Monday, 11 January 2016

Computer Professional knowledge quiz for upcoming IBPS(SO) I.T.officer exam 2016

Computer Professional knowledge quiz for upcoming IBPS(SO) I.T.officer exam 2016
 
1. A……………is an acyclic diagraph, which has only node with in-degree 0, and other nodes have indegree 1. 

(1) Dis-joint tree
(2) Direction oriented tree
(3) directed tree
(4) Diagonalised tree
(5) Undirected tree

2. The UML designation for a public class member is
(1) the symbol @
(2) the symbol #
(3) the minus symbol (-)
(4) the plus symbol (+)
(5) the word public
 
3. Every host computer on the internet has a(n)
(1) similar IP address
(2) unique 10-digit number
(3) common name and number
(4) unique IP address
(5) unique 15-digit number

4. Built-in functions provided by SQL are?
(1) SUM, AVG, MIN, MAX, NAME
(2) MIN, MAX, MULT, DIV, NAME
(3) SUM, AVG, MULT, DIV, MIN
(4) SUM, AVG, MIN, MAX , MULT
(5) COUNT, SUM, AVT, MAX, MIN

5. Which of the following is true regarding Common Gateway Interface (CGI)?
(1) An interface that accepts and returns data that may be written in SQL.
(2) A small program that excutes within other application and is stored on the server.
(3) A small program that excutes within other application and is stored on the client.
(4) A small program that executes within other application and is stored on the client or the server.
(5) An interface that accepts and returns data that may be written in any language that produces executable file.

6. Which of the following wildcard masks is most useful for matching all IP packets in subnet 10.1.128.0, mask 255.255.255.0?

(1) 0.0.0.0
(2) 0.0.0.255
(3) 0.0.0.240
(4) 0.0.0.31
(5) 0.0.15.0

7. What is the full form of DLCI?
(1) Data Link Circuit Identifier
(2) Data Link Connection Interrupt
(3) Data Link Connection Indicator
(4) Data Link Circuit Indicator
(5) Data Link Connection Identifier

8. Which of the following is used to create and delete views and relations within tables?
(1) SQL Data Identification Language
(2) SQL Data Identification and Manipulation Languages
(3) SQL Data Relational Language
(4) SQL Data Definition Language
(5) SQL Data Manipulation Language

9. What is the result of a SQL SELECT statement called?
(1) report
(2) file
(3) page
(4) table
(5) form

10. Which of the following is true for a CASE SQL statement?

(1) CASE SQL statement a way to establish a data definition in SQL or establish a loop in SQL
(2) CASE SQL statement a way to establish an IF-THEN-ELSE in SQL
(3) CASE SQL statement a way to establish a loop in SQL
(4) CASE SQL statement a way to establish a data definition in SQL
(5) Establish a loop in SQL and establish an IF-THEN-ELSE in SQL
 
 
11. Which one of the following computer language is not the procedure-oriented language?
(1) C-language
(2) FORTRAN
(3) COBOL
(4) Simula
(5) None of these
 
12. ‘TELNET’ is
(1) running complex programs by logging on to supercomputers belonging to other countries
(2) a telephone call made by the help of Internet
(3) a software to perfect viral attack
(4) All of the above
(5) None of the above

13. Which one of the following internet protocol version is the most deployed internet layer protocol?
(1) IPv2
(2) IPv4
(3) IPv6
(4) IPv8
(5) None of these

14. Which one of the following malware is used in the Internet Relay chart channel or other chart system to coordinate the activity of many infected computer?
(1) Keyloggers
(2) Adwares
(3) Dialers
(4) Botnets
(5) None of these

15. Which one of the following rebooting commonly occurs when the system of computer is crashed?
(1) Soft rebooting
(2) Cold rebooting
(3) Hard rebooting
(4) Random rebooting
(5) None of the above

16. Which one of the following computers is the world’s first commercial computer?
(1) Ferranti Mar-I
(2) Mark-I Star
(3) UNIVAC-I
(4) IBM-704
(5) None of these

17. The advantage of a LAN is
(1) sharing peripherals
(2) backing up your data
(3) saving all your data
(4) accessing the web
(5) automatic printing of data

18. A tree like structure of records in a database
(1) hierarchical database structure
(2) relational database structure
(3) multidimensional database structure
(4) sequential database access
(5) None of the above

19. The memory address of the first element of an array is called
(1) floor address
(2) foundation address
(3) first address
(4) base address
(5) None of these

20. The PHP Syntax is most similar to
(1) PERL and C
(2) Java script
(3) VB script
(4) Visual Basic
(5) None of these

No comments:

Post a Comment

Advertisement