Showing posts with label IBPS IT Officers. Show all posts
Showing posts with label IBPS IT Officers. Show all posts
Saturday, March 16, 2013
IBPS IT Officers Exam held on 16 March 2013 Review
Monday, February 25, 2013
IBPS Specialist Officers Previous Paper Held on 11-3-2012 - IT Officers
41. Override is a method __________
a. For an operation that replaces an inherited method for the same operation
b. For a data that replaces an inherited method for the same operation
c. For an operation that takes arguments from library function
d. All of these
e. None of these
Saturday, February 23, 2013
Previous Paper of IBPS IT Officers Professional Knowledge Section
11. From what location are the 1st computer instructions available on boot up?
a. ROM BIOS
b. CPU
c. Boot.ini
d. CONFIG.SYS
e. None of these
a. ROM BIOS
b. CPU
c. Boot.ini
d. CONFIG.SYS
e. None of these
IBPS IT Officers Previous Paper - Professional Knowledge Section
Monday, February 11, 2013
Software Engineering Study Material for IBPS IT Officers Exam - Pdf Download
Saturday, February 9, 2013
Data Strutures (DS) Study Material for IBPS IT Officers Exam - Pdf Download
Monday, January 21, 2013
Detailed Syllabus of IBPS IT Officers Exam 2013
Wednesday, January 16, 2013
IBPS IT Officers Study Materials
Monday, May 28, 2012
Indian Overseas Bank - Specialist Officers - 551 Posts
Thursday, May 17, 2012
IBPS Specialist Officers Scores
Inorder to view your marks you should enter your Reg No or Roll No AND Password or Date of Birth.
Click HERE to see your Marks >>
Wednesday, March 7, 2012
Normalization and Normal Forms - IBPS IT Officers Preparation Materials - DBMS
Good definitions... Aren't they ??? ;) But you will get Size Zero marks if you write the above definitions in exams. Lets be lil TECHNICAL.
The design method which helps us to MINIMIZE the redundancies of data (repetitions) and reduces the errors / mistakes in the table is called Normalization.
Monday, February 27, 2012
IBPS Specialist Officers Admit Cards
Enter your Reg No / Roll No / Password / Date of Birth to download your IBPS Specialist Officers Admit Card.
All The Best
Sunday, February 26, 2012
The Phases of Compiler
- Lexical Analyser : Performs Lexical Analysis
- Syntax Analyser : Performs Syntax Analysis
- Semantic Analyser : Performs Semantic Analysis
- Intermediate Code Generator : Performs Intermediate Code Generation
- Code Optimizer : Performs Code Optimization
- Code Generator : Generates Target Code
The Symbol Table is a Data Structure which is useful to store the identifiers in the program.
The Error Handler is useful in Detecting and Reporting the errors.
These two are useful from the starting to the ending of the conversion. ( I mean from the starting phase to the ending phase).
NOTE : We can group these phases into two parts..
- Analysis : In which the compiler ANALYZES the given program. For this, the compiler SCANS and DIVIDES the program into parts. The first THREE phases comes under this category (shortcut : Check the names, if you can find the terms Analysis or Analiser, then that phase comes under the ANALYSIS category
- Synthesis : In which the compiler JOINS the parts of the divided program and makes the target program. (The last two phases comes under this category)
Now lets have a look at the functionalities of all these phases.
Lexical Analysis : It is nothing but analyzing the LEXEMs (tokens), in this phase, the compiler scans the entire program and pics the tokens and groups them.
Syntax Analysis : Syntax is nothing but the structure. It is nothing but to Analyze the structure of the program (whether it is correct or not)
Semantic Analysis : In this the compiler checks the MEANING of the program.
