SBI Specialist Officer 2014 Previous Paper ( Morning and Evening Sessions ).
Following are the questions asked in the SBI Specialist Officer 2014 – Systems in the Professional Knowledge Section.This section had 50Q each question carrying 2 Marks. The marks scored in this section are carry forwarded to the next round and the other sections are just qualifying in nature.
Questions from Evening Session.
1.which two files are used during operation of the DBMS?
Ans:data dictionary and transaction log
2.Fragmentation is –
Ans: fragments of memory words unused in a page
3.Virtual memory is –
Ans: an illusion of an extremely large memory
4.Access time of symbol table will be logarithmic if it is implemented using
Ans: Search Trees
5.Manager’s salary details are to be hidden from Employee Table. This Technique is called as
Ans: External level Data hiding or Conceptual level hiding.
6.Which of the following addresses is used to deliver a message to the correct application program running on a host?
Ans: Port
7.In classful addressing, the IP address 190.255.254.254 belongs to
Ans: Class B
8.While estimating the cost of software, Lines of Code (LOC) and Function Points (FP) are used to measure which one of the following?
Ans: Size of software
9.Page stealing is_____Ans: Taking page frame from another working set
10.XOR Gate is ideal for testing parity because even parity produce____ and odd parity produce____ output?
Ans: Low,High
11.Question related to Data link layer error detection
Ans: Cyclic Redundancy check
12.Virus __
Ans:Vital Information Resource under siege
13. Eclipse in ER diagram represents___
Ans: Attributes
14. Similar term for related records
Ans: File
15. Railway track best suits___
Ans: Half-Duplex
16. students and course enrolled relationship of
Ans: Many to Many (Doubtful whether the question was Student to course relation?)
17.Tuple is a
Ans: Row level attribute
18.A table is synonym for___
Ans: Relation
19. Thrasing is most significantly affected by___
Ans: Program structure(?)
20.End to end and Host to Host delivery is a reposibility of ___ Layer
Ans: Transport Layer
21. Device which Compiles the code in system which wil be used in another system
Ans: Cross compiler
22.First operator used in microprocessor is__
Ans: CP/M
23. What is multiprogrmming operating system?
Ans: Single user can run mulpile programs…
24. Three types of authorities of user category can be updated using which command chuser,chgrp,cat,chmod….
Ans:chmod
25. What uses 7 bits to represent each character
Ans: Ascii
26. Data integrity conrol is__
Ans: has the data dictionary keep the date and time of last access last back-up, and most recent modification for all files
27.There are certain packages that allow people to define data items, place these items in particular records, combine the records into designated files and then manipulate and retrieve the stored data. What are they called?
Ans: DBMS
28.Which of the following derivations does a bottom-up parser use while parsing an input string ?
The input is scanned from left to right.
29.Compiler is preferred over intrepretter because
A. It can generate stand-alone programs that often take less time for execution.
B. It is much helpful in the initial stages of program development.
C. Debugging can be faster and easier.
D. If one changes a statement, only that statement needsrecompilation.
Ans: (B)It can generate stand-alone programs that often take less timefor execution.(?)
30.What utility do you use to transfer files and exchange messages?
Ans : EMAIL
31.The main difference between a DFSA and an NDFSA is
Ans: in DFSA, from any given state, there can’t be any alphabet leading to two diferent states
32.190.255.254.254 is of which class
Ans Class B
33.The number of instructions needed to add ‘n’ numbers and store the result in memory usingonly one address instruction is
A)N+1
B)N-1
c)independent of n
d) None of the Above
Ans : A
34.From a given tautology, another tautology can be derived by interchanging.A). 0 and 1B) And and ORC) 0 and 1; ANd and ORD) Impossible to derive
Ans: C
35.Number of symbols necessary to simulate a TM with m symbols and n states is
ANs: 4mn +m
—————————————————————————————-
Questions from Morning Session
1. At which layer does Hub Work?
Ans. Layer 1
2. Belady’s Anomaly occurs in which Scheduling Technique?
Ans. First In First Out (FIFO)
