Tuesday, 11 October 2016

Theory Of SBI IT Officer Exam


1) A transaction is a very small unit of a program and it may contain several low level tasks. A transaction in a database system must maintain Atomicity, Consistency, Isolation, and Durability − commonly known as ACID properties − in order to ensure accuracy, completeness, and data integrity.

2)Graph is a collection of nodes, connected by edges.
Two types of Graph implementation include Array based implementation and linked list implementation. Whereas Graphs can be traversed using 2 methods Depth first search which uses stack and Breadth First search which uses queue. 

3)The computer program Yacc(Yet another compiler compiler)  is a parser generator developed by stephen  C.Johnson for UNIX operating system in 1970.
It is LALR(Look Ahead Left to Right) parser generator. 

4) Digitization is the process of converting information into digital format. Audio & Video digitization uses one of many analog to digital conversion process in which a continuously variable (analog) signal is changed, without altering its essential content.

5)Virtual storage access method (VSAM) is an IBM file storage access method. Originally a record-oriented file system, VSAM comprises four data set organizations: Key Sequenced Data Set(KSDS), Relative Record Data Set (RRDS), Entry Sequenced Data Set(ESDS) and Linear Data Set (LDS). The KSDS, RRDS and ESDS organizations contain records, while the LDS organization (added later to VSAM) simply contains a sequence of pages with no intrinsic record structure, for use as a memory-mapped file.



6)IPv6 is communication protocol that routes traffic across the internet. It features  includes larger address space stateless Address Auto configuration  mobility, security.


7)IP address is a numerical label assigned to each device participating in a computer network that uses the internet Protocol for communication. IP address is defined as a 32 bit number and this system is known as IPv4.

8)IP address is a numerical label assigned to each device participating in a computer network that uses the internet Protocol for communication. IP address is defined as a 32 bit number and this system is known as IPv4.

9)When a packet is too big to travel across a network it must be broken up into manageable piece. This is called fragmentation. There are 2 forms of packet fragmentation. Transparent and Non-Transparent. In transparent fragmentation , each network that fragments a packet puts it back together again whereas in non-transparent fragmentation, fragmented packets are reconstructed at the destination.



10)Class can contain data and functions.These functions are referred to as “member function ”

Any non static function declared inside a class declaration is considered a member function and is called using member selection operators(. And -->) .

2 comments:

  1. Sir we need previous year sbi specialist officer question paper.

    ReplyDelete
  2. great videos for SBI SO preparations.... waiting for more videos. You are doing a great help for us thanks a lot.

    ReplyDelete