Tuesday, March 5, 2013

SBI Specialist Officer Questions with answer


Here I am adding previous SBI SO question paper with solution. I have doubts about few questions and I marked those with red color. If you know the right answer please comment the right answer in the comment box.  Best wishes!!

  1. In SQL, which of the following is not a data Manipulation Language Commands?
    1. Delete
    2. Select
    3. Update
    4. Create
    5. None of the above
  2. The value for an attribute or a column are drawn from a set of values known as -
    1. Tuples
    2. Attributes
    3. Domain
    4. Column
    5. None of these
  3. Entities having primary key are called
    1. Primary Key
    2. Strong entities
    3. Weak entities
    4. Primary Key
    5. None Of these
  4. Which of the following is not a type of SQL statement?
    1. Data Manipulation Language (DML)
    2. Data Definition Language (DDL)
    3. Data Control Language (DCL)
    4. Data Communication Language (DCL)
    5. None of these
  5. Which of the following is not included in DML (Data Manipulation Language)
    1. INSERT
    2. UPDATE
    3. DELETE
    4. CREATE - Create is a DDL Statement
    5. None of these
  6. TRUNCATE statement in SQL is a -
    1. DML statement
    2. DDL statement
    3. DCL statement
    4. DSL statement
    5. None of these
  7. To discard all pending data changes
    1. COMMIT
    2. ROLLBACK
    3. SAVEPOINT
    4. LOCK
    5. None of these
  8. Which of the following term is related to the stack?
    1. TOP
    2. PUSH
    3. POP
    4. Rear
    5. A, B and C.
  9. In Queues, the end from where items inserted is called
    1. Rear
    2. Front
    3. Top
    4. Base
    5. None of these
  10. Which protocol is used for browsing website:
    1. TCP
    2. FITFP
    3. FTP
    4. TFTP
    5. None of these
  11. Which of the following is a browser?
    1. Netscape Navigator
    2. Mosaic
    3. Mozilla Firefox
    4. Google chrome
    5. All of these
  12. Black Box Testing sometime called -
    1. Data flow testing
    2. Loop testing
    3. Behavioral testing
    4. Graph based testing
    5. None of these
  13. The Objective of testing is
    1. Debugging
    2. To uncover errors
    3. To gain modularity
    4. To analyze system
    5. None of these
  14. Choose the right sequence of SDLC (Software development life cycle) steps
    1. Design, Requirement Analysis, Coding, Testing
    2. Requirement Analysis, Design, Coding, Testing
    3. Requirement Analysis, Design, Testing, Coding
    4. Requirement Analysis, Coding, Design, Testing
    5. None of these
  15. The drawback of the binary tree sort are remedied by the
    1. Linear Sort
    2. Quick Sort
    3. Heap Sort
    4. Insertion Sort
    5. All of these
  16. Round robin scheduling is essentially the preemptive version of
    1. FIFO
    2. Shortest job first
    3. Shortest remaining
    4. Longest time first
    5. None of these
  17. ____ is the situation in which a process is waiting on another process, which is also waiting on another process which is waiting on the first process. None of the processes involved in this circular wait are making progress.
    1. Deadlock
    2. Starvation
    3. Dormant
    4. All of these
    5. None of these
  18. Assembly language is a _____
    1. Low Level Language
    2. Middle Level Language
    3. High level Language
    4. User Language
    5. None of these
  19. Which of the following is a type of translator?
    1. Assembler
    2. Compiler
    3. Interpreter
    4. All of the Above
    5. None of these
  20. Multiprogramming systems ___
    1. Are easier to develop than single programming
    2. Execute each job faster
    3. Execute more jobs in the same time
    4. Are used only on large main frame computers
    5. None of these
  21. The mechanism by which the data and functions are bound together with an
    1. Inheritance
    2. Encapsulation
    3. Abstraction
    4. Polymorphism
    5. None of these
  22. The OSI model consists of ___layers.
    1. Nine
    2. Eight
    3. Seven
    4. Five
    5. Eleven
  23. Decryption & Encryption of data are the responsibility of the ___ layer.
    1. Physical
    2. Data link
    3. Presentation
    4. Session
    5. Application
  24. LANs can be connected by devices called ____ which operate in the data link layer?
    1. Hub
    2. Bridges
    3. HDLC
    4. Tunnel
    5. None of these
  25. In a ____ topology, if there are n devices in a network, each device has n-1 ports for cable.
    1. Mesh
    2. Star
    3. Bus
    4. Ring
    5. None of these
  1. OLAP applications are widely used by ____ and it uses ____ Schema.
    1. RDBMS , Bus
    2. Operating System ,Star
    3. Java , Bus
    4. Data mining Techniques; Star or multidimensional
    5. None of these
  2. Arrange the following in increasing order of their size.
  1. Database<File<Record<Field<Byte<Bit
  2. Bit<Byte<Field<Record<File<Database
  3. Bit>Byte>Record>Field>File>Database
  4. Bit>Byte>File>Record>Field>Database
  1. JVM is a virtual machine that can execute ___
  1. C language
  2. .net programming
  3. RDBMS
  4. C++ Language
  5. Java byte Code
  1. ODBC is based on ___.
  1. Structured Query Language.
  2. C language
  3. C++ language
  4. .net
  5. None of these
  1. Which of the following is not an advantage of the data-base approach?
  1. Increased security
  2. Elimination data redundancy
  3. Ability to associate related data ‘
  4. Programming/data independence
  5. All of the above
Elimination of data redundancy is an application of DBMS. 
(The given question is not clear, I think the question should have been ' which of the following is an advantage of the database approach')


