prepare for exams
Sunday, February 15, 2015
Wednesday, February 11, 2015
Top 50 SQL Question & Answers
Here are the 50 Common and Most Important SQL Questions asked in Exams and Interviews.
Have a look at these questions:
1. What is DBMS?
A Database Management System (DBMS) is a program that controls creation, maintenance and use of a database. DBMS can be termed as File Manager that manages data in a database rather than saving it in file systems.
2. What is RDBMS?
RDBMS stands for Relational Database Management System. RDBMS store the data into the collection of tables, which is related by common fields between the columns of the table. It also provides relational operators to manipulate the data stored into the tables.
Example: SQL Server.
Example: SQL Server.
3. What is SQL?
SQL stands for Structured Query Language , and it is used to communicate with the Database. This is a standard language used to perform tasks such as retrieval, updation, insertion and deletion of data from a database.
Standard SQL Commands are Select.
Standard SQL Commands are Select.
4. What is a Database?
Database is nothing but an organized form of data for easy access, storing, retrieval and managing of data. This is also known as structured form of data which can be accessed in many ways.
Example: School Management Database, Bank Management Database.
Example: School Management Database, Bank Management Database.
5. What are tables and Fields?
A table is a set of data that are organized in a model with Columns and Rows. Columns can be categorized as vertical, and Rows are horizontal. A table has specified number of column called fields but can have any number of rows which is called record.
Example:.
Table: Employee.
Field: Emp ID, Emp Name, Date of Birth.
Data: 201456, David, 11/15/1960.
Example:.
Table: Employee.
Field: Emp ID, Emp Name, Date of Birth.
Data: 201456, David, 11/15/1960.
6. What is a primary key?
A primary key is a combination of fields which uniquely specify a row. This is a special kind of unique key, and it has implicit NOT NULL constraint. It means, Primary key values cannot be NULL.
7. What is a unique key?
A Unique key constraint uniquely identified each record in the database. This provides uniqueness for the column or set of columns.
A Primary key constraint has automatic unique constraint defined on it. But not, in the case of Unique Key.
There can be many unique constraint defined per table, but only one Primary key constraint defined per table.
A Primary key constraint has automatic unique constraint defined on it. But not, in the case of Unique Key.
There can be many unique constraint defined per table, but only one Primary key constraint defined per table.
8. What is a foreign key?
A foreign key is one table which can be related to the primary key of another table. Relationship needs to be created between two tables by referencing foreign key with the primary key of another table.
9. What is a join?
This is a keyword used to query data from more tables based on the relationship between the fields of the tables. Keys play a major role when JOINs are used.
10. What are the types of join and explain each?
There are various types of join which can be used to retrieve data and it depends on the relationship between tables.
Inner join.
Inner join return rows when there is at least one match of rows between the tables.
Right Join.
Right join return rows which are common between the tables and all rows of Right hand side table. Simply, it returns all the rows from the right hand side table even though there are no matches in the left hand side table.
Left Join.
Left join return rows which are common between the tables and all rows of Left hand side table. Simply, it returns all the rows from Left hand side table even though there are no matches in the Right hand side table.
Full Join.
Full join return rows when there are matching rows in any one of the tables. This means, it returns all the rows from the left hand side table and all the rows from the right hand side table.
Inner join.
Inner join return rows when there is at least one match of rows between the tables.
Right Join.
Right join return rows which are common between the tables and all rows of Right hand side table. Simply, it returns all the rows from the right hand side table even though there are no matches in the left hand side table.
Left Join.
Left join return rows which are common between the tables and all rows of Left hand side table. Simply, it returns all the rows from Left hand side table even though there are no matches in the Right hand side table.
Full Join.
Full join return rows when there are matching rows in any one of the tables. This means, it returns all the rows from the left hand side table and all the rows from the right hand side table.
11. What is normalization?
Normalization is the process of minimizing redundancy and dependency by organizing fields and table of a database. The main aim of Normalization is to add, delete or modify field that can be made in a single table.
12. What is Denormalization.
DeNormalization is a technique used to access the data from higher to lower normal forms of database. It is also process of introducing redundancy into a table by incorporating data from the related tables.
13. What are all the different normalizations?
The normal forms can be divided into 5 forms, and they are explained below -.
First Normal Form (1NF):.
This should remove all the duplicate columns from the table. Creation of tables for the related data and identification of unique columns.
Second Normal Form (2NF):.
Meeting all requirements of the first normal form. Placing the subsets of data in separate tables and Creation of relationships between the tables using primary keys.
Third Normal Form (3NF):.
This should meet all requirements of 2NF. Removing the columns which are not dependent on primary key constraints.
Fourth Normal Form (3NF):.
Meeting all the requirements of third normal form and it should not have multi- valued dependencies.
First Normal Form (1NF):.
