Showing posts with label CAIIB IT Elective. Show all posts
Showing posts with label CAIIB IT Elective. Show all posts

Sunday, 22 March 2020

New All IIBF Certifications PDFs in single link 2020-2021

All IIBF Certification PDFs in single link 2020-2021

Read corresponding  IIBF books .. Macmillan / Taxmann.

These all materials are extra information to get knowledge.

All the best


Face book:

https://www.facebook.com/groups/543054539662893/

Certified credit officer/Professionals 2020

https://drive.google.com/file/d/1lUW00Y-qnVzH9R9QB4ZjGqeShYDATS-e/view?usp=sharing

CAIIB ABM 2020

https://drive.google.com/file/d/10AkzgCtLyYexdKulaYY3B1ljHRJPGuLu/view?usp=sharing


MSME 2020

https://drive.google.com/file/d/1m1qF2hh9D0hpVvFTlNCR2rvpYAiEQTD8/view?usp=sharing


KYC AML:2020

https://drive.google.com/file/d/1T__7x42LV1HaG9YBQuMkAIPvS9GAHeL8/view?usp=sharing


BCSBI:2020

https://drive.google.com/file/d/1lSOKtV5OrThXmCwiB4TGVyOjZVVtjThd/view?usp=sharing


CAIIB IT:2020

https://drive.google.com/file/d/1t7Ein_FE5YMruvDQPOG4Z3Z-TE-Xmp_1/view?usp=sharing


Certified Treasury Professionals:2020
https://drive.google.com/file/d/1lVvYYtYC797vn1DKuSAsCxJhkv3E1JxK/view?usp=sharing


Digital banking 2020
https://drive.google.com/file/d/1lckjesn0gs0kiOZID1aBubb4tiHvbzPE/view?usp=sharing


Forex Individual 2020

https://drive.google.com/file/d/1lf3o8SRqy2_aRJulq9qf2q0krHmFlKok/view?usp=sharing


Forex Operations 2020
https://drive.google.com/file/d/1lnPrVdXPVsc3sve8OwsjE87OEgsxsAVb/view?usp=sharing



Cyber Crime and fraud management 2020

https://drive.google.com/file/d/1m2y5bwuUa1vKkBjx5DjwH17dNf8BP-xu/view?usp=sharing


Information System for Bankers 2020
https://drive.google.com/file/d/1lt0r7cRzJHTmBXsmF9xvEYFzaaxHCxTI/view?usp=sharing


International Trade Finance  2020
https://drive.google.com/file/d/1lxS3FGgdzI5Q-rJFPufnVUSA69TpVjT3/view?usp=sharing


IT SECURITY 2020
https://drive.google.com/file/d/1ly9nfxTpucTPKB6kuV-mIod4pTc97ceg/view?usp=sharing


Micro finance 2020

https://drive.google.com/file/d/1lzMSuWctOJUrKnNP_FfRlQL9ngs1U6aS/view?usp=sharing

Risk In financial services 2020
https://drive.google.com/file/d/1m7eITlMDdKTnc1FU1sSIKJtP8IcrZrG1/view?usp=sharing


Certified Audit  Professionals:
https://drive.google.com/file/d/1m8aQcdD4qr7R4QzUEgiN1Paw_rWhKWsm/view?usp=sharing

https://drive.google.com/file/d/1zoloZKNR2-UsBGIf0gw1ErhD0F2Y9mHW/view?usp=sharing



Telegram:

https://t.me/joinchat/KP68xFdZGztM7iDAuS4ueg














Sunday, 28 April 2019

All IIBF Certifications PDFs in single link Updated on April 2019

All IIBF Certifications PDFs in single link

Read corresponding  IIBF book 1st Macmillan / Taxmann.

These all materials are extra information to get knowledge.

All the best

Certified credit officer/Professionals
https://drive.google.com/file/d/1UuxDdXjdmPYiMa05SPgXQe1ZjuQ4e8bh/view?usp=sharing

MSME
https://drive.google.com/file/d/10zBkmliUC7170ZzgceaslAHeGXQd1-vF/view?usp=sharing

KYC AML:
https://drive.google.com/file/d/10mB6kpvV3CZ7UhUvXKnbFs2z_KUJu2IT/view?usp=sharing

BCSBI
https://drive.google.com/file/d/1Bdlk9P7in93ua_xusXgtwj0-USU3ALRV/view?usp=sharing

CAIIB ABM
https://drive.google.com/file/d/1NXM9K5pNJps-euhZR0TbV6Zz87zFK8gA/view?usp=sharing

CAIIB IT
https://drive.google.com/file/d/1Pj5vev_yk78BvAM6PTr-2wiRRXUDeiXH/view?usp=sharing

Certified Treasury Professionals:
https://drive.google.com/file/d/1Ojzmwijq9oqLoWWba0uWhzMzZwYdlYws/view?usp=sharing

Digital banking
https://drive.google.com/file/d/1EYj0XBI3-7_P9zq24WgPSFNkU6uJsEDz/view?usp=sharing

Forex Individual
https://drive.google.com/file/d/1jiyi1IiOI1W0r9u1aIFw0RH1U3jAOxNE/view?usp=sharing

Forex Operations
https://drive.google.com/file/d/1-ToWV33bJ4mKv20nNkQoLNw7z8bHwpuU/view?usp=sharing

Cyber Crime and fraud management
https://drive.google.com/file/d/16pwzqhxEBDYGq1SgUlXExhYXmWzCujmm/view?usp=sharing

Information System for Bankers
https://drive.google.com/file/d/1Xs8ywGhueRM4RToIRehfB5Od3YC0m7yM/view?usp=sharing

International Trade Finance
https://drive.google.com/file/d/11yfB3mpE51VPViNvOGcbDVIA3_i8r4wq/view?usp=sharing

IT SECURITY
https://drive.google.com/file/d/1plGml38MO1MBebPdTpC5pGEvh7rdqDfe/view?usp=sharing

Microfinace
https://drive.google.com/file/d/1mo-Pz-zoylEUKG21eKhRFJMcrbwv3RNb/view?usp=sharing

Risk In financial services
https://drive.google.com/file/d/1TdRYKQ34PGLtcnmnF83brpVHp2kEHUT9/view?usp=sharing

Certified Audit  Professionals:

https://drive.google.com/file/d/1gzaqFOz97-yNdL-COsYUkka0MTTaB9xF/view?usp=sharing








Sunday, 16 December 2018

CAIIB IT Recollected todays exam

CAIIB IT Recollected

Questions asked in Morning Shift:
1. SDLC phase and definition
2. Normalization definition
3. Threats and attacks in network.
4.Routers/Switch/Firewall
5. Honey Pot
6. Biometrics.
7. Disaster avoidance.
8. Phases of CMM.
9. SQL query commands.
10. DDL/DML
11. NEFT/RTGS/FEDWIRE
12.SLA Negotiation
13. Purging of data.
14. Artificial Intelligence
15. Spamming/Eavesdropping/Phishing
16.Digital Signature
17. IDEA encryption
18. RAID
19.Generalized Audit Software
20. Virtual Classroom concept
21. Web SAFARI
22. Strategic Information
23. Fibre Optic cables.
24. Blooms Taxonomy
25. OLAP
26.Deferred Payment System
27.SFMS
28. Floor Limit ??
29. Software Escrow Management?
30. Types of cards?
31. Call Centre Benchmarks?
32. Hash Function used in Digital Signature?
33. SCORM benifit?
34. Characteristics of BHIM ?
35. Rupay Cards used in ?

