Search your Topic HERE....

February 02, 2015

IBPS IT Officers Professional Knowledge Quiz


sponsored links

  1. The strategy of allowing processes that are logically runnable to be temporarily suspended is called ?
    1. preemptive scheduling
    2. non preemptive scheduling
    3. shortest job first 
    4. first come first served
    5. none of these
  2. The LRU algorithm
    1. pages out pages that have been used recently 
    2. pages out pages that have not been used recently 
    3. pages out pages that have been least used recently 
    4. pages out the first page in a give area 
    5. none of these
  3. Which of the following systems software does the job of merging the records from two files into one ?
    1. security software 
    2. utility program 
    3. networking software 
    4. documentation system 
    5. none of these
  4. Which of the following statement is false ?
    1. the technique of storage compaction involves moving all occupied areas of storage to one end or other of main storage 
    2. compaction does not involve relocation of programs
    3. compaction is also known as garbage collection 
    4. the system must stop everything while it performs the compaction 
    5. none of these
  5. User-Friendly systems are :
    1. required for object- oriented programming 
    2. easy to develop
    3. common among traditional mainframe operating systems 
    4. becoming more common 
    5. none of these
  6. Which of the following addressing modes, facilitates access to an operand whose location is defined relative to the beginning of the data structure in which it appears ?
    1. ascending
    2. sorting 
    3. index
    4. indirect
    5. none of these
  7. The FIFO algorithm 
    1. executes first the job that last entered the queue
    2. executes first the job that first entered the queue
    3. execute first the job that has been in the queue from longest 
    4. executes first the job with the least processor needs 
    5. none of these
  8. Assembly code data base is associated with ?
    1. assembly language version of the program which is created by the code generation phase and is input to the assembly phase 
    2. a permanent table of decision rules in the form of patterns for matching with the uniform symbol table to discover syntactic structure 
    3. consists of a full or partial list or the tokens as they appear  in the programm. Created by Lexical analysis and used for syntax analysis and interpretation.
    4. a permanent table which lists all key words and special symbols of the language in symbolic form
    5. none of these
  9. In which addressing mode the effective address of the operand is the contents of a register specified in the instruction and after accessing the operand, the contents of this register is incremented to point to the next item in the list ?
    1. index addressing 
    2. indirect addressing 
    3. auto increment 
    4. auto decrement 
    5. none of these
  10. In which addressing mode the contents of a register specified in the instruction are first decremented, and then these contents are used as the effective address of the operands ?
    1. index addressing 
    2. indirect addressing 
    3. auto increment 
    4. auto decrement 
    5. none of these
  11. What is the name given to the values that are automatically provided by software to reduce keystrokes and improve a computer user's productivity ?
    1. defined values
    2. fixed values 
    3. default values 
    4. special values 
    5. none of these
  12. The Register - to - Register instructions 
    1. have both their operands in the main store 
    2. which perform an operation on a register operand and an operand which is located in the main store, generally leaving the result in the register, except in the case of store operation when it is also written into the specified storage location
    3. which perform indicated operations on two fast registers of the machine and leave the result in one of the registers
    4. all of these 
    5. none of these
  13. The process of transferring data intended for a peripheral device into a disk (or intermediate store) so that it can be transferred to peripheral at a more convenient time or in bulk, is known as 
    1. multiprogramming 
    2. spooling 
    3. caching 
    4. virtual programming 
    5. none of these
  14. Which of the following capabilities is required for a system program to execute more than one program at a time ?
    1. word processing
    2. compiling
    3. virtualmemory
    4. multitasking
    5. none of these
  15. The action of parsing the source program into the proper syntactic classes is known as 
    1.  syntax analysis 
    2. lexical analysis 
    3. interpretation analysis 
    4. general syntax analysis
    5. none of these
  16. Banker's algorithm for recourse allocation deals with  ?
    1. deadlock prevention
    2. resources of nationalized banks
    3. deadlock avoidance
    4. deadlock recovery 
    5. mutual exclusion 
    6. none of these
  17. Relocation bits used by relocating loader are specified (generated) by ? 
    1. relocating loader itself 
    2. linker
    3. assembler or translator 
    4. macro processor 
    5. none of these
  18. The higher versions of the operating systems are so written that programs designed for earlier versions can still be run. What is it called ?
    1. upgradability 
    2. upward mobility 
    3. universality 
    4. upward compatibility 
    5. none of these
  19. Which policy replaces a page if it is not in the favored subset of a process' pages ? 
    1. FIFO
    2. LRU
    3. LFU
    4. Working set
    5. none of these
  20. Which of the following terms refers to the degree to which data in a database system are accurate and correct ?
    1. data security 
    2. data validity
    3. data independence
    4. data integrity 
    5. none of these
sponsored links


