It Officer MCQ PDF
It Officer MCQ PDF
It Officer MCQ PDF
IBPS IT OFFICER
Covers
• DBMS
• Networking
• Operating System
• Software Engineering
• Hardware
• Machine Code etc.
Dear Readers of DayTodayGK,
The Wait is Over!!! We feel pleasure in announcing the most awaited DayTodayGK
Mobile APP (Free). YES. It is Available in Playstore.
1. The loss in signal power as light travels down the fiber is called?
a) attenuation b) progragation c) scattering d) interruption
Answer a) attenuation
2. How much power (roughly) a light emitting diode can couple into an optical fibre?
a) 100 microwatts b) 440 microwatts c) 100 picowatts d) 10 miliwatts
Answer a) 100 microwatts
3. Computer system is a
a) Hardware b) Software c) Bioware d) Virtual ware
Answer a) Hardware
4. Object model is a
a) Rule b) Process c) guidance d) System model Entity
Answer c) Guidance
7. Sensor component
a) Causes changes in system environment b) Communicate with other components
c) Collects information from system environment d) Coordinate the operation of components.
Answer c) Collects information from system environment
9. Sensor component is a
a) Functional component b) Non-functional component c) Reliability component d) None
Answer a) Functional component
2|P ag e
www.DayTodayGK.com
IT OFFICER MCQs BY D2G
16. Digital-analog converter that converter digital input into analog output is a
a) Communication component b) Computation component
c) Sensor component d) Interface component
Answer d) Interface component
17. In software system requirements, the functional requirement for the system
describes
a) Services the system is expected to provide b) Factors of system development
(C) Reliability, response time or system capacity d) None of these
Answer b) Factors of system development
18. Each data item in a record may be a group item composed of sub-items; those items
which are indecomposable are called
a) Elementary items b) Atoms c) Scalars d) All of above
3|P ag e
www.DayTodayGK.com
IT OFFICER MCQs BY D2G
21. When new data are to be inserted into a data structure, but there is no available
space; this situation is usually called
a) Houseful b) Saturated c) Underflow d) Overflow
Answer d) Overflow
25. In a binary tree, certain null entries are replaced by special pointers which point to
nodes higher in tree for efficiency. These special pointers are called
a) Leaf b) Branch c) Path d) Thread
Answer d) Thread
4|P ag e
www.DayTodayGK.com
IT OFFICER MCQs BY D2G
32. The following data structure allows deleting data elements from front and inserting
at rear
a) Stacks b) Queues c) Deques d) Binary search tree
Answer b) Queues
33. This data structure allows deletions at both ends of the list but insertion at only one
end.
a) Input-restricted deque b) Output-restricted deque c) Priority queues d) None
Answer a) Input-restricted deque
5|P ag e
www.DayTodayGK.com
IT OFFICER MCQs BY D2G
37. A binary tree whose every node has either zero or two children is called
a) Complete binary tree b) Binary search tree c) Extended binary tree d) None
Answer c) Extended binary tree
42. When representing any algebraic expression E the following uses only binary
operations in a 2-tree
a) the variable in E will appear as external nodes and operations in internal nodes
b) the operations in E will appear as external nodes and variables in internal nodes
c) the variables and operations in E will appear only in internal nodes
d) None of the above
6|P ag e
www.DayTodayGK.com
IT OFFICER MCQs BY D2G
Answer a) the variable in E will appear as external nodes and operations in internal
nodes
43. When converting binary tree into extended binary tree, all the original nodes in
binary tree are
a) internal nodes on extended tree b) external nodes on extended tree
c) vanished on extended tree d) None of the above
Answer a) internal nodes on extended tree
