IBPS CWE (Specialist IT Officer) - V - 2016


Quantitative Aptitude Quiz for Banking entrance exams

Dear readers,

This quiz consists of questions from various Banking entrance exams held during the last few years. Leave your answers/ responses in the comments section below and we'll soon let you know the correct answers!

Directions (Q 1-5) Each of the questions below consists of a question and two statements numbered I and II given below it. You have to decide whether the data provided in the statements are sufficient to answer the question. Read both the statements and

Give answer (1) if the data in Statement I alone are sufficient to answer the question, while the data in Statement II alone are not sufficient to answer the question.

Give answer (2) if the data in Statement II alone are sufficient to answer the question, while the data in Statement I alone are not sufficient to answer the question.

Give answer (3) if the data either in Statement I alone or in Statement II alone are sufficient to answer the question.

Give answer (4) if the data in both the Statements I and II are not sufficient to answer the question.

Give answer (5) if the data in both the Statements I and II together are necessary to answer the question.

1. What is the speed of the bus?

I. The bus covers a distance of 80 km in 5 h.

II. The bus covers a distance of 160 km in 10 h.

2. What is the ratio of the number of freshers to the number of seniors in a college?

I. The ratio of males and females in the college is 2 : 3.

II. There are 1125 female fresher in the college.

3. What is Mr. Mehta's present income?

I. Mr. Mehta's income increases by 10% every year.

II. His income will increase by  ₹ 2,500 this year.

4. What is Nidhi's age?

I. Nidhi is 3 times younger to Rani.

II. Sutekha is twice the age of Rani and the sum of their ages is 72.

5. What is the ratio of the total number of girls to the total number of boys in the school?

I. The ratio of the total number of boys to the total number of girls, last year was 4 : 5.

II. There are 3500 students in the school out of which 60 % are boys.

Directions (Q. 6-10) In the following questions two equations numbered I and II are given. You have to solve both the equations and Give answer If

(1) X > Y

(2) X ≥ Y

(3) X

(4) X ≤  Y

(5) X = Y or the relationship cannot be established

6. 

I. (3/4) y = (2/3) x

II. 24.1 - Y = 19.6

7.

I. 4x + 2y = 8.5

II. 2x + 4y =9.5

8.   

I. x = cube root of 10648

II. y = ± √484

9. 

I. (x^2) + 17x + 72 = 0

II. (y^2) + 15y + 56 = 0

10.  

I. (x^2) + 12x + 27 = 0

II. (y^2) + 11y + 30 = 0

To follow our Banking portal on Facebook and Twitter, click on the following links:

Facebook: https://www.facebook.com/pagalguybankpo

Twitter: https://twitter.com/PaGaLGuYBankPO


Reasoning quiz for Banking entrance exams

Dear readers,

This quiz consists of actual questions from various Banking entrance exams held during the last few years. Leave your answers/ responses in the comments section below and soon we'll let you know the correct answers!

Directions (Q. 1-3) Read the following information carefully and answer the questions which follow.

If 'A * B' means 'A is wife of B'

If 'A + B' means 'A is brother of B'

If 'A / B' means 'A is daughter of B'

If 'A - B' means 'A is son of B'

1. How is Q related to P if 'P / R * T - Q' ?

(1) Granddaughter

(2) Mother-in-law/Father-in-law

(3) Grandmother

(4) Grandmother/Grandfather

(5) None of the above

2. How is R related to Q, if  'P - Q + R / T' ?

(1) Brother/Sister

(2) Niece

(3) Sister

(4) Nephew/Niece

(5) None of these

3. How is T related to P if `P * Q - T + R' ?

(1) Mother

(2) Father-in-law

(3) Mother-in-law

(4) Mother-in-law/Father-in law

(5) None of the above

Directions (Q. 4-8) Each of the questions below consists of a question and two statements numbered I and II given below it. You have to decide whether the data provided in the statements are sufficient to answer the question. Read both the    statements and

Give answer (1) if the data in Statement I alone are sufficient to answer the question, while the data in Statement II alone are not sufficient to answer the question.

Give answer (2) if the data in Statement II alone are sufficient to answer the question, while the data in Statement I alone are not sufficient to answer the question.

