Showing posts with label Model Questions for IT Jobs. Show all posts
Showing posts with label Model Questions for IT Jobs. Show all posts

Sunday, November 26, 2017

Basic questions for Linux Users




1.  Which two Linux commands can be used to display currently active processes? (Choose
two answers)

a. netstat
b. tcpdump
c. top
d. ifconfig
e. proc

2. What command can you use to determine the MAC address of a Linux-based machine?
(Choose one answer)

a. ipconfig
b. ifconfig
c. getmac
d. intmac

3. What three are valid permissions under Linux? (Choose three answers)
a. read
b. shared
c. execute
d. no permissions
e. full control.

4. What two Linux commands can be used for pattern matching and filtering of output?
(Choose two answers)

a. cat
b. echo
c. find
d. grep
e. more

5. What is the purpose of the 'sudo' command in Linux? (Choose one answer)

a. Provides a stateful 'undue' of the previous command.
b. Enters the administrator or superuser command mode.
c. Configures the pseudowire interface on Linux machines.
d. Allows a logged in user to run Linux commands as the administrator.

6. Where are user-specific passwords stored in a Linux OS? (Choose one answer)
a. /etc/password
b. /etc/shadow
c. /usr/local
d. /usr/password

7.  What command is used to verify disk capacity of Linux hosts? (Choose one answer)
a. chkdsk

b. df
c. du
d. hwinfo

8. What does the linux command 'tar -cvf' do? (Choose one answer)
a. Activates task management and recovery tools.
b. Terminates active running processes specificed by the user.
c. Creates an archive from a set of files without verification.
d. Mounts terminal access ports for use by the Linux kernel.

09. Which command is used to view the contents of a directory within Linux? (Choose one
answer)

a. cat
b. df
c. dir
d. ls

10. What Linux command is used to verify the host network configuration? (Choose one
answer)

a. biff
b. cat /etc/hosts
c. ifconfig
d. netconf

11. What three are characteristics of MAC addresses? (Choose three answers)

a. MAC addresses are used to forward frame in LAN switches.
b. MAC addresses are used by routers to build routing tables and make routing decisions.
c. The first three byes are the OUI which identifies the manufacturer of the network interface card.
d. Dynamic MAC addresses are assigned by DHCP.
e. MAC addresses are unique across the global internet.

12. What function does Snort perform on Linux machines? (Choose one answer)
a. File scanning for malware and virus infections.
b. Simple Network Object management.
c. Real-time traffic analysis and packet logging in IP networks.
d. Simple messaging system for Linux system alerts.



ANSWER:
1=a,c.
2=a.
3=a,c,d.
4=d,e
5=d
6=b
7=b
8=c
9=d
10=c
11=a,c,e
12=c

Monday, November 6, 2017

Basic IT Questions for Computer Engineer Part 2

51. All of the following are examples of real security and privacy risks EXCEPT
a.Spam
b.Spare
c.Phising
d.Stole

Answer a. Spam

52.A byte can represent any number between 0 and _________
a. 255
b. 1024
c. 1025
d. 256
e. 2

Answer a. 255

53.Attributes can be defined as ______________
a.Switch Board
b.Macro
c.None
d.Pages
e.Entity

Answer e. Entity

54.________ would you find on LinkedIn
a. Chat
b. Games
c. Connections
d. Applications
e. None

Answer c. Connections

55.Smart Card is _________
a. Special Purpose Card
b. None
c. Micro Processor Card
d. Processing Unit for Software Handling
e. Processing Unit contains memory for storing data

Answer e. Processing Unit contains memory for storing data

56.Linux is a type of ___________ software
a.Proprietary
b.Open Source
c.Share Ware
d.Hidden type
e.Commercial

Answer c. Share Ware



57.A station in a network forwards incoming packets by placing them on its shortest output queue. What routing algorithm is being used?
a) hot potato routing
b) flooding
c) static routing
d) delta routing
e) None of the above

