Professional Documents
Culture Documents
Computer Literacy Test 3
Computer Literacy Test 3
Computer Literacy Test 3
a) Petabytes
b) Zebibytes
c) Yottabytes
d) Exabytes
e) None of the above
2) The art and science of keeping files and messages secured is called: a)
encryption
b) decryption
c) pass phrase
d) cryptography
e) none of the above
3) The process of retrieval of plain text from the coded (ciphered) message is known as:
a) encryption
b) decryption
c) passphrase
d) cryptography
e) none of the above
4) A string of characters that is used to mathematically encode the message to ensure that it
can be read only by someone in possession of that string or another related string, is called:
a) encryption
b) decryption
c) key
d) password
e) none of the above
5) Which of the following keys is kept secret by the owner of the key as it is used to sign?
a) public key
b) private key
c) security key
d) general key
e) none of the above
6) The recipient of a digitally signed message can verify the authenticity of the message by
use of which of the following key?
a) sender's private key
b) sender's public key
c) receiver's private key
d) receiver's public key
e) none of the above
7) The pair of keys that is used in case of electronic signature is called: a)
sender-receiver key
b) public-private key
c) encryption-decryption key
d) validation-authentication key
e) none of the above
a) certificates chest
b) certificates depositor
c) repository
d) certificate warehouse
e) none of the above
9) The process of conversion of a variable length message into a fixed length key is called:
a) conversion
b) hashing
c) key fixation
d) decryption
e) none of the above
12) With a view to ensure that the user should not be able to misuse the system what
provision can be there as part of computer system security?
a) instructions can be issued not to report outside prescribed hours
b) someone should guard the computer system at all times
c) restrictions on users may be provided in the system
d) all the above
e) none of the above
13) Banking records in an electronic form shall be treated as _________ records under the
provisions of ________ Act:
a) valid, NI Act
b) invalid, BR Act
c) valid, IT Act 2000
d) valid, IT Act 1961
e) none of the above
14) What is the minimum time period for which the electronic records are to be preserved?
15) Which of the following actions of a person are not to be included as part of the legal
definition of computer crime?
a) damage to a computer system
b) disruption to a network of computers
c) providing assistance to another person to get access to a computer system d) all
the above
e) none of the above
16) Local Area Network is the computer network. Which of the following statements
explains it better?
a) the network that links computers and peripherals within a municipal area b) the
network that links computers and peripherals within a localised area
c) the network that links computers and peripherals within a state area d) all
the above
e) none of the above
17) In a local area network, each independent computer system (i.e. terminal linked to server)
is called:
a) sub-LAN
b) server
c) workstation or node
d) any of the above
e) none of the above
18) Which of the following relates to helping in recovering from failures in a network
system?
a) work-station
b) server
c) disk mirroring
d) nodes
e) none of the above
19) In a core banking system (a) the branches are linked to central server (b) transactions are
done in the branch server and controlled by central server (c) the customer is offered any time
any where banking facilities
a) a to c - all correct
b) only a and b correct
c) only a and c correct
d) only b and c correct
e) a to c - all incorrect
20) The setting up of ATM was recommended by which of the following committee?
a) Narasimham Committee
b) Saraf Committee
c) Rangarajan Committee
d) Shere Committee
e) None of the above
21) There are a number of slots in the ATM for various purposes. Which of the following is
not one such slot?