This should remove all the duplicate columns from the table. Creation of tables for the related data and identification of unique columns.
Second Normal Form (2NF):.
Meeting all requirements of the first normal form. Placing the subsets of data in separate tables and Creation of relationships between the tables using primary keys.
Third Normal Form (3NF):.
This should meet all requirements of 2NF. Removing the columns which are not dependent on primary key constraints.
Fourth Normal Form (3NF):.
Meeting all the requirements of third normal form and it should not have multi- valued dependencies.
14. What is a View?
A view is a virtual table which consists of a subset of data contained in a table. Views are not virtually present, and it takes less space to store. View can have data of one or more tables combined, and it is depending on the relationship.
15. What is an Index?
An index is performance tuning method of allowing faster retrieval of records from the table. An index creates an entry for each value and it will be faster to retrieve data.
16. What are all the different types of indexes?
There are three types of indexes -.
Unique Index.
This indexing does not allow the field to have duplicate values if the column is unique indexed. Unique index can be applied automatically when primary key is defined.
Clustered Index.
This type of index reorders the physical order of the table and search based on the key values. Each table can have only one clustered index.
NonClustered Index.
NonClustered Index does not alter the physical order of the table and maintains logical order of data. Each table can have 999 nonclustered indexes.
Unique Index.
This indexing does not allow the field to have duplicate values if the column is unique indexed. Unique index can be applied automatically when primary key is defined.
Clustered Index.
This type of index reorders the physical order of the table and search based on the key values. Each table can have only one clustered index.
NonClustered Index.
NonClustered Index does not alter the physical order of the table and maintains logical order of data. Each table can have 999 nonclustered indexes.
17. What is a Cursor?
A database Cursor is a control which enables traversal over the rows or records in the table. This can be viewed as a pointer to one row in a set of rows. Cursor is very much useful for traversing such as retrieval, addition and removal of database records.
18. What is a relationship and what are they?
Database Relationship is defined as the connection between the tables in a database. There are various data basing relationships, and they are as follows:.
One to One Relationship.
One to Many Relationship.
Many to One Relationship.
Self-Referencing Relationship.
One to One Relationship.
One to Many Relationship.
Many to One Relationship.
Self-Referencing Relationship.
19. What is a query?
A DB query is a code written in order to get the information back from the database. Query can be designed in such a way that it matched with our expectation of the result set. Simply, a question to the Database.
20. What is subquery?
A subquery is a query within another query. The outer query is called as main query, and inner query is called subquery. SubQuery is always executed first, and the result of subquery is passed on to the main query.
21. What are the types of subquery?
There are two types of subquery – Correlated and Non-Correlated.
A correlated subquery cannot be considered as independent query, but it can refer the column in a table listed in the FROM the list of the main query.
A Non-Correlated sub query can be considered as independent query and the output of subquery are substituted in the main query.
A correlated subquery cannot be considered as independent query, but it can refer the column in a table listed in the FROM the list of the main query.
A Non-Correlated sub query can be considered as independent query and the output of subquery are substituted in the main query.
22. What is a stored procedure?
Stored Procedure is a function consists of many SQL statement to access the database system. Several SQL statements are consolidated into a stored procedure and execute them whenever and wherever required.
23. What is a trigger?
A DB trigger is a code or programs that automatically execute with response to some event on a table or view in a database. Mainly, trigger helps to maintain the integrity of the database.
Example: When a new student is added to the student database, new records should be created in the related tables like Exam, Score and Attendance tables.
Example: When a new student is added to the student database, new records should be created in the related tables like Exam, Score and Attendance tables.
24. What is the difference between DELETE and TRUNCATE commands?
DELETE command is used to remove rows from the table, and WHERE clause can be used for conditional set of parameters. Commit and Rollback can be performed after delete statement.
TRUNCATE removes all rows from the table. Truncate operation cannot be rolled back.
TRUNCATE removes all rows from the table. Truncate operation cannot be rolled back.
25. What are local and global variables and their differences?
Local variables are the variables which can be used or exist inside the function. They are not known to the other functions and those variables cannot be referred or used. Variables can be created whenever that function is called.
Global variables are the variables which can be used or exist throughout the program. Same variable declared in global cannot be used in functions. Global variables cannot be created whenever that function is called.
Global variables are the variables which can be used or exist throughout the program. Same variable declared in global cannot be used in functions. Global variables cannot be created whenever that function is called.
26. What is a constraint?
Constraint can be used to specify the limit on the data type of table. Constraint can be specified while creating or altering the table statement. Sample of constraint are.
NOT NULL.
CHECK.
DEFAULT.
UNIQUE.
PRIMARY KEY.
FOREIGN KEY.
NOT NULL.
CHECK.
DEFAULT.
UNIQUE.
PRIMARY KEY.
FOREIGN KEY.
