Upload
anshuman
View
213
Download
0
Embed Size (px)
Citation preview
7/24/2019 76ibps So-it Officer-computer Cracker
1/55
IBPS SO:IT OFFICER COMPUTER CRACKER
IT OFFICER COMPUTER AWARENESS
1. Basic Computer 2. Computer Network
3. Database Management System 4. Data structure
5. Operating System
System of interconnected computers and computerized peripherals such as
printers is called computer network .This interconnection among computers
facilitates information sharing among them. Computers may connect to eachother by either wired or wireless media.
Characteristics of a Network-A network is a group of systems that are
connected to allow sharing of resourcessuch as files or printersor sharing
of services-such as an Internet connection .There are two aspects of setting up anetwork: the hardware used to connect the systems together and the software installed on the computers to
allow them to communicate.
Servers-The server is a special computer that contains more disk space and memory than are found on client
workstations. The server has special software installed that allows it to function as a server. This specialsoftware can provide file and print services (to allow sharing of files and printers), provide web pages toclients, or provide e-mail functionality to the company.
Workstations -The workstation also is known as a client, which is just a basic computer running a client
operating system such as Windows XP or Linux. These users typically store their files on a central server so
that they can share the files with other users on the network.
Hosts-The term hostrefers to any computer or device that is connected to a network and sends or receives
information on that network. A host can be a server, a workstation, a printer with its own network card, or adevice such as a router. We can summarize by saying that any system ordevice that is connected to the network is known as a host.
Types of Networks-
Organizations of different sizes, structures, and budgets need differenttypes of networks. Networks can be divided into one of two categories:
peer-to-peer or server-based networks.
1. Peer-to-Peer Network
2. Server-Based Networks
Computer Network
For More Info visit: www.ibtindia.com or call: 94636-12090 Page 1
7/24/2019 76ibps So-it Officer-computer Cracker
2/55
IBPS SO:IT OFFICER COMPUTER CRACKER
Peer-to-Peer Network-A peer-to-peer network has no dedicated servers instead; a number of workstations
are connected together for the purpose of sharing information or devices. When there is no dedicated server, all
workstations are considered equal; any one of them can participate as the client or the server. Peer-to-peernetworks are designed to satisfy the networking needs of home networks or of small companies that do not
want to spend a lot of money on a dedicated server but still want to have the Capability to share information or
devices. For example, A small peer-to-peer network will allow these three computers to share the printer andthe customer information with one another .The extra cost of a server was not incurred because the existing
client systems were networked together to create the peer-to-peer network.A big disadvantage of peer-to-peernetworking is that you cant do your day-today administration in a single place.
Server-Based Networks-Usually after four or five systems
have been networked, the need for a dedicated server to store all
of the user accounts and data files becomes apparentthis is a
server-based network. The advantage of a server-based networkis that the data files that will be used by all of the users are
stored on the one server. This will help you by giving you a
central point to set up permissions on the data files, and it will
give you a central point from which to back up all of the data incase data loss should occur. With a server-based network, the
network server stores a list of users who may use networkresources and usually holds the resources as well. The server in
a server-based network may provide a number of different
services. The services it will offer to the network usually are decided by the servers role. There are a numberof different roles that a server could play on a network:
1. File and print servers 2. Application servers 3. Web servers 4. Directory servers
1. File and print servers-:File and print servers control, share printers
and files among clients on the network. File and print servers were the
original reason to have a network; a large number of users neededaccess to the same files, so the files were placed on a server, and all
clients were connected to the server when they needed to work with thefiles.
2. Application servers-:Application serversare servers that run some form of special program on the server. A
good example of an application server is a server that runs the companys e-mail server. The e-mail server
software is special software that can be run on a server operating system. Another example of software thatwould run on an application server is a database server product such as Microsoft SQL Server. A databaseserver is a server that holds the companys core business data and typically gives this data to custom
applications that run on the workstations. These are some applications that you might find on an applicationserver:
1. Microsoft SQL Server 2.Oracle 3.Microsoft Exchange Server
4. IBM Lotus Domino
3. Web servers-:
Web servers are servers that run the Hypertext Transfer Protocol (HTTP) and are designed topublish information on the Internet or the corporate intranet. Web servers are popular in todays businessesbecause they host web applications (web sites) for the organization. These web applications could be designedfor internal use, or they could be used to publish information to the rest of the world on the Internet. Examples
of web server software are Microsofts Internet Information Services that runs on Windows or Apache webserver software that runs on UNIX/Linux, Novell NetWare, and Windows.
4. Directory servers-Directory servers hold a list of the user accounts that are allowed to log on to the
network. This list of user accounts is stored in a database (known as the directory database) and can store
For More Info visit: www.ibtindia.com or call: 94636-12090 Page 2
7/24/2019 76ibps So-it Officer-computer Cracker
3/55
IBPS SO:IT OFFICER COMPUTER CRACKER
information about these user accounts such as address, city, phone number, and fax number. A directoryservice is designed to be a central database that can be used to store everything about such objects as users andprinters.
Ethernet-:Ethernet is a widely deployed LAN technology. This technology was invented by Bob Metcalfe and
D.R. Boggs in the year 1970. It was standardized in IEEE 802.3 in 1980. Ethernet shares media. Network
which uses shared media has high probability of data collision. Ethernet uses Carrier Sense MultiAccess/Collision Detection (CSMA/CD) technology to detect collisions. On the occurrence of collision in
Ethernet, all its hosts roll back, wait for some random amount of time, and then re-transmit the data. Ethernet
connector is network interface card equipped with 48-bits MAC address. This helps other Ethernet devices toidentify and communicate with remote devices in Ethernet. Traditional Ethernet uses 10BASE-T
specifications. The number 10 depicts 10MBPS speed, BASE stands for baseband, and T stands for ThickEthernet. 10BASE-T Ethernet provides transmission speed up to 10MBPS and uses coaxial cable or Cat-5
twisted pair cable with RJ-5 connector. Ethernet follows Star topology with segment length up to 100 meters.
All devices are connected to a hub/switch in a star fashion.
Fast-Ethernet-:
To encompass need of fast emerging software and hardware technologies, Ethernet extends
itself as Fast-Ethernet. It can run on UTP, Optical Fiber, and wirelessly too. It can provide speed up to
100MBPS. This standard is named as 100BASE-T in IEEE 803.2 using Cat-5 twisted pair cable. It usesCSMA/CD technique for wired media sharing among the Ethernet hosts and CSMA/CA (CA stands for
Collision Avoidance) technique for wireless Ethernet LAN. Fast Ethernet on fiber is defined under 100BASE-FX standard which provides speed up to 100MBPS on fiber. Ethernet over fiber can be extended up to 100
meters in half-duplex mode and can reach maximum of 2000 meters in full-duplex over multimode fibers.
Giga-Ethernet-:After being introduced in 1995, Fast-Ethernet retained its high speed status only for three
years till Giga-Ethernet introduced. Giga-Ethernet provides speed up to 1000 mbits/seconds. IEEE802.3ab
standardizes Giga-Ethernet over UTP using Cat-5, Cat-5e and Cat-6 cables. IEEE802.3ah defines Giga-Ethernet over Fiber.
Internet, Intranet and Extranet-:
Internet Intranet Extranet
Internet If you wish to expose
information to everyone in theworld, then you would build an
Internet-type application. AnInternet-type applicationUses Internet protocols such as
HTTP, FTP, or SMTP and isavailable to persons anywhereon the Internet. We use the
Internet and web applications
as ways to extend who the
application can reach. Forexample, I no longer need to go
to the bank to transfer funds.
Because the bank has built aweb site on the Internet, I can
do that from the comfort of my
own home.
Intranet An application is considered to
be on the companys intranet if it is usingInternet-type protocols such as HTTP or
FTP but the application is available only
within the company. The information on acompanys intranet would not be
accessible to persons on the Internetbecause it is not for public use. Forexample, a few years ago I was sitting
with my banking officer going over my
account and noticed that the bank hadmoved all of its customer account
information to a web site and that the
banking officer was using a Web browserto retrieve my account details. Although
the application was being used by a web
browser, it was still an internal
application meant only for bankingofficers.
Extranet From time to time, an
application that has been builtfor the Companys intranet and
used by internal employees will
need to be extended to selectbusiness partners or customers.
If you extend your intranet out
to select business partners orcustomers, you have created an
extranet. An extranet cannot be
used by anyone else external tothe company except for those
selected individuals.
