previous year papers it officer

Upload: hindu2012

Post on 04-Jun-2018

226 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/13/2019 previous year papers it officer

    1/26

    A special type gateway that can keep external users from accessing resources on the

    LAN users access the external info is called:

    Repeater

    Firewall

    Encryption

    Hub

    None of these

    hat is the name gi!en to the exchange of control signals which is necessary for

    establishing a connection between a modem and a computer at one end of a line and

    another modem and computer at the other end"

    Handshaking

    #odem options

    $rotocol

    All of these

    None of these

    %n &'L( which command is used to changes data in a data table"

    )$*A+E

    %N&ER+

    ,R-&E

    A$$EN*

    None of these

    %n &'L( which of the following is not a data definition language command"

    RENA#E

    RE.-/E

    0RAN+

    )$*A+E

    None of these

  • 8/13/2019 previous year papers it officer

    2/26

    hich command1s2 is 1are2 used to redefine a column of the table in &'L "

    AL+ER +A,LE

    *EF%NE +A,LE

    #-*%F3 +A,LE

    ALL of the these

    None of these

    %n a relational schema( each tuple is di!ided into fields called

    Relations

    *omains

    'ueries

    All of the these

    None of these

    An indexing operation

    &orts a file using a single key

    &orts file using two keys

    Establishes an index for a file

    ,oth 142 and 152

    None of these

    *ata security threats include

    Hardware failure

    $ri!acy in!asion

    Fraudulent manipulation of data

    All of these

    None of these

    +he language used in application programs to re6uest data from the *,#& is referred

    to as the

    *#L

  • 8/13/2019 previous year papers it officer

    3/26

    **L

    'uery language

    *7L

    None of these

    A 888 contains the smallest unit of meaningful data( so you might call it the basic

    building block for a data file9

    File structures

    Records

    Fields

    *atabase

    None of these

    A 888 means that one record in a particular record type is related to only one record of

    another record type9

    -ne to one relationship

    -ne to many relationship

    #any toone relationship

    #any to many relationship

    None of these

    +hrough linked list one can implement

    &tack

    0raph

    'ueue

    All of these

    None of these

    A heap allows a !ery efficient implementation of a

    *oubled ended 6ueue

    $riority 6ueue

  • 8/13/2019 previous year papers it officer

    4/26

    &tack

    +rees

    None of these

    %n files( there is a key associated with each record which is used to differentiateamong different records9 For e!ery file there is at least one set of keys that is uni6ue9

    &uch a /ey is called

    )ni6ue key

    $rime attribute

    %ndex key

    $rimary /ey

    Null key

    8888 is primarily used for mapping host names and email destinations to %$ address

    but can also be used for other purposes9

    +7$1transfer control protocol2

    *N&1*omain Name &ystem2

    &HA 1&ecure Hash Algorithm2

    &imple Network #anagement $rotocol 1&N#$2

    None of these

    -!erride is a method

    For an operation that replaces an inherited method for the same operation

    For a data that replaces an inherited method for the same operation

    For an operation that takes arguments form library function

    All of these

    None of these

    Local !ariables

    Are created outside a block

    Are known only to that block

    7ontinue to exist when their block ends

  • 8/13/2019 previous year papers it officer

    5/26

    Are illegal in 7

    None of these

    8888 is !irus that inserts itself into a system;s memory9 +hen it take number of actions

    when an infected file is executed9

    eb scripting !irus

    $olymorphic !irus

    #acro !irus

    ,oot sector !irus

    Resident !irus

    +his 888 data mining techni6ue deri!es rules from real world case examples9

    aterfall model

    RA*

    hite ,ox

    &piral model

    7ase based reasoning

    +he 888 remains operati!e until the software is re6uired9

    aterfall model

    %ncremental model

    &piral model

    $rototyping model

    %ncremental model

    *ata mining e!ol!e as a mechanism to cater the limitations of 888 systems to deal

    massi!e data sets with high dimensionality( new data type( multiple heterogeneous data

    resource etc9

    -L+$

    -LA$

    *&&

    *H

  • 8/13/2019 previous year papers it officer

    6/26

    None of these

    An important application of cryptography( used in computeri

  • 8/13/2019 previous year papers it officer

    7/26

    'uestion =>?@

    +he tracks on a disk which can be accused without repositioning the RB heads is

    &urface

    7ylinder

    7luster

    All of these

    None of these

    hich of the following is true about 0)%s"

