1. A commonly used data format for exchanging information between computers or programs?





Write Comment

Type in
(Press Ctrl+g to toggle between English and the chosen language)

Comments

Tags
Show Similar Question And Answers
QA->A person who used his or her expertise to gain access to other computers to get information illegally or to do damage is called ?....
QA->Whose duty is to scrutinise the distances entered in travelling allowance bills and to check any tendency to abuse the option of exchanging daily allowance for mileage allowance is required?....
QA->What is the commonly used unit for measuring the speed of data transmission?....
QA->A storage area used to store data to compensate for the difference in speed at which the different units can handle data is:....
QA->Routine is not loaded until it is called. All routines are kept on disk in a relocatable load format. The main program is loaded into memory and is executed. This type of loading is called:....
MCQ->A commonly used data format for exchanging information between computers or programs?....
MCQ-> Read the following passage carefully and answer the questions given below it. Certain words/phrases have been printed in ‘’bold’’ to help you locate them while answering some of the questions.As increasing dependence on information systems develops, the need for such system to be reliable and secure also becomes more essential. As growing numbers of ordinary citizens use computer networks for banking, shopping, etc., network security in potentially a ‘’massive’’ problem. Over the last few years, the need for computer and information security system has become increasingly evident, as web sites are being defaced with greater frequency, more and more denial-of-service attacks are being reported, credit card information is being stolen, there is increased sophistication of hacking tools that are openly available to the public on the Internet, and there is increasing damage being caused by viruses and worms to critical information system resources.At the organizational level, institutional mechanism have to be designed in order to review policies, practices, measures and procedures to review e-security regularly and assess whether these are appropriate to their environment. It would be helpful if organizations share information about threats and vulnerabilities, and implement procedures of rapid and effective cooperation to prevent, detect and respond to security incidents. As new threats and vulnerabilities are continuously discovered there is a strong need for co-operation among organizations and, if necessary, we could also consider cross-border information sharing. We need to understand threats and dangers that could be ‘’vulnerable’’ to and the steps that need to be taken to ‘’mitigate’’ these vulnerabilities. We need to understand access control systems and methodology, telecommunications and network security, and security management practise. We should be well versed in the area of application and systems development security, cryptography, operations security and physical security.The banking sector is ‘’poised’’ for more challenges in the near future. Customers of banks can now look forward to a large array of new offerings by banks, from an ‘’era’’ of mere competition, banks are now cooperating among themselves so that the synergistic benefits are shared among all the players. This would result in the information of shared payment networks (a few shared ATM networks have already been commissioned by banks), offering payment services beyond the existing time zones. The Reserve Bank is also facilitating new projects such as the Multi Application Smart Card Project which, when implemented, would facilitate transfer of funds using electronic means and in a safe and secure manner across the length and breadth of the country, with reduced dependence on paper currency. The opportunities of e-banking or e-power is general need to be harnessed so that banking is available to all customers in such a manner that they would feel most convenient, and if required, without having to visit a branch of a bank. All these will have to be accompanied with a high level of comfort, which again boils down to the issue of e-security.One of the biggest advantages accruing to banks in the future would be the benefits that arise from the introduction of Real Time Gross Settlement (RTGS). Funds management by treasuries of banks would be helped greatly by RTGS. With almost 70 banks having joined the RTGS system, more large value funds transfer are taking place through this system. The implementation of Core Banking solutions by the banks is closely related to RTGS too. Core Banking will make anywhere banking a reality for customers of each bank. while RTGS bridges the need for inter-bank funds movement. Thus, the days of depositing a cheque for collection and a long wait for its realization would soon be a thing of the past for those customers who would opt for electronic movement of funds, using the RTGS system, where the settlement