For More Info visit: www.ibtindia.com or call: 94636-12090 Page 3
7/24/2019 76ibps So-it Officer-computer Cracker
4/55
IBPS SO:IT OFFICER COMPUTER CRACKER
Network Topologies-:A network topology is the physical layout of computers, cables, and other components
on a network. There are a number of different network topologies, and a network may be built using multiple
topologies. The different types of network layouts are1. Bus topology 2.Star topology 3.Mesh topology 4. Ring topology 5. Hybrid topology6. Wireless topology
Network Media and Connectors-:Cabling is the medium for the transmission of data between hosts on the
LANs. LANs can be connected together using a variety of cable types, such as unshielded twisted-pair, coax,or fiber. Each cable type has its own advantages and disadvantages, which you will examine in this section.
There are three primary types of cable media that can be used to connect systems to a networkcoaxial cable,twisted-pair cable, and fiber-optic cable. Transmission rates that can be
supported on each of these physical media are measured in millions of bits
per second, or megabits per second (Mbps).
Coaxial Cable-:Coaxial, or coax, cable looks like the cable used to bring
the cable TV signal to your television. One strand (a solid-core copper
wire) runs down the middle of the cable. There are two types of coaxcabling: thinnet and thicknet. The two differ in thickness and maximum
cable distance that the signal can travel.
Twisted-Pair Cable-:
Coaxial cable is not as popular today as it was a few years ago; today the popularity
contest has been dominated by twisted-pair cabling. Twisted-pair cabling gets its name by having four pairs ofwires that are twisted to help reduce crosstalk or interference from outside electrical devices. (Crosstalk isinterference from adjacent wires.) there are two forms of twisted-pair cablingunshielded twisted-pair (UTP)
and shielded twisted-pair (STP).
Fiber-Optic Cable-:The third type of cabling that we want to discuss is
fiber-optic cabling. Fiber-optic cabling is unlike coax and twisted-pair,because both of those types have a copper wire that carries the electrical
signal. Fiber-optic cables use optical fibers that carry digital data signalsin the form of modulated pulses of light. An optical fiber consists of anextremely thin cylinder of glass, called the core, surrounded by aconcentric layer of glass, known as the cladding. There are two fibers per
cable-one to transmit and one to receive. The core also can be an optical-quality clear plastic, and the cladding can be made up of gel that reflectssignals back into the fiber to reduce signal loss. There are two types of
fiber-optic cables: single-mode fiber (SMF) and multimode fiber (MMF).
1. Single-mode fiber Uses a single ray of light, known as a mode, tocarry the transmission over long distances.
2. Multimode fiber Uses multiple rays of light (modes) simultaneously, with each ray of light running at a
different reflection angle to carry the transmission over short distances
Cable Max Distance Tr ansfer Rate Connector Used
Thinnet 185 m 10 Mbps BNC
Thicknet 500 m 10 Mbps AUI
CAT 3 (UTP) 100 m 10 Mbps RJ-45
CAT 5 (UTP) 100 m 100 Mbps RJ-45
CAT 5e 100 m 1 Gbps RJ-45
CAT 6 100 m 10 Gbps RJ-45
Fiber 2 km 1+ Gbps SC, ST
For More Info visit: www.ibtindia.com or call: 94636-12090 Page 4
7/24/2019 76ibps So-it Officer-computer Cracker
5/55
IBPS SO:IT OFFICER COMPUTER CRACKER
Network devices-:Network devices are components used to connect computers or other electronic devices
together so that they can share files or resources like printers or fax machines. Devices used to setup a Local
Area Network (LAN) are the most common types of network devices used by the public. A LAN requires ahub, router, cabling or radio technology, network cards, and if online access is desired, a high-speed
modem. This is much less complicated than it might sound to someone new to networking.
HUB-:A hub is used in a wired networkto connect Ethernet cables from
a number of devices together. The hub allows each device to talk to theothers. Hubs arent used in networks with only wireless connections, since
network devices such as routers and adapters communicate directly withone another. Hubs are such simple devices they require no
configuration, and have no manuals that their function is now included
in other devices such as routers and modems.
Router-:A routeris a communications device that connects multiple
computers or other routers together and transmits data to its correctdestination on the network. A router can be used on any size of network.
On the largest scale, routers along the Internet backbone forward datapackets to their destination using the fastest available path. For smaller
business and home networks, a router allows multiple computers to sharea single high-speed Internet connection such as through a cable modemor DSL modem. These routers connect from 2 to 250 computers. To
prevent unauthorized users from accessing files and computers, many
routers are protected by a built-in antivirus protection. Routers alsosupport wireless communications, eliminating the need for a separate
wireless access point in a wireless network. If network has a separate
wireless access point, it connects to the router via a cable. Some routers
also include additional functionality such as including a built-in print server.
Modem-:A computers digital signals must be converted to analog signals
before they are transmitted over standard telephone lines. The
communications devices that perform this conversion in a modem,
sometimes called a dial-up modem. The word, modem, is derived from thecombination of the words, modulation, to change into an analog signal,
and demodulation,to convert an analog signal into a digital signal. Both the
sending and receiving ends o a standard telephone line (communicationschannel) must have a dial-up modem or data transmission to occur. For
example, a dial-up modem connected to a sending computer converts the
computers digital signals into analog signals. The analog signals then can travel over a standard telephoneline. At the receiving end, another dial-up modem converts the analog signals
back into digital signals that a receiving computer can process.
Bridge-:A bridge reads the outermost section of data on the data packet, to
tell where the message is going. It reduces the traffic on other networksegments, since it does not send all packets. Bridges can be programmed to
reject packets from particular networks. Bridging occurs at the data link layerof the OSI model, which means the bridge cannot read IP address, but only
the outermost hardware address of the packet. In our case the bridge can read
For More Info visit: www.ibtindia.com or call: 94636-12090 Page 5
7/24/2019 76ibps So-it Officer-computer Cracker
6/55
IBPS SO:IT OFFICER COMPUTER CRACKER
the Ethernet data which gives the hardware address of the destination address, not the IP address. Bridgesforward all broadcast messages. Only a special bridge called a translation bridge will allow two networks of
different architectures to be connected. Bridges do not normally allow connection of networks with different
architectures. The hardware address is also called the MAC (media access control) address. To determine thenetwork segment a MAC address belongs to, bridges use one of the following
Transparent Bridging:They build a table of addresses (bridging table) as they receive packets. If the
address is not in the bridging table, the packet is forwarded to all segments other than the one it came from.This type of bridge is used on Ethernet networks.
Source Route Bridging:
The source computer provides path information inside the packet. This is used onToken Ring networks. A gateway can translate information between different network data formats or networkarchitectures. It can translate TCP/IP to AppleTalk so computers supporting TCP/IP can communicate with
Apple brand computers. Most gateways operate at the application layer, but can operate at the network or
session layer o the OSI model. Gateways will start at the lower level and strip information until it gets to therequired level and repackage the information and work its way back toward the hardware layer of the OSI
model. To confuse issues, when talking about a router that is used to interface to another network, the word
gateway is often used. This does not mean the routing machine is a gateway as defined here, although it could
be.
OSI Reference Model:
OSI (Open Systems Interconnection) is reference model for how messages shouldbe transmitted between any two points in a telecommunication network. A reference model is a framework for
understanding relationships. The purpose of the OSI reference model is to guide vendors and developers so
that the digital communication products and software programs they create will interoperate. The OSIreference model defines seven layers of functions that take place at each end of a communication.
Layers of OSI -:
Layer 7-:The application layer - This is the layer at
which communication partners are identified,quality of service (QoS) is identified, user
authentication and privacy are considered, and any
constraints on data syntax are identified. (This layeris not the application itself, although some
applications may perform application layer
functions.)
Layer 6-:The presentation layer - This is a layer, usually part of an operating system (OS), that converts
incoming and outgoing data from one presentation format to another (for example, from a text stream into a
popup window with the newly-arrived text).
Layer 5-:The session layer - This layer sets up, coordinates, and terminates conversations, exchanges, and
dialogs between the applications at each end. It deals with session and connection coordination.
Layer 4-:The transport layer - This layer manages the end-to-end control (for example, determining whether all
packets have arrived) and error-checking. It ensures complete data transfer.
Layer 3-:
For More Info visit: www.ibtindia.com or call: 94636-12090 Page 6
7/24/2019 76ibps So-it Officer-computer Cracker
7/55
IBPS SO:IT OFFICER COMPUTER CRACKER
The network layer - This layer handles the routing of the data (sending it in the right direction to theright destination on outgoing transmissions and receiving incoming transmissions at the packet level). Thenetwork layer does routing and forwarding.
