February 1, 2016

IBPS SO (IT Officer) Professional Knowledge Questions Set

Dear Readers,

We are presenting you the model practice questions set for the upcoming IBPS Specialist Officers (IT Officers) Exam.This questions set consists of questions from DBMS, Operating System, Data Structure, Computer Networks, Microprocessor, Programming Language,Web Technologies etc. We have also included some important questions that are repeatedly asked in previous exams.Hope this model practice questions set will help you in your preparation.

  • JVM is a virtual machine that can execute - Java byte code
  • The JDBC - ODBC bridge - Three tiered
  • In SQL, Command is used to add new rows to a table - Append
  • Protocol is used for browsing website - HTTP
  • Round robin scheduling is essentially the preemptive version of - FIFO
  • A top to bottom relationship among the items in a database is established by a - Hierarchical Schema
  • Relocating bits used by relocating loader are specified (generated) by - Linker
  • Aggregation is a special form of - Association
  • Universal gate - NAND gate
  • In SQL, command is used to changes data in a data table - UPDATE
  • Multiplexer means - Many into One
  • Each node in a linked list must contain at least - Two fields
  • The order of the binary search algorithm - log (n)
  • The term push and  pop is related to the  - Stacks
  • HTTP refers to - Hyper Text Transfer Protocol
  • Unauthorized access to computer - Hacking
  • Loopbackaddress - 127.0.0.1
  • Utility used to transfer files and exchange messages - Email
  • When CD is read by the CD- ROM it is termed as - Seek Time
  • Code uses 7 bits to represent a character - ASCII Code
  • Packets are related to - Network Layer
  • The condition of a disk in which files are divided into pieces scattered around the disk - Fragmentation
  • End to end connectivity is provided from host to host in - Transport Layer
  • IEEE standards is used for Wi / Fi system - 802.11
  • In the OSI model routers operate in - Network Layer
  • The default subnet mask for a class B network - 255.255.0.0
  • The passive threat to computer security is - Malicious Intent
  • 'DOS' floppy disk does not have - BIOS
  • The technology used for clearance of cheques by banks - MICR
  • The protocol used in eliminate loops - Spanning Tree Protocol
  • The term "hypertext" means - Non-sequential writing
  • An association to develop advanced Internet technology - Internet 2
  • To identify a user who returns to a website - Cookies
  • Every host computer on the internet has a(n) - Unique IP Address
  • Web pages can be created using - web authoring software
  • A network covering a large geographic area - wide area network
  • Malicious software is known as - Malware
  • The web page that idetifies a website - Home page
  • Criminal hacking is - Cracking
  • Web App performance tests are designed to - simulate real-world loading situations
  • DLCI stands for - Data Link connection Identifier
  • Two important technologies for developing the semantic web - XML and RDF
  • The command is used for to test a device on a network whether it is reachable -Ping command
  • Five built-in functions provided by SQL - COUNT, SUM, AVG, MAX, MIN
  • White Box testing, a software testing technique is called - Glass box testing
  • Two or more Central Processing Units within a single computer system - Multi-processing
  • In queue, an element can be inserted and deleted by using - Rear and Front
  • To discard all pending data changes  - ROLLBACK
  • In C++, by default, the members of a class are - Private
  • Two files are used during operation of the DBMS - Data dictionary and Transaction log