SBI Specialist Officer 2014 Previous Paper – Questions Based On Memory – Exam Date 19-04-2014

State Bank Of India

SBI Specialist Officer 2014 Previous Paper  ( Morning and Evening Sessions ).

Following are the questions asked in the SBI Specialist Officer 2014 – Systems in the Professional Knowledge Section.This section had 50Q each question carrying 2 Marks. The marks scored in this section are carry forwarded to the next round and the other sections are just qualifying in nature.

Questions from Evening Session.

1.which two files are used during operation of the DBMS?

Ans:data dictionary and transaction log

2.Fragmentation is –

Ans: fragments of memory words unused in a page

3.Virtual memory is –

Ans: an illusion of an extremely large memory

4.Access time of symbol table will be logarithmic if it is implemented using

Ans: Search Trees

5.Manager’s salary details are to be hidden from Employee Table. This Technique is called as

Ans: External level Data hiding or Conceptual level hiding.

6.Which of the following addresses is used to deliver a message to the correct application program running on a host?

Ans: Port

7.In classful addressing, the IP address 190.255.254.254 belongs to

Ans: Class B

8.While estimating the cost of software, Lines of Code (LOC) and Function Points (FP) are used to measure which one of the following?

Ans: Size of software

9.Page stealing is_____Ans: Taking page frame from another working set

10.XOR Gate is ideal for testing parity because even parity produce____ and odd parity produce____ output?

Ans: Low,High

11.Question related to Data link layer error detection

Ans: Cyclic Redundancy check

12.Virus __

Ans:Vital Information Resource under siege

13. Eclipse in ER diagram represents___

Ans: Attributes

14. Similar term for related records

Ans: File

15. Railway track best suits___

Ans: Half-Duplex

16. students and course enrolled relationship of

Ans: Many to Many (Doubtful whether the question was Student to course relation?)

17.Tuple is a

Ans: Row level attribute

18.A table is synonym for___

Ans: Relation

19. Thrasing is most significantly affected by___

Ans: Program structure(?)

20.End to end and Host to Host delivery is a reposibility of ___ Layer

Ans: Transport Layer

21. Device which Compiles the code in system which wil be used in another system

Ans: Cross compiler

22.First operator used in microprocessor is__

Ans: CP/M

23. What is multiprogrmming operating system?

Ans: Single user can run mulpile programs…

24. Three types of authorities of user category can be updated using which command chuser,chgrp,cat,chmod….

Ans:chmod

25. What uses 7 bits to represent each character

Ans: Ascii

26. Data integrity conrol is__

Ans: has the data dictionary keep the date and time of last access last back-up, and most recent modification for all files

27.There are certain packages that allow people to define data items, place these items in particular records, combine the records into designated files and then manipulate and retrieve the stored data. What are they called?

Ans: DBMS

28.Which of the following derivations does a bottom-up parser use while parsing an input string ?

The input is scanned from left to right.

29.Compiler is preferred over intrepretter because

A. It can generate stand-alone programs that often take less time for execution.

B. It is much helpful in the initial stages of program development.

C. Debugging can be faster and easier.

D. If one changes a statement, only that statement needsrecompilation.

Ans: (B)It can generate stand-alone programs that often take less timefor execution.(?)

30.What utility do you use to transfer files and exchange messages?

Ans : EMAIL

31.The main difference between a DFSA and an NDFSA is

Ans: in DFSA, from any given state, there can’t be any alphabet leading to two diferent states

32.190.255.254.254 is of which class

Ans Class B

33.The number of instructions needed to add ‘n’ numbers and store the result in memory usingonly one address instruction is

A)N+1

B)N-1

c)independent of n

d) None of the Above

Ans : A

34.From a given tautology, another tautology can be derived by interchanging.A). 0 and 1B) And and ORC) 0 and 1; ANd and ORD) Impossible to derive

Ans: C

35.Number of symbols necessary to simulate a TM with m symbols and n states is

ANs: 4mn +m

—————————————————————————————-

Questions from Morning Session

1. At which layer does Hub Work?

Ans. Layer 1

2. Belady’s Anomaly occurs in which Scheduling Technique?
Ans. First In First Out (FIFO)

3. One question on Compiler Design having rules such as S->ABC; A->BC…have to trace the string.

4. Relational Algebra and Relational Calculus are:

(A) Both Procedural languages

(B) Procedural and Non Procedural Respectively

(C) Non Procedural and Procedural Respectively

(D) Both are Non-Procedural

(E) None of These

Ans. (B)

