Saturday, 16 June 2018

CAIIB IT very important over view for exam


Caiib IT elective

Module A

1. With Information Technology we cannot achieve
a) Workforce flexibility
b) Distributed the wealth equally
c) Globalization
d) Reduce financial frauds

2. Meaning and impact of globalization

3. Generation of computers
 First Generation: High speed vacuum tube
Very small memory
Development of stored program

 Second generation: Germanium transistors
more reliable and faster
Much cheaper  than tubes
Magnetic core storage and magnetic disk storage

 Third Generation: Silicon transistors
Integrated Circuits (ICs)
Switching speed and reliability increased
Semi-conductor Memory

 Fourth generation: Microprocessor chip
VLSI (Very Large Scale Integrated Circuits)
Computer networks and distributed computer systems
Highly portable and smaller in size due to improvements in speed, memory size, packing density of ICs

 Fifth generation: ULSI (Ultra Large Scale Integrated) chips
Artificial Intelligence

4. COBOL (Common Business Oriented Language) mainly used for business data processing (impt.)
5. FORTRAN used for scientific and engineering calculations (impt.)
6. Function of ALU ………… page 14-15
7. CPU consists of ….. page 14
8. Batch processing   ….  Page 18
9. Function of OLTP (On-Line Transaction Processing)…… page 20
10. Meaning of Grid computing, Real time system, cluster computing, cloud computing
11. Virtualizations of server’s means to run multiple operating systems on same physical servers.
12. Category of software with examples …. Page 35 36 (You will get 2 questions from this section)
13. Open Source Software with example
14. System software and application software examples
15. Unit 4: Networking System (You will get maximum questions from this unit, so concentrate on this chapter from module A)
16. Intranet
(i) Uses Internet-derived communication protocols (TCP/IP), networking and user interface.
(ii) Relatively cost efficient

17. In which types of cable composed of two or more copper wirestwisted around each other within a plastic sheath?
a) Coaxial cable
b) Twisted-pair cable
c)  Optical fiber cable
d) None of the above

18. RJ-45 connectors is a type of
a) Coaxial cable
b) Twisted-pair cable
c)  Optical fiber cable
d) None of the above

19. Cable used to where very large amount of data need to be transmitted on a regular basis____?
a) Coaxial cable
b) Twisted-pair cable
c)  Optical fiber cable
d) None of the above
Module  C

Chapter 8

Choose the odd one
a) SCORM
b) IEEE
c) IMS
d) AICC

Choose the correct flows of Instructional Design Process
a) Analyze-Develop-Design-Evaluate-Implement
b) Analyze-Design-Implement-Develop-Evaluate
c) Analyze-Develop-Design-Implement-Evaluate
d) Analyze-Design-Develop-Implement-Evaluate

Bloom’s taxonomy divides educational objectives into
a) 3 domains
b) 4 domains
c) 5 domains
d) 6 domains

A virtual classroom can help to
a) Save voice discussion and presentations.
b) Hold live ad-hoc learning discussions and study sessions.
c) Share the advantages of e-learning with the suppliers and strategic partners.
d) All of the above

Chapter 9

Score Banking System can manage multiple delivery channels through
a) API’s
b) Different servers
c) Different versions of CBS
d) None of the above

Data security includes
a) Transaction access of authorized users
b) Message validation
c) Transaction logging
d) All of the above

Chapter 10

In India, RTGS uses ______ message flow structure.
a) V-shaped
b) L-shaped
c) T-shaped
d) Y shaped

What is the name of the RTGS system that uses in the USA?
a) CHAPS
b) Fedwire
c) SIC
d) ELLIPS

What is the name of the RTGS system that uses in the UK?
a) CHAPS
b) Fedwire
c) SIC
d) ELLIPS

What is the name of the RTGS system that uses in the Belgium?
a) CHAPS
b) Fedwire
c) SIC
d) ELLIPS

Which message flow structure is generally incompatible with the basic principle of RTGS?
a) V-shaped
b) L-shaped
c) T-shaped
d)  Y-shaped

Message flow structure in CHAPS is
a) L-shaped
b) V-shaped
c) T-shaped
d)None of the above

Chapter 11

The cards used while traveling that is on move are ________________ cards.
a) Debit Card
b) Credit Card
c) Magnetic Card
d) Contactless smart Card

Smartcards can hold up to _______________ of information.
a) 4 KB
b) 8 KB
c) 12 KB
d) 16 KB

The following is a re-loadable card
a) Credit Card
b) Smart Card
c) Magnetic Card
d) Debit Card

Chapter 12

CRM is the dimensions of the E-business, what is the use
You need to study this also
ITService Delivery & Support : Service level management practices, Operations management
- work load scheduling, network services management, Preventive maintenance, Systems
performance monitoring process tools, techniques, Functionality of hardware, software, data
base. Drafting of RFP, system specifications, SLAs, Capacity planning & monitoring, Change
management processes / scheduled, emergency in configuration of production systems,
application of patches, releases etc., Incident & problem management practices, System
resiliency tools and techniques - fault tolerance, elimination of single point of failure, clustering.


#CAIIB IT
Instructions and data can be stored in the memory of Computer for automatically directing the flow of operations. It is called _____ concept.
(A) Objective Programming
(B) Stored program
(C) Both (A) and (B)
(D) None of the Above
Answer
(B) Stored program
“Stored Program” concept was developed by ______
(A) Maurice Wilkes
(B) Von Neumann
(C) M.H.A. Newman
(D) None of the Above
Answer
(B) Von Neumann
Electronic Discrete Variable Automatic Computer(EDVAC) was designed on __________ concept.
(A) Objective Programming
(B) Stored program
(C) Both (A) and (B)
(D) None of the Above
Answer
(B) Stored program
Which of the following was a small experimental machine based on Neumann’s stored program concept?
(A) Analytical engine
(B) Pascaline
(C) Manchester Mark I
(D) None of the Above
Answer
Third Generation computers were based on _______
(A) IC
(B) Vacuum tube
(C) transistor
(D) None of the Above
Answer
In EDSAC, an addition operation was completed in _____ micro seconds.
(A) 4000
(B) 3000
(C) 2000
(D) 1500
Answer
(D) 1500
ULSI stands for______
(A) Ultra Large Scale Integration
(B) Ultimate Large Scale Integration
(C) Upper Large Scale Integration
(D) Ultra Large Script Integration
Answer
(A) Ultra Large Scale Integration
Which of the following is fourth generation computer?
(A) INTEL 4004
(B) IBM 360
(C) IBM 1401
(D) None of the Above
Answer
(A) INTEL 4004
IC is made up of _________
(A) microprocessor
(B) vacuum tube
(C) transistor
(D) None of the Above
Answer
(C) transistor
Father of modern computer______
(A) Charles Babbage
(B) Alan Turing
(C) Ted Hoff
(D) None of the Above
Answer
(B) Alan Turing


