Professional Documents
Culture Documents
IT Broad and Short question
IT Broad and Short question
1. Generation of Computers
The development of electronic computers can be Cooling system was required
divided into five generations depending upon the Constant maintenance was required
technologies used. The following are the five Commercial production was difficult
generations of computers. Only used for specific purposes
First Generation of Computers (1942-1955) Costly and not versatile
The first generation computers were used during Puch cards were used for input.
1942-1955. They were based on vacuum tubes.
Examples of first generation computers are ENIVAC Third Generation Computers (1964-1975)
and UNIVAC-1. The Third generation computers used the
Advantages integrated circuits (IC). A single IC chip may contain
Vacuum tubes were the only electronic component thousands of transistors. The computer became
available during those days. smaller in size, faster, more reliable and less
Vacuum tube technology made possible to make expensive. The examples of third generation
electronic digital computers. computers are IBM 370, IBM System/360, UNIVAC
These computers could calculate data in 1108 and UNIVAC AC 9000 etc.
millisecond. Advantages
Disadvantages
Smaller in size as compared to previous
The computers were very large in size. generations.
They consumed a large amount of energy. More reliable.
They heated very soon due to thousands of vacuum Used less energy, Produced less heat as compared
tubes. to the previous two generations of computers.
Non-portable. Better speed and could calculate data in
Used machine language only. nanoseconds.
Used magnetic drums which provide very less data Used fan for heat discharge to prevent damage.
storage. Could be used for high-level languages.
Used punch cards for input. Versatile to an extent
Used mouse and keyboard for input.
Second Generation Computers (1955-1964) Disadvantages
The second generation computers used transistors. Air conditioning was required.
The size of the computers was decreased by replacing Highly sophisticated technology required for the
vacuum tubes with transistors. The examples of manufacturing of IC chips.
second generation computers are IBM 7094 series,
IBM 1400 series and CDC 164 etc. Fourth Generation Computers (1975-
Advantages Present)
Smaller in size as compared to the first generation The fourth generation computers started with the
computers. invention of Microprocessor. It greatly reduced the
The 2nd generation Computers were more reliable size of computer. It can contain millions of electronic
Used less energy and were not heated. circuits. The examples of fourth generation computers
Used faster peripherals like tape drives, magnetic are Apple Macintosh & IBM PC.
disks, printer etc. Advantages
Used Assembly language instead of Machine More powerful and reliable than previous
language. generations.
Accuracy improved. Small in size
Disadvantages
Page 2 of 57
Fast processing power with less power Fifth Generation Computers (Present &
consumption Beyond)
Fan for heat discharging and thus to keep cold. Scientists are working hard on the 5th generation
Commercial production computers with quite a few breakthroughs. It is based on
Cheapest among all generations the technique of Artificial Intelligence (AI). Computers can
understand spoken words & imitate human reasoning.
All types of High level languages can be used in this
Scientists are constantly working to increase the processing
type of computers
power of computers. They are trying to create a computer
Disadvantages with real IQ with the help of advanced programming and
The latest technology is required for technologies. IBM Watson computers one example that
manufacturing of Microprocessors. outsmarts Harvard University Students. The advancement
in modern technologies will revolutionize the
computer in future.
Limitations of computers
1. The computer can only perform the tasks you ask it to. You cannot expect a computer to be smarter than the person
running it, though it can sometimes seem that way. Basically, as the person running it you have to tell the computer
what tasks you want it to do. Yes, there are processes in the background, but these run based on preset information
built in to the operating system.
2. A computer cannot generate information by itself. You have to give the computer operations, and even new
instructions from time to time. Updates for example are a way to get new information to your computer to help
streamline its functionality, but you still have to feed it that information by having an internet connection and
automatic updates.
3. If you give the computer wrong data it is going to give you wrong information. The computer can only work with
what you give it. It is just like giving directions to someone. If you tell someone to go right when they should have
gone left, you are giving them the wrong information and they will not be able to find you.
4. Computers are unable to correct wrong instructions. The computer is always going to depend on your instructions,
so you have to correct your mistake if you want it to work right.
5. Overall, a computer was built by humans and new technology comes out all the time. Hardware will eventually fade
out and deteriorate. Given these properties it can be hard for a computer to remain a primo machine. These are five
limitations computers have. There are more, but note most are based on human interaction with the computer, thus
humans are part of the limitation a computer will have.
2. TYPES OF COMPUTERS
Computers can be classified based on their principles of operation or on their configuration. By configuration, we
mean the size, speed of doing computation and storage capacity of a computer.
Page 3 of 57
Analog Computers
Analog Computer is a computing device that works on continuous range of values. The results given by the analog
computers will only be approximate since they deal with quantities that vary continuously. It generally deals with
physical variables such as voltage, pressure, temperature, speed, etc.
Digital Computers
On the other hand a digital computer operates on digital data such as numbers. It uses binary number system in which
there are only two digits 0 and 1. Each one is called a bit.
Super Computers
When we talk about types of computers, the first type that comes to our mind would be Super computers. They are the
best in terms of processing capacity and also the most expensive ones. These computers can process billions of
instructions per second. Normally, they will be used for applications which require intensive numerical computations
such as stock analysis, weather forecasting etc. Other uses of supercomputers are scientific simulations, (animated)
graphics, fluid dynamic calculations, nuclear energy research, electronic design, and analysis of geological data (e.g. in
petrochemical prospecting). Perhaps the best known super computer manufacturer is Cray Research. Some of the
"traditional" companies which produce super computers are Cray, IBM and Hewlett-Packard.
As of July 2009, the IBM Roadrunner, located at Los Alamos National Laboratory, is the fastest super computer in the
world.
Mainframe Computers
Mainframe computers can also process data at very high speeds vi.e., hundreds of million instructions per second and
they are also quite expensive. Normally, they are used in banking, airlines and railways etc for their applications.
Mini Computers
Mini computers are lower to mainframe computers in terms of speed and storage capacity. They are also less
expensive than mainframe computers. Some of the features of mainframes will not be available in mini computers.
Hence, their performance also will be less than that of mainframes.
Micro Computers
The invention of microprocessor (single chip CPU) gave birth to the much cheaper micro computers. They are further
classified into
Desktop Computers
Laptop Computers
Handheld Computers(PDAs)
a) Desktop Computers: Today the Desktop computers are the most popular computer systems.These
desktop computers are also known as personal computers or simply PCs. They are usually easier to
use and more affordable. They are normally intended for individual users for their word processing
and other small application requirements.
b) Laptop Computers: Laptop computers are portable computers. They are lightweight computers
with a thin screen. They are also called as notebook computers because of their small size. They can
operate on batteries and hence are very popular with travellers. The screen folds down onto the
keyboard when not in use.
c) Handheld Computers: Handheld computers or Personal Digital Assistants (PDAs) are pen-based
and also battery-powered. They are small and can be carried anywhere. They use a pen like stylus
and accept handwritten input directly on the screen. They are not as powerful as desktops or laptops
but they are used for scheduling appointments, storing addresses and playing games. They have
touch screens which we use with a finger or a stylus.
Page 4 of 57
04. Impact of computerization in banking sector?
There are various ways through which computers are widely used in the banking industry. It can be used to carry out
from simple to complex tasks of the banks. For example, instead of making manual records and then storing the files,
all data is stored on computers. It is more quick and productive. More data can be stored in this way. Moreover, data
can be easily stored, and retrieved from computers.
The advantages accruing from computerization are three-directional - to the customer, to the bank and to the
employee.
For the customer:-
Self-inquiry facility: Facility for logging into specified self-inquiry terminals at the branch to inquire and
view the transactions in the account.
Remote banking: Remote terminals at the customer site connected to the respective branch through a
modem, enabling the customer to make inquiries regarding his accounts, on-line, without having to move
from his office.
Anytime banking- Anywhere banking: Networking of computerized branches inter-city and intra-city, will
permit customers of these branches, when interconnected, to transact from any of these branches
Telebanking: A 24-hour service through which inquiries regarding balances and transactions in the account
can be made over the phone.
For the bank:-
Availability of a wide range of inquiry facilities, assisting the bank in business development and follow-up.
Immediate replies to customer queries without reference to ledger-keeper as terminals are provided to
Managers and Chief Managers.
Automatic and prompt carrying out of standing instructions on due date and generation of reports.
Generation of various MIS reports and periodical returns on due dates.
Fast and up-to-date information transfer enabling speedier decisions, by interconnecting computerized
branches and controlling offices.
For the employees:-
Accurate computing of cumbersome and time-consuming jobs such as balancing and interest calculations on
due dates.
Automatic printing of covering schedules, deposit receipts, pass book / pass sheet, freeing the staff from
performing these time-consuming jobs, and enabling them to give more attention to the needs of the
customer.
Signature retrieval facility, assisting in verification of transactions, sitting at their own terminal.
Avoidance of duplication of entries due to existence of single-point data entry.
Page 6 of 57
Chapter Two
Hardware and Software
1. Input, Output, Central Processing Unit Of Computer?
2. Data Storage Device & Types?
3. Operating System (OS)?
4. Difference between Hardware & Software?
5. Various Types Of Software?
6. What Is Utility Software Give 5 Example?
7. Software Package
8. What Are The Software Development Life Cycle Phases?
9. ERP Software: Enterprise Resource Planning Software?
10. COMPUTER MEMORY?
11. Core Banking Software?
12. Cache Memory
13. Micro-processor
14. systems software and application software
15. What does Storage Device mean? Mechanism of storing data in a hard disk:
Architecture of a computer:
Input, output & central processing unit:
Input Unit
Input Unit accepts the instructions and data
from the outside world. Then it converts
these instructions and data in computer
acceptable form. after that it supplies the
converted instructions and data to the
computer system for further processing.
Output Unit
The output unit is just reverse of the input
unit. it accepts the result produced by
computer, which are in coded form and
can't be easily understood by us. Then it
converts these coded result into human
readable form. After that it supplies the
converted results to the outside world.
Memory Unit
The Memory Unit is the part of the computer that holds data and instructions for processing. Although it is closely
associated with the CPU, in actual fact it is separate from it. Memory associated with the CPU is also called primary
storage, primary memory, main storage, internal storage and main memory. When we load software from a floppy
disk, hard disk or CD-ROM, it is stored in the Main Memory.
Page 7 of 57
There are two types of computer memory inside the computer:
Primary Memory
Secondary Memory
Primary Memory
Primary storage, presently known as main memory, is the only one directly accessible to the CPU. The CPU
continuously reads instructions stored there and executes them as required. Any data actively operated on is also
stored there in uniform manner. However, the primary memory can hold information only while the computer system
is ON. As soon as the computer system is switched off or rest, the information hold in primary memory disappears.
Also it has limited storage capacity because it is very expensive. It is made up of semiconductor devices.
Secondary Memory
Secondary storage, sometimes called auxiliary storage, is all data storage that is not currently in a computer's primary
storage or memory. This is computer memory that is not directly accessible to the processor but uses the I/O
channels. It is for storing data not in active use and preserves data even without power, meaning it is non-volatile. In a
personal computer, secondary storage typically consists of storage on the hard disk and on any removable media, if
present, such as a CD or DVD.
