IT Officer Questions | Basic Computer Knowledge

1.

SIP, DHCP and DNS are which layer protocol of OSI model?

   A.) Presentation layer
   B.) Transport layer
   C.) Application layer
   D.) Session layer

Answer: Option 'C'

Application layer

2.

Which of the following model is also referred to as a linear-sequential life cycle model?

   A.) Waterfall Model
   B.) Iterative Model
   C.) Spiral Model
   D.) V Model

Answer: Option 'A'

Waterfall Model

3.

Which data structure is used to implement priority queue?

   A.) Array
   B.) List
   C.) Heap
   D.) All of the mentioned

Answer: Option 'D'

All of the mentioned

4.

NTFS stands for _______

   A.) New Technology File System
   B.) New Transmission File System
   C.) Net Transmission File System
   D.) None of these

Answer: Option 'A'

New Technology File System

5.

In E-R Diagram, total participation in entities is represented by which of the following shape?

   A.) Double Rectangle
   B.) Eclipse
   C.) Diamond
   D.) Double line

Answer: Option 'D'

Double line

6.

Three-way hand shake method used in which of the following?

   A.) Connection establishment
   B.) Connection termination
   C.) Connection release
   D.) Path finding

Answer: Option 'A'

​Connection establishment

7.

Which of the following sorting algorithm is best if a list is already sorted?

   A.) Insertion sort
   B.) Quick Sort
   C.) Merge Sort
   D.) Heap sort

Answer: Option 'A'

Insertion sort

8.

What is the work of compiler?

   A.) A program that programs into memory and prepares them for execution
   B.) A program that automates the translation of assembly language into machine language
   C.) Program that accepts a program written in a high-level language and produces an object program
   D.) A program that appears to execute a source program as if it were machine language

Answer: Option 'C'

​Program that accepts a program written in a high-level language and produces an object program

9.

What is the main protocol used to access data on WWW?

   A.) FTP
   B.) HTML
   C.) HTTP
   D.) TFTP

Answer: Option 'C'

HTTP

10.

________ is mainly responsible for allocating the resources as per process requirement?

   A.) RAM
   B.) Compiler
   C.) Operating Systems
   D.) Software

Answer: Option 'C'

Operating Systems

11.

_____ is the program which interprets commands given by the user?

   A.) Kernel
   B.) Shell
   C.) Fork
   D.) None of these

Answer: Option 'B'

Shell

12.

Ethernet uses how many bit/byte physical address, that is imprinted on the network interface card?

   A.) 64 bit
   B.) 64 byte
   C.) 6 bit
   D.) 6 byte

Answer: Option 'D'

6 byte

13.

Which of the following concepts is applicable with respect of 2 NF?

   A.) Full functional dependency
   B.) Partial dependency
   C.) Transitive dependency
   D.) None- transitive dependency

Answer: Option 'A'

Full functional dependency

14.

______ occur commonly in multi-tasking when two or more threads waiting for each other.

   A.) Kernel
   B.) Shell
   C.) Fork
   D.) Deadlock

Answer: Option 'D'

Deadlock

15.

By which statement you can force immediate termination of a loop, by passing the conditional expression and any remaining code in the body of the loop.

   A.) Break
   B.) Continue
   C.) Terminate
   D.) Loop Close

Answer: Option 'A'

Break

16.

In SQL, Which of the following is a Data Manipulation Language(DML) command?

   A.) create
   B.) drop
   C.) alter
   D.) merge

Answer: Option 'D'

merge

17.

In which type of SQL join returns all the rows from left table combine with the matching rows of the right table

   A.) Inner join
   B.) Left outer join
   C.) Right outer join
   D.) Full join

Answer: Option 'B'

​Left outer join

18.

Which of the following maintenance strategies involves performing maintenance before problems occur to avoid breakdowns and disruptions?

   A.) Perfective Maintenance
   B.) Corrective Maintenance
   C.) Adaptive Maintenance
   D.) Preventive Maintenance

Answer: Option 'D'

Preventive Maintenance

19.

Which of the following is not a DDL command?

   A.) CREATE
   B.) ALTER
   C.) DROP
   D.) UPDATE

Answer: Option 'D'

UPDATE

20.

In SQL server, indexes are organized as:

   A.) List
   B.) Array
   C.) Queue
   D.) B-tree

Answer: Option 'D'

B-tree

21.

Which of the following plays an important role in modern Operating Systems(OS)?

   A.) Kernel
   B.) Shell
   C.) Fork
   D.) None of these

Answer: Option 'A'

Kernel

22.

Default subnet mask of Class C IP address is:

   A.) 255.255.0.0
   B.) 255.255.255.0
   C.) 255.255.255.255
   D.) 255.0.255.0

Answer: Option 'B'

255.255.255.0

23.

When a packet with the code is transmitted; it is received and processed by every machine on the network. This mode of operation is called _______ .

   A.) Broadcasting
   B.) Multi-casting
   C.) Unicasting
   D.) Point-to-point

Answer: Option 'A'

Broadcasting

24.

Which of the following is a single communication channel that is shared by all the users on the network?

   A.) Point-to-Point
   B.) Broadcast Network
   C.) Protocol
   D.) PAN

Answer: Option 'B'

Broadcast Network

25.

Rows of a relation are called ________

   A.) entity
   B.) degree
   C.) tuples
   D.) None of these

Answer: Option 'C'

tuples


IT Officer Questions Download Pdf

Recent Posts