44. The post order traversal of a binary tree is DEBFCA. Find out the pre order
traversal
a) ABFCDE b) ADBFEC c) ABDECF d) None of the above
Answer c) ABDECF
47. Finding the location of the element with a given value is called
a) Traversal b) Search c) Sort d) All of the above
Answer b) Search
7|P ag e
www.DayTodayGK.com
IT OFFICER MCQs BY D2G
50. Each array declaration need not give, implicitly or explicitly, the information about
the
a) name of array b) data type of array
c) first data from the set to be stored d) index set of the array
Answer c) first data from the set to be stored
52. The indirect change of the values of a variable in one module by another module is
called
a) internal change b) inter-module change c) side effect d) all the above
Answer c) side effect
54. The time factor when determining the efficiency of algorithm is measured by
a) Counting the number of key operations b) Counting the number of statements
c) Counting the kilobytes of algorithm d) None of the above
Answer a) Counting the number of key operations
55. The space factor when determining the efficiency of algorithm is measured by
a) Counting the maximum memory needed by the algorithm
b) Counting the minimum memory needed by the algorithm
c) Counting the average memory needed by the algorithm
d) Counting the maximum disk space needed by the algorithm
Answer a) Counting the maximum memory needed by the algorithm
56. All the above* Which of the following data structures are indexed structures
a) linear arrays b) linked lists c) both of above d) none of above
Answer a) linear arrays
57. Which of the following is not the required condition for binary search algorithm
a) there must be mechanism to delete and/ or insert elements in list
b) the list must be sorted
c) there should be the direct access to the middle element in any sublist
8|P ag e
www.DayTodayGK.com
IT OFFICER MCQs BY D2G
61. A data structure where elements can be added or removed at either end but not in
the middle is referred as
a) Linked lists b) Stacks c) Queues d) Deque
Answer d) Deque
64. The elements of an array are stored successively in memory cells because
a) by this way computer can keep track only the address of the first element and the addresses
of other elements can be calculated
b) the architecture of computer memory does not allow arrays to store other than serially
c) A and B both false
d) A and B both true
Answer a) by this way computer can keep track only the address of the first element
and the addresses of other elements can be calculated
9|P ag e
www.DayTodayGK.com
IT OFFICER MCQs BY D2G
66. The memory address of fifth element of an array can be calculated by the formula
a) LOC(Array[5])=Base(Array[5])+(5-lower boun(D), where w is the number of words per
memory cell for the array
b) LOC(Array[5])=Base(Array[4])+(5-Upper boun(D), where w is the number of words per
memory cell for the array
c) LOC(Array[5]=Base(Array)+w(5-lower boun(D), where w is the number of words per
memory cell for the array
d) None of the above
Answer c) LOC(Array[5]=Base(Array)+w(5-lower boun(D), where w is the number of
words per memory cell for the array
67. The following data structure can’t store the non-homogeneous data elements
a) Arrays b) Records c) Pointers d) None of the above
Answer a) Arrays
69. The operating system creates _____ from the physical computer
a) Virtual space b) Virtual computers c) Virtual device d) None
Answer b) Virtual computers
10 | P a g e
www.DayTodayGK.com
IT OFFICER MCQs BY D2G
72. Which is the first program run on a computer when the computer boots up?
a) System software b) Operating system c) System operations d) None
Answer b) Operating system
74. Which of the following Operating System does not implement multitasking truly?
a) Windows 98 b) Windows NT c) Windows XP d) MS DOS
Answer d) MS DOS
75. Which runs on computer hardware and serve as platform for other software to run
on?
