IBPS RRB IT Officer Professional Knowledge Quiz: 10th September

IBPS RRB Officer Scale-II is amongst the most reputed jobs in the Banking Sector and many Aspirants work hard to get this job. The exam for this post consists of various subjects other than the common subjects in Bank exams. Here we are providing you with a quiz based on Information Technology which will cover topics like Networking, Computer Software and Hardware, Computer Security, DBMS, Computer Organisation etc. Practice with the questions based on the most updated pattern.

About Course:

This package Includes IBPS PO Study Material -  Subscribe Now

About Bank Mahapack
If you are preparing for more than 1 Banking & Insurance exams then this is the pack we recommend you buy.

It is most cost effective and you get access to 100% digital content for Bank & Insurance exams on Adda247.

Banking & Insurance Exams Covered in this Pack

Additionally you can crack any private bank job exam with content in this pack.


Bank & Insurance Mahapack Highlights 

  • Structured course content
  • Recorded classes available if you miss any live class
  • Previous Years’ Papers of all upcoming exams.
  • Full Length Mocks based on the latest pattern with detailed solutions (video solutions for certain topics)
  • Topic level knowledge tests
  • Strategy sessions, time management & Preparation tips from the experts
Bank Maha Pack
  1. Unlimited Live Classes & Recorded Video Courses
  2. Unlimited Tests and eBooks
  3. 1 Lakh+ Selections
  1. 6 Months
  2. 1 Month
  3. 3 Months
6049 504/month

Q1. Congestion Control is done by which layer.

Data link layer
Network layer
Transport layer
Application layer
None of the above

congestion is a state occurring in network layer when the message traffic is so heavy that it slows down network response time. Congestion control is done by network layer by Leaky Bucket Algorithm and Token bucket Algorithm.

Q2. What is the amount of time takes for the desired sector of a disk to rotate under the read-write heads of the disk drive?

Positioning time
Random access time
Seek time
Rotational latency
None of these

A rotational delay or rotational latency is the amount of time between information requests and how long it takes the hard drive to move to the sector where the requested data is located.

Q3. Which is focused towards the goal of the organization?

Feasibility study
Requirement gathering
Software requirement specification
Software requirement validation
None of these

Feasibility study is basically the test of the proposed system in the light of its workability, meeting user’s requirement, effective use of resources and the cost effectiveness. These are categorized as technical, operational, economic, schedule and social feasibility. The main goal of feasibility study is to achieve scope.

Q4. ________ has many of the characteristics of what is now being called cloud computing.

Web Service
All of the mentioned

The Internet offers abstraction, runs using the same set of protocols and standards, and uses the same applications and operating systems.

Q5. In a virtual memory system, the addresses used by the programmer belongs to

Memory space.
Physical addresses.
Address space.
Main memory address.
None of these

An address used by programmers in a system supporting virtual memory concept is called virtual address and the set of such addresses are called address space.

Q6. What are the 3 principles of information security?

Authentication, Availability, Accessibility
Confidentiality, Integrity, Availability,
Integrity, Authentication, Confidentiality
Availability, Security, Encryption
None of these

A principle which is a core requirement of information security for the safe utilization, flow, and storage of information is the CIA triad. CIA stands for confidentiality, integrity, and availability and these are the three main objectives of information security.

Q7. Ethernet uses a _____________ physical address that is imprinted on the network interface card.

64 bit
68 byte
6 bit
6 byte
32 bit

Ethernet uses a 6 -byte (48-bit) physical address that is imprinted on the network interface card (NIC). The physical address also known as the link address is the address of a node physical address, also known as the link address, is the address of a node as defined by its LAN or WAN. It is included in the frame used by the data link layer.

Q8. __________ is backing up data by making a copy of the database and it maintain by local or remote computer.

Data Shadowing
Data Mirroring
Both (a) and (b)
Data Isolation
None of these

In Data backup technique an identical copy of a firm’s database is maintained on a local or remote computer. The primary database and its shadow are so linked via cable, telephone line, or wireless that any change in the former is instantly reflected in the latter. It is also called data mirroring.

Q9. Which Wi-Fi security is impossible to crack?

MAC filtering
None of these

No wireless security system is impossible to crack but MAC Filtering is the hardest. By employing MAC Filtering the administrator of a Wi-Fi network can limit the access to the network to only those devices whose MAC addresses have been entered into the router. While this is a very hard security protocol to crack MAC addresses can be spoofed and a system can then be tricked into allowing access to an unauthorized user so it is advisable to run both MAC filtering and WPA2 protocol.

Q10. Which of these keywords can be used to prevent Method overriding?

None of these

To disallow a method from being overridden, specify final as a modifier at the start of its declaration. Methods declared as final cannot be overridden.

Q11. A system is in a ______ state if there exists a set of transactions such that every transaction in the set is waiting for another transaction in the set.

None of the above

when one data item is waiting for another data item in a transaction then system is in deadlock.

Q12. Which of the following are shows by using ER diagram?

Attributes of the Entities
Entities of the database
Relationship between the entities
all of the above
None of these

the entity-relationship model (or ER model) is a way of graphically representing the logical relationships of entities (or objects) in order to create a database. ER diagram contain entity, attributes and relationship between the entities.

Q13. Which of them take care of email at client side?

Both (a) and (c)
None of the mentioned

POP is short for Post Office Protocol, a protocol used to retrieve e-mail from a mail server. Most e-mail applications (sometimes called an e-mail client) use the POP protocol, although some can use the newer IMAP (Internet Message Access Protocol).
"IMAP" stands for "Internet Message Access Protocol." It is better than POP for accessing mail from multiple locations because it leaves the mail messages on the mail server. This lets you read the same messages regardless of what computer you use to read your e-mail.

Q14. Which of the following is sued to transfer data intended for a peripheral device into a disk so that it can be transmitted to the peripheral device at a more suitable time or in bulk?

Virtual programming
Multi programming

Spooling is a technique to hold data temporarily in the computer memory and provide to devices when they need it. The temporary holding area of the memory is sometimes referred to as the buffer. One common example of spooling is printing, where files are stored in the buffer and sent to the printer when it is ready.

Q15. Which of the following is not one of the 3 general components of the Unix operating system?

the kernel
the shell
the GUI
the file system
None of these

the UNIX operating system is made up of three parts; the kernel, the shell, and the file system.



You may also like to read: