IT Officer Questions | Basic Computer Knowledge

1.

If different properties and functions of a real-world entity is grouped or embedded into a single element, what is it called in OOP language? 

   A.) Inheritance
   B.) Polymorphism
   C.) Abstraction
   D.) Encapsulation

Answer: Option 'D'

Encapsulation

2.

In DOS label command is used to _____

   A.) Create the label of disk
   B.) Change the label of disk
   C.) Both (A) & (B)
   D.) None of these

Answer: Option 'C'

Both (A) & (B)

3.

Which of the following is testing is also known as clear box testing?

   A.) White box testing
   B.) Black box testing
   C.) Grey box testing
   D.) Behavioral testing

Answer: Option 'A'

White box testing

4.

________ is mainly responsible for allocating the resources as per process requirement?

   A.) RAM
   B.) Compiler
   C.) Operating Systems
   D.) Software

Answer: Option 'C'

Operating Systems

5.

Which of the following HTTP error message shows when server is currently unavailable?

   A.) 503
   B.) 404
   C.) 406
   D.) 400

Answer: Option 'A'

​503

6.

Which level of testing is evaluating the software/system compatibly with the business requirements?

   A.) Integration testing
   B.) System testing
   C.) Acceptance testing
   D.) Unit Testing

Answer: Option 'C'

​Acceptance testing

7.

Which of the following protocol is used for remote terminal connection service?

   A.) TELNET
   B.) FTP
   C.) RARP
   D.) UDP

Answer: Option 'A'

TELNET

8.

Which of the following phase produce intermediate representations of the source program in compiler design?

   A.) Lexical Analyzer
   B.) Syntax Analyzer
   C.) Semantic Analyzer
   D.) Intermediate code generator

Answer: Option 'D'

Intermediate code generator

9.

Which feature in Object Oriented Programming allows reusing code?

   A.) Polymorphism
   B.) Inheritance
   C.) Encapsulation
   D.) Data hiding

Answer: Option 'B'

​Inheritance

10.

Which protocols is used to monitor network devices such as hubs, switches, and routes?

   A.) SMTP
   B.) RIP
   C.) SNMP
   D.) OSPF

Answer: Option 'C'

SNMP

11.

Which of the following malicious software that can change its code and signature patterns with each iteration?

   A.) Keylogger
   B.) Mutation Engine
   C.) Morris worm
   D.) Metamorphic Virus

Answer: Option 'D'

Metamorphic Virus

12.

If user participation is available, which model is to be chosen?

   A.) Waterfall
   B.) Iterative enhancement model
   C.) Spiral model
   D.) RAD model

Answer: Option 'D'

RAD model

13.

Which IEEE standard used for Ethernet?

   A.) 802.3
   B.) 802.4
   C.) 802.5
   D.) 802.6

Answer: Option 'A'

​802.3

14.

In which type of switching technique whole message are transmitted at a time from source to destination ?

   A.) Packet switching
   B.) Circuit switching
   C.) Message switching
   D.) Data switching

Answer: Option 'C'

​Message switching

15.

The number of tuples in a relation is termed as ______

   A.) cardinality
   B.) entity
   C.) column
   D.) None of these

Answer: Option 'A'

cardinality

16.

Which of the following is a condition created within a database or data storage technology in which the same piece of data is stored in two separate places?

   A.) Data Enumeration
   B.) Data Iteration
   C.) Data Concurrency
   D.) Data Redundancy

Answer: Option 'D'

Data Redundancy

17.

With SQL, how do you select all the records from a table named "Persons" where the value of the column "FirstName" is "Megha"?

   A.) SELECT * FROM Persons WHERE FirstName='Megha'
   B.) SELECT [all] FROM Persons WHERE FirstName='Megha'
   C.) SELECT [all] FROM Persons WHERE FirstName LIKE 'Megha'
   D.) SELECT * FROM Persons WHERE FirstName<>'Megha'

Answer: Option 'A'

​SELECT * FROM Persons WHERE FirstName='Megha'

18.

“SaaS” stand for in cloud computing:

   A.) System as a service
   B.) Software as a service
   C.) Software as a system
   D.) Scheme as a service

Answer: Option 'B'

​Software as a service

19.

What are the three types of addresses in IPV6?

   A.) Class A, Class B, Class C
   B.) Unicast, anycast, multicast
   C.) Unicast, datacast, multicast
   D.) Unicast, dualcast, multicast

Answer: Option 'B'

​Unicast, anycast, multicast

20.

Which of the following maintenance strategies involves performing maintenance before problems occur to avoid breakdowns and disruptions?

   A.) Perfective Maintenance
   B.) Corrective Maintenance
   C.) Adaptive Maintenance
   D.) Preventive Maintenance

Answer: Option 'D'

Preventive Maintenance


IT Officer Questions Download Pdf

Recent Posts