Computer related information
1.
features of different generation of computers with example
The computer
has evolved from a large-sized simple calculating machine to a smaller but much
more powerful machine. Each generation of computer is designed based on a new
technological development, resulting in better, cheaper and smaller computers
that are more powerful, faster and efficient than their predecessors.
First
Generation (1940 to 1956): The first generation of computers used vacuum tubes for circuitry
and magnetic drums for memory. The input to the computer was through punched cards and paper
tapes. The output was displayed as printouts. The instructions were written in machine language. The first generation computers
could solve one problem at a time. The computation time was in milliseconds.
Second
Generation (1956 to 1963): Transistors replaced the vacuum tubes of the first
generation of computers. Transistors allowed computers to become smaller,
faster, cheaper, energy efficient and reliable. The second generation computers
used magnetic core technology for primary
memory. They used magnetic tapes and magnetic disks for secondary storage
Third
Generation (1964 to 1971): The third generation computers used the Integrated Circuit
(IC) chips. In an IC chip, multiple transistors are placed on a silicon
chip. Silicon is a type of semiconductor. The keyboard and monitor were used to
interact with the third
generation computer, instead of the punched card and printouts. Operating system allowed different applications to run at
the same time. High-level languages were used
extensively for programming, instead of machine language and assembly language.
The computing time was in nanoseconds
Fourth Generation (1971 to present): They use the Large Scale Integration (LSI) and the Very Large Scale Integration technology. Thousands of transistors are integrated on a small silicon chip using LSI technology. This generation also saw the development of pointing devices like mouse, and handheld devices. The computing time is in picoseconds. Example: The Intel 4004 chip was the first microprocessor.
Fifth Generation (Present and next): The fifth generation computers use Super Large Scale Integrated (SLSI) chips that are able to store millions of components on a single chip. These computers have large memory requirements. This generation of computers uses parallel processing which results in faster processing speed. The Intel dual-core microprocessor uses parallel processing. The fifth generation computers are based on Artificial Intelligence (AI).
2.
Discuss the capabilities and limitations of computers
i)
The computer processes information
very fast ii)The computer gives accurate result iii) The computer store large amount
of data and information iv) The computer enables one to restore or bring back
any of his works v) It is automatics vi) The computer can do two or more things
at a same time vii) The computer can be improved and upgraded Limitations: i) The computer can only
do what you tell it to do ii) It cannot generate information on its own iii) The
computer will give you wrong information if you feed it with wrong data iv) The
computer cannot correct wrong instruction
ii)
3. Impact of computerization on modern society,
Modern society cannot run without computer explain
It is the
age of Science & Technology. It is Science that makes our life quicker and
easier. Computer is also the invention of Science. Modern societies are more
civilized & developed then ancient society. In modern society the people
are busy but their lives are quicker & easier by the use of different
advance technology. Hence, in modern society's computer have become parts of
their life.
Computers
are used in every aspect of life. It is used by an engineer in there project
work. It is also used by a doctor in the medical field. It is also used in the
field of agriculture and education. It also helps us to enlighten us and deal
with the daily needs. It also helps the businessman to know the profit &
loss & is also used in the bank to keep accurate account. It is also used
in the field of transportation & also in the railway. It helps the people
to keep connection with their friends by via of e-mail & internet. Scientist
also used it in the field of aeronautics' & in other research programmed.
So, it is the means of communication & is most useful invention of the 21st
century.
Computer
is used in every aspect of life & it makes our work easier, quicker &
convenient but it is expensive. So, it makes the lifestyle of society
expensive. It decreases the manpower & creates the unemployment problem in
the society. It needs a lot of electricity & power to run. It makes sick
& lazy due to sitting in the computer a long time. So, the computer has
become a part of our life.
4. CPU of a computer/
block diagram of a micro-computer and describe its control unit
A computer can process data, pictures,
sound and graphics. They can solve highly complicated problems quickly and
accurately.
A central processing unit contains the following- Input: Computer
receives data and instructions through the Input Unit.• The input unit consists
of one or more input devices.• Input devices include: Keyboard, Mouse, Joystick,
Scanner etc. Storage: The process of saving data and instructions permanently
is known as storage. The data is first stored in the storage unit for faster
access and processing. This storage unit or the primary storage of the computer
system is designed to do the above functionality. It provides space for storing
data and instructions. The storage unit performs the following major functions:
• All data and instructions are stored here before and after processing. •
Intermediate results of processing are also stored here. Processing: The task of performing
operations like arithmetic and logical operations is called processing. The
Central Processing Unit (CPU) takes data and instructions from the storage unit
and makes all sorts of calculations based on the instructions given and the
type of data provided. It is then sent back to the storage unit. Output: Computer provides information
and results of computation to the outside world through the Output Unit. The
output unit consists of one or more output devices. Output devices include:
Monitor, Printer. Control: It instructs the input unit, where to store the data
after receiving it from the user. It controls the flow of data and instructions
from the storage unit to ALU. It also controls the flow of results from the ALU
to the storage unit. The control unit determines the sequence in which computer
programs and instructions are executed. The control unit is also capable of
shutting down the computer when the power supply detects abnormal conditions.
5. Functions
of an operating system. name of modern OS
An operating system is a group of
computer programs that coordinates all the activities among computer hardware
devices. It is the first program loaded into the computer by a boot program and
remains in memory at all times.
1) Booting the computer 2) To interpret
the commands executed by the user. 3) To handle disk input/output settings. 4) Loaded
in the memory at boot up and remain in the memory at all times. 5) To provide
the OS with the mechanism in order to see the additional memory. 6) Used to
access the high memory area. 7) it allows the rest of the OS and its programs
to interact directory with the system hardware and the system BIOS. 8) It sets
particular values corresponding to the windows environment. 9) Used to run
particular programs during startup. 10) Protection and security 11) Error
detection 12) protection and security 13) Process communication
1) Disk Operating System (DOS) 2)
Windows Operating System (Windows) 3) Unix Operating System (UNIX)
6. Define computer hardware and software
Computer hardware refers to the
physical parts of a computer and related devices. Internal hardware devices
include motherboards,
hard drives,
and RAM.