Layer 2-:The data-link layer - This layer provides synchronization for the physical level and does bit-stuffing
for strings of 1's in excess of 5. It furnishes transmission protocol knowledge and management. This layer hastwo sub layers, the Logical Link Control Layer and the Media Access Control Layer.
Layer 1-:The physical layer - This layer conveys the
bit stream through the network at the electrical andmechanical level. It provides the hardware means of
sending and receiving data on a carrier network.
TCP/IP Model -:The Transmission Control Protocol
/ Internet Protocol (TCP/IP) was created by the
Department of Defense (DoD) to make sure andprotect data integrity, and also maintained
communications in the time of disastrous war.However, if designed and deployed properly
according to standard, a TCP/IP network can be a
truly reliable and flexible one. Essentially, theDepartment of Defense (DoD) Model is a reduced version of the OSI Reference Model. The DoD model basedon four layers:
Layer Description Protocols
4.
Application
Defines TCP/IP application protocols and how host
programs interface with transport layer services touse the network.
HTTP, Telnet, FTP, TFTP,
SNMP, DNS, SMTP,X Windows, other
application protocols
3. Transport Provides communication session management
between host computers. Defines the level of service
and status of the connection used when transportingdata.
TCP, UDP, RTP
2. Internet Packages data into IP datagram, which contain
source and destination address information that is
used to forward the datagrams between hosts andacross networks. Performs routing of IP datagrams.
IP, ICMP, ARP, RARP
1. Network
interface/
Access
Specifies details of how data is physically sentthrough the network, including how bits are
electrically signaled by hardware devices that
interface directly with a network medium, such ascoaxial cable, optical fiber, or twisted-pair copper
wire.
Ethernet, Token Ring,FDDI, X.25, Frame Relay,
RS-232, v.35
IP Address-:Every machine on a network has a unique identifier. Most networks today, including all
computers on the Internet, use the TCP/IP protocol as the standard for how to communicate on the network. Inthe TCP/IP protocol, the unique identifier for a computer is called its IP address.
For More Info visit: www.ibtindia.com or call: 94636-12090 Page 7
7/24/2019 76ibps So-it Officer-computer Cracker
8/55
IBPS SO:IT OFFICER COMPUTER CRACKER
There are two standards for IP addresses:-1) IP Version 4 (IPv4) 2) IP Version 6 (IPv6).
All computers with IP addresses have an IPv4 address, and many are starting to use the new IPv6 address
system as well. Here's what these two address types mean:-IPv4 uses 32 binarybits to create a single unique address on thenetwork. An IPv4 address is expressed by four numbers separated
by dots. Each number is the decimal (base-10) representation foran eight-digit binary (base-2) number, also called an octet. Forexample: 216.27.61.137.Class A - 0.0.0.0 - 127.255.255.255
Class B - 128.0.0.0 - 191.255.255.255
Class C - 192.0.0.0 - 223.255.255.255Class D - 224.0.0.0 - 239.255.255.255
Class E - 240.0.0.0 - 247.255.255.255
IPv6 uses 128 binary bits to create a single unique address onthe network. An IPv6 address is expressed by eight groups of
hexadecimal (base-16) numbers separated by colons, as in 2001:cdba: 0000:0000:0000:0000:3257:9652Groups of numbers that
contain all zeros are often omitted to save space, leaving a colonseparator to mark the gap (as in 2001:cdba::3257:9652).
At the dawn of IPv4 addressing, the Internet was not the large commercial sensation it is today, and mostnetworks were private and closed off from other networks around the world. When the Internet exploded,
having only 32 bits to identify a unique Internet address caused people to panic that we'd run out of IP
addresses. Under IPv4, there are 232 possible combinations, which offer just under 4.3 billion uniqueaddresses. IPv6 raised that to a panic-relieving 2128 possible addresses.
Web browser- :
A browser is an application program that provides a way to look at and interact with all theinformation on the World Wide Web. The word "browser" seems to have originated prior to the Web as ageneric term for user interfaces that let you browse text files online. Technically, a Web browser is a client
program that uses HTTP to make requests of Web servers throughout the Internet on behalf of the browseruser. Most browsers support e-mail and the File Transfer Protocol but a Web browser is not required for those
Internet protocols and more specialized client programs are more popular. The first Web browser, called WorldWide Web, was created in 1990. That browser's name was changed to Nexus to
For More Info visit: www.ibtindia.com or call: 94636-12090 Page 8
7/24/2019 76ibps So-it Officer-computer Cracker
9/55
IBPS SO:IT OFFICER COMPUTER CRACKER
avoid confusion with the developing information space known as the World Wide Web. The first Webbrowser with a graphical user interface was Mosaic, which appeared in 1993. Many of the user interfacefeatures in Mosaic went into Netscape Navigator. Microsoft followed with its Internet Explorer (IE).
Bandwidth -:Bandwidth describes the rate at which data can be transferred to your computer from a website
or internet service within a specific time. Therefore the amount of bandwidth you have (the bandwidth'strength') determines the efficiency and speed of your internet activity that is, when you open web pages,
download files and so on. A useful analogy is a pipe with water running through it the wider the pipe, the
greater the volume of water that can flow through it. The same applies to bandwidth strength and the flow ofthe volume of data. Bandwidth is generally measured in bits per second' or sometimes bytes per second'.
ARPANET- :
Advanced Research Projects Agency Network, ARPANET or ARPAnet began development
in 1966 by the United States ARPA. ARPANET was a Wide Area Network linking many Universities andresearch centers, was first to use packet switching, and was the beginning of what we consider the Internet
today. Some of the reasons for creating ARPANET include making it easier for people to access computers, to
improve computer equipment, and to have a more effective communication method for the military.
Bookmark - :When referring to the Internet or a browser, a bookmark or electronic bookmark is a method of
saving a web page's address. For example, with most browsers pressing Ctrl + D will bookmark the page you
are viewing.
Bounce - :A description of what occurs when an e-mail message returns back to the sender as undeliverable.
Some e-mail programs also have a bounce or bounce back feature built into them, which allows the user tobounce messages back to the sender causing the e-mail address to appear invalid.
Cyber Law-:Cyber law is the part of the overall legal system that deals with the Internet, cyberspace, and
their respective legal issues. Cyber law covers a fairly broad area, encompassing several subtopics includingfreedom of expression, access to and usage of the Internet, and online privacy. Generically, cyber law has beenreferred to as the Law of the Internet.
DNS-:Domain Name Systemor Domain Name Service, a DNS is an Internet or other network server that
helps to point domain names or the hostname to their associated IP address that was introduced by PaulMockapetris and Jon Postel in1984. If a domain name is not found within the local database, the server may
query other domain servers to obtain the address of a domain name. For example, when a user is accessing the
ibtindia domain a user would enter the easy to remember domain: ibtindia.com. When entered that domainname is looked up on a Domain Name System to translate that name into an IP address that can be better
understood by computer, e.g. 69.72.169.241. Using that IP address the computers can then find the computer
containing the ibtindia web page and forward that information to your computer.
Phishing-:Pronounced like fishing, phishing is a term used to describe a
malicious individual or group of individuals scamming users by sending
e-mails or creating web pages that are designed to collect an individual's
online bank, credit card, or other login information. Because these e-mailsand web pages look like legitimate companies users trust them and enter
their personal information.
For More Info visit: www.ibtindia.com or call: 94636-12090 Page 9
7/24/2019 76ibps So-it Officer-computer Cracker
10/55
IBPS SO:IT OFFICER COMPUTER CRACKER
Search engine-:A search engine is a software program or script
available through the Internet that searches documents and files for
keywords and returns the results of any files containing those keywords.Today, there are thousands of different search engines available on the
Internet, each with their own abilities and features. The first search
engine ever developed is considered Archie, which was used to search forFTP files and the first text-based search engine is considered Veronica.
Today, the most popular and well known search engine is Google.
Firewall-:A firewall is a software utility or hardware device that limits outside network access to a computer
or local network by blocking or restricting network ports. Firewalls are a great step for helping prevent un-
authorized access to a company or home network. The picture is an example of a hardware firewall, the
ZyXEL ZyWALL a Unified Security Gateway with a Firewall and other security features. In addition tohardware firewalls like that shown above, basic hardware firewalls are also commonly found in most network
routers and can be configured and setup through the router setup. Software firewalls are designed to protect the
computer they are installed onto by blocking any unrestricted programs from sending and receiving
information from the network or Internet. A good example of a software Firewall is the Windows Firewall thatis included with Microsoft Windows.
