Вы находитесь на странице: 1из 15

Answer Key for the Live Leak IBPS SO Mains

Model Question Paper for IT Officer

Qs Ans Qs Ans Qs Ans Qs Ans Qs Ans


1. 1 2. 5 3. 2 4. 1 5. 3
6. 3 7. 4 8. 2 9. 2 10. 4
11. 4 12. 3 13. 1 14. 4 15. 3
16. 2 17. 3 18. 4 19. 1 20. 2
21. 1 22. 3 23. 1 24. 4 25. 1
26. 4 27. 3 28. 2 29. 3 30. 2
31. 2 32. 4 33. 1 34. 1 35. 1
36. 1 37. 4 38. 2 39. 2 40. 1
41. 1 42. 1 43. 1 44. 4 45. 2
46. 2 47. 4 48. 1 49. 2 50. 1
51. 1 52. 1 53. 1 54. 4 55. 1
56. 3 57. 1 58. 1 59. 2 60. 3

Solutions:

Q1. Voice over Internet Protocol (VoIP), is a technology that allows you to make
voice calls using a broadband Internet connection instead of a regular (or analog)
phone line. Some VoIP services may only allow you to call other people using the
same service, but others may allow you to call anyone who has a telephone
number - including local, long distance

Q2. There are several different types of computer networks. Computer networks can
be characterized by their size as well as their purpose.
Some of the different networks based on size are:

 Personal area network, or PAN


 Local area network, or LAN
 Metropolitan area network, or MAN
 Wide area network, or WAN
 Some of the different networks based on their main purpose are:
 Storage area network, or SAN
 Enterprise private network, or EPN
 Virtual private network, or VPN

Q3. The SQL DROP command is used to remove an object from the database. If you
drop a table, all the rows in the table is deleted and the table structure is removed
from the database. The DELETE Statement is used to delete rows from a table.

Q4. AES is largely considered impervious to all attacks, with the exception of brute
force, which attempts to decipher messages using all possible combinations in the
128, 192, or 256-bit. RSA is considered an asymmetric algorithm due to its use of
a pair of keys. You’ve got your public key, which is what we use to encrypt our
message, and a private key to decrypt it. Triple DES uses three individual keys
with 56 bits each. The total key length adds up to 168 bits, but experts would
argue that 112-bits in key strength is more like it.

Q5. Software life cycle models describe phases of the software cycle and the order in
which those phases are executed. Each phase produces deliverables required by
the next phase in the life cycle. There are following six phases in every Software
development life cycle model:

1) Requirement gathering and analysis


2) Design
3) Implementation or coding
4) Testing
5) Deployment
6) Maintenance

Q6. An interrupt service routine (ISR) is a software routine that hardware


invokes in response to an interrupt. ISRs examine an interrupt and determine
how to handle it. The Information Service is for general legal enquiries and will
signpost you to fact sheets and resources on our website.

Q7. Binary Large Object is a large object data type in the database system. BLOB
could store a large chunk of data, document types and even media files like audio
or video files. BLOB fields allocate space only whenever the content in the field is
utilized. BLOB allocates spaces in Giga Bytes. The VARCHAR data type accepts
character strings, including Unicode, of a variable length is up to the maximum
length specified in the data type declaration. The INTEGER data type accepts
numeric values with an implied scale of zero. It stores any integer value between
the range 2-31 and (231 – 1).

Attempting to assign values outside this range causes an error. The DECIMAL
data type accepts numeric values, for which you may define a precision and a
scale in the data type declaration. The precision is a positive integer that indicates
the number of digits that the number will contain.

Q8. In mathematics and computing, hexadecimal (also base 16, or hex) is a


positional numeral system with a radix, or base, of 16. It uses sixteen distinct
symbols, most often the symbols 0–9 to represent values zero to nine, and A, B,
C, D, E, F (or alternatively a, b, c, d, e, f) to represent values ten to fifteen.
Q9. In the Open Systems Interconnection (OSI) communications model, the
application layer provides services for an application program to ensure that
effective communication with another application program in a network is
possible. The Network layer adds the concept of routing above the Data
Link layer. The Application layer supplies network services to end-
user applications.

Presentation layer is also called syntax layer.

Q10. Primary storage typically refers to random access memory (RAM), while
secondary storage refers to the computer's internal hard drive. Pen drive is a
small removable Flash Memory drive which is connected to the usb port.