a) Operating System b) Application Software c) System Software d) All
Answer a) Operating System
76. Which is the layer of a computer system between the hardware and the user
program
a) Operating environment b) Operating system c) System environment d) None
Answer b) Operating system
78. When a computer is first turned on or restarted, a special type of absolute loader
called____ is executed
a) Compile and Go loader b) Boot loader c) Bootstrap loader d) Relating loader
Answer c) Bootstrap loader
79. Which of the following Operating systems is better for implementing a Client-
Server network
a) MS DOS b) Windows 95 c) Windows 98 d) Windows 2000
Answer d) Windows 2000
11 | P a g e
www.DayTodayGK.com
IT OFFICER MCQs BY D2G
81. Usually, in MSDOS, the primary hard disk drives has the drive letter ____
a) A b) B c) C d) D
Answer c) C
12 | P a g e
www.DayTodayGK.com
IT OFFICER MCQs BY D2G
96. In which type of the following OS, the response time is very crucial.
a) Network Operating System b) Real Time Operating System
c) Batch Operating System d) Unix Operating System
Answer b) Real Time Operating System
13 | P a g e
www.DayTodayGK.com
IT OFFICER MCQs BY D2G
101. Which of the following memory unit that processor can access more rapidly
a) Main Memory b) Virtual Memory c) Cache memory d) Read Only Memory
Answer c) Cache memory
103. Bringing a page into memory only when it is needed, this mechanism is called
a) Deadlock b) Page Fault c) Dormant Paging d) Demand Paging
Answer d) Demand Paging
105. Copying a process from memory to disk to allow space for other processes is Called
a) Swapping b) Deadlock c) Demand Paging d) Page Fault
Answer a) Swapping
14 | P a g e
www.DayTodayGK.com
IT OFFICER MCQs BY D2G
112. What are the requirements for the solution to critical section problem?
a) Mutual Exclusion b) Progress c) Bounded Waiting d) All of Above
Answer d) All of Above
15 | P a g e
www.DayTodayGK.com
IT OFFICER MCQs BY D2G
16 | P a g e
www.DayTodayGK.com
IT OFFICER MCQs BY D2G
122. Which of the following operating system reads and reacts in actual time?
a) Quick Response System b) Real Time System
c) Time Sharing System d) Batch Processing System
Answer b) Real Time System
123. Which of the following resources must be protected by the operating system?
a) I/O b) Memory c) CPU d) All of the above
Answer d) All of the above
127. The operating system keeps the information of files in a table called
a) File Folder Table (FFT) b) File Index Table (FIT)
c) File Allocation Table (FAT) d) Directory Index Table (DIT)
Answer c) File Allocation Table (FAT)
17 | P a g e
www.DayTodayGK.com
IT OFFICER MCQs BY D2G
18 | P a g e
www.DayTodayGK.com
IT OFFICER MCQs BY D2G
139. An entity set that does not have sufficient attributes to form a primary key is a
a) Strong entity set b) Weak entity set c) Simple entity set d) Primary entity set
Answer b) Weak entity set
Q.16 The way a particular application views the data from the database that the
application uses is a
(A) Module. (B) Relational model. (C) Schema. (D) Sub schema.
Ans: D
Q.17 The language used in application programs to request data from the DBMS is
referred to as the
(A) DML (B) DDL (C) VDL (D) SDL
Ans: A
19 | P a g e
www.DayTodayGK.com
IT OFFICER MCQs BY D2G
Q.20 The database environment has all of the following components except:
(A) Users. (B) Separate files. (C) Database. (D) Database administrator.
Ans: A
Q.21 The language which has recently become the defacto standard for interfacing
application programs with relational database system is
(A) Oracle. (B) SQL. (C) DBase. (D) 4GL.
Ans: B
Q.22 The way a particular application views the data from the database that the
application uses is a
(A) Module. (B) Relational model. (C) Schema. (D) Sub schema.
Ans: D
20 | P a g e
www.DayTodayGK.com
IT OFFICER MCQs BY D2G
Q.30 The method in which records are physically stored in a specified order according
to a key field in each record is
(A) Hash. (B) Direct. (C) Sequential. (D) all of the above.
Ans: A A method in which records are physically stored in a specified order according to a
key field in each record is hash. (In hash method, a hash function is performed on the key
value to determine the unique physical address of the record to store or retrieve)
21 | P a g e
www.DayTodayGK.com
IT OFFICER MCQs BY D2G
(D) The data dictionary is a tool used exclusively by the database administrator.
Ans: B
Q.40 The statement in SQL which allows to change the definition of a table is
(A) Alter. (B) Update. (C) Create. (D) Select.
Ans: A
22 | P a g e
www.DayTodayGK.com
IT OFFICER MCQs BY D2G
9. A logical schema
A) is the entire database B) is a standard way of organizing information into accessible parts.
C) Describes how data is actually stored on disk. D) All of the above
1. C) Program
2. B) Domains
3. A) Entity
4. C) Data Flow Diagram
5. A) Hierarchical schema
23 | P a g e
www.DayTodayGK.com
IT OFFICER MCQs BY D2G
6. C) System
7. B) Schema
8. C) Having
9. B) is a standard .. accessible parts.
10. C) Structured query language
1. The candidate key is that you choose to identify each row uniquely is called
……………..
A) Alternet Key B) Primary Key C) Foreign Key D) None of the above
7. A ………………. Does not have a distinguishing attribute if its own and mostly are
dependent entities, which are part of some another entity.
A) Weak entity B) Strong entity C) Non attributes entity D) Dependent entity
24 | P a g e
www.DayTodayGK.com
IT OFFICER MCQs BY D2G
10. The number of tuples in a relation is called its …………. While the number of
attributes in a relation is called it’s ………………..
