Tuesday, 15 December 2015


Presenting to you some questions on Computer for the upcoming IBPS SPECIALIST OFFICER EXAM, keeping in trend with the types of question asked in last years.

Q.1. What part of is the Network ID, assuming a default subnet mask?
(a) 192
(b) 192.168.10  
(d) 51

Q.2. Which of the following statements is correct for the use of packet switching?
(a) the subdivision of information into individually addressed packets in conjunction with alternative routing arrangement enabled the transmission path to be altered in the event of congestion or individual link failure
(b) the employment of additional intelligence within the network enabled more sophisticated error control and link control procedures to be applied
(c) by employing wide bandwidth circuits for the trunk networks substantial economics through extensive sharing of capacity could be achieved
(d) All of these               

Q.3. The research and development department at your office has been experimenting with different technologies to help improve the performance of the network. One group has been examining the use of a broadband network versus a based band network. Select the correct statement about broadband and baseband.
(a) Broadband networks carry several channels on a single cable, whereas in a baseband network several cables carry one channel
(b) Baseband networks carry a single channel on a single cable, whereas broadband networks carry several channels on a single cable
(c) Baseband networks refers to local area networks, and broadband refers to wide area networks
(d) Baseband operates at a standard bit rate, whereas broadband may operate at different rates as needed

Q.4. A network consists of eight NT servers. You are planning to move servers to different segments of your network, what utility should be used at each server to determine which server generates the most traffic?
(a) NBTSTAT     
(b) NETSTAT.EXE            
(c) Performance Monitor           
(d) Network Monitor

Q.5. You are working with a network that has the network ID What subnet should you use that supports upto 25 hosts and a maximum number of subnets?

Q.6. Which of the following best illustrates the default subnet mask for a class A, B and C Network?

Q.7. You are working with three networks that have the network IDs, and What subnet mask can you use to combine these addresses into one?

Q.8. What part of is the Network ID, assuming a default subnet mask?
(a) 172
(b) 172.16.3      
(d) 51

Q.9. With an IP address of 100, you currently have 80 subnets. What subnet mask should you use to maximize the number of available hosts?
(a) 192
(b) 224
(c) 240
(d) 248
(d) 252

Q.10. Which of the following technique is used for fragment?
(a) a technique used in best-effort delivery systems to avoid endlessly looping packets
(b) a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame
(c) One of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size

Q.11. The amount of ROM needed to implement a 4 bit multiplier is
(a) 64 bit            
(b) 128 bit         
(c) 1 kbit            
(d) 2 kbit

Q.12. Let the page fault service time be 10 Ms in a computer with average memory access time being 20 ns. If one page fault is generated for every 106 memory accesses, what is the effective access time for the memory?
(a) 21 ns            
(b) 30 ns            
(c) 23 ns             
(d) 35 ns

Q.13. A computer handles several interrupt sources of which of the following are relevant?
(a) Interrupt from Hard disk      
(b) Interrupt from Mouse
(c) Interrupt from Keyboard      
(d) Interrupt from CPU temperature sensor

Q.14. How many 32 k × 1 RAM chips are needed to provide a memory capacity of 256 kbyte?
(a) 8     
(b) 32   
(c) 64   
(d) 128

Q.15. A CPU generally handles an interrupt by executing an interrupt service routine
(a) as soon as an interrupt as raised      
(b) by checking the interrupt register at the end of fetch cycle
(c) by checking the interrupt register after finishing the execution of the current instruction        
(d) by checking the interrupt register fixed time intervals

Q.16. For a magnetic disk with concentric circular tracks, the seek latency is not linearly proportional to the seek distance due to
(a) non-uniform distribution of requests
(b) arm starting and stopping inertia
(c) higher capacity of tracks on the periphery of the platter
(d) use of unfair arm scheduling policies

Q.17. Consider a 4-way set associate cache consisting of 128 lines with a line size of 64 words.  The CPU generates a 20-bit address of word in memory. The number of bits in the TAG, LINE and WORD fields are respectively.
(a) 9, 6, 5           
(b) 7, 7, 6           
(c) 7, 5, 8           
(d) 9, 5, 6

Q.18. Consider a disk pack with 16 surfaces, 128 tracks per surface and 256 sectors per track. 512 byte of data are stored in a bit serial manner in a second. The capacity of a disk pack and the number of bits required to specify a particular section in the disk are respectively
(a) 256 Mbyte, 19 bit    
(b) 256 Mbyte, 28 bit
(c) 512 Mbyte, 20 bit     
(d) 64 Gbyte, 28 bit

Q.19. A CPU has 24-bit instructions. A program starts at address 300 (in decimal). Which one of the following is a legal program counter (all values in decimal)?
(a) 400
(b) 500
(c) 600
(d) 700

Q.20. Artificial intelligence is
(a) It uses machine-learning techniques. Here program can learn from past experience and adapt themselves to new situations
(b) Computational procedure that takes some value as input and produces some value as output
(c) Science of making machines performs tasks that would require intelligence when performed by humans
(d) All of these

No comments:

Post a Comment