IBPS RRB IT Officer Professional Knowledge Quiz: 17th September


IBPS RRB Officer Scale-II is amongst the most reputed jobs in the Banking Sector and many Aspirants work hard to get this job. The exam for this post consists of various subjects other than the common subjects in Bank exams. Here we are providing you with a quiz based on Information Technology which will cover topics like Networking, Computer Software and Hardware, Computer Security, DBMS, Computer Organisation etc. Practice with the questions based on the most updated pattern.

Q1. To promote encapsulation, Java provides which type of access modifier?
All of the above
None of the above
Encapsulate provides contract to other object to what to hide and what to expose which can be accessed other objects. In java we use private access modifier to hide method and variable to restrict from outer world.

Q2. A distributed network configuration in which all data information pass through a central computer is________.
Bus Network
Ring Network
Star Network
Font to Point Network
None of the above
Star networks are one of the most common computer network topologies. In its simplest form, a star network consists of one central hub which acts as a conduit to transmit messages.

Q3. A web cookie is a small piece of data________
sent from a website and stored in user’s web browser while a user is browsing a website
sent from user and stored in the server while a user is browsing a website
sent from root server to all servers
none of the mentioned
AJAX stands for
web cookie is a small piece of data sent from a website and stored on the user's computer by the user's web browser while the user is browsing. Cookies were designed to be a reliable mechanism for websites to remember stateful information (such as items added in the shopping cart in an online store) or to record the user's browsing activity.

Q4. Which of the following page replacement algorithms suffers from Belady’s anomaly?
Shortest job first
Round robin
first-in first-out
None of these
Belady’s anomaly is the phenomenon in which increasing the number of page frames results in an increase in the number of page faults for certain memory access patterns. This phenomenon is commonly experienced when using the first-in first-out (FIFO) page replacement algorithm.

Q5. What is JSP?
Client-side programming
Sever side programming
Browser side programming
Both (A) and (B)
None of the above
Java Server Pages (JSP) is a server-side programming technology that enables the creation of dynamic, platform-independent method for building Web-based applications.

Q6. ___________ is a malicious act in which a large number of email messages are sent to a single email address in a short period of time.
E-mail bomb
None of these
A malicious act where huge numbers of e-mails are directed to a specific system or a targeted user of that system. Mail bombs will usually fill the allotted space on an e-mail server for the users e-mail and can result in crashing the e-mail server, or at the very least, possibly rendering the user's computer useless as their e-mail client attempts to download the huge amounts of e-mail. Also called a mail bomb.

Q7. By using ________you can force immediate termination of a loop, by passing the conditional expression and any remaining code in the body of the loop.
Loop Close
None of these
break statement is encountered inside a loop, the loop is immediately terminated and the program control resumes at the next statement following the loop.

Q8. Error detection at the data link level is achieve by ___________
bit stuffing
Hamming codes
A Cyclic Redundancy Check (CRC) is an error-detecting code commonly used in digital networks and storage devices to detect accidental changes to raw data. Blocks of data entering these systems get a short check value attached, based on the remainder of a polynomial division of their contents.

Q9. Which of the following is the time interval between the submission and completion of job?
Waiting time
Turnaround time
Response time
None of these
Turnaround time is the time interval from the time of submission of a process to the time of the completion of the process.

Q10. Which of the following is a form of virus explicitly designed to hide itself from detection by antivirus software?
Stealth Virus
Macro Virus
Polymorphic Virus
Parasitic Virus
None of these
A stealth virus is a hidden computer virus that attacks operating system processes and averts typical anti-virus or anti-malware scans. Stealth viruses hide in files, partitions and boot sectors and are adept at deliberately avoiding detection.

Q11. The default parameter passing mechanism is_____
Call by value
Call by reference
Call by value result
Call by function
None of these
call by value method of passing arguments to a function copies the actual value of an argument into the formal parameter of the function.

Q12. What are the qualities of good software?
All of the above
Quality of software is not just concern with what software does, it also includes the software’s behavior while it is executing and the structure and organization of the system programs and associated documentation. Quality of good software is- reliability, correctness, efficiency, portability, flexibility, maintainability etc.

Q13. JavaScript was developed by __________ to run inside of web pages.
None of these
Java script was developed by Netscape. JavaScript is a powerful and popular language for programming on the web.

Q14. Which SQL command used to avoid the selection of duplicate rows?
None of these
The SQL DISTINCT keyword is used in conjunction with the SELECT statement to eliminate all the duplicate records and fetching only unique record.

Q15. Which cloud computing service provided by Microsoft?
None of these
Microsoft Azure is a cloud computing service created by Microsoft for building, testing, deploying, and managing applications and services through a global network of Microsoft-managed data centers.



You may also like to read:
Print Friendly and PDF