StudyWithMeenakshi

Search Your Topic Here

Sunday, June 24, 2018

CAIIB IT MODULE A COLLECTION

Module A

DOWNLOAD LINK-  MODULE A COLLECTION

1. With Information Technology we cannot achieve 
a) Workforce flexibility
b) Distributed the wealth equally
c) Globalization
d) Reduce financial frauds
2. Meaning and impact of globalization
3. Generation of computers
First Generation: High speed vacuum tube
- Very small memory
- Development of stored program
Second generation: Germanium transistors
- more reliable and faster
- Much cheaper than tubes
- Magnetic core storage and magnetic disk storage
Third Generation: Silicon transistors
- Integrated Circuits (ICs)
- Switching speed and reliability increased
- Semi-conductor Memory
Fourth generation: Microprocessor chip
- VLSI (Very Large Scale Integrated Circuits)
- Computer networks and distributed computer systems
- Highly portable and smaller in size due to improvements in speed, memory size, packing density of ICs
Fifth generation: ULSI (Ultra Large Scale Integrated) chips
- Artificial Intelligence
4. COBOL (Common Business Oriented Language) mainly used for business data processing (impt.)
5. FORTRAN used for scientific and engineering calculations (impt.)
6. Function of ALU ………… page 14-15
7. CPU consists of ….. page 14
8. Batch processing …. Page 18
9. Function of OLTP (On-Line Transaction Processing)…… page 20
10. Meaning of Grid computing, Real time system, cluster computing, cloud computing
11. Virtualizations of server’s means to run multiple operating systems on same physical servers.
12. Category of software with examples …. Page 35 36 (You will get 2 questions from this section)
13. Open Source Software with example
14. System software and application software examples
15. Unit 4: Networking System (You will get maximum questions from this unit, so concentrate on this chapter from module A)
16. Intranet
(i) Uses Internet-derived communication protocols (TCP/IP), networking and user interface.
(ii) Relatively cost efficient
17. In which types of cable composed of two or more copper wirestwisted around each other within a plastic sheath?
a) Coaxial cable
b) Twisted-pair cable
c) Optical fiber cable
d) None of the above
18. RJ-45 connectors is a type of
a) Coaxial cable
b) Twisted-pair cable
c) Optical fiber cable
d) None of the above
19. Cable used to where very large amount of data need to be transmitted on a regular basis____?
a) Coaxial cable
b) Twisted-pair cable
c) Optical fiber cable
d) None of the above
20. 10Base-FL and 100Base-FX cable is type of
a) Coaxial cable
b) Twisted-pair cable
c) Optical fiber cable
d) None of the above
21. ____________ wave are omni directional.
a) Radio wave
b) Micro wave
c) Radio and Micro both
d) None of the above
22. Which of the following statements are correct?
a) VPN server does not require IP number.
b) Dial-up connectivity is always cheap irrespective of the amount of data transfer.
c) 100 Mbps data rate cannot be achieved over LAN.
d) LAN connection for a printer is not a Network Interface Card.
23. PPTP (Point-to-Point Tunneling Protocol)
L2TP (Layer 2 Tunneling Protocol)
24. An ISDN Primary rate interface (PRI) connections supports
a) 2 B-channels 1 D-channels
b) 1 B-channels 2 D-channels
c) 23 B-channels 1 D-channels
d) 1 B-channels 23 D-channels
25. An ISDN Basic rate interface (BRI) connection supports
a) 2 B-channels 1 D-channels
b) 1 B-channels 2 D-channels
c) 23 B-channels 1 D-channels
d) 1 B-channels 23 D-channels
26. In which band operates with an uplink frequency of 6 GHz and a downlink frequency of 4 GHz?
a) C band
b) Ku band
c) Ka band
d) All of the above
27. In which band operates with an uplink frequency of 14 GHz and a downlink frequency of 11 GHz?
a) C band
b) Ku band
c) Ka band
d) All of the above
28. In which band operates with an uplink frequency of 30 GHz and a downlink frequency of 20 GHz?
a) C band
b) Ku band
c) Ka band
d) All of the above
29. The most common reason for sub-netting a network is
a. To control network traffic
b. To reduce IP addressing number
c. To manage hubs
d. None of the above
30. A VPN can provide secure remote access through
a. Dial-up connections
b. Adding a switch at customer place
c. By encryption
d. None of the above
Module B
1. LISP, Pascal, PL/1 are develops in which generation?
a) 1st generation
b) 2nd generation
c) 3rd generation
d) 4th generation
2. Pick the odd one with respect to deployment strategies?
a) Horizontal
b) Parallel
c) Phased
d) Pilot
3. These systems does not make decision, it helps the user make the decision, providing information and analysis where the user sees fit?
a) Transaction Processing System (TPS)
b) Management Information System (MIS)
c) Decision Support System (DSS)
d) None of the above
4. In which phase of SDLC involves acquiring the hardware, programming software, developing and distributing the documentation, and training personnel to use the system?
a) Planning and Analysis
b) Design
