Tu Service Commission - Computer Officer Syllabus

 

k|fljlws clws[t-sDKo'6/_ kbsf] v'Nnf k|ltof]lutfsf] lnlvt k/LIffsf] kf7\of+z

k|fljlws clws[t-sDKo'6/_ kbsf] v'Nnf k|ltof]lutfsf] lnlvt k/LIff lngsf lgldQ !)) ÷ !)) k"0ff{Ísf tLg kqx¿ /xg] 5g\ . tLg} kqsf] s"n cÍ hf]8\bf s"n k"0ff{Í #)) df Go"gtd\ %)Ü cÍ -cyf{t !%) cÍ_ k|fKt u/]sf pDd]bjf/x¿sf] of]Uotf;"rL tof/ kfl/g] 5 .

k|yd kq M– ljifout / ;}4flGts

k"0ff{Í !))

;do # 306f

1.     Computer Fundamentals

1.1.Introduction to computer systems:

1.2.Hardware: Definition of Hardware

1.2.1.Input devices: keyboard, mouse, Scanner, etc.

1.2.2.CPU: Arithmetic logical unit (ALU), Control Unit (CU), Memory unit (MU)

1.2.3.Output devices: Monitor, Printer etc.

1.2.4.Storage devices: Primary and Auxiliary Memory 1.2.5.Others: Network card, Modem, Sound card etc.

1.3.Software: Introduction to computer software, Operating system, Programming Languages and Application software.

1.4.BIOS, Firmware and cache memory concept

1.5.Concept of computer viruses and remedies

1.6.Concept of Multimedia, Hypermedia

1.6.1.Troubleshooting methods

2.    Procedural and Object Oriented Programming Languages

2.1.Procedural Programming Language

2.1.1.Types of data

2.1.2.Data representation

2.1.3.Data structure

2.1.4.Arrays

2.1.5.Operators

2.1.6.Variables and assignments

2.1.7.Control structures

2.1.8.Procedure/Function

2.2.Object Oriented Programming Language

2.2.1.Object and Classes

2.2.2.Method

2.2.3.Inheritance

2.2.4.Polymorphism

2.2.5.Modularity

2.2.6.Encapsulation

2.2.7.Abstraction

2.2.8.Operator Overloading

3.    Digital Logic and Microprocessors

3.1.Digital Logic

3.1.1.Digital and Analog Systems

3.1.2.Number Systems

3.1.3.Boolean Algebra

3.1.4.Combinational Logic Circuits

3.1.5.Sequential Logic Circuits

3.1.6.MSI Logic circuits

3.1.7.Counters and Registers

3.1.8.IC logic families

3.1.9.Memory Devices

3.2.Microprocessors

3.3.Machine languages, Interpreters and Compilers

3.4.808X and Intel microprocessors: programming and interfacing

3.5.Instruction sets and addressing modes; assembly language programming, I/O and interrupt servicing

4.    Data Structure and Algorithms

4.1.Abstract Data Types

4.1.1.Arrays

4.1.2.Stacks

4.1.3.Queues

4.1.4.Linked Lists

4.2.Trees

4.2.1.General and binary trees

4.2.2.Representations and traversals

4.2.3.Binary search trees

4.2.4.Balancing trees

4.2.5.AVL trees

4.3.Indexing Methods

4.3.1.Hashing Trees

4.3.2.Suffix Trees

4.4.Analysis of Algorithms

4.4.1.Asymptotic Notation

4.4.2.Notions of Space and Time Complexity

4.4.3.Worst and Average Case Analysis

4.5.Algorithm Design

4.5.1.Greedy Approach

4.5.2.Dynamic Programming

4.5.3.Divide-and-Conquer

4.5.4.Backtracking

4.6.Graph Traversals

4.6.1.Connected Components

4.6.2.Spanning Trees

4.6.3.Shortest Paths

4.6.4.Hashing

4.6.5.Sorting

4.6.6.Searching

4.6.7.Merging

4.6.8.Depth-first Search and Breadth-first Search

5.    Operating Systems

5.1.History & concepts of operating system

5.2.Processing and Threads:

5.2.1.Symmetric Multiprocessing

5.2.2.Micro-kernels

5.2.3.Concurrency

5.2.4.Mutual Exclusion and Synchronization

5.2.5.Deadlock

5.3.Scheduling

5.4.Memory Management

5.5.Input Output and Files

5.5.1.I/O devices and its organization,

5.5.2.Principles of I/O software and hardware,

5.5.3.Disks, Files and directories organization,

5.5.4.File System Implementation

5.6.Distributed Systems:

5.6.1.Distributed Message passing

5.6.2.RPC

5.6.3.Client/Server Computing

5.6.4.Clusters

5.7.Basic characteristics of modern operating systems: Linux, Windows

6.    Database Management System

6.1.Introduction

6.1.1.The relational model

6.1.2.ER model

6.1.3.SQL

6.1.4.Functional dependency and relational database design

6.1.5.File structure

6.2.Transaction Management and Concurrency Control

6.2.1.Concurrent execution of the user programs

6.2.2.Transactions

6.2.3.Concurrency control techniques

6.3.Crash Recovery

6.3.1.Types of failure

6.3.2.Recovery techniques

6.4.Query Processing and Optimization

6.5.Distributed Database Systems and Object oriented database system

7.    Computer Organization and Architecture

7.1.Basic computer organization and design

7.2.Computer Instruction

7.3.Timing and control

7.4.Execution of instruction

7.5.Input-output and Interrupt

7.6.Addressing modes

7.7.Processor bus organization

7.8.Stack organization

7.9.Microprocessor organization

7.10.                  RISC / CISC architecture

7.11.                  I/O devices

7.12.                  Asynchronous data transfer

7.13.                  DMA

7.14.                  I/O organization 7.15.    Memory system

k|Zg of]hgf

!) k|Zg x !) º !))

;a} k|Zgx¿ clgjfo{ x'g]5g\ .

-dfly pNn]lvt k|To]s PsfO{ jf6 kg]{ u/L ljifout k|Zgsf nflu tf]lsPsf] cÍsf k|Zgx¿sf] Pp6f nfdf] k|Zg jf Pp6} k|Zgsf b'O{ jf b'O{ eGbf a9L efu - two or more parts of a single question _ jf Pp6f k|Zg cGtu{t b'O{ jf a9L l6Kk0fLx¿ -Short notes _ ;f]Wg ;lsg] 5 . _

k|fljlws clws[t -sDKo'6/_ kbsf] v'Nnf k|ltof]lutfsf] lnlvt k/LIffsf] kf7\of+z

bf];|f] kqM– ljifout                                     k"0f{fÍ M– !))

;do # 306f

1 Theory of Computation

        7.16.          Regular Languages and Finite Automata

        7.17.          Context Free Languages and Push-down Automata

        7.18.           Recursively Enumerable Sets and Turing Machines

        7.19.           Undecidability

        7.20.           Completeness

2 Computer Networks and Network Security

        7.21.           Network Definition, Network Models, Connectivity, Network Addressing

7.22.           The Data Package, Establishing a Connection, Reliable Delivery, Network Connectivity, Noise Control, Building Codes, Connection Devices

        7.23.           ISO/OSI Model

        7.24.           LAN technologies (Ethernet, Token Ring)

        7.25.           Flow and Error Control Techniques

        7.26.          Routing Algorithms, Congestion Control

        7.27.           TCP/IP, UDP, Sockets

        7.28.           IP (v4), IP (v6),

        7.29.           Dynamic Host Configuration Protocol

        7.30.          Application Layer Protocols (ICMP, DNS, SMTP, POP, FTP, http)

        7.31.           Basic concepts of Hubs, Switches, Gateways, and Routers LAN

7.32.           Protocols on a Network, IP Routing, IP Routing Tables, Router Discovery Protocols, Data Movement in a Routed Network, Virtual LANs (VLANS)

7.33. The WAN Environment, Wan Transmission Technologies, Wan Connectivity Devices, Voice Over Data Services

        7.34.          Internetworking, E-mail, Internet and Intranet, Extranet

        7.35.               Remote Networking: Remote Networking, Remote Access protocols, VPN Technologies.

        7.36.           Computer Security: Computer Virus, Worm, Trojan Horse.

7.37. Network Security: Introduction, Virus Protection, Local Security, Network Access, Internet Security.

7.37.1. Encryption, Decryption, Asymmetric / Symmetric Algorithms

7.37.2. RSA Algorithm,

7.37.3. Firewalls, Proxies, Intrusion Detection and Protection System

7.37.4. Security- Confidentiality, Integrity and Authentication

7.38.           Disaster Recovery: The need for Disaster Recovery, Disaster Recovery plan, Data backup, Fault Tolerance.

7.39.           Advanced Data Storage Techniques: Enterprise Data Storage, Clustering, Network Attached Storage, Storage Area Networks.