Answer a) hot potato routing



58.Frames from one LAN can be transmitted to another LAN via the device
a) Router
b) Bridge
c) Repeater
d) Modem

Answer b) Bridge

59.The synchronous modems are more costly than the asynchronous modems because
a) they produce large volume of data
b) they contain clock recovery circuits
c) they transmit the data with stop and start bits
d) they operate with a larger bandwidth
e) None of the above

Answer b) they contain clock recovery circuits

60.A remote batch-processing operation in which data is solely input to a central computer would require a
a) telegraph line
b) simplex lines
c) mixedband channel
d) All the above
e) None of the above

Answer b) simplex lines

61.With an IP address of 100, you currently have 80 subnets. What subnet mask should you use to maximize the number of available hosts?
a) 192
b) 224
c) 240
d) 248
e) 252

Answer e) 252

62.Which of the following is not a programming language?
a.Basic
b.Java
c.Knuth

Answer a.Basic

63.When creating a vertical page break _______.
A. The active cell must be A1
B. The active cell can be anywhere in the worksheet
C. The active cell must be in row 1
D. The active cell must be in column A
E. None of these

Answer C.The active cell must be in row 1



64.To drag a selected range of data to another worksheet in the same workbook, use the ______.
A. Tab key
B. Alt key
C. Shift key
D. Ctrl key
E. Pageup/down

Answer D.Ctrl key



65.You can use the format painter multiple times before you turn it off by _______.
A. You can use the format painter button only one time when you click it
B. Double clicking the format painter button
C. Pressing the Ctrl key and clicking the format painter button
D. Pressing Alt key and clicking the format painter button
E. Both 2 and 3

Answer B.Double clicking the format painter button



66.Data marker on a chart are linked to data points in a worksheet, therefore
A. You can automatically apply formatting to a data series
B. You can change the position of a data marker and automatically change the data point value in the worksheet
C. You can change a data print value and automatically are draw the chart
D. 1 and 2
E. None of these

Answer B.You can change the position of a data marker and automatically change the data point value in the worksheet



67.The process of finding errors in a program is called
a.Testing
b.Compiling
c.Debugging
d.none of the above

Answer a.Testing



68. Each pixel is composed of :
a. two mini dots
b. five mini dots
c. six mini dots
d.three mini dots

Answer d.three mini dots



69. 16 bit color, also called
a. 65K or triColor
b. 65K or HiColor
c. 65K or reColor
d. 65K or biColor

Answer b. 65K or HiColorb

70. P55C – MMX is a ——–generation CPU
a.1ST
b.5th—
c.3rd
d.6th

Answer b.5th

71.CMOS stands for:
a. Complimentary Metallugy Oxide Semiconductor
b. Compliment Metal Oxide Semiconductor—
c. Complimentary Metal Oxy Semiconductor
d. Complimentary Metal Oxide Semi

Answer b. Compliment Metal Oxide Semiconductor

72. It enable the PC to coordinate the functions of various computer components:
a.ROM
b.RAM
c.ALU
d.DAM

Answer a.ROM

73.A process known as ____________ is used by large retailers to study trends.
A. Data mining
B. Data selection
C. Data conversion
D. POS Point of Sale

Answer A.Data mining

74.DSL is an example of a(n) ____________ connection.
A. Network
B. Wireless
C. Slow
D. Broadband
E. None of these


Answer D.Broadband

75.A self replicating program, similar to a virus which was taken from a 1970s science fiction novel by John Bruner entitled the Shockwave Rider is _________
A. Vice
B. Bug
C. Lice
D. Worm

Answer D.Worm

76. Data (information) is stored in computers as
a.File
b.Directories
c.Discs
d.Txt

Answer a.File

77.The commonly used UNIX commands like date, ls, cat etc. are stored in
(A) /dev directory
(B) /bin directory
(C) /tmp directory
(D) /unix directory
(E) None of these

Answer (B) /bin directory



78. What displays the contents of the active cell in Excel?
(A) Name box
(B) Row Headings
(C) Formula bar
(D) Task pane
(E) None of these