Give answer (3) if the data in Statement I alone or in Statement II alone are sufficient to answer the question.

Give answer (4) if the data in both the Statements I and II are not sufficient to answer the question.

Give answer (5) if the data in both the Statements I and II together are necessary to answer the question.

4. Is it 5 O'clock ?

I. One hour ago Reena left for home.

II. One hour later the hour and minute hands of clock will make a straight line.

5. Who is tallest among A, B, C and D ?

I. A is taller than D, who is taller than B.

II. C is shorter than B.

6. What does `so' mean in the code language ?

I. `ni la pe so' means "I bought a car".

II. 'la be so nu' means "A house was bought".

7. How many students are there in the class ?

I. P's rank is 9th from the top and 15th from the bottom.

II. 66% of all the number of students in the class are girls.

8. How many children does Mr. X have ?

I. He has only one son and twice as many daughters.

II. One of his daughters is elder than his son.

Directions (Q. 9-10) In each of the questions below are given four statements followed by four conclusions numbered I, II, III and IV. You have to take the given statements to be true even if they seem to be at variance from commonly known facts. Read all the conclusions and then decide which of the given conclusions logically follows from the given statements disregarding commonly known facts.

9.   Statements:  Some letters are words. All words are sentences. Some sentences are paragraphs. Some paragraph is a chapter.

Conclusions:

I. Some words are paragraphs.

II. Some chapters are letters.

III. No chapter is letter.

IV. Some letters are sentences.

(1) Only IV follows

(2) Only III and IV follow

(3) Only either II or III follows

(4) Only IV and either II or III follow

(5) None of the above

10. Statements:  Some files are folders. Some folders are boxes. All boxes are bags. Some bags are trunks.

Conclusions :

I. Some bags are folders.

II. Some boxes are trunks.

III. Some bags are files.

IV. Some trunks are folders.

(1) None follows

(2) Only I follows

(3) Only III follows

(4) Only II follows

(5) None of these

To follow our Banking portal on Facebook and Twitter, click on the following links:

Facebook: https://www.facebook.com/pagalguybankpo

Twitter: https://twitter.com/PaGaLGuYBankPO

What type of virus uses computers hosts to reproduce itself?


  • Micro Virus
  • Melissa Virus
  • Time bomb
  • Worm

0 voters

HELLO ALL !!

I HAVE SERIOUS DOUBT ... 😞

cut off marks in ibps so ( IT officer scale-1 ) will be around 65-75/200 as per online analysis from various websites or it will be around 125+

Pls mention your time taken to solve this set

From where to study network security?

Brain teaser..

In SQL, which of the following is not a data definition language command? 

  • RENAME
  • None of these
  • REVOKE
  • GRANT
  • UPDATE

0 voters

Professional Knowledge Quiz for IBPS SO (I.T.)

Dear readers,

This quiz consists of questions from various Banking entrance exams held during the last few years. Leave your answers/ responses in the comments section below and we'll soon let you know the correct answers!

Directions (Q. 1-10)

1. In addition to an internet connection, which of the following is needed to access webpages?

(A) telnet client

(B) scanner

(C) mail client

(D) web browser

2. A DBMS performs several important functions that guarantee the integrity and consistency of the data in the database. Which of the following is not one of those functions?

(A) Data integrity management

(B) Data reports

(C) Security and storage management

(D) Data storage management

3. A procedural program stores ________ in a collection of variables and a set of ________ perform operations on it.

(A) parameters, arguments

(B) data, functions

(C) assets, actions

(D) strings, operators

4. Which of the following is the phase of SDLC in which the identified requirements are incorporated into the new system's design?

(A) Maintenance

(B) Physical layout

(C) Requirement design

(D) Systems design

5. What does DLCI stands for?

(A) Data Link Circuit Identifier

(B) Data Link Connection Interrupt

(C) Data Link Connection Indicator

(D) Data Link Connection Identifier

6. What standard Java package is used to move the cursors?

(A) Javax swing

(B) Java fcio   

(C) Java lo

(D) java awt event

7. A communication medium where data is transformed into light pulses is

(A) coaxial cable

(B) optical fiber

(C) satellite

(D) twisted-pair cable

8. ___________ is a standard for security that is inclined at the network or packet processing layer of network communications, as opposed to the application layer.

