0 ratings 0% found this document useful (0 votes) 11 views 13 pages SBI SO - IT - Set 3
The document is a sample IT exam paper containing multiple-choice questions covering various topics in computer science, including normalization, E-R diagrams, data structures, programming concepts, and operating systems. Each question is followed by the correct answer, providing a comprehensive overview of essential IT concepts. The questions range from basic definitions to more complex applications in technology.
AI-enhanced title and description
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here .
Available Formats
Download as PDF or read online on Scribd
Go to previous items Go to next items
Save SBI SO_IT_Set 3 For Later IT Sample Paper
Q.1: Partial dependency is removed in which normal form of normalization?
A. First
B. Second
©. Third
D. Fourth
Answer: B
Q.2: Which of the following is true about composite attributes?
A. Composite attribute are those attributes which cannot be further divided into other attributes
B. Composite attribute are those attributes which are essentially the primary keys of the relation
C. Composite attribute are those attributes which can further be divided into other attribute
D. All are true about composite attributes
Answer: C
Q.3: Relationship in E-R diagram is represented by which of the following?
A. Rectangle box
B. Ellipse
C. Diamond shape
D. Double Ellipse
Answer: C
Q.4: Which of the following is used to remove all records from a table, including all spaces allocated for the
records are removed?
A. Truncate
B. Alter
C. Revoke
D. Delete
Answer: A
Q.5: A graphic representation of an information system is called?
A. Flow chart
B. Pictogram
C. Data flow diagram
D. Histogram
Answer: C
Q.6: Which of the following statements applies to the bisection method used for finding roots of functions?
‘A. Is faster than the Newton-Raphson methodB. Guaranteed to work for all continuous functions
C. Converges within a few iterations
D. Requires that there be no error in determining the sign of the funetion
Answer: D
Q.7: The advantages of partial pivoting in the solution of a system of equations are:
A. Division by zero can be avoided
B. Round-off errors can be minimized
C. Ill-conditioned system can be handled efficiently
D. All of these
Answer: D
Q.
: In the solution of an LPP using simplex method, the current cost of the objective function must:
A. Inerease in the next iteration
B. Cannot decrease in the next iteration
C. Correspond to one of the comers of the convex region bound by the constraining equations
D. Both Band C
Answer: D
Q.9: Which of the following statement is correct?”
A. Addition of a new constant to an LPP can never improve the optimal value
B. Addition of a new variable can never decrease the optimal value
C. Both A and B
D. Addition of a new variable can never improve the optimal value
Answer: C
Q.10:In the set of natural numbers, the binary operator that is not associative and not commutative is:
A. Subtraction
B. Division
. Both A and B
D. Multiplication
Answer: C
Q.11: A combinational logic circuit that is used when it is desired to send data from two or more source through
a single transmission line is known as:
A. Multiplexer
B. Decoder
C. Encoder
D. None of these
Answer: AQ.12: Data can be changed from special code to temporal code by using:
A. Shift registers,
B. Counters
C. Both A and B
D. None of these
Answer: A
Q.13: A floating point number is said to be normalizes if the most significant digit of the mantissa is:
‘A. Zero
B. Non-zero
C. Negative
D. Positive
Answer: B
QL
‘or which of the following applications regular expressions can’t be used?
A. Designing compiler
B. Developing text editors
C. Designing computers
D. Both A and C
Answer: D
Q.15: In a modem digital computer, a subtraction is normally not used because:
A. Subtractions are very expensive
B. The design of a subtraction is very complex
C. The adder is geared for doing subtraction also
D. Most of the programs do not require subtraction
Answer: C
Q.16: A type of inheritance that permits a class to have more than one super class and to inherit features from
all ancestors-
A. Inheritance
B. Multiple inheritance
C. Subclasses
D. Super-classes
Answer: B
Q.17:Which of the following operators can be overloaded in C++?
