0

Computer Applications

Description: Important questions related to information technology in banking.
Number of Questions: 20
Created by:
Tags: Computer banking information technoloty Banking Awareness Computer Knowledge Bank PO/SO/Clerical Internet and Network
Attempted 0/20 Correct 0 Score 0

Which of the following is incorrect about IFSC code?

  1. IFSC is used for RTGS.

  2. IFSC is used for NEFT.

  3. It is an 11 character code.

  4. First 5 alphabetic characters represent the bank.

  5. None of the above


Correct Option: D
Explanation:

Incorrect statement.  First 4 alphabetic characters represent the bank.

Which of the following is not used for electronic payments?

  1. Debit Card

  2. Credit Card

  3. Cheque

  4. Internet Banking

  5. None of these


Correct Option: C
Explanation:

Cheque is not used for electronic payments.

Which of the following is/are used to make passwords strong?

  1. Ctrl, Shift, Alt, special symbols, numbers, characters

  2. Ctrl, Alt, special symbols, numbers, characters

  3. Ctrl, Shift, Alt, numbers, characters

  4. Ctrl, Shift, Alt, special symbols, numbers

  5. Special symbols, numbers, characters


Correct Option: E
Explanation:

Special symbols, numbers and characters are used to make passwords strong.

________ enables accessing of complete customer account details centrally.

  1. ATM

  2. WAN

  3. LAN

  4. MAN

  5. CBS


Correct Option: E
Explanation:

CBS (Core Banking Solution) refers to software applications for recording transactions, storing customer information, calculating interest and completing the process of passing entries in a single database. Core banking is services provided by a group of networked bank branches. Bank customers may access their funds and other simple transactions from any of the member branch offices.

________ is an overview of the pages within a website.

  1. SMTP

  2. FAQ

  3. Sitemap

  4. Mailing list

  5. FDDI


Correct Option: C
Explanation:

A site map is an overview of the pages within a website.

Internet banking requires a) User ID b) Account number c) Login password d) Transaction password e) PIN

  1. a, b, c

  2. a, d

  3. a, c, d

  4. a, c, d, e

  5. b, c, d, e


Correct Option: C
Explanation:

Internet banking requires (a) User ID, (c) Login password and (d) Transaction password.

________ facilitates the payment transaction between the internet customer and the merchant.

  1. Debit card

  2. Credit card

  3. ATM card

  4. Payment gateway

  5. Core Banking Solution


Correct Option: D
Explanation:

Payment gateway facilitates the payment transaction between th internet customer and the merchant. Payment gateway is the way of authorizing credit card or other forms of electronic payments. Payment gateways help to protect sensitive information like credit card numbers and other account information by encrypting the data they transmit to merchants and payment processors.

________ is/are valid for one session.

  1. Login password

  2. Transaction password

  3. PIN

  4. OTP

  5. Transaction password and PIN


Correct Option: D
Explanation:

A one-time password (OTP) is a password that is valid for only one login session or transaction. OTPs avoid a number of shortcomings that are associated with static passwords. The most important shortcoming that is addressed by OTPs is that, in contrast to static passwords, they are not vulnerable to replay attacks. This means that a potential intruder who manages to record an OTP that was already used to log into a service or to conduct a transaction will not be able to abuse it, since it will be no longer valid.

Which of the following is not used in banking?

  1. MICR

  2. OMR

  3. Plotter

  4. Switch

  5. Scanner


Correct Option: C
Explanation:

Plotter is not used in banking. Plotter draws pictures on paper based on commands from a computer. Plotters differ from printers in that they draw lines using a pen. As a result, they can produce continuous lines, whereas printers can only simulate lines by printing a closely spaced series of dots. Multicolor plotters use different - coloured pens to draw different colours.

________ is a 3 digit number on debit cards for security purpose.

  1. PIN

  2. Password

  3. TPIN

  4. CVV

  5. CTS


Correct Option: D
Explanation:

CVV is a 3 digit number on debit cards for security purpose. The CVV (Card Verification Value) on your credit card or debit card is a 3 digit number on VISA and MasterCard branded credit and debit cards.