External hardware devices include monitors,
keyboards, mice, printers, and scanners. The internal hardware parts of a
computer are often referred to as components,
while external hardware devices are usually called peripherals.
Together, they all fall under the category of computer hardware
Computer software is a general term
that describes computer programs. Software can be difficult to describe because
it is "virtual," or not physical like computer hardware.
Software is often divided into two categories. Systems
software includes the operating
system and all the utilities
that enable the computer to function. Applications
software includes programs that do real work for users. For example, word
processors, spreadsheets,
and database
management systems fall under the category of applications software.
7. What are the various types of software?
1. System Software: System software or operating system is the
software used by the computer to translate inputs from various sources into a
language which a machine can understand. Basically, the OS coordinates the
different hardware components of a computer. There are many OS in the market.
The most popular Os are from the stable of Microsoft.
2.
Application software: A
normal user rarely gets to see the operating system or to work with it. But all
of us are familiar with application software which we must use to interact with
a computer. Popular examples of application software are the Microsoft office
suite which includes Word, Excel and PowerPoint. The anti-virus is an
application and so is the Media player.
3. Programming languages: Programmers use the programming software to
develop the programming languages necessary to run computer software.
Compliers, interpreters, linkers and text editors are some of the basic tools
used in programming software.
8. Number system?
Briefly the number system used by compute
A numeral system is a writing system
for expressing numbers, that is, a mathematical
notation for representing numbers of a given set,
using digits
or other symbols in a consistent manner. Any system
using a range of digits organized in a series of columns or "places"
that represents a specific quantity. The most common numbering systems are
decimal, binary, octal, and hexadecimal.
**
The decimal numeral
system has ten as its base. It is the numerical
base most widely used by modern civilizations. ** In mathematics
and computer science, the binary numeral system, or base-2 numeral system, represents
numeric values using two symbols: 0
and 1.
Numbers represented in this system are commonly called binary numbers. ** The octal
numeral
system, or oct for
short, is the base-8
number system, and uses the digits 0 to 7. Octal numerals can be made from binary numerals by grouping
consecutive binary digits into groups of three. For example, the binary
representation for decimal 74 is 1001010, which can be grouped into (00)1 001
010 – so the octal representation is 112. ** Hexadecimal describes a base-16
number system. That is, it describes a numbering system containing 16
sequential numbers as base units before adding a new position for the next
number. The hexadecimal numbers are 0-9 and then use the letters A-F.
9. Parity
bit? Difference between odd and even parity
A parity bit is a single bit
added to a binary
data transmission used to indicate if whether the 0's and 1's within that data
transmission is an even or odd number. The parity bit is used in parity
error checking to find errors that may occur during data transmission.
.i) odd parity refers to the odd
number of ones in a binary code, i) even parity refers to the even number of
ones in a binary code. Both the even and odd parity is used for error checking.
ii) An even number can be divided by 2 evenly. Ii) An odd number will have a remainder of 1 when
divided by 2. iii) even parity number
of 1s is even called even parity
iii) and or number of 1s is odd
called odd parity
10. Phishing? How
can you handle phishing in internet banking?
Phishing is
a fraudulent attempt, usually made through email, to steal your personal
information. Phishing emails usually appear to come from a well-known
organization and ask for your personal information — such as credit card
number, social security number, account number or password. Often times
phishing attempts appear to come from sites, services and companies with which
you do not even have an account.
In order for
Internet criminals to successfully "phish" your personal information,
they must get you to go from an email to a website. Phishing emails will almost
always tell you to click a link that takes you to a site where your personal
information is requested • Firstly I’ll not open such a mail which I really
doubt. • Only enter my Internet Banking through bank official websites. Never
enter Internet banking via links in emails or other web pages. • I’ll not make
use of public access points such as Internet cafés or any computer that is not
your own when doing my banking. • Change my password and customer-selected PIN
(CSP) regularly. • Be sure to install the free Rapport software to prevent a
variety of online attacks, these include key loggers, screen capturing, session
hijacking and spyware. • Be very careful with downloading files and attachments
from these emails as these documents may contain spyware, viruses and other
damaging software • Look out for masked URLs in emails, in other words URLs
that look authentic. Finally to open an email I have to do the following: The Know test, The Received test, The Expect
test, The Sense test, The Virus test
11. Elaborate UPS: An
uninterruptible power supply (UPS) from Caterpillar will provide years of low
maintenance protection, whether supporting critical processes or defending
servers from harmful power problems. A UPS is typically used to protect computers, data
centers, telecommunication equipment or other electrical
equipment where an unexpected power disruption could cause injuries,
fatalities, serious business disruption or data loss.
12. Computer virus?
How can we prevent it? Some antivirus
A computer virus is a program or
piece of code
that is loaded onto your computer without your knowledge and runs against your
wishes. Viruses can also replicate themselves. All computer
viruses are man-made. A simple virus that can make a copy of itself over and over
again is relatively easy to produce. Even such a simple virus is dangerous
because it will quickly use all available memory
and bring the system
to a halt.
10 ways to avoid viruses and spyware # 1: Install quality antivirus 2: Install real-time anti-spyware protection 3: Keep anti-malware applications current 4: Perform daily scans 5: Disable auto run 6: Disable image previews in Outlook 7: Don’t click on email links or attachments 8: Surf smart 9: Use a hardware-based firewall 10: Deploy DNS protection
i) Kaspersky Anti-Virus ii) BitDefender
Antivirus iii) Trend
Micro iv) Norton Antivirus/ Internet Security v) McAfee Antivirus vi) Panda
Antivirus Pro vii) Norton viii) Avira Antivirus ix) AVG
Free Antivirus x) Avast Free
antivirus
13. What is
e-governance? Describe the security measures that should be taken in e-banking
procedure
E-Government refers to government's
use of information technology to exchange information and services with
citizens, businesses, and other arms of government. E-Government may be applied
by the legislature, judiciary, or administration, in order to improve internal
efficiency, the delivery of public services, or processes of democratic
governance. It also refers to the citizen to government interaction including
the feedback of policies. The primary delivery models are Government-to-Citizen
or Government-to-Customer (G2C), Government-to-Business (G2B) and
Government-to-Government (G2G) & Government-to-Employees (G2E). The most
important anticipated benefits of e-government include improved efficiency,
convenience, and better accessibility of public services
E-banking is defined as the
automated delivery of new and traditional banking products and services
directly to customers through electronic, interactive communication channels.