Hacking-:
Hacking in simple terms means an illegal intrusion into acomputer system and/or network. There is an equivalent term tohacking i.e. cracking, but from Indian Laws perspective there is no
difference between the term hacking and cracking. Every act
committed towards breaking into a computer and/or network ishacking. Hackers write or use ready-made computer programs to
attack the target computer. They possess the desire to destruct and
they get the kick out of such destruction. Some hackers hack for
personal monetary gains, such as to stealing the credit card
information, transferring money from various bank accounts to theirown account followed by withdrawal of money. They extort money
from some corporate giant threatening him to publish the stoleninformation which is critical in nature.
Message Switching-:In this switching method, a different strategy is used, where instead of
establishing a dedicated physical line between the sender and the
receiver, the message is sent to the nearest directly connected switchingnode. This node stores the message, checks for errors, selects the best
available route and forwards the message to the next intermediate node.
The line becomes free again for other messages, while the process isbeing continued in some other nodes. Due to the mode of action, this
method is also known as store-and-forward technology where themessage hops from node to node to its final destination. Each nodestores the full message, checks for errors and forwards it. In this
switching technique, more devices can share the network bandwidth, as
compared with circuit switching technique. Temporary storage ofmessage reduces traffic congestion to some extent. Higher priority can be given to urgent messages, so that the
low priority messages are delayed while the urgent ones are forwarded faster. Through broadcast addresses onemessage can be sent to several users. Last of all, since the destination host need not be active when the
message is sent, message switching techniques improve global communications.
For More Info visit: www.ibtindia.com or call: 94636-12090 Page 10
7/24/2019 76ibps So-it Officer-computer Cracker
11/55
IBPS SO:IT OFFICER COMPUTER CRACKER
Packet Switching -:
The basic approach is not much
different from message switching. It is also based on thesame store-and-forward approach. However, to overcome
the limitations of message switching, messages are divided
into subsets of equal length called packets. This approachwas developed for long-distance data communication(1970) and it has evolved over time. In packet switching
approach, data are transmitted in short packets (fewKbytes). A long message is broken up into a series ofpackets as shown in Fig. Every packet contains some
control information in its header, which is required forrouting and other purposes. Main difference betweenPacket switching and Circuit Switching is that the
communication lines are not dedicated to passing messagesfrom the source to the destination. In Packet Switching,different messages (and even different packets) can pass
through different routes, and when there is a "dead time" in the communication between the source and the
destination, the lines can be used by other sources.
Circuit switching-:
A networking technology that provides a
temporary, but dedicated, connection between two stations nomatter how many switching devices the data are routed
through. Circuit switching was originally developed for the
analog-based telephone system in order to guarantee steady,consistent service for two people engaged in a phone
conversation. Analog circuit switching Frequency DivisionMultiplexing(FDM)has given way to digital circuit switchingTime Division Multiplexing (TDM), and the digital
counterpart still maintains the connection until broken.
Encryption and Decryption-:Encryption is the process of translating plain text data (plaintext) into
something that appears to be random and meaningless (ciphertext). Decryption is the process of converting
ciphertext back to plaintext. To encrypt more than a small amount of data, symmetric encryption is used. Asymmetric key is used during both the
encryption and decryption processes. To decrypt
a particular piece of ciphertext, the key that wasused to encrypt the data must be used. The goal
of every encryption algorithm is to make it as
difficult as possible to decrypt the generatedciphertext without using the key. If a really good
encryption algorithm is used, there is no
technique significantly better than methodically trying every possible key. For such an algorithm, the longerthe key, the more difficult it is to decrypt a piece of ciphertext without possessing the key. It is difficult todetermine the quality of an encryption algorithm. Algorithms that look promising sometimes turn out to be
very easy to break, given the proper attack. When selecting an encryption algorithm, it is a good idea to chooseone that has been in use for several years and has successfully resisted all attacks.
Private Key encryption -:
Private Key encryption -Private Key means that each computer has a secret key(code) that it can use to encrypt a packet of information before it is sent over the network to the othercomputer. Private key requires that you know which computers will talk to each other and install the key on
For More Info visit: www.ibtindia.com or call: 94636-12090 Page 11
7/24/2019 76ibps So-it Officer-computer Cracker
12/55
IBPS SO:IT OFFICER COMPUTER CRACKER
each one. Private key encryption is essentially the same as a secret code that the two computers must eachknow in order to decode the information. The code would provide the key to decoding the message. Think of itlike this. You create a coded message to send to a friend where each letter is substituted by the letter that is
second from it. So "A" becomes "C" and "B" becomes "D". You have already told a trusted friend that thecode is "Shift by 2". Your friend gets the message and decodes it. Anyone else who sees the message will onlysee nonsense.
Public key encryption -:Public key encryption uses a combination of a private key and a public key. The
private key is known only to your computer while the public key is given by your computer to any computerthat wants to communicate securely with it. To decode an encrypted message, a computer must use the public
key provided by the originating computer and it's own private key.
Digital signature-:A digital signature is basically a way to ensure that an electronic document (e-mail,
spreadsheet, text file, etc.) is authentic. Authentic means that you know who created the document and you
know that it has not been altered in any way since that person created it. Digital signatures rely on certain types
of encryption to ensure authentication. Encryption is the process of taking all the data that one computer is
sending to another and encoding it into a form that only the other computer will be able to decode.Authentication is the process of verifying that information is coming from a trusted source. These two
processes work hand in hand for digital signatures.
Unicasting, Multicasting and Broadcasting? If the message is sent from a source to a single destination node, it is called Unicasting. If the message is sent to some subset of other nodes, it is called Multicasting. If the message is sent to all the m nodes in the network it is called Broadcasting.
What is Project 802?It is a project started by IEEE to set standards to enable
intercommunication between equipment from a variety ofmanufacturers. It is a way for specifying functions of the
physical layer, the data link layer and to some extent thenetworklayer to allow for interconnectivity of major LAN protocols.
It consists of the following:
802.1 is an internetworking standard for compatibility ofdifferent LANs and MANs across protocols.
802.2 Logical link control (LLC) is the upper sublayer of thedata link layer which is non-architecture-specific, that is
remains the same for all IEEE-defined LANs. Media access
control (MAC) is the lower sublayer of the data link layerthat contains some distinct modules each carrying
proprietary information specific to the LAN product being
used. The modules are Ethernet LAN (802.3), Token ring
LAN (802.4), Token bus LAN (802.5). 802.6 is distributedqueue dual bus (DQDB) designed to be used in MANs.
For More Info visit: www.ibtindia.com or call: 94636-12090 Page 12
7/24/2019 76ibps So-it Officer-computer Cracker
13/55
IBPS SO:IT OFFICER COMPUTER CRACKER
Database-:A database is a logically coherent collection of data with some inherent meaning, representing
some aspect of real world and which is designed, built and populated with data for a specific purpose.
DBMS-:It is a collection of programs that enables user to create and maintain a database. In other words it is
general-purpose software that provides the users with the processes of defining, constructing and manipulating
the database for various Applications.
Advantages of DBMS-:1. Redundancy is controlled. 2. Unauthorized access is restricted.3. Providing multiple user interfaces. 4. Enforcing integrity constraints.
5. Providing backup and recovery.
III-tier Architecture -:
Three levels of data abstraction (III-tier Architecture)-:They are three levels of abstraction are given below,
1.
Physical level: The lowest level of abstractiondescribes how data are stored. (How to store the
data?)2. Logical level: The next higher level of abstraction,
describes what data are stored in database and what
relationship among those data. (What type of data to
be stored?)3. View level: The highest level of abstraction describes
only part of entire database. (How to show the data?)
Integrity rules-:There are two types of Integrity rules
1. Entity Integrity:States that "Primary key cannot have NULL value"
2. Referential Integrity:States that "Foreign Key can be either a NULL value or should be PrimaryKey value of other relation.
Data Independence-:Data independence means that "the application is independent of the storage structure
and access strategy of data". In other words, the ability to modify the schema definition in one level should notaffect the schema definition in the next higher level.
Two types of Data Independence:1. Physical Data Independence: Modification in physical level should not affect the logical level.
2. Logical Data Independence: Modification in logical level should affect the view level.
The people who use the database can be categorized -
a) Database users b) Database administrator (DBA)
Database users are of 4 different types that are given below:
1) Naive users:These are the unsophisticated users who interact with the system by invoking one of the
application programs that have been written previously. E.g. consider a user who checks for account balance
information over the World Wide Web. Such a user access a form, enters the account number and passwordetc. And the application program on the internet then retrieves the account balance using given accountinformation which is passed to the user.
