Download MCQ Model Questions

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

Computer network wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Internet protocol suite wikipedia , lookup

Airborne Networking wikipedia , lookup

Wake-on-LAN wikipedia , lookup

List of wireless community networks by region wikipedia , lookup

IEEE 1355 wikipedia , lookup

Computer security wikipedia , lookup

UniPro protocol stack wikipedia , lookup

Transcript
1
MCQs - JAIIB/Diploma in Banking & Finance
Principles & Practices of Banking – MODULE C- BANKING TECHNOLOGY
1) A collaborative network that uses Internet Technology to link business with their
suppliers is --A)
B)
C)
D)
Internet
Intranet
Extranet
WAN
2) ‘PIN’ in Smart Card is called --A)
B)
C)
D)
Permanent Index Number
Personal Identification Number
Personal Index Number
Permanent Identification Number
3) The usage of word “ATM” in the banks connotes –
A)
B)
C)
D)
Automated Teller Machine
Automated Teller Machine
Accounts Transacting Machine
Automated Tallying Machine
4) ‘DOS’ floppy disk does not have –
A) A Boot Record
B) A File Allocation Table
C) A Root Directory
D )Virtual Memory
5) ‘MICR’ technology used for clearance of cheques by banks refers to –
A)
B)
C)
D)
Magnetic Ink Character Recognition
Magnetic Intelligence Character Recognition
Magnetic Information Cable Recognition
Magnetic Insurance Cases Recognition
6) “Buy Now – Pay Now” is commonly used for --A)
B)
C)
D)
Debit Cards
Vault Cards
Credit Cards
E-purse
2
7) Open Systems Interconnection (OSI) Model consists of –
A)
B)
C)
D)
5-layers
6-layers
7-layers
8-layers
8) Internet is –
A)
B)
C)
D)
Network of LAN
Network of ATMs
Network of ALPMs
Network of Networks
9) A passive threat to computer security is :
A)
B)
C)
D)
Malicious Intent
Sabotage
Accidental Errors
Espionage Agents
10) Threats of physical damage to the hardware is from –
A)
B)
C)
D)
Natural Calamities
Power Fluctuations
Electro Magnetic Effects
All of these
11) The network interface card of LAN is related to following layer of OSI Model
Transport
Network
Data Link
Physical
12) A result of a computer virus cannot lead to
A) Disk Crash
B) Mother Board Crash
C) Corruption of program
D) Deletion of files
3
13) Firewalls are used to protect against
A) Unauthorised Attacks
B) Virus Attacks
C) Data Driven Attacks
D) Fire Attacks
14) Data related crime does not incorporate
A)
B)
C)
D)
Data Didling
Data Spying
Data Leakage
Data Mining
15) The highest percentage of victims of computer crime are in –
A)
B)
C)
D)
Banks
Commercial Users
Government
University
16) The ____ converts digital signals to analog signals for the purpose of transmitting
data over telephone lines
A)
B)
C)
D)
Modem
Router
Gateway
Bridge
17) The ___ directory is mandatory for every disk
Root
Base
Sub
Case
18) In the online world of electronic commerce, what do the initials CEM stands for ?
A)
B)
C)
D)
Costly E-Commerce Marketing
Customer Experience Management
Customer Experience Misleading
Cost Estimates are Mind Boggling
4
19) The fastest 1/0 of RAID (Redundant Arrays of Inexpensive Disks) is -A) Level – 0
B) Level – 1
C) Level – 3
D) Level – 4
20) RSA is –
A)
B)
C)
D)
Symmetric Cryptosystem
Asymmetric Cryptosystem
Block Cypher
Digital Signature
21) Compiler is a --A)
B)
C)
D)
Package
System Software
Process
Application Software
22) Smallest storage unit of a computer is --A)
B)
C)
D)
Bit
Byte
Nibble
Pixel
23) Digital Signature consists of –A)
B)
C)
D)
Message Only
Random Number Only
Both (A) and (B)
None of these
24) The management level responsible for making long range strategic decisions about
which products and services to produce is the –
A)
B)
C)
D)
Technology Level
Application Level
Operational Level
Top Level
5
25) A communication processor that connects dissimilar networks by providing the
translation from one set of protocol to another is –
A)
B)
C)
D)
Bridge
Gateway
Router
Modem
26) Any Crime accomplished through knowledge or use of computer technology is –
A)
B)
C)
D)
Cyber – Crime
Techno – Theft
Computer – Crime
Techno – Crime
27) Smart Card is –
A)
B)
C)
D)
Special purpose Cards
Microprocessor Cards
Processing unit contains memory for storing data
Processing unit for software handling
28) The word “FTP’ stands for –
A)
B)
C)
D)
File Translate Protocol
File Transit Protocol
File Typing Protocol
File Transfer Protocol
29) A collection of raw facts is called –
A)
B)
C)
D)
Output
Information
Bits
Data
30) The nucleus of all software activity is –
A)
B)
C)
D)
Printer
Word Processing Application
Database Application
Operating System
@@@@@@@@@