E-banking includes the systems that enable financial institution customers,
individuals or businesses, to access accounts, transact business, or obtain
information on financial products and services through a public or private
network, including the Internet. Customers access e-banking services using an
intelligent electronic device, such as a personal computer (PC), personal
digital assistant (PDA), automated teller machine (ATM), kiosk, or Touch Tone
telephone. While the risks and controls are similar for the various e-banking
access channels, this booklet focuses specifically on Internet-based services
due to the Internet's widely accessible public network.
Secure communication: Data transmission on our site is protected by Secure Socket Layer Encryption to 128 bit, which currently represents the best standard for encrypting information transmitted on Internet. Strong authentication devices, Temporary Passwords (OTP), Digital Signature, End of work session, Data Protection on internal systems, Support for security issues, Card security, Password, PIN and Telephone security, avoid scams and hoaxes, you’ll be liable: Always remember to withdraw your card whenever you finish using an ATM. You’re liable for any money lost as a result of someone else using your card to withdraw or transfer funds.
21. Distinguish
between OMR, OCR, and MICR
MICR: MICR is a
character recognition technology used primarily by the banking industry to
facilitate the processing of cheques. The human readable characters are printed
on documents using a magnetic ink. It stands for Magnetic Ink Character
Recognition.
OMR: OMR which stands
for Optical Mark Recognition is the process of gathering data with an optical
scanner by measuring the reflectively of light at predetermined positions on a
surface.
OCR: OCR stands for
Optical Character Recognition. OCR is the recognition of printed or written
text characters by a computer. It is the application software that allows a
computer to recognize printed or written characters, e.g. letters, numbers,
punctuation marks, and pictograms using an optical scanner for input.
14. Phone
banking and SMS banking, internet banking
Phone
banking
is a service provided by a bank or other financial institution, that enables customers to
perform financial transactions over the telephone,
without the need to visit a bank branch or automated teller machine. Phone banking
times can be longer than branch opening times, and some financial institutions
offer the service on a 24 hour basis. Phone banking reduces the cost of handling
transactions. In Phone Bank you can do almost everything you can do at a
branch: transfer Taka, check your
balance, check transactions, pay bills, manage your standing orders, cancel
direct debits, and organize holiday money
SMS banking is a type of mobile
banking, a technology-enabled service offering from banks
to its customers, permitting them to operate selected banking services over
their mobile
phones using SMS
messaging. The service will enable customers to check account
balance, stop a cheque payment or even get statements through SMS.
Online banking (or Internet
banking or E-banking)
allows customers of a financial institution to
conduct financial transactions on a secure website operated by the institution,
which can be a retail or virtual
bank,
credit
union or building society. Services: Very convenient, unlimited service day and night. No time constraint. Easy to access via PC, Easy way of payment, Smart, Higher interest rate, Easy
transaction, efficient and
effective etc
15. Described
about electronic payment system
Electronic
Payment Systems (EPS) is one of the nations’ oldest and largest, privately held
merchant service providers of electronic payment products to businesses and
ISO’s. Uniquely positioned in the payments industry, EPS provides a
comprehensive suite of merchant processing solutions, the highest level of data
security, and expertise to drive revenue and profitability for all business
types including retailers, restaurants, hotels, automotive, healthcare, service
businesses, e-Commerce and non-profit organizations.
EPS Electronic Payment Processing Advantages:
· Security and Peace of Mind: EPS continues to be on the forefront of adopting new data security measures including the implementation of Payment Card Industry Data Security Standards before it was a requirement.
· Cash flow: We provide access to funds within 48 hours at rates which are among the best in the industry.
· Service: Talk to a real person! In-house customer service and technical support is available 24/7/365 - meaning your business never has to experience a down time.
16. How
computer can help investment management for a bank
Investment
management is about managing money by investing it in a variety of asset
classes including equities (or shares) and bonds. The main roles within
investment management are analyst and investment manager. As you might
expect, the role of an analyst is to analyze stocks, taking a view on their
future outlook and circulating research internally. This could entail meeting
with company management and looking at economic data and market trends.
An
investment manager will then be responsible for investing clients’ money in a
portfolio of stocks. Investment managers will rely heavily on the in-depth
research done by analysts when deciding how to invest. At the same time, they
must take overall responsibility for how the fund is constructed, looking at
the bigger picture and considering issues such as asset allocation. Many
investment managers carry on doing hands-on research to avoid becoming too
distant from company analysis.
17. Name 4
core banking software? Discuss the use of computer in cash management
Core Banking is a general term used
to describe the services provided by a group of networked bank branches. Bank
Customers may access their funds and other simple transactions from any of the
member branch offices at REAL TIME. Strategic Information Technology defines
core banking software as the functionality required to run a bank or credit
union. Core banking includes: @Retail Banking @ Lines of Credit &
Segregated Lines of Credit @ Loans @ Mortgages @ Web banking @ Investments @ Clearing
@ Term Deposits @ Accounting ... and more. In addition, there are many third
party interfaces that a core banking system must accommodate. These include: @ CANNEX @
ATM & ABM @ FundSERV @ Telpay @ Cheque Clearing @ Equifax @ Trans Union
@ Point of Sale (POS) @ Loan Insurance @
18. Operating system, DBMS, Application
software
OS: An operating
system is a collection of software that manages computer
hardware resources and provides common services for computer
programs. The operating system is a vital component of the system
software in a computer system. @ Process Management @ Resource
Management @ File management @ Communication Management @ Security Management @
Memory Management
A database management system is a set of software programs that
allows users to create, edit and update data in database files, and store and
retrieve data from those database files. Data in a database can be added,
deleted, changed, sorted or searched all using a DBMS. The Database Management
System performs the following functions. 1) Data Dictionary
Management 2) Data Storage Management 3) Data Transformation and
Presentation 4) Security Management 5) Multi User Access Control 6) Backup
and Recovery Management 7) Data Integrity Management 8) Database Access
Languages and Application Interface 9 ) Database Communication Interface
19. Computer
software? Define system and application software
Computer software is a
program that tells a computer what to do. These
instructions might be internal commands, such as updating the system clock, or
a response to external input received from the keyboard or mouse.
