Skip to main content

Computer related information



Computer related information

1.        features of different generation of computers with example

The computer has evolved from a large-sized simple calculating machine to a smaller but much more powerful machine. Each generation of computer is designed based on a new technological development, resulting in better, cheaper and smaller computers that are more powerful, faster and efficient than their predecessors.
First Generation (1940 to 1956): The first generation of computers used vacuum tubes for circuitry and magnetic drums for memory. The input to the computer was through punched cards and paper tapes. The output was displayed as printouts. The instructions were written in machine language. The first generation computers could solve one problem at a time. The computation time was in milliseconds.
Second Generation (1956 to 1963): Transistors replaced the vacuum tubes of the first generation of computers. Transistors allowed computers to become smaller, faster, cheaper, energy efficient and reliable. The second generation computers used magnetic core technology for primary memory. They used magnetic tapes and magnetic disks for secondary storage
Third Generation (1964 to 1971): The third generation computers used the Integrated Circuit (IC) chips. In an IC chip, multiple transistors are placed on a silicon chip. Silicon is a type of semiconductor. The keyboard and monitor were used to interact with the third generation computer, instead of the punched card and printouts. Operating system allowed different applications to run at the same time. High-level languages were used extensively for programming, instead of machine language and assembly language. The computing time was in nanoseconds

Fourth Generation (1971 to present): They use the Large Scale Integration (LSI) and the Very Large Scale Integration technology. Thousands of transistors are integrated on a small silicon chip using LSI technology. This generation also saw the development of pointing devices like mouse, and handheld devices. The computing time is in picoseconds. Example: The Intel 4004 chip was the first microprocessor.

Fifth Generation (Present and next): The fifth generation computers use Super Large Scale Integrated (SLSI) chips that are able to store millions of components on a single chip. These computers have large memory requirements. This generation of computers uses parallel processing which results in faster processing speed. The Intel dual-core microprocessor uses parallel processing. The fifth generation computers are based on Artificial Intelligence (AI).


2.                 Discuss the capabilities and limitations of computers
i)                     The computer processes information very fast ii)The computer gives accurate result iii) The computer store large amount of data and information iv) The computer enables one to restore or bring back any of his works v) It is automatics vi) The computer can do two or more things at a same time vii) The computer can be improved and upgraded Limitations: i) The computer can only do what you tell it to do ii) It cannot generate information on its own iii) The computer will give you wrong information if you feed it with wrong data iv) The computer cannot correct wrong instruction
ii)                    
3.             Impact of computerization on modern society, Modern society cannot run without computer explain
It is the age of Science & Technology. It is Science that makes our life quicker and easier. Computer is also the invention of Science. Modern societies are more civilized & developed then ancient society. In modern society the people are busy but their lives are quicker & easier by the use of different advance technology. Hence, in modern society's computer have become parts of their life.
Computers are used in every aspect of life. It is used by an engineer in there project work. It is also used by a doctor in the medical field. It is also used in the field of agriculture and education. It also helps us to enlighten us and deal with the daily needs. It also helps the businessman to know the profit & loss & is also used in the bank to keep accurate account. It is also used in the field of transportation & also in the railway. It helps the people to keep connection with their friends by via of e-mail & internet. Scientist also used it in the field of aeronautics' & in other research programmed. So, it is the means of communication & is most useful invention of the 21st century.
Computer is used in every aspect of life & it makes our work easier, quicker & convenient but it is expensive. So, it makes the lifestyle of society expensive. It decreases the manpower & creates the unemployment problem in the society. It needs a lot of electricity & power to run. It makes sick & lazy due to sitting in the computer a long time. So, the computer has become a part of our life.
4.             CPU of a computer/ block diagram of a micro-computer and describe its control unit

A computer can process data, pictures, sound and graphics. They can solve highly complicated problems quickly and accurately. A central processing unit contains the following- Input: Computer receives data and instructions through the Input Unit.• The input unit consists of one or more input devices.• Input devices include: Keyboard, Mouse, Joystick, Scanner etc. Storage: The process of saving data and instructions permanently is known as storage. The data is first stored in the storage unit for faster access and processing. This storage unit or the primary storage of the computer system is designed to do the above functionality. It provides space for storing data and instructions. The storage unit performs the following major functions: • All data and instructions are stored here before and after processing. • Intermediate results of processing are also stored here. Processing: The task of performing operations like arithmetic and logical operations is called processing. The Central Processing Unit (CPU) takes data and instructions from the storage unit and makes all sorts of calculations based on the instructions given and the type of data provided. It is then sent back to the storage unit. Output: Computer provides information and results of computation to the outside world through the Output Unit. The output unit consists of one or more output devices. Output devices include: Monitor, Printer. Control: It instructs the input unit, where to store the data after receiving it from the user. It controls the flow of data and instructions from the storage unit to ALU. It also controls the flow of results from the ALU to the storage unit. The control unit determines the sequence in which computer programs and instructions are executed. The control unit is also capable of shutting down the computer when the power supply detects abnormal conditions.








 













5.             Functions of an operating system. name of modern OS

An operating system is a group of computer programs that coordinates all the activities among computer hardware devices. It is the first program loaded into the computer by a boot program and remains in memory at all times.
1) Booting the computer 2) To interpret the commands executed by the user. 3) To handle disk input/output settings. 4) Loaded in the memory at boot up and remain in the memory at all times. 5) To provide the OS with the mechanism in order to see the additional memory. 6) Used to access the high memory area. 7) it allows the rest of the OS and its programs to interact directory with the system hardware and the system BIOS. 8) It sets particular values corresponding to the windows environment. 9) Used to run particular programs during startup. 10) Protection and security 11) Error detection 12) protection and security 13) Process communication
1) Disk Operating System (DOS) 2) Windows Operating System (Windows) 3) Unix Operating System (UNIX)

6.             Define computer hardware and software

Computer hardware refers to the physical parts of a computer and related devices. Internal hardware devices include motherboards, hard drives, and RAM. External hardware devices include monitors, keyboards, mice, printers, and scanners. The internal hardware parts of a computer are often referred to as components, while external hardware devices are usually called peripherals. Together, they all fall under the category of computer hardware
Computer software is a general term that describes computer programs. Software can be difficult to describe because it is "virtual," or not physical like computer hardware. Software is often divided into two categories.  Systems software includes the operating system and all the utilities that enable the computer to function. Applications software includes programs that do real work for users. For example, word processors, spreadsheets, and database management systems fall under the category of applications software.
7.             What are the various types of software?