Friday, 24 August 2018

Gist of Important FEDAI Rules

Gist of Important FEDAI Rules
Rule 1: Hours of Business
1.1 The exchange trading hours for Inter-bank forex market in India would be from
9.00 a.m. to 5.00 p.m. No customer transaction should be undertaken by the
Authorised Dealers after 4.30 p.m. on any working day. 1.2 Cut-off time limit of 05.00 p.m. is not applicable for cross- currency transactions.
In terms of paragraph 7.1 of Internal Control Guidelines over Foreign Exchange
Business of Reserve Bank of India (February 2011), Authorised Dealers are
permitted to undertake cross-currency transactions during extended hours, provided
the Managements lay down the extended dealing hours. 1.3 For the purpose of Foreign Exchange business, Saturday will not be treated as
a working day. 1.4 “Known holiday” is one which is known at least 4 working days before the date. A holiday that is not a “known holiday” is defined as a “suddenly declared holiday”. Rule 2: Export Transactions
2.1. Post-shipment Credit in Rupees
(c) Application of exchange rate: Foreign Currency bills will be
purchased/discounted/ negotiated at the Authorised Dealer’s current bill buying rate
or contracted rate. Interest for the normal transit period and/or usance period shall
be recovered upfront simultaneously. (d) Crystallization and Recovery:
(ii) Authorized Dealers should formulate own policy for crystallization of foreign
currency liability into rupee liability, in case of non-payment of bills on the due
date. (iii) The policy in this regard should be transparently available to the customers. (iv) For crystallization into Rupee liability, the Authorised Dealer shall apply its TT
selling rate of exchange. The amount recoverable, thereafter, shall be the
crystallized Rupee amount along with interest and charges, if any.

(v) Interest shall be recovered on the date of crystallization for the overdue period
at the appropriate rate; and thereafter till the date of recovery of the
crystallized amount. (vi) Export bills payable in countries with externalization issues shall also be
crystallized as per the policy of the authorised dealer, notwithstanding receipt
of advice of payment in local currency. (d) Realization of Bills after crystallization: After receipt of advice of realization,
the authorised dealer will apply TT buying rate or contracted rate (if any) to convert
foreign currency proceeds. (e) Dishonor of bills: In case of dishonor of a bill before crystallization, the bank
shall recover:
(ii) Rupee equivalent amount of the bill and foreign currency charges at TT selling rate. (iii) Appropriate interest and rupee denominated charges. 2.2. Application of Interest
(c) Rate of interest applicable to all export transactions shall be as per the
guidelines of Reserve Bank of India from time to time. (d) Overdue interest shall be recovered from the customer, if payment is not
received within normal transit period in case of demand bills and on/or before
notional due date/actual due date in case of usance bills, as per RBI directive. (e) Early Realization: In case of early realization, interest for the unexpired period
shall be refunded to the customer. The bank shall also pay or recover notional swap
cost as in the case of early delivery under a forward contract. 2.3. Normal Transit Period:
Concepts of normal transit period and notional due date are linked to concessional
interest rate on export bills. Normal transit period comprises the average period
normally reckoned from the date of negotiation/purchase/discount till the receipt of
bill proceeds.
It is not to be confused with the time taken for the arrival of the goods at the destination. Normal transit period for different categories of export business are laid down as below:
(c) Fixed Due Date: In the case of export usance bills, where due dates are fixed, or are reckoned from date of shipment or date of bill of exchange etc, the actual due
date is known. Therefore, in such cases, normal transit period is not applicable. (d) Bills in Foreign Currencies – 25 days
(e) Exports to Iraq under United Nations Guidelines – Max. 120 days
(g) Bills drawn in Rupees under Letters of Credit (L/C)
(i) Reimbursement provided at centre of negotiation - 3 days
(ii) Reimbursement provided in India at centre different from centre of
negotiation - 7 days
(iii) Reimbursement provided by banks outside India - 20 days
(iv) Exports to Russia under L/C where reimbursement is provided by RBI - 20 days. (h) Bills in Rupees not under Letter of Credit - 20 days
(i) TT reimbursement under Letters of Credit (L/C)
(i) Where L/C provides for reimbursement by electronic means - 5 days
(ii) Where L/C provides reimbursement claim after certain number of days
from the date of negotiation - 5 days + this additional period. 2.4. Substitution/Change in Tenor:
(o) In case of change in the usance of a bill, interest on post-shipment credit shall
be charged to the customer, as per RBI guidelines. In addition, the bank shall
charge or pay notional swap difference. Interest on outlay of funds for such
swaps shall also be recovered from the customer at rate not below base rate
of the bank concerned. (p) It is optional for banks to accept delivery of bills under a contract made for
purchase of a clean TT. In such cases, the bank shall recover/pay notional
swap difference for the relative cover. Interest at the rate not below base rate
of the bank would be charged on the outlay of funds. 2.5. Export Bills sent for collection:
(a) Application of exchange rates: The conversion of foreign currency proceeds of
export bills sent for collection or of goods sent on consignment basis shall be
done at prevailing TT buying rate or the forward contract rate, as the case
may be. The conversion to Rupee equivalent shall be made only after the
foreign currency amount is credited to the nostro account of the bank. (b) On receipt of credit advice/statement of nostro account and compliances of
guidelines, requirements of the Bank and FEMA, the Bank shall transfer funds
for the credit of exporter’s account within two working days. (c) If the above stipulated time limit is not observed, the Bank shall pay
compensation for the delayed period at the minimum interest rate charged on
export credit. Compensation for adverse movement of exchange rate, if any, shall also be paid as per the compensation policy of the bank.

Rule 3: Import Transactions
3.1 Application of exchange rate:
(a) Retirement of import bills - Exchange rate as per forward sale contract, if
forward contract is in place. Prevailing Bills selling rate, in case there is no
forward contract. (b) Crystallization of Import - same as above bill (vide para 3.3 below)
(c) For determination of stamp - As per exchange rate provided by the duty on
import bills authority concerned. 3.2. Application of Interest:
(a) Bills negotiated under import letters of credit shall carry commercial rate of
interest as applicable to banks’ domestic advances from time to time. (b) Interest remittable on interest bearing bills shall be subject to the directive of
Reserve Bank of India in this regard. 3.3. Crystallization of Import Bill under Letters of Credit. Unpaid foreign currency import bills drawn under letters of credit shall be
crystallized as per the stated policy of the bank in this respect. Rule 4 Clean Instruments:
4.1. Outward Remittance: Outward remittance shall be effected at TT selling rate of
the bank ruling on that date or at the forward contract rate. 4.2. Encashment of foreign currency notes and instruments, Foreign currency
travelers’ cheques, currency notes, foreign currency in prepaid card, debit/credit
card will be encashed at Authorised Dealer’s option at the appropriate buying rate
ruling on the date of encashment. 4. 3. Payment of foreign inward remittance, Foreign currency remittance up to an
equivalent of USD 10,000/- shall be immediately converted into Indian Rupees. Remittance in excess of equivalent of USD 10,000 shall be executed in foreign
currency. The beneficiary has the option of presenting the related instrument for
payment to the executing bank within the period prescribed under FEMA. 4.4. The applicable exchange rate for conversion of the foreign currency inward
remittance shall be TT buying rate or the contracted rate as the case may be. 4.5. Compensation for delayed payment: Authorised Dealers shall pay or send
intimation, as the case may be, to the beneficiary in two working days from the date
of receipt of credit advice / nostro statement. In case of delay, the bank shall pay
the beneficiary interest @ 2 % over its savings bank interest rate. The bank shall
also pay compensation for adverse movement of exchange rate, if any, as per its
compensation policy