PROM stands for

  1. Programmed Read Only Memory

  2. Programmable Read Only Memory

  3. Permanent Read Only Memory

  4. Positive Read Only Memory

  5. Persistent Read Only Memory


Correct Option: B
Explanation:

PROM stands for Programmable Read Only Memory. It's a type of ROM.

In notepad, F5 is used to

  1. refresh

  2. insert time and date

  3. word wrap

  4. open font dialog box

  5. spelling check


Correct Option: B
Explanation:

In notepad, F5 is used to insert time and date.

PIN stands for

  1. Permanent Identification Number

  2. Personal Identification Number

  3. Personal Information Network

  4. Public Information Network

  5. Public Information Netiquette


Correct Option: B
Explanation:

PIN stands for Personal Identification Number A personal identification number is a secret numeric password shared between a user and a system that can be used to authenticate the user to the system.

Last 3 digits of MICR cheque represent ________.

  1. bank name

  2. city of the branch

  3. branch in the city

  4. clearing house code

  5. the CVV Number


Correct Option: C
Explanation:

Last 3 digits of MICR cheque represent branch in the city.

A(An) ________ prevents unauthorised traffic to and from local area network.

  1. Proxy server

  2. Firewall

  3. Router

  4. Bridge

  5. None of the above


Correct Option: B
Explanation:

A firewall is a small program that helps protect your computer and its contents from outsiders on the internet or network. A firewall prevents unauthorised traffic to and from your computer.

Which of the following does not require authentication?

  1. Internet banking

  2. Telephone banking

  3. Debit Card

  4. (2) and (3)

  5. None of the above


Correct Option: E
Explanation:

None of the above does not require authentication. Authentication is a very important process in banking services. Authentication is required at every step in banking such as Internet banking, ATM card, debit card, credit card, etc.  Authentication is the process of determining whether someone or something is, in fact, who or what it is, declared to be. In private and public computer networks, authentication is commonly done through the use of logon passwords. Knowledge of the password is assumed to guarantee that the user is authentic.

________ topology shows how data flows within a network.

  1. Star

  2. Ring

  3. Bus

  4. Physical

  5. Logical


Correct Option: E
Explanation:

Logical topology shows how data flows within a network. Topologies are either physical or logical. Physical topology refers to the placement of the network's various components, including device location and cable installation. Logical topology is the way that the signals act on the network media, or the way that the data passes through the network from one device to the next without regard to the physical interconnection of the devices. Bus, Ring and Star topologies are logical topologies.

Which of the following is incorrect - a) PIN and password are same terms. b) ATMs are not connected to CBS system. c) Virtual keyboard is conneted via PS/2 port.

  1. Only (a)

  2. Only (b)

  3. Only (c)

  4. (a) and (b)

  5. (a), (b) and (c)


Correct Option: E
Explanation:

All of (a), (b) and (c) are false. a) PIN and password are not the same terms. Password is a combination of characters, numbers and special symbols whereas PIN (Personal Identification Number) is a combination of numbers assigned to ATM card or debit card. b) ATMs are connected to CBS (Core Banking Solution) system. Without a connection to CBS system ATMs cannot provide account services. c) Virtual keyboard is is not a hardware. Virtual keyboard is a keyboard displayed on screen to provide security. Virtual keyboard is an online application which substitutes the actual physical keyboard with a mouse. This virtual keyboard is a safeguard against risks in online banking.

Which of the following is not a network?

  1. TCP/IP

  2. LAN

  3. MAN

  4. PSTN

  5. ISDN


Correct Option: A
Explanation:

TCP/IP is not a network. TCP/IP, short for Transmission Control Protocol/Internet Protocol, is the suite of communications protocols used to connect hosts on the internet.

________ allows secure e-commerce transactions, such as online banking.

  1. HTTP

  2. HTTPS

  3. SMTP

  4. MAPI

  5. IMPS


Correct Option: B
Explanation:

Hyper Text Transfer Protocol Secure (HTTPS) is a secure version of the Hyper Text Transfer Protocol (HTTP). HTTPS allows secure e-commerce transactions, such as online banking. Web browsers such as Internet Explorer and Firefox display a padlock icon to indicate that the website is secure, as it also displays https:// in the address bar. When a user connects to a website via HTTPS, the website encrypts the session with a Digital Certificate. A user can tell if they are connected to a secure website or  if the website URL begins with https:// instead of http://.

- Hide questions