1. System Software: System software or operating system is the software used by the computer to translate inputs from various sources into a language which a machine can understand. Basically, the OS coordinates the different hardware components of a computer. There are many OS in the market. The most popular Os are from the stable of Microsoft.
2.  Application software: A normal user rarely gets to see the operating system or to work with it. But all of us are familiar with application software which we must use to interact with a computer. Popular examples of application software are the Microsoft office suite which includes Word, Excel and PowerPoint. The anti-virus is an application and so is the Media player.
3. Programming languages: Programmers use the programming software to develop the programming languages necessary to run computer software. Compliers, interpreters, linkers and text editors are some of the basic tools used in programming software.

8.  Number system? Briefly the number system used by compute

A numeral system is a writing system for expressing numbers, that is, a mathematical notation for representing numbers of a given set, using digits or other symbols in a consistent manner. Any system using a range of digits organized in a series of columns or "places" that represents a specific quantity. The most common numbering systems are decimal, binary, octal, and hexadecimal.
** The decimal numeral system has ten as its base. It is the numerical base most widely used by modern civilizations. ** In mathematics and computer science, the binary numeral system, or base-2 numeral system, represents numeric values using two symbols: 0 and 1. Numbers represented in this system are commonly called binary numbers. ** The octal numeral system, or oct for short, is the base-8 number system, and uses the digits 0 to 7. Octal numerals can be made from binary numerals by grouping consecutive binary digits into groups of three. For example, the binary representation for decimal 74 is 1001010, which can be grouped into (00)1 001 010 – so the octal representation is 112. ** Hexadecimal describes a base-16 number system. That is, it describes a numbering system containing 16 sequential numbers as base units before adding a new position for the next number. The hexadecimal numbers are 0-9 and then use the letters A-F.

9.             Parity bit? Difference between odd and even parity

A parity bit is a single bit added to a binary data transmission used to indicate if whether the 0's and 1's within that data transmission is an even or odd number. The parity bit is used in parity error checking to find errors that may occur during data transmission.
.i) odd parity refers to the odd number of ones in a binary code, i) even parity refers to the even number of ones in a binary code. Both the even and odd parity is used for error checking. ii) An even number can be divided by 2 evenly. Ii)  An odd number will have a remainder of 1 when divided by 2. iii) even parity number of 1s is even called even parity  iii) and or number of 1s is odd called odd parity

10.    Phishing? How can you handle phishing in internet banking?

Phishing is a fraudulent attempt, usually made through email, to steal your personal information. Phishing emails usually appear to come from a well-known organization and ask for your personal information — such as credit card number, social security number, account number or password. Often times phishing attempts appear to come from sites, services and companies with which you do not even have an account.
In order for Internet criminals to successfully "phish" your personal information, they must get you to go from an email to a website. Phishing emails will almost always tell you to click a link that takes you to a site where your personal information is requested • Firstly I’ll not open such a mail which I really doubt. • Only enter my Internet Banking through bank official websites. Never enter Internet banking via links in emails or other web pages. • I’ll not make use of public access points such as Internet cafés or any computer that is not your own when doing my banking. • Change my password and customer-selected PIN (CSP) regularly. • Be sure to install the free Rapport software to prevent a variety of online attacks, these include key loggers, screen capturing, session hijacking and spyware. • Be very careful with downloading files and attachments from these emails as these documents may contain spyware, viruses and other damaging software • Look out for masked URLs in emails, in other words URLs that look authentic. Finally to open an email I have to do the following:  The Know test, The Received test, The Expect test, The Sense test, The Virus test
11.  Elaborate UPS: An uninterruptible power supply (UPS) from Caterpillar will provide years of low maintenance protection, whether supporting critical processes or defending servers from harmful power problems. A UPS is typically used to protect computers, data centers, telecommunication equipment or other electrical equipment where an unexpected power disruption could cause injuries, fatalities, serious business disruption or data loss.

12.  Computer virus? How can we prevent it? Some antivirus

A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. Viruses can also replicate themselves. All computer viruses are man-made. A simple virus that can make a copy of itself over and over again is relatively easy to produce. Even such a simple virus is dangerous because it will quickly use all available memory and bring the system to a halt.

10 ways to avoid viruses and spyware # 1: Install quality antivirus 2: Install real-time anti-spyware protection 3: Keep anti-malware applications current 4: Perform daily scans 5: Disable auto run 6: Disable image previews in Outlook 7: Don’t click on email links or attachments 8: Surf smart 9: Use a hardware-based firewall 10: Deploy DNS protection

i) Kaspersky Anti-Virus ii)  BitDefender Antivirus iii) Trend Micro iv) Norton Antivirus/ Internet Security v) McAfee Antivirus vi) Panda Antivirus Pro vii) Norton viii) Avira  Antivirus  ix) AVG Free Antivirus  x) Avast Free antivirus

13.           What is e-governance? Describe the security measures that should be taken in e-banking procedure
E-Government refers to government's use of information technology to exchange information and services with citizens, businesses, and other arms of government. E-Government may be applied by the legislature, judiciary, or administration, in order to improve internal efficiency, the delivery of public services, or processes of democratic governance. It also refers to the citizen to government interaction including the feedback of policies. The primary delivery models are Government-to-Citizen or Government-to-Customer (G2C), Government-to-Business (G2B) and Government-to-Government (G2G) & Government-to-Employees (G2E). The most important anticipated benefits of e-government include improved efficiency, convenience, and better accessibility of public services
E-banking is defined as the automated delivery of new and traditional banking products and services directly to customers through electronic, interactive communication channels. E-banking includes the systems that enable financial institution customers, individuals or businesses, to access accounts, transact business, or obtain information on financial products and services through a public or private network, including the Internet. Customers access e-banking services using an intelligent electronic device, such as a personal computer (PC), personal digital assistant (PDA), automated teller machine (ATM), kiosk, or Touch Tone telephone. While the risks and controls are similar for the various e-banking access channels, this booklet focuses specifically on Internet-based services due to the Internet's widely accessible public network.
Secure communication: Data transmission on our site is protected by Secure Socket Layer Encryption to 128 bit, which currently represents the best standard for encrypting information transmitted on Internet. Strong authentication devices, Temporary Passwords (OTP), Digital Signature, End of work session, Data Protection on internal systems, Support for security issues, Card security, Password, PIN and Telephone security, avoid scams and hoaxes, you’ll be liable: Always remember to withdraw your card whenever you finish using an ATM. You’re liable for any money lost as a result of someone else using your card to withdraw or transfer funds.