Rule 5 Foreign Exchange Contracts:
5.1. Contract amounts: Exchange contracts shall be for definite amounts and
periods. When a bill contract mentions more than one rate for bills of different
deliveries, the contract must state the amount and delivery against each such rate. 5.2. Option period of delivery: Unless the date of delivery is fixed and indicated in
the contract, the option period may be specified at the discretion of the customer
subject to the condition that such option period of delivery shall not extend beyond
one month. If the fixed date of delivery or the last date of delivery option is a known
holiday, the last date for delivery shall be the preceding working day. In case of
suddenly declared holidays, the contract shall be deliverable on the next working
day. Contracts permitting option of delivery must state the first and last dates of
delivery. For Example: 18th January to 17th February, 31st January to 29th Feb. 2012. “Ready” or “Cash” merchant contract shall be deliverable on the same day. “Value next day” contract shall be deliverable on the working day immediately
succeeding the contract date. A spot contract shall be deliverable on second
succeeding working day following the contract date. A forward contract is a contract
deliverable at a future date, duration of the contract being computed from spot value
date at the time of transaction”. 5. 3. Place of delivery: All contracts shall be understood to read “to be delivered or
paid for at the Bank” and “at the named place”. 5.4. Date of delivery: Date of delivery under forward contracts shall be:
(i) In case of bills/documents negotiated, purchased or discounted - the date of
negotiation/purchase/ discount and payment of Rupees to the customer. However, in case the documents are submitted earlier than, or later than the
original delivery date, or for a different usance, the bank may treat it as proper
delivery, provided there is no change in the expected date of realization of
foreign currency calculated at the time of booking of the contract. No early
realization or late delivery charges shall be recovered in such cases. (ii) In case of export bills/documents sent for collection - Date of payment of
Rupees to the customer on realization of the bills. (iii) In case of retirement/crystallization of import bills/documents - the date of
retirement/ crystallization of liability, whichever is earlier?
5.5. Option of delivery: In all forward merchant contracts, the merchant, whether a
buyer or a seller will have the option of delivery. 5.6. Option of usance: The merchant purchase contract should state the tenor of
the bills/documents. Acceptance of delivery of bills/documents drawn for a different
tenor will be at the discretion of the bank

5.7. Merchant quotations: The exchange rate shall be quoted in direct terms i.e. so many Rupees and Paise for 1 unit or 100 units of foreign currency. 5.8. Rounding off: Rupee equivalent of the foreign currency Settlement of all
merchant transactions shall be effected on the principle of rounding off the Rupee
amounts to the nearest whole Rupee i.e. without paise. RULE 6 Early Delivery, Extension and Cancellation of Foreign Exchange
Contracts
6.1. General
(i) At the request of a customer, unless stated to the contrary in the provisions of
FEMA, 1999, it is optional for a bank to: (a). Accept or give early delivery; or
(b). Extend the contract. (ii) It is the responsibility of a customer to effect delivery or request the bank for
extension / cancellation as the case may be, on or before the maturity date of
the contract. 6.2. Early delivery: If a bank accepts or gives early delivery, the bank shall
recover/pay swap difference, if any. 6.3. Extension: Foreign exchange contracts where extension is sought by the
customers shall be cancelled (at an appropriate selling or buying rate as on the date
of cancellation) and rebooked simultaneously only at the current rate of exchange. The difference between the contracted rate, and the rate at which the contract is
cancelled, shall be recovered from/paid to the customer at the time of extension. Such request for extension shall be made on or before the maturity date of the
contract. 6.4. Cancellation
(i) In case of cancellation of a contract at the request of a customer, (the request
shall be made on or before the maturity date) the Authorised Dealer shall
recover/ pay, as the case may be, the difference between the contracted rate
and the rate at which the cancellation is effected. The recovery/payment of
exchange difference on cancellation of forward contracts before the maturity
date may be either upfront or back-ended at the discretion of banks. (ii) Rate at which cancellation is to be effected:
(a) Purchase contracts shall be cancelled at T.T. selling rate of the
contracting Authorised Dealer
(b) Sale contracts shall be cancelled at T.T. buying rate of the contracting
Authorised Dealer

(c) Where the contract is cancelled before maturity, the appropriate forward
T.T. rate shall be applied. (bi) Notwithstanding the fact that the exchange contract between the customer
and the bank becomes impossible of performance, for whatever reason,
including Government prohibitory orders, the exchange contract shall not be
deemed to have become void and the customer shall forthwith apply to the
Authorised Dealer for cancellation, as per the provisions of paragraph 6.4.(i)
and (ii) above. (iv)
(d) In the absence of any instructions from the customer, vide para 6.1(ii), a
contract which has matured shall be cancelled by the bank on the 7th working
day after the maturity date. (e) Swap cost, if any, shall be recovered from the customer under advice to him. © When a contract is cancelled after the maturity date, the customer shall not be entitled
to the exchange difference, if any, in his favour, since the contract is cancelled on
account of his default. He shall, however, be liable to pay the exchange difference
against him. 6.5. Swap cost/gain:
(ii) In all cases of early delivery of a contract, swap cost shall be recovered from
the customer, irrespective of whether an actual swap is made or not. Such
recoveries should be made either back-ended or upfront at discretion of the
bank. (iii) Payment of swap gain to a customer shall be made at the end of the swap period. 6.6. Outlay and Inflow of funds:
Authorised Dealer shall recover interest on outlay of funds for the purpose of
arranging the swap, in addition to the swap cost in case of early delivery of a
contract.
If such a swap leads to inflow of funds, interest shall be paid to the customer. Funds
outlay / inflow shall be arrived at by taking the difference between the original
contract rate and the rate at which the swap could be arranged. The rate of interest
to be recovered / paid should be determined by banks as per their policy in this
regard.

Loans to NRIs

Loans to NRIs NRI can avail the following loans:
1. Rupee Loans in India
- Up to up to any limit subject to prescribed margin. - For personal purpose, contribution to Capital in Indian
Companies or for acquisition of property. - Repayment of loan will be either from inward remittances or
from local resources through NRO accounts. 2. Foreign Currency Loans in India
- Against security of funds in FCNR-B deposits. - Maturity of loan should not exceed due date of deposits. - Repayment from Fresh remittances or from maturity proceeds of
deposits. 3. Loans to 3
rd Parties provided
- There is no direct or indirect consideration for NRE depositor
agreeing to pledge his FD. - Margin, rate of Interest and Purpose of loan shall be as per RBI
guidelines. - The loan will be utilized for personal purpose or business
purpose and not for re-lending or carrying out
Agriculture/Plantation/Real estate activities. - Loan documents will be executed personally by the depositor
and Power of attorney is not allowed. 4. Housing Loans to NRIs : HL can be sanctioned to NRIs subject to
following conditions: - Quantum of loan, Margin and period of Repayment shall be
same as applicable to Indian resident. - The loan shall not be credited to NRE/FCNR account of the
customer. - EM of IP is must and lien on assets. - Repayment from remittance abroad or by debit to NRE/FCNR
account or from rental income derived from property.

