Free Essay

Alphanumeric

In:

Submitted By sripandu3000
Words 907
Pages 4
FAQ

1. How do I apply for the program?
Candidates are required to apply online through the website www.federalbank.co.in.
The online application format is available in the Careers page of the website.
The link to the application form is as follows:
Federal Bank Home Page/Careers/Federal Manipal School of Banking/Apply Now!

2. How do I remit the application fee?
The applicants can pay the fees using any of the following facilities
Payment Gateway using Debit/Credit Card( will be activated in website by 09.10.12)
Internet Banking.
NEFT (remittance through any Commercial Bank of your choice)
Fee Payment Challan provided for remittance at Federal Bank Branches.

3.

What is the selection procedure?

Candidates shall be selected by Federal Bank through a selection process consisting of an open online exam followed by Personal interview and /or Group Discussion.
Online Aptitude test:
The online aptitude test will be for duration of 2 hours and shall comprise of the following tests, with a sufficiently high degree of difficulty:
Logical aptitude / reasoning
Quantitative / numerical aptitude
English language
General Awareness and Marketing Aptitude
Computer Awareness

4. How will a candidate be intimated of the online test and interview?
The Candidates should note that the entire selection procedure will be Online and that all the instructions/ intimations will be provided on the Bank’s website. The candidates are requested to check the website for the same from time to time for important dates and notifications.

5. What kind of documents am I supposed carry with me for the online examination?
The candidates are requested to bring the following documents at the time of attending the online examination.
Call Letter for the online examination with latest passport size photo
Printout of the online application form
Photo ID proof
Examination fee payment challan or payment receipt in other cases.

6. In what locations will the process be conducted?
The online test is conducted at around 33 locations across the country. The list is available in the drop down list provided in the online application form.

The candidate will be required to

choose 2 centres in their order of preference. It will be Bank’s endeavour to provide a test venue in one of the centres opted by the candidate in the order of his/her preference. Bank reserves the right to allot the candidate to any of the centres other than the one he/she has opted for, depending upon the administrative feasibility.
The dates and venues for the subsequent processes of interview/GDs will also be published in
Bank’s website. Bank will take all efforts to intimate all qualified candidates through SMS/E mail.

7. When is the selection process being held?
The On line Aptitude Test is likely to be held on various dates during the last week of October
2012. This will be followed by Group Discussion and /or Interview for candidates who are found successful in the aptitude test. The process is likely to be completed by November 2012 .

8. When does the course start?
The first batch will start in the 1st week of December 2012.

9. Where will the course be held?
The course will be conducted in the campus of Federal Manipal School of Banking at Bangalore.

10. How can I get an educational loan for this course if I am selected? What are the procedures to avail the Loan?
Educational Loan at concessional rate of interest will be offered to the desirous candidate, if selected. Such candidates shall have to complete the loan formalities includin g signing of loan documents etc. Parent/Guardian of the candidate shall join as co-obligant.

Details of the

formalities to be carried out for availing loan will be intimated along with the offer of admission.

11. What would be my Salary once I join the Bank after Completing the program
Your gross annual salary, based on IBA package and other perks (calculated on CTC basis , if posted at Mumbai) on joining the Bank will be Rs 5.90 Lakhs per annum. In addition to that officers are also eligible for annual increment in Basic pay, Leave Fare concession, reimbursement of cost of Brief case/ Office bag, Vehicle maintenance expenses, Closing allowance,
Scholarship to children, Club Allowance, Re-imbursement of cost of printing visiting cards,
Transfer compensation, Medical re-imbursement for self and dependents, Group Savings Linked
Insurance etc, subject to applicable rules.

12. What happens after I am selected?
The selected candidates will be issued an admission offer letter from Federal Bank, f or pursuing the PGBDF course at Federal Manipal School of Banking. The participants after successful completion of the course will be awarded the PGDBF certificate from Manipal University at a convocation ceremony where they shall also be handed over the offer of appointment from the
Bank. They shall undergo a one year probation period and can be posted anywhere in India as per the Bank’s discretion. They shall be confirmed in the services of the Bank as Assistant
Manager on completion of their probation period to the satisfaction of the Bank.

13. Where will I be posted after completion of the course?
Upon induction in the Bank as probationary officers on successful completion of their 1 year Post
Graduate Diploma course in Banking and Finance, candidates shall be deployed in Branches/ offices anywhere in India or Abroad considering the skills/expertise and competency of the participant and the administrative requirements of the bank.

