IBPS RRB IT Officer Professional Knowledge Quiz: 12th September

ibps-rrb-it-officer-quiz

IBPS RRB Officer Scale-II is amongst the most reputed jobs in the Banking Sector and many Aspirants work hard to get this job. The exam for this post consists of various subjects other than the common subjects in Bank exams. Here we are providing you with a quiz based on Information Technology which will cover topics like Networking, Computer Software and Hardware, Computer Security, DBMS, Computer Organisation etc. Practice with the questions based on the most updated pattern.



Q1.______ computer virus is a computer that's been infected by a hacker and controlled under remote direction to perform criminal tasks.
Zombie
Worm
Logic Bomb
Virusa
None of these
Solution:
A zombie computer virus is a computer that's been infected by a computer virus or compromised by a hacker. It can be controlled under remote direction to perform criminal tasks, as well as infect other computers with viruses.

Q2. Which of the following is a type of margin at the time of printing and binding printouts?
Portrait
Gutter
A4
Next Page
None of these
Solution:
A gutter margin adds an extra space to the binding sides. Thus, it ensures that the text does not hide at the time of binding or folding papers.

Q3. Which of the following addressing mode, the operand is available in the instruction itself.
Direct addressing
Immediate addressing
Implied addressing
Indirect addressing
None of these
Solution:
The addressing mode in which the data operand is a part of the instruction itself is known as immediate addressing mode.

Q4. Which of the memories has the shortest access time?
Cache memory
Magnetic bubble memory
Magnetic core memory
RAM
None of these
Solution:
Cache memory is a small-sized type of volatile computer memory that provides high-speed data access to a processor and stores frequently used computer programs, applications and data. Cache is the fastest memory in a computer.

Q5. What is trap door?
IT is trap door in War Games
It is a hole in software left by designer.
It is a Trojan horse
It is a virus which traps and locks user terminal
None of these
Solution:
Trap door is the new jargon for Backdoor Programs or Backdoor virus in Software field. A trap door is a secret entry point into a program that allows someone that is aware of the trap door to gain access without going through the usual security access procedures.

Q6. Which one of the following is not a Linux distribution?
Debian
Gentoo
Kinoppix
Fedora
Slix
Solution:
The Linux open source operating system, or Linux OS, is a freely distributable,
Cross-platform operating system based on Unix that can be installed on PCs, laptops,
netbooks, mobile and tablet devices, video game consoles, servers, supercomputers and more. All are Linux distribution except Slix.

Q7. Which of the following method allow you to factor out commonality from two or more entity sets?
Specialization
Aggregation
Generalization
Inheritance
None of these
Solution:
Generalization is a process of extracting common characteristics from two or more classes and combining them into a generalized super class. So, it is a bottom up approach as two or more lower lever entities are combined to form a higher level entity.

Q8. What is Dirty Bit in operating system?
Page with corrupted data
Wrong page in the memory
Page that is modified after being loaded into cache memory
Page that is less frequently accessed
None of these
Solution:
A dirty bit is a flag that indicates whether an attribute needs to be updated. Such situations usually occur when a bit in a memory cache or virtual memory page that has been changed by a processor but has not been updated in the storage.

Q9. The …………… is code embedded in some legitimate program that is set to "explode" when certain conditions are met.
Trap doors
Trojan horse
Logic Bomb
Virus
None of these
Solution:
The logic bomb is code embedded in some legitimate program that is set to "explode" when certain condition are met.

Q10. The organization and interconnection of the various components of a computer system is ___.
Architecture
Networks
Graphics
Cesigning
None of these
Solution:
Computer architecture is the organization and interconnection of the various components of a computer system.

Q11. Which of the following is not a valid software development models?
Spiral model
Circular model
Waterfall model
RAD model
None of these
Solution:
Circular model is not a valid software model.

Q12. If a relation has several candidate keys, one is chosen arbitrarily to be the __________ key?
Primary key
Secondary key
Foreign key
Candidate key
None of these
Solution:
A candidate key is a column, or set of columns, in a table that can uniquely identify any database record without referring to any other data. Each table may have one or more candidate keys, but one candidate key is unique, and it is called the primary key.

Q13. What is the file extension of compiled java program?
(.class)
(.java)
(.css)
(.html)
None of these
Solution:
(.class) is the Compiled java source code file, and (.java) is the extension of source code of a java program.

Q14. Which of the following is an authorization command in SQL?
Access
Allow
Grant
Revoke
None of these
Solution:
SQL GRANT is a command used to provide access or privileges on the database objects to the users.

Q15. What is Code Red?
Word Processing Software
Antivirus
Virus
Photo Editing Software
None of these
Solution:
Code Red is a worm that caused possible billions of dollars of damage in the summer of 2001. It contains the text string "Hacked by Chinese!", which is displayed on web pages that the worm defaces. It is also one of the few worms able to run entirely in memory, leaving no files on the hard drive or any other permanent storage.

               


           

You may also like to read: