IBPS CWE IT Officers Online Mocks 3

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Appliedjobz
A
Appliedjobz
Community Contributor
Quizzes Created: 20 | Total Attempts: 16,397
Questions: 25 | Attempts: 1,490

SettingsSettingsSettings
IBPS CWE Quizzes & Trivia

The Questions give you a fair idea of the IBPS IT Officer Exam Question Paper Pattern and help you prepare better. The written examination consists of objective type paper including 5 parts that are as follows: General Intelligence Quantitative Aptitude General Awareness Related to Banking
Professional Knowledge
English Total Duraion 25 min By: Appliedjobz To download Previous year IBPS Examination Please Visit http://appliedmocks. Blogspot. In


Questions and Answers
  • 1. 

    A special Type Of gateway that can keep external users from accessing resources   on the LAN users access the external info is called_______  

    • A.

      Repeater

    • B.

      Firewall

    • C.

      Hub

    • D.

      Extension

    • E.

      None Of these

    Correct Answer
    B. Firewall
    Explanation
    A firewall is a special type of gateway that can keep external users from accessing resources on the LAN that users access the external info. It acts as a barrier between the internal network and the external network, monitoring and controlling incoming and outgoing network traffic based on predetermined security rules. By examining the data packets and determining whether they meet the specified criteria, a firewall can prevent unauthorized access, protect against malicious attacks, and ensure the security and privacy of the network.

    Rate this question:

  • 2. 

    What is the name given to the exchange of control signals which is necessary for establishing a connection between a modem and computer at one end of the line and another modem and computer at other end of the line?   

    • A.

      Hand shaking

    • B.

      Modem option

    • C.

      Protocols

    • D.

      All of these

    • E.

      None of these

    Correct Answer
    A. Hand shaking
    Explanation
    Handshaking is the name given to the exchange of control signals necessary for establishing a connection between a modem and computer at one end of the line and another modem and computer at the other end of the line. Handshaking involves a series of signals that are sent back and forth between the devices to ensure proper synchronization and communication. This process allows the devices to establish a connection and negotiate the parameters of the data transfer. Therefore, the correct answer is handshaking.

    Rate this question:

  • 3. 

     In SQL which command is used to changes data in data table?   

    • A.

      UPDATE

    • B.

      Browse

    • C.

      Insert

    • D.

      Append

    • E.

      None of these

    Correct Answer
    A. UPDATE
    Explanation
    The correct answer is UPDATE. In SQL, the UPDATE command is used to modify or change data in a data table. It allows you to update specific columns or rows in a table based on certain conditions or criteria. This command is essential for making changes to existing data in a database.

    Rate this question:

  • 4. 

    In SQL which of the following isn’t a data definition language command?    

    • A.

      Update

    • B.

      Rename

    • C.

      Revoke

    • D.

      Grant

    • E.

      None of these

    Correct Answer
    A. Update
    Explanation
    The UPDATE command in SQL is not a data definition language (DDL) command. DDL commands are used to define or modify the structure of the database, such as creating or altering tables, while the UPDATE command is used to modify the data within the tables. Therefore, the correct answer is Update.

    Rate this question:

  • 5. 

    Which Command/s is/are used to redefine a column of the table in SQL?

    • A.

      Define Table

    • B.

      Modify Table

    • C.

      Alter Table

    • D.

      All of these

    • E.

      None of these

    Correct Answer
    C. Alter Table
    Explanation
    The correct answer is "Alter Table". The ALTER TABLE command is used to modify the structure of an existing table in SQL. It allows you to add, delete, or modify columns in the table. This command is commonly used to redefine a column by changing its data type, size, or constraints. Therefore, "Alter Table" is the correct command to use when redefining a column in SQL.

    Rate this question:

  • 6. 

     In a relational schema, each tuple is divided into fields called.      

    • A.

      Relations

    • B.

      Domains

    • C.

      Queries

    • D.

      All of these

    • E.

      None of these

    Correct Answer
    B. Domains
    Explanation
    In a relational schema, each tuple is divided into fields called "domains". Domains define the data type and constraints of the values that can be stored in each field of a tuple. This ensures that the data stored in the database is consistent and follows the specified rules for each field. Therefore, the correct answer is "Domains".

    Rate this question:

  • 7. 

    An indexing operation

    • A.

      Sorts a file using a single key

    • B.

      Sorts file using two keys

    • C.

      Establishes an index for a file

    • D.

      Both a and b

    • E.

      None of these

    Correct Answer
    C. Establishes an index for a file
    Explanation
    The correct answer is "Establishes an index for a file." An indexing operation refers to the process of creating an index for a file. An index is a data structure that allows for efficient searching and retrieval of data from a file. It typically contains key-value pairs, where the key is a specific attribute or field in the file, and the value is the corresponding record or location of that attribute in the file. By establishing an index for a file, it becomes easier and faster to locate and access specific data within the file.

    Rate this question:

  • 8. 

     Data security threats include

    • A.

      Hardware failure

    • B.

      Privacy Invasion

    • C.

      Fraudulent manipulation of data

    • D.

      All of these

    • E.

      None of these

    Correct Answer
    B. Privacy Invasion
    Explanation
    The correct answer is "Privacy Invasion". This refers to unauthorized access or intrusion into an individual's personal information, leading to a breach of privacy. It can involve activities such as hacking, identity theft, or unauthorized surveillance. In the context of data security threats, privacy invasion poses a significant risk as it can result in the exposure of sensitive information and potential misuse by malicious actors.

    Rate this question:

  • 9. 

    The Language used in the application Programs to request a data from the DBMS is referred to as       

    • A.

      DML

    • B.

      DDL

    • C.

      Query Language

    • D.

      DCL

    • E.

      None Of these

    Correct Answer
    A. DML
    Explanation
    The correct answer is DML. DML stands for Data Manipulation Language and it is used to retrieve, insert, update, and delete data from a database. In the context of application programs, DML is the language used to send requests to the DBMS (Database Management System) to perform these data manipulation operations. DDL (Data Definition Language) is used to define the database structure, Query Language is a general term for any language used to query databases, and DCL (Data Control Language) is used to control access and permissions on the database. None of these options accurately describe the language used in application programs to request data from the DBMS.

    Rate this question:

  • 10. 

    A _______ contains the smallest unit of meaning full data , so you might call it basic building  blocks for the data file    

    • A.

      File Structure

    • B.

      Record

    • C.

      Fields

    • D.

      Data Base

    • E.

      None Of these

    Correct Answer
    C. Fields
    Explanation
    Fields contain the smallest unit of meaningful data in a data file. They are the basic building blocks that make up the structure of the file. Each field represents a specific piece of information and is typically assigned a data type that defines the kind of data it can hold. Fields allow for the organization and storage of data in a structured and meaningful way, enabling efficient data retrieval and manipulation.

    Rate this question:

  • 11. 

    A _______ means that one record in a particular record type is related to only one record of another record type    

    • A.

      One to one relationship

    • B.

      One to many relationship

    • C.

      Many to one relationship

    • D.

      Many to many relationship

    • E.

      None Of these

    Correct Answer
    A. One to one relationship
    Explanation
    A one-to-one relationship means that each record in one record type is related to only one record in another record type. This type of relationship ensures that there is a unique and direct connection between the two record types, allowing for a specific and exclusive association between them.

    Rate this question:

  • 12. 

    Through Linked list one can implement    

    • A.

      Stack

    • B.

      Graph

    • C.

      Queue

    • D.

      All Of these

    • E.

      None Of these

    Correct Answer
    D. All Of these
    Explanation
    A linked list is a data structure that consists of nodes, where each node contains a value and a reference to the next node. This data structure allows for dynamic memory allocation and efficient insertion and deletion operations. By utilizing the concept of a linked list, one can implement various data structures such as a stack, graph, and queue. Therefore, the correct answer is "All Of these".

    Rate this question:

  • 13. 

    A heap allows a very efficient implementation of a _______   

    • A.

      Double ended Queue

    • B.

      Priority Queue

    • C.

      Stack

    • D.

      Trees

    • E.

