Bank Exams - Specialist Officers (IT) Syllabus
Sakshi Education
There are five important chapters in IBPS Specialist Officers (IT) Syllabus viz, Networking, Operating Systems, DBMS / RDBMS, Security System Terminology and Basics of Programming. The sub topics of the chapters are as follows.
- Networking:
i. OSI Model, TCP/IP Model and Line Configuration
ii. Topologies
iii. Transmission Modes
iv. Categories of Networks
v. Circuit Switching, Packet Switching and Message Switching
vi. Frame Relay - Overview
vii. ATM - Overview
viii. Types of Errors – Single Bit, Burst, Error Detection – VRC, LRC, CRC, Checksum, Error Correction – Hamming code
ix. Repeaters, Bridges and Routers
x. Gateways
xi. Transport Layer Services, Elements of Transport Layer protocols and TCP.
xii. UDP
xiii. ATM AAL Layer Protocols (Optional)
xiv. ICMP, FTP, DNS, DHCP, SNMP, Email, SMTP, WWW.
xv. Point to Point Protocol (PPP), ISDN, Physical layer stuff, baud rate,
xvi. Manchester encoding etc
xvii. Cryptography Fundamentals, Public Key Algorithms and Secret Key Algorithms
xviii. Authentication Protocols
xix. Digital Signatures
xx. 802.3 Ethernet, 802.4 Token bus and 802.5 Token Ring
xxi. FDDI
- Operating System
i. Introduction of OS
ii. Linux
iii. Process States
iv. Transition
v. Context Switches
vi. Process Control
vii. Files & Database System
viii. Device Independent I/O
ix. IPC
x. Memory Management
xi. Virtual Memory
xii. Paging
xiii. Segmentation
xiv. Dead Lock
xv. Scheduling
- DBMS
i. Data Base
ii. DBMS
iii. FPS
iv. Data Abstraction
v. Integrity Rules
vi. Data Independence
vii. PDI
viii. LDI
ix. Data Model
x. ER Model
xi. Object Oriented Model
RDBMS
i. SQL
ii. P/L SQL
iii. DB in Oracle
iv. DB Trigger
v. Storage Management
vi. Buffer Management
vii. Transaction Management
viii. File Management
ix. COLD & HOT Backup
- Security System terminology
i. Introduction - Computer Security, Threats to security, History of Computer security, Computer System Security and Access Controls (System access and data access).
ii. Threats - Viruses ,worms, Trojan horse, bombs, trap doors, spoofs, email virus, macro viruses, remedies, Intruders, Malicious software, Firewalls, vulnerabilities & threats, Network Denial of service attack.
iii. Communication security- Encryption, classical encryption techniques, data encryptions standards, advances encryption techniques.
- Basics of Programming
i. C, C++
ii. Core Java
iii. Java
Published date : 29 Oct 2015 02:26PM