27. What is data Integrity?
Data Integrity defines the accuracy and consistency of data stored in a database. It can also define integrity constraints to enforce business rules on the data when it is entered into the application or database.
28. What is Auto Increment?
Auto increment keyword allows the user to create a unique number to be generated when a new record is inserted into the table. AUTO INCREMENT keyword can be used in Oracle and IDENTITY keyword can be used in SQL SERVER.
Mostly this keyword can be used whenever PRIMARY KEY is used.
Mostly this keyword can be used whenever PRIMARY KEY is used.
29. What is the difference between Cluster and Non-Cluster Index?
Clustered index is used for easy retrieval of data from the database by altering the way that the records are stored. Database sorts out rows by the column which is set to be clustered index.
A nonclustered index does not alter the way it was stored but creates a complete separate object within the table. It point back to the original table rows after searching.
A nonclustered index does not alter the way it was stored but creates a complete separate object within the table. It point back to the original table rows after searching.
30. What is Datawarehouse?
Datawarehouse is a central repository of data from multiple sources of information. Those data are consolidated, transformed and made available for the mining and online processing. Warehouse data have a subset of data called Data Marts.
31. What is Self-Join?
Self-join is set to be query used to compare to itself. This is used to compare values in a column with other values in the same column in the same table. ALIAS ES can be used for the same table comparison.
32. What is Cross-Join?
Cross join defines as Cartesian product where number of rows in the first table multiplied by number of rows in the second table. If suppose, WHERE clause is used in cross join then the query will work like an INNER JOIN.
33. What is user defined functions?
User defined functions are the functions written to use that logic whenever required. It is not necessary to write the same logic several times. Instead, function can be called or executed whenever needed.
34. What are all types of user defined functions?
Three types of user defined functions are.
Scalar Functions.
Inline Table valued functions.
Multi statement valued functions.
Scalar returns unit, variant defined the return clause. Other two types return table as a return.
Scalar Functions.
Inline Table valued functions.
Multi statement valued functions.
Scalar returns unit, variant defined the return clause. Other two types return table as a return.
35. What is collation?
Collation is defined as set of rules that determine how character data can be sorted and compared. This can be used to compare A and, other language characters and also depends on the width of the characters.
ASCII value can be used to compare these character data.
ASCII value can be used to compare these character data.
36. What are all different types of collation sensitivity?
Following are different types of collation sensitivity -
Case Sensitivity – A and a and B and b.
Accent Sensitivity.
Kana Sensitivity – Japanese Kana characters.
Width Sensitivity – Single byte character and double byte character.
Case Sensitivity – A and a and B and b.
Accent Sensitivity.
Kana Sensitivity – Japanese Kana characters.
Width Sensitivity – Single byte character and double byte character.
37. Advantages and Disadvantages of Stored Procedure?
Stored procedure can be used as a modular programming – means create once, store and call for several times whenever required. This supports faster execution instead of executing multiple queries. This reduces network traffic and provides better security to the data.
Disadvantage is that it can be executed only in the Database and utilizes more memory in the database server.
Disadvantage is that it can be executed only in the Database and utilizes more memory in the database server.
38. What is Online Transaction Processing (OLTP)?
Online Transaction Processing or OLTP manages transaction based applications which can be used for data entry and easy retrieval processing of data. This processing makes like easier on simplicity and efficiency. It is faster, more accurate results and expenses with respect to OTLP.
Example – Bank Transactions on a daily basis.
Example – Bank Transactions on a daily basis.
39. What is CLAUSE?
SQL clause is defined to limit the result set by providing condition to the query. This usually filters some rows from the whole set of records.
Example – Query that has WHERE condition
Query that has HAVING condition.
Example – Query that has WHERE condition
Query that has HAVING condition.
40. What is recursive stored procedure?
A stored procedure which calls by itself until it reaches some boundary condition. This recursive function or procedure helps programmers to use the same set of code any number of times.
41. What is Union, minus and Interact commands?
UNION operator is used to combine the results of two tables, and it eliminates duplicate rows from the tables.
MINUS operator is used to return rows from the first query but not from the second query. Matching records of first and second query and other rows from the first query will be displayed as a result set.
INTERSECT operator is used to return rows returned by both the queries.
MINUS operator is used to return rows from the first query but not from the second query. Matching records of first and second query and other rows from the first query will be displayed as a result set.
INTERSECT operator is used to return rows returned by both the queries.
42. What is an ALIAS command?
ALIAS name can be given to a table or column. This alias name can be referred in WHERE clause to identify the table or column.
Example-.
Select st.StudentID, Ex.Result from student st, Exam as Ex where st.studentID = Ex. StudentID
Here, st refers to alias name for student table and Ex refers to alias name for exam table.
Example-.