    +hey make computers easier to use for nonprofessionals

    +hey use icons and menus that users can select with a mouse

    ,oth 142 and 1=2

    All of the these

    None of these

    A computer system consisting of its processor( memory and %B- de!ices accepts data(

    processes it and produces the output results 97an you tell in which component is the raw

    data fed"

    #ass #emory

    #ain #emory

    Logic )nit

    Arithmetic unit

    None of these

    +he mechanical diskette dri!e in which you insert your diskette is connected to the

    computer;sCbus

    *ata

    7ommunication

    Address

    $arallel

  • 8/13/2019 previous year papers it officer

    8/26

    None of these

    A set of programs that handle firm;s database responsibilities is called a

    *ata base #anagement &ystem 1*,#&2

    *ata ,ase $rocessing &ystem 1*,$&2

    *ata #anagement &ystem 1*#&2

    All of these

    None of these

    3ou are in the process of analy

  • 8/13/2019 previous year papers it officer

    9/26

    hich of the following system program forgoes the production of obDect code to

    generate absolute machine code and load it into the physical main storage location from

    which it will be executed immediately upon completion of the assembly"

    +wo pass assembler

    Load and go assembler

    #acro processor

    7ompiler

    None of these

    Relocation bits used by relocating loader are specifically 1generated2 by:

    Relocating loader itself

    Linker

    Assembler or translator

    #acro processor

    None of these

    From what location are the 4st computer instructions a!ailable on boot up "

    R-# ,%-&

    7$)

    ,oot9ini

    7-NF%09&3&

    None of these

    Abstraction is

    +he act of representing the essential features of something without including much

    detail9

    +he act of representing the features of something much detail

    A tree structure

    All of these

    None of these

    Aggregation is a special for of

  • 8/13/2019 previous year papers it officer

    10/26

    0enerali

  • 8/13/2019 previous year papers it officer

    11/26

    Nonterminal symbol

    $roduction line

    List

    None of these

    hich of the following is a phase of RA* model"

    ,usiness modeling

    *ata modeling

    Application generation

    All of the abo!e

    None of these

    8888 is a set design steps that allows a *F* with transform flow characteristics to be

    mapped into a predefined template for program structure9

    +ransaction flow

    7ontributor

    +ransform mapping

    *esign e!aluation

    None of these

    A combinational logic circuit which is used to send data coming from a single source

    to two or more separate destinations is called as

    *ecoder

    Encoder

    #ultiplexer

    *emultiplexer

    None of these

    hich of the following is a uni!ersal gate"

    AN*

    -R

  • 8/13/2019 previous year papers it officer

    12/26

    E-R

    NAN*

    None of these

    +he two;s compliment of binary number 4444944 is

    444944

    4494

    4444944

    44944

    None of these

    %n > the o!erflow flag is set when

    +he sum is more than 4> bits

    &igned numbers go out their range after an arithmetic operation

    7arry and sign flags are set

    *uring subtraction

    None of these

    hat does microprocessor speed depends on"

    7lock

    *ata bus width

    Address bus width

    All of these

    None of these

    +he +RA$ is one of the interrupts a!ailable its %N+EL @9 hich one statement is

    true of +RA$"

    %t is le!el triggered

    %t is negati!e edge triggered %t is positi!e edge triggered

    %t is positi!e edge triggered

    %t is both positi!e edge triggered and le!el triggered

  • 8/13/2019 previous year papers it officer

    13/26

    None of these

    %,$& &pecialist %+ -fficer $re!ious $aper =45

    'uestion 4 to =@

    hich of the following microprocessors is not bit microprocessor"

    @

    >@=

    G

    >

    None of these

    #icroprocessor @ is the enhanced !ersion of which essentially the same

    construction set

    >

    >A

    All of these

    hich of the following interrupts has the lowest priority"

