1. Prologue
  2. SBI Specialist: Written stage
    1. Part I: Maths, English, Reasoning: How to approach?
    2. High priority areas in Part I (Maths, English, Reasoning)
  3. Part II professional knowledge (PK): Systems/IT
    1. SBI Specialist Syllabus for System/IT/ Professional knowledge topic
  4. SBI IT (Systems) Assistant Manager 2012 Question Paper
    1. Question 1 to 25
    2. Question 26 to 50
  5. SBI Specialist (Computer & Communication) 2012 Question Paper
    1. Q1 to 25
    2. Q26 to 50
  6. IBPS specialist Question paper 2012 and 2013 Exam

Prologue

  • State bank of India (SBI) recently notified vacancies in specialist officer cadre.
  • Some readers had been requesting the question papers. So here it is.

SBI specialist assistant  Manager in system

SBI Specialist: Written stage

DONOT waste time in GA/GK, Banking, current affairs and Marketing = because they’re not part of the exam.

Part I Maths, reasoning, English score not counted in merit list, but you need to cross minimum cutoff.
Part II Professional knowledge (PK) score counted in merit list.

Part I: Maths, English, Reasoning: How to approach?

  • Its marks not counting in final merit list.  But you’ve to cross cutoffs, otherwise your part II will not be evaluated.
  • In other words, this is same like UPSC’s compulsory English language paper in Mains exam).
  • Since its marks are not counted in merit list. You only need to cross the cutoff. Therefore, I don’t recommend separate books on maths/reasoning/English for this exam. You don’t need to “master” these topics. Just practice enough questions so you can tick 15-20 MCQs in each section and move on to part II (professional knowledge).
  • For this, solve previous PO papers. [You don’t need ‘special’ papers for specialist officer- the routine PO papers also work fine- as far as maths, english, reasoning is concerned.
  • Besides, whatever “mock” tests/ books are in the market, their MCQs are usually jugaad-lifted from previous PO exam papers.
  • You don’t even need “brand new” paperset- pick whatever second hand/used paperset you can get from the local book-bazaar. In the Bank paperset market, three noted publication houses are: Arihant, Disha and Kiran publication. (Use anyone- whichever you can get cheap.)
  • Even in those papersets, don’t waste time practicing everything. Just focus on following areas:

High priority areas in Part I (Maths, English, Reasoning)

REASONING
  1. Sitting arranging
  2. blood relation
  3. input-output
  4. syllogism

These questions usually come in a set of 3-5 MCQs  =12-20 MCQs are done.

MATHS
  1. BODMAS, % profit loss, SI-CI.
  2. time-speed-work. (can be easily solved by following the techniques under Mrunal.org/aptitude)
  3. within geometry- only area, perimeter of square, rectangle, circle. (At most volume of sphere, cube, cone, cylinder and cuboid.
  4. within data interpretation (DI), go for the “Table/piechart” type MCQs- mainly those requiring multiplication, addition or subtraction.

IGNORE: Trigonometry, quadratic equations, logarithms, coordinate geometry. Because they don’t ask it in SBI. So don’t waste time in those topics.

ENGLISH
  1. Reading comprehension (don’t spent too much time on a single MCQ, if you can solve move to the next).
  2. Fill in the blanks and vocabulary type.
  • If you master above areas, then crossing the cutoffs in Part 1 should not pose big challenge.
  • In the real-exam, DONOT waste time in solving 1,2,4… all MCQs in a linear fashion. I can’t predict cutoffs. But to be on safe side, at least 15 should be ticked in each section accurately before moving to next section. If time permits even after doing everything else, then tick more in the second round.
  • In Bank exams, often sincere players fail, because they spent too much time in the English portion. Since English is relatively easy- so these people try to solve all English MCQs, before moving to next section. Avoid this stupid mistake.

Part II professional knowledge (PK): Systems/IT

  • Total 50 questions.
  • Its marks counted in final merit list. (Along with interview marks).
  • Therefore, you must give highest priority to this area.

