IT Officer Questions and Answers

1.

_____ contains the information about an array used in a program.

   A.) Dope vector
   B.) Record
   C.) Table
   D.) None of these

Answer: Option 'A'

Dope vector

DigitalOcean Referral Badge

2.

A sort that compares each element with its adjacent element in a list is called _______

   A.) Insertion Sort
   B.) Bubble Sort
   C.) Quick Sort
   D.) Heap Sort

Answer: Option 'B'

Bubble Sort

DigitalOcean Referral Badge

3.

The term DEQUE refers _______

   A.) single ended queue
   B.) double ended queue
   C.) Both (A) & (B)
   D.) None of these

Answer: Option 'B'

double ended queue

DigitalOcean Referral Badge

4.

Which of the following data structure is required to evaluate a post fix expression?

   A.) Stack
   B.) linked list
   C.) Array
   D.) None of these

Answer: Option 'A'

​Stack

DigitalOcean Referral Badge

5.

A matrix in which number of zero elements are much higher than the number of non zero elements is called

   A.) Scalar Matrix
   B.) Identity Matrix
   C.) Sparse Matrix
   D.) None of these

Answer: Option 'C'

​Sparse Matrix

DigitalOcean Referral Badge

6.

In order traversal is also known as _______

   A.) Pre order
   B.) Symmetric order
   C.) End order
   D.) None of these

Answer: Option 'B'

​Symmetric order

DigitalOcean Referral Badge

7.

Which data structure is required to check balanced parenthesis in an expression?

   A.) Linked List
   B.) Queue
   C.) Stack
   D.) Tree

Answer: Option 'C'

​Stack

DigitalOcean Referral Badge

8.

The smallest element of an Array’s index is known as _______

   A.) Range
   B.) Upper bound
   C.) Lower bound
   D.) None of these

Answer: Option 'C'

​Lower bound

DigitalOcean Referral Badge

9.

A linked list that has no beginning and no end is called _______

   A.) Doubly linked list
   B.) Singly linked list
   C.) Circular linked list
   D.) None of these

Answer: Option 'C'

Circular linked list

DigitalOcean Referral Badge

10.

Rows of a relation are called ________

   A.) entity
   B.) degree
   C.) tuples
   D.) None of these

Answer: Option 'C'

tuples

DigitalOcean Referral Badge

11.

In SQL, Which of the following is a Data Manipulation Language(DML) command?

   A.) create
   B.) drop
   C.) alter
   D.) merge

Answer: Option 'D'

merge

DigitalOcean Referral Badge

12.

The number of tuples in a relation is termed as ______

   A.) cardinality
   B.) entity
   C.) column
   D.) None of these

Answer: Option 'A'

cardinality

DigitalOcean Referral Badge

13.

______ is a top-down approach in which one higher level entity can be divided into two lower level entities.

   A.) Aggregation
   B.) Specialization
   C.) Generalization
   D.) None of these

Answer: Option 'B'

​Specialization

DigitalOcean Referral Badge

14.

Which of the following is used with database?

   A.) ATM
   B.) Payment gateway
   C.) Data Mining
   D.) None of these

Answer: Option 'C'

Data Mining

DigitalOcean Referral Badge

15.

Which of the following is a part of the Oracle database system?

   A.) Free lists
   B.) Front end
   C.) Network
   D.) None of these

Answer: Option 'B'

​Front end

DigitalOcean Referral Badge

16.

In E-R Diagram, attribute is represented by ______

   A.) Rectangle
   B.) eclipse
   C.) Square
   D.) Double Rectangle

Answer: Option 'B'

​eclipse

DigitalOcean Referral Badge

17.

Which of the following is not a type of database?

   A.) Hierarchical
   B.) Relational
   C.) Network
   D.) Transition

Answer: Option 'D'

Transition

DigitalOcean Referral Badge

18.

In a relational database, each tuple is divided into fields called_______

   A.) Relations
   B.) Domains
   C.) Queries
   D.) None of these

Answer: Option 'B'

Domains

DigitalOcean Referral Badge

19.

