SBI PO Prelims Questions Asked in Exam 29 April 2017. This article covers the Questions asked in SBI PO Prelims 2017 with Answers.
Help:- Share your Exam Questions in Comments Sections
Note:- Keep your Eye on this page, We ll update more Questions
SBI PO 2017 Prelims 29 April
SLOT – I
Quantitative Aptitude Section
13.03^2+?+21.998×4.012=298.998 Ans – 42
- 14 8 9 14.5 30 ? Ans – 76
- 20 29 54 103 184 ? Ans – 305
- 7 8 18 57 ? 1165 Ans – 232
- 5 7 18 47 105 ? Ans – 205
- 77 85 69 101 37 ? Ans – 165
1. x^2-7x+10 = 0
y^2-12y+35 =0 Ans: y≥x
2. (x-12)^2 =0
y^2 =144 Ans: x≥y
3. 2x^2+5x+2 =0
y^2+9y+20 =0 Ans: x>y
4. y^2-3y+2 =0
2x^2-7x+6 =0 Ans: Cannot be Determined
5. 3x^2+4x+1 =0
y^2+5y+6 = 0 Ans: x>y
1. B is 20% efficient than A. B started the work & do it for x days. And then B is replaced A . And A completed the remaining work in x+8 days. Ratio of work done by A & B is 2:3. In how many day A & B working together to complete the whole work?
2. A sum of Rs. 91,00 is borrowed at 20% per annum compounded annually. If the amount is to be paid in two years, the amount will be
(a) Rs. 131,040
(b) Rs. 132,800
(c) Rs. 132,500
(d) Rs. 142,300
Data Interpretation – Based on Bar Graph – 2 Car manufacturing company manufactures car in five different years (2011-2015)
Data Interpretation – Based on Tabular – Visitors of Park (Percentage of Male & Female were given)
1- 8 persons M,N,O,P ,Q,R,S and W have their birthdays on 10th and 27th of four different months i.e March, April, May, June not necessarily in the same order. M has birthday on 10th of a month which is having 31 days. Only one person has birthday before N.Number of persons between M and N is one less than the number of persons between N and W. O and P were held in same month having 30 days , but not in April. R has birthday after S. Only three persons have birthday between N and Q. O was held before P.
2- Ram, Manoj, Shiva, Aman, Rajeev, Vijay, Ravi and Rakesh are eight employees of an enterprise and they will attend a seminar in the four months (May, June, August & September). The seminar held in each month on 8th and 20th date. Only two seminars held in a month. None of the person can attend the seminar after Shiva. Aman does not attend the seminar in the month of 31 days. Rajeev and Ravi attends seminar after Aman on date 20th of different months, while Ram & Manoj attend the seminar before Aman and Manoj attends after Ram in the same month. Rakesh does not attend the seminar in the month in which either Rajeev attends or Shiva attends.
This RC was picked from an article of The Economist
OVER a couple of days in February, hundreds of thousands of point-of-sale printers in restaurants around the world began behaving strangely. Some churned out bizarre pictures of computers and giant robots signed, “with love from the hacker God himself”. Some informed their owners that, “YOUR PRINTER HAS BEEN PWND”. Some told them, “For the love of God, please close this port”. When the hacker God gave an interview to Motherboard, a technology website, he claimed to be a British secondary-school pupil by the name of “Stackoverflowing”. Annoyed by the parlous state of computer security, he had, he claimed, decided to perform a public service by demonstrating just how easy it was to seize control.
Not all hackers are so public-spirited, and 2016 was a bonanza for those who are not. In February of that year cyber-crooks stole $81m directly from the central bank of Bangladesh—and would have got away with more were it not for a crucial typo. In August America’s National Security Agency (NSA) saw its own hacking tools leaked all over the internet by a group calling themselves the Shadow Brokers. (The CIA suffered a similar indignity this March.) In October a piece of software called Mirai was used to flood Dyn, an internet infrastructure company, with so much meaningless traffic that websites such as Twitter and Reddit were made inaccessible to many users. And the hacking of the Democratic National Committee’s e-mail servers and the subsequent leaking of embarrassing communications seems to have been part of an attempt to influence the outcome of the American elections.
Away from matters of great scale and grand strategy, most hacking is either show-off vandalism or simply criminal. It is also increasingly easy. Obscure forums oil the trade in stolen credit-card details, sold in batches of thousands at a time. Data-dealers hawk “exploits”: flaws in code that allow malicious attackers to subvert systems. You can also buy “ransomware”, with which to encrypt photos and documents on victims’ computers before charging them for the key that will unscramble the data. So sophisticated are these facilitating markets that coding skills are now entirely optional. Botnets—flocks of compromised computers created by software like Mirai, which can then be used to flood websites with traffic, knocking them offline until a ransom is paid—can be rented by the hour. Just like a legitimate business, the bot-herders will, for a few dollars extra, provide technical support if anything goes wrong.
The total cost of all this hacking is anyone’s guess (most small attacks, and many big ones, go unreported). But all agree it is likely to rise, because the scope for malice is about to expand remarkably. “We are building a world-sized robot,” says Bruce Schneier, a security analyst, in the shape of the “Internet of Things”. The IoT is a buzz-phrase used to describe the computerisation of everything from cars and electricity meters to children’s toys, medical devices and light bulbs. In 2015 a group of computer-security researchers demonstrated that it was possible to take remote control of certain Jeep cars. When the Mirai malware is used to build a botnet it seeks out devices such as video recorders and webcams; the botnet for fridges is just around the corner.