SBI Specialist Syllabus for System/IT/ Professional knowledge topic

As such SBI notification doesn’t give detailed syllabus. But if you observe the index of recently launched books, you can get a rough idea about what topics should be prepared (from your college books/GATE guidebooks/internet.) for example:

Disha publication book index says Kiran Prakshan book index says
  1.  Computer Fundamentals
  2.  Computer Architecture & Organisation
  3.  Data Structure
  4.  Compiler Design
  5.  Networking
  6.  Operating System
  7.  DBMS
  8.  Software Engineering
  9.  Programming
  10.  Digital Logic
  1. Basic Concept of Computer
  2. Computer Architecture and Origination
  3. Data Structure
  4. Data Communication and Networking
  5. Networking Security
  6. Operating System
  7. Digital Circuits and System
  8. Microprocessor, 8085
  9. Introduction to DBMS
  10. Data Mining
  11. Software Engineering
  12. Security and Service Level Management
  13. Introduction to Programming Language C

From the indexes of these two books, you can see following topics are common

  1. fundamentals/basic concept
  2. computer Architecture and organization
  3. data structure
  4. networking and networking security
  5. operating system
  6. DBMS
  7. Software engineering
  8. Disha says programming, Kiran says “C programming”.

So first dig those common topics from whatever college textbooks/GATE guidebooks you’ve.Or through internet. I’ve also included the previous papers of SBI PO exam (professional knowledge section) below. Use them to get a better idea on what areas are to be covered- what is the depth and difficultly level of the papers.

Beyond that, I cannot say much because I’m a Pharmacist and not an IT graduate. If any senior player/ maestro wants to share more wisdom about the PK section- please post it under the comments.

SBI IT (Systems) Assistant Manager 2012 Question Paper

Question 1 to 25

  1. In SQL, which of the following is not a data Manipulation Language Commands?
    1. Delete
    2. Select
    3. Update
    4. Create
    5. None of the above
  2. The value for an attribute or a column are drawn from a set of values known as –
    1. Tuples
    2. Attributes
    3. Domain
    4. Column
    5. None of these
  3. Entities having primary key are called
    1. Primary Key
    2. Strong entities
    3. Weak entities
    4. Primary Key
    5. None Of these
  4. Which of the following is not a type of SQL statement?
    1. Data Manipulation Language (DML)
    2. Data Definition Language (DDL)
    3. Data Control Language (DCL)
    4. Data Communication Language (DCL)
    5. None of these
  5. Which of the following is not included in DML (Data Manipulation Language)
    1. INSERT
    2. UPDATE
    3. DELETE
    4. CREATE
    5. None of these
  6. TRUNCATE statement in SQL is a –
    1. DML statement
    2. DDL statement
    3. DCL statement
    4. DSL statement
    5. None of these
  7. To discard all pending data changes
    1. COMMIT
    2. ROLLBACK
    3. SAVEPOINT
    4. LOCK
    5. None of these
  8. Which of the following term is related to the stack?