(Note : The above two process will execute simultaniously, so in some books they combine these two names and call the process as Syntax and Semantic Analysis)
Intermediate Code Generation : After scanning the program, the compiler generates an intermediate code (which is neither High level code nor Low level code, which looks like the Microprocessor Code)
Note : Most of the compilers generates the TAC (Three Address Code) as the Intermediate Code. It contains, maximum 3 variable, so we call it as the Three Address Code. (note : we can convert any problem into this TAC form).
it just look like, Temp1 = Temp2 + Temp3 (temporary variables)
or Temp2 = Id + Temp4 etc,
Code Optimization : It helps to improve the Intermediate Code. It make assure that the target code will run EFFICIENTLY in LESS TIME ( i mean, it should give the desired output in less amount of time)
Code Generation : It is the final phase. It generates the relocatable machine code or assembly code. It takes care about the target machine and where to store the variables in the target machine. Yea ofcourse, it takes care about the ORDER of the instruction execution too.
Thats all for now Friends.. Happy Reading..
Compilers Basics for IBPS IT Officers Exam
- To learn Chinese
- To make him learn your Language
- Or you both should learn some other language (Like English) so that you can communicate in that language...
Now what if HE is not ready to learn your language or English??? and what if you too are Lazy enough to learn Chinese or English??? Isn't there any other solution for this problem???
There is...... If you have enough money, You can hire a person who knows your language as well as Chinese and he will work as a MEDIATOR for both of you people.. :)Now come to our Subjects...... As we know, computer cant understand our Hais and hellos....
And we too cant understand Computer's 0's and 1's... So how to talk to the computer and make it works according to your orders?
Can you teach English to computer? Its impossible, because its a machine. It cant understand anything except LOW VOLTAGE (0) and HIGH VOLTAGE (1)... On and Off in simple words...
We too are TALLENTED enough to use CTRL+C and CTRL+V so we are not ready to write big codes which looks like 00011 01001 110100 1001001 01001 11001 11111 0111010 101010 10101011 01111 1101010 11101 1010101 01010 n bla bla........
So what can we do now? we write a Software Code which acts as a TRANSLATOR and converts your instructions into 0's and 1's and gives them to computer and vice versa.. We call this SOFTWARE CODE as COMPILER.. Thats it :)
What exactly is the Compiler? is it a for Translating or for Debugging?
Lets go back to our Chinese Man, assume that you are communicating with him with the help of a Translator. And you have some problem with your TONGUE... (assume)..... So, what will happn if you use some adjectives like "Poker face and ######## (censored :P) " .
Now say, what if the Mediator translates that POKER FACE stuff as it is in Chinese???
Your relationship with the Chinese man, will collapsed and you will get some injuries if he is expert in those Chinese martial arts...
So, before going to translate your words in Chinese, your mediator (or Translator) warns you about the outcomes of your words (may be you will get kicked or killed, depends upon the intensity of your words :P) and confirms whether to translate them as they are or not...
Heare also same... Some programmer (like me) writes a program with so many errors. If the compiler translates as it is, the computer may collapse (as it cant hit you for your errors)... So the compiler warns you about your errors so that you can correct them and resubmit your program. So, the main task of the compiler is to TRANSLATE, in-order to translate an Error free program, it warns you about your errors :)
The Technical Definition : So, technically you can say that "The compiler is a software program which converts the program written in High level language / Programming Language / User Language into the Machine Language / Binary Language to make an Executable Program.
Saturday, February 25, 2012
The OSI Model - Study Materials for IBPS IT Officers Exam 2013
In this model, similar types of communication functions are grouped into Layers. There are 7 layers in this Model. Those are,
- Physical Layer
- Data link Layer
- Network Layer
- Transport Layer
- Session Layer
- Presentation Layer
- Application Layer
Each layer helps it's above layer to establish an error free communication, in other words, each layer depends on its below layer to establish an error free communication.
How to remember these names????
Here the order is very important. If anybody asks you about these layers, you should start with Physical and end with Application Layer. You should not jumble these names according to your convenience. So you should remember these names with an order. Well, there are several techniques are there to remember these type of names. One of those technique is, making a funny name or sentence with the STARTING letters. Just, write the starting letters of these layers.