        7.40.          Network Troubleshooting: Using Systematic Approach to Troubleshooting.

        7.41.           Network Support Tools: Utilities, The Network Baseline.

        7.42. Network Access Points (NAP), Common Network Component, Common Peripheral Ports.

3. System Analysis and Design

        7.43.         Entity Relationship Diagram, Data Flow Diagram, Software Development Life Cycles, MIS

        7.44.              Decision Support System, Software Engineering and User-Interface Design Considerations.

        7.45.          Context diagram, Top level DFD, Expansion Level DFD, Conversions of Data

        7.46.           Object -Oriented Concept, Object Structure, Object Feature, Class and Object

        7.47.          Association and Composition, Inheritance, Multiple Inheritances

        7.48.           Use Case Diagram, State Diagram, Event Flow Diagram

4. Software Engineering

        7.49.           Software process

7.49.1. The software lifecycle models

7.49.2. Risk-driven approaches

        7.50.          Software project management

        7.51.          Software requirements

        7.52.           Software design

        7.53.          Software Implementation

        7.54.          Software maintenance

        7.55.           SE issues

7.55.1. Formal issue

7.55.2. Tools and environments for software engineering

7.55.3. Role of programming paradigm

7.55.4. Process maturity and improvement

7.55.5. ISO standards

7.55.6. CASE tools

5 Artificial Intelligence

7.56.           Concepts of artificial intelligence 7.57.      Overview of knowledge-based

        7.58.           Logic programming.

        7.59.           Programming languages (LISP and Prolog) for AI

        7.60.          Knowledge representation.

        7.61.          Rule-based and object-based systems.

7   Data Communications

        7.62.          Block Diagram of analog/ digital communication system

        7.63.          Analog and Digital modulation techniques

        7.64.           Data communications, including signals, modulation and reception.

        7.65.           Error detecting and correcting codes.

        7.66.          Circuit and Packet switching.

        7.67.          Multiplexing, including time, frequency and code division multiplexing.

        7.68.           Digital networks: ISDN, frame relay and ATM

8 Computer Graphics

        7.69.           Graphics concepts

        7.70.          Input devices and techniques

        7.71.           Basic raster graphics algorithms and primitives

        7.72.           Scan conversion

        7.73.           Graphics hardware

        7.74.           2D geometrical transformations and viewing

        7.75.           3D geometry and viewing

        7.76.           Hierarchical modeling

        7.77.           Projections

        7.78.           Hidden surface removal

        7.79.           Shading and rendering

(=   ljifo ;+u ;DjlGwt Ps k|Zg lgdf{0f ul/g] 5 . pQm k|Zgsf] pQ/ c+u|]hL efiffdf @%) b]lv #)) zAbdf n]Vg' kg]{5 .

k|Zg of]hgf

!) k|Zg x !) º !))

;a} k|Zgx¿ clgjfo{ x'g]5g\ .

-dfly pNn]lvt k|To]s PsfO{ jf6 kg]{ u/L ljifout k|Zgsf nflu tf]lsPsf] cÍsf k|Zgx¿sf] Pp6f nfdf] k|Zg jf Pp6} k|Zgsf b'O{ jf b'O{ eGbf a9L efu - two or more parts of a single question _ jf Pp6f k|Zg cGtu{t b'O{ jf a9L l6Kk0fLx¿ -Short notes _ ;f]Wg ;lsg] 5 . _

k|fljlws clws[t -sDKo'6/_ kbsf] v'Nnf k|ltof]lutfsf] lnlvt k/LIffsf] kf7\of+z

t];|f] kqM– pRrlzIff / ljZjljBfno ;+u7g ;DaGwL 1fg

k"0ff{Í !))

