Welcome to the Professional Knowledge Question Section in IT Officer. Here we are providing sample questions of Professional Knowledge. It will be useful for the IBPS SO, IBPS RRB SO, SBI SO, LIC AAO, and many more exams. We have also included important questions that are frequently asked in exams.
1. ________ refers to a family of IEEE standards dealing with the local area network and the metropolitan area network.
- 802
- 800
- 801
- 803
- None of these
2. What is the general network standard for the data link layer in the OSI Reference Model?
- IEEE 802.1
- IEEE 802.2
- IEEE 802.3
- IEEE 802.4
- IEEE 802.6
3. ________ uses a standard called IEEE 802.6.
- LAN
- WAN
- Internet
- MAN
- None of these
4. Where does Bridge operates in the OSI model?
- Physical layer
- Datalink layer
- Application layer
- Both (1) and (2)
- None of these
5. The repeater operates in which layer of the OSI model?
- Application layer
- Presentation layer
- Physical layer
- Transport layer
- Datalink layer
6. Routers operate in which layer of the OSI model?
- Physical layer
- Datalink layer
- Network layer
- All of these
- None of these
7. Modem is a ________ that modulates and demodulate signals.
- DTE( data terminal equipment)
- DCE( data circuit terminating equipment)
- DTE-DCE
- Both 1 and 2
- None of these
8. Which of the following uses the greatest number of layers in the OSI model?
- Bridge
- Repeater
- Router
- Gateway
- None of these
9. At ________ layer, TCP/IP defines two protocols : TCP(transmission control protocol) and UDP(user datagram protocol).
- Transport layer
- Network layer
- Physical layer
- Application layer
- None of these
10. A communication network which is used by large organizations over regional, national or global area is called _________.
- LAN
- WAN
- MAN
- Internet
- None of these
11. The _________ layer is the layer closest to transmission medium.
- Transport
- Network
- Datalink
- Physical
- None of these
12. End-to-End connectivity is provided from host to host in ?
- Network layer
- Session layer
- Datalink layer
- Transport layer
- None of these
13. Which of the following is an example of client server model?
- FTP
- DNS
- TELNET
- All of these
- None of these
14. Which of the following TCP/IP protocol is used for transferring electronic mail messages from one machine to another?
- SNMP
- SMTP
- RPC
- FTP
- None of these
15. ________ is the continuous ability to send and receive data between interconnected networks.
- FTP
- SMTP
- TNS
- Network Interoperability
- None of these
16. What is the default subnet masks of a class B network?
- 127.0.0.1
- 255.0.0.0
- 255.255.0.0
- 255.255.255.0
- None of these
17. Which IEEE standard is used for WI/Fi systems?
- 802.11
- 802.1
- 802.2
- 802.3
- 802.10
18. What is loopback address?
- 127.0.0.1
- 255.0.0.0
- 255.255.0.0
- 127.0.0.0
- None of these
19. The central computer surrounded by one or more satellite computers is called
- Bus network
- Ring network
- Star network
- All of the above
- None of these
20. The data to be encrypted at the sender site is called _________. The data to be decrypted at receiver end is called _________.
- Secret key, public key
- Public key, secret key
- Plaintext, ciphertext
- Ciphertext, plaintext
- None of these
21. In digital signature the private key is used for ________ and the public key for ________.
- Encryption, decryption
- Decryption, encryption
- Plaintext, ciphertext
- Ciphertext, plaintext
- None of these
22. To create a copy file in the event of system failure, we create a _________.
- Firewall
- Redundancy
- Backup
- Restore file
- None of these
23. Print server uses __________ which is a buffer that holds before it is sent to the printer.
- Queue
- Spool
- Node
- Stack
- None of these
24. Which of the following identifies specific web page and its computer on the web page?
- Web site
- URL
- Web site address
- Domain name
- None of these
25. _________ is the computer to computer exchange of routing business data between trading partners in standard data formats.
- CTS
- DSR
- VDR
- EDI (Electronic data interchange)
- None of these
26. Ping command is used for what purpose?
- Test a device on a network whether it is reachable
- Test a hard disk fault
- Test a bug in the application
- Test devices scanning quality
- None of these
27. Two different kind of networks can be connected by using
- Bridges
- Satellite
- Gateway
- Routers
- None of these
28. Most important advantage of IC is its
- Easy replacement in case of circuit failure
- Low power consumption
- Extremely high reliability
- Reduced cost
- None of these
29. Which type of computers use the 8 bit code called EBCDIC?
- Mini computers
- Mainframe computers
- Supercomputer
- Micro computer
- None of these
30. An AND gate
- Implements logic addition
- Is equivalent to a series switching circuit
- Is any or all gate
- Is equivalent to a parallel switching circuit
- None of these
31. Programs in which of the following memories can’t be erased?
- RAM
- ROM
- Cache memory
- Virtual memory
- None of these
32. Which are not used in case of applet?
- Read/write
- Internet
- Search engine
- All of these
- None of these
33. In Queue, the items deleted at one in is called _________.
- Rear
- Front
- Top
- Base
- None of these
34. The drawback of the binary tree sort are remedied by the
- Linear sort
- Heap sort
- Insertion sort
- Quick sort
- None of these
35. White box testing, a software testing technique is sometimes called __________.
- Graph testing
- Basis path
- Glass box testing
- Data flow testing
- Look testing
36. Which of the following is used with database?
- EDI
- Credit card
- ATM
- Payment gateway
- Data mining
37. To modify existing rows of the table _________ statement is used.
- ALTER
- MODIFY
- UPDATE
- COMMIT
- DELETE
38. Which of the following is not a function of database administrator (DBA)?
- Network maintenance
- Routine maintenance
- Schema definition
- Authorization for data access
- None of these
39. Which of the following NF ( Normal Form) is based on multi Valued dependency?
- First NF
- Second NF
- Third NF
- Fourth NF
- None of these
40. In The Entity-Relationship diagram “Ellipses” represents
- Attributes
- Weak entity set
- Relationship sets
- Multivalued attributes
- None of these
Answers key :
1. (1) | 2. (2) | 3. (4) | 4. (2) | 5. (3) | 6. (3) | 7. (2) | 8. (4) |
9. (1) | 10. (2) | 11. (4) | 12. (4) | 13. (4) | 14. (2) | 15. (4) | 16. (3) |
17. (1) | 18. (1) | 19. (3) | 20. (3) | 21. (1) | 22. (3) | 23. (2) | 24. (4) |
25. (4) | 26. (1) | 27. (3) | 28. (3) | 29. (2) | 30. (2) | 31. (2) | 32. (1) |
33. (2) | 34. (2) | 35. (3) | 36. (5) | 37. (3) | 38. (1) | 39. (4) | 40. (1) |
iGlobal Desk is a full-fledges service provider in the field of website design and digital marketing agency based in Patna. In today’s digital business world, you need a partner who can help you take advantage of marketing opportunities across a variety of channels in real-time.
iGlobal Desk combines a data-driven approach with knowledge gain and deals with the demand according to customer demand and work up to satisfaction. We provide support to our clients.
Hello…
This is really very useful and important for all those aspirants who are preparing for IBPS SO, IBPS RRB SO, SBI SO, LIC AAO and many others. This will definitely going to help in practicing and studying more effectively. Thanks and plz do keep sharing more similar posts.
Regards,
-Rijhu.
Thanks for important questions, keep publishing more questions so that it can help us in our preparation.