IBPS RRB SO IT Officer Scale-II is amongst the most reputed jobs in the Banking Sector. We will provide you with a quiz based on Information Technology which will cover topics like Networking, Information Security, DBMS, Data Structure, Programming, etc. Practice with the questions based on the most updated pattern. We already rolled the study plan for IBPS RRB MAINS 2019.
Q1. Which level of testing is evaluating the software/system compatibly with the business requirements?
(a) Integration testing
(b) System testing
(c) Acceptance testing
(d) Unit Testing
(e) Evaluation Testing
Sol. Acceptance testing (or User Acceptance Testing), is conducted to determine whether the system is ready for release. During the Software development life cycle, requirements changes can sometimes be misinterpreted in a fashion that does not meet the intended needs of the users. During this final phase, the user will test the system to find out whether the application meets their business’ needs. Once this process has been completed and the software has passed, the program will then be delivered to production.
Q2. What is UML (Uniform Modeling Language)?
(a) Designing technique
(b) Testing technique
(c) Maintenance technique
(d) Delivery Technique
(e) Debugging Technique
Sol. UML is a common language for business analysts, software architects and developers used to describe, specify, design, and document existing or new business processes, structure and behavior of artifacts of software systems. UML can be applied to diverse application domains (e.g., banking, finance, internet, aerospace, healthcare, etc.) It can be used with all major object and component software development methods and for various implementation platforms (e.g., J2EE, .NET).
Q3.Which of the following software development model is also referred as Linear Sequential Model?
(a) Spiral Model
(b) Iterative Model
(c) Waterfall Model
(d) Incremental Model
Sol. In the waterfall model (also known as the classical life cycle model), the development of software proceeds linearly and sequentially from requirement analysis to design, coding, testing, integration, implementation, and maintenance. Thus, this model is also known as the linear sequential model.
Q4.Which level of DFD is also called Context Diagram?
(a) DFD Level 0
(b) DFD Level 1
(c) DFD Level 2
(d) DFD Level 3
(e) DFD Level 4
Sol. DFD Level 0 is also called a Context Diagram. It’s a basic overview of the whole system or process being analyzed or modeled. It’s designed to be an at-a-glance view, showing the system as a single high-level process, with its relationship to external entities. It should be easily understood by a wide audience, including stakeholders, business analysts, data analysts and developers.
Q5.Which of the following algorithm technique is used in the quick sort?
(a) Dynamic algorithm
(b) Back tracking
(c) Divide and Conquer
(d) Greedy algorithm
(e) Traversal method
Sol. Quick sort used Divide and Conquer method. In this method divide problem into several smaller sub problems. Conquer the sub problems by solving them recursively. Combine the solutions to get a solution to the sub problems. Divide and Conquer algorithms are normally recursive.
Q6. Which of the following sorting algorithm has the worst time complexity [O(n log(n))]?
Sol. Heap sort is a comparison based sorting technique based on Binary Heap data structure. It is similar to selection sort where we first find the maximum element and place the maximum element at the end. We repeat the same process for remaining element. The worst time complexity of Heap sort is O[n log n].
Q7. In which phase of compiler design programs are converted into tokens?
(a) Syntax Analyzer
(b) Lexical Analyzer
(c) Semantic Analyzer
(d) Code optimizer
(e) Code Generator
Sol. Lexical analysis is the first phase of compiler which is also termed as scanning. Source program is scanned to read the stream of characters and those characters are grouped to form a sequence called lexemes which produces token as output. Token is a sequence of characters that represent lexical unit, which matches with the pattern, such as keywords, operators, identifiers etc. Once a token is generated the corresponding entry is made in the symbol table.
Q8.Which of the following password format is more secure?
Sol. A good password is made up of a number of different characteristics. For instance, it should be at least 6 – 8 characters long and should include at least two uppercase letters, lowercase letters, Symbols and numbers. As you mentioned, it shouldn’t be obvious. Definitely do not use your children’s names or pet’s names. For that matter, it shouldn’t even be a real word person, place or thing. Use random characters. The more random the sequence of characters, the more secure the password will be.
Q9.IP Address 188.8.131.52 belong to_____
(a) Class A
(b) Class B
(c) Class C
(d) Class D
(e) Class E
Sol. Range of Class B IP address 184.108.40.206 to 220.127.116.11
Q10.’REVOKE’ command is used in which category of SQL statement?
(e) None of these
Sol. DCL is used to create roles, permissions, and referential integrity as well it is used to control access to database by securing it. These SQL commands are used for providing security to database objects. These commands are GRANT and REVOKE.
GRANT to allow specified users to perform specified tasks.
REVOKE to cancel previously granted or denied permissions.
Q11.The key words-try, catch and finally, are typically used in the sequence in Java is
(a) try, catch, finally
(b) finally, try, catch
(c) catch, try, finally
(d) try, finally, catch
(e) None of these
Sol. When an exception occurs the execution of the program is transferred to an appropriate exception handler. The try-catch-finally block is used to handle the exception. The code in which the exception may occur is enclosed in a try block, also called as a guarded region. The catch clause matches a specific exception to a block of code which handles that exception. And the cleanup code which needs to be executed no matter the exception occurs or not is put inside the finally block
Q12.What is Aging in operating system?
(a) Keeping track of cache contents
(b) Keeping track of what pages are currently residing in the memory
(c) Keeping track of how many times a given page is referenced
(d) Increasing the priority of jobs to ensure termination in a finite time
(e) None of these
Sol. Aging is a scheduling technique used to avoid starvation. It is a technique of gradually increasing the priority of processes that wait in the system for a long time.
Q13.HTML tags are used to describe document ___________.
Q14._______ is passed to a method by use of call-by-reference.
Q15.In Java, each thread has its own ________, in which it runs?
(a) main() method
(c) Call stack
Sol. Thread of execution means an individual ‘lightweight’ process that has its own call stack. In java each thread has its own call stack.
Check out more Computer Knowledge Videos Here