Answer (C) Formula bar



79.The basic unit of a worksheet into which you enter data in Excel is called a
(A) tab
(B) cell
(C) box
(D) range
(E) None of these

Answer (B) cell



80) Which of the following memory has the shortest access time?
A. Virtual Memory
B. Cache Memory
C. External Memory
D. Register

Answer D) Register



81)What is Unicode?
A. Standard Font
B. Software
C. Character Encoding System
D. Keyboard Layout

Answer C) Character Encoding System



82. A _____ contains specific rules and words that express the logical steps of an algorithm.
a) Syntax
b) Programming structure
c) Programming language
d) Logic chart
e) None of these

Answer c) Programming language



83. To what temporary area can you store text and other data, and later paste them to another location?
a) The clipboard
b) ROM
c) CD-ROM
d) The hard disk
e) None of these

Answer a) The clipboard



84. The ability to find an individual item in a file immediately _____is used.
a) File allocation table
b) Directory
c) Sequential access
d) Direct access
e) None of these


Answer d) Direct access

Wednesday, February 1, 2017

IT LAB test for Janata Bank Executer Officer(IT)



Janata Bank Executive Officer IT (LAB Test)

1. Open the packet tracer file From E Drive named “Rip.pkt” and Configure, Examine the routing and check connectivity among routers.








2. Open linux in Vmware with userid=root and password=123456;
 
         i. Configure yum repository. ( All rpm packages are stored in /var/ftp/pub)

         ii. Install the necessary rpm for DNS by using yum and Configure DNS of  domain name 
          abcd.com 
            IP 172.16.1.100
             (Forward Zone and Reverse Zone should be configured) 

        iii. Install the necessary rpm for squid by using yum and configure proxy server where a group 
            of user  get their internet from Sunday to Thursday and 10am to 6pm only.

        iv. Install the necessary rpm packages for ftp by using yum.
        v. Configure iptables for allowing ftp and telnet.
 


Thursday, December 8, 2016

Basic IT Questions for Computer Engineer Part 1

1. When creating a vertical page break _______.

A. The active cell must be A1
B. The active cell can be anywhere in the worksheet
C. The active cell must be in row 1
D. The active cell must be in column A
E. None of these

Answer C.The active cell must be in row 1


2. In Computer Operating Systems And Data Storage WYSIWYG Stands For:
a) We You See In We You Ground
b) We Yours In Window Your Gate
c) What You See Is What You Get
d) What You See Is What You Got


Answer c) What You See Is What You Get

3. Microsoft Office Written In Which Computer Language?
a) JAVA
b) C++
c) HTML
d) XML

Answer b) C++


4. Which is NOT a function of a microprocessor?
a) keeps the system unit hot
b) keeps system always cool
c) Keeps the system unit cool
d) dont keep the system unit cool

Answer c) Keeps the system unit cool


5. PC cards, flash memory cards, and smart cards are all examples of:
a) Solid state storage devices
b) hard disk
c) ram
d) rom


Answer a) Solid state storage devices


6. Which of the following is a graphical package?
a) CorelDraw
b) illustrator
c) paint
d) microsoft office


Answer a) CorelDraw


7. This is not a function category in Excel ________
a) Operational
b) Logical
c) Unlogical
d) Functional


Answer b) Logical


8. The operating system that is self-contained in a device and resident in the ROM is
a) Inside operating system
b) Outside operating system
c) Explore operating system
d) Embedded Operating System


Answer d) Embedded Operating System


9. On-line real time systems become popular in ___________ Generation
a) First generation
b) Fifth generation
c) Sixth generation
d) Third Generation


Answer d) Third Generation


10. ___________ is the ability of a device to “jump” directly to the requested data
a) Read only
b) Read write both
c) a and d are correct
d) Random access


Answer d) Random access


11. _______ is the combination of keys to switch between the last four places that you have edited.
a) ALT + CTRL + Z
b) ALT + CTRL + Y
c) ALT + TAB + Z
d) ALT + SHIFT + Z