A) Degree, Cardinality B) Cardinality, Degree C) Rows, Columns D) Columns, Rows
ANSWERS
1. B) Primary Key
2. A) Unique predicate
3. C) DISTINCT
4. C) i-true, ii-true
5. A) Data Control Language
6. A) Normalization
7. A) Weak entity
8. D) Predicate
9. A) Constraints
10. B) Cardinality, Degree
3. One aspect that has to be dealt with by the integrity subsystem is to ensure that only
valid values can be assigned to each data items. This is referred to as
A) Data Security B) Domain access C) Data Control D) Domain Integrity
25 | P a g e
www.DayTodayGK.com
IT OFFICER MCQs BY D2G
6. Centralizing the integrity checking directly under the DBMS ………….. Duplication
and ensures the consistency and validity of the database.
A) Increases B) Skips C) Does not reduce D) Reduces
8. In snapshot, …………………. clause tells oracle how long to wait between refreshes.
A) Complete B) Force C) Next D) Refresh
9. ……………… defines rules regarding the values allowed in columns and is the
standard mechanism for enforcing database integrity.
A) Column B) Constraint C) Index D) Trigger
ANSWERS
1. C) i-False, ii-True
2. B) Model
3. D) Domain Integrity
4. B) Semi-Join
5. D) Project
6. D) Reduces
7. D) All of the above
8. D) Refresh
9. B) Constraint
10. C) Both of them
26 | P a g e
www.DayTodayGK.com
IT OFFICER MCQs BY D2G
2. The DBMS utility, ...................... allows to reconstruct the correct state of database
from the backup and history of transactions.
A) Backup B) Recovery C) Monitoring D) Data loading
8. Identify the criteria for designing database from the point of view of user
A) No redundancy B) No inapplicable attributes C) Uniformity in naming & definitions of
the data items D) All of the above
9. The ............ operator preserves unmatched rows of the relations being joined.
A) Inner join B) Outer join C) Union D) Union join
ANSWERS
1. B) Degree
2. B) Recovery
3. A) First
27 | P a g e
www.DayTodayGK.com
IT OFFICER MCQs BY D2G
4. C) Relations
5. C) Third
6. B) select * from table_name
7. B) BCNF
8. D) All of the above
9. B) Outer join
10. D) All
1. The relational model is based on the concept that data is organized and stored in two-
dimensional tables called ……………………….
A) Fields B) Records C) Relations D) Keys
2. ……………….. contains information that defines valid values that are stored in a
column or data type.
A) View B) Rule C) Index D) Default
8. ………………… is a special type of integrity constraint that relates two relations &
maintains consistency across the relations.
A) Entity Integrity Constraints B) Referential Integrity Constraints
C) Domain Integrity Constraints D) Domain Constraints E) Key Constraints
28 | P a g e
www.DayTodayGK.com
IT OFFICER MCQs BY D2G
10. Drop Table cannot be used to drop a table referenced by a …………… constraint.
A) Local Key B) Primary Key C) Composite Key D) Foreign Key
ANSWERS
1. C) Relations
2. C) Index
3. C) Both of them
4. B) Edgar F. Codd
5. A) use database
6. C) =<
7. C) navigation
8. B) Referential.....Constraints
9. B) HAVING Clause
10. D) Foreign Key
29 | P a g e
www.DayTodayGK.com
IT OFFICER MCQs BY D2G
8. ................. requires that data should be made available to only authorized users.
A) Data integrity B) Privacy C) Security D) None of the above
10. ................. allows individual row operation to be performed on a given result set or
on the generated by a selected by a selected statement.
A) Procedure B) Trigger C) Curser D) None of above
ANSWERS
1. B) Inner
2. A) Like Predicate
3. A) i, ii, and iv only
4. C) drop ....database_name
5. A) Composite Key
6. B) Query optimization
7. B) Trigger
8. C) Security
9. B) i, ii and iii only
10. C) Curser
30 | P a g e
www.DayTodayGK.com
IT OFFICER MCQs BY D2G
5. ………………… approach reduces time and effort required for design and lesser risk
in database management.
