Material Content for JAIIB-Important Questions of Principles and Practice of Banking Module-C

JAIIB-Important Questions of Principles and Practice of Banking  Module-C

 

Important Principles and Practice of Banking Questions

Module-C

1        A computer network mainly used to share

  • Data
  • Software
  • Hardware
  • All of above
  • None of these

 

2        Proper functioning of a computerized system is ensured by

  • Generation of audit trails
  • Exceptional transaction report
  • Tallying of cash book
  • All of above
  • None of these

 

 3        In bus topology

  • Each node is joined to the central node by a separate link
  • Devices are connected in a closed loop
  • Information is passed from one node to another in series
  • Devices on the network are connected to a single continuous cable
  • All of above

 

4        In multi-user computer networking

  • Computers are based on a centralized processing concept
  • Various terminals are attached to the main computer
  • All data and information is kept on the main computer
  • Large number of users can be connected to a central computer
  • All of above


5        For uninterrupted power supply in branch computerization, the following device is used 

  • Online UPS
  • Offline UPS
  • Convertor
  • Generator
  • None of these

 

6        Terminals Connected to a server is known as

  • Clients
  • Nodes
  • (a) and (b)
  • CPU
  • None of these

 

 7        In core banking system

  • Branches are connected to a central host
  • Branch automation modules and delivery channels are incorporated
  • Transactions are done centrally and online
  • All of above
  • None of these

 

8        In star topology

  • Each node is joined to the central node by a separate link
  • Devices are connected in a closed loop
  • Information is passed from one node to another in series
  • Devices on the network are connected to a single continuous cable
  • All of above

 

9        In ring topology

  • Each node is joined to the central node by a separate link
  • Devices are connected in a closed loop
  • Information is passed from one node to the other in series (d) (b) and (c)
  • All of above

 

10    Benefits in core banking system is

  • Reliable centralized data recovery
  • Data warehousing and data mining technologies
  • Integrated customer centric services
  • Core infrastructure can be used for future expansion
  • All of above


11    The debit card offers

  • Revolving credit for certain period
  • Payoff the entire amount of card usage
  • Online recover of amount of card usage
  • All of above
  • None of these

 

12    ATMs provide

  • Round the clock service
  • Privacy in transaction
  • Anywhere banking facility
  • Quick and efficient service
  • All of above

 

13    From the bank point of view the advantage of ATMs are

  • Alternative to expand banking hours
  • Cash handling and cash transportation is avoided
  • Alternative of new branches
  • All of above
  • None of these

 

14    Security features available with smart cards are

  • Multiple pins
  • Retinal pattern verification
  • Dynamic signature verification
  • Vein recognition
  • All of above

 

15    The advantage of processor smart cards are

  • Security
  • Reliability
  • Longer life
  • All of above
  • None of these

 

16    Electronic purse may have following number of storage space

  • Only one
  • Two
  • Several
  • No storage space
  • None of these

 

17    Cheque truncation can be done by

  • Using MICR data
  • Sending Cheque by speed post
  • Using image processing
  • (a) and  (c)
  • None of these

 

18    The credit card offers

  • Revolving credit for certain period
  • Payoff the entire amount of card usage
  • Online recover of amount of card usage
  • All of above
  • None of these

 

19    The charge card offers

  • Revolving credit for certain period
  • Payoff the entire amount of card usage
  • Online recover of amount of card usage
  • All of above
  • None of these

 

20    PIN is

  • Randomly generated sequence of digits
  • Postal index number
  • Stored in magnetic strip of the card
  • (a) and (c)
  • None of these

 

21    Mobile banking offers the following

  • Withdrawal of cash anywhere in India
  • Statement of account for a specific period
  • Transfer of funds from account to another account
  • Balance inquiry
  • None of these

 

22    Transaction of Internet banking excludes

  • Withdrawal of cash anywhere in India
  • Statement of account for a specific period
  • Transfer of funds from account to another account
  • Balance inquiry
  • None of these

 

23    MODEM does the following

  • Modulates digital signals into analogue
  • Demodulates analogue signals into digital
  • Converts data into image
  • Both (a) and (b)
  • None of these

 

24    A twisted pair cable consists of

  • Two insulated copper wire
  • An inner copper conductor held in position by circular spacers
  • Single copper wire
  • All of above
  • None of these

 

25    A coaxial cable consists of

  • Two insulated copper wire
  • An inner copper conductor held in position by circular spacers
  • Single copper wire
  • All of above
  • None of these

 

26    In an optical fibre data is transmitted through

  • A very thin glass or plastic fibres with a beam of light
  • Satellite
  • Laser beam driven by a high speed high current driver
  • Both (a) and  (c)
  • None of these

 

27    In a microwave system

  • Radio waves are modulated to carry information
  • Wave beams are sent from one antenna to another
  • Along the route, the received data is amplified and retransmitted
  • Microwave signals may be passed on the satellite
  • All of above