Control Unit
The control unit (often called a control system or central controller) directs the various components of a computer. It
reads and interprets (decodes) instructions in the program one by one. The control system decodes each instruction
and turns it into a series of control signals that operate the other parts of the computer. Control systems in advanced
computers may change the order of some instructions so as to improve performance. its functions are:
1. Read the code for the next instruction from the cell indicated by the program counter.
2. Decode the numerical code for the instruction into a set of commands or signals for each of the other systems.
3. Increment the program counter so it points to the next instruction.
4. Read whatever data the instruction requires from cells in memory (or perhaps from an input device). The location
of this required data is typically stored within the instruction code.
5. Provide the necessary data to an ALU or register.
6. If the instruction requires an ALU or specialized hardware to complete, instruct the hardware to perform the
requested operation.
7. Write the result from the ALU back to a memory location or to a register or perhaps an output device. 8. Jump back
to step (1).
Page 8 of 57
2. What does Storage Device mean? Types? Mechanism of storing data in a hard disk?
A data storage device is a device for recording (storing) information (data). Recording can be done using virtually
any form of energy, spanning from manual muscle power in handwriting, to acoustic vibrations in phonographic
recording, to electromagnetic energy modulating magnetic tape and optical discs.
A storage device is any computing hardware that is used for storing, porting and extracting data files and objects. It
can hold and store information both temporarily and permanently, and can be internal or external to a computer,
server or any similar computing device.
A storage device may also be known as a storage medium.
Storage devices are one of the core components of any computing device. They store virtually all the data and
applications on a computer, except hardware firmware. They are available in different form factors depending on the
type of underlying device. For example, a standard computer has multiple storage devices including RAM, cache, a
hard disk, an optical disk drive and externally connected USB drives. There are two different types of storage devices:
Primary Storage Devices: Generally smaller in size, are designed to hold data temporarily and are internal
to the computer. They have the fastest data access speed, and include RAM and cache memory.
Secondary Storage Devices: These usually have large storage capacity, and they store data permanently.
They can be both internal an
Some examples of data storage devices include:
Hard drives
CD, DVD, and Blu-Ray drives
Floppy drives
Zip drives
USB Flash drives
CompactFlash cards
SD cards
Tape drives
Input, storage, processing, control, and output System software, Programming software, and
Types
devices. Application software.
CD-ROM, monitor, printer, video card, scanners , Quick books, Adobe Acrobat, Winoms-Cs, Internet
Examples
label makers, routers , and modems. Explorer , Microsoft Word , Microsoft Excel
Hardware serve as the delivery system for
software solutions. The hardware of a computer To perform the specific task you need to complete.
is infrequently changed, in comparison with Software is generally not needed to for the hardware to
Function
software and data, which are “soft” in the sense perform its basic level tasks such as turning on and
that they are readily created, modified, or responding to input.
erased on the computer
Inter Hardware starts functioning once software is To deliver its set of instructions, Software is installed
dependency loaded. on hardware.
Hardware failure is random. Hardware does Software failure is systematic. Software does not have
Failure
have increasing failure at the last stage. an increasing failure rate.
Software does not wear out over time. However, bugs
Durability Hardware wears out over time.
are discovered in software as time passes.
Nature Hardware is physical in nature. Software is logical in nature.
Page 10 of 57
5. Various Types of Software?
Software can be categorized according to what it is designed to accomplish. There are two main types of software:
systems software and application software.
Systems Software
It helps in running the computer hardware and the computer system. System software is a collection of
operating systems; device drivers, servers, windowing systems and utilities. System software is the
communicator of user and hardware.
Systems software includes the programs that are dedicated to managing the computer itself, such as the
operating system, file management utilities, and disk operating system (or DOS). The operating system
manages the computer hardware resources in addition to applications and data. Without systems software
installed in our computers we would have to type the instructions for everything we wanted the computer to
do!
Applications Software
Application software consists of standalone programs that solve a specific business need. Business software,
databases and educational software are some forms of application software. Different word processors,
which are dedicated for specialized tasks to be performed by the user, are other examples of application
software.
Application software, or simply applications, are often called productivity programs or end-user programs
because they enable the user to complete tasks such as creating documents, spreadsheets, databases, and
publications, doing online research, sending email, designing graphics, running businesses, and even playing
games! Application software is specific to the task it is designed for and can be as simple as a calculator
application or as complex as a word processing application. When you begin creating a document, the word
processing software has already set the margins, font style and size, and the line spacing for you. But you can
change these settings, and you have many more formatting options available. For example, the word
processor application makes it easy to add color, headings, and pictures or delete, copy, move, and change the
document's appearance to suit your needs.
Other Software
Programming Software: This software comes in forms of tools that assist a programmer in writing
computer programs. Computer programs are sets of logical instructions that make a computer system
perform certain tasks. The tools that help the programmers in instructing a computer system include text
editors, compilers and interpreters.
Engineering / Scientific Software : These software ranges from astronomy to volcanology, from automotive
stress analysis to space shuttle orbital dynamics and from molecular biology to automated manufacturing.
This software is used in various aspects of engineering examination, scientific experiments and calculations
etc.
Embedded Software: Embedded software resides within a product to perform some specific tasks. Such as
the button control pad of microwave oven, the display controller, fuel controller of an automobile, secure gate
pass of an elevator or lift etc.
Product-line Software: Software that are designed to use by many different customers. Product-line
software can focus on a limited marketplace such as inventory control products or address mass consumer
markets such as word processing, spreadsheets, graphics etc.
Web Applications: Web applications are online software. These software work through web sites mainly.
These applications not only provide standalone features but also integrated with corporate databases and
business applications.
Artificial Intelligence Software: AI software makes use of nonnumeric algorithms to solve complex
problems that are amenable to computation or straightforward analysis. Application within this area includes
robotics, expert systems, pattern recognition, game playing etc.
Page 11 of 57
6. What Is Utility Software Give 5 Example?
A Utility software is a computer software designed to help in the management and tuning of operating systems,
computer hardware and application software. It is designed to perform a single task or a multiple of small tasks.
Examples of utility software's include:
Disk defragmenters,
System Profilers,
Network Managers,
Application Launchers and
Virus Scanners.
7. Software Package
(1) A special method of distributing and installing software (or software upgrades) to a computer. For example, on a
Macintosh computer, a package usually means "software." It's specifically a directory, presented as a single file, that
contains all the information the Mac OS X Installer application needs to install your software. That includes the
software itself, as well as files that are used only during the installation process. In a Windows environment it is
sometimes called an installation package or update package.
(2) Multiple software programs that work together (or performs similar functions) and is bundled and sold together
as a software package.
(3) Term used to describe software that is bunched together making a complete set. For example, Microsoft Office is
packaged software that includes many software programs that may be used in the office, such as Microsoft Excel,
Microsoft Word and Microsoft Access.
Page 12 of 57
6) Maintenance: Once when the customers starts using the developed system then the actual problems comes up and
needs to be solved from time to time. This process where the care is taken for the developed product is known as
maintenance.
10 COMPUTER MEMORY?
Memory is an essential element of a computer.
Without its memory, a computer is of hardly any use.
Memory plays an important role in saving and
retrieving data. The performance of the computer
system depends upon the size of the memory.
Memory is of following types:
1. Primary Memory / Volatile Memory.
2. Secondary Memory / Non Volatile Memory.
1. Primary Memory / Volatile Memory: Primary Memory is internal memory of the computer. RAM AND ROM both
form part of primary memory. The primary memory provides main working space to the computer. The following
terms comes under primary memory of a computer are discussed below:
Random Access Memory (RAM): The primary storage is referred to as random access memory (RAM)
because it is possible to randomly select and use any location of the memory directly store and retrieve data.
It takes same time to any address of the memory as the first address. It is also called read/write memory. The
storage of data and instructions inside the primary storage is temporary. It disappears from RAM as soon as
the power to the computer is switched off. The memories, which lose their content on failure of power supply,
are known as volatile memories .So now we can say that RAM is volatile memory.
Read Only Memory (ROM): There is another memory in computer, which is called Read Only Memory
(ROM). Again it is the ICs inside the PC that form the ROM. The storage of program and data in the ROM is
permanent. The ROM stores some standard processing programs supplied by the manufacturers to operate
the personal computer. The ROM can only be read by the CPU but it cannot be changed. The basic
input/output program is stored in the ROM that examines and initializes various equipment attached to the
Page 13 of 57
PC when the power switch is ON. The memories, which do not lose their content on failure of power supply,
are known as non-volatile memories. ROM is non-volatile memory.
PROM: There is another type of primary memory in computer, which is called Programmable Read Only
Memory (PROM). You know that it is not possible to modify or erase programs stored in ROM, but it is
possible for you to store your program in PROM chip. Once the programmers’ are written it cannot be
changed and remain intact even if power is switched off. Therefore programs or instructions written in PROM
or ROM cannot be erased or changed.
EPROM: This stands for Erasable Programmable Read Only Memory, which overcome the problem of PROM
& ROM. EPROM chip can be programmed time and again by erasing the information stored earlier in it.
Information stored in EPROM exposing the chip for some time ultraviolet light and it erases chip is
reprogrammed using a special programming facility. When the EPROM is in use information can only be read.
Cache Memory: The speed of CPU is extremely high compared to the access time of main memory. Therefore
the performance of CPU decreases due to the slow speed of main memory. To decrease the mismatch in
operating speed, a small memory chip is attached between CPU and Main memory whose access time is very
close to the processing speed of CPU. It is called CACHE memory. CACHE memories are accessed much faster
than conventional RAM. It is used to store programs or data currently being executed or temporary data
frequently used by the CPU. So each memory makes main memory to be faster and larger than it really is. It is
also very expensive to have bigger size of cache memory and its size is normally kept small.
Registers: The CPU processes data and instructions with high speed; there is also movement of data between
various units of computer. It is necessary to transfer the processed data with high speed. So the computer
uses a number of special memory units called registers. They are not part of the main memory but they store
data or information temporarily and pass it on as directed by the control unit.
2. Secondary Memory / Non-Volatile Memory: Secondary memory is external and permanent in nature. The
secondary memory is concerned with magnetic memory. Secondary memory can be stored on storage media like
floppy disks, magnetic disks, magnetic tapes, This memory can also be stored optically on Optical disks - CD-ROM. The
following terms comes under secondary memory of a computer are discussed below:
1. Magnetic Tape: Magnetic tapes are used for large computers like mainframe computers where large volume
of data is stored for a longer time. In PC also you can use tapes in the form of cassettes. The cost of storing
data in tapes is inexpensive. Tapes consist of magnetic materials that store data permanently. It can be 12.5
mm to 25 mm wide plastic film-type and 500 meter to 1200 meter long which is coated with magnetic
material. The deck is connected to the central processor and information is fed into or read from the tape
through the processor. It’s similar to cassette tape recorder.
Magnetic Disk: You might have seen the gramophone record, which is circular like a disk and coated with
magnetic material. Magnetic disks used in computer are made on the same principle. It rotates with very high
speed inside the computer drive. Data is stored on both the surface of the disk. Magnetic disks are most
popular for direct access storage device. Each disk consists of a number of invisible concentric circles called
tracks. Information is recorded on tracks of a disk surface in the form of tiny magnetic spots. The presence of
a magnetic spot represents one bit and its absence represents zero bit. The information stored in a disk can
be read many times without affecting the stored data. So the reading operation is non-destructive. But if you
want to write a new data, then the existing data is erased from the disk and new data is recorded. For
Example-Floppy Disk.
