PYQS
Slashbyte
IBPS SO MAINS
2024 -25
Previous Year Questions
Useful for:
IBPS SO IT, SBI SO IT, IPPB SO, RRB SO IT and other IT
related govt. and pvt. exams.
@slashbytessc
Slashbyte | IT-Bank-SSC |
Prepared By: Visit Our Website
Piyush Sir (IT Officer) [Link]
🌟 About These Notes:
“Knowledge shared is knowledge multiplied.”
These notes are a proud creation of the SlashByte team, built with care,
clarity, and a lot of coffee☕to help you learn faster and smarter. Every
word, diagram, and structure is crafted to simplify complex topics and
empower learners.
🚀 Access free IT Notes:
You can download free notes on our website [Link]. These free
notes are short and suitable for revision only.
❗ Copyright & Usage Policy:
🔒 All Rights Reserved: This material is exclusively owned by SlashByte.
Do not copy, reproduce, or redistribute without written permission.
Sharing for commercial use is strictly prohibited.
💙
Respect the effort behind free learning. Let’s keep it fair.
🔗 Connect with Us
YouTube: Free tutorials, tips & concept walkthroughs
Telegram: Exclusive PDFs, updates & doubt support
📩
Email: Queries or collab? → slashbyte1204@[Link]
Slashbyte | IT-Bank-SSC | @slashbytessc
🤝 Thank You!
You're now part of the SlashByte Learning Community — where curiosity
meets clarity. Keep learning. Keep growing.🚀
Made with ❤️ by SlashByte
I BPS SO IT MAINS Qs Set Maximum marks: 60
Year: 2024-25 (MBT) Time: 45 min
. The relation scheme Student Performance (name, courseNo, rollNo, grade) has the
1
following functional dependencies:
name, courseNo → grade
rollNo, courseNo → grade
name → rollNo
rollNo → name
The highest normal form of this relation scheme is
A) 1NF
B) 2NF
C) 3NF
D) BCNF
E) 4NF
.WhichSQLoperationcombinestablesbasedoncommonattributesandremovesduplicate
2
column values?
a) Inner Join
b) Outer Join
c) Left Join
d) Right Join
e) Natural Join
. Which sorting algorithm has best case, average case and worst case timecomplexityO(n
3
log n)?
a) Selection Sort
b) Insertion Sort
c) Bubble Sort
d) Merge Sort
e) Counting Sort
4. Which term refers to the process of creating malicious payloads in ethical hacking?
A) Reconnaissance
B) Weaponization
C) Exploitation
D) Post-Exploitation
5. Which FTP mode supports data compression during file transfer?
A. Active mode
B. Passive mode
C. Compression mode
D. Binary mode
. Which OOP concept ensures that a child class object ceases to exist when the parent is
6
deleted?
a) Inheritance
b) Composition
c) Encapsulation
d) Abstraction
e) Aggregation
7. Which attack involves sending malicious requests from a trusted user’s browser?
A) CSRF
B) MITM
C) DDoS
D) Phishing
. A customer transfers ₹500 from Account A to Account B, the amount is deducted from
8
Account A but not received by Account B for system crash at themiddleofthetransaction.
Which DBMS transaction property violates ?
a) Atomicity
b) Consistency
c) Isolation
d) Durability
e) Integrity
9. What will be the output of the following Python code?
names = ["Alice", "Bob", "John", "Eve"]
result = names[2][:]
print(result)
) John
a
b) John Eve
c) Alice Bob
d) Bob John Eve
e) Syntax Error
0. In Python, which operator is used to check if a key exists in a dictionary?
1
a) ==
b) in
c) has_key
d) exists
e) contains
1.Whichsortingalgorithmfindstheminimumelementandplacesitinthecorrectposition
1
in each iteration?
a) Bubble Sort
b) Insertion Sort
c) Merge Sort
d) Selection Sort
e) Quick Sort
2. What does the existential quantifier (∃) signify in mathematical logic?
1
a) For all elements
b) At least one element satisfies the condition
c) Exactly one element satisfies the condition
d) No element satisfies the condition
e) Some elements may satisfy the condition
3. In Python, what is the difference between `open("[Link]", "w")` and `open("[Link]",
1
"a")`?
