Ibps /sbi (i.t. officer jmgs 1) 2017

2nd shift- network cable which can transfer most data & longest

  • coxial
  • unshielded twisted pair
  • fiber optic

0 voters

First shift me ek cable se question tha yaad h kisi ko

Today finally accepted Pk was useless, English is actually decided you selected or not, PK was just like computer awareness of PO/CLERK level, now many guys might be selected in basis of English only, PK cut off might be apporx 25. Many seniors told me bro, its all about scoring in English/Reasoing/Maths, no one is selected on the based on Pk scorce, Indirectly Ibps play with mind because every one waste their 2 months for PK lol 

PK mera Kitne Correct or Wrong ....GOD know 50/50 kar ke aya hu.... i will not clear Exam

Just tell me why ibps kept ibps po sectional cut off 4.75 only in mains.....there was 30 minute for English here 50 questions 25 minutes level of Eng all u know And saw in exam also..... I gave SBI so and English was moderate in that still SBI kept cut off near 5 from.past year results.....I observed it..... Some.people.still saying Eng cut off will be high.....I m not getting why...😕 And those who are saying Eng only matters not PK..ye log to gajab hi h.....

SBI so result date?

Worth preparing for banking xams or shd v concentrate on our pvt jobs???coz t way thy ask questions,evn n GRE or CAT ,s easy compared t bank I suppose..

This year Ibps so is tougher than SBI so (it officer) do u agree?

Don't worry guys the cut off may be around 22-25 for 50 ...

RRB Scale 2 IT officer English cutoff was 1.25


share answer for pk @ second slot

Biometric is there ???

Shift 1 (copied)

 Vunerability management after software procurement is called- verification, validation, patching etc
SSH TCP Port no - 22
Device which regenerates data signal without segmenting the network
Access control lists are linked to
Enterprise software definition
Authorization definition
Data mining definition
Find the true statement in JAVA - 2 Questions I think
Mirroring in backup definition
Flip flops are used in SRAM
UV light is used to erase- EPROM
Dynamic assembling and building of web pages is known as
UML Comprises of Structural diagrams and Behaviour diags.
Digital signature does what - options were constructed using public/private key, had to find the correct one.
What ensures protection against unauthorized data change- integrity
Audit trail definition
Case modelling used when
Subjects interact in operation using what- objects, subjectivities etc
3 way handshake used in - CHAP
IP Adress is in which layer - network
Router works in which layer of TCP/IP Model - internet
Unreliable protocol - UDP
Which protocol to use for audio streaming if some delay is acceptable - UDP, TCP, IMAP etc
Cross talk is eliminated using what - fibre optics, UTP, STP etc
Switches use which address - MAC
Switches work on which layer - DLL
Non variable data type in SQL - Number, character etc
How to protect android device from malicious app- run in sandbox
Cloud services in mobile- Simple options, was easy
Linux command to change directory- cd
Linux command for documentation manual - man
Hierarchical DB follows what structure - tree 

end to end connction protocol

  • ip
  • http
  • arp
  • tcp

0 voters

verification and validation

  • accredtion certification
  • specific requrimnt
  • 2 & 1
  • 1 &2

0 voters

transaction process done by

  • date kndge person
  • admunstrtion
  • customer
  • mangmnt peopl

0 voters

making software repsrntation

  • data flow digrm
  • blah blaah
  • functionl reqrmnt

0 voters

can ny1 please tell me reasoning sectional(prediction)  cut off for general  category ?

I rememember some Second Shift Questions :-

1. verification and validation

2.cmm model- IRDMO

3. vpn used at layer-Dat link/Network layer ?

4. unlocking android device by power button and volume-factory reset

5.definition of form in business documents

6. wirelss to wired lan process- Process segmantaion 

7. MIS objective- provide efficiency and effectiveness or strategy decision making

8. software supllier prequalifications-

9. middleware technology-CORBA

10. non vloatile memory-ROM

11.java modifiers-private methods with in class

12.an object is an instance of class

13. http used in web pages

14. rows and column-Relation dbms

15. tcp is connection relible

16. not supported oracle data type- float/string

17. business to functional requirements

18.Information sysytem not working-Down time

19.size,cost of softeare-software metrics

20.requirement traceablity matrix

21. process takes place when when two device wirleslly connected without human intervention- connectivity

22.in a row key value must be there 

23.linux- mkdir

24.linux-ls

25.linux-rm

26.ethernet- csma/cd

27.data dictionary in dbms contains- data ownership, data relationships to other objects, and other data

28.java- abstarct class not final

29.http in aplication layer

30.ftp for file transfer

31.fields in dbms

32.Value is single unless we change it - Default, 

33.Unique value across all relations - Primary Key.

34.value in field not 0,not define-  null value

35.data mining- fraud detection

36.digital certificate needs-issued by trusted third parties, called certificate

37. Bluetooth - Pairing

38.For Gobal compny connection- WAN, 

39.15. Information server not working -offline/down time

40.long distance and speed cabling- fibre optics


 Guys plz share correct  answers 

 and remaining questions


in the second shift there was a question related to abstract mathod relating to final modifier ,,any one remember what was the question?