21.           Distinguish between OMR, OCR, and MICR

MICR: MICR is a character recognition technology used primarily by the banking industry to facilitate the processing of cheques. The human readable characters are printed on documents using a magnetic ink. It stands for Magnetic Ink Character Recognition.
OMR: OMR which stands for Optical Mark Recognition is the process of gathering data with an optical scanner by measuring the reflectively of light at predetermined positions on a surface.
OCR: OCR stands for Optical Character Recognition. OCR is the recognition of printed or written text characters by a computer. It is the application software that allows a computer to recognize printed or written characters, e.g. letters, numbers, punctuation marks, and pictograms using an optical scanner for input.

14.           Phone banking and SMS banking, internet banking

Phone banking is a service provided by a bank or other financial institution, that enables customers to perform financial transactions over the telephone, without the need to visit a bank branch or automated teller machine. Phone banking times can be longer than branch opening times, and some financial institutions offer the service on a 24 hour basis. Phone banking reduces the cost of handling transactions. In Phone Bank you can do almost everything you can do at a branch:  transfer Taka, check your balance, check transactions, pay bills, manage your standing orders, cancel direct debits, and organize holiday money
SMS banking is a type of mobile banking, a technology-enabled service offering from banks to its customers, permitting them to operate selected banking services over their mobile phones using SMS messaging. The service will enable customers to check account balance, stop a cheque payment or even get statements through SMS.
Online banking (or Internet banking or E-banking) allows customers of a financial institution to conduct financial transactions on a secure website operated by the institution, which can be a retail or virtual bank, credit union or building society. Services: Very convenient, unlimited service day and night. No time constraint. Easy to access via PC, Easy way of payment, SmartHigher interest rate, Easy transaction, efficient and effective etc


15.           Described about electronic payment system

Electronic Payment Systems (EPS) is one of the nations’ oldest and largest, privately held merchant service providers of electronic payment products to businesses and ISO’s. Uniquely positioned in the payments industry, EPS provides a comprehensive suite of merchant processing solutions, the highest level of data security, and expertise to drive revenue and profitability for all business types including retailers, restaurants, hotels, automotive, healthcare, service businesses, e-Commerce and non-profit organizations.

EPS Electronic Payment Processing Advantages:

·         Security and Peace of Mind: EPS continues to be on the forefront of adopting new data security measures including the implementation of Payment Card Industry Data Security Standards before it was a requirement.

·         Cash flow: We provide access to funds within 48 hours at rates which are among the best in the industry.

·         Service: Talk to a real person! In-house customer service and technical support is available 24/7/365 - meaning your business never has to experience a down time.


16.           How computer can help investment management for a bank

Investment management is about managing money by investing it in a variety of asset classes including equities (or shares) and bonds. The main roles within investment management are analyst and investment manager. As you might expect, the role of an analyst is to analyze stocks, taking a view on their future outlook and circulating research internally. This could entail meeting with company management and looking at economic data and market trends.
An investment manager will then be responsible for investing clients’ money in a portfolio of stocks. Investment managers will rely heavily on the in-depth research done by analysts when deciding how to invest. At the same time, they must take overall responsibility for how the fund is constructed, looking at the bigger picture and considering issues such as asset allocation. Many investment managers carry on doing hands-on research to avoid becoming too distant from company analysis.

17.           Name 4 core banking software? Discuss the use of computer in cash management

Core Banking is a general term used to describe the services provided by a group of networked bank branches. Bank Customers may access their funds and other simple transactions from any of the member branch offices at REAL TIME. Strategic Information Technology defines core banking software as the functionality required to run a bank or credit union. Core banking includes: @Retail Banking @ Lines of Credit & Segregated Lines of Credit @ Loans @ Mortgages @ Web banking @ Investments @ Clearing @ Term Deposits @ Accounting ... and more. In addition, there are many third party interfaces that a core banking system must accommodate. These include:  @ CANNEX @  ATM & ABM @ FundSERV @ Telpay @ Cheque Clearing @ Equifax @ Trans Union @ Point of Sale (POS) @ Loan Insurance @
18.           Operating system, DBMS, Application software

OS: An operating system is a collection of software that manages computer hardware resources and provides common services for computer programs. The operating system is a vital component of the system software in a computer system. @ Process Management @ Resource Management @ File management @ Communication Management @ Security Management @ Memory Management
A database management system is a set of software programs that allows users to create, edit and update data in database files, and store and retrieve data from those database files. Data in a database can be added, deleted, changed, sorted or searched all using a DBMS. The Database Management System performs the following functions. 1) Data Dictionary Management 2) Data Storage Management 3) Data Transformation and Presentation 4) Security Management 5) Multi User Access Control 6) Backup and Recovery Management 7) Data Integrity Management 8) Database Access Languages and Application Interface 9 ) Database Communication Interface

19.  Computer software? Define system and application software

Computer software is a program that tells a computer what to do. These instructions might be internal commands, such as updating the system clock, or a response to external input received from the keyboard or mouse.
System software refers to the files and programs that make up your computer's operating system. System files include libraries of functions, system services, drivers for printers and other hardware, system preferences, and other configuration files. The programs that are part of the system software include assemblers, compilers, file management tools, system utilities, and debuggers. The system software is installed on your computer when you install your operating system
Application s/w is a set of one or more programs, designed to solve a specific problem, or do a specific task. The program included in the application s/w package is called application programs and the programmers who prepare application s/w are called application programmers. Some of the most commonly known application s/w are:
(i) Word processing s/w (ii) Spreadsheet s/w (iii) Database s/w (iv) Graphics s/w (v) personal assistance s/w (vi) Education s/w (vii) Entertainment s/w.