Answer a) ALT + CTRL + Z


12. Superscript, subscript, outline, emboss, engrave are known as ______
a) Font effects
b) Size effects
c) Alignment effect
d) Numeric effect

Answer a) font effects



13. Similar to a hub in an Ethernet network, a _________ helps relay data between wireless network nodes.
a) Wireless access point
b) Portable access point
c) Internet access point
d) system access point

Answer a) Wireless access point



14. In CSMA/CD, the computer sends a fixed unit of  data called a(n)_______
a) Racket
b) Joint
c) Packet
d) Point

Answer c) Packet



15. The uniform resource locator (URL) is case sensitive in the ______
a) Directory
b) Bibliography
c) Packet
d) Internet

Answer a) Directory



16. ASCII is a(n)________
a) Encoding standard used to represent point and characters.
b) Encoding standard used to represent letters and characters.
c) Encoding standard used to represent letters and algorithm.
d) Encoding standard used to represent logics and characters.

Answer b) Encoding standard used to represent letters and characters.



12. Who designed the first electronic computer -ENIAC?

a) Hal Abelson

b) Van Neuman

c) Abiteboul

d) Samson Abramsky

Answer b) Van Neuman



17. ________ is the process of carrying out commands
a) Executing
b) Relate
c) Rescued
d) Turn on

Answer a) Executing



18. In word, when you indent a paragraph, you _______
a) Push the text in with respect to the outline
b) Push the text in with respect to the trim
c) Push the text in with respect to the margin
d) Push the text in with respect to the bleed

Answer c) Push the text in with respect to the margin



19. What is a popular program for creating documents that can be read on both a PC and a Macintosh computer?
a) Adobe Acrobat
b) Adobe reader
c) Adobe photoshop
d) Adobe edit

Answer a) Adobe Acrobat



20. Which Of The Following Is Used For Close a Tab On a Browser?
a) Ctrl + T
b) Ctrl + W
c) Ctrl + A For Select All
d) Ctrl +Z

Answer b) Ctrl + W


21. When More Than One Window Is Open, To Switch To The Next Window — Is The Key Combination.
a) CTRL+F5
b) CTRL+F6
c) CTRL+F7
d) CTRL+F8

Answer b) CTRL+F6


22. What Is The Shortcut Key To Indent The Paragraph In Ms Word?
a) Ctrl + M
b) Ctrl + P
c) Shift + M
d) Ctrl + I

Answer a) Ctrl + M



23. The ______ is device which connects in inputs to outputs
a) RAM
b) Cross Point
c) Modem
d) Crossbar

Answer c) Modem



24. ___________ gathers user information and sends it to some one through Internet
a) Spybot
b) Logic Bomb
c) Security
d) Patch
e) Virus

Answer a) Spybot



25. Function of Router in a Network _________
a) forwards a packet to the next free outgoing links
b) determines on which outgoing link a packet is to be forwarded
c) forwards a packet to all outgoing links except the originated link
d) forwards a packet to all outgoing links

Answer b) determines on which outgoing link a packet is to be forwarded

26. Custom Software developed to address specific needs of a company is known as ___________
a) Proprietary
b) Developmental
c) Privately owned
d) Copyrighted

Answer a) Proprietary

27. ________ Values can be represented by a single Byte
a) 16
b) 4
c) 64
d) 256

Answer d) 256

28. _________ malware typically has a tendency to reside in/to get attach to a computer program
a) All the above
b) Worm
c) Computer Virus
d) Trojan Horse

Answer c) Computer Virus


29.The Advantage Of “Touch Screen” Is ___________
a) That It Is Natural To Touch Things
b) That It Uses A Little Screen Space For Each Choice
c) That It Is Not As Tiring As The Keyboard Input
d) All The Above

Answer a) That It Is Natural To Touch Things


30. Which One Of The Following Problem Causes Exception?
a) A Problem In Calling Function
b) A Run-Time Error
c) A Syntax Error
d) Missing Semicolon In Statement In Main