DATABASE MANAGEMENT SYSTEM
For More Info visit: www.ibtindia.com or call: 94636-12090 Page 13
7/24/2019 76ibps So-it Officer-computer Cracker
14/55
IBPS SO:IT OFFICER COMPUTER CRACKER
2) Application programmers-:These are computer professionals who write application programs, used to
develop user interfaces. The application programmer uses Rapid Application Development (RAD) toolkit or
special type of programming languages which include special features to facilitate generation of forms anddisplay of date on screen.
3) Sophisticated users-:
These users interact with the database using database query language. They submittheir query to the query processor. Then Data Manipulation Language (DML) functions are performed on the
database to retrieve the data. Tools used by these users are OLAP (Online Analytical Processing) and data
mining tools.
4) Specialized users-:These users write specialized database applications to retrieve data. These applications
can be used to retrieve data with complex data types e.g. graphics data and audio data.
b) Database Administrator (DBA):
A person having who has central control over data and programs that
access the data is called DBA. DBA functions are given below:
1) Schema definition: DBA creates database schema by executing Data Definition Language (DDL)statements.
2) Storage structure and access method definition3) Schema and physical organization modification: If any changes are to be made in the original
schema, to fit the need of your organization, then these changes are carried out by the DBA.
4) Granting of authorization for data access: DBA can decide which parts of data can be accessed bywhich users. Before any user access the data, dbms checks which rights are granted to the user bythe DBA.
5) Routine maintenance: DBA has to take periodic backups of the database, ensure that enough diskspace is available to store new data, ensure that performance of dbms ix not degraded by anyoperation carried out by the users.
SQL-:SQL stands for Structured Query Language. SQL is used to communicate with a database.
According to ANSI (American National Standards Institute), it is the standard language for relational databasemanagement systems. SQL statements are used to perform tasks such as update data on a database, or retrievedata from a database. Some common relational database management systems that use SQL are: Oracle,Sybase, Microsoft SQL Server, Access, Ingres, etc. Although most database systems use SQL, most of them
also have their own additional proprietary extensions that are usually only used on their system. However, thestandard SQL commands such as "Select", "Insert", "Update", "Delete", "Create", and "Drop" can be used toaccomplish almost everything that one needs to do with
a database. This tutorial will provide you with the
instruction on the basics of each of these commands aswell as allow you to put them to practice using the SQL
Interpreter.
Relational Model-:
The most popular data model inDBMS is the Relational Model. It is more scientific a
model than others. This model is based on first-orderpredicate logic and defines a table as an n-array relation.
The main highlights of this model are
1. Data is stored in tables called relations.2. Relations can be normalized.3. In normalized relations, values saved are
atomic values.
For More Info visit: www.ibtindia.com or call: 94636-12090 Page 14
7/24/2019 76ibps So-it Officer-computer Cracker
15/55
IBPS SO:IT OFFICER COMPUTER CRACKER
4. Each row in a relation contains a unique value.5. Each column in a relation contains values from a same domain.
Key-:
A key is an attribute (also known as column or field) or a combination of attribute that is used to identifyrecords. Sometimes we might have to retrieve data from more than one table, in those cases we require to jointables with the help of keys. The purpose of the key is to bind data together across tables without repeating all
of the data in every table. Such an attribute is called a key attribute, and its values can be used to identify eachentity uniquely. For example, the Name attribute is a key of the COMPANY entity type because no twocompanies are allowed to have the same name. For the PERSON entity type, a typical key attribute is
SocialSecurityNumber. Sometimes, several attributes together form a key, meaning that the combination of theattribute values must be distinct for each entity. If a set of attributes possesses this property, we can define acomposite attribute that becomes a key attribute of the entity type. The various types of key with e.g. in SQL
are mentioned below, (For examples let suppose we have an Employee Table with attributes ID , Name
,Address , Department_ID ,Salary)
(I) Super Key :An attribute or a combination of attribute that is used to identify the records uniquely is
known as Super Key. A table can have many Super Keys.
E.g. of Super Key
1 ID 2 ID, Name3 ID, Address 4 ID, Department_ID
5 ID, Salary 6 Names, Address7 Names, Address, Department_ID So on as any combination which can identify the records
uniquely will be a Super Key.
(II) Candidate Key :It can be defined as minimal Super Key or irreducible Super Key. In other words an
attribute or a combination of attribute that identifies the record uniquely but none of its proper subsets can
identify the records uniquely.E.g. of Candidate Key
1 Code 2 Names, Address
For above table we have only two Candidate Keys (i.e. Irreducible Super Key) used to identify the recordsfrom the table uniquely. Code Key can identify the record uniquely and similarly combination of Name and
Address can identify the record uniquely, but neither Name nor Address can be used to identify the recordsuniquely as it might be possible that we have two employees with similar name or two employees from thesame house.
(III) Primary Key-:
A Candidate Key that is used by the database designer for unique identification of eachrow in a table is known as Primary Key. A Primary Key can consist of one or more attributes of a table. E.g. ofPrimary Key - Database designer can use one of the Candidate Key as a Primary Key. In this case we have
Code and Name, Address as Candidate Key, we will consider Code Key as a Primary Key as the other
key is the combination of more than one attribute.
(IV) Foreign Key :A foreign key is an attribute or combination of attribute in one base table that points to the
candidate key (generally it is the primary key) of another table. The purpose of the foreign key is to ensure
referential integrity of the data i.e. only values that are supposed to appear in the database are permitted.
E.g. of Foreign Key Let consider we have another table i.e. Department Table with AttributesDepartment_ID, Department_Name, Manager_ID, Location_ID with Department_ID as an Primary
Key. Now the Department_ID attribute of Employee Table (dependent or child table) can be defined as theForeign Key as it can reference to the Department_ID attribute of the Departments table (the referenced or
parent table), a Foreign Key value must match an existing value in the parent table or be NULL.
For More Info visit: www.ibtindia.com or call: 94636-12090 Page 15
7/24/2019 76ibps So-it Officer-computer Cracker
16/55
IBPS SO:IT OFFICER COMPUTER CRACKER
(V) Composite Key:If we use multiple attributes to create a Primary Key then that Primary Key is called
Composite Key (also called a Compound Key or Concatenated Key). E.g. of Composite Key, if we have used
Name, Address as a Primary Key then it will be our Composite Key.
(VI) Alternate Key:Alternate Key can be any of the Candidate Keys except for the Primary Key. E.g. of
Alternate Key is Name, Address as it is the only other Candidate Key which is not a Primary Key.(VII) Secondary Key:
The attributes that are not even the Super Key but can be still used for identification
of records (not unique) are known as Secondary Key. E.g. of Secondary Key can be Name, Address, Salary,Department_ID etc. as they can identify the records but they might not be unique.
SQL Commands- :SQL have the different type of commands that are given below -
1. DDL (Data Definition Language)-:A data base schema is specifies by a set of definitions expressed
by a special language called DDL. Example of DDL commands are given below-:
CREATE- to create objects in the database. ALTER- alters the structure of the database. DROP- delete objects from the database.
TRUNCATE- remove all records from a table, including all spaces allocated for the recordsare removed. COMMENT- add comments to the data dictionary. RENAME- rename an object.
2. DML (Data Manipulation Language)-: This language that enable user to access or manipulate data
as organized by appropriate data model. Procedural DML or Low level: DML requires a user tospecify what data are needed and how to get those data. Non-Procedural DML or High level: DML
requires a user to specify what data are needed without specifying how to get those data.
SELECT - retrieve data from the a database INSERT - insert data into a table UPDATE - updates existing data within a table DELETE - deletes all records from a table, the space for the records remain MERGE- UPSERT operation (insert or update)
CALL- call a PL/SQL or Java subprogram EXPLAIN PLAN - explain access path to data LOCK TABLE - control concurrency
3. DCL-:Data Control Language (DCL) statements. Some examples:
GRANT -gives user's access privileges to database REVOKE- withdraw access privileges given with the GRANT command
4. TCL-: Transaction Control (TCL) statements are used to manage the changes made by DML
statements. It allows statements to be grouped together into logical transactions.
COMMIT -save work done SAVEPOINT -identify a point in a transaction to which you can later roll back ROLLBACK -restore database to original since the last COMMIT SET TRANSACTION - Change transaction options like isolation level and what rollback
segment to use
5. VDL (View Definition Language) -: It specifies user views and their mappings to the conceptualschema.
6. SDL (Storage Definition Language)-: This language is to specify the internal schema. This language
may specify the mapping between two schemas.
