10 MCQ For IBPS IT Officer
Exam 2017
1)Which of the following are the valid relationships in Use
Case Diagrams
a)Generalization
b)Include
c)Extend
d)All of the mentioned
e)None of these
2)The item of documentation added to the description of the
new system is
a)feedback
b)control review
c)problem overview
d)I/O analysis
e)None of these
3)Referring to the attached diagram, the arrow indicates:
a)Navigability
b)Dependency
c)Association
d)Refers to
e)None of these
4)When users are involved in complex tasks, the demand on
__________ can be significant.
a)short-term memory
b)shortcuts
c)objects that appear on the screen
d)all of the mentioned
e)None of these
5)A person who writes a programmes for running the hardware of
a computer is called
a)system analyst
b)system designer
c)data processor
d)programmer
e)None of these
6)What incorporates data, architectural, interface, and
procedural representations of the software?
a)design model
b)user’s model
c)mental image
d)system image
e)None of these
7)What establishes the profile of end-users of the system?
a)design model
b)user’s model
c)mental image
d)system image
e)None of these
8)System implementation phase entails
a)parallel runs
b)pilot runs
c)system checkouts
d)all of these
e)None of these
9)A knowledge-based information system that acts as an expert
consultant to users in a specific application area, select one
answer
a)application
b)expert system
c)benefits and limitations
d)knowledge base
e)None of these
10)Which of the following is an essential principle of an
architecture?
a)Consistency
b)Reliability
c)Scalability
d)All of the mentioned
e)None of these
Answers:
1)d
2)a
3)a
4)a
5)d
6)a
7)b
8)c
9)b
10)d
10 MCQ For IBPS IT Officer
Exam 2017
1)Which of the following features of UNIX may be used for
inter process communication?
a)Signals
b)Pipes
c)Semaphore
d)All of these
e)None of these
2)dev/null
a)Is a file
b)Has write permission for all
c)Is the UNIX built – in dustbin
d)All of these
e)None of these
3)From the following, which is not a common file permission ?
a)Stop
b)Write
c)Execute
d)Read
e)None of these
4)Which of the following is least secure method of
authentication ?
a)Key card
b)Pattern
c)Password
d)Fingerprint
e)None of these
5)Which of the following is a strong password ?
a)P@assw0rd
b)12aug1998
c)Mumbai22
d)!augustdelhi
e)None of these
6)Files that store data in the same format as used in program
are called
a)Text file
b)Binary file
c)Core
d)Source file
e)None of these
7)The file that stores an integer as a sequence of characters
is a
a)Core file
b)Binary file
c)Text file
d)Source file
e)None of these
8)What does Light Directory Access Protocol (LDAP) doesn’t
store ?
a)Users
b)Address
c)Operation
d)Password
e)None of these
9)Multipartite viruses attack on
a)files
b)memory
c)boot sector
d)All of these
e)None of these
10)Which of the following are not filter programs?
a)sort
b)grep
c)cat
d)date
e)None of these
Answers:
1)d
2)d
3)a
4)c
5)a
6)b
7)c
8)b
9)d
10)d
10 MCQ For IBPS IT Officer
Exam 2017
1)A computer system that serves as a filter for access to and
from other networks by a company’s networked computers are
a)Firewall
b)Audit trade
c)Encryption
d)Controls for end user computing
e)None of these
2)Identify a fourth generation language(4GL) from the given
below.
a)COBOL
b)Unix shell
c)C
d)Pascal
e)None of these
3)4GL is an example of ______________ processing.
a)White box
b)Black box
c)Operational
d)Modularity
e)None of these
4)Scrambling data during its transmission for
a)Encryption
b)Biometric controls
c)Security codes
d)Audit trade
e)None of these
5)Using computers to steal money, service software or data is
called
a)Hacking
b)Software
c)Computer crime
d)Computer laws
e)None of these
6)Which of the following 4GLs invented at IBM and subsequently
adopted by ANSI and ISO as the standard language for managing
structured data?
