IBPS SO(IT officer) Professional Knowledge Questions – Set 6

Dear Aspirants,
Welcome to the Professional Knowledge Section in Affairscloud.com. Here we are providing sample questions. It will be useful for the IBPS SO IT officer. We have also included some important questions that are repeatedly asked in previous exams.

  1. Which of the following is the preferred way to recover a database after a transaction in progress terminates abnormally?
    A. Rollforward
    B. Rollback
    C. Reprocess transactions
    D. None of the above
    Answer
  2. ___________ is usually a specialized hardware instruction dedicated to invoke the Operating System.
    A. Procedure Call
    B. Supervisor Call
    C. Both (A) and (B)
    D. None of the above
    Answer
  3. _______ is a versatile instruction that is finding its way into an increasing number of computer systems, especially microprocessors.
    A. Procedure Call
    B. Supervisor Call
    C. Software Interrupt (SWI)
    D. None of the above
    Answer
  4. A ________ is a collection of autonomous computer systems capable of communication and cooperation via their hardware and software interconnections.
    A. System
    B. distributed computer system
    C. Centralized Computer
    D. None of the above
    Answer
  5. Locking may cause which of the following problems?
    A. Deadlock
    B. Rollback
    C. Reprocess
    D. None of the above
    Answer
  6. A data warehouse administrator is concerned with which of the following?
    A. The time to make a decision but not the typical roles of a database administrator
    B. The time to make a decision and the typical roles of a database administrator
    C. The typical roles of a database administrator and redesigning existing applications.
    D. None of the above
    Answer
  7. Concurrency control is important for which of the following reasons?
    A. To ensure data integrity when updates occur to the database in single-user environment.
    B. To ensure data integrity when updates occur to the database in Multi-user environment.
    C. To ensure data integrity while reading data occurs to the database in Multi-user environment.
    D. None of the above
    Answer
  8. Which of the following is associated with implementation of e-commerce?
    A. LAN
    B. WLAN
    C. VLAN
    D. VAN
    Answer
  9. Which of the following makes Web insecure?
    A. RSA security algorithm
    B. Network Interface Card (NIC)
    C. Static keys
    D. None of the above
    Answer
  10. The buffer in DBMS has data that has to be__________
    A. Accessed
    B. Read
    C. Transmitted
    D. All of the above
    Answer