [log2n]-1

(2) [logn]+1

(3) [log2n]

(4) [log2n]+1 

(5) [logn]+2

Ans. (4) [log2n]+1

2. The………enables you to simultaneously keep multiple Web pages open in one browser window.

(1) tab box

(2) pop-up helper

(3) tab row

(4) address bar

(5) Esc key

Ans. (3) Tab Row

3. Compiler is the ______.

(1) name given to the computer operator

(2) part of the digital machine to store the information

(3) translator of source program to object

(4) part of arithmetic logic unit

(5) operator of Boolean Algebra

Ans. (3) translator of source program to object

4. A data warehouse is which of the following?

(1) Can be updated by the end users

(2) Contains numerous naming conventions and formats

(3) Organized around important subject areas

(4) Contains only current data

(5) All of above

Ans. (3) Organized around important subject areas

5. In a ring topology , the computer in possession of the ______ can trasmit data

(1) packet

(2) data

(3) access method

(4) token

(5) header

Ans. (4) token

6. A database management system (DBMS) is a ______.

(1) hardware system used to create , maintain and provide controlled access to a database

(2) hardware system used to create, maintain, and provide uncontrolled access to a database.

(3) software system used to create, maintain, and provide uncontrolled access to a database.

(4) software system used to create, maintain, and provide controlled access to a database.

(5) Hardware and software both system used to create, maintain, and provide controlled access to a database

Ans. (4) Software system used to create, maintain, and provide controlled access to a database

7. Which of the following is NOT a goal of transaction processing system?

(1) Capture, process and store transactions

(2) Produce a variety of documents related to routine business activities

(3) Reduce manual effort associated with processing business transactions

(4) Produce standard reports used for management decision making

(5) None of these

Ans. (2) Produce a variety of documents related to routine business activities

8. A Proxy server is used for which of the following?

(1) To provide security against unauthorized users

(2) To process client requests for web pages

(3) To process client requests for database access

(4) To provide TCP/IP

(5) To process server requests for web pages

Ans. (2) To process client requests for web pages

9. When data changes in multiple lists and all lists are not updated, this causes ______.

1) Data redundancy

2) Information overload

3) Duplicated data

4) Data inconsistency

5) Data Consistency

Ans. (4) Data inconsistency

10. Virtual memory is typically located ________.

(1) on a floppy disk

(2) in the CPU

(3) in a flash card

(4) on the hard drive

(5) on the ROM

Ans. (4) on the hard drive

Copyright © 2023 www.mahendraguru.com All Right Reserved by Mahendra Educational Pvt . Ltd.