| no. 1 app for banking & ssc preparation website: email · which type of operating system used...

13
1 Adda247 | No. 1 APP for Banking & SSC Preparation Website:store.adda247.com | Email:[email protected]

Upload: vohanh

Post on 16-Apr-2018

216 views

Category:

Documents


1 download

TRANSCRIPT

1 Adda247 | No. 1 APP for Banking & SSC Preparation Website:store.adda247.com | Email:[email protected]

2 Adda247 | No. 1 APP for Banking & SSC Preparation Website:store.adda247.com | Email:[email protected]

Q1. When users download an app from outside the device's native app store; this is known as:

(a) Dummy addition

(b) Mock-up app installation

(c) Sneaky app addition

(d) Side loading

(e) Backdoor app Installation

Q2. Which of the following is not a mobile biometric technology?

(a) Fingerprint scanner

(b) Facial recognition

(c) Iris scanner

(d) Handprint recognition

(e) Voice recognition

Q3. If you want to delete the Customer "Nyra" from the "Customers" table. which of the following

is correct:

(a) DROP "Nyra" From "Customers"

(b) DELETE FROM Customers WHERE CustomerName='Nyra';

(c) DELETE IN Customers WHERE CustomerName='Nyra'

(d) DELETE 'Nyra' FROM Customers

(e) DROP FROM Customers WHERE CustomerName='Nyra'

Q4. Which among the following backs up all the data that has changed?

(a) Copy backup

(b) Incremental backup

(c) Differential backup

(d) Full backup

(e) None of these

Q5. 128.167.152.2 belongs to which address class?

(a) A

(b) B

(c) C

(d) D

(e) E

Q6. Which HTTP message shows "Request Timeout"?

(a) 408

(b) 409

(c) 302

(d) 202

(e) 103

3 Adda247 | No. 1 APP for Banking & SSC Preparation Website:store.adda247.com | Email:[email protected]

Q7. The person who use his skills for security of organization is known as:

(a) Black Hat Hacker

(b) White Hat Hacker

(c) Script Kiddie

(d) Phreaker

(e) Attacker

Q8. Which of the following is commonly used between hosts on the Internet to exchange routing

information?

(a) HTTP

(b) EGP

(c) UDP

(d) SMTP

(e) IGP

Q9. Which of the following is SMTP port number?

(a) 80

(b) 23

(c) 25

(d) 21

(e) 110

Q10. Which of the following is used to maintain the accuracy and integrity of data inside table?

(a) trigger

(b) joins

(c) constraints

(d) Schema

(e) Cardinality

Q11. 802.10 IEEE standard used for:

(a) Wireless networking

(b) Ethernet

(c) Broadband technology

(d) Network security

(e) Token ring

Q12. What is the use of ESP in IPSec?

(a) Provide encryption and authentication

(b) Negotiate Security Associations

(c) Provide data integrity

(d) Manage parameter

(e) Both (A) and (C)

4 Adda247 | No. 1 APP for Banking & SSC Preparation Website:store.adda247.com | Email:[email protected]

Q13. Which unix command is used to look at file and one page at

a time?

(a) man

(b) more

(c) grep

(d) lpr

(e) rm

Q14. Choose the odd one:

(a) Boolean

(b) Catch

(c) Instanceof

(d) New

(e) struct

Q15. Which OSI model layer is responsible of compression-decompression as well as encryption-

decryption of data?

(a) Application layer

(b) Network layer

(c) Datalink layer

(d) Transport layer

(e) Presentation layer

Q16. Which statement makes permanent the change made to the database during the current

transaction?

(a) SET TRANSACTION

(b) COMMIT

(c) BEGIN TRANSACTION

(d) PERMANENT

(e) BEGIN

Q17. Which type of operating system used in Air traffic control?

(a) soft real time

(b) Hard real time

(c) Application specific

(d) Batch processing

(e) None of these

5 Adda247 | No. 1 APP for Banking & SSC Preparation Website:store.adda247.com | Email:[email protected]

Q18. Convert the octal number 2322₈ to its decimal number equivalent:

(a) 1234₁₀

(b) 2345₁₀

(c) 1432₁₀

(d) 1325₁₀

(e) 1134₁₀

Q19. Which of the following hold the actual data in the DBMS?

(a) Schemas

(b) Triggers

(c) Reports

(d) Tables

(e) Relation

Q20. Which of the following shortcut key is used to move slide to beginning in MS PowerPoint?

