Anda di halaman 1dari 55

IBPS SO:IT OFFICER COMPUTER CRACKER

IT OFFICER COMPUTER AWARENESS

1. Basic Computer 2. Computer Network


3. Database Management System 4. Data structure
5. Operating System

Computer Network
System of interconnected computers and computerized peripherals such as
printers is called computer network .This interconnection among computers
facilitates information sharing among them. Computers may connect to each
other by either wired or wireless media.
Characteristics of a Network-
A network is a group of systems that are
connected to allow sharing of resourcessuch as files or printersor sharing
of services-such as an Internet connection .There are two aspects of setting up a
network: the hardware used to connect the systems together and the software installed on the computers to
allow them to communicate.
Servers-
The server is a special computer that contains more disk space and memory than are found on client
workstations. The server has special software installed that allows it to function as a server. This special
software can provide file and print services (to allow sharing of files and printers), provide web pages to
clients, or provide e-mail functionality to the company.
Workstations -
The workstation also is known as a client, which is just a basic computer running a client
operating system such as Windows XP or Linux. These users typically store their files on a central server so
that they can share the files with other users on the network.
Hosts-
The term host refers to any computer or device that is connected to a network and sends or receives
information on that network. A host can be a server, a workstation, a printer with its own network card, or a
device such as a router. We can summarize by saying that any system or
device that is connected to the network is known as a host.
Types of Networks-
Organizations of different sizes, structures, and budgets need different
types of networks. Networks can be divided into one of two categories:
peer-to-peer or server-based networks.
1. Peer-to-Peer Network
2. Server-Based Networks

For More Info visit: www.ibtindia.com or call: 94636-12090 Page 1


IBPS SO:IT OFFICER COMPUTER CRACKER

Peer-to-Peer Network-
A peer-to-peer network has no dedicated servers instead; a number of workstations
are connected together for the purpose of sharing information or devices. When there is no dedicated server, all
workstations are considered equal; any one of them can participate as the client or the server. Peer-to-peer
networks are designed to satisfy the networking needs of home networks or of small companies that do not
want to spend a lot of money on a dedicated server but still want to have the Capability to share information or
devices. For example, A small peer-to-peer network will allow these three computers to share the printer and
the customer information with one another .The extra cost of a server was not incurred because the existing
client systems were networked together to create the peer-to-peer network. A big disadvantage of peer-to-peer
networking is that you cant do your day-today administration in a single place.
Server-Based Networks-
Usually after four or five systems
have been networked, the need for a dedicated server to store all
of the user accounts and data files becomes apparentthis is a
server-based network. The advantage of a server-based network
is that the data files that will be used by all of the users are
stored on the one server. This will help you by giving you a
central point to set up permissions on the data files, and it will
give you a central point from which to back up all of the data in
case data loss should occur. With a server-based network, the
network server stores a list of users who may use network
resources and usually holds the resources as well. The server in
a server-based network may provide a number of different
services. The services it will offer to the network usually are decided by the servers role. There are a number
of different roles that a server could play on a network:
1. File and print servers 2. Application servers 3. Web servers 4. Directory servers
1. File and print servers-:
File and print servers control, share printers
and files among clients on the network. File and print servers were the
original reason to have a network; a large number of users needed
access to the same files, so the files were placed on a server, and all
clients were connected to the server when they needed to work with the
files.
2. Application servers-:
Application servers are servers that run some form of special program on the server. A
good example of an application server is a server that runs the companys e-mail server. The e-mail server
software is special software that can be run on a server operating system. Another example of software that
would run on an application server is a database server product such as Microsoft SQL Server. A database
server is a server that holds the companys core business data and typically gives this data to custom
applications that run on the workstations. These are some applications that you might find on an application
server:
1. Microsoft SQL Server 2.Oracle 3.Microsoft Exchange Server
4. IBM Lotus Domino
3. Web servers-:
Web servers are servers that run the Hypertext Transfer Protocol (HTTP) and are designed to
publish information on the Internet or the corporate intranet. Web servers are popular in todays businesses
because they host web applications (web sites) for the organization. These web applications could be designed
for internal use, or they could be used to publish information to the rest of the world on the Internet. Examples
of web server software are Microsofts Internet Information Services that runs on Windows or Apache web
server software that runs on UNIX/Linux, Novell NetWare, and Windows.
4. Directory servers-
Directory servers hold a list of the user accounts that are allowed to log on to the
network. This list of user accounts is stored in a database (known as the directory database) and can store

For More Info visit: www.ibtindia.com or call: 94636-12090 Page 2


IBPS SO:IT OFFICER COMPUTER CRACKER

information about these user accounts such as address, city, phone number, and fax number. A directory
service is designed to be a central database that can be used to store everything about such objects as users and
printers.
Ethernet-:
Ethernet is a widely deployed LAN technology. This technology was invented by Bob Metcalfe and
D.R. Boggs in the year 1970. It was standardized in IEEE 802.3 in 1980. Ethernet shares media. Network
which uses shared media has high probability of data collision. Ethernet uses Carrier Sense Multi
Access/Collision Detection (CSMA/CD) technology to detect collisions. On the occurrence of collision in
Ethernet, all its hosts roll back, wait for some random amount of time, and then re-transmit the data. Ethernet
connector is network interface card equipped with 48-bits MAC address. This helps other Ethernet devices to
identify and communicate with remote devices in Ethernet. Traditional Ethernet uses 10BASE-T
specifications. The number 10 depicts 10MBPS speed, BASE stands for baseband, and T stands for Thick
Ethernet. 10BASE-T Ethernet provides transmission speed up to 10MBPS and uses coaxial cable or Cat-5
twisted pair cable with RJ-5 connector. Ethernet follows Star topology with segment length up to 100 meters.
All devices are connected to a hub/switch in a star fashion.
Fast-Ethernet-:
To encompass need of fast emerging software and hardware technologies, Ethernet extends
itself as Fast-Ethernet. It can run on UTP, Optical Fiber, and wirelessly too. It can provide speed up to
100MBPS. This standard is named as 100BASE-T in IEEE 803.2 using Cat-5 twisted pair cable. It uses
CSMA/CD technique for wired media sharing among the Ethernet hosts and CSMA/CA (CA stands for
Collision Avoidance) technique for wireless Ethernet LAN. Fast Ethernet on fiber is defined under 100BASE-
FX standard which provides speed up to 100MBPS on fiber. Ethernet over fiber can be extended up to 100
meters in half-duplex mode and can reach maximum of 2000 meters in full-duplex over multimode fibers.
Giga-Ethernet-:
After being introduced in 1995, Fast-Ethernet retained its high speed status only for three
years till Giga-Ethernet introduced. Giga-Ethernet provides speed up to 1000 mbits/seconds. IEEE802.3ab
standardizes Giga-Ethernet over UTP using Cat-5, Cat-5e and Cat-6 cables. IEEE802.3ah defines Giga-
Ethernet over Fiber.
Internet, Intranet and Extranet-:

Internet Intranet Extranet

Internet If you wish to expose Intranet An application is considered to Extranet From time to time, an
information to everyone in the be on the companys intranet if it is using application that has been built
world, then you would build an Internet-type protocols such as HTTP or for the Companys intranet and
Internet-type application. An FTP but the application is available only used by internal employees will
Internet-type application within the company. The information on a need to be extended to select
Uses Internet protocols such as companys intranet would not be business partners or customers.
HTTP, FTP, or SMTP and is accessible to persons on the Internet If you extend your intranet out
available to persons anywhere because it is not for public use. For to select business partners or
on the Internet. We use the example, a few years ago I was sitting customers, you have created an
Internet and web applications with my banking officer going over my extranet. An extranet cannot be
as ways to extend who the account and noticed that the bank had used by anyone else external to
application can reach. For moved all of its customer account the company except for those
example, I no longer need to go information to a web site and that the selected individuals.
to the bank to transfer funds. banking officer was using a Web browser
Because the bank has built a to retrieve my account details. Although
web site on the Internet, I can the application was being used by a web
do that from the comfort of my browser, it was still an internal
own home. application meant only for banking
officers.

For More Info visit: www.ibtindia.com or call: 94636-12090 Page 3


IBPS SO:IT OFFICER COMPUTER CRACKER

Network Topologies-:
A network topology is the physical layout of computers, cables, and other components
on a network. There are a number of different network topologies, and a network may be built using multiple
topologies. The different types of network layouts are
1. Bus topology 2.Star topology 3.Mesh topology 4. Ring topology 5. Hybrid topology
6. Wireless topology

Network Media and Connectors-:


Cabling is the medium for the transmission of data between hosts on the
LANs. LANs can be connected together using a variety of cable types, such as unshielded twisted-pair, coax,
or fiber. Each cable type has its own advantages and disadvantages, which you will examine in this section.
There are three primary types of cable media that can be used to connect systems to a networkcoaxial cable,
twisted-pair cable, and fiber-optic cable. Transmission rates that can be
supported on each of these physical media are measured in millions of bits
per second, or megabits per second (Mbps).
Coaxial Cable-:
Coaxial, or coax, cable looks like the cable used to bring
the cable TV signal to your television. One strand (a solid-core copper
wire) runs down the middle of the cable. There are two types of coax
cabling: thinnet and thicknet. The two differ in thickness and maximum
cable distance that the signal can travel.
Twisted-Pair Cable-:
Coaxial cable is not as popular today as it was a few years ago; today the popularity
contest has been dominated by twisted-pair cabling. Twisted-pair cabling gets its name by having four pairs of
wires that are twisted to help reduce crosstalk or interference from outside electrical devices. (Crosstalk is
interference from adjacent wires.) there are two forms of twisted-pair cablingunshielded twisted-pair (UTP)
and shielded twisted-pair (STP).
Fiber-Optic Cable-:
The third type of cabling that we want to discuss is
fiber-optic cabling. Fiber-optic cabling is unlike coax and twisted-pair,
because both of those types have a copper wire that carries the electrical
signal. Fiber-optic cables use optical fibers that carry digital data signals
in the form of modulated pulses of light. An optical fiber consists of an
extremely thin cylinder of glass, called the core, surrounded by a
concentric layer of glass, known as the cladding. There are two fibers per
cable-one to transmit and one to receive. The core also can be an optical-
quality clear plastic, and the cladding can be made up of gel that reflects
signals back into the fiber to reduce signal loss. There are two types of
fiber-optic cables: single-mode fiber (SMF) and multimode fiber (MMF).
1. Single-mode fiber Uses a single ray of light, known as a mode, to
carry the transmission over long distances.
2. Multimode fiber Uses multiple rays of light (modes) simultaneously, with each ray of light running at a
different reflection angle to carry the transmission over short distances

Cable M ax Distance Transfer Rate Connector Used


Thinnet 185 m 10 Mbps BNC
Thicknet 500 m 10 Mbps AUI
CAT 3 (UTP) 100 m 10 Mbps RJ-45
CAT 5 (UTP) 100 m 100 Mbps RJ-45
CAT 5e 100 m 1 Gbps RJ-45
CAT 6 100 m 10 Gbps RJ-45
Fiber 2 km 1+ Gbps SC, ST

For More Info visit: www.ibtindia.com or call: 94636-12090 Page 4


IBPS SO:IT OFFICER COMPUTER CRACKER

Network devices-:
Network devices are components used to connect computers or other electronic devices
together so that they can share files or resources like printers or fax machines. Devices used to setup a Local
Area Network (LAN) are the most common types of network devices used by the public. A LAN requires a
hub, router, cabling or radio technology, network cards, and if online access is desired, a high-speed
modem. This is much less complicated than it might sound to someone new to networking.

HUB-:
A hub is used in a wired network to connect Ethernet cables from
a number of devices together. The hub allows each device to talk to the
others. Hubs arent used in networks with only wireless connections, since
network devices such as routers and adapters communicate directly with
one another. Hubs are such simple devices they require no
configuration, and have no manuals that their function is now included
in other devices such as routers and modems.

Router -:
A router is a communications device that connects multiple
computers or other routers together and transmits data to its correct
destination on the network. A router can be used on any size of network.
On the largest scale, routers along the Internet backbone forward data
packets to their destination using the fastest available path. For smaller
business and home networks, a router allows multiple computers to share
a single high-speed Internet connection such as through a cable modem
or DSL modem. These routers connect from 2 to 250 computers. To
prevent unauthorized users from accessing files and computers, many
routers are protected by a built-in antivirus protection. Routers also
support wireless communications, eliminating the need for a separate
wireless access point in a wireless network. If network has a separate
wireless access point, it connects to the router via a cable. Some routers
also include additional functionality such as including a built-in print server.

Modem-:
A computers digital signals must be converted to analog signals
before they are transmitted over standard telephone lines. The
communications devices that perform this conversion in a modem,
sometimes called a dial-up modem. The word, modem, is derived from the
combination of the words, modulation, to change into an analog signal,
and demodulation, to convert an analog signal into a digital signal. Both the
sending and receiving ends o a standard telephone line (communications
channel) must have a dial-up modem or data transmission to occur. For
example, a dial-up modem connected to a sending computer converts the
computers digital signals into analog signals. The analog signals then can travel over a standard telephone
line. At the receiving end, another dial-up modem converts the analog signals
back into digital signals that a receiving computer can process.

Bridge-:
A bridge reads the outermost section of data on the data packet, to
tell where the message is going. It reduces the traffic on other network
segments, since it does not send all packets. Bridges can be programmed to
reject packets from particular networks. Bridging occurs at the data link layer
of the OSI model, which means the bridge cannot read IP address, but only
the outermost hardware address of the packet. In our case the bridge can read

For More Info visit: www.ibtindia.com or call: 94636-12090 Page 5


IBPS SO:IT OFFICER COMPUTER CRACKER

the Ethernet data which gives the hardware address of the destination address, not the IP address. Bridges
forward all broadcast messages. Only a special bridge called a translation bridge will allow two networks of
different architectures to be connected. Bridges do not normally allow connection of networks with different
architectures. The hardware address is also called the MAC (media access control) address. To determine the
network segment a MAC address belongs to, bridges use one of the following

Transparent Bridging :
They build a table of addresses (bridging table) as they receive packets. If the
address is not in the bridging table, the packet is forwarded to all segments other than the one it came from.
This type of bridge is used on Ethernet networks.
Source Route Bridging :
The source computer provides path information inside the packet. This is used on
Token Ring networks. A gateway can translate information between different network data formats or network
architectures. It can translate TCP/IP to AppleTalk so computers supporting TCP/IP can communicate with
Apple brand computers. Most gateways operate at the application layer, but can operate at the network or
session layer o the OSI model. Gateways will start at the lower level and strip information until it gets to the
required level and repackage the information and work its way back toward the hardware layer of the OSI
model. To confuse issues, when talking about a router that is used to interface to another network, the word
gateway is often used. This does not mean the routing machine is a gateway as defined here, although it could
be.

OSI Reference Model :


OSI (Open Systems Interconnection) is reference model for how messages should
be transmitted between any two points in a telecommunication network. A reference model is a framework for
understanding relationships. The purpose of the OSI reference model is to guide vendors and developers so
that the digital communication products and software programs they create will interoperate. The OSI
reference model defines seven layers of functions that take place at each end of a communication.
Layers of OSI -:

Layer 7-:
The application layer - This is the layer at
which communication partners are identified,
quality of service (QoS) is identified, user
authentication and privacy are considered, and any
constraints on data syntax are identified. (This layer
is not the application itself, although some
applications may perform application layer
functions.)

Layer 6-:
The presentation layer - This is a layer, usually part of an operating system (OS), that converts
incoming and outgoing data from one presentation format to another (for example, from a text stream into a
popup window with the newly-arrived text).

Layer 5-:
The session layer - This layer sets up, coordinates, and terminates conversations, exchanges, and
dialogs between the applications at each end. It deals with session and connection coordination.

Layer 4-:
The transport layer - This layer manages the end-to-end control (for example, determining whether all
packets have arrived) and error-checking. It ensures complete data transfer.

Layer 3-:

For More Info visit: www.ibtindia.com or call: 94636-12090 Page 6


IBPS SO:IT OFFICER COMPUTER CRACKER

The network layer - This layer handles the routing of the data (sending it in the right direction to the
right destination on outgoing transmissions and receiving incoming transmissions at the packet level). The
network layer does routing and forwarding.

Layer 2-:
The data-link layer - This layer provides synchronization for the physical level and does bit-stuffing
for strings of 1's in excess of 5. It furnishes transmission protocol knowledge and management. This layer has
two sub layers, the Logical Link Control Layer and the Media Access Control Layer.

Layer 1-:
The physical layer - This layer conveys the
bit stream through the network at the electrical and
mechanical level. It provides the hardware means of
sending and receiving data on a carrier network.

