evening shift wale question post karo??
Anyone from shift at 12.30 pm??? Please
Kya tumlog k center me bhi students absent the bohot?
Is software testing questions asked in exam ?
Some 2nd shift Question i remember...
1. Redundancy bit Question
2. Data manipulation language
3. Customer segmentation
4. Customer relationship managemant
5. EDI
6. Route trace ques
7. Process Management
8. Requirement Traceability matrix ques.
9. ecommerce works on real and current data
10. user acceptance testing
11. rad model disadvantage
12. pre-Commit question
13. which of the following is not doe by DBA
14. Oracle- OPF and ORP
15. PSK certificate is done by
16. service label agreement
17.TSB Acronym
18. 3 tier Architecture
19. why securiy in Data warehouse
20.Slice up/Roll up in DWH
21. Unicast routing
22. UDP- No delivery Gurantee
23. ingrees filtering ?
24. Management Information syetem.
Guys Plz comment correct answers and remaing Questions.
which test series helped for today's exam?
- others
- OB
- Test Series
0 voters
Behen ke lodo second shift mai m** c*** gayi sabki
ek question tha jisme ... option tha open systems, open source software ... uska kya hoga... maine open systems mara h pata n kya hoga...
Do anyone know about hotsite, cold site,warmsite asked in 1st shift.
CMMI Capability maturity model intrigrity Decided by SEI (software engineering institutions) Levels 0 Incomplete 1 initial 2 Repeatable 3 defined 4 Quantitively managed 5 Optimised Mnemonic IIdhaR DeQO
Kahaan tha center?
Sbi so systems scale 1 : resoning quants and english mein qualifying marks max kitne ho sakte hai ?
One qns in shift 1 maintaining entire enterprise data.......wat is d ans??
Morning Shift All question:
Q1. Cryptoanalysis
Q2. Database with large storage and lacks of rows in a cloumn.
Q3. Sharing task between servers.
Q4. backward recovery.
Q5. Reduced instruction sets. : RISC
Q6. Wifi hotspot
Q7. Arp protocol
Q8. Concurrency control in database
Q9. Virtualization in operating system
Q10. CGI
Q11. Hot Site
Q12. Data shadowing
Q13. Data mining
Q14. SAAS
Q15. Embeeded systems need less power and less computing.
Q16. RISC architecture
Q17. RFID Chip,
Q18. Full form of OLAP
Q19. Process of exchanging packet between ISP.
Q20. Hierarchical database
Q21. ‘Streaming’ definition
Q22. Trojan horse,
Q23. Data consistency
Q24. IP address
Q25. assigning roles for database access
Q26. System log ar used for ?
Q27. Formal storage of oraganizations data : 1)Data warehouse 2)Datamart 3)Enterprise resource managment.
Q28. Group server or application server.
Q30. Data isolation
Q31. Program embeeded in GIF.
Q32. to attract "trap" intruders.
Q33. slicing dicing and pivoting.
Q34. What is extract process of ETL.
Q35. What is extranet.
Q36. Process to detect ip range of live host.
Q37. Setting website pages as per user preferences.
Q38. Prototype is used in for Models ?
Q39. Hot site vs warm or cold site ?.
Q40. Software program inside program and reusable. : 1)Components 2)Modules 3)SOA.
Q41. system used for competing computing resources.
Q42. Database recovery.
Q43. What is the best way to maintain network againt the vulnarability.
Q44. ER Diagram is used to establish relation-ship between data objects.
Q45. Best Wireless protocol ?
Q46. Process of storing data at remote location is called ?
Just for knowledge...
Kal main yaad kr rha tha ki ye Web Beacon(bug) hota kya h..fir suddenly mujhe yaad aya....1/2 website h jo ek chhota sa image provide krte h wo Email me ap attach krke kisi ko send krte ho... samne wala jab isse visit krta h toh uska sara detail (i mean Ip address or kab visit kiya etc) apke email pe chala jata h... Web bug is actually an image or can be a tag.. embedded in email(just like you attach an image)... I have done this but never knew this is called web bug.. we use this for tracking a person.. (boring stuff)
Ye bohot tricky question tha.. if they asked something to embed inside image then may be this is not the answer..spyware might be the correct..
Some 2nd shift Question i remember...
1. Redundancy bit Question
2. Data manipulation language
3. Customer segmentation
4. Customer relationship managemant
5. EDI
6. Route trace ques
7. Process Management
8. Requirement Traceability matrix ques.
9. ecommerce works on real and current data
10. user acceptance testing
11. rad model disadvantage
12. pre-Commit question
13. which of the following is not doe by DBA
14. Oracle- OPF and ORP
15. PSK certificate is done by
16. service label agreement
17.TSB Acronym
18. 3 tier Architecture
19. why securiy in Data warehouse
20.Slice up/Roll up in DWH
21. Unicast routing
22. UDP- No delivery Gurantee
23. ingrees filtering ?
24. Management Information syetem.
25. group of servers that share work and may be able to back each other up if one server fails
26. the address dat changes temporarily when application connects-dynamic ip
27. trasction log contain?
28.question on shared lock ans-read.
29.after completion of trasaction it can be undone ans-COnsistency/durability/isolation
30.shopping mall bar code reading question-
31.4GL languages- AI and fuzzy logic
32.system's___ shows that system will be in danger- VUlrenability.
Guys comment correct answers and remaining questions
Few hacking terms for future use :p syn flooding form of dos Consume server process and Make server unresponsive Ip hijacking also called bgp hijacking Illegimate takeover of grp ofIp Ip spoofing creation of ip packets with false source address Replay attack also called playback attack Valid data delayed
What would be the pk cutoff for interview?? And how many marks does interview consist of?
Shift 1 question answer in wireless lan is wifi hotspot or WAP?
Shift 1 question no of times a webpage is visited.what is answer?