c) Implementation
d) Operation and maintenance
5. For medium to high risk project and when risk evaluation is important, which software development model is used? (Choose the most suited model)
a) Waterfall
b) Spiral
c) Prototype
d) None of the above
6. Full form of PERT
a. Program Evaluate and Revised Technique
b. Program Evaluation and Revised Technique
c. Program Evaluate and Review Technique
d. Program Evaluation and Review Technique
7. The components of CMM includes (Select the odd one)
a. Goals
b. Process capability
c. Maturity levels
d. None of the above
8. Advantages of CMM (Capability Maturity Model)
- Helps to build an understanding of software process.
- Provide a consistent basis for conducting appraisals of software processes.
- To serve blueprint for software process improvement.
9. Atomicity in terms of DBMS means
a.
b.
c.
d.
Chapter 7
Replication management is also known as
a) Process Management Layer
b) Application Messaging Layer
c) Data Warehouse Layer
d) Data Staging Layer
Data about data within the enterprise is known as
a) Metadata
b) Data Marts
c) Data Warehouse
d) None of the above
Which of the following is used on a business or departmental level?
a) Metadata
b) Data Marts
c) Data Warehouse
d) None of the above
The data mining tool that discovers different groupings within the data depending on the common features or attributes is known as
a) Association
b) Classification
c) Clustering
d) Forecasting
_______________ transforms data from the data warehouse into strategic information.
a) Data Marts
b) Data Mining
c) OLAP
d) Data warehouse
Chapter 8
Choose the odd one
a) SCORM
b) IEEE
c) IMS
d) AICC
Choose the correct flows of Instructional Design Process
a) Analyze-Develop-Design-Evaluate-Implement
b) Analyze-Design-Implement-Develop-Evaluate
c) Analyze-Develop-Design-Implement-Evaluate
d) Analyze-Design-Develop-Implement-Evaluate
Bloom’s taxonomy divides educational objectives into
a) 3 domains
b) 4 domains
c) 5 domains
d) 6 domains
A virtual classroom can help to
a) Save voice discussion and presentations.
b) Hold live ad-hoc learning discussions and study sessions.
c) Share the advantages of e-learning with the suppliers and strategic partners.
d) All of the above
Chapter 9
Score Banking System can manage multiple delivery channels through
a) API’s
b) Different servers
c) Different versions of CBS
d) None of the above
Data security includes
a) Transaction access of authorized users
b) Message validation
c) Transaction logging
d) All of the above
Chapter 10
In India, RTGS uses ______ message flow structure.
a) V-shaped
b) L-shaped
c) T-shaped
d) Y shaped
What is the name of the RTGS system that uses in the USA?
a) CHAPS
b) Fedwire
c) SIC
d) ELLIPS
What is the name of the RTGS system that uses in the UK?
a) CHAPS
b) Fedwire
c) SIC
d) ELLIPS
What is the name of the RTGS system that uses in the Belgium?
a) CHAPS
b) Fedwire
c) SIC
d) ELLIPS
Which message flow structure is generally incompatible with the basic principle of RTGS?
a) V-shaped
b) L-shaped
c) T-shaped
d) Y-shaped
Message flow structure in CHAPS is
a) L-shaped
b) V-shaped
c) T-shaped
d)None of the above
Chapter 11
The cards used while traveling that is on move are ________________ cards.
a) Debit Card
b) Credit Card
c) Magnetic Card
d) Contactless smart Card
Smartcards can hold up to _______________ of information.
a) 4 KB
b) 8 KB
c) 12 KB
d) 16 KB
The following is a re-loadable card
a) Credit Card
b) Smart Card
c) Magnetic Card
d) Debit Card
Chapter 12
CRM is the dimensions of the E-business, what is the use of CRM?
a) For on-line purchase
b) For streamlining internal business processes
c) For bringing customers and associates closer
d) None of the above
The technology that can be used to reduce the billing cost is known as _____________.
a) EBPP
b) SCM
c) CRM
d) None of the above
Chapter 13: RBI Reports on Technology
Computer Audit: Functional audit in computerized environment.
IS Audit: Information system audit without the functional focus.
1. Which committee emphasis on IS Audit in banks?
a) Jilani Committee
b) Narasimham Committee
c) Vasudevan Committee
d) Internet Banking Committee
2. Which committee underlined the importance of computerization in the banking industry?
a) Jilani Committee
b) Narasimham Committee
c) Vasudevan Committee
d) Internet Banking Committee
________________ is done in and around the computer with the help of manual resources as well as sources from the system.
a) Computer Audit
b) IS Audit
c) System Audit
d) None of the above
_________ concerned with holding the sender responsibility for his message.
a) Non repudiation
b) Authenticity
c) Integrity
d) Atomicity
IDEA (International Data Encryption Algorithm) is of _______ bit key length.
a) 56
b) 128
c) 112
d) 40
The possibility of data being read by someone other than the intended recipients is known as
a) Impersonation
b) Eavesdropping
c) Data Alteration
d) Denial-of-service


No comments:

Post a Comment