PDA

View Full Version : Corporation Bank Computer Officer and Business Development GD/PI results annouced


neha
16-02-2010, 08:59 PM
Corporation Bank Computer Officer and Business Development GD/PI results announced. You can check the result at

http://corpbank.com/asp/0100text.asp?presentID=1632&headID=805

gaurav
17-02-2010, 09:50 PM
Can somebody tell me what type of questions are asked in IT or Computer officer interview for Indian PSU banks? for example Corporation Bank..

thanks in advance.. :gm:

rajesh
17-02-2010, 09:53 PM
Can somebody tell me what type of questions are asked in IT or Computer officer interview for Indian PSU banks? for example Corporation Bank..

thanks in advance.. :gm:

Some sample questions..

1. What do you understand by 'Authentication' and 'Encryption' in the context of system security? In this context explain
(i) Kerberos
(ii) IP Security
(iii) RSA Encryption

2.Write short notes on each of the following:
(a) Trojan Horse
(b) Smart Cards

3. Write short notes on each of the following:
(a) Trojan Horse
(b) Smart Cards
(c) Physical threats and security
(d) PGP

4. Explain the DMA controller with block diagram. What is meant by a block transfer?

What are the various phases of an instruction cycle ? Give the micro operation of fetch and decode phases

Compare Static RAM with Dynamic RAM.

5. Using NAND gate generate the AND and NOR functions

6. Which of the following services should be enabled in a secure workstation connected in an Ethernet LAN ? Give reasons for your answer.
Anacron, ftp, netfs, nfs, telnet, sendmail, SSH, syslog, SNMP, time. (Assume the LAN is connected to the Internet but is not connected via Firewall nor is Kerberos used).


7. What is a Socket ? Write two differences between a TCP Socket and a UDP Socket.

8. What are the standard port numbers for (i) Web Server (ii) Mail Server (iii) FTP Server (iv) Telnet ?

9 What is Network Address Translation (NAT) ? Give any two advantages and two disadvantages of NAT.

10 What is VPN ? How is it useful for an organization ?

11. What is a Search Engine ? How is it useful for Internet/Intranet ? Give the names of any four Search engines.

12 What is WAP ? Give any two advantages and two limitations of WAP. Also explain its layered architecture.

swahil
17-02-2010, 09:55 PM
Normally you can be asked questions on these topics..

1. Computer Basics

2. MS Office

3. Internet and Mail

4. Internet Security

5. DBMS

6. Networking

7. Business Systems

8. C Language

9. C++ Language

10. Data Structures

11. Visual Basic

12. Java Programming

13. UNIX and Shell Programming

14. Computer Engineering

15. Micro Processors etc.

:bike:

swahil
17-02-2010, 09:58 PM
1. The _____ states that a foreign key must either match a primary key value in another relation or it must be null.

(a) entity integrity rule

(b) referential integrity constraint

(c) action assertion

(d) composite attribute

(e) None of these

2. An applet __________

(a) is an interpreted program that runs on the client

(b) tracks the number of visitors to a Website

(c) is a compiled program that usually runs on the client

(d) collects data from visitors to a Website

(e) None of these

3. A _____ sometimes called a boot sector virus, executes when a computer boots up because it resides in the boot sector of a floppy disk or the master boot record of a hard disk.

