IBPS CWE (Specialist IT Officer) - V - 2016

I am new here...please suggest best book for quants  as per po exam level?

INPUT - 93 26 98 18 36 bomb old with year pay

S1- 98 93 26 18 36 bmob dlo htiw raey yap

s2- 98 93 36 26 18 ylny low drgs bvzi kzb

ye step 2 can anyone explain?

Border Gateway protocol(BGP) is followed by which routing scheme ?

The no. of autonomous systems in path vector routing is/are 

The routing scheme which uses the routing information of only its immediate neighbour is

prep ke liye koi website batado yaar....ya phir koi gate ka material share kardo...@vipulshah39 


What term is commonly used to describe malware that changes characteristics or rewrites its code between infections?


Which one of the following is a process that uses the spawn mechanism to ravage the system performance?

Which one of the following is not an attack, but a search for vulnerabilities to attack?


 In asymmetric encryption:

...................... approach reduces time and effort required for design and lesser risk in database management.

  • Multiple databases
  • Top-down approach
  • None of the above
  • Single global database

0 voters


SQL server stores index information in the ………… system table

.,

http://www.pagalguy.com/discussions/sbi-po-2016-preparation-discussion-37443483

Which of the following uses UDP as the transport protocol?

http://www.indiabix.com/                in this refer engineering section...maximum topics are covered

AMPS use

IPv6 uses which of the following representation in its address ?

Frame relay uses which of the following layers 

Frame relay is which type of technology ?

The default subnet is