Friday, 22 June 2018

CAIIB IT ELECTIVE MCQs


Srinivas Kante:: Kindly utilize  the materials properly .After collecting materials  practice it.
Download materials here: :



Use Facebook for live discussions

Feedback : srinivaskante4u@gmail.com

Saturday, 16 June 2018

CAIIB IT very important over view for exam


Caiib IT elective

Module A

1. With Information Technology we cannot achieve
a) Workforce flexibility
b) Distributed the wealth equally
c) Globalization
d) Reduce financial frauds

2. Meaning and impact of globalization

3. Generation of computers
 First Generation: High speed vacuum tube
Very small memory
Development of stored program

 Second generation: Germanium transistors
more reliable and faster
Much cheaper  than tubes
Magnetic core storage and magnetic disk storage

 Third Generation: Silicon transistors
Integrated Circuits (ICs)
Switching speed and reliability increased
Semi-conductor Memory

 Fourth generation: Microprocessor chip
VLSI (Very Large Scale Integrated Circuits)
Computer networks and distributed computer systems
Highly portable and smaller in size due to improvements in speed, memory size, packing density of ICs

 Fifth generation: ULSI (Ultra Large Scale Integrated) chips
Artificial Intelligence

4. COBOL (Common Business Oriented Language) mainly used for business data processing (impt.)
5. FORTRAN used for scientific and engineering calculations (impt.)
6. Function of ALU ………… page 14-15
7. CPU consists of ….. page 14
8. Batch processing   ….  Page 18
9. Function of OLTP (On-Line Transaction Processing)…… page 20
10. Meaning of Grid computing, Real time system, cluster computing, cloud computing
11. Virtualizations of server’s means to run multiple operating systems on same physical servers.
12. Category of software with examples …. Page 35 36 (You will get 2 questions from this section)
13. Open Source Software with example
14. System software and application software examples
15. Unit 4: Networking System (You will get maximum questions from this unit, so concentrate on this chapter from module A)
16. Intranet
(i) Uses Internet-derived communication protocols (TCP/IP), networking and user interface.
(ii) Relatively cost efficient

17. In which types of cable composed of two or more copper wirestwisted around each other within a plastic sheath?
a) Coaxial cable
b) Twisted-pair cable
c)  Optical fiber cable
d) None of the above

18. RJ-45 connectors is a type of
a) Coaxial cable
b) Twisted-pair cable
c)  Optical fiber cable
d) None of the above

19. Cable used to where very large amount of data need to be transmitted on a regular basis____?
a) Coaxial cable
b) Twisted-pair cable
c)  Optical fiber cable
d) None of the above
Module  C

Chapter 8

Choose the odd one
a) SCORM
b) IEEE
c) IMS
d) AICC

Choose the correct flows of Instructional Design Process
a) Analyze-Develop-Design-Evaluate-Implement
b) Analyze-Design-Implement-Develop-Evaluate
c) Analyze-Develop-Design-Implement-Evaluate
d) Analyze-Design-Develop-Implement-Evaluate

Bloom’s taxonomy divides educational objectives into
a) 3 domains
b) 4 domains
c) 5 domains
d) 6 domains

A virtual classroom can help to
a) Save voice discussion and presentations.
b) Hold live ad-hoc learning discussions and study sessions.
c) Share the advantages of e-learning with the suppliers and strategic partners.
d) All of the above

Chapter 9

Score Banking System can manage multiple delivery channels through
a) API’s
b) Different servers
c) Different versions of CBS
d) None of the above

Data security includes
a) Transaction access of authorized users
b) Message validation
c) Transaction logging
d) All of the above

Chapter 10

In India, RTGS uses ______ message flow structure.
a) V-shaped
b) L-shaped
c) T-shaped
d) Y shaped

What is the name of the RTGS system that uses in the USA?
a) CHAPS
b) Fedwire
c) SIC
d) ELLIPS

What is the name of the RTGS system that uses in the UK?
a) CHAPS
b) Fedwire
c) SIC
d) ELLIPS

What is the name of the RTGS system that uses in the Belgium?
a) CHAPS
b) Fedwire
c) SIC
d) ELLIPS

Which message flow structure is generally incompatible with the basic principle of RTGS?
a) V-shaped
b) L-shaped
c) T-shaped
d)  Y-shaped

Message flow structure in CHAPS is
a) L-shaped
b) V-shaped
c) T-shaped
d)None of the above

Chapter 11

The cards used while traveling that is on move are ________________ cards.
a) Debit Card
b) Credit Card
c) Magnetic Card
d) Contactless smart Card

Smartcards can hold up to _______________ of information.
a) 4 KB
b) 8 KB
c) 12 KB
d) 16 KB

The following is a re-loadable card
a) Credit Card
b) Smart Card
c) Magnetic Card
d) Debit Card

Chapter 12

CRM is the dimensions of the E-business, what is the use
You need to study this also
ITService Delivery & Support : Service level management practices, Operations management
- work load scheduling, network services management, Preventive maintenance, Systems
performance monitoring process tools, techniques, Functionality of hardware, software, data
base. Drafting of RFP, system specifications, SLAs, Capacity planning & monitoring, Change
management processes / scheduled, emergency in configuration of production systems,
application of patches, releases etc., Incident & problem management practices, System
resiliency tools and techniques - fault tolerance, elimination of single point of failure, clustering.


#CAIIB IT
Instructions and data can be stored in the memory of Computer for automatically directing the flow of operations. It is called _____ concept.
(A) Objective Programming
(B) Stored program
(C) Both (A) and (B)
(D) None of the Above
Answer
(B) Stored program
“Stored Program” concept was developed by ______
(A) Maurice Wilkes
(B) Von Neumann
(C) M.H.A. Newman
(D) None of the Above
Answer
(B) Von Neumann
Electronic Discrete Variable Automatic Computer(EDVAC) was designed on __________ concept.
(A) Objective Programming
(B) Stored program
(C) Both (A) and (B)
(D) None of the Above
Answer
(B) Stored program
Which of the following was a small experimental machine based on Neumann’s stored program concept?
(A) Analytical engine
(B) Pascaline
(C) Manchester Mark I
(D) None of the Above
Answer
Third Generation computers were based on _______
(A) IC
(B) Vacuum tube
(C) transistor
(D) None of the Above
Answer
In EDSAC, an addition operation was completed in _____ micro seconds.
(A) 4000
(B) 3000
(C) 2000
(D) 1500
Answer
(D) 1500
ULSI stands for______
(A) Ultra Large Scale Integration
(B) Ultimate Large Scale Integration
(C) Upper Large Scale Integration
(D) Ultra Large Script Integration
Answer
(A) Ultra Large Scale Integration
Which of the following is fourth generation computer?
(A) INTEL 4004
(B) IBM 360
(C) IBM 1401
(D) None of the Above
Answer
(A) INTEL 4004
IC is made up of _________
(A) microprocessor
(B) vacuum tube
(C) transistor
(D) None of the Above
Answer
(C) transistor
Father of modern computer______
(A) Charles Babbage
(B) Alan Turing
(C) Ted Hoff
(D) None of the Above
Answer
(B) Alan Turing