(A) passive FTP

(B) TCP

(C) S-HTTP

(D) IPsec

9. Locking may cause which of the following problems?

(A) Deadlock  

(B) versioning 

(C) versioning and deadlock

(D) Erroneous updates

10. Which of the following is not a WebApp Interface mechanism?

(A) Links

(B) Cookies

(C) Browser

(D) Cookies and Links

`

To follow our Banking portal on Facebook and Twitter, click on the following links:

Facebook: https://www.facebook.com/pagalguybankpo

Twitter: https://twitter.com/PaGaLGuYBankPO

The customer desired to do transaction through ATM need to have

A. ATM or debit card

B. PIN allocated by bank while using ATM

C. either A or B

D. Both A and B

Can anyone tell  how many number of candidates are applied for ibps IT officers approx...?

any guess

Professional Knowledge Quiz for IBPS SO (I.T.)

Dear readers,

This quiz consists of questions from various Banking entrance exams held during the last few years. Leave your answers/ responses in the comments section below and we'll soon let you know the correct answers!

Directions (Q. 1-10)

1. This is one of the older and slower methods an intruder might use to scan a network to determine which of a range of IP addresses map to live hosts.

(A) ping sweep

(B) phreaking

(C) smurfing   

(D) war driving

2. Which of the following is used to create and delete views and relations within tables?

(A) SQL Data Identification Language

(B) SQL Data Identification and Manipulation Languages

(C) SQL Data Relational Language

(D) SQL Data Definition Language

3. Criminal hacking is called

(A) cracking

(B) a virus

(C) a Trojan horse

(D) a worm

4. Backward recovery is which of the following?

(A) Where the before-images are applied to the database

(B) Where the after-images and before-images are applied to the database

(C) Where the after-images are applied to the database

(D) Continuing without any recovery

5. ___________ is the integration of economic, social, cultural and ecological facets of life, enabled by information technologies.

(A) business environment

(B) neutralization

(C) nationalisation

(D) globalization

6. _________ is the process used by managers to get more detailed information.

(A) Detailing

(B) Wagering

(C) Drilling down

(D) Probing

7. A cross life-cycle activity of system development is

(A) data modelling

(B) fact finding

(C) prototyping

(D) data flow diagram modelling

8. The result of a SQL SELECT statement is a(n)

(A) report

(B) file

(C) page

(D) table

9. WebApp performance tests are designed to

(A) assess WebApp usability.

(B) test network performance.

(C) evaluate page loading times.

(D) simulate real-world loading situations.

10. A CASE SQL statement is which of the following?

(A) A way to establish a data definition in SQL or establish a loop in SQL

(B) A way to establish an IF THEN-ELSE in SQL

(C) A way to establish a loop in SQL

(D) Establish a loop in SQL and establish an IF-THEN-ELSE in SQL

`

To follow our Banking portal on Facebook and Twitter, click on the following links:

Facebook: https://www.facebook.com/pagalguybankpo

Twitter: https://twitter.com/PaGaLGuYBankPO


Quantitative Aptitude Quiz for Banking entrance exams

Dear readers,

This quiz consists of questions from various Banking entrance exams held during the last few years. Leave your answers/ responses in the comments section below and we'll soon let you know the correct answers!

Direction (Q.1-5) In the following number series only one number is wrong. Find out the wrong number.

1.   7   56   442   3089   18532   92647   370586

(1) 442         (2) 92647        (3) 18532         (4) 3089          (5) None of these

2. 8000     3200     1280      512   204.8    84.92      32.768

(1) 512         (2) 84.92        (3) 204.8        (4) 1280           (5) None of these

3.  898   906   933   996   1122   1338   1681

(1) 906           (2) 933        (3) 1122         (4) 1338          (5) None of these

4.     4   55   576   4209   21280   64083    64204

(1) 4209        (2) 576        (3) 21280        (4) 64204       (5) None of the above

5.  3   6   16   47.5   154.5   558.5    2257

(1) 2257           (2) 47.5        (3) 154.5         (4) 558.5        (5) None of these

Directions (Q.6-10) Study the information carefully and answer the questions that follow.