In SQL, TCL stands for______

   A.) Transmission Control Language
   B.) Transaction Central Language
   C.) Ternary Control Language
   D.) Transaction Control Language

Answer: Option 'D'

Transaction Control Language

DigitalOcean Referral Badge

20.

________ is mainly responsible for allocating the resources as per process requirement?

   A.) RAM
   B.) Compiler
   C.) Operating Systems
   D.) Software

Answer: Option 'C'

Operating Systems

DigitalOcean Referral Badge

21.

Which of the following plays an important role in modern Operating Systems(OS)?

   A.) Kernel
   B.) Shell
   C.) Fork
   D.) None of these

Answer: Option 'A'

Kernel

DigitalOcean Referral Badge

22.

______ occur commonly in multi-tasking when two or more threads waiting for each other.

   A.) Kernel
   B.) Shell
   C.) Fork
   D.) Deadlock

Answer: Option 'D'

Deadlock

DigitalOcean Referral Badge

23.

_____ is the program which interprets commands given by the user?

   A.) Kernel
   B.) Shell
   C.) Fork
   D.) None of these

Answer: Option 'B'

Shell

DigitalOcean Referral Badge

24.

In DOS label command is used to _____

   A.) Create the label of disk
   B.) Change the label of disk
   C.) Both (A) & (B)
   D.) None of these

Answer: Option 'C'

Both (A) & (B)

DigitalOcean Referral Badge

25.

NTFS stands for _______

   A.) New Technology File System
   B.) New Transmission File System
   C.) Net Transmission File System
   D.) None of these

Answer: Option 'A'

New Technology File System

DigitalOcean Referral Badge

26.

Which of the following is an MS-DOS external command?

   A.) DIR
   B.) COPY
   C.) FORMAT
   D.) PROMPT

Answer: Option 'C'

FORMAT

DigitalOcean Referral Badge

27.

Which of the following model is a combination of Iterative model and Waterfall model?

   A.) linear-sequential Model
   B.) Spiral Model
   C.) V Model
   D.) None of these

Answer: Option 'B'

Spiral Model

DigitalOcean Referral Badge

28.

SRS stands for ________

   A.) Software Resolution Specification
   B.) Software Requirement Standards
   C.) Software Response Service
   D.) Software Requirements Specifications

Answer: Option 'D'

Software Requirements Specifications

DigitalOcean Referral Badge

29.

Which of the following model is also referred to as a linear-sequential life cycle model?

   A.) Waterfall Model
   B.) Iterative Model
   C.) Spiral Model
   D.) V Model

Answer: Option 'A'

Waterfall Model

DigitalOcean Referral Badge

30.

Which type of security attack occurs, when a malicious actor inserts himself as a relay/proxy into a communication session between people or systems?

   A.) Compromised key attack
   B.) Sniffer Attack
   C.) Man-in-the-Middle attack
   D.) Denial-of-service attack

Answer: Option 'C'

​Man-in-the-Middle attack

DigitalOcean Referral Badge

31.

Ethernet uses how many bit/byte physical address, that is imprinted on the network interface card?

   A.) 64 bit
   B.) 64 byte
   C.) 6 bit
   D.) 6 byte

Answer: Option 'D'

6 byte

DigitalOcean Referral Badge

32.

Which protocols is used to monitor network devices such as hubs, switches, and routes?

   A.) SMTP
   B.) RIP
   C.) SNMP
   D.) OSPF

Answer: Option 'C'

SNMP

DigitalOcean Referral Badge

33.

Which of the following is not the major function of PKI?

   A.) Confidentiality
   B.) Accessibility
   C.) Authentication
   D.) Integrity

Answer: Option 'B'

​Accessibility

DigitalOcean Referral Badge

34.

Which class of IP address provides a maximum of only 254 host addresses per network ID?

   A.) A Class
   B.) B Class
   C.) C Class
   D.) D Class

Answer: Option 'C'

C Class

DigitalOcean Referral Badge

35.

PPP used in which layer of network reference model?

   A.) Physical layer
   B.) Data link layer
   C.) Network layer
   D.) Application layer

Answer: Option 'B'

Data link layer

DigitalOcean Referral Badge

36.

