IBPS RRB SO IT Professional Knowledge Quiz: 2nd September

| Updated On September 6th, 2019 at 03:54 pm

Dear Aspirants,

ibps-rrb-professional-knowledge-quiz

About Course:

"Did you Know? In this pack you will get All new content we launch in the next 1 months"
 

This is the most recommended and NRA-CET ready Pack!
 
Use Code 'DREAM' to avail at the best price today

This package Includes IBPS PO Study Material -  Subscribe Now

About Bank Mahapack
If you are preparing for more than 1 Banking & Insurance exams then this is the pack we recommend you buy.

It is most cost-effective and you get access to 100% digital content for Bank & Insurance exams on Adda247.

Banking & Insurance Exams Covered in this Pack

Additionally, you can crack any private bank job exam with content in this pack.

 

Bank & Insurance Mahapack Highlights 

  • Structured course content
  • Recorded classes available if you miss any live class
  • Previous Years’ Papers of all upcoming exams.
  • Full Length Mocks based on the latest pattern with detailed solutions (video solutions for certain topics)
  • Topic level knowledge tests
  • Strategy sessions, time management & Preparation tips from the experts

 

Validity: 1 Month

Bank Maha Pack
  1. Unlimited Live Classes & Recorded Video Courses
  2. Unlimited Tests and eBooks
  3. 1 Lakh+ Selections
Validity
  1. 15 Months
  2. 3 Months
  3. 9 Months
  4. 27 Months
  5. 1 Month
8449 563/month
BUY NOW

IBPS RRB SO IT Professional Quiz

IBPS RRB SO IT Officer Scale-II is amongst the most reputed jobs in the Banking Sector. We will provide you with a quiz based on Information Technology which will cover topics like Networking, Information Security, DBMS, Data Structure, Programming, etc. Practice with the questions based on the most updated pattern. We already rolled the study plan for IBPS RRB MAINS 2019


Q1. CISC stands for:

(a) Complete Instruction Set Computer

(b) Complex Introduction Set Computer

(c) Complete Instruction Serial Computer

(d) Complex Instruction Set Computer

(e) Complete Instruction Set Compiler

S1. Ans.(d)

Sol. 

CISC (complex instruction set computer) has the ability to execute addressing modes or multi-step operations within one instruction set. It is the design of the CPU where one instruction performs many low-level operations.

Q2. Which of the following is the example of “SaaS” cloud computing service?

(a) Amazon Web Services(AWS)

(b) Microsoft Azure

(c) Google Apps

(d) Apprenda

(e) Google Compute Engine

S2. Ans.(c)

Sol. 

Software-as-a-service (SaaS) is a method for delivering software applications over the Internet, on-demand and typically on a subscription basis. With SaaS, cloud providers host and manage the software application and underlying infrastructure and handle any maintenance, like software upgrades and security patching. Users connect to the application over the Internet, usually with a web browser on their phone, tablet or PC.

Google Apps is a very good example of SaaS. Google Apps consists of services like Gmail, Drive, Docs, and Photos. Free users get free access to these services along with 15 GB of Drive storage.

Q3. SELECT * FROM employee WHERE dept_name=”CompSci”;

In the SQL given above, there is an error. Identify the error.

(a) Dept_name

(b) Employee

(c) “CompSci”

(d) From

(e) No Error

S3. Ans.(c)

Sol. 

For any string operations, single-quoted (‘) must be used to enclose.

Q4. What is the output of this program?

    class main_class {

        public static void main(String args[])

        {

            int a = 6;

            if (a == 6) { 

                int a = 5;

                System.out.println(a);

            }

        } 

    }

(a)6

(b)5

(c)11

(d)Compiler error

(e)Runtime error

S4. Ans.(d)

Sol.

Two variables with the same name can’t be created in a class. compiler error generates.

Q5. Which of the following is not a DDL command?

(a) CREATE

(b) ALTER

(c) DROP

(d) UPDATE

(e) TRUNCATE

S5. Ans.(d)

Sol.

DDL (Data Definition Language) commands are used for creating, modifying, and dropping the structure of database objects. The commands are CREATE, ALTER, DROP, RENAME, and TRUNCATE.

UPDATE is a DML (Data Manipulation Language) command.

Q6. Which of the following is the correct syntax for java main method?