Optical Disk: With every new application and software there is greater demand for memory capacity. It is the
necessity to store large volume of data that has led to the development of optical disk storage medium.
Optical disks can be divided into the following categories:
1. Compact Disk/ Read Only Memory (CD-ROM
2. Write Once, Read Many (WORM)
3. Erasable Optical Disk
Page 14 of 57
designed to deal with multiple types of core banking functions are sometimes referred to as universal banking
systems.
Examples of core banking products include Infosys’ Finacle, Nucleus FinnOne and Oracle's Flexcube
application (from their acquisition of Indian IT vendor i-flex).
12 Cache Memory
Cache (pronounced cash) memory is extremely fast memory that is built into a computer’s central processing unit
(CPU), or located next to it on a separate chip. The CPU uses cache memory to store instructions that are repeatedly
required to run programs, improving overall system speed.
The advantage of cache memory is that the CPU does not have to use the motherboard’s system bus for data transfer.
Whenever data must be passed through the system bus, the data transfer speed slows to the motherboard’s capability.
The CPU can process data much faster by avoiding the bottleneck created by the system bus. When the processor
needs to read from or write to a location in main memory, it first checks whether a copy of that data is in the cache. If
so, the processor immediately reads from or writes to the cache, which is much faster than reading from or writing to
main memory.
Disadvantage of the Cache: Just in case the Cache memory is full and data that is required to process or an application
required to run doesn't fit into the Principle of Locality (that is not in the nearby location) then it is obvious that the
time required for the main memory to access the information would increase. Because, first the data need to be
relocated into the cache and then process over here if the cache memory was missing it would be quicker.
Furthermore being such an extensive memory they are very small in size which requires location and relocation of the
data or applications. It allows commonly accessed data to be stored in full and referenced faster than recompiling the
data each time.
Page 15 of 57
13. Micro-processor
A microprocessor incorporates the functions of a computer's central processing unit (CPU) on a single integrated
circuit (IC), or at most a few integrated circuits. It is a multipurpose, programmable device that accepts digital data as
input, processes it according to instructions stored in its memory, and provides results as output. It is an example of
sequential digital logic, as it has internal memory. Microprocessors operate on numbers and symbols represented in
the binary numeral system.
The advent of low-cost computers on integrated circuits has transformed modern society. General-purpose
microprocessors in personal computers are used for computation, text editing, multimedia display, and
communication over the Internet. Many more microprocessors are part of embedded systems, providing digital
control over myriad objects from appliances to automobiles to cellular phones and industrial process control
Page 16 of 57
Chapter Three
Number system
1. What is number system? Describe four number systems with example.
2. Parity Bit?
3. ASCII, BCD, UNICODE?
The decimal number system is used in general. However, the computers use binary number system. The octal and
hexadecimal number systems are used in the computer.
DECIMAL (base 10) - Possible digits: 0, 1, 2, 3, 4, 5, 6, 7, 8, 9
The Decimal Number System consists of ten digits from 0 to 9. These digits can be used to represent any numeric
value. The base of decimal number system is 10. It is the most widely used number system. The value represented by
individual digit depends on weight and position of the digit.
Each number in this system consists of digits which are located at different positions. The position of first digit
towards left side of the decimal point is 0. The position of second digit towards left side of the decimal point is 1.
Similarly, the position of first digit towards right side of decimal point is -1. The position of second digit towards right
side of decimal point is -2 and so on.
The value of the number is determined by multiplying the digits with the weight of their position and adding the
results. This method is known as expansion method. The rightmost digit of number has the lowest weight. This digit is
called Least Significant Digit (LSD). The leftmost digit of a number has the highest weight. This digit is called Most
Significant Digit (MSD). The digit 7 in the number 724 is most significant digit and 4 is the least significant digit.
Page 18 of 57
Step
125708 (4096 + 1024 + 320 + 56 + 0)10
2
Step
125708 549610
3
Note: 125708 is normally written as 12570.
Hexadecimal Number System
Characteristics
Uses 10 digits and 6 letters: 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E, F.
Letters represent numbers starting from 10. A = 10. B = 11, C = 12, D = 13, E = 14, F = 15.
Also called base 16 number system.
Each position in a hexadecimal number represents a 0 power of the base (16). Example, 16 0.
Last position in a hexadecimal number represents a x power of the base (16). Example, 16x where x
represents the last position - 1.
Example
Hexadecimal Number: 19FDE16
Calculating Decimal Equivalent:
Step Hexadecimal Number Decimal Number
Step
19FDE16 ((1 x 164) + (9 x 163) + (F x 162) + (D x 161) + (E x 160))10
1
Step
19FDE16 ((1 x 164) + (9 x 163) + (15 x 162) + (13 x 161) + (14 x 160))10
2
Step
19FDE16 (65536+ 36864 + 3840 + 208 + 14)10
3
Step
19FDE16 10646210
4
2. Parity bit?
A parity bit, or check bit, is a bit added to the end of a string of binary code that indicates whether the number of bits
in the string with the value one is even or odd. Parity bits are used as the simplest form of error detecting code.
There are two variants of parity bits: even parity bit and odd parity bit. In case of even parity, the parity bit is set to
1 if the count of ones in a given set of bits (not including the parity bit) is odd, making the count of ones in the entire
set of bits (including the parity bit) even. If the count of ones in a given set of bits is already even, it is set to a 0. When
using odd parity, the parity bit is set to 1 if the count of ones in a given set of bits (not including the parity bit) is even,
making the count of ones in the entire set of bits (including the parity bit) odd. When the count of set bits is odd, then
the odd parity bit is set to 0.
If the parity bit is present but not used, it may be referred to as mark parity (when the parity bit is always 1) or
space parity (the bit is always 0).
A parity bit is a single bit added to a binary data transmission used to indicate if whether the 0's and 1's within that
data transmission is an even or odd number. The parity bit is used in parity error checking to find errors that may
occur during data transmission. In the picture to the right, is an example of a 8-bit binary number with the ninth digit
being the parity bit.
Page 19 of 57
3. ASCII, BCD, UNICODE?
**ASCII : ASCII codes represent text in computers, communications equipment, and other devices that work with text.
ASCII, pronounced "ask-ee" is the acronym for American Standard Code for Information Interchange. It's a set of
characters which, unlike the characters in word processing documents, allow no special formatting like different
fonts, bold, underlined or italic text. ASCII is computer code for the interchange of information between terminals.
An "ASCII file" is a data or text file that contains only characters coded from the standard ASCII character set.
Characters 0 through 127 comprise the Standard ASCII Set and characters 128 to 255 are considered to be in the
Extended ASCII Set. These codes, however, may not be the same in all computers and files containing these characters
may not display or convert properly by another ASCII program. ASCII characters are the ones used to send and receive
email.
**The reflected binary code, also known as Gray Code after Frank Gray, is a binary numeral system where two
successive values differ in only one digit.The reflected binary code was originally designed to prevent spurious output
from electromechanical switches. Today, Gray codes are widely used to facilitate error correction in digital
communications such as digital terrestrial television and some cable TV systems. This is a variable weighted code and
is cyclic.
This means that it is arranged so that every transition from one value to the next value involves only one bit change.
The gray code is sometimes referred to as reflected binary, because the first eight values compare with those of the
last 8 values, but in reverse order. The gray code is often used in mechanical applications such as shaft encoders.
**Unicode is an industry standard allowing computers to represent & manipulate text expressed in any of the world’s
writing systems. It consists of about 10000 characters, a set of code charts for visual reference, an encoding
methodology and a set of character encodings, rules, etc. It allows for combining characters as it contains
precomposed versions of most letter combinations in normal use. This makes conversion to and from encodings
simpler. It covers almost all scripts like Arabic, Bengali, Greek, Hebrew, Latin, Gujrati, etc. It is used in operating
systems, email, web, fonts, etc.
**Binary coded decimal (BCD) is a system of writing numerals that assigns a four-digit binary code to each digit 0
through 9 in a decimal (base-10) numeral. The four-bit BCD code for any particular single base-10 digit is its
representation in binary notation, as follows:
0 = 0000
1 = 0001
2 = 0010
3 = 0011
4 = 0100
5 = 0101
6 = 0110
7 = 0111
8 = 1000
9 = 1001
Numbers larger than 9, having two or more digits in the decimal system, are expressed digit by digit. For example, the
BCD rendition of the base-10 number 1895 is
0001 1000 1001 0101
The binary equivalents of 1, 8, 9, and 5, always in a four-digit format, go from left to right.
The BCD representation of a number is not the same, in general, as its simple binary representation. In binary form,
for example, the decimal quantity 1895 appears as
11101100111
Other bit patterns are sometimes used in BCD format to represent special characters relevant to a particular system,
such as sign (positive or negative), error condition, or overflow condition.
The BCD system offers relative ease of conversion between machine-readable and human-readable numerals. As
compared to the simple binary system, however, BCD increases the circuit complexity. The BCD system is not as
widely used today as it was a few decades ago, although some systems still employ BCD in financial applications.
32. Inter-Branch Reconciliation: Inter-branch reconciliation is a major activity for banks and financial institutions
looking to create a balanced co-ordination between their various branches and their activities. Inter-branch
reconciliation can help the organisation discover any errors or negligence in transactions and make due changes.
Page 20 of 57
Chapter Four
Data management System and Disaster Recovery
1. Database Management System?
2. Data Center? How Does A Data Center Work?
3. DR (Disaster Recovery) Plan?
4. Disaster Recovery Site Selection: Factors And Approach?
5. Business Continuity Plan
6. Data Security Through Encryption & Decryption
7. Digital Signature? Digital Signature & Data Genuineness
8. RSA Data Security Digital Signature Process
9. Data Warehouse
10. Digital Signature
11. Database Base Management System (DBMS)
12. How to ensure data security in banks:
13. Digital Bangladesh:
Database Base Management System (DBMS) is a set of programs that enables you to store, modify, and
extract information from a database, it also provide users with tools to add, delete, access, modify, and
analyze data stored in one location. A group can access the data by using query and reporting tools that are
part of the DBMS or by using application programs specifically written to access the data. The following are
examples of database applications:
computerized library systems
automated teller machines
flight reservation systems
computerized parts inventory systems
Page 21 of 57
These kinds of data centers contain information that is critical to the continued operation of the bank, university, or
other business. Therefore, that data cannot be lost. Security measures surrounding such data centers are usually very
strong, as are systems of climate control that keep the data center's computer systems from malfunctioning. Data
centers will also almost certainly contain backup computers or mirror drives that protect against massive data loss.
Such backup computers or mirror drives are routinely dependent not only on electronic power but also on battery
power, so that they can continue to function in the case of an interruption of electronic power.
Other kinds of data centers can be found in government institutions; companies that have multiple headquarters; and
providers of electronic services such as television, mobile phones, and the like. A data center can also be a single
computer, storing and accessing one company's or one person's critical data. Smaller data centers usually have less
complicated forms of data protection. No matter the size, all data centers serve the same function: to compile and
protect the data of a person or company.