    1. TOP
    2. PUSH
    3. POP
    4. Rear
    5. A, B and C.
  9. In Queues, the end from where items inserted is called
    1. Rear
    2. Front
    3. Top
    4. Base
    5. None of these
  10. Which protocol is used for browsing website:
    1. TCP
    2. FITFP
    3. FTP
    4. TFTP
    5. None of these
  11. Which of the following is a browser?
    1. Netscape Navigator
    2. Mosaic
    3. Mozilla Firefox
    4. Google chrome
    5. All of these
  12. Black Box Testing sometime called –
    1. Data flow testing
    2. Loop testing
    3. Behavioral testing
    4. Graph based testing
    5. None of these
  13. The Objective of testing is
    1. Debugging
    2. To uncover errors
    3. To gain modularity
    4. To analyze system
    5. None of these
  14. Choose the right sequence of SDLC (Software development life cycle) steps
    1. Design, Requirement Analysis, Coding, Testing
    2. Requirement Analysis, Design, Coding, Testing
    3. Requirement Analysis, Design, Testing, Coding
    4. Requirement Analysis, Coding, Design, Testing
    5. None of these
  15. The drawback of the binary tree sort are remedied by the
    1. Linear Sort
    2. Quick Sort
    3. Heap Sort
    4. Insertion Sort
    5. All of these
  16. Round robin scheduling is essentially the preemptive version of
    1. FIFO
    2. Shortest job first
    3. Shortest remaining
    4. Longest time first
    5. None of these
  17. ____ is the situation in which a process is waiting on another process, which is also waiting on another process which is waiting on the first process. None of the processes involved in this circular wait are making progress.
    1. Deadlock
    2. Starvation
    3. Dormant
    4. All of these
    5. None of these
  18. Assembly language is a _____
    1. Low Level Language
    2. Middle Level Language
    3. High level Language
    4. User Language
    5. None of these
  19. Which of the following is a type of translator?
    1. Assembler
    2. Compiler
    3. Interpreter
    4. All of the Above
    5. None of these
  20. Multiprogramming systems ___
    1. Are easier to develop than single programming
    2. Execute each job faster
    3. Execute more jobs in the same time
    4. Are used only on large main frame computers
    5. None of these
  21. The mechanism by which the data and functions are bound together with an
    1. Inheritance
    2. Encapsulation
    3. Abstraction
    4. Polymorphism
    5. None of these
  22. The OSI model consists of ___layers.
    1. Nine
    2. Eight
    3. Seven
    4. Five
    5. Eleven
  23. Decryption & Encryption of data are the responsibility of the ___ layer.
    1. Physical
    2. Data link
    3. Presentation
    4. Session
    5. Application
  24. LANs can be connected by devices called ____ which operate in the data link layer?
    1. Hub
    2. Bridges
    3. HDLC
    4. Tunnel
    5. None of these
  25. In a ____ topology, if there are n devices in a network, each device has n-1 ports for cable.
    1. Mesh
    2. Star
    3. Bus
    4. Ring
    5. None of these