1-1 Computer Network is
A. Collection of hardware components and computers
B. Interconnected by communication channels
C. Sharing of resources and information
D. All of the Above
1-2 What is a Firewall in Computer Network?
A. The physical boundary of Network
B. An operating System of Computer Network
C. A system designed to prevent unauthorized access
D. A web browsing Software
1-3 How many layers does OSI Reference Model has?
A. 4
B. 5
C. 6
D. 7
1-4 DHCP is the abbreviation of
A. Dynamic Host Control Protocol
B. Dynamic Host Configuration Protocol
C. Dynamic Hyper Control Protocol
D. Dynamic Hyper Configuration Protocol
1-5 IPV4 Address is
A. 8 bit
B. 16 bit
C. 32 bit
D. 64 bit
1-6 DNS is the abbreviation of
A. Dynamic Name System
B. Dynamic Network System
C. Domain Name System
D. Domain Network Service
1-7 What is the meaning of Bandwidth in Network?
A. Transmission capacity of a communication channels
B. Connected Computers in the Network
C. Class of IP used in Network
D. None of Above
1-8 ADSL is the abbreviation of
A. Asymmetric Dual Subscriber Line
B. Asymmetric Digital System Line
C. Asymmetric Dual System Line
D. Asymmetric Digital Subscriber Line
1-9 What is the use of Bridge in Network?
A. to connect LANs
B. to separate LANs
C. to control Network Speed
D. All of the above
1-10 Router operates in which layer of OSI Reference Model?
A. Layer 1 (Physical Layer)
B. Layer 3 (Network Layer)
C. Layer 4 (Transport Layer)
D. Layer 7 (Application Layer)
2
2-1 Each IP packet must contain
A. Only Source address
B. Only Destination address
C. Source and Destination address
D. Source or Destination address
2-2 Bridge works in which layer of the OSI model?
A. Appliation layer
B. Transport layer
C. Network layer
D. Datalink layer
2-3 _______ provides a connection-oriented reliable service for sending messages
A. TCP
B. IP
C. UDP
D. All of the above
2-4 Which layers of the OSI model are host-to-host layers?
A. Transport, Session, Persentation, Application
B. Network, Transport, Session, Presentation
C. Datalink, Network, Transport, Session
D. Physical, Datalink, Network, Transport
2-5 Which of the following IP address class is Multicast
A. Class A
B. Class B
C. Class C
D. Class D
2-6 Which of the following is correct regarding Class B Address of IP address
A. Network bit – 14, Host bit – 16
B. Network bit – 16, Host bit – 14
C. Network bit – 18, Host bit – 16
D. Network bit – 12, Host bit – 14
2-7 The last address of IP address represents
A. Unicast address
B. Network address
C. Broadcast address
D. None of above
2-8 How many bits are there in the Ethernet address?
A. 64 bits
B. 48 bits
C. 32 bits
D. 16 bits
2-9 How many layers are in the TCP/IP model?
A. 4 layers
B. 5 layers
C. 6 layers
D. 7 layers
2-10 Which of the following layer of OSI model also called end-to-end layer?
A. Presentation layer
B. Network layer
C. Session layer
D. Transport layer

3-1. Why IP Protocol is considered as unreliable?
A. A packet may be lost
B. Packets may arrive out of order
C. Duplicate packets may be generated
D. All of the above
3-2. What is the minimum header size of an IP packet?
A. 16 bytes
B. 10 bytes
C. 20 bytes
D. 32 bytes
3-3. Which of following provides reliable communication?
A. TCP
B. IP
C. UDP
D. All of the above
3-4. What is the address size of IPv6 ?
A. 32 bit
B. 64 bit
C. 128 bit
D. 256 bit
3-5. What is the size of Network bits & Host bits of Class A of IP address?
A. Network bits 7, Host bits 24
B. Network bits 8, Host bits 24
C. Network bits 7, Host bits 23
D. Network bits 8, Host bits 23
3-6. What does Router do in a network?
A. Forwards a packet to all outgoing links
B. Forwards a packet to the next free outgoing link
C. Determines on which outing link a packet is to be forwarded
D. Forwards a packet to all outgoing links except the originated link
3-7. The Internet is an example of
A. Cell switched network
B. circuit switched network
C. Packet switched network
D. All of above
3-8. What does protocol defines?
A. Protocol defines what data is communicated.
B. Protocol defines how data is communicated.
C. Protocol defines when data is communicated.
D. All of above
3-9. What is the uses of subnetting?
A. It divides one large network into several smaller ones
B. It divides network into network classes
C. It speeds up the speed of network
D. None of above
3-10. Repeater operates in which layer of the OSI model?
A. Physical layer
B. Data link layer
C. Network layer
D. Transport layer

4-1. What is the benefit of the Networking?
A. File Sharing
B. Easier access to Resources
C. Easier Backups
D. All of the Above
4-2. Which of the following is not the Networking Devices?
A. Gateways
B. Linux
C. Routers
D. Firewalls
4-3. What is the size of MAC Address?
A. 16-bits
B. 32-bits
C. 48-bits
D. 64-bits
4-4. Which of the following can be Software?
A. Routers
B. Firewalls
C. Gateway
D. Modems
4-5. What is the use of Ping command?
A. To test a device on the network is reachable
B. To test a hard disk fault
C. To test a bug in a Application
D. To test a Pinter Quality
4-6. MAC Address is the example of
A. Transport Layer
B. Data Link Layer
C. Application Layer
D. Physical Layer
4-7. Routing tables of a router keeps track of
A. MAC Address Assignments
B. Port Assignments to network devices
C. Distribute IP address to network devices
D. Routes to use for forwarding data to its destination
4-8. Layer-2 Switch is also called
A. Multiport Hub
B. Multiport Switch
C. Multiport Bridge
D. Multiport NIC
4-9. Difference between T568A and T568B is
A. Difference in wire color
B. Difference in number of wires
C. Just different length of wires
D. Just different manufacturer standards
4-10. The meaning of Straight-through Cable is
A. Four wire pairs connect to the same pin on each end
B. The cable Which Directly connects Computer to Computer
C. Four wire pairs not twisted with each other
D. The cable which is not twisted
For 4: 1 – D / 2 – B / 3 – C / 4 – B / 5 – A / 6 – B / 7 – D / 8 – C / 9 – D / 10 – A