Data dictionary-:A data dictionary is a collection of descriptions of the data objects or items in a data model
for the benefit of programmers and others who need to refer to them. A first step in analyzing a system ofobjects with which users interact is to identify each object and its relationship to other objects. This process is
called data modeling and results in a picture of object relationships. After each data object or item is given a
For More Info visit: www.ibtindia.com or call: 94636-12090 Page 16
7/24/2019 76ibps So-it Officer-computer Cracker
17/55
IBPS SO:IT OFFICER COMPUTER CRACKER
descriptive name, its relationship is described (or it becomes part of some structure that implicitly describesrelationship), the type of data (such as text or image or binary value) is described, possible predefined valuesare listed, and a brief textual description is provided. This collection can be organized for reference into a book
called a data dictionary.
ER model-:The ER model defines the conceptual view of a database. It works around real-world entities and
the associations among them. At view level, the ER model is considered a good option for designing databases.Entity-:
An entity can be a real-world object, either
animate or inanimate, that can be easily identifiable. Forexample, in a school database, students, teachers, classes,
and courses offered can be considered as entities. All theseentities have some attributes or properties that give them their identity.
Entity set-:An entity set is a collection of similar types of entities. An entity set may contain entities with
attribute sharing similar values. For example, a Students set may contain all the students of a school; likewise a
Teachers set may contain all the teachers of a school from all faculties. Entity sets need not be disjoint.
Attributes-:
Entities are represented by means of their properties, called attributes. All attributes have values.For example, a student entity may have name, class, and age as attributes. There are different type of attributes
that are given below-
1. Simple attribute:Simple attributes are atomic values, which cannot be divided further. For example, a
student's phone number is an atomic value of 10 digits.
2. Composite attribute:Composite attributes are made of more than one simple attribute. For example, a
student's complete name may have first_name and last_name.
3. Derived attribute :Derived attributes are the attributes that do not exist in the physical database, but
their values are derived from other attributes present in the database. For example, average_salary in adepartment should not be saved directly in the database, instead it can be derived. For another example, age
can be derived from data_of_birth.4. Single-value attribute:
Single-value attributes contain single value. For example
Social_Security_Number.
5. Multi-value attribute:Multi-value attributes may contain more than one values. For example, a person
can have more than one phone number, email_address, etc.
Generalization-:
As mentioned above, the process of generalizing entities,
where the generalized entities contain the properties of all the generalizedentities is called generalization. In generalization, a number of entitiesare brought together into one generalized entity based on their similar
characteristics. For example, pigeon, house sparrow, crow and dove canall be generalized as Birds.
Specialization-:
Specialization is the opposite of generalization. In specialization, a group of entities is
divided into sub-groups based on their characteristics. Take a group Person for example. Aperson has name, date of birth, gender, etc. These properties are common in all persons,
human beings. But in a company, persons can be identified as employee, employer,
For More Info visit: www.ibtindia.com or call: 94636-12090 Page 17
7/24/2019 76ibps So-it Officer-computer Cracker
18/55
IBPS SO:IT OFFICER COMPUTER CRACKER
customer, or vendor, based on what role they play in the company. Similarly, in a school database, persons canbe specialized as teacher, student, or a staff, based on what role they play in school as entities.
Normalization-:
If a database design is not perfect, it may contain anomalies, which are like a bad dream for any
database administrator. Managing a database with anomalies is next to impossible.
Update anomalies:If data items are scattered and are not linked to each other properly, then it could lead to
strange situations. For example, when we try to update one data item having its copies scattered over severalplaces, a few instances get updated properly while a few others are left with old values. Such instances leave
the database in an inconsistent state.
Deletion anomalies-:We tried to delete a record, but parts of it was left undeleted because of unawareness,
the data is also saved somewhere else.Insert anomalies-:
We tried to insert data in a record that does not exist at all. Normalization is a method to
remove all these anomalies and bring the database to a consistent state.
First Normal Form-:First Normal Form is defined in the definition of relations (tables) itself. This rule defines
that all the attributes in a relation must have atomic domains. The values in an atomic domain are indivisible
units. We re-arrange the relation (table) as below, to convert it to First Normal Form.
Each attribute must contain only a single value from its pre-defined domain.
Second Normal Form-:Before we learn about the second normal form, we need to understand the following
1. Prime attribute : An attribute, which is a part of the prime-key, is known as a prime attribute.
2. Non-prime attribute: An attribute, which is not a part of the prime-key, is said to be a non-primeattribute. If we follow second normal form, then every non-prime attribute should be fully functionally
dependent on prime key attribute. That is, if X A holds, then there should not be any proper subset Y of X,
for which Y A also holds true. We see here in Student_Project relation that the prime key attributes areStu_ID and Proj_ID. According to the rule, non-key attributes, i.e. Stu_Name and Proj_Name must be
dependent upon both and not on any of the prime key attribute individually. But we find that Stu_Name can be
identified by Stu_ID and Proj_Name can be identified by Proj_ID independently. This is called partialdependency, which is not allowed in Second Normal Form. We broke the relation in two as depicted in the
above picture. So there exists no partial dependency.
For More Info visit: www.ibtindia.com or call: 94636-12090 Page 18
7/24/2019 76ibps So-it Officer-computer Cracker
19/55
IBPS SO:IT OFFICER COMPUTER CRACKER
Third Normal Form-:For a relation to be in Third Normal Form, it must be in Second Normal form and the
following must satisfy No non-prime attribute is transitively dependent on prime key attribute. For any non-
trivial functional dependency, X A, then either X is a super key or, A is prime attribute. We find that inthe above Student_detail relation, Stu_ID is the key and only prime key attribute. We find that City can be
identified by Stu_ID as well as Zip itself. Neither Zip is a super key nor is City a prime attribute. Additionally,
Stu_ID Zip City, so there exists transitive dependency. To bring this relation into third normal form, webreak the relation into two relations as follows-
Boyce-Codd Normal Form-: Boyce-Codd Normal Form (BCNF) is an extension of Third Normal Form on
strict terms. BCNF states that For any non-trivial functional dependency, X A, X must be a super-key. Inthe above image, Stu_ID is the super-key in the relation Student_Detail and Zip is the super-key in the relation
ZipCodes. So, Stu_ID Stu_Name, Zip and Zip City which confirms that both the relations are in BCNF.
ACID Properties-:
A transaction is a very small unit of a program and it may contain several low level tasks. Atransaction in a database system must maintain Atomicity, Consistency, Isolation, and Durability commonly known as ACID properties in order to ensure accuracy, completeness, and data integrity.
Atomicity This property states that a transaction must be treated as an atomic unit, that is, either all
of its operations are executed or none. There must be no state in a database where a transaction is left
partially completed. States should be defined either before the execution of the transaction or afterthe execution/abortion/failure of the transaction.
Consistency The database must remain in a consistent state after any transaction. No transactionshould have any adverse effect on the data residing in the database. If the database was in a
consistent state before the execution of a transaction, it must remain consistent after the execution ofthe transaction as well.
Durability The database should be durable enough to hold all its latest updates even if the system
fails or restarts. If a transaction updates a chunk of data in a database and commits, then the databasewill hold the modified data. If a transaction commits but the system fails before the data could be
written on to the disk, then that data will be updated once the system springs back into action.
Isolation In a database system where more than one transaction are being executed simultaneouslyand in parallel, the property of isolation states that all the transactions will be carried out andexecuted as if it is the only transaction in the system. No transaction will affect the existence of any
other transaction.
OLAP-:On Line Analytical Processing (OLAP) is a Business Intelligence (BI) reporting system. OLAP
provides the user with the capability to sum, count, average and do other simple arithmetic operations ongroups of data. An OLAP report has measures and dimensions. Measures are the data values to be displayed.
For More Info visit: www.ibtindia.com or call: 94636-12090 Page 19
7/24/2019 76ibps So-it Officer-computer Cracker
20/55
IBPS SO:IT OFFICER COMPUTER CRACKER
Dimensions are characteristics of the measures. OLAP reports are called OLAP cubes, although such reportsare not limited to three dimensions.
ODBC-:
ODBC is a standard that contains an interface that provides a common language for applicationprograms to access and process SQL databases. In order to use ODBC, a driver, server name, database name,user id, and password are required. ODBC is important for Internet applications and has gained wide
acceptance.
ODBC- :
ODBC is a standard that contains an interface that provides a common language for applicationprograms to access and process SQL databases. In order to use ODBC, a driver, server name, database name,user id, and password are required. ODBC is important for Internet applications and has gained wide
acceptance.
Entity-:It is a 'thing' in the real world with an independent existence.
Entity type-:
It is a collection (set) of entities that have same attributes.
Entity set-:
It is a collection of all entities of particular entity type in the database.
Weak Entity set-:An entity set may not have sufficient attributes to form a primary key, and its primary key
compromises of its partial key and primary key of its parent entity, then it is said to be Weak Entity set.