A school has a total of 1200 students. The ratio of girls to boys in the school is 3 : 2. All the students have enrolled in hobby classes viz. Singing, Dancing, Martial Arts and Cooking. One-twelfth of the boys have enrolled in only cooking classes. 25 per cent of the girls have enrolled in Cooking and Singing classes together. Number of boys enrolled in only Martial Arts classes is 150 per cent of the number of girls enrolled in the same. Number of students enrolled in only Dancing is 26 per cent of the total number of students. 5 per cent of the girls have enrolled in only Martial Arts classes. One-third of the boys enrolled in only Dancing classes. 35 per cent of the girls enrolled in Singing, Dancing and Martial Arts together and the remaining enrolled in only Cooking. 15 per cent of the boys enrolled in Cooking and Singing classes together and the remaining enrolled in Singing, Dancing and Martial Arts classes together.

6. Number of boys enrolled in Cooking and Singing classes together is what per cent of the girls enrolled in the same ?

(1) 48             (2) 36           (3) 20              (4) 25           (5) None of these.

7. What is the total number of students learning Martial Arts?

(1) 96                (2) 496              (3) 342             (4) 128            (5) None of these

8. How many girls are enrolled in only Cooking classes?

(1) 280             (2) 252             (3) 154             (4) 100             (5) None of these

9. How many boys learn Singing?

(1) 226          (2) 184             (3) 72            (4) 96                  (5) None of these

10. What is the respective ratio of girls to boys enrolled in only Dancing classes?

(1) 8 : 7            (2) 14 : 17               (3) 19 : 20              (4) 12 : 7                (5) None of these

To follow our Banking portal on Facebook and Twitter, click on the following links:

Facebook: https://www.facebook.com/pagalguybankpo

Twitter: https://twitter.com/PaGaLGuYBankPO


Reasoning quiz for Banking entrance exams

Dear readers,

This quiz consists of actual questions from various Banking entrance exams held during the last few years. Leave your answers/ responses in the comments section below and soon we'll let you know the correct answers!

Directions (Q. 1-7) In these question symbols $, #, %, © and @ are used with different meanings as follows.

'A $ B' means 'A is smaller than B'.

'A # B' means 'A is not smaller than B'.

' A % B' means 'A is neither smaller than nor greater than B'.

'A © B' means 'A is greater than B'.

'A @ B' means 'A is not greater than B'.

In each of the following questions, assuming the given statements to be true, find  out which of the two conclusions I and II given below them is/are definitely true.

Give answer (1) if only conclusion I is true.

Give answer (2) if only conclusion II is true.

Give answer (3) if either conclusion I or conclusion II is true.

Give answer (4) if neither conclusion I nor conclusion II is true.

Give answer (5) if both conclusions I and II are true.

1. Statements:    D $ L, L @ V, V # W

Conclusions:   

I. D $ V

II. D@W

2. Statements:    M # T, T© H, F @ H

Conclusions:  

I. M©H

II. T©F

3. Statements:    H © L, L %  E, E $ T

Conclusions:

I. H @ T

II.  H © T

4. Statements:   L@ R. R % J, J © N

Conclusions:

I. L @ N

II.  N $ R

5.  Statements:    V # F. F © J, J % D

Conclusions:      

I. V # D

II. F © D

6. Statements:   L % T, T@ J, J # K

Conclusions:  

I. L © K

II. T @ K

7. Statements:   G @ K, K @ F  F $ M

Conclusions:  

I. G © F

II. K @ M

8.  Statements:   All computers are machines. All machines are printers. Some printers are keys. No key is board.

Conclusions:

I. Some keys are machines.

II. Some boards are printers.

III. All printers are machines.

IV. Some boards are computers.

(1) None follows

(2) Only I and II follow

(3) Only III follows

(4) Only either II or IV follows

(5) None of the above

9. Statements:  Some coins are metals. Some metals are papers. Some papers are clothes. Some clothes are apparels.

Conclusions:

