You are on page 1of 8

JAIIB PRINCIPLES OF BANKING - MODULE C

- BANKING TECHNOLOGY
Dr.Firdo T.S!ro""#J$.Dir%&$or 'A&(d%)i&*#IIBF# M+),(i
MODEL -MULTIPLE CHOICE .UESTIONS 'MC.*/
1) A flaw in a program that causes it to produce incorrect or inappropriate results is
called a ----
A) Byte
B) Attribute
C) Unit Problem
D) Bug

2) he term !"A#$ stands for %
A) "orld Area #etwor&
B) "ide Area #etwor&
C) "orld Application #et
D) "ide Application #etwor&
') A collaborati(e networ& that uses )nternet echnology to lin& business with their
suppliers is ---
A) )nternet
B) )ntranet
C) *+tranet
D) "A#
,) !P)#$ in -mart Card is called ---
A) Permanent )nde+ #umber
B) Personal )dentification #umber
C) Personal )nde+ #umber
D) Permanent )dentification #umber

.) !/)C0$ technology used for clearance of che1ues by ban&s refers to -----
A) /agnetic )n& Character 0ecognition
B) /agnetic )ntelligence Character 0ecognition
C) /agnetic )nformation Cable 0ecognition
D) /agnetic )nsurance Cases 0ecognition
1
2) 3Buy #ow % Pay #ow4 is commonly used for ---
A) Debit Cards
B) 5ault Cards
C) Credit Cards
D) *-purse
6) 7pen -ystems )nterconnection 87-)) /odel consists of ----
A) .-layers
B) 2-layers
C) 6-layers
D) 9-layers
9) )nternet is ----
A) #etwor& of :A#
B) #etwor& of A/s
C) #etwor& of A:P/s
D) #etwor& of #etwor&s
;) A passi(e threat to computer security is -----
A) /alicious )ntent
B) -abotage
C) Accidental *rrors
D) *spionage Agent
1<) A /7D*/ is connected in between a telephone line and a -----
A) #etwor&
B) Computer
C) Communication Adapter
D) -erial Port
2
11) A leased line can transmit %
A) 7nly Data = e+t
B) 7nly 5oice
C) 7nly 5ideo
D) All the abo(e
12) he primary communication protocol on )nternet is --
A) )P>
B) #*B)7-
C) CP=)P
D) *PB>
1') he techni1ue is used to produce a 3fingerprint4 of a message as a part of digital
signing %
A) -crambling
B) *+tracting
C) ?ashing
D) Condensing

1,) -mart Card is %
A) -pecial purpose Cards
B) /icroprocessor Cards
C) Processing unit contains memory for storing data
D) Processing unit for software handling
1.) he word 3@P$ stands for -----
A) @ile ranslate Protocol
B) @ile ransit Protocol
C) @ile yping Protocol
D) @ile ransfer Protocol
'
12) A collection of raw facts is called ------
A) 7utput
B) )nformation
C) Bits
D) Data
16) he term !?/:$ connotes %
A) ?yper e+t /ar&up :anguage
B) ?yper ranscription /ar&up :anguage
C) ?igh e+t /ar&up :anguage
D) ?igh erminal /ar&up :anguage
19) hreats of physical damage to the hardware is from -----
A) #atural Calamities
B) Power @luctuations
C) *lectro /agnetic *ffects
D) /agnetic De(ices
1;) he networ& interface card of :A# is related to following layer of 7-) /odel ---
A) ransport
B) #etwor&
C) Data :in&
D) Physical
2<) A result of a computer (irus cannot lead to ----
A) Dis& Crash
B) /other Board Crash
C) Corruption of program
D) Deletion of files
,
21) @irewalls are used to protect against ----
A) Unauthorised Attac&s
B) 5irus Attac&s
C) Data Dri(en Attac&s
D) @ire Attac&s

22) he highest percentage of (ictims of computer crime are in ------
A) Ban&s
B) Commercial Users
C) Ao(ernment
D) Uni(ersity
2') he ------- con(erts digital signals to analog signals for the purpose of transmitting
data o(er telephone lines
A) /odem
B) 0outer
C) Aateway
D) Bridge
2,) he ------ directory is mandatory for e(ery dis&
A) 0oot
B) Base
C) -ub
D) Case


2.) -mallest storage unit of a computer is ---
A) Bit
B) Byte
C) #ibble
D) Pi+el
.
22) !-B:$ stands for %
A) -e1uential Buery :anguage
B) -e1uence Bueue :anguage
C) -e1uential Buote :anguage
D) -e1uel Buarry :anguage
26) BA#C#* comprises of the following -tandard %
A) CC >D2.
B) CC) >D2.
C) CC) >DD292
D) CC)) >D,92
29) C7/* stands for %
A) Composition of /essage rial
B) Computerised /iscellaneous ransfer
C) Computerised /essage ransfer
D) Composition of /utilation e+t

2;) !/ultiple+ing$ means %
A) a techni1ue to enable more than one signal to be sent simultaneously o(er one
physical channel
B) a techni1ue to enable one signal o(er one channel
C) a techni1ue to enable one signal o(er many channels
D) a techni1ue to enable one signal o(er multiple channels

'<) @or scientific applications most useful language is %
A) C7B7:
B) @700A#
C) -B:
D) ?/:
2
'1) Payroll -ystem is essentially %
A) 7nline
B) Batch Processing
C) 0eal ime
D) ransaction processing
'2) he term !CP=)P$ stands for %
A) ransmission Control Protocol=)nternet Protocol
B) ransit Control Protocol=)nternal Protocol
C) ransfer Concept Protocol=)ntermediate Protocol
D) ransit Concept Protocol=)nter(al Protocol

'') ----- means the altering of computer system software to achie(e a tas& for which it
was not originally designed
A) Pegging
B) ?ac&ing
C) re&&ing
D) Brea&ing

',) he word !)-D#$ stands for %
A) )nternal -er(ice Digit #etwor&
B) )ntegrated -er(ices Digital #etwor&
C) )nformation -er(ice Digital #et
D) )nternal -er(er Digit #etwor&


'.) Bio-metric 0ecognition does not include %
A) @inger Print and Palm Print
B) 5oice Print and *ye 0etina
C) ?and Aeometry and yping 0hythm
D) Body Print and ?ead print

6
'2) he following cannot be done by (irus ---
A) :oss of Data
B) Deletion of @ile
C) Physical Damage to Ceyboard
D) Corruption of Program
'6) /emory /anagement through !Paging$ is controlled by %
A) 7-
B) CPU
C) 0A/
D) 07/
'9) 0-A stands for the following three scientists %
A) 0i(estE -hamir and Adleman
B) 0onalladE -ussan and Assamann
C) 0ueppelE -elfridge and Albert
D) 0egisE -chroeer and Anderson
';) ?/: tag ------
A) FPG
B) F-
C) -G
D) dir
,<) Adobe Page /ill is ----
A) Browser
B) Authoring ool
C) "or&flow
D) -cripting :anguage
HHHHHHHHH
9

You might also like