Question 26 to 50

  1. OLAP applications are widely used by ____ and it uses ____ Schema.
    1. RDBMS , Bus
    2. Operating System ,Star
    3. Java , Bus
    4. Data mining Techniques; Star or multidimensional
    5. None of these
  2. Arrange the following in increasing order of their size.
  1. Database<File<Record<Field<Byte<Bit
  2. Bit<Byte<Field<Record<File<Database
  3. Bit>Byte>Record>Field>File>Database
  4. Bit>Byte>File>Record>Field>Database
  1. JVM is a virtual machine that can execute ___
  1. C language
  2. .net programming
  3. RDBMS
  4. C++ Language
  5. Java byte Code
  1. ODBC is based on ___.
  1. Structured Query Language.
  2. C language
  3. C++ language
  4. .net
  5. None of these
  1. Which of the following is not an advantage of the data-base approach?
  1. Increased security
  2. Elimination data redundancy
  3. Ability to associate related data ‘
  4. Programming/data independence
  5. All of the above
  1. In relational database row and column is called as ____and ____respectively.
  1. Tuple; Attribute
  2. Attribute; Tuple
  3. Tupple;Domain
  4. Attribute; Domain
  5. None of these
  1. To delete a particular column in a relation the command used is:
  1. DELETE
  2. UPDATE
  3. DROP
  4. ALTER
  5. None of these
  1. A primary key if combined with a foreign key creates
  1. Parent-Child relationship between the tables that connect them.
  2. Many to many relationship between the tables that connect them.
  3. Network model between the tables that connect them.
  4. All of the above
  5. None of the above
  1. Which of the following is record based logical model?
  1. Network Model
  2. Object oriented model
  3. E-R Model
  4. All of these
  5. None of these
  1. The full form of DDL is
  1. Dynamic Data Language
  2. Detailed Data Language
  3. Data Definition Language
  4. Data Derivation Language
  5. All of these
  1. Which of the following virus overtake computer system when it boots and destroy in-formation?
  1. Trojan
  2. System infectors
  3. Boot infectors
  4. Stealth virus
  5. None of these
  1. The relational model includes two general integrity rules. Integrity rule 1 is concerned with ____ and integrity rule 2 is concerned with ____
  1. Primary Key, Foreign key
  2. Primary Key, composite key
  3. Unique key, Foreign key
  4. Composite Key, Foreign key
  5. None of these
  1. ____ is person who has the central control over both data and application programs.
  1. System engineer
  2. Database administrator
  3. Database manager
  4. Technical analyst
  5. None of these
  1. An attribute of a relation that references the primary key of another relation is known as the ____
  1. Foreign Key
  2. Unique Key
  3. Parent key
  4. Child key
  5. Index key
  1. An entity set that does not have sufficient attributes to form a primary key is a
  1. strong entity set
  2. weak entity set
  3. simple entity set
  4. primary entity set.
  5. None of these
  1. The JDBC-ODBC bridge is
  1. Three tiered
  2. Multithread
  3. Best for any platform
  4. All of these
  5. None of these
  1. In a relational database, this is a data structure that organizes the information about a single topic into row and columns.
  1. Block
  2. Record
  3. Tuple
  4. Table
  5. None of these
  1. Which statements about the Java language are true?
  1. Java supports both procedural and object-oriented programming
  2. Java is only a procedural language.
  3. Java is only an Object-Oriented.
  4. Java is related to
  5. None of the above.
  1. Stack is also called ____
  1. First In First Out (LIFO)
  2. Last In First Out (FIFO)
  3. First In Last Out (FILO)
  4. First Come First Served (FCFS)
  5. None of the above
  1. The index created by primary key column is called _____
  1. Unique Index
  2. Composite Index
  3. Single Index
  4. Primary index
  5. None of these
  1. In SQL ,which command(s) is(are) used to remove rows from a table.
  1. Delete
  2. Remove
  3. Truncate
  4. Both
  5. and (3)
  6. None of the above
  1. In SQL, the CREATE TABLE is used
  1. To create a table, defining its columns, integrity constraints, and storage allocation
  2. To add a column/integrity constraint to a table.
  3. To redefine a column
  4. To change a table’s storage characteristics
  5. All of the above
  1. What is the abbreviation is used for a software package that permits the user to create , retrieve and maintain records in a database?
  1. DASD
  2. CRMD
  3. DBMS
  4. All of these
  5. None of the above
  1. Choose the right sequence of virus stages –
  1. Triggering, Damage ,Dormancy, propagation
  2. Damage, Triggering ,Dormancy, propagation
  3. Damage, Triggering, propagation ,Dormancy
  4. Triggering, Damage, propagation, Dormancy
  5. Dormancy, Propagation,. Triggering, Damage
  1. In SQL, which command is used to add new rows to a table?
  1. Alter Table
  2. Add row
  3. Insert
  4. Append
  5. None of the Above

