S.B.I. IT Officer Model Paper

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Prashant_kr
P
Prashant_kr
Community Contributor
Quizzes Created: 3 | Total Attempts: 1,467
Questions: 50 | Attempts: 734

SettingsSettingsSettings
Banking Quizzes & Trivia

Are you a network administrator or networking student? Do you know anything about an I. T officer model and networking in the work place? If yes take this quiz to find out how much you know.


Questions and Answers
  • 1. 

    ___________________refers to a family of IEEE standards dealing with local area network with metropolitan area network

    • A.

      802

    • B.

      800

    • C.

      801

    • D.

      803

    • E.

      None of these

    Correct Answer
    A. 802
    Explanation
    The correct answer is 802. The 802 family of IEEE standards includes various specifications for local area networks (LANs) and metropolitan area networks (MANs). These standards cover different aspects such as network protocols, data transfer rates, and physical media. Examples of well-known standards within the 802 family include 802.11 for wireless LANs (Wi-Fi) and 802.3 for Ethernet.

    Rate this question:

  • 2. 

    ______uses a standard called IEEE 802.6 

    • A.

      LAN

    • B.

      WAN

    • C.

      MAN

    • D.

      Internet

    • E.

      None of These

    Correct Answer
    C. MAN
    Explanation
    MAN (Metropolitan Area Network) uses a standard called IEEE 802.6. MAN is a network that covers a larger geographic area than a LAN (Local Area Network) but smaller than a WAN (Wide Area Network). It is typically used to connect multiple LANs within a city or metropolitan area.

    Rate this question:

  • 3. 

    Repeater operates in which layer of OSI model?

    • A.

      Application Layer

    • B.

      Presentation Layer

    • C.

      Physical Layer

    • D.

      Transport Layer

    • E.

      Data link Layer

    Correct Answer
    C. Physical Layer
    Explanation
    The correct answer is Physical Layer because the repeater operates at the physical layer of the OSI model. The physical layer is responsible for transmitting raw data bits over a communication channel without any processing or interpretation. A repeater is a device that regenerates and amplifies signals to extend the range of a network by boosting the signal strength. Therefore, it operates at the physical layer to ensure the proper transmission of signals.

    Rate this question:

  • 4. 

    Which is the general network standard for the data link layer in the OSI Reference Model?

    • A.

      IEEE 802.1

    • B.

      IEEE 802.2

    • C.

      IEEE 802.3

    • D.

      IEEE 802.4

    • E.

      IEEE 802.6

    Correct Answer
    B. IEEE 802.2
    Explanation
    The correct answer is IEEE 802.2. IEEE 802.2 is the general network standard for the data link layer in the OSI Reference Model. It defines the Logical Link Control (LLC) sublayer, which provides services to the network layer and handles the flow and error control mechanisms. The other options (IEEE 802.1, IEEE 802.3, IEEE 802.4, and IEEE 802.6) are also standards within the IEEE 802 series, but they are specific to other layers or different network technologies.

    Rate this question:

  • 5. 

    Where does Bridge operate in OSI model?

    • A.

      Physical Layer

    • B.

      Data Link Layer

    • C.

      Both (1) and (2)

    • D.

      Application Layer

    • E.

      None of these

    Correct Answer
    C. Both (1) and (2)
    Explanation
    The correct answer is "Both (1) and (2)". A bridge operates in both the Physical Layer and the Data Link Layer of the OSI model. In the Physical Layer, it forwards data packets based on the physical addresses of the devices. In the Data Link Layer, it examines the MAC addresses of the devices to determine whether to forward or filter the packets. Therefore, a bridge operates at both layers to facilitate the communication between different network segments.

    Rate this question:

  • 6. 

    Which of the following uses the greatest number of layers in OSI model?

    • A.

      Bridge

    • B.

      Repeater

    • C.

      Router

    • D.

      Gateway

    • E.

      None of these

    Correct Answer
    D. Gateway
    Explanation
    A gateway uses the greatest number of layers in the OSI model because it operates at all seven layers. It acts as a translator between different protocols and network architectures, allowing communication between networks that use different protocols. This requires it to understand and process data at each layer of the OSI model, making it the option that uses the greatest number of layers.