1-1 Computer Network is
A. Collection of hardware components and computers
B. Interconnected by communication channels
C. Sharing of resources and information
D. All of the Above
1-2 What is a Firewall in Computer Network?
A. The physical boundary of Network
B. An operating System of Computer Network
C. A system designed to prevent unauthorized access
D. A web browsing Software
1-3 How many layers does OSI Reference Model has?
A. 4
B. 5
C. 6
D. 7
1-4 DHCP is the abbreviation of
A. Dynamic Host Control Protocol
B. Dynamic Host Configuration Protocol
C. Dynamic Hyper Control Protocol
D. Dynamic Hyper Configuration Protocol
1-5 IPV4 Address is
A. 8 bit
B. 16 bit
C. 32 bit
D. 64 bit
1-6 DNS is the abbreviation of
A. Dynamic Name System
B. Dynamic Network System
C. Domain Name System
D. Domain Network Service
1-7 What is the meaning of Bandwidth in Network?
A. Transmission capacity of a communication channels
B. Connected Computers in the Network
C. Class of IP used in Network
D. None of Above
1-8 ADSL is the abbreviation of
A. Asymmetric Dual Subscriber Line
B. Asymmetric Digital System Line
C. Asymmetric Dual System Line
D. Asymmetric Digital Subscriber Line
1-9 What is the use of Bridge in Network?
A. to connect LANs
B. to separate LANs
C. to control Network Speed
D. All of the above
1-10 Router operates in which layer of OSI Reference Model?
A. Layer 1 (Physical Layer)
B. Layer 3 (Network Layer)
C. Layer 4 (Transport Layer)
D. Layer 7 (Application Layer)
2
2-1 Each IP packet must contain
A. Only Source address
B. Only Destination address
C. Source and Destination address
D. Source or Destination address
2-2 Bridge works in which layer of the OSI model?
A. Appliation layer
B. Transport layer
C. Network layer
D. Datalink layer
2-3 _______ provides a connection-oriented reliable service for sending messages
A. TCP
B. IP
C. UDP
D. All of the above
2-4 Which layers of the OSI model are host-to-host layers?
A. Transport, Session, Persentation, Application
B. Network, Transport, Session, Presentation
C. Datalink, Network, Transport, Session
D. Physical, Datalink, Network, Transport
2-5 Which of the following IP address class is Multicast
A. Class A
B. Class B
C. Class C
D. Class D
2-6 Which of the following is correct regarding Class B Address of IP address
A. Network bit – 14, Host bit – 16
B. Network bit – 16, Host bit – 14
C. Network bit – 18, Host bit – 16
D. Network bit – 12, Host bit – 14
2-7 The last address of IP address represents
A. Unicast address
B. Network address
C. Broadcast address
D. None of above
2-8 How many bits are there in the Ethernet address?
A. 64 bits
B. 48 bits
C. 32 bits
D. 16 bits
2-9 How many layers are in the TCP/IP model?
A. 4 layers
B. 5 layers
C. 6 layers
D. 7 layers
2-10 Which of the following layer of OSI model also called end-to-end layer?
A. Presentation layer
B. Network layer
C. Session layer
D. Transport layer

3-1. Why IP Protocol is considered as unreliable?
A. A packet may be lost
B. Packets may arrive out of order
C. Duplicate packets may be generated
D. All of the above
3-2. What is the minimum header size of an IP packet?
A. 16 bytes
B. 10 bytes
C. 20 bytes
D. 32 bytes
3-3. Which of following provides reliable communication?
A. TCP
B. IP
C. UDP
D. All of the above
3-4. What is the address size of IPv6 ?
A. 32 bit
B. 64 bit
C. 128 bit
D. 256 bit
3-5. What is the size of Network bits & Host bits of Class A of IP address?
A. Network bits 7, Host bits 24
B. Network bits 8, Host bits 24
C. Network bits 7, Host bits 23
D. Network bits 8, Host bits 23
3-6. What does Router do in a network?
A. Forwards a packet to all outgoing links
B. Forwards a packet to the next free outgoing link
C. Determines on which outing link a packet is to be forwarded
D. Forwards a packet to all outgoing links except the originated link
3-7. The Internet is an example of
A. Cell switched network
B. circuit switched network
C. Packet switched network
D. All of above
3-8. What does protocol defines?
A. Protocol defines what data is communicated.
B. Protocol defines how data is communicated.
C. Protocol defines when data is communicated.
D. All of above
3-9. What is the uses of subnetting?
A. It divides one large network into several smaller ones
B. It divides network into network classes
C. It speeds up the speed of network
D. None of above
3-10. Repeater operates in which layer of the OSI model?
A. Physical layer
B. Data link layer
C. Network layer
D. Transport layer

4-1. What is the benefit of the Networking?
A. File Sharing
B. Easier access to Resources
C. Easier Backups
D. All of the Above
4-2. Which of the following is not the Networking Devices?
A. Gateways
B. Linux
C. Routers
D. Firewalls
4-3. What is the size of MAC Address?
A. 16-bits
B. 32-bits
C. 48-bits
D. 64-bits
4-4. Which of the following can be Software?
A. Routers
B. Firewalls
C. Gateway
D. Modems
4-5. What is the use of Ping command?
A. To test a device on the network is reachable
B. To test a hard disk fault
C. To test a bug in a Application
D. To test a Pinter Quality
4-6. MAC Address is the example of
A. Transport Layer
B. Data Link Layer
C. Application Layer
D. Physical Layer
4-7. Routing tables of a router keeps track of
A. MAC Address Assignments
B. Port Assignments to network devices
C. Distribute IP address to network devices
D. Routes to use for forwarding data to its destination
4-8. Layer-2 Switch is also called
A. Multiport Hub
B. Multiport Switch
C. Multiport Bridge
D. Multiport NIC
4-9. Difference between T568A and T568B is
A. Difference in wire color
B. Difference in number of wires
C. Just different length of wires
D. Just different manufacturer standards
4-10. The meaning of Straight-through Cable is
A. Four wire pairs connect to the same pin on each end
B. The cable Which Directly connects Computer to Computer
C. Four wire pairs not twisted with each other
D. The cable which is not twisted
For 4: 1 – D / 2 – B / 3 – C / 4 – B / 5 – A / 6 – B / 7 – D / 8 – C / 9 – D / 10 – A

5-1 Which of the following is not the External Security Threats?
A. Front-door Threats
B. Back-door Threats
C. Underground Threats
D. Denial of Service (DoS)
5-2 What is the Demilitarized Zone?
A. The area between firewall & connection to an external network
B. The area between ISP to Military area
C. The area surrounded by secured servers
D. The area surrounded by the Military
5-3 What is the full form of RAID ?
A. Redundant Array of Independent Disks
B. Redundant Array of Important Disks
C. Random Access of Independent Disks
D. Random Access of Important Disks
5-4 What is the maximum header size of an IP packet?
A. 32 bytes
B. 64 bytes
C. 30 bytes
D. 60 bytes
5-5 What is the size of Host bits in Class B of IP address?
A. 04
B. 08
C. 16
D. 32
5-6 What is the usable size of Network bits in Class B of IP address?
A. 04
B. 08
C. 14
D. 16
5-7 In which type of RAID, data is mirrored between two disks.
A. RAID 0
B. RAID 1
C. RAID 2
D. RAID 3
5-8 What do you mean by broadcasting in Networking?
A. It means addressing a packet to all machine
B. It means addressing a packet to some machine
C. It means addressing a packet to a particular machine
D. It means addressing a packet to except a particular machine
5-9 Which of the following is/are Protocols of Application?
A. FTP
B. DNS
C. Telnet
D. All of above
5-10 Which of the following protocol is/are defined in Transport layer?
A. FTP
B. TCP
C. UDP
D. B & C

6-1. What is the IP Address range of APIPA?
A. 169.254.0.1 to 169.254.0.254
B. 169.254.0.1 to 169.254.0.255
C. 169.254.0.1 to 169.254.255.254
D. 169.254.0.1 to 169.254.255.255
6-2. Which of the following is correct in VLSM?
A. Can have subnets of different sizes
B. Subnets must be in same size
C. No required of subnet
D. All of above
6-3. What does the port number in a TCP connection specify?
A. It specifies the communication process on the two end systems
B. It specifies the quality of the data & connection
C. It specify the size of data
D. All of the above
6-4. The class-based addressing is also known as
A. Modern Model
B. Classful Model
C. Classless Model
D. Heterogeneous Model
6-5. Which of the following is correct in CIDR?
A. Class A includes Class B network
B. There are only two networks
C. There are high & low class network
D. There is no concept of class A, B, C networks
6-6. What is the size of Source and Destination IP address in IP header?
A. 4 bits
B. 8 bits
C. 16 bits
D. 32 bits
6-7. Which of the following is reliable communication?
A. TCP
B. IP
C. UPD
D. All of them
6-8. What is the typical range of Ephemeral ports?
A. 1 to 80
B. 1 to 1024
C. 80 to 8080
D. 1024 to 65535
6-9. What is the purpose of the PSH flag in the TCP header?
A. Typically used to indicate end of message
B. Typically used to indicate beginning of message
C. Typically used to push the message
D. Typically used to indicate stop the message
6-10. What is the natural mask for a class C Network?
A. 255.255.255.1
B. 255.255.255.0
C. 255.255.255.254
D. 255.255.255.255


