bhaiyo internet ke questions ke liye koi achhi si website bata do???
Any preference List???
Anybdy hav softcopy of IT officer by kiran publication ???
how many attempts are allowed for sbi specialist officer for general category?
is experience mandatory for sbi specialist officer systems category?
koi batao yaar proffessional knowledge kahans karen sbi ke liye...
hope it helps ..
questions asked in SBI SO June 2015 (based on memory)...
1) A firewall is hardware and/or software that is used to protect a computer or private network resources from intruders or hackers.
2) Oracle 9i lGWR takes input from redo log buffer and writes to online log file
3) Firewall decision making - Always deny or deny by delay & Accept by exception???
4) Encapsulating data inside data link layer with header and trailer - Frame
5) Project estimation techniques uses the standards of prior proj experience-??? (options function point,cocomo...)
6) RSA - Asymmetric protocol
7) VPN also called as Tunnel [other options Pipeline,packet switched]
8) One question about compliance validation and compliance monitoring
9) OLTP real time reporting tool - Dashboard
10) Cryptogrphy is not concerned about - Availability [other options Integrity,privacy,confidentiality]
11) Cryptanalysis refers - to the study of ciphers, ciphertext, or cryptosystems (that is, to secret code systems) with a view to finding weaknesses in them that will permit retrieval of the plaintext from the ciphertext
12) How public keys are shared - via email or digital signature???
13) Oracle procedure does not contain - RETURN [other options BEGIN END INTO]
14) Shutdown method in oracle for a consistent backup - Normal [ABORT,Inconsistent..]
15) encrypt using receiver's public key decrypt using receiver private key - public key and asymmetric key encryption
16) Providing application access via third party - Software as a service(saas)
17) Notify all stations before transmitting data - CSMA/CD or CSMA/CA
18) Removing redundancy in DB - Normalization
19) Which of the following provide network redundancy in a local network environment?Dual backbone
20) best technologies for in indoors are - IEEE 802.11 a/ IEEE 802.11 b/IEEE 802.11 n/???
21) In the relationship between course and faculty, the course entity would be - Child 22) When overriding a method - method inheritance/method signature/method name ???
23) In java Objects can communicate with each other - using methods and can call methods in other classes
24) Security threat associated with java applet - when downloaded and run at client....
25) Connecoin oriented protocol - TCP
26) Bridge operated in - data link layer
27) Forcing client package without users knowledge/permission - PUSH
28) Which one is NOT a phase of the systems development life cycle? - Post Implementation review
29) Which is not a information analysis system - DBMS?
30) DBMS not doing - programming data
31) A hacker that changes or forges information - altering raw data just before a computer processes it and then changing it back after the processing is completed, is engaging in - Data didling
32) Not a part of disaster recovery - Proximity of alternate site near primary site???
33) Most important thing in disaster recovery?personnel safety???
34) Disaster recovery risk assessment and business impact analysis (BIA) are crucial steps in the development of a disaster recovery plan.
35) Strong password/authentication mechanism - Hybrid/static/dynamic/brutal???
36) Which of the following statements is not true about two-tier client-server database architecture? SQL stmnts may be processed on some of the clients
37) ER diagram presenting minimum and maximum relation - cardinality
38) what happens when a error is encounterd during online transaction processing? - review and report??
39) Permissible operation when there is a shared lock on DB? Read
40) Polymorphic virus - associated with code modified differently each time....
41) UML Public symbol = +
42) Realtime ids system - N/w based IDS??
43) VLAN referred to as - TRUNKS/ SUBNET???
44) Identification - who is this, authentication - what action he has been authorized to perform
45) Check digit can detect - transcription error/substitution error..
46) The entity relationship diagram - Depicts relationship between data objects
47) Attack done by checking all possible combinations of letters, numbers and symbols - Brute force attack
48)An OLAP tool provides for
(a) Multidimensional analysis
(b) Roll-up and drill-down
(c) Slicing and dicing
(d) Rotation
(e) Setting up only relations.
49) Which of the below is not an Information system....
Database Management System.
50)Which background process performs a checkpoint in the database by writing modified blocks from the database buffer cache in the SGA to the data files? DBWn
from where to get those difficult puzzles which ibps has started asking recently for practice . i have failed to solve a single puzzle for 3 consecutive exams
Anyone have idea about how to fill preference list or you are doing it according to PO preferences?
wat is d level of difficulty for IBPS IT OFFICER..givivng for first time ..if possible mention cutoffs too
i have completed btech in electrical and electronics enginerring am i eligible to apply for specialist officers??
Topics to Prepare
Basic Concept Of Computers
Computer architecture & origination
Data structure
Data communication & networking
Networking Security
Operating System
Digital circuit & System
Microprocessor, 8085
Introduction to DBMS
Data Mining
Software Engineering.
A _____ is a property of the entire relation, rather than of the individual tuples in which each tuple is unique.
a) Rows
b) Key
c) Attribute
d) Fields
The subset of super key is a candidate key under what condition ?
a) No proper subset is a super key
b) All subsets are super keys
c) Subset is a super key
d) Each subset is a super key
Which one of the following is a procedural language ?
a) Domain relational calculus
b) Tuple relational calculus
c) Relational algebra
d) Query language
All d questions posted today by me were related to networking & web technologies..Thank u 😃
kitni vacancy hai SO (IT officer) ki? approx.
Is the syllabus for IBPS SO and SBI SO same ???
which mocks to take for ibps so it officer? 🙏
how to prepare for ibps and sbi it officer? books ,pdfs .btech books nikalna possible ey nehi hae