Q11. The TCP/UDP is a part of the most important protocol hierarchy – The
Transport Layer. There would be no sense for the concept of layered protocols
without the transport layer. This layer provides cost-effective and reliable data
transport from the source computer to the destination computer. Physical layer is
the lowest layer of all. It is responsible for sending bits from one computer to
another. The Network layer adds the concept of routing above the Data Link
layer. The Application layer supplies network services to end-user applications.

Q12. Attributes are represented by ellipse while Entities are represented by means
of rectangles.

Q13. A FOREIGN KEY is a key used to link two tables together.


A FOREIGN KEY is a field (or collection of fields) in one table that refers to the
PRIMARY KEY in another table.

The table containing the foreign key is called the child table, and the table
containing the candidate key is called the referenced or parent table.

Q14. Star topology here all of the computers and devices on the network connect to
a central device, thus forming a star. The central device that provides a common
connection point for nodes on the network is called a hub.

Q15. Full - duplex data transmission means that data can be transmitted in both
directions on a signal carrier at the same time. For example, on a local area
network with a technology that has full-duplex transmission, one workstation can
be sending data on the line while another workstation is receiving data. Full-
duplex transmission necessarily implies a bidirectional line.

Q16. The newton (symbol: N) is the International System of Units (SI) derived unit
of force. It is named after Isaac Newton in re. The hertz (symbol: Hz) is the
derived unit of frequency in the International System of Units (SI) and is
defined as one cycle per second. It is named for Heinrich Rudolf Hertz, the first
person to provide conclusive proof of the existence of electromagnetic waves.
Cognition of his work on classical mechanics, specifically Newton's second law of
motion. The watt (symbol: W) is a derived unit of power in the International
System of Units (SI) defined as 1 joule per second and can be used to quantify
the rate of energy transfer.
Q17. IBM (International Business Machines Corporation) is an
American multinational technology company headquartered in Armonk, New
York, United States, with operations in over 170 countries. The company
originated in 1911 as the Computing-Tabulating-Recording Company (CTR) and
was renamed "International Business Machines" in 1924.

IBM manufactures and markets computer hardware, middle ware and software,
and offers hosting and consulting services in areas

Q18. The correct place to write the main function in a program is anywhere in the
program.

Q19. Wired Equivalent Privacy (WEP) is security protocols and security certification
programs developed by the Wi-Fi Alliance to secure wireless computer networks.

Q20. Optical storage devices are; CD-ROM,CD-R,CD-RW, DVD etc. They Stores
data optically & used laser to read/write. It has less storage than hard disk.

Q21. GIF is used for simple web graphics with limited colors. GIF always reduced to
256 colors, making for fast-loading visuals. Thats why it is used in graphic format
for web

Q22. Transaction Control Language (TCL) commands are used to manage


transactions in database. Savepoint command is used to temporarily save a
transaction so that you can rollback to that point whenever necessary.
Q23. In SQL(Structured Query Language), UPDATE command is used to update
the data entered in the column of the database table according to the condition
specified in WHERE clause. If you omit the WHERE clause, ALL records will be
updated. Example:

UPDATE table_name

SET column1 = value1, column2 = value2, ...

WHERE condition;

Q24. TCP is a connection-oriented protocol, which provides reliable, ordered, and


error-checked delivery of a stream of octets between applications running on
hosts communicating by an IP network.

Q25. An ODMR (on-demand mail relay) is a SMTP extension that allows e-mail to
be relayed to the recipients after they have been authenticated. It uses the
extended SMTP command ATRN, similar to the ETRN command but available
for dynamically assigned IP addresses.

Q26. Magnetic Disk is an example of non-volatile memory that is not directly


accessible by the CPU, because it is not accessed via the input/output channels. A
magnetic disk is a circular plate constructed of metal or plastic coated with
magnetized material. Both sides of the disk are used and several disks may be
stacked on one spindle with read/write heads available on each surface. Bits are
stored on the magnetized surface in spots along concentric circles called tracks.
Tracks are commonly divided into sections called sectors.

Q27. Using Topological Sort, we can find single source shortest paths in O(V+E)
time which is the most efficient algorithm. Topological sorting for Directed
Acyclic Graph (DAG) is a linear ordering of vertices such that for every directed
edge uv, vertex u comes before v in the ordering. Topological Sorting for a graph
is not possible if the graph is not a DAG.