  1. In relational database row and column is called as ____and ____respectively.
  1. Tuple; Attribute
  2. Attribute; Tuple
  3. Tupple;Domain
  4. Attribute; Domain
  5. None of these
  1. To delete a particular column in a relation the command used is:
  1. DELETE
  2. UPDATE
  3. DROP
  4. ALTER
  5. None of these
  1. A primary key if combined with a foreign key creates
  1. Parent-Child relationship between the tables that connect them.
  2. Many to many relationship between the tables that connect them.
  3. Network model between the tables that connect them.
  4. All of the above
  5. None of the above
  1. Which of the following is record based logical model?
  1. Network Model
  2. Object oriented model
  3. E-R Model
  4. All of these
  5. None of these
(Click here to know more about record based logical models)
  1. The full form of DDL is
  1. Dynamic Data Language
  2. Detailed Data Language
  3. Data Definition Language
  4. Data Derivation Language
  5. All of these
  1. Which of the following virus overtake computer system when it boots and destroy in-formation?
  1. Trojan
  2. System infectors
  3. Boot infectors
  4. Stealth virus
  5. None of these
Boot infectors spread during the boot up of computer. The virus target the critical section of the hard disk or floppy disk and obtain the complete control.  File infector viruses infect on the files of the computer. They spread when the user run the infected file. The virus make copy of itself and spread. Multipartite virus take either approach to spread. 
  1. The relational model includes two general integrity rules. Integrity rule 1 is concerned with ____ and integrity rule 2 is concerned with ____
  1. Primary Key, Foreign key
  2. Primary Key, composite key
  3. Unique key, Foreign key
  4. Composite Key, Foreign key
  5. None of these
  1. ____ is person who has the central control over both data and application programs.
  1. System engineer
  2. Database administrator
  3. Database manager
  4. Technical analyst
  5. None of these
  1. An attribute of a relation that references the primary key of another relation is known as the ____
  1. Foreign Key
  2. Unique Key
  3. Parent key
  4. Child key
  5. Index key
  1. An entity set that does not have sufficient attributes to form a primary key is a
  1. strong entity set
  2. weak entity set
  3. simple entity set
  4. primary entity set.
  5. None of these
  1. The JDBC-ODBC bridge is
  1. Three tiered
  2. Multithread
  3. Best for any platform
  4. All of these
  5. None of these
  1. In a relational database, this is a data structure that organizes the information about a single topic into row and columns.
  1. Block
  2. Record
  3. Tuple
  4. Table
  5. None of these
  1. Which statements about the Java language are true?
  1. Java supports both procedural and object-oriented programming
  2. Java is only a procedural language.
  3. Java is only an Object-Oriented.
  4. Java is related to
  5. None of the above.
  1. Stack is also called ____
  1. First In First Out (FIFO)
  2. Last In First Out (LIFO)
  3. First In Last Out (FILO)
  4. First Come First Served (FCFS)
  5. None of the above
  1. The index created by primary key column is called _____
  1. Unique Index
  2. Composite Index
  3. Single Index
  4. Primary index
  5. None of these
  1. In SQL ,which command(s) is(are) used to remove rows from a table.
  1. Delete
  2. Remove
  3. Truncate
  4. Both (1) and (3)
  5. None of the above
(Remember TRUNCATE is a DDL. Most people confuse it with DML)