SBI Specialist (Computer & Communication) 2012 Question Paper

Q1 to 25

  1. To create a copy files in the event of system failure, you create a ___
    1. Firewall
    2. Redundancy
    3. Backup
    4. Restore file
    5. None of these
  2. Print server uses___ which is a buffler that holds before it is send to the printer.
    1. Queue
    2. Spool
    3. Node
    4. Stack
    5. None of these
  3. Which of the following identifies specific web page and its computer on the web page?
    1. Web site
    2. URL
    3. Web site address
    4. Domain Name
    5. None of these
  4. _____ is the computer to computer exchange of routine business data between trading partners in standard data formats.
    1. CTS
    2. DSR
    3. VDR
    4. EDI (Electronic data interchange)
    5. None of these
  5. Communication handler is basically an ____ 16 bit micro controller?
    1. 8085
    2. 8086
    3. 8086A
    4. 80C186
    5. None of these
  6. Which uses a Pre-Shared Key that is more than 7 and less than 64 characters in length?
    1. WPA-PSK
    2. TKIP
    3. AES
    4. All of these
    5. None of these
  7. Ping command is used for what purpose?
    1. Test a device on a network whether it is reachable
    2. Test a hard disk fault
    3. Test a bug in the application
    4. Test devices scanning quality
    5. None of these
  8. Two different kind of networks can be connected by using—
    1. Bridges
    2. Satellite
    3. Gateway
    4. Routers
    5. None of these
  9. Full adder is used to—
    1. 2 bit addition
    2. 3 bit addition
    3. 4 bit addition
    4. 6 bit addition
    5. None of these
  10. Most important advantage of an IC is its—
    1. Easy replacement in case of circuit failure
    2. Low power consumption
    3. Extremely high reliability
    4. Reduced cost
    5. None of these
  11. An 1C contains 50 gates each of which consists of 6 components. Its belongs to
    1. VLSI
    2. LSI
    3. MS1
    4. SSI
    5. None of these
  12. Which type of computers use the 8 bit code called EBCDIC?
    1. Minicomputers
    2. Mainframe computers
    3. Super computer
    4. Microcomputer
    5. None of these
  13. An AND gate
    1. Implements logic addition
    2. Is equivalent to a series switching circuit
    3. Is any-or all gate
    4. Is equivalent to a parallel switching circuit
    5. None of these
  14. The decimal equivalent of the binary number 11100001111 is
    1. 1806
    2. 1807
    3. 2806
    4. All of these
    5. None of these
  15. Programs in which of the following memories can’t be erased ?
    1. RAM
    2. ROM
    3. Cache Memory
    4. Virtual Memory
    5. None of these
  16. The IP address 135.0.10.27 belongs to address class?
    1. A
    2. B
    3. C
    4. D
    5. None of these
  17. Which are not used in case of applet?
    1. Read /write
    2. Internet
    3. Search engine
    4. All of these
    5. None of these
  18. Which of the following is not a type of database?
    1. Hierarchical
    2. Relational
    3. Network
    4. Transition
    5. None of these
  19. Which of the following is not a type of SQL statement?
    1. Data Manipulation Language
    2. Data Definition language
    3. Data control language
    4. Data Standard language
    5. None of these
  20. In Queue , the items deleted at one end is called
    1. Rear
    2. Front
    3. Top
    4. Base
    5. None of these
  21. The drawback of the binary tree sort are remedied by the
    1. Linear sort
    2. Heap Sort
    3. Insertion sort
    4. Quick Sort
    5. None of these
  22. White Box testing, a software testing technique is sometimes called
    1. Graph testing
    2. Basis path
    3. Glass box testing
    4. Data flow testing
    5. Loop testing
  23. Which of the following is used with database?
    1. EDI
    2. Credit card
    3. ATM
    4. Payment gateway
    5. Data mining
  24. When a cracker attempts to misuse or steal data from a system, it is called
    1. Stealing
    2. Intrusion
    3. Virus
    4. Worm
    5. None of these
  25. To modify existing rows of the table ____ statement is used.
    1. ALTER
    2. MODIFY
    3. UPDATE
    4. COMMIT
    5. DELETE