Because instant and always-on access to the Internet or even a company intranet is now the norm, data centers run
'round the clock to ensure the content they contain is accessible at all times. In order to maximize uptime, they often
rely on a sophisticated array of redundant power supplies and data management systems. These systems can keep
websites, files, or applications available even if connection, power, or hardware issues arise.
Page 23 of 57
Steps to setup your organization’s Data Disaster Recovery plan:
Step 1
Schedule regular transfers (Backup) from the primary center to your IBackup account. The data is transferred with all
possible optimizations including encrypted and compressed delta transfers and incremental transfers - i.e. only new
files and modified portions of the already backed up file(s) are backed up after the initial first backup.
Step 2
Schedule regular transfers (Restore) from IBackup account to your disaster recovery site. The data is transferred with
all possible optimizations as described in Step 1.
You can optimize the schedules of your backups and restore to keep data almost mirrored between primary and
disaster recovery sites, with minimal delay. This solution is reliable, scalable to multiple terabytes of data and
efficient. You will have primary and secondary locations with full copy of data, and in addition, a copy available on the
web accessible from anywhere.
Some key features that are part of the IBackup Disaster Recovery Solution:
Highly scalable and reliable
Data is encrypted with 256 bit AES with optional private key for additional security during transit
Data is never deleted from the disaster recovery site even if it is deleted from the primary site
Open files (such as quickbooks, outlook and other database type files) are also mirrored while they are in use
Page 24 of 57
7. Capacity Available for Further Expansion – Capacity and scalability of DR site has to be looked into considering
future growth plans.
8. Network Latency – For DR strategy to work as per requirement, data has to be copied from primary datacenter to
DR. Network latency plays a major role in this and becomes a crucial factor while deciding for DR site.
9. Cost Implications – Last but not the least is cost implications of building a DR site at a particular location. This
involves both CAPEX and OPEX.
Once factors are finalized for DR site selection, next action will be to select a site based on it. Next section defines
about the approach for the same.
DR Site Selection – Approach
Approach for selecting a DR site is very similar to ones which we use for making most of business decisions. It
includes data collection, followed by assessment and decision. Before a company starts the process of site selection for
its DR Datacenter, company should have made a decision on Primary datacenter site and DR strategy is in place. Post
this, below approach will help to select a site for DR Datacenter:
Step 1 – Requirement gathering: During this phase, DR strategy and policies formulated by company should be well
understood. In addition to that various application requirements w.r.t. RPO/RTO and SLAs have to be collected and
documented.
Step 2 – Assessment: Post data collection, next step is to assess the requirements and finalize various factors that
need to be considered for site selection. Some of the above mentioned factors will help on the same.
Weighted score method can be used to work on various options that are available for DR site. Below diagram depicts
an illustrative weighted score method for site selection.
Step 3 – Decision/Report: Based on analysis, weighted score method and experience, final decision need to be taken
for DR site selection.
In summary, selecting a DR site is an important step in customer’s journey to build a world class infrastructure for
servicing its customers. With a well-defined DR strategy and site selection process, it will become easier for
companies to succeed in its business goals.
Importance:
Here are the top five ways a business continuity plan can help your organization minimize the effects of emergencies
and disasters:
1. Ensure important business operations continue. A business continuity plan helps identify even simple contingency
plans, such as installing generators at a hospital to ensure important equipment continues to operate during power
outages.
2. Allow for remote operation. A larger event, such as a fire or flood, could prevent your staff from getting to your
offices. A business continuity plan could include processes that would, for example, enable staff to work from a remote
location via laptops or tablet computers.
3. Protect your important assets, such as your customer and accounting data. An important aspect of business
continuity planning is identifying your key assets and ensuring they are stored in secured locations. In the case of data,
you may want to create a duplicate storage facility in a secondary location.
4. Reduce your downtime. Every hour your business is down costs you money. With a business continuity plan in place,
you will get back up and running more quickly.
Page 25 of 57
5. Prevent you from going out of business. During larger events, your business could be down for an extended period
of time, resulting in significant revenue losses. Ultimately, a business continuity plan could prevent your business from
going under.
Consider which job functions are critically necessary, every day. Think about who fills those positions when
the primary job-holder is on vacation.
Make a list of all those individuals with all contact information including business phone, home phone, cell
phone, pager, business email, personal email, and any other possible way of contacting them in an emergency
situation where normal communications might be unavailable.
2Identify who can telecommute. Some people in your company might be perfectly capable of conducting
business from a home office. Find out who can and who cannot.
You might consider assuring that your critical staff (identified in Step 1) can all telecommute if necessary.
3Document external contacts. If you have critical vendors or contractors, build a special contact list that includes
a description of the company (or individual) and any other absolutely critical information about them including key
personnel contact information.
Include in your list people like attorneys, bankers, IT consultants...anyone that you might need to call to assist
with various operational issues.
Don’t forget utility companies, municipal and community offices (police, fire, water, hospitals) and the post
office!
4Document critical equipment. Personal computers often contain critical information (you do have off-site
backups, don’t you?).
Some businesses cannot function even for a few hours without a fax machine. Do you rely heavily on your
copy machine? Do you have special printers you absolutely must have?
Don’t forget software – that would often be considered critical equipment especially if it is specialized
software or if it cannot be replaced.
5Identify critical documents. Articles of incorporation and other legal papers, utility bills, banking information,
critical HR documents, building lease papers, tax returns...you need to have everything available that would be
necessary to start your business over again.
Remember, you might be dealing with a total facility loss. Would you know when to pay the loan on your
company vehicles? To whom do you send payment for your email services?
6Identify contingency equipment options. If your company uses trucks, and it is possible the trucks might be
damaged in a building fire, where would you rent trucks? Where would you rent computers? Can you use a business
service outlet for copies, fax, printing, and other critical functions?
Page 26 of 57
7Identify your contingency location. This is the place you will conduct business while your primary offices are
unavailable.
It could be a hotel – many of them have very well-equipped business facilities you can use. It might be one of
your contractors’ offices, or your attorney’s office.
Perhaps telecommuting for everyone is a viable option.
If you do have an identified temporary location, include a map in your BCP. Wherever it is, make sure you
have all the appropriate contact information (including people’s names).
8Make a "How-to". It should include step-by-step instructions on what to do, who should do it, and how.
List each responsibility and write down the name of the person assigned to it. Also, do the reverse: For each
person, list the responsibilities. That way, if you want to know who is supposed to call the insurance
company, you can look up "Insurance." And if you want to know what Joe Doe is doing, you can look under
"Joe" for that information.
9Put the information together! A BCP is useless if all the information is scattered about in different places. A BCP
is a reference document – it should all be kept together in something like a 3-ring binder.
Make plenty of copies and give one to each of your key personnel.
Keep several extra copies at an off-site location, at home and/or in a safety-deposit box.
10Communicate. Make sure everyone in your company knows the BCP.
Hold mandatory training classes for each and every employee whether they are on the critical list or not. You
do not want your non-critical staff driving through an ice storm to get to a building that has been damaged by
fire then wondering what to do next.
11Test the plan! You’ve put really good ideas down, accumulated all your information, identified contingency
locations, listed your personnel, contacts and service companies, but can you pull it off?
Pick a day and let everyone know what’s going to happen (including your customers, contractors and
vendors); then on that morning, act as though your office building has been destroyed. Make the calls – go to
the contingency site.
One thing you will definitely learn in the test is that you haven’t gotten it all just exactly right. Don’t wait until
disaster strikes to figure out what you should do differently next time. Run the test.
If you make any major changes, run it again a few months later. Even after you have a solid plan, you should
test it annually.
12Plan to change the plan. No matter how good your plan is, and no matter how smoothly your test runs, it is
likely there will be events outside your plan. The hotel you plan to use for your contingency site is hosting a huge
convention. You can’t get into the bank because the disaster happened on a banking holiday. The power is out in your
house. The copy machine at the business services company is broken. Your IT consultant is on vacation.
13Review and revise. Every time something changes, update all copies of your BCP.
Never let it get out of date. An out-of-date plan can be worse than useless: it can make you feel safe when you
are definitely not safe.
Page 27 of 57
It is difficult to determine the quality of an encryption algorithm. Algorithms that look promising sometimes turn out
to be very easy to break, given the proper attack. When selecting an encryption algorithm, it is a good idea to choose
one that has been in use for several years and has successfully resisted all attacks.
Digital Signature
A digital signature or digital signature scheme is a mathematical scheme for demonstrating the authenticity of a digital
message or document. A valid digital signature gives a recipient reason to believe that the message was created by a
known sender, and that it was not altered in transit. Digital signatures are commonly used for software distribution,
financial transactions, and in other cases where it is important to detect forgery or tampering. In some countries,
including the United States, India, and members of the European Union, electronic signatures have legal significance.
Page 28 of 57
8. RSA Data Security Digital
Signature Process
In the RSA digital signature process, the private
key is used to encrypt only the message digest.
The encrypted message digest becomes the digital
signature and is attached to the original data.
Figure 14.7 illustrates the basic RSA Data Security
digital signature process.
9. Data Warehouse
A Data Warehouse or Enterprise Data Warehouse (DW, DWH, or EDW) is a database used for reporting and data
analysis. It is a central repository of data which is created by integrating data from one or more disparate sources.
Data warehouses store current as well as historical data and are used for creating trending reports for senior
management reporting such as annual and quarterly comparisons.
The data stored in the warehouse are uploaded from the operational systems. The data may pass through an
operational data store for additional operations before they are used in the DW for reporting.
The typical ETL-based data warehouse uses staging, data integration, and access layers to house its key functions. The
staging layer or staging database stores raw data extracted from each of the disparate source data systems. The
integration layer integrates the disparate data sets by transforming the data from the staging layer often storing this
transformed data in an operational data store (ODS) database. The integrated data are then moved to yet another
database, often called the data warehouse database, where the data is arranged into hierarchical groups often called
dimensions and into facts and aggregate facts. The combination of facts and dimensions is sometimes called a star
schema. The access layer helps users retrieve data.
Benefits of a data warehouse:
A data warehouse maintains a copy of information from the source transaction systems.
Gather data from multiple sources into a single database so a single query engine can be used to present data.
Mitigate the problem of database isolation level lock contention in transaction processing systems caused by
attempts to run large, long running, analysis queries in transaction processing databases.
Maintain data history, even if the source transaction systems do not.
Integrate data from multiple source systems, enabling a central view across the enterprise. This benefit is
always valuable, but particularly so when the organization has grown by merger.
Improve data quality, by providing consistent codes and descriptions, flagging or even fixing bad data.
Present the organization's information consistently.
Provide a single common data model for all data of interest regardless of the data's source.
Restructure the data so that it makes sense to the business users.
Restructure the data so that it delivers excellent query performance, even for complex analytic queries,
without impacting the operational systems.
Add value to operational business applications, notably customer relationship management (CRM) systems
Page 29 of 57
10. How to ensure data security in banks?
1. User ID Maintenance: Each user must have a unique User ID and a valid password. User ID shall be locked
up after 3 unsuccessful login attempts. User ID and password shall not be same. User ID Maintenance form
with access privileges shall be duly approved by the appropriate authority. Access privileges shall be
changed/ locked within 24 hours or as per bank's policy when users' status changed or user left the bank.
