IBPS RRB SO IT Officer Scale-II is amongst the most reputed jobs in the Banking Sector. We will provide you with a quiz based on Information Technology which will cover topics like Networking, Information Security, DBMS, Data Structure, Programming, etc. Practice with the questions based on the most updated pattern. We already rolled the study plan for IBPS RRB MAINS 2019.
Q1. Which of the following is an online cloud storage service from Microsoft?
(e) None of these
Sol. OneDrive integrates with Microsoft Office so users can access Word, Excel and PowerPoint documents in OneDrive. The system allows users to simultaneously edit Office documents, edit documents in browsers, and create and share folders.
"Did you Know? In this pack you will get All new content we launch in the next 1 months"
Use Code 'DREAM' to avail at the best price today
This package Includes IBPS PO Study Material - Subscribe Now
If you are preparing for more than 1 Banking & Insurance exams then this is the pack we recommend you buy.
Banking & Insurance Exams Covered in this Pack
Additionally, you can crack any private bank job exam with content in this pack.
Bank & Insurance Mahapack Highlights
- Structured course content
- Recorded classes available if you miss any live class
- Previous Years’ Papers of all upcoming exams.
- Topic level knowledge tests
- Strategy sessions, time management & Preparation tips from the experts
Validity: 1 Month
- Unlimited Live Classes & Recorded Video Courses
- Unlimited Tests and eBooks
- 1 Lakh+ Selections
- 15 Months
- 9 Months
- 3 Months
- 27 Months
- 1 Month
Q2. What is the purpose of the CRC in network communications?
(a) Request retransmission of lost packets
(b) Reassemble packets into their original order
(c) Detect lost data packets
(d) Slow down or speed up data transmission
(e) Detect data errors
Sol. The Cyclical Redundancy Check (CRC) is a mathematical calculation added to each frame. Its purpose is to detect when a frame arrives that has been corrupted. The sending device calculates the CRC and adds it to the frame. The receiving device calculates the CRC when the frame is received. If the CRCs do not match, the frame has been corrupted or altered. The most common method of correcting errors is to request retransmission of the original frame.
Q3. What is BGP in networking?
(a) Balanced Gateway Protocol
(b) Border Gateway Protocol
(c) Broadband Gateway Protocol
(d) Balanced Goal Protocol
(e) Balanced Gate Protocol
Sol. Border Gateway Protocol (BGP) is a routing protocol used to transfer data and information between different host gateways, the Internet or autonomous systems. BGP is a Path Vector Protocol (PVP), which maintains paths to different hosts, networks and gateway routers and determines the routing decision based on that.
Q4. Default subnet mask of Class C IP address is:
(e) None of these
Sol. A Subnet mask is a 32-bit number that masks an IP address, and divides the IP address into network address and host address. Default subnet mask of Class C IP address is 255.255.255.0
Q5. What is WiMAX?
(a) Wireless maximum communication
(b) Worldwide interoperability for microwave access
(c) Worldwide international standard for microwave access
(d) Wireless internet maximum access
(e) Wireless interoperability maximum communication
Sol. WiMAX (Worldwide Interoperability for Microwave Access) is a wireless industry coalition dedicated to the advancement of IEEE 802.16 standards for broadband wireless access (BWA) networks.
Q6. In which type of cryptography same key is used as encryption and decryption?
(a) Symmetric cryptography
(b) Asymmetric cryptography
(c) Key cryptography
(d) Encryption cryptography
(e) None of these
Sol. In symmetric key cryptography, same key is shared, i.e. the same key is used in both encryption and decryption.
Q7.What is Kerberos in networking?
(a) Authentication Protocol
(b) Routing Protocol
(c) Flow Control Protocol
(d) Error Control Protocol
(e) Both (c) and (d)
Sol. Kerberos is a network authentication protocol that is designed to provide strong authentication for client/server applications using secret-key cryptography.
Q8.Deadlocks are possible only when one of the transactions wants to obtain a(n) ____ lock on a data item.
(e) None of these
Sol. When a statement modifies data, its transaction holds an exclusive lock on data that prevents other transactions from accessing the data.
Q9.How can you change “Singh” into “Gupta” in the “LastName” column in the Persons table?
(a) MODIFY Persons SET LastName=’Singh’ INTO LastName=’Gupta’
(b) MODIFY Persons SET LastName=’Gupta’ WHERE LastName=’Singh’
(c) UPDATE Persons SET LastName=’Singh’ INTO LastName=’Gupta’
(d) UPDATE Persons SET LastName=’Gupta’ WHERE LastName=’Singh’
(e) CREATE Person SET LastName=’Gupta’ WHERE LastName=’Singh’
Sol. The UPDATE statement is used to modify the existing records in a table.
SET column1 = value1, column2 = value2, …
Q10.Which of the following is not an antivirus?
Sol. Cobian Backup is a freeware for Windows that enables the users to back up files and directories from the existing location and can be done on the same computer or within the same network.
Q11.Which of the following is the combination of public and private cloud?
(a) Business cloud
(b) Space cloud
(c) Rackspace cloud
(d) Hybrid cloud
(e) Commodity cloud
Sol. Hybrid clouds combine public and private clouds, bound together by technology that allows data and applications to be shared between them. By allowing data and applications to move between private and public clouds, hybrid cloud gives businesses greater flexibility and more deployment options.
Q12. In which debugging technique, when an error has occurred, one needs to start tracing the program backward one step at a time evaluating the values of all variables until the cause of error is found?
(a) Cause Elimination
(b) Program Slicing
(d) Brute Force Method
(e) None of these
S12. Ans. (c)
Sol. In Backtracking method, beginning from the statement at which an error symptom has been observed, the source code is traced backwards until the error is discovered. Unfortunately, as the number of source lines to be traced back increases, the number of potential backward paths increases and may become unmanageably large thus limiting the use of this approach.
Q13.Which of the following maintenance strategies involves performing maintenance before problems occur to avoid breakdowns and disruptions?
(a) Perfective Maintenance
(b) Corrective Maintenance
(c) Adaptive Maintenance
(d) Preventive Maintenance
(e) Breakdown Maintenance
S13. Ans. (d)
Sol. Preventive maintenance refers to regular, routine maintenance to help keep equipment up and running, preventing any unplanned downtime and expensive costs from unanticipated equipment failure. It requires careful planning and scheduling of maintenance on equipment before there is an actual problem as well as keeping accurate records of past inspections and servicing reports.
Q14.Which of the following malicious software that can change its code and signature patterns with each iteration?
(b) Mutation Engine
(c) Morris worm
(d) Metamorphic Virus
(e) Stealth Virus
Sol. A metamorphic virus is one that can transform based on the ability to translate, edit and rewrite its own code. It is considered the most infectious computer virus, and it can do serious damage to a system if it isn’t detected quickly.
Q15.In which type of SQL join returns all the rows from left table combine with the matching rows of the right table
(a) Inner join
(b) Left outer join
(c) Right outer join
(d) Full join
(e) Self join
Sol. The LEFT JOIN keyword returns all records from the left table, and the matched records from the right table. The result is NULL from the right side, if there is no match.
LEFT JOIN table2 ON table1.column_name = table2.column_name;
Check out more Computer Knowledge Videos Here