TCP/IP Model -:
The Transmission Control Protocol
/ Internet Protocol (TCP/IP) was created by the
Department of Defense (DoD) to make sure and
protect data integrity, and also maintained
communications in the time of disastrous war.
However, if designed and deployed properly
according to standard, a TCP/IP network can be a
truly reliable and flexible one. Essentially, the
Department of Defense (DoD) Model is a reduced version of the OSI Reference Model. The DoD model based
on four layers:

Layer Description Protocols


4. Defines TCP/IP application protocols and how host HTTP, Telnet, FTP, TFTP,
Application programs interface with transport layer services to SNMP, DNS, SMTP,
use the network. X Windows, other
application protocols
3. Transport Provides communication session management TCP, UDP, RTP
between host computers. Defines the level of service
and status of the connection used when transporting
data.
2. Internet Packages data into IP datagram, which contain IP, ICMP, ARP, RARP
source and destination address information that is
used to forward the datagrams between hosts and
across networks. Performs routing of IP datagrams.
1. Network Specifies details of how data is physically sent Ethernet, Token Ring,
interface/ through the network, including how bits are FDDI, X.25, Frame Relay,
Access electrically signaled by hardware devices that RS-232, v.35
interface directly with a network medium, such as
coaxial cable, optical fiber, or twisted-pair copper
wire.

IP Address-:
Every machine on a network has a unique identifier. Most networks today, including all
computers on the Internet, use the TCP/IP protocol as the standard for how to communicate on the network. In
the TCP/IP protocol, the unique identifier for a computer is called its IP address.

For More Info visit: www.ibtindia.com or call: 94636-12090 Page 7


IBPS SO:IT OFFICER COMPUTER CRACKER

There are two standards for IP addresses:-


1) IP Version 4 (IPv4) 2) IP Version 6 (IPv6).
All computers with IP addresses have an IPv4 address, and many are starting to use the new IPv6 address
system as well. Here's what these two address types mean:-
IPv4 uses 32 binary bits to create a single unique address on the
network. An IPv4 address is expressed by four numbers separated
by dots. Each number is the decimal (base-10) representation for
an eight-digit binary (base-2) number, also called an octet. For
example: 216.27.61.137.
Class A - 0.0.0.0 - 127.255.255.255
Class B - 128.0.0.0 - 191.255.255.255
Class C - 192.0.0.0 - 223.255.255.255
Class D - 224.0.0.0 - 239.255.255.255
Class E - 240.0.0.0 - 247.255.255.255
IPv6 uses 128 binary bits to create a single unique address on
the network. An IPv6 address is expressed by eight groups of
hexadecimal (base-16) numbers separated by colons, as in 2001:
cdba: 0000:0000:0000:0000:3257:9652 Groups of numbers that
contain all zeros are often omitted to save space, leaving a colon
separator to mark the gap (as in 2001:cdba::3257:9652).
At the dawn of IPv4 addressing, the Internet was not the large commercial sensation it is today, and most
networks were private and closed off from other networks around the world. When the Internet exploded,
having only 32 bits to identify a unique Internet address caused people to panic that we'd run out of IP
addresses. Under IPv4, there are 232 possible combinations, which offer just under 4.3 billion unique
addresses. IPv6 raised that to a panic-relieving 2128 possible addresses.
Web browser- :
A browser is an application program that provides a way to look at and interact with all the
information on the World Wide Web. The word "browser" seems to have originated prior to the Web as a
generic term for user interfaces that let you browse text files online. Technically, a Web browser is a client
program that uses HTTP to make requests of Web servers throughout the Internet on behalf of the browser
user. Most browsers support e-mail and the File Transfer Protocol but a Web browser is not required for those
Internet protocols and more specialized client programs are more popular. The first Web browser, called World
Wide Web, was created in 1990. That browser's name was changed to Nexus to

For More Info visit: www.ibtindia.com or call: 94636-12090 Page 8


IBPS SO:IT OFFICER COMPUTER CRACKER

avoid confusion with the developing information space known as the World Wide Web. The first Web
browser with a graphical user interface was Mosaic, which appeared in 1993. Many of the user interface
features in Mosaic went into Netscape Navigator. Microsoft followed with its Internet Explorer (IE).

Bandwidth -:
Bandwidth describes the rate at which data can be transferred to your computer from a website
or internet service within a specific time. Therefore the amount of bandwidth you have (the bandwidth
'strength') determines the efficiency and speed of your internet activity that is, when you open web pages,
download files and so on. A useful analogy is a pipe with water running through it the wider the pipe, the
greater the volume of water that can flow through it. The same applies to bandwidth strength and the flow of
the volume of data. Bandwidth is generally measured in bits per second' or sometimes bytes per second'.

ARPANET- :
Advanced Research Projects Agency Network, ARPANET or ARPAnet began development
in 1966 by the United States ARPA. ARPANET was a Wide Area Network linking many Universities and
research centers, was first to use packet switching, and was the beginning of what we consider the Internet
today. Some of the reasons for creating ARPANET include making it easier for people to access computers, to
improve computer equipment, and to have a more effective communication method for the military.

Bookmark - :
When referring to the Internet or a browser, a bookmark or electronic bookmark is a method of
saving a web page's address. For example, with most browsers pressing Ctrl + D will bookmark the page you
are viewing.

Bounce - :
A description of what occurs when an e-mail message returns back to the sender as undeliverable.
Some e-mail programs also have a bounce or bounce back feature built into them, which allows the user to
bounce messages back to the sender causing the e-mail address to appear invalid.

Cyber Law-:
Cyber law is the part of the overall legal system that deals with the Internet, cyberspace, and
their respective legal issues. Cyber law covers a fairly broad area, encompassing several subtopics including
freedom of expression, access to and usage of the Internet, and online privacy. Generically, cyber law has been
referred to as the Law of the Internet.

DNS-:
Domain Name System or Domain Name Service, a DNS is an Internet or other network server that
helps to point domain names or the hostname to their associated IP address that was introduced by Paul
Mockapetris and Jon Postel in1984. If a domain name is not found within the local database, the server may
query other domain servers to obtain the address of a domain name. For example, when a user is accessing the
ibtindia domain a user would enter the easy to remember domain: ibtindia.com. When entered that domain
name is looked up on a Domain Name System to translate that name into an IP address that can be better
understood by computer, e.g. 69.72.169.241. Using that IP address the computers can then find the computer
containing the ibtindia web page and forward that information to your computer.

Phishing-:
Pronounced like fishing, phishing is a term used to describe a
malicious individual or group of individuals scamming users by sending
e-mails or creating web pages that are designed to collect an individual's
online bank, credit card, or other login information. Because these e-mails
and web pages look like legitimate companies users trust them and enter
their personal information.

For More Info visit: www.ibtindia.com or call: 94636-12090 Page 9


IBPS SO:IT OFFICER COMPUTER CRACKER

Search engine-:
A search engine is a software program or script
available through the Internet that searches documents and files for
keywords and returns the results of any files containing those keywords.
Today, there are thousands of different search engines available on the
Internet, each with their own abilities and features. The first search
engine ever developed is considered Archie, which was used to search for
FTP files and the first text-based search engine is considered Veronica.
Today, the most popular and well known search engine is Google.

Firewall-:
A firewall is a software utility or hardware device that limits outside network access to a computer
or local network by blocking or restricting network ports. Firewalls are a great step for helping prevent un-
authorized access to a company or home network. The picture is an example of a hardware firewall, the
ZyXEL ZyWALL a Unified Security Gateway with a Firewall and other security features. In addition to
hardware firewalls like that shown above, basic hardware firewalls are also commonly found in most network
routers and can be configured and setup through the router setup. Software firewalls are designed to protect the
computer they are installed onto by blocking any unrestricted programs from sending and receiving
information from the network or Internet. A good example of a software Firewall is the Windows Firewall that
is included with Microsoft Windows.

Hacking-:
Hacking in simple terms means an illegal intrusion into a
computer system and/or network. There is an equivalent term to
hacking i.e. cracking, but from Indian Laws perspective there is no
difference between the term hacking and cracking. Every act
committed towards breaking into a computer and/or network is
hacking. Hackers write or use ready-made computer programs to
attack the target computer. They possess the desire to destruct and
they get the kick out of such destruction. Some hackers hack for
personal monetary gains, such as to stealing the credit card
information, transferring money from various bank accounts to their
own account followed by withdrawal of money. They extort money
from some corporate giant threatening him to publish the stolen
information which is critical in nature.

Message Switching-:
In this switching method, a different strategy is used, where instead of
establishing a dedicated physical line between the sender and the
receiver, the message is sent to the nearest directly connected switching
node. This node stores the message, checks for errors, selects the best
available route and forwards the message to the next intermediate node.
The line becomes free again for other messages, while the process is
being continued in some other nodes. Due to the mode of action, this
method is also known as store-and-forward technology where the
message hops from node to node to its final destination. Each node
stores the full message, checks for errors and forwards it. In this
switching technique, more devices can share the network bandwidth, as
compared with circuit switching technique. Temporary storage of
message reduces traffic congestion to some extent. Higher priority can be given to urgent messages, so that the
low priority messages are delayed while the urgent ones are forwarded faster. Through broadcast addresses one
message can be sent to several users. Last of all, since the destination host need not be active when the
message is sent, message switching techniques improve global communications.

For More Info visit: www.ibtindia.com or call: 94636-12090 Page 10


IBPS SO:IT OFFICER COMPUTER CRACKER

Packet Switching -:
The basic approach is not much
different from message switching. It is also based on the
same store-and-forward approach. However, to overcome
the limitations of message switching, messages are divided
into subsets of equal length called packets. This approach
was developed for long-distance data communication
(1970) and it has evolved over time. In packet switching
approach, data are transmitted in short packets (few
Kbytes). A long message is broken up into a series of
packets as shown in Fig. Every packet contains some
control information in its header, which is required for
routing and other purposes. Main difference between
Packet switching and Circuit Switching is that the
communication lines are not dedicated to passing messages
from the source to the destination. In Packet Switching,
different messages (and even different packets) can pass
through different routes, and when there is a "dead time" in the communication between the source and the
destination, the lines can be used by other sources.

Circuit switching-:
A networking technology that provides a
temporary, but dedicated, connection between two stations no
matter how many switching devices the data are routed
through. Circuit switching was originally developed for the
analog-based telephone system in order to guarantee steady,
consistent service for two people engaged in a phone
conversation. Analog circuit switching Frequency Division
Multiplexing (FDM) has given way to digital circuit switching
Time Division Multiplexing (TDM), and the digital
counterpart still maintains the connection until broken.

Encryption and Decryption-:


Encryption is the process of translating plain text data (plaintext) into
something that appears to be random and meaningless (ciphertext). Decryption is the process of converting
ciphertext back to plaintext. To encrypt more than a small amount of data, symmetric encryption is used. A
symmetric key is used during both the
encryption and decryption processes. To decrypt
a particular piece of ciphertext, the key that was
used to encrypt the data must be used. The goal
of every encryption algorithm is to make it as
difficult as possible to decrypt the generated
ciphertext without using the key. If a really good
encryption algorithm is used, there is no
technique significantly better than methodically trying every possible key. For such an algorithm, the longer
the key, the more difficult it is to decrypt a piece of ciphertext without possessing the key. It is difficult to
determine the quality of an encryption algorithm. Algorithms that look promising sometimes turn out to be
very easy to break, given the proper attack. When selecting an encryption algorithm, it is a good idea to choose
one that has been in use for several years and has successfully resisted all attacks.
Private Key encryption -:
Private Key encryption -Private Key means that each computer has a secret key
(code) that it can use to encrypt a packet of information before it is sent over the network to the other
computer. Private key requires that you know which computers will talk to each other and install the key on

For More Info visit: www.ibtindia.com or call: 94636-12090 Page 11


IBPS SO:IT OFFICER COMPUTER CRACKER

each one. Private key encryption is essentially the same as a secret code that the two computers must each
know in order to decode the information. The code would provide the key to decoding the message. Think of it
like this. You create a coded message to send to a friend where each letter is substituted by the letter that is
second from it. So "A" becomes "C" and "B" becomes "D". You have already told a trusted friend that the
code is "Shift by 2". Your friend gets the message and decodes it. Anyone else who sees the message will only
see nonsense.

Public key encryption -:


Public key encryption uses a combination of a private key and a public key. The
private key is known only to your computer while the public key is given by your computer to any computer
that wants to communicate securely with it. To decode an encrypted message, a computer must use the public
key provided by the originating computer and it's own private key.

Digital signature-:
A digital signature is basically a way to ensure that an electronic document (e-mail,
spreadsheet, text file, etc.) is authentic. Authentic means that you know who created the document and you
know that it has not been altered in any way since that person created it. Digital signatures rely on certain types
of encryption to ensure authentication. Encryption is the process of taking all the data that one computer is
sending to another and encoding it into a form that only the other computer will be able to decode.
Authentication is the process of verifying that information is coming from a trusted source. These two
processes work hand in hand for digital signatures.

Unicasting, Multicasting and Broadcasting?


If the message is sent from a source to a single destination node, it is called Unicasting.
If the message is sent to some subset of other nodes, it is called Multicasting.
If the message is sent to all the m nodes in the network it is called Broadcasting.

What is Project 802?


It is a project started by IEEE to set standards to enable
intercommunication between equipment from a variety of
manufacturers. It is a way for specifying functions of the
physical layer, the data link layer and to some extent the
network
layer to allow for interconnectivity of major LAN protocols.
It consists of the following:
802.1 is an internetworking standard for compatibility of
different LANs and MANs across protocols.
802.2 Logical link control (LLC) is the upper sublayer of the
data link layer which is non-architecture-specific, that is
remains the same for all IEEE-defined LANs. Media access
control (MAC) is the lower sublayer of the data link layer
that contains some distinct modules each carrying
proprietary information specific to the LAN product being
used. The modules are Ethernet LAN (802.3), Token ring
LAN (802.4), Token bus LAN (802.5). 802.6 is distributed
queue dual bus (DQDB) designed to be used in MANs.

For More Info visit: www.ibtindia.com or call: 94636-12090 Page 12


IBPS SO:IT OFFICER COMPUTER CRACKER

DATABASE MANAGEMENT SYSTEM


Database-:
A database is a logically coherent collection of data with some inherent meaning, representing
some aspect of real world and which is designed, built and populated with data for a specific purpose.
DBMS-:
It is a collection of programs that enables user to create and maintain a database. In other words it is
general-purpose software that provides the users with the processes of defining, constructing and manipulating
the database for various Applications.
Advantages of DBMS-:
1. Redundancy is controlled. 2. Unauthorized access is restricted.
3. Providing multiple user interfaces. 4. Enforcing integrity constraints.
5. Providing backup and recovery.

III-tier Architecture -:
Three levels of data abstraction (III-tier Architecture)-:
They are three levels of abstraction are given below,
1. Physical level: The lowest level of abstraction
describes how data are stored. (How to store the
data?)
2. Logical level: The next higher level of abstraction,
describes what data are stored in database and what
relationship among those data. (What type of data to
be stored?)
3. View level: The highest level of abstraction describes
only part of entire database. (How to show the data?)

Integrity rules-:
There are two types of Integrity rules
1. Entity Integrity: States that "Primary key cannot have NULL value"
2. Referential Integrity: States that "Foreign Key can be either a NULL value or should be Primary
Key value of other relation.
Data Independence-:
Data independence means that "the application is independent of the storage structure
and access strategy of data". In other words, the ability to modify the schema definition in one level should not
affect the schema definition in the next higher level.
Two types of Data Independence:
1. Physical Data Independence: Modification in physical level should not affect the logical level.
2. Logical Data Independence: Modification in logical level should affect the view level.
The people who use the database can be categorized -
a) Database users b) Database administrator (DBA)

Database users are of 4 different types that are given below:

1) Naive users:
These are the unsophisticated users who interact with the system by invoking one of the
application programs that have been written previously. E.g. consider a user who checks for account balance
information over the World Wide Web. Such a user access a form, enters the account number and password
etc. And the application program on the internet then retrieves the account balance using given account
information which is passed to the user.

For More Info visit: www.ibtindia.com or call: 94636-12090 Page 13


IBPS SO:IT OFFICER COMPUTER CRACKER

2) Application programmers-:
These are computer professionals who write application programs, used to
develop user interfaces. The application programmer uses Rapid Application Development (RAD) toolkit or
special type of programming languages which include special features to facilitate generation of forms and
display of date on screen.
3) Sophisticated users-:
These users interact with the database using database query language. They submit
their query to the query processor. Then Data Manipulation Language (DML) functions are performed on the
database to retrieve the data. Tools used by these users are OLAP (Online Analytical Processing) and data
mining tools.

4) Specialized users-:
These users write specialized database applications to retrieve data. These applications
can be used to retrieve data with complex data types e.g. graphics data and audio data.

b) Database Administrator (DBA):


A person having who has central control over data and programs that
access the data is called DBA. DBA functions are given below:
1) Schema definition: DBA creates database schema by executing Data Definition Language (DDL)
statements.
2) Storage structure and access method definition
3) Schema and physical organization modification: If any changes are to be made in the original
schema, to fit the need of your organization, then these changes are carried out by the DBA.
4) Granting of authorization for data access: DBA can decide which parts of data can be accessed by
which users. Before any user access the data, dbms checks which rights are granted to the user by
the DBA.
5) Routine maintenance: DBA has to take periodic backups of the database, ensure that enough disk
space is available to store new data, ensure that performance of dbms ix not degraded by any
operation carried out by the users.
SQL-:
SQL stands for Structured Query Language. SQL is used to communicate with a database.
According to ANSI (American National Standards Institute), it is the standard language for relational database
management systems. SQL statements are used to perform tasks such as update data on a database, or retrieve
data from a database. Some common relational database management systems that use SQL are: Oracle,
Sybase, Microsoft SQL Server, Access, Ingres, etc. Although most database systems use SQL, most of them
also have their own additional proprietary extensions that are usually only used on their system. However, the
standard SQL commands such as "Select", "Insert", "Update", "Delete", "Create", and "Drop" can be used to
accomplish almost everything that one needs to do with
a database. This tutorial will provide you with the
instruction on the basics of each of these commands as
well as allow you to put them to practice using the SQL
Interpreter.