20.           Automation clearing house. What is cheque truncation / MICR codes in bank cheque help the process

Automated Clearing House (ACH) is a secure payment transfer system that connects all U.S. financial institutions. The ACH network acts as the central clearing facility for all Electronic Fund Transfer (EFT) transactions that occur nationwide, representing a crucial link in the national banking system. It is here that payments linger in something akin to a holding pattern while awaiting clearance for their final banking destination. Scores of financial institutions transmit or receive ACH entries through ACH operators such as the American Clearing House Association, the Federal Reserve, the Electronic Payments Network, and Visa.
Here are the 4 major benefits of ACH processing: 1 - Quicker access to funds 2 - More convenient 3 - More cost-effective 4 - Easy recurring payments:

27. ATM? Operation of ATM in connection with online, offline systems

The automatic teller machine (ATM), used by banks and customers for a variety of functions, was patented in 1939, but failed initially due to limited functionality. Something more similar to the modern ATM emerged on the streets of London in 1967, introducing a new era of banking convenience. The functions of ATM machines include:
Below are the steps as to how it works: * Customer visits the ATM and inserts his card into the machine * ATM reads the magnetic stripe to identify the user * ATM prompts the user to enter his identification pin number * If the user enters an incorrect pin, the transaction is cancelled and the card is returned * If the user enters the correct pin, the machine shows him a menu of operations like withdrawal, deposit, balance inquiry etc. * User chooses his option - Ex: Withdraw cash * Machine connects to the bank database to check if the user has sufficient balance in his account to successfully complete the withdrawal transaction * If so, the machine dispenses cash that the user asked for * Machine updates users account with the withdrawal and updates the balance accordingly * Machine returns the card and a receipt advise on the transaction just performed * User takes his card and leaves the ATM
* Withdrawals, Deposits, Balance Inquiries, Account Transfers, Stamp Purchases.
22.           Digital signature? How does it ensure that data are genuine

A digital signature (not to be confused with a digital certificate) is an electronic signature that can be used to authenticate the identity of the sender of a message or the signer of a document, and possibly to ensure that the original content of the message or document that has been sent is unchanged. Digital signatures are easily transportable, cannot be imitated by someone else, and can be automatically time-stamped. The ability to ensure that the original signed message arrived means that the sender cannot easily repudiate it later. Importance: 1) Digital signatures make it easier to prove your fiscal compliance 2) Digital signatures make it easier to provide trade law evidence 3) Think about your reputation and responsibility: a customer-centric professional 4) To overcome acquisition fraud: ghost invoices 5) Return on investment

23.           BCD, ASCII and Unicode systems

Binary coded decimal (BCD) is a system of writing numerals that assigns a four-digit binary code to each digit 0 through 9 in a decimal (base-10) numeral. The four-bit BCD code for any particular single base-10 digit is its representation in binary notation, as follows: 0 = 0000, 1 = 0001, 2 = 0010, 3 = 0011, 4 = 0100, 5 = 0101, 6 = 0110, 7 = 0111, 8 = 1000, and 9 = 1001
Numbers larger than 9, having two or more digits in the decimal system, are expressed digit by digit. For example, the BCD rendition of the base-10 number 1895 is 0001 1000 1001 0101
ASCII: Acronym for the American Standard Code for Information Interchange. Pronounced ask-ee, ASCII is a code for representing English characters as numbers, with each letter assigned a number from 0 to 127. For example, the ASCII code for uppercase M is 77. Most computers use ASCII codes to represent text, which makes it possible to transfer data from one computer to another.
Unicode is A standard for representing characters as integers. Unlike ASCII, which uses 7 bits for each character, Unicode uses 16 bits, which means that it can represent more than 65,000 unique characters.

24.           Describe the stages of software development life-cycle

1. Planning: 2. Analysis: 3. Design: 4. Development & Implementation: 5. Testing: 6. Maintenance:

25.           Interbank and inter branch reconciliation? Describe the use of computers in inter branch reconciliation
Bank reconciliation is a process that explains the difference between the bank balance shown in an organization's bank statement, as supplied by the bank, and the corresponding amount shown in the organization's own accounting records at a particular point in time.
Inter-Branch Reconciliation is an important back-office function for Banks and its significance cannot be more emphasized in today's expanding world of banking. As commercial activities and money involved grow in magnitude, co-ordination between activities of all branches becomes a daunting task.

31.           Computer? Types of computer based on capacity and performance

Computers are machines that are manually programmed to perform calculations and tasks that range in complexity, scale and range. Not all computers are similar; they differ in capabilities, size, price and usability, and are designed to meet the diverse needs of a variety of end users---nuclear scientists, waste water engineers, financial consultants, students and homeowners. * Super Computers * Mainframe Computers * Mini Computers * Micro Computers
Super Computers: These computers can process billions of instructions per second. Normally, they will be used for applications which require intensive numerical computations such as stock analysis, weather forecasting etc.
Mainframe Computers: Mainframe computers can also process data at very high speeds vi.e., hundreds of million instructions per second and they are also quite expensive. Normally, they are used in banking, airlines and railways etc for their applications.
Mini: Mini computers are lower to mainframe computers in terms of speed and storage capacity. They are also less expensive than mainframe computers. Some of the features of mainframes will not be available in mini computers.
Micro Computers: The invention of microprocessor (single chip CPU) gave birth to the much cheaper micro computers. They are further classified into * Desktop Computers * Laptop Computers * Handheld Computers(PDAs)
26.           ICT audit?/ What is audit trail?  Usefulness the ICT audit in banking operation

Auditing involves establishing an organization’s current ICT capacity- what hardware and software an organization has, what skills the workers have etc. An audit trail can be either a paper or electronic trail that provides documented history of a transaction in a company. An audit trail allows an auditor to trace the financial data from general ledger to the source document (invoice, receipt, voucher, etc.).
Usefulness: 1) To make the most of volunteers' time it is better if a project is properly defined, rather than having a volunteer turn up for a specific job and find out that the scope of the work is wider or has additional problems. 2) It is also important that ICT help given be used sustainably by an organization. This means that a project should be well defined and the organization should know what skills it will need to have/acquire in order to make the most of completed work. 3) Finally, it is useful if an organization has had some help considering what information it wishes to make available to the community it serves and in what format.