System software refers to the files and programs that
make up your computer's operating system.
System files include libraries of functions, system services, drivers for
printers and other hardware, system preferences, and other configuration files.
The programs that are part of the system software include assemblers,
compilers, file management tools, system utilities, and debuggers. The system
software is installed on your computer when you install your operating system
Application
s/w is a set of one or more programs,
designed to solve a specific problem, or do a specific task. The program
included in the application s/w package is called application programs and the
programmers who prepare application s/w are called application programmers. Some
of the most commonly known application s/w are:
(i) Word processing s/w (ii) Spreadsheet s/w (iii)
Database s/w (iv) Graphics s/w (v) personal assistance s/w (vi) Education s/w
(vii) Entertainment s/w.
20. Automation
clearing house. What is cheque truncation / MICR codes in bank cheque help the
process
Automated
Clearing House
(ACH) is a secure payment transfer system that connects all U.S. financial institutions. The
ACH network acts as the central clearing facility for all Electronic Fund
Transfer (EFT) transactions that occur nationwide, representing a crucial link
in the national banking system. It is here that payments linger in something
akin to a holding pattern while awaiting clearance for their final banking
destination. Scores of financial institutions transmit or receive ACH entries
through ACH operators such as the American Clearing House Association, the
Federal Reserve, the Electronic Payments Network, and Visa.
Here
are the 4 major benefits of ACH processing: 1 - Quicker access to funds 2 - More
convenient 3
- More cost-effective 4 - Easy recurring payments:
27. ATM? Operation of ATM in connection with
online, offline systems
The
automatic teller machine (ATM), used by banks and customers for a variety of
functions, was patented in 1939, but failed initially due to limited
functionality. Something more similar to the modern ATM emerged on the streets
of London in
1967, introducing a new era of banking convenience. The functions of ATM
machines include:
Below are the steps as to how it
works: * Customer visits the ATM and inserts his card into the machine * ATM
reads the magnetic stripe to identify the user * ATM prompts the user to enter
his identification pin number * If the user enters an incorrect pin, the
transaction is cancelled and the card is returned * If the user enters the
correct pin, the machine shows him a menu of operations like withdrawal,
deposit, balance inquiry etc. * User chooses his option - Ex: Withdraw cash *
Machine connects to the bank database to check if the user has sufficient
balance in his account to successfully complete the withdrawal transaction * If
so, the machine dispenses cash that the user asked for * Machine updates users
account with the withdrawal and updates the balance accordingly * Machine
returns the card and a receipt advise on the transaction just performed * User
takes his card and leaves the ATM
*
Withdrawals, Deposits, Balance
Inquiries, Account Transfers, Stamp Purchases.
22. Digital
signature? How does it ensure that data are genuine
A
digital signature (not to be confused with a digital
certificate) is an electronic signature that can be used to
authenticate the identity of the sender of a message or the signer of a
document, and possibly to ensure that the original content of the message or
document that has been sent is unchanged. Digital signatures are easily
transportable, cannot be imitated by someone else, and can be automatically
time-stamped. The ability to ensure that the original signed message arrived
means that the sender cannot easily repudiate it later. Importance: 1) Digital signatures make it easier to prove your
fiscal compliance 2) Digital signatures make it easier to provide trade law
evidence 3) Think about your reputation and responsibility: a customer-centric
professional 4) To overcome acquisition fraud: ghost invoices 5) Return on
investment
23. BCD,
ASCII and Unicode systems
Binary coded
decimal (BCD) is a system of writing
numerals that assigns a four-digit binary
code to each digit 0 through 9 in a decimal (base-10)
numeral. The four-bit BCD
code for any particular single base-10 digit is its representation in binary
notation, as follows: 0 = 0000, 1 = 0001, 2 = 0010, 3 = 0011, 4 = 0100, 5 =
0101, 6 = 0110, 7 = 0111, 8 = 1000, and 9 = 1001
Numbers larger than 9, having two or more digits in the
decimal system, are expressed digit by digit. For example, the BCD rendition of
the base-10 number 1895 is 0001 1000 1001 0101
ASCII: Acronym for
the American Standard Code for Information Interchange.
Pronounced ask-ee,
ASCII is a code for representing English characters as
numbers, with each letter assigned a number from 0 to 127. For example, the
ASCII code for uppercase
M is
77. Most computers
use ASCII codes to represent text,
which makes it possible to transfer data from one computer to
another.
Unicode is A standard for
representing characters
as integers. Unlike ASCII, which uses 7 bits for each character,
Unicode uses 16 bits, which means that it can represent more than 65,000 unique
characters.
24. Describe
the stages of software development life-cycle
1.
Planning: 2. Analysis: 3. Design: 4. Development & Implementation: 5.
Testing: 6. Maintenance:
25. Interbank
and inter branch reconciliation? Describe the use of computers in inter branch
reconciliation
Bank reconciliation is a process
that explains the difference between the bank balance shown in an
organization's bank statement, as supplied
by the bank, and the corresponding amount shown in the organization's own accounting
records at a particular point in time.
Inter-Branch
Reconciliation
is an important back-office function for Banks and its significance cannot be
more emphasized in today's expanding world of banking. As commercial activities
and money involved grow in magnitude, co-ordination between activities of all
branches becomes a daunting task.
31. Computer? Types of computer based on capacity
and performance
Computers are machines that are manually
programmed to perform calculations and tasks that range in complexity, scale
and range. Not all computers are similar; they differ in capabilities, size,
price and usability, and are designed to meet the diverse needs of a variety of
end users---nuclear scientists, waste water engineers, financial consultants,
students and homeowners. * Super
Computers * Mainframe Computers * Mini Computers * Micro Computers
Super Computers: These computers can process billions of instructions per
second. Normally, they will be used for applications which require intensive
numerical computations such as stock analysis, weather forecasting etc.
Mainframe Computers: Mainframe computers can also process data at very high
speeds vi.e., hundreds of million instructions per second and they are also
quite expensive. Normally, they are used in banking, airlines and railways etc
for their applications.
Mini: Mini computers are lower to mainframe computers in terms of
speed and storage capacity. They are also less expensive than mainframe
computers. Some of the features of mainframes will not be available in mini
computers.