Relational Model-:
The most popular data model in
DBMS is the Relational Model. It is more scientific a
model than others. This model is based on first-order
predicate logic and defines a table as an n-array relation.
The main highlights of this model are
1. Data is stored in tables called relations.
2. Relations can be normalized.
3. In normalized relations, values saved are
atomic values.

For More Info visit: www.ibtindia.com or call: 94636-12090 Page 14


IBPS SO:IT OFFICER COMPUTER CRACKER

4. Each row in a relation contains a unique value.


5. Each column in a relation contains values from a same domain.
Key-:
A key is an attribute (also known as column or field) or a combination of attribute that is used to identify
records. Sometimes we might have to retrieve data from more than one table, in those cases we require to join
tables with the help of keys. The purpose of the key is to bind data together across tables without repeating all
of the data in every table. Such an attribute is called a key attribute, and its values can be used to identify each
entity uniquely. For example, the Name attribute is a key of the COMPANY entity type because no two
companies are allowed to have the same name. For the PERSON entity type, a typical key attribute is
SocialSecurityNumber. Sometimes, several attributes together form a key, meaning that the combination of the
attribute values must be distinct for each entity. If a set of attributes possesses this property, we can define a
composite attribute that becomes a key attribute of the entity type. The various types of key with e.g. in SQL
are mentioned below, (For examples let suppose we have an Employee Table with attributes ID , Name
,Address , Department_ID ,Salary)
(I) Super Key :
An attribute or a combination of attribute that is used to identify the records uniquely is
known as Super Key. A table can have many Super Keys.
E.g. of Super Key
1 ID 2 ID, Name
3 ID, Address 4 ID, Department_ID
5 ID, Salary 6 Names, Address
7 Names, Address, Department_ID So on as any combination which can identify the records
uniquely will be a Super Key.
(II) Candidate Key :
It can be defined as minimal Super Key or irreducible Super Key. In other words an
attribute or a combination of attribute that identifies the record uniquely but none of its proper subsets can
identify the records uniquely.
E.g. of Candidate Key
1 Code 2 Names, Address
For above table we have only two Candidate Keys (i.e. Irreducible Super Key) used to identify the records
from the table uniquely. Code Key can identify the record uniquely and similarly combination of Name and
Address can identify the record uniquely, but neither Name nor Address can be used to identify the records
uniquely as it might be possible that we have two employees with similar name or two employees from the
same house.
(III) Primary Key-:
A Candidate Key that is used by the database designer for unique identification of each
row in a table is known as Primary Key. A Primary Key can consist of one or more attributes of a table. E.g. of
Primary Key - Database designer can use one of the Candidate Key as a Primary Key. In this case we have
Code and Name, Address as Candidate Key, we will consider Code Key as a Primary Key as the other
key is the combination of more than one attribute.
(IV) Foreign Key :
A foreign key is an attribute or combination of attribute in one base table that points to the
candidate key (generally it is the primary key) of another table. The purpose of the foreign key is to ensure
referential integrity of the data i.e. only values that are supposed to appear in the database are permitted.
E.g. of Foreign Key Let consider we have another table i.e. Department Table with Attributes
Department_ID, Department_Name, Manager_ID, Location_ID with Department_ID as an Primary
Key. Now the Department_ID attribute of Employee Table (dependent or child table) can be defined as the
Foreign Key as it can reference to the Department_ID attribute of the Departments table (the referenced or
parent table), a Foreign Key value must match an existing value in the parent table or be NULL.

For More Info visit: www.ibtindia.com or call: 94636-12090 Page 15


IBPS SO:IT OFFICER COMPUTER CRACKER

(V) Composite Key:


If we use multiple attributes to create a Primary Key then that Primary Key is called
Composite Key (also called a Compound Key or Concatenated Key). E.g. of Composite Key, if we have used
Name, Address as a Primary Key then it will be our Composite Key.
(VI) Alternate Key:
Alternate Key can be any of the Candidate Keys except for the Primary Key. E.g. of
Alternate Key is Name, Address as it is the only other Candidate Key which is not a Primary Key.
(VII) Secondary Key:
The attributes that are not even the Super Key but can be still used for identification
of records (not unique) are known as Secondary Key. E.g. of Secondary Key can be Name, Address, Salary,
Department_ID etc. as they can identify the records but they might not be unique.
SQL Commands- :
SQL have the different type of commands that are given below -
1. DDL (Data Definition Language)-: A data base schema is specifies by a set of definitions expressed
by a special language called DDL. Example of DDL commands are given below-:
CREATE - to create objects in the database.
ALTER - alters the structure of the database.
DROP - delete objects from the database.
TRUNCATE - remove all records from a table, including all spaces allocated for the records
are removed.
COMMENT - add comments to the data dictionary.
RENAME - rename an object.
2. DML (Data Manipulation Language)-: This language that enable user to access or manipulate data
as organized by appropriate data model. Procedural DML or Low level: DML requires a user to
specify what data are needed and how to get those data. Non-Procedural DML or High level: DML
requires a user to specify what data are needed without specifying how to get those data.
SELECT - retrieve data from the a database
INSERT - insert data into a table
UPDATE - updates existing data within a table
DELETE - deletes all records from a table, the space for the records remain
MERGE - UPSERT operation (insert or update)
CALL - call a PL/SQL or Java subprogram
EXPLAIN PLAN - explain access path to data
LOCK TABLE - control concurrency
3. DCL-: Data Control Language (DCL) statements. Some examples:
GRANT - gives user's access privileges to database
REVOKE - withdraw access privileges given with the GRANT command
4. TCL-: Transaction Control (TCL) statements are used to manage the changes made by DML
statements. It allows statements to be grouped together into logical transactions.
COMMIT - save work done
SAVEPOINT - identify a point in a transaction to which you can later roll back
ROLLBACK - restore database to original since the last COMMIT
SET TRANSACTION - Change transaction options like isolation level and what rollback
segment to use
5. VDL (View Definition Language) -: It specifies user views and their mappings to the conceptual
schema.
6. SDL (Storage Definition Language)-: This language is to specify the internal schema. This language
may specify the mapping between two schemas.
Data dictionary-:
A data dictionary is a collection of descriptions of the data objects or items in a data model
for the benefit of programmers and others who need to refer to them. A first step in analyzing a system of
objects with which users interact is to identify each object and its relationship to other objects. This process is
called data modeling and results in a picture of object relationships. After each data object or item is given a

For More Info visit: www.ibtindia.com or call: 94636-12090 Page 16


IBPS SO:IT OFFICER COMPUTER CRACKER

descriptive name, its relationship is described (or it becomes part of some structure that implicitly describes
relationship), the type of data (such as text or image or binary value) is described, possible predefined values
are listed, and a brief textual description is provided. This collection can be organized for reference into a book
called a data dictionary.
ER model-:
The ER model defines the conceptual view of a database. It works around real-world entities and
the associations among them. At view level, the ER model is considered a good option for designing databases.
Entity-:
An entity can be a real-world object, either
animate or inanimate, that can be easily identifiable. For
example, in a school database, students, teachers, classes,
and courses offered can be considered as entities. All these
entities have some attributes or properties that give them their identity.
Entity set-:
An entity set is a collection of similar types of entities. An entity set may contain entities with
attribute sharing similar values. For example, a Students set may contain all the students of a school; likewise a
Teachers set may contain all the teachers of a school from all faculties. Entity sets need not be disjoint.
Attributes-:
Entities are represented by means of their properties, called attributes. All attributes have values.
For example, a student entity may have name, class, and age as attributes. There are different type of attributes
that are given below-
1. Simple attribute:
Simple attributes are atomic values, which cannot be divided further. For example, a
student's phone number is an atomic value of 10 digits.
2. Composite attribute:
Composite attributes are made of more than one simple attribute. For example, a
student's complete name may have first_name and last_name.
3. Derived attribute :
Derived attributes are the attributes that do not exist in the physical database, but
their values are derived from other attributes present in the database. For example, average_salary in a
department should not be saved directly in the database, instead it can be derived. For another example, age
can be derived from data_of_birth.
4. Single-value attribute:
Single-value attributes contain single value. For example
Social_Security_Number.
5. Multi-value attribute:
Multi-value attributes may contain more than one values. For example, a person
can have more than one phone number, email_address, etc.
Generalization-:
As mentioned above, the process of generalizing entities,
where the generalized entities contain the properties of all the generalized
entities is called generalization. In generalization, a number of entities
are brought together into one generalized entity based on their similar
characteristics. For example, pigeon, house sparrow, crow and dove can
all be generalized as Birds.

Specialization-:

Specialization is the opposite of generalization. In specialization, a group of entities is


divided into sub-groups based on their characteristics. Take a group Person for example. A
person has name, date of birth, gender, etc. These properties are common in all persons,
human beings. But in a company, persons can be identified as employee, employer,

For More Info visit: www.ibtindia.com or call: 94636-12090 Page 17


IBPS SO:IT OFFICER COMPUTER CRACKER

customer, or vendor, based on what role they play in the company. Similarly, in a school database, persons can
be specialized as teacher, student, or a staff, based on what role they play in school as entities.
Normalization-:
If a database design is not perfect, it may contain anomalies, which are like a bad dream for any
database administrator. Managing a database with anomalies is next to impossible.
Update anomalies :
If data items are scattered and are not linked to each other properly, then it could lead to
strange situations. For example, when we try to update one data item having its copies scattered over several
places, a few instances get updated properly while a few others are left with old values. Such instances leave
the database in an inconsistent state.
Deletion anomalies -:
We tried to delete a record, but parts of it was left undeleted because of unawareness,
the data is also saved somewhere else.
Insert anomalies -:
We tried to insert data in a record that does not exist at all. Normalization is a method to
remove all these anomalies and bring the database to a consistent state.

First Normal Form-:


First Normal Form is defined in the definition of relations (tables) itself. This rule defines
that all the attributes in a relation must have atomic domains. The values in an atomic domain are indivisible
units. We re-arrange the relation (table) as below, to convert it to First Normal Form.

Each attribute must contain only a single value from its pre-defined domain.
Second Normal Form-:
Before we learn about the second normal form, we need to understand the following
1. Prime attribute : An attribute, which is a part of the prime-key, is known as a prime attribute.
2. Non-prime attribute : An attribute, which is not a part of the prime-key, is said to be a non-prime
attribute. If we follow second normal form, then every non-prime attribute should be fully functionally
dependent on prime key attribute. That is, if X A holds, then there should not be any proper subset Y of X,
for which Y A also holds true. We see here in Student_Project relation that the prime key attributes are
Stu_ID and Proj_ID. According to the rule, non-key attributes, i.e. Stu_Name and Proj_Name must be
dependent upon both and not on any of the prime key attribute individually. But we find that Stu_Name can be
identified by Stu_ID and Proj_Name can be identified by Proj_ID independently. This is called partial
dependency, which is not allowed in Second Normal Form. We broke the relation in two as depicted in the
above picture. So there exists no partial dependency.

For More Info visit: www.ibtindia.com or call: 94636-12090 Page 18


IBPS SO:IT OFFICER COMPUTER CRACKER

Third Normal Form-:


For a relation to be in Third Normal Form, it must be in Second Normal form and the
following must satisfy No non-prime attribute is transitively dependent on prime key attribute. For any non-
trivial functional dependency, X A, then either X is a super key or, A is prime attribute. We find that in
the above Student_detail relation, Stu_ID is the key and only prime key attribute. We find that City can be
identified by Stu_ID as well as Zip itself. Neither Zip is a super key nor is City a prime attribute. Additionally,
Stu_ID Zip City, so there exists transitive dependency. To bring this relation into third normal form, we
break the relation into two relations as follows-

Boyce-Codd Normal Form-:


Boyce-Codd Normal Form (BCNF) is an extension of Third Normal Form on
strict terms. BCNF states that For any non-trivial functional dependency, X A, X must be a super-key. In
the above image, Stu_ID is the super-key in the relation Student_Detail and Zip is the super-key in the relation
ZipCodes. So, Stu_ID Stu_Name, Zip and Zip City which confirms that both the relations are in BCNF.
ACID Properties-:
A transaction is a very small unit of a program and it may contain several low level tasks. A
transaction in a database system must maintain Atomicity, Consistency, Isolation, and Durability
commonly known as ACID properties in order to ensure accuracy, completeness, and data integrity.

Atomicity This property states that a transaction must be treated as an atomic unit, that is, either all
of its operations are executed or none. There must be no state in a database where a transaction is left
partially completed. States should be defined either before the execution of the transaction or after
the execution/abortion/failure of the transaction.

Consistency The database must remain in a consistent state after any transaction. No transaction
should have any adverse effect on the data residing in the database. If the database was in a
consistent state before the execution of a transaction, it must remain consistent after the execution of
the transaction as well.

Durability The database should be durable enough to hold all its latest updates even if the system
fails or restarts. If a transaction updates a chunk of data in a database and commits, then the database
will hold the modified data. If a transaction commits but the system fails before the data could be
written on to the disk, then that data will be updated once the system springs back into action.

Isolation In a database system where more than one transaction are being executed simultaneously
and in parallel, the property of isolation states that all the transactions will be carried out and
executed as if it is the only transaction in the system. No transaction will affect the existence of any
other transaction.

OLAP-:
On Line Analytical Processing (OLAP) is a Business Intelligence (BI) reporting system. OLAP
provides the user with the capability to sum, count, average and do other simple arithmetic operations on
groups of data. An OLAP report has measures and dimensions. Measures are the data values to be displayed.

For More Info visit: www.ibtindia.com or call: 94636-12090 Page 19


IBPS SO:IT OFFICER COMPUTER CRACKER

Dimensions are characteristics of the measures. OLAP reports are called OLAP cubes, although such reports
are not limited to three dimensions.
ODBC-:
ODBC is a standard that contains an interface that provides a common language for application
programs to access and process SQL databases. In order to use ODBC, a driver, server name, database name,
user id, and password are required. ODBC is important for Internet applications and has gained wide
acceptance.

ODBC- :
ODBC is a standard that contains an interface that provides a common language for application
programs to access and process SQL databases. In order to use ODBC, a driver, server name, database name,
user id, and password are required. ODBC is important for Internet applications and has gained wide
acceptance.
Entity-:
It is a 'thing' in the real world with an independent existence.
Entity type-:
It is a collection (set) of entities that have same attributes.
Entity set-:
It is a collection of all entities of particular entity type in the database.

Weak Entity set-:


An entity set may not have sufficient attributes to form a primary key, and its primary key
compromises of its partial key and primary key of its parent entity, then it is said to be Weak Entity set.
Database Trigger-:
A database trigger is a PL/SQL block that can defined to automatically execute for insert,
update, and delete statements against a table. The trigger can e defined to execute once for the entire statement
or once for every row that is inserted, updated, or deleted. For any one table, there are twelve events for which
you can define database triggers. A database trigger can call database procedures that are also written in
PL/SQL.
Cold backup and hot backup (in case of Oracle)-:
Cold Backup-:
It is copying the three sets of files (database files, redo logs, and control file) when the instance
is shut down. This is a straight file copy, usually from the disk directly to tape. You must shut down the
instance to guarantee a consistent copy. If a cold backup is performed, the only option available in the event of
data file loss is restoring all the files from the latest backup. All work performed on the database since the last
backup is lost.
Hot Backup-:
Some sites (such as worldwide airline reservations systems) cannot shut down the database
while making a backup copy of the files. The cold backup is not an available option.
SQL view-:
A SQL view is a virtual table built from other tables or views. Views are used to
(1) Hide columns or rows,
(2) show the results of computed columns,
(3) Hide complicated SQL syntax,
(4) Layer built-in functions,
(5) provide a level of indirection between application programs and tables,
(6) Assign different sets of processing permissions to tables, and
(7) To assign different sets of triggers to the same table.
What is Trigger-:
A trigger is a SQL procedure that initiates an action when an event (INSERT, DELETE or
UPDATE) occurs. Triggers are Stored in and managed by the DBMS. Triggers are used to maintain the
referential integrity of data by changing the data in a systematic fashion. A trigger cannot be called or
executed; DBMS automatically fires the trigger as a result of a data modification to the associated table.

