Computer Literacy Test 3

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 9

1) One Yobibyte = 1024 _____

a) Petabytes
b) Zebibytes
c) Yottabytes
d) Exabytes
e) None of the above

2) The art and science of keeping files and messages secured is called: a)
encryption
b) decryption
c) pass phrase
d) cryptography
e) none of the above

3) The process of retrieval of plain text from the coded (ciphered) message is known as:

a) encryption
b) decryption
c) passphrase
d) cryptography
e) none of the above

4) A string of characters that is used to mathematically encode the message to ensure that it
can be read only by someone in possession of that string or another related string, is called:

a) encryption
b) decryption
c) key
d) password
e) none of the above

5) Which of the following keys is kept secret by the owner of the key as it is used to sign?

a) public key
b) private key
c) security key
d) general key
e) none of the above

6) The recipient of a digitally signed message can verify the authenticity of the message by
use of which of the following key?
a) sender's private key
b) sender's public key
c) receiver's private key
d) receiver's public key
e) none of the above
7) The pair of keys that is used in case of electronic signature is called: a)
sender-receiver key
b) public-private key
c) encryption-decryption key
d) validation-authentication key
e) none of the above

8) An electronic database of certificates, the equivalent of digital Yellow Pages is called:

a) certificates chest
b) certificates depositor
c) repository
d) certificate warehouse
e) none of the above

9) The process of conversion of a variable length message into a fixed length key is called:

a) conversion
b) hashing
c) key fixation
d) decryption
e) none of the above

10) Disk mirroring stands for which of the following?


a) duplication of CD-ROM
b) duplication from hard drives
c) duplication of data from one hard disk to another hard disk
d) all the above
e) none of the above

11) There are _____ parties to an electronic signature, that include:


a) 2, sender & receiver
b) 2, sender & certification authority
c) 3, sender receiver & certification authority
d) 2, receiver & certification authority
e) none of the above

12) With a view to ensure that the user should not be able to misuse the system what
provision can be there as part of computer system security?
a) instructions can be issued not to report outside prescribed hours
b) someone should guard the computer system at all times
c) restrictions on users may be provided in the system
d) all the above
e) none of the above
13) Banking records in an electronic form shall be treated as _________ records under the
provisions of ________ Act:
a) valid, NI Act
b) invalid, BR Act
c) valid, IT Act 2000
d) valid, IT Act 1961
e) none of the above

14) What is the minimum time period for which the electronic records are to be preserved?

a) till they are available in a computer system


b) as per rules for physical records unless modified
c) there is no need for maintenance of such records
d) all the above
e) none of the above

15) Which of the following actions of a person are not to be included as part of the legal
definition of computer crime?
a) damage to a computer system
b) disruption to a network of computers
c) providing assistance to another person to get access to a computer system d) all
the above
e) none of the above

16) Local Area Network is the computer network. Which of the following statements
explains it better?
a) the network that links computers and peripherals within a municipal area b) the
network that links computers and peripherals within a localised area
c) the network that links computers and peripherals within a state area d) all
the above
e) none of the above

17) In a local area network, each independent computer system (i.e. terminal linked to server)
is called:
a) sub-LAN
b) server
c) workstation or node
d) any of the above
e) none of the above

18) Which of the following relates to helping in recovering from failures in a network
system?
a) work-station
b) server
c) disk mirroring
d) nodes
e) none of the above

19) In a core banking system (a) the branches are linked to central server (b) transactions are
done in the branch server and controlled by central server (c) the customer is offered any time
any where banking facilities
a) a to c - all correct
b) only a and b correct
c) only a and c correct
d) only b and c correct
e) a to c - all incorrect
20) The setting up of ATM was recommended by which of the following committee?
a) Narasimham Committee
b) Saraf Committee
c) Rangarajan Committee
d) Shere Committee
e) None of the above

21) There are a number of slots in the ATM for various purposes. Which of the following is
not one such slot?
a) deposit slot
b) cash dispenser
c) card reader
d) PIN
e) none of the above

22) Which of the following is correct in the context of PIN?


a) PIN stands for personal information number
b) PIN is similar to a password
c) PIN is not inserted on the ATM card
d) all the above
e) none of the above

23) The smart card is similar to an ATM card or Credit card:


a) with a loaded value
b) with an integrated circuit (IC)
c) with a charging facility
d) all the above
e) none of the above

24) Electronic signature is recognised equal to a handwritten signature as per provisions of

a) NI Act 1881
b) Information Technology Act 2000
c) Indian Evidence Act
d) Banking Regulation Act
e) None of the above
25) _________________ is a smart card that contains electronic money. It is sometimes
called the electronic wallet or the stored value card (SVC)
a) electronic purse
b) electronic cash
c) electronic card
d) all the above
e) none of the above

26) Where funds are loaded in a card to use these as cash, in case of need, it is called:
a) smart card
b) electronic cheque
c) electronic purse
d) electronic cash
e) none of the above

27) When the card holder authorises payment by typing his PIN and his bank account is
debited and account of merchant establishment (point of sale) is credited, it is called:
a) electronic token
b) electronic cheque
c) electronic purse
d) electronic cash
e) none of the above

