ĐĎॹá > ţ˙ [ ] ţ˙˙˙ Z ˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙ěĽÁ M đż , bjbjâ=â= > W W ( ˙˙ ˙˙ ˙˙ l Ź Ź Ź Ź Ź Ź Ź Ŕ ö! ö! ö! 8 ." :" | Ŕ ňO ś Â" Â" ( ę" ę" ę" Ĺ# Ĺ# Ĺ# qO sO sO sO sO sO sO $ ¨P ČR O Ź Ĺ# Ĺ# Ĺ# Ĺ# Ĺ# O ' Ź Ź ę" ę" Ű ŹO ' ' ' Ĺ# H Ź ę" Ź ę" qO ' Ĺ# qO ' ˘ ' ť' UG Ź Ź -O ę" ś" Ë4¤ČŔ 6 ö! % d ŐM Ź -O D ÂO 0 ňO N Ź PS q% ¨ PS -O ' Ŕ Ŕ Ź Ź Ź Ź Ů JAIIB PRINCIPLES OF BANKING - MODULE C - BANKING TECHNOLOGY Dr.Firdos T.Shroff,Jt.Director (Academics),IIBF, Mumbai MODEL MULTIPLE CHOICE QUESTIONS (MCQs) A flaw in a program that causes it to produce incorrect or inappropriate results is called a ---- Byte Attribute Unit Problem Bug The term WAN stands for World Area Network Wide Area Network World Application Net Wide Application Network A collaborative network that uses Internet Technology to link business with their suppliers is --- Internet Intranet Extranet WAN PIN in Smart Card is called --- Permanent Index Number Personal Identification Number Personal Index Number Permanent Identification Number MICR technology used for clearance of cheques by banks refers to ----- Magnetic Ink Character Recognition Magnetic Intelligence Character Recognition Magnetic Information Cable Recognition Magnetic Insurance Cases Recognition Buy Now Pay Now is commonly used for --- Debit Cards Vault Cards Credit Cards E-purse Open Systems Interconnection (OSI) Model consists of ---- A) 5-layers B) 6-layers C) 7-layers D) 8-layers Internet is ---- Network of LAN Network of ATMs Network of ALPMs Network of Networks A passive threat to computer security is ----- Malicious Intent Sabotage Accidental Errors Espionage Agent A MODEM is connected in between a telephone line and a ----- Network Computer Communication Adapter Serial Port A leased line can transmit Only Data / Text Only Voice Only Video All the above The primary communication protocol on Internet is -- IPX NETBIOS TCP/IP D) EPBX The technique is used to produce a fingerprint of a message as a part of digital signing Scrambling Extracting Hashing Condensing Smart Card is Special purpose Cards Microprocessor Cards Processing unit contains memory for storing data Processing unit for software handling The word FTP stands for ----- File Translate Protocol File Transit Protocol File Typing Protocol File Transfer Protocol A collection of raw facts is called ------ Output Information Bits Data The term HTML connotes A) Hyper Text Markup Language B) Hyper Transcription Markup Language C) High Text Markup Language D) High Terminal Markup Language Threats of physical damage to the hardware is from ----- Natural Calamities Power Fluctuations Electro Magnetic Effects Magnetic Devices The network interface card of LAN is related to following layer of OSI Model --- A) Transport B) Network C) Data Link D) Physical 20) A result of a computer virus cannot lead to ---- Disk Crash Mother Board Crash Corruption of program Deletion of files 21) Firewalls are used to protect against ---- Unauthorised Attacks Virus Attacks Data Driven Attacks Fire Attacks 22) The highest percentage of victims of computer crime are in ------ Banks Commercial Users Government University 23) The ------- converts digital signals to analog signals for the purpose of transmitting data over telephone lines Modem Router Gateway Bridge 24) The ------ directory is mandatory for every disk A) Root B) Base C) Sub D) Case 25) Smallest storage unit of a computer is --- Bit Byte Nibble Pixel 26) SQL stands for Sequential Query Language Sequence Queue Language Sequential Quote Language Sequel Quarry Language 27) BANKNET comprises of the following Standard CCT X.25 CCITT X.25 CCITT X..286 CCIIT X.486 28) COMET stands for Composition of Message Trial Computerised Miscellaneous Transfer Computerised Message Transfer Composition of Mutilation Text 29) Multiplexing means a technique to enable more than one signal to be sent simultaneously over one physical channel B) a technique to enable one signal over one channel C) a technique to enable one signal over many channels D) a technique to enable one signal over multiple channels 30) For scientific applications most useful language is COBOL FORTRAN SQL HTML 31) Payroll System is essentially Online Batch Processing Real Time Transaction processing 32) The term TCP/IP stands for A) Transmission Control Protocol/Internet Protocol B) Transit Control Protocol/Internal Protocol C) Transfer Concept Protocol/Intermediate Protocol D) Transit Concept Protocol/Interval Protocol 33) ----- means the altering of computer system software to achieve a task for which it was not originally designed A) Pegging B) Hacking C) Trekking D) Breaking 34) The word ISDN stands for A) Internal Service Digit Network B) Integrated Services Digital Network C) Information Service Digital Net D) Internal Server Digit Network 35) Bio-metric Recognition does not include Finger Print and Palm Print Voice Print and Eye Retina Hand Geometry and Typing Rhythm D) Body Print and Head print 36) The following cannot be done by virus --- Loss of Data Deletion of File Physical Damage to Keyboard Corruption of Program 37) Memory Management through Paging is controlled by OS CPU RAM ROM 38) RSA stands for the following three scientists A) Rivest, Shamir and Adleman B) Ronallad, Sussan and Assamann C) Rueppel, Selfridge and Albert Regis, Schroeer and Anderson 39) HTML tag ------
<- -> dir 40) Adobe Page Mill is ---- Browser Authoring Tool Workflow Scripting Language @@@@@@@@@ PAGE 19 PAGE 1 § ň L U Ů ö $ % & ' ( + , ü÷ü÷üőü÷üđ đ đ đ éćéŢéć éćéŢéć ü 0J mH nH u0J j 0J U j U5 5>* \5>* ! + B { Ś § ¨ ' + - . K L _ q Ą ˘ ý ý ý ý ý ř đ ř č č č č ř ř đ ř ŕ ŕ ŕ ŕ ř ř đ ř Ř $ &