Select st.StudentID, Ex.Result from student st, Exam as Ex where st.studentID = Ex. StudentID
Here, st refers to alias name for student table and Ex refers to alias name for exam table.
43. What is the difference between TRUNCATE and DROP statements?
TRUNCATE removes all the rows from the table, and it cannot be rolled back. DROP command removes a table from the database and operation cannot be rolled back.
44. What are aggregate and scalar functions?
Aggregate functions are used to evaluate mathematical calculation and return single values. This can be calculated from the columns in a table. Scalar functions return a single value based on the input value.
Example -
Aggregate – max(), count – Calculated with respect to numeric.
Scalar – UCASE(), NOW() – Calculated with respect to strings.
Example -
Aggregate – max(), count – Calculated with respect to numeric.
Scalar – UCASE(), NOW() – Calculated with respect to strings.
45. How can you create an empty table from an existing table?
Example will be -
Select * into studentcopy from student where 1=2
Here, we are copying student table to another table with the same structure with no rows copied.
Select * into studentcopy from student where 1=2
Here, we are copying student table to another table with the same structure with no rows copied.
46. How to fetch common records from two tables?
Common records result set can be achieved by -
Select studentID from student. <strong>INTERSECT </strong> Select StudentID from Exam
Select studentID from student. <strong>INTERSECT </strong> Select StudentID from Exam
47. How to fetch alternate records from a table?
Records can be fetched for both Odd and Even row numbers -
To display even numbers-
Select studentId from (Select rowno, studentId from student) where mod(rowno,2)=0
To display odd numbers-
Select studentId from (Select rowno, studentId from student) where mod(rowno,2)=1 from (Select rowno, studentId from student) where mod(rowno,2)=1.[/sql]
To display even numbers-
Select studentId from (Select rowno, studentId from student) where mod(rowno,2)=0
To display odd numbers-
Select studentId from (Select rowno, studentId from student) where mod(rowno,2)=1 from (Select rowno, studentId from student) where mod(rowno,2)=1.[/sql]
48. How to select unique records from a table?
Select unique records from a table by using DISTINCT keyword.
Select DISTINCT StudentID, StudentName from Student.
Select DISTINCT StudentID, StudentName from Student.
49. What is the command used to fetch first 5 characters of the string?
There are many ways to fetch first 5 characters of the string -
Select SUBSTRING(StudentName,1,5) as studentname from student
Select RIGHT(Studentname,5) as studentname from student
Select SUBSTRING(StudentName,1,5) as studentname from student
Select RIGHT(Studentname,5) as studentname from student
50. Which operator is used in query for pattern matching?
LIKE operator is used for pattern matching, and it can be used as -.
1) % – Matches zero or more characters.
2) _(Underscore) – Matching exactly one character.
Example -
Select * from Student where studentname like ‘a%’
Select * from Student where studentname like ‘ami_’
1) % – Matches zero or more characters.
2) _(Underscore) – Matching exactly one character.
Example -
Select * from Student where studentname like ‘a%’
Select * from Student where studentname like ‘ami_’
The Difference Between a Computer Virus, Worm and Trojan Horse
The most common blunder people make when the topic of a computer virus arises is to refer to a worm or Trojan horse as a virus.
One common mistake that people make when the topic of a computer virus arises is to refer to a worm or Trojan horse as avirus.
While the words Trojan, worm and virus are often used interchangeably, they are not exactly the same thing. Viruses, worms and Trojan Horses are all malicious programs that can cause damage to your computer, but there are differences among the three, and knowing those differences can help you better protect your computer from their often damaging effects.
While the words Trojan, worm and virus are often used interchangeably, they are not exactly the same thing. Viruses, worms and Trojan Horses are all malicious programs that can cause damage to your computer, but there are differences among the three, and knowing those differences can help you better protect your computer from their often damaging effects.
What Is a Virus?
A computer virus attaches itself to a program or file enabling it to spread from one computer to another, leaving infections as it travels. Like a human virus, a computer virus can range in severity: some may cause only mildly annoying effects while others can damage your hardware, software or files. Almost all viruses are attached to an executable file, which means the virus may exist on your computer but it actually cannot infect your computer unless you run or open the malicious program. It is important to note that a virus cannot be spread without a human action, (such as running an infected program) to keep it going. Because a virus is spread by human action people will unknowingly continue the spread of a computer virus by sharing infecting files or sending emails with viruses as attachments in the email.
What Is a Worm?
A worm is similar to a virus by design and is considered to be a sub-class of a virus. Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any human action. A worm takes advantage of file or information transport features on your system, which is what allows it to travel unaided.
The biggest danger with a worm is its capability to replicate itself on your system, so rather than your computer sending out a single worm, it could send out hundreds or thousands of copies of itself, creating a huge devastating effect. One example would be for a worm to send a copy of itself to everyone listed in your e-mail address book. Then, the worm replicates and sends itself out to everyone listed in each of the receiver's address book, and the manifest continues on down the line.