A) "w" appends data; "a" overwrites data
B) "w" overwrites data; "a" appends data
C) Both append data
D) Both overwrite data
4. Which firewall type dynamically filters packets based on state and connection context?
1
a) Proxy Firewall
b) Packet Filtering Firewall
c) Stateful Packet Inspection Firewall
d) Dynamic Packet Filtering Firewall
e) Next-Generation Firewall
15. Which type of firewall is considered a 3rd generation firewall?
A) Packet Filtering Firewall
B) Stateful Inspection Firewall
C) Next-Generation Firewall (NGFW)
D) Proxy Firewall
6.WhichofthefollowinghelpssecureIPaddressesbymappingprivateIPstopublicIPsfor
1
internet access?
a) DHCP
b) NAT
c) ARP
d) DNS
e) ICMP
17. Which protocol maps IP addresses to MAC addresses?
A) DNS
B) DHCP
C) ARP
D) ICMP
E) RARP
18. Which symbol accesses variable values in Unix shell scripting?
A) @
B) $
C) #
D) &
9. Which of the following statements correctly differentiates IMAP from POP3?
1
a) IMAP downloads emails to the local device, whereas POP3 keeps emails on the server.
b)IMAPallowsaccesstoemailsfrommultipledevices,whilePOP3primarilysupportssingle-device
access.
c) POP3 synchronizes emails across all devices, but IMAP does not.
d) POP3 allows users to modify emails on the server, while IMAP does not.
e) IMAP does not require an internet connection to access emails, whereas POP3 does.
0. What happens when "CASCADE ON DELETE" is set in SQL?
2
a) Only parent table rows are deleted
b) Only child table rows are deleted
c) Both parent and child rows are deleted
d) Constraint violation occurs
e) Parent rows get archived
1. Which statement is correct?
2
a) DROP removes structure; TRUNCATE resets but retains structure.
b) DELETE is DDL; TRUNCATE and DROP are DML.
c) TRUNCATE logs row deletions; DELETE does not.
d) DROP preserves constraints; TRUNCATE removes them.
e) DELETE is irreversible, unlike DROP and TRUNCATE.
2. What is the hexadecimal equivalent of the binary number 10111010?
2
a) BA
b) 186
c) 2B
d) B1
e) 1A
3. What does an inorder traversal of a BST 5,4,7,3,9,1,2,6?
2
a) 2,1,4,6,9,3,5,7
b) 1,2,3,4,5,6,7,9
c) 9,7,6,5,4,3,2,1
d) 1,2,3,5,6,7,9,4
e) 5,6,7,9,4,3,2,1
4. Which security measure cannot be enforced by a hardware firewall?
2
a) IP filtering
b) Port blocking
c) Network intrusion detection
d) Theft prevention
e) Packet filtering
5. In SQL, what happens if an index is not found?
2
a) Returns NULL
b) Returns -1
c) Raises an error
d) Returns first row
e) Skips the query
6. Which attack involves setting up a rogue WiFi access point to capture user data?
2
a) Man-in-the-Middle
b) Evil Twin Attack
c) DDoS Attack
d) Phishing Attack
e) DNS Spoofing
7. Which command is used to define a Bash script?
2
a) #!/usr/bin/python
b) #!/usr/bin/bash
c) #!/bin/bash
d) #!/bin/sh
e) None of the above
8. Which attack specifically targets HTTP-based services?
2
a) XSS
b) CSRF
c) SQL Injection
d) HTTP Attack
e) DNS Poisoning
29. What does the `LIKE` operator with `%` do in SQL?
A) Matches any single character
B) Matches any sequence of characters
C) Matches only numeric values
D) Matches only uppercase letters
0. What is the time complexity of dynamic programming solutions in most cases?
3
a) O(n)
b) O(log n)
c) O(n²)
d) O(2ⁿ)
e) O(n log n)
1. Which SQL operation ignores primary key constraints while inserting intoaforeignkey
3
table?
a) INSERT IGNORE
b) INSERT FORCE
c) INSERT SKIP
d) UPDATE FORCE
e) DROP CASCADE
32. What will be the output of the following Python code?
ef func(a, b):
d
return a + (b >> 1) - (b % 3)
= func(5, 6)
x
y = sum(map(int, str(32 // 4)))
print(x + y)
) 4
A
B) 8
C) 16
D) Error
E) 2
33. Which schema allows multiple fact tables to share dimension tables?
A) Star Schema
B) Snowflake Schema
C) Fact Constellation
D) Flat Schema
34. What is the output of ` ` in Python?
print([1,2,3,4][1:3])
A) [2,3]
B) [1,2]
C) [2,3,4]
D) [3,4]
5. Which command-line argument module is used in Python to handle command-line inputs?
3
a) argparse
b) getopt
c) [Link]
d) os
e) input()
36. What is the purpose of the `setw` manipulator in C++?
A) Sets the width of the output field
B) Sets the precision of floating-point numbers
C) Sets the alignment of text
D) Sets the base for number formatting
7. Which software testing method ensures that the final product meets business
3
requirements before release?
