Latest Banking jobs   »   IBPS RRB IT Officer Professional Knowledge...

IBPS RRB IT Officer Professional Knowledge Quiz: 3rd September

ibps-rrb-it-officer-quiz
IBPS RRB Officer Scale-II is amongst the most reputed jobs in the Banking Sector and many Aspirants work hard to get this job. The exam for this post consists of various subjects other than the common subjects in Bank exams. Here we are providing you with a quiz based on Information Technology which will cover topics like Networking, Computer Software and Hardware, Computer Security, DBMS, Computer Organisation etc. Practice with the questions based on the most updated pattern. 




Q1. Bit stuffing technique used in which method?

Checking error
flow control
framing
Route finding
None of these
Solution:

Bit stuffing is the insertion of one or more bits into a transmission unit as a way to provide signaling information to a receiver. The receiver knows how to detect and remove or disregard the stuffed bits. This technique is used in framing.

Q2. Alpha testing is done in which side of software development.

Customer side
Developer side
Both Customer side and developer side
Server side
None of these
Solution:

Alpha testing takes place at the developer's site by the internal teams, before release to external customers. Alpha testing performed to identify all possible issues/bugs before releasing the product to everyday users or public.

Q3. Which of the following is the biometric login featured of Windows 10?

Windows Instant
Windows Bio
Windows Hello
Windows Padlock
None of these
Solution:

Windows Hello is the biometric authentication feature that helps strengthen authentication and helps to guard against potential spoofing through fingerprint matching and facial recognition.

Q4. Tuple variables in SQL are defined in which clause?

From clause
Select clause
Where clause
All of the above
None
Solution:

Tuple variables can be used in SQL and are defined in the from clause.

Q5. By firmware we understand _______.

physical equipment used in a computer system
a set of instructions that causes a computer to perform one or more tasks.
the people involved in the computing process.
a set of programs that is pre-installed into the read only memory of a computer during the time of manufacturing
None of these
Solution:

Firmware is programming that's written to the read-only memory (ROM) of a computing device. Firmware, which is added at the time of manufacturing, is used to run user programs on the device.

Q6. Which of the following is a subject- oriented, integrated, time variant, nonvolatile collection of data in support of management decisions?

Data Mining
Data Warehousing
Web Mining
Text Mining
None of these
Solution:

Data warehousing is the process of constructing and using a data warehouse. A data warehouse is constructed by integrating data from multiple heterogeneous sources that support analytical reporting, structured and/or ad hoc queries, and decision making. Data warehousing involves data cleaning, data integration, and data consolidations.

Q7. Doubles ellipses in E-R diagram represent_______

Entity set
multi valued
derived attributes
relationship
None of these
Solution:

A multi valued attribute can have more than one value at a time for an attribute. For ex., skills of a surgeon are a multi valued attribute since a surgeon can have more than one skill. It represents double ellipses in E-R diagram.

Q8. FDDI standards are used in which topology?

Ring network
Star network
Mesh network
Bus Based network
None of the above
Solution:

Fiber distributed data interface (FDDI), which is an optical data communication standard used for long distance networks provides communication with fiber optic lines up to 200 kilometers at a speed of 100 megabit per second (Mbps). FDDI has dual primary and secondary communication rings. The primary ring works alongside the network, and the secondary ring remains idle and available for backup.

Q9. Deque is called________

Double ended queue
Single ended queue
An operation
None of the above
None of these
Solution:

A deque, also known as a double-ended queue, is an ordered collection of items similar to the queue. It has two ends, a front and a rear, and the items remain positioned in the collection. In deque new items can be added at either the front or the rear. Likewise, existing items can be removed from either end.

Q10. Which of the following is use of COCOMO Model in Software Engineering?

Finding cost of the project
Design software
Scheduling software
Time complexity of the project
None of the above
Solution:

The Constructive Cost Model (COCOMO) is the most common and widely used cost estimation models for most software projects.

Q11. Which of the following is used to convert infix notation to postfix notation in data structure?

Branch
Queue
Tree
Stack
None of these
Solution:

Stack is used to expression conversion. There are three type of expression- infix, postfix, and prefix. Stack converts one type of expression to another like infix to postfix, infix to prefix, postfix to prefix and vice versa.

Q12. Which of the following create metadata?

DML Compiler
DML pre-processor
DDL interpreter
Query interpreter
None of these
Solution:

It interpreters DDL statements and record them in table containing metadata.

Q13. 128.167.152.2 is a class ___________ address

A
B
C
D
None of these
Solution:

Range of Class B address is 128.0.0.0 to 191.255.255.255

Q14. How do the main Components of computer communicate?

System bus
Memory
Keyboard
Monitor
Cache
Solution:

A system bus is a single computer bus that connects the major components of a computer system, combining the functions of a data bus to carry information, an address bus to determine where it should be sent, and a control bus to determine its operation.

Q15. Which of the following lists memory types from highest to lowest access speed?

secondary storage, main memory, cache, registers
registers, cache, secondary storage, main memory
registers, cache, main memory, secondary storage
cache, registers, main memory, secondary storage
None of these
Solution:

registers, cache, main memory, secondary storage.

               

TOPICS:

Leave a comment

Your email address will not be published. Required fields are marked *