Professional Knowledge or IT Officer Quiz - Set 2
In SBI and IBPS IT Officer exam, Professional Knowledge section alone contains 75 marks. It means, this section is most important for cracking IBPS/SBI IT Officer Exam. We provided the First set few days back. This is the Second set on Professional Knowledge from us. In this post, we are providing you some really important questions of this section along with explanation.
Computer Quiz for IT Officer
-
1. On a client/server network:
- Files are stored on the server computer and can be stored on the Individual PCs.
- No Special operating system other than Windows 95 or 98 is required.
- When one node "goes down" the entire network malfunctions.
- Twenty nodes is the absolute maximum allowed on a client/server network.
- None of these
Answer And Explanation
Answer: Option A
Explanation:
Note :In client/server network files can be stored on servers as well as client PCs.
(a)Windows 95/98 works best in peer-to-peer networks. For client-server netware, windows NT or Novel Network are better.
(b)There is no upper limit on the no. of client PCs attached to a server computer.
(c) All client PCs are independently attached to servers. So, if only client PC malfunction, it doesn't disrupt other client PCs functionality/ connectivity to the server.
Computer Quiz for IT Officer
-
2.__________ is the most advantageous payment way when orders are mostly received through phone or email.
- Real time processing solutions.
- Weblink
- API
- Virtual Terminal Solution
- None of the above
Answer And Explanation
Answer: Option D
Explanation:
Note:Virtual terminal is a advantageous for businesses that manually process credit card & debit card payment received by telephone, fax or mail order. It is cost-effective as the process secures payments on any device connected to the internet without the need for a website or costly integration.
Computer Quiz for IT Officer
-
3.Which of the following two duties should not be clubbed with respect to banking software system?
- Security administration and security audit
- System administration and network administration
- Systems development and maintenance
- All of the above
- None of the above
Answer And Explanation
Answer: Option D
Explanation:
Note:Banking software system comprises different modules that perform different tasks. Different duties performed in a bank should constitute a different module in a banking software. eg. network administration module should be different from system administration.
Computer Quiz for IT Officer
-
4.FTP is better than HTTP because__________
- It uses separate channels for data transmission and flow control
- It transfers data from the web server
- It transfers data from the file server
- It copies files to the user's hard disk in the destination specified by the user
- None of the above
Answer And Explanation
Answer: Option A
Explanation:
Note:FTP is better than HTTP as it has built in flow control. The control channel and data channels are independent of each other, two separate TCP connections.
FTP is a two way systems as files are transferred back & forth between file server & workstation. Whereas HTTP is a one way system as files are transported only from the web server onto the workstation's browser.
Computer Quiz for IT Officer
-
5.___________ is used for online transactions.
- Physical terminal transaction systems
- Software terminal transaction systems
- Virtual terminals or gateways
- All of the above
- None of the above
Answer And Explanation
Ans-D( Physical terminal eg. point of sale terminal located in most retail outlet; virtual terminal; payment gateways' software terminals, eg. touch screen ICE terminals can also be used for on-line transaction.)
Computer Quiz for IT Officer
-
6.Which of the following makes WEB insecure?
- RSA Security Algorithm
- Network Interface Card (NIC)
- Static Keys
- Shared Secret Keys
- None of the above
Answer And Explanation
Answer: Option C
Explanation:
Note:Static Keys are intended for use for a relatively long period of time & is typically intended for use in many instances of a cryptographic key establishment scheme as compared to emphemeral keys which are generated for each execution of a key establishment process.
A static key is insecure as soon as attacker discovers it, all past & all future data transfers are no longer secure; one needs to change key regularly, i.e. a new key for each message.
Computer Quiz for IT Officer
-
7. Which among the following components of a telephone system uses fiber optics?
- Trunks
- Switching Office
- Local Loops
- Toll Office
- None of the above
Answer And Explanation
Answer: Option A
Explanation:
Note:The Trun link in telecommunication refers to the high speed connection between telephone central offices in the public switched Telephone Network(PSTN). Trunk line today is a fiber optic line that is capable of carrying both voice & data rather than the old copper lines that were capable of carrying sound or voice only.
Computer Quiz for IT Officer
-
8.A webpage cannot be created in :
- Java Server Pages
- Active Server Pages
- Active USP Pages
- All of these
- None of these
Answer And Explanation
Answer: Option C
Explanation:
Note: Both ASP and JSP can be used to create dynamically generated pages. ASP- Microsoft, JSP - Sun Microsystems.
Computer Quiz for IT Officer
-
9.Boot Monitors are
- Memory resident virus
- Input/Output peripherals
- Memory resident anti-virus
- All of the above
- None of these
Answer And Explanation
Answer: Option C
Explanation:
Note: Boot Monitor is a memory resident anti-virus which loads as a part of the machine's start boot. By being resident, it act as an activity monitor system for viruses.They work continuously by checking for boot viruses on start up.
Computer Quiz for IT Officer
-
10.Disk scanners are
- Anti-virus protection systems.
- Aftereffects of virus
- 8086's supplementry IC
- All of these
- None of these
Answer And Explanation
Answer: Option A
Explanation:
Note:Disk scanners eg. memory resident, inoculation, start-up, Behaviour-based, detection disk scanners are the utility that comes with antivirus software. They all constitute protection systems against malwares.
No comments