28) A bank allows its customers to effect banking transactions through its website such as
transfer of funds. It is called:
a) base level service
b) simple transactional website
c) fully transactional website
d) any of the above
e) none of the above

29) After cheque truncation, the paper cheque is kept in the custody of:
a) bank or clearing house that truncated the cheque
b) paying bank
c) collecting bank
d) clearing house
e) none of the above

30) With a view to authenticate the electronic image of the truncated cheque, the bank or
clearing house that truncates the cheque:
a) can send a separate confirmation in writing
b) can send an email
c) can attach electronic signature
d) any of the above
e) none of the above
31) Which of the following is not an electronic funds transfer system?
a) Electronic Clearing Services
b) National Electronic Fund Transfer
c) Real Time Gross Settlement
d) Electronic Fund Transfer
e) None of the above

32) Under NEFT, once a request for transfer of funds is received from a customer, the
remitter bank prepares SFMS, which stands for:
a) Standard Financial Monitoring System
b) Standard Financial Messaging System
d) Structured Financial Monitoring System
e) None of the above

33) Under NEFT, if a message is not returned uneffected _________, it is treated to have
been completed and credit afforded to the beneficiary's account by the beneficiary branch
a) before the next settlement day
b) before the next day
c) before the next business day
d) before the next banking day
e) none of the above

34) Which of the following is not correct regarding RTGS in India?


a) It is managed by RBI as a settlement authority
b) It was established in the year 2004
c) It is a batch settlement system
d) All the above
e) None of the above

35) RBI's VSAT network called Indian Financial Network (INFINET) has been set up at
Hyderabad on recommendations of:
a) TN Anantharam Iyer Committee
b) 2nd Rangarajan Committee
c) Saraf Committee
d) Shere Committee
e) None of the above

36) Which of the following services can be offered by banks through internet?
a) Banks can sell their products through specially designed web pages b)
Banks can offer account opening facilities to NRIs
c) Interactive feedback forms can be designed and used
d) All the above
e) None of the above

37) SWIFT is owned by which of the following?


a) US Federal Bank
b) European Central Bank
c) Bank for International Settlements
d) Member banks
e) None of the above

38) Which of the following is not correct regarding SWIFT?


a) It is established under Belgian Law
b) It is a public limited company
c) Its headquarters is in Brussels
d) Its major role is transmission of financial messages
e) None of the above

39) Which of the following is not a feature of SWIFT?


a) It is operational on 24 x 7 basis
b) Financial messages are transmitted all over the world
c) All message formats are standardised
d) SWIFT does not assume any financial liability
e) None of the above

40) In India, SWIFT is operating for quite long. Which of the following is correct?
a) Regional Processor is at Mumbai
b) All public sector banks are its members
c) Banks are connected to Regional Processor
d) All the above
e) None of the above

41) SWIFT owns responsibility for transmission:


a) between regional processors only
b) between regional processors and member banks
c) between member banks only
d) all the above
e) none of the above

42) The SWIFT security control to prevent automatic changes during transmission is called:

a) encryption
b) checksum
c) decryption
d) key authentication
e) none of the above

43) The SWIFT security contol to ensure data confidentiality is called:


a) encryption
b) checksum
c) decryption
d) key authentication
e) none of the above

44) ____________ permits payments to be made at the merchant establishment through


electronic funds transfer (EFT):
a) Point of Sale
b) Bank ATM
c) FEDWIRE
d) BANKWIRE
e) None of the above

45) Which of the following is correct regarding pair of keys used in an electronic signature?

a) private key is used by a person to sign and public key is used by relying party to
verify the private key
b) public key is used by a person to sign and private key is used by relying party to verify
the public key
c) private key and public key are used by a person to sign and to verify the private key by
the same persons
d) all the above
e) none of the above
46) The debit payment system that works on the principle of multiple debits and a single
credit:
a) debit clearing
b) electronic debit clearing
c) electronic clearing
d) electronic clearing service
e) none of the above

47) The electronic system through which a company or a mutual fund can make payment of
dividend to a large number of shareholders or unit holders:
a) MICR
b) Truncation
c) Debit Clearing System
d) Credit Clearing System
e) None of the above

48) _____________ is a mechanism under which an account holder with a bank can authorise
an ECS user to recover an amount at a prescribed frequency by raising a debit in his account:

a) NEFT
b) RTGS
c) ECS-Debit
d) ECS-Credit
e) None of the above
49) The transaction limit under mobile banking is Rs.________ per customer for transactions
involving purchase of goods and services and transfer of funds:
a) 50000
b) 25000
c) 10000
d) 5000
e) Bank's discretion

50) The sub-section (5) of the Section 25 of the Payment and Settlement Systems Act, 2007
provides for _________ of electronic funds transfer instruction, or both for dishonour of such
electronic funds transfer instructions.
a) imprisonment of 2 years and fine twice the amount
b) imprisonment of 1 year and fine twice the amount
c) imprisonment of 2 years and fine equal to the amount
d) imprisonment of 1 year and fine equal to the amount
e) imprisonment of 2 years and fine thrice the amount

You might also like