a)Java
b)C
c)C++
d)SQL
e)None of these
7)In XP Increments are delivered to customers every _______
weeks.
a)Three
b)Two
c)Four
d)One
e)None of these
8)How many phases are there in Brainstorming ?
a)One
b)Four
c)Three
d)Five
e)None of these
9)A substitute module used in testing top down designs is the
a)stub module
b)test module
c)sub module
d)controls
e)None of these
10)To ensure that available resources are properly
distributed, a system will implement
a)Controls
b)Variable
c)Limit factor
d)Constraints
e)None of these
Answers:
1)a
2)b
3)b
4)a
5)c
6)d
7)b
8)c
9)a
10)a
10 MCQ For IBPS IT Officer
Exam 2017
1)A list integers is read in, one at a time, and a binary
search tree is constructed. Next the tree is traversed would
result in a printout which duplicates the original order of
the list of integers?
a)Pre – order
b)Post – order
c)In – order
d)All of these
e)None of these
2)Which of the following need not to be a binary tree ?
a)Tree
b)B –Tree
c)AVL – Tree
d)Search Tree
e)None of these
3)Which data structure can be used suitably to solve the Tower
of Hanoi problem?
a)Stack
b)Queue
c)Heap
d)Binary
e)None of these
4)Which of the following bitwise operations will you use to
set a particular bit to 1?
a)AND
b)OR
c)NOR
d)XOR
e)None of these
5)Which of the following can never be sent by call-by-value?
a)Array
b)Variable
c)Reference
d)Structures
e)None of these
6)Relational operators cannot be used on:
a)Float
b)Char
c)Structure
d)Integer
e)None of these
7)Which of the following bitwise operations will you use to
toggle a particular bit?
a)OR
b)NOR
c)NAND
d)XOR
e)None of these
8)Which of the following bitwise operations will you use to
set a particular bit to 0?
a)AND
b)NAND
c)NOT
d)XOR
e)None of these
9)Which among the following is odd one out?
a)printf
b)scanf
c)putchar
d)fprintf
e)None of these
10)Which class in Java can be used to represent bit array?
a)Stream
b)Array
c)Vector
d)BitSet
e)None of these
Answers:
1)e
2)b
3)a
4)b
5)a
6)c
7)d
8)a
9)b
10)d
10 MCQ For IBPS IT Officer
Exam 2017
1)The intersection operator is used to get the _____ tuples.
a)Different
b)Common
c)Repeating
d)All
e)None of these
2)C++ was originally developed by;
a)Clocksin and Mellish
b)Donald E. Knuth
c)Sir Richard Hadlee
d)Bjame Storustrup
e)None of these
3)The number of attributes in relation is called as its
a)Degree
b)Entity
c)RAID
d)Interface
e)None of these
4)Which of the following are procedural languages?
a)C
b)Java
c)Pascal
d)Both (a) and (c)
e)None of these
5)_____ clause is an additional filter that is applied to the
result.
a)Select
b)Order
c)Having
d)Group
e)None of these
6)cout stands for
a)Common Output
b)Call Output
c)Character Output
d)Class Output
e)None of these
7)_________ joins are SQL server default
a)Inner
b)Outer
c)Null
d)Like
e)None of these
8)The fields in a structure of a C program are by default
a)class
b)public
c)private
d)All
e)None of these
9)At what point of time a variable comes into existence in
memory is determined by its
a)Scope
b)Inline
c)Static
d)Storage class
e)None of these
10)The____condition allows a general predicate over the
relations being joined.
a)On
b)Of
c)Set
d)Where
e)None of these
Answers:
1)b
2)d
3)a
4)d
5)c
6)c
7)a
8)b
9)d
10)a
10 MCQ For IBPS IT Officer
Exam 2017
1)Efficiency in a software product does not include ________
a)Functional
b)Licensing
c)Refinement
d)Processing time
e)None of these
2)Checking quality of software in both simulated and live
environments is known as
a)Validation
b)Validity
c)Data design
d)Random
e)None of these
3)Which of these are not among the eight principles followed
by Software Engineering Code of Ethics and Professional
Practice ?