5-1 Which of the following is not the External Security Threats?
A. Front-door Threats
B. Back-door Threats
C. Underground Threats
D. Denial of Service (DoS)
5-2 What is the Demilitarized Zone?
A. The area between firewall & connection to an external network
B. The area between ISP to Military area
C. The area surrounded by secured servers
D. The area surrounded by the Military
5-3 What is the full form of RAID ?
A. Redundant Array of Independent Disks
B. Redundant Array of Important Disks
C. Random Access of Independent Disks
D. Random Access of Important Disks
5-4 What is the maximum header size of an IP packet?
A. 32 bytes
B. 64 bytes
C. 30 bytes
D. 60 bytes
5-5 What is the size of Host bits in Class B of IP address?
A. 04
B. 08
C. 16
D. 32
5-6 What is the usable size of Network bits in Class B of IP address?
A. 04
B. 08
C. 14
D. 16
5-7 In which type of RAID, data is mirrored between two disks.
A. RAID 0
B. RAID 1
C. RAID 2
D. RAID 3
5-8 What do you mean by broadcasting in Networking?
A. It means addressing a packet to all machine
B. It means addressing a packet to some machine
C. It means addressing a packet to a particular machine
D. It means addressing a packet to except a particular machine
5-9 Which of the following is/are Protocols of Application?
A. FTP
B. DNS
C. Telnet
D. All of above
5-10 Which of the following protocol is/are defined in Transport layer?
A. FTP
B. TCP
C. UDP
D. B & C

6-1. What is the IP Address range of APIPA?
A. 169.254.0.1 to 169.254.0.254
B. 169.254.0.1 to 169.254.0.255
C. 169.254.0.1 to 169.254.255.254
D. 169.254.0.1 to 169.254.255.255
6-2. Which of the following is correct in VLSM?
A. Can have subnets of different sizes
B. Subnets must be in same size
C. No required of subnet
D. All of above
6-3. What does the port number in a TCP connection specify?
A. It specifies the communication process on the two end systems
B. It specifies the quality of the data & connection
C. It specify the size of data
D. All of the above
6-4. The class-based addressing is also known as
A. Modern Model
B. Classful Model
C. Classless Model
D. Heterogeneous Model
6-5. Which of the following is correct in CIDR?
A. Class A includes Class B network
B. There are only two networks
C. There are high & low class network
D. There is no concept of class A, B, C networks
6-6. What is the size of Source and Destination IP address in IP header?
A. 4 bits
B. 8 bits
C. 16 bits
D. 32 bits
6-7. Which of the following is reliable communication?
A. TCP
B. IP
C. UPD
D. All of them
6-8. What is the typical range of Ephemeral ports?
A. 1 to 80
B. 1 to 1024
C. 80 to 8080
D. 1024 to 65535
6-9. What is the purpose of the PSH flag in the TCP header?
A. Typically used to indicate end of message
B. Typically used to indicate beginning of message
C. Typically used to push the message
D. Typically used to indicate stop the message
6-10. What is the natural mask for a class C Network?
A. 255.255.255.1
B. 255.255.255.0
C. 255.255.255.254
D. 255.255.255.255


……………



Regression testing is a major part of which of the life cycle?
a) Waterfall model
b) V model
c) Iterative model…..
d) All of the above


Friday, 15 June 2018

INTERNATIONAL BANKING RECOLLECTED QUESTIONS

INTERNATIONAL BANKING RECOLLECTED QUESTIONS

bullet repayment
IMF
negative pledge
bahamas routing offshore known as
ratio covenants
value at risk
urc 522
restoration of confidence in intt trade and invstment
sterling denominated foreign bonds
world bank group
leveraged buy out
floating rate notes
risk collaps of barings bank
oldest credit rating agency
straight debt
numericals asked frm call option, dealer, bill negotiation n crystalization, post n pre shipment

1)Oldest rating agency
2)what is IMF
3)5 marks case study on residential status
4)5 marks case study on conversion of currency directly quoted,TT Buying or selling
5)5 marks case study on conversion indirectly quoted
6)2 questions on INCOTERMS
7)Syndication financing
8)Off sheet balance
9)IEC code
10)EEFC
11)Predecessor of World Bank
12)3 questions on LC
13)Popular Off shore location for resident and non resident
14)Euronote
15)AD is the member of....?
SNRR a/c

1)Leveraged buy outs
2)Management buy out
3)correspondent banking
4)balance of payment
5)A case study on NRI NRO PIO
6)ADR GDR level movement
7)syndication definition
8)World Bank
9)a case study on ECGC
10)Offshore banking
11)Export Import duration after shipment
12)Letter of credit theory
13)A case study on parties of LC
14)A Case study on cross rate transaction
15)A case study on margin selling or buying
16)Authorised Dealer
17)IMF 2 questions
18)Theoretical case study on ECB
19)Straddle
20)URR522



....

INFORMATION TECHNOLOGY

INFORMATIONTECHANOLOGY)

1.Aspecialtypegatewaythatcankeepexternalusersfromaccessing resourcesontheLANusersaccesstheexternalinfoiscaled: A.Repeater

B.Firewal

C.Encryption

D.Hub

2.Whatisthenamegiventotheexchangeofcontrolsignalswhichis necessaryforestablishingaconnectionbetweenamodemanda computeratoneendofalineandanothermodemandcomputeratthe otherend?

A.Handshaking

B.Modemoptions

C.Protocol

D.Alofthese

3.InSQL,whichcommandisusedtochangesdatainadatatable?

A.UPDATE

B.INSERT

C.BROWSE

D.APPEND

4.InSQL,whichofthefolowingisnotadatadefinitionlanguage command?

