IBPS CWE IT Officers Online Mocks 1

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Appliedjobz
A
Appliedjobz
Community Contributor
Quizzes Created: 20 | Total Attempts: 16,394
Questions: 25 | Attempts: 674

SettingsSettingsSettings
IBPS CWE Quizzes & Trivia

The Questions give you a fair idea of the IBPS IT Officer Exam Question Paper Pattern and help you prepare better. The written examination consists of objective type paper including 5 parts that are as follows: General Intelligence Quantitative Aptitude General Awareness Related to Banking
Professional Knowledge
English Total Duraion 25 min By: Appliedjobz To download Previous year IBPS Examination Please Visit http://appliedmocks. Blogspot. In


Questions and Answers
  • 1. 

     The ________ states that a foreign key must either match a primary key value in another relation or it must be null.

    • A.

      Entity integrity rule

    • B.

      Referential integrity constraint

    • C.

      Action assertion

    • D.

      Composite attribute

    • E.

      None Of these

    Correct Answer
    B. Referential integrity constraint
    Explanation
    The referential integrity constraint states that a foreign key must either match a primary key value in another relation or it must be null. This means that when a foreign key is used to establish a relationship between two tables, it must always refer to a valid primary key value in the referenced table, or it can be left as null if there is no corresponding value. This constraint ensures the consistency and accuracy of data by preventing orphaned records and maintaining the integrity of the relationships between tables.

    Rate this question:

  • 2. 

    An applet ________

    • A.

      is an interpreted program that runs on the client

    • B.

      tracks the number of visitors to a Website

    • C.

      Is a compiled program that usually runs on the client

    • D.

      Collects data from visitors to a Website

    • E.

      None of these

    Correct Answer
    A. is an interpreted program that runs on the client
    Explanation
    An applet is an interpreted program that runs on the client. This means that it is a program written in a high-level language, such as Java, that is executed by the client's web browser. It is different from a compiled program, which is converted into machine code before execution. Applets are commonly used to add interactive features to websites and can perform various tasks, such as tracking the number of visitors or collecting data from visitors. Therefore, the correct answer is that an applet is an interpreted program that runs on the client.

    Rate this question:

  • 3. 

    A ________ sometimes called a boot sector virus, executes when a computer boots up because it resides in the boot sector of a floppy disk or the master boot record of a hard disk.

    • A.

      System virus

    • B.

      Trojan horse virus

    • C.

      File virus

    • D.

      Macro virus

    • E.

      None Of these

    Correct Answer
    A. System virus
    Explanation
    A system virus, sometimes called a boot sector virus, executes when a computer boots up because it resides in the boot sector of a floppy disk or the master boot record of a hard disk.

    Rate this question:

  • 4. 

    This is a group of servers that share work and may be able to back each other up if one server fails.

    • A.

      Channel bank

    • B.

      Cluster

    • C.

      Tiger team

    • D.

      Serverless Backup

    • E.

      Logical unit

    Correct Answer
    B. Cluster
    Explanation
    A cluster is a group of servers that work together and share the workload. In a cluster, if one server fails, the others can take over its tasks, ensuring continuous operation and minimizing downtime. This setup provides redundancy and backup capabilities, making it an effective solution for high availability and fault tolerance.

    Rate this question:

  • 5. 

    The ________ directory is mandatory for every disk.

    • A.

      Root

    • B.

      Base

    • C.

      Sub

    • D.

      Case

    • E.

      None Of these

    Correct Answer
    C. Sub
    Explanation
    The sub directory is not mandatory for every disk. The root directory, on the other hand, is mandatory for every disk.

    Rate this question:

  • 6. 

    Which of the following will NOT eliminates the ambiguities of a null value?

    • A.

      Define the attribute as required

    • B.

      Define subtypes

    • C.

      Define each attribute as having an initial value that is recognized as blank

    • D.

      Define supertypes

    • E.

      None of these

    Correct Answer
    D. Define supertypes
    Explanation
    Defining supertypes does not eliminate the ambiguities of a null value. Supertypes are used in inheritance to create a hierarchy of classes, where subclasses inherit attributes and behaviors from their parent class. However, supertypes do not directly address the issue of null values or eliminate any ambiguities related to them.

    Rate this question:

  • 7. 

    Data are ________ in client/server computing.

    • A.