Micro
Computers: The invention of microprocessor
(single chip CPU) gave birth to the much cheaper micro computers. They are
further classified into * Desktop
Computers * Laptop Computers * Handheld Computers(PDAs)
26. ICT
audit?/ What is audit trail? Usefulness
the ICT audit in banking operation
Auditing involves establishing an organization’s
current ICT capacity- what hardware and software an organization has, what
skills the workers have etc. An audit trail can be either a paper or electronic
trail that provides documented history of a transaction in a company. An audit
trail allows an auditor to trace the financial data from general
ledger to the source document (invoice, receipt, voucher, etc.).
Usefulness: 1) To
make the most of volunteers' time it is better if a project is properly
defined, rather than having a volunteer turn up for a specific job and find out
that the scope of the work is wider or has additional problems. 2) It is also
important that ICT help given be used sustainably by an organization. This
means that a project should be well defined and the organization should know
what skills it will need to have/acquire in order to make the most of completed
work. 3) Finally, it is useful if an organization has had some help considering
what information it wishes to make available to the community it serves and in
what format.
29. SWIFT and its use in banking
application
The Society for Worldwide Interbank Financial
Telecommunication provides a network that enables financial institutions
worldwide to send and receive information about financial transactions in a
secure, standardized and reliable environment. The majority of international
interbank messages use the SWIFT network. SWIFT transports financial messages
in a highly secure way but does not hold accounts for its members and does not
perform any form of clearing or settlement. SWIFT does not facilitate funds
transfer; rather, it sends payment orders, which must be settled by
correspondent accounts that the institutions have with each other. Each financial
institution, to exchange banking transactions, must have a banking relationship
by either being a bank or affiliating itself with one (or more) so as to enjoy
those particular business features. SWIFT hosts an annual conference every year
called SIBOS which is specifically aimed at the Financial Services industry.
30. Discuss
online processing and batch processing
Online Processing or Interactive: Definition: Data is processed immediately while it is
entered, the user usually only has to wait a short time for a response. (ex.
games, word processing, booking systems). Interactive or online processing
requires a user to supply an input. Advantages:
Interactive or online processing enables the user to input data and get the
results of the processing of that data immediately.
Batch processing: Definition:
To process a large set of data in a specific way, automatically, without
needing any user intervention. The data is first collected, during a work day,
for example, and then batch-processed, so all the collected data is processed
in one go. This could happen at the end of the work day, for example, when
computing capacities are not needed for other tasks. Advantages: It is possible to perform repetitive tasks on a large
number of pieces of data rapidly without needing the user to monitor it.
Real time Processing: Real
time processing is a subset of interactive or online processing. Input is
continuously, automatically acquired from sensors, for example, which is
processed immediately in order to respond to the input in as little time as
possible. After the system is finished responding it reads the next set of
input data immediately to process that. This system doesn't need a user to
control it, it works automatically. Advantages:
Whenever there is a rapid reaction required due to some sort of change, real
time processing can take action without the need of a user or long processing
time beforehand.
33. What do
you understand by storage device? Name various storage devices
A
data storage device is a device
for recording
(storing) information.
Recording can be done using virtually any form of energy,
spanning from manual muscle power in handwriting,
to acoustic vibrations in phonographic recording, to electromagnetic energy
modulating magnetic tape and optical
discs. There are two storage devices used
in computers; a primary storage device such as
computer RAM
and a secondary storage device such as a
computer hard drive.
The secondary storage could be a removable,
internal,
or external
storage.
There are some additional examples
of storage devices that are used with computers. 1) Floppy diskette 2) CD-ROM disc 3) CD-R and CD-RW disc 4) Cloud storage
5) DVD-R, DVD+R,
DVD-RW, and DVD+RW disc 6) Jump drive
and USB flash drive 7) Hard drive
8) LS-120 9) Tape cassette 10) Zip diskette
32. Describe
the classification of computers on the basis of construction and working
principles
Analog: An analog computer (spelt analogue in British English) is a form of computer that uses continuous physical phenomena such as electrical, mechanical, or hydraulic quantities to model the problem being solved
Digital Computer: A computer that performs calculations and logical operations with quantities represented as digits, usually in the binary number system
Hybrid (Analog + Digital): A combination of computers those are capable of inputting and outputting in both digital and analog signals. A hybrid computer system setup offers a cost effective method of performing complex simulations.
34. Describe
the recording method in compact disk
A
molded plastic disc containing digital data that is scanned by a laser
beam for the reproduction of recorded sound
and other information. Since its commercial introduction in 1982, the audio CD
has almost completely replaced the phonograph disc for high-fidelity recorded
music. Co invented by Philips Electronics N.V. and Sony Corporation in 1980,
the compact disc has expanded beyond audio recordings into other
storage-and-distribution uses, notably for computers (CD-ROM) and entertainment
systems (videodisc)
.
36. What is
computer network? Describe various networks
A
computer network is a group of computer systems and other computing hardware
devices that are linked together through communication channels to facilitate
communication and resource-sharing among a wide range of users. Networks are
commonly categorized based on their characteristics.
Different types of networks are distinguished
based on their size, their data transfer speed, and their reach. There are
usually said to be three categories of networks: 1) LAN
2) MAN
(metropolitan) 3) WAN
(wide area network)
LAN: 1) Limited
geographic operation 2) High speed data transfer rates 3) Full time
connectivity to local services 4) Generally lower in cost than a WAN 5) Cabling
is primary transmission medium
WAN: 1) Referred
as a large network. 2) Location is defined as any connection from one LAN to
another 3) Point-to-Point connections.4) Group of routers/switches connected
not owned by one company.5) Each groups' administrators maintain their part of
the connections.
38. LAN, MANs, WAN and internet, intranet
A local area network (LAN) supplies networking capability to
a group of computers in close proximity to each other such as in an office
building, a school, or a home. A LAN is useful for sharing resources like
files, printers, games or other applications. A LAN in turn often connects to
other LANs, and to the Internet or other WAN.
MANs (Metropolitan Area Networks) connect
multiple geographically nearby LANs to one another at high speeds. Thus, a MAN
lets two remote nodes communicate as if they were part of the same local area
network. A MAN is made from switches or
routers connected to one another with high-speed links (usually fibre optic cables).
