IBPS RRB SO IT Officer Scale-II is amongst the most reputed jobs in the Banking Sector. We will provide you with a quiz based on Information Technology which will cover topics like Networking, Information Security, DBMS, Data Structure, Programming, etc. Practice with the questions based on the most updated pattern. We already rolled the study plan forIBPS RRB MAINS 2019.
Q1. Partial dependency is removed in which normal form of normalization?
(e) None of these
Second normal form eliminates partial dependencies. The database is said to be in 2NF (Second Normal Form) if the following conditions are satisfied.
(i)-Should be in first normal form.
(ii)-Partial dependencies are removed, i.e., all non-key attributes are fully functional dependent on the primary key. In other words, non-key attributes cannot depend on a subset of the primary key.
Q2. Which SQL function returns the total sum of a numeric column?
(e)None of these
The SUM() function returns the total sum of a numeric column.
Q3.Which of the following is true about composite attributes?
(a)Composite attribute are those attributes which cannot be further divided into other attributes
(b)Composite attribute are those attributes which can further be divided into other attributes
(c)Composite attribute are those attributes which are essentially the primary keys of the relation
(d)All are true about composite attributes
(e)None is true
S3. Ans.(b) Sol.
Composite attribute can be further divided into more attributes.
Q4. Which operator is used to project particular columns from a relation?
(a)Projection Operator (∏)
(b)Selection operator (σ)
(e)None of these
Projection operator is used to project particular columns from a relation.
∏(Column 1,Column 2….Column n)(Relation Name)
Q5.Relationship in E-R diagram is represented by which of the following?
(a) Rectangle box
(c) Diamond shape
(d) Double Ellipse
(e) None of the above
Relationships are represented by diamond-shaped box. Name of the relationship is written inside the diamond-box.
Q6.Which clause is used to extract only those records that fulfill a specified condition?
The WHERE clause is used to filter records. The WHERE clause is used to extract only those records that fulfill a specified condition.
SELECT column1, column2, …
Q7.Which of the following is used to remove all records from a table, including all spaces allocated for the records are removed?
TRUNCATE is used to remove all records from a table, including all spaces allocated for the records are removed.
Q8. Which of the following is not a TCL(transaction Control Language) command?
REVOKE is DCL(Data Control Language) command. DCL includes commands such as GRANT and REVOKE which mainly deals with the rights, permissions and other controls of the database system.
Q9. Which of the following is the correct syntax of UPDATE Command?
(a) UPDATE table_name where condition SET column_name = <value>
(b) UPDATE table_name SET column_name = <value> WHERE <condition>
(c) UPDATE table table_name set column_name = <value> WHERE <condition>
(d) UPDATE IN table_name WHERE condition set column_name = <value>
(e) UPDATE IN table_name LIKE condition set column_nam =<value>
Q10.The following SQL Query is which type of join:
SELECT * from Employ, Employe_info where Employe.id = Employe_info.id
(a) Inner Join
(b) Natural Join
(c) Cross Join
(d) Outer Join
(e) Left Outer Join
The INNER JOIN selects all rows from both participating tables as long as there is a match between the columns. An SQL INNER JOIN is same as JOIN clause, combining rows from two or more tables.
Q11. Which of the following is not an application layer protocol?
ICMP is a network layer protocol. ICMP (Internet Control Message Protocol) is an error-reporting protocol network devices like routers use to generate error messages to the source IP address when network problems prevent delivery of IP packets.
Q12.Proxy firewall works on which layer
(a) Application layer
(b) network layer
(c) transport layer
(d) datalink layer
(e) none of these
A proxy firewall is a network security system that protects network resources by filtering messages at the application layer. A proxy firewall may also be called an application firewall or gateway firewall.
Q13.What is the default subnet mask for a class B network?
(e) None of these
Subnet Masks are used to divide a given network in to 2 or more subnets. Default subnet mask of class B network is: 255.255.0.0.
Q14. A web client sends a request to a web server. The web server transmits a program to that client as is executed at client. It creates a web document. What are such web documents called?
(e) None of these
Active web document consists of a software program sent by a server to interact with the client and answer the query of the client.
Q15. Which protocol will be used to automate the IP configuration mechanism which includes IP address, subnet mask, default gateway, and DNS information?
S15. Ans.(b) Sol.
DHCP (Dynamic Host Configuration Protocol) is a network management protocol used to dynamically assign an Internet Protocol (IP) address to any device, or node, on a network so they can communicate using IP.
Bankersadda is India’s Leading and most trusted website for Banking Jobs. The portal has complete information about all Banking and Insurance Jobs, its latest notifications, from all state and national level jobs, and updates.