Similar Documents

Free Essay

Lcd Alphanumeric

...LCD The most commonly used LCDs found in the market today are 1 Line, 2 Line or 4 Line LCDs which have only one controller and support at most 80 characters, whereas LCDs supporting more than 80 characters make use of 2 HD44780 controllers. Apart from displaying some simple static characters you can create animated text scripts and a lot more! Let’s start playing with them, but you will have to wait a little as these things mentioned below will help you to create your own magical codes. Most LCDs with 1 controller has 14 Pins and 16 Pins (two extra pins are for back-light LED connections). Pin description is shown in the table below. (We may also have 16 pins in 2 controllers, refer to the datasheet for exact details). This may not match with the exact pin configuration for your LCD, check application circuit in datasheet for exact configuration. We will discuss here 8 bit mode first (that is data transfer through all the 8 data pins), 4 bit mode will be discussed later on. Read/Write (RW): 1.) RW= 0, the information is being written on LCD. 2.) RW=1, for reading from LCD. (Only one command that is “Get LCD status” is a read command all others are write command) It is a control line. When RW is low (0), the information on the data bus is being written to the LCD. When RW is high (1), the program is effectively querying (or reading from) the LCD. Only one instruction ("Get LCD status") is a read command. All others are write commands--so RW will be low for majority of...

Words: 663 - Pages: 3

Free Essay

Questionnaire Test

...QUESTIONNAIRE SHEET NAME OF STUDENT: _______________________________________ MAT. NO.: _______________________________________ SECTION: _______________________________________ COURSE TITLE: _______________________________________ PROGRAM: _______________________________________ DATE OF ADMISSION: _______________________________________ ANSWER THE FOLLOWING QUESTIONS AFTER READING THE HANDOUT CAREFULLY. 1. __________________________define an office as a room or building where the clerical processes are being carried out to start, develop and control the various activities of business. 2. There are two types of office layout namely___________________ and __________________ 3. Source of noise in the office could be either___________________ or ___________________ 4. _________________, ____________________, _________________, ___________________ are examples of office machine. 5. A processes whereby a master copy is prepared from which a large number of other copies can be automatically reproduced is referred to as_______________________ machine. 6. A machine that receive information, process, it stores it , analysis it and produced it is referred to as___________________________________ 7. ________________ and _________________ are types of machine used to print on an envelop the design of a postage stamp and date mark. 8. ________________________ is a machine used to print on an envelop the design of a postage stamp and date marks. 9. ______________________...

Words: 306 - Pages: 2

Premium Essay

Nt1310 Unit 1 Exercise 2

...6.1 Occlusion Because QAZ Keyboard is nearly placed at the center of screen, contents on the screen are occluded by the keyboard. To address this issue, we plan to test the following three design alternatives. Reduction of keyboard size The second solution is to reduce the size of the keyboard. Since QAZ Keyboard is surrounded by space, ick or drag outward from the keyboard can also be used along with tapping. By utilizing this, outside keys can be shrunken, because using ick or drag can reduce the number of keys required. In this case, however, the optimum region may be different from the one we used in this paper, because it is necessary to rede ne the size of regions smaller by evaluating accuracy of ick or drag. QAZ Keyboard: QWERTY based Portrait Soft Keyboard 11 Semi-transparent keyboard The third solution is to make the keyboard semi- transparent. Because when we input text, we do not look at contents except for input component. Accordingly, reducing the occlusion with the almost transparent keyboard will be feasible. 6.2 Orientation of keys Orientation of keys may change the learning cost of the QAZ Keyboard, thus is one of our future work. Note that this paper presents QAZ Keyboard with keys oriented to users, i.e., the letter on the top of a key is placed with the same orientation in both keyboards as shown in Figure 1 and 2. However, this arrangement destroys the orientation relationships between the entire keyboard and keys of the conventional QWERTY layout. While...

Words: 421 - Pages: 2

Free Essay

Milestone 5 6

...AreaCode | A 3 – character alphanumeric field holding the client’s area code. | Barcode | A 20-character alphanumeric barcode ID that is either pre-printed on each component package or added via a label at Coastline Consulting. | City | A 20-character alphanumeric field holding the name of the client’s city. | ClientID | A system-generated large integer numeric value unique to each client. | CloseDate | A date field holding the date a service request was resolved. | Config | A system-generated large integer numeric value unique to each software configuration record. | ContactFirst | A 20-character alphanumeric field consisting of the first name of the client contact person. | ContactLast | A 30-character alphanumeric field consisting of last name of the client contact person. | DateInstalled | Date field consisting of the date a component was installed into a piece of equipment. | DateRemoved | Date field consisting of the date a component was removed from a piece of equipment. | Descrip | A 30-character description of the inventory. | Description | A 30-character description of the problem. | Details | A large alphanumeric field describing the work done on a work record. | Email | A 70-character alphanumeric field consisting of the client contact’s e-mail address. | Equipment | A 20-character alphanumeric description of the piece of equipment, if any, for a software configuration record. | EqName | A 15-character alphanumeric field holding the identifying...