In the passage given below there are 5 blanks, each followed by a word given in bold. Even blank has four alternative words given in options (A),(B),(C) and (D). You have to tell which word will best suit the respective blank. Mark (E) as your answer if the work given in bold after the blank is your answer i.e “No change required”.
TRAVELLERS sometimes have to show their travel documents five times when (1)_______ [flying] a flight: at check-in, at security, then occasionally at outbound immigration, before another check when boarding. Finally there is passport control at the destination. Each is a potential queue. So regular flyers will be interested in anything that might speed up the process.
One answer could be facial-recognition technology. In the past few weeks, a number of airports have begun to introduce a system that will (2)____ [adapt] faces, match them with electronic passport photos, and allow those passengers it (3)______ [rectifies] to skip lines.
In Tokyo, the government has been (4)_____ [observing] facial-recognition technology in two airports since 2014. It hopes to introduce the system in full in time for the 2020 Tokyo Olympics. In France, Groupe ADP, which operates Charles De Gaulle airport in Paris, began testing similar software in February. Queues at the airport have doubled since new security measures were introduced after terrorist attacks in 2015; this, thinks ADP, might be one way to (5)______ [leisure] the pain. In Canada, meanwhile, plans are in place to start rolling out facial-recognition kiosks this spring. Similar trials have also been announced in Schiphol Airport in Amsterdam.
SLOT – II
Quantitative Aptitude Section
Number Series :
- 6, 7, 16, 51, ?, 1045 Ans – 208
- 16, 25, 50, 99, 180, ? Ans – 301
- 4, 7, 17, 41, 86, ? Ans – 159
- 72, 79, 65, 93, 37, ? Ans – 149
- 12, 7, 8, 13, 27, ? Ans – 68.5
6. The time taken for covering a distance of ‘X’ Km by downstream is equal to ‘X-18’ by covering upstream. Upstream speed is less than 6 km/hr than that of down stream. If the speed of the boat in still water is 15 km/hr. What is the value of ‘X’.
Sd = 15+a = 15
Su = 15-a = 12
x/Sd = x-18/Su
x = 54
A, B, C, D, P, Q, R, S seated straight line facing north.All have different ages 14, 16, 17, 19, 21, 23, 26, 31, but not in same order. B sit extreme on the end of the line. Three people sit between B and 16 yr old. 23 yr old sits second left of Q. Q sits right of 16 year old but not immediate. Two persons sit between 23 year old and D. Three persons sit between 26 yr and C. C sits right of 26 year. Neither B nor D are 26 yr old. The difference of ages of neighbors of D is 5. Oldest is not neighbor of D. D is not oldest. P sits right of 31 year old. More than one person sit between 31 and 19 year old. A sits second right of R.
There are eight persons namely A, B, C, D, E, F,G and H has born in the same month of different year i.e. 1969, 1972, 1978, 1981, 1989, 1997, 2000 and 2005. Their age are considered as on the same month of 2016.G is born in even number year, but not born in the year, which does not divisible by 4.A is 36 years old now.B is 17 year older than F, who is 8 years younger than A. There are eight year gap between age of E and age of D. H is nine year younger than C, but not born in 2005. E was born earlier than G.
M is the sister of Q,Q is the mother of R,R is the mother of C,P is the grand mother of C.then how is R related to P?
Reading Comprehension passage -Source The Economist
ABOUT 1.3 billion people use one or other version of Microsoft’s Windows operating systems, and well over a billion have downloaded Mozilla’s Firefox web browser. Minor variations aside, every copy of these products—like all other mass-market software—has exactly the same bits in it. This makes such software a honeypot for hackers, who can write attack code that will cause precisely the same damage to, say, every copy of Windows 7 it infects. Worse, the bad guys can hone their attacks by practising on their own machines, confident that what they see will be what their victims get.
This computing monoculture—which also extends to the widespread use of particular pieces of hardware, such as microprocessors from Intel and ARM—has long been the bane of technologists. In the face of a near constant onslaught from hackers, antivirus software is frequently several steps behind the foe. Symantec, one of the commercial pioneers of online security, estimates that antivirus software now stops only 45% of attacks. The firm recently declared that this approach was “dead” and a new one was needed.
Michael Franz, a computer scientist at the University of California, Irvine, agrees. And he believes the answer is to learn from nature. Lots of species are composed of individuals which are, the occasional set of identical twins apart, all slightly different genetically from each other. Sexual reproduction ensures this. Indeed, it is probably the reason sex evolved in the first place, for it means that no bacterium or virus can wipe out an entire population, since some are almost certain to be genetically immune to any given pathogen.
Applying the idea of genetic diversity to software is not a new idea. High-security systems, such as the fly-by-wire programs used in aeroplanes, are designed from the outset with code that differs between installations. But this approach is too costly for large-scale use. Some mass-market software companies have instead introduced modest diversity to deter attackers, such as randomly choosing the starting addresses of big blocks of memory, but this is not enough to defeat a determined hacker.
SLOT – III
Quantitative Aptitude Section
5 6 14 25 ? 925
16 9 10 16 33 ?
3 6 17 44 95 ?
5 24 49 98 179 ?
65 74 56 92 20 ?
Ola, which competed with the likes of Uber and Meru in India, connects drivers to prospective riders using its technology platform.
Among the heart-warming stories to has emerged from the Chennai floods is a cleaning drive undertaken by a Muslim organization.
S taller than bothT & Q, but lower than R. R is not tallest T is not Lowest. Q is taller than both U&T. Second highest is 32 cm, T is 13 cm
3.52.89% OF 499-92= X^2
SLOT – IV
A,B and C started a business and invested in the ratio of 3:4:5. After 4 months, A withdraw 1/12th amount of what B and C invested. If the annual income was 9200, then what was share of B?