29.           SWIFT and its use in banking application

The Society for Worldwide Interbank Financial Telecommunication provides a network that enables financial institutions worldwide to send and receive information about financial transactions in a secure, standardized and reliable environment. The majority of international interbank messages use the SWIFT network. SWIFT transports financial messages in a highly secure way but does not hold accounts for its members and does not perform any form of clearing or settlement. SWIFT does not facilitate funds transfer; rather, it sends payment orders, which must be settled by correspondent accounts that the institutions have with each other. Each financial institution, to exchange banking transactions, must have a banking relationship by either being a bank or affiliating itself with one (or more) so as to enjoy those particular business features. SWIFT hosts an annual conference every year called SIBOS which is specifically aimed at the Financial Services industry.

30.           Discuss online processing and batch processing

Online Processing or Interactive: Definition: Data is processed immediately while it is entered, the user usually only has to wait a short time for a response. (ex. games, word processing, booking systems). Interactive or online processing requires a user to supply an input. Advantages: Interactive or online processing enables the user to input data and get the results of the processing of that data immediately.
Batch processing: Definition: To process a large set of data in a specific way, automatically, without needing any user intervention. The data is first collected, during a work day, for example, and then batch-processed, so all the collected data is processed in one go. This could happen at the end of the work day, for example, when computing capacities are not needed for other tasks. Advantages: It is possible to perform repetitive tasks on a large number of pieces of data rapidly without needing the user to monitor it.
Real time Processing: Real time processing is a subset of interactive or online processing. Input is continuously, automatically acquired from sensors, for example, which is processed immediately in order to respond to the input in as little time as possible. After the system is finished responding it reads the next set of input data immediately to process that. This system doesn't need a user to control it, it works automatically. Advantages: Whenever there is a rapid reaction required due to some sort of change, real time processing can take action without the need of a user or long processing time beforehand.

33.           What do you understand by storage device? Name various storage devices

A data storage device is a device for recording (storing) information. Recording can be done using virtually any form of energy, spanning from manual muscle power in handwriting, to acoustic vibrations in phonographic recording, to electromagnetic energy modulating magnetic tape and optical discs. There are two storage devices used in computers; a primary storage device such as computer RAM and a secondary storage device such as a computer hard drive. The secondary storage could be a removable, internal, or external storage.
There are some additional examples of storage devices that are used with computers. 1) Floppy diskette 2) CD-ROM disc 3) CD-R and CD-RW disc 4) Cloud storage 5) DVD-R, DVD+R, DVD-RW, and DVD+RW disc 6) Jump drive and USB flash drive 7) Hard drive 8) LS-120 9) Tape cassette 10) Zip diskette
32.           Describe the classification of computers on the basis of construction and working principles

Analog: An analog computer (spelt analogue in British English) is a form of computer that uses continuous physical phenomena such as electrical, mechanical, or hydraulic quantities to model the problem being solved

Digital Computer: A computer that performs calculations and logical operations with quantities represented as digits, usually in the binary number system

Hybrid (Analog + Digital):  A combination of computers those are capable of inputting and outputting in both digital and analog signals. A hybrid computer system setup offers a cost effective method of performing complex simulations.


34.           Describe the recording method in compact disk

A molded plastic disc containing digital data that is scanned by a laser beam for the reproduction of recorded sound and other information. Since its commercial introduction in 1982, the audio CD has almost completely replaced the phonograph disc for high-fidelity recorded music. Co invented by Philips Electronics N.V. and Sony Corporation in 1980, the compact disc has expanded beyond audio recordings into other storage-and-distribution uses, notably for computers (CD-ROM) and entertainment systems (videodisc)
.

36.           What is computer network? Describe various networks

A computer network is a group of computer systems and other computing hardware devices that are linked together through communication channels to facilitate communication and resource-sharing among a wide range of users. Networks are commonly categorized based on their characteristics.
Different types of networks are distinguished based on their size, their data transfer speed, and their reach. There are usually said to be three categories of networks: 1) LAN 2) MAN (metropolitan) 3) WAN (wide area network)

37.           Describe the main features of LAN and WAN

LAN: 1) Limited geographic operation 2) High speed data transfer rates 3) Full time connectivity to local services 4) Generally lower in cost than a WAN 5) Cabling is primary transmission medium
WAN: 1) Referred as a large network. 2) Location is defined as any connection from one LAN to another 3) Point-to-Point connections.4) Group of routers/switches connected not owned by one company.5) Each groups' administrators maintain their part of the connections.

38.           LAN, MANs, WAN and internet, intranet

A local area network (LAN) supplies networking capability to a group of computers in close proximity to each other such as in an office building, a school, or a home. A LAN is useful for sharing resources like files, printers, games or other applications. A LAN in turn often connects to other LANs, and to the Internet or other WAN.
MANs (Metropolitan Area Networks) connect multiple geographically nearby LANs to one another at high speeds. Thus, a MAN lets two remote nodes communicate as if they were part of the same local area network. A MAN is made from switches or routers connected to one another with high-speed links (usually fibre optic cables).
A wide area network (WAN) is a geographically dispersed telecommunications network. The term distinguishes a broader telecommunication structure from a local area network (LAN). A wide area network may be privately owned or rented, but the term usually connotes the inclusion of public (shared user) networks. An intermediate form of network in terms of geography is a metropolitan area network (MAN).
The Internet is a global system of interconnected computer networks that use the standard Internet protocol suite (TCP/IP) to serve billions of users worldwide. It is a network of networks that consists of millions of private, public, academic, business, and government networks, of local to global scope, that are linked by a broad array of electronic, wireless and optical networking technologies.
Intranet is the generic term for a collection of private computer networks within an organization. An intranet uses network technologies as a tool to facilitate communication between people or work groups to improve the data sharing capability and overall knowledge base of an organization's employees.