A) Single global database B) Top-down approach C) Multiple databases D) None of the
above
ANSWERS
1. B) Information
2. B) SQL server service manager
3. A) record
4. B) Operational database
5. C) Multiple databases
6. A) Hierarchic Seque ... Method
7. D) sysindexes
8. C) It should avo … redundancy.
9. A) Chain
10. A) Constraints
31 | P a g e
www.DayTodayGK.com
IT OFFICER MCQs BY D2G
4. In the ………………… mode any record in the file can be accessed at random
A) Sequential access B) Random access C) Standard access D) Source access
10. The main task carried out in the …………… is to remove repeating attributes to
separate tables.
A) First Normal Form B) Second Normal Form C) Third Normal Form D) Fourth
Normal Form
32 | P a g e
www.DayTodayGK.com
IT OFFICER MCQs BY D2G
ANSWERS
1. A) Subset of X
2. C) DDL
6. A) Key integrity
7. B) Fourth Normal Form
3. C) Both of them
4. B) Random access
5. A) Delete * from table_name
8. B) Backup Utility
9. C) Terminal Interface
10. D) Fourth Normal Form
6: What is the language used by most of the DBMSs for helping their users to access
data?
a. High level language b. SQL c. Query Language d. 4GL
33 | P a g e
www.DayTodayGK.com
IT OFFICER MCQs BY D2G
9: In a large DBMS
a. each user can "see" only a small part of the entire database b. each subschema contains
every field in the logical schema c. each user can access every subschema
Answers: 1. c 2. b 3. e 4. a 5. c 6. c 7. d 8. c 9. a 10. D
s 1: Which of the following fields in a student file can be used as a primary key?
a. Class b. Social Security Number c. GPA d. Major
3: Which of the following contains a complete record of all activity that affected the
contents of a database during a certain period of time?
a. report writer b. query language c. data manipulation language
d. transaction log e. none of the above
6: Which is the make given to the database management system which is able to handle
full text data, image data, audio and video?
a. full media b. graphics media c. Multimedia d. hypertext
34 | P a g e
www.DayTodayGK.com
IT OFFICER MCQs BY D2G
9: A transparent DBMS
a. can not hide sensitive information from users b. keeps its logical structure hidden from
users
c. keeps its physical structure hidden from users d. both b and c
Answers:
1.b
2.e
3.d
4.b
5.d
6.c
7.b
8.b
9.c
10.a
s 1: The relational database environment has all of the following components except
a. Users b. separate files c. Database d. query languages e. database
4: The language used application programs to request data from the DBMS is referred
to as the
a. DML b. DDL c. query language d. any of the above e. none of the above
35 | P a g e
www.DayTodayGK.com
IT OFFICER MCQs BY D2G
6: Choose the RDBMS which supports full fledged client server application
development
a. dBase V b. Oracle 7.1 c. FoxPro 2.1 d. Ingress
8: A form defined
a. where data is placed on the screen b. the width of each field
c. both a and b d. none of the above
10: The management information system (MIS) structure with one main computer
system is called a...................
a. hierarchical MIS structure b. distributed MIS structure c. centralized MIS structure
d. decentralized MIS structure
Answers:
1.b
2.e
3.c
4.a
5.b
6.b
7.d
8.a
9.a
10.c
36 | P a g e
www.DayTodayGK.com
IT OFFICER MCQs BY D2G
Answers:
1. C) Both of the above
2. B) Ring
3. A) File transfer protocol
4. A) Bus
5. D) All of the above
6. C) Star Topology
7. A) Fiber Distributed... Interface
8. C) Mail service
9. B) End to end delivery
10. A) Physical
37 | P a g e
www.DayTodayGK.com
IT OFFICER MCQs BY D2G
4. The name of the protocol which provides virtual terminal in TCP/IP model is.
A) Telnet B) SMTP C) HTTP D) FTP
6. What is the name of the network topology in which there are bi-directional links
between each possible node?
A) Ring B) Star C) Tree D) Mesh
7. What is the commonly used unit for measuring the speed of data transmission?
A) Bytes per second B) Baud C) Bits per second D) Both B and C
8. Which of the communication modes support two way traffic but in only once
direction of a time?
A) Simplex B) Half-duplex C) Three - quarter's duplex D) Full duplex
9. The loss in signal power as light travels down the fiber is called .............
A) Attenuation B) Propagation C) Scattering D) Interruption
10. Which of the following TCP/IP protocols is used for transferring files form one
machine to another.