A.RENAME

B.REVOKE

C.GRANT

D.UPDATE

5.Whichcommand(s)is(are)usedtoredefineacolumnofthetablein SQL?

A.ALTERTABLE

B.DEFINETABLE

C.MODIFYTABLE

D.ALLofthethese

6.Inarelationalschema,eachtupleisdividedintofieldscaled A.Relations

B.Domains

C.Queries

D.Alofthethese






7.Anindexingoperation

A.Sortsafileusingasinglekey

B.Sortsfileusingtwokeys


C.Establishesanindexforafile

D.Both(1)and(3)

8.Datasecuritythreatsinclude

A.Hardwarefailure

B.Privacyinvasion

C.Fraudulentmanipulationofdata

D.Alofthese

9.Thelanguageusedinapplicationprogramstorequestdatafromthe DBMSisreferedtoasthe

A.DML

B.DDL

C.Querylanguage

D.DCL

10.A___containsthesmalestunitofmeaningfuldata,soyoumightcalit thebasicbuildingblockforadatafile.

A.Filestructures

B.Records

C.Fields

D.Database

IT

Analogue: The use of a system in which the data is of a continuously variable physical quantity such as voltage
or angular position. It is a signal that is continuously variable over its full range of values e.g. the signal of the
sound wave or the electric output of a telephone microphone is an analogue voltage signal.
Analogue Computer: A device that operate on date in the form of continuously variable physical quantities.
ANSI: American National Standards Institute.
Address Bus - An electronic pathway that carries data between the computers CPU and its memory.
Authentication - Means of ensuring that a message or instruction in an EFT context is from an authorised
source. Usually carried out with PIN.
Access Control Systems - Equipment or software designed to restrict access to equipment, data, software, or
system functions to authorized persons.
Batch Processing: A technique in which a number of similar items or transactions are processed in groups or
batches during a machine run.
Binary: A number system using base 2 and the numbers 0 and 1.
Bit — Binary digit - An individual piece of data either a 0 or 1.
Byte: A group of 8 bits to represent a character; the amount of memory required to store a single character, a
unit of data capable of storing 256 unique values.
Bar Code reader - An input device used to read bar codes, translate them into numbers, and input the
numbers often used In retail stores and assembly line productions.
Baud rate - A measure of modulation rate used In serial communications, the number of discrete signaling
events per second e.g. 2400 bits per second.
CBT: Computer Based Training - An interactive educational tool in which the computer usually explains the
subject with the help of text, pictures, animations and audio-visual features.
Centra! Processing Unit CPU - The processing component generally referred to as a chip located on the
motherboard that interprets and executes program instructions and communicates with input, output and
storage devices.
Control unit - One of the two basic parts (together with the ALU) of the CPU; contains instructions for carrying
out different activities of the computer.
CASE - An acronym for Computer Aided software Engineering, a collection of software tools that automate or
support the process or designing and programming software systems.
C++ _ An object oriented programming language-developed by AT & T Bell labs in 1980s.
Channel - It consists of controller card, interface cable and power supply.
Computer Network - A network of interconnected computer systems that allows data to be transformed
between them.
Compartmentaiisation - Rigid and well defined boundaries between different organs/offices of banks
providing hindrance to information flow amongst themselves.
Data: Facts, numbers, letters or symbols that become usable information when processed. Facts coded and
structured for subsequent processing, generally using a computer system.
Database - A non-redundant collection of inter-related data items processable by one or more applications.
Non-redundant means that individual data elements appear only once or less frequently than in normal files.
Data Communication - Data transfer between a source and a data destination via one or more data links.
Data processing: It is a method concerning with the systematic recording, arranging, filing, processing and
dissemination of facts of business, generally done by computers in today's organizations.
Data Transmission - The movement of data from one location of storage to another. If the locations are
geographically far away, generally done via satellites.
Digital — An electronic signal that is defined in terms of a signal set of discrete and discontinuous value, and
whose various states are at discrete internal part.
Digital Signal - A signal that a computer sends; made up of Os and Is and transmitted by telephone line.
Digital Computer: A device that manipulates discrete data and performs arithmetic and logic operations on
these data.
Demodulation - The process of converting an electric computer signal that has traversed a telephone line
back into sound or other data.
Desk Top Model - A PC designed to sit on a desk.
Digital Audio Tape Drive (DAT) - A tape drive that typically has two write heads and that has a very high
storage capacity.
DBMS - An acronym for the database management system. A program that maintains and controls the access
to collection of related information in electronic files.
Disk mirroring - The data is written on two or more hard disks simultaneous over the same channel.
Disk duplexing - The data Is written on two or more hard disks simultaneously over the different channel.
Dumb terminals - Hardware configuration consisting of a key board and monitor that is capable of sending
and receiving Information, but has no memory or processing capabilities.
ENIAC: Electronic Numeric Integrator and Calculator, the first electronic computing device designed by the US
army with Moore School of Electrical Engineering.
Electronic Fund Transfer (EFT) - The electronic systems that transfer money and record data relating to
these transfers. Funds transfers effected through the banking systems by electronic techniques with input and
output methods largely or completely being in electronic form.

