PROFESSIONAL KNOWLEDGE QUESTIONS SET-2

set2

Welcome to the Professional Knowledge Question Section in IT Officer. Here we are providing sample questions of Professional Knowledge. It will be useful for the IBPS SO, IBPS RRB SO, SBI SO, LIC AAO, and many more exams. We have also included important questions that are frequently asked in exams.

1. ________ refers to a family of IEEE standards dealing with the local area network and the metropolitan area network.

  1. 802
  2. 800
  3. 801
  4. 803
  5. None of these

2. What is the general network standard for the data link layer in the OSI Reference Model?

  1. IEEE 802.1
  2. IEEE 802.2
  3. IEEE 802.3
  4. IEEE 802.4
  5. IEEE 802.6

3. ________ uses a standard called IEEE 802.6.

  1. LAN
  2. WAN
  3. Internet
  4. MAN
  5. None of these

4. Where does Bridge operates in the OSI model?

  1. Physical layer
  2. Datalink layer
  3. Application layer
  4. Both (1) and (2)
  5. None of these

5. The repeater operates in which layer of the OSI model?

  1. Application layer
  2. Presentation layer
  3. Physical layer
  4. Transport layer
  5. Datalink layer

6. Routers operate in which layer of the OSI model?

  1. Physical layer
  2. Datalink layer
  3. Network layer
  4. All of these
  5. None of these

7. Modem is a ________ that modulates and demodulate signals.

  1. DTE( data terminal equipment)
  2. DCE( data circuit terminating equipment)
  3. DTE-DCE
  4. Both 1 and 2
  5. None of these

8. Which of the following uses the greatest number of layers in the OSI model?

  1. Bridge
  2. Repeater
  3. Router
  4. Gateway
  5. None of these

9. At ________ layer, TCP/IP defines two protocols : TCP(transmission control protocol) and UDP(user datagram protocol).

  1. Transport layer
  2. Network layer
  3. Physical layer
  4. Application layer
  5. None of these

10. A communication network which is used by large organizations over regional, national or global area is called _________.

  1. LAN
  2. WAN
  3. MAN
  4. Internet
  5. None of these

11. The _________ layer is the layer closest to transmission medium.

  1. Transport
  2. Network
  3. Datalink
  4. Physical
  5. None of these

12. End-to-End connectivity is provided from host to host in ?

  1. Network layer
  2. Session layer
  3. Datalink layer
  4. Transport layer
  5. None of these

13. Which of the following is an example of client server model?

  1. FTP
  2. DNS
  3. TELNET
  4. All of these
  5. None of these

14. Which of the following TCP/IP protocol is used for transferring electronic mail messages from one machine to another?

  1. SNMP
  2. SMTP
  3. RPC
  4. FTP
  5. None of these

15. ________ is the continuous ability to send and receive data between interconnected networks.

  1. FTP
  2. SMTP
  3. TNS
  4. Network Interoperability
  5. None of these

16. What is the default subnet masks of a class B network?

  1. 127.0.0.1
  2. 255.0.0.0
  3. 255.255.0.0
  4. 255.255.255.0
  5. None of these

17. Which IEEE standard is used for WI/Fi systems?

  1. 802.11
  2. 802.1
  3. 802.2
  4. 802.3
  5. 802.10

18. What is loopback address?

  1. 127.0.0.1
  2. 255.0.0.0
  3. 255.255.0.0
  4. 127.0.0.0
  5. None of these

19. The central computer surrounded by one or more satellite computers is called

  1. Bus network
  2. Ring network
  3. Star network
  4. All of the above
  5. None of these

20. The data to be encrypted at the sender site is called _________. The data to be decrypted at receiver end is called _________.

  1. Secret key, public key
  2. Public key, secret key
  3. Plaintext, ciphertext
  4. Ciphertext, plaintext
  5. None of these

21. In digital signature the private key is used for ________ and the public key for ________.

  1. Encryption, decryption
  2. Decryption, encryption
  3. Plaintext, ciphertext
  4. Ciphertext, plaintext
  5. None of these

22. To create a copy file in the event of system failure, we create a _________.

  1. Firewall
  2. Redundancy
  3. Backup
  4. Restore file
  5. None of these

23. Print server uses __________ which is a buffer that holds before it is sent to the printer.

  1. Queue
  2. Spool
  3. Node
  4. Stack
  5. None of these

24. Which of the following identifies specific web page and its computer on the web page?

  1. Web site
  2. URL
  3. Web site address
  4. Domain name
  5. None of these

25. _________ is the computer to computer exchange of routing business data between trading partners in standard data formats.