Due to the copying nature of a worm and its capability to travel across networks the end result in most cases is that the worm consumes too much system memory (or network bandwidth), causing Web servers, network servers and individual computers to stop responding. In recent worm attacks such as the much-talked-about Blaster Worm, the worm has been designed to tunnel into your system and allow malicious users to control your computer remotely.
What Is a Trojan horse?
A Trojan Horse is full of as much trickery as the mythological Trojan Horse it was named after. The Trojan Horse, at first glance will appear to be useful software but will actually do damage once installed or run on your computer. Those on the receiving end of a Trojan Horse are usually tricked into opening them because they appear to be receiving legitimate software or files from a legitimate source. When a Trojan is activated on your computer, the results can vary. Some Trojans are designed to be more annoying than malicious (like changing your desktop, adding silly active desktop icons) or they can cause serious damage by deleting files and destroying information on your system. Trojans are also known to create a backdoor on your computer that gives malicious users access to your system, possibly allowing confidential or personal information to be compromised. Unlike viruses and worms, Trojans do not reproduce by infecting other files nor do they self-replicate.Sunday, February 8, 2015
An Overview of Five Year Plans (Planning Commission)
The Planning Commission was set up in March, 1950 by a Resolution of the Government of India. The economy of India is based on planning through its five-year plans, developed, executed and monitored by the Planning Commission .
With the Prime Minister as the ex-official Chairman, the commission has a nominated Deputy Chairman, who has rank of a Cabinet minister. Montek Singh Ahluvaliya was the last Deputy Chairman of the Commission. The eleventh plan completed its term in March 2012 and twelfth plan is currently underway.
With the Prime Minister as the ex-official Chairman, the commission has a nominated Deputy Chairman, who has rank of a Cabinet minister. Montek Singh Ahluvaliya was the last Deputy Chairman of the Commission. The eleventh plan completed its term in March 2012 and twelfth plan is currently underway.
Five Year Plans in India
Planning without an objective is like driving without any destination. There are two sets of objectives for planning, namely the short-term objectives and the long-term objectives. While the short-term objectives vary from plan to plan, depending on the immediate problems faced by the economy, the process of planning is inspired by certain long term objectives.
The long-term objectives are:
A high rate of growth
Economic self-reliance
Social justice and
Modernization of the economy
Economic stability
First Five Year Plan
First Plan (1951 − 56) It was based on Harrod-Domar Model. Community Development Program was launched in 1952. Emphasized on agriculture, price stability, power & transport. It was more than a success, because of good harvests in the last two years.
Second Five Year Plan
Second Plan (1956 − 61) Also called Mahalanobis Plan after its chief architect. Its objective was rapid industrialization. Advocated huge imports which led to emptying of funds leading to foreign loans. It shifted basic emphasis from agriculture to industry far too soon. During this plan, price level increased by 30%, against a decline of 13% during the First Plan.
Third Five Year Plan
Third Plan (1961 − 66) At its conception time, it was felt that Indian economy has entered a take-off stage. Therefore, its aim was to make India a ‘self-reliant’ and ‘self-generating’ economy. Also, it was realized from the experience of first two plans that agriculture should be given the top priority to suffice the requirement of export and industry. Complete failure due to unforeseen misfortunes, viz. Chinese aggression (1962), Indo-Pak war (1965), severest drought in 100 years (1965 − 66).
Three Annual Plans (1966 − 69):
Plan holiday for 3 years. The prevailing crisis in agriculture and serious food shortage necessitated the emphasis on agriculture during the Annual Plans. During these plans a whole new agricultural strategy involving wide-spread distribution of High-Yielding Varieties of seeds, the extensive use of fertilizers, exploitation of irrigation potential and soil conservation was put into action to tide-over the crisis in agricultural production. During the Annual Plans, the economy basically absorbed the shocks given during the Third Plan, making way for a planned growth.
Fourth Five Year Plan
Fourth Plan (1969 − 74). Main emphasis on agriculture’s growth rate so that a chain reaction can start. Fared well in the first two years with record production but last three years were failure because of poor monsoon. Had to tackle the influx of Bangladeshi refugees before and after 1971 Indo-Pak war.
Fifth Five Year Plan
Fifth Plan (1974 − 79) The fifth plan prepared and launched by D D Dhar proposed to achieve two main objectives viz, ‘removal of poverty’ (Garibi Hatao) and ‘attainment of self reliance’ through promotion of high rate of growth, better distribution of income and a very significant growth in the domestic rate of savings. The plan was terminated in 1978 (instead of 1979) when Janta Govt. Came to power.
Rolling Plan
Rolling Plan (1978 − 80) There were 2 Sixth Plans. First one is by Janta Govt (for 78 − 83) which was in operation for only 2 years. Second is by the Congress Govt. when it returned to power in 1980.