……………



Regression testing is a major part of which of the life cycle?
a) Waterfall model
b) V model
c) Iterative model…..
d) All of the above


Friday, 15 June 2018

INFORMATION TECHNOLOGY

INFORMATIONTECHANOLOGY)

1.Aspecialtypegatewaythatcankeepexternalusersfromaccessing resourcesontheLANusersaccesstheexternalinfoiscaled: A.Repeater

B.Firewal

C.Encryption

D.Hub

2.Whatisthenamegiventotheexchangeofcontrolsignalswhichis necessaryforestablishingaconnectionbetweenamodemanda computeratoneendofalineandanothermodemandcomputeratthe otherend?

A.Handshaking

B.Modemoptions

C.Protocol

D.Alofthese

3.InSQL,whichcommandisusedtochangesdatainadatatable?

A.UPDATE

B.INSERT

C.BROWSE

D.APPEND

4.InSQL,whichofthefolowingisnotadatadefinitionlanguage command?

A.RENAME

B.REVOKE

C.GRANT

D.UPDATE

5.Whichcommand(s)is(are)usedtoredefineacolumnofthetablein SQL?

A.ALTERTABLE

B.DEFINETABLE

C.MODIFYTABLE

D.ALLofthethese

6.Inarelationalschema,eachtupleisdividedintofieldscaled A.Relations

B.Domains

C.Queries

D.Alofthethese






7.Anindexingoperation

A.Sortsafileusingasinglekey

B.Sortsfileusingtwokeys


C.Establishesanindexforafile

D.Both(1)and(3)

8.Datasecuritythreatsinclude

A.Hardwarefailure

B.Privacyinvasion

C.Fraudulentmanipulationofdata

D.Alofthese

9.Thelanguageusedinapplicationprogramstorequestdatafromthe DBMSisreferedtoasthe

A.DML

B.DDL

C.Querylanguage

D.DCL

10.A___containsthesmalestunitofmeaningfuldata,soyoumightcalit thebasicbuildingblockforadatafile.

A.Filestructures

B.Records

C.Fields

D.Database

IT

Analogue: The use of a system in which the data is of a continuously variable physical quantity such as voltage
or angular position. It is a signal that is continuously variable over its full range of values e.g. the signal of the
sound wave or the electric output of a telephone microphone is an analogue voltage signal.
Analogue Computer: A device that operate on date in the form of continuously variable physical quantities.
ANSI: American National Standards Institute.
Address Bus - An electronic pathway that carries data between the computers CPU and its memory.
Authentication - Means of ensuring that a message or instruction in an EFT context is from an authorised
source. Usually carried out with PIN.
Access Control Systems - Equipment or software designed to restrict access to equipment, data, software, or
system functions to authorized persons.
Batch Processing: A technique in which a number of similar items or transactions are processed in groups or
batches during a machine run.
Binary: A number system using base 2 and the numbers 0 and 1.
Bit — Binary digit - An individual piece of data either a 0 or 1.
Byte: A group of 8 bits to represent a character; the amount of memory required to store a single character, a
unit of data capable of storing 256 unique values.
Bar Code reader - An input device used to read bar codes, translate them into numbers, and input the
numbers often used In retail stores and assembly line productions.
Baud rate - A measure of modulation rate used In serial communications, the number of discrete signaling
events per second e.g. 2400 bits per second.
CBT: Computer Based Training - An interactive educational tool in which the computer usually explains the
subject with the help of text, pictures, animations and audio-visual features.
Centra! Processing Unit CPU - The processing component generally referred to as a chip located on the
motherboard that interprets and executes program instructions and communicates with input, output and
storage devices.
Control unit - One of the two basic parts (together with the ALU) of the CPU; contains instructions for carrying
out different activities of the computer.
CASE - An acronym for Computer Aided software Engineering, a collection of software tools that automate or
support the process or designing and programming software systems.
C++ _ An object oriented programming language-developed by AT & T Bell labs in 1980s.
Channel - It consists of controller card, interface cable and power supply.
Computer Network - A network of interconnected computer systems that allows data to be transformed
between them.
Compartmentaiisation - Rigid and well defined boundaries between different organs/offices of banks
providing hindrance to information flow amongst themselves.
Data: Facts, numbers, letters or symbols that become usable information when processed. Facts coded and
structured for subsequent processing, generally using a computer system.
Database - A non-redundant collection of inter-related data items processable by one or more applications.
Non-redundant means that individual data elements appear only once or less frequently than in normal files.
Data Communication - Data transfer between a source and a data destination via one or more data links.
Data processing: It is a method concerning with the systematic recording, arranging, filing, processing and
dissemination of facts of business, generally done by computers in today's organizations.
Data Transmission - The movement of data from one location of storage to another. If the locations are
geographically far away, generally done via satellites.
Digital — An electronic signal that is defined in terms of a signal set of discrete and discontinuous value, and
whose various states are at discrete internal part.
Digital Signal - A signal that a computer sends; made up of Os and Is and transmitted by telephone line.
Digital Computer: A device that manipulates discrete data and performs arithmetic and logic operations on
these data.
Demodulation - The process of converting an electric computer signal that has traversed a telephone line
back into sound or other data.
Desk Top Model - A PC designed to sit on a desk.
Digital Audio Tape Drive (DAT) - A tape drive that typically has two write heads and that has a very high
storage capacity.
DBMS - An acronym for the database management system. A program that maintains and controls the access
to collection of related information in electronic files.
Disk mirroring - The data is written on two or more hard disks simultaneous over the same channel.
Disk duplexing - The data Is written on two or more hard disks simultaneously over the different channel.
Dumb terminals - Hardware configuration consisting of a key board and monitor that is capable of sending
and receiving Information, but has no memory or processing capabilities.
ENIAC: Electronic Numeric Integrator and Calculator, the first electronic computing device designed by the US
army with Moore School of Electrical Engineering.
Electronic Fund Transfer (EFT) - The electronic systems that transfer money and record data relating to
these transfers. Funds transfers effected through the banking systems by electronic techniques with input and
output methods largely or completely being in electronic form.

