1) A
transaction is a very small unit of a program and it may contain several low
level tasks. A transaction in a database system
must maintain Atomicity,
Consistency,
Isolation,
and Durability
− commonly known as ACID properties − in order to ensure accuracy,
completeness, and data integrity.
2)Graph
is a collection of nodes, connected by edges.
Two
types of Graph implementation include Array based implementation and linked
list implementation. Whereas Graphs can be traversed using 2 methods Depth
first search which uses stack and Breadth First search which uses queue.
3)The
computer program Yacc(Yet
another compiler compiler)
is a parser generator developed by stephen C.Johnson
for UNIX operating system in 1970.
It is
LALR(Look Ahead Left to Right) parser generator.
4) Digitization
is the process of converting information into digital format. Audio & Video
digitization uses one of many analog to digital conversion process in which a
continuously variable (analog) signal is changed, without altering its
essential content.
5)Virtual
storage access method (VSAM)
is an IBM file storage
access method. Originally
a record-oriented file system, VSAM
comprises four data set
organizations:
Key Sequenced Data Set(KSDS),
Relative Record Data Set (RRDS), Entry Sequenced Data Set(ESDS)
and Linear Data Set (LDS). The KSDS, RRDS and ESDS organizations contain
records, while the LDS organization (added later to VSAM) simply contains a
sequence of pages with no intrinsic record structure, for use as a
memory-mapped file.
6)IPv6
is communication protocol that routes traffic across the internet. It
features includes larger address space
stateless Address Auto configuration
mobility, security.
7)IP
address is a numerical label assigned to each device participating in a
computer network that uses the internet Protocol for communication. IP address
is defined as a 32 bit number and this system is known as IPv4.
8)IP
address is a numerical label assigned to each device participating in a
computer network that uses the internet Protocol for communication. IP address
is defined as a 32 bit number and this system is known as IPv4.
9)When a packet is too big to travel across
a network it must be broken up into manageable piece. This is called
fragmentation. There are 2 forms of packet fragmentation. Transparent and
Non-Transparent. In transparent fragmentation , each network that fragments a
packet puts it back together again whereas in non-transparent fragmentation,
fragmented packets are reconstructed at the destination.
10)Class
can contain data and functions.These
functions are referred to as “member function ”
Any
non static function declared inside a class declaration is considered a member
function and is called using member selection operators(. And -->) .
Sir we need previous year sbi specialist officer question paper.
ReplyDeletegreat videos for SBI SO preparations.... waiting for more videos. You are doing a great help for us thanks a lot.
ReplyDelete