A wide area network (WAN) is a geographically dispersed
telecommunications network.
The term distinguishes a broader telecommunication structure from a local area
network (LAN).
A wide area network may be privately owned or rented, but the term usually
connotes the inclusion of public (shared user) networks. An intermediate form
of network in terms of geography is a metropolitan area network (MAN).
The Internet is a global
system of interconnected computer networks that use
the standard Internet protocol suite (TCP/IP) to serve billions of users
worldwide. It is a network of networks
that consists of millions of private, public, academic, business, and
government networks, of local to global scope, that are linked by a broad array
of electronic, wireless and optical networking technologies.
Intranet is the generic term for a collection of private computer
networks within an organization. An intranet uses network technologies as a
tool to facilitate communication between people or work groups to improve the
data sharing capability and overall knowledge base of an organization's
employees.
35. Back-up
strategy of a core banking system
A backup strategy that will ensure
that your memories and other important data can survive even the most
devastating of accidents. Be sure to keep in mind these three important
concepts:
1)
Schedule backups. Backups aren't useful unless they occur regularly. You must
back up your data on a timely schedule. 2)
Ensure redundancy. Be sure
to make one or more copies of your data. The best backup, probably, is a second
hard disk, but you should also be copying your data to removable media such as
writeable CD or DVD. 3) Go off-site. Keep a second backup of your data off-site, in a separate
physical location. This location can be a family member's or friend's house, a
bank safety deposit box, a drawer at work, and so on. It just can't be inside
your house.
39 Importance
of Business Continuity Plan(BCP) for a bank
Business continuity planning
involves developing a practical plan for how your business can prepare for, and
continue to operate after an incident or crisis. A business continuity plan
will help you to:
- identify and prevent risks where possible
- prepare for risks that you can't control
- Respond and recover if a risk (e.g. an incident or crisis) occurs.
Preparing a business continuity
plan will help your business recover quickly if an incident does happen. You
may not be able to predict every kind of incident that could threaten your
business, but you can develop a plan that covers a range of incidents. To get
the most out of a business continuity plan, you should include a schedule for
testing and updating it, making sure you take into account any changes to your
business, your industry, or the location you operate in. This guide explains
how to develop, test and update a business continuity plan for your business.
41. Functions of data center (DC) and Disaster Recovery Site (DRS)
Functions of data center: a) Operations – Operations staff monitors the network and critical
applications. Services such as running application batch jobs and printing are
also provided. b) Security - A
Data Center firewall is provided to prevent unauthorized access to restricted
servers. C) Hosting - The Data
Center provides three options for server hosting: Co-Location, ITS Hosting, and
Virtual Server Hosting e) Load Balancing
- The Data Center Networking Team provides IP Load Balancing Services
on certain specific Data f) Center segments. Distributes a system’s
workload via load balancing aids in optimizing resources, and may improve
response times and availability. G) Backups
– Tapes are stored securely on-site and off-site.
Functions of Disaster Recovery Site: a) Disaster recovery plans ensure that legislation and
compliance issues are adhered to. B) Prevent financial loss. C) A disaster
recovery program can prevent loss of credibility and goodwill. D) It will
ensure that staff will continue to be paid. There is nothing as de-motivating
to your personnel as not being paid! E) It will ensure that the organization’s
services and production can continue. F) A disaster recovery program will
prevent the loss of important operational information.
42. Discuss physical and environmental setup
for Data center
Physical data center security
is largely the same worldwide, barring any local regulatory restrictions: that
is, to keep out the people you don’t want in your building, and if they do make
it in, then identify them as soon as possible.
Physical Security Measures: a) On-premise security guards b) Security systems on the
building exterior: cameras, false entrances, vehicle blockades, customized
parking lot designs, bulletproof glass/walls and unmarked buildings c) Biometric
systems, including palm scanners d) Numerous security cameras with digital
recorders e) Portals and person-traps that authenticate only one person at a
time.
The Environmental Data Center
(EDC) is a geographic information system (GIS) laboratory in the URI Department
of Natural Resources Science, College
of Environmental and Life
Sciences (CELS).
The main objectives of the Environmental Data Centre
on Waste are to: a) Provide robust data, indicators
and other relevant information to support the assessment of policy
effectiveness; b) Manage data, perform quality assurance, and coordinate
data and information managed by other bodies c) Be the central entry point for
reporting of data under European Union legislation on waste; d) Be the
reference point for answering specific policy questions related to information
on waste and the associated environmental impacts; and e) Co-operate with DG
Environment, the JRC and the EEA to develop and coordinate the necessary
methodologies to produce statistical data, information and indicators on the
environmental impacts of waste generation and waste management, within a life
cycle perspective.
43. Plastic money? Discuss various forms of plastic money
Plastic
money are the alternative
to the cash or the standard 'money'. Plastic money is the generic term for all types of bank
cards, credit cards, debit cards, smartcards, etc. They are the alternative to
the cash or the standard 'money'. Plastic money is used to refer to the credit
cards or the debit cards that we use to make purchases in our everyday life.
The various Plastic cards include ATM cards, Debit Card,
ATM cum Debit Card, Credit Cards, Smart Card, Charge Cards, Co-branded cards,
add on cards and so on
1* Debit Cards
- When a person uses a debit card, the money is directly debited from the
person’s bank account. Thus, a person can use the debit card till he has
sufficient balance in his bank account as there is no deferred payment. Debit
cards can also be used in Automated Teller Machines (ATMs) to withdraw cash. 2 * Credit cards - A credit card is a
type of plastic money using which a person can purchase now and pay later. When
the person swipes his credit card for making payment, the amount does not get
debited to his bank account. It is paid by the credit card company and comes to
the person in the form of a monthly statement. 3* Smart Cards - A smart card consists of an electronic chip used
to store cash. While making a payment, the exact amount is deducted from the
smart card. This card does not require any authorization like signature or
identification. 4. *Cash Cards - These cards cannot be used to make payments or
buying things. They are only useful for withdrawing cash from machines, known
as ATMs. 5. * Prepaid Cash Cards -
These cards are similar to credit cards except that there are no monthly
statements. It can be used till there is credit in the card but does not need a
bank account. 6* Store Cards - Some
stores have their own cards which can be used at that particular store or group
of stores. They can be used like credit cards in the particular stores but are
accompanied with high interest rates. 7*
Loyalty Cards - Loyalty cards are issued by retailers as a reward to
frequent buyers. It entitles the cardholders to a certain percentage of
discounts every time they purchase from that retailer.