    Rate this question:

  • 7. 

    Routers operate in which layer of OSI?

    • A.

      Physical layer

    • B.

      Data Link Layer

    • C.

      Network Layer

    • D.

      All of these

    • E.

      None of these

    Correct Answer
    D. All of these
    Explanation
    Routers operate in all of these layers of the OSI model. In the physical layer, routers transmit and receive signals over physical media such as cables. In the data link layer, routers use MAC addresses to forward data packets between devices on the same network. In the network layer, routers use IP addresses to route data packets between different networks. Therefore, routers play a role in all three layers of the OSI model.

    Rate this question:

  • 8. 

    MODEM is a___________that modulates and demodulates signals

    • A.

      DCE (Data Circuit-Terminating Equipment)

    • B.

      DTE (Data terminal euipment)

    • C.

      Both (1) and (2)

    • D.

      DTE-DCE

    • E.

      None of these

    Correct Answer
    A. DCE (Data Circuit-Terminating Equipment)
    Explanation
    A MODEM is a device that modulates and demodulates signals. DCE (Data Circuit-Terminating Equipment) is the correct answer because it refers to the equipment that terminates a digital circuit, such as a MODEM. DTE (Data terminal equipment) refers to the equipment that originates or terminates data, such as a computer or a terminal. The answer "Both (1) and (2)" is incorrect because it includes both DCE and DTE, which are two separate entities. "DTE-DCE" is also incorrect because it combines both DCE and DTE into one term. "None of these" is also incorrect because DCE is the correct answer.

    Rate this question:

  • 9. 

    At ___ layer TCP/IP defines two protocols: Transmission Control Protocol (TCP) and User Datagram Protocol (UDP)

    • A.

      Transport

    • B.

      Network

    • C.

      Physical

    • D.

      Application

    • E.

      None of these

    Correct Answer
    A. Transport
    Explanation
    TCP/IP is a protocol suite that defines how data is transmitted over networks. At the Transport layer, TCP/IP defines two protocols: Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). TCP is a reliable protocol that ensures the delivery of data packets in the correct order and guarantees error-free transmission. UDP, on the other hand, is a connectionless protocol that does not guarantee the delivery of data packets or their order. Both TCP and UDP are used for different types of network communication, and their functions are defined at the Transport layer of the TCP/IP model.

    Rate this question:

  • 10. 

    A communication network which is used by large organizations over regional, national or global area are called

    • A.

      LAN

    • B.

      WAN

    • C.

      MAN

    • D.

      Internet

    • E.

      None of These

    Correct Answer
    B. WAN
    Explanation
    A Wide Area Network (WAN) is a communication network that is used by large organizations over a regional, national, or global area. It allows for the connection of multiple Local Area Networks (LANs) and enables the sharing of resources and information across different geographical locations. Unlike LANs, which are limited to a specific area such as a building or campus, WANs provide connectivity over larger distances. The Internet is a type of WAN that connects networks globally, making it possible for users to access information and services from anywhere in the world. Therefore, the correct answer is WAN.

    Rate this question:

  • 11. 

    The __________ layer is closest to transmission medium

    • A.

      Transport

    • B.

      Network

    • C.

      Physical

    • D.

      Application

    • E.

      None of these

    Correct Answer
    C. Physical
    Explanation
    The physical layer is closest to the transmission medium because it is responsible for transmitting raw bits over a physical medium such as copper wires, fiber optic cables, or wireless signals. It deals with the physical characteristics of the transmission medium, such as voltage levels, signaling rates, and physical connectors. This layer ensures that the bits are transmitted reliably and accurately across the network.

    Rate this question:

  • 12. 

    End to End connectivity is provided in____layer

    • A.

      Network

    • B.

      Session

    • C.

      Transport

    • D.

      Data Link

    • E.

