IBPS RRB Officer Scale-II is amongst the most reputed jobs in the Banking Sector and many Aspirants work hard to get this job. The exam for this post consists of various subjects other than the common subjects in Bank exams. Here we are providing you with a quiz based on Information Technology which will cover topics like Networking, Computer Software and Hardware, Computer Security, DBMS, Computer Organisation etc. Practice with the questions based on the most updated pattern.
Q1. Which SQL statement is used to extract data from a database?
EXTRACT
GET
SELECT
OPEN
None of these
Q2. With SQL, how do you select all the records from a table named "Persons" where the value of the column "FirstName" is "Megha"?
SELECT * FROM Persons WHERE FirstName='Megha'
SELECT [all] FROM Persons WHERE FirstName='Megha'
SELECT [all] FROM Persons WHERE FirstName LIKE 'Megha'
SELECT * FROM Persons WHERE FirstName<>'Megha'
None of the above
Q3. When a packet with the code is transmitted; it is received and processed by every machine on the network. This mode of operation is called _______ .
Broadcasting
Multi-casting
Unicasting
Point-to-point
None of these
Solution:
Broadcasting is the simultaneous transmission of the same message to multiple recipients. In networking, broadcasting occurs when a transmitted data packet is received by all network devices.
Q4. IP Address 168.2.7.6 belong to_____
Class A
Class B
Class C
Class D
Class E
Solution:
Range of Class B IP address 128.0.0.0 to 191.255.255.255
Q5. Which of the following is not a Data Definition Language Statement?
Delete
Create
Drop
Alter
Rename
Solution:
DDL is short name of Data Definition Language, which deals with database schemas and descriptions, of how the data should reside in the database. DDL commands are-CREATE, ALTER, DROP, TRUNCATE, RENAME.
Q6. Which is pre-emptive process scheduling algorithm?
FCFS
SJF
Round Robin
Both A and B
None of these
Solution:
Round Robin is the preemptive process scheduling algorithm. Each process is provided a fix time to execute, it is called a quantum. Once a process is executed for a given time period, it is preempted, and other process executes for a given time period. Context switching is used to save states of preempted processes.
Q7. Which of the following is the time interval between the submission and completion of job?
Waiting time
Turnaround time
Throughput
Response time
Active time
Solution:
Turnaround time is the time interval from the time of submission of a process to the time of the completion of the process.
Q8. Which of the following protocols is used to monitor network devices such as hubs, switches, and routes?
SMTP
RIP
SNMP
OSPF
TFTP
Solution:
Simple Network Management Protocol (SNMP) is a popular protocol for network management. It is used for collecting information from, and configuring, network devices, such as servers, printers, hubs, switches, and routers on an Internet Protocol (IP) network.
Q9. Which feature in Object Oriented Programming allows reusing code?
Polymorphism
Inheritance
Encapsulation
Data hiding
Recursion
Solution:
Inheritance in java is a mechanism in which one object acquires all the properties and behaviors of parent object. The idea behind inheritance in java is that you can create new classes that are built upon existing classes. When you inherit from an existing class, you can reuse methods and fields of parent class, and you can add new methods and fields also.
Q10. Which of the following technique is an alternative to log-based recovery?
Check points
Shadow paging
Locks
Page based
Recovery with current transaction
Solution:
Shadow paging is an alternative to transaction log-based recovery technique. This is the method where all the transactions are executed in the primary memory or the shadow copy of database. Once all the transactions completely executed, it will be updated to the database.
Q11. Which command is use for sorting the table?
Like
Distinct
Group By
Order By
None of these
Solution:
ORDER BY command is used to sort the result-set in ascending or descending order. ORDER BY keyword sorts the records in ascending order by default.
Q12.What is the main protocol used to access data on WWW?
FTP
HTML
HTTP
SMTP
TFTP
Solution:
HTTP protocol is used by the World Wide Web and this protocol defines how messages are formatted and transmitted, and what actions Web servers and browsers should take in response to various commands.
Q13. “SaaS” stand for in cloud computing:
System as a service
Software as a service
Software as a system
Scheme as a service
System as a system
Solution:
Software-as-a-service (SaaS) is a method for delivering software applications over the Internet, on demand and typically on a subscription basis. With SaaS, cloud providers host and manage the software application and underlying infrastructure and handle any maintenance, like software upgrades and security patching. Users connect to the application over the Internet, usually with a web browser on their phone, tablet or PC.
Q14.Which of the following is the Correct HTML tag for the largest heading?
<head>
<h6>
<heading>
<h1>
<h2>
Q15. Which IEEE standard used for Ethernet?
802.3
802.4
802.5
802.6
None of these
Solution:
802.3 is a standard specification for Ethernet, a method of physical communication in a local area network (LAN), which is maintained by the Institute of Electrical and Electronics Engineers (IEEE).