A. Scope resolution operator
B. Size of operator
C. Conditional operatorD. Arithmetic operator
Answer: D
Q.18: The conversion character ‘s' for data input means that the data item is:
A. An unsigned decimal integer
B. A short integer
C. A string followed by a whitespace character
D. A hexadecimal integer
Answer: C
Q.19: Which of the following statement is correct?
A. In multiple inheritance.the base classes must have only default constructors
B. Multiple inheritance can include virtual classes
C. Multiple inheritance cannot have virtual functions
D. None of these
Answer: B
Q.20: Which of the following cannot be used as identifiers?
A. Letters
B. Under-scorer
©. Digits
D. Spaces
Answer: D
Q.21: Which of the following is not used for the purpose of the front and back clipping planes in OpenGL?
A. Division by zero
B. Avoiding the problems of infinite viewing volume size
C. Objects behind the center of projection mapping onto the projection plane
D. None of these
Answer: B
Q.22: Oblique projection with an angle of 45° to the horizontal plane is called as
A. Cabinet projection
B. Isomettic projection
€. Cavalier projection
D. None of these
Answer: C
Q.23: Which statement about beam penetration method for producing color display is/are true?
A. It is used with raster-scan monitorsB. Its used with random-scan monitors
C. By using beam penetration method a wide range of colors can be obtained
D. None of these
Answer: B
Q.24: The best hidden surface removal method used for complex scenes with more than a few thousand
surfaces is:
A. Depth sorting method
B. Depth buffer algorithm
C. Octree method
D. Both B and C
Answer: D
Q.25: When several types of output devices are available in a graphics installation, it is convenient to use:
A. Bundled attributes
B. Unbundled attributes
C. Inquiry attributes
D. None of these
Answer: A
Q.26: Which of the following is not included in DML (Data Manipulation Language)?
A. INSERT
B, UPDATE
©. DELFT
D. CRATE
Answer: D
Q.27: Which of the following statement is not true?
A. We use views to restrict data access
B. We use views to make complex queries simple
C. We use views to allow data independence
D. All of these
Answer: D
Q.28:What name is given to the collection of facts, items of information or data which are related in some way?
A. Database
B. Directory information
C. Information tree
D. None of these
Answer: AQ.29: A top-to-bottom relationship among the items in a database is established by a
A. Hierarchical schema
B. Network schema
. Relational schema
D. All of these
Answer: A
Q.30: What is the abbreviation used for a software package that permits the users to create, retrieve and
maintain records in a database?
A. DASD
B. FMS
. EMMS
D. DBMS.
Answer: D
Q.31: In direct file organization, the key value is mapped directly to the storage location, The usual method of
direct mapping is by performing some arithmetic manipulation of the key value. This process is known as:
A. Bucket addressing
B. Hashing
C. Clashing
D. Direct mapping
Answer: B
Q.32: Representing the syntax by a grammar advantageous becaus.
A. Itis accurate
B. Intermediate code can be generated easily and efficiently
C. Itis concise
D. All of these
Answer: D
Q.33: The advantage of panic mode of error recovery is that-
A. Itis simple to implement
B. It never gets into an infinite loop
. Both A and B
D. None of these
Answer: C
Q.34: Which of the following structure is FIFO (First IN First Out)?
A. Stack
B. QueueC. Array
D. Graph
Answer: B
Q.35: A list in which all additions to be the list are made at one end and all deletions from the list are made at
the other end is called-
A. Queue
B. Rooted list
C. Stack
D. Allof these
Answer: A
Q.36: The geostationary satellite used for communication system-
A. Rotates with the earth
B. Remains stationery relative to the earth
. Is positioned over equator
D. All of these
Answer: D
Q.37: If you get both local and remote echoes, every character you type will appear on the sereen-
A. Once
B, Three times
C. Twice
Dz Never
Answer: C
Q.38:What is the drawback of infrared and millimeter waves?