      Application

    Correct Answer
    C. Transport
    Explanation
    The correct answer is Transport because the Transport layer is responsible for providing end-to-end connectivity and ensuring reliable communication between the source and destination hosts. It is responsible for segmenting data, adding sequence numbers, and providing flow control and error recovery mechanisms. The Network layer is responsible for routing packets, the Data Link layer is responsible for framing and error detection, and the Application layer is responsible for providing services to the end-users. The Session layer is responsible for establishing, managing, and terminating sessions between applications.

    Rate this question:

  • 13. 

    Which of the following Transport layer protocol is used for transferring Electronic mail messages from one machine to anoher

    • A.

      SNMP

    • B.

      SMTP

    • C.

      TCP

    • D.

      FTP

    • E.

      POP/IMAP

    Correct Answer
    C. TCP
    Explanation
    TCP (Transmission Control Protocol) is the correct answer for this question. TCP is a reliable and connection-oriented transport layer protocol that is commonly used for transferring electronic mail messages from one machine to another. It ensures that the data is delivered in the correct order and without any errors. SMTP (Simple Mail Transfer Protocol) is an application layer protocol that uses TCP to transfer email messages between mail servers. Therefore, TCP is the appropriate choice for this scenario.

    Rate this question:

  • 14. 

    Which of the following is an example of Client/Server Model?

    • A.

      FTP

    • B.

      DNS

    • C.

      TELNET

    • D.

      All of the above

    • E.

      None of these

    Correct Answer
    D. All of the above
    Explanation
    All of the options listed (FTP, DNS, and TELNET) are examples of the client/server model. In the client/server model, a client computer requests services or resources from a server computer. FTP (File Transfer Protocol) allows clients to transfer files to and from a server. DNS (Domain Name System) translates domain names into IP addresses, with clients requesting this information from DNS servers. TELNET allows clients to remotely access and control servers. Therefore, all of these options demonstrate the client/server model.

    Rate this question:

  • 15. 

    IEEE standard for Wi-Fi Systems is_____

    • A.

      802.11

    • B.

      802.1

    • C.

      802.2

    • D.

      802.3

    • E.

      802.10

    Correct Answer
    A. 802.11
    Explanation
    The correct answer is 802.11. This is the IEEE standard for Wi-Fi systems. It specifies the protocols and technologies used for wireless local area networks (WLANs). The 802.11 standard defines different variations such as 802.11a, 802.11b, 802.11g, 802.11n, 802.11ac, and 802.11ax, each with its own specifications and capabilities.

    Rate this question:

  • 16. 

    Default Subnet mask for class B network is______

    • A.

      127.0.0.1

    • B.

      255.0.0.0

    • C.

      255.255.0.0

    • D.

      255.255.255.0

    • E.

      None of these

    Correct Answer
    C. 255.255.0.0
    Explanation
    The default subnet mask for a class B network is 255.255.0.0. This subnet mask allows for a network portion of 16 bits and a host portion of 16 bits. It can support up to 65,534 hosts on each network.

    Rate this question:

  • 17. 

    A central computer surrounded by one or more satellite computers is called___ 

    • A.

      Bus Network

    • B.

      Ring Network

    • C.

      Star Network

    • D.

      All of above

    • E.

      None of these

    Correct Answer
    C. Star Network
    Explanation
    A central computer surrounded by one or more satellite computers is known as a Star Network. In this network topology, all the satellite computers are connected to the central computer, forming a star-like structure. The central computer acts as a hub, facilitating communication between the satellite computers. This arrangement allows for easy management and troubleshooting as each satellite computer can be individually connected or disconnected without affecting the rest of the network.

    Rate this question:

  • 18. 

    Internet-like network within enterprises are called________

    • A.

      Intranets

    • B.

      Switching alternatives

    • C.

      Inter-Organizational Network

    • D.

      Extranets

    • E.

      None of these

    Correct Answer
    A. Intranets
    Explanation
    Intranets are internet-like networks within enterprises. They are private networks that use internet protocols and technologies to securely share information and resources within an organization. Intranets are designed to be accessible only to authorized users within the organization, providing a secure and controlled environment for communication, collaboration, and information sharing. Intranets are commonly used to facilitate internal communication, document sharing, employee collaboration, and access to company resources such as databases and applications.