  1. In SQL, the CREATE TABLE is used
  1. To create a table, defining its columns, integrity constraints, and storage allocation
  2. To add a column/integrity constraint to a table.
  3. To redefine a column
  4. To change a table’s storage characteristics
  5. All of the above
  1. What is the abbreviation is used for a software package that permits the user to create , retrieve and maintain records in a database?
  1. DASD
  2. CRMD
  3. DBMS
  4. All of these
  5. None of the above
  1. Choose the right sequence of virus stages -
  1. Triggering, Damage ,Dormancy, propagation
  2. Damage, Triggering ,Dormancy, propagation
  3. Damage, Triggering, propagation ,Dormancy
  4. Triggering, Damage, propagation, Dormancy
  5. Dormancy, Propagation,. Triggering, Damage
  1. In SQL, which command is used to add new rows to a table?
  1. Alter Table
  2. Add row
  3. Insert
  4. Append
  5. None of the Above
Friends thanks for your comments and help. Please comment if you have any kind of doubts relating to these questions. Thanks

Courtesy:

24 Comments:

At April 1, 2014 at 8:58 AM , Anonymous Shivani said...

Thanks for the post. Really helpfull.
I have a doubt about question no. 50
Will append works in that case??

 
At April 1, 2014 at 7:57 PM , Anonymous Nejiya said...

Select,delete,insert,update are DML.
create,drop,alter,truncate are DDL

 
At April 1, 2014 at 8:11 PM , Anonymous Nejiya said...

12.Behavioral testing
15.Heap sort
30.5
34.Network model

 
At April 2, 2014 at 12:06 AM , Blogger Vijay said...

1) Create

 
At April 4, 2014 at 2:33 AM , Blogger Unknown said...

Q12)--->3.BEHAVIORAL TESTING

 
At April 4, 2014 at 2:35 AM , Blogger Unknown said...

Q.46)--->DELETE AND TRUNCATE BOTH

 
At April 4, 2014 at 2:38 AM , Blogger Unknown said...

Q41)--->THREE TIERED

 
At June 13, 2015 at 11:23 AM , Anonymous Anonymous said...

Q1. Ans. - CREATE

 
At June 13, 2015 at 11:25 AM , Anonymous Anonymous said...

Q18. Ans. - Low Level Language

 
At December 6, 2015 at 7:16 PM , Anonymous Anonymous said...

Yes Q-18: Low level language .As assembly languages are more close to metal.

 
At December 10, 2015 at 5:44 AM , Blogger Unknown said...

Q. 1. Ans: Create

 
At January 6, 2016 at 12:49 AM , Anonymous Anonymous said...

Assembly language is in category of low level language

 
At January 15, 2016 at 9:04 AM , Anonymous Anonymous said...

Q32. Alter. Drop is used to delete a table from database. Alter can remove a particular column from schema.

 
At October 11, 2016 at 6:00 AM , Anonymous Anonymous said...

Q50 -- alter should be write answer

 
At October 14, 2016 at 11:53 PM , Blogger Unknown said...

Q 1 & 5 are same but answer is different

 
At October 24, 2016 at 3:36 AM , Blogger Unknown said...

So answer given is wrong in the answer sheet very 1 st answer answer must be create

 
At October 24, 2016 at 4:03 AM , Blogger Unknown said...

So answer given is wrong in the answer sheet very 1 st answer answer must be create

 
At November 2, 2016 at 2:20 AM , Blogger Unknown said...

Many of your answers are wrong

 
At November 7, 2016 at 4:28 AM , Anonymous Anonymous said...

Some of your answers are wrong like question 32...
Alter command is used for addition, modification or deletion of column.Hence Alter is correct answer instead of drop

 
At December 23, 2016 at 4:22 AM , Blogger Unknown said...

Question 18.right answer is low-level language

 
At January 4, 2017 at 11:21 PM , Anonymous Anonymous said...

Q 32 - delete is the right answer

 
At May 15, 2018 at 3:52 AM , Blogger IACE said...

Great post. i really appreciate this blog. Its very helpful and informative blog. Bank Coaching Center in Hyderabad

 
At October 10, 2019 at 11:39 PM , Blogger Anjali said...

This comment has been removed by the author.

 
At October 10, 2019 at 11:41 PM , Blogger Anjali said...

Question Number 43, Java is purely Object Oriented

 

Post a Comment

Subscribe to Post Comments [Atom]

<< Home