5. Primary key is selected from a set of

(A) Alternate Keys                 (C) Foreign Keys               (E) Both A and C

(B) Candidate Keys        (D) None of These

Ans. (B)

6. Which class IP Address has highest number of Network Addresses?

Ans. Class C
Reason:

7. The Transport layer corresponds to which layer in TCP Model?
Ans. Transport (Both Models have layer with same name)

8. A Type of Topology requiring Human Intervention
Ans. T-MAN

9. How do Toggle Flip-Flops divide Clock frequency of size n MHz?
(A) n                                  (B) 2n

(C) log n                     (D) None

Ans. Log n

10. Full form of SQL is:
Ans. Structured Query language

11. What is the function of Quarter Adder?
Ans. A quarter adder is a circuit that can add two binary digits but will not produce a carry. This circuit
will produce the following results:
0 plus 0 = 0
0 plus 1 = 1
1 plus 0 = 1
1 plus 1 = 0 (no carry)

12. There are 7 bits in ____________ system

(A) ASCII

(B) EBCDIC
(C) BCD

(D) Unicode

(E) None of These

Ans. (A) ASCII

13.

Which of the following is not true about the memory management?

A.

virtual memory is used only in multi-user systems

B.

segmentation suffers from external fragmentation

C.

paging suffers from internal fragmentation

D.

segmented memory can be paged

E.

None of the above

Ans. (A)

14. Data integrity control

(A) is used to set upper and lower limits on numeric data

(B) requires the use of passwords to prohibit unauthorized access to the file

(C) has the data dictionary keep the date and time of last access last back-up, and most recent modification for all files
(D) All of the above

(E) None of the above

Ans. (C)

15. What does Bottom up Parser generates?
Ans. Rightmost Derivation in Reverse

16.  What command is used to assign only read permission to all three categories of the file ‘letter’?

(A) chmod u + r, g + r, o – x letter

(B) chmod ugo = r letter

(C) chmod a – rw letter

(D) chmod go + r letter

(E) None of the above

Ans. (B)

17. Collection of fields is called
(A) Information (B) Object (C) Record (D) File (E) None

Ans. (C)

18. In an E-R diagram ellipse  is used to represent

(A) attributes                                 (B) Relationships

(C) Entity                          (D) Tuple

(E) None

Ans (A)

19.

Compiler is preferred over intrepretter because

A. It can generate stand-alone programs that often take less time for execution.

B. It is much helpful in the initial stages of program development.

C. Debugging can be faster and easier.

D. If one changes a statement, only that statement needs recompilation.

Ans. B

20. Which of the following is the loopback address?
Ans. 127.0.0.1

21. Which two files are used during operation of the DBMS?

(A) query language and utilities

(B) data manipulation language and query language

(C) data dictionary and transaction log

(D) data dictionary and query language

(E) None

Ans. (C)

22. Access time of symbol table will be logarithmic, if it is implemented by

(A) Liner List

(B) Search Trees

(C)  Hash table

(D) Self Organizing List

(E) Either (B) or (C)

Ans (B)

23. Manager’s salary details are to be hidden from Employee Table. This Technique is called as
(A) Conceptual level Datahiding
(B) Physical level Datahiding
(C) External level Datahiding
(D) Logical level Datahiding
Ans. (C)

24. Which of the following addresses is used to deliver a message to the correct application program running on a host?
(A) Port
(B) IP
(C) Logical
(D) Physical

Ans. (A) Port

25. In classful addressing, the IP address 190.255.254.254 belongs to
(A) Class A
(B) Class B
(C) Class C
(D) None of These

Ans. (B)

26. While estimating the cost of software, Lines of Code (LOC) and Function Points (FP) are used to measure which one of the following?
(A) Length of code
(B) Size of software
(C) Functionality of software
(D) None of the above

Ans. (B)

27. The XOR gates are ideal for testing parity because even-parity words produce a _____ output and odd-parity words produce a _____ output

(A) low, high                                                         (B) high, low

(C) odd, even                                                              (D) Even,Odd

Ans. (A)

28. Error detection at the data link level is achieved by?

(A) Bit stuffing                                         (B) Hamming codes

(C) Cyclic Redundancy codes                  (D) Equalization

(E) None of These

Ans (C)

29. What is the full form of VIRUS commonly used in terms of computer technology?

(A) Various Information Resource Under Siege

(B) Vital Information Resource Under Siege.