Words: 651 - Pages: 3

Free Essay

Information Technology

...human interpretation, ambiguities arise. The most obvious is the similarity of the letters I, O and Q to the numbers 1 and 0. Therefore, depending on the application, various subsets of the alphanumeric were adopted to avoid misinterpretation by humans. In passenger aircraft, aircraft seat maps and seats were designated by row number followed by column letter. For wide bodied jets, the seats can be 10 across, labeled ABC-DEFG-HJK. The letter I is skipped to avoid mistaking it as row number 1. In Vehicle Identification Number used by motor vehicle manufacturers, the letters I, O and Q are omitted for their similarity to 1 or 0. Tiny embossed letters are used to label pins on an V.35/M34 electrical connector. The letters I, O, Q, S and Z were dropped to ease eye strain with 1, 0, 5, 3,and 2. That subset is named the DEC Alphabet after the company that first used it. For alphanumerics that are frequently handwritten, in addition to I and O, V is avoided because it looks like U in cursive, and Z for its similarity to 2. When a string of mixed alphabets and numerals is presented for human interpretation, ambiguities arise. The most obvious is the similarity of the letters I, O and Q to the numbers 1 and 0. Therefore, depending on the application, various subsets of the alphanumeric were adopted to avoid misinterpretation by humans. In passenger aircraft, aircraft seat maps and seats were designated by row number followed by column letter. For wide bodied jets, the seats...

Words: 397 - Pages: 2

Premium Essay

Changes To The ICD-9

...1. What is medical coding and what is it used for? According to AAPC, medical coding is the transformation of healthcare diagnosis, procedures, medical services, and equipment into universal medical alphanumeric codes. The diagnoses and procedure codes are taken from medical record documentation, such as transcription of medical notes, laboratory and radiologic results, etc. 2. What coding systems are used in the United States? The International Classification of Diseases (ICD) and the Current Procedural Terminology (CPT). According to the World Health Organization (WHO), 70% of the world's health care expenditures are allocated using ICD. ICD codes are alphanumeric designations given to every diagnosis, description of symptoms and cause of death attributed to human beings. 3. How did changes to the ICD-9 over the years reflect events? ICD-9-CM is based on the official version of the World Health Organization's 9th Revision of the International Classification of Diseases (ICD-9). In 1977, the steering committee was formed by the National Center for Health Statistics (NCHS) to clinically modify ICD-9 for use in the United States. The term "Clinical" meant that the United States needed a useful tool to report diagnoses, to classify morbidity data...

Words: 359 - Pages: 2

Premium Essay

Mct Answer Sheet for Term Test

...What is a Keypad? A keypad is a set of buttons or keys bearing digits, symbols and/or alphabetical letters placed in order on a pad, which can be used as an efficient input device. A keypad may be purely numeric, as that found on a calculator or a digital door lock, or alphanumeric as those used on cellular phones. Explanation for Keypad Aside from the row of number keys found on the upper portion of a computer keyboard, a separate numerical pad is also located on the right side for efficient data entry. For more compact computers such as laptops and notebooks, external plug-in keypads may be purchased separately. Phone keypads are typically alphanumeric, allowing the user to enter names and text messages. They also provide an easier way of remembering phone numbers. For instance, 1-800-DELIVER is a way of marketing a food chain delivery service, but it's easier to remember than the actual number customers would call (1-800-335-4837). How many I/0 interface pins between keypad (4x4) and PIC18f4520? A standard Microcontroller Keypad (4x4) has a 8 I/0 interface pins. In the example below, RB0 to R07 is connected to the 8 I/O pins of the Keypad (4x4) The standard PIC18f4520 Microcontroller has 36 I/O pins that are grouped into 5 ports respectively. Due to this, It should require 8 pins to connect the 4x4 Keypad to make it work. How to detect if the key is pressed? E.g. Of flowchart when things are input. When a key depression has been detected...