(a) public void main(String[] args)

(b) public static void main(string[] args)

(c) public static void(string args)

(d) public static void main(String[] args)

(e) public void main(String args)

S6. Ans.(d)

Q7. Ethernet uses how many bit/byte physical address, that is imprinted on the network interface card?

(a) 64 bit

(b) 64 byte

(c) 6 bit

(d) 6 byte

(e) 32 bit

S7. Ans.(d) 

Sol.

Ethernet uses a  6 -byte (48-bit) physical address that is imprinted on the network interface card (NIC). The physical address also known as the link address is the address of a node physical address, also known as the link address, is the address of a node as defined by its LAN or WAN. It is included in the frame used by the data link layer.

Q8.DNS is defining at which layer of TCP/IP model?

(a) Internet layer

(b) Datalink layer

(c) Transport layer

(d) Application layer

(e) Both (a) and (c)

S8. Ans.(d)

Sol.

One of the most important components of the application layer is the Domain Name System (DNS) server. DNS is a distributed hierarchical and global directory that translates machine or domain names to numerical IP addresses. DNS can run over either UDP or TCP.

Q9. Three-way handshake method used in which of the following?

(a) Connection establishment

(b) Connection termination

(c) Connection release

(d) Pathfinding

(e) packet forwarding

S9. Ans.(a) 

Sol.

A three-way handshake is a method used in a TCP/IP network to create a connection between a local host/client and server. It is a three-step method that requires both the client and server to exchange SYN and ACK (acknowledgment) packets before actual data communication begins.

A three-way handshake is also known as a TCP handshake.

Q10. Which type of security attack occurs, when a malicious actor inserts himself as a relay/proxy into a communication session between people or systems?

(a) Compromised key attack

(b) Sniffer Attack

(c) Man-in-the-Middle attack

(d) Denial-of-service attack

(e) Eavesdropping

S10. Ans.(c)

Sol. 

A man-in-the-middle attack is a type of cyberattack where a malicious actor inserts him/herself into a conversation between two parties, impersonates both parties and gains access to information that the two parties were trying to send to each other. A man-in-the-middle attack allows a malicious actor to intercept, send and receive data meant for someone else, or not meant to be sent at all, without either outside party knowing until it is too late.

Q11. What is the use of “touch” command in Linux?

(a) create a file

(b) remove a file

(c) Show the manual page

(d) Showhome directory

(e) Copy files

S11. Ans.(a)

Sol. 

The touch command is used to create a file. It can be anything, from an empty txt file to an empty zip file.

Q12.What is SGML?

(a) Standard generalized making loop

(b) Special generalized markup language

(c) Standard general markup language

(d) Short generalized markup language

(e) Standard generalized markup language

S12. Ans.(e)

Sol. 

SGML (Standard Generalized Markup Language) is a standard for how to specify a document markup language or tag set. Such a specification is itself a document type definition (DTD). SGML is not in itself a document language, but a description of how to specify one.

Q13.In ring topology data are transmitted in which form?

(a) Datagram

(b) Packet

(c) Segments

(d) Frame

(e) Token

S13. Ans.(e)

Sol.

In a Ring topology, every device/node is connected to exactly two other nodes one on either side of it in a closed-loop fashion. All messages travel through the ring either in a clockwise direction or an anti-clockwise direction. Ring topology is very rarely used today because they are expensive, difficult to install and manage. A failure in any single connection disrupts the ring topology thus also making ring topology a rare choice for network topologies. In ring topology data are transmitted in form of ring.

Q14.Which of the following is the process of logically and/or physically partitioning data into segments that are more easily maintained or accessed in database?

(a) Data Hiding

(b) Data Partitioning

(c) Data Clustering

(d) Data Mirroring

(e) Data Shadowing

S14. Ans.(b)

Sol.

Partitioning is the database process where very large tables are divided into multiple smaller parts. By splitting a large table into smaller, individual tables, queries that access only a fraction of the data can run faster because there is less data to scan.

Q15.Which of the following is the time interval between the submission and completion of job?

(a) Waiting time

(b) Turnaround time

(c) Throughput

(d) Response time

(e) Seek time

S15. Ans.(b)

Sol.

Turnaround time is the time interval from the time of submission of a process to the time of the completion of the process.