Skip to main content

Bank Exams - Specialist Officers (IT) Syllabus

There are five important chapters in IBPS Specialist Officers (IT) Syllabus viz, Networking, Operating Systems, DBMS / RDBMS, Security System Terminology and Basics of Programming. The sub topics of the chapters are as follows.
  1. Networking:
    i. OSI Model, TCP/IP Model and Line Configuration
    ii. Topologies
    iii. Transmission Modes
    iv. Categories of Networks
    v. Circuit Switching, Packet Switching and Message Switching
    vi. Frame Relay - Overview
    vii. ATM - Overview
    viii. Types of Errors – Single Bit, Burst, Error Detection – VRC, LRC, CRC, Checksum, Error Correction – Hamming code
    ix. Repeaters, Bridges and Routers
    x. Gateways
    xi. Transport Layer Services, Elements of Transport Layer protocols and TCP.
    xii. UDP
    xiii. ATM AAL Layer Protocols (Optional)
    xiv. ICMP, FTP, DNS, DHCP, SNMP, Email, SMTP, WWW.
    xv. Point to Point Protocol (PPP), ISDN, Physical layer stuff, baud rate,
    xvi. Manchester encoding etc
    xvii. Cryptography Fundamentals, Public Key Algorithms and Secret Key Algorithms
    xviii. Authentication Protocols
    xix. Digital Signatures
    xx. 802.3 Ethernet, 802.4 Token bus and 802.5 Token Ring
    xxi. FDDI

  2. Operating System
    i. Introduction of OS
    ii. Linux
    iii. Process States
    iv. Transition
    v. Context Switches
    vi. Process Control
    vii. Files & Database System
    viii. Device Independent I/O
    ix. IPC
    x. Memory Management
    xi. Virtual Memory
    xii. Paging
    xiii. Segmentation
    xiv. Dead Lock
    xv. Scheduling

  3. DBMS
    i. Data Base
    ii. DBMS
    iii. FPS
    iv. Data Abstraction
    v. Integrity Rules
    vi. Data Independence
    vii. PDI
    viii. LDI
    ix. Data Model
    x. ER Model
    xi. Object Oriented Model

    RDBMS
    i. SQL
    ii. P/L SQL
    iii. DB in Oracle
    iv. DB Trigger
    v. Storage Management
    vi. Buffer Management
    vii. Transaction Management
    viii. File Management
    ix. COLD & HOT Backup

  4. Security System terminology
    i. Introduction - Computer Security, Threats to security, History of Computer security, Computer System Security and Access Controls (System access and data access).
    ii. Threats - Viruses ,worms, Trojan horse, bombs, trap doors, spoofs, email virus, macro viruses, remedies, Intruders, Malicious software, Firewalls, vulnerabilities & threats, Network Denial of service attack.
    iii. Communication security- Encryption, classical encryption techniques, data encryptions standards, advances encryption techniques.

  5. Basics of Programming
    i. C, C++
    ii. Core Java
    iii. Java
Published date : 29 Oct 2015 02:26PM

Photo Stories