44. E-commerce? Banking sector play an importance
role of e-commerce
The buying
and selling
of products
and services
by businesses and consumers
through an electronic medium,
without using any paper documents.
E-commerce
is widely considered the buying and selling of products over the internet,
but any transaction
that is completed solely through electronic measures
can be considered e-commerce. E-commerce is subdivided into three categories: business
to business or B2B (Cisco), business
to consumer or B2C, and consumer
to consumer or C2C (eBay).
The Internet has opened up a new horizon for trade and
commerce, namely electronic commerce (e-commerce). E-commerce entails the use
of the Internet in the marketing, identification, payment and delivery of goods
and services. This paper highlights the status, statutes, potential and
constraints to e-commerce development in Bangladesh. Major legal, regulatory
and institutional constraints to e-commerce are identified. The paper also
lists specific policy changes aimed at bringing improvements to the legal and
regulatory environment affecting e-commerce.
E-commerce through Internet, e-mails, websites, and other
facilities, enables a businessman to be linked with every corner of the world,
and thus opens up greater opportunities in the world market. However, the steps
taken towards trade liberalization in Bangladesh become ineffective as a result
of poor governance and weak infrastructure. Even simple day-to-day transactions
with government bodies are characterized by unnecessary delays, obstructionism
by public sector officials and demands for illegal payments. In addition to
corruption, trade related regulations that are vague, contradictory and
improperly implemented aggravate the situation.
46. Settlement procedure for online transaction
in EFT
For net banking:
Funds are transferred to merchant’s bank account on T+2 days (Where T is the
transaction date)
T+0: Customer’s bank A/C is debited
and fund are credited to Techprocess account
T+1 day: Bank submits the
reconciliation file and techprocess updates the status. Funds are transmitted
to techprocess’ pool account.
T+2 days: Funds are transferred to merchant’s
bank account
For Visa/ Master card:
Funds are transferred to merchant’s bank account on T+1 day (Where T is the
transaction date)
T+0: Customer’s bank A/C is debited
and fund are transferred to the VISA/Master Card account with the transaction
processing bank
T+1 day: Funds are transferred to merchant’s
bank account
For Cash Card:
Funds are transferred to merchant’s bank account on T+2 days (Where T is the
transaction date)
T+0: Customer’s Cash Card A/C is
debited
T+1 day: Respective cash Card
Company transfers the funds to techprocess’ ‘pool account’.
T+2 days: Funds are transferred to merchant’s
bank account
45. Advantages of e-commerce’s
** Faster buying/selling procedure,
as well as easy to find products. ** Buying/selling 24/7. ** More reach to
customers, there is no theoretical geographic limitations. ** Low operational
costs and better quality of services. **No need of physical company set-ups. **
Easy to start and manage a business. ** Customers can easily select products
from different providers without moving around physically.
47. Briefly
discuss on electronic fund transfer system. What do you know about BEFTN
Electronic funds transfer (EFT) is the electronic exchange,
transfer of money from one account to another, either within a single financial institution or across multiple
institutions, through computer-based systems. The term covers a number of
different concepts: ** Wire transfer via an international banking
network **Cardholder-initiated transactions, using a payment card
such as a credit
or debit card
**Direct
deposit payment initiated by the payer ** Direct debit
payments, sometimes called electronic checks, for which a business debits the
consumer's bank accounts for payment for goods or services
** Electronic bill payment in online
banking, which may be delivered by EFT or paper check ** Transactions
involving stored value of electronic
money, possibly in a private
currency ** Electronic Benefit Transfer
Advantages of using the Electronic Fund Transfer: ** It is easy and convenient
** It is fast and secure. **It is efficient and less expensive than paper
cheque payments and collections.
Disadvantages of using the Electronic Fund Transfer: ** If you
enter the target account number incorrectly, there is no way to reverse the
transaction since the bank would process the transaction under the belief
that the information you provided is accurate. ** Once an amount is
transferred, the bank cannot reverse a transaction.
BEFTN: The Bangladesh Electronic Funds Transfer Network (BEFTN)
will operate as a processing and delivery centre providing for the distribution
and settlement of electronic credit and debit instruments among all participating
banks. This Network will operate in a real ‐ time batch processing mode. Transaction
Files received from the banks during the day will be processed as
they are received to ensure that if there are conditions that would Result
in A file or batch reject the banking company will have Sufficient Time
To Fix The errors and resubmit the file. All payment transactions will be calculated
into a single multilateral netting figure for each individual bank. Final
settlement will take place using accounts that are maintained
with Bangladesh Bank.
49. How security of data can be ensured
though encryption and decryption
Encryption is the process of translating plain
text data into something that appears to be random and meaningless. Decryption
is the process of converting ciphertext back to plaintext. To encrypt more than
a small amount of data, symmetric encryption
is used. A symmetric key is used
during both the encryption and decryption processes. To decrypt a particular
piece of ciphertext, the key that was used to encrypt the data must be
used. The goal of every encryption
algorithm is to make it as difficult as possible to decrypt the generated
ciphertext without using the key. If a really good encryption algorithm is
used, there is no technique significantly better than methodically trying every
possible key. For such an algorithm, the longer the key, the more difficult it
is to decrypt a piece of ciphertext without possessing the key.