  1. CTS
  2. DSR
  3. VDR
  4. EDI (Electronic data interchange)
  5. None of these

26. Ping command is used for what purpose?

  1. Test a device on a network whether it is reachable
  2. Test a hard disk fault
  3. Test a bug in the application
  4. Test devices scanning quality
  5. None of these

27. Two different kind of networks can be connected by using

  1. Bridges
  2. Satellite
  3. Gateway
  4. Routers
  5. None of these

28. Most important advantage of IC is its

  1. Easy replacement in case of circuit failure
  2. Low power consumption
  3. Extremely high reliability
  4. Reduced cost
  5. None of these

29. Which type of computers use the 8 bit code called EBCDIC?

  1. Mini computers
  2. Mainframe computers
  3. Supercomputer
  4. Micro computer
  5. None of these

30. An AND gate

  1. Implements logic addition
  2. Is equivalent to a series switching circuit
  3. Is any or all gate
  4. Is equivalent to a parallel switching circuit
  5. None of these

31. Programs in which of the following memories can’t be erased?

  1. RAM
  2. ROM
  3. Cache memory
  4. Virtual memory
  5. None of these

32. Which are not used in case of applet?

  1. Read/write
  2. Internet
  3. Search engine
  4. All of these
  5. None of these

33. In Queue, the items deleted at one in is called _________.

  1. Rear
  2. Front
  3. Top
  4. Base
  5. None of these

34. The drawback of the binary tree sort are remedied by the

  1. Linear sort
  2. Heap sort
  3. Insertion sort
  4. Quick sort
  5. None of these

35. White box testing, a software testing technique is sometimes called __________.

  1. Graph testing
  2. Basis path
  3. Glass box testing
  4. Data flow testing
  5. Look testing

36. Which of the following is used with database?

  1. EDI
  2. Credit card
  3. ATM
  4. Payment gateway
  5. Data mining

37. To modify existing rows of the table _________ statement is used.

  1. ALTER
  2. MODIFY
  3. UPDATE
  4. COMMIT
  5. DELETE

38. Which of the following is not a function of database administrator (DBA)?

  1. Network maintenance
  2. Routine maintenance
  3. Schema definition
  4. Authorization for data access
  5. None of these

39. Which of the following NF ( Normal Form) is based on multi Valued dependency?

  1. First NF
  2. Second NF
  3. Third NF
  4. Fourth NF
  5. None of these

40. In The Entity-Relationship diagram “Ellipses” represents

  1. Attributes
  2. Weak entity set
  3. Relationship sets
  4. Multivalued attributes
  5. None of these


Answers key :

1. (1)2. (2)3. (4)4. (2)5. (3)6. (3)7. (2)8. (4)
9. (1)10. (2)11. (4)12. (4)13. (4)14. (2)15. (4)16. (3)
17. (1)18. (1)19. (3)20. (3)21. (1)22. (3)23. (2)24. (4)
25. (4)26. (1)27. (3)28. (3)29. (2)30. (2)31. (2)32. (1)
33. (2)34. (2)35. (3)36. (5)37. (3)38. (1)39. (4)40. (1)

3 thoughts on “PROFESSIONAL KNOWLEDGE QUESTIONS SET-2”

  1. iGlobal Desk is a full-fledges service provider in the field of website design and digital marketing agency based in Patna. In today’s digital business world, you need a partner who can help you take advantage of marketing opportunities across a variety of channels in real-time.

    iGlobal Desk combines a data-driven approach with knowledge gain and deals with the demand according to customer demand and work up to satisfaction. We provide support to our clients.

  2. Hello…

    This is really very useful and important for all those aspirants who are preparing for IBPS SO, IBPS RRB SO, SBI SO, LIC AAO and many others. This will definitely going to help in practicing and studying more effectively. Thanks and plz do keep sharing more similar posts.

    Regards,
    -Rijhu.

Leave a Comment

Your email address will not be published. Required fields are marked *