MEMORY Based question of SBI SO in 2nd shift......
How many types of dimensions exist in Cloud cube model ?
(1) 6
(2) 3
(3) 4
(4) 2
(5) 1
System analysts work with end users to determine the features that must be included in a new IT application. These are called ... .
(1) implications
(2) requirements
(3) effects
(4) core functions
(5) critical processes
What is full form of SOA, a method to improve availability in ITL ?
(1) Service ability of Applications
(2) Service Outage Analysis
(3) Service Offer Adjustment
(4) Systematic Operational Adjustment
(5) System Optimization Approach
Which of the following is not a Web App interface mechanism ?
(1) Cookies
(2) Forms
(3) Browser
(4) Cookies and Links
(5) Links
Which of the following can help to detect transmission errors by appending specially calculated bits into the each segment of data ?
(1) Parity check
(2) Integrity check
(3) Accuracy check
(4) Redundancy check
(5) Completeness check
SQL security issues include which of the following ?
(1) The complexity of key structures
(2) The number of records
(3) The size of databases
(4) The number of candidate key elements
(5) Granularity of administration
What is the technical name of a wireless network ?
(1) SSID
(2) SSO
(3) WPAD
(4) WPA
(5) BSSID
If you are connected to your internal network, what should you check if you cannot connect to with servers on the internet ?
(1) Administrative rights
(2) NTFS permissions
(3) Browser settings
(4) Proxy settings
(5) UAC
To define what columns should be displayed in an SQL, SELECT statement ....................
(1) use USING to name the source table(s).
(2) use SELECT to name the source table(s) and list the columns to be shown after USING.
(3) use USING to name the source table(s) and list the columns to be shown after SELECT.
(4) use FROM to name the source table(s) and list the columns to be shown after SELECT.
(5) use USING to name the source table(s) and list the columns to be shown after WHERE.
Which of the following is a CASE SQL statement ?
(1) A way to establish a data definition in SQL.
(2) A way to establish an IFTHENELSE
in SQL.
(3) Establish a loop in SQL or establish an IFTHENELSE
in SQL.
(4) A way to establish a loop in SQL.
(5) A way to establish a data definition in SQL or establish a loop in SQL.
Which one is not a phase of the systems development life cycle ?
(1) Problem analysis
(2) Decision analysis
(3) Requirements analysis
(4) Postimplementation
review
(5) Scope definition
The simplest model in software development is ...................
(1) Iterative
(2) COCOBC model
(3) spiral
(4) waterfall model
(5) prototyping
....................is a standard for security that is located at the network or packet processing layer of network communications, as opposed to the application
layer.
(1) TCP
(2) SQL
(3) IPsec
(4) SHTTP
(5) passive FTP
A thin, creditcard
size device used principally on Laptop computers to expand its capabilities is...............
(1) special card
(2) smart card
(3) expansion card
(4) flash card
(5) PC card
In the concept of object orientation, .........................
(1) Users change properties and cell functions
(2) Designers can only call functions
(3) Designers can only call calculations
(4) Users change properties with their input devices
(5) Designers convert binary data into object functions
What type of BCP test user adjusts resources to simulate a system crash and validate the plan's effectiveness ?
(1) Paper
(2) Preparedness
(3) Walkthrough
(4) Parallel
(5) None of the above
Data mining is used to aid in.............................
(1) analyzing current decisions made by managers.
(2) operational management
(3) retrieving archival data
(4) analysing past decisions made by managers
(5) detecting patterns in operational data
Which of the following provid network redundancy in a local network environment ?
(1) Shadowing
(2) Mirroring
(3) Mirroring and Shadowing
(4) Duplexing
(5) Dual backbones
On pointtopoint
networks, OSPF hello packets are addressed to which address ?
(1) 27.0.0.1
(2) 172.16.0.1
(3) 224.0.0.5
(4) 192.168.0.5
(5) 224.255.255.255
Which of the following do digital signatures provide ?
(1) Authentication and integrity of data
(2) Confidentiality and availability of data
(3) Authentication and confidentiality of data
(4) Confidentiality and integrity of data
(5) Authentication and availability of data
Which of the following codes must be granted to an Oracle 9x to perform a full database import ?
(1) CONNECT
(2) RESOURCE
(3) FULL_REPORT_PREVS
(4) FULL_REPORT_PRINS
(5) IMP_FULL_DATABASE
What does CIDR, a method of allocating IP addresses, stand for ?
(1) Classless Interdomain
Routing
(2) Classless IP Default Routing
(3) Glassful IP Dclass
Routing
(4) Classless IP Dclass
Routing
(5) Glassful Information Routing
What tool is used to view the hardware and software loaded on a Windows server ?
(1) KB Tool
(2) System Information
(3) System configuration
(4) POST
(5) Device manager
A server farm is an example of..........................
(1) Multiple servers
(2) Redundant servers
(3) Server clustering
(4) Standalone
server
(5) Serve fault tolerance
Map entities, attributes and relations in Oracle is represented by .....................
(1) Special Schema
(2) Conceptual and Physical Schema
(3) Logical Schema
(4) Physical Schema
(5) Conceptual Schema
A systems analysis test used to display how data moves through a new program design is called a(n).............
(1) data logic chart
(2) dataflow diagram
(3) system flowchart
(4) software logic diagram
(5) webrelationship
illustration
Which one of the following control steps is usually not performed in data warehousing applications ?
(1) Monitor summary tables for regular use
(2) Cleaning up the data
(3) Control meta data from being used interactively.
(4) Reconcile data moved between the operations environment and data warehouse
(5) Monitor the data purging plan