I. Some apparels are papers.

II. Some clothes are coins

III. Some apparels are metals.

IV. No cloth is coin.

(1) Only I follows

(2) Only either I or III follows

(3) Only either II or IV follows

(4) Only II and IV follow

(5) None of the above

10.  Statements:  Some curtains are nets. All net are holes. All Holes are windows. Some windows are partitions.

Conclusions

I. Some curtains are partitions.

II. Some nets are partitions.

III. All nets are windows.

IV. Some curtains are holes.

(1) Only I and III follow

(2) Only either I or II and III follow

(3) Only III and IV follow

(4) Only II and III follow

(5) None of the above

To follow our Banking portal on Facebook and Twitter, click on the following links:

Facebook: https://www.facebook.com/pagalguybankpo

Twitter: https://twitter.com/PaGaLGuYBankPO

In Frame Relay, the ________ bit warns the sender of congestion in the network.


  • NONE
  • EITHER
  • FECN
  • BECN

0 voters

can anyone please upload the topicwise marks distribution for P.K.?

3 days left for exam . feeling tensed.. 😞

pyus i have filled ibps so IT from electronics ....so in exam will they ask electronics question or computer science question.........

Malware: Malware is short for “malicious software" Wikipedia describes malware as a term used to mean a “variety of forms of hostile, intrusive, or annoying software or program code.” Malware could be computer viruses, worms, Trojan horses, dishonest spyware, and malicious rootkits—all of which are defined below, - ---------------------------------------- Computer virus: A computer virus is a small piece of software that can spread from one infected computer to another. The virus could corrupt, steal, or delete data on your computer—even erasing everything on your hard drive. A virus could also use other programs like your email program to spread itself to other computers. Virus Stages: Dormant->Propagation->Triggering->Execution Rogue security software: Have you ever seen a pop-up window that advertises a security update or alert? It appears legitimate and asks you to click on a link to install the “update” or “remove” unwanted malicious software that it has apparently detected. This could be rogue security software designed to lure people into clicking and downloading malicious software. Microsoft has a useful webpage that describes rogue security software and how you can protect yourself. Trojan horse: Users can infect their computers with Trojan horse software simply by downloading an application they thought was legitimate but was in fact malicious. Once inside your computer, a Trojan horse can do anything from record your passwords by logging keystrokes (known as a keystroke logger) to hijacking your webcam to watch and record your every move. Malicious spyware: Malicious spyware is used to describe the Trojan application that was created by cybercriminals to spy on their victims. An example would be keylogger software that records a victim’s every keystroke on his or her keyboard. The recorded information is periodically sent back to the originating cybercriminal over the Internet. Keylogging software is widely available and is marketed to parents or businesses that want to monitor their kids’ or employees’ Internet usage. Computer worm: A computer worm is a software program that can copy itself from one computer to another, without human interaction. Worms can replicate in great volume and with great speed. For example, a worm can send copies of itself to every contact in your email address book and then send itself to all the contacts in your contacts’ address books. Botnet: A botnet is a group of computers connected to the Internet that have been compromised by a hacker using a computer virus or Trojan horse. An individual computer in the group is known as a “zombie“ computer. Spam: Spam in the security context is primarily used to describe email spam—unwanted messages in your email inbox. Spam, or electronic junk mail, is a nuisance as it can clutter your mailbox as well as potentially take up space on your mail server. Unwanted junk mail advertising items you don’t care for is harmless, relatively speaking. However, spam messages can contain links that when clicked on could go to a website that installs malicious software onto your computer. Phishing: Phishing scams are fraudulent attempts by cybercriminals to obtain private information. Phishing scams often appear in the guise of email messages designed to appear as though they are from legitimate sources. For example, the message would try to lure you into giving your personal information by pretending that your bank or email service provider is updating its website and that you must click on the link in the email to verify your account information and password details. Rootkit: A rootkit is a collection of tools that are used to obtain administrator-level access to a computer or a network of computers. A rootkit could be installed on your computer by a cybercriminal exploiting a vulnerability or security hole in a legitimate application on your PC and may contain spyware that monitors and records keystrokes.


Which
type of computers use the 8 bit code called EBCDIC?


  • Mainframe computers
  • Minicomputers
  • Super computer
  • Microcomputer

0 voters