a)PUBLIC
b)PROFESSION
c)PRODUCT
d)ENVIRONMENT
e)None of these
4)Which of these does not affect different types of software
as a whole?
a)Security
b)Programming
c)Flexibility
d)Storing
e)None of these
5)The best file organization in which one has to process all
data records in a file called
a)Sequential
b)Random access
c)Processing
d)Microsoft project
e)None of these
6)Coding and testing is done in following manner :
a)Adhoc
b)Cross sectional
c)Quicken
d)Acrobat
e)None of these
7)Build & Fix Model is suitable for programming exercises of
___________ LOC (Line of Code).
a)200 – 300
b)400 – 500
c)100 – 200
d)100 – 300
e)None of these
8)The largest percentage of total life cycle cost of software
is:
a)Design cost
b)Maintenance cost
c)Corel
d)Adobe
e)None of these
9)Which one of the following is not a phase of Prototyping
Model?
a)Coding
b)Codes
c)Samples
d)Network
e)None of these
10)The spiral model was originally proposed by
a)Barry Boehm
b)Royce
c)Pressman
d)IBM
e)None of these
Answers:
1)b
2)a
3)d
4)c
5)a
6)b
7)c
8)b
9)a
10)a
10 MCQ For IBPS IT Officer
Exam 2017
1)How many Bytes are stored by ‘Long’ Datatype in C# .net?
a)6
b)4
c)8
d)5
e)None of these
2)The memory blocks are mapped on to the cache with the help
of ______
a)Mapping function
b)Interrupts
c)Exception
d)Vectors
e)None of these
3)Which datatype should be more preferred for storing a simple
number like 35 to improve execution speed of a program?
a)sbyte
b)short
c)int
d)long
e)None of these
4)While using the direct mapping technique, in a 16 bit system
the higher order 5 bits is used for ________
a)Id
b)Tag
c)Direct
d)System
e)None of these
5)Default Type of number without decimal is ?
a)Signed
b)Unsigned
c)int
d)Long
e)None of these
6)In associative mapping, in a 16 bit system the tag field has
______ bits.
a)10
b)14
c)8
d)12
e)None of these
7)Which of the following is the object oriented way to handle
run time errors?
a)Exception
b)Structure
c)Handling
d)Onerror
e)None of these
8)Which of these keywords is not a part of exception handling?
a)Catch
b)Thrown
c)Attribute
d)Character
e)None of these
9)A control bit called ____ has to be provided to each block
in set-associative.
a)Idol bit
b)Binary
c)Linear
d)Valid bit
e)None of these
10)Data which is not up-to date is called as _______
a)Stale data
b)Block
c)Word
d)Dirty data
e)None of these
Answers:
1)c
2)a
3)a
4)b
5)c
6)d
7)a
8)b
9)d
10)a
10 MCQ For IBPS IT Officer
Exam 2017
1)The addressing mode/s, which uses the PC instead of a
general purpose register is ______
a)Indexed with offset
b)Relative
c)Definite
d)Direct
e)None of these
2)A low memory can be connected to microprocessor by using
a)Ready
b)New
c)Hold
d)Operand
e)None of these
3)In case of, Zero-address instruction method the operands are
stored in _____
a)Offset
b)Register
c)Push down stack
d)Indexed
e)None of these
4)The addressing mode used in an instruction of the form ADD
X, Y, is
a)Absolute
b)Logical
c)Address
d)Relative
e)None of these
5)The bits used to indicate the status of the page in the
memory is called ______
a)Control bits
b)Frame
c)Memory
d)Page
e)None of these
6)Microprocessor 8085 is the enhanced version of ……… with
essentially the same construction set
a)6800
b)7000
c)7500
d)8080
e)None of these
7)The _______ bit is used to indicate the validity of the
page.