Analogue: The use of a system in which the data is of a continuously variable physical quantity such as voltage
or angular position. It is a signal that is continuously variable over its full range of values e.g. the signal of the
sound wave or the electric output of a telephone microphone is an analogue voltage signal.
Analogue Computer: A device that operate on date in the form of continuously variable physical quantities.
ANSI: American National Standards Institute.
Address Bus - An electronic pathway that carries data between the computers CPU and its memory.
Authentication - Means of ensuring that a message or instruction in an EFT context is from an authorised
source. Usually carried out with PIN.
Access Control Systems - Equipment or software designed to restrict access to equipment, data, software, or
system functions to authorized persons.
Batch Processing: A technique in which a number of similar items or transactions are processed in groups or
batches during a machine run.
Binary: A number system using base 2 and the numbers 0 and 1.
Bit — Binary digit - An individual piece of data either a 0 or 1.
Byte: A group of 8 bits to represent a character; the amount of memory required to store a single character, a
unit of data capable of storing 256 unique values.
Bar Code reader - An input device used to read bar codes, translate them into numbers, and input the
numbers often used In retail stores and assembly line productions.
Baud rate - A measure of modulation rate used In serial communications, the number of discrete signaling
events per second e.g. 2400 bits per second.
CBT: Computer Based Training - An interactive educational tool in which the computer usually explains the
subject with the help of text, pictures, animations and audio-visual features.
Centra! Processing Unit CPU - The processing component generally referred to as a chip located on the
motherboard that interprets and executes program instructions and communicates with input, output and
storage devices.
Control unit - One of the two basic parts (together with the ALU) of the CPU; contains instructions for carrying
out different activities of the computer.
CASE - An acronym for Computer Aided software Engineering, a collection of software tools that automate or
support the process or designing and programming software systems.
C++ _ An object oriented programming language-developed by AT & T Bell labs in 1980s.
Channel - It consists of controller card, interface cable and power supply.
Computer Network - A network of interconnected computer systems that allows data to be transformed
between them.
Compartmentaiisation - Rigid and well defined boundaries between different organs/offices of banks
providing hindrance to information flow amongst themselves.
Data: Facts, numbers, letters or symbols that become usable information when processed. Facts coded and
structured for subsequent processing, generally using a computer system.
Database - A non-redundant collection of inter-related data items processable by one or more applications.
Non-redundant means that individual data elements appear only once or less frequently than in normal files.
Data Communication - Data transfer between a source and a data destination via one or more data links.
Data processing: It is a method concerning with the systematic recording, arranging, filing, processing and
dissemination of facts of business, generally done by computers in today's organizations.
Data Transmission - The movement of data from one location of storage to another. If the locations are
geographically far away, generally done via satellites.
Digital — An electronic signal that is defined in terms of a signal set of discrete and discontinuous value, and
whose various states are at discrete internal part.
Digital Signal - A signal that a computer sends; made up of Os and Is and transmitted by telephone line.
Digital Computer: A device that manipulates discrete data and performs arithmetic and logic operations on
these data.
Demodulation - The process of converting an electric computer signal that has traversed a telephone line
back into sound or other data.
Desk Top Model - A PC designed to sit on a desk.
Digital Audio Tape Drive (DAT) - A tape drive that typically has two write heads and that has a very high
storage capacity.
DBMS - An acronym for the database management system. A program that maintains and controls the access
to collection of related information in electronic files.
Disk mirroring - The data is written on two or more hard disks simultaneous over the same channel.
Disk duplexing - The data Is written on two or more hard disks simultaneously over the different channel.
Dumb terminals - Hardware configuration consisting of a key board and monitor that is capable of sending
and receiving Information, but has no memory or processing capabilities.
ENIAC: Electronic Numeric Integrator and Calculator, the first electronic computing device designed by the US
army with Moore School of Electrical Engineering.
Electronic Fund Transfer (EFT) - The electronic systems that transfer money and record data relating to
these transfers. Funds transfers effected through the banking systems by electronic techniques with input and
output methods largely or completely being in electronic form.

Online: A term describing persons, equipment or devices that are in direct communication with the central
processing unit of a computer. Facility providing immediate access to computer files for data entry or enquiry
purposes.
Optical Storage - The main alternative to magnetic storage, uses a laser beam to read, write or transfer data
to the appropriate medium.
Output - Information generated through the processing of input data.
OfMlne ATMs - The ATMs which are not connected to the bank's host computer.
Organizational Decay - Downtrend in the growth.
Program: A set of instructions which a computer can understand and which has been ordered in a logical
sequence of steps to complete a particular task.
Programming Language: A precise notation with precisely defined grammar (syntax) and semantic rules to
express algorithm.
Packet Switched Network - A network designed to carry data in the form of packets. The packet and its
format is internal to the network.
Packet assembler/dissembler (PAD) - A protocol conversion device that permits end user devices, e.g.
terminals to access a packet switched network. It is a unit to which one can connect many places. This PAD is
connected to the Switching Device.
Payment Order - An unconditional instruction issued by an originator in writing or transmitted electronically to
a sending bank to effect a funds transfer of a certain sum of money to the designated account of a designated
beneficiary.
Password ~ A confidential code which a user must enter into the computer before the access control system
allows any operations to be performed.
Random Access — A method used to access a record of a file directly by it's address rather than sequentially.
Random Access Memory - A computers volatile or temporary memory built into its CPU, stores information
while the information is being worked upon but holds the information only until the computer is turned off or
reset.
Reduced Instruction Set Computing (RISC) Processor - A microprocessor used by some personal and mid
size computers including workstations contains only a handful of instructions and therefore works more quickly
than the CISC processor.
Redundant Array of Inexpensive Disks (RAID) - A set of hard disks all of which work together, with a file
spread across them also called a disk array.
Real time - Facility providing immediate updating of main files or data items with the data entered into the
system in on-line mode.
Semi-Conductor: It is used to form small compact circuitry which can also be used to form memory.
Simulation: The representation of various situations in a computer by means of a model so that different
condition can be tested.
Software: A set of instructions written to bring the hardware of a computer system into operation and to best
advantage.
Systems Analyst - A computer specialist responsible for analyzing current procedures for designing the most
efficient and economical system that will improve the given task within a company.
Serial Mouse - A general purpose port through which a mouse or modem can be connected to the computer,
the data transmission occurs one bit after another in series.
Server - It is a computer which coordinates all computer activities into a network.
Static Data - The data that usually does not get changed with passage of time, e.g. customer name, date of
borrowing etc.
Transistor: A small, light very fast switching device in the second generation computers.
Timesharing: A processing system in which CPU's time is shared by several users simultaneously such that
user has the illusion that no one else is using the same processor.
Terminal - an I/O device connected to a multi-user computer consisting of a monitor and a keyboard.
Technological Prowess - The extent of technology implemented successfully.
Turnover — Switch-over of jobs by the employees, particularly professionals.
Virtual Memory - A CPUs simulation of memory by accessing a disk drive and using it as internal memory.
Volatile Memory — Memory that retains data only until the computer is turned off.

