IBPS SO 2018 Professional Knowledge Quiz for IT

IBPS SO IT Officer is amongst the most reputed jobs in the Banking Sector and many Aspirants work hard to get this job. The exam for this post consists of various subjects other than the common subjects in Bank exams. Here we are providing you with a quiz based on Information Technology which will cover important chapters of professional knowledge for IT Officer exam. Practice with the questions based on the most updated pattern.

Q1. Which of the following is not an antivirus?
Cobian Backup is a freeware for Windows that enables the users to back up files and directories from the existing location and can be done on the same computer or within the same network.

Q2. Which of the following is the combination of public and private cloud?
Business cloud
Space cloud
Rackspace cloud
Hybrid cloud
Commodity cloud
Hybrid clouds combine public and private clouds, bound together by technology that allows data and applications to be shared between them. By allowing data and applications to move between private and public clouds, hybrid cloud gives businesses greater flexibility and more deployment options.

Q3. In which debugging technique, when an error has occurred, one needs to start tracing the program backward one step at a time evaluating the values of all variables until the cause of error is found?
Cause Elimination
Program Slicing
Brute Force Method
None of these
In Backtracking method, beginning from the statement at which an error symptom has been observed, the source code is traced backwards until the error is discovered. Unfortunately, as the number of source lines to be traced back increases, the number of potential backward paths increases and may become unmanageably large thus limiting the use of this approach.

Q4. Which of the following maintenance strategies involves performing maintenance before problems occur to avoid breakdowns and disruptions?
Perfective Maintenance
Corrective Maintenance
Adaptive Maintenance
Preventive Maintenance
Breakdown Maintenance
Preventive maintenance refers to regular, routine maintenance to help keep equipment up and running, preventing any unplanned downtime and expensive costs from unanticipated equipment failure. It requires careful planning and scheduling of maintenance on equipment before there is an actual problem as well as keeping accurate records of past inspections and servicing reports.

Q5. Which of the following malicious software that can change its code and signature patterns with each iteration?
Mutation Engine
Morris worm
Metamorphic Virus
Stealth Virus
A metamorphic virus is one that can transform based on the ability to translate, edit and rewrite its own code. It is considered the most infectious computer virus, and it can do serious damage to a system if it isn't detected quickly.

Q6. In which type of SQL join returns all the rows from left table combine with the matching rows of the right table
Inner join
Left outer join
Right outer join
Full join
Self join
The LEFT JOIN keyword returns all records from the left table, and the matched records from the right table. The result is NULL from the right side, if there is no match.
SELECT column_name(s)
FROM table1
LEFT JOIN table2 ON table1.column_name = table2.column_name;

Q7. An accountant office has four employees. They have four computers and two printers. What kind of network would you suggest they install?
Client server network
Peer-to peer network
None of the above
A peer-to-peer (P2P) network is group of computers, each of which acts as a node for sharing files within the group. Instead of having a central server to act as a shared drive, each computer acts as the server for the files stored upon it.

Q8. Which of the following is the process of taking control over an existing session between a client and a server?
IP spoofing
Replay attack
Session hijacking
Session hijacking is a method of taking over a Web user session by surreptitiously obtaining the session ID and acting like the authorized user. Once the user’s session ID has been accessed (through session prediction), the attacker can act as that user and do anything the user is authorized to do on the network.

Q9. If different properties and functions of a real-world entity is grouped or embedded into a single element, what is it called in OOP language?
Encapsulation is one of the fundamental concepts in object-oriented programming (OOP). It describes the idea of bundling data and methods that work on that data within one unit, e.g., a class in Java. This concept is also often used to hide the internal representation, or state, of an object from the outside.

Q10.Which keyword is used to define a scope where identifiers like variables, functions, classes, etc are declared in C++?
A namespace is a declarative region that provides a scope to the identifiers (the names of types, functions, variables, etc) inside it. Namespaces are used to organize code into logical groups and to prevent name collisions that can occur especially when your code base includes multiple libraries.

Q11.Which among the following is not a necessary condition for constructors?
Its name must be same as that of class
It must not have any return type
It must contain a definition body
It can contain arguments
None of these
Constructors are predefined implicitly, even if the programmer doesn’t define any of them. Even if the programmer declares a constructor, it’s not necessary that it must contain some definition.

Q12. Which feature works with both Microsoft Explorer and Microsoft Edge and monitors websites, pages, and downloads for known issues?
None of there
SmartScreen Filter helps you identify reported phishing and malware websites and also helps you make informed decisions about downloads.

Q13. A free file storage and file sharing service provided by Microsoft when you sign up for a Microsoft account is:
Google Drive
OneDrive (formerly SkyDrive) is an online cloud storage service from Microsoft. OneDrive integrates with Microsoft Office so users can access Word, Excel and PowerPoint documents in OneDrive. The system allows users to simultaneously edit Office documents, edit documents in browsers, and create and share folders.

Q14. What is the correct HTML for inserting an image?
 <image src="image.gif" alt="MyImage">
<img href="image.gif" alt="MyImage">
<img src="image.gif" alt="MyImage">
<img alt="MyImage">image.gif</img>
<img sty= “MyImage”>img.gif</img>
In HTML, images are defined with the tag. The tag is empty, it contains attributes only, and does not have a closing tag.
The src attribute specifies the URL (web address) of the image: <img src="url">
The alt attribute provides an alternate text for an image, if the user for some reason cannot view it (because of slow connection, an error in the src attribute, or if the user uses a screen reader).

Q15. Which of the following cloud computing service allows user to subscribe to a software application and execute it online, rather than purchasing it to install on in-house computers?
Software-as-a-service (SaaS) is a method for delivering software applications over the Internet, on demand and typically on a subscription basis. With SaaS, cloud providers host and manage the software application and underlying infrastructure and handle any maintenance, like software upgrades and security patching. Users connect to the application over the Internet, usually with a web browser on their phone, tablet or PC.



You may also like to read:

No comments