Sixth Five Year Plan
Sixth Plan (1980 − 85) Objectives: Increase in national income, modernization of technology, ensuring continuous decrease in poverty and unemployment, population control through family planning, etc.
Seventh Five Year Plan
Seventh Plan (1985 − 90) The Seventh plan emphasized policies and programs which aimed at rapid growth in food-grains production, increased employment opportunities and productivity within the framework of basic tenants of planning. It was a great success, the economy recorded 6% growth rate against the targeted 5%.
Eighth Five Year Plan
Eighth Plan (1992 − 97) The eighth plan was postponed by two years because of political upheavals at the Centre and it was launched after a worsening Balance of Payment position and inflation during 1990 − 91. The plan undertook various drastic policy measures to combat the bad economic situation and to undertake an annual average growth of 5.6% Some of the main economic performances during eighth plan period were rapid economic growth, high growth of agriculture and allied sector, and manufacturing sector, growth in exports and imports, improvement in trade and current account deficit.
Ninth Five Year Plan
Ninth Plan (1997 − 2002) It was developed in the context of four important dimensions: Quality of life, generation of productive employment, regional balance and self-reliance.
Tenth Five Year Plan
Tenth Plan (2002 − 2007) to achieve the growth rate of GDP@8%.
Reduction of poverty ratio to 20% by 2007 and to 10% by 2012.
Providing gainful high quality employment to the addition to the labour force over the tenth plan period.
Universal access to primary education by 2007.
Providing gainful and high-quality employment at least to the addition to the labor force.
Reduction in gender gaps in literacy and wage rates by at least 50% by 2007.
20-point program was introduced.
Eleventh Five Year Plan
Eleventh plan (2007-2012) The overall and comprehensive picture of the growth and plan performance during the 11th Five Year Plan (2007 – 2012) and performance of various Flagship programmes being implemented in the state for Economic growth, Ensuring Equity and Social Justice
Twelvth Five Year Plan
12th Five Year Plan(2012-2017). The Twelvth Five-Year Plan of the Government of India has decided for the growth rate at 8.2% but the National Development Council (NDC) on 27 Dec 2012 approved 8% growth rate for 12th five-year plan.
Friday, January 30, 2015
Important Facts about Indian Currency-Banking terminology
The Indian rupee symbol '' (officially adopted in 2010) is derived from the Devanagari consonant "र" (ra) and the Latin letter "R". The first series of coins with the rupee symbol was launched on 8 July 2011. Currency paper is composed of cotton and cotton rag.
RBI issues all the bank notes except Rupees 1 Notes. These notes are issued by Ministry of Finance. Recently RBI launched a website Paisa‐Bolta‐Hai to raise awareness of counterfeit or fake currency among users of the Indian Rupees and also the citizen of India.
The main security features of current banknotes are:
- →Watermark ‐ White side panel of notes has Mahatma Gandhi watermark.
- →Security thread ‐ All notes have a silver or green security band with inscriptions (visible when held against light) of Bharat in Hindi and "RBI" in English.
- →Latent image ‐ On notes of denominations of Rs.20 and upwards, a vertical band on the right side of the Mahatma Gandhi’s portrait contains a latent image showing the respective denominational value numerally (visible only when the note is held horizontally at eye level).
- →Micro lettering ‐ Numeral denominational value is visible under magnifying glass between security thread and latent image.
- →Intaglio ‐ On notes with denominations of INR5 and upwards the portrait of Mahatma Gandhi, the Reserve Bank seal, guarantee and promise clause, Ashoka Pillar Emblem on the left and the RBI Governor's signature are printed in intaglio (raised print).
- →Identification mark ‐ On the left of the watermark window, different shapes are printed for various denominations INR20: vertical rectangle, INR50: square, INR100: triangle, INR500: circle, INR1,000: diamond). This also helps the visually impaired to identify the denomination.
- →Fluorescence ‐ Number panels glow under ultraviolet light.
- →Optically variable ink ‐ Notes of Rs.500 and Rs.1,000 denominations have their numerals printed in optically variable ink. The number appears green when the note is held flat, but changes to blue when viewed at an angle.
- →See‐through register ‐ Floral designs printed on the front and the back of the note coincide and perfectly overlap each other when viewed against light.
- →EURion constellation ‐ A pattern of symbols found on the banknote helps software detect the presence of a banknote in a digital image, preventing its reproduction with devices such as colour photocopiers.
Different Kinds of Notes:
- →Genuine Notes: Such notes must have a water mark of Asoka Pillar, security thread and serial number along with alphabet. They have distinctive colours.
- →Soiled notes: The currency note which has become dirty due to its use or may be in 2 pieces. No portion of such note should be missing. These notes are accepted for exchange without any restrictions by the banks.
