This quiz consists of questions from
various Banking entrance exams held during the last few years. Leave your
answers/ responses in the comments section below and we’ll soon let you know
the correct answers!
This is one of the older and slower methods an intruder might use to scan a
network to determine which of a range of IP addresses map to live hosts.
(A) ping sweep
(D) war driving
Which of the following is used to create and delete views and relations within
(A) SQL Data Identification Language
(B) SQL Data Identification and
(C) SQL Data Relational Language
(D) SQL Data Definition Language
Criminal hacking is called
(B) a virus
(C) a Trojan horse
(D) a worm
Backward recovery is which of the following?
(A) Where the before-images are applied to
(B) Where the after-images and
before-images are applied to the database
(C) Where the after-images are applied to
(D) Continuing without any recovery
___________ is the integration of economic, social, cultural and ecological
facets of life, enabled by information technologies.
(A) business environment
_________ is the process used by managers to get more detailed information.
(C) Drilling down
A cross life-cycle activity of system development is
(A) data modelling
(B) fact finding
(D) data flow diagram modelling
The result of a SQL SELECT statement is a(n)
WebApp performance tests are designed to
(A) assess WebApp usability.
(B) test network performance.
(C) evaluate page loading times.
(D) simulate real-world loading situations.
A CASE SQL statement is which of the following?
(A) A way to establish a data definition in
SQL or establish a loop in SQL
(B) A way to establish an IF THEN-ELSE in
(C) A way to establish a loop in SQL
(D) Establish a loop in SQL and establish
an IF-THEN-ELSE in SQL
To follow our
Banking portal on Facebook and Twitter, click on the following links:
1(a) 2(d) 3(a)
4(a) 5(d) 6(c)
7(b) 8(d) 9(d)