(C) Viirtual Information Resource Under Secured

(D) Very Imoprtant Resource Under Seiege

Ans. (B)

30. railway track is an example of

a. simplex b. halfduplex c. fullduplex d. all of these

Ans. (B)

31. Synonym of Table is___

Ans. Relation

32. The problem of thrashing is affected significantly by:
A. program structure. B. program size. C. primary-storage size. D. all of the above.

Ans., (A)

33.  End to end and Host to Host delivery is a reponsibility of which Layer?

Ans. Transport Layer

34. System that Compiles the code in system which wil be used in another system

Ans. Cross-Compiler

35. A good software design must have
(A) High module coupling, High module cohesion
(B) High module coupling, Low module cohesion
(C) Low module coupling, High module cohesion
(D) Low module coupling, Low module cohesion

Ans. (C)

36. application to application delivery is guaranteed by which layer?

Ans. Application layer

37. What SQL keyword must be used to remove duplicate rows from the result?

Ans, SELECT DISTINCT Statement

38. DML  command  that  modifies rows (tuples) of your tables  ____

Ans. UPDATE

39. How many times the word ‘print’ shall be printed by the following program segment?

for(i=1, i?2, i++)

for(j=1, J?2, J++)

for(k=l, k?2, k++)

printf(“print/n”)

(A) 1

(B) 3

(C) 6

(D) 8

Ans.: D

40. Which of the following is not a type of Database Management System?

(A) Hierarchical

(B) Network

(C) Relational

(D) Sequential

Ans.: D.)

41.

Consider the following statements for priority queue:

S1 : It is a data structure in which the intrinsic ordering of the elements does determine the result of its basic operations.
S2: The elements of a priority queue may be complex structures that are ordered on one or several fields.
Which of the following is correct?

(A) Both S1 and S2 are incorrect.

(B) S1 is correct and S2 is incorrect.

(C) SI is incorrect and S2 is correct.

(D) Both S1 and S2 are correct.

Ans.: D.

42. The task of correcting and pre processing data is called as

(A) Data streaming

(B) Data cleaning

(C) Data mining

(D) Data storming

Ans.: B.

43. COCOMO stands for

(A) Composite Cost Model

(B) Constructive Cost Model

(C) Constructive Composite Model

(D) Comprehensive Construction Model

Ans.: B.)

44. The mv command changes

(A) the inode

(B) the inode-number

(C) the directory entry

(D) both the directory entry and the inode

Ans.:C.)

45. Dirty bit is used to show the

(a) Page with corrupted data

(b) The wrong page in the memory

(c) Page that is modified after being loaded into

cache memory

(d) Page that is less frequently accessed

Ans (C)

46. The first-fit, best-fit and the worst-fit algorithm can be used for

(A) contiguous allocation of memory

(B) linked allocation of memory

(C) indexed allocation of memory

(D) all of thes

Ans (B)

47. Routers operate at layer _____.

LAN switches operate at layer _____.

Ethernet hubs operate at

layer _____.

Word processing operates at layer _____.

Ans.  Layer 3,Layer 2 ,Layer 1 , None

48. A receiving host has failed to receive all of the segments that it should acknowledge. What can the host do to improve the reliability of this communication session?

(A) Send a different source port number.

(B) Restart the virtual circuit.

(C) Decrease the sequence number.

(D) Decrease the window size.

Ans. Option D

Reason: A receiving host can control the transmitter by using flow control (TCP uses Windowing by default). By decreasing the window size, the receiving host can slow down the transmitting host so the receiving host does not overflow its buffers.

49. Full form of ISP

Ans. Internet Service Provider

50. DSP full form

Ans. Digital Signal processing

Do share with us if you remember any questions from the examination. 

Related Posts
JMET 2009 Question Paper,Key and Expected Cut-Offs
Joint Management Entrance Test (JMET) entrance test held all over India on 14 of December 2008 for admission into MBA Program at the IIT’s and IISC. Pattern Of Exam : Total time ...
READ MORE
XAT 2009 Question Paper, Answer Keys and Cut Offs
XAT (Xavier’s Admission Test) 2009, conducted across India on January 4th 2009.Here’s is the Question Paper, Answer keys and Expected Cuts of various institutes. XAT 2009 Question paper - Download XAT 2009 ...
READ MORE
XLRI is conducting Admission Test on All ...
READ MORE
JMET 2009 Question Paper,Key and Expected Cut-Offs
XAT 2009 Question Paper, Answer Keys and Cut Offs
XAT Previous Years Essay Topics

Leave a Reply

Your email address will not be published. Required fields are marked *