A) FTP B) SNMP C) SMTP D) RPC
Answers:
1. D) Peer to Peer
2. D) All of the above
3. C) Session Layer
4. A) Telnet
5. A) Physical layer
38 | P a g e
www.DayTodayGK.com
IT OFFICER MCQs BY D2G
6. D) Mesh
7. B) Baud
8. B) Half-duplex
9. A) Attenuation
10. A) FTP
2. ................... address use 7 bits for the and 24 bits for the portion of the IP address.
A) Class A B) Class B C) Class C D) Class D
7. Match the following IEEE No to their corresponding Name for IEEE 802 standards
for LANs.
i) 802.3 a) WiFi
ii) 802.11 b) WiMa
iii) 802.15.1 c) Ethernet
iv) 802.16 d) Bluetooth
A) i-b, ii-c, iii-d, iv-a
B) i-c, ii-d, iii-a, iv-b
C) i-c, ii-a, iii-d, iv-b
D) i-b, ii-d, iii-c, iv-a
39 | P a g e
www.DayTodayGK.com
IT OFFICER MCQs BY D2G
8. ........... was the first step in the evolution of Ethernet from a coaxial cable bus to hub
managed, twisted pair network.
A) Star LAN B) Ring LAN C) Mesh LAN D) All of the above
9. ............... is the predominant form of Fast Ethernet, and runs over two pairs of
category 5 or above cable.
A) 100 BASE-T B) 100 BASE-TX C) 100 BASE-T4 D) 100 BASE-T2
10. IEEE 802.3ab defines Gigabit Ethernet transmission over unshielded twisted pair
(UTP) category 5, 5e or 6 cabling known as ....................
A) 1000 BASE-T B) 1000 BASE-SX C) 1000 BASE-LX D) 1000 BASE-CX
Answers:
1. B) Session Layer
2. A) Class A
3. C) Class D
4. B) True, True
5. A) i only
6. B) EuropeAnswer ..... (ERIN)
7. C) i-c, ii-a, iii-d, iv-b
8. A) Star LAN
9. B) 100 BASE-TX
10. A) 1000 BASE-T
1. ………………….. is a high performance fiber optic token ring LAN running at 100
Mbps over distances upto 1000 stations connected.
A) FDDI B) FDDT C) FDDR D) FOTR
4. …………… is another kind of fiber optic network with an active star for switching.
A) S/NET B) SW/NET C) NET/SW D) FS/NET
40 | P a g e
www.DayTodayGK.com
IT OFFICER MCQs BY D2G
5. The combination of ……………. And ………….. is often termed the local address of
the local portion of the IP address.
A) Network number and host number B) Network number and subnet number
C) Subnet number and host number D) All of the above
6. ………………….. implies that all subnets obtained from the same subnet mask.
A) Static subnetting B) Dynamic subnetting C) Variable length subnetting
D) Both B and C
8. The most important and common protocols associated TCP/IP internetwork layer
are.
i) Internet protocol(IP)
ii) Internet control Message Protocol(ICMP)
iii) Bootstrap Protocol (BooTP)
iv) Dynamic Host Configuration Protocol (DHCP)
v) Address Resolution Protocol (ARP)
A) i, ii, iii and iv only B) i, iii, iv and v only
C) ii, iii, iv and v only D) All i, ii, iii, iv and v
10. Which of the following is not a mechanism that DHCP supports for IP address
allocation?
A) Automatic allocation B) Static allocation C) Dynamic allocation D) Manual allocation
Answers:
1. A) FDDI
2. D) All of above
3. B) Fast Ethernet
4. A) S/NET
5. C) Subnet . host number
6. A) Static subnetting
41 | P a g e
www.DayTodayGK.com
IT OFFICER MCQs BY D2G
7. A) True, True
8. D) All i, ii, iii, iv and v
9. A) Address ….. (ARP)
10. B) Static allocation
6. How does a host that has sent TCP data know that the data was received?
a. A TCP acknowledgement is sent from the receiver
b. An ICMP echo reply is sent from the receiver
c. An incremented TCP sequence number is sent from the receiver
d. A SYN/ACK is sent from the receiver
Answer: (a)
