Memory Based Questions Asked In SBI PO Pre 2017
Number Series –
1st Slot –
- 14 8 9 14.5 30 ?
- 20 29 54 103 184 ?
- 7 8 18 57 ? 1165
- 5 7 18 47 103 ?
- 77 85 69 101 37 ?
2nd Slot –
- 6 7 16 51 ? 1045
- 16 25 50 99 180 ?
- 4 7 17 41 86 ?
- 72 79 65 93 37 ?
- 12 7 8 13 27 ?
Approximation/ Simplification –
Quadratic Equation –
- Russia has deployed attack and transport helicopters to reinforce its military base in Armenia, RIA news agency quoted Russian Defence Ministry is saying on Tuesday.
- After a dismal 2015 of mass refugee flows, war and catastrophe, leading U.N. agencies and their partners announced last week that they are seeking over $20 billion in funding next year.
- Ola, which competed with the likes of Uber and Meru in India, connects drivers to prospective riders using its technology platform.
- Among the heart-warming stories to has emerged from the Chennai floods is a cleaning drive undertaken by a Muslim organization.
- The voice had to be listened to, not only in account of its form but for the matter which it delivered.
TRAVELLERS sometimes have to show their travel documents five times when (1)_______ [flying] a flight: at check-in, at security, then occasionally at outbound immigration, before another check when boarding. Finally there is passport control at the destination. Each is a potential queue. So regular flyers will be interested in anything that might speed up the process.
One answer could be facial-recognition technology. In the past few weeks, a number of airports have begun to introduce a system that will (2)____ [adapt] faces, match them with electronic passport photos, and allow those passengers it (3)______ [rectifies] to skip lines.
In Tokyo, the government has been (4)_____ [observing] facial-
Not all hackers are so public-spirited, and 2016 was a bonanza for those who are not. In February of that year cyber-crooks stole $81m directly from the central bank of Bangladesh—and would have got away with more were it not for a crucial typo. In August America’s National Security Agency (NSA) saw its own hacking tools leaked all over the internet by a group calling themselves the Shadow Brokers. (The CIA suffered a similar indignity this March.) In October a piece of software called Mirai was used to flood Dyn, an internet infrastructure company, with so much meaningless traffic that websites such as Twitter and Reddit were made inaccessible to many users. And the hacking of the Democratic National Committee’s e-mail servers and the subsequent leaking of embarrassing communications seems to have been part of an attempt to influence the outcOMES.
Away from matters of great scale and grand strategy, most hacking is either show-off vandalism or simply criminal. It is also increasingly easy. Obscure forums oil the trade in stolen credit-card details, sold in batches of thousands at a time. Data-dealers hawk “exploits”: flaws in code that allow malicious attackers to subvert systems. You can also buy “ransomware”, with which to encrypt photos and documents on victims’ computers before charging them for the key that will unscramble the data. So sophisticated are these facilitating markets that coding skills are now entirely optional. Botnets—flocks of compromised computers created by software like Mirai, which can then be used to flood websites with traffic, knocking them offline until a ransom is paid—can be rented by the hour. Just like a legitimate business, the bot-herders will, for a few dollars extra, provide technical support if anything goes wrong.
The total cost of all this hacking is anyone’s guess (most small attacks, and many big ones, go unreported). But all agree it is likely to rise, because the scope for malice is about to expand remarkably. “We are building a world-sized robot,” says Bruce Schneier, a security analyst, in the shape of the “Internet of Things”. The IoT is a buzz-phrase used to describe the computerisation of everything from cars and electricity meters to children’s toys, medical devices and light bulbs. In 2015 a group of computer-security researchers demonstrated that it was possible to take remote control of certain Jeep cars. When the Mirai malware is used to build a botnet it seeks out devices such as video recorders and webcams; the botnet for fridges is just around the corner.