Answer b) A Run-Time Error


31. _______ Was A Search Engine System For The Gopher Protocol
a) Gobbler
b) Archie
c) Veronica
d) Mikky

Answer c) Veronica


32. Which Backup Method Only Backs Up Files That Have Been Modified Since The Last Backup?
a) Incremental Backup
b) Decreamental Backup
c) RAM Backup
d) ROM Backup

Answer a) Incremental Backup


33. In Word, You Can Change Page Margins By
a) Clicking The Right Mouse Button On The Ruler
b) Clicking The Left Mouse Button On The Ruler
c) Clicking The Middle Mouse Button On The Ruler
d) Clicking The Mouse Button On The Ruler

Answer a) Clicking The Right Mouse Button On The Ruler

34. Which Part Of The Computer Helps To Store Information?
a) Disk – Drive
b) Common-Drive
c) Rare-Drive
d) Reel Memory

Answer a) Disk – Drive


35. Perforated Paper Used As Input Or Output Media Is Known As _____
a) Paper Tape
b) Media
c) Desktop
d) Disk Drive

Answer a) Paper Tape


36. FPI stands for____
a.File pre insert
b.File per insert
c.Frames per insert
d.Frames per inch

Answer d.Frames per inch


37. Which is not the portable computer?
a.parallel computers
b.Series Computers
c.mainframe computers
d.mini computers

Answer b.Series Computers


38. A ………… is an additional set of commands that the computer displays after you make a selection from the main menu
a.Dialog box
b.Tool bar
c.Menu bar
d.On screen

Answer a.Dialog box


39. Which of the following is NOT one of the four major data processing functions of a computer?
a.Input of the data
b.Analyzing the data or information
c.Interpret data
d.output of the data

Answer b.Analyzing the data or information


40. Which of the following is not a term pertaining to the Internet?
a.Mouse
b.Keyboard
c.Joystick
d.Monitor

Answer b.Keyboard


41. __________are ‘attempts by individuals to obtain confidential information from you by falsifying their identity.
a.Phishing
b.Hacking
c.Hacker
d.Curuption

Answer a.Phishing


42. Which of the following helps describe the Windows .NET Server?
a. It is designed for different levels of network complexity
b. Phising
c. Windows key
d. RAM

Answer a. It is designed for different levels of network complexity


43. The process of analyzing large data sets in search of new, previously undiscovered relationships is known as:
a. Data mining
b. Data entry
c. Data storage
d. Data compiler

Answer a.Data mining


44. On a CD-RW you can
a.Read, write and rewrite information
b.Read, write and rewrite
c.Read and write
d.Read and rewrite information

Answer a. Read, write and rewrite information



45. What is the function of Recycle Bin?
a.Store deleted file
b.Do not store deleted file
c.Remove store files
d.All

Answer a.Store deleted file


46. Which type of network requires HPNA adapters for communication between network nodes?
a.Computer lane
b.Phone line
c.Phone Operator
d.Internet

Answer d. Internet



47. Which of the following may be necessary for you to do after you install new application software?
a.Cool boost
b.Do a warm boot
c.Hot boot
d.all

Answer a.Cool boost[/su_spoiler


48. Which of the following is NOT part of the motherboard?
a.Connector
b.Protactor
c.Translator
d.Compiler

Answer a.Connector

49. Information that comes from an external source and fed into computer software is called …………….
a.Output
b.Translator
c.Input
d.RAM

Answer c.Input


50. The basic unit of a worksheet
a.Cell
b.Bar
c.Table
d.Lines

Answer a.Cell

Tuesday, February 16, 2016

OSI Layer 2

                                                                                                                    tutorial of OSI Layer

   1. Question: The_________ layer is responsible for the delivery of a message from one process to another.,
   1. Presentation ,
   2. physical ,
   3. network  ,
   4. transport ,
   5. none of the above,
 
   Answer 4

2
   Question: In the OSI model, encryption and decryption are functions of the ________ layer.,
   1. transport   ,
   2. presentation ,
   3. session ,
   4. application,
   5. network  ,