 

28    A message switcher is used to

  • Store and forward data to large number of terminals over a single communication channel
  • Send more than one signal simultaneously over a single communication channel
  • Intercept and handle communication activities for the host computer
  • All of above
  • None of these

 

29    Multiplexer is used to

  • Store and forward data to large number of terminals over a single communication channel
  • Send more than one signal simultaneously over a single communication channel
  • Intercept and handle communication activities for the host computer
  • All of above
  • None of these

 

30    Front End Processor (FEP) is used to

  • Store and forward data to large number of terminals over a single communication channel
  • Send more than one signal simultaneously over a single communication channel
  • Intercept and handle communication activities for the host computer
  • All of above
  • None of these

 

31    A simplex transmission is capable of

  • Transmitting data only in one direction
  • Data movement in both the direction but only in one direction at a time
  • Providing a simultaneous two way communication
  • Data communication only
  • None of these


32    A Full- duplex transmission is capable of

  • Transmitting data only in one direction
  • Data movement in both the direction but only in one direction at a time
  • Providing a simultaneous two way communication
  • Data communication only
  • None of these

 

33    The upper value limit of an individual national electronic funds transfer (NEFT) transaction is

  • Rs. 20000
  • Rs. 50000
  • Rs. 100000
  • None of these

 

34    The committee which has recommended for establishment of data warehouse is known as

  • Vasudevan Committee
  • Rangarajan Committee
  • Saraf Committee
  • Shere Committee
  • None of these

 

35    Data mining techniques can be applied in

  • Predicting future trends based on information available
  • Credit risk analysis
  • Analysing demographic information about customers
  • All of above
  • None of these

 

36    Communication Technology

  • Facilitates the processing of data
  • Helps in transmission of data
  • Enables decision support system
  • Is a tool for data mining
  • All of the above

 

37    Which of the following is the gateway in India for EDI services worldwide?

  • Satyam online
  • BSNL
  • MTNL
  • VSNL
  • None of these

 

38    The universal set of standards for EDI is known as

  • EDIFACT
  • EDI
  • ISO
  • BIS
  • None of these

 

39    Banks can use a corporate website for

  • Dissemination of information
  • Financial advice
  • Accounts services
  • Selling Products
  • All of these

 

40    Computer based information systems offer

  • Data consistency
  • Data redundancy
  • Flexibility and ease for modification
  • All of above
  • None of these

 

41    Decision Support System (DSS) uses

  • Query language
  • Adhoc report generator
  • Statistical analyser
  • Graphics
  • All of above

 

42    Impact of IT on banks can be

  • Change in Organisational structure
  • Change in Organisational orientation
  • Change in service delivery channel
  • Change in customer aspiration
  • All of above

 

43    Information technology has resulted in

  • Improved efficiency
  • Innovative products
  • Effective delivery system
  • Enhanced Productivity
  • All of above

 

44    A typical computerized environment constitutes three interdependent but separate components

  • Software, hardware and data
  • Hardware, software and UPS
  • Software, modem and networking
  • Software, people ware and data
  • None of these

 

45    The risk broadly lead to

  • Incorrect decision making leading to setback to business
  • Interruption in activities due to loss of data, hardware, software, people ware
  • Violation of privacy
  • Direct financial loss due to computer frauds
  • All of these

 

46    The phases of disaster recovery planning are:

  • Awareness
  • Preparation
  • Testing
  • Recovery
  • All of above

 

47    The consequences of errors in computerized systems are more serious than in manual systems because:

  • Computer systems process more data
  • Errors in computer systems are generated at high speed, and the cost to correct may be high
  • Users of computer systems perceive the computer outputs to be always correct
  • All of above
  • (a) and (c)

 

48    Compared to a manual system, in a computer system:

  • The methodologies for implementing controls change
  • Basic controls objectives change
  • Control objectives are more difficult to achieve
  • All of above
  • (a) and  (b)

 

49    IS audit for the software used is carried out by CAATT. This type is known as:

  • The audit around the computer
  • The audit through the computer
  • The audit with the computer
  • All of above
  • None of these

 

50    Risk prone component(s) in computerized systems are:

  • Errors and omissions in data and software
  • Unauthorised disclosure of confidential information
  • Computer abuse and mis-utilisation of banks assets
  • Frauds
  • All of above

 

51    Effective control mechanism(s) in computerized environment are:

  • Preventive
  • Detective
  • Corrective
  • All of above
  • (a) and (c)

 

52    Objective of IS security is to insure;

  • Confidentiality
  • Integrity
  • Availability
  • All of above
  • None of these

 

53    Audit trail is :

  • A chronological record of all events occurring in a system is
  • Report submitted by auditors
  • A collection of record generated by database administrator
  • All of above
  • None of these

View More Material

Share