Important Principles and Practice of Banking Questions
Module-C
1 A computer network mainly used to share
- Data
- Software
- Hardware
- All of above
- None of these
2 Proper functioning of a computerized system is ensured by
- Generation of audit trails
- Exceptional transaction report
- Tallying of cash book
- All of above
- None of these
3 In bus topology
- Each node is joined to the central node by a separate link
- Devices are connected in a closed loop
- Information is passed from one node to another in series
- Devices on the network are connected to a single continuous cable
- All of above
4 In multi-user computer networking
- Computers are based on a centralized processing concept
- Various terminals are attached to the main computer
- All data and information is kept on the main computer
- Large number of users can be connected to a central computer
- All of above
5 For uninterrupted power supply in branch computerization, the following device is used
- Online UPS
- Offline UPS
- Convertor
- Generator
- None of these
6 Terminals Connected to a server is known as
- Clients
- Nodes
- (a) and (b)
- CPU
- None of these
7 In core banking system
- Branches are connected to a central host
- Branch automation modules and delivery channels are incorporated
- Transactions are done centrally and online
- All of above
- None of these
8 In star topology
- Each node is joined to the central node by a separate link
- Devices are connected in a closed loop
- Information is passed from one node to another in series
- Devices on the network are connected to a single continuous cable
- All of above
9 In ring topology
- Each node is joined to the central node by a separate link
- Devices are connected in a closed loop
- Information is passed from one node to the other in series (d) (b) and (c)
- All of above
10 Benefits in core banking system is
- Reliable centralized data recovery
- Data warehousing and data mining technologies
- Integrated customer centric services
- Core infrastructure can be used for future expansion
- All of above
11 The debit card offers
- Revolving credit for certain period
- Payoff the entire amount of card usage
- Online recover of amount of card usage
- All of above
- None of these
12 ATMs provide
- Round the clock service
- Privacy in transaction
- Anywhere banking facility
- Quick and efficient service
- All of above
13 From the bank point of view the advantage of ATMs are
- Alternative to expand banking hours
- Cash handling and cash transportation is avoided
- Alternative of new branches
- All of above
- None of these
14 Security features available with smart cards are
- Multiple pins
- Retinal pattern verification
- Dynamic signature verification
- Vein recognition
- All of above
15 The advantage of processor smart cards are
- Security
- Reliability
- Longer life
- All of above
- None of these
16 Electronic purse may have following number of storage space
- Only one
- Two
- Several
- No storage space
- None of these
17 Cheque truncation can be done by
- Using MICR data
- Sending Cheque by speed post
- Using image processing
- (a) and (c)
- None of these
18 The credit card offers
- Revolving credit for certain period
- Payoff the entire amount of card usage
- Online recover of amount of card usage
- All of above
- None of these
19 The charge card offers
- Revolving credit for certain period
- Payoff the entire amount of card usage
- Online recover of amount of card usage
- All of above
- None of these
20 PIN is
- Randomly generated sequence of digits
- Postal index number
- Stored in magnetic strip of the card
- (a) and (c)
- None of these
21 Mobile banking offers the following
- Withdrawal of cash anywhere in India
- Statement of account for a specific period
- Transfer of funds from account to another account
- Balance inquiry
- None of these
22 Transaction of Internet banking excludes
- Withdrawal of cash anywhere in India
- Statement of account for a specific period
- Transfer of funds from account to another account
- Balance inquiry
- None of these
23 MODEM does the following
- Modulates digital signals into analogue
- Demodulates analogue signals into digital
- Converts data into image
- Both (a) and (b)
- None of these
24 A twisted pair cable consists of
- Two insulated copper wire
- An inner copper conductor held in position by circular spacers
- Single copper wire
- All of above
- None of these
25 A coaxial cable consists of
- Two insulated copper wire
- An inner copper conductor held in position by circular spacers
- Single copper wire
- All of above
- None of these
26 In an optical fibre data is transmitted through
- A very thin glass or plastic fibres with a beam of light
- Satellite
- Laser beam driven by a high speed high current driver
- Both (a) and (c)
- None of these
27 In a microwave system
- Radio waves are modulated to carry information
- Wave beams are sent from one antenna to another
- Along the route, the received data is amplified and retransmitted
- Microwave signals may be passed on the satellite
- All of above
28 A message switcher is used to
- Store and forward data to large number of terminals over a single communication channel