There are a
few types of algorithm for data encryption. The most popular is the Data Encryption Standard. DSS is a
previously predominant algorithm for the encryption
of electronic data. It was highly influential in the advancement of modern cryptography
in the academic world.
i)
Smart card
A smart card is a plastic card
about the size of a credit card, with an embedded microchip
that can be loaded with data, used for telephone calling, electronic cash
payments, and other applications, and then periodically refreshed for
additional use. Currently or soon, you may be able to use a smart card to:
- Dial a connection on a mobile telephone and be charged on a per-call basis
- Establish your identity when logging on to an Internet access provider or to an online bank
- Pay for parking at parking meters or to get on subways, trains, or buses
- Give hospitals or doctors personal data without filling out a form
- Make small purchases at electronic stores on the Web (a kind of cybercash)
- Buy gasoline at a gasoline station
ii)
Website
A website is a collection of web
pages (documents that are accessed through the Internet), such as the one
you're looking at now. A web page is what you see on the screen when you type
in a web address, click on a link, or put a query in a search engine. A web
page can contain any type of information, and can include text, color,
graphics, animation and sound. When someone gives you their web address, it
generally takes you to their website's home page, which should introduce you to
what that site offers in terms of information or other services.
Generally, people look at websites
for two primary reasons:
1. To find information they need.
This could be anything from a student looking for pictures of frogs for a
school project, to finding the latest stock quotes, to getting the address of
the nearest Thai restaurant.
2. To complete a task. Visitors may
want to buy the latest best-seller, download a software program, or participate
in an online discussion about a favorite hobby.
iii)
CHIPS
CHIPS. A
privately-held transferal system that allows banks to settle transactions with
each other electronically. It primarily deals with large-value fund transfers, with
daily totals of
more than $1 trillion. CHIPS is used for transactions that are less time-sensitive,
contrary to the Federal
Reserve Wire Network, and has fewer members making transfers. It settles transactions
by netting. For
example, if Bank of America is to pay American
Express US$1.2 million, and American Express is to pay Bank of America
$800,000, the CHIPS system aggregates this to a single payment of $400,000 from
Bank of America to American Express — only 20% of the $2 million to be
transferred actually changes hands. Only the largest banks dealing in U.S.
dollars participate in CHIP and Smaller banks have not found it cost effective
to participate in CHIPS.
Spam and Spy wore
Spam is most often considered to be
electronic junk mail or junk newsgroup postings. Some people define spam even
more generally as any unsolicited email. However, if a
long-lost brother finds your email address
and sends you a message, this could hardly be called spam, even though it is
unsolicited. Real spam is generally email advertising for some product sent to
a mailing list
or newsgroup.
Any software
that covertly gathers user information through the user's Internet
connection without his or her knowledge, usually for advertising purposes.
Spyware applications
are typically bundled
as a hidden component of freeware
or shareware
programs that can be downloaded
from the Internet. product when they install something else.
iv)
Any brunch banking
Any Branch Banking a facility for
our customers to operate their account from any of our networked branches. The
branch where the customer maintains his account is the base branch and the
branch from where he carries out his transactions is referred as the remote
branches. Any Branch Banking facility is available in ALL branches of Corporation
Bank. FACILITIES available under ABB: ** Cash Withdrawal ** Cash Deposit **
Fund Transfers ** Purchase of Demand Drafts / Pay Orders ** Deposit of Local
Cheques ** Stop Payment facility at Remote Branches: You can give instructions
to Stop Payment of cheques issued by you at any of our branches by simply
giving a written request. You can also revoke the stop payment instruction
issued by you earlier. ** Repayment to Loan accounts: Now you can make
repayments to your loans such as Home Loan, Vehicle Loan, etc. held with your branch
through any of the Corp Bank Branches by Cash / Local cheque.
v)
Online CIB
Bangladesh
Bank (BB) will start providing online information of its Credit Information
Bureau (CIB) reports to banks and non-banking financial institutions (NBFIs)
from July 19, which will make faster the lending services and will eventually
cut the cost of doing business. BB Governor Dr Atiur Rahman will inaugurate the
online service at the central bank’s headquarters in the capital city, bringing
an end to the manual, time consuming and cumbersome process of sharing the
important credit information among banks and financial institutions.
All the 47 banks and 29 NBFIs of the country will be able to collect the online CIB reports on July 19 and onwards. The banks and financial institutions would also be able to collect the CIB reports from the central bank physically if they want, the central bank officials said.
All the 47 banks and 29 NBFIs of the country will be able to collect the online CIB reports on July 19 and onwards. The banks and financial institutions would also be able to collect the CIB reports from the central bank physically if they want, the central bank officials said.
vi)
ExtranetAn extranet is a private network that uses Internet
technology and the public telecommunication system to securely share part of a
business's information or operations with suppliers, vendors, partners,
customers, or other businesses. An extranet can be viewed as part of a
company's intranet
that is extended to users outside the company. It has also been described as a
"state of mind" in which the Internet is perceived as a way to do
business with other companies as well as to sell products to customers.
vii)
Data Warehouse
A data warehouse is a relational
database that is designed for query and analysis rather than for transaction
processing. It usually contains historical data derived from transaction data,
but it can include data from other sources. It separates analysis workload from
transaction workload and enables an organization to consolidate data from
several sources. Benefits of a data
warehouse
- Maintain data history, even if the source transaction systems do not.
- Improve data quality
- Present the organization's information consistently.
- Provide a single common data model for all data of interest regardless of the data's source.
- Restructure the data so that it makes sense to the business users.
- Add value to operational business applications, notably customer relationship management systems.
48. What are the benefits of online banking
*Customer service * Higher Interest Rates * No fees *
No Minimums * Less Access * Sales * Incentives * you
don't have to wait in line. * You don't have to plan your day around the bank's
hours. * You can look at your balance whenever you want, not just when you get
a statement. * Online banking allows you to watch your money on a daily basis
if you want to. By keeping close tabs on your funds, you'll always be aware of
what's happening in your bank account. * For those experienced spenders, this
option is far more appealing than the sudden discovery that you're broke! *
It's also helpful to watch how much interest you're gathering on investments
and savings or what service charges you have incurred.
Disadvantages
Internet
account: You need to get an account with
an Internet
Service Provider (ISP) which may be another hectic experience. Security concern: Even though online
banking sites are heavily encrypted, with the developing technology, it’s hard
to rule out the "hackers" who may access your bank accounts. Switching banks: This can be more
cumbersome online than in person. Money
usage: You can’t spend your money from the online bank
account as you wish, in the end; you will need to go to an ATM to
withdraw money for usage. Technical
breakdowns: As with all technologies, online banking websites sometimes
go down. If this happen when you closed your local bank or credit card
accounts, you will definitely go penniless.
Comments
Post a Comment