a) Unit Testing
b) Integration Testing
c) System Testing
d) Acceptance Testing
e) Stress Testing
8. Which file system does not exist?
3
a) FAT16
b) FAT32
c) FAT84
d) NTFS
e) exFAT
9. Which SQL clause groups similar types of values?
3
a) GROUP BY
b) ORDER BY
c) HAVING
d) WHERE
e) PARTITION BY
0.WhichofthefollowingTupleRelationalCalculus(TRC)queriescorrectlyselectsthenames
4
of employees whose salary is above 5000?
a) { t | ∃ e ∈ Employee ([Link] = [Link] ∧ [Link] > 5000) }
b) { t | ∀ e ∈ Employee ([Link] = [Link] ∧ [Link] > 5000) }
c) { t | e ∈ Employee → ([Link] = [Link] ∧ [Link] > 5000) }
d) { [Link] | t ∈ Employee ∧ [Link] ≥ 5000 }
e) { [Link] | e ∈ Employee ∧ [Link] < 5000 }
41. In Python, where is a global variable accessible?
A) Only inside functions
B) Only in the module where it is defined
C) Anywhere in the program
D) Only in loops
2. Which SQL keyword is used to define a trigger that executes for multiple events (e.g.,
4
INSERT and UPDATE)?
A) `OR`
B) `WHEN`
C) `AFTER`
D) `FOR EACH ROW`
3. Which UNIX command lists files sorted by modification time?
4
a) ls -a
b) ls -r
c) ls -lt
d) ls -l
44. Which loop syntax is correct in bash?
A) `for i in {1..5}`
B) `for (i=1; i<=5; i++)`
C) `loop i from 1 to 5`
D)`for each i in 1 2 3`
5. Which security measure restricts input to predefined values?
4
a) Input filtering
b) Blacklisting
c) Whitelisting
d) Obfuscation
6. Which operations are valid on C++ pointers?
4
a) Addition
b) Subtraction
c) Multiplication
d) Both (a) and (b)
e) All of the above
47. Which command is used to repair the Master Boot Record (MBR) in Windows?
A)`bootrec /fixmbr`
B) `bootrec /fixboot`
C) `bootrec /rebuildbcd`
D) `bootrec /scanos`
8. Which Python mode allows file writing while preserving previous content?
4
a) 'w'
b) 'a'
c) 'r'
d) 'x'
e) 'wb'
9. Which Python module is used for handling regular expressions?
4
a) regex
b) os
c) sys
d) re
e) match
0. Which formula calculates transmission delay in networking?
5
a) Bandwidth × Time
b) Distance / Speed
c) Data Size / Bandwidth
d) Latency × Speed
e) Hop Count × RTT
1. Which SQL query finds the nth highest salary?
5
a) SELECT salary FROM employees ORDER BY salary DESC LIMIT n;
b) SELECT salary FROM employees ORDER BY salary DESC LIMIT n-1,1;
c) SELECT MAX(salary) FROM employees;
d) SELECT salary FROM employees WHERE salary=n;
e) SELECT salary FROM employees ORDER BY salary ASC LIMIT n;
2. Which command is used to find the infix to postfix conversion of (A+B)*(C-D)?
5
a) AB+CD-*
b) A+BC-D
c) ABC+D-
d) A+BC-D
e) AB+*CD-
3. Which technique stores overlapping subproblems in dynamic programming?
5
a) Memoization
b) Recursion
c) Backtracking
d) Heuristics
e) Tabulation
4. Which hashing formula is used to calculate the load factor?
5
a) (No. of elements) / (No. of buckets)
b) (No. of buckets) / (No. of elements)
c) (Hash value) / (Table size)
d) (Table size) / (Hash value)
e) (Data size) / (No. of keys)
5. Which SQL command is used to add a foreign key constraint?
5
a) ALTER TABLE ADD FOREIGN KEY
b) ADD CONSTRAINT FOREIGN KEY
c) CREATE FOREIGN KEY
d) FOREIGN KEY CONSTRAINT
e) None of the above
56. Which OLAP operation reduces dimensionality?
A) Roll-up
B) Drill-down
C) Slice
D) Dice
7.Whichdatastructureisusedtostoresequencesofcharactersinalmostallprogramming
5
languages?
A) array
B) list
C) string
D) Queue
E) stack
8. Which firewall can be configured to block specific HTTP and Telnet requests?
5
a) Application Firewall
b) Circuit-Level Gateway
c) Stateful Firewall
d) Packet Filtering Firewall
e) NGFW
9. Which mode allows a network switch to capture and analyze all traffic?
5
a) Half-duplex mode
b) Full-duplex mode
c) Promiscuous mode
d) Secure mode
e) Broadcast mode
0. Which OOP concept allows hiding implementation details and only exposing relevant
6
features?
a) Inheritance
b) Polymorphism
c) Encapsulation
d) Abstraction
e) Aggregation