For More Info visit: www.ibtindia.com or call: 94636-12090 Page 20


IBPS SO:IT OFFICER COMPUTER CRACKER

Triggers can be viewed as similar to stored procedures in that both consist of procedural logic that is stored at
the database level. Stored procedures, however, are not event-drive and are not attached to a specific table as
triggers are. Stored procedures are explicitly executed by invoking a CALL to the procedure while triggers are
implicitly executed. In addition, triggers can also execute stored procedures.
What is Cursor-:
Cursor is a database object used by applications to manipulate data in a set on a row-by- row
basis, instead of the typical SQL commands that operate on all the rows in the set at one time.
In order to work with a cursor we need to perform some steps in the following order:
1. Declare cursor
2. Open cursor
3. Fetch row from the cursor
4. Process fetched row
5. Close cursor
6. Deallocate cursor
Different Types of Join-:
Cross Join a cross join that does not have a WHERE clause produces the Cartesian
product of the tables involved in the join. The size of a Cartesian product result set is the number of rows in the
first table multiplied by the number of rows in the second table. The common example is when company wants
to combine each product with a pricing table to analyze each product at each price.

Inner Join- A join that displays only the rows that have a match in both joined tables is known as inner Join.
This is the default type of join in the Query and View Designer.

Outer Join- A join that includes rows even if they do not have related rows in the joined table is an Outer
Join. You can create three different outer join to specify the unmatched rows to be included:

Left Outer Join- In Left Outer Join all rows in the first-named table i.e. "left" table, which appears leftmost in
the JOIN clause are included. Unmatched rows in the right table do not appear.

Right Outer Join- In Right Outer Join all rows in the second-named table i.e. "right" table, which appears
rightmost in the JOIN clause are included. Unmatched rows in the left table are not included.

Full Outer Join- In Full Outer Join all rows in all joined tables are included, whether they are matched or not.

Self Join-This is a particular case when one table joins to itself, with one or two aliases to avoid confusion. A
self join can be of any type, as long as the joined tables are the same. A self join is rather unique in that it
involves a relationship with only one table. The common example is when company has a hierarchal reporting
structure whereby one member of staff reports to another. Self Join can be Outer Join or Inner Join.
Data Warehousing-:
Subject-oriented, meaning that the data in the database is organized so that all the data
elements relating to the same real world event or object are linked together; Time-variant, meaning that the
changes to the data in the database are tracked and recorded so that reports can be produced showing changes
over time; Non-volatile, meaning that data in the database is never over-written or deleted, once committed,
the data is static, read-only, but retained for future reporting. Integrated, meaning that the database contains
data from most or all of an organization's operational applications, and that this data is made consistent.

For More Info visit: www.ibtindia.com or call: 94636-12090 Page 21


IBPS SO:IT OFFICER COMPUTER CRACKER

DATA STRUCTURE
DATA STRUCTURE-:
In computer science, a data structure is a particular way of storing and organizing
data in a computers memory so that it can be used efficiently. Data may be organized in many different ways;
the logical or mathematical model of a particular organization of data is called a data structure. The choice of a
particular data model depends on the two considerations first; it must be rich enough in structure to mirror the
actual relationships of the data in the real world. On the other hand, the structure should be simple enough that
one can effectively process the data whenever necessary.
Need of data structure-:
It gives different level of organization data.
It tells how data can be stored and accessed in its elementary level.
Provide operation on group of data, such as adding an item, looking up highest priority item.
Provide a means to manage huge amount of data efficiently.
Provide fast searching and sorting of data.
Selecting a data structure-:
Selection of suitable data structure involve following steps
Analyze the problem to determine the resource constraints a solution must meet.
Determine basic operation that must be supported. Quantify resource constraint for each operation
Select the data structure that best meets these requirements.
Each data structure has cost and benefits. Rarely is one data structure better than other in all situations.
Type of data structure-:
1. Static data structure: A data structure whose organizational characteristics are invariant throughout its
lifetime. Such structures are well supported by high-level languages and familiar examples are arrays and
records. The prime features of static structures are
[A]None of the structural information need be stored explicitly within the elements it is often held in a
distinct logical/physical header;
[B]The elements of an allocated structure are physically contiguous, held in a single segment of memory.
[C]All descriptive information, other than the physical location of the allocated structure, is determined by the
structure definition.
[D]Relationships between elements do not change during the lifetime of the structure.
2. Dynamic data structure-:
A data structure whose organizational characteristics may change during its
lifetime. The adaptability afforded by such structures, e.g. linked lists, is often at the expense of decreased
efficiency in accessing elements of the structure. Two main features distinguish dynamic structures from static
data structures. Firstly, it is no longer possible to infer all structural information from a header; each data
element will have to contain information relating it logically to other elements of the structure. Secondly, using
a single block of contiguous storage is often not appropriate, and hence it is necessary to provide some storage
management scheme at run-time.

Linear Data Structure-:


A data structure is said to be linear if its elements from any sequence. There are
basically two ways of representing such linear structure in memory.
a) One way is to have the linear relationships between the elements represented by means of sequential
memory location. These linear structures are called arrays.
b) The other way is to have the linear relationship between the elements represented by means of pointers or
links. These linear structures are called linked lists. The common examples of linear data structure are arrays,
queues, stacks and linked lists.
Non-linear Data Structure-:
This structure is mainly used to represent data containing a hierarchical
relationship between elements. E.g. graphs, family trees and table of contents.

For More Info visit: www.ibtindia.com or call: 94636-12090 Page 22


IBPS SO:IT OFFICER COMPUTER CRACKER

Array-:
The simplest type of data structure is a linear (or one dimensional) array. A list of a finite number n of
similar data referenced respectively by a set of n consecutive numbers, usually 1, 2, 3 . . . . . . . n. if we choose
the name A for the array, then the elements of A are denoted by subscript notation.
Linked List-:
A linked list or one way list is a linear collection of data elements, called nodes, where the linear
order is given by means of pointers. Each node is divided into two parts:
1.The first part contains the information of the element/node
2.The second part contains the address of the next node (link /next pointer field) in the list.
There is a special pointer Start/List contains the address of first node in the list. If this special pointer contains
null, means that List is empty.
Abstract Data Type-:
It can be defined as a collection of data items together with the operations on the data.
The word abstract refers to the fact that the data and the basic operations defined on it are being studied
independently of how they are implemented. It involves what can be done with the data, not how has to be
done. For ex, in the below figure the user would be involved in checking that what can be done with the data
collected not how it has to be done.
Queue- :
A queue is a linear list of elements in
which deletion can take place only at one end,
called the front, and insertions can take place only
at the other end, called the rear. The term front
and rear are used in describing a linear list only
when it is implemented as a queue. Queue is also
called first-in-first-out (FIFO) lists. Since the first
element in a queue will be the first element out of
the queue. In other words, the order in which elements enters a queue is the order in which they leave.
There are main two ways to implement a queue:
1. Circular queue using array
2. Linked Structures (Pointers)
Primary queue operations:
Enqueue : insert an element at the rear of the queue.
Dequeue : remove an element from the front of the queue Following is the algorithm which describes the
implementation of Queue using an Array.
Priority queue-:
Priority queue is a linear data structure. It is having a list of items in which each item has
associated priority. It works on a principle add an element to the queue with an associated priority and remove
the element from the queue that has the highest priority. In general different items may have different
priorities. In this queue highest or the lowest priority item are inserted in random order. It is possible to delete
an element from a priority queue in order of their priorities starting with the highest priority. While priority
queues are often implemented with heaps, they are
conceptually distinct from heaps. A priority queue is an
abstract concept like "a list" or "a map"; just as a list can be
implemented with a linked list or an array, a priority queue
can be implemented with a heap or a variety of other
methods such as an unordered array.
Stack-:
It is an ordered group of homogeneous items of
elements. Elements are added to and removed from the top
of the stack (the most recently added items are at the top of
the stack). The last element to be added is the first to be
removed (LIFO: Last In, First Out).

For More Info visit: www.ibtindia.com or call: 94636-12090 Page 23


IBPS SO:IT OFFICER COMPUTER CRACKER

Stack Operations-:
These are two basic operations associated with stack:
1. Push() is the term used to insert/add an element into a stack.
2. Pop() is the term used to delete/remove an element from a stack.
Tree - :
A node is a structure which may contain a value, a condition, or represent a separate data structure
(which could be a tree of its own). Each node in a tree has zero or more child nodes, which are below it in the
tree (by convention, trees grow down, not up as they do in nature). A node that has a child is called the child's
parent node (or ancestor node, or superior). A node has at most one parent. Nodes that do not have any
children are called leaf nodes. They are also referred to as terminal nodes. The height of a node is the length
of the longest downward path to a leaf from that node. The height of the root is the height of the tree. The
depth of a node is the length of the path to its root (i.e., its root path).
Binary Tree -:
The binary tree is a fundamental data structure
used in computer science. The binary tree is a useful data
structure for rapidly storing sorted data and rapidly retrieving
stored data. A binary tree is composed of parent nodes, or
leaves, each of which stores data and also links to up to two
other child nodes (leaves) which can be visualized spatially as
below the first node with one placed to the left and with one
placed to the right. It is the relationship between the leaves
linked to and the linking leaf, also known as the parent node,
which makes the binary tree such an efficient data structure. It is
the leaf on the left which has a lesser key value (i.e, the value
used to search for a leaf in the tree), and it is the leaf on the right
which has an equal or greater key value. As a result, the leaves
on the farthest left of the tree have the lowest values, whereas
the leaves on the right of the tree have the greatest values. More
importantly, as each leaf connects to two other leaves, it is the beginning of a new, smaller, binary tree. Due to
this nature, it is possible to easily access and insert data in a binary tree using search and insert functions
recursively called on successive leaves.

Complete Binary Tree -:


A binary tree T with n levels is complete
if all levels except possibly the last are completely full, and the last
level has all its nodes to the left side. A complete binary tree has 2k
nodes at every depth k < n and between 2n and 2n+1-1 nodes
altogether. It can be efficiently implemented as an array, where a
node at index i has children at indexes 2i and 2i+1 and a parent at
index i/2, with one-based indexing. If child index is greater than the
number of nodes, the child does not exist. A complete binary tree
can be represented in an array in the following approach. If root
node is stored at index i, its left, and right children are stored at
indices 2*i+1, 2*i+2 respectively.

Traversal:-
A traversal is a process that visits all the nodes in the tree. Since a tree
is a nonlinear data structure, there is no unique traversal.
There are three different types traversals,
PreOrder traversal - visit the parent first and then left and right children.
InOrder traversal - visit the left child, then the parent and the right child.
PostOrder traversal - visit left child, then the right child and then the parent.
There is only one kind of breadth-first traversal--the level order traversal.

For More Info visit: www.ibtindia.com or call: 94636-12090 Page 24


IBPS SO:IT OFFICER COMPUTER CRACKER

This traversal visits nodes by levels from top to bottom and from left to right. As an example consider the
following tree and its four traversals:
PreOrder - 8, 5, 9, 7, 1, 12, 2, 4, 11, 3
InOrder - 9, 5, 1, 7, 2, 12, 8, 4, 3,11
PostOrder - 9, 1, 2, 12, 7, 5, 3, 11,4, 8
In the next picture we demonstrate the order of node visitation. Number 1 denotes the first node in a particular
traversal and 7 denote the last node.

Binary Search Tree-:


We consider a particular kind of a binary tree called
a Binary Search Tree (BST). The basic idea behind this data structure is to
have such a storing repository that provides the efficient way of data sorting,
searching and retrieving. A BST is a binary tree where nodes are ordered in
the following way:
Each node contains one key (also known as data)
The keys in the left subtree are less then the key in its parent node, in short
L < P.
The keys in the right subtree are greater the key in its parent node, in short P < R.
Duplicate keys are not allowed.
In the following tree all nodes in the left subtree of 10 have keys < 10 while all nodes in the right subtree > 10.
Because both the left and right subtrees of a BST are again search trees; the above definition is recursively
applied to all internal nodes:
Heaps-:
A heap is a binary tree where the elements are arranged in a certain order proceeding from smaller to
larger. In this way, a heap is similar to a binary search tree (discussed previously), But the arrangement of the
elements in a heap follows rules that are different from a binary search tree:
1. In a heap, the element contained by each node is greater than or equal to the elements of that node's children.
2. The tree is a complete binary tree, so that every level except the deepest must contain as many nodes as
possible and at the deepest level, all the nodes are as far left as possible.

Linear Search-:
Linear search or sequential search is a method for finding a particular value in a list that consists
of checking every one of its elements, one at a time and in sequence, until the desired one is found.

Binary search-:
A binary search or half-interval search algorithm finds the position of a specified input value
(the search "key") within an array sorted by key value. For binary search, the array should be arranged in
ascending or descending order. In each step, the algorithm compares the search key value with the key value of
the middle element of the array. If the keys match, then a matching element has been found and its index is

For More Info visit: www.ibtindia.com or call: 94636-12090 Page 25


IBPS SO:IT OFFICER COMPUTER CRACKER

returned. Otherwise, if the search key is less than the middle element's key, then the algorithm repeats its
action on the sub-array to the left of the middle element or, if the search key is greater, on the sub-array to the
right. If the remaining array to be searched is empty, then the key cannot be found in the array and a special
"not found" indication is returned.
Graph-:
Data sometimes contains a relationship between
pairs of elements which is not necessarily hierarchical in
nature, e.g. an airline flights only between the cities
connected by lines. This data structure is called Graph.

Graph representation: a graph is a collection of vertices


(or nodes), pairs of which are joined by edges (or lines).

Graph operations and representation-:


1. Path problems: Since a graph may have more than one path between two vertices, we may be interested
in finding a path with a particular property. For example, find a path with the minimum length from the
root to a given vertex (node).
2. Simple path: a path in which all vertices, except possibly the first and last, are different.
3. Undirected graph: a graph whose vertices do not specify a specific direction.
4. Directed graph: a graph whose vertices do specify a specific direction.
5. Connected graph: there is at least one path between every pair of vertices.
6. Bipartite graphs: graphs that have vertexes that are partitioned into 2 subsets A and B, where every edge
has one endpoint in subset A and the other endpoint in subset B.
7. A complete graph: an n-vertex undirected graph with n(n-1)/2 edges is a complete graph.
8. A complete digraph: (denoted as Kn) for n-vertices a complete digraph contains exactly n(n-1) directed
edges
9. Incident: the edge (i, j) is incident on the vertices i and j (there is a path between i and j)
10. In-degree: the in-degree d of vertex i is the # of edges incident to i (the # of edges coming into this vertex)
11. The out-degree: the out-degree d of vertex i is the # of edges incident from vertex i (the # of edges
leaving vertex i)
12. The degree of a vertex: the degree d of vertex i of an undirected graph is the number of edges incident on
vertex i
13. Connected component: a maximal sub-graph that is connected, but you cannot add vertices and edges
from the original graph and retain connectedness. A connected graph has EXACTLY one component
14. Communication network: Each edge is a feasible link that can be constructed. Find the components and
create a small number of feasible links so that the resulting network is connected
15. Cycles: the removal of an edge that is on a cycle does not affect the networks connectedness (a cycle
creates a sort of loop between certain vertices, for example there is a path that links vertex a to b to c and
then back to a)
Spanning problems:
A spanning tree: is a sub-graph that includes all vertices of the original graph without
cycles. Start a breadth-first search at any vertex of the graph. If the graph is connected, the n-1 edges are used
to get to the unvisited vertices define the spanning tree (breadth-first Spanning tree)

For More Info visit: www.ibtindia.com or call: 94636-12090 Page 26


IBPS SO:IT OFFICER COMPUTER CRACKER

Graph search methods:


A vertex u is reachable from vertex b iff there is a path from u to b A search method
starts at a given vertex v and visits/labels/marks every vertex that is reachable from v Many graph problems are
solved using search methods.
1. Breadth-first search:
Visit the start vertex and use a FIFO queue
Repeatedly remove a vertex from the queue, visit its unvisited adjacent vertices putting the newly
visited vertices into the queue, when the queue is empty the search terminates
All vertices that are reachable from the start vertex (including the start vertex) are visited
2. Depth-first search:
Has the same complexity as breadth-first search
Has the same properties with respect to path finding, connected components, and spanning trees
Edges used to reach unvisited vertices define a depth-first spanning tree when the graph is connected
RECURSION-:
Recursion is a programming technique that allows the programmer to express operations in
terms of themselves. In C, this takes the form of a function that calls itself. A useful way to think of recursive
functions is to imagine them as a process being performed where one of the instructions is to "repeat the
process". This makes it sound very similar to a loop because it repeats the same code, and in some ways it is
similar to looping. On the other hand, recursion makes it easier to express ideas in which the result of the
recursive call is necessary to complete the task. Of course, it must be possible for the "process" to sometimes
be completed without the recursive call. One simple example is the idea of building a wall that is ten feet high;
if I want to build a ten foot high wall, and then I will first build a 9 foot high wall, and then add an extra foot of
bricks. Conceptually, this is like saying the "build wall" function takes a height and if that height is greater
than one, first calls itself to build a lower wall, and then adds one a foot of bricks.

OPERATING SYSTEM

Operating system -:
An operating system is a
program that acts as an interface between the user and
the computer hardware and controls the execution of all
kinds of programs.
Following are some of important functions of an
operating System.
1. Memory Management
2. Processor Management
3. Device Management
4. File Management
5. Security
6. Control over system performance
7. Job accounting
8. Error detecting aids
9. Coordination between other software and users
Following are some of the important activities that Operating System does.
Security -- By means of password and similar other techniques, preventing unauthorized access to
programs and data.
Control over system performance -- Recording delays between request for a service and response
from the system.
Job accounting -- Keeping track of time and resources used by various jobs and users.
Error detecting aids -- Production of dumps, traces, error messages and other debugging and error
detecting aids.

