1. A sixteen-input multiplexer will need three data select input control lines.



Write Comment

Type in
(Press Ctrl+g to toggle between English and the chosen language)

Comments

Tags
Show Similar Question And Answers
QA->Red data book provides data on :....
QA->4G LTE is a standard for wireless communication of high speed data for mobile phone and data terminals. What does LTE stand for?....
QA->A subset of data in a warehouse in the form of summary data, related to a particular department of business function:....
QA->Scheme which represent how data are organized in Physical data storage.....
QA->A storage area used to store data to compensate for the difference in speed at which the different units can handle data is:....
MCQ->A sixteen-input multiplexer will need three data select input control lines.....
MCQ-> Read the following passage carefully and answer the questions given below it. Certain words/phrases have been printed in ‘’bold’’ to help you locate them while answering some of the questions.As increasing dependence on information systems develops, the need for such system to be reliable and secure also becomes more essential. As growing numbers of ordinary citizens use computer networks for banking, shopping, etc., network security in potentially a ‘’massive’’ problem. Over the last few years, the need for computer and information security system has become increasingly evident, as web sites are being defaced with greater frequency, more and more denial-of-service attacks are being reported, credit card information is being stolen, there is increased sophistication of hacking tools that are openly available to the public on the Internet, and there is increasing damage being caused by viruses and worms to critical information system resources.At the organizational level, institutional mechanism have to be designed in order to review policies, practices, measures and procedures to review e-security regularly and assess whether these are appropriate to their environment. It would be helpful if organizations share information about threats and vulnerabilities, and implement procedures of rapid and effective cooperation to prevent, detect and respond to security incidents. As new threats and vulnerabilities are continuously discovered there is a strong need for co-operation among organizations and, if necessary, we could also consider cross-border information sharing. We need to understand threats and dangers that could be ‘’vulnerable’’ to and the steps that need to be taken to ‘’mitigate’’ these vulnerabilities. We need to understand access control systems and methodology, telecommunications and network security, and security management practise. We should be well versed in the area of application and systems development security, cryptography, operations security and physical security.The banking sector is ‘’poised’’ for more challenges in the near future. Customers of banks can now look forward to a large array of new offerings by banks, from an ‘’era’’ of mere competition, banks are now cooperating among themselves so that the synergistic benefits are shared among all the players. This would result in the information of shared payment networks (a few shared ATM networks have already been commissioned by banks), offering payment services beyond the existing time zones. The Reserve Bank is also facilitating new projects such as the Multi Application Smart Card Project which, when implemented, would facilitate transfer of funds using electronic means and in a safe and secure manner across the length and breadth of the country, with reduced dependence on paper currency. The opportunities of e-banking or e-power is general need to be harnessed so that banking is available to all customers in such a manner that they would feel most convenient, and if required, without having to visit a branch of a bank. All these will have to be accompanied with a high level of comfort, which again boils down to the issue of e-security.One of the biggest advantages accruing to banks in the future would be the benefits that arise from the introduction of Real Time Gross Settlement (RTGS). Funds management by treasuries of banks would be helped greatly by RTGS. With almost 70 banks having joined the RTGS system, more large value funds transfer are taking place through this system. The implementation of Core Banking solutions by the banks is closely related to RTGS too. Core Banking will make anywhere banking a reality for customers of each bank. while RTGS bridges the need for inter-bank funds movement. Thus, the days of depositing a cheque for collection and a long wait for its realization would soon be a thing of the past for those customers who would opt for electronic movement of funds, using the RTGS system, where the settlement would be on an almost ‘’instantaneous’’ basis. Core Banking is already in vogue in many private sector and foreign banks; while its implementation is at different stages amongst the public sector banks.IT would also facilitate better and more scientific decision-making within banks. Information system now provide decision-makers in banks with a great deal of information which, along with historical data and trend analysis, help in the building up of efficient Management Information Systems. This, in turn, would help in better Asset Liability Management (ALM) which, today’s world of hairline margins is a key requirement for the success of banks in their operational activities. Another benefit which e-banking could provide for relates to Customer Relationship Management (CRM). CRM helps in stratification of customers and evaluating customer needs on a holistic basis which could be paving the way for competitive edge for banks and complete customer care for customer of banks.The content of the passage ‘’mainly’’ emphasizes----
 ....
MCQ-> Answer question based on the following information:Mrs. Sharma has a house which she wants to convert to a hostel and rent it out to students of a nearby women’s college. The house is a two story building and each floor has eight rooms. When one looks from the outside, three rooms are found facing North, three found facing East, three found facing West and three found facing South. Expecting a certain number of students, Mrs. Sharma wanted to follow certain rules while giving the sixteen rooms on rent:All sixteen rooms must be occupied.No room can be occupied by more than three students.Six rooms facing north is called north wing. Similarly six rooms facing east, west and south are called as east wing, west wing and south wing. Each corner room would be in more than one wing. Each of the wings must have exactly 11 students. The first floor must have twice as many students as the ground floor.However Mrs. Sharma found that three fewer students have come to rent the rooms. Still. Mrs.Sharma could manage to allocate the rooms according to the rules.How many students turned up for renting the rooms?
