Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Recursive InterNetwork Architecture (RINA) wikipedia , lookup
Computer network wikipedia , lookup
Cracking of wireless networks wikipedia , lookup
Internet protocol suite wikipedia , lookup
Airborne Networking wikipedia , lookup
Wake-on-LAN wikipedia , lookup
List of wireless community networks by region wikipedia , lookup
1 MCQs - JAIIB/Diploma in Banking & Finance Principles & Practices of Banking – MODULE C- BANKING TECHNOLOGY 1) A collaborative network that uses Internet Technology to link business with their suppliers is --A) B) C) D) Internet Intranet Extranet WAN 2) ‘PIN’ in Smart Card is called --A) B) C) D) Permanent Index Number Personal Identification Number Personal Index Number Permanent Identification Number 3) The usage of word “ATM” in the banks connotes – A) B) C) D) Automated Teller Machine Automated Teller Machine Accounts Transacting Machine Automated Tallying Machine 4) ‘DOS’ floppy disk does not have – A) A Boot Record B) A File Allocation Table C) A Root Directory D )Virtual Memory 5) ‘MICR’ technology used for clearance of cheques by banks refers to – A) B) C) D) Magnetic Ink Character Recognition Magnetic Intelligence Character Recognition Magnetic Information Cable Recognition Magnetic Insurance Cases Recognition 6) “Buy Now – Pay Now” is commonly used for --A) B) C) D) Debit Cards Vault Cards Credit Cards E-purse 2 7) Open Systems Interconnection (OSI) Model consists of – A) B) C) D) 5-layers 6-layers 7-layers 8-layers 8) Internet is – A) B) C) D) Network of LAN Network of ATMs Network of ALPMs Network of Networks 9) A passive threat to computer security is : A) B) C) D) Malicious Intent Sabotage Accidental Errors Espionage Agents 10) Threats of physical damage to the hardware is from – A) B) C) D) Natural Calamities Power Fluctuations Electro Magnetic Effects All of these 11) The network interface card of LAN is related to following layer of OSI Model Transport Network Data Link Physical 12) A result of a computer virus cannot lead to A) Disk Crash B) Mother Board Crash C) Corruption of program D) Deletion of files 3 13) Firewalls are used to protect against A) Unauthorised Attacks B) Virus Attacks C) Data Driven Attacks D) Fire Attacks 14) Data related crime does not incorporate A) B) C) D) Data Didling Data Spying Data Leakage Data Mining 15) The highest percentage of victims of computer crime are in – A) B) C) D) Banks Commercial Users Government University 16) The ____ converts digital signals to analog signals for the purpose of transmitting data over telephone lines A) B) C) D) Modem Router Gateway Bridge 17) The ___ directory is mandatory for every disk Root Base Sub Case 18) In the online world of electronic commerce, what do the initials CEM stands for ? A) B) C) D) Costly E-Commerce Marketing Customer Experience Management Customer Experience Misleading Cost Estimates are Mind Boggling 4 19) The fastest 1/0 of RAID (Redundant Arrays of Inexpensive Disks) is -A) Level – 0 B) Level – 1 C) Level – 3 D) Level – 4 20) RSA is – A) B) C) D) Symmetric Cryptosystem Asymmetric Cryptosystem Block Cypher Digital Signature 21) Compiler is a --A) B) C) D) Package System Software Process Application Software 22) Smallest storage unit of a computer is --A) B) C) D) Bit Byte Nibble Pixel 23) Digital Signature consists of –A) B) C) D) Message Only Random Number Only Both (A) and (B) None of these 24) The management level responsible for making long range strategic decisions about which products and services to produce is the – A) B) C) D) Technology Level Application Level Operational Level Top Level 5 25) A communication processor that connects dissimilar networks by providing the translation from one set of protocol to another is – A) B) C) D) Bridge Gateway Router Modem 26) Any Crime accomplished through knowledge or use of computer technology is – A) B) C) D) Cyber – Crime Techno – Theft Computer – Crime Techno – Crime 27) Smart Card is – A) B) C) D) Special purpose Cards Microprocessor Cards Processing unit contains memory for storing data Processing unit for software handling 28) The word “FTP’ stands for – A) B) C) D) File Translate Protocol File Transit Protocol File Typing Protocol File Transfer Protocol 29) A collection of raw facts is called – A) B) C) D) Output Information Bits Data 30) The nucleus of all software activity is – A) B) C) D) Printer Word Processing Application Database Application Operating System @@@@@@@@@