Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
11 views13 pages

SBI SO - IT - Set 3

The document is a sample IT exam paper containing multiple-choice questions covering various topics in computer science, including normalization, E-R diagrams, data structures, programming concepts, and operating systems. Each question is followed by the correct answer, providing a comprehensive overview of essential IT concepts. The questions range from basic definitions to more complex applications in technology.

Uploaded by

aviku1390
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
11 views13 pages

SBI SO - IT - Set 3

The document is a sample IT exam paper containing multiple-choice questions covering various topics in computer science, including normalization, E-R diagrams, data structures, programming concepts, and operating systems. Each question is followed by the correct answer, providing a comprehensive overview of essential IT concepts. The questions range from basic definitions to more complex applications in technology.

Uploaded by

aviku1390
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 13
IT Sample Paper Q.1: Partial dependency is removed in which normal form of normalization? A. First B. Second ©. Third D. Fourth Answer: B Q.2: Which of the following is true about composite attributes? A. Composite attribute are those attributes which cannot be further divided into other attributes B. Composite attribute are those attributes which are essentially the primary keys of the relation C. Composite attribute are those attributes which can further be divided into other attribute D. All are true about composite attributes Answer: C Q.3: Relationship in E-R diagram is represented by which of the following? A. Rectangle box B. Ellipse C. Diamond shape D. Double Ellipse Answer: C Q.4: Which of the following is used to remove all records from a table, including all spaces allocated for the records are removed? A. Truncate B. Alter C. Revoke D. Delete Answer: A Q.5: A graphic representation of an information system is called? A. Flow chart B. Pictogram C. Data flow diagram D. Histogram Answer: C Q.6: Which of the following statements applies to the bisection method used for finding roots of functions? ‘A. Is faster than the Newton-Raphson method B. Guaranteed to work for all continuous functions C. Converges within a few iterations D. Requires that there be no error in determining the sign of the funetion Answer: D Q.7: The advantages of partial pivoting in the solution of a system of equations are: A. Division by zero can be avoided B. Round-off errors can be minimized C. Ill-conditioned system can be handled efficiently D. All of these Answer: D Q. : In the solution of an LPP using simplex method, the current cost of the objective function must: A. Inerease in the next iteration B. Cannot decrease in the next iteration C. Correspond to one of the comers of the convex region bound by the constraining equations D. Both Band C Answer: D Q.9: Which of the following statement is correct?” A. Addition of a new constant to an LPP can never improve the optimal value B. Addition of a new variable can never decrease the optimal value C. Both A and B D. Addition of a new variable can never improve the optimal value Answer: C Q.10:In the set of natural numbers, the binary operator that is not associative and not commutative is: A. Subtraction B. Division . Both A and B D. Multiplication Answer: C Q.11: A combinational logic circuit that is used when it is desired to send data from two or more source through a single transmission line is known as: A. Multiplexer B. Decoder C. Encoder D. None of these Answer: A Q.12: Data can be changed from special code to temporal code by using: A. Shift registers, B. Counters C. Both A and B D. None of these Answer: A Q.13: A floating point number is said to be normalizes if the most significant digit of the mantissa is: ‘A. Zero B. Non-zero C. Negative D. Positive Answer: B QL ‘or which of the following applications regular expressions can’t be used? A. Designing compiler B. Developing text editors C. Designing computers D. Both A and C Answer: D Q.15: In a modem digital computer, a subtraction is normally not used because: A. Subtractions are very expensive B. The design of a subtraction is very complex C. The adder is geared for doing subtraction also D. Most of the programs do not require subtraction Answer: C Q.16: A type of inheritance that permits a class to have more than one super class and to inherit features from all ancestors- A. Inheritance B. Multiple inheritance C. Subclasses D. Super-classes Answer: B Q.17:Which of the following operators can be overloaded in C++? A. Scope resolution operator B. Size of operator C. Conditional operator D. Arithmetic operator Answer: D Q.18: The conversion character ‘s' for data input means that the data item is: A. An unsigned decimal integer B. A short integer C. A string followed by a whitespace character D. A hexadecimal integer Answer: C Q.19: Which of the following statement is correct? A. In multiple inheritance.the base classes must have only default constructors B. Multiple inheritance can include virtual classes C. Multiple inheritance cannot have virtual functions D. None of these Answer: B Q.20: Which of the following cannot be used as identifiers? A. Letters B. Under-scorer ©. Digits D. Spaces Answer: D Q.21: Which of the following is not used for the purpose of the front and back clipping planes in OpenGL? A. Division by zero B. Avoiding the problems of infinite viewing volume size C. Objects behind the center of projection mapping onto the projection plane D. None of these Answer: B Q.22: Oblique projection with an angle of 45° to the horizontal plane is called as A. Cabinet projection B. Isomettic projection €. Cavalier projection D. None of these Answer: C Q.23: Which statement about beam penetration method for producing color display is/are true? A. It is used with raster-scan monitors B. Its used with random-scan monitors C. By using beam penetration method a wide range of colors can be obtained D. None of these Answer: B Q.24: The best hidden surface removal method used for complex scenes with more than a few thousand surfaces is: A. Depth sorting method B. Depth buffer algorithm C. Octree method D. Both B and C Answer: D Q.25: When several types of output devices are available in