Q26 to 50

  1. ____ refers to a family of IEEE standards dealing with local area network and metropolitan area network.
    1. 802
    2. 800
    3. 801
    4. 803
    5. None of these
  2. Which is the general network standard for the data link layer in the OSI Reference Model?
    1. IEEE 802.1
    2. IEEE 802.2
    3. IEEE 802.3
    4. IEEE 802.4
    5. IEEE 802.6
  3. ____ uses a standard called IEEE 802.6.
    1. LAN
    2. WAN
    3. MAN
    4. Internet
    5. None of these
  4. Repeater operates in which layer of OSI model?
    1. Application layer
    2. Presentation layer
    3. Physical layer
    4. Transport layer
    5. Data link layer
  5. Where does Bridge operate in OSI model?
    1. Physical layer
    2. Data link layer
    3. Both (1)and (2)
    4. Application layer
    5. None of these
  6. Which of the following uses the greatest number of layers in the OSI model?
    1. Bridge
    2. Repeater
    3. Router
    4. Gateway
    5. None of these
  7. Routers operate in which layer of the OSI model?
    1. Physical layer
    2. Data link layer
    3. Network Layer
    4. All of these
    5. None of these
  8. Modem is a _____ that modulates and demodulate signals
    1. DCE (Data circuit-terminating equipment)
    2. DTE (Data terminal equipment)
    3. DTE-DCE
    4. Both (1)and (2)
    5. None of these
  9. A communication network which is used by large organizations over regional, national or global area is called ___
    1. LAN
    2. WAN
    3. MAN
    4. Internet
    5. None of these
  10. At ___ layer, TCP/IP defines two protocols :Transmission Control Protocol (TCP) and User Datagram Protocol(UDP).
    1. Transport layer
    2. Network layer
    3. Physical layer
    4. Application layer
    5. None of these
  11. The ___ layer is the layer closest to transmission medium.
    1. Transport
    2. Network
    3. Data link
    4. Physical
    5. None of the above
  12. End to end connectivity is provided from host to host in :
    1. Network layer
    2. Session layer
    3. Data link layer
    4. Transport layer
    5. None of these
  13. Which of the following TCP/ IP protocol is used for transferring electronic mail messages from one machine to another?
    1. SNMP
    2. SMTP
    3. RPC
    4. FTP
    5. None of these
  14. Which of the following is an example of a client-server model?
    1. FTP
    2. DNS
    3. TELNET
    4. All of these
    5. None of these
  15. Which IEEE Standards is usz for Wi/Fi systems?
    1. 802.11
    2. 802.1
    3. 802.2
    4. 802.3
    5. 802.10
  16. _____ is the continuous ability to send and receive data between interconnected networks.
    1. FTP
    2. SMTP
    3. TNS
    4. Network Interoperability
    5. None of these
  17. What is the default subnet mask for a class B network?
    1. 127.0.0.1
    2. 2550.0.0
    3. 255.255.0.0
    4. 255.255.255.0
    5. None of these
  18. What is loopback address?
    1. 127.0.0.1
    2. 255.0.0.0
    3. 255.255.0.0
    4. 127.0.0.0
    5. None of these
  19. Internet-like networks within enterprises.
    1. Intranets
    2. Switching alternating
    3. Inter organizational networks
    4. Extranets
    5. None of these
  20. A central computer surrounded by one or more satellite computers is called a
    1. Bus network
    2. Ring network
    3. Star network
    4. All of the above
    5. None of these
  21. With an IP address of 100,you currently have 80 subnets.What subnet mask should you use to maximize the number of available hosts?
    1. 192
    2. 240
    3. 248
    4. 224
    5. 252
  22. Encryption/decryption provides a network with____
    1. Privacy
    2. Authenticity
    3. Integrity
    4. Non-reputation
    5. None of these
  23. The data to be encrypted at the sender site is called ___.The data to be decrypted at receiver end is called ____
    1. Secret key, public key
    2. Public key, secret key
    3. Plaintext, ciphertext
    4. Ciphertext, plaintext
    5. None of these
  24. In digital signature the private key is used for ___ and the public key for ____
    1. Encryption, decryption
    2. Decryption, encryption
    3. Plaintext, ciphertext
    4. Ciphertext, plaintext
    5. None of these
  25. A ___ ‘s main purpose is to prohibit unauthorized access to your computer via the Internet.
    1. Popup blocker
    2. Firewall
    3. Spyware
    4. Spam assassin
    5. None of these

IBPS specialist Question paper 2012 and 2013 Exam

Already given. Click me

For entire Archive of all IBPS/Banking related articles, visit Mrunal.org/IBPS

If any senior player/ maestro wants to share wisdom- please post it under the comments.