IT Officer Questions | Basic Computer Knowledge

1.

Which SQL statement is used to extract data from a database?

   A.) EXTRACT
   B.) GET
   C.) SELECT
   D.) OPEN

Answer: Option 'C'

​SELECT

2.

By which of the following statements, we can undo all the updates performed on the transaction?

   A.) Undo
   B.) Commit
   C.) Rollback
   D.) Replace

Answer: Option 'C'

​Rollback

3.

Checkpoints are a part of which of the following measures?

   A.) Recovery measure
   B.) Security measure
   C.) Concurrency measure
   D.) Authorized measure

Answer: Option 'A'

​Recovery measure

4.

Which level of testing is evaluating the software/system compatibly with the business requirements?

   A.) Integration testing
   B.) System testing
   C.) Acceptance testing
   D.) Unit Testing

Answer: Option 'C'

​Acceptance testing

5.

DNS is defining at which layer of TCP/IP model?

   A.) Internet layer
   B.) Data link layer
   C.) Transport layer
   D.) Application layer

Answer: Option 'D'

Application layer

6.

What are the three types of addresses in IPV6?

   A.) Class A, Class B, Class C
   B.) Unicast, anycast, multicast
   C.) Unicast, datacast, multicast
   D.) Unicast, dualcast, multicast

Answer: Option 'B'

​Unicast, anycast, multicast

7.

An accountant office has four employees. They have four computers and two printers. What kind of network would you suggest they install?

   A.) Client server network
   B.) Peer-to peer network
   C.) Intranet
   D.) MAN

Answer: Option 'B'

​Peer-to peer network

8.

Bridge work at which layer of OSI Model?

   A.) network layer
   B.) Data link layer
   C.) Physical layer
   D.) application layer

Answer: Option 'B'

Data link layer

9.

Circuit Switching takes place at which layer?

   A.) Transport layer
   B.) Application layer
   C.) Physical layer
   D.) Presentation layer

Answer: Option 'C'

​Physical layer

10.

SIP, DHCP and DNS are which layer protocol of OSI model?

   A.) Presentation layer
   B.) Transport layer
   C.) Application layer
   D.) Session layer

Answer: Option 'C'

Application layer

11.

Which of the following is a single communication channel that is shared by all the users on the network?

   A.) Point-to-Point
   B.) Broadcast Network
   C.) Protocol
   D.) PAN

Answer: Option 'B'

Broadcast Network

12.

The smallest element of an Array’s index is known as _______

   A.) Range
   B.) Upper bound
   C.) Lower bound
   D.) None of these

Answer: Option 'C'

​Lower bound

13.

Which of the following technique is an alternative to log-based recovery?

   A.) Check points
   B.) Shadow paging
   C.) Locks
   D.) Page based

Answer: Option 'B'

​Shadow paging

14.

Which of the following maintenance strategies involves performing maintenance before problems occur to avoid breakdowns and disruptions?

   A.) Perfective Maintenance
   B.) Corrective Maintenance
   C.) Adaptive Maintenance
   D.) Preventive Maintenance

Answer: Option 'D'

Preventive Maintenance

15.

How can you change "Tripathi" into "Purohit" in the "LastName" column in the Persons table?

   A.) MODIFY Persons SET LastName='Tripathi' INTO LastName='Purohit’
   B.) MODIFY Persons SET LastName='Purohit' WHERE LastName='Tripathi'
   C.) UPDATE Persons SET LastName='Tripathi' INTO LastName='Purohit'
   D.) UPDATE Persons SET LastName='Purohit' WHERE LastName='Tripathi'

Answer: Option 'D'

UPDATE Persons SET LastName='Purohit' WHERE LastName='Tripathi'

16.

What is BGP in networking?

   A.) Balanced Gateway Protocol
   B.) Border Gateway Protocol
   C.) Broadband Gateway Protocol
   D.) Balanced Goal Protocol

Answer: Option 'B'

​Border Gateway Protocol

17.

A free file storage and file sharing service provided by Microsoft when you sign up for a Microsoft account is: 

   A.) OneDrive
   B.) Google Drive
   C.) iCloud
   D.) AWS

Answer: Option 'A'

OneDrive

18.

Which of the following is the process of taking control over an existing session between a client and a server? 

   A.) IP spoofing
   B.) Replay attack
   C.) Session hijacking
   D.) WarDriving

Answer: Option 'C'

Session hijacking

19.

What are the qualities of good software?

   A.) Reliability
   B.) Correctness
   C.) Efficiency
   D.) All of the above

Answer: Option 'D'

All of the above

20.

Which is not a software life cycle model?

   A.) Waterfall model
   B.) Spiral model
   C.) Prototyping model
   D.) Capability maturity model

Answer: Option 'D'

Capability maturity model


IT Officer Questions Download Pdf

Recent Posts