a graphics installation, it is convenient to use: A. Bundled attributes B. Unbundled attributes C. Inquiry attributes D. None of these Answer: A Q.26: Which of the following is not included in DML (Data Manipulation Language)? A. INSERT B, UPDATE ©. DELFT D. CRATE Answer: D Q.27: Which of the following statement is not true? A. We use views to restrict data access B. We use views to make complex queries simple C. We use views to allow data independence D. All of these Answer: D Q.28:What name is given to the collection of facts, items of information or data which are related in some way? A. Database B. Directory information C. Information tree D. None of these Answer: A Q.29: A top-to-bottom relationship among the items in a database is established by a A. Hierarchical schema B. Network schema . Relational schema D. All of these Answer: A Q.30: What is the abbreviation used for a software package that permits the users to create, retrieve and maintain records in a database? A. DASD B. FMS . EMMS D. DBMS. Answer: D Q.31: In direct file organization, the key value is mapped directly to the storage location, The usual method of direct mapping is by performing some arithmetic manipulation of the key value. This process is known as: A. Bucket addressing B. Hashing C. Clashing D. Direct mapping Answer: B Q.32: Representing the syntax by a grammar advantageous becaus. A. Itis accurate B. Intermediate code can be generated easily and efficiently C. Itis concise D. All of these Answer: D Q.33: The advantage of panic mode of error recovery is that- A. Itis simple to implement B. It never gets into an infinite loop . Both A and B D. None of these Answer: C Q.34: Which of the following structure is FIFO (First IN First Out)? A. Stack B. Queue C. Array D. Graph Answer: B Q.35: A list in which all additions to be the list are made at one end and all deletions from the list are made at the other end is called- A. Queue B. Rooted list C. Stack D. Allof these Answer: A Q.36: The geostationary satellite used for communication system- A. Rotates with the earth B. Remains stationery relative to the earth . Is positioned over equator D. All of these Answer: D Q.37: If you get both local and remote echoes, every character you type will appear on the sereen- A. Once B, Three times C. Twice Dz Never Answer: C Q.38:What is the drawback of infrared and millimeter waves? A. They are directional B. They cannot pass through solid objects C. License is needed D. Can be used outdoor Answer: B Q.39:Iridium and Dysprosium projects, proposed by Motorola are related to: A. Geosynchronous satellite B. Wavelength C. Low orbit satellite D. ISDN Answer: C Q.40: It is primarily used for mapping host names and e-mail destinations to IP addresses but in also be used for other purposes. Here “It” refers to the- A. Transfer Control Protocol (TCP) B. Domain Name System (DNS) C. Secure Hash Algorithm (SHA) D. Simple Network Management Protocol (SNMP) Answer: B Q.41: Which of the following checks cannot be carried out on the input data to a system? A. Syntax check B. Consistency check C. Range check D. All of these Answer: A Q.42: A sequence of instructions in a computer language to get the desired result, is known as: A. Algorithm B. Decision table . Program D. None of these Answer: C Q.43: The process of macro-expansion is completely segregated from the process of assembly program. The translator which performs macro-expansions is called- A. Macro Interpreter B. Macro Pre-Processor C. Macro Table D. None of these Answer: B Q.4: If the non-terminal on the left-hand side is repeated as the first symbol of the right-hand side. The phenomenon is called- A. Left parsing B. Left factoring C. Lefimost derivation D. Left recursion Answer: D Q.43: Which of the following is not a multi-programming operating system? A. Multi-tasking operating system B. Network operating system C. Time sharing system D. Multi-user operating system Answer: B Q.46: Choose the right sequence of virus stages- A. Triggering, Damage, Dormancy, Propagation B. Damage, Triggering, Dormancy, Propagation, C. Dormancy, Propagation, Triggering, Damage D. None of these Answer: C Q.47: In UNIX systems the user can change the access rights of the file to different users by using: A. PID B. Chmod C. Head Dz Tail Answer: B Q.48: In a Linux system, when a new process is cloned the two processes share the same- A. Virtual memory B. Process identifier C. Both A andB D. None of these Answer: A. Q.49: Which command is used to extract specific columns from the file? A. Cat B. Grep c. Cut D. Paste Answer: C Q.50: Which of the following is a task region of spiral model? A. Planning B. Risk analysis, C. Engineering D. All of these Answer: D Q.51: Which of the following is not a measure of software quality? A. Correctness B. Accessibility C. Integrity D. Maintainability Answer: B Q.52: Which of the following are a software metrics? A. Size-oriented B. Function-oriented C. Extended funetion point D. All of the these Answer: D Q.53: Each time a defect gets detected and fixed, the reliability of a software product- A. Increases B. Decreases C. Remains constant D. None of these Answer: A Q.54: All of the tools are used for process descriptions except A. Structured English B. Decision tables C. Pseudocode D. Data dictionaries Answer: D Q. A. Float B. String C. Int D. Wehar_t : Which one of the following is not a fundamental data type in C++? Answer: A Q.56: Which of the following is a technique used to speed up communication with slow devices? A. Fragmentation B. Caching C. Segmentation D. Cleaning Answer: B Q.57: Which of the following are the properties of entities? A. Groups B. Table C. Attributes D. Switeh Answer: C Q.58: Which of the following device assigns IP address to devices connected to a network that uses TCP/IP? A. DHCP Server B. NIC C. Gateway D. Hub Answer: A Qs : What is Response time in operating system? A. The total time taken from the submission time till the completion time B. The total time taken from the submission time till the first response is produced . The total time taken from submission time till the response is output D. Total completion time Answer: B Q.60: Which of the following device takes data sent from one network device and forwards it to the destination node based on the MAC address? A. Hub B. Gateway C. Modem D. Switch Answer: D

You might also like