    Rate this question:

  • 19. 

    What is loopback address?

    • A.

      127.0.0.0

    • B.

      127.0.0.1

    • C.

      127.0.1.0

    • D.

      127.1.0.0

    • E.

      127.1.1.1

    Correct Answer
    B. 127.0.0.1
    Explanation
    The loopback address is a special IP address that is used to test network connections on a local device. It is commonly represented as 127.0.0.1. When a device sends data to this address, it loops back to itself, allowing the device to communicate with itself. This is often used for troubleshooting and testing purposes, as it allows the device to simulate network communication without actually sending data over a physical network.

    Rate this question:

  • 20. 

    ____________is the continuous ability to send and recieve data between interconnected networks 

    • A.

      FTP

    • B.

      SMTP

    • C.

      TNS

    • D.

      Network Interoperability

    • E.

      None of these

    Correct Answer
    D. Network Interoperability
    Explanation
    Network interoperability refers to the continuous ability to send and receive data between interconnected networks. It ensures that different networks, systems, and devices can seamlessly communicate and exchange information without any compatibility or connectivity issues. This is essential for the smooth functioning of the internet and other interconnected networks, allowing users to access and share data across different platforms and environments. FTP (File Transfer Protocol), SMTP (Simple Mail Transfer Protocol), and TNS (Transparent Network Substrate) are specific protocols or technologies used for specific purposes within network interoperability, but the term "network interoperability" encompasses the broader concept of seamless data exchange between interconnected networks.

    Rate this question:

  • 21. 

    Encryption/Decryption provides a network with______

    • A.

      Privacy

    • B.

      Authenticity

    • C.

      Integrity

    • D.

      Non-Repudiation

    • E.

      None of these

    Correct Answer
    A. Privacy
    Explanation
    Encryption/Decryption provides a network with privacy by ensuring that the information being transmitted is only accessible to authorized individuals. It involves encoding the data in such a way that it cannot be understood by anyone who does not have the decryption key. This ensures that sensitive information remains confidential and protected from unauthorized access or interception.

    Rate this question:

  • 22. 

    With an IP address of 100, you currently have 80 subnets. What subnet mask you should use to maximize number of hosts?

    • A.

      192

    • B.

      240

    • C.

      248

    • D.

      224

    • E.

      252

    Correct Answer
    E. 252
    Explanation
    To maximize the number of hosts, a subnet mask with a larger number of host bits should be used. The subnet mask 252 has 4 host bits, which allows for a maximum of 14 hosts per subnet (2^4 - 2). This is the largest number of hosts possible among the given subnet masks (192, 240, 248, 224, and 252). Therefore, the subnet mask 252 should be used to maximize the number of hosts.

    Rate this question:

  • 23. 

    The data encrypted at the sender site is called_____. The data to be decrypted at reciever end is called___

    • A.

      Secret Key,Public Key

    • B.

      Public Key, Secret Key

    • C.

      Plaintext, Cipher Text

    • D.

      Cipher Text, Plaintext

    • E.

      None of these

    Correct Answer
    C. Plaintext, Cipher Text
    Explanation
    The data encrypted at the sender site is called plaintext, while the data to be decrypted at the receiver end is called ciphertext.

    Rate this question:

  • 24. 

    In digital signature, the private key is used for___________ and public key for________

    • A.

      Encyption, Decryption

    • B.

      Decryption, Encryption

    • C.

      Plain text, Cipher Text

    • D.

      Cipher Text, Plain text

    • E.

      None of these

    Correct Answer
    A. Encyption, Decryption
    Explanation
    In digital signature, the private key is used for encryption and the public key is used for decryption. This is because the private key is known only to the owner and is used to encrypt the data, ensuring its integrity and authenticity. The public key, on the other hand, is freely available to anyone and is used to decrypt the data, verifying the digital signature and ensuring that it was indeed created by the owner of the private key.

    Rate this question:

  • 25. 

    A _______'s main purpose if to prohibit unathorized access to your computer via Internet

    • A.

      PopUp Blocker

    • B.

      Firewall

    • C.

      Spyware

    • D.