Thursday, 14 June 2018

Current Affairs on June 14th 2018

Today's Headlines
*Economic Times*

📝 Airtel plans Rs 24,000 cr capex in FY19 to beat rivals

📝 Kaspersky targets 10% revenue growth from South Asia

📝 ICICI Bank to sell 2% stake in life insurance arm

📝 India seeks help from World Bank on GeM software pricing

📝 Home loan growth may rise to 17-19% in FY19: Report

📝 Greenko plans to buy 6k-cr power project

📝 Four suitors for Usha Martin’s steel unit

📝 Securitisation volumes down 7.2% in FY18 on GST ambiguity: Report

*Business Standard*

📝 FIFA set to make $6.1 billion from World Cup 2018

📝 India's CAD triples to 1.9% in Q4 year-on-year, pegged at 1.6% in FY18

📝 India's silver use triples in a decade, world share up from 14.7% to 39.2%

📝 Govt's move to push FDI via stock exchanges fails to yield results

📝 Taiwan co, Adani may join hands to set up Rs 400 bn petrochemical project

📝 With rising awareness, carmakers see a surge in demand for airbags

📝 CBDT proposes amendments to three IT forms, invites public suggestions

*Financial Express*

📝 Comcast offers $65 billion to lure Fox from Disney bid

📝 Isro unit offers to transfer EV battery tech for Rs 1 crore

📝 Government may cut short-term bond sales as yields surge

📝 Public Wi-Fi networks without licence violate law, says COAI

📝 600 MW K’taka solar projects stuck over new wheeling, transmission charges

📝 Ikea partners with Adidas, Lego, others to design products for India

*Mint*

📝 Fed raises interest rates amid stronger inflation, drops crisis-era guidance

📝 HDFC Bank gets nod from cabinet for ₹24,000 crore FDI

📝 Carlsberg is said to plan IPO for India operations

📝 Truecaller buys Chillr, looks to expand digital payments services

📝 Fitch downgrades viability rating of SBI, BoB on poor asset quality

📝 PFRDA seeks to double pension limit under Atal Pension Yojana.

Wednesday, 13 June 2018

CAIIB IT DATA WARE HOUSE

DATA WAREHOUSE ARCHITECTURE
Different data warehousing systems have different structures. Some may have an ODS (operational data store), while some may have multiple data marts. In general a Data Warehouse is used on an enterprise level, while Data Mart is used on a business division/department level. Some may have a small number of data sources, while some may have dozens of data sources. In view of this, it is far more reasonable to present the different layers of a data warehouse architecture rather than discussing the specifics of any one system.
Layers in a Data Warehouse
In general, all data warehouse systems have the following layers:
 Data Source Layer
 Data Extraction Layer
 Staging Area
 ETL Layer
 Data Storage Layer
 Data Logic Layer
 Data Presentation Layer
 Metadata Layer
 System Operations Layer

The picture below shows the relationships among the different components of the data warehouse architecture:Pl z find snap
Each component is discussed individually below:
Data Source Layer
This represents the different data sources that feed data into the data warehouse. The data source can be of any format -- plain text file, relational database, other types of database, Excel file, etc., can all act as a data source
Many different types of data can be a data source:
 Operations -- such as sales data, HR data, product data, inventory data, marketing data, systems data.
 Web server logs with user browsing data.
 Internal market research data.
 Third-party data, such as census data, demographics data, or survey data.
All these data sources together form the Data Source Layer.
Clearly, the goal of data warehousing is to free the information that is locked up in the operational databases and to mix it with information from other, often external, sources of data. Increasingly, large organizations are acquiring additional data from outside databases. This information includes demographic, econometric, competitive and purchasing trends.
Data Extraction Layer
Data gets pulled from the data source into the data warehouse system. There is likely some minimal data cleansing, but there is unlikely any major data transformation.
Staging Area: This is where data sits prior to being scrubbed and transformed into a data warehouse / data mart. Having one common area makes it easier for subsequent data processing / integration.
ETL Layer
ETL stands for “Extract, Transform and Load”. This is where data gains its "intelligence", as logic is applied to transform the data from a transactional nature to an analytical nature. This layer is also where data cleansing happens. The ETL design phase is often the most time-consuming phase in a data warehousing project, and an ETL tool is often used in this layer.
Data Storage Layer
This is where the transformed and cleansed data sit. Based on scope and functionality, 3 types of entities can be found here: data warehouse, data mart, and operational data store (ODS). In any given system, you may have just one of the three, two of the three, or all three types.
Data Logic Layer
This is where business rules are stored. Business rules stored here do not affect the underlying data transformation rules, but do affect what the report looks like.
Data Presentation Layer
This refers to the information that reaches the users. This can be in a form of a tabular / graphical report in a browser, an emailed report that gets automatically generated and sent every day, or an alert that warns users of exceptions, among others. Usually an OLAP tool and/or a reporting tool is used in this layer.
Metadata Layer
This is where information about the data stored in the data warehouse system is stored. Metadata is data about data. A logical data model would be an example of something that's in the metadata layer. A metadata tool is often used to manage metadata. Data warehouse contains huge amount of data. The metadata component contains the information like: (1) description of data warehouse; (2) rules to map, translate and transform data sources to warehouse elements; (3) the navigation paths and rules for browsing in the data warehouse; (4) the data dictionary; (5) the list of pre-designed and built-in queries available to the users etc. Record descriptions in a COBOL program DIMENSION statements in a FORTRAN program, or SQL Create statement fields are examples of metadata.
In order to have a fully functional warehouse, it is necessary to have a variety of meta-data available, data about the end-user views of data and data about the operational databases. Ideally, end-users should be able to access data from the data warehouse (or from the operational databases) without having to know where that data resides or the form in which it is stored.
System Operations Layer
This layer includes information on how the data warehouse system operates, such as ETL job status, system performance, and user access history


NOTICE by IIBF

This is to bring to the notice of candidates that due to technical issue (Display problem ofquestions) examination of ‘Advanced Bank Management’ subject of CAIIB held on 3rd June,2018 could not be completed properly by candidates in some centres for the 8.30 am batch.Institute has, therefore, decided to conduct re-examination for those effected candidates on 24thJune 2018. The venue, time and other details will be given in the admit letter which will besent to the candidate’s email id registered with the Institute in due course. Admit letter will also be made available in the Institute’s website 3-4 day before the examination date. Candidate who do not receive the admit letter by email can download it from our website.Kindly note that in case if candidates choose to appear at the re-examination, their previous score if any, will be cancelled. In case if they choose not to appear for the re-examination,their previous score would be maintained For details plz check iibf site


Tuesday, 12 June 2018

CAIIB IT

caiib IT

CRYPTOGRAPHY
There are two basic types of Encryption algorithms:
(i) Symmetric encryption
(ii) Asymmetric Encryption
Symmetric Encryption: In this encryption technique the sender and receiver encrypts and decrypts the message with the same key. Examples are Twofish, Serpent, AES (Rijndael), Blowfish, CAST5, Kuznyechik, RC4, 3DES, Skipjack etc.

