Thursday, June 23, 2011

Solved Paper INDIAN BANK COMPUTER OFFICERS EXAM., 2008 (Held on 30-3-2008)






INDIAN BANK COMPUTER OFFICERS (IT) EXAM., 2008
(Held on 30-3-2008)
Professional Knowledge
(Based on Memory)



1. A passive threat to computer security is—
(A) Malicious Intent
(B) Sabotage
(C) Accidental Errors
(D) Espionage Agents
(E) None of these

2. The Secure Electronic Transaction (SET) specification—
(A) Is a notice, issued and verified by a certificate authority, that guarantees a user or Web site is legitimate
(B) Provides private-key encryption of all data that passes between a client and a server
(C) Allows users to choose an encryption scheme for the data that passes between a client and a server
(D) Uses a public-key encryption to secure credit-card transaction systems
(E) None of these


3.____allows wireless mobile devices to access the Internet and its services such as the Web and e-mail.
(A) TCP/IP
(B) Ethernet
(C) WAP
(D) Token ring
(E) None of these



4. 'DOS' floppy disk does not have—
(A) A Boot Record
(B) A File Allocation Table
(C) A Root Directory
(D) Virtual Memory
(E) BIOS


5. 'MICR' technology used for clearance of cheques by banks refers to—
(A) Magnetic Ink Character Recognition
(B) Magnetic Intelligence Character Recognition
(C) Magnetic Information Cable Recognition
(D) Magnetic Insurance Cases Recognition
(E) None of these


6. All the information collected during database development is stored in a—
(A) Repository
(B) Data warehouse
(C) RAD
(D) CASE
(E) None of these


7. The component is used by the data analyst to create the queries that access the database.
(A) Data extraction
(B) End-user query tool
(C) End-user presentation tool
(D) Data store
(E) None of these