would be on an almost ‘’instantaneous’’ basis. Core Banking is already in vogue in many private sector and foreign banks; while its implementation is at different stages amongst the public sector banks.IT would also facilitate better and more scientific decision-making within banks. Information system now provide decision-makers in banks with a great deal of information which, along with historical data and trend analysis, help in the building up of efficient Management Information Systems. This, in turn, would help in better Asset Liability Management (ALM) which, today’s world of hairline margins is a key requirement for the success of banks in their operational activities. Another benefit which e-banking could provide for relates to Customer Relationship Management (CRM). CRM helps in stratification of customers and evaluating customer needs on a holistic basis which could be paving the way for competitive edge for banks and complete customer care for customer of banks.The content of the passage ‘’mainly’’ emphasizes----
 ....
MCQ-> These questions consist of a question and two statements numbered I and H given below it. You have to decide whether the data provided in the statements are sufficient to answer the question. Read both the statements and mark the appropriate answer. Give answer : Topic:banking-reasoning-data-sufficiency a: The data even in both statements I and II together are not sufficient to answer the question. b: The data in statement I alone are sufficient to answer the question while the data in statement II alone are not sufficient to answer the question. c: The data either in statement I alone or in statement II alone are sufficient to answer the question. d: The data in both statements I and II together are necessary to answer the question. e: The data in statement II alone are sufficient to answer the question while the data in statement I are not sufficient to answer the question.In a building, the ground floor is numbered one, first floor is numbered two and so on till the topmost floor is numbered five. Amongst five people- M, N, O, P and Q, each living on a different floor, but not necessarily in the same order, on which floor does Q live ? I. O lives on an odd numbered floor. M lives immediately below O. Only two people live between M and P. N lives neither immediately below M nor immediately below P. II. N lives on an even numbered floor. Only two people live between N and O. Only one person lives between O and Q.....
MCQ->Your network contains 10 domain controllers, 10 member servers, and approximately 1,000 client computers. All the servers run Windows 2000 Server, and all the client computers run Windows 2000 Professional. Two of the domain controllers act as DNS servers. Users of client computers use file sharing to grant access to files stored locally. The network has 10 subnets and uses TCP/IP as the only network protocol. You want to configure the network so that all computers can resolve the addresses of all other computers by using DNS. Client computers must be able to register and resolve addresses if a server fails. How should you configure the DNS servers?....
MCQ-> Read the following passage and solve the questions based on it.Taking note of the day-long heavy queue in front of the Tarangabad Transport Department office everyday for obtaining transport permits, the City Administration comes out with a ‘Single Office-Five Windows’ system for facilitating the process. For simplicity, the windows are named as W1, W2, W3, W4 and W5 respectively. Office hours are from 8:00 AM to 5:30 PM, barring Saturday, when the office closes by 2.30 PM. To streamline the rush and reduce pressure on the employees, the working hours of the aforesaid windows are defined in the following manner:1. W1 is open between 9.30 AM and 2.30 PM on Monday and Wednesday, between 8.00 AM and 11.30 AM on Tuesday and Thursday and between 3.00 PM and 5.00 PM on Friday. 2. W2 is open between 8.30 AM and 11.30 AM on Wednesday and Thursday, between 8.00 AM and 10.00 AM on Friday, and between 12.30 PM and 2.30 PM on Monday and Saturday. 3. W3 is open between 10.00 AM and 12.30 PM on Wednesday and Saturday, between 10.00 AM and 12.00 Noon on Friday, and between 3.30 PM and 5.30 PM on Monday and Thursday. 4. W4 is open between 11.30 AM and 3.00 PM on Tuesday, between 12.30 PM and 3.00 PM on Thursday and Friday, between 8 AM and 10 AM on Saturday and Monday and between 3.30 PM to 5.30 PM on Wednesday. 5. W5 is open between 2.00 PM and 4.00 PM on Monday, 3.30 PM and 5.30 PM on Tuesday and Friday, between 8 AM and 10 AM on Wednesday and between 10.30 AM to 12.30 PM on Thursday.On which of the following days, maximum number of windows is simultaneously open at 9.45 AM?
 ....
Terms And Service:We do not guarantee the accuracy of available data ..We Provide Information On Public Data.. Please consult an expert before using this data for commercial or personal use
DMCA.com Protection Status Powered By:Omega Web Solutions
© 2002-2017 Omega Education PVT LTD...Privacy | Terms And Conditions