IT Questions For NVS Exam : 17th April 2019


As NVS exam is approaching, you must practice and pay attention to all the subject and section to maximise your score in the final exam. NVS PGT (IT) is one of the most awaited teaching vacancies.This IT section based questions can help you to improve your overall score if in case other sections are tougher than the expectation. Solve or Answer these 15 Computer Knowledge Questions to test your preparation for NVS and other upcoming Teaching Exams of 2019.

Q1. Which of the following algorithm technique is used in the quick sort?
(a) Dynamic algorithm
(b) Back tracking
(c) Divide and Conquer
(d) Greedy algorithm


Q2. Which of the following sorting algorithm has the worst time complexity [O(n log(n))]?
(a)Quick sort
(b)Bubble sort
(c)Insertion sort
(d)Heap sort

Q3. In which phase of compiler design programs are converted into tokens?
(a) Syntax Analyzer
(b) Lexical Analyzer
(c) Semantic Analyzer
(d) Code optimizer

Q4.Which of the following password format is more secure?
(a) Abc123
(b) Keyword
(c) HbGd#
(d) Hgm@22Ds

Q5.IP Address 169.2.7.6 belong to_____
(a) Class A
(b) Class B
(c) Class C
(d) Class D

Q6.'REVOKE' command is used in which category of SQL statement?
(a) DCL
(b) TCL
(c) DML
(d) DDL

Q7.All java classes are derived from:
(a)java.lang.Class
(b)java.util.Name
(c)java.lang.Object
(d)java.awt.Window

Q8.What is the act of willful changing data, using fraudulent input or removal of controls called_____.
(a) Data diddling
(b) Data contaminating
(c) Data capturing
(d) Data trashing

Q9.Which layer provides for the syntax of the data?
(a) Application Layer
(b) Session Layer
(c) Transport Layer
(d) Presentation Layer

Q10.What are the 3 principles of information security?
(a) Authentication, Availability, Accessibility
(b) Confidentiality, Integrity, Availability, 
(c) Integrity, Authentication, Confidentiality
(d) Availability, Security, Encryption

Q11.Which of the following is correct order of Clauses for an SQL Query?
(a) WHERE - ORDER BY - HAVING - GROUP BY
(b) WHERE - HAVING - GROUP BY - ORDER BY
(c) WHERE - GROUP BY - HAVING - ORDER BY
(d) ORDER BY - HAVING - GROUP BY - WHERE

Q12.which of the following statement is correct about HAVING clause?
(a) HAVING clause is used for rows rather than columns.
(b) HAVING clause is used for columns rather than groups.
(c) HAVING clause acts exactly like a WHERE clause.
(d) HAVING clause is used to mention condition in Group based SQL functions

Q13.Default subnet mask of Class A IP address is?
(a) 255.255.0.0
(b) 255.255.255.0
(c) 255.255.255.255
(d) 255.0.0.0

Q14.Which of the following protocol is used for securing connections between network application clients and servers over an insecure network?
(a)SSL
(b)EGP
(c)UDP
(d)HTTP

Q15.Which of the following is an example for Exterior Gateway Protocol (EGP)?
(a)  Open Shortest Path First (OSPF) Protocol
(b) Routing Information Protocol (RIP)
(c) Border Gateway Protocol
(d) Both (A) and (B)
  

You may also like to read :





    No comments