#DBMS PLAYLIST https://youtu.be/ivDJZB2hGYQ
Hi Guys,
What were the last years overall and sectional cutoffs for getting interview calls in SBI IT (Asst. manager system) officer exam?
sbi so previous years papers ka link hai kya koi..if it is there please share
If the number of bits in a virtual address of a program is 16 and the page size is 0.5 K bytes, the number of pages in the virtual address space is
A.16
B.32
C.64
D.128
E.None of the above
answer is 128. Please explain how ?
For SBI SO , 8:30 am slot, What would be the last entry time?
Do they follow the PO thing?
1. If the Quant, Logic, English are just qualifying papers, then the cutoff for last years is around only 5 marks out of 35 and 50 makrs. then what is point of studying them? The cutoffs for 2014 is 1 or 2 only. Then, I should prepare for Professional Knowledge test only nah? please correct me if my strategy is wrong. Moreover, apart from individual sectional cutoffs, is there any overall cutoff for quant, logic and english sections?
2. More over what does PK test syllabus comprises of, I belongs to EEE but applied as I had electronics, is there any problem with that, especially at the time of interview?
R u confident in clearing written cutoff??
- Yes, but with bordr marks
- Am not sure
- Yes, with good marks
- Nahi hopayega
0 voters
anyone kno last year cut off for IBPS IT ??
Summary
Zombie : a compromised computer. Bad bots can launch two attacks
i.e. Denial of service(Dos) and email Spam
Virus Malicious code which modifies computer programs
Worms: Malicious self replicating code
Trojan : Stealth , Does not replicate itself.
Lets have a discussion here which of above is most dangeruos and which one is least harmful. It will help us to remember better (y)
Cryptography : Building of secure system
Crypanalysis :Breaking of system
AES and DES are Block Ciphers
DES encrypts 64 bit plaintext with 64 but key
---> has 2 transposition box
--->16 Cipher rounds
---> 3DES intoduced to lengthen key size to 168 bits
But 3 DES is slow so they introduced AES with key size 120,192,256
Important Topics for SBI..( Guys it took me hours to summarize these topics, Please add any if i am missing anything here)
1. Networking
1.1. Topology (Mesh,star,bus etc..which is more reliable )
1.2 Singals (basband -single signal,Broadband -Multi)
1.3 Transmission delay,propagation delay
1.4 Signal impair(Attenuation,Distort,Noise)
1.5 7 Layers of OSI (PDNTSPA)
1.6 hop to hop , link to link ,end to end layers
1.7 TCP/IP 5 layers
1.8 Addresses (ip,mac,port and special)
1.6.1 ip me classful(ABCDE) and CIDR
1.9 Line coding--Manchester,differential Mancester
1.10 Transmission media (guided unguided)
1.10.1. guided (twisted,coaxial,fibre) (UTP,STP)
1.10.2 unguided (wireless)
1.11 Switching(Circuit,Packet,Message)
1.11.1 Circuit switching is connection oriented
1.11.2 packet switching included(Virtual,Datagram)
1.12 Flow control and Access control
1.12.1 Flow control (StopNwait,GpBackN)
1.12.2 Access Control(CSMA/CD,polling,Aloha)
1.13 Messages name in different layers
Data link -> Frames
Network--> Datagram
Transport-> Segments
Application->Message
1.14 Protocols
DNS uses both TCP and UDP (Name->IP)
ICMP Network layer protocol for Error messaging
FTP uses TCP to share file using 3 way handshake in two separate channel
ARP RARP BOOTP and DHCP
1.15 DVR (RIP) < LSR(OSPF)
EIGRP=RIP+OSPF
2. DBMS
Relational Model
ER diagram attributes
Keys (primary ,candidate keys,Super keys )
FD
Normalization
1NF Atomic
2NF No partial Dependency
3NF No transitive relation
BCNF in nontrivail FD every determinant is super key
4NF Multivalued Dependency
5NF Join Dependency
Rows Tuples
Relation Table
Attributes Column
Degree of relation
Cardinality
Concurrency control
Lock based (shared,exclusive lock)
2-Phase lock
-> cascading rollback problem
-> conservative 2PL to avoid deadlock
Blind write -> writes without read
Dirty read -> Reading uncommited data
Phantom -> tuple disappearing when two transaction inserting records based on same condition
Indexes -> Single level, Multi level
Primary index
Secondary index
Clustering index
B index
B+ index
3. OS
4. Software Engineering
Models
5. Cloud, Data ware housing and other topics(guys please add topics here )
6. Oracle
PGA
SGA
PMON
SMON
DWBN
LGWN
Control file
Redo file
Archive log
RAC(Real Application Cluster)
Recovery Manager(RMAN)
Hot backup cold back
Incremental backup full backup
Database states
Nomount
Mount
Open
Shutdown
NetCa DbCA
Pfile(text) SPfile(binary)
Blocks
Prototype is developed in which SDLC model?
Bluetooth defines two types of networks:
piconet and scatternet
A Bluetooth network is called a piconet, or a small net. A piconet can have up to eight stations, one of which is called the primary;
Piconets can be combined to form what is called a scatternet
Spoofing : fooling 👍
https://upload.wikimedia.org/wikipedia/commons/7/76/Phish.jpg
Phishing : fishing (using baith to collect sensitive data)
Whaling: giving more bait to catch a big fish :P
Prepared for SBI SO (cut off - 60)????
- yes
- no
0 voters
To deliver a message to the correct application program running on a host, the ....address must be consulted ?
- Port
- Tom & Jerry
- MAC
- IP
0 voters
network that requires human intervention of route signals is called a ?
- T-Shaped
- U-shaped
- V-shaped
- Traingle-shaped
0 voters
ddress Resolution Protocol is used to acquire the MAC address of a host whose ______________ 👁🗨
- IP address is unknown
- IP address is known
0 voters