For More Info visit: www.ibtindia.com or call: 94636-12090 Page 27


IBPS SO:IT OFFICER COMPUTER CRACKER

Coordination between other software and users -- Coordination and assignment of compilers,
interpreters, assemblers and other software to the various users of the computer systems.
Types of operating System-:
1. Real Time operating System-:
Real time system is defines as a data processing system in which the
time interval required to process and respond to inputs is so small that it controls the environment. Real time
processing is always on line whereas on line system need not be real time. The time taken by the system to
respond to an input and display of required updated information is termed as response time. So in this method
response time is very less as compared to the online processing. Real-time systems are used when there are
rigid time requirements on the operation of a processor or the flow of data and real-time systems can be used
as a control device in a dedicated application. Real-time operating system has well-defined, fixed time
constraints otherwise system will fail. For example Scientific experiments, medical imaging systems, industrial
control systems, weapon systems, robots, and home-applicance controllers, Air traffic control system etc.
There are two types of real-time operating systems.
a) Hard real-time systems-: Hard real-time systems guarantee that critical tasks complete on time. In
hard real-time systems secondary storage is limited or missing with data stored in ROM. In these
systems virtual memory is almost never found.
b) Soft real-time systems-: Soft real time systems are less restrictive. Critical real-time task gets priority
over other tasks and retains the priority until it completes. Soft real-time systems have limited utility
than hard real-time systems. For example, Multimedia, virtual reality, Advanced Scientific Projects
like undersea exploration and planetary rovers etc.
2. Distributed operating System-:
Distributed systems use multiple central processors to serve multiple
real time application and multiple users. Data processing jobs are distributed among the processors
accordingly to which one can perform each job most efficiently. The processors communicate with
one another through various communication lines (such as high-speed buses or telephone lines). These
are referred as loosely coupled systems or distributed systems. Processors in a distributed system may
vary in size and function. These processors are referred as sites, nodes, computers and so on.
3. Time-sharing operating systems-:
Time sharing is a technique which enables many people, located at
various terminals, to use a particular computer system at the same time. Time-sharing or multitasking is a
logical extension of multiprogramming. Processor's time which is shared among multiple users simultaneously
is termed as time-sharing. The main difference between Multiprogrammed Batch Systems and Time-Sharing
Systems is that in case of Multiprogrammed batch systems, objective is to maximize processor use, whereas in
Time-Sharing Systems objective is to minimize response time. Multiple jobs are executed by the CPU by
switching between them, but the switches occur so frequently. Thus, the user can receive an immediate
response. Operating system uses CPU scheduling and multiprogramming to provide each user with a small
portion of a time. Computer systems that were designed primarily as batch systems have been modified to
time-sharing systems.
Advantages of Timesharing operating systems are following-:
Provide advantage of quick response.
Avoids duplication of software.
Reduces CPU idle time.
Disadvantages of Timesharing operating systems are following.
Problem of reliability.
Question of security and integrity of user programs and data.
Problem of data communication.
4. Batch operating system-:
The users of batch operating system do not interact with the computer directly.
Each user prepares his job on an off-line device like punch cards and submits it to the computer operator. To
speed up processing, jobs with similar needs are batched together and run as a group. Thus, the programmers
left their programs with the operator. The operator then sorts programs into batches with similar requirements.

For More Info visit: www.ibtindia.com or call: 94636-12090 Page 28


IBPS SO:IT OFFICER COMPUTER CRACKER

5. Multitasking -:
Multitasking refers to term where multiple
jobs are executed by the CPU simultaneously by switching
between them. Switches occur so frequently that the users
may interact with each program while it is running. Operating
system does the following activities related to multitasking.
The user gives instructions to the operating system or to a
program directly, and receives an immediate response.
Operating System handles multitasking in the way that it can
handle multiple operations / executes multiple programs at a
time. Multitasking Operating Systems are also known as
Time-sharing systems. These Operating Systems were developed to provide interactive use of a computer
system at a reasonable cost.
A time-shared operating system uses concept of CPU scheduling and multiprogramming to provide each user
with a small portion of a time-shared CPU. Each user has at least one separate program in memory.

6. Multiprogramming-:
When two or more
programs are residing in memory at the same
time, then sharing the processor is referred to the
multiprogramming. Multiprogramming assumes a
single shared processor. Multiprogramming
increases CPU utilization by organizing jobs so
that the CPU always has one to execute.
Following figure shows the memory layout for a
multiprogramming system. Operating system does
the following activities related to
multiprogramming.
The operating system keeps several jobs in memory at a time.
This set of jobs is a subset of the jobs kept in the job pool.
The operating system picks and begins to execute one of the job in the memory.
Multiprogramming operating system monitors the state of all active programs and system resources
using memory management programs to ensures that the CPU is never idle unless there are no jobs
Advantages
High and efficient CPU utilization.
User feels that many programs are allotted CPU almost simultaneously.
Disadvantages
CPU scheduling is required.
To accommodate many jobs in memory, memory management is required.
Spooling -:
Spooling is an acronym for simultaneous peripheral
operations on line. Spooling refers to putting data of various I/O
jobs in a buffer. This buffer is a special area in memory or hard
disk which is accessible to I/O devices. Operating system does the
following activates related to distributed environment. OS handles
I/O device data spooling as devices have different data access
rates. OS maintains the spooling buffer which provides a waiting
station where data can rest while the slower device catches up. OS
maintains parallel computation because of spooling process as a
computer can perform I/O in parallel fashion. It becomes possible
to have the computer read data from a tape, write data to disk and
to write out to a tape printer while it is doing its computing task.

For More Info visit: www.ibtindia.com or call: 94636-12090 Page 29


IBPS SO:IT OFFICER COMPUTER CRACKER

Advantages-:
The spooling operation uses a disk as a very large buffer. Spooling is capable of overlapping I/O
operation for one job with processor operations for another job.
Process-:
A process is a program in execution. The execution of a process must progress in a sequential
fashion. Definition of process is following. A process is defined as an entity which represents the basic unit of
work to be implemented in the system.
Program-:
A program by itself is not a process. It is a static entity made up of program statement while process
is a dynamic entity. Program contains the instructions to be executed by processor. A program takes a space at
single place in main memory and continues to stay there. A program does not perform any action by itself.
Process States-:
As a process executes, it changes state. The state of a process is defined as the current activity
of the process. Process can have one of the following five states at a time.

S.N. State & Description


1 New: The process is being created.
2 Ready: The process is waiting to be assigned to a processor. Ready processes are waiting to have
the processor allocated to them by the operating system so that they can run.
3 Running: Process instructions are being executed (i.e. The process that is currently being executed).
4 Waiting: The process is waiting for some event to occur (such as the completion of an I/O
operation).
5 Terminated: The process has finished execution.

Process Control Block (PCB) -:


Each process is represented in the operating system by a process control
block (PCB) also called a task control block. PCB is the data structure used by the operating system. Operating
system groups all information that needs about particular process. PCB contains many pieces of information
associated with a specific process which are described below.

S.N. Information & Description


1 Pointer: Pointer points to another process control block. Pointer is used for maintaining the
scheduling list.
2 Process State : Process state may be new, ready, running, waiting and so on.
3 Program Counter: Program Counter indicates the address of the next instruction to be executed for
this process.
4 CPU registers: CPU registers include general purpose register, stack pointers, index registers and
accumulators etc. number of register and type of register totally depends upon the computer
architecture.
5 Memory management information: This information may include the value of base and limit
registers, the page tables, or the segment tables depending on the memory system used by the
operating system. This information is useful for deallocating the memory when the process
terminates.
6 Accounting information: This information includes the amount of CPU and real time used, time
limits, job or process numbers, account numbers etc.

Process control block includes CPU scheduling, I/O resource management, file management information etc.
The PCB serves as the repository for any information which can vary from process to process. Loader/linker
sets flags and registers when a process is created. If that process get suspended, the contents of the registers are
saved on a stack and the pointer to the particular stack frame is stored in the PCB. By this technique, the
hardware state can be restored so that the process can be scheduled to run again.

For More Info visit: www.ibtindia.com or call: 94636-12090 Page 30


IBPS SO:IT OFFICER COMPUTER CRACKER

Schedulers-:
Schedulers are special system softwares which handles process scheduling in various ways.
Their main task is to select the jobs to be submitted into the system and to decide which process to run.
Schedulers are of three types-
Long Term Scheduler
Short Term Scheduler
Medium Term Scheduler
Long Term Scheduler -:
It is also called job scheduler. Long term scheduler determines which programs are
admitted to the system for processing. Job scheduler selects processes from the queue and loads them into
memory for execution. Process loads into the memory for CPU scheduling. The primary objective of the job
scheduler is to provide a balanced mix of jobs, such as I/O bound and processor bound. It also controls the
degree of multiprogramming. If the degree of multiprogramming is stable, then the average rate of process
creation must be equal to the average departure rate of processes leaving the system. On some systems, the
long term scheduler may not be available or minimal. Time-sharing operating systems have no long term
scheduler. When process changes the state from new to ready, then there is use of long term scheduler.
Short Term Scheduler-:
It is also called CPU scheduler. Main objective is increasing system performance in
accordance with the chosen set of criteria. It is the change of ready state to running state of the process. CPU
scheduler selects process among the processes that are ready to execute and allocates CPU to one of them.
Short term scheduler also known as dispatcher, execute most frequently and makes the fine grained decision of
which process to execute next. Short term scheduler is faster than long term scheduler.
Medium Term Scheduler-:
Medium term scheduling is part of the swapping. It removes the processes from
the memory. It reduces the degree of multiprogramming. The medium term scheduler is in-charge of handling
the swapped out-processes. Running process may become suspended if it makes an I/O request. Suspended
processes cannot make any progress towards completion. In this condition, to remove the process from
memory and make space for other process, the suspended process is moved to the secondary storage. This
process is called swapping, and the process is said to be swapped out or rolled out. Swapping may be
necessary to improve the process mix. Comparison between Scheduler-:

S.N. Long Term Scheduler Short Term Scheduler Medium Term Scheduler
1 It is a job scheduler It is a CPU scheduler It is a process swapping scheduler.
2 Speed is lesser than short Speed is fastest among Speed is in between both short and long
term scheduler other two term scheduler.
3 It controls the degree of It provides lesser control It reduces the degree of multiprogramming.
multiprogramming over degree of
multiprogramming
4 It is almost absent or It is also minimal in time It is a part of Time sharing systems.
minimal in time sharing sharing system
system
5 It selects processes from It selects those processes It can re-introduce the process into memory
pool and loads them into which are ready to and execution can be continued.
memory for execution execute

Scheduling Algorithms-: there are different types of algorithms that are given below
1. First Come First Serve (FCFS) Scheduling 2. Shortest-Job-First (SJF) Scheduling
3. Priority Scheduling 4. Round Robin(RR) Scheduling
5. Multilevel Queue Scheduling

For More Info visit: www.ibtindia.com or call: 94636-12090 Page 31


IBPS SO:IT OFFICER COMPUTER CRACKER

Thread-:
A thread is a flow of execution through the process code, with its own program counter, system
registers and stack. A thread is also called a light weight process. Threads provide a way to improve
application performance through parallelism. Threads represent a software approach to improving performance
of operating system by reducing the overhead thread is equivalent to a classical process. Each thread belongs
to exactly one process and no thread can exist outside a process. Each thread represents a separate flow of
control. Threads have been successfully used in implementing network servers and web server. They also
provide a suitable foundation for parallel execution of applications on shared memory multiprocessors.
Following figure shows the working of the single and multithreaded processes.
Difference between Process and Thread

S.N. Process Thread


1 Process is heavy weight or resource intensive. Thread is light weight taking lesser resources
than a process.
2 Process switching needs interaction with operating Thread switching does not need to interact
system. with operating system.
3 In multiple processing environments each process All threads can share same set of open files,
executes the same code but has its own memory and child processes.
file resources.
4 If one process is blocked then no other process can While one thread is blocked and waiting,
execute until the first process is unblocked. second thread in the same task can run.
5 Multiple processes without using threads use more Multiple threaded processes use fewer
resources. resources.
6 In multiple processes each process operates One thread can read, write or change another
independently of the others. thread's data.

Difference between User Level & Kernel Level Thread-:

S.N. User Level Threads Kernel Level Thread


1 User level threads are faster to create and Kernel level threads are slower to create and
manage. manage.
2 Implementation is by a thread library at the user Operating system supports creation of Kernel
level. threads.
3 User level thread is generic and can run on any Kernel level thread is specific to the operating
operating system. system.
4 Multi-threaded application cannot take advantage Kernel routines themselves can be multithreaded.
of multiprocessing.

Swapping- :
Swapping is a mechanism in which a process can be swapped temporarily out of main memory to
a backing store, and then brought back into memory for continued execution. Backing store is a usually a hard
disk drive or any other secondary storage which fast in access and large enough to accommodate copies of all
memory images for all users. It must be capable of providing direct access to these memory images. Major
time consuming part of swapping is transfer time. Total transfer time is directly proportional to the amount of
memory swapped. Let us assume that the user process is of size 100KB and the backing store is a standard
hard disk with transfer rate of 1 MB per second. The actual transfer of the 100K process to or from memory
will take 100KB / 1000KB per second
= 1/10 second
= 100 milliseconds

For More Info visit: www.ibtindia.com or call: 94636-12090 Page 32


IBPS SO:IT OFFICER COMPUTER CRACKER

Fragmentation- :
As processes are loaded and removed from memory, the free memory space is broken into
little pieces. It happens after sometimes that processes cannot be allocated to memory blocks considering their
small size and memory blocks remains unused. This problem is known as Fragmentation.
Paging-:
External fragmentation is avoided by using paging technique. Paging is a technique in which physical
memory is broken into blocks of the same size called pages (size is power of 2, between 512 bytes and 8192
bytes). When a process is to be executed, it's corresponding pages are loaded into any available memory
frames. Logical address space of a process can be non-contiguous and a process is allocated physical memory
whenever the free memory frame is available. Operating system keeps track of all free frames. Operating
system needs n free frames to run a program of size n pages. Address generated by CPU is divided into
Page number (p) - page number is used as an index into a page table which contains base address of each
page in physical memory.
Page offset [D] - page offset is combined with base address to define the physical memory address.

Segmentation-:
Segmentation is a technique to break memory into logical pieces where each piece represents a
group of related information. For example, data segments or code segment for each process, data segment for
operating system and so on. Segmentation can be implemented using or without using paging. Unlike paging,
segment are having varying sizes and thus eliminates internal fragmentation. External fragmentation still exists
but to lesser extent.

Deadlocks-:
Deadlocks are a set of blocked processes each
holding a resource and waiting to acquire a resource held by
another process.
How to avoid Deadlocks-:
Deadlocks can be avoided by
avoiding at least one of the four conditions, because all this four
conditions are required simultaneously to cause deadlock.
1. Mutual Exclusion-:
Resources shared such as read-only files do
not lead to deadlocks but resources, such as printers and tape drives, requires exclusive access by a single
process.
2. Hold and Wait-:
In this condition processes must be prevented from holding one or more resources while
simultaneously waiting for one or more others.
3. No Preemption-:
Preemption of process resource allocations can avoid the condition of deadlocks, where
ever possible.
4. Circular Wait-:
Circular wait can be avoided if we number all resources, and require that processes request
resources only in strictly increasing (or decreasing) order.

Handling Deadlock-:
The above points focus on preventing deadlocks. But what to do once a deadlock has
occurred. Following three strategies can be used to remove deadlock after its occurrence.

1. Preemption-:
We can take a resource from one process and give it to other. This will resolve the deadlock
situation, but sometimes it does causes problems.

For More Info visit: www.ibtindia.com or call: 94636-12090 Page 33


IBPS SO:IT OFFICER COMPUTER CRACKER

2. Rollback-:
In situations where deadlock is a real possibility, the system can periodically make a record of
the state of each process and when deadlock occurs, roll everything back to the last checkpoint, and restart, but
allocating resources differently so that deadlock does not occur.