2. Password Control: The password definition parameters ensure that minimum password length is specified
according to the Bank's ICT Security Policy (at least 6 characters, combination of uppercase, lowercase,
numbers & may include special characters). Administrative password of Operating System, Database and
Banking Application shall be kept in sealed envelope and kept in a safe custody (centralized/decentralized).
The maximum validity period of password shall not be beyond the number of days permitted in the Bank's
ICT Security Policy (within 30 to 90 days cycle).
3. Input Control: Software shall not allow the same user to be both maker and checker of the same transaction.
Management approval must be in place for delegation of authority. The system shall be restricted from being
accessed especially in sensitive data/fields.
4. Network Security: The Network Design and its security shall be implemented under a documented plan.
Physical security for the network equipment shall be ensured. Specifically: Access shall be restricted and
controlled. Network equipment shall be housed in a secure environment. Unauthorized access and electronic
tampering shall be controlled strict Firewall shall be in place on the network for any external connectivity.
There shall be a system to detect unauthorized intruder in the network. Connection of personal laptop to
office LAN or any personal wireless modem with the office laptop/desktop must be secured.
5. Data Encryption: Mechanism shall be in place to encrypt and decrypt sensitive data travelling through WAN
or public network.
6. Virus Protection: Anti‐virus software shall be installed in each server and computer whether it is connected
to network or not. Virus auto protection mode shall be enabled. Anti‐virus software shall always be updated
with the latest virus definition file. All computers in the network shall get updated signature of anti‐virus
software automatically from the server.
Page 30 of 57
Chapter Five
ICT Policy and IT Audit
1. Information and Communications Technology (Ict) Audit? Need for IT Audit?
2. Audit Trail?
3. ICT Policy scenario in Bangladesh?
4. Audit trail:
5. Cyber Crime:
6. Objective of ICT policy:
7. Cyber law in Bangladesh
Confidentiality
Confidentiality concerns the protection of sensitive information from unauthorised disclosure.Consideration needs to
be given to the level of sensitivity to the data, as this will determine how stringent controls over its access should
be.Management need assurance of the organisation’s ability to maintain information confidential, as compromises in
confidentiality could lead to significant public reputation harm, particularly where the information relates to sensitive
client data.
Page 31 of 57
Integrity
Integrity refers to the accuracy and completeness of information as well as to its validity in accordance with business
values and expectations. This is an important audit objective to gain assurance on because it provides assurance to
both management and external report users that the information produced by the organisation’s information systems
can be relied and trusted upon to make business decisions.
Availability
Availability relates to information being available when required by the business process now and in the future. It also
concerns the safeguarding of necessary resources and associated capabilities. Given the high-risk nature of keeping
important information stored on computer systems, it is important that organisations gain assurance that the
information they need for decision-making is available when required. This implies ensuring that the organisation has
measures in place to ensure business continuity and ensuring that recovery can be made in a timely manner from
disasters so that information is available to users as and when required.
Reliability
Reliability refers to the degree of consistency of a system or the ability of a system (or component) to perform its
required function under stated conditions.Reliability is an important audit objective in order to provide assurance
that the system consistently operates and performs its stated functions as expected.
Compliance with Legal and Regulatory Requirements
Compliance deals with complying with those laws, regulations and contractual obligations to which the business
process is subject, that is, externally imposed business criteria. Management and key stakeholders require assurance
that necessary compliance procedures have been put in place, as there is a potential risk that the organisation could
incur penalties should legal and regulatory procedures not be enforced.
2. Audit Trail?
A record showing who has accessed a computer system and what operations he or she has performed during a given
period of time. Audit trails are useful both for maintaining security and for recovering lost transactions. Most
accounting systems and database management systems include an audit trail component. In addition, there are
separate audit trail software products that enable network administrators to monitor use of network resources.
An audit trail (or audit log) is a security-relevant chronological record, set of records, or destination and source of
records that provide documentary evidence of the sequence of activities that have affected at any time a specific
operation, procedure, or event. Audit records typically result from activities such as financial transactions, scientific
research and health care data transactions or communications by individual people, systems, accounts, or other
entities.
The process that creates an audit trail is typically required to always run in a privileged mode, so it can access and
supervise all actions from all users; a normal user should not be allowed to stop/change it. Furthermore, for the same
reason, trail file or database table with a trail should not be accessible to normal users. Another way of handling this
issue is through the use of a role-based security model in the software. The software can operate with the closed-
looped controls, or as a 'closed system,' as required by many companies when using audit trail functionality.
In accounting, an audit trail is the sequence of paperwork that validates or invalidates accounting entries. In
computing, the term is also used for an electronic or paper log used to track computer activity. For example, a
corporate employee might have access to a section of a network in a corporation such as billing but be unauthorized
to access all other sections. If that employee attempts to access an unauthorized section by typing in passwords, this
improper activity is recorded in the audit trail.
Page 32 of 57
Objectives
Social Equity:
Ensure social equity, gender parity, equal opportunity and equitable participation in nation-building through access to
ICTs for all, including persons with disabilities and special needs Productivity: Achieve higher productivity across all
economic sectors including agriculture and SMME (small, medium and micro enterprises) through the use of ICTs.
Integrity: Achieve transparency, accountability, responsiveness and higher efficiency in the delivery of citizen-
services. Education and Research: Expand the reach and quality of education to all parts of the country using ICTs,
ensure computer literacy at all levels of education and public service and facilitate innovation, creation of intellectual
property and adoption of ICTs through appropriate research and development.
Employment Generation: Enlarge the pool of world-class ICT professionals to cater to the local and overseas
employment opportunities.
Strengthening Exports: Ensure a thriving software, ITES and IT manufacturing industry to meet domestic and global
demands and thereby increase foreign exchange earnings, attract foreign direct investments and reduce dependence
on imports.
Healthcare: Ensure quality healthcare to all citizens by innovative application of ICTs.
Universal Access: Ensure connectivity to all as a public service obligation (PSO).
Environment, Climate and Disaster Management: Enhance creation and adoption of environment-friendly green
technologies, ensure safe disposal of toxic wastes, minimize disaster response times and enable effective climate-
change management programs through use of ICTs as Bangladesh is facing the dual scourge of environmental
pollution due to rising industrial and consumer wastes and also global-warming-induced climate-change due to
excessive carbon emissions of the industrialized countries.
ICT has been given considerable importance from the Prime Minister’s Office in the last few years
A National ICT Task Force has been formed which is headed by the Honorable Prime Minister
The Executive Committee of the National ICT Task Force, headed by the Honorable Principal Secretary,
administers the implementation of decisions taken by the Task Force
A program called the Support to ICT Task Force (SICT) has been initiated, with financial support from the
Government, to provide implementation and monitoring support to the Task Force.
The Ministry of Science and Technology has been renamed as the Ministry of Science and ICT and has been
entrusted the duty of working as the primary hub for ICT policy and implementation in the country.
The Ministry of Science and ICT has come up with a comprehensive ICT Policy in 2002.
The Ministry of Post and Telecom has also come up with a National Telecom Policy in 1998 (time for a revised
policy)
Page 33 of 57
ICTE and capacity building
Policy
Facilities shall be built to promote ICT training and computer aided training at all levels of education
including Primary Schools and Madrasahs.
Universities, Bangladesh Institutes of Technology and colleges, both in the public and private sectors,
shall be strengthened to produce ICT graduates in four-year Computer Science and/or Engineering
courses.
Establish multimedia institutes up to district level.
Diploma and Trade Certificate in ICT will be offered in both public and private institutes including
Polytechnics.
Use the potential of ICT for delivery of distance education to help stretch the country’s limited
teaching resources and ensure quality education to all.
Preference shall be given to ICT literate candidates for the purpose of recruitment in public offices.
ICT-literacy shall also be evaluated in the Annual Confidential Report (ACR) of officials to ensure
utilization of ICTs in the public services.
4. Cyber Crime:
Cyber crime refers to all activities done with criminal intent in cyberspace. These fall into three slots.
Against persons
Against Business and Non-business organizations
Crime targeting the government
Cyber crime is the unlawful act wherein the computer information technology is used either as a tool or a target or
both. Cybercrime covers many crimes. The computer itself is a tool that may be used for an unlawful act. This kind of
activity usually involves modification of a conventional crime by using computers.
This kind of activity usually involves modification of a conventional crime by using computers. The following are the
examples of cybercrime-
Financial crime: Financial crimes include cheating, credit card frauds, money laundering etc.
Cyber Pornography: Cyber Pornography includes pornographic websites, pornographic magazines produced by
using computer and the Internet to download and transmit pornographic pictures, photos, writings etc
Page 34 of 57
.
Sale of Illegal Articles: Sale of illegal articles includes sale of narcotics, weapons and wildlife, illegal medicine etc.
This can be by posting information on websites, auction websites and bulletin boards or simply by using e-mail
communications. Many of the auction sites are believed to be selling cocaine in the name of honey.
Online Gambling : There are millions of websites, all hosted on servers abroad that offer online gambling. In fact, it is
believed that many of these websites are actually fronts for money laundering .
Intellectual Property Crimes: These include software piracy, copyright infringement, trademarks violations, theft of
computer source code etc.
E-mail spoofing: A spoofed email is that email which appears to originate from one source but actually has been sent
from another source. This can also be termed as E-mail forging.
Forgery: Counterfeit currency notes, postage and revenue stamps, mark sheets etc. can be forged using sophisticated
computers, printers and scanners. This is becoming a booming business now a days.
Cyber Defamation : This occurs when defamation takes place with the help of computers and or the Internet e.g.
someone publishes defamatory matter about someone on websites or sends e-mail to his friends containing
defamatory information.
Cyber Stalking :Cyber stalking involves a person’s movements across the Internet. The person sends the message on
the bulletin boards frequently to the victim. He can enter chat rooms and disturb the victim by constantly sending
emails.
In the Information Communication Technology Act of Bangladesh does not define what the Cyber law by any section
is. But Cyber laws are contained in the Information and Communication Technology Act, 2006. Therefore this Act
provide the legal infrastructure for e-commerce others legal solution relating with cyber crime in Bangladesh. The
said Act enable (a) Legal recognition of electronic transaction, (b) Legal recognition of digital signature, (c)
Acceptance to con-tract expressed by electronic means, (d) e-commerce and electronic form, (f) publication of official
gazette in the electronic form, (g) prevention of computer crime, forged electronic records, international alteration of
electronic records fraud, forgery or falsification in e-commerce and electronic transaction, (h) and others solutions of
the crime relation with information Communication Technology.
Page 35 of 57
Chapter Six
Modern Banking
1. Personal Banking?
2. Online Banking?
3. Mobile Banking?
4. What Is ANY BRANCH BANKING?
5. Difference between Debit Card & Credit Card?
6. Master Card & VISA Card?
7. P/N (Personal identification number)
8. Smart Card
9. Online Banking:
10. Sms banking:
11. Mobile Banking:
12. Smart Card?
13. Website?
14. Plastic Money?
15. Difference between OMR, OCR, and MICR?
16. “ATM has made our life easy”-Explain.
17. CHIPS
18. Internet Banking:
19. Difference between smart card & other cards:
1. Personal Banking?
PC banking refers to a person being able to access their banking information from a "personal computer." It has
become a popular method for people to manage money and pay bills using online servers to log in to their account and
pay bills, transfer money between accounts and reconcile check ledgers.”