Q28. BIOS software is stored on a non-volatile ROM chip on the motherboard. In


modern computer systems, the BIOS contents are stored on a flash memory chip
so that the contents can be rewritten without removing the chip from the
motherboard. This allows BIOS software to be easily upgraded to add new
features or fix bugs, but can make the computer vulnerable to BIOS rootkits.

Q29. The reflected binary code (RBC), also known as Gray code after Frank Gray, is
a binary numeral system where two successive values differ in only one bit. The
reflected binary code was originally designed to prevent spurious output
from electromechanical switches. Today, Gray codes are widely used to
facilitate error correction in digital communications such as digital terrestrial
television and some cable TV systems.

Conversion from Gray Code to Binary Code:

Let Gray Code be G3 G2 G1 G0 and Binary Code be B3 B2 B1 B0. Then the


respective Grey Code can be obtained as follows:

Now, convert 14 in grey code:

Binary code of 14 ® 1110


1 1Å1 1Å1 1Å0
¯ ¯ ¯ ¯
1 0 0 1

Hence the grey code is: 1001

Q30. Optical character recognition (also optical character reader, OCR) is the
mechanical or electronic conversion of images of typed, handwritten or printed
text into machine-encoded text, whether from a scanned document, a photo of a
document, a scene-photo or from subtitle text superimposed on an image (for
example from a television broadcast).

Q31. A stack is an abstract data type that serves as a collection of elements, with two
principal operations: push, which adds an element to the collection, and pop,
which removes the most recently added element that was not yet removed. The
order in which elements come off a stack gives rise to its alternative name, LIFO
(for last in, first out).

Q32. Breadth-first search (BFS) is an algorithm for traversing or searching tree or


graph data structures. It starts at the tree root and explores the neighbor nodes
first, before moving to the next level neighbors. Breadth First Search (BFS)
algorithm traverses a graph in a breadthward motion and uses a queue to
remember to get the next vertex to start a search, when a dead end occurs in any
iteration, while DFS uses stack.

Q33. Viruses propagates by inserting a copy of itself into and becoming part of
another program, Worms are similar to viruses in that they replicate functional
copies of themselves and can cause the same type of damage but Trojans do not
reproduce by infecting other files nor do they self-replicate.

Q34. It is not suitable for those projects where requirements are at a moderate to
high risk of changing. In this model, there are high amounts of risk and
uncertainty.

Q35. Transport layer aggregates data from different applications into a single
stream before passing it to the network layer.

Q36. A nibble consists of 4 bits and a byte consists of 8 bits.

Q37. UDP is a connectionless protocol, which is used for its low overhead and high
speed. The User Datagram Protocol (UDP) is one of the core members of
the Internet protocol suite.

Q38. The Document Object Model (DOM) is a cross-platform and language-


independent application programming interface that treats an HTML, XHTML,
or XML document as a tree structure wherein each node is an object representing
a part of the document. The objects can be manipulated programmatically and
any visible changes occurring as a result may then be reflected in the display of
the document.

Q39. Batch processing is the execution of a series of jobs in a program on


a computer without manual intervention. It is a processing mode: the execution
of a series of programs each on a set or "batch" of inputs, rather than
a single input. However, this distinction has largely been lost, and the series of
steps in a batch process are often called a "job" or "batch job".

Q40. Semaphore is a synchronization tool which is used in a multiprogramming


environment. It is a protected integer variable, which facilitates as well as
restricts to the shared resources within any multi-processing environment. It is a
variable or abstract data type that is used to control access to a common resource
by multiple processes in a concurrent system such as a multiprogramming
operating system.

Q41. 172.16.64.0 is used as a sub-network number of a host with an IP address of


172.16.66.0/21. The routing prefix of an address is written in a form identical to
that of the address itself. This is called the network mask, or subnet mask, of the
address.

Q42. HTTP and FTP are both file transfer protocols and have many common
characteristics. They both run on top of TCP, the Internet's connection-oriented,
reliable data transfer Protocol. The most striking difference is that FTP uses two
parallel TCP connections to transfer a file, a control connection and a data
connection.