P D N T S P A
Now make a funny sentence, here are some examples
- Please Do Not Touch Steve's Pet Alligator

Or
- Please Do Not Throw Sausage Pizza Away

Now I bet you never going to forget these names and order again :)
Ok, now lets have a look at the Functionalities of these Layers...
- Physical Layer : This is the First or Lowest layer of the OSI model. It takes care about the Physical Connections.
- Data Link Layer : This layer Encodes the data packets and provides error free node to node transmission. It is divided into two sub layers. Those are
- Media Access Control Layer (MAC Sublayer in short)
- It helps the computer to get the access of data transmission
- Logical Link Control Layer (LLC Sublayer in short)
- It controls the order, flow and errors of the frames (Frame synchronization)
- Network Layer : This layer helps in Switching and Routing (connecting and transmitting), and also creates virtual circuits ( Imaginary paths for transmission)
- Transport Layer : This layer helps in providing Transparent data transmission. Its also checks whether the data completely transmitted or not.
- Session Layer : This layer is responsible for the Transmission Sessions. I mean Starting, Maintaining and Terminating the Communication.
- Presentation Layer : This layer provides the data Independence ( simply you can remember that this layer is responsible for the data Presentation :) I mean, how you are presenting data (without any leakage)
- Application Layer : This is the topmost layer, this layer directly interacts with the end user. This layer is responsible for checking whether the claimed user is genuine or not.
Still having problems with these functions??? Have a look at the following diagram. It will be easier for you to understand :)
Very good. Now you know about the OSI model and It's Layers :) You know that it was developed by ISO.
Hey, you know one secret? ISO dint invent any new model. It just COPIED some old model and modified it.. Thats all.
Once there was a model called TCP/IP model (Transport Control Protocol / Internet Protocol) with this name itself, you can define its functionality :) It has lil complicated structure with only 4 Layers. Those are
- Network Interface Layer
- Internet Layer
- Transport Layer
- Application Layer
ISO Just elaborated this model and divided some of these layers into EXTRA LAYERS and developed OSI model. have a look at the following Diagram, so that you can understand the difference :)
Thats all for now friends. Happy reading...
IBPS bank it officer study material pdf download 2013
Thursday, February 23, 2012
Data Base Users and Administrator - IBPS IT Officers Special
Read Basics HERE
D epeending on their degree of expertise or the mode of their interactions with the DBMS, The Data Base users (people who uses database) can be classified into several groups.

They are,

- Naive Users
- Online Users
- Application Users
- Sophisticated Users
- Specialized Users
Naive Users : Naive means Lacking Experience, these are the users who need not be aware of the presence of the Data Base System. Example of these type of users is The user of an ATM machine. Because these users only responds to the instructions displayed on the screen (enter your pin number, click here, enter the required money etc). Obviously operations performed by these users are very limited.
Online Users : These are the users who may communicate with the Data Base directly via an online terminal or indirectly via a user interface and application program. These users are aware of the presence of the Data Base System and may have acquired a certain amount of expertise within the limited interaction they are permitted with a Data Base.
Application Programmers : Professional / Application programmers are those who are responsible for developing application programs or user interface. The application programs could be written in a general-purpose programming language or the commands available to manipulate a database.
Sophisticated Users : Simply we can say that these are the EXPERIENCED users. These people interact with the system without writing programs. Instead they from their requests in a database query language. They submit each such query to a query processor, whose function is to break down DML (Data Manipulation Language, the language which is used to MAINTAIN the data. we shall discuss about this later) statements into instructions that the storage manager understands. Analysts who submit queries to explore data in the Data Base fall in this category.
Specialized Users : These are the sophisticated users who write specialized database applications that do not fit into the traditional data-processing framework. Among these applications are computer - aided design systems, knowledge-based and expert systems, systems that store data with complex data types (Ex, Graphics Data and Audio Data) and environment-modeling systems.
DBA (Data Base Administrator) : The person who controls both Data and the Programs that access that data in the Data Base is called the Data Base Administrator (DBA).