Which of the following is the process of splitting a message into multiple packets at transport layer?

   A.) Fragmentation
   B.) Segmentation
   C.) Synchronization
   D.) Defragmentation

Answer: Option 'B'

​Segmentation

DigitalOcean Referral Badge

37.

An accountant office has four employees. They have four computers and two printers. What kind of network would you suggest they install?

   A.) Client server network
   B.) Peer-to peer network
   C.) Intranet
   D.) MAN

Answer: Option 'B'

Peer-to peer network

DigitalOcean Referral Badge

38.

End-to-end connectivity is provided from host-to-host in which layer?

   A.) Network layer
   B.) Session layer
   C.) Data link layer
   D.) Transport layer

Answer: Option 'D'

Transport layer

DigitalOcean Referral Badge

39.

An administrator attempts a traceroute but receives a “Destination Unreachable” message. Which protocol is responsible for that message?

   A.) RARP
   B.) RUDP
   C.) ICMP
   D.) SNMP

Answer: Option 'C'

​ICMP

DigitalOcean Referral Badge

40.

Which type of network consists set of switches connected by physical links?

   A.) Circuit Switched Network
   B.) Datagram Network
   C.) Virtual Circuit Network
   D.) All of these

Answer: Option 'A'

​Circuit Switched Network

DigitalOcean Referral Badge

41.

Which of the following layer oversees both error control & flow control at the source to destination level?

   A.) Physical
   B.) Data link
   C.) Transport
   D.) Network

Answer: Option 'C'

​Transport

DigitalOcean Referral Badge

42.

Bridge work at which layer of OSI Model?

   A.) network layer
   B.) Data link layer
   C.) Physical layer
   D.) application layer

Answer: Option 'B'

Data link layer

DigitalOcean Referral Badge

43.

Which feature in Object Oriented Programming allows reusing code?

   A.) Polymorphism
   B.) Inheritance
   C.) Encapsulation
   D.) Data hiding

Answer: Option 'B'

​Inheritance

DigitalOcean Referral Badge

44.

What would be the worst run time complexity of queue and dequeue operations, if queue is implemented using arrays?

   A.) O(n),O(n)
   B.) O(n),O(1)
   C.) O(1),O(n)
   D.) O(1),O(1)

Answer: Option 'D'

O(1),O(1)

DigitalOcean Referral Badge

45.

What is the work of compiler?

   A.) A program that programs into memory and prepares them for execution
   B.) A program that automates the translation of assembly language into machine language
   C.) Program that accepts a program written in a high-level language and produces an object program
   D.) A program that appears to execute a source program as if it were machine language

Answer: Option 'C'

​Program that accepts a program written in a high-level language and produces an object program

DigitalOcean Referral Badge

46.

By which statement you can force immediate termination of a loop, by passing the conditional expression and any remaining code in the body of the loop.

   A.) Break
   B.) Continue
   C.) Terminate
   D.) Loop Close

Answer: Option 'A'

Break

DigitalOcean Referral Badge

47.

Which of the following is an online cloud storage service from Microsoft?

   A.) MicroDrive
   B.) OneDrive
   C.) CloudDrive
   D.) WindowsDrive

Answer: Option 'B'

OneDrive

DigitalOcean Referral Badge

48.

Which of the following sorting algorithm is best if a list is already sorted?

   A.) Insertion sort
   B.) Quick Sort
   C.) Merge Sort
   D.) Heap sort

Answer: Option 'A'

Insertion sort

DigitalOcean Referral Badge

49.

Which of the following HTTP error message shows when server is currently unavailable?

   A.) 503
   B.) 404
   C.) 406
   D.) 400

Answer: Option 'A'

​503

DigitalOcean Referral Badge

50.

Which of the following phase produce intermediate representations of the source program in compiler design?

   A.) Lexical Analyzer
   B.) Syntax Analyzer
   C.) Semantic Analyzer
   D.) Intermediate code generator

Answer: Option 'D'

Intermediate code generator

DigitalOcean Referral Badge

IT Officer Questions Download Pdf

Recent Posts