Example of Personal Banking Is-
ATM:-“Automated Teller Machines (ATM) are computerized machines that allow customers to conduct basic banking
transactions without an attendant or bank teller.”
How Does It Works:-
ATM Processing is similar to credit card processing, except with ATM Machines the processing center uses ATM
networks instead of credit networks. To begin with, we will have to program or re-programmed your ATM machine
with a TID (terminal ID number) assigned to your ATM at location . This is the number that identifies your ATM
machine on our ATM processing system
Before a transaction can be processed, the ATM machines must receive authorization from the customer's native
bank, such as confirmation that the customer has sufficient funds in his account to permit cash withdrawal. Interbank
networks allow this authorization process to take place in seconds.
Personal Banking Used For:-
Transactional:-
Bill payments and wire transfers to third parties,
Fund transfer between customer's transactional and savings account,
Sale and purchase of investments,
Applications and transactions for loans and enrollment repayments.
Non-Transactional:-
Analyzing recent transactions,
Downloading bank statements,
Viewing paid cheques.
Financial Institution Administration
Transaction approval process
Page 36 of 57
2. Online Banking?
A system allowing individuals to perform banking activities at home, via the internet. Some online banks are
traditional banks which also offer online banking, while others are online only and have no physical presence. Online
banking through traditional banks enable customers to perform all routine transactions, such as account transfers,
balance inquiries, bill payments, and stop-payment requests, and some even offer online loan and credit card
applications. Account information can be accessed anytime, day or night, and can be done from anywhere. A few
online banks update information in real-time, while others do it daily.
Online banking enables bank customers to handle account management and perform account transactions directly
with the bank through the internet. This is also known as internet banking
“Online banking enables bank customers to handle account management and perform account transactions directly
with the bank through the internet. This is also known as internet banking.”
Online Banking Used For:-
Personal financial management support- Importing data to personal accounts software. Supporting account
aggregation which allows the customers to manage all of their accounts in one place irrespective of their location.
3. Mobile Banking?
Mobile Banking refers to provision and availment of banking- and financial services with the help of mobile
telecommunication devices. The scope of offered services may include facilities to conduct bank and stock market
transactions, to administer accounts and to access customized information.“
OR
“Mobile banking through cell phone is really catching up. Now you can access your account, transfer funds or make
payments with your mobile. Mobile connectivity is vast and this makes mobile banking very successful.”
Benefits of Mobile Banking:-
In case of online banking, you must have an internet connection and a computer. However, with mobile
banking, connectivity is not a problem. You can find mobile connectivity in the remotest of places also where
having an internet connection is a problem.
Mobile banking thorough cell phone is user friendly. The interface is also very simple. You just need to follow
the instructions to make the transaction. It also saves the record of any transactions made.
Cell phone banking is cost effective. Various banks provide this facility at a lower cost as compared to banking
by self.
Banking through mobile reduces the risk of fraud. You will get an SMS whenever there is an activity in your
account. This includes deposits, cash withdrawals, funds transfer etc. You will get a notice as soon as any
amount is deducted or deposited in your account.
Banking through cell phone benefits the banks too. It cuts down on the cost of tele- banking and is more
economical.
Mobile banking through cell phone is very advantageous to the banks as it serves as a guide in order to help
the banks improve their customer care services.
Banks can be in touch with their clients with mobile banking.
Banks can also promote and sell their products and services like credit cards, loans etc. to a specific group of
customers.
Various banking services like Account Balance Enquiry , Credit/Debit Alerts, Bill Payment Alerts, Transaction
History, Fund Transfer Facilities, Minimum Balance Alerts etc. can be accessed from your mobile.
You can transfer money instantly to another account in the same bank using mobile banking.
You can make transactions or pay bills anytime. It saves a lot of time.
Page 39 of 57
8. Smart Card
A smart card is a plastic card about the size of a credit card, with an embedded microchip that can be loaded with data,
used for telephone calling, electronic cash payments, and other applications, and then periodically refreshed for
additional use.
Features of a smart card:
Smart cards can provide identification, authentication, data storage and application processing. Smart cards
may provide strong security authentication for single sign-on (SSO) within large organizations.
Smart cards serve as credit or ATM cards, fuel cards, mobile phone SIMs, authorization cards for pay
television, household utility pre-payment cards, high-security identification and access-control cards, and
public transport and public phone payment cards.
Smart cards may also be used as electronic wallets. The smart card chip can be "loaded" with funds to pay
parking meters, vending machines or merchants. Cryptographic protocols protect the exchange of money
between the smart card and the machine. No connection to a bank is needed. The holder of the card may use
it even if not the owner.
A smart card contains more information than a magnetic stripe card and it can be programmed for different
applications. Some cards can contain programming and data to support multiple applications and some can
be updated to add new applications after they are issued. Smart cards can be designed to be inserted into a
slot and read by a special reader or to be read at a distance, such as at a toll booth. Cards can be disposable (as
at a trade-show) or reloadable (for most applications).
A smart card, chip card, or integrated circuit card (ICC) is any pocket-sized card with embedded integrated
circuits. Smart cards are made of plastic, generally polyvinyl chloride,
Smart cards can provide identification, authentication, data storage and application processing. Smart cards may
provide strong security authentication for single sign-on (SSO) within large organizations.
A smart card resembles a credit card in size and shape, but inside it is completely different. First of all, it has an inside
-- a normal credit card is a simple piece of plastic. The inside of a smart card usually contains an embedded
microprocessor. The microprocessor is under a gold contact pad on one side of the card.
The most common smart card applications are:
Credit cards
Electronic cash
Computer security systems
Wireless communication
Loyalty systems (like frequent flyer points)
Banking
Satellite TV
Government identification
9. Sms banking:
SMS banking is a type of mobile banking, a technology-enabled service offering from banks to its customers,
permitting them to operate selected banking services over their mobile phones using SMS messaging.
SMS banking services are operated using both push and pull messages. Push messages are those that the bank chooses
to send out to a customer's mobile phone, without the customer initiating a request for the information. Typically
push messages could be either Mobile marketing messages or messages alerting an event which happens in the
customer's bank account, such as a large withdrawal of funds from the ATM or a large payment using the customer's
credit card, etc. (see section below on Typical Push and Pull messages).
Page 40 of 57
Online banking allows for easier updating and maintaining of direct accounts. The time for changing mailing
address is greatly reduced, ordering of additional checks is availed and provision of actual time interest rates.
Friendlier rates – Lack of substantial support and overhead costs results to direct banks offering higher
interest rates on savings and charge lower rates on mortgages and loans.
Some banks offer high yield certificate of deposits and don’t penalize withdrawals on certificate of deposits,
opening of accounts without minimum deposits and no minimum balance.
Transfer services – Online banking allows automatic funding of accounts from long established bank accounts
via electronic funds transfers.
Ease of monitoring – A client can monitor his/her spending via a virtual wallet through certain banks and
applications and enable payments.
Ease of transaction – the speed of transaction is faster relative to use of ATM’s or customary banking.
Page 42 of 57
printers. Black and White or on demand (DOD). Matrix.
color printers.
USD 0.6 for black and white USD 0.20 color page; USD
Price per page page. Much higher for a 0.4-0.5 black and white Copies are quite cheap.
color page. page.
Approximately USD 60- Basic cost of printer is quite expensive.
Approximately USD 100-
Cost for basic printer 1000, depending on the size Compared to an inkjet, dot matrix can
150
and use of the printer. cost between two to ten times more.
Printing speed 20 pages a minute 6 pages a minute 30-550 characters per second.
Printing quality is adequate. Printing quality is good, Printing quality is bad if printing images.
Quality
Best for black and white. specially for smaller fonts. In terms of text, printing is fine.
Color quality is a bit poor, with Color printing is sharp and Only works best with low-res
Color Quality
banding. excellent. images.
Page 43 of 57
16. Difference between OMR, OCR, and MICR?
a) MICR: MICR is a character recognition technology used primarily by the banking industry to facilitate
the processing of cheques. The human readable characters are printed on documents using a magnetic
ink. It stands for Magnetic Ink Character Recognition. (Magnetic Ink Character Recognition is a character
recognition system that uses special ink and characters. When a document that contains this ink needs
to be read, it passes through a machine, which magnetizes the ink and then translates the magnetic
information into characters.
MICR technology is used by banks. Numbers and characters found on the bottom of checks (usually
containing the check number, sort number, and account number) are printed using Magnetic Ink. To
print Magnetic Ink need, you need a laser printer that accepts MICR toner.
MICR provides a secure, high-speed method of scanning and processing information.)
b) OMR: OMR which stands for Optical Mark Recognition is the process of gathering data with an optical
scanner by measuring the reflectively of light at predetermined positions on a surface.
(Short for optical mark recognition, the technology of electronically extracting intended data from marked fields, such
as checkboxes and fill-infields, on printed forms. OMR technology scans a printed form and reads predefined positions
and records where marks are made on the form. This technology is useful for applications in which large numbers of
hand-filled forms need to be processed quickly and with great accuracy, such as surveys, reply cards, questionnaires
and ballots. A common OMR application is the use of “bubble sheets” for multiple-choice tests used by schools. The
student indicates the answer on the test by filling in the corresponding bubble, and the form is fed through an optical
mark reader (also abbreviated as OMR, a device that scans the document and reads the data from the marked fields.
The error rate for OMR technology is less than 1%.)
c) OCR: OCR stands for Optical Character Recognition. OCR is the recognition of printed or written text
characters by a computer. It is the application software that allows a computer to recognize printed or
written characters, e.g. letters, numbers, punctuation marks, and pictograms using an optical scanner for
input. OCR is being used by libraries to digitize and preserve their holdings.
(Often abbreviated OCR, optical character recognition refers to the branch of computer science that
involves reading text from paper and translating the images into a form that the computer can
manipulate (for example, into ASCII codes). An OCR system enables you to take a book or a magazine
article, feed it directly into an electronic computer file, and then edit the file using a word processor.
All OCR systems include an optical scanner for reading text, and sophisticated software for analyzing
images. Most OCR systems use a combination of hardware (specialized circuit boards) and software to
recognize characters, although some inexpensive systems do it entirely through software. Advanced
OCR systems can read text in large variety of fonts, but they still have difficulty with handwritten text.
The potential of OCR systems is enormous because they enable users to harness the power of computers
to access printed documents. OCR is already being used widely in the legal profession, where searches
that once required hours or days can now be accomplished in a few seconds.)
d) OBR: It stands for Optical Bar Code Reader which is used for reading bar-coded data. It scans a set of
vertical bars of different width for specific data and is used to read tags. Bar code reading is done by a
light pen or scanner connected to a computer.
17. Website?
A website is a collection of web pages (documents that are accessed through the Internet), such as the one you're
looking at now. A web page is what you see on the screen when you type in a web address, click on a link, or put a
query in a search engine. A web page can contain any type of information, and can include text, color, graphics,
animation and sound.
When someone gives you their web address, it generally takes you to their website's home page, which should
introduce you to what that site offers in terms of information or other services. From the home page, you can click on
links to reach other sections of the site. A website can consist of one page, or of tens of thousands of pages, depending
on what the site owner is trying to accomplish.