35.           Back-up strategy of a core banking system

A backup strategy that will ensure that your memories and other important data can survive even the most devastating of accidents. Be sure to keep in mind these three important concepts:
1) Schedule backups. Backups aren't useful unless they occur regularly. You must back up your data on a timely schedule. 2) Ensure redundancy. Be sure to make one or more copies of your data. The best backup, probably, is a second hard disk, but you should also be copying your data to removable media such as writeable CD or DVD. 3) Go off-site. Keep a second backup of your data off-site, in a separate physical location. This location can be a family member's or friend's house, a bank safety deposit box, a drawer at work, and so on. It just can't be inside your house.

39            Importance of Business Continuity Plan(BCP) for a bank

Business continuity planning involves developing a practical plan for how your business can prepare for, and continue to operate after an incident or crisis. A business continuity plan will help you to:
  • identify and prevent risks where possible
  • prepare for risks that you can't control
  • Respond and recover if a risk (e.g. an incident or crisis) occurs.
Preparing a business continuity plan will help your business recover quickly if an incident does happen. You may not be able to predict every kind of incident that could threaten your business, but you can develop a plan that covers a range of incidents. To get the most out of a business continuity plan, you should include a schedule for testing and updating it, making sure you take into account any changes to your business, your industry, or the location you operate in. This guide explains how to develop, test and update a business continuity plan for your business.

41. Functions of data center (DC) and Disaster Recovery Site (DRS)

Functions of data center: a) Operations – Operations staff monitors the network and critical applications. Services such as running application batch jobs and printing are also provided. b) Security - A Data Center firewall is provided to prevent unauthorized access to restricted servers. C) Hosting - The Data Center provides three options for server hosting: Co-Location, ITS Hosting, and Virtual Server Hosting e) Load Balancing - The Data Center Networking Team provides IP Load Balancing Services on certain specific Data f) Center segments. Distributes a system’s workload via load balancing aids in optimizing resources, and may improve response times and availability. G) Backups – Tapes are stored securely on-site and off-site.
Functions of Disaster Recovery Site: a) Disaster recovery plans ensure that legislation and compliance issues are adhered to. B) Prevent financial loss. C) A disaster recovery program can prevent loss of credibility and goodwill. D) It will ensure that staff will continue to be paid. There is nothing as de-motivating to your personnel as not being paid! E) It will ensure that the organization’s services and production can continue. F) A disaster recovery program will prevent the loss of important operational information.
42.           Discuss physical and environmental setup for Data center

Physical data center security is largely the same worldwide, barring any local regulatory restrictions: that is, to keep out the people you don’t want in your building, and if they do make it in, then identify them as soon as possible.
Physical Security Measures: a) On-premise security guards b) Security systems on the building exterior: cameras, false entrances, vehicle blockades, customized parking lot designs, bulletproof glass/walls and unmarked buildings c) Biometric systems, including palm scanners d) Numerous security cameras with digital recorders e) Portals and person-traps that authenticate only one person at a time.
The Environmental Data Center (EDC) is a geographic information system (GIS) laboratory in the URI Department of Natural Resources Science, College of Environmental and Life Sciences (CELS).
The main objectives of the Environmental Data Centre on Waste are to: a) Provide robust data, indicators and other relevant information to support the assessment of policy effectiveness;  b) Manage data, perform quality assurance, and coordinate data and information managed by other bodies c) Be the central entry point for reporting of data under European Union legislation on waste; d) Be the reference point for answering specific policy questions related to information on waste and the associated environmental impacts; and e) Co-operate with DG Environment, the JRC and the EEA to develop and coordinate the necessary methodologies to produce statistical data, information and indicators on the environmental impacts of waste generation and waste management, within a life cycle perspective.
43. Plastic money? Discuss various forms of plastic money

Plastic money are the alternative to the cash or the standard 'money'. Plastic money is the generic term for all types of bank cards, credit cards, debit cards, smartcards, etc. They are the alternative to the cash or the standard 'money'. Plastic money is used to refer to the credit cards or the debit cards that we use to make purchases in our everyday life.
The various Plastic cards include ATM cards, Debit Card, ATM cum Debit Card, Credit Cards, Smart Card, Charge Cards, Co-branded cards, add on cards and so on
1* Debit Cards - When a person uses a debit card, the money is directly debited from the person’s bank account. Thus, a person can use the debit card till he has sufficient balance in his bank account as there is no deferred payment. Debit cards can also be used in Automated Teller Machines (ATMs) to withdraw cash. 2 * Credit cards - A credit card is a type of plastic money using which a person can purchase now and pay later. When the person swipes his credit card for making payment, the amount does not get debited to his bank account. It is paid by the credit card company and comes to the person in the form of a monthly statement. 3* Smart Cards - A smart card consists of an electronic chip used to store cash. While making a payment, the exact amount is deducted from the smart card. This card does not require any authorization like signature or identification.  4. *Cash Cards - These cards cannot be used to make payments or buying things. They are only useful for withdrawing cash from machines, known as ATMs. 5. * Prepaid Cash Cards - These cards are similar to credit cards except that there are no monthly statements. It can be used till there is credit in the card but does not need a bank account. 6* Store Cards - Some stores have their own cards which can be used at that particular store or group of stores. They can be used like credit cards in the particular stores but are accompanied with high interest rates. 7* Loyalty Cards - Loyalty cards are issued by retailers as a reward to frequent buyers. It entitles the cardholders to a certain percentage of discounts every time they purchase from that retailer.