      None of these

    Correct Answer
    B. Priority Queue
    Explanation
    A heap allows a very efficient implementation of a Priority Queue. A heap is a complete binary tree that satisfies the heap property, which means that the value of each node is greater than or equal to the values of its children. This property allows for efficient insertion and removal of the highest priority element, making it an ideal data structure for implementing a priority queue.

    Rate this question:

  • 14. 

    In files, there is a key associated with each record which is used to differentiate among different record. For every file there is at least one set of a key that is unique. Such a key is called _______  

    • A.

      Unique key

    • B.

      Prime Attribute

    • C.

      Index Key

    • D.

      Primary Key

    • E.

      Null Key

    Correct Answer
    D. Primary Key
    Explanation
    A primary key is a key associated with each record in a file that is used to differentiate among different records. It is a unique key, meaning that there is at least one set of a key that is unique for every file. The primary key is used to uniquely identify each record in the file and is crucial for maintaining data integrity and ensuring the accuracy of data retrieval and manipulation operations.

    Rate this question:

  • 15. 

     _______ is primarily used for mapping host names and email destinations to IP address but can also be used for other purposes    

    • A.

      TCP (Transfer Control Protocol)

    • B.

      DNS ( Domain Name System)

    • C.

      SHA (secure hash Algorithm)

    • D.

      SNMP(simple Network management Protocol)

    • E.

      None of these

    Correct Answer
    B. DNS ( Domain Name System)
    Explanation
    The correct answer is DNS (Domain Name System). DNS is primarily used for mapping host names and email destinations to IP addresses. It allows users to easily access websites or send emails by using domain names instead of IP addresses. DNS also provides other functionalities such as load balancing, caching, and security. TCP is a protocol used for establishing a reliable connection between two devices, SHA is a cryptographic hash function, and SNMP is a protocol used for managing and monitoring network devices.

    Rate this question:

  • 16. 

    Which layer of OSI determines the interface of the system with the users? 

    • A.

      Network

    • B.

      Application

    • C.

      Data link

    • D.

      Session

    • E.

      None

    Correct Answer
    B. Application
    Explanation
    The application layer of the OSI model determines the interface of the system with the users. This layer provides services directly to the user, such as email, file transfer, and web browsing. It is responsible for managing communication between the application and the network, and it ensures that the data is properly formatted and presented to the user.

    Rate this question:

  • 17. 

    The Drawbacks of binary Tree sort are remedied by the

    • A.

      Linear sort

    • B.

      Quicker sort

    • C.

      Heap Sort

    • D.

      Insertion Sort

    • E.

      None

    Correct Answer
    C. Heap Sort
    Explanation
    Heap Sort is the correct answer because it addresses the drawbacks of binary tree sort. Binary tree sort has a worst-case time complexity of O(n^2), which can be inefficient for large datasets. Heap Sort, on the other hand, has a worst-case time complexity of O(n log n), making it more efficient. It uses a binary heap data structure to sort the elements, ensuring that the largest element is always at the root of the heap. This allows for efficient removal of the root element and maintaining the heap property, resulting in a sorted array.

    Rate this question:

  • 18. 

    Row of a relation are called   

    • A.

      Relation

    • B.

      Tuples

    • C.

      Data Structure

    • D.

      An entity

    • E.

      None of these

    Correct Answer
    B. Tuples
    Explanation
    The rows of a relation are called tuples. In a relational database, a tuple represents a single record or row of data that contains a set of related attributes or fields. Each tuple in a relation is unique and can be identified by a primary key. Tuples are used to store and organize data in a structured manner, allowing for efficient retrieval and manipulation of information.

    Rate this question:

  • 19. 

    An important application of cryptography , used in computerized commercial and financial transaction

    • A.

      Data mining

    • B.

      Data warehousing

    • C.

      Digital Signature

    • D.

      Media Convergence

    • E.

      None of these

    Correct Answer
    C. Digital Signature
    Explanation
    A digital signature is a cryptographic technique used in computerized commercial and financial transactions to ensure the authenticity, integrity, and non-repudiation of digital messages or documents. It provides a way to verify the identity of the sender and ensure that the message or document has not been tampered with during transmission. This is crucial in secure online transactions where the parties involved need to have trust and confidence in the authenticity and integrity of the exchanged data.