Functions of the DBA are,
- Defining Schemas (arrangement of Data)
- Creating Storage Structure and Access Methods ( I mean how to store data and access that)
- Modifying the storage Data
- Granting Authorization Permissions
- Specifying the CONDITIONS of the data storage
- Periodically Updating the Data Base etc.,
Read complete study materials of IBPS IT Officers Here
Tuesday, February 21, 2012
The Transaction Management - IBPS Specialist Officers Study Materials
You logged in into your bank's site and types your account number.
Later you typed your friend's name and his account number

Later types the amount and clicks on TRANSFER button.
Later??? Rs. 1500 /- TRANSFERS into your friend's account.
Now lets see this process in DBMS's point of view.
YOu entered some money (Rs 1500). The DBMS checks whether the mentioned money is available in your account or not.Assume that you have some 3000 in your account.
If available then it checks the reciepient's Account (Assume that he has Rs. 200 in his account)
Later the DBMS reduces your amount to Rs 1500 and Adds that 1500 to your friend's account.
And makes his account balance as Rs 1700 ( 200 + 1500).
Then shows you a message, something like "TRANSACTION COMPLETED"
yes, this is an example of Transaction.
A transaction is an execution of a user program and is seen by the DBMS as a series or list of actions. (or simply we can remember it as " A transaction is nothing but a List of Actions". These actions include the reading and writing of database.
ACID Properties (important) :
These are the properties that a transaction should possess in order to avoid failures during concurrent access to a database. The ACID is an acronym which stands for Atomicity, Consistency, Isolation, Durability. Now lets have a look at these properties in detail. Ofcourse, for beginers these all may look same and confusing, read them two or three times. then you can get the exact meanings and differences among them...
- Atomicity : It ensures that the transaction either is executed completely or not at all. Incomplete transaction consequences are not entertained, check an example
- Assume that Shivani has Rs. 500/- in her account and Palvi has Rs. 200/- in her account. Now Shivani transfers an amount of Rs. 50/- to Palvi. A transaction debits the amount from shivani's account, but befrore it could be credited to palvi, if there is a failure, then transaction would stop. So finally Shivani loses Rs. 5o but palvi cant get the amount. This leaves the data in an inconsistent state. If there is a failure during transaction execution , then measures must be taken to get back the data in a form which was in, before transaction (I mean, the 50 shouldnt be deducted from Shivani's account in our case). This is taken care of by transaction management component.
- Consistency : The data in the database must always be in a consistent state. A transaction occurred on a Consistent data should end with the data with another Consistent stage after completion of that transaction. Take the above case, the total of the amounts of Shivani and Palvi are (500+200) is Rs 700/- So, after the Transaction completed, the total amount should be same. i.e., (450+250 = 700). Ofcourse, in intermediate stage, where the amount is deducted from Shivani's account but not yet credited to Palvi, the total would not be same. It is the responsibility of DBMS.
- Durability : Durability ensures that the data remains in a consistent state even after the FAILURE. (This is ensured by keeping copy of the old data in the Disk, till the transaction is COMPLETED). I mean, if shivani is transfering money to Palvi. The money is deducted frm Shivani's account and power gone (before adding the MONEY to palvi's account). Then our DBMS shouldn't save that transaction. This is called Durability.
- Isolation : All transaction must run in Isolation from one another. I mean, each and every transaction should be kept unaware of other transactions and execute independently. The intermediate results shouldnt be available to other transactions.
Read Complete Set of Study Materials and Previous Papers of IBPS IT Officers Here
IBPS IT Officers Study Materials
Sunday, February 19, 2012
Computer Networks (Basics) for IBPS IT Officers Exam 2013
Data Base Management Systems (Introduction)
Before going into details, lets have a look at the basic terminology of DBMS.
Data : Data is the raw material from which Useful Information is derived. The word data is the Plural form of Datum (but nowadays, people commonly using data for both singular and plural).
Simply we can say that, data is a collection of unorganized facts, but can be made organized into useful information.
Subscribe to:
Posts (Atom)