Database Trigger-:A database trigger is a PL/SQL block that can defined to automatically execute for insert,
update, and delete statements against a table. The trigger can e defined to execute once for the entire statement
or once for every row that is inserted, updated, or deleted. For any one table, there are twelve events for whichyou can define database triggers. A database trigger can call database procedures that are also written in
PL/SQL.
Cold backup and hot backup (in case of Oracle)-:
Cold Backup-:
It is copying the three sets of files (database files, redo logs, and control file) when the instanceis shut down. This is a straight file copy, usually from the disk directly to tape. You must shut down the
instance to guarantee a consistent copy. If a cold backup is performed, the only option available in the event ofdata file loss is restoring all the files from the latest backup. All work performed on the database since the last
backup is lost.
Hot Backup-:Some sites (such as worldwide airline reservations systems) cannot shut down the database
while making a backup copy of the files. The cold backup is not an available option.
SQL view-:A SQL view is a virtual table built from other tables or views. Views are used to
(1) Hide columns or rows,
(2) show the results of computed columns,(3) Hide complicated SQL syntax,
(4) Layer built-in functions,(5) provide a level of indirection between application programs and tables,(6) Assign different sets of processing permissions to tables, and(7) To assign different sets of triggers to the same table.
What is Trigger-:A trigger is a SQL procedure that initiates an action when an event (INSERT, DELETE or
UPDATE) occurs. Triggers are Stored in and managed by the DBMS. Triggers are used to maintain thereferential integrity of data by changing the data in a systematic fashion. A trigger cannot be called or
executed; DBMS automatically fires the trigger as a result of a data modification to the associated table.
For More Info visit: www.ibtindia.com or call: 94636-12090 Page 20
7/24/2019 76ibps So-it Officer-computer Cracker
21/55
IBPS SO:IT OFFICER COMPUTER CRACKER
Triggers can be viewed as similar to stored procedures in that both consist of procedural logic that is stored atthe database level. Stored procedures, however, are not event-drive and are not attached to a specific table astriggers are. Stored procedures are explicitly executed by invoking a CALL to the procedure while triggers are
implicitly executed. In addition, triggers can also execute stored procedures.
What is Cursor-:Cursor is a database object used by applications to manipulate data in a set on a row-by- row
basis, instead of the typical SQL commands that operate on all the rows in the set at one time.In order to work with a cursor we need to perform some steps in the following order:
1. Declare cursor2. Open cursor3. Fetch row from the cursor4. Process fetched row5. Close cursor6. Deallocate cursor
Different Types of Join-:Cross Join a cross join that does not have a WHERE clause produces the Cartesian
product of the tables involved in the join. The size of a Cartesian product result set is the number of rows in the
first table multiplied by the number of rows in the second table. The common example is when company wants
to combine each product with a pricing table to analyze each product at each price.
Inner Join-A join that displays only the rows that have a match in both joined tables is known as inner Join.This is the default type of join in the Query and View Designer.
Outer Join- A join that includes rows even if they do not have related rows in the joined table is an OuterJoin. You can create three different outer join to specify the unmatched rows to be included:
Left Outer Join- In Left Outer Join all rows in the first-named table i.e. "left" table, which appears leftmost inthe JOIN clause are included. Unmatched rows in the right table do not appear.
Right Outer Join-In Right Outer Join all rows in the second-named table i.e. "right" table, which appearsrightmost in the JOIN clause are included. Unmatched rows in the left table are not included.
Full Outer Join- In Full Outer Join all rows in all joined tables are included, whether they are matched or not.
Self Join-This is a particular case when one table joins to itself, with one or two aliases to avoid confusion. A
self join can be of any type, as long as the joined tables are the same. A self join is rather unique in that itinvolves a relationship with only one table. The common example is when company has a hierarchal reportingstructure whereby one member of staff reports to another. Self Join can be Outer Join or Inner Join.
Data Warehousing-:
Subject-oriented, meaning that the data in the database is organized so that all the dataelements relating to the same real world event or object are linked together; Time-variant, meaning that the
changes to the data in the database are tracked and recorded so that reports can be produced showing changes
over time; Non-volatile, meaning that data in the database is never over-written or deleted, once committed,the data is static, read-only, but retained for future reporting. Integrated, meaning that the database contains
data from most or all of an organization's operational applications, and that this data is made consistent.
For More Info visit: www.ibtindia.com or call: 94636-12090 Page 21
7/24/2019 76ibps So-it Officer-computer Cracker
22/55
IBPS SO:IT OFFICER COMPUTER CRACKER
DATA STRUCTURE-:In computer science, a data structure is a particular way of storing and organizing
data in a computers memory so that it can be used efficiently. Data may be organized in many different ways;
the logical or mathematical model of a particular organization of data is called a data structure. The choice of aparticular data model depends on the two considerations first; it must be rich enough in structure to mirror the
actual relationships of the data in the real world. On the other hand, the structure should be simple enough that
one can effectively process the data whenever necessary.
Need of data structure-: It gives different level of organization data. It tells how data can be stored and accessed in its elementary level.Provide operation on group of data, such as adding an item, looking up highest priority item.Provide a means to manage huge amount of data efficiently.Provide fast searching and sorting of data.
Selecting a data structure-:Selection of suitable data structure involve following steps
Analyze the problem to determine the resource constraints a solution must meet.Determine basic operation that must be supported. Quantify resource constraint for each operation
Select the data structure that best meets these requirements.Each data structure has cost and benefits. Rarely is one data structure better than other in all situations.
Type of data structure-:1. Static data structure: A data structure whose organizational characteristics are invariant throughout itslifetime. Such structures are well supported by high-level languages and familiar examples are arrays and
records. The prime features of static structures are
[A]None of the structural information need be stored explicitly within the elements it is often held in adistinct logical/physical header;
[B]The elements of an allocated structure are physically contiguous, held in a single segment of memory.
[C]All descriptive information, other than the physical location of the allocated structure, is determined by thestructure definition.
[D]Relationships between elements do not change during the lifetime of the structure.2. Dynamic data structure-:
A data structure whose organizational characteristics may change during its
lifetime. The adaptability afforded by such structures, e.g. linked lists, is often at the expense of decreased
efficiency in accessing elements of the structure. Two main features distinguish dynamic structures from staticdata structures. Firstly, it is no longer possible to infer all structural information from a header; each data
element will have to contain information relating it logically to other elements of the structure. Secondly, usinga single block of contiguous storage is often not appropriate, and hence it is necessary to provide some storage
management scheme at run-time.
Linear Data Structure-:
A data structure is said to be linear if its elements from any sequence. There are
basically two ways of representing such linear structure in memory.
a) One way is to have the linear relationships between the elements represented by means of sequentialmemory location. These linear structures are called arrays.b) The other way is to have the linear relationship between the elements represented by means of pointers orlinks. These linear structures are called linked lists. The common examples of linear data structure are arrays,
queues, stacks and linked lists.
Non-linear Data Structure-:This structure is mainly used to represent data containing a hierarchical
relationship between elements. E.g. graphs, family trees and table of contents.
DATA STRUCTURE
For More Info visit: www.ibtindia.com or call: 94636-12090 Page 22
7/24/2019 76ibps So-it Officer-computer Cracker
23/55
IBPS SO:IT OFFICER COMPUTER CRACKER
Array-:The simplest type of data structure is a linear (or one dimensional) array. A list of a finite number n of
similar data referenced respectively by a set of n consecutive numbers, usually 1, 2, 3 . . . . . . . n. if we choose
the name A for the array, then the elements of A are denoted by subscript notation.
Linked List-:A linked list or one way list is a linear collection of data elements, called nodes, where the linear
order is given by means of pointers. Each node is divided into two parts:1.The first part contains the information of the element/node
2.The second part contains the address of the next node (link /next pointer field) in the list.
There is a special pointer Start/List contains the address of first node in the list. If this special pointer containsnull, means that List is empty.
Abstract Data Type-:It can be defined as a collection of data items together with the operations on the data.
The word abstract refers to the fact that the data and the basic operations defined on it are being studied
independently of how they are implemented. It involves what can be done with the data, not howhas to bedone. For ex, in the below figure the user would be involved in checking that what can be done with the data
collected not how it has to be done.
Queue- :
A queue is a linear list of elements inwhich deletion can take place only at one end,
called the front, and insertions can take place onlyat the other end, called the rear. The term front
and rear are used in describing a linear list only
when it is implemented as a queue. Queue is alsocalled first-in-first-out (FIFO) lists. Since the first
element in a queue will be the first element out of
the queue. In other words, the order in which elements enters a queue is the order in which they leave.