3. Kill one or more processes-: This is the simplest way, but it works.

For IBPS- HR and


PERSONNEL Officer
Exams download this
file -

For Basic of computer download this file From-www.ibtindia.com

For More Info visit: www.ibtindia.com or call: 94636-12090 Page 34


IBPS SO:IT OFFICER COMPUTER CRACKER

[B] Cell switched network


[C] Circuit switched network
[D] All of the above
[E] None of the above
Ans:-A
7. Which of the following methods are NOT
used by Kerberos to establish a secure
connection between the client and the target
1. Which of the following is to be done the server?
auditor while internet banking services audit? [A] OCR [B] Secret key
[A] Tour the server room [C] Password [D] Al of these
[B] The user is not allowed to login after defined [E] None of these
repeated failed attempts Ans:-C
[C] Contract clearly states the services that will be 8. ____________ is the process of organizing
provided by the vendor data in tables with the object of elimination
[D] All of the above redundancy and inconsistent dependency.
[E] None of these [A] Data modeling [B] Normalization
Ans:-A [C] Data mining [D] All of these
2. ___________ can be one of the approach used [E] None of these
to tax online transactions. Ans:-B
[A] Permanent establishment [B] Residence 9. Which can be used for development for an
based application?
[C] Income based classification [D] All of the [A] Data [B] Human factor
above [C] Technology [D] All of these
[E] None of these [E] None of these.
Ans:-D Ans:-D
3. To stop unauthorized access to the computer 10. The security features of the application
systems we should: should be the time of
[A] Have a trust worthy system administrator [A] Programming phase [B] Conceptual design
[B] Have a sound encryption policy [C] Testing phase [D] All of these
[C] Have as good password policy [E] None of these
[D] All of the above Ans:-B
[E] None of these 11. Which of the following statements is
Ans:-C FALSE pegarding selection of hardware /
4. An attack on network will not bother to do: software?
[A] Network Investigation [A] Budget allocated for application is limited to
[B] Network Management hardware and software cost.
[C] Access Gaining [B] The application should be easy to use by
[D] Escaping programming rather than by the end user
[E] None of these [C] The requirement for the application should be
Ans:- B decided
5. Which of the following details do you think [D] All of these are false
should be checked on security breaches? [E] None of these
[A] Authorized access to system resources Ans:-B
[B] Un-authorized access to system 12. A good data base should have
[C] Un-authorized attempts to change security [A] Financial stability of the vendor
definitions [B] Scope for achieves
[D] All of the above [C] Provision for data integrity and system
[E] None of these integrity
Ans:-D [D] All of the above
6. The internet is an example of a: [E] None of these
[A] Packet switched network Ans:-D

For More Info visit: www.ibtindia.com or call: 94636-12090 Page 35


IBPS SO:IT OFFICER COMPUTER CRACKER

13. To check if data that is being entered does [C] Mainframe scheduling
not have blanks, we have [D] Automated scheduling
[A] A mathematically calculated check digit [E] None of these
[B] Control check to verify if the data is in Ans:-C
accordance to predetermined criteria. 21. MICR devices can read:
[C] Completeness check [A] Characters [B] Numbers
[D] All of these [C] Both of these [D] All of these
[E] None of these [E] None of these
Ans:-C Ans:-C
14. A detective control is used to check if 22. Auxiliary storage consists of
correct numbers are keyed in [A] Magnetic tapes [B] CDs
[A] Sequence check [B] Manual check [C] Both of these [D] All of these
[C] Check digits [D] All of these [E] None of these
[E] None of these Ans:-A
Ans:-C 23. Who can provides access rights to users?
15. On August 23, 2005, an accounting clerk [A] Data custodian [B] Data owner
prepared an invoice dated August 31,2005, [C] The data base administrator [D] Management
Which control can check this? [E] None of these
[A] Size check [B] Hash total Ans:-C
[C] Range check [D] All of the above 24. Security policy of an organization need not
[E] None of these have
Ans:-C [A] The overall security philosophy of the
16. Processing control procedures have organization
[A] Authorization and authentication of users [B] The authorization procedure for accessing data
[B] Access control for online data [C] Security awareness program
[C] Reporting of before and after images [D] Highlights and identity of the sensitive
[D] All of these security features
[E] None of these [E] None of these
Ans:-D Ans:-D
17. Which cannot assure data accuracy in an 25. In case of a virus getting into computer,
application? which of the following will help?
[A] Control total [A] Encryption [B] NORTON
[B] Limit and reasonableness test [C] Police complaint [D] All of these
[C] Echo checking [E] None of these
[D] All of these Ans:-B
[E] None of these 26. Which of the following do you think is NOT
Ans:-C necessary for computerization system in a
18. A computer works faster with bank?
[A] GUI [B] Mouse [A] Effective customer service
[C] Keyboard [D] All of these [B] Effective back office integration
[E] None of these [C] Focus on manual records
Ans:-A [D] All of these
19. SMTP protocol is used for [E] None of these
[A] Sending email messages between servers Ans:-C
[B] Sits between client server 27. BCNF is needed because:
[C] Transmit news to all clients [A] Otherwise tuples may be duplicated
[D] All of the above [B] When a data is deleted tuples may be lost
[E] None of these [C] Updating is otherwise is difficult
Ans:-A [D] When there is dependent attributes in two
20. Which form of job scheduling uses triggers? possible composite keys one of the attribute is
[A] Manual scheduling unnecessarily duplicated in the tuples.
[B] Distributed scheduling [E] None of these

For More Info visit: www.ibtindia.com or call: 94636-12090 Page 36


IBPS SO:IT OFFICER COMPUTER CRACKER

Ans:-D [A] Data can be facts / figures / letters / words


28. Which of the following is reliable service? symbols etc. that represent an idea or object
[A] TCP [B] Data is raw material from which information is
[B] UDP derived.
[C] Both [A] & (2) [C] Data is numbers, alphabets
[D] Either [A] nor (2) [D] All the above
[E] None of these [E] None of these
Ans:-A Ans:-A
29. Firewall is used in PC for 37. Maximum storage space is available on
[A] Security [B] Authentication [A] CDs [B] Floppies
[C] Data transmission [D] All of these [C] ROM [D] Hard disc
[E] None of these [E] None of these
Ans:-A Ans:-D
30. A transmission in which receiver receives 38. ____________ deals with the restructuring
the data simultaneously as it is relayed is called of existing source code in reverse engineering.
[A] Video-conferencing [A] Abstraction [B] Completeness
[B] Online transmission [C] Users screen [D] Directionality
[C] Real-time transmission [E] None of these
[D] Offline transmission Ans:-D
[E] None of these 39. Which of the following person should be
Ans:-C made responsible for reporting maintenance
31. A protocol is: problems in a LAN?
[A] Service that helps in communicating [A] Network administrator [B] Users
[B] Rules that help computer talk [C] Security officer [D] All the above
[C] Way of transmission data over the net [E] None of these
[D] All of these Ans:-B
[E] None of these 40. Software change management decides:
Ans:-B [A] How to manage alternations, irrespective of
32. Which of the following are relational the stage of the life cycle of a product
integrity constraints? [B] Development stages working
[A] Null value [B] Primary key [C] Maintenance stages working
[C] Referential integrity [D] All the above [D] All the above
[E] None of these [E] None of these
Ans:-D Ans:-A
33. Which of the following do think is NOT to 41. Address Resolution Protocol (ARP) is used
develop an application for computer? for:
[A] Feasibility study [B] Designing [A] Relating IP Address to Ethernet addresses
[C] Testing [D] All the above [B] Preventing two computers from using the same
[E] None of these IP address
Ans:-D [C] Enables a workstation to know its IP address
34. Binary equivalent to 87 is: by broad casting its local address
[A] 1010111 [B] 1101111 [D] All the above
[C] 1011111 [D] 10111111 [E] None of these
[E] None of these Ans:-A
Ans:-A 42. How many rollers are actually responsible
35. In binary system the highest value of an 8- for movement of the cursor in the mouse?
bit number is [A] 1 [B] 2
[A] 255 [B] 256 [C] 3
[C] 253 [D] 259 [D] Depends from mouse to mouse
[E] None of these [E] None of these
Ans:-A Ans:-B
36. Which of them is true?

For More Info visit: www.ibtindia.com or call: 94636-12090 Page 37


IBPS SO:IT OFFICER COMPUTER CRACKER

43. Which of there can have more than one [A] Hardware and software [B] Input and Output
value? [C] Keyboard and Printer [D] All the above
[A] A composite attribute [E] None of these
[B] A multi valued attribute Ans:-A
[C] A Derived attribute 50. Address Resolution Protocol (ARP) is used
[D] All the above for:
[E] None of these [A] Relating IP Address to Ethernet addresses
Ans:-A [B] Preventing two computers from using the same
44. Which of the following do you think is NOT IP address.
true for SNMP? [C] Enables a workstation to know its IP address
[A] It is connection less protocol by broad casting its local address.
[B] It guarantees data transmission [D] All the above
[C] It can accommodate devices from different [E] None of these
vendors Ans:-A
[D] All the above 51. How many click are actually in the mouse?
[E] None of these [A] 1
Ans:-C [B] 2
45. What are the facilities offered by tale- [C] 3
banking? [D] Depends from mouse to mouse
[A] Balance enquiries [E] None of these
[B] Enquiries about the specific transaction Ans:-B
[C] Transfer of funds 52. Which of there can have more than one
[D] All the above value?
[E] None of these [A] A composite attribute
Ans:-C [B] A multi valued attribute
46. Approval for software projects has to be [C] A Derived attribute
done by [D] All the above
[A] The project head [E] None of these
[B] The user department head Ans:-A
[C] The senior management 53. How many layers in OSI Model?
[D] All the above [A] 8 [B] 4
[E] None of these [C] 7 [D] 5
Ans:-C [E] None of these
47. The base line for a software in term if Ans:-C
software configuration management 54. Which layer is reasonable for the user
[A] Point of latest release of the software interface?
[B] Point of latest change of the software [A] Physical Layer
[C] Point of change approved in the software and [B] Application Layer
added to the project data base [C] Data Link Layer
[D] All the above [D] All the above
[E] None of 1these [E] None of these
Ans:-C Ans:-B
48. The purpose of using computer in an 55. Approval for software projects has to be
organization is _____________? done by
[A] To produce image, texts, reports etc. [A] The project head
[B] To be able get on the internet [B] The user department head
[C] To process data in to information [C] The senior management
[D] All the above [D] All the above
[E] None of these [E] None of these
Ans:-C Ans:-C
49. Which of the following mandatory parts of 56. The base line for a software in term if
complete PC system? software configuration management

For More Info visit: www.ibtindia.com or call: 94636-12090 Page 38


IBPS SO:IT OFFICER COMPUTER CRACKER

[A] Point of latest release of the software [A] A compiler using static memory, allocation
[B] Point of latest change of the software can be written for L.
[C] Point of change approved in the software and [B] A compiler cannot be written L: an interpreter
added to the project data base must be used
[D] All the above [C] A compiler using dynamic memory allocation
[E] None of 1these can be written
Ans:-C [D] All of the above
57. The purpose of using computer in an [E] None of these
organization is _____________? Ans:-C
[A] To produce image, texts, reports etc. 64. Which of the following systems
[B] To be able get on the internet implementation approaches should be used if
[C] To process data in to information you want to run the old system and the new
[D] All the above system at the same time for a specified period?
[E] None of these [A] Direct [B] Pilot
Ans:-C [C]Phased [D]Parallel
58. Which of the following mandatory parts of [E] None of these
complete PC system? Ans:-D
[A] Hardware and software [B] Input and Output 65. In open (), the mode, that opens a binary file
[C] Keyboard and Printer [D] All the above for readings is
[E] None of these [A] r [B] r+
Ans:-A [C] rb [D] r+b
59. The elements of computer processing system [E] None of these
are Ans:-C
[A] Hardware, software, information &people 66. Dirty bit for a page in a page table
[B] Hardware, programs, and people [A] Helps avoid unnecessary writers on a paging
[C] Hardware, Data, users, and procedures device
[D] All the above [B] Helps maintain LRU information
[E] None of these [C]Allows only read on as page
Ans:-C [D] All the above
60. What are the safest ways to edit registry in [E] None of these
win 95? Ans:-A
[A] Edit [B] REGEDIT 67. Which of the following is not a logical
[C] DEVICE MANAGER [D] Control Panel database structure?
Applets [A] Tree [B] Relational
[E] None of these [C] Network [D] Chain
Ans:-D [E] None of these
61. Input of Lex is ----- Ans:-D
[A] Set a regular expression [B] Statement 68. Which is not included in the UNIX file
[C] Numeric data [D] ASCII code system?
[E] None of these [A] Bin [B] Usr
Ans:-A [C] DevQ [D] All the above
62. Stack is structure. [E] None of these
[A] Last in first out (LIFO) Ans:-D.
[B] First in First out (FIFO) 69. The idea of automation with a stack as
[C] First in Last out (FILO) auxiliary storage----
[D] First come First served (FCFS) [A] Finite automata
[E] None of these [B] Pushdown automata
Ans:-A [C] Deterministic automata
63. A language L allows declaration of arrays [D] All the above
whose sizes are not known during compilation. [E] None of these
It is required to use efficient use of memory, Ans:-B
which one of the following is true?

For More Info visit: www.ibtindia.com or call: 94636-12090 Page 39


IBPS SO:IT OFFICER COMPUTER CRACKER

70. Which of the following derivations does a 77. Which of the following circuit type is based
top-down parser while parsing an input string? up on time or clock pulse?
The input is assumed to be scanned in left to right [A] Combinational circuit
order. [B] Sequential circuit
[A] Left most derivation [C] Full adder
[B] Left most derivation traced out in reverse [D] All the above
[C] Right most derivation [E] None of these
[D] Right most derivation traced out in reverse Ans:-B
[E] None of these 78. A solution to the problem were the source
Ans:-A and destination hosts are on the same type of
71. Layer one of the OSI model is: network, but there is a
[A] Physical layer [B] Link layer different network in between------
[C] Transport layer [D] Network layer [A] Data link [B] Packet
[E] None of these [C] Tunneling [D] Hopping
Ans:-A [E] None of these
72. IE uses Ans:-C
[A] Active X controls for interaction between 79. Which is true?
browser and third party application and the [A] Functional testing is called black box testing
operating system [B] Structure testing is called glass box testing
[B] Active X control for browser and operating [C] Glass box testing is called white box testing
system [D] All the above
[C] Both 1 and 2 [E] None of these
[D] Active X controls for only operating system Ans:-D
[E] None of these 80. Storage class defines
(Ans):-A [A] The data type [B] The scope
73. Parsing is also known as ---------- [C] The scope and performance
[A] Lexical analysis [B] Syntax analysis [D] The scope, performance and data type
[C] Semantic analysis [D] Code generation [E] None of these
[E] None of these (Ans):-C
Ans:-B 81. 128.167.152.2 is a class________ address
74. The derivation will be called .derivation [A] A [B] B
if the non-terminal symbol replaced at every [C] C [D] D
step is [E] None of these
the left most non-terminal symbol in the string. (Ans):-B
[A] Left shifting [B] Left recursion 82. DMA is
[C] Left most [D] Left pushdown [A] High speed I/O devices
[E] None of these [B] It transfers blocks of data directly to and from
Ans:-C its own buffer storage to memory
75. Who provide the leased line? [C] In DMA transfer for I/O, CPU has no
[A] WWW [B]TCP/IP intervention
[C] ISDN [D] ISP [D] All the above
[E] None of these [E] None of these
Ans:-D Ans:-D
76. Master slave flip-flop is also referred to as 83. Randomized quick sort is an extension of
the. quick sort where the pivot is chosen randomly.
[A] Level triggered flip-flop What is the worst case complexity of sorting n
[B] Pulse triggered flip-flop numbers using randomized quick sort?
[C] Edge triggered flip-flop [A] 0 (n) [B] 0 (n log n)
[D] All the above [C] 0 (n2) [D] 0 (log n)
[E] None of these [E] None of these
Ans:-B Ans:-B
84. CIDR (Classless inter Domain Routing)

For More Info visit: www.ibtindia.com or call: 94636-12090 Page 40


IBPS SO:IT OFFICER COMPUTER CRACKER

[A] It is used in class C Networks 90.What happens if you digitally sign and inject
[B] It is used in class B Networks footer on an e-mail message in the order?
[C] It is used in class A Network [A] Nothing
[D] All the above [B] The message wont be sent.
[E] None of these [C] The footer will invalidate the signature.
Ans:-A [D] The footer will be illegible.
[E] None of these
85. What type of attack do some firewalls try to Ans:-C
limit by enforcing rules on how long a GET or 91. This is a class of programs that searches
POST request can be? your hard drive and floppy disks for any known
[A] Smurf or potential virus:
[B] Denial of service [A] Intrusion Detection
[C] Buffer overflow [B] Security identifier
[D] LAND [C] Antigen
[E] None of these [D] Probe
Ans:-C [E] Antivirus software
86. This is a documents that states in writing Ans:-E
how a company plans to protect the companys 93. Which of them is not an input control type?
physical [A] Unintentional entry of wrong data
and IT assets : [B] Preparation of false input forms
[A] Data Encryption Standard [C] Intentional entry of fraudulent data
[B] Security Policy [D] Use of unauthorized Input forms
[C] Public Key Certificate [E] Password secrecy
[D] Access Control List Ans:-E
[E] Copyright 94. Which cannot assure data accuracy in an
Ans:-B application?
87. Which are examples of IPS (Intrusion [A] Control total
Protection system) ? [B] Limit and reasonableness test
[A] Solar Open Design Wall [C] Echo checking
[B] Grsecurity [D] All of these
[C] LOMAC [E] None of these
[D] All of the above Ans:-C
[E] None of these 95. A computer works faster with
Ans:-D [A] GUI
88. Which of the following are methods of [B] Mouse
Network Security? [C] Keyboard
[A] VPN [D] All of these
[B] Encryption [E] None of these
[C] Honey pots Ans:-C
[D] Firewall 96. Which form of job scheduling uses triggers?
[E] All of the above [A] Manual scheduling
Ans:-E [B] Distributed scheduling
89. This is a set of related programs, usually [C] Mainframe scheduling
located at a network gateway server, that [D] Automated scheduling
protects the resources of a private network [E] None of these
from other network: Ans:-C
[A] Firewall 97. MICR devices can read:
[B] Root kit [A] Letters
[C] Sandbox [B] Numbers
[D] Password Cracker [C] Both of these
[E] None of these [D] All of these
Ans:-A [E] None of these