  1. Repeater-Physical Layer
    Bridge-Data Link Layer
    HUB-Multiport Repeater-Physical Layer-
    Switch-Multiport Bridge-datalink-used for LAN connection
    Router-Multiple LAN connection-Network-used for LAN-LAN Comm,WAN Comm
    Gateway-all layers

    Confidentality-Sender and Receiver expect Privacy
    Integrity-the data must arrive at the receiver exactly as sent
    Nonrepudiation-sender must not be able to deny sendinding a message that he sent
    Verification(static)- check whether the software according to specifications.
    Validation(dynamic)-to check whether software meets the customer expectations and requirements.

  2. plzz provide a programing language introduction....

  3. hi ravi if u have more material of IT officer exam then pls send me at

  4. Is there any notification regarding the requirement of po and oa in Odisha grameen bank and utkal grameen bank ..??
    Pls reply anyone.?

  5. Mam kindly provide HR OFFICER professional knowledge quiz like this.. Much awaited..

  6. good questions... :)

  7. hi ravi if u have more material of IT officer exam then pls send me at

  8. My employer has issued me NOC as

    "To Dinar Nasnodkar
    This is to inform you that Goa Electronics ltd has no objection for you attending the interview for the post of clerical cadre."
    and signed by our CEO

    Is the format/wording right? Its a PSU but I'm employed on contractual basis, not permanent. Shouldn't they have mentioned clerical cadre through IBPS Organisations something like that, I mean specific? clerical cadre can be in any Govt Org. Please reply. I am tensed.

  9. An E-R diagram can express the overall logical structure of a database graphically. E-R diagrams are simple and clear qualities that may well account in large part for the widespread use of the E-R model. Such a diagram consists of the following major components:
    • Rectangles, which represent entity sets
    • Ellipses, which represent attributes
    • Diamonds, which represent relationship sets
    • Lines, which link attributes to entity sets and entity sets to relationship sets
    • Double ellipses, which represent multi valued attributes
    • Dashed ellipses, which denote derived attributes
    • Double lines, which indicate total participation of an entity in a relationship set
    • Double rectangles, which represent weak entity sets

  10. About TCP/IP

    TCP and IP were developed by a Department of Defense (DOD) research project to connect a number different networks designed by different vendors into a network of networks (the "Internet"). It was initially successful because it delivered a few basic services that everyone needs (file transfer, electronic mail, remote logon) across a very large number of client and server systems. Several computers in a small department can use TCP/IP (along with other protocols) on a single LAN. As with all other communications protocol, TCP/IP is composed of layers:

    IP - is responsible for moving packet of data from node to node. IP forwards each packet based on a four byte destination address (the IP number). The Internet authorities assign ranges of numbers to different organizations. The organizations assign groups of their numbers to departments. IP operates on gateway machines that move data from department to organization to region and then around the world.

    TCP - is responsible for verifying the correct delivery of data from client to server. Data can be lost in the intermediate network. TCP adds support to detect errors or lost data and to trigger retransmission until the data is correctly and completely received.

    Sockets - is a name given to the package of subroutines that provide access to TCP/IP on most systems.

  11. i need material of I.T plz....can anyone help me ..........

  12. Same condition here dear..but now I have kiran publication book..u have to go for dis


Related Posts Plugin for WordPress, Blogger...