IBPS RRB SO IT Professional Knowledge Quiz: 18th September

IBPS RRB SO IT Officer Scale-II is amongst the most reputed jobs in the Banking Sector. We will provide you with a quiz based on Information Technology which will cover topics like Networking, Information Security, DBMS, Data Structure, Programming, etc. Practice with the questions based on the most updated pattern. We already rolled the study plan for IBPS RRB MAINS 2019

Q1. Which of the following is an online cloud storage service from Microsoft?
(a) MicroDrive
(b) OneDrive
(c) CloudDrive
(d) WindowsDrive
(e) None of these

S1. Ans.(b)
Sol. OneDrive integrates with Microsoft Office so users can access Word, Excel and PowerPoint documents in OneDrive. The system allows users to simultaneously edit Office documents, edit documents in browsers, and create and share folders.

About Course:

"Did you Know? In this pack you will get All new content we launch in the next 1 months"
 

This is the most recommended and NRA-CET ready Pack!
 
Use Code 'DREAM' to avail at the best price today

This package Includes IBPS PO Study Material -  Subscribe Now

About Bank Mahapack
If you are preparing for more than 1 Banking & Insurance exams then this is the pack we recommend you buy.

It is most cost-effective and you get access to 100% digital content for Bank & Insurance exams on Adda247.

Banking & Insurance Exams Covered in this Pack

Additionally, you can crack any private bank job exam with content in this pack.

 

Bank & Insurance Mahapack Highlights 

  • Structured course content
  • Recorded classes available if you miss any live class
  • Previous Years’ Papers of all upcoming exams.
  • Full Length Mocks based on the latest pattern with detailed solutions (video solutions for certain topics)
  • Topic level knowledge tests
  • Strategy sessions, time management & Preparation tips from the experts

 

Validity: 1 Month

Bank Maha Pack
  1. Unlimited Live Classes & Recorded Video Courses
  2. Unlimited Tests and eBooks
  3. 1 Lakh+ Selections
Validity
  1. 15 Months
  2. 9 Months
  3. 3 Months
  4. 27 Months
  5. 1 Month
6799 453/month
BUY NOW

Q2. What is the purpose of the CRC in network communications?
(a) Request retransmission of lost packets
(b) Reassemble packets into their original order
(c) Detect lost data packets
(d) Slow down or speed up data transmission
(e) Detect data errors

S2. Ans.(e)
Sol. The Cyclical Redundancy Check (CRC) is a mathematical calculation added to each frame. Its purpose is to detect when a frame arrives that has been corrupted. The sending device calculates the CRC and adds it to the frame. The receiving device calculates the CRC when the frame is received. If the CRCs do not match, the frame has been corrupted or altered. The most common method of correcting errors is to request retransmission of the original frame.

Q3. What is BGP in networking?
(a) Balanced Gateway Protocol
(b) Border Gateway Protocol
(c) Broadband Gateway Protocol
(d) Balanced Goal Protocol
(e) Balanced Gate Protocol

S3. Ans.(b)
Sol. Border Gateway Protocol (BGP) is a routing protocol used to transfer data and information between different host gateways, the Internet or autonomous systems. BGP is a Path Vector Protocol (PVP), which maintains paths to different hosts, networks and gateway routers and determines the routing decision based on that.

Q4. Default subnet mask of Class C IP address is:
(a) 255.255.0.0
(b) 255.255.255.0
(c) 255.255.255.255
(d) 255.0.255.0
(e) None of these

S4. Ans.(b)
Sol. A Subnet mask is a 32-bit number that masks an IP address, and divides the IP address into network address and host address. Default subnet mask of Class C IP address is 255.255.255.0

Q5. What is WiMAX?
(a) Wireless maximum communication
(b) Worldwide interoperability for microwave access
(c) Worldwide international standard for microwave access
(d) Wireless internet maximum access
(e) Wireless interoperability maximum communication

S5. Ans.(b)
Sol. WiMAX (Worldwide Interoperability for Microwave Access) is a wireless industry coalition dedicated to the advancement of IEEE 802.16 standards for broadband wireless access (BWA) networks.

Q6. In which type of cryptography same key is used as encryption and decryption?
(a) Symmetric cryptography
(b) Asymmetric cryptography
(c) Key cryptography
(d) Encryption cryptography
(e) None of these

S6. Ans.(a)
Sol. In symmetric key cryptography, same key is shared, i.e. the same key is used in both encryption and decryption.