For More Info visit: www.ibtindia.com or call: 94636-12090 Page 41


IBPS SO:IT OFFICER COMPUTER CRACKER

Ans:-B [B] Authentication


98. Auxiliary storage consists of [C] Data transmission
[A] Magnetic tapes [D] All of these
[B] CDs [E] None of these
[C] Both of these Ans:-A
[D] All of these 105. A transmission in which receiver receives
[E] None of these the data simultaneously as it is relayed is called
Ans:-A [A] Video-conferencing
[B] Online transmission
99. Who can provides access rights to users? [C] Real-time transmission
[A] Data custodian [D] Offline transmission
[B] Data owner [E] None of these
[C] The data base administrator Ans:-C
[D] Management 106. Which of the following are relational
[E] None of these integrity constraints?
Ans:-C [A] Null value
100. Security policy of an organization need not [B] Prim any key
have [C] Referential integrity
[A] The overall security philosophy of the [D] All the above
organization [E] None of these
[B] The authorization procedure for accessing data Ans:-D
[C] Security awareness program 107. Which of the following do think is NOT to
[D] Highlights and identity of the sensitive develop an application for computer?
security features [A] Feasibility study
[E] None of these [B] Designing
Ans:-D [C] Testing
101. In case of a virus getting into computer, [D] All the above
which of the following will help? [E] None of these
[A] Encryption Ans:-D
[B] NORTON 108. Binary equivalent to 87 is:
[C] Police complaint [A] 1010111
[D] All of these [B] 1101111
[E] None of these [C] 1011111
Ans:-B [D] 10111111
102. Which of the following do you think is [E] None of these
NOT necessary for computerization system in a Ans:-A
bank? 109. Maximum storage space is available on
[A] Effective customer service [A] CDs
[B] Effective back office integration [B] Floppies
[C] Focus on manual records [C] ROM
[D] All of these [D] Hard disc
[E] None of these [E] None of these
Ans:-C Ans:-D
103. Which of the following is reliable service? 110. ____________ deals with the restructuring
[A] TCP of existing source code in reverse engineering.
[B] UDP [A] Abstraction
[C] Both [A] & (2) [B] Completeness
[D] Either [A] nor (2) [C] Users screen
[E] None of these [D] Directionality
Ans:-A [E] None of these
104. Firewall is used in PC for Ans:-D
[A] Security

For More Info visit: www.ibtindia.com or call: 94636-12090 Page 42


IBPS SO:IT OFFICER COMPUTER CRACKER

111. Which of the following person should be 117. The purpose of using computer in an
made responsible for reporting maintenance organization is _____________?
problems in a LAN? [A] To produce image, texts, reports etc.
[A] Network administrator [B] To be able get on the internet
[B] Users [C] To process data in to information
[C] Security officer [D] All the above
[D] All the above [E] None of these
[E] None of these Ans:-C
Ans :-B 118. Which of the following mandatory parts of
112. Software change management decides: complete PC system?
[A] How to manage alternations, irrespective of [A] Hardware and software
the stage of the life cycle of a product [B] Input and Output
[B] Development stages working [C] Keyboard and Printer
[C] Maintenance stages working [D] All the above
[D] All the above [E] None of these
[E] None of these Ans:-A
Ans:-A 119. The elements of computer processing
113. Address Resolution Protocol (ARP) is used system are
for: [A] Hardware, software, information &people
[A] Relating IP Address to Ethernet addresses [B] Hardware, programs, and people
[B] Preventing two computers from using the same [C] Hardware, Data, users, and procedures
IP address [D] All the above
[C] Enables a workstation to know its IP address [E] None of these
by broad casting its local address Ans:-C
[D] All the above 120. To stop unauthorized access to the
[E] None of these computer systems we should:
Ans:-A [A] Have a trust worthy system administrator
114. Which of there can have more than one [B] Have a sound encryption policy
value? [C] Have as good password policy
[A] A composite attribute [D] All of the above
[B] A multi valued attribute [E] None of these
[C] A Derived attribute Ans:-C
[D] All the above 121. An attack on network will not bother to do:
[E] None of these [A] Network Investigation
Ans:-A [B] Network Management
115. Which of the following do you think is [C] Access Gaining
NOT true for SNMP? [D] Escaping
[A] It is connection less protocol [E] None of these
[B] It guarantees data transmission Ans:-B
[C] It can accommodate devices from different 122. Which of the following details do you think
vendors should be checked on security breaches?
[D] All the above [A] Authorized access to system resources
[E] None of these [B] Un-authorized access to system
Ans:-C [C] Un-authorized attempts to change security
116. Approval for software projects has to be definitions
done by: [D] All of the above
[A] The project head [E] None of these
[B] The user department head Ans:-D
[C] The senior management 123. The internet is an example of a:
[D] All the above [A] Packet switched network
[E] None of these [B] Cell switched network
Ans:-C [C] Circuit switched network

For More Info visit: www.ibtindia.com or call: 94636-12090 Page 43


IBPS SO:IT OFFICER COMPUTER CRACKER

[D] All of the above [C]Locked cell


[E] None of the above [D]data
Ans:-A Ans-A
124. Which is not a characteristics of a process? 131. The traditional file processing approach to
[A] Process is always measurable information systems results in a great deal of:
[B] Process always delivers specific results [A]loss of dat[A]
[C] Process always responds to specific events [B]data extraction.
[D] Process always is necessary [C]data redundancy.
[E] None of these [D]data integrity.
Ans : D Ans-C
125. E-mail services for a particular 132. This is a collection of related files in which
department needs encryption and secure each table contains data concerning only a
backups is example of: single entity.
[A] Corporate level SLA [A]Database
[B] Customer level SLA [B]Spreadsheet
[C] Service level SLA [C]Data set
[D] All of these [D]Presentation
[E] None of these Ans-A
Ans : C 133. What is the name for the rules that data
126. An instruction to the program to perform a must follow to maintain integrity?
calculation is a: [A] Data standards
[A]recalculation. [B]Integrity rules
[B]solution. [C]Integrity constraints
[C]formula. [D]Database constraints
[D]calculation. Ans-C
Ans-C 134. A software package that allows the user to
127. What represents business data in a visual, create a database, enter data into the database,
easily understood format? modify the data as required, and retrieve
[A]Clip art information from the database is a:
[B]Database reports [A]Database Management System
[C]Stock tables [B]Network Management System
[D]Business graphics [C]Data Retrieval System
Ans-D [D]Data Query System
128. What type of program can produce Ans-A
sophisticated graphics? 135. What stores data about the tables and
[A]A presentation graphics program fields within the database?
[B]A database program [A]A data index
[C]A word processing program [B]A data directory
[D]A spreadsheet program [C]A data form
Ans-A [D]A data dictionary
129. Programs that help users to analyze and Ans-B
understand specific data by presenting data in 136. Adding new data, modifying existing data,
visual form are called: and deleting data are called:
[A]business report programs. [A]data manipulation.
[B]analytical graphics programs. [B]data restoration.
[C]graphic arts programs. [C]data operation.
[D]_what-if_ analysis programs. [D]data maintenance.
Ans-B Ans-D
130. A ____________is a storage area on a 137. What is the standard query language
spreadsheet. supported by most DBMSs?
[A]cell [A]Object-oriented language
[B]field [B]Report generator language

For More Info visit: www.ibtindia.com or call: 94636-12090 Page 44


IBPS SO:IT OFFICER COMPUTER CRACKER

[C]Structured Query Language (SQL) [C]Abstract language


[D]Query-By-example (QBE) [D]data language
Ans-C Ans-B
138. What provides a formatted presentation of 145. __________ are designed using a report
data from a database? generator built into the DBMS.
[A]A form [A]Queries
[B]A view [B]Reports
[C]A report [C]Repair
[D]A table [D]Acess
Ans-C Ans-B
139. What model was developed to meet the 146. Read-only __________ permits that user
needs of manipulating complex data types such only to look at the dat[A]
as audio and video? [A]privilege
[A]A procedure-oriented database [B]endorsement
[B]A relational database [C]Memory
[C]A network database [D]Data
[D]An object-oriented database Ans-A
Ans-D 147. What is an organized set of related
140. What contains data that has been captured components established to accomplish a certain
from a database in summary form, on a task?
scheduled basis, over a period of time? [A]A group
[A]A data mine [B]A system
[B]A data summary [C]A department
[C]A data report [D]A team
[D]A data warehouse Ans-B
Ans-D 148. The most widely used coding scheme is------
141. In database terminology files are referred ------
to as __________. [A]ASCII
[A]tables [B]Unicode
[B]worksheets [C]EBCDIC
[C]Rows [D]Hexadecimal
[D]columns Ans-A
Ans-A 149. A microprocessor is a:
142. A __________ organizes data in a table [A]Central processing unit on a chip
format consisting of rows and columns. [B]Motherboard
[A]hierarchical database [C]Memory module
[B]relational database [D]TrAnsistor
[C]Operational database Ans-A
[D]Active database 150. A system bus:
Ans-B [A]runs at 100 MHz
143. With a(n) __________, you present a set of [B]Transports data between the CPU and memory.
criteria that the DBMS uses to select data from [C]Uses a set of serial electrical paths.
the database. [D]Is always the same size.
[A]query Ans-B
[B]inquiry 151. Expansion boards are also called:
[C]data extract language [A]Adapter cards.
[D]Cloud [B]Serial ports.
Ans-A [C]USB ports.
144. A __________ allows you to prepare your [D]Parallel ports.
query using English-like statements. Ans-A
[A]data extract language 153. The IEEE 1394 bus is a(n):
[B]query language [A]PC Card bus.

For More Info visit: www.ibtindia.com or call: 94636-12090 Page 45


IBPS SO:IT OFFICER COMPUTER CRACKER

[B]Low-speed parallel bus. [A]Pipelining


[C]High-speed serial bus. [B]Caching
[D]Universal Serial Bus (USB). [C]Buffering
Ans-C [D]Real Time
154. A name for memory packaged on a circuit Ans-A
board is: 161. The two parts of the __________ are the
[A]DRAMs. control unit and the arithmetic/logic unit.
[B]SIMMs. [A]central processing unit
[C]RDRAMs. [B]Primary storage
[D]SRAMs. [C]RAM
Ans-B [D]ROM
155. A measure of computer speed is: Ans-A
[A]T[B] 162. The __________ contains circuitry that
[B]K[B] uses electrical signals to direct the entire
[C]MIPS. computer system to carry out, or execute,
[D]M[B] stored program instructions.
Ans-C [A]Arithmetic/logic unit (ALU)
[B]control unit
156. What is defined as the number of bits that [C]CPU
the CPU processes as a unit? [D]RAM
[A]A computer sentence Ans-B
[B]A computer word 163. Memory is also known as primary storage,
[C]A computer phrase primary memory, __________, internal storage,
[D]A computer term and main memory.
Ans-B [A]secondary storage
157. Semiconductor memory is: [B]main storage
[A]Random. [C]Primary storage
[B]Volatile. [D]secondary memory
[C]Read-only. Ans-B
[D]Stati[C] 164. Before an instruction can be executed,
Ans-B program instructions and data must be placed
158. What are currently being used in cellular into memory from a(n) __________ or a
phones, digital cameras, and digital music secondary storage device.
recorders? [A]diskette
[A]Micro chips [B]input device
[B]SIMM chips [C]Output device
[C]Flash chips [D]CPU
[D]RAM chips Ans-B
Ans-C 165. The combination of I-time and E-time is
159. The ultimate speed solution is __________, called the __________.
a method of using multiple processors at the [A]instruction set
same time. [B]machine cycle
[A]parallel processing [C]Pipeline
[B]serial processing [D]Processing set
[C]Batch processing Ans-B
[D]Real Time processing 166. Which systems can interpret sustained
Ans-A speech so that users can speak almost
160. __________ is a processing technique that normally?
feeds a new instruction into the CPU at every [A]Continuous word
step of the processing cycle so that four or more [B]Instant word
instructions are being worked on [C]Discrete word
simultaneously. [D]Virtual word

For More Info visit: www.ibtindia.com or call: 94636-12090 Page 46


IBPS SO:IT OFFICER COMPUTER CRACKER

Ans-A where the transaction takes place is a:


167. Digital photographs are composed of: [A]Kiosk
[A]Points. [B]ATM
[B]Pixels. [C]Dumb terminal
[C]Frames. [D]Point-of-sale (POS) terminal
[D]Digits. Ans-D
Ans-B 176. This system integrates CAD/CAM and the
168. Digital video consists of a series of: entire manufacturing process.
[A]Media clips. [A]Computer-integrated manufacturing (CIM)
[B]Captures. [B]Project scheduling
[C]Frames. [C]Materials management
[D]Pictures. [D]Production control
Ans-C Ans-A
169. The number of times an electron beam 177. The __________ is a variation on the
refreshes a CRT screen is called the: mechanical mouse.
[A]Pulse rate. [A]trackball
[B]Image rate. [B]stylus
[C]Scan rate. [C]joystick
[D]CRT rate. [D]barcode
Ans-A
Ans-C 178. __________ use touch screens to provide
170. The graphics standard most commonly information and services to the public.
used today is: [A]Kiosks
[A]SVGA [B]ATMs
[B]LCD [C]Scanner
[C]RGB [D]Moniter
[D]VGA Ans-A
Ans-A 179. __________ Automation eliminates keying,
172. A new class of displays based on flat panel thereby reducing costs and opportunities for
technology is called: human-introduced mistakes.
[A]Passive matrix. [A]Source data
[B]Smart displays. [B]Original data
[C]Active matrix. [C]Main data
[D]Liquid crystal display. [D]Secondary data
Ans-B Ans-A
173. This printer places an image on a page 180. __________ involves using a machine to
without physically touching the page. read characters made of magnetized particles.
[A]Line printer [A]MICR
[B]Impact printer [B]OCR
[C]Non-impact printer [C]OMR
[D]Dot-matrix printer [D]OBR
Ans-C Ans-A
174. A set of rules designed for connecting 181. __________ is an inexpensive and
musical instruments, synthesizers, and remarkably reliable way to get data into a
computers is: computer.
[A]TFT. [A]Bar coding
[B]POS. [B]Voice coding
[C]COM. [C]OMR
[D]MIDI. [D]MICR
Ans-D Ans-A
175. A combination of input and output devices 182. Which of the following is a benefit of
designed to capture retail sales data at the point secondary storage?

For More Info visit: www.ibtindia.com or call: 94636-12090 Page 47


IBPS SO:IT OFFICER COMPUTER CRACKER

[A]It is permanent. called a(n) __________.