Analogue: The use of a system in which the data is of a continuously variable physical quantity such as voltage
or angular position. It is a signal that is continuously variable over its full range of values e.g. the signal of the
sound wave or the electric output of a telephone microphone is an analogue voltage signal.
Analogue Computer: A device that operate on date in the form of continuously variable physical quantities.
ANSI: American National Standards Institute.
Address Bus - An electronic pathway that carries data between the computers CPU and its memory.
Authentication - Means of ensuring that a message or instruction in an EFT context is from an authorised
source. Usually carried out with PIN.
Access Control Systems - Equipment or software designed to restrict access to equipment, data, software, or
system functions to authorized persons.
Batch Processing: A technique in which a number of similar items or transactions are processed in groups or
batches during a machine run.
Binary: A number system using base 2 and the numbers 0 and 1.
Bit — Binary digit - An individual piece of data either a 0 or 1.
Byte: A group of 8 bits to represent a character; the amount of memory required to store a single character, a
unit of data capable of storing 256 unique values.
Bar Code reader - An input device used to read bar codes, translate them into numbers, and input the
numbers often used In retail stores and assembly line productions.
Baud rate - A measure of modulation rate used In serial communications, the number of discrete signaling
events per second e.g. 2400 bits per second.
CBT: Computer Based Training - An interactive educational tool in which the computer usually explains the
subject with the help of text, pictures, animations and audio-visual features.
Centra! Processing Unit CPU - The processing component generally referred to as a chip located on the
motherboard that interprets and executes program instructions and communicates with input, output and
storage devices.
Control unit - One of the two basic parts (together with the ALU) of the CPU; contains instructions for carrying
out different activities of the computer.
CASE - An acronym for Computer Aided software Engineering, a collection of software tools that automate or
support the process or designing and programming software systems.
C++ _ An object oriented programming language-developed by AT & T Bell labs in 1980s.
Channel - It consists of controller card, interface cable and power supply.
Computer Network - A network of interconnected computer systems that allows data to be transformed
between them.
Compartmentaiisation - Rigid and well defined boundaries between different organs/offices of banks
providing hindrance to information flow amongst themselves.
Data: Facts, numbers, letters or symbols that become usable information when processed. Facts coded and
structured for subsequent processing, generally using a computer system.
Database - A non-redundant collection of inter-related data items processable by one or more applications.
Non-redundant means that individual data elements appear only once or less frequently than in normal files.
Data Communication - Data transfer between a source and a data destination via one or more data links.
Data processing: It is a method concerning with the systematic recording, arranging, filing, processing and
dissemination of facts of business, generally done by computers in today's organizations.
Data Transmission - The movement of data from one location of storage to another. If the locations are
geographically far away, generally done via satellites.
Digital — An electronic signal that is defined in terms of a signal set of discrete and discontinuous value, and
whose various states are at discrete internal part.
Digital Signal - A signal that a computer sends; made up of Os and Is and transmitted by telephone line.
Digital Computer: A device that manipulates discrete data and performs arithmetic and logic operations on
these data.
Demodulation - The process of converting an electric computer signal that has traversed a telephone line
back into sound or other data.
Desk Top Model - A PC designed to sit on a desk.
Digital Audio Tape Drive (DAT) - A tape drive that typically has two write heads and that has a very high
storage capacity.
DBMS - An acronym for the database management system. A program that maintains and controls the access
to collection of related information in electronic files.
Disk mirroring - The data is written on two or more hard disks simultaneous over the same channel.
Disk duplexing - The data Is written on two or more hard disks simultaneously over the different channel.
Dumb terminals - Hardware configuration consisting of a key board and monitor that is capable of sending
and receiving Information, but has no memory or processing capabilities.
ENIAC: Electronic Numeric Integrator and Calculator, the first electronic computing device designed by the US
army with Moore School of Electrical Engineering.
Electronic Fund Transfer (EFT) - The electronic systems that transfer money and record data relating to
these transfers. Funds transfers effected through the banking systems by electronic techniques with input and
output methods largely or completely being in electronic form.

Online: A term describing persons, equipment or devices that are in direct communication with the central
processing unit of a computer. Facility providing immediate access to computer files for data entry or enquiry
purposes.
Optical Storage - The main alternative to magnetic storage, uses a laser beam to read, write or transfer data
to the appropriate medium.
Output - Information generated through the processing of input data.
OfMlne ATMs - The ATMs which are not connected to the bank's host computer.
Organizational Decay - Downtrend in the growth.
Program: A set of instructions which a computer can understand and which has been ordered in a logical
sequence of steps to complete a particular task.
Programming Language: A precise notation with precisely defined grammar (syntax) and semantic rules to
express algorithm.
Packet Switched Network - A network designed to carry data in the form of packets. The packet and its
format is internal to the network.
Packet assembler/dissembler (PAD) - A protocol conversion device that permits end user devices, e.g.
terminals to access a packet switched network. It is a unit to which one can connect many places. This PAD is
connected to the Switching Device.
Payment Order - An unconditional instruction issued by an originator in writing or transmitted electronically to
a sending bank to effect a funds transfer of a certain sum of money to the designated account of a designated
beneficiary.
Password ~ A confidential code which a user must enter into the computer before the access control system
allows any operations to be performed.
Random Access — A method used to access a record of a file directly by it's address rather than sequentially.
Random Access Memory - A computers volatile or temporary memory built into its CPU, stores information
while the information is being worked upon but holds the information only until the computer is turned off or
reset.
Reduced Instruction Set Computing (RISC) Processor - A microprocessor used by some personal and mid
size computers including workstations contains only a handful of instructions and therefore works more quickly
than the CISC processor.
Redundant Array of Inexpensive Disks (RAID) - A set of hard disks all of which work together, with a file
spread across them also called a disk array.
Real time - Facility providing immediate updating of main files or data items with the data entered into the
system in on-line mode.
Semi-Conductor: It is used to form small compact circuitry which can also be used to form memory.
Simulation: The representation of various situations in a computer by means of a model so that different
condition can be tested.
Software: A set of instructions written to bring the hardware of a computer system into operation and to best
advantage.
Systems Analyst - A computer specialist responsible for analyzing current procedures for designing the most
efficient and economical system that will improve the given task within a company.
Serial Mouse - A general purpose port through which a mouse or modem can be connected to the computer,
the data transmission occurs one bit after another in series.
Server - It is a computer which coordinates all computer activities into a network.
Static Data - The data that usually does not get changed with passage of time, e.g. customer name, date of
borrowing etc.
Transistor: A small, light very fast switching device in the second generation computers.
Timesharing: A processing system in which CPU's time is shared by several users simultaneously such that
user has the illusion that no one else is using the same processor.
Terminal - an I/O device connected to a multi-user computer consisting of a monitor and a keyboard.
Technological Prowess - The extent of technology implemented successfully.
Turnover — Switch-over of jobs by the employees, particularly professionals.
Virtual Memory - A CPUs simulation of memory by accessing a disk drive and using it as internal memory.
Volatile Memory — Memory that retains data only until the computer is turned off.

Wednesday, 13 June 2018

CAIIB IT DATA WARE HOUSE

DATA WAREHOUSE ARCHITECTURE
Different data warehousing systems have different structures. Some may have an ODS (operational data store), while some may have multiple data marts. In general a Data Warehouse is used on an enterprise level, while Data Mart is used on a business division/department level. Some may have a small number of data sources, while some may have dozens of data sources. In view of this, it is far more reasonable to present the different layers of a data warehouse architecture rather than discussing the specifics of any one system.
Layers in a Data Warehouse
In general, all data warehouse systems have the following layers:
 Data Source Layer
 Data Extraction Layer
 Staging Area
 ETL Layer
 Data Storage Layer
 Data Logic Layer
 Data Presentation Layer
 Metadata Layer
 System Operations Layer