a) deposit slot
b) cash dispenser
c) card reader
d) PIN
e) none of the above
a) NI Act 1881
b) Information Technology Act 2000
c) Indian Evidence Act
d) Banking Regulation Act
e) None of the above
25) _________________ is a smart card that contains electronic money. It is sometimes
called the electronic wallet or the stored value card (SVC)
a) electronic purse
b) electronic cash
c) electronic card
d) all the above
e) none of the above
26) Where funds are loaded in a card to use these as cash, in case of need, it is called:
a) smart card
b) electronic cheque
c) electronic purse
d) electronic cash
e) none of the above
27) When the card holder authorises payment by typing his PIN and his bank account is
debited and account of merchant establishment (point of sale) is credited, it is called:
a) electronic token
b) electronic cheque
c) electronic purse
d) electronic cash
e) none of the above
28) A bank allows its customers to effect banking transactions through its website such as
transfer of funds. It is called:
a) base level service
b) simple transactional website
c) fully transactional website
d) any of the above
e) none of the above
29) After cheque truncation, the paper cheque is kept in the custody of:
a) bank or clearing house that truncated the cheque
b) paying bank
c) collecting bank
d) clearing house
e) none of the above
30) With a view to authenticate the electronic image of the truncated cheque, the bank or
clearing house that truncates the cheque:
a) can send a separate confirmation in writing
b) can send an email
c) can attach electronic signature
d) any of the above
e) none of the above
31) Which of the following is not an electronic funds transfer system?
a) Electronic Clearing Services
b) National Electronic Fund Transfer
c) Real Time Gross Settlement
d) Electronic Fund Transfer
e) None of the above
32) Under NEFT, once a request for transfer of funds is received from a customer, the
remitter bank prepares SFMS, which stands for:
a) Standard Financial Monitoring System
b) Standard Financial Messaging System
d) Structured Financial Monitoring System
e) None of the above
33) Under NEFT, if a message is not returned uneffected _________, it is treated to have
been completed and credit afforded to the beneficiary's account by the beneficiary branch
a) before the next settlement day
b) before the next day
c) before the next business day
d) before the next banking day
e) none of the above
35) RBI's VSAT network called Indian Financial Network (INFINET) has been set up at
Hyderabad on recommendations of:
a) TN Anantharam Iyer Committee
b) 2nd Rangarajan Committee
c) Saraf Committee
d) Shere Committee
e) None of the above
36) Which of the following services can be offered by banks through internet?
a) Banks can sell their products through specially designed web pages b)
Banks can offer account opening facilities to NRIs
c) Interactive feedback forms can be designed and used
d) All the above
e) None of the above
40) In India, SWIFT is operating for quite long. Which of the following is correct?
a) Regional Processor is at Mumbai
b) All public sector banks are its members
c) Banks are connected to Regional Processor
d) All the above
e) None of the above
42) The SWIFT security control to prevent automatic changes during transmission is called:
a) encryption
b) checksum
c) decryption
d) key authentication
e) none of the above
45) Which of the following is correct regarding pair of keys used in an electronic signature?
a) private key is used by a person to sign and public key is used by relying party to
verify the private key
b) public key is used by a person to sign and private key is used by relying party to verify
the public key
c) private key and public key are used by a person to sign and to verify the private key by
the same persons
d) all the above
e) none of the above
46) The debit payment system that works on the principle of multiple debits and a single
credit:
a) debit clearing
b) electronic debit clearing
c) electronic clearing
d) electronic clearing service
e) none of the above
47) The electronic system through which a company or a mutual fund can make payment of
dividend to a large number of shareholders or unit holders:
a) MICR
b) Truncation
c) Debit Clearing System
d) Credit Clearing System
e) None of the above
48) _____________ is a mechanism under which an account holder with a bank can authorise
an ECS user to recover an amount at a prescribed frequency by raising a debit in his account:
a) NEFT
b) RTGS
c) ECS-Debit
d) ECS-Credit
e) None of the above
49) The transaction limit under mobile banking is Rs.________ per customer for transactions
involving purchase of goods and services and transfer of funds:
a) 50000
b) 25000
c) 10000
d) 5000
e) Bank's discretion
50) The sub-section (5) of the Section 25 of the Payment and Settlement Systems Act, 2007
provides for _________ of electronic funds transfer instruction, or both for dishonour of such
electronic funds transfer instructions.
a) imprisonment of 2 years and fine twice the amount
b) imprisonment of 1 year and fine twice the amount
c) imprisonment of 2 years and fine equal to the amount
d) imprisonment of 1 year and fine equal to the amount
e) imprisonment of 2 years and fine thrice the amount