IT Officer Questions | Basic Computer Knowledge


Which SQL statement is used to extract data from a database?

   B.) GET
   D.) OPEN

Answer: Option 'C'



By which of the following statements, we can undo all the updates performed on the transaction?

   A.) Undo
   B.) Commit
   C.) Rollback
   D.) Replace

Answer: Option 'C'



Checkpoints are a part of which of the following measures?

   A.) Recovery measure
   B.) Security measure
   C.) Concurrency measure
   D.) Authorized measure

Answer: Option 'A'

​Recovery measure


Which level of testing is evaluating the software/system compatibly with the business requirements?

   A.) Integration testing
   B.) System testing
   C.) Acceptance testing
   D.) Unit Testing

Answer: Option 'C'

​Acceptance testing


DNS is defining at which layer of TCP/IP model?

   A.) Internet layer
   B.) Data link layer
   C.) Transport layer
   D.) Application layer

Answer: Option 'D'

Application layer


What are the three types of addresses in IPV6?

   A.) Class A, Class B, Class C
   B.) Unicast, anycast, multicast
   C.) Unicast, datacast, multicast
   D.) Unicast, dualcast, multicast

Answer: Option 'B'

​Unicast, anycast, multicast


An accountant office has four employees. They have four computers and two printers. What kind of network would you suggest they install?

   A.) Client server network
   B.) Peer-to peer network
   C.) Intranet
   D.) MAN

Answer: Option 'B'

​Peer-to peer network


Bridge work at which layer of OSI Model?

   A.) network layer
   B.) Data link layer
   C.) Physical layer
   D.) application layer

Answer: Option 'B'

Data link layer


Circuit Switching takes place at which layer?

   A.) Transport layer
   B.) Application layer
   C.) Physical layer
   D.) Presentation layer

Answer: Option 'C'

​Physical layer


SIP, DHCP and DNS are which layer protocol of OSI model?

   A.) Presentation layer
   B.) Transport layer
   C.) Application layer
   D.) Session layer

Answer: Option 'C'

Application layer


Which of the following is a single communication channel that is shared by all the users on the network?

   A.) Point-to-Point
   B.) Broadcast Network
   C.) Protocol
   D.) PAN

Answer: Option 'B'

Broadcast Network


The smallest element of an Array’s index is known as _______

   A.) Range
   B.) Upper bound
   C.) Lower bound
   D.) None of these

Answer: Option 'C'

​Lower bound


Which of the following technique is an alternative to log-based recovery?

   A.) Check points
   B.) Shadow paging
   C.) Locks
   D.) Page based

Answer: Option 'B'

​Shadow paging


Which of the following maintenance strategies involves performing maintenance before problems occur to avoid breakdowns and disruptions?

   A.) Perfective Maintenance
   B.) Corrective Maintenance
   C.) Adaptive Maintenance
   D.) Preventive Maintenance

Answer: Option 'D'

Preventive Maintenance


How can you change "Tripathi" into "Purohit" in the "LastName" column in the Persons table?

   A.) MODIFY Persons SET LastName='Tripathi' INTO LastName='Purohit’
   B.) MODIFY Persons SET LastName='Purohit' WHERE LastName='Tripathi'
   C.) UPDATE Persons SET LastName='Tripathi' INTO LastName='Purohit'
   D.) UPDATE Persons SET LastName='Purohit' WHERE LastName='Tripathi'

Answer: Option 'D'

UPDATE Persons SET LastName='Purohit' WHERE LastName='Tripathi'


What is BGP in networking?

   A.) Balanced Gateway Protocol
   B.) Border Gateway Protocol
   C.) Broadband Gateway Protocol
   D.) Balanced Goal Protocol

Answer: Option 'B'

​Border Gateway Protocol


A free file storage and file sharing service provided by Microsoft when you sign up for a Microsoft account is: 

   A.) OneDrive
   B.) Google Drive
   C.) iCloud
   D.) AWS

Answer: Option 'A'



Which of the following is the process of taking control over an existing session between a client and a server? 

   A.) IP spoofing
   B.) Replay attack
   C.) Session hijacking
   D.) WarDriving

Answer: Option 'C'

Session hijacking


What are the qualities of good software?

   A.) Reliability
   B.) Correctness
   C.) Efficiency
   D.) All of the above

Answer: Option 'D'

All of the above


Which is not a software life cycle model?

   A.) Waterfall model
   B.) Spiral model
   C.) Prototyping model
   D.) Capability maturity model

Answer: Option 'D'

Capability maturity model

IT Officer Questions Download Pdf

Recent Posts