IBPS RRB SO IT Professional Quiz
IBPS RRB SO IT Officer Scale-II is amongst the most reputed jobs in the Banking Sector. We will provide you with a quiz based on Information Technology which will cover topics like Networking, Information Security, DBMS, Data Structure, Programming, etc. Practice with the questions based on the most updated pattern. We already rolled the study plan for IBPS RRB MAINS 2019.
Q1. CISC stands for:
(a) Complete Instruction Set Computer
(b) Complex Introduction Set Computer
(c) Complete Instruction Serial Computer
(d) Complex Instruction Set Computer
(e) Complete Instruction Set Compiler
S1. Ans.(d)
Sol.
CISC (complex instruction set computer) has the ability to execute addressing modes or multi-step operations within one instruction set. It is the design of the CPU where one instruction performs many low-level operations.
Q2. Which of the following is the example of “SaaS” cloud computing service?
(a) Amazon Web Services(AWS)
(b) Microsoft Azure
(c) Google Apps
(d) Apprenda
(e) Google Compute Engine
S2. Ans.(c)
Sol.
Software-as-a-service (SaaS) is a method for delivering software applications over the Internet, on-demand and typically on a subscription basis. With SaaS, cloud providers host and manage the software application and underlying infrastructure and handle any maintenance, like software upgrades and security patching. Users connect to the application over the Internet, usually with a web browser on their phone, tablet or PC.
Google Apps is a very good example of SaaS. Google Apps consists of services like Gmail, Drive, Docs, and Photos. Free users get free access to these services along with 15 GB of Drive storage.
Q3. SELECT * FROM employee WHERE dept_name=”CompSci”;
In the SQL given above, there is an error. Identify the error.
(a) Dept_name
(b) Employee
(c) “CompSci”
(d) From
(e) No Error
S3. Ans.(c)
Sol.
For any string operations, single-quoted (‘) must be used to enclose.
Q4. What is the output of this program?
class main_class {
public static void main(String args[])
{
int a = 6;
if (a == 6) {
int a = 5;
System.out.println(a);
}
}
}
(a)6
(b)5
(c)11
(d)Compiler error
(e)Runtime error
S4. Ans.(d)
Sol.
Two variables with the same name can’t be created in a class. compiler error generates.
Q5. Which of the following is not a DDL command?
(a) CREATE
(b) ALTER
(c) DROP
(d) UPDATE
(e) TRUNCATE
S5. Ans.(d)
Sol.
DDL (Data Definition Language) commands are used for creating, modifying, and dropping the structure of database objects. The commands are CREATE, ALTER, DROP, RENAME, and TRUNCATE.
UPDATE is a DML (Data Manipulation Language) command.
Q6. Which of the following is the correct syntax for java main method?
(a) public void main(String[] args)
(b) public static void main(string[] args)
(c) public static void(string args)
(d) public static void main(String[] args)
(e) public void main(String args)
S6. Ans.(d)
Q7. Ethernet uses how many bit/byte physical address, that is imprinted on the network interface card?
(a) 64 bit
(b) 64 byte
(c) 6 bit
(d) 6 byte
(e) 32 bit
S7. Ans.(d)
Sol.
Ethernet uses a 6 -byte (48-bit) physical address that is imprinted on the network interface card (NIC). The physical address also known as the link address is the address of a node physical address, also known as the link address, is the address of a node as defined by its LAN or WAN. It is included in the frame used by the data link layer.
Q8.DNS is defining at which layer of TCP/IP model?
(a) Internet layer
(b) Datalink layer
(c) Transport layer
(d) Application layer
(e) Both (a) and (c)
S8. Ans.(d)
Sol.
One of the most important components of the application layer is the Domain Name System (DNS) server. DNS is a distributed hierarchical and global directory that translates machine or domain names to numerical IP addresses. DNS can run over either UDP or TCP.
Q9. Three-way handshake method used in which of the following?
(a) Connection establishment
(b) Connection termination
(c) Connection release
(d) Pathfinding
(e) packet forwarding
S9. Ans.(a)
Sol.
A three-way handshake is a method used in a TCP/IP network to create a connection between a local host/client and server. It is a three-step method that requires both the client and server to exchange SYN and ACK (acknowledgment) packets before actual data communication begins.
A three-way handshake is also known as a TCP handshake.
Q10. Which type of security attack occurs, when a malicious actor inserts himself as a relay/proxy into a communication session between people or systems?
(a) Compromised key attack
(b) Sniffer Attack
(c) Man-in-the-Middle attack
(d) Denial-of-service attack
(e) Eavesdropping
S10. Ans.(c)
Sol.
A man-in-the-middle attack is a type of cyberattack where a malicious actor inserts him/herself into a conversation between two parties, impersonates both parties and gains access to information that the two parties were trying to send to each other. A man-in-the-middle attack allows a malicious actor to intercept, send and receive data meant for someone else, or not meant to be sent at all, without either outside party knowing until it is too late.
Q11. What is the use of “touch” command in Linux?
(a) create a file
(b) remove a file
(c) Show the manual page
(d) Showhome directory
(e) Copy files
S11. Ans.(a)
Sol.
The touch command is used to create a file. It can be anything, from an empty txt file to an empty zip file.
Q12.What is SGML?
(a) Standard generalized making loop
(b) Special generalized markup language
(c) Standard general markup language
(d) Short generalized markup language
(e) Standard generalized markup language
S12. Ans.(e)
Sol.
SGML (Standard Generalized Markup Language) is a standard for how to specify a document markup language or tag set. Such a specification is itself a document type definition (DTD). SGML is not in itself a document language, but a description of how to specify one.
Q13.In ring topology data are transmitted in which form?
(a) Datagram
(b) Packet
(c) Segments
(d) Frame
(e) Token
S13. Ans.(e)
Sol.
In a Ring topology, every device/node is connected to exactly two other nodes one on either side of it in a closed-loop fashion. All messages travel through the ring either in a clockwise direction or an anti-clockwise direction. Ring topology is very rarely used today because they are expensive, difficult to install and manage. A failure in any single connection disrupts the ring topology thus also making ring topology a rare choice for network topologies. In ring topology data are transmitted in form of ring.
Q14.Which of the following is the process of logically and/or physically partitioning data into segments that are more easily maintained or accessed in database?
(a) Data Hiding
(b) Data Partitioning
(c) Data Clustering
(d) Data Mirroring
(e) Data Shadowing
S14. Ans.(b)
Sol.
Partitioning is the database process where very large tables are divided into multiple smaller parts. By splitting a large table into smaller, individual tables, queries that access only a fraction of the data can run faster because there is less data to scan.
Q15.Which of the following is the time interval between the submission and completion of job?
(a) Waiting time
(b) Turnaround time
(c) Throughput
(d) Response time
(e) Seek time
S15. Ans.(b)
Sol.
Turnaround time is the time interval from the time of submission of a process to the time of the completion of the process.