- →Mutilated notes: Such currency notes that are composed of various pieces or they are cut note of which some portion is missing. These notes are exchanged only by the currency chest branches of banks.
- →Single/double numbered notes: Notes up to Rs.5 are single numbered while the notes above Rs.5 are double numbered notes.
RBI’S Clean Note Policy
RBI had announced ‘Clean Note Policy’ in January, 1999.
For withdrawing soiled notes from circulation and pumping fresh notes into circulation, the RBI introduced various changes in the system and procedures related to currency management which include mechanization of the currency verification and processing as also shredding and briquetting for destruction of soiled and mutilated notes.
Rules and Instructions Issued by RBI:
→Not to staple bank notes.→To Tender soiled notes to the Reserve Bank in unstapled condition.
→To use bands instead of staple pins.
→To issue only clean notes to members of public.
→To open select currency chest branches on Sundays to provide exchange facility to members of public all over the county.
→To provide unrestricted facility for exchange of soiled and mutilated notes to members of public.
→Banks should sort notes into re‐issuables and non‐ issuables, and issue only clean notes to public.
→Soiled notes in unstapled condition may be tendered at RBI in inward remittances through Currency Chests.
→Banks should stop writing of any kind on watermark window of bank notes.
Coins of 25 Paise and Below – Withdrawal
→Govt, of India has decided to withdraw the coins of 25 paise and below from circulation from June 30, 2011. Coins of 25 paise and below are not accepted for exchange at the bank branches from July 1, 2011 onward.
Withdrawal of Pre‐2005 Notes:
→Reserve Bank of India decided to withdraw from circulation all banknotes issued prior to 2005 as they have fewer security features as compared to banknotes printed after 2005.
→The withdrawal exercise is in conformity with the standard international practice of not having multiple series of notes in circulation at the same time.
→The RBI has already been withdrawing these banknotes in a routine manner through banks.
→It is estimated that the volume of such banknotes (pre‐2005) in circulation is not significant enough to impact the general public in a large way and the members of public may exchange the pre‐2005 series banknotes at bank branches at their convenience.
→The deadline for exchanging pre‐2005 currency notes of various denominations, including Rs.500 and Rs.1,000, has been extended by another six months till June 30, 2015.
Monday, January 26, 2015
Deccan (Telangana) Grameena Bank Recruitment 2015,TGB Jobs,Careers
Deccan/ Telangana Grameena Bank Recruitment 2015
Deccan Telangana Grameena Bank presently has the Head Office in Hyderabad in the State of Telangana (officially changed and renamed as Telangana Grameena bank) will officially release 2015 Notification.
Notifications will be available in the official website of Institute of Banking Personnel Selection (IBPS) i.e www.ibps.in or their official website www.dgbhyd.com.in (now changed to www.tgbhyd.in).
Every year Deccan/ Telangana Grameena Bank invites online applications from the eligible candidates (who have qualified in the RRB Exam conducted by IBPS) with valid IBPS RRB Score 2015, for the post of officer scale-1, Scale-2, Scale-3 and Office Assistant (Multipurpose) and Specialist officers (SO) vacancies.
Deccan Grameena Bank Recruitment 2015 Notification publish twice or thrice in the year depending on the vacancies available in the bank. When Deccan Grameena Bank 2015 Recruitment notification releases for the office scale-I,II,III and office assistant (Multipurpose) vacancies,the candidates must have a valid IBPS Score Card (The IBPS Score Card obtained from the examination conducted by IBPS in the year 2014 September)
Huge number of candidates waits for Deccan Grameena Bank Recruitment 2015 Notification for the post of Clerk,PO,Office Scale-I,II,III & Office Assistant vacancies.when the notification advertisement published in the official website, the candidates can apply online application form from www.ibps.in or www.dgbhyd.com who has valid IBPS Valid Score Card 2014.Deccan Grameena Bank Notification 2015 advertisement mentions all eligibility details regarding age limit,education qualification,selection process,challan,cut off marks.
Eligibility Criteria for Deccan Grameena Bank Recruitment 2015 :
Education Qualification : The applicants must have degree qualification from the recognized university with proficiency in local language.
Age Limit :
For Officer Scale- III- Above 21 years – Below 40 years i.e. candidates should not have
been born earlier than 03.06.1975 and later than31.05.1994 (both dates inclusive).
For Officer Scale- II
– Above 21 years – Below 32 years i.e. candidates should not have been born earlier than 03.06.1983 and later than 31.05.1994 (both dates inclusive).
For Officer Scale- I
– Above 18 years – Below 28 years i.e. candidates should not have been
born earlier than 03.06.1987 and later than 31.05.1997 (both dates inclusive).
For Office Assistant (Multipurpose)
– Between 18 years and 28 years i.e. candidates should have not be born earlier than 02.06.1987 and later than 01.06.1997 (both dates inclusive).