44. E-commerce? Banking sector play an importance role of e-commerce

The buying and selling of products and services by businesses and consumers through an electronic medium, without using any paper documents. E-commerce is widely considered the buying and selling of products over the internet, but any transaction that is completed solely through electronic measures can be considered e-commerce. E-commerce is subdivided into three categories: business to business or B2B (Cisco), business to consumer or B2C, and consumer to consumer or C2C (eBay).
The Internet has opened up a new horizon for trade and commerce, namely electronic commerce (e-commerce). E-commerce entails the use of the Internet in the marketing, identification, payment and delivery of goods and services. This paper highlights the status, statutes, potential and constraints to e-commerce development in Bangladesh. Major legal, regulatory and institutional constraints to e-commerce are identified. The paper also lists specific policy changes aimed at bringing improvements to the legal and regulatory environment affecting e-commerce.
E-commerce through Internet, e-mails, websites, and other facilities, enables a businessman to be linked with every corner of the world, and thus opens up greater opportunities in the world market. However, the steps taken towards trade liberalization in Bangladesh become ineffective as a result of poor governance and weak infrastructure. Even simple day-to-day transactions with government bodies are characterized by unnecessary delays, obstructionism by public sector officials and demands for illegal payments. In addition to corruption, trade related regulations that are vague, contradictory and improperly implemented aggravate the situation.

46.           Settlement procedure for online transaction in EFT

For net banking: Funds are transferred to merchant’s bank account on T+2 days (Where T is the transaction date)
T+0: Customer’s bank A/C is debited and fund are credited to Techprocess account
T+1 day: Bank submits the reconciliation file and techprocess updates the status. Funds are transmitted to techprocess’ pool account.
T+2 days: Funds are transferred to merchant’s bank account
For Visa/ Master card: Funds are transferred to merchant’s bank account on T+1 day (Where T is the transaction date)
T+0: Customer’s bank A/C is debited and fund are transferred to the VISA/Master Card account with the transaction processing bank
T+1 day: Funds are transferred to merchant’s bank account
For Cash Card: Funds are transferred to merchant’s bank account on T+2 days (Where T is the transaction date)
T+0: Customer’s Cash Card A/C is debited
T+1 day: Respective cash Card Company transfers the funds to techprocess’ ‘pool account’.
T+2 days: Funds are transferred to merchant’s bank account
45.           Advantages of e-commerce’s
** Faster buying/selling procedure, as well as easy to find products. ** Buying/selling 24/7. ** More reach to customers, there is no theoretical geographic limitations. ** Low operational costs and better quality of services. **No need of physical company set-ups. ** Easy to start and manage a business. ** Customers can easily select products from different providers without moving around physically.

47.           Briefly discuss on electronic fund transfer system. What do you know about BEFTN

Electronic funds transfer (EFT) is the electronic exchange, transfer of money from one account to another, either within a single financial institution or across multiple institutions, through computer-based systems. The term covers a number of different concepts: ** Wire transfer via an international banking network **Cardholder-initiated transactions, using a payment card such as a credit or debit card **Direct deposit payment initiated by the payer ** Direct debit payments, sometimes called electronic checks, for which a business debits the consumer's bank accounts for payment for goods or services ** Electronic bill payment in online banking, which may be delivered by EFT or paper check ** Transactions involving stored value of electronic money, possibly in a private currency ** Electronic Benefit Transfer
Advantages of using the Electronic Fund Transfer: ** It is easy and convenient ** It is fast and secure.  **It is efficient and less expensive than paper cheque payments and collections.
Disadvantages of using the Electronic Fund Transfer: ** If you enter the target account number incorrectly, there is no way to reverse the transaction since the bank would process the transaction under the belief that the information you provided is accurate.  ** Once an amount is transferred, the bank cannot reverse a transaction.
BEFTN: The Bangladesh Electronic Funds Transfer Network (BEFTN) will operate as a processing and delivery centre providing for the distribution and settlement of electronic credit and debit instruments among all participating banks. This Network will operate in a real time batch processing mode. Transaction Files received from the banks during the day will be processed as they are received to ensure that if there are conditions that would Result in A file or batch reject the banking company will have Sufficient Time To Fix The errors and resubmit the file. All payment transactions will be calculated into a single multilateral netting figure for each individual bank.  Final settlement will take place using accounts that are maintained with Bangladesh Bank.

49. How security of data can be ensured though encryption and decryption

Encryption is the process of translating plain text data into something that appears to be random and meaningless. Decryption is the process of converting ciphertext back to plaintext. To encrypt more than a small amount of data, symmetric encryption is used. A symmetric key is used during both the encryption and decryption processes. To decrypt a particular piece of ciphertext, the key that was used to encrypt the data must be used.  The goal of every encryption algorithm is to make it as difficult as possible to decrypt the generated ciphertext without using the key. If a really good encryption algorithm is used, there is no technique significantly better than methodically trying every possible key. For such an algorithm, the longer the key, the more difficult it is to decrypt a piece of ciphertext without possessing the key.
There are a few types of algorithm for data encryption. The most popular is the Data Encryption Standard. DSS is a previously predominant algorithm for the encryption of electronic data. It was highly influential in the advancement of modern cryptography in the academic world.

i)         Smart card
A smart card is a plastic card about the size of a credit card, with an embedded microchip that can be loaded with data, used for telephone calling, electronic cash payments, and other applications, and then periodically refreshed for additional use. Currently or soon, you may be able to use a smart card to:
  • Dial a connection on a mobile telephone and be charged on a per-call basis
  • Establish your identity when logging on to an Internet access provider or to an online bank
  • Pay for parking at parking meters or to get on subways, trains, or buses
  • Give hospitals or doctors personal data without filling out a form
  • Make small purchases at electronic stores on the Web (a kind of cybercash)
  • Buy gasoline at a gasoline station
ii)       Website
A website is a collection of web pages (documents that are accessed through the Internet), such as the one you're looking at now. A web page is what you see on the screen when you type in a web address, click on a link, or put a query in a search engine. A web page can contain any type of information, and can include text, color, graphics, animation and sound. When someone gives you their web address, it generally takes you to their website's home page, which should introduce you to what that site offers in terms of information or other services.
Generally, people look at websites for two primary reasons:
1. To find information they need. This could be anything from a student looking for pictures of frogs for a school project, to finding the latest stock quotes, to getting the address of the nearest Thai restaurant.
2. To complete a task. Visitors may want to buy the latest best-seller, download a software program, or participate in an online discussion about a favorite hobby.