Page 44 of 57
Why Do People Visit Websites?
Generally, people look at websites for two primary reasons:
1. To find information they need. This could be anything from a student looking for pictures of frogs for a
school project, to finding the latest stock quotes, to getting the address of the nearest Thai restaurant.
2. To complete a task. Visitors may want to buy the latest best-seller, download a software program, or
participate in an online discussion about a favorite hobby.
3. The main thing to remember in creating a website is that you're not creating the website for you; you
already know about the information or service you have to offer. You're creating the site for your visitors, so
it should contain the content they want, and be organized in a way that makes sense, even to an outsider.
Plastic money is a term that is used predominantly in reference to the hard plastic cards we use everyday in place of
actual bank notes. They can come in many different forms such as cash cards, credit cards, debit cards, pre-paid cash
cards and store cards.
Cash Cards - A card that will allow you to withdraw money directly from your bank via an Authorised Teller Machine
(ATM) but it will not allow the holder to purchase anything directly with it.
Credit Cards - Again this card will permit the card holder to withdraw cash from an ATM, and a credit card will allow
the user to purchase goods and services directly, but unlike a Cash Card the money is basically a high interest loan to
the card holder, although the card holder can avoid any interest charges by paying the balance off in full each month.
Debit Cards - This type of card will directly debit money from your bank account, and can directly be used to
purchase goods and services. While there is no official credit facility with debit cards per se, as it is linked to the bank
account the limit is the limit of what is in the account, for instance if an overdraft facility is available then the limit will
be the extent of the overdraft.
Pre-paid Cash Cards - As the name suggests the user will add credit to the card themselves, and will not exceed that
amount. These are usually re-useable in that they can be 'topped up' however some cards, usually marketed as Gift
Cards are not re-useable and once the credit has been spent they are disposed of.
Store Cards - These are similar in concept to the Credit Card model, in that the idea is to purchase something in store
and be billed for it at the end of the month. These cards can be charged at a very high interest rate and can are limited
in the places they can be used, sometimes as far as only the store brand that issued it.
Page 45 of 57
Chapter Seven
Online Banking
1. SWIFT & Its Use?
2. Electronic Funds Transfer (EFT)?
3. Online CIB services ?
4. Electronic Payment System?
5. BATCH PROCESSING
6. Bangladesh Automated Clearing House (BACH)
7. Compiler, interpreter & assembler: Assembler, Compilers and Interpreters
8. Interbank Reconciliations
9. Online CIB
10. RTGS:
11. Electronic Payment System:
SWIFT is the Society for Worldwide Interbank Financial Telecommunication, a member-owned cooperative through
which the financial world conducts its business operations with speed, certainty and confidence. More than 10,000
banking organisations, securities institutions and corporate customers in 212 countries trust us every day to
exchange millions of standardised financial messages.
SWIFT does not facilitate funds transfer; rather, it sends payment orders, which must be settled by correspondent
accounts that the institutions have with each other. Each financial institution, to exchange banking transactions, must
have a banking relationship by either being a bank or affiliating itself with one (or more) so as to enjoy those
particular business features.
SWIFT for banks
Thousands of banks use SWIFT to increase their reach, achieve operational cost efficiencies and enhance their
customer service in payments, trade, treasury and securities services. Here is an overview of SWIFT’s value
proposition for banks:
Financial transaction services
Provide financial services to your corporate customers
Offer payments and cash management services to institutional clients
Connect to an ACH or RTGS for payments clearing and settlement
Offer trade and supply chain services including the Bank Payment Obligation
Automate, confirm, match and report foreign exchange and derivatives trades
Securities pre-trade/trade, post-trade, custody and asset servicing, and funds services
Regulation/liberalization
Successfully migrate to SEPA
Reliable, cost-effective compliance services for sanctions screening and sanctions testing
BCBS compliant intraday liquidity analytics and reporting
Derivatives regulation / EMIR compliant trade confirmations, clearing and reporting
Understand what RMB internationalization means for you
Business intelligence
Analyse your SWIFT messaging flows
Identify new opportunities, benchmark against competitors using insight dashboards
Thought leadership
SWIFT white papers on key industry topics in banking
Page 46 of 57
SWIFT hosts a number of community events spanning the global financial
An electronic funds transfer (EFT) is a transaction that takes place over a computerized network, either among
accounts at the same bank or to different accounts at separate financial institutions.
How It Works/Example:
EFTs include direct-debit transactions, wire transfers,
direct deposits, ATM withdrawals and online bill pay
services. Transactions are processed through the
Automated Clearing House (ACH) network, the secure
transfer system of the Federal Reserve that connects all U.S.
banks, credit unions and other financial institutions.
For example, when you use your debit card to make a
purchase at a store or online, the transaction is processed
using an EFT system. The transaction is very similar to an
ATM withdrawal, with near-instantaneous payment to the
merchant and deduction from your checking account.
Direct deposit is another form of an electronic funds
transfer. In this case, funds from your employer’s bank
account are transferred electronically to your bank account,
with no need for paper-based payment systems.
Why It Matters:
The increased use of EFTs for online bill payments, purchases and pay processes is leading to a paper-free banking
system, where a large number of invoices and payments take place over digital networks. EFT systems play a large
role in this future, with fast, secure transactions guaranteeing a seamless transfer of funds within institutions or
across banking networks.
EFT transactions, also known as an online transaction or PIN-debit transaction, also offer an alternative to signature
debit transactions, which take place through one of the major credit card processing systems, such as Visa,
MasterCard or Discover, and can cost as much as 3% of the total purchase price. EFT processing, on the other hand,
only charges an average of 1% for debit card transactions.
5. Online CIB
CIB means Credit Information Bureau. To create a disciplined environment for borrowing, the automated CIB service
provides credit related information for prospective and existing borrowers. With this improved and efficient system,
risk management will be more effective. Banks and financial institutions may furnish credit information to CIB
database 24 by 7 around the year; and they can access credit reports from CIB online.
With a view to strengthening credit discipline and streamlining all sorts of data in a systematic way for formulation of
monetary, economic and credit policy, a full-fledged CIB was established in Bangladesh Bank on 18/08/1992. Full
particulars of all borrowers and guarantors (individual/firms/company) of all banks and NBFI in Bangladesh and
Page 47 of 57
whose outstanding balance is Tk. 50000 and above and defaulter credit card borrower of Tk 10000 and above are
maintaining in the CIB department.
In Bangladesh there is loan default culture exists. At present 10% amount of loan is classified. This type of loan is
called non-performing. To avoid the worst situation of default loan, BB has taken some measures. Online CIB is one of
them. Before sanctioning of any loan (and other purposes also) clean report of the borrower and guarantors is
compulsory to obtain for the banking and NBFIs. So, there is no possibility of concealment of fact by any bad elements.
As a result old bad borrowers are not getting fresh loan resulting reduction in bad loans. Defaulter borrowers will not
be eligible to participate in the parliament election, be a CIP, be a director in a bank or NBFI, joint venture
entrepreneur, member of stock exchange etc.
4. Online CIB will minimize the extent of default loan by facilitating the banks and financial institutions with credit
reports of the loan applicants very quickly, and therefore, lending institutions would not encounter any credit risk
while extending lending or rescheduling facility.
5. The CIB online service will play a pivotal role in creating a disciplined environment for borrowing. Risk
management will be more effective as it’s an improved and efficient system. 6. He also hoped that the system will
assist the election commission in finding out the loan status of the candidates competing in national and local
elections, apart from increasing banks’ expertise.
7. The online reports will cut the cost of doing business as officials of banks and NBFIs will not have to wait for long to
get the reports.
4. BATCH PROCESSING
Batch processing is execution of a series of programs ("jobs") on a computer without manual intervention. Jobs are set
up so they can be run to completion without manual intervention, so all input data are preselected through scripts,
command-line parameters, or job control language. This is in contrast to "online" or interactive programs which
prompt the user for such input. A program takes a set of data files as input, processes the data, and produces a set of
output data files. This operating environment is termed as "batch processing" because the input data are collected into
batches of files and are processed in batches by the program.
Benefits:
It can shift the time of job processing to when the computing resources are less busy.
It avoids idling the computing resources with minute-by-minute manual intervention and supervision.
By keeping high overall rate of utilization, it better amortizes the cost of a computer, especially an expensive
one.
It allows the system to use different priorities for batch and interactive work.
Page 48 of 57
5. Online Processing vs Batch Processing:
An online system handles transactions when the occur and provides output directly to users. Because it is interactive,
online processing avoids delays and allows a constant dialog between the user and the system. The system processes
transactions completely when and where they occur. Users interact directly with the information system. Users can
access data randomly. The information system must be available whenever necessary to support business functions.
Batch Processing: Data is processed in groups or
batches. Batch processing is typically used for large
amounts of data that must be processed on a routine
schedule, such as paychecks or credit card transactions. A
batch processing system has several main characteristics:
collect, group, and process transactions periodically.
Batch programs require no user involvement and
requires significantly fewer network resources than
online systems.
7. Interbank Reconciliations
Banks maintain checking with other banks to conduct their business activities. Inter- Bank reconciliation refers to the
balancing and verification of a bank holder's checking account to the periodic bank statements that are produced and
sent by the bank to its customer banks.
Checking Accounts Statements: Checking account statements are generally produced on a monthly basis.
The statement reflects all banking transactions.
Verification: After the statement from the bank has been received, a cross check of your records to the
statement must take place. All items that appear on the bank statement that you did not know about need to
be segregated and the same holds true for items appearing on your records.
Bank Balance: To balance your checking account statement to your own records, you must take the above
segregated items and add or subtract each of them as the case may be from the other set of books that were
not yet affected.
Assembler:
Assembler is a computer program which is used to translate program written in Assembly Language in to machine
language. The translated program is called as object program. Assembler checks each instruction for its correctness
and generates diagnostic messages, if there are mistakes in the program.
Various steps of assembling are:
1. Input source program in Assembly Language through an input device.
2. Use Assembler to produce object program in machine language.
3. Execute the program.
Page 49 of 57
Compiler:
A compiler is a program that translates a programme written in HLL to executable machine language. The process of
transferring HKK source program in to object code is a lengthy and complex process as compared to assembling.
Compliers have diagnostic capabilities and prompt the programmer with appropriate error message while compiling
a HLL program. The corrections are to be incorporated in the program, whenever needed, and the program has to be
recompiled. The process is repeated until the program is mistake free and translated to an object code.
Thus the job of a complier includes the following:
1. To translate HLL source program to machine codes.
2. To trace variables in the program
3. To include linkage for subroutines.
4. To allocate memory for storage of program and variables.
5. To generate error messages, if there are errors in the program.
Interpreter:
The basic purpose of interpreter is same as that of complier. In compiler, the program is translated completely and
directly executable version is generated. Whereas interpreter translates each instruction, executes it and then the next
instruction is translated and this goes on until end of the program. In this case, object code is not stored and reused.
Every time the program is executed, the interpreter translates each instruction freshly.
It also has program diagnostic capabilities. However, it has some disadvantages as below:
1. Instructions repeated in program must be translated each time they are executed.
2. Because the source program is translated fresh every time it is used, it is slow process or execution takes more time.