Selection Process : The applicants must have a valid IBPS Score Card,the candidates will be called for interview based on the IBPS Score Card.
How to Apply : The interested candidates who has a valid ibps score card can fill online application form from the official website www.ibps.in or www.dghyd.com.After filling Deccan Grameena Bank Recruitment 2015 online application,take print out of the filled online application form 2015 and should be kept by them which should be submitted at the time of interview.
The applicants can refer more details on these Deccan Grameena Bank Recruitment 2015notification regarding age limit,selection process,call letter,admit card,interview list,interview date,cut off marks from the given link below.
Bank Recruitment 2015 (IBPS)
IBPS (Institute of Personal Banking Selection) Recruitment Board invites the applications through online from the eligible aspirants allover the country for the posts of IBPS PO, IBPS Clerk, IBPS Specialist Officers and Regional Rural Banks (RRB's) exams. Generally these notifications are released from the August month of every year, so this year also we can here from IBPS about these Notifications.
IBPS Recruitment 2015 PO/ Clerk/ SO/ RRB :-
Firstly the Notification for the Recruitment of RRB's Officer Scale-1, Scale-2, Scale-3 and Office Assistants (Multipurpose) will be released. Then comes the IBPS PO, IBPS Clerks and finally the notification will be for the recruitment of Specialist Officers (IT, Law and RajBhasha Adhikari).
Aspirants who wish to make career as a PO (Probationary Officer) or Clerk or Officer Scale-1/ Scale-2/ Scale-3 or Office Assistant (Multipurpose) have to apply for each exam application through ONLINE separately before the Last Date of Applications. Then the candidates have to appear each of the applied exams separately and have to clear the Cutoff marks (which will be announced by the IBPS with the RESULTS). The Candidates who have secured the marks above the cutoff marks are then called for the further tests (as mentioned in the Notification), and then IBPS itself makes the shortlist (depends on the posts available for this 2015 year) of the candidates who are in the top of the list and assigns the bank (as selected by the candidate in the application form in the preference order).
Finally, the shortlisted candidate has to report the bank (assigned to them) as of the mentioned date (will be given on the offer letter).
Other details on this IBPS Bank Recruitment 2015 regarding Age Limits, Education Qualification, and Selection Process has been explained in detail below,
IBPS Recruitment 2015 Eligibility Details :-
Candidates must have any Degree as the Qualification for the posts of IBPS PO, IBPSClerk, IBPS RRBs and IBPS SO (Specialist Officers-Law,IT,RajBhasha)
Note: For the post of IBPS SO (Specialist Officers) the candidate should have the mentioned qualification for each category,
→Degree in Computer Science/Information Technology for IT Officers
→Degree in Law for Law Officers
→Degree in Language (as per noification) for RajBhasha Adhikari
IBPS Recruitment 2015 Selection Process :-
From 2015 IBPS has changed the process in Recruitment of PO's and Clerks, and has made no changes in the Recruitment of RRB Officer Scale-1, Scale-2, Scale-3 and Office Assistants (Multipurpose).
Here is the Process of Selection for IBPS Recruitment 2015 for PO's and Clerks:
Stage -1: Preliminary
→The Candidate has to appear for the Preliminary Exam 2015 conducted by IBPS for both PO and Clerk posts separately.
*Within 10 to 20 days IBPS will publish the Results of the Preliminary Exam. Thus it reduce the number of candidates by filtering through their performance in Preliminary.
Stage -2: Mains
→This Exam is only for those Candidates who have qualified in the IBPS preliminary Exam 2015, this will be the final Final Written Test.
Stage -3: Interview
→Candidates who has appeared for both Exams and Qualified for the Interview are then called for Interview according to their Secured Marks/ Roll Numbers/ Registration Numbers.
Finally IBPS announces the Final List of the Selected Candidates in this overall Recruitment Process.
How to apply for IBPS Recruitment 2015 :-
Interested candidates have to apply for each post separately by visiting the Official IBPS Website.
→Here are the Application process in detail:
1. Login to official website www.ibps.in
2. On the left hand side of the computer screen, you will able to see four labels of PO,SO,RRB,Clerk. (Here the list of Notifications/ Online Applications/ Results/ Any Changes in the Recruitment are available)
3. Then click on the desired label which you wish to apply.
4. You are redirected to another window.
5. Click on the latest notification advertisement.
6. Click on the link “Apply online”
7. Fill all the required details in the application by uploading photograph and signature.
8. After filling application form,submit it.
9. You can pay prescribed amount of application fee through online or offline.
Stay tuned this website for latest notification on bank exams, SBI exams,govt jobs.If you have any doubts on IBPS Recruitment 2015 comment below, we will reply as soon as possible.
Subscribe to:
Posts (Atom)