      Spam assassin

    • E.

      None of these

    Correct Answer
    B. Firewall
    Explanation
    A firewall's main purpose is to prohibit unauthorized access to your computer via the Internet. It acts as a barrier between your computer and the outside world, monitoring and controlling incoming and outgoing network traffic based on predetermined security rules. By analyzing data packets and determining whether they should be allowed or blocked, a firewall helps protect your computer from potential threats, such as hackers, malware, and unauthorized access attempts.

    Rate this question:

  • 26. 

    Print Server uses___________which is a buffer that holds data before it is send to printer

    • A.

      Spool

    • B.

      Queue

    • C.

      Node

    • D.

      Stack

    • E.

      None of these

    Correct Answer
    A. Spool
    Explanation
    A Print Server uses a spool, which is a buffer that holds data before it is sent to the printer. This allows the print server to receive and process print jobs from multiple users simultaneously, storing them in the spool until the printer is ready to print. This helps in improving the efficiency and speed of printing by allowing users to continue working without having to wait for their print job to be completed immediately.

    Rate this question:

  • 27. 

    _____________is a computer to computer exchange of routine business data between trading partners in a standard data formats.

    • A.

      CTS

    • B.

      DSR

    • C.

      VDR

    • D.

      EDI

    • E.

      None of these

    Correct Answer
    D. EDI
    Explanation
    EDI stands for Electronic Data Interchange. It is a computer-to-computer exchange of routine business data between trading partners in a standard data format. This allows for the seamless transmission of information such as purchase orders, invoices, and shipping notices, eliminating the need for manual data entry and reducing errors. EDI is widely used in various industries to streamline business processes, increase efficiency, and improve communication between trading partners.

    Rate this question:

  • 28. 

    Communication handler is basically an____ 16 bit micro controller?

    • A.

      8085

    • B.

      8086

    • C.

      8086A

    • D.

      80C186

    • E.

      None of these

    Correct Answer
    D. 80C186
    Explanation
    The correct answer is 80C186. The 80C186 is a 16-bit microcontroller that can handle communication tasks. It is specifically designed for communication applications and includes features such as UART, DMA, and interrupt controllers. It is a popular choice for applications that require reliable and efficient communication handling.

    Rate this question:

  • 29. 

    What is a Pre-Shared Key that is more than 7 and less than 64 characters in length.

    • A.

      WPA-PSK

    • B.

      TKIP

    • C.

      AES

    • D.

      All of these

    • E.

      None of these

    Correct Answer
    D. All of these
    Explanation
    A Pre-Shared Key (PSK) is a password used to authenticate wireless devices and secure the network. In the context of this question, the correct answer is "All of these" because all three options (WPA-PSK, TKIP, and AES) can be used with a PSK that is more than 7 and less than 64 characters in length. WPA-PSK is a security protocol that uses a PSK, while TKIP and AES are encryption algorithms that can be used with a PSK to secure the wireless network.

    Rate this question:

  • 30. 

    Ping command is used for what purpose?

    • A.

      Test a device on a network weather it is reachable

    • B.

      Test a hard disk fault

    • C.

      Test devices scanning quality

    • D.

      Test a bug in application

    • E.

      Both (1) and (4)

    Correct Answer
    A. Test a device on a network weather it is reachable
    Explanation
    The ping command is used to test whether a device on a network is reachable or not. It sends a small packet of data to the specified IP address or domain name and waits for a response. If a response is received, it indicates that the device is reachable and functioning properly. This command is commonly used for network troubleshooting and diagnosing connectivity issues.

    Rate this question:

  • 31. 

    Which of the following identifies a specific web page and its computer on the web page?

    • A.

      Web Site

    • B.

      URL

    • C.

      Web Site address

    • D.

      Domain name

    • E.

      None of these

    Correct Answer
    D. Domain name
    Explanation
    A domain name is a unique name that identifies a specific website and its computer on the internet. It is used in the URL (Uniform Resource Locator) to access a specific web page. A domain name is easier to remember and use than the actual IP address of the computer hosting the website. Therefore, the domain name is the correct answer as it specifically identifies a web page and its computer on the web.