There are main two ways to implement a queue:1. Circular queue using array
2. Linked Structures (Pointers)
Primary queue operations:
Enqueue : insert an element at the rear of the queue.Dequeue : remove an element from the front of the queue Following is the algorithm which describes theimplementation of Queue using an Array.
Priority queue-:
Priority queue is a linear data structure. It is having a list of items in which each item hasassociated priority. It works on a principle add an element to the queue with an associated priority and remove
the element from the queue that has the highest priority. In general different items may have differentpriorities. In this queue highest or the lowest priority item are inserted in random order. It is possible to delete
an element from a priority queue in order of their priorities starting with the highest priority. While priority
queues are often implemented with heaps, they areconceptually distinct from heaps. A priority queue is an
abstract concept like "a list" or "a map"; just as a list can be
implemented with a linked list or an array, a priority queue
can be implemented with a heap or a variety of othermethods such as an unordered array.
Stack-:It is an ordered group of homogeneous items of
elements. Elements are added to and removed from the top
of the stack (the most recently added items are at the top ofthe stack). The last element to be added is the first to be
removed (LIFO: Last In, First Out).
For More Info visit: www.ibtindia.com or call: 94636-12090 Page 23
7/24/2019 76ibps So-it Officer-computer Cracker
24/55
IBPS SO:IT OFFICER COMPUTER CRACKER
Stack Operations-:These are two basic operations associated with stack:
1. Push() is the term used to insert/add an element into a stack.
2. Pop() is the term used to delete/remove an element from a stack.
Tree - :A node is a structure which may contain a value, a condition, or represent a separate data structure
(which could be a tree of its own). Each node in a tree has zero or more child nodes, which are below it in thetree (by convention, trees grow down, not up as they do in nature). A node that has a child is called the child's
parent node (or ancestor node, or superior). A node has at most one parent. Nodes that do not have any
children are called leaf nodes. They are also referred to as terminal nodes. The height of a node is the lengthof the longest downward path to a leaf from that node. The height of the root is the height of the tree. The
depth of a node is the length of the path to its root (i.e., its root path).
Binary Tree -:
The binary tree is a fundamental data structure
used in computer science. The binary tree is a useful datastructure for rapidly storing sorted data and rapidly retrieving
stored data. A binary tree is composed of parent nodes, or
leaves, each of which stores data and also links to up to two
other child nodes (leaves) which can be visualized spatially asbelow the first node with one placed to the left and with one
placed to the right. It is the relationship between the leaveslinked to and the linking leaf, also known as the parent node,
which makes the binary tree such an efficient data structure. It is
the leaf on the left which has a lesser key value (i.e, the valueused to search for a leaf in the tree), and it is the leaf on the rightwhich has an equal or greater key value. As a result, the leaves
on the farthest left of the tree have the lowest values, whereasthe leaves on the right of the tree have the greatest values. Moreimportantly, as each leaf connects to two other leaves, it is the beginning of a new, smaller, binary tree. Due to
this nature, it is possible to easily access and insert data in a binary tree using search and insert functionsrecursively called on successive leaves.
Complete Binary Tree -:A binary tree T with n levels is complete
if all levels except possibly the last are completely full, and the last
level has all its nodes to the left side. A complete binary tree has 2knodes at every depth k < n and between 2n and 2n+1-1 nodesaltogether. It can be efficiently implemented as an array, where a
node at index i has children at indexes 2i and 2i+1 and a parent at
index i/2, with one-based indexing. If child index is greater than thenumber of nodes, the child does not exist. A complete binary tree
can be represented in an array in the following approach. If root
node is stored at index i, its left, and right children are stored atindices 2*i+1, 2*i+2 respectively.
Traversal:-A traversal is a process that visits all the nodes in the tree. Since a tree
is a nonlinear data structure, there is no unique traversal.
There are three different types traversals,
PreOrder traversal -visit the parent first and then left and right children. InOrder traversal - visit the left child, then the parent and the right child. PostOrder traversal -visit left child, then the right child and then the parent.
There is only one kind of breadth-first traversal--the level order traversal.
For More Info visit: www.ibtindia.com or call: 94636-12090 Page 24
7/24/2019 76ibps So-it Officer-computer Cracker
25/55
IBPS SO:IT OFFICER COMPUTER CRACKER
This traversal visits nodes by levels from top to bottom and from left to right. As an example consider thefollowing tree and its four traversals:PreOrder - 8, 5, 9, 7, 1, 12, 2, 4, 11, 3
InOrder - 9, 5, 1, 7, 2, 12, 8, 4, 3,11PostOrder - 9, 1, 2, 12, 7, 5, 3, 11,4, 8In the next picture we demonstrate the order of node visitation. Number 1 denotes the first node in a particular
traversal and 7 denote the last node.
Binary Search Tree-:We consider a particular kind of a binary tree called
a Binary Search Tree (BST). The basic idea behind this data structure is to
have such a storing repository that provides the efficient way of data sorting,searching and retrieving. A BST is a binary tree where nodes are ordered in
the following way:
Each node contains one key (also known as data)The keys in the left subtree are less then the key in its parent node, in short
L < P.
The keys in the right subtree are greater the key in its parent node, in short P < R.
Duplicate keys are not allowed.In the following tree all nodes in the left subtree of 10 have keys < 10 while all nodes in the right subtree > 10.Because both the left and right subtrees of a BST are again search trees; the above definition is recursively
applied to all internal nodes:
Heaps-:A heap is a binary tree where the elements are arranged in a certain order proceeding from smaller to
larger. In this way, a heap is similar to a binary search tree (discussed previously), But the arrangement of theelements in a heap follows rules that are different from a binary search tree:1. In a heap, the element contained by each node is greater than or equal to the elements of that node's children.
2. The tree is a complete binary tree, so that every level except the deepest must contain as many nodes aspossible and at the deepest level, all the nodes are as far left as possible.
Linear Search-:Linear search or sequential search is a method for finding a particular value in a list that consistsof checking every one of its elements, one at a time and in sequence, until the desired one is found.
Binary search-:A binary search or half-interval search algorithm finds the position of a specified input value
(the search "key") within an array sorted by key value. For binary search, the array should be arranged in
ascending or descending order. In each step, the algorithm compares the search key value with the key value ofthe middle element of the array. If the keys match, then a matching element has been found and its index is
For More Info visit: www.ibtindia.com or call: 94636-12090 Page 25
7/24/2019 76ibps So-it Officer-computer Cracker
26/55
IBPS SO:IT OFFICER COMPUTER CRACKER
returned. Otherwise, if the search key is less than the middle element's key, then the algorithm repeats itsaction on the sub-array to the left of the middle element or, if the search key is greater, on the sub-array to theright. If the remaining array to be searched is empty, then the key cannot be found in the array and a special
"not found" indication is returned.
Graph-:Data sometimes contains a relationship between
pairs of elements which is not necessarily hierarchical innature, e.g. an airline flights only between the cities
connected by lines. This data structure is called Graph.
Graph representation: a graph is a collection of vertices
(or nodes), pairs of which are joined by edges (or lines).
Graph operations and representation-:
1. Path problems: Since a graph may have more than one path between two vertices, we may be interestedin finding a path with a particular property. For example, find a path with the minimum length from the
root to a given vertex (node).
2. Simple path: a path in which all vertices, except possibly the first and last, are different.
3. Undirected graph: a graph whose vertices do not specify a specific direction.4. Directed graph: a graph whose vertices do specify a specific direction.
5. Connected graph: there is at least one path between everypair of vertices.
6. Bipartite graphs: graphs that have vertexes that are partitioned into 2 subsets A and B, where every edge
has one endpoint in subset A and the other endpoint in subset B.
7. A complete graph: an n-vertex undirected graph with n(n-1)/2 edges is a complete graph.
8. A complete digraph: (denoted as Kn) for n-vertices a complete digraph contains exactly n(n-1) directed
edges
9. Incident: the edge (i, j) is incident on the vertices i and j (there is a path between i and j)
10. In-degree: the in-degree d of vertex i is the # of edges incident to i (the # of edges coming into this vertex)
11. The out-degree: the out-degree d of vertex i is the # of edges incident from vertex i (the # of edgesleaving vertex i)
12. The degree of a vertex: the degree d of vertex i of an undirected graph is the number of edges incident on
vertex i13. Connected component: a maximal sub-graph that is connected, but you cannot add vertices and edges
from the original graph and retain connectedness. A connected graph has EXACTLY one component
14. Communication network: Each edge is a feasible link that can be constructed. Find the components andcr