7. Which of the following best characterizes TCP versus UDP (in most cases)?
a. TCP is less reliable and quicker
42 | P a g e
www.DayTodayGK.com
IT OFFICER MCQs BY D2G
43 | P a g e
www.DayTodayGK.com
IT OFFICER MCQs BY D2G
3. Some of the fields in an IPv4 packet that are used by the receiver to reassemble
associated fragments are:
a. The IP identification field to identify all associated fragments, the More Fragment bit to
indicate whether or not more fragments follow the current one, and the fragment offset to
indicate where a particular fragment falls in relation to other fragments
b. The IP identification field to identify all associated fragments, the More Fragment bit to
indicate whether or not more fragments follow the current one, and the Time to Live to expire
missing fragments
c. The IP identification field to identify all associated fragments, the More Fragment bit to
indicate whether or not more fragments follow the current one, and the TCP checksum to
discard corrupted fragments
d. The IP identification field to identify all associated fragments, the More Fragment bit to
indicate whether or not more fragments follow the current
one, the IP options to route all
fragments through the same intermediate routers
Answer: (a)
44 | P a g e
www.DayTodayGK.com
IT OFFICER MCQs BY D2G
7. What is a typical response from a host that receives a UDP packet on a non Ͳlistening
port?
a. A UDP reset flag set to the sender b. A UDP FIN flag set to the sender
c. An ICMP port unreachable message to the sender d. A UDP port unreachable message to
the sender
Answer: (c)
8. Suppose a SYN packet is spoofed using a real IP address and then sent to a server
that responds with a SYN/ACK to the actual IP
address. How does the real IP
address respond?
a. With an acknowledgement since it did not send the SYN
b. With a reset since it did not send the SYN
c. With a duplicate SYN since it did not send the SYN
d. With a TTL of 0 since it did not send the SYN
Answer: (b)
10. Suppose you had a tool that allowed you to craft an ICMP echo request over
Ethernet, but you needed to tell the tool how to compose the request layer by layer in
the proper order. How would you order the different layers?
a. Ethernet header, followed by IP header, followed by ICMP header, followed by optional
ICMP data
b. IP header, followed by Ethernet header, followed by ICMP header, followed by optional
45 | P a g e
www.DayTodayGK.com
IT OFFICER MCQs BY D2G
ICMP data
c. The order is unimportant ^ craft them in any order and the TCP/IP stack will properly
assemble them before sending
d. The Ethernet header must be first, and the order of the IP header, ICMP header, and data is
unimportant since the TCP/IP stack will properly order assemble them before sending
Answer: (a)
3. In the IPv6 header,the traffic class field is similar to which field in the IPv4 header?
a) Fragmentation field b) Fast-switching c) ToS field d) Option field
Answer: c
Explanation: This field enables to have different types of IP datagram.
46 | P a g e
www.DayTodayGK.com
IT OFFICER MCQs BY D2G
c) Node has both IPv4 and IPv6 support d) None of the mentioned
Answer: c
Explanation: dual-stack is one of the approach used to support IPv6 in already existing
systems.
8. Suppose two IPv6 nodes want to interoperate using IPv6 datagrams but are
connected to each other by intervening IPv4 routers. The best solution here is
a) use dual-stack approach b) Tunneling c) No solution d) Replace the system
Answer: b
Explanation: The IPv4 routers can form a tuunel.
4. Bluetooth uses
a) frequency hoping spread spectrum b) orthogonal frequency division multiplexing
47 | P a g e
www.DayTodayGK.com
IT OFFICER MCQs BY D2G
1. A special type gateway that can keep external users from accessing resources on the
LAN users access the external info is called:
A. Repeater B. Firewall C. Encryption D. Hub E. None of these
Answer B. Firewall
2. What is the name given to the exchange of control signals which is necessary for
establishing a connection between a modem and a computer at one end of a line and
another modem and computer at the other end?
48 | P a g e
www.DayTodayGK.com
IT OFFICER MCQs BY D2G
7. An indexing operation
A. Sorts a file using a single key B. Sorts file using two keys C. Establishes an index for a
file D. Both (1) and (3) E. None of these
Answer C. Establishes an index for a file
9. The language used in application programs to request data from the DBMS is
referred to as the
A. DML B. DDL C. Query language D. DCL E. None of these
Answer A. DML
10. A ___ contains the smallest unit of meaningful data, so you might call it the basic
building block for a data file.
A. File structures B. Records C. Fields D. Database E. None of these
Answer C. Fields
49 | P a g e
www.DayTodayGK.com