3. One question on Compiler Design having rules such as S->ABC; A->BC…have to trace the string.
4. Relational Algebra and Relational Calculus are:
(A) Both Procedural languages
(B) Procedural and Non Procedural Respectively
(C) Non Procedural and Procedural Respectively
(D) Both are Non-Procedural
(E) None of These
Ans. (B)
5. Primary key is selected from a set of
(A) Alternate Keys (C) Foreign Keys (E) Both A and C
(B) Candidate Keys (D) None of These
Ans. (B)
6. Which class IP Address has highest number of Network Addresses?
Ans. Class C
Reason:
7. The Transport layer corresponds to which layer in TCP Model?
Ans. Transport (Both Models have layer with same name)
8. A Type of Topology requiring Human Intervention
Ans. T-MAN
9. How do Toggle Flip-Flops divide Clock frequency of size n MHz?
(A) n (B) 2n
(C) log n (D) None
Ans. Log n
10. Full form of SQL is:
Ans. Structured Query language
11. What is the function of Quarter Adder?
Ans. A quarter adder is a circuit that can add two binary digits but will not produce a carry. This circuit
will produce the following results:
0 plus 0 = 0
0 plus 1 = 1
1 plus 0 = 1
1 plus 1 = 0 (no carry)
12. There are 7 bits in ____________ system
(A) ASCII
(B) EBCDIC
(C) BCD
(D) Unicode
(E) None of These
Ans. (A) ASCII
13.
Which of the following is not true about the memory management?
A.
virtual memory is used only in multi-user systems
B.
segmentation suffers from external fragmentation
C.
paging suffers from internal fragmentation
D.
segmented memory can be paged
E.
None of the above
Ans. (A)
14. Data integrity control
(A) is used to set upper and lower limits on numeric data
(B) requires the use of passwords to prohibit unauthorized access to the file
(C) has the data dictionary keep the date and time of last access last back-up, and most recent modification for all files
(D) All of the above
(E) None of the above
Ans. (C)
15. What does Bottom up Parser generates?
Ans. Rightmost Derivation in Reverse
16. What command is used to assign only read permission to all three categories of the file ‘letter’?
(A) chmod u + r, g + r, o – x letter
(B) chmod ugo = r letter
(C) chmod a – rw letter
(D) chmod go + r letter
(E) None of the above
Ans. (B)
17. Collection of fields is called —
(A) Information (B) Object (C) Record (D) File (E) None
Ans. (C)
18. In an E-R diagram ellipse is used to represent
(A) attributes (B) Relationships
(C) Entity (D) Tuple
(E) None
Ans (A)
19.
Compiler is preferred over intrepretter because
A. It can generate stand-alone programs that often take less time for execution.
B. It is much helpful in the initial stages of program development.
C. Debugging can be faster and easier.
D. If one changes a statement, only that statement needs recompilation.
Ans. B
20. Which of the following is the loopback address?
Ans. 127.0.0.1
21. Which two files are used during operation of the DBMS?
(A) query language and utilities
(B) data manipulation language and query language
(C) data dictionary and transaction log
(D) data dictionary and query language
(E) None
Ans. (C)
22. Access time of symbol table will be logarithmic, if it is implemented by
(A) Liner List
(B) Search Trees
(C) Hash table
(D) Self Organizing List
(E) Either (B) or (C)
Ans (B)
23. Manager’s salary details are to be hidden from Employee Table. This Technique is called as
(A) Conceptual level Datahiding
(B) Physical level Datahiding
(C) External level Datahiding
(D) Logical level Datahiding
Ans. (C)
24. Which of the following addresses is used to deliver a message to the correct application program running on a host?
(A) Port
(B) IP
(C) Logical
(D) Physical
Ans. (A) Port
25. In classful addressing, the IP address 190.255.254.254 belongs to
(A) Class A
(B) Class B
(C) Class C
(D) None of These
Ans. (B)
26. While estimating the cost of software, Lines of Code (LOC) and Function Points (FP) are used to measure which one of the following?
