IBPS CWE (Specialist IT Officer) - V - 2016

result kab aata h??

mujhse quant ke series questions khabi nai hote!!!

iskeliye kya karuu??


Now everything’s done and dusted lets play CUTOFF CUTOFF 

Predict UR cutoff , others adjust accordingly

  • 95
  • 105
  • 100
  • 110
  • 115

0 voters

What was the question related to kernel in Evening shift. 

To create new file- 

Ctrl+Shift+N

Qns batao bhai-behno PK ke jisko jisko yaad ho?? 😀😙

What was last year's cutoff for gen cat?

BREAKING NEWS: The infamous second shift prevails. As per the first shift PK questions shared by someone, 2nd shift has lived up to its reputation & proved to be a nightmare. Janhit me Jari!! :P

Can any1 tellme about cloud computing in short with iaas ,paas and saas defination in simple language

online collaborative word document edit is ?

synchronous?

asyn?

in cloud edit ?

?

?

attempt in I.T so 2016

  • 100-110
  • 80-90
  • 120-150
  • 110-120
  • 90-100

0 voters

2nd slot

QA-25

PK-37

VA-41

LR-44

total- 147

no chance ...  😞 

morning slot:


Which class provides large networks? ...class A B C D 

2nd slot QA-28 PK-26 eng-26 LR-46 total- 126 any chances ...?? 😞

One can check sentence arreangement for 1st shift from here ...chk 8th para

http://wap.business-standard.com/article/punditry/what-is-the-cause-of-huge-food-grain-wastage-in-in...

any chance with 115-120 score?

morning slot: 

Which feature of linux make it Multiprogramming ?  

iska ans-- timesharing tha na?

Morning Shift:

1. The core in a operating system is called: kernel
2. PPP (Point to Pint Protocol) is used for: the communication between two computers using a serial interface.
3. Which class is used for large networks? : Class A
4. File Extension of Microsoft Word 2013 is : docx
5. A hierarchical database uses: one-to-many relationship
6. The round button in web pages is called : radio button
7. Scrambling of Data is called : Encryption
8. Java language is mainly used for : a new platform for Internet
9. Malicious software is also known as : Malware
10. The virus which attaches itself to macros? - Macro virus
11. To prevent unauthorized Internet users from accessing private networks: Firewall
12. TCP and UDP belong to what layer of the OSI model: Transport layer
13. One question related to: Normal Form(NF)
14. In JAVA, the class destructor returns: No Value
15. Shortcut key for Help: F1
16. One question related to data dictionary
17. Which of the following is TCP/IP data link layer protocol - SMTP
18. Connection oriented protocol: TCP
19. One question related to: insecure network protocols
20. Which option where you search for files: start
21. What is used to provide relationship between two relations which have matching or same attribute: foreign key
22. How does UNIX system provides multi-tasking:
23. When you override an existing function, what should be same in it?
24. In which phase of SDLC a new hardware is added which can be used afterwards? System design

Evening Shift:
1. Which normal form is not concerned with functional dependency?
2. One question related to : Kernel
3. one question related to : Select Operating System
4. Shortcut key to create a new folder?
5. Which of the following is an example declaration of a class in c++??
6. One question related to: Router

ShiFt 2nd woh puzzle ka answer yaad h kisiko jisme rectangular table pe 8 log the facing in and out??ek ka tha 2nd to the right of P??

series - 24 26 20 32 12 ....

anyone ?