Ibps /sbi (i.t. officer jmgs 1) 2017

#DBMS PLAYLIST https://youtu.be/ivDJZB2hGYQ

Hi Guys,


What were the last years overall and sectional cutoffs for getting interview calls in SBI IT (Asst. manager system) officer exam?

sbi so previous years papers ka link hai kya koi..if it is there please share


 If the number of bits in a virtual address of a program is 16 and the page size is 0.5 K bytes, the number of pages in the virtual address space is


A.16

B.32

C.64

D.128

E.None of the above 



answer is 128. Please explain how ?

For SBI SO , 8:30 am slot, What would be the last entry time?

Do they follow the PO thing?

 1. If the Quant, Logic, English are just  qualifying papers,  then the cutoff for last years is around only 5  marks out of 35  and 50 makrs. then what is  point of studying them? The cutoffs for 2014 is 1 or 2 only.  Then, I should prepare for  Professional Knowledge  test only nah? please correct me if my strategy  is wrong.  Moreover, apart from individual sectional cutoffs, is there any overall cutoff for quant, logic and english sections?

 2. More over what does PK test syllabus comprises of, I belongs to   EEE but applied as I had electronics, is there any problem with that, especially at the time of interview? 

R u confident in clearing written cutoff??

  • Yes, but with bordr marks
  • Am not sure
  • Yes, with good marks
  • Nahi hopayega

0 voters

anyone kno last year cut off for IBPS IT ??

https://youtu.be/TlIp2SmzZ5A

Summary 


Zombie : a compromised computer. Bad bots can launch two attacks

 i.e. Denial of service(Dos) and email Spam


Virus Malicious code which modifies computer programs


Worms: Malicious self replicating code 


Trojan : Stealth , Does not replicate itself.



Lets have a discussion here which of above is most dangeruos and which one is least harmful. It will help us to remember better (y)



Cryptography  : Building of secure system

Crypanalysis     :Breaking of system



AES and DES are Block Ciphers


DES encrypts 64 bit plaintext with 64 but key

   ---> has 2 transposition box

   --->16 Cipher rounds 

   ---> 3DES intoduced to lengthen key size to 168 bits 

But 3 DES is slow so they introduced AES with key size          120,192,256





Important Topics for SBI..( Guys it took me hours to summarize these topics, Please add any if i am missing anything here)


1. Networking 

    1.1. Topology (Mesh,star,bus etc..which is more reliable )

    1.2  Singals  (basband -single signal,Broadband -Multi)

    1.3 Transmission delay,propagation delay

    1.4 Signal impair(Attenuation,Distort,Noise)

    1.5 7 Layers of OSI (PDNTSPA)

    1.6  hop to hop , link to link ,end to end layers

    1.7 TCP/IP  5 layers 

    1.8 Addresses (ip,mac,port and special)

           1.6.1  ip me classful(ABCDE) and CIDR

    1.9 Line coding--Manchester,differential Mancester

    1.10 Transmission media (guided unguided)

            1.10.1. guided (twisted,coaxial,fibre) (UTP,STP)

            1.10.2  unguided (wireless)

    1.11 Switching(Circuit,Packet,Message) 

       1.11.1 Circuit switching is connection oriented

       1.11.2 packet switching included(Virtual,Datagram)

    1.12  Flow control and Access control

    1.12.1  Flow control (StopNwait,GpBackN)

    1.12.2  Access Control(CSMA/CD,polling,Aloha)

    1.13 Messages name in different layers 

             Data link -> Frames

             Network--> Datagram

             Transport-> Segments

             Application->Message

   1.14 Protocols

          DNS  uses both TCP and UDP (Name->IP)

          ICMP Network layer protocol for Error messaging

          FTP uses TCP  to share file using 3 way handshake in  two separate channel 

          ARP RARP BOOTP and DHCP 

    1.15 DVR (RIP) < LSR(OSPF)  

            EIGRP=RIP+OSPF      

         


2. DBMS 

    Relational Model 

    ER diagram attributes 

    Keys (primary ,candidate keys,Super keys )

    FD

    Normalization

       1NF  Atomic 

       2NF  No partial Dependency 

       3NF  No transitive relation 

       BCNF in nontrivail FD every determinant is super key

       4NF Multivalued Dependency 

       5NF Join Dependency 

    Rows Tuples 

    Relation Table 

    Attributes Column 

   Degree of relation 

   Cardinality 

   Concurrency control 

        Lock based (shared,exclusive lock)

        2-Phase lock 

                  -> cascading rollback problem 

                          -> conservative 2PL to avoid deadlock

Blind write -> writes without read

Dirty read -> Reading uncommited data 

Phantom -> tuple disappearing when two transaction inserting records based on same condition

Indexes -> Single level, Multi level 

Primary index 

Secondary index 

Clustering index 

B index 

B+ index 



3. OS 



4. Software Engineering 

        Models 


5. Cloud, Data ware housing and other topics(guys please add topics here )



6. Oracle 

        PGA 

        SGA 

        PMON

        SMON

        DWBN

        LGWN

        Control file 

        Redo file 

        Archive log 

        RAC(Real Application Cluster)

        Recovery Manager(RMAN)

        Hot backup cold back

        Incremental backup full backup 

        Database states

                     Nomount 

                     Mount 

                     Open 

                     Shutdown  

       NetCa DbCA 

      Pfile(text) SPfile(binary)

       Blocks

     

   

    







Prototype is developed in which SDLC model?


Bluetooth defines two types of networks: 

piconet and scatternet


A Bluetooth network is called a piconet, or a small net. A piconet can have up to eight stations, one of which is called the primary;



Piconets can be combined to form what is called a scatternet



Spoofing : fooling 👍 


https://upload.wikimedia.org/wikipedia/commons/7/76/Phish.jpg


Phishing :  fishing (using baith to collect sensitive data)


Whaling:   giving more bait to catch a big fish :P



Prepared for SBI SO (cut off - 60)????

  • yes
  • no

0 voters

To deliver a message to the correct application program running on a host, the ....address must be consulted ?   

  • Port
  • Tom & Jerry
  • MAC
  • IP

0 voters

 network that requires human intervention of route signals is called a ?  

  • T-Shaped
  • U-shaped
  • V-shaped
  • Traingle-shaped :slight_smile:

0 voters

 ddress Resolution Protocol is used to acquire the MAC address of a host whose ______________ 👁‍🗨 

  • IP address is unknown
  • IP address is known

0 voters

 

ION DIGITAL ZONE IDZ AUSTINPATTI PTR COLLEGE OF ENGINEERING & TECHNOLOGY DAHNAPANDIYAN NAGAR AUSTINPATTI MADURAI-625008 anybody on 20.01.17