IBPS RRB Officer Scale-II is amongst the most reputed jobs in the Banking Sector and many Aspirants work hard to get this job. The exam for this post consists of various subjects other than the common subjects in Bank exams. Here we are providing you with a quiz based on Information Technology which will cover topics like Networking, Computer Software and Hardware, Computer Security, DBMS, Computer Organisation etc. Practice with the questions based on the most updated pattern.
Q1. Congestion Control is done by which layer.
Data link layer
Network layer
Transport layer
Application layer
None of the above
Solution:
congestion is a state occurring in network layer when the message traffic is so heavy that it slows down network response time. Congestion control is done by network layer by Leaky Bucket Algorithm and Token bucket Algorithm.
Q2. What is the amount of time takes for the desired sector of a disk to rotate under the read-write heads of the disk drive?
Positioning time
Random access time
Seek time
Rotational latency
None of these
Solution:
A rotational delay or rotational latency is the amount of time between information requests and how long it takes the hard drive to move to the sector where the requested data is located.
Q3. Which is focused towards the goal of the organization?
Feasibility study
Requirement gathering
Software requirement specification
Software requirement validation
None of these
Solution:
Feasibility study is basically the test of the proposed system in the light of its workability, meeting user’s requirement, effective use of resources and the cost effectiveness. These are categorized as technical, operational, economic, schedule and social feasibility. The main goal of feasibility study is to achieve scope.
Q4. ________ has many of the characteristics of what is now being called cloud computing.
Internet
Software
Web Service
All of the mentioned
WiFi
Solution:
The Internet offers abstraction, runs using the same set of protocols and standards, and uses the same applications and operating systems.
Q5. In a virtual memory system, the addresses used by the programmer belongs to
Memory space.
Physical addresses.
Address space.
Main memory address.
None of these
Solution:
An address used by programmers in a system supporting virtual memory concept is called virtual address and the set of such addresses are called address space.
Q6. What are the 3 principles of information security?
Authentication, Availability, Accessibility
Confidentiality, Integrity, Availability,
Integrity, Authentication, Confidentiality
Availability, Security, Encryption
None of these
Solution:
A principle which is a core requirement of information security for the safe utilization, flow, and storage of information is the CIA triad. CIA stands for confidentiality, integrity, and availability and these are the three main objectives of information security.
Q7. Ethernet uses a _____________ physical address that is imprinted on the network interface card.
64 bit
68 byte
6 bit
6 byte
32 bit
Solution:
Ethernet uses a 6 -byte (48-bit) physical address that is imprinted on the network interface card (NIC). The physical address also known as the link address is the address of a node physical address, also known as the link address, is the address of a node as defined by its LAN or WAN. It is included in the frame used by the data link layer.
Q8. __________ is backing up data by making a copy of the database and it maintain by local or remote computer.
Data Shadowing
Data Mirroring
Both (a) and (b)
Data Isolation
None of these
Solution:
In Data backup technique an identical copy of a firm’s database is maintained on a local or remote computer. The primary database and its shadow are so linked via cable, telephone line, or wireless that any change in the former is instantly reflected in the latter. It is also called data mirroring.
Q9. Which Wi-Fi security is impossible to crack?
WEP
WPA
MAC filtering
WPA2
None of these
Solution:
No wireless security system is impossible to crack but MAC Filtering is the hardest. By employing MAC Filtering the administrator of a Wi-Fi network can limit the access to the network to only those devices whose MAC addresses have been entered into the router. While this is a very hard security protocol to crack MAC addresses can be spoofed and a system can then be tricked into allowing access to an unauthorized user so it is advisable to run both MAC filtering and WPA2 protocol.
Q10. Which of these keywords can be used to prevent Method overriding?
Static
Constant
Protected
Final
None of these
Solution:
To disallow a method from being overridden, specify final as a modifier at the start of its declaration. Methods declared as final cannot be overridden.
Q11. A system is in a ______ state if there exists a set of transactions such that every transaction in the set is waiting for another transaction in the set.
Idle
Waiting
Deadlock
Ready
None of the above
Solution:
when one data item is waiting for another data item in a transaction then system is in deadlock.
Q12. Which of the following are shows by using ER diagram?
Attributes of the Entities
Entities of the database
Relationship between the entities
all of the above
None of these
Solution:
the entity-relationship model (or ER model) is a way of graphically representing the logical relationships of entities (or objects) in order to create a database. ER diagram contain entity, attributes and relationship between the entities.
Q13. Which of them take care of email at client side?
POP
MAP
IMAP
Both (a) and (c)
None of the mentioned
Solution:
POP is short for Post Office Protocol, a protocol used to retrieve e-mail from a mail server. Most e-mail applications (sometimes called an e-mail client) use the POP protocol, although some can use the newer IMAP (Internet Message Access Protocol). "IMAP" stands for "Internet Message Access Protocol." It is better than POP for accessing mail from multiple locations because it leaves the mail messages on the mail server. This lets you read the same messages regardless of what computer you use to read your e-mail.
Q14. Which of the following is sued to transfer data intended for a peripheral device into a disk so that it can be transmitted to the peripheral device at a more suitable time or in bulk?
Virtual programming
Multi programming
Caching
Multitasking
Spooling
Solution:
Spooling is a technique to hold data temporarily in the computer memory and provide to devices when they need it. The temporary holding area of the memory is sometimes referred to as the buffer. One common example of spooling is printing, where files are stored in the buffer and sent to the printer when it is ready.
Q15. Which of the following is not one of the 3 general components of the Unix operating system?
the kernel
the shell
the GUI
the file system
None of these
Solution:
the UNIX operating system is made up of three parts; the kernel, the shell, and the file system.
- https://www.bankersadda.com/2018/09/ibps-rrb-it-officer-professional-10.html
No comments:
Post a Comment