Asymmetric encryption: In this encryption technique the sender encrypts the message with the receiver’s public key and the receiver decrypts the information with recipient’s private key. Hence this technique is called public key encryption. Examples are: Diffie-Hellman, RSA, ECC, ElGamal, DSA etc.

Among the various models of symmetric cipher analyzed the Rijndael is the best. Actually it is the role model of DES and AES. This model is adopted by different information security agencies like NSA, NIST and FIPS.
Among the various asymmetric ciphers, RSA is a moderate and most useful cipher for small data encryption like digital signature, ATM Pin etc.
But as discussed above, RSA (asymmetric technique) is much slower than Rijndael (symmetric technique) and other symmetric cipher techniques. But the scalability of asymmetric cryptosystem is far higher than the symmetric cryptosystem. Thus where the number of users is huge and required keys are very high, asymmetric cryptosystem proves to be superior.
It is scientifically predicted that the symmetric cipher like Rijndael is supposed to be secure against mathematical attacks until 2090. Thus they are very suitable for hardware level security in communicating devices.
Advanced Encryption Standard (AES): is the successor of DES (Data Encryption Standard) as standard symmetric encryption algorithm for US federal organizations. AES uses keys of 128, 192 or 256 bits, although, 128 bit keys provide sufficient strength today. It uses 128 bit blocks, and is efficient in both software and hardware implementations. It was selected through an open competition involving hundreds of cryptographers during several years.
Safe Key Length
128-bit encryption is a data/file encryption technique that uses a 128-bit key to encrypt and decrypt data or files. In today’s parlance, it is considered one of the most secure encryption methods and used in most modern encryption algorithms and technologies. 128-bit encryption is considered to be logically unbreakable as of date. However, it is to be remembered that breakability is only relative considering the technology available at that time. Keeping this in view, it is also recommended by many that the cipher AES-256 be used among other places in SSL/TLS across the Internet. It's considered among the top ciphers. In theory it's not crackable since the combinations of keys is massive.

CAIIB IT

CAIIB IT
Logical Security
Generally, passwords must be at least 8 characters long and include upper and lower case characters and at least one numeric character and one special character. It is amazing to note that a ‘brute force’ tool which may crack a 4 character password in just 4 seconds, takes about 10 years to crack an 8 character password.
Privileged identity management (PIM) is a recent concept involving a domain within identity management focused on the special requirements of powerful accounts within the IT infrastructure of an enterprise. It is frequently used as an information security and governance tool to help companies in meeting compliance regulations and to prevent internal data breaches through the use of privileged accounts, like system or database administrator. PIM, privileged identity management; PUM, privileged user management; and PAM, privileged account management OR privileged access management; all three of these acronyms revolve around the same simple concept: who can get to a server, how they can get to a server and what they can do when they get there.
Denial-of-service (DoS) attacks: Where the intruder attempts to crash a service (or the machine), overload network links, overloaded the CPU, or fill up the disk. The intruder is not trying to gain information, but to simply act as a vandal to prevent from making use of machine.
Distributed Denial of Service (DDoS) attacks: In most respects it is similar to a DoS attack but the results are much, much different. Instead of one computer and one internet connection the DDoS attack utilises many computers and many connections. The computers behind such an attack may be often distributed around the whole world and will be part of what is known as a botnet. The main difference between a DDoS attack vs a DoS attack, therefore, is that the target server will be overload by hundreds or even thousands of requests in the case of the former as opposed to just one attacker in the case of the latter. Therefore it is much, much harder for a server to withstand a DDoS attack as opposed to the simpler DoS incursion.
An Intrusion Detection System (IDS) is a system for detecting such intrusions. IDS can be broken down into the following categories:
An Intrusion Prevention System (IPS) sits between the firewall and the rest of the network. That way, if an attack is detected, the IPS can stop the malicious traffic before it makes it to the rest of the network. In contrast, an IDS simply sits on top of the network rather than in front of it. Unlike IDS, IPS actively takes steps to prevent or block intrusions that are detected. These preventing steps include activities like dropping malicious packets and resetting or blocking traffic coming from malicious IP addresses. IPS can be seen as an extension of IDS, which has the additional capabilities to prevent intrusions while detecting them.
IPS is a system that actively takes steps to prevent an intrusion or an attack when it identifies one. IPS are divided in to four categories. First one is the Network-based Intrusion Prevention (NIPS), which monitors the entire network for suspicious activity. The second type is the Network Behavior Analysis (NBA) systems that examine the traffic flow to detect unusual traffic flows which could be results of attack such as distributed denial of service (DDoS). The third kind is the Wireless Intrusion Prevention Systems (WIPS), which analyzes wireless networks for suspicious traffic. The fourth type is the Host-based Intrusion Prevention Systems (HIPS), where a software package is installed to monitor activities of a single host.

Bharat Bill Payment System (BBPS)

Bharat Bill Payment System (BBPS) Bharat Bill Payment System (BBPS) is an integrated bill payment system in India offering interoperable and accessible bill payment service to customers online as well as through a network of agents, enabling multiple payment modes, and providing instant confirmation of payment.
National Payments Corporation of India (NPCI) will function as the authorised Bharat Bill Payment Central Unit (BBPCU), which will be responsible for setting business standards, rules and procedures for technical and business requirements for all the participants. NPCI, as the BBPCU, will also undertake clearing and settlement activities related to transactions routed through BBPS. Existing bill aggregators and banks are envisaged to work as Operating Units to provide an interoperable bill payment system irrespective of which unit has on-boarded a particular biller. Payments may be made through the BBPS using cash, transfer cheques, and electronic modes. To start with, the scope of BBPS will cover repetitive payments for everyday utility services such as electricity, water, gas, telephone and Direct-to-Home (DTH). Gradually, the scope would be expanded to include other types of repetitive payments, like school / university fees, municipal taxes etc.