iii)      CHIPS
CHIPS. A privately-held transferal system that allows banks to settle transactions with each other electronically. It primarily deals with large-value fund transfers, with daily totals of more than $1 trillion. CHIPS is used for transactions that are less time-sensitive, contrary to the Federal Reserve Wire Network, and has fewer members making transfers. It settles transactions by netting. For example, if Bank of America is to pay American Express US$1.2 million, and American Express is to pay Bank of America $800,000, the CHIPS system aggregates this to a single payment of $400,000 from Bank of America to American Express — only 20% of the $2 million to be transferred actually changes hands. Only the largest banks dealing in U.S. dollars participate in CHIP and Smaller banks have not found it cost effective to participate in CHIPS.
Spam and Spy wore
Spam is most often considered to be electronic junk mail or junk newsgroup postings. Some people define spam even more generally as any unsolicited email. However, if a long-lost brother finds your email address and sends you a message, this could hardly be called spam, even though it is unsolicited. Real spam is generally email advertising for some product sent to a mailing list or newsgroup.
Any software that covertly gathers user information through the user's Internet connection without his or her knowledge, usually for advertising purposes. Spyware applications are typically bundled as a hidden component of freeware or shareware programs that can be downloaded from the Internet. product when they install something else.

iv)      Any brunch banking
Any Branch Banking a facility for our customers to operate their account from any of our networked branches. The branch where the customer maintains his account is the base branch and the branch from where he carries out his transactions is referred as the remote branches. Any Branch Banking facility is available in ALL branches of Corporation Bank. FACILITIES available under ABB: ** Cash Withdrawal ** Cash Deposit ** Fund Transfers ** Purchase of Demand Drafts / Pay Orders ** Deposit of Local Cheques ** Stop Payment facility at Remote Branches: You can give instructions to Stop Payment of cheques issued by you at any of our branches by simply giving a written request. You can also revoke the stop payment instruction issued by you earlier. ** Repayment to Loan accounts: Now you can make repayments to your loans such as Home Loan, Vehicle Loan, etc. held with your branch through any of the Corp Bank Branches by Cash / Local cheque.
v)       Online CIB
Bangladesh Bank (BB) will start providing online information of its Credit Information Bureau (CIB) reports to banks and non-banking financial institutions (NBFIs) from July 19, which will make faster the lending services and will eventually cut the cost of doing business. BB Governor Dr Atiur Rahman will inaugurate the online service at the central bank’s headquarters in the capital city, bringing an end to the manual, time consuming and cumbersome process of sharing the important credit information among banks and financial institutions.
All the 47 banks and 29 NBFIs of the country will be able to collect the online CIB reports on July 19 and onwards. The banks and financial institutions would also be able to collect the CIB reports from the central bank physically if they want, the central bank officials said.
vi)                  ExtranetAn extranet is a private network that uses Internet technology and the public telecommunication system to securely share part of a business's information or operations with suppliers, vendors, partners, customers, or other businesses. An extranet can be viewed as part of a company's intranet that is extended to users outside the company. It has also been described as a "state of mind" in which the Internet is perceived as a way to do business with other companies as well as to sell products to customers.
vii)    Data Warehouse
A data warehouse is a relational database that is designed for query and analysis rather than for transaction processing. It usually contains historical data derived from transaction data, but it can include data from other sources. It separates analysis workload from transaction workload and enables an organization to consolidate data from several sources. Benefits of a data warehouse
  • Maintain data history, even if the source transaction systems do not.
  • Improve data quality
  • Present the organization's information consistently.
  • Provide a single common data model for all data of interest regardless of the data's source.
  • Restructure the data so that it makes sense to the business users.
  • Add value to operational business applications, notably customer relationship management systems.

48.           What are the benefits of online banking

*Customer service * Higher Interest Rates * No fees * No Minimums * Less Access * Sales * Incentives * you don't have to wait in line. * You don't have to plan your day around the bank's hours. * You can look at your balance whenever you want, not just when you get a statement. * Online banking allows you to watch your money on a daily basis if you want to. By keeping close tabs on your funds, you'll always be aware of what's happening in your bank account. * For those experienced spenders, this option is far more appealing than the sudden discovery that you're broke! * It's also helpful to watch how much interest you're gathering on investments and savings or what service charges you have incurred.
Disadvantages
Internet account: You need to get an account with an Internet Service Provider (ISP) which may be another hectic experience. Security concern: Even though online banking sites are heavily encrypted, with the developing technology, it’s hard to rule out the "hackers" who may access your bank accounts. Switching banks: This can be more cumbersome online than in person. Money usage: You can’t spend your money from the online bank account as you wish, in the end; you will need to go to an ATM to withdraw money for usage. Technical breakdowns: As with all technologies, online banking websites sometimes go down. If this happen when you closed your local bank or credit card accounts, you will definitely go penniless.

Comments

Popular posts from this blog

What precautions should be taken by a banker before advancing

What precautions should be taken by a banker before advancing What precautions should be taken by a banker before advancing the loan or Investment? No doubt the advancing of loan is also risk as well. If the loan is for a longer period then risk will be also greater. So before advancing the loan a banker should keep in view the following precautions : Business Volume: Character : Character of the borrower depends upon honestly, family background, nature of employment, habits and the record of the past. So before advancing loan these things must   be considered. 2. Ability To Repay : Before advancing loan a banker must be satisfied with the sources of the repayment of the funds. 3. Check The Assets : The banker should also check the property capital and borrower. This property can kept as a security of loan. In other words if the businessman financial condition is sound then it can be lended otherwise not. 4. Purpose Of Financing :- Funds should be provided f

Statutory Protection to Collecting Banker

  Statutory Protection to Collecting Banker Section 131 of the Negotiable Instruments Act provides protection to a collecting banker who receives payment of a crossed cheque or draft on behalf of his customers. According to Section 131 of the Act “a banker who has, in good faith and without negligence, received payment for a customer of a cheque crossed generally or specially to himself shall not, in case the title to the cheque proves defective, incur any liability to the true owner of the cheque by reason only of having received such payment.” The protection provided by Section 131 is not absolute but qualified. A collecting banker can claim protection against conversion if the following conditions are fulfilled. 1.      Good Faith and Without Negligence: Statutory protection is available to a collecting banker when he receives payment in good faith and without negligence. The phrase in “good faith” means honestly and without notice or interest of deceit or fraud and does n