A. They are directional
B. They cannot pass through solid objects
C. License is needed
D. Can be used outdoor
Answer: B
Q.39:Iridium and Dysprosium projects, proposed by Motorola are related to:
A. Geosynchronous satellite
B. Wavelength
C. Low orbit satellite
D. ISDN
Answer: CQ.40: It is primarily used for mapping host names and e-mail destinations to IP addresses but in also be used for
other purposes. Here “It” refers to the-
A. Transfer Control Protocol (TCP)
B. Domain Name System (DNS)
C. Secure Hash Algorithm (SHA)
D. Simple Network Management Protocol (SNMP)
Answer: B
Q.41: Which of the following checks cannot be carried out on the input data to a system?
A. Syntax check
B. Consistency check
C. Range check
D. All of these
Answer: A
Q.42: A sequence of instructions in a computer language to get the desired result, is known as:
A. Algorithm
B. Decision table
. Program
D. None of these
Answer: C
Q.43: The process of macro-expansion is completely segregated from the process of assembly program. The
translator which performs macro-expansions is called-
A. Macro Interpreter
B. Macro Pre-Processor
C. Macro Table
D. None of these
Answer: B
Q.4: If the non-terminal on the left-hand side is repeated as the first symbol of the right-hand side. The
phenomenon is called-
A. Left parsing
B. Left factoring
C. Lefimost derivation
D. Left recursion
Answer: D
Q.43: Which of the following is not a multi-programming operating system?
A. Multi-tasking operating systemB. Network operating system
C. Time sharing system
D. Multi-user operating system
Answer: B
Q.46: Choose the right sequence of virus stages-
A. Triggering, Damage, Dormancy, Propagation
B. Damage, Triggering, Dormancy, Propagation,
C. Dormancy, Propagation, Triggering, Damage
D. None of these
Answer: C
Q.47: In UNIX systems the user can change the access rights of the file to different users by using:
A. PID
B. Chmod
C. Head
Dz Tail
Answer: B
Q.48: In a Linux system, when a new process is cloned the two processes share the same-
A. Virtual memory
B. Process identifier
C. Both A andB
D. None of these
Answer: A.
Q.49: Which command is used to extract specific columns from the file?
A. Cat
B. Grep
c. Cut
D. Paste
Answer: C
Q.50: Which of the following is a task region of spiral model?
A. Planning
B. Risk analysis,
C. Engineering
D. All of these
Answer: DQ.51: Which of the following is not a measure of software quality?
A. Correctness
B. Accessibility
C. Integrity
D. Maintainability
Answer: B
Q.52: Which of the following are a software metrics?
A. Size-oriented
B. Function-oriented
C. Extended funetion point
D. All of the these
Answer: D
Q.53: Each time a defect gets detected and fixed, the reliability of a software product-
A. Increases
B. Decreases
C. Remains constant
D. None of these
Answer: A
Q.54: All of the tools are used for process descriptions except
A. Structured English
B. Decision tables
C. Pseudocode
D. Data dictionaries
Answer: D
Q.
A. Float
B. String
C. Int
D. Wehar_t
: Which one of the following is not a fundamental data type in C++?
Answer: A
Q.56: Which of the following is a technique used to speed up communication with slow devices?
A. Fragmentation
B. Caching
C. SegmentationD. Cleaning
Answer: B
Q.57: Which of the following are the properties of entities?
A. Groups
B. Table
C. Attributes
D. Switeh
Answer: C
Q.58: Which of the following device assigns IP address to devices connected to a network that uses TCP/IP?
A. DHCP Server
B. NIC
C. Gateway
D. Hub
Answer: A
Qs
: What is Response time in operating system?
A. The total time taken from the submission time till the completion time
B. The total time taken from the submission time till the first response is produced
. The total time taken from submission time till the response is output
D. Total completion time
Answer: B
Q.60: Which of the following device takes data sent from one network device and forwards it to the destination
node based on the MAC address?
A. Hub
B. Gateway
C. Modem
D. Switch
Answer: D