(a) Ctrl+Shift+Up Arrow

(b) Ctrl+Up Arrow

(c) Ctrl+Shift+Alt

(d) Ctrl+B

(e) Ctrl+E

Q21. In which type of security threats, someone tries to steal information that computers,

smartphones, or other devices transmit over a network?

(a) Intrusion attack

(b) Network spoofing

(c) Eavesdropping

(d) Impersonation

(e) Packet modification

Q22. Which of the following kind of computer virus that hides and stores itself within the

computer memory, which then allows it to infect any file that is run by the computer, depending

on the virus' programming?

(a) Encrypted virus

(b) Overwriting virus

(c) Polymorphic virus

(d) Resident virus

(e) Self- recognition virus

6 Adda247 | No. 1 APP for Banking & SSC Preparation Website:store.adda247.com | Email:[email protected]

Q23. Which type of testing strategy deals with the internal logic and structure of the code?

(a) Gray-box testing

(b) Closed-box testing

(c) Black box testing

(d) White box testing

(e) Boundary value Analysis

Q24. Which of the following layer is not User Support layer?

(a) Session layer

(b) Presentation layer

(c) Application layer

(d) Both (B) and (C)

(e)Data Link Layer

Q25. Which of the following is a not a necessary condition for deadlock?

(a) Mutual Exclusion

(b) Hold and Wait

(c) Aborted

(d) No Preemption

(e) Circular wait

Q26. Which of the following is not a relational database?

(a) Oracle

(b) MySQL

(c) IBM DB2

(d) HBase

(e) SQL

Q27. Tuple variables in SQL are defined in which clause?

(a) From clause

(b) Select clause

(c) Where clause

(d) Like clause

(e) All of the above

Q28. Speed of super computer measure in:

(a) Hertz

(b) Gigahertz

(c) Flops

(d) Rad/sec

(e) Megahertz

7 Adda247 | No. 1 APP for Banking & SSC Preparation Website:store.adda247.com | Email:[email protected]

Q29. Which one of the following is not a Linux distribution?

(a) Debian

(b) Gentoo

(c) Kinoppix

(d) Fedora

(e) Slix

Q30. Which of the following allows you to specify multiple values in a WHERE clause?

(a) Between

(b) In

(c) Like

(d) Joins

(e) Insert

Q31. Which type of firewall can provide additional functionality such as content caching and

security by preventing direct connections from outside the network?

(a) Packet Filtering Firewalls

(b) Statefull inspection firewalls

(c) Next-gen firewalls

(d) Proxy firewall

(e) Circuit-level gateways

8 Adda247 | No. 1 APP for Banking & SSC Preparation Website:store.adda247.com | Email:[email protected]

Q32. The default extension for an Oracle SQL*Plus file is:

(a) .txt

(b) .pls

(c) .ora

(d) .sql

(e) .doc

Q33. Which malware spreads via fake Adobe Flash updates and tricking users into clicking the

malware by falsely alerting the user that their Flash player requires an update?

(a) WannaCry

(b) Bad Rabbit

(c) CryptoLocker

(d) KeyLocker

(e) Trojen horse

Q34. What is livelock?

(a) It is a deadlock handling technique

(b) It is useful in page replacement

(c) It is like a deadlock condition

(d) It is used in transaction management

(e) It is used to recover transaction log

Q35. Which command is used to execute compiled java program?

(a) Java

(b) Javac

(c) Run

(d) Javaw

(e) Javavac

Q36. What is segmentation in operating system?

(a) is a memory management scheme that supports user view of memory

(b) logical address space is collection of segments.

(c) logical address consists of two tuples < segment-number, offset >.

(d) All of the above

(e) Blocking the process

Q37. When you want to delete data from a data structure that is

empty this situation is called:

(a) Overflow

(b) Underflow

(c) Deletion

(d) Saturated

(e) Insertion

9 Adda247 | No. 1 APP for Banking & SSC Preparation Website:store.adda247.com | Email:[email protected]

Q38. The software used to drive microprocessor-based systems is called:

(a) assembler

(b) firmware

(c) machine language code

(d) BASIC interpreter instructions

(e) Compiler

Q39. Which of the following service is responsible for changing the source IP address of a packet

to the IP address of the public interface on the router.

(a) NAT

(b) DNS

(c) DHCP

(d) HTTP

(e) ICMP

Q40. Which of the following protocol is used to automatically assigns a unique IP address to each

device that connects to a network?