 ....
MCQ-> Read the following passage carefully and answer the given questions. Certain words/phrases have been given in bold to help you locate them while answering some of the questions. Virtual currencies are growing in popularity. While the collective value of virtual currencies is still a fraction of the total U.S. Dollars in circulation, the use of virtual currencies as a payment mechanism of transfer of value is gaining momentum. Additionally, the number of entities (issuers, exchangers and intermediaries, to name just a few) that engage in virtual currency transactions is increasing and these entities often need access to traditional banking services.Virtual currencies are digital representations of value that function as a medium of exchange, a unit of account and a store of value (buy now redeem later policy). In many cases, virtual currencies are “convertible” currencies; they are not legal lenders, but they have an equivalent value in real currency. Despite what seems to be a tremendous interest in virtual currencies their overall value is still extremely small relative to other payment mechanisms, such as cash, cheques and credit and debit cards. The virtual currency landscape includes many participants from the merchant that accepts the virtual currency, to the intermediary that exchanges the virtual currency on behalf of the merchant, to the exchange that actually converts the virtual currency to the real currency to the electronic wallet provider that holds the virtual currency on behalf of its owner. Accordingly, opportunities abound for community banks to provide services to entities engaged in virtual currency activities. Eventually, it is also possible that community banks may find themselves holding virtual currency on their own balance sheets.Launched in 2009, Silicon is currently the largest and most popular virtual currency. However, many other virtual currencies have emerged over the past few years, such as Litecoin, Dogecoin, Peercoin and these provide even more anonymity to its users than that provided by Bitcoin.As the virtual currency landscape is fraught with dangers, what important risks should community bankers consider?The most significant is compliance risk- a subset of legal risk. Specifically, virtual currency administrators or legal exchangers may present risks similar to other money transmitters, as well in presenting their own unique risks. Quite simply, many users of virtual currencies do so because of the perceptions that transactions conaucted using virtual currencies are anonymous. The less-than transparent nature of the transactions, :nay make it more difficult for a inancial institution to truly know and understand the activities of its customer and whether the customer’s activities are legal. Therefore, these transactions may present a higher risk for banks and require additional due diligence and monitoring.Another important risk for community banks to consider is credit risk. How should a community bank respond if a borrower wants to specifically post Bitcoin or another virtual currency as collateral for a loan? For many, virtual currencies are simply another form of cash, so it is not hard to analyse that bankers will face such a scenario at some point. In this case, caution is appropriate. Bankers should carefully weigh the pros and cons of extending any loan secured by Bitcoin or other virtual currencies (in whole or in part), or where the source of loan repayment is in some way dependent on the virtual currency. For one, the value of Bitcoin in particular has been volatile. Then, the collateral value could fluctuate widely from day-to-day. Bankers also need to think about control over the account. ‘How does the banker control access to a virtual wallet, and how can it control the borrower’s access to the virtual wallet? In the event of a loan default, the bank would need to take control of the virtual currency. This would require access to the borrower’s virtual wallet and private key. All of this suggests that the loan agreement needs to be carefully crafted and that additional steps need to be taken to ensure the bank has a perfected lift on the virtual currency.Virtual currencies bring with them, both opportunities and challenges, and they are likely here to stay. Although, it is too early to determine just how prevalent they will be in the coming years, we too expect that the virtual participants in the virtual currency ecosystem will increasingly intersect with the banking industry.Which of the following is the meaning of the phrase ‘fraught with dangers’ as mentioned in the passage?
 ....
MCQ-> Study the following information carefully and answer the questions given below :When a word and number arrangement machine is given an input line of words and numbers, it arranges them following a particular rule. The following is an illustration of input and rearrangement. (All the numbers are two digit numbers) Input : 24 method 87 67 of data 34 collection 45 12 specified now Step I : 12 method 87 67 of data 34 collection 45 specified now 24 Step II : 34 12 method 87 67 of data collection specified now 24 45 Step III: 67 34 12 method of data collection specified now 24 45 87 Step IV : collection 67 34 12 method of specified now 24 45 87 data Step V : method collection 67 34 12 of specified 24 45 87 data now Step VI: of method collection 67 34 12 24 45 87 data now specified Step VII is the last step of the above arrangement as the intended arrangement is obtained. As per the rules followed in the given steps, find out the appropriate steps for the given input. Input : chemical 68 11 reaction 87 is 21 hard to 53 92 detectIn which step are the elements to 92 detect 21′ found in the same order?
 ....
Terms And Service:We do not guarantee the accuracy of available data ..We Provide Information On Public Data.. Please consult an expert before using this data for commercial or personal use
DMCA.com Protection Status Powered By:Omega Web Solutions
© 2002-2017 Omega Education PVT LTD...Privacy | Terms And Conditions