(a) system virus

(b) Trojan horse virus

(c) file virus

(d) macro virus

(e) None of these

4. Which error detection method uses one's complement arithmetic?

(a) Simply parity check

(b) Checksum

(c) Two-dimensional parity check

(d) CRC

(e) None of these

5. A result of a computer virus can not lead to ___.

(a) Disk Crash

(b) Mother Board Crash

(c) Corruption of program

(d) Deletion of files

(e) None of these

6. The network interface card of LAN is related to following layer of OSI Model-

(a) Transport

(b) Network

(c) Data Link

(d) Physical

(e) All of these

7. Which of the following does not describe a data warehouse?

(a) Subject-oriented

(b) Integrated

(c) Time-variant

(d) Updateable

(e) None of these

8. Which of the following is true ?

(a) Logical design is software-dependent

(b) In a distributed database, database is stored in one physical location

(c) Conceptual design translates the logical design into internal model

(d) Logical design is software independent

(e) None of these

9. A range check _____

(a) ensures that only the correct data type is entered into a field

(b) verifies that all required data is present

(c) determines whether a number is within a specified limit

(d) tests if the data in two or more associated fields is logical

(e) None of these

10. The total set of interlinked hypertext documents worldwide is-

(a) HTTP

(b) Browser

(c) WWW

(d) B2B

(e) None of these

11. With the object-oriented (OO) approach, an object encapsulates, or_____.a programmer.

(a) carries out, the details of an object for

(b) hides, the details of an object from

(c) reveals, the details of an object to

(d) extends, the details of an object beyond

(e) None of these

12. Every computer connected to an intranet or extranet must have a distinct_____

(a) firewall

(b) proxy server

(c) IP address

(d) domain name

(e) None of these

13. A table of bits in which each row represents the distinct values of a key?

(a) Join index

(b) Bitmap index

(c) B + Tree

(d) Hierarchical index

(e) None of these

14. The degree of detail that should be incorporated into a database depends on what?

(a) Data integrity

(b) The type of database

(c) The user's perspective

(d) The business practices and policies

(e) None of these

15. The ___.converts digital signals to analog signals for the purpose of transmitting data over telephone lines.

(a) Modem

(b) Router

(c) Gateway

(d) Bridge

(e) All of these

16. Before a package can be used in a java program it must be___.

(a) executed

(b) referenced

(c) imported

(d) declared

(e) None of these

17. Choose the correct way to indicate that a line in a C++ program is a comment line, that is, a line the will not be executed as an instruction___.

(a) begin the line with a # sign

(b) begin the line with double slashes (/ /)

(c) begin and end the line with double hyphens (-_-)

(d) indent the line

(e) None of these

18. Programming language built into user programs such as Word and Excel are known as____

(a) 4GLs

(b) macro languages

(c) object-oriented languages

(d) visual programming languages

(e) None of these

19. Firewalls are used to protect against___.

(a) Unauthorized Attacks

(b) Virus Attacks

(c) Data Driven Attacks

(d) Fire Attacks

(e) All of these

20. This is a standard way for a Web server to pass a Web user's request to an application program and to receive data back to forward to the user-

(a) Interrupt request

(b) Forward DNS lookup

(c) Data-Link layer

(d) File Transfer Protocol

(e) Common gateway interface

21. Three SQL, DDL, CREATE commands are__.

(a) Schema, Base and Table

(b) Base, Table and Schema

(c) Key, Base and Table

(d) Schema, Table and View

(e) None of these

22. Data are ________ in client/server computing.

(a) never sent to the client machine

(b) sent in very large sections to save processing time

(c) sent only upon the client's request

(d) sent in complete copies for the client to filter and sort

(e) sent from the client to the server for processing

23. Which of the following will not eliminates the ambiguities of a null value?

(a) Define the attribute as required

(b) Define subtypes

(c) Define each attribute as having an initial value that is recognized as blank

(d) Define supertypes

(e) None of these

24. The____directory is mandatory for every disk.

(a) Root

(b) Base

(c) Sub

(d) Case

(e) None of these

25. This is a group of servers that share work and may be able to back each other up if one server fails.

(a) Channel bank

(b) Cluster

(c) Tiger team

(d) Serverless backup

(e) Logical unit

ANSWERS

1. (a) (c) (e) (b) (b)

6. (e) (d) (a) (c) (a)

11. (b) (c) (b) (b) (a)

16. (c) (b) (d) (a) (e)

21. (d) (c) (d) (c) (b)

surya
18-02-2010, 08:45 PM
Q1. What is Client-server Computing?

Ans: The short answer: Client/server is a computational architecture that involves client processes
requesting service from server processes.
The long answer: Client/server computing is the logical extension of modular programming. Modular programming has as its fundamental assumption that separation of a large piece of software into its constituent parts ("modules") creates the possibility for easier development and better maintainability. Client/server computing takes this a step farther by recognizing that those modules need not all be executed within the same memory space.

With this architecture, the calling module becomes the "client" (that which requests a service), and the called module becomes the "server" (that which provides the service). The logical extension of this is to have clients and servers running on the appropriate hardware and software platforms for their functions. For example, database management system servers running on platforms specially designed and configured to perform queries, or file servers running on platforms with special elements for managing files. It is this latter perspective that has created the widely-believed myth that client/server has something to do with PCs or Unix machines.

Q2 What is a Client process?

