Beruflich Dokumente
Kultur Dokumente
5) None of these
1) WAN
2) PAN
3) LAN
4) MAN
5) All of these
1) Remove
2) Drop
1|Page
3) Delete
4) Erase
5) Rollback
Choose the option that correctly matches the given algorithms with the type of
cryptography (public-key of private-key) utilised by them.
1) Testing
2) Maintenance
3) Marketing
4) Coding
5) None of these
2|Page
Q 6. The full form of ISR is.
5) None of these
1) INT
2) VARCHAR
3) DOUBLE
4) BLOB
5) None of these
1) 0-9, A-E
2) 0-9, A-F
3) 1-10, A-E
4) 1-10, A-F
5) None of these
Q 9. Which layer of the OSI model defines the language and syntax for
programs?
3|Page
1) Data link layer
2) Presentation layer
3) Application layer
4) Session layer
5) Transport layer
1) Pen drive
2) Memory Stick
4) None of these
Q 11. UDP and TCP are categorised under the _______ layer of the OSI
model.
1) physical
2) data link
3) application
4) transport
5) network
1) Entity set
3) Attributes
4|Page
4) Link between the attributes and entity set
5) None of these
1) Foreign key
2) Table key
3) Primary key
4) Unique key
5) None of these
Q 14. Which of the following topologies mainly use hub for interconnection of
resources?
1) Ring topology
2) Bus topology
3) Tree topology
4) Star topology
5) Mesh topology
Q 15. Which communication mode allows both the sender and the receiver to
transmit data at the same time over a single communication channel?
1) Simplex mode
5|Page
5) None of these
1) Newton
2) Hertz
3) Watt
4) Hertz/second
5) None of these
5) None of these
Q 18. Which is the correct place to write the main function in a program?
1) WEP
2) AES
3) DES
4) PPTP
5) SSL
1) Flash memory
2) Optical memory
3) Magnetic memory
5) None of these
1) GIF
2) BMP
3) TXT
4) LMP
5) TIF
1) DROP
7|Page
2) REVOKE
3) SAVEPOINT
4) TRUNCATE
5) None of these
1) UPDATE
2) INSERT
3) CREATE
4) TRUNCATE
5) None of these
1) Data
2) Network
3) Sessions
4) Connection
5) Application
1) SMTP extension
2) SMTP protocol
3) SMTP network
8|Page
4) SMTP device
5) None of these
1) Register
4) Non-volatile Storage
5) None of These
1) Dijkstra
2) Bellman-Ford
3) Topological Sort
5) None of these
2) Motherboard
3) Hard Disk
4) CPU Cache
9|Page
5) None of these
1) 1010
2) 1100
3) 1001
4) 1110
5) 1101
5) None of these
10 | P a g e
Q 32. Which of the following data structure is used by Breadth First Search of
Graph?
1) Array
2) Linked list
3) Pointer
4) Queue
5) None of these
1) Trojan Horse
2) Blue c
3) Cho bed
4) Full hall
5) None of these
1) It is not suitable for those projects where requirements are at a moderate to high risk
of changing.
4) It’s very tough to manage due to the rigidity of the model. Each phase do not specific
deliverables and a review process.
5) None of these
11 | P a g e
Q 35. Transport layer aggregates data from different applications into a single
stream before passing it to______________________.
1) Network layer
3) Application layer
4) Physical layer
5) None of these
1) 4 and 8 bits
2) 8 and 16 bits
3) 10 and 20 bits
4) 16 and 8 bits
5) 32 and 8 bits
1) ARP
3) ICMP
4) UDP
5) TCP
12 | P a g e
Q 38. What is document object model (DOM)?
1) Batch gathering
2) Batch processing
3) Batch channeling
4) Batch networking
5) None of these
1) Semaphore
2) Address bus
3) ICs
4) Logic gate
5) None of these
13 | P a g e
Q 41. What is the sub-network number of a host with an IP address of
172.16.66.0/21?
1) 172.16.64.0
2) 172.16.48.0
3) 172.16.36.0
4) 172.16.0.0
5) None of these
4) Both A & B
5) None of these
1) Network Management
2) Protocol Management
3) Wave Management
5) None of these
14 | P a g e
Q 44. A bridge is a connecting device that operates in the ______________
and data link layers of the Internet model.
1) Session
2) Application
3) Network
4) Physical
5) None of these
1) Public
2) Private
3) Protected
4) Unique
1) Object
2) Class
3) Entity
4) Array
5) None of these
15 | P a g e
Q 47. Which of the following is not a concept of OOP?
1) Inheritance
2) Polymorphism
3) Encapsulation
4) Global variables
5) None of these
1) Session layer
2) Network layer
3) Transport layer
5) None of these
Q 49. When you start up the computer the bootup storage at which the BIOS
versions, manufacturer and data are displayed on the monitor is
called__________.
1) Bootstrap
3) System configuration
4) Kernel loading
16 | P a g e
5) None of these
Q 50. Inverted page table scheme uses a __________ that contains an entry
for each physical frame, not for each logical page.
1) Page table
2) Inverse table
3) Segmented table
4) Look table
2) for(;;);
3) return;
4) return(5+2);
1) An object is declared
2) A class is declared
3) An object is used
4) A class is used
5) None of these
17 | P a g e
Q 53. The word __________ means the ability to take many forms.
1) Polymorphism
2) Overlaoder
3) Overrider
4) Aggregation
5) Generalization
5) None of these
2) Segment table
Q 56. TLB is a high speed cache used to hold recently referenced page table
entries a part of paged virtual memory. Inverted page table scheme uses a
18 | P a g e
page table that contains an entry for each physical frame, not for each
logical page. This ensures that the table occupies a fixed fraction of
memory. The size is proportional to physical memory, not the virtual
address space.
1) Three
2) Four
3) Five
4) Six
1) Hierarchical
2) Network
3) Relational
5) None of these
Q 58. Which of the following SQL command is used to change the structure of
a table?
1) ALTER TABLE
2) STRC TABLE
3) MODIFY TABLE
19 | P a g e
5) None of these
Q 59. A relation with atomic values and with no partial dependency is in:
5) None of these
Q 60. Which one is capable of overlapping I/O operation for one job with
processor operations for another job?
1) Register
2) Operating System
3) Spooling
4) Buffering
5) None of these
Check out the Answer Keys to this Live Leak of IBPS SO Mains for IT Officer:
20 | P a g e