;do # 306f !=  lzIff / z}lIfs k|zf;g s= lzIffsf] kl/ro, p4]Zo tyf lzIffsf] ;fdflhs,cfly{s / /fhg}lts e"ldsf

v= g]kfnsf] z}lIfs Oltxf; / dxTjk"0f{ z}lIfs 36gfx¿

u= z}lIfs k|zf;g ;DaGwL 1fgM– kl/ro tyf kl/efiff, p2]Zo / sfo{If]q

3= lqe'jg ljZjljBfnosf] z}lIfs k|zf;gsf] 1fgM– s]Gb|Lo k|zf;g, ;+sfo÷;+:yfg  k|zf;g / SofDk;  k|zf;g,

@=  pRr lzIffsf] Joj:yfkgsf ljljw kIfM

-s_= u'0f:t/, ;fGble{stf, kx'r / sfo{s'zntf

-v_= ;fj{hlgs, lghL, ;fem]bf/L

-u_= :jfoQtf / hafkmb]lxtf

-3_ g]kfndf pRr lzIffsf] ljsf;s|d

-ª_  g]kfndf  ljZjljBfnox? /  ltgLx?sf] jt{dfg cj:yf .

-r_= pRrlzIffsf] tfTko{ / g]kfndf pRr lzIffdf b]lvPsf r'gf}tLx¿

#= z}lIfs cg';Gwfg /  ljljw s= z}lIfs cg';Gwfgsf] cjwf/0f / p2]Zo v= gLlt lgdf{0f tyf of]hgf / sfo{s|dsf] ljsf;df cg';Gwfgsf] k|of]u / dxTj . u= ;fj{hlgs Joj:yfkgdf tYofÍ / ;"rgfsf] dxTj / pkof]u

3= ;"rgf k|ljlw ;DaGwL /fli6«o gLlt jf/] hfgsf/L ª= k':tsfno tyf ;"rgf ;DjGwL /fli6«o gLltjf/]sf] 1fg .

r= ljZjljBfno cg'bfg cfof]u – :yfkgfsf] p2]Zo, st{Jo tyf pQ/bfloTj 5== lzIff dGqfno, cy{ dGqfno,  ljZjljBfno cg'bfg cfof]u / ljZjljBfno jLrsf] ;DaGwsf ljljw cfofdx¿

$=  ;+ljwfg, P]g, lgod tyf lqe'jg ljZjljBfno ;+u7g;DaGwL

-s_=;+ljwfg, P]g, lgod / sfo{Joj:yfkg k|0ffnLsf] cy{ / logLx¿ jLrsf]  leGgtfx¿

-v_= lq=lj P]g @)$( -;+zf]wg ;lxt _ sf] hfgsf/L

-u_ lq=lj ;+u7g tyf z}lIfs k|zf;g ;DaGwL lgod @)%) -;+zf]wg ;lxt _ sf] hfgsf/L .

-3_  lq=lj lzIfs sd{rf/L ;]jf;DaGwL lgod @)%) -;+zf]wg ;lxt _ jf/] hfgsf/L

-ª_= lq=lj cfly{s Joj:yfkg / vl/b ;DjGwL lgod @)%) -;+zf]wg ;lxt _ jf/] hfgsf/L

-r_ lq=lj=sf] ljs]Gb|Ls/0f lgod @)%% jf/] hfgsf/L

-5_  :jfoQtf ;DaGwL lgod @)^@ jf/] hfgsf/L

%= jf]w–cleJolQm ÷ ;d:of–;dfwfg –

;+If]kLs/0f, lj:t[tLs/0f, a"Fbf l6kf]6, ;f/f+z, l6Kk0fL n]vg, cg'R5]b n]vg jf af]w k|Zgx?sf] dfWodjf6 uxgtd\ 9+un] af]w / cleJolQm Ifdtfsf] k/LIf0f jf s'g} klg ;d:of a'em\g / To;sf] ;dfwfg ug{ ;Sg] Ifdtfsf] k/LIf0f .

* k|Zg x !) = *)

af]w cleJolQm÷;d:of/ ;dfwfg ! k|Zg x @) º @)

;a} k|Zgx¿ clgjfo{ x'g]5g\ .

-dfly pNn]lvt k|To]s PsfO{ jf6 kg]{ u/L ljifout k|Zgsf nflu tf]lsPsf] cÍsf k|Zgx¿sf] Pp6f nfdf] k|Zg jf Pp6} k|Zgsf b'O{ jf b'O{ eGbf a9L efu - two or more parts of a single question _ jf Pp6f k|Zg cGtu{t b'O{ jf a9L l6Kk0fLx¿ -Short notes _ ;f]Wg ;lsg] 5 . _ 

Download in PDF From - This Link

Previous Post Next Post

نموذج الاتصال