Q7.What is Kerberos in networking?
(a) Authentication Protocol
(b) Routing Protocol
(c) Flow Control Protocol
(d) Error Control Protocol
(e) Both (c) and (d)

S7. Ans.(a)
Sol. Kerberos is a network authentication protocol that is designed to provide strong authentication for client/server applications using secret-key cryptography.

Q8.Deadlocks are possible only when one of the transactions wants to obtain a(n) ____ lock on a data item.
(a) binary
(b) exclusive
(c) shared
(d) complete
(e) None of these

S8. Ans.(b)
Sol. When a statement modifies data, its transaction holds an exclusive lock on data that prevents other transactions from accessing the data.

Q9.How can you change “Singh” into “Gupta” in the “LastName” column in the Persons table?
(a) MODIFY Persons SET LastName=’Singh’ INTO LastName=’Gupta’
(b) MODIFY Persons SET LastName=’Gupta’ WHERE LastName=’Singh’
(c) UPDATE Persons SET LastName=’Singh’ INTO LastName=’Gupta’
(d) UPDATE Persons SET LastName=’Gupta’ WHERE LastName=’Singh’
(e) CREATE Person SET LastName=’Gupta’ WHERE LastName=’Singh’

S9. Ans.(d)
Sol. The UPDATE statement is used to modify the existing records in a table.
Syntax:
UPDATE table_name
SET column1 = value1, column2 = value2, …
WHERE condition;

Q10.Which of the following is not an antivirus?
(a) Bitdefender
(b) Kaspersky
(c) Cobian
(d) F-secure
(e) Avira

S10. Ans.(c)
Sol. Cobian Backup is a freeware for Windows that enables the users to back up files and directories from the existing location and can be done on the same computer or within the same network.

Q11.Which of the following is the combination of public and private cloud?
(a) Business cloud
(b) Space cloud
(c) Rackspace cloud
(d) Hybrid cloud
(e) Commodity cloud

S11. Ans.(d)
Sol. Hybrid clouds combine public and private clouds, bound together by technology that allows data and applications to be shared between them. By allowing data and applications to move between private and public clouds, hybrid cloud gives businesses greater flexibility and more deployment options.

Q12. In which debugging technique, when an error has occurred, one needs to start tracing the program backward one step at a time evaluating the values of all variables until the cause of error is found?
(a) Cause Elimination
(b) Program Slicing
(c) Backtracking
(d) Brute Force Method
(e) None of these

S12. Ans. (c)
Sol. In Backtracking method, beginning from the statement at which an error symptom has been observed, the source code is traced backwards until the error is discovered. Unfortunately, as the number of source lines to be traced back increases, the number of potential backward paths increases and may become unmanageably large thus limiting the use of this approach.

Q13.Which of the following maintenance strategies involves performing maintenance before problems occur to avoid breakdowns and disruptions?
(a) Perfective Maintenance
(b) Corrective Maintenance
(c) Adaptive Maintenance
(d) Preventive Maintenance
(e) Breakdown Maintenance

S13. Ans. (d)
Sol. Preventive maintenance refers to regular, routine maintenance to help keep equipment up and running, preventing any unplanned downtime and expensive costs from unanticipated equipment failure. It requires careful planning and scheduling of maintenance on equipment before there is an actual problem as well as keeping accurate records of past inspections and servicing reports.

Q14.Which of the following malicious software that can change its code and signature patterns with each iteration?
(a) Keylogger
(b) Mutation Engine
(c) Morris worm
(d) Metamorphic Virus
(e) Stealth Virus

S14. Ans.(d)
Sol. A metamorphic virus is one that can transform based on the ability to translate, edit and rewrite its own code. It is considered the most infectious computer virus, and it can do serious damage to a system if it isn’t detected quickly.

Q15.In which type of SQL join returns all the rows from left table combine with the matching rows of the right table
(a) Inner join
(b) Left outer join
(c) Right outer join
(d) Full join
(e) Self join

S15. Ans.(b)
Sol. The LEFT JOIN keyword returns all records from the left table, and the matched records from the right table. The result is NULL from the right side, if there is no match.
Syntax:
SELECT column_name(s)
FROM table1
LEFT JOIN table2 ON table1.column_name = table2.column_name;

          Check out more Computer Knowledge Videos Here

You may also like to Read: