IBPS RRB IT Officer Professional Knowledge Quiz: 29th August

IBPS RRB Officer Scale-II is amongst the most reputed jobs in the Banking Sector and many Aspirants work hard to get this job. The exam for this post consists of various subjects other than the common subjects in Bank exams. Here we are providing you with a quiz based on Information Technology which will cover topics like Networking, Computer Software and Hardware, Computer Security, DBMS, Computer Organisation etc. Practice with the questions based on the most updated pattern. 

Q1. The schema at the intermediate level according to the level of abstraction in DBMS called____

(a)Conceptual Schema
(b)Logical Schema
(c)Physical Schema
(d)Sub schema
(e)Super Schema

Schema at the intermediate level is called Conceptual Schema

Q2. OLAP applications are widely used by________.

(c)Data Mining Technique
(d)Operating System
(e)None of these

OLAP (Online Analytical Processing) is a category of software tools that provides analysis of data stored in a database. OLAP tools enable users to analyze different dimensions of multidimensional data. For example, it provides time series and trend analysis views. OLAP often is used in data mining.

Q3. What is an applet?

(a) An applet is a Java program that runs in a Web browser.
(b) Applet is a standalone java program.
(c) Applet is a tool.
(d) Applet is a run time environment.
(e) None of these

An applet is a Java program that runs in a Web browser. Applets are small Java applications that can be accessed on an Internet server, transported over Internet, and can be automatically installed and run as apart of a web document.

Q4. Which of the following company developed core banking solution software “BaNCS”?

(e)None of these

BaNCS core banking solution is designed by Tata Consultancy Services. This is a very popular core banking platform across the world. BaNCS is used by over 280 institutions in more than 80 countries. Here is a list of banks that use BaNCS Software Packages- State Bank of India, Allahabad Bank, Bank of Maharastra, Central Bank of India, Indian Bank

Q5. Which network topology is highly reliable?

(a) Bus topology
(b) Star topology
(c) Ring topology
(d) Mesh topology
(e) None of these

Mesh topology is highly reliable because it provides some divers set of transmission routes. If one segment of line is fails, the rest of the lines is not affected. Because of its multiple transmission paths, mesh topology also provides a high level of availability.

Q6. In SQL, which of the following is not a Data Control Language Command?

(d) All of the above
(e) None

Data Control Language (DCL) is used to control privilege in Database. To perform any operation in the database, such as for creating tables, sequences or views we need privileges. GRANT and REVOKE are used in DCL. RENAME is the DDL (data definition Language) command.

Q7. A(n) ________ allows you to access your e-mail from anywhere.

(a) Forum
(b) Webmail interface
(c) Message Board
(d) Weblog

Webmail (or web-based email) is any email client implemented as a web application running on a web server. Examples of webmail software are Roundcube and SquirrelMail. Examples of webmail providers are AOL Mail, Gmail, Outlook.com and Yahoo!

Q8.A flip flop has how many stable states?

(a) one stable state
(b) no stable states
(c) two stable states
(d) three stable states
(e) none of the above

A flip-flop or latch is a circuit that has two stable states and can be used to store state information. A flip-flop is a bistablemultivibrator. The circuit can be made to change state by signals applied to one or more control inputs and will have one or two outputs.

Q9. Which clause is used to specify condition while retrieving data from table in SQL?

(d)Group By
(e)None of these

WHERE clause is used to extract only those records that fulfill a specified condition.

Q10. Which of the following is a secret-key Algorithm?

(b) DES
(c)Public Key
(d)All of the above
(e)None of these

A secret key algorithm (sometimes called a symmetric algorithm) is a cryptographic algorithm that uses the same key to encrypt and decrypt data. The best-known algorithm is the U.S. Department of Defense's Data Encryption Standard (DES). DES is a symmetric encryption scheme in which both the sender and the receiver need to know the secret key in order to communicate securely.

Q11.What is critical region?

(a) a part of the operating system which is not allowed to be accessed by any process
(b)a set of instructions that access common shared resources which exclude one another in time
(c)the portion of the main memory which can be accessed only by one process at a time
(d)a part of the operating system which allowed to be accessed by any process
(e)None of these

critical section is a set of instructions that access common shared resource which exclude one another in time. Critical section is primarily centered on the usage of global shared resources among the processes.

Q12.Which of the following is the feature of spiral software development model?

(a)Ends with the delivery of the software product
(b)Is more chaotic than the incremental model
(c)Includes project risks evaluation during each iteration
(d)All of the above
(e)None of these

The spiral model is a risk-driven process model generator for software projects. Based on the unique risk patterns of a given project, the spiral model guides a team to adopt elements of one or more process models, such as incremental, waterfall, or evolutionary prototyping.

Q13. The main objective of inheritance in OOPs is to-

(a) Decrease re-usability
(b) Hide complexity
(c) Implement polymorphism
(d) Increase re-usability
(e) None of the above

The most frequent use of inheritance is for deriving classes using existing classes, which provides reusability. The existing classes remain unchanged. By reusability, the development time of software is reduced. The derived classes extend the properties of base classes to generate more dominant objects.

Q14. .…………… operator is basically join followed by a projection on the attributes

(a) semi-join
(c) Join
(d) Projection
(e) None of these

In semi join, first we take the natural join of two relations then we project theattributes of first table only. So after join and matching the common attribute of bothrelations only attributes of first relation are projected.

Q15.Which keyword is used to prevent any changes in the variable within a C++ program?

(a) immutable
(b) mutable
(c) const
(d) volatile
(e) None of these

Constant is something that doesn't change. In C and C++ we use the keyword const to make program elements constant.