Ans: The client is a process (program) that sends a message to a server process (program), requesting that the server perform a task (service). Client programs usually manage the user-interface portion of the application, validate data entered by the user, dispatch requests to server programs, and sometimes execute business logic. The client-basedprocess is the front- end of the application that the user sees and interacts with. The client process contains solution-specific logic and provides the interface between the user and the rest of the application system. The client process also manages the local resources that the user interacts with such as the monitor, keyboard, workstation CPU and peripherals. One of the key elements of a client workstation is the graphical user interface (GUI). Normally a part of operating system i.e. the window manager detects user actions, manages the windows on the display and displays the data in the windows.

Q3 What is a Server process?

Ans : A server process (program) fulfills the client request by performing the task requested. Server programs generally receive requests from client programs, execute database retrieval and updates, manage data integrity and dispatch responses to client requests. Sometimes server programs execute common or complex business logic. The server-based process "may" run on another machine on the network. This server could be the host operating system or network file server; the server is then provided both file system services and application services. Or in some cases, another desktop machine provides the application services. The server process acts as a software engine that manages shared resources such as databases, printers, communication links, or high powered-processors. The server process performs the back-end tasks that are common to similar applications.

Q4 What is a Two-Tier Architecture?

Ans : A two-tier architecture is where a client talks directly to a server, with no intervening server. It is typically used in small environments (less than 50 users). A common error in client/server development is to prototype an application in a small, two-tier environment, and then scale up by simply adding more users to the server. This approach will usually result in an ineffective system, as the server becomes overwhelmed. To properly scale to hundreds or thousands of users, it is usually necessary to move to a three-tier architecture.

Q5 What is a Three-Tier Architecture?

A three-tier architecture introduces a server (or an "agent") between the client and the server. The role of the agent is manyfold. It can provide translation services (as in adapting a legacy application on a mainframe to a client/server environment), metering services (as in acting as a transaction monitor to limit the number of simultaneous requests to a given server), or intellegent agent services (as in mapping a request to a number of different servers, collating the results, and returning a single response to the client.

For SBI Speciality Officer, Allahabad bank IT Officer Exam

Model Questions : The Descriptive Test should be Prepared on Basis of All Books of Degree Exam with Special Emphasis on Banking.We are Listing Sample Questions

1. What do you understand by 'Authentication' and 'Encryption' in the context of system security? In this context explain
(i) Kerberos
(ii) IP Security
(iii) RSA Encryption

2.Write short notes on each of the following:
(a) Trojan Horse
(b) Smart Cards

3. Write short notes on each of the following:
(a) Trojan Horse
(b) Smart Cards
(c) Physical threats and security
(d) PGP

4. Explain the DMA controller with block diagram. What is meant by a block transfer? What are the various phases of an instruction cycle ? Give the micro operation of fetch and decode phases
Compare Static RAM with Dynamic RAM.

5. Using NAND gate generate the AND and NOR functions

6. Which of the following services should be enabled in a secure workstation connected in an Ethernet LAN ?

Give reasons for your answer.
Anacron, ftp, netfs, nfs, telnet, sendmail, SSH, syslog, SNMP, time. (Assume the LAN is connected to the Internet but is not connected via Firewall nor is Kerberos used).

7. What is a Socket ? Write two differences between a TCP Socket and a UDP Socket.

8. What are the standard port numbers for (i) Web Server (ii) Mail Server (iii) FTP Server (iv) Telnet ?

9 What is Network Address Translation (NAT) ? Give any two advantages and two disadvantages of NAT.

10 What is VPN ? How is it useful for an organization ?

11. What is a Search Engine ? How is it useful for Internet/Intranet ? Give the names of any four Search engines.

12 What is WAP ? Give any two advantages and two limitations of WAP. Also explain its layered architecture.

Tony
18-02-2010, 09:28 PM
1. If a word is typed that is not in Word’s dictionary, a____________wavy underline appears below the word.
(A) red
(B) green
(C) blue
(D) black
(E) None of these
Ans : (A)

2. The____________button on the quick access Toolbar allows you to cancel your recent commands or actions.
(A) Search
(B) Cut
(C) Document
(D) Undo
(E) None of these
Ans : (D)

3. In Excel, any set of characters containing a letter , hyphen, or space is considered—
(A) a formula
(B) text
(C) a name
(D) a title
(E) None of these
Ans : (B)

4. ____________Software allows users to perform calculations on rows and columns of data.
(A) Word processing
(B) Presentation graphics
(C) Database Management Systems
(D) Electronic Spreadsheet
(E) None of these
Ans : (C)

5. A ____________represent approximately one billion memory locations.
(A) kilobyte
(B) megabyte
(C) gigabyte
(D) terabyte
(E) None of these
Ans : (C)

6. ____________cells involves creating a single cell by combining two or more selected cells.
(A) Formatting
(B) Merging
(C) Embedding
(D) Splitting
(E) None of these
Ans : (B)

7. The operating system is the most common type of____________software.
(A) communication
(B) application
(C) system
(D) word-processing
(E) None of these
Ans : (C)

8. When you quickly press and releaes the left mouse button twice , you are—
(A) Primary-clicking
(B) pointing
(C) Double-clicking
(D) Secondary-clicking
(E) None of these
Ans : (C)

9. The horizontal and vertical lines on a worksheet are called—
(A) cells
(B) sheets
(C) block lines
(D) gridlines
(E) None of these
Ans : (D)

10. To delete an incorrect character in a document, ____________ to erase to the right of the insertion point.
(A) press the left mouse key
(B) double-click the right mouse key
(C) press the BACKSPACE key
(D) press the delete key
(E) None of these
Ans : (D)

11. The operating system does all of the following EXCEPT:
(A) provide a way for the user to interact with the computer.
(B) manage the central processing unit (CPU).
(C) manage memory and storage.
(D) enable users to perform a specific task such as document editing.
Ans : (D)

12. During the boot process, the____________looks for the system files.
(A) CD
B. BIOS
C. CPU
D. DVD
Ans : (B)

13. ____________ are lists of commands that appear on the screen.
(A) GUIs
(B) Icons
(C) Menus
(D) Windows
Ans : (C)

14. ____________ is the ability of an operating system to control the activities of multiple programs at the same time.
(A) Multitasking
(B) Streamlining
(C) Multiuser
(D) Simulcasting
Ans : (A)

15. The unique signal, generated by a device, that tells the operating system that it is in need of immediate attention is called an:
(A) action.
(B) event.
(C) interrupt.
(D) activity.
Ans : (C)

16. The operating system controls access to the processor by assigning a(n) ____________ to each task requiring the processor’s attention.
(A) CPU
(B) slice of time
(C) stack
(D) event
Ans : (B)

17. The blocks of code, included in the operating system, that software applications interact with are known as:
(A) application programming interfaces (APIs).
(B) complimentary metal-oxide conductors (CMOS).
(C) device drivers.
(D) bootstrap loaders.
Ans : (A)

18. MS-DOS is a ____________ operating system.
(A) point-and-click
(B) user-friendly
(C) command-driven
(D) Mac
Ans : (C)

19. An interrupt handler is a(n):
(A) location in memory that keeps track of recently generated interrupts.
(B) peripheral device.
(C) utility program.
(D) special numeric code that indicates the priority of a request.
Ans : (D)

20. A spooler is a(n):
(A) location in memory that maintains the contents of a document until it prints out.
(B) print job.
(C) program that coordinates the print jobs that are waiting to print.
(D) message sent from the printer to the operating system when a print job is completed.
Ans : (C)

Tony
18-02-2010, 09:29 PM
21. Virtual memory is typically located:
(A) on a floppy disk.
(B) in the CPU.
(C) in a flash card.
(D) on the hard drive.
Ans : (D)

22. The purpose of a swap (or page) file is to:
(A) maintain pages of documents that are being spooled to the printer.
(B) hold a program’s data or instructions in virtual memory when it can’t fit in RAM.
(C) prevent thrashing in a multitasking environment.
(D) allow multiple print jobs to print their pages out simultaneously.
Ans : (B)

23. The definition of thrashing is:
(A) swapping data between virtual memory and RAM too frequently.
(B) insufficient hard disk space.
(C) too many processors being managed by the operating system.
(D) inaccurate information stored in the registry.
Ans : (A)

24. All of the following are TRUE of Safe Mode EXCEPT:
(A) Safe Mode is a special diagnostic mode.
(B) Safe Mode loads all nonessential icons.
(C) Safe Mode allows users to troubleshoot errors.
(D) Safe Mode loads only the most essential devices.
Ans : (B)

25. Verification of a login name and password is known as:
(A) configuration.
(B) accessibility.
(C) authentication.
(D) logging in.
Ans : (C)

26. The combination of the operating system and the processor is referred to as the computer’s:
(A) CPU.
(B) platform.
(C) BIOS.
(D) CMOS.
Ans : (B)