    Rate this question:

  • 32. 

    Two different kinds of networks can be connected via

    • A.

      Bridges

    • B.

      Gateways

    • C.

      Satellites

    • D.

      Routers

    • E.

      None of these

    Correct Answer
    B. Gateways
    Explanation
    Gateways are devices that connect two different kinds of networks, allowing communication between them. They act as a bridge between networks that use different protocols or have different architectures. Unlike bridges, which connect similar networks, gateways handle the translation of data and protocols between the networks, enabling seamless communication. Satellites, routers, and bridges may also connect networks, but gateways specifically address the connectivity between different network types. Therefore, gateways are the correct answer for connecting two different kinds of networks.

    Rate this question:

  • 33. 

    Full adder is used for

    • A.

      2 bit addition

    • B.

      3 bit addition

    • C.

      4 bit addition

    • D.

      6 bit addition

    • E.

      8 bit addition

    Correct Answer
    B. 3 bit addition
    Explanation
    A full adder is a digital circuit that performs addition of three bits: two input bits and a carry bit. It is capable of adding two 1-bit numbers along with the carry generated from the previous stage. Therefore, it is commonly used for 3-bit addition, where three bits are added together to produce a sum and a carry output. This allows for the addition of numbers that are represented in 3 bits, providing a wider range of possible values compared to 2-bit addition.

    Rate this question:

  • 34. 

    Which type of computers use 8 bit EBCDIC code?

    • A.

      Mini Computers

    • B.

      Super Computers

    • C.

      Mainframes

    • D.

      MicroComputers

    • E.

      None of these

    Correct Answer
    C. Mainframes
    Explanation
    Mainframes use 8-bit EBCDIC code. EBCDIC stands for Extended Binary Coded Decimal Interchange Code, which is a character encoding used mainly on IBM mainframe computers. EBCDIC uses 8 bits to represent each character, allowing for a larger character set than ASCII. Therefore, the correct answer is Mainframes.

    Rate this question:

  • 35. 

    IP address 135.0.10.27 belongs to class_____

    • A.

      A

    • B.

      B

    • C.

      C

    • D.

      D

    • E.

      None of these

    Correct Answer
    B. B
    Explanation
    The IP address 135.0.10.27 belongs to class B. In classful IP addressing, the first octet of the IP address determines the class. Class B addresses have a range of 128.0.0.0 to 191.255.255.255, with the first two octets used for network identification and the last two for host identification. The given IP address falls within this range, hence it belongs to class B.

    Rate this question:

  • 36. 

    Decimal equivalent of 11100001111 is

    • A.

      1806

    • B.

      1807

    • C.

      2806

    • D.

      All of these

    • E.

      None of these

    Correct Answer
    B. 1807
    Explanation
    The decimal equivalent of a binary number can be found by multiplying each digit by the corresponding power of 2 and then summing the results. In this case, starting from the rightmost digit, we have 1 * 2^0 + 1 * 2^1 + 1 * 2^2 + 0 * 2^3 + 0 * 2^4 + 0 * 2^5 + 0 * 2^6 + 1 * 2^7 + 1 * 2^8 + 1 * 2^9 + 1 * 2^10. Simplifying this expression gives us 1 + 2 + 4 + 0 + 0 + 0 + 0 + 128 + 256 + 512 + 1024 = 1807. Therefore, the correct answer is 1807.

    Rate this question:

  • 37. 

    Which are not used in case of applet?

    • A.

      Read/Write data from disk

    • B.

      Internet

    • C.

      Search Engine

    • D.

      All of these

    • E.

      None of these

    Correct Answer
    A. Read/Write data from disk
    Explanation
    Applets are small applications that run within a web browser. They are designed to be lightweight and portable, and therefore do not have direct access to the user's disk. Applets are typically used to enhance the functionality of a web page by providing interactive content or multimedia. They can communicate with the internet to retrieve data or interact with web services, but they do not have the capability to read or write data from the user's disk. Therefore, "Read/Write data from disk" is not used in the case of applets.

    Rate this question:

  • 38. 

