SB-IT Set A
SB-IT Set A
©ê◊ËŒflÊ⁄U ∑§Ê ŸÊ◊/Name of Candidate : ________________________ ©ê◊ËŒflÊ⁄U ∑§ „SÃÊˇÊ⁄U/Signature of Candidate : ___________________
PART - A 5. 3, 5, 12, 39, 154, 772, 4634 :
(A) 5 (B) 3
GENERIC
(C) 39 (D) 154
10. Which of the following is the correct group 15. Who among the following is good at four
of ladies ? games ?
(A) Q (B) P
(A) P, Q and R (B) Q, R and S
(C) O (D) M
(C) P, Q and S (D) P, R and S
11. Who is the football player ? 16. Who is good at the largest number of
games ?
(A) Q (B) R
(A) Q (B) P
(C) S (D) T (C) O (D) N
(B) 5/9
19. If the flats of T and P are interchanged, (C) 3/5
who’s flat will be next to that of U ?
(A) Q (B) T (D) None of the above
(C) P (D) R
29. ½ log10 25−2 log10 3+log10 18 equals : *App - Appeared *Pass - Passed
(A) 18
33. In which of the following years was the
(B) 1
percentage passed to appeared candidates
(C) log10 3 from semi-urban area the least ?
(A) 2015 (B) 2016
(D) None of these (C) 2017 (D) 2018
44. Which TCP/IP protocol is used for file 49. The maximum number of binary trees that
transfer with minimal capability and can be formed with three unlabeled nodes
minimal overhead ? is :
(A) RARP (B) FTP
(A) 1 (B) 5
(C) TFTP (D) TELNET
(C) 4 (D) 3
45. Choose correct statement for code segment
int multiply (int a, int b=5),
(A) variable a and b are of int types and 50. Boundary value analysis is based on which
the initial value of a and b are 5 testing :
(B) variable b is of int type and will (A) White Box Testing
always have value 5
(C) variable b is of global scope and will (B) Black Box Testing
have value 5 (C) White Box & Black Box Testing
(D) variable b will have value 5 if not
specified when calling a function in (D) None of the options
further program
46. What is the minimum no. of wires required 51. Cardinality of relationship advisor to each
for sending data over a serial entity sets instructor and student will be :
communication link ? (A) One to many (B) One to one
(A) 1 (B) 3
(C) 2 (D) 4 (C) Many to many (D) Many to one
(C) 6900 (D) 12890 (D) (ii) (iv) (v) (i) (ii)
(C) Repeater (D) Gateway 77. Cache memory works on the principle of :
(A) Locality of data
(B) Locality of memory
74. Indicate which representation is the logical
(C) Locality of reference
design of the database, and which is a
snapshot of the data in the database at a (D) Locality of reference & memory
given instant in time.
(A) Instance, Range 78. Merge Sort divides the input list in :
(A) N equal parts
(B) Relation, Schema
(B) Three equal parts
(C) Relation, Domain
(C) Two parts which may not be equal
(D) Schema, Instance (D) N parts which may not be equal
d++;
103. The determinant of matrix
if (n>1) count (n-1);
0 p− q p− r
printf(" %d",d); } q− p 0 q− r is __________.
void main ( ) { count(3); } r − p r− q 0
(A) 3 1 2 2 1 3 4 4 4
(A) 0
(B) 3 1 2 1 1 12 2 2
(B) (p−q)(q−r)(r−p)
(C) 3 1 2 2 1 3 4 (C) pqr
(D) 3 1 2 1 1 1 2 (D) 3pqr
π (B) java.sql.Time
2π a
(A)
∫0 ∫ ∫ 2
0 0
r2 sinθ drdθd φ
(C) java.io.Time
2π π a
(D) java.io.TimeStamp
∫0 ∫0 ∫0 r
2
(B) sinθ drdθ d φ
106. Which is indicating use of virtual functions ? (C) <h5> (D) <h6>
(A) Overloading
(B) Overriding 111. Consider a program with following data :
(C) Static binding
Unique operator=10, unique operands
(D) Dynamic binding =15
113. Build & Fix Model is suitable for 118. The number of un-labeled non-isomorphic
programming exercises of how many LOC graphs with four vertices is :
(Line of Code) ?
(A) 12 (B) 11
(A) 100−200 (B) 200−400 (C) 10 (D) 9
(C) 400−1000 (D) above 1000
119. The logic expression for the output of
following circuit is :
114. Consider the following two statements :
(I) A Hash function, which is used for
computing digital signatures, is an
injective function
(II) An encryption technique such as
DES performs a permutation on the (A) AC + BC + CD
elements of its input alphabet
(B) AC + BC +CD
(A) Both are false
(C) ABC + CD
(B) (I) is true (II) is false
(C) (II) is true (I) is false (D) AB + BC + CD