The picture below shows the relationships among the different components of the data warehouse architecture:Pl z find snap
Each component is discussed individually below:
Data Source Layer
This represents the different data sources that feed data into the data warehouse. The data source can be of any format -- plain text file, relational database, other types of database, Excel file, etc., can all act as a data source
Many different types of data can be a data source:
 Operations -- such as sales data, HR data, product data, inventory data, marketing data, systems data.
 Web server logs with user browsing data.
 Internal market research data.
 Third-party data, such as census data, demographics data, or survey data.
All these data sources together form the Data Source Layer.
Clearly, the goal of data warehousing is to free the information that is locked up in the operational databases and to mix it with information from other, often external, sources of data. Increasingly, large organizations are acquiring additional data from outside databases. This information includes demographic, econometric, competitive and purchasing trends.
Data Extraction Layer
Data gets pulled from the data source into the data warehouse system. There is likely some minimal data cleansing, but there is unlikely any major data transformation.
Staging Area: This is where data sits prior to being scrubbed and transformed into a data warehouse / data mart. Having one common area makes it easier for subsequent data processing / integration.
ETL Layer
ETL stands for “Extract, Transform and Load”. This is where data gains its "intelligence", as logic is applied to transform the data from a transactional nature to an analytical nature. This layer is also where data cleansing happens. The ETL design phase is often the most time-consuming phase in a data warehousing project, and an ETL tool is often used in this layer.
Data Storage Layer
This is where the transformed and cleansed data sit. Based on scope and functionality, 3 types of entities can be found here: data warehouse, data mart, and operational data store (ODS). In any given system, you may have just one of the three, two of the three, or all three types.
Data Logic Layer
This is where business rules are stored. Business rules stored here do not affect the underlying data transformation rules, but do affect what the report looks like.
Data Presentation Layer
This refers to the information that reaches the users. This can be in a form of a tabular / graphical report in a browser, an emailed report that gets automatically generated and sent every day, or an alert that warns users of exceptions, among others. Usually an OLAP tool and/or a reporting tool is used in this layer.
Metadata Layer
This is where information about the data stored in the data warehouse system is stored. Metadata is data about data. A logical data model would be an example of something that's in the metadata layer. A metadata tool is often used to manage metadata. Data warehouse contains huge amount of data. The metadata component contains the information like: (1) description of data warehouse; (2) rules to map, translate and transform data sources to warehouse elements; (3) the navigation paths and rules for browsing in the data warehouse; (4) the data dictionary; (5) the list of pre-designed and built-in queries available to the users etc. Record descriptions in a COBOL program DIMENSION statements in a FORTRAN program, or SQL Create statement fields are examples of metadata.
In order to have a fully functional warehouse, it is necessary to have a variety of meta-data available, data about the end-user views of data and data about the operational databases. Ideally, end-users should be able to access data from the data warehouse (or from the operational databases) without having to know where that data resides or the form in which it is stored.
System Operations Layer
This layer includes information on how the data warehouse system operates, such as ETL job status, system performance, and user access history


Tuesday, 12 June 2018

CAIIB IT

caiib IT

CRYPTOGRAPHY
There are two basic types of Encryption algorithms:
(i) Symmetric encryption
(ii) Asymmetric Encryption
Symmetric Encryption: In this encryption technique the sender and receiver encrypts and decrypts the message with the same key. Examples are Twofish, Serpent, AES (Rijndael), Blowfish, CAST5, Kuznyechik, RC4, 3DES, Skipjack etc.

Asymmetric encryption: In this encryption technique the sender encrypts the message with the receiver’s public key and the receiver decrypts the information with recipient’s private key. Hence this technique is called public key encryption. Examples are: Diffie-Hellman, RSA, ECC, ElGamal, DSA etc.

Among the various models of symmetric cipher analyzed the Rijndael is the best. Actually it is the role model of DES and AES. This model is adopted by different information security agencies like NSA, NIST and FIPS.
Among the various asymmetric ciphers, RSA is a moderate and most useful cipher for small data encryption like digital signature, ATM Pin etc.
But as discussed above, RSA (asymmetric technique) is much slower than Rijndael (symmetric technique) and other symmetric cipher techniques. But the scalability of asymmetric cryptosystem is far higher than the symmetric cryptosystem. Thus where the number of users is huge and required keys are very high, asymmetric cryptosystem proves to be superior.
It is scientifically predicted that the symmetric cipher like Rijndael is supposed to be secure against mathematical attacks until 2090. Thus they are very suitable for hardware level security in communicating devices.
Advanced Encryption Standard (AES): is the successor of DES (Data Encryption Standard) as standard symmetric encryption algorithm for US federal organizations. AES uses keys of 128, 192 or 256 bits, although, 128 bit keys provide sufficient strength today. It uses 128 bit blocks, and is efficient in both software and hardware implementations. It was selected through an open competition involving hundreds of cryptographers during several years.
Safe Key Length
128-bit encryption is a data/file encryption technique that uses a 128-bit key to encrypt and decrypt data or files. In today’s parlance, it is considered one of the most secure encryption methods and used in most modern encryption algorithms and technologies. 128-bit encryption is considered to be logically unbreakable as of date. However, it is to be remembered that breakability is only relative considering the technology available at that time. Keeping this in view, it is also recommended by many that the cipher AES-256 be used among other places in SSL/TLS across the Internet. It's considered among the top ciphers. In theory it's not crackable since the combinations of keys is massive.

CAIIB IT

CAIIB IT
Logical Security
Generally, passwords must be at least 8 characters long and include upper and lower case characters and at least one numeric character and one special character. It is amazing to note that a ‘brute force’ tool which may crack a 4 character password in just 4 seconds, takes about 10 years to crack an 8 character password.
Privileged identity management (PIM) is a recent concept involving a domain within identity management focused on the special requirements of powerful accounts within the IT infrastructure of an enterprise. It is frequently used as an information security and governance tool to help companies in meeting compliance regulations and to prevent internal data breaches through the use of privileged accounts, like system or database administrator. PIM, privileged identity management; PUM, privileged user management; and PAM, privileged account management OR privileged access management; all three of these acronyms revolve around the same simple concept: who can get to a server, how they can get to a server and what they can do when they get there.
Denial-of-service (DoS) attacks: Where the intruder attempts to crash a service (or the machine), overload network links, overloaded the CPU, or fill up the disk. The intruder is not trying to gain information, but to simply act as a vandal to prevent from making use of machine.
Distributed Denial of Service (DDoS) attacks: In most respects it is similar to a DoS attack but the results are much, much different. Instead of one computer and one internet connection the DDoS attack utilises many computers and many connections. The computers behind such an attack may be often distributed around the whole world and will be part of what is known as a botnet. The main difference between a DDoS attack vs a DoS attack, therefore, is that the target server will be overload by hundreds or even thousands of requests in the case of the former as opposed to just one attacker in the case of the latter. Therefore it is much, much harder for a server to withstand a DDoS attack as opposed to the simpler DoS incursion.
An Intrusion Detection System (IDS) is a system for detecting such intrusions. IDS can be broken down into the following categories:
An Intrusion Prevention System (IPS) sits between the firewall and the rest of the network. That way, if an attack is detected, the IPS can stop the malicious traffic before it makes it to the rest of the network. In contrast, an IDS simply sits on top of the network rather than in front of it. Unlike IDS, IPS actively takes steps to prevent or block intrusions that are detected. These preventing steps include activities like dropping malicious packets and resetting or blocking traffic coming from malicious IP addresses. IPS can be seen as an extension of IDS, which has the additional capabilities to prevent intrusions while detecting them.
IPS is a system that actively takes steps to prevent an intrusion or an attack when it identifies one. IPS are divided in to four categories. First one is the Network-based Intrusion Prevention (NIPS), which monitors the entire network for suspicious activity. The second type is the Network Behavior Analysis (NBA) systems that examine the traffic flow to detect unusual traffic flows which could be results of attack such as distributed denial of service (DDoS). The third kind is the Wireless Intrusion Prevention Systems (WIPS), which analyzes wireless networks for suspicious traffic. The fourth type is the Host-based Intrusion Prevention Systems (HIPS), where a software package is installed to monitor activities of a single host.