    Rate this question:

  • 20. 

    Data mining evolve as a mechanism to cater the limitations of  _______   system to deal massive data sets with high dimensionality, new data type, multiple heterogeneous data resources etc. 

    • A.

      OLTP

    • B.

      OLAP

    • C.

      DSS

    • D.

      DWH

    • E.

      None of these

    Correct Answer
    A. OLTP
    Explanation
    Data mining evolved as a mechanism to cater to the limitations of the OLTP (Online Transaction Processing) system. OLTP systems are designed to handle real-time transactional data, but they are not well-suited for dealing with massive data sets with high dimensionality, new data types, and multiple heterogeneous data resources. Data mining, on the other hand, is a process of discovering patterns and relationships in large datasets, enabling organizations to extract valuable insights and make informed decisions.

    Rate this question:

  • 21. 

    The _______ model remains operative until the software is required.

    • A.

      Incremental Model

    • B.

      Spiral Model

    • C.

      Prototyping Model

    • D.

      Waterfall Model

    • E.

      None of these

    Correct Answer
    B. Spiral Model
    Explanation
    The Spiral Model remains operative until the software is required. The Spiral Model is a risk-driven software development process model that combines elements of both waterfall and iterative development models. It emphasizes on continuous risk analysis and mitigation throughout the software development lifecycle. The model consists of multiple iterations, each involving planning, risk analysis, development, and evaluation. This iterative approach allows the software to be continuously updated and improved, making it suitable for projects where the requirements are not completely known or may change over time.

    Rate this question:

  • 22. 

    This _______ data mining techniques derivess rules from real world case examples   

    • A.

      Waterfall Model

    • B.

      RAD

    • C.

      White Box

    • D.

      Spiral Model

    • E.

      Case based reasoning

    Correct Answer
    E. Case based reasoning
    Explanation
    Case-based reasoning is a data mining technique that derives rules from real-world case examples. It involves solving new problems by applying solutions that were used to solve similar past problems. In this approach, a database of previously solved cases is created, and when a new problem arises, the system retrieves the most similar cases from the database and adapts their solutions to fit the current problem. This allows for the reuse of knowledge and experience to solve new problems efficiently.

    Rate this question:

  • 23. 

    Local variables _________     

    • A.

      Are created outside a block

    • B.

      Are known only to that block

    • C.

      Continue to exist when their block ends

    • D.

      Area illegal in C++

    • E.

      None of these

    Correct Answer
    B. Are known only to that block
    Explanation
    Local variables are known only to the block in which they are declared. They are not accessible or visible outside of that block. Once the block ends, the local variables are no longer in scope and cannot be accessed. This is a fundamental concept in programming languages like C++ where variables have limited visibility and can only be used within the block they are declared in.

    Rate this question:

  • 24. 

    ____________ is virus that inserts itself into a system's memory. Then it takes number of actions when an infected file is executed.  

    • A.

      Web scripting virus

    • B.

      Polymorphic virus

    • C.

      Macro virus

    • D.

      Boot sector virus

    • E.

      Resident virus

    Correct Answer
    E. Resident virus
    Explanation
    A resident virus is a type of virus that inserts itself into a system's memory, allowing it to remain active even after the infected file has been executed. Once in memory, the resident virus can perform a variety of actions, such as infecting other files or corrupting data. Unlike other types of viruses, a resident virus does not need to be executed again in order to carry out its actions. Therefore, it is considered to be a particularly dangerous and persistent type of virus.

    Rate this question:

  • 25. 

    An Operating System is a _________

    • A.

      System Softawre

    • B.

      Application Software

    • C.

      Hardware

    • D.

      I/o devics

    • E.

      Utility Software

    Correct Answer
    A. System Softawre
    Explanation
    The correct answer is "System Software". An Operating System is a type of system software that manages computer hardware and software resources, provides common services for computer programs, and allows users to interact with the computer system. It acts as an intermediary between the users and the computer hardware, enabling the execution of application software and providing functions such as file management, memory management, and device management.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 05, 2013
    Quiz Created by
    Appliedjobz
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.