[B]It is valid [A]Index file access device
[C]It is problem-free. [B]Randomizing access device
[D]It is reliable. [C]Direct-Access storage device (DASD)
Ans-D [D]Sequential file access device
185. Which of the following items are magnetic Ans-Ans-C
media? 192. A technique in which transactions are
[A]Microfiche collected into groups is called __________.
[B]Microfilm [A]sequential processing
[C]Hard disks [B]online processing
[D]Optical disks [C]batch processing
Ans-C [D]update processing
186. What is the capacity of the newest Iomega Ans-C
Zip drive? 193. Name the technique of processing
[A]550 MB transactions in random order.
[B]750 MB [A]Transaction processing
[C]600 MB [B]Batch processing
[D]200 MB [C]Offline processing
Ans-B [D]Sequential file processing
187. Redundant array of independent disks Ans-A
(RAID) __________ 194. A bank may use __________ processing to
check your balance and individually record
[A]Uses a group of two or more hard disks that your cash withdrawal transaction during the
work together as a unit day at the teller window or ATM.
[B]is an inexpensive technology [A]Batch
[C]is completely safe [B]TrAnsaction
[D]Uses a group of floppy diskettes [C]Parellel
Ans-A [D]Serial
188. What is the name for a fixed number of Ans-B
adjacent sectors that are treated as a unit of 195. __________ Means that a transaction is
storage by the operating system? processed fast enough for the result to come
[A]Cylinder back and be acted upon right away.
[B]Cluster [A]Real-time processing
[C]Zone [B]Records processing
[D]Block [C]Batch processing
Ans-B [D]serial processing
189. The time needed to access data directly on Ans-A
a disk is called __________. 196. __________ organization stores records in
[A]Access speed a file in sequential order, but the file also
[B]Access time contains an index of keys.
[C]Run time [A]Random file
[D]Head speed [B]Indexed file
Ans-B [C]Header file
190. These devices store data using laser beam [D]Main file
technology. Ans-B
[A]Optical disks 197. A __________ disk is a rigid platter coated
[B]Audio disks with magnetic oxide that can be magnetized to
[C]Scanners represent data.
[D]Hard disks [A]floppy
Ans-A [B]hard
191. A disk device in which a computer can go [C]Dynamic
directly to the desired record on the disk is [D]secondary

For More Info visit: www.ibtindia.com or call: 94636-12090 Page 48


IBPS SO:IT OFFICER COMPUTER CRACKER

Ans-B [A]Wide area data processing


198. On a hard disk that has multiple platters, a [B]Centralized data processing
__________ consists of the track on each [C]Distributed data processing
surface that is beneath the read/write head at a [D]Network data processing
given position of the read/write arms. Ans-B
[A]cylinder 205. This processing method allows both remote
[B]cluster access and remote processing-
[C]Dot matrix [A]Distributed data processing
[D]Plater [B]Centralized data processing
Ans-A [C]Digital transmission
199. The data __________ rate, which tells how [D]Analog transmission
fast data can be transferred once it has been Ans-A
found, is usually stated in terms of megabytes of 206. A computer system that uses
data per second- communications equipment to connect two or
[A]access more computers and their resources is a:
[B]transfer [A]hub
[C]Copy [B]bridge.
[D]Read [C]network.
Ans-B [D]router.
200. _______________uses an area of memory Ans-C
to temporarily store data from disk that the 207. The protocol that makes Internet
program might need soon. universality possible is:
[A]Disk caching [A]WAN.
[B]Data transferring [B]FEP.
[C]Data access [C]POTS.
[D]Memory [D]TCP/IP.
Ans-A Ans-D
201. __________ is a set of widely accepted 208. A network of personal computers that
video compression standards. share hardware, software, and data is called a:
[A]MPEG [A]Local area network (LAN)
[B]JPEG [B]Wide area network (WAN)
[C]SIV [C]Metropolitan area network (MAN).
[D]ASF [D]Plain old telephone service (POTS).
Ans-A Ans-A
202. __________ has a large storage capacity, 209. A network of geographically distant
up to 17 GB if both layers and both sides are computers and terminals is called a:
used- [A]Integrated Services Digital Network (ISDN)
[A]DVD-ROM [B]Metropolitan area network (MAN).
[B]CD-ROM [C]Wide area network (WAN)
[C]EPROM [D]Local area network (LAN)
[D]EEPROM Ans-C
Ans-A 210. In this network arrangement, all
203. Computer systems that transmit data over computers have equal status.
communications lines, such as telephone lines or [A]Client-to-Client
cables are: [B]Client/server
[A]Data communications systems [C]Token ring
[B]Data network [D]Peer-to-peer
[C]Home-Based systems Ans-D
[D]Centralized data systems 211. This system allows workers to transmit
Ans-A messages to other peoples computers.
204. This method places all processing, [A]E-mail
hardware, and software in one central location. [B]Videoconferencing

For More Info visit: www.ibtindia.com or call: 94636-12090 Page 49


IBPS SO:IT OFFICER COMPUTER CRACKER

[C]Teleconferencing 218. A __________ is a set of rules for the


[D]Chatting exchange of data between a terminal and a
Ans-A computer or between two computers.
212. This method allows businesses to send [A]standard
common business forms electronically. [B]protocol
[A]Electronic fund trAnsfer (EFT) [C]APK
[B]Electronic data interchange (EDI) [D]GUI
[C]Facsimile technology (FAX) Ans-B
[D]Front-end processor (FEP) 219. A __________ network has a central (hub)
Ans-B computer that is responsible for managing the
213. The most common communications devices network
all use __________ transmission, a continuous [A]star
electrical signal in the form of a wave. [B]ring
[A]automatic [C]Bus
[B]analog [D]Mesh
[C]Digital Ans-A
[D]Infrared 220. What is the name of the project that led to
Ans-B the development of the Internet?
214. __________ cards and internal modems [A]NSF net
have given portable computers full connectivity [B]DARPA
capability outside the constraints of an office. [C]UUNET
[A]Graphics [D]ARPANET
[B]PC Ans-D
[C]HD 221. Who developed the concept of the World
[D]Simple Wide Web?
Ans-B [A]Marc Andreessen
215. A(n) __________ adapter can move data at [B]Mitch Kapor
128,000 bps, more than double a standard [C]Dr. Tim Berners-Lee
modem. [D]Robert Metcalfe
[A]fax Ans-C
[B]ISDN 222. What part of the Internet was provided by
[C]Wireless the National Science Foundation (NSF)?
[D]Cable [A]The backbone
Ans-B [B]The trunk line
216. The __________ modem uses the coaxial [C]The nodes
television cables that are already in place [D]The branches
without interrupting normal cable TV Ans-A
reception. 223. The interface software that is used to
[A]cellular explore the Internet is called a:
[B]cable [A]Browser.
[C]FAX [B]Searcher.
[D]Wireless [C]Linker.
Ans-B [D]Surfer.
217. A popular communications medium is Ans-A
__________ transmission, which uses line-of- 224. A message to be sent over the Internet is
sight transmission of data signals through the divided up into uniformly sized packages called:
atmosphere. [A]Units.
[A]microwave [B]Packets.
[B]fiber optics [C]Applets.
[C]Optical [D]Bundles.
[D]Analog Ans-B
Ans-A 225. This service provides the server computer

For More Info visit: www.ibtindia.com or call: 94636-12090 Page 50


IBPS SO:IT OFFICER COMPUTER CRACKER

and the software to connect to the Internet. [B]Telnet


[A]An Internet link provider [C]Internet
[B]A browser service provider [D]Ethernet
[C]A client service provider Ans-B
[D]An Internet service provider (ISP) 232. __________ is the most-used feature of the
Ans-D Internet, used even more than the We[B]
226. What is the initial page of the Web site for [A]E-mail
the company that created your particular [B]Voice mail
browser? [C]Transaction mail
[A]The start page [D]Notification mail
[B]The hyperlink page Ans-A
[C]The link page 233. Internet retail activity is referred to as
[D]The home page __________ e-Commerce.
Ans-D [A]Business-to-Consumer (B2C)
227. A string of letters and symbols that is the [B]Business-to-Business (B2B)
unique address of a Web page or file on the [C]Consumer-to-Consumer(C2C)
Internet is called a(n): [D]Business-to-government(B2G)
[A]HTML. Ans-A
[B]URL. 234. __________ e-Commerce takes place over
[C]TCP. the many online auction sites.
[D]XML. [A]Consumer-to-Consumer (C2C)
Ans-B [B]Business-to-Business (B2B)
228. This is an informal network of computers [C]Business-to-Consumer (B2C)
that allow the posting and reading of messages [D]Business-to-government(B2G)
in newsgroups that focus on specific topics. Ans-A
[A]Telnet 235. The de facto standard for online
[B]Newsreader trAnsaction payments is the __________
[C]Usenet protocol.
[D]Netiquette [A]Secure Sockets Layer (SSL)
Ans-C [B]Secure Payment Transaction (SPT)
229. Computers on the Internet have a standard [C]Secure Electronic Transaction (SET)
way to transfer copies of files, a set of rules [D]Standard payement
called: Ans-A
[A]WAP. 236. What major issue separates the computing
[B]VPN. haves from the have-nots?
[C]FAQ. [A]Healthy computing
[D]FTP. [B]Green computing
Ans-D [C]Ergonomics
230. A __________ is software, usually located [D]The digital divide
at its own Web site, that lets a user specify Ans-D
search terms. 237. What refers to human factors related to
[A]Search engine the use of computers?
[B]Database engine [A]Employee monitoring
[C]Firefox [B]Energy management
[D]Ixquick [C]Ergonomics
Ans-A [D]Child monitoring
231. __________ is a protocol that allows Ans-C
remote users to use their PC to log onto a host 238. What refers to addressing the
computer system over the Internet and use it as environmental impact of computer use in an
if they were sitting at one of that systems local environmentally responsible manner?
terminals. [A]Ethical computing
[A]Usenet [B]Fair use

For More Info visit: www.ibtindia.com or call: 94636-12090 Page 51


IBPS SO:IT OFFICER COMPUTER CRACKER

[C]Cyber squatting intention of selling the domain name at a profit


[D]Green computing to a company that wanted a catchy, easily
Ans-D remembered URL?
239. What standards do many organizations [A]Cyber squatting
require all newly purchased computer [B]Domain theft
equipment to meet? [C]Identity theft
[A]HUD [B]ACM [D]Cyber theft
[C]DNR [D]Energy Star Ans-A
Ans-D 246. What term usually describes a person who
240. What features do current operating gains access to computer systems illegally?
systems contain that reduce the power [A]Shacker
requirements of computer systems? [B]Breaker
[A]Energy management features [C]Hacker
[B]Power boosters [D]Con artist
[C]Energy logos Ans-C
[D]Surge protectors 247. What causes a program to trigger damage
Ans-A under certain conditions?
241. What is the legislation that prohibits any [A]A scavenger [B]A bomb
new taxes that single out Internet transactions, [C]A trapdoor [D]A zapper
such as taxes on Internet service? Ans-B
[A]The Internet Nondiscrimination Act 248. What term describes highly trained
[B]The U.S. Copyright Act technical people who are paid to try to break
[C]The Communications Decency Act into a computer system before anyone else
[D]The Neighborhood Children_s Internet does?
Protection Act [A]Hired hands
Ans-A [B]Piggybacks
242. What software attempts to prevent [C]Hit teams
children from accessing objectionable sites? [D]White-hat hackers
[A]Desktop management software Ans-D
[B]Prevention software 249. What is the name of the computer crime
[C]Blocking software law that was passed by Congress in 1986?
[D]Anti-virus software [A]Computer Criminals Act
Ans-C [B]Cyber Crime Act of 1986
243. What legislation attempted to prevent [C]Computer Crime Act
people from preying on children on the [D]Computer Fraud and Abuse Act
Internet, but was struck down by the Supreme Ans-D
Court? 250. What term refers to uncovering computer-
[A]The Communications Decency Act stored information suitable for use as evidence
[B]The U.S. Copyright Act in courts of law?
[C]The Internet Nondiscrimination Act [A]Computer probing
[D]The Digital Millennium Copyright Act [B]Computer investigation
Ans-A [C]Computer detective work
244. What refers to results of intellectual [D]Computer forensics
activity in the industrial, scientific, literary, or Ans-D
artistic fields? 251. What is a system of safeguards designed to
[A]Copyrights protect a computer system and data from
[B]Patents deliberate or accidental damage or access by
[C]Intellectual property (IP) unauthorized persons?
[D]Trademarks [A]Security [B] Data diddling
Ans-C [C]Data screening [D] Piggybacking
245. What involves registering common words Ans-A
and phrases as domain names, with the 252. What is a method of restoring computer

For More Info visit: www.ibtindia.com or call: 94636-12090 Page 52


IBPS SO:IT OFFICER COMPUTER CRACKER

processing operations if they are halted by [C]The location point


major damage or destruction? [D]The reference point
[A]A computer recovery plan Ans-A
[B]A contingency plan 260. What is the technique that automatically
[C]A disaster recovery plan starts a word on the next line if it does not fit on
[D]A loss recovery plan the previous line?
Ans-C [A]Line wrap [B]Text wrap
253. What is a fully equipped computer facility [C]Sentence wrap [D]Word wrap
with hardware, environmental controls, Ans-D
security, and communications equipment in 270. What feature adjusts the top and bottom
place? margins so that the text is centered vertically on
[A]A turnkey site [B]A model site the printed page?
[C]A hot site [D]A loaded site [A]Vertical centering [B]Vertical adjusting
Ans-C [C]Vertical justifying [D]Horizontal centering
254. What is a device that prevents electrical Ans-A
problems from affecting computer data files? 271. What feature refers to the evenness of the
[A]An incremental backup text at the side margins?
[B]A full backup [A]Automatic reformatting
[C]A surge protector [B]Centering
[D]A differential backup [C]Ragged-right
Ans-C [D]Justification
255. What is a set of illicit instructions that Ans-D
passes itself on to other programs with which it 272. What is a set of charactersletters,
comes in contact? punctuation, and numbersof the same
[A]A germ [B]A retrovirus design?
[C]An antivirus [D]A virus [A]A font [B] A collection
Ans-D [C]A type [D] A style
256. __________ Controls are security controls Ans-A
that are planned as part of the computer 273. What type of program lets you produce
system. professional-looking documents containing both
[A]External [B]Internal text and graphics?
[C]Primary [D]Secondary [A]A page composer
Ans-B [B]A thesaurus
257. What is the overall term for creating, [C]A desktop publisher
editing, formatting, storing, retrieving, and [D]A speller checker
printing a text document? Ans-C
[A]Web design 274. What refers to the spacing between the
[B]Database management lines of type on a page?
[C]Spreadsheet design [A]Leading [B]Scaling
[D]Word processing [C]Kerning [D]Edging
Ans-D Ans-A
258. What is any text that can be keyed in, such 275. What program lets the user design the
as a memo? page layout?
[A]A database [A]Page publishing [B]Page composition
[B]A spreadsheet [C]Page design [D]Page editing
[C]A text document Ans-B
[D]A business presentation 276. Moving a block of text from one location to
Ans-C another is also called __________.
259. What item is usually a blinking underscore [A]copying and printing
or rectangle in a word processing document? [B]cutting and pasting
[A]The insertion point [C]Copying and pasting
[B]The start point [D]Delete and paste

For More Info visit: www.ibtindia.com or call: 94636-12090 Page 53


IBPS SO:IT OFFICER COMPUTER CRACKER

Ans-B Ans: A
277. A __________ program finds spelling 286. Relational calculus is a
errors you might have made when typing a [A]Procedural language.
document. [B]Non- Procedural language.
[A]spelling checker [B]grammar checker [C]Data definition language.
[C]Remove [D]Delete [D]High level language.
Ans-A Ans: B
278. Any line can be individually __________ 287. The view of total database content is
between the left and right margins of the page. [A]Conceptual view. [B]Internal view.
[A]aligned [B]centered [C]External view. [D]Physical View.
[C]Horizental [D]Verticall Ans: A
Ans-B 288. Cartesian product in relational algebra is
279. Accidental or incorrect deletions can [A]a Unary operator. [B]a Binary operator.
usually be repaired with the __________ [C]a Ternary operator. [D]not defined.
command Ans-B
[A]undo [B]redo 289. AS clause is used in SQL for
[C]Copy [D]Print preview [A]Selection operation. [B]Rename operation.
Ans-A [C]Join operation. [D]Projection operation.
280. Forms that are used to organize business Ans-B AS clause is used in SQL for rename
data into rows and columns are called: operation.
[A]Registers [B]Spreadsheets 290. ODBC stands for
[C]Business forms [D]TrAnsaction sheets [A]Object Database Connectivity.
Ans-B [B]Oral Database Connectivity.
281. A computerized version of a manual [C]Oracle Database Connectivity.
spreadsheet is a(n): [D]Open Database Connectivity.
[A]Analysis sheet [B] Electronic spreadsheet Ans-D
[C]Planning sheet [D]Journal 291. Architecture of the database can be viewed
Ans-B as
282. The greatest labor-saving aspect of the [A]two levels. [B]four levels.
electronic spreadsheet is: [C]three levels. [D]one level.
[A]automatic recalculation. Ans-C
[B]building formulas. [C]building functions. 292. In a relational model, relations are termed
[D]building charts. as
Ans-A [A]Tuples. [B]Attributes
283. The process of changing one or more [C]Tables. [D]Rows.
spreadsheet values and observing the results is: Ans-c
[A]what-if analysis. [B]formula analysis. 293. In the architecture of a database system
[C]business analysis. [D] break-even analysis. external level is the
Ans-A [A]physical level. [B]logical level.
284. The letter and number of the intersecting [C]conceptual level [D]view level.
column and row is the: Ans: D
[A]cell coordinates. [B]cell location. 294. An entity set that does not have sufficient
[C]cell position. [D]cell address. attributes to form a primary key is a
Ans-D [A]strong entity set. [B]weak entity set.
285. The cell in which you can type data is the: [C]simple entity set. [D]primary entity set.
[A]active cell. [B]new cell. Ans: B
[C]set cell. [D]ready cell. 295. In a Hierarchical model records are
Ans-A organized as
285. In the relational modes, cardinality is [A]Graph. [B]List.
termed as: [C]Links. [D]Tree.
[A]Number of tuples. [B]Number of attributes. Ans: D
[C]Number of tables. [D]Number of constraints.

For More Info visit: www.ibtindia.com or call: 94636-12090 Page 54


IBPS SO:IT OFFICER COMPUTER CRACKER

296. In an E-R diagram attributes are


represented by
[A]rectangle. [B]square.
[C]ellipse. [D]triangle.
Ans: C
297. In case of entity integrity, the primary key
may be
[A]not Null [B]Null
[C]both Null & not Null. [D]any value.
Ans: A
298. A logical schema
[A]is the entire database.
[B]is a standard way of organizing information
into accessible parts.
[C]describes how data is actually stored on disk.
[D]both [A]and (C)
Ans: A
299. Related fields in a database are grouped to
form a
[A]data file. [B]data record.
[C]menu. [D]bank.
Ans: B
300. The database environment has all of the
following components except:
[A]users. [B]separate files.
[C]database. [D]database
administrator.
Ans: A

For More Info visit: www.ibtindia.com or call: 94636-12090 Page 55

Anda mungkin juga menyukai