Previous questions with answers of the Professional
Knowledge paper of I.T. Officers/Specialist Officers of Banks.
1. The _____ states that a foreign key must either match a
primary key value in another relation or it must be null.
(a) entity integrity rule
(b) referential integrity constraint
(c) action assertion (d)
composite attribute (e) None of
these.
2. An applet __________
(a) is an interpreted program that runs on the client (b) tracks the number of visitors to a
Website (c) is a compiled program that
usually runs on the client (d) collects
data from visitors to a Website (e) None
of these.
3. A _____ sometimes called a boot sector virus, executes when a computer boots up
because it resides in the boot sector of
a floppy disk or the master boot record of a hard disk.
(a) system virus (b) Trojan
horse virus (c) file virus (d) macro
virus (e) None of these.
4. Which error detection method uses one's complement
arithmetic?
(a) Simply parity check
(b) Checksum (c) Two-dimensional
parity check (d) CRC (e) None of these (b)
5. A result of a computer virus can not lead to ___.
(a) Disk Crash (b)
Mother Board Crash (c) Corruption of
program (d) Deletion of files (e) None of these.
6. The network interface card of LAN is related to following
layer of OSI Model-
(a) Transport (b) Network
(c) Data Link (d) Physical (e) All of these
7. Which of the following does not describe a data
warehouse?
(a) Subject-oriented
(b) Integrated (c)
Time-variant (d) Updateable (e) None of these
8. Which of the following is true ?
(a) Logical design is software-dependent (b) In a distributed database, database is
stored in one physical location (c)
Conceptual design translates the logical design into internal model (d) Logical design is software
independent (e) None of these
9. A range check _____
(a) ensures that only the correct data type is entered into
a field (b) verifies that all required
data is present (c) determines whether a
number is within a specified limit (d)
tests if the data in two or more associated fields is logical (e) None of these
10. The total set of interlinked hypertext documents
worldwide is-
(a) HTTP (b)
Browser (c) WWW (d) B2B
(e) None of these
11. With the object-oriented (OO) approach, an object
encapsulates, or_____.a programmer.
(a) carries out, the details of an object for (b) hides, the details of an object from (c) reveals, the details of an object to (d) extends, the details of an object
beyond (e) None of these
12. Every computer connected to an intranet or extranet must
have a distinct_____
(a) firewall (b)
proxy server (c) IP address (d) domain name (e) None of these
13. A table of bits in which each row represents the
distinct values of a key?
(a) Join index (b)
Bitmap index (c) B + Tree (d) Hierarchical index (e) None of these
14. The degree of detail that should be incorporated into a
database depends on what?
(a) Data integrity
(b) The type of database (c) The
user's perspective (d) The business
practices and policies (e) None of
these
15. The ___ converts digital signals to analog signals for
the purpose of transmitting data over telephone lines.
(a) Modem (b)
Router (c) Gateway (d) Bridge
(e) All of these
16. Before a package can be used in a java program it must
be___.
(a) executed (b)
referenced (c) imported (d) declared
(e) None of these
17. Choose the correct way to indicate that a line in a C++
program is a comment line, that is, a line the will not be executed as an
instruction___.
(a) begin the line with a # sign (b) begin the line with double slashes (/
/) (c) begin and end the line with
double hyphens (-_-) (d) indent the
line (e) None of these
18. Programming language built into user programs such as
Word and Excel are known as____
(a) 4GLs (b) macro
languages (c) object-oriented
languages (d) visual programming
languages (e) None of these
19. Firewalls are used to protect against___.
(a) Unauthorized Attacks
(b) Virus Attacks (c) Data Driven
Attacks (d) Fire Attacks (e) All of these
20. This is a standard way for a Web server to pass a Web
user's request to an application program and to receive data back to forward to
the user-
(a) Interrupt request
(b) Forward DNS lookup (c)
Data-Link layer (d) File Transfer
Protocol (e) Common gateway
interface
21. Three SQL, DDL, CREATE commands are__.
(a) Schema, Base and Table
(b) Base, Table and Schema (c)
Key, Base and Table (d) Schema, Table
and View (e) None of these
22. Data are _______ in client/server computing.
(a) never sent to the client machine (b) sent in very large sections to save
processing time (c) sent only upon the
client's request (d) sent in complete
copies for the client to filter and sort
(e) sent from the client to the server for processing
23. Which of the following will not eliminates the
ambiguities of a null value?
(a) Define the attribute as required (b) Define subtypes (c) Define each attribute as having an
initial value that is recognized as blank
(d) Define supertypes (e) None of
these
24. The____directory is mandatory for every disk.
(a) Root (b)
Base (c) Sub (d) Case
(e) None of these
25. This is a group of servers that share work and may be
able to back each other up if one server fails.
(a) Channel bank
(b) Cluster (c) Tiger team (d) Serverless backup (e) Logical unit
Answers: 1. (a), 2
(c), 3(e), 4(b), 5(b) 6. (e), 7(d), 8(a), 9(c), 10(a) 11.(b), 12(c) 13(b) 14(b) 15(a) 16. (c) 17(b) 18(d) 19(a) 20(e) 21. (d) 22(c) 23(d) 24(c) 25(b)