sponsored links
1. Project
management will be made a separate division on the basis of _____
a. Interdependencies
among departments
b. Sharing
of resources
c. Size
of the project
d.
All
of the above
2. Depending
upon the traffic handling capacity of class A, B, C network which of the
following is true ?
b. Small,
Moderate, Large
c. Moderate,
Small, Large
d. All
are same
e. None
of these
3. Unit
record machines are actually
a. Machines
that can record unit data
b. Initial
form of tape recorder
c.
A
sort of punching machine
d. All
of the above
e. None
of these
4. Which
of the following is equivalent to 7 in binary system?
a. 110
b.
111
c. 101
d. All
of these
e. None
of these
5. In
object oriented technology, hiding the complexity of characteristics is called _________
a.
Abstraction
b. Object
c. Inheritance
d. Polymorphism
e. None
of these
6. Which
of the following programming languages is exclusively used for artificial
intelligence ?
a. C
b. J2EE
c.
Prolog
d. Java
e. None
of these
7. Which
of the following is false about change in computer from one generation to the
next ?
a. Computer
size is decreased
b. Speed
of processing increase
c.
Memory
/ Storage capacities decreases
d. All
of these
e. None
of these
8. Synchronous
transmission may be defined as :
a. Communication
where the receiver clock must be in approximate synchronism with that of the
transmitter.
b. Communication
where the receiver will operate satisfactorily, even if its clock frequency is appreciably
different to that of the transmitter.
c.
Communication
where the receiver clock is arranged to be in exact synchronism with that of
the receiver.
d. All
of the above
e. None
of these
9. The
strategy for testing a function when developing a software is made at
a. Test
strategy
b.
Test
plans
c. Test
case design
d. All
of these
e. None
of these
10. When
talking of software budget
a. It
includes only direct development costs
b. Productivity
loss (of an end-user) that occurs during IT training
c.
Indirect
costs of the budget include training costs and productivity
d. All
of these
e. None
of these
11. To
make a program safe we should take care of :
a.
Strong
authentication and access controls
b. Error
checking controls
c. Do
risk analysis
d. All
of these
e. None
of these
12. We
are shifting towards computerization because
a. Current
technologies are available
b.
Technologies
help in meeting the business objectives
c. Hire
the employees that are expert in the latest technologies are available
d. All
of these
e. None
of these
13. Who
is responsible for developing the intranet strategy and monitoring its
policies?
a.
Intranet
administrator
b. Webmaster
c. Editor
d. All
of these
e. None
of these
14. Network
layer’s function is to
a.
Select
path for data transfer
b. Break
the Network in to subnet
c. Determine
the IP
d. All
of these
e. None
of these
15. Which
of the following makes a network insecure?
a. Encryption
b. Network
interface card (NIC)
c.
Static
keys
d. All
of these
e. None
of these
16. If
the network of the company is to be protected from remote access that may
damage company’s reputation due to misuse of information then security policy
should include ________
a. All
employees
b. Only
the employer
c. Contractors
d.
All
of the above
e. None
of these
17. Telnet
helps in
a.
Remote
log in
b. Connecting
to television
c. Transferring
files across net
d. All
of these
e. None
of these
18. Which
of the following is NOT true aobut FTP?
a. It
is a protocol
b. It
is a program or command
c. It
transfers files over net
d.
All
are true
e. None
are true
19. TCP/IP
protocol stack is
a. Combination
of TCP & IP protocols
b.
A
family of protocols that connect to PCs
c. Part
of Internet
d. All
of these
e. None
20. Who
amongst the following is called the father of modern computing?
a.
Charles
Babbage
b. Hollerith
c. Gottfried
Von Leibnitz
d. Joseph.
M. Jacquard
thanks for the post.. Please provide some more professional knowledge paper
ReplyDeletefriends concentrate more on reasoning questions they are really time consuming ,, I had my exam today. rest of 3 sections were good
ReplyDeletehello.. r u from IT.. can you tell me what came in professional knowledge paper?
Deletehw was d xam?easy or moderate?
DeleteFriends.. Today IT prof knowledge qns are asked only based on computers. In other way u can call it as Computer Knowledge like IBPS clerical paper.
ReplyDeleteALL THE BEST :-)
Thank you so much for the update friend. All the best.
DeleteFrnd IT officer Scale II paper have different questions from scale I? Can anybody clarify me on this
ReplyDelete