1.In context with the Core Banking System, what does CORE stands for ________?
(A)Centralized Online Records Exchange
(B)Centralized Office Real-time Exchange
(C)Centralized Online Real-time Exchange
(D)Central Online Real-time Exchange
2.Firewall technology is designed to block unauthorized access while permitting authorized communications. Which among the following is the most advanced in firewall technology?
(A)packet filters
(B)application layer
(C)stateful filters
(D)None of Them
3.Which of the following term is used for the process of transforming information using an algorithm to make it unreadable to anyone except those possessing special knowledge?
(A)deciphering
(B)encryption
(C)decryption
(D)coding
4.Which among the following is the correct definition of “Computer Audit” used many times in Banking Industry?
(A)Practice of using computers to automate or simplify the audit process
(B)Practice of testing the computer security procedures and identification lapses before the banking operation is put to risk
(C)software designed to read, process and write data with the help of functions performing specific audit routines
(D)Practice of financial statement audit with the help of Computers
5.In which year was UNCITRAL Model Law on E-Commerce adopted by the United Nations following which India passed the Information Technology Act 2000 in May 2000?
(A)1995
(B)1996
(C)1997
(D)1998
6.In 1995, the Reserve Bank had set up the Committee for Proposing Legislation on Electronic Funds Transfer and other Electronic Payments. What this committee was called?
(A)Rangrajan Committee
(B)Shere Committee
(C)Saraf Committee
(D)Narsimham Committee
7.In context with the use of Information technology in Banks, what is the meaning of Cheque Truncating?
(A)illegal act of taking advantage of the float to make use of non-existent funds in a cheque
(B)creating digital version of the original cheque
(C)crossing of cheque
(D)None of Them
8.Which of the following parts of a computer makes use of primary memory?
(A)Storage Unit
(B)CPU
(C)Computer Output devices
(D)Mass Storage Devices
9.While browsing internet , a keyboard shortcut is used to place a www to the beginning and “.com” to the end of the text typed in the Address bar. Which among the following shortcuts?
(A)ALT + ENTER
(B)CNTRL + ENTER
(C)ALT + SHIFT
(D)CNTRL + SHIFT
10.How many kilohertz are in 1 terahertz ?
(A)1 000 000 000
(B)1 000 000 00
(C)1 000 000
(D)1 000 000 000 00
11.Access control which enables an authority to control access to areas and resources in a given physical facility or computer-based information system has two important processes. These processes are ___?
(A)Encryption & Decryption
(B)Locking and Unlocking
(C)Authorization and authentication
(D)Tunneling and Switching
12.Most of the ATM cards, credit cards, debit cards, etc all over the world are of ISO/IEC 7810 ID-1 size, an international standard format that defines the physical characteristics for identity or identification cards. What are the approx. dimensions of these cards?
(A)93 x 53 mm
(B)90 x 49 mm
(C)86 × 54 mm
(D)74 x 44 mm
13.The first 6 digits of the credit card number are known as ___?
(A)Issuer Identification Number
(B)Major Industry Identifier
(C)account number
(D)Check sum
14.Which among the following is official registrar of International Bank Account Number (IBAN)?
(A)SWIFT
(B)Euro Banking Association
(C)Banking, Insurance and Finance Union
(D)None of them
15.What is the full form of SDRAM?
(A)Shift dynamic random access memory
(B)Synchronous dynamic random access memory
(C)System dynamic random access memory
(D)Serial dynamic random access memory
source: www.gktoday.in
(A)Centralized Online Records Exchange
(B)Centralized Office Real-time Exchange
(C)Centralized Online Real-time Exchange
(D)Central Online Real-time Exchange
2.Firewall technology is designed to block unauthorized access while permitting authorized communications. Which among the following is the most advanced in firewall technology?
(A)packet filters
(B)application layer
(C)stateful filters
(D)None of Them
3.Which of the following term is used for the process of transforming information using an algorithm to make it unreadable to anyone except those possessing special knowledge?
(A)deciphering
(B)encryption
(C)decryption
(D)coding
4.Which among the following is the correct definition of “Computer Audit” used many times in Banking Industry?
(A)Practice of using computers to automate or simplify the audit process
(B)Practice of testing the computer security procedures and identification lapses before the banking operation is put to risk
(C)software designed to read, process and write data with the help of functions performing specific audit routines
(D)Practice of financial statement audit with the help of Computers
5.In which year was UNCITRAL Model Law on E-Commerce adopted by the United Nations following which India passed the Information Technology Act 2000 in May 2000?
(A)1995
(B)1996
(C)1997
(D)1998
6.In 1995, the Reserve Bank had set up the Committee for Proposing Legislation on Electronic Funds Transfer and other Electronic Payments. What this committee was called?
(A)Rangrajan Committee
(B)Shere Committee
(C)Saraf Committee
(D)Narsimham Committee
7.In context with the use of Information technology in Banks, what is the meaning of Cheque Truncating?
(A)illegal act of taking advantage of the float to make use of non-existent funds in a cheque
(B)creating digital version of the original cheque
(C)crossing of cheque
(D)None of Them
8.Which of the following parts of a computer makes use of primary memory?
(A)Storage Unit
(B)CPU
(C)Computer Output devices
(D)Mass Storage Devices
9.While browsing internet , a keyboard shortcut is used to place a www to the beginning and “.com” to the end of the text typed in the Address bar. Which among the following shortcuts?
(A)ALT + ENTER
(B)CNTRL + ENTER
(C)ALT + SHIFT
(D)CNTRL + SHIFT
10.How many kilohertz are in 1 terahertz ?
(A)1 000 000 000
(B)1 000 000 00
(C)1 000 000
(D)1 000 000 000 00
11.Access control which enables an authority to control access to areas and resources in a given physical facility or computer-based information system has two important processes. These processes are ___?
(A)Encryption & Decryption
(B)Locking and Unlocking
(C)Authorization and authentication
(D)Tunneling and Switching
12.Most of the ATM cards, credit cards, debit cards, etc all over the world are of ISO/IEC 7810 ID-1 size, an international standard format that defines the physical characteristics for identity or identification cards. What are the approx. dimensions of these cards?
(A)93 x 53 mm
(B)90 x 49 mm
(C)86 × 54 mm
(D)74 x 44 mm
13.The first 6 digits of the credit card number are known as ___?
(A)Issuer Identification Number
(B)Major Industry Identifier
(C)account number
(D)Check sum
14.Which among the following is official registrar of International Bank Account Number (IBAN)?
(A)SWIFT
(B)Euro Banking Association
(C)Banking, Insurance and Finance Union
(D)None of them
15.What is the full form of SDRAM?
(A)Shift dynamic random access memory
(B)Synchronous dynamic random access memory
(C)System dynamic random access memory
(D)Serial dynamic random access memory
source: www.gktoday.in
For Further Reading,
0 comments:
Post a Comment