Sunday, September 27, 2009

Indian Bank Computer Officers exam 2008 solved paper

Indian Bank Computer Officers exam 2008 solved

paper (Held on 30-03-2008)

Professional Knowledge

1. Apassive threat to computer security is -
(a) Malacious intent
(b) Sabotage
(c) Accidental Agents
(d) Espionage Agents
(e) None of these
Ans (b)
2. The Secure Electronic Transaction (SET) specification is-
(a) is a notice ,issued and verified by a certificate authority that guarantees a user or website is legitimate
(b) proved private key-encryption of all data that passes between a client and a server
(c) Allows users to choose an encryption scheme for the data that passes between a client and a server
(d) Uses a public-key encryption to secure credit-card transaction system
(e) None of these
Ans (d)
3. ........... allows wireless mobile device to access the Internet and its services such as the web and E-mail.
(a) TCP/IP
(b) Ethernet
(c) WAP
(d) Token ring
(e) None of these
Ans (c)
4. 'DOS' floppy disk does not have -
(a) A boot record
(b) A file allocation table
(c) A root Directory
(d) Virtual memory
(e) BIOS
Ans (A)
5. 'MICR' technology used for clearance of cheque by banks refers to-
(a) Magnetic Ink Character Recognition
(b) Magnetic Intelligence Character Recognition
(c) Magnetic Information Cable Recognition
(d) Magnetic Insurance Cases Recognition
(e) None of these
Ans (a)
6. All the information collected during database development is stored in a -
(a) Repository
(b) Data Warehouse
(c) RAD
(d) CASE
(e) None of these
Ans (d)
7. The ........ component is usedby the data analyst to create the queries that access the database.
(a) Data extraction
(b) End-user query tool
(c) End-user presentational tool
(d) Dta store
(e) None of these
Ans (b)
8. A(n) .......... allows network users to share a single copy of software,which resides on the network server.
(a) Single-user license agreement
(b) Network site license
(c) End-user license agreement
(d) Business software license
(e) None of these
Ans (a)
9. A polymorphic virus -
(a) Modifies its program code each time it attaches itself to another program or file
(b) is a malicious - logic program that copies itself repeatedly in memory or on a disk drive untill no memory or disk space remains
(c) a malious -logic program that hides within or looks like a legitimate program
(d) Infects a program file ,but still reports the size and creation data of the original ,uninfected program
(e)None of these
Ans (a)
10. Microwave transmission is used in environments where installing physical tranmission media is -
(a) Difficult or impossible and where line-of-sight transmission is unavailable
(b) Easy or promising and line-of-sight transmission is unavailable
(c) Difficult or impossible and where line-of-sight transmission is available
(d) Easy or promising and line-of-sight transmission is available
(e) None of these
Ans (c)

No comments:

Post a Comment

About This Blog

  © Blogger templates Newspaper by Ourblogtemplates.com 2008

Back to TOP