Words: 467 - Pages: 2

Free Essay

Automation

...Colegio de San Juan de Letran Calamba School Of Engineering Industrial Engineering Department Automated Conversion Technology Submitted to: Engr. Eugene Ramos Submitted by: Camille G. Cabral 4IE2 Date Submitted: January 21, 2016 Basic Elements of an Automated System Automation is defined as the creation and application of technology to monitor and control the production and delivery of products and services; or in simpler term it is the creation and application of technology to monitor and control the production and delivery of products and services. An Automated System has 3 basic elements, these are Power Source, Program of Instructions, and Control Systems. 1. Power – It refers to the supply needed in order to accomplish the process and operate the automated system. The most common power source is electricity. 2. Program of Instructions – It is the set of commands that specify the sequence of steps in the work cycle and the details of each step. It is used in directing the process. (e.g. Temperature setting of a furnace, Axis position in a positioning system, Motor on or off) 3. Control System – It is actuating of the instructions. Figure 1. The Basic Elements of an Automated System The figure above shows how power is being distributed to the other elements and to the process. Power for process is used to drive the process itself, to load and unload units, and transport between operations. It is also distributed to both 2 and 3 to...

Words: 1141 - Pages: 5

Free Essay

Owl for Paper Formatting

...4/11/2016 Purdue OWL Welcome to the Purdue OWL This page is brought to you by the OWL at Purdue (https://owl.english.purdue.edu/). When printing this page, you must include the entire legal notice at bottom. Contributors:Elyssa Tardiff, Allen Brizee. Summary: This resource describes why outlines are useful, what types of outlines exist, suggestions for developing effective outlines, and how outlines can be used as an invention strategy for writing. Four Main Components for Effective Outlines Ideally, you should follow the four suggestions presented here to create an effective outline. When creating a topic outline, follow these two rules for capitalization: For first­level heads, present the information using all upper­case letters; and for secondary and tertiary items, use upper and lower­case letters. The examples are taken from the Sample Outline handout. Parallelism—How do I accomplish this? Each heading and subheading should preserve parallel structure. If the first heading is a verb, the second heading should be a verb. Example: I. CHOOSE DESIRED COLLEGES II. PREPARE APPLICATION ("Choose" and "Prepare" are both verbs. The present tense of the verb is usually the preferred form for an outline.) Coordination—How do I accomplish this? All the information contained in Heading 1 should have the same significance as the information contained in Heading 2. The same goes for the subheadings (which should be less significant than the headings)...

Words: 1193 - Pages: 5

Premium Essay

Quantitative Research Synthesis Essay

...The authors test the feasibility of using random faces or symbols generated by users as passwords. Time to generate, time to recall, and if the passwords could be remembered after 1, 3, 7, 14, 28, and 49 days were used as criteria for evaluation. A randomly generated alphanumeric password and an alphanumeric password generated by the users was also part of the study. There were 20 participants in the study, and all were shown to have a proficiency in computer use. The study found that alphanumeric passwords generated by the users were not only the quickest to create and recall, but also, the easiest to remember over long...

Words: 1948 - Pages: 8

Premium Essay

Database Concepts

...Assignment 2 Task 1 OrderItem Items Orders Reps Customers Has many Can be ordered Can place Can contain Can be stored ItemLocation WarehouseLocations Can store Domain Name | Meaning | Domain Definition | ID | Representative Number, Customer Number, Order Number, Item Number, Warehouse Number | Alphanumeric Size 10 | Name | Customer Reps Lastname, Firstname; Customers Lastname, Firstname | Character Size 20 | Address | House Nmuber \ Name, Warhouse Number \ Name, Street, City, County | Aphanumeric Size 20 | Post Code | Post Code | Alphanumeric Size 8 | Telephone Number | Cust Rep Telephone Number; Cust Telephone Number; Warehouse Telephone Number. | Numeric Size 15 | Date | Date of Order, Date Joined | Date | Goods | Number in Stock, Product Category, Item Description | Alphanumeric Size 20 | Order | Amount Paid, Unit Price, Quantity Ordered, Balance Outstanding, Commision Rate | Numeric Size (8,2) | Reps Rep_ID | ID | Required | Primary Key | LastName | Name | Required | | FirstName | Name | Required | | AddressID | Address | Required | | StreetName | Address | Required | | City | Address | | | County | Address | | | PostCode | Post Code | Required | | TelNo | Tel | Required | | CommisionRate | Numeric | Required | | Customers Cust_ID | ID | Required | Primary...