    R&+ @9@

    R&+ 9@

    +RA$

    %N+R

    None of these

    +he *ata control language 1*7L29

    is used to manage user access to data bases

    is used to manipulate the contents of a database in some form

  • 8/13/2019 previous year papers it officer

    14/26

    ,oth 142 and 1=2

    )sed for inserting( deleting and updating data in a database

    None of these

    A collection of fields is called a record with respect of *,#&( a record corresponds to

    +uple

    Relation

    File

    Attribute

    None of these9

    #ultiplexer means

    -ne into many

    #any into one

    #any into many

    All of these

    None of these

    hich gate is known as uni!ersal gate "

    N-+ gate

    NAN* gate

    AN* gate

    -R gate

    None of the abo!e

    hich of the following is the first integrated logic family"

    +7L

    +4L

    *+L

    #-&

  • 8/13/2019 previous year papers it officer

    15/26

    R+L

    A top to bottom relationship among the items in a database is established by a

    Hierarchical schema

    Network &chema

    Relational &chema

    ,oth 142 and 1=2

    ,oth 1=2 and 152

    %n the relational schema( each tuple is di!ided into fields called9

    Relations

    *omains

    'ueries

    ,oth 142 and 1=2

    ,oth 142 and 152

    +he modify operation is likely to be done after9

    *elete

    %nsert

    Look up

    All of the abo!e

    None of these

    +he way a particular application !iews the data from the database that the application

    uses is a :

    #odule

    Relational model

    &chema

    &ubschema

    None of these

    hich two files are used during operation of the *#,&"

  • 8/13/2019 previous year papers it officer

    16/26

    'uery language and utilities

    *ata manipulation language and 6uery language:

    *ata dictionary and transaction log

    *ata dictionary and 6uery language

    None of these

    hich normal form is considered ade6uate for relational database design"

    = NF

    5 NF

    I NF

    ,7NF

    None of these

    An attribute of one matching the primary key another table( is called as

    Foreign key

    &econdary key

    7andidate key

    7omposite key

    None of these

    hich of the following &'L commands can be used modify existing data in a

    database table"

    #-*%F3

    )$*A+E

    7HAN0E

    NE

    None of these

    Each node in a linked list must contain at least:

    +hree fields

    Fi!e fields

  • 8/13/2019 previous year papers it officer

    17/26

    Four fields

    -ne fields

    +wo fields

    +he a!erage number of key comparisons done in a successful se6uential search in alist of length JnK is

    Log n

    1n?42B=

    nB=

    1n42B=

    None of these

    +he order of the binary search algorithm is

    n

    n=

    nlog1n2

    log1n2

    None of these

    hich of the following is useful in implementing 6uick sort"

    &tack

    &et

    List

    'ueue

    None of these

    -&% model consists of 8888 layers

    +hree

    Fi!e

    &ix

    Eight

  • 8/13/2019 previous year papers it officer

    18/26

    &e!en

    hich data communication method is used to transmit the data o!er a serial

    communication link9

    &implex

    Full duplex

    Half duplex

    ,oth 142 and 1=2

    ,oth 1=2 and 152

    Encryption and decryption are functions of the 8888 layer9

    +ransport

    &ession

    Application

    $hysical

    $resentation

    hich of the following is not a connecting de!ice"

    ,ridge

    +rans recei!er

    Router

    Repeater

    None of these

    Repeaters function in the 888 layer

    $hysical

    *ata link

    Network

    ,oth 142 and 1=2

    None of these

  • 8/13/2019 previous year papers it officer

    19/26

    'uestion =>?@

    How many hosts are attached to each of the local area network at your site"