- Send more than one signal simultaneously over a single communication channel
- Intercept and handle communication activities for the host computer
- All of above
- None of these
29 Multiplexer is used to
- Store and forward data to large number of terminals over a single communication channel
- Send more than one signal simultaneously over a single communication channel
- Intercept and handle communication activities for the host computer
- All of above
- None of these
30 Front End Processor (FEP) is used to
- Store and forward data to large number of terminals over a single communication channel
- Send more than one signal simultaneously over a single communication channel
- Intercept and handle communication activities for the host computer
- All of above
- None of these
31 A simplex transmission is capable of
- Transmitting data only in one direction
- Data movement in both the direction but only in one direction at a time
- Providing a simultaneous two way communication
- Data communication only
- None of these
32 A Full- duplex transmission is capable of
- Transmitting data only in one direction
- Data movement in both the direction but only in one direction at a time
- Providing a simultaneous two way communication
- Data communication only
- None of these
33 The upper value limit of an individual national electronic funds transfer (NEFT) transaction is
- Rs. 20000
- Rs. 50000
- Rs. 100000
- None of these
34 The committee which has recommended for establishment of data warehouse is known as
- Vasudevan Committee
- Rangarajan Committee
- Saraf Committee
- Shere Committee
- None of these
35 Data mining techniques can be applied in
- Predicting future trends based on information available
- Credit risk analysis
- Analysing demographic information about customers
- All of above
- None of these
36 Communication Technology
- Facilitates the processing of data
- Helps in transmission of data
- Enables decision support system
- Is a tool for data mining
- All of the above
37 Which of the following is the gateway in India for EDI services worldwide?
- Satyam online
- BSNL
- MTNL
- VSNL
- None of these
38 The universal set of standards for EDI is known as
- EDIFACT
- EDI
- ISO
- BIS
- None of these
39 Banks can use a corporate website for
- Dissemination of information
- Financial advice
- Accounts services
- Selling Products
- All of these
40 Computer based information systems offer
- Data consistency
- Data redundancy
- Flexibility and ease for modification
- All of above
- None of these
41 Decision Support System (DSS) uses
- Query language
- Adhoc report generator
- Statistical analyser
- Graphics
- All of above
42 Impact of IT on banks can be
- Change in Organisational structure
- Change in Organisational orientation
- Change in service delivery channel
- Change in customer aspiration
- All of above
43 Information technology has resulted in
- Improved efficiency
- Innovative products
- Effective delivery system
- Enhanced Productivity
- All of above
44 A typical computerized environment constitutes three interdependent but separate components
- Software, hardware and data
- Hardware, software and UPS
- Software, modem and networking
- Software, people ware and data
- None of these
45 The risk broadly lead to
- Incorrect decision making leading to setback to business
- Interruption in activities due to loss of data, hardware, software, people ware
- Violation of privacy
- Direct financial loss due to computer frauds
- All of these
46 The phases of disaster recovery planning are:
- Awareness
- Preparation
- Testing
- Recovery
- All of above
47 The consequences of errors in computerized systems are more serious than in manual systems because:
- Computer systems process more data
- Errors in computer systems are generated at high speed, and the cost to correct may be high
- Users of computer systems perceive the computer outputs to be always correct
- All of above
- (a) and (c)
48 Compared to a manual system, in a computer system:
- The methodologies for implementing controls change
- Basic controls objectives change
- Control objectives are more difficult to achieve
- All of above
- (a) and (b)
49 IS audit for the software used is carried out by CAATT. This type is known as:
- The audit around the computer
- The audit through the computer
- The audit with the computer
- All of above
- None of these
50 Risk prone component(s) in computerized systems are:
- Errors and omissions in data and software
- Unauthorised disclosure of confidential information
- Computer abuse and mis-utilisation of banks assets
- Frauds
- All of above
51 Effective control mechanism(s) in computerized environment are:
- Preventive
- Detective
- Corrective
- All of above
- (a) and (c)
52 Objective of IS security is to insure;
- Confidentiality
- Integrity
- Availability
- All of above
- None of these
53 Audit trail is :
- A chronological record of all events occurring in a system is
- Report submitted by auditors
- A collection of record generated by database administrator
- All of above
- None of these
Download PDF File
View More Material
Share