Words: 2823 - Pages: 12

Premium Essay

Business and Management

...ADMINISTRATION COURSE TITLE: COMPUTER FUNDAMENTAL COURSE CODE: 106 SUBMITTED TO: MASTAFA WASIUDDIN NUMAN NAME: EMAD UDDIN MUHAMMAD EMDAD ID NO: 1301050026 BATCH:19TH SUBMITTED DATE: 23.02.2013 1. Briefly describe different groups of keys available on a keyboard? 1 No. Ans: Keyboard: keyboards are the single most and primary input device for most types of computer systems. They are ideal for textual data input and control commands. Keyboards are grouped into five groups. 1. Alphanumeric keys. 2. Numeric keypad. 3. Modifier keys. 4. Function keys. 5. Cursor control keys. 6. Special keys. ➢ Briefly describe: 1. Alphanumeric keys: Keys on the second to fourth rows from the top are alphanumeric keys. These keys are used to input letters, digits, punctuation marks and other symbols. The keys on second row are for decimal digits and other common symbols. The third, fourth and fifth rows from top contain the letters of English alphabet and punctuation marks. There are few other keys in alphanumeric group that have special use. They are the following: *Tab *Caps lock *Backspace *Enter 2. Numeric keys: There is a separate section on the very right of the keyboard for imputing decimal digits. This section is known as numeric keypad. Numeric keypad has the same layout as calculators, and allows faster numeric data input. The numeric keypad is activated and de-activated by the Num Lock key, the right top...

Words: 2698 - Pages: 11

Free Essay

Keylogging

...TRANSACTIONS ON MOBILE COMPUTING, VOL. 1, NO. 8, AUGUST 2014 1 Keylogging-resistant Visual Authentication Protocols DaeHun Nyang, Member, IEEE, Aziz Mohaisen, Member, IEEE, Jeonil Kang, Member, IEEE, Abstract—The design of secure authentication protocols is quite challenging, considering that various kinds of root kits reside in PCs (Personal Computers) to observe user’s behavior and to make PCs untrusted devices. Involving human in authentication protocols, while promising, is not easy because of their limited capability of computation and memorization. Therefore, relying on users to enhance security necessarily degrades the usability. On the other hand, relaxing assumptions and rigorous security design to improve the user experience can lead to security breaches that can harm the users’ trust. In this paper, we demonstrate how careful visualization design can enhance not only the security but also the usability of authentication. To that end, we propose two visual authentication protocols: one is a one-time-password protocol, and the other is a password-based authentication protocol. Through rigorous analysis, we verify that our protocols are immune to many of the challenging authentication attacks applicable in the literature. Furthermore, using an extensive case study on a prototype of our protocols, we highlight the potential of our approach for real-world deployment: we were able to achieve a high level of usability while satisfying stringent security requirements. Index...

Words: 12707 - Pages: 51

Premium Essay

Vacations in Paradise

...our potential and current owners. Along with evaluating employees by our personal standards, we use a three-step process measuring performance, comparing our standards to those of our competitors, and using action when needed to address inadequacies within the department (Management, 11th ed., 2003-2012). Internal Performance We monitor the internal performances of our call center employees, specifically the Customer Service Representatives or CSRs. By monitoring the CSRs, we can use certain control measures to determine if our employees are being productive and using company time efficiently and effectively. Once the CSR clocks in for the day, they sign into our digital phone system using their personally assigned five-digit alphanumeric code. The phone system will calculate all incoming and outgoing calls. Each CSR is required to have at least 60 calls per day. The employees are aware that all calls are on record, and subject to monitoring at any time. Random calls are pulled and monitored to check for efficiency, effectiveness, and productivity. Monthly...

Words: 1025 - Pages: 5

Free Essay

Csec 610 Lab One

...1) Explain the two different types of attacks that can be performed in Cain and Abel to crack user account passwords. Which do you think is the most effective and why? For the assignment we utilized Cain & Abel password recovery tool for Microsoft Operating Systems. For this lab assignment we utilized Brute Force NT LAN Manager (NTUM) and LAN Manager (LM) and Dictionary NTLM and LM hashes. (Features overview, n.d.) Brute Force is a password cracking -technique that tries every combination of numeric, alphanumeric, and special characters until the password is broken or the user is locked out. Dictionary is a technique that runs a given password against each of the words in a dictionary (file of words) until a match is found or the end of the dictionary is reached. (p. 13) Cain and Abel couples Brute Force and Dictionary with LM and NTLM hash. Based on my lab experience, my assessment is that the Dictionary NTLM Manager is the better of the processes. The table below reveals that Dictionary NTLM delivered more favorable results over LM because this process uncovered the passwords in the shortest amount of time and recovered the passwords in their entirety. Table | Brute Force LM | Brute Force NTLM | Dictionary LM | Dictionary NTLM | User1 | No password, 6-8 hours | No password, estimated time 10 years | yes, 75 seconds | yes, 40 | User2 | No password, 6-8 hours | No password, estimated time 10 years | yes, 30 | yes, 25 | User3 | No password, 6-8 hours...

Words: 971 - Pages: 4