Approx. 20 times slower than complier
9. RTGS:
Real time gross settlement systems (RTGS) are specialist funds transfer systems where transfer of money or
securities[1] takes place from one bank to another on a "real time" and on "gross" basis. Settlement in "real time"
means payment transaction is not subjected to any waiting period. The transactions are settled as soon as they are
processed. "Gross settlement" means the transaction is settled on one to one basis without bundling or netting with
any other transaction. Once processed, payments are final and irrevocable. RTGS systems are typically used for high-
value transactions that require immediate clearing. In some countries the RTGS systems may be the only way to get
same day cleared funds and so may be used when payments need to be settled urgently such as when purchasing a
house. However most regular payments would not use a RTGS system, but instead would use a national payment
system or network that allows participants to batch and net payments.
RTGS systems are usually operated by a country's Central bank as it is seen as a critical infrastructure for a country's
economy. Economists view that an efficient national payment system reduces the cost of exchanging goods and
services, and is indispensable to the functioning of the interbank, money, and capital markets. A weak payment system
may severely drag on the stability and developmental capacity of a national economy; its failures can result in
inefficient use of financial resources, inequitable risk-sharing among agents, actual losses for participants, and loss of
confidence in the financial system and in the very use
Page 50 of 57
Chapter Eight
Virus- Antivirus
1. Computer Virus?
2. Phishing?
3. Name of different antivirus software?
4. SPAM & Spyware?
5. P/N (Personal identification number)
6. Spam & Spyware
7. Fire Wall:
1. Computer Virus?
Page 51 of 57
6. Configure your web browsers to disable ActiveX, Java, and Javascript. You'll lose some of the fun the Web's been
known for, but you'll save your computer from contracting a virus and speed up your connection.
7. Know that the only way a virus spreads is either by launching an infected file or by booting an infected disk. You can
not get a virus by simply being online or by reading e-mail. You have to download and launch an infected file before it
will spread. Therefore, do not launch any unsolicited executable files sent via e-mail.
8. Using an updated anti-virus program, scan all new software for viruses before installing them on your hard drive.
Even shrink-wrapped software from major publishers has been known to contain viruses.
9. WHEN IN DOUBT, THROW IT OUT! Always use caution and do not open, download, or execute any suspicious files
or email attachments. If the file was in fact legitimate, you can always ask the sender to resend it. Do not open any files
attached to an email
1. from an unknown, suspicious or untrustworthy source.
2. ending with: .exe, .com, .scr, .pif, .vbs.
3. that you were not expecting to receive
4. unless you know what it is, even if it appears to come from a friend or someone you know. Some viruses can
replicate themselves and spread through email. Better to be safe than sorry and confirm that they really sent
it.
5. if the subject line is questionable. When sending e-mail, use a subject that will not be detected as spam, and
do not leave the subject line blank.
10. Delete chain emails and junk email. Do not forward or reply to any to them. These types of email are considered
spam, which is unsolicited, intrusive mail that clogs up the network.
11. Use caution when downloading files from the Internet. Ensure that the source is a legitimate and reputable one.
Verify that an anti-virus program checks the files on the download site. If you're uncertain, don't download the file at
all.
2. Phishing?
Phishing is a fraudulent attempt, usually made through email, to steal your personal information. The best way to
protect yourself from phishing is to learn how to recognize a phish.
Phishing emails usually appear to come from a well-known organization and ask for your personal information —
such as credit card number, social security number, account number or password. Often times phishing attempts
appear to come from sites, services and companies with which you do not even have an account.
In order for Internet criminals to successfully "phish" your personal information, they must get you to go from an
email to a website. Phishing emails will almost always tell you to click a link that takes you to a site where your
personal information is requested. Legitimate organizations would never request this information of you via email.
What to look for in a phishing email
1. Generic greeting. Phishing emails are usually sent in large batches. To save time, Internet criminals use
generic names like "First Generic Bank Customer" so they don't have to type all recipients' names out and
send emails one-by-one. If you don't see your name, be suspicious.
2. Forged link. Even if a link has a name you recognize somewhere in it, it doesn't mean it links to the real
organization. Roll your mouse over the link and see if it matches what appears in the email. If there is a
discrepency, don't click on the link. Also, websites where it is safe to enter personal information begin with
"https" — the "s" stands for secure. If you don't see "https" do not proceed.
3. Requests personal information. The point of sending phishing email is to trick you into providing your
personal information. If you receive an email requesting your personal information, it is probably a phishing
attempt.
4. Sense of urgency. Internet criminals want you to provide your personal information now. They do this by
making you think something has happened that requires you to act fast. The faster they get your information,
the faster they can move on to another victim.
Prevention:
Phishing scams are usually presented in the form of spam or pop-ups and are often difficult to detect. Once the
fraudsters obtain your personal information, they can use it for all types of identity theft, putting your good credit and
good name at risk.
Because phishing is one of the most devious forms of identity theft, it is important for you to become familiar with
various types of phishing scams as well as to learn how to guard against them.
8 Ways To Avoid Phishing Scams
To help you protect yourself from phishing, we offer the following tips:
Page 52 of 57
1. Guard against spam. Be especially cautious of emails that:
* Come from unrecognized senders.
* Ask you to confirm personal or financial information over the Internet and/or make urgent requests for this
information.
* Aren’t personalized.
* Try to upset you into acting quickly by threatening you with frightening information.
2. Communicate personal information only via phone or secure web sites. In fact:
When conducting online transactions, look for a sign that the site is secure such as a lock icon on the
browser’s status bar or a “https:” URL whereby the “s” stands for “secure” rather than a “http:”.
Also, beware of phone phishing schemes. Do not divulge personal information over the phone unless you
initiate the call. Be cautious of emails that ask you to call a phone number to update your account
information as well.
3. Do not click on links, download files or open attachments in emails from unknown senders. It is best
to open attachments only when you are expecting them and know what they contain, even if you know the
sender.
4. Never email personal or financial information, even if you are close with the recipient. You never
know who may gain access to your email account, or to the person’s account to whom you are emailing.
5. Beware of links in emails that ask for personal information, even if the email appears to come from an
enterprise you do business with. Phishing web sites often copy the entire look of a legitimate web site,
making it appear authentic. To be safe, call the legitimate enterprise first to see if they really sent that email to
you. After all, businesses should not request personal information to be sent via email.
6. Beware of pop-ups and follow these tips:
* Never enter personal information in a pop-up screen.
* Do not click on links in a pop-up screen.
* Do not copy web addresses into your browser from pop-ups.
* Legitimate enterprises should never ask you to submit personal information in pop-up screens, so don’t do
it.
7. Protect your computer with a firewall, spam filters, anti-virus and anti-spyware software. Do some
research to ensure you are getting the most up-to-date software, and update them all regularly to ensure that
you are blocking from new viruses and spyware.
8. Check your online accounts and bank statements regularly to ensure that no unauthorized
transactions have been made.
Page 53 of 57
Spyware: Spyware is a software which gathers information about you and transmits it to an unauthorized third party.
This can cover everything from what sites you go to on the web to logging your keystrokes and finding out passwords
and PINs. "Spyware" is mostly classified into four types: system monitors, Trojans, adware, and tracking cookies.
Spyware is mostly used for the purposes such as; tracking and storing internet users' movements on the web; serving
up pop-up ads to internet users. Whenever spyware is used for malicious purposes, its presence is typically hidden
from the user and can be difficult to detect. Some spyware, such as key loggers,
5. Fire Wall
A firewall is a system designed to prevent unauthorized access to or from a private network. Firewalls can be
implemented in both hardware and software, or a combination of both. Firewalls are frequently used to prevent
unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All
messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those
that do not meet the specified security criteria.
A firewall is a network security system, either hardware- or software-based, that controls incoming and outgoing
network traffic based on a set of rules.
Page 54 of 57
online ACH, wire transfers, etc. you may want to consider investing in a purpose built firewall device. This increases
the level of protection available to you.
Hacking
How can you reduce your risks of being hacked? The primary way that you can reduce your risk is by having a firewall
between your computers and the Internet. In addition, some businesses find, if prudent, to perform online banking
activities from one or two computers only, which helps them monitor the systems more closely. We have already
covered maintaining up-to-date Antivirus software, but keeping software applications up to date is critical here as
well. Many programs will have auto update features which can be leveraged to do this.
Page 55 of 57
discount coupon for turkey at one physical store and toilet paper at another, she may find it infeasible to avail of both
discounts. But the customer could do that online with a few mouse-clicks.
8) Provide Abundant Information: There are limitations to the amount of information that can be displayed in a
physical store. It is difficult to equip employees to respond to customers who require information across product
lines. Ecommerce websites can make additional information easily available to customers. Most of this information is
provided by vendors, and does not cost anything to create or maintain.
9) Create Targeted Communication: Using the information that a customer provides in the registration form, and by
placing cookies on the customer's computer, an ecommerce merchant can access a lot of information about its
customers. This, in turn, can be used to communicate relevant messages. An example: If you are searching for a certain
product on Amazon.com, you will automatically be shown listings of other similar products. In addition, Amazon.com
may also email you about related products.
10) Remain Open All the Time: Store timings are now 24/7/365. Ecommerce websites can run all the time. From
the merchant's point of view, this increases the number of orders they receive. From the customer's point of view, an
"always open" store is more convenient.
11) Create Markets for Niche Products: Buyers and sellers of niche products can find it difficult to locate each other
in the physical world. Online, it is only a matter of the customer searching for the product in a search engine. One
example could be purchase of obsolete parts. Instead of trashing older equipment for lack of spares, today we can
locate parts online with great ease.
8. e-Governance
E-Governance is the application of Information and Communication Technology (ICT) for delivering government
services, exchange of information, communication transactions, integration of various stand-alone systems and
services between Government-to-Citizens (G2C), Government-to-Business (G2B), Government-to-Government (G2G)
as well as back office processes and interactions within the entire government frame work.
Benefits of e-Governance
It greatly simplifies the process of information accumulation for citizens and businesses.
It empowers people to gather information regarding any department of government and get involved in the
process of decision making.
E-Governance strengthens the very fabric of democracy by ensuring greater citizen participation at all levels
of governance
E-Governance leads to automation of services, ensuring that information regarding every work of public
welfare is easily available to all citizens, eliminating corruption.
This revolutionizes the way governments function, ensuring much more transparency in the functioning,
thereby eliminating corruption.
Since the information regarding every activity of government is easily available, it would make every
government department responsible as they know that every action of theirs is closely monitored.
Proper implementation of e-Governance practices make it possible for people to get their work done online
thereby sparing themselves of unnecessary hassles of traveling to the respective offices.
Successful implementation of e-Governance practices offer better delivery of services to citizens, improved
interactions with business and industry, citizen empowerment through access to information, better
management, greater convenience, revenue growth, cost reductions etc.
Furthermore, introduction of e-Governance brings governments closer to citizens.
E-Governance practices help business access information that might be important for them at a click.
Intranet
Intranet is system in which multiple PCs are networked to be connected to each other.
PCs in intranet are not available to the world outside of the intranet.
Usually each company or organization has their own Intranet network and members/employees of that
company can access the computers in their intranet.
Each computer in Intranet is also identified by a IP Address, which is unique among the computers in that
Intranet.
Page 57 of 57