Go Back   2023 2024 Courses.Ind.In > Main Category > Main Forum

  #1  
Old January 21st, 2016, 11:53 AM
Super Moderator
 
Join Date: Apr 2013
Default sbi specialist officer mock test online

Discuss about sbi specialist officer mock test online here. Welcome to Courses.ind.in and this page is for sbi specialist officer mock test online discussion. If you are looking for information on sbi specialist officer mock test online then ask your question is as much details as possible in the “Reply” box provided below. The more detailed your question will be, the more easy will it be for our experts to answers your query. And if you have any updated or latest information on sbi specialist officer mock test online, then please share you knowledge with our experts in the “Reply” box below. Your reply will be published here and your knowledge can help many people. Thanks for stopping by at Courses.ind.in. Please visit again.
Reply With Quote Quick reply to this message
  #2  
Old May 27th, 2017, 08:19 AM
Unregistered
Guest
 
Default Re: sbi specialist officer mock test online

I want the sample question paper of State Bank Of India SBI Specialist Officer SO Exam for preparation?
Reply With Quote Quick reply to this message
  #3  
Old May 27th, 2017, 08:20 AM
Super Moderator
 
Join Date: Aug 2012
Default Re: sbi specialist officer mock test online

I am providing you the sample question paper of State Bank Of India SBI Specialist Officer SO Exam

SBI Specialist Officer SO Exam question paper

1. The _____ states that a foreign key must either match a primary key value in another relation or it must be null.
(a) entity integrity rule
(b) referential integrity constraint
(c) action assertion
(d) composite attribute
(e) None of these

2. An applet __________
(a) is an interpreted program that runs on the client
(b) tracks the number of visitors to a Website
(c) is a compiled program that usually runs on the client
(d) collects data from visitors to a Website
(e) None of these

3. A _____ sometimes called a boot sector virus, executes when a computer boots up because it resides in the boot sector of a floppy disk or the master boot record of a hard disk.
(a) system virus
(b) Trojan horse virus
(c) file virus
(d) macro virus
(e) None of these

4. Which error detection method uses one's complement arithmetic?
(a) Simply parity check
(b) Checksum
(c) Two-dimensional parity check
(d) CRC
(e) None of these

5. A result of a computer virus can not lead to ___.
(a) Disk Crash
(b) Mother Board Crash
(c) Corruption of program
(d) Deletion of files
(e) None of these

6. The network interface card of LAN is related to following layer of OSI Model-
(a) Transport
(b) Network
(c) Data Link
(d) Physical
(e) All of these

7. Which of the following does not describe a data warehouse?
(a) Subject-oriented
(b) Integrated
(c) Time-variant
(d) Updateable
(e) None of these

8. Which of the following is true ?
(a) Logical design is software-dependent
(b) In a distributed database, database is stored in one physical location
(c) Conceptual design translates the logical design into internal model
(d) Logical design is software independent
(e) None of these

9. A range check _____
(a) ensures that only the correct data type is entered into a field
(b) verifies that all required data is present
(c) determines whether a number is within a specified limit
(d) tests if the data in two or more associated fields is logical
(e) None of these

10. The total set of interlinked hypertext documents worldwide is-
(a) HTTP
(b) Browser
(c) WWW
(d) B2B
(e) None of these

11. With the object-oriented (OO) approach, an object encapsulates, or_____.a programmer.
(a) carries out, the details of an object for
(b) hides, the details of an object from
(c) reveals, the details of an object to
(d) extends, the details of an object beyond
(e) None of these

12. Every computer connected to an intranet or extranet must have a distinct_____
(a) firewall
(b) proxy server
(c) IP address
(d) domain name
(e) None of these

13. A table of bits in which each row represents the distinct values of a key?
(a) Join index
(b) Bitmap index
(c) B + Tree
(d) Hierarchical index
(e) None of these

14. The degree of detail that should be incorporated into a database depends on what?
(a) Data integrity
(b) The type of database
(c) The user's perspective
(d) The business practices and policies
(e) None of these

15. The ___.converts digital signals to analog signals for the purpose of transmitting data over telephone lines.
(a) Modem
(b) Router
(c) Gateway
(d) Bridge
(e) All of these

16. Before a package can be used in a java program it must be___.
(a) executed
(b) referenced
(c) imported
(d) declared
(e) None of these

17. Choose the correct way to indicate that a line in a C++ program is a comment line, that is, a line the will not be executed as an instruction___.
(a) begin the line with a # sign
(b) begin the line with double slashes (/ /)
(c) begin and end the line with double hyphens (-_-)
(d) indent the line
(e) None of these

18. Programming language built into user programs such as Word and Excel are known as____
(a) 4GLs
(b) macro languages
(c) object-oriented languages
(d) visual programming languages
(e) None of these

19. Firewalls are used to protect against___.
(a) Unauthorized Attacks
(b) Virus Attacks
(c) Data Driven Attacks
(d) Fire Attacks
(e) All of these

20. This is a standard way for a Web server to pass a Web user's request to an application program and to receive data back to forward to the user-
(a) Interrupt request
(b) Forward DNS lookup
(c) Data-Link layer
(d) File Transfer Protocol
(e) Common gateway interface

21. Three SQL, DDL, CREATE commands are__.
(a) Schema, Base and Table
(b) Base, Table and Schema
(c) Key, Base and Table
(d) Schema, Table and View
(e) None of these

22. Data are ________ in client/server computing.
(a) never sent to the client machine
(b) sent in very large sections to save processing time
(c) sent only upon the client's request
(d) sent in complete copies for the client to filter and sort
(e) sent from the client to the server for processing

23. Which of the following will not eliminates the ambiguities of a null value?
(a) Define the attribute as required
(b) Define subtypes
(c) Define each attribute as having an initial value that is recognized as blank
(d) Define supertypes
(e) None of these

24. The____directory is mandatory for every disk.
(a) Root
(b) Base
(c) Sub
(d) Case
(e) None of these

25. This is a group of servers that share work and may be able to back each other up if one server fails.
(a) Channel bank
(b) Cluster
(c) Tiger team
(d) Serverless backup
(e) Logical unit
Reply With Quote Quick reply to this message
Reply
Similar Threads
Thread
Study Material For SBI Specialist Officer
SBI Specialist Officer PDF
Online Application For IBPS Specialist Officer
PNB Syllabus For Specialist Officer
SBI Specialist Officer Test Series
SBI Specialist Officer For Engineer
Www.sbi.co.in SBI Recruitment- Specialist Officer Online Registration
How To Prepare For Sbi Specialist Officer
aptitude questions for sbi specialist officer
sbi specialist officer law
qualification for sbi specialist officer
how to apply sbi specialist officer
results of sbi - specialist officer
english for sbi specialist officer
www sbi specialist officer recruitment
amrita university online mock test
sbi specialist officer online application
lsat mock test online
mgims online mock test
AIEEE Mock Test Online


Quick Reply
Your Username: Click here to log in

Message:
Options



All times are GMT +5.5. The time now is 08:28 PM.


Powered by vBulletin® Version 3.8.7
Copyright ©2000 - 2024, vBulletin Solutions, Inc.
Search Engine Friendly URLs by vBSEO 3.6.1
vBulletin Optimisation provided by vB Optimise (Lite) - vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.