There are five important chapters in IBPS Specialist Officers (IT) Syllabus viz, Networking, Operating Systems, DBMS / RDBMS, Security System Terminology and Basics of Programming. The sub topics of the chapters are as follows.
- Networking:
i. OSI Model, TCP/IP Model and Line Configuration ii. Topologies iii. Transmission Modes iv. Categories of Networks v. Circuit Switching, Packet Switching and Message Switching vi. Frame Relay - Overview vii. ATM - Overview viii. Types of Errors – Single Bit, Burst, Error Detection – VRC, LRC, CRC, Checksum, Error Correction – Hamming code ix. Repeaters, Bridges and Routers x. Gateways xi. Transport Layer Services, Elements of Transport Layer protocols and TCP. xii. UDP xiii. ATM AAL Layer Protocols (Optional) xiv. ICMP, FTP, DNS, DHCP, SNMP, Email, SMTP, WWW. xv. Point to Point Protocol (PPP), ISDN, Physical layer stuff, baud rate, xvi. Manchester encoding etc xvii. Cryptography Fundamentals, Public Key Algorithms and Secret Key Algorithms xviii. Authentication Protocols xix. Digital Signatures xx. 802.3 Ethernet, 802.4 Token bus and 802.5 Token Ring xxi. FDDI
- Operating System
i. Introduction of OS ii. Linux iii. Process States iv. Transition v. Context Switches vi. Process Control vii. Files & Database System viii. Device Independent I/O ix. IPC x. Memory Management xi. Virtual Memory xii. Paging xiii. Segmentation xiv. Dead Lock xv. Scheduling
- DBMS
i. Data Base ii. DBMS iii. FPS iv. Data Abstraction v. Integrity Rules vi. Data Independence vii. PDI viii. LDI ix. Data Model x. ER Model xi. Object Oriented Model
RDBMS i. SQL ii. P/L SQL iii. DB in Oracle iv. DB Trigger v. Storage Management vi. Buffer Management vii. Transaction Management viii. File Management ix. COLD & HOT Backup
- Security System terminology
i. Introduction - Computer Security, Threats to security, History of Computer security, Computer System Security and Access Controls (System access and data access). ii. Threats - Viruses ,worms, Trojan horse, bombs, trap doors, spoofs, email virus, macro viruses, remedies, Intruders, Malicious software, Firewalls, vulnerabilities & threats, Network Denial of service attack. iii. Communication security- Encryption, classical encryption techniques, data encryptions standards, advances encryption techniques.
- Basics of Programming
i. C, C++ ii. Core Java iii. Java
|
No comments:
Post a Comment