   Answer 2

3
   Question: The physical layer is concerned with the movement of _______ over the physical medium.,
   1. bits  ,
   2. dialogs   ,
   3. programs  ,
   4. protocols,
   5. None of the above,
   Answer 1

4
   Question: In the OSI model, when data is transmitted from device A to device B, the header from A\'s layer 5 is read by B\'s _______ layer.,
   1. physical   ,
   2. transport ,
   3. session   ,
   4. presentation,
   5. application,

   Answer 3

5
   Question: Which layer in the OSI reference model is responsible for determining the availability of the receiving program and checking to see if enough resources exist for that communication?,
   1. application,
   2. session,
   3. presentation,
   4. transport,
   5. network,

   Answer 1


   Question: A receiving host computes the checksum on a frame and determines that the frame is damaged. The frame is then discarded. At which OSI layer did this happen?,
   1. session ,
   2. network ,
   3. physical ,
   4. data link,
   5. transport,

   Answer 4

7
   Question: Router works in which layer,
   1. Application ,
   2. session,
   3. network,
   4. physical,
   5. none of above,

   Answer 3

8
   Question: If you use either Telnet or FTP, which is the highest layer you are using to transmit data?,
   1. Application,
   2. Physical,
   3. Presentation,
   4. Session,
   5. transport,

   Answer 1

9
   Question: In the OSI model path selection is  functions of the ________ layer.,
   1. Application,
   2. Presentation,
   3. Session,
   4. network,
   5. physical,

   Answer 4

10
   Question: Hub works in ,
   1. physical ,
   2. network,
   3. Presentation,
   4. Application,
   5. Session,

   Answer 1

OSI Layer_1

1
   Question Why was the OSI model developed? ,                                    
   1. manufacturers disliked the TCP/IP protocol suite ,
   2. the rate of data transfer was increasing exponentially,
   3. only for microsoft windows file and folder sharing,
   4. standards were needed to allow any two systems to communicate ,
   5. none of the above,

   Answer 4

2
   Question The OSI model consists of _______ layers.,
   1. ten,
   2. eight,
   3. seven  ,
   4. five  ,
   5. three  ,

   Answer 3

3
   Question At which layer of the OSI model does PPP perform? ,
   1. Layer 1,
   2. Layer 2,
   3. Layer 3,
   4. Layer 4,
   5. Layer 5,

   Answer 2

4
   Question The physical layer is concerned with the movement of _______ over the physical medium. dialogs ,
   1. programs,
   2. dialogs ,
   3. bits,
   4. protocols ,
   5. none of above,
   Answer 3

5
   Question In the OSI model, as a data packet moves from the lower to the upper layers, headers are _______.,
   1. modified,
   2. removed ,
   3. added ,
   4. rearranged  ,
   5.   none of above,

   Answer 3

6.
   Question A network administrator is verifying the configuration of a newly installed host by establishing an FTP connection to a remote server. What is the highest layer of the protocol stack that the network administrator is using for this operation?  ,
   1. application,
   2. presentation,
   3. transport,
   4. data link,
   5. internet,

   Answer 1

7
   Question In the OSI model, what is the main function of the transport layer?  ,
   1. node-to-node delivery,
   2. updating and maintenance of routing tables,
   3. process-to-process message delivery,
   4. synchronization,
   5. none of above,

   Answer 3

8
   Question Where does routing occur within the DoD TCP/IP reference model?,
   1. application  ,
   2. presentation,
   3. internet,
   4. physical,
   5. transport,

   Answer 3

9
   Question At which layer of the OSI model switch works?,
   1. data link  ,
   2. physical ,
   3. network,
   4. application ,
   5. transport,

   Answer 1

10
   Question The ______ layer adds a header to the packet coming from the upper layer that includes the logical addresses of the sender and receiver.,
   1. physical ,
   2. transport,
   3. application ,
   4. data link  ,
   5. network,

   Answer 5