mahendras

| Join Mahendras Telegram Channel | Like Mahendras Facebook Page | Online Admission | Download Mahendras App

Now Subscribe for Free videos

Subscribe Now

IBPS - SO - IT - QUIZ : 05.01.2016

Bankers Guru

1. A transparent DBMS? 

(1) Cannot hide sensitive information from users

(2) Keep its logical structure hidden from users

(3) Keeps its physical structure hidden from users

(4) Both 2 and 3

(5) Access by any user

Ans. (3) keeps its physical structure hidden from users

2. A locked file can be _____. 

(1) Accessed by only one user

(2) Modified by users with the correct password

(3) Is used to hide sensitive information

(4) Both 2 and 3

(5) Modified by users with the correct username

Ans. (1) Accessed by only one user

3. A trigger is? 

(1) A statement that enables to start any DBMS

(2) A statement that is executed by the user when debugging an application program

(3) A condition the system tests for the validity of the database user

(4) A statement that is executed automatically by the system as a side effect of modification to the database.

(5) A statement that enables to end any DBMS

Ans. (4) A statement that is executed automatically by the system as a side effect of modification to the database.

4. Manager's salary details are hidden from the employee. This is ______. 

(1) Conceptual level data hiding

(2) Physical level data hiding

(3) External level hiding

(4) Internal level data hiding

(5) Logical level data hiding

Ans. (3) External level hiding

5. What are the primitive operations common to all record management systems?

(1) Addition

(2) deletion 

(3) modification

(4) All

(5) None of these

Ans. (4) All

6. Which scheduling policy is most suitable for time-shared operating system?

(1) Shortest job first

(2) Round-robin

(3) Elevator

(4) First-come-first-serve

(5) Last-come-first-serve

Ans. (2) Round-robin Scheduling

7. Which of the following storage is fastest?

(1) RAM

(2) ROM

(3) Register

(4) Blu-ray disc

(5) Magnetic Disk

Ans. (3) Register

8. A polymorphic virus ______.

(1) Modifies its program code each time it attaches itself to another program or file.

(2) Is a malicious-logic program that copies itself repeatedly in memory or on a disk drive until no memory or disk space remains.

(3) A malicious-logic program that hides within or looks like a legitimate program.

(4) Infects a program file, but still reports the size and creation date of the original, uninfected program.

(5) Both 1 and 3

Ans. (1) Modifies its program code each time it attaches itself to another program or file

9. Cache Memory ______.

(1) Helps to store more data in hard disk

(2) Placed between Hard Disk and microprocessor

(3) Stores data permanently

(4) Holds last time visited web site only

(5) Placed between main memory and microprocessor

Ans. (5) Placed between main memory and microprocessor

10. SWIFT stands for:

(1) Society for Worldwide Interbank Financial Technology

(2) Society for Worldwide International Financial Telecommunication

(3) Society for Worldwide Interbank Financial Transmission

(4) Society for Worldwide Interbank Financial Transfer

(5) Society for Worldwide Interbank Financial Telecommunication

Ans. (5) Society for Worldwide Interbank Financial Telecommunication

Copyright © 2023 www.mahendraguru.com All Right Reserved by Mahendra Educational Pvt . Ltd.