(A) Length of code
(B) Size of software
(C) Functionality of software
(D) None of the above
Ans. (B)
27. The XOR gates are ideal for testing parity because even-parity words produce a _____ output and odd-parity words produce a _____ output
(A) low, high (B) high, low
(C) odd, even (D) Even,Odd
Ans. (A)
28. Error detection at the data link level is achieved by?
(A) Bit stuffing (B) Hamming codes
(C) Cyclic Redundancy codes (D) Equalization
(E) None of These
Ans (C)
29. What is the full form of VIRUS commonly used in terms of computer technology?
(A) Various Information Resource Under Siege
(B) Vital Information Resource Under Siege.
(C) Viirtual Information Resource Under Secured
(D) Very Imoprtant Resource Under Seiege
Ans. (B)
30. railway track is an example of
a. simplex b. half–duplex c. full–duplex d. all of these
Ans. (B)
31. Synonym of Table is___
Ans. Relation
32. The problem of thrashing is affected significantly by:
A. program structure. B. program size. C. primary-storage size. D. all of the above.
Ans., (A)
33. End to end and Host to Host delivery is a reponsibility of which Layer?
Ans. Transport Layer
34. System that Compiles the code in system which wil be used in another system
Ans. Cross-Compiler
35. A good software design must have
(A) High module coupling, High module cohesion
(B) High module coupling, Low module cohesion
(C) Low module coupling, High module cohesion
(D) Low module coupling, Low module cohesion
Ans. (C)
36. application to application delivery is guaranteed by which layer?
Ans. Application layer
37. What SQL keyword must be used to remove duplicate rows from the result?
Ans, SELECT DISTINCT Statement
38. DML command that modifies rows (tuples) of your tables ____
Ans. UPDATE
39. How many times the word ‘print’ shall be printed by the following program segment?
for(i=1, i?2, i++)
for(j=1, J?2, J++)
for(k=l, k?2, k++)
printf(“print/n”)
(A) 1
(B) 3
(C) 6
(D) 8
40. Which of the following is not a type of Database Management System?
(A) Hierarchical
(B) Network
(C) Relational
(D) Sequential
Ans.: D.)
41.
Consider the following statements for priority queue:
S1 : It is a data structure in which the intrinsic ordering of the elements does determine the result of its basic operations.
S2: The elements of a priority queue may be complex structures that are ordered on one or several fields.
Which of the following is correct?
(A) Both S1 and S2 are incorrect.
(B) S1 is correct and S2 is incorrect.
(C) SI is incorrect and S2 is correct.
(D) Both S1 and S2 are correct.
Ans.: D.
42. The task of correcting and pre processing data is called as
(A) Data streaming
(B) Data cleaning
(C) Data mining
(D) Data storming
Ans.: B.
43. COCOMO stands for
(A) Composite Cost Model
(B) Constructive Cost Model
(C) Constructive Composite Model
(D) Comprehensive Construction Model
Ans.: B.)
44. The mv command changes
(A) the inode
(B) the inode-number
(C) the directory entry
(D) both the directory entry and the inode
Ans.:C.)
45. Dirty bit is used to show the
(a) Page with corrupted data
(b) The wrong page in the memory
(c) Page that is modified after being loaded into
cache memory
(d) Page that is less frequently accessed
Ans (C)
46. The first-fit, best-fit and the worst-fit algorithm can be used for
(A) contiguous allocation of memory
(B) linked allocation of memory
(C) indexed allocation of memory
(D) all of thes
Ans (B)
47. Routers operate at layer _____.
LAN switches operate at layer _____.
Ethernet hubs operate at
layer _____.
Word processing operates at layer _____.
Ans. Layer 3,Layer 2 ,Layer 1 , None
48. A receiving host has failed to receive all of the segments that it should acknowledge. What can the host do to improve the reliability of this communication session?
(A) Send a different source port number.
(B) Restart the virtual circuit.
(C) Decrease the sequence number.
(D) Decrease the window size.
Ans. Option D
Reason: A receiving host can control the transmitter by using flow control (TCP uses Windowing by default). By decreasing the window size, the receiving host can slow down the transmitting host so the receiving host does not overflow its buffers.
49. Full form of ISP
Ans. Internet Service Provider
50. DSP full form
Ans. Digital Signal processing
Do share with us if you remember any questions from the examination.