      Never sent to the client machine

    • B.

      Sent in very large sections to save processing time

    • C.

      Sent only upon the client's request

    • D.

      Sent in complete copies for the client to filter and sort

    • E.

      None of these

    Correct Answer
    C. Sent only upon the client's request
    Explanation
    In client/server computing, data are sent only upon the client's request. This means that the server does not automatically send data to the client machine without the client explicitly asking for it. This approach helps to optimize the use of network resources and processing time by only sending the necessary data when it is needed by the client.

    Rate this question:

  • 8. 

    Three SQL, DDL, CREATE commands are ________ .

    • A.

      Schema, Base and Table

    • B.

      Base, Table and Schema

    • C.

      Key, Base and Table

    • D.

      Schema, Table and View

    • E.

      None of these

    Correct Answer
    D. Schema, Table and View
    Explanation
    The correct answer is "Schema, Table and View". In SQL, DDL (Data Definition Language) commands are used to define the database schema, create tables, and create views. A schema is a logical container for database objects, such as tables and views. Tables are used to store data in a structured manner, while views are virtual tables that can be used to simplify complex queries or provide a different perspective on the data. Therefore, the correct answer includes the three DDL commands commonly used in SQL.

    Rate this question:

  • 9. 

    This is a standard way for a Web server to pass a Web user's request to an application program and to receive data back to forward to the user-

    • A.

      Interrupt request

    • B.

      Forward DNS lookup

    • C.

      Data-Link layer

    • D.

      File Transfer Protocol

    • E.

      Common gateway interface

    Correct Answer
    E. Common gateway interface
    Explanation
    The Common Gateway Interface (CGI) is a standard way for a Web server to pass a Web user's request to an application program and receive data back to forward to the user. It allows the server to communicate with external programs or scripts, such as Perl or Python, to generate dynamic content for the user. CGI acts as a bridge between the web server and the application program, enabling the processing of user requests and the generation of appropriate responses.

    Rate this question:

  • 10. 

    Firewalls are used to protect against ________ .

    • A.

      Unauthorized attacks

    • B.

      Virus attacks

    • C.

      Fire attacks

    • D.

      Data Driven attacks

    • E.

      All Of these

    Correct Answer
    A. Unauthorized attacks
    Explanation
    Firewalls are network security devices that monitor and control incoming and outgoing network traffic based on predetermined security rules. They act as a barrier between internal and external networks, protecting against unauthorized access and attacks from external sources. Unauthorized attacks refer to any attempt to gain unauthorized access to a network, system, or data. Firewalls are designed to detect and block such unauthorized access attempts, making them an essential tool in protecting against unauthorized attacks.

    Rate this question:

  • 11. 

     Programming language built into user programs such as Word and Excel are known as ________

    • A.

      4GLs

    • B.

      Macro languages

    • C.

      Object-oriented languages

    • D.

      Visual programming languages

    • E.

      None Of these

    Correct Answer
    B. Macro languages
    Explanation
    Macro languages are programming languages that are built into user programs such as Word and Excel. These languages allow users to automate repetitive tasks and create custom commands or functions within the program. They are specifically designed to interact with the features and functions of the user program, making it easier for users to customize and enhance their experience. Therefore, macro languages are the correct answer for this question.

    Rate this question:

  • 12. 

    Choose the correct way to indicate that a line in a C++ program is a comment line, that is, a line the will not be executed as an instruction ________ .

    • A.

      Begin the line with a # sign

    • B.

      Begin the line with double slashes (/ /)

    • C.

      Begin and end the line with double hyphens (- _ -)

    • D.

      Indent the line

    • E.

      None Of these

    Correct Answer
    B. Begin the line with double slashes (/ /)
    Explanation
    In C++, the correct way to indicate a comment line is by beginning the line with double slashes (//). This syntax tells the compiler to ignore everything on that line, treating it as a comment rather than an executable instruction. The other options listed (beginning the line with a # sign, beginning and ending the line with double hyphens, and indenting the line) are not valid ways to create comment lines in C++. Therefore, the correct answer is to begin the line with double slashes (/ /).

    Rate this question:

  • 13. 

    Before a package can be used in a java program it must be ________ .

    • A.

      Executed

    • B.

      Referenced

    • C.

      Declared

    • D.

      Imported

    • E.