    An IC contains 50 gates each of which consists of 6 components. It belongs to____

    • A.

      VLSI

    • B.

      LSI

    • C.

      MSI

    • D.

      SSI

    • E.

      None of these

    Correct Answer
    C. MSI
    Explanation
    The IC containing 50 gates, each consisting of 6 components, belongs to the MSI (Medium Scale Integration) category. MSI refers to integrated circuits that have a moderate level of complexity and are capable of accommodating a higher number of gates and components compared to SSI (Small Scale Integration) circuits. VLSI (Very Large Scale Integration) and LSI (Large Scale Integration) are used to describe circuits with even greater complexity and higher gate and component counts. Therefore, the correct answer is MSI.

    Rate this question:

  • 39. 

    Most important advantage of IC is its______

    • A.

      Easy replacement in case of circuit failure

    • B.

      Low power consumption

    • C.

      Extremely high reliability

    • D.

      Reduced cost

    • E.

      3 bit addition

    Correct Answer
    C. Extremely high reliability
    Explanation
    The most important advantage of an Integrated Circuit (IC) is its extremely high reliability. This means that ICs are less likely to fail or malfunction compared to other circuit components. This reliability is achieved through the miniaturization and integration of multiple electronic components onto a single chip, reducing the chances of physical damage or external interference. The high reliability of ICs makes them ideal for use in critical applications where failure could have severe consequences, such as in aerospace or medical devices.

    Rate this question:

  • 40. 

    An OR gate___

    • A.

      Implements logical product

    • B.

      Is any-or-all gate

    • C.

      Is equivalent to a series switching circuit

    • D.

      Is equivalent to a parallel switching circuit

    • E.

      None of these

    Correct Answer
    B. Is any-or-all gate
    Explanation
    An OR gate is a digital logic gate that outputs a true value if any of its inputs are true. It can be seen as an "any-or-all" gate because it produces a true output if any or all of its inputs are true. This means that even if only one input is true, the output will be true. Therefore, the correct answer is "is any-or-all gate".

    Rate this question:

  • 41. 

    Which of the following is not a type of database language?

    • A.

      Data Manipulation Language

    • B.

      Data Definition Language

    • C.

      Data Control Language

    • D.

      Data Standard Language

    • E.

      None of these

    Correct Answer
    D. Data Standard Language
    Explanation
    Data Standard Language is not a type of database language. The other options listed - Data Manipulation Language, Data Definition Language, and Data Control Language - are all types of database languages that are used for different purposes in managing and manipulating data within a database. Data Standard Language, on the other hand, is not a recognized type of database language and does not have a specific function or purpose in database management.

    Rate this question:

  • 42. 

    Which of the following is not a type of database?

    • A.

      Hierarchical

    • B.

      Relational

    • C.

      Network

    • D.

      Synthetic

    • E.

      Transition

    Correct Answer
    E. Transition
    Explanation
    The given options are all types of databases except for "Transition." Transition is not a commonly recognized type of database. Hierarchical, relational, and network databases are all well-known and widely used types of databases. Synthetic is not a type of database either, but it is not as commonly recognized as the other options. Therefore, the correct answer is Transition.

    Rate this question:

  • 43. 

    Programs in which of the following can't be erased?

    • A.

      RAM

    • B.

      ROM

    • C.

      Cache Memory

    • D.

      Virtual Memory

    • E.

      None of these

    Correct Answer
    B. ROM
    Explanation
    ROM stands for Read-Only Memory, which is a type of computer memory that is non-volatile and cannot be erased or modified. Unlike RAM (Random Access Memory) which is volatile and can be both read from and written to, ROM is designed to store permanent data or instructions that are essential for the computer's operation. Therefore, programs stored in ROM cannot be erased.

    Rate this question:

  • 44. 

    The drawback of binary tree sort are remedied by:-

    • A.

      Linear Sort

    • B.

      Heap Sort

    • C.

      Insertion Sort

    • D.

      Quick Sort

    • E.