Q43. Simple Network Management Protocol (SNMP) is a popular protocol for


network management. It is used for collecting information from, and configuring,
network devices, such as servers, printers, hubs, switches, and routers on an
Internet Protocol (IP) network. In 1988, SNMP was developed to provide
network-device-monitoring capability for TCP/IP-based networks.

Q44. A bridge is a connecting device that operates in the physical and data link
layers of the Internet model. A bridge is a computer networking device that
creates a single aggregate network from multiple communication
networks or network segments.

Q45. Private members of a base class are never accessible to a derived class. A base
class's private members are never accessible directly from a derived class, but can
be accessed through calls to the public and protected members of the base class.

Q46. A struct is the same as a class except that cannot be used in inheritance
hierarchy. There is no inheritance for structs as there is for classes. A struct
cannot inherit from another struct or class, and it cannot be the base of a class.

Q47. Global variable is not supported by OOPs. Inheritance, Abstraction,


Polymorphism and Encapsulation are the important concept of OOPs.

Q48. In OSI network architecture, the dialogue control and token management are
the responsibilities of Session layer. The session layer is layer 5. The session
layer provides the mechanism for opening, closing and managing a
session between end-user application processes, i.e., a semi-permanent dialogue.
Q49. When you start up the computer the boot up storage at which the BIOS
versions manufacturer and data are displayed on the monitor is called Power on
self-test (POST). POST (Power-On Self-Test) is the diagnostic testing sequence
that a computer's basic input/output system (or "starting program") runs to
determine if the computer keyboard, random access memory, disk drives, and
other hardware are working correctly.

Q50. Inverse page table is a high speed cache used to hold recently referenced page
table entries a part of paged virtual memory. Inverted page table scheme uses a
page table that contains an entry for each physical frame, not for each logical
page. This ensures that the table occupies a fixed fraction of memory. The size is
proportional to physical memory, not the virtual address space.

Q51. /* Is /* this a valid */ comment */ is the syntactically incorrect statement.

Q52. A constructor is called when an object is declared. In class-based object-


oriented programming, a constructor in a class is a special type of subroutine
called to create an object. It prepares the new object for use, often accepting
arguments that the constructor uses to set required member variables.

Q53. The word polymorphism means the ability to take many forms. In OOPs
polymorphism refers to a programming language's ability to process objects
differently depending on their data type or class. More specifically, it is the ability
to redefine methods for derived classes.
Q54. A pure virtual function is defined only in derived class. A virtual
function or virtual method is an inheritable
and overridable function or method for which dynamic dispatch is facilitated. A
pure virtual function is implemented by classes which are derived from an
Abstract class.

Q55. TLB is a high speed cache used to hold recently referenced page table entries a
part of paged virtual memory. Inverted page table scheme uses a page table that
contains an entry for each physical frame, not for each logical page. This ensures
that the table occupies a fixed fraction of memory. The size is proportional to
physical memory, not the virtual address space.

Q56. A classful network is a network addressing architecture used in


the Internet from 1981 until the introduction of Classless Inter-Domain
Routing in 1993. The method divides the address space for Internet Protocol
Version 4 (IPv4) into five address classes by address range. Classes A, B, C are
networks of three different network sizes, i.e. number
of hosts for unicast addresses. Class D is for multicast. The class E address range
is reserved for future or experimental purposes.

Q57. A top-to-bottom relationship among the items in a database is established by


hierarchical schema. A hierarchical database model is a data model in which the
data is organized into a tree-like structure. The data is stored as records which
are connected to one another through links. A record is a collection of fields, with
each field containing only one value.
Q58. To change the structure of the table we use “ALTER TABLE” command.
Syntax of ALTER TABLE is:
ALTER TABLE “table_name” ADD “column_name” datatype
OR
ALTER TABLE “table_name” DROP COLUMN “column_name”

Q59. A relation is in 2NF (Second Normal Form) if it has No Partial Dependency,


i.e., no non-prime attribute (attributes which are not part of any candidate key) is
dependent on any proper subset of any candidate key of the table.

Q60. It is the advantage of spooling that it is capable of overlapping I/O operation


for one job with processor operations for another job. Spooling is an acronym for
simultaneous peripheral operations on line. Spooling refers to putting data of
various I/O jobs in a buffer. This buffer is a special area in memory or hard disk
which is accessible to I/O devices.

Get the Question Paper to this Live Leak Here:-

IBPS SO Mains Live Leak Model Question Paper

Вам также может понравиться