    4=

    =@>

    =@I

    >I

    None of these

    hich of the following types of software should we use if we often need to create( edit

    and print documents"

    ord processing

    &pread sheet

    -bDect program

    )N%

    None of these

    +hrashing

    7an always be a!oided by swapping

    %s a natural conse6uence of !irtual memory system Always occurs on large

    computers

    7an be caused by poor paging algorithms

    None of these

    88888 is present in spiral model

    7ode generator

    Risk analysis

    7ode optimi

  • 8/13/2019 previous year papers it officer

    20/26

  • 8/13/2019 previous year papers it officer

    21/26

    'uery and reporting

    *ata mining

    -LA$

    All of the abo!e

    None of these

    +he term push and pop is related to the

    Array

    Lists

    &tacks

    All of the abo!e

    None of these

    +he break statement causes an exit9

    From the innermost loop only

    -nly from the innermost switch

    From the loops and switches

    From the innermost loop or switch

    None of these

    ,ackup procedure helps in

    Restoring the operation whene!er there is a disk failure

    Restoring both application and system software whene!er there is disk corruption

    Restoring the data sites whene!er there is a system crash

    All of the abo!e

    None of these

    &oftware testing is

    +he process of demonstrating that error are not present

    -ne process of establishing confidence that a program does what it is supposed to

    do

  • 8/13/2019 previous year papers it officer

    22/26

  • 8/13/2019 previous year papers it officer

    23/26

    None of these

    $ointer is used in

    *irect Addressing

    %ndirect Addressing

    %ndexed mode

    %mmediate Addressing

    None of these

    An array can be passed in a functions in 7 language through

    7all by !alue; only

    7all by reference; only

    ,oth 142 M 1=2

    7all by preference

    None of these

    H++$ refers to

    Hyper +ext +ransmission $rotocol

    Hyper +ext +ransfer $rotocol

    Hyper +ext +ie $rotocol

    Hyper +ext +otal $rotocol

    None of these

    An email account includes a storage area( often called a 1n2

    Attachment

    Hyperlink

    #ailbox

    %p address

    None of these

    A1n2 8888 is a collection of information that determines which files you can access

    and which setting you use9

  • 8/13/2019 previous year papers it officer

    24/26

    Network

    )ser account

    -perating system

    File system

    None of these

    +o print a document

    &elect the print command and then select -/

    &elect the Ready printer and then select -/

    +ype $R%N+ and then press Enter

    7lose the document( select the print command then select -/

    None of these

    hich part of the computer pro!ides only temporary storage of files"

    R-# memory

    $rocessor

    Hard dri!e

    #other board

    RA# memory

    hat will be the output of JaK in following code"

    includeOstdio9hP

    int main12

    int aQ=

    S

  • 8/13/2019 previous year papers it officer

    25/26

    int aQ4

    printf1JTdK(a2

    printf1JTdK(a2 return

    U

    answer choices

    = =

    4 =

    = 4

    4 4

    7ompilation Error

    hat topics to prepare: &yllabus for %+ section"

    -fficial notification doesn;t mention full syllabus for the %+ topics9 Hence leads to

    confusion especially since candidates from parallel graduation streams are permitted:

    electronics( communication( and %+9

    As a result( market is also flooded with !ariety of books for the %+ topics? to 6uicklymint money from this confusion and uncertainty9 1&ame thing happens in A$F7 labour

    commissioner( F7% and so on29

    o!erall these readymade books deal with following topics:

    basics of hardware software and operating system

    %B- system( microprocessors( circuits

  • 8/13/2019 previous year papers it officer

    26/26

    &'L( database management( data mining

    7ommunication( networking( security9

    ,usiness?0/ related social networking sites( smartphones( i$hone etc9

    7ommon sense suggests that you;re better off going through your college text books B0A+E guidebooks from reputed authors( rather than putting your future in such randomly

    copy pasted =?=@ pages9 After all those @ #7's are worth @ marks9

    As per %,$& official notification( *-EAA7 J,K certificate is also !alid for %+ officer post9

    +his *-EA77 &ociety is under HR* ministry and its J,K certificate is professionally

    e6ui!alent to #7A *egree course9 &o( you can use its syllabus as the common ground;(

    and do selecti!e study accordingly from your college books9

    &yllabus link: http:BBwww9nielit9inBpdfBsyllabus8b9pdf1E!en contains #ock #7's2

    http://www.nielit.in/pdf/syllabus_b.pdfhttp://www.nielit.in/pdf/syllabus_b.pdf