      None of these

    Correct Answer
    B. Heap Sort
    Explanation
    Heap Sort is the correct answer because it overcomes the drawbacks of binary tree sort. Binary tree sort has a drawback of having an unbalanced tree, which can lead to inefficient sorting. Heap Sort, on the other hand, uses a binary heap data structure that ensures a balanced tree and guarantees efficient sorting. It achieves this by creating a heap from the given array and then repeatedly removing the root element (which is the largest) and placing it at the end of the sorted array.

    Rate this question:

  • 45. 

    White box testing, a software testing technique is sometimes called____

    • A.

      Graph testing

    • B.

      Basis Path testing

    • C.

      Glass Box Testing

    • D.

      Data Flow Testing

    • E.

      None of these

    Correct Answer
    C. Glass Box Testing
    Explanation
    White box testing is a software testing technique that involves testing the internal structure and implementation of a software system. It is also known as glass box testing because it allows the tester to see and understand the internal workings of the system, similar to looking inside a glass box. This technique involves examining the code, logic paths, and data flows to ensure that all components of the system are functioning correctly. Therefore, the correct answer is Glass Box Testing.

    Rate this question:

  • 46. 

    Which of the following activity is associated with data warehouse?

    • A.

      EDI

    • B.

      Credit Card Transactions

    • C.

      ATM Transactions

    • D.

      Payment Gateways

    • E.

      Data Mining

    Correct Answer
    E. Data Mining
    Explanation
    Data mining is the correct answer because it is a process of discovering patterns and extracting useful information from large datasets. Data warehouses are specifically designed to store and organize large amounts of data from various sources, making it easier to perform data mining activities. EDI, credit card transactions, ATM transactions, and payment gateways are all related to data processing and transactions, but they are not directly associated with data warehousing or the process of data mining.

    Rate this question:

  • 47. 

    To modify existing ROWS of table_____command is used

    • A.

      ALTER

    • B.

      MODIFY

    • C.

      UPDATE

    • D.

      COMMIT

    • E.

      DELETE

    Correct Answer
    C. UPDATE
    Explanation
    The correct answer is UPDATE because the UPDATE command is used to modify existing rows of a table. This command allows you to change the values of specific columns in one or more rows of a table based on specified conditions. It provides a way to update the data in a table without having to delete and reinsert the entire row.

    Rate this question:

  • 48. 

    SONET uses

    • A.

      Twisted Pair Cable

    • B.

      Fiber Optic Cable

    • C.

      Co-Axial Cable

    • D.

      All of these

    • E.

      None of these

    Correct Answer
    B. Fiber Optic Cable
    Explanation
    SONET (Synchronous Optical Network) is a high-speed telecommunications network that is widely used for transmitting voice, data, and video over long distances. It uses fiber optic cables for transmission. Fiber optic cables are made of thin strands of glass or plastic that transmit data as pulses of light. These cables offer high bandwidth, low signal loss, and immunity to electromagnetic interference, making them ideal for long-distance and high-speed data transmission. Therefore, the correct answer is Fiber Optic Cable.

    Rate this question:

  • 49. 

    Second generation computers used___language

    • A.

      Assembly

    • B.

      High Level

    • C.

      Machine

    • D.

      Code

    • E.

      None of these

    Correct Answer
    A. Assembly
    Explanation
    Second generation computers used assembly language. Assembly language is a low-level programming language that is specific to a particular computer architecture. It uses mnemonic codes and symbols to represent the machine instructions and data. Assembly language is easier for humans to understand and write compared to machine code, which is in binary format. However, it still requires a deep understanding of the computer's architecture and instruction set. Second generation computers, which were developed in the 1950s and 1960s, used assembly language as a means of programming and controlling the computer's operations.

    Rate this question:

  • 50. 

    In Queue, the items deleted at one end called___

    • A.

      Rear

    • B.

      Front

    • C.

      Top

    • D.

      Bottom

    • E.

      None of these

    Correct Answer
    B. Front
    Explanation
    In a queue, the items are deleted from the front end. The front represents the first item that was inserted into the queue, and as items are deleted, the front moves towards the rear. Therefore, the correct answer is "Front".

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Feb 02, 2014
    Quiz Created by
    Prashant_kr
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.