(a) DNS

(b) IP

(c) DHCP

(d) HTTP

(e) LLC

Q41. Which of the following device is used to regenerate the signal, so that increases the signal's

strength and it can be transmitted and received over a greater distance without a loss in quality?

(a) Bridge

(b) Router

(c) Repeater

(d) Switch

(e) Gateway

Q42. Which transaction property ensure that multiple transactions can occur concurrently without

leading to inconsistency of database state?

(a) Consistency

(b) Isolation

(c) Durability

(d) Atomicity

(e) Not any property ensures the transaction independency

10 Adda247 | No. 1 APP for Banking & SSC Preparation Website:store.adda247.com | Email:[email protected]

Q43. Which type of maintenance mainly deals with implementing new or changed user

requirement?

(a) Corrective

(b) Preventive

(c) Adaptive

(d) Perfective

(e) None of these

Q44. Boundary Value Analysis is based on which design technique?

(a) White box testing

(b) Statement coverage

(c) Path testing

(d) Black box testing

(e) Clear Box testing

Q45. System threat mechanism by which a hacker can detects system vulnerabilities to make an

attack on the system is known as:

(a) Worm

(b) Denial of Service

(c) Port Scanning

(d) Trojan horse

(e) Virus

Q46. Which of the following file accessing method contains a pointer to a various block?

(a) Sequential Access

(b) Direct Access

(c) Index Access

(d) Random Access

(e) None of these

Q47. Which of the following is used to create a new process?

(a) Thread

(b) Signal

(c) Method

(d) fork()

(e) exec()

Q48. Which of the following allows to create complex entities

from existing entities and relationships?

(a) Specialization

(b) Generalization

(c) Aggregation

(d) Inheritance

(e) Encapsulation

11 Adda247 | No. 1 APP for Banking & SSC Preparation Website:store.adda247.com | Email:[email protected]

Q49. C++ encourages structure of software as a collection of components that are ____

(a) Highly cohesive and loosely coupled

(b) Not highly cohesive but loosely coupled

(c) Highly cohesive and tightly coupled

(d) Not highly cohesive but tightly coupled

(e) None of these

Q50. In which type of communication, a message is sent out on the network and is destined for a

group of systems?

(a) Unicast

(b) Multicast

(c) Broadcast

(d) Both (B) and (C)

(e) Semicast

Q51. Which of the following is not a transaction state in DBMS?

(a) Active

(b) Aborted

(c) Committed

(d) Failed

(e) Terminated

Q52. Someone who breaks into the telephone network illegally, typically to make free long-

distance phone calls or to tap phone lines:

(a) Phreaker

(b) Hacker

(c) Cracker

(d) Spoofing

(e) Hacktivist

Q53. Which of the network security attacks are a series of minor data security attacks that together

result in a larger attack?

(a) Data diddling attacks

(b) Trust relationship attacks

(c) Salami attacks

(d) Man-in-the-middle attacks

(e) Session hijacking attacks

Q54. Which operator is used to combine the result-set of two or more SELECT statements?

(a) Join

(b) Having

(c) Union

(d) Combine

(e) Unique

12 Adda247 | No. 1 APP for Banking & SSC Preparation Website:store.adda247.com | Email:[email protected]

Q55. What is XaaS in cloud computing?

(a) Anything as a Service

(b) Example as a Service

(c) Anything as a System

(d) Explore as a Service

(e) Explore as a System

Q56. Finacle, core banking solution software developed by which

company?

(a) TCS

(b) Infosys

(c) IBM

(d) Oracle

(e) HCL

Q57. PJNF Stand for:

(a) Practically – join Normal form

(b) Project – join normal form

(c) Period – Join normal form

(d) Pages – join normal form

(e) Parallel - join normal form

Q58. Printf() function in C is:

(a) Library Function

(b) Define in header file stdio.h

(c) User define function

(d) User for input data from keyboard

(e) None of these

Q59. What is SQL Injection?

(a) Used to create SQL database

(b) Used to create a virtual table in SQL

(c) uniquely identified SQL statement

(d) placed a malicious code in SQL statements

(e) Allow SQL statement to run any platform

Q60. Which of the following is a view of the database that appears to an application program?

(a) Tuple

(b) Instance

(c) Subschema

(d) Relation

(e) Virtual Table

13 Adda247 | No. 1 APP for Banking & SSC Preparation Website:store.adda247.com | Email:[email protected]