a)Invalid bit
b)Dirty bit
c)Modify bit
d)Valid bit
e)None of these
8)The addressing mode used in the instruction PUSH B is
a)Register
b)Array
c)Stack
d)Direct
e)None of these
9)The page table should be ideally situated within ______
a)Cache
b)Function
c)MMU
d)TLB
e)None of these
10)If the page table is large then it is stored in ______
a)Secondary storage
b)Main memory
c)Hard disk
d)Floppy disk
e)None of these
Answers:
1)b
2)a
3)c
4)a
5)a
6)d
7)d
8)a
9)c
10)b
10 MCQ For IBPS IT Officer
Exam 2017
1)Using which language can a user request information from a
database?
a)Query
b)Interpreter
c)Compiler
d)Procedures
e)None of these
2)The graph that shows basic blocks and their successor
relationship is called
a)Integer
b)Encoder
c)Decoder
d)Flow graph
e)None of these
3)The _______operation performs a set union of two “similarly
structured” tables
a)Union
b)Intersection
c)Set difference
d)Product
e)None of these
4)Which of the following case does not exist in complexity
theory
a)Best case
b)Null case
c)Expression
d)Sorting
e)none of these
5)When a computer is first turned on or restarted, a special
type of absolute loader is executed called
a)Boot strap loader
b)Boot loader
c)Control
d)Address bus
e)None of these
6)Which schema object instructs Oracle to connect to a
remotely access an object of a database?
a)Sequence
b)Data link
c)Join
d)Function
e)None of these
7)Which of the following object types below cannot be
replicated?
a)Sequence
b)Trigger
c)Database
d)Recursive
e)None of these
8)The algorithm which removes the recently used page first is
________
a)LRU
b)CPU
c)ALU
d)MRU
e)None of these
9)The counter that keeps track of how many times a block is
most likely used is _______
a)Count
b)Reference number
c)Address
d)Use counter
e)None of these
10)Which of the following are introduced to reduce the
overheads caused by the log-based recovery?
a)Locks
b)Dead code
c)Pinned
d)Zapped
e)None of these
Answers:
1)a
2)d
3)a
4)b
5)a
6)b
7)a
8)d
9)b
10)a
10 MCQ For IBPS IT Officer
Exam 2017
1)For the tree below, write the in-order traversal.
a)2, 7, 5, 6, 11, 2, 5, 4, 9
b)3, 5, 8, 9, 12, 5, 4, 6, 7
c)1, 3, 4, 7, 9, 13, 2, 4, 8
d)2, 4, 6, 8, 10, 12, 3, 5, 7
e)None of these
2)In previous question, the average access time will be
a)266 units
b)245 units
c)268 units
d)270 units
e)None of these
3)Consider the strings “PQRSTPQRS” and “PRATPBRQRPS”. What is
the length of the longest common subsequence?
a)15
b)7
c)9
d)10
e)None of these
4)The given array is arr = {1,2,4,3}. Bubble sort is used to
sort the array elements. How many iterations will be done to
sort the array?
a)3
b)4
c)2
d)0
e)None of these
5)A text is made up of the characters a, b, c, d, e each
occurring with the probability .12, .4, .15, .08 and .25
respectively. The optimal coding technique will have the
average length of
a)2.15
b)1.15
c)3.25
d)5.25
e)None of these
6)The order of an algorithm that finds whether a given Boolean
function of ‘n’ variables, produces a 1 is
a)Structure
b)Algorithm
c)Constant
d)Stack
e)None of these
7)Which of the following methods can be used to find the sum
of digits of a number?
a)Recursion
b)Bubble sort
c)Iteration
d)Both recursion and iteration
e)None of these
8)What can be the maximum sum of digits for a 4 digit number?
a)36
b)9
c)16
d)4
e)None of these
9)The running time of an algorithm is given by
T(n) = T(n – 1) + T(n – 2) – T(n – 3), if n > 3
n, otherwise.
a)logn
b)nn
c)n
d)n2
e)None of these
10)Topological sort is equivalent to which of the traversals
in trees?
a)Pre-order traversal
b)Heap
c)Merge sort
d)In-order traversal
e)None of these
Answers:
1)a
2)c
3)b
4)b
5)a
6)c
7)d
8)a
9)c
10)a