27. The following message generally means:
(A) a nonsystem floppy has been left in the floppy disk drive.
(B) the CD drive is not functioning.
(C) the BIOS is corrupted.
(D) there is a problem loading a device.
Ans : (A)

28. Which of the following is the correct sequence of actions that takes place during the boot-up process?
(A) Load operating system ? Activate BIOS ? Perform POST ? Check configuration settings
(B) Activate BIOS ? Perform POST ? Load operating system ? Check configuration settings
(C) Perform POST ? Load operating system ? Activate BIOS ? Check configuration settings
(D) Activate BIOS ? Check configuration settings ? Perform POST ? Load operating system
Ans : (B)

29. All of the following are steps involved in the boot process EXCEPT:
(A) load the operating system into RAM.
(B) the power-on self-test.
(C) activate the basic input/output system (BIOS).
(D) load application programs.
Ans : (D)

30. The ____________, stored on a ROM chip, is responsible for loading the operating system from its permanent location on the hard drive into RAM.
(A) BIOS
(B) API
(C) device driver
(D) supervisor program
Ans : (A)

Tony
18-02-2010, 09:30 PM
31. The basic input/output system (BIOS) is stored in:
(A) RAM.
(B) ROM.
(C) the CPU.
(D) the hard drive.
Ans : (B)

32. Ensuring that the essential peripheral devices are attached and operational is the ____________ process.
(A) configuration
(B) CMOS
(C) POST
(D) ROM
Ans : (C)

33. The memory resident portion of the operating system is called the—
(A) registry.
(B) API.
(C) CMOS.
(D) kernel.
Ans : (D)

34. Which of the following does NOT occur during the power-on self-test (POST)?
(A) The ScanDisk utility begins to run.
(B) The video card and video memory are tested.
(C) The BIOS identification process occurs.
(D) Memory chips are checked to ensure they are working properly.
Ans : (A)

35. All of the following are TRUE regarding virtual memory EXCEPT—
(A) any amount of RAM can be allocated to virtual memory.
(B) the setting for the amount of hard drive space to allocate to virtual memory can be manually changed.
(C) this temporary storage is called the swap file (or page file).
(D) virtual memory is physical space on the hard drive.
Ans : (A)

36. The operating system allows users to organize the computer’s contents in a hierarchical structure of directories that include all of the following EXCEPT:
(A) files.
(B) folders.
(D) drives.
(D) systems.
Ans : (D)

37. All of the following statements concerning windows are true EXCEPT—
(A) windows are an example of a command-driven environment.
(B) windows can be resized and repositioned on the desktop.
(C) more than one window can be open at a time.
(D) toolbars and scrollbars are features of windows.
Ans : (A)

38. All of the following statements concerning files are true EXCEPT—
(A) A file is a collection of related pieces of information stored together for easy reference.
(B) Files can be generated from an application.
(C) Files are stored in RAM.
(D) Files should be organized in folders.
Ans : (C)

39. Using Windows Explorer, a plus (+) sign in front of a folder indicates—
(A) an open folder.
(B) the folder contains subfolders.
(C) a text file.
(D) a graphics file.
Ans : (B)

40. In Windows XP, if you want to see the file size and modified dates of all files in a folder, the best viewing option is the __________ view.
(A) List
(B) Thumbnails
(C) Details
(D) Icon
Ans : (C)

shilpa
18-02-2010, 09:54 PM
Skill set for IT officers..

1. Operating Systems
2. RDBMS with emphasis on Oracle,
3. knowledge of JAVA /C++ / COBOL /FOX-PRO
4. DEVELOPER-2000 / VISUAL BASIC / STUDIO / .NET
5. NETWORK and Communication

Others...

1. Software acquisition / Development
2. Hardware acquisition & maintenance
3. Different operating systems
4. RDBMS with emphasis on ORACLE -proficiency in front end development Tools like developer 2000, visual studio etc.
5. Knowledge in ASP / PHP / JAVA / C++ / COBOL - Networking & Communication
6. UNIX /Windows NT / Windows 2003
7. Data Centre Management/ Data Warehousing and mining
8. Payment gateway Management
9. Banking delivery channel
10.On-line Share Trading / Cyber & IT Security management / System Audit

sony
20-02-2010, 03:36 PM
Normally in IT officer interview, you will be asked questions on computer basics, Databases, programming and networking..