IBPS CWE (Specialist Officer) 2013 Discussions

@puchun said:
What is the standard IANA port number used for requesting web pages?
a. 80
b. 53
c. 21
d. 25
port 80, i guess..its default for HTTP..
@AnkitChoudhary1 How many blocks of numbers make up an IP Address? a) 4 b) 3 c) 6 d) 5?
Which of the following commands of vi editor deletes the current line:
a) dd b) yy
c) d d) p
2. Which of the following vi commands is used to replace the character under the cursor:
a) P b) R
c) r d) a
@puchun said:
@AnkitChoudhary1 How many blocks of numbers make up an IP Address? a) 4 b) 3 c) 6 d) 5?
4?
@AnkitChoudhary1 : yaar iska nahi pata ans. 😞
@puchun said:
Which of the following commands of vi editor deletes the current line:
a) dd b) yy
c) d d) p
2. Which of the following vi commands is used to replace the character under the cursor:
a) P b) R
c) r d) a
1. dd
2.'a' i think.. not sure..
P.S. I dont think unix will come in ibps it officer scale 1 paper..warna achche achcho ko pareshani ho jayegi ..
@puchun said:
@AnkitChoudhary1 : yaar iska nahi pata ans.
4 hoga.. as ip addresses are like 123.12.12.09.. so 4 blocks of addresses..
Which of the following wireless technologies provides the most security?
Bluetooth
Wireless Encryption Protocol (WEP)
Wi-Fi Protected Access (WPA)
Microwave communications
@AnkitChoudhary1 : yar iska batado.
Which of the following are logical database structures
a) Segments
b) Data files
c) Data blocks
d) Control files

Hello Everyone,


Has anybody got the same examination centre ???
INTERNATIONAL COLLEGE OF ENGINEERING NEW EDUCATION HUB
DIDOLI GANG NAHAR ROAD
MURADNAGAR GHAZIABAD UTTAR PRADESH-20100

If yes then message me so we can pool in to go to the centre as this centre seems faraway from Delhi.

@AnkitChoudhary1 : 2nd ques ka r hoga.. i.e. c option.
Courtsey: http://pc.net/resources/commands/vi

anyone has same centre as mine??

MANGALORE INSTITUTE OF TECHNOLOGY,

MOODBIDRI,

KARNATAKA

??

@ram11 Which of the following are logical database structures
a) Segments
b) Data files
c) Data blocks
d) Control files
iska ans batao yaaro 😃
@specialstevie8 said:
good luck !
tq
SQL Injection attacks can be perpetrated easily through __________manipulation.
a) String
b) Character
c) Numeric
d) None
iska batao ans
@puchun a) String
To avoid SQL Injection attack use
a) Static SQL
b) Dynamic SQL with bind arguments
c) Validate and sanitize input.
d) All
What is the purpose of an Intrusion Detection System (IDS)?

a) To prevent unauthorized access to network resources.
b) To prevent users from accessing network resources.
c) To detect Intrusions on the network.
d) To detect Security flaws
@puchun a) To prevent unauthorized access to network resources.
@puchun said:
Which of the following wireless technologies provides the most security?
Bluetooth
Wireless Encryption Protocol (WEP)
Wi-Fi Protected Access (WPA)
Microwave communications
microwave communication cant be.. i just know wpa is more secure than wep..so i will go for wpa..