      None

    Correct Answer
    C. Declared
    Explanation
    In order for a package to be used in a Java program, it must be declared. This means that the package needs to be explicitly stated or specified in the program. By declaring the package, the program is able to access the classes and resources within that package. Without declaring the package, the program would not be able to recognize or utilize any of its contents.

    Rate this question:

  • 14. 

    The ________ converts digital signals to analog signals for the purpose of transmitting data over telephone lines.

    • A.

      Router

    • B.

      Modem

    • C.

      Bridge

    • D.

      Mux

    • E.

      Switches

    Correct Answer
    B. Modem
    Explanation
    A modem is a device that converts digital signals to analog signals for the purpose of transmitting data over telephone lines. It is used to establish a connection between a computer or other digital device and an internet service provider (ISP) through the telephone network. The modem modulates the digital data into analog signals that can be transmitted over the phone lines and then demodulates them back into digital signals at the receiving end. This allows for the transmission of data over long distances using existing telephone infrastructure.

    Rate this question:

  • 15. 

    The degree of detail that should be incorporated into a database depends on what?

    • A.

      Data integrity

    • B.

      The type of database

    • C.

      The user's perspective

    • D.

      The business practices and policies

    • E.

      None of these

    Correct Answer
    B. The type of database
    Explanation
    The degree of detail that should be incorporated into a database depends on the type of database. Different types of databases have different requirements and purposes, so the level of detail needed will vary. For example, a financial database may require a high level of detail to accurately track transactions and balances, while a customer database may only need basic information such as names and contact details. Therefore, the type of database is a crucial factor in determining the appropriate level of detail to be included.

    Rate this question:

  • 16. 

    A table of bits in which each row represents the distinct values of a key?

    • A.

      Join index

    • B.

      Bitmap index

    • C.

      B + Tree

    • D.

      Hierarchical index

    • E.

      None of these

    Correct Answer
    B. Bitmap index
    Explanation
    A bitmap index is a table of bits in which each row represents the distinct values of a key. It is used to efficiently store and retrieve data in a database by creating a bitmap for each distinct value of a key. Each bit in the bitmap corresponds to a specific row in the table, indicating whether that row contains the corresponding value. This allows for fast searching and filtering of data based on specific key values.

    Rate this question:

  • 17. 

     Every computer connected to an intranet or extranet must have a distinct ________

    • A.

      Firewall

    • B.

      Proxy server

    • C.

      IP address

    • D.

      Domain name

    • E.

      None of these

    Correct Answer
    C. IP address
    Explanation
    Every computer connected to an intranet or extranet must have a distinct IP address. An IP address is a unique numerical identifier assigned to each device on a network. It allows computers to communicate with each other and ensures that data is sent to the correct destination. Without a distinct IP address, there would be conflicts and confusion in the network, making it impossible for devices to connect and communicate effectively.

    Rate this question:

  • 18. 

    With the object-oriented (OO) approach, an object encapsulates, or ________ a programmer.

    • A.

      Carries out, the details of an object for

    • B.

      Hides, the details of an object from

    • C.

      Reveals, the details of an object to

    • D.

      Extends, the details of an object beyond

    • E.

      None of these

    Correct Answer
    B. Hides, the details of an object from
    Explanation
    The correct answer is "hides, the details of an object from". In object-oriented programming, encapsulation is a fundamental principle where the internal details of an object are hidden from the outside world. This allows the object to maintain its integrity and ensures that only the necessary information is accessible to other parts of the program. By hiding the details, the object provides a clean interface for other programmers to interact with, promoting modularity and code reusability.

    Rate this question:

  • 19. 

    The total set of interlinked hypertext documents worldwide is-

    • A.

      HTTP

    • B.

      Browser

    • C.

      WWW

    • D.

      B2B

    • E.

      None of these

    Correct Answer
    C. WWW
    Explanation
    The correct answer is WWW, which stands for World Wide Web. The World Wide Web refers to the total set of interlinked hypertext documents that are accessible through the internet. It is a system of interconnected documents and other resources, linked by hyperlinks and URLs, allowing users to navigate and access information from various websites using web browsers. HTTP (Hypertext Transfer Protocol) is the protocol used for transferring data over the World Wide Web, while a browser is the software application used to access and view webpages. B2B (Business-to-Business) is unrelated to the concept of the interconnected hypertext documents worldwide.