Bharat Interface for Money (BHIM)

Bharat Interface for Money (BHIM) Bharat Interface for Money (BHIM) is an app that lets you make simple, easy and quick payment transactions using Unified Payments Interface (UPI). You can make instant bank-to-bank payments and Pay and collect money using just Mobile number or Virtual Payment Address (VPA).
The following are the features of BHIM:
1. Send Money: User can send money using a Virtual Payment Address (VPA), Account Number & IFSC, Aadhaar Number or QR code. 2. Request Money: User can collect money by entering Virtual Payment Address (VPA). Additionally through BHIM App, one can also transfer money using Mobile No. (Mobile No should be registered with BHIM or *99# and account should be linked) 3. Scan & Pay: User can pay by scanning the QR code through Scan & Pay & generate your QR option is also present. 4. Transactions: User can check transaction history and also pending UPI collect requests (if any) and approve or reject. User can also raise complaint for the declined transactions by clicking on Report issue in transactions.5. Profile: User can view the static QR code and Payment addresses created or also share the QR code through various messenger applications like WhatsApp, Email etc. available on phone and download the QR code. 6. Bank Account: User can see the bank account linked with his/her BHIM App and set/change the UPI PIN. User can also change the bank account linked with BHIM App by clicking Change account provided in Menu and can also check Balance of his/her linked Bank Account by clicking “REQUEST BALANCE” 7. Language: Up to 8 regional languages (Tamil, Telugu, Bengali, Malayalam, Oriya, Gujarati, Kannada ,Hindi) available on BHIM to improve user experience. 8. Block User: Block/Spam users who are sending you collect requests from illicit sources. 9. Privacy: Allow a user to disable and enable mobilenumber@upi in the profile if a secondary VPA is created (QR for the disabled VPA is also disabled).

CAIIB Financial Advising



PORTFOLIO PERFORMANCE EVALUATION

 Portfolio Performance Measures

Portfolio performance evaluation involves determining periodically how the portfolio  performed  in  terms  of  not  only  the  return  earned,  but  also  the  risk experienced by the investor. For portfolio evaluation appropriate measures of return and risk as well as relevant standards (or “benchmarks”) are needed. In general, the market value of a portfolio at a point of time is determined by adding the markets value of all the securities held at that particular time. 

The essential idea behind performance evaluation is to compare the returns which were obtained on portfolio with the results that could be obtained if more appropriate   alternative   portfolios   had   been   chosen   for   the   investment.   Such comparison portfolios are often referred to as benchmark portfolios. In selecting them investor should be certain that they are relevant, feasible and known in advance. The benchmark should reflect the objectives of the investor.

 Beta
Beta (β) measures the systematic risk of a portfolio. It is the sensitivity of a portfolio to an index, typically an equity index. If beta is one, then the portfolio carries the same systematic risk as the index. If beta is less than one, then the systematic risk is less than that of the index. If beta is more than one, then the systematic risk is more than the index. It should be noted that apart from systematic risk, portfolios also carry specific risk, which is the risk of individual securities making losses even when the index is going up. Thus beta is not a full measure of risk.
Beta can be calculated as:

β=(Covariance between an asset and market )/(Variance of the asset)=(Cov(Asset,Market))/(Var(Asset))

 Capital Asset Pricing Model (CAPM)
CAPM was developed by W. F. Sharpe. CAPM simplified Markowitz‘s Modern Portfolio theory, made it more practical. Markowitz showed that for a given level of expected return and for a given feasible set of securities, finding the optimal portfolio with the lowest total risk, measured as variance or standard deviation of portfolio returns, requires knowledge of the covariance or correlation between all possible security combinations (see formula 3.3). When forming the diversified portfolios consisting large number of securities investors found the calculation of the portfolio risk using standard deviation technically complicated.

Measuring Risk in CAPM   is based on the identification of   two key components of total risk (as measured by variance or standard deviation of return):
 Systematic risk
 Unsystematic risk

Systematic risk is that associated with the market (purchasing power risk, interest rate risk, liquidity risk, etc.)
Unsystematic risk is unique to an individual asset (business risk, financial risk, other risks, related to investment into the particular asset) while unsystematic risk can be mitigated through diversification by holding many different assets in the portfolio, systematic risk cannot be avoided through diversification.
In CAPM, investors are compensated for taking only systematic risk. Though, CAPM only links investments via the market as a whole. The CAPM predicts what an expected rate of return for the investor should be, given other statistics about the expected rate of return in the market and market risk (systematic risk):

E(r j) =  Rf  + β(j) * ( E(rM) - Rf) 

E(r j)  -  expected return on stock j; 
Rf       -  risk free rate of return;
E(rM) -  expected rate of return on the market
β(j)    -    coefficient Beta, measuring undiversified risk of security j.


 Portfolio Beta 
It can be used as an indication of the amount of market risk that the portfolio had during the time interval. It can be compared directly with the betas of other portfolios. One cannot compare the ex post or the expected and the expected return of two portfolios without adjusting for risk. To adjust the return for risk before comparison of performance risk adjusted measures of performance can be used:
 Sharpe’s ratio;
 Treynor’s ratio;
 Jensen’s Alpha.

Sharpe’s ratio shows an excess a return over risk free rate, or risk premium, by unit of total risk, measured by standard deviation:

Sharpe’s ratio =  (rp– rf)
σp
Here:    
rp  -  the average return for portfolio p during some period of time;
rf  -  the average risk-free rate of return during the period; 
σp  - standard deviation of returns for portfolio p during the period.

Treynor’s ratio shows an excess actual return over risk free rate, or risk premium, by unit of systematic risk, measured by Beta:

Treynor’s ratio =  (rp –rf)
βp
Here:   βp – Beta, measure of systematic risk for the portfolio p.

Jensen‘s Alpha shows excess actual return over required return and excess of actual risk premium over required risk premium. This measure of the portfolio manager’s performance is based on the CAPM.

Jensen’s Alpha =  rp – {rf  + βp (rm – rf)}

Here:  rm   - the average return on the market in period t; 
(rm – rf)  - The market risk premium during period t.

It is important to note, that if a portfolio is completely diversified, all of these measures (Sharpe, Treynor’s ratios and Jensen’s Alfa) will agree on the ranking of the portfolios. The reason for this is that with the complete diversification, total variance is equal to systematic variance. When portfolios are not completely diversified, the Treynor’s and Jensen’s measures can rank relatively undiversified portfolios much higher than the Sharpe measure does. Since the Sharpe ratio uses total risk, both systematic and unsystematic components are included.

************************************************************************************