    Rate this question:

  • 20. 

    A range check ________

    • A.

      Ensures that only the correct data type is entered into a field

    • B.

      Verifies that all required data is present

    • C.

      Determines whether a number is within a specified limit

    • D.

      (d) tests if the data in two or more associated fields is logical tests if the data in two or more associated fields is logical

    • E.

      None of these

    Correct Answer
    C. Determines whether a number is within a specified limit
    Explanation
    A range check is a type of validation that determines whether a number is within a specified limit. It is used to ensure that the entered data falls within an acceptable range or boundary. This helps to prevent errors or inconsistencies in the data. For example, if a field is supposed to accept values between 1 and 100, a range check would verify if the entered number is within this range. If it is not, an error message or prompt can be displayed to the user, indicating that the input is invalid.

    Rate this question:

  • 21. 

     Which of the following is TRUE ?

    • A.

      Logical design is software-dependent

    • B.

      In a distributed database, database is stored in one physical location

    • C.

      Conceptual design translates the logical design into internal model

    • D.

      Logical design is software independent

    • E.

      None of these

    Correct Answer
    A. Logical design is software-dependent
    Explanation
    Logical design refers to the representation of the database's structure and organization, including tables, relationships, and constraints. It focuses on the logical relationships between data elements and does not depend on any specific software or technology. However, the given answer states that logical design is software-dependent, which contradicts the definition of logical design. Therefore, the given answer is incorrect.

    Rate this question:

  • 22. 

     Which of the following does NOT describe a data warehouse?

    • A.

      Subject-oriented

    • B.

      Integrated

    • C.

      Time-variant

    • D.

      Updateable

    • E.

      None Of these

    Correct Answer
    D. Updateable
    Explanation
    A data warehouse is a large, centralized repository of data that is used for reporting and data analysis. It is designed to support complex queries and provide a historical perspective of the data. The data in a data warehouse is typically not updated in real-time, as it is meant to store and analyze historical data rather than transactional data. Therefore, the statement "Updateable" does not describe a data warehouse, as it implies that the data can be continuously modified or updated in real-time.

    Rate this question:

  • 23. 

    The network interface card of LAN is related to following layer of OSI Model

    • A.

      Transport

    • B.

      DATA

    • C.

      Network

    • D.

      Physical

    • E.

      None

    Correct Answer
    D. pHysical
    Explanation
    The network interface card (NIC) of a LAN is related to the Physical layer of the OSI Model. The Physical layer is responsible for the actual transmission and reception of data bits on the network. The NIC is a hardware component that enables a computer to connect to a network and physically transmit and receive data signals. It handles the electrical, mechanical, and functional aspects of the network connection, such as converting data into signals that can be sent over a network cable. Therefore, the NIC's functionality aligns with the Physical layer of the OSI Model.

    Rate this question:

  • 24. 

    A result of a computer virus can NOT lead to ________ .

    • A.

      Disk Crash

    • B.

      Mother Board Crash

    • C.

      Corruption of program

    • D.

      Deletion of files

    • E.

      None of these

    Correct Answer
    B. Mother Board Crash
    Explanation
    A computer virus is a malicious software program that can infect a computer and cause various types of damage. However, it is important to note that a computer virus is primarily designed to manipulate or disrupt software, such as corrupting programs or deleting files. While a virus can potentially cause system instability and crashes, it is unlikely to directly cause a motherboard crash. Motherboard crashes are typically the result of hardware failures or issues, rather than being caused by a software virus. Therefore, the correct answer is "Mother Board Crash".

    Rate this question:

  • 25. 

    Which error detection method uses one's complement arithmetic?

    • A.

      Simply parity check

    • B.

      Checksum

    • C.

      Two-dimensional parity check

    • D.

      CRC

    • E.

      None

    Correct Answer
    B. Checksum
    Explanation
    Checksum is an error detection method that uses one's complement arithmetic. In checksum, the data is divided into equal-sized blocks and a sum is calculated for each block. This sum is then added to the data and sent along with it. At the receiving end, the sum is recalculated and compared with the received sum. If they match, it is assumed that the data is error-free. One's complement arithmetic is used in checksum to ensure that any errors in the data are detected.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 17, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Feb 26, 2013
    Quiz Created by
    Appliedjobz
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.