Wednesday 10 February 2016

Issuance of EMV Chip and PIN Cards

THE RBI HAS GRANTED EXTENSION FOR ISSUANCE OF ALL NEW EMV CHIP. AND PIN CARDS-

1. FOR  CARDS ISSUED UNDER PMJDY / BASIC SAVING BANK DEPOSIT ACCOUNT ETC- THE TIME IS EXTENDED UPTO 30-09-2016 AND

2. FOR ALL OTHER CARDS THE PERIOD HAS BEEN EXTENDED UPTO 31-01-2016.

3. FURTHER, THE MAGNETIC STRIP CARDS ISSUED WOULD HAVE TO BE REPLACED BY 31-12-2018. IRRESPECTIVE OF THE VALIDITY PERIOD OF THE CARDS,

Tuesday 9 February 2016

Lending / Deposit Rates

Lending / Deposit  Rates

Base Rate : 9.30% - 9.70%

Savings Deposit Rate : 4.00%

Term Deposit Rate > 1 Year : 7.00% - 7.90%

Policy Rates


Policy Rates


Policy Repo Rate : 6.75%


Reverse Repo Rate : 5.75%


Marginal Standing Facility Rate : 7.75%


Bank Rate : 7.75%


CRR : 4%

SLR : 21.5%

Monday 8 February 2016

Definition of "Currency"



Definition of "Currency"


Debit cards, ATM cards or any other instrument which can be

used to create a financial liability may be defined as currency.


In pursuance of clause (h) of Section 2 of the Foreign Exchange Management Act, 1999 (42 of 1999), and in supersession of Notification No. FEMA 15/2000-RB dated May 3, 2000, as amended from time to time, the Reserve Bank notifies debit cards, ATM cards or any other instrument by whatever name called that can be used to create a financial liability, as ‘currency’.

Sunday 7 February 2016

COMPUTER TEST QUESTIONS FOR IV TO V AND III TO IV PROMOTION

51.       As per RBI latest instructions to the banks, banks have to ensure that CTS compliant cheque bokks are issued to all customers across all locations latest by:
          (a) 31.03.2012        (b) 30.06.2012                   (c) 30.09.2012
          (d) 31.03.2013         (e) 31.12.2012

52.     In a network, the computer that stores the files and process the data is             called:
        (a) Server   (b) Terminal            (c) Modem     (d) All of the above
(e) either (a) or (b)

53.     Viruses are so called because:
(a) They are viruses     (b) They can copy themselves and spread
(c) Both (a) and (b)            (d) None of the above

54.     Which of the following can't spread virus?
(a) An e-mail with attachment        (b) A plain text mail
(c) Downloading files over the web  (d) None of the above

55.     There is a new anti-virus software update available which is downloaded to your computer
(a) everyday           (b) only in the night  
(c) When you next switch on your computer        (d) All of the above

56.     Numbers are stored and transmitted inside a computer in:
          (a) Binary form        (b) ASCII code form           (c) Alphabets form
(d) Numerical form   (e) None of these

57.     CPU capacity can be measured in:
(a) BPS         (b) MIPS        (c) MHz         (d) MPI  (e) None of these

58.     MPIS stands for
(a) Million Instructions Per Second     (b) Million Instructions Per Season (c) Monthly Instructions Per Second (d) Million Inputs Per Second

59.     LAN speeds are measured in:
(a) BPS         (b) KBPS       (c) MBPS       (d) MIPS        (e) none of these

60      Modem speeds are measured in:
(a) BPS  (b) KBPS       (c) MBPS       (d) MIPS        (e) none of these

61.     BPS stands for:
(a) Bits Per Second (b) Bits Per Season   (c) Bytes Per Second
(d) Bits Per System       (e) None of these

62.     In cheque processing which of the following I/O techniques have          banks  traditionally been followed?
(a) OCR         (b) MICR       (c) Barcode    (d) VRT         (e) CTS

63.     The object of UPS is:
(a) using for storage    (b) increasing the speed of a computer
(c) Providing backup power  (d) All of the above   (e) only (a) and           (c)   above

64.     QWERTY is used with reference to :
(a) Monitor    (b) Printer (c) Keyboard (d) Mouse   (e) All of these

65.     "Zipping" a file means:
(a) Encrypting the message           (b) Compressing the message
(c) Transfer the message              (d) All of the above

66.     Integrated Circuits (IC) chips used in computers are made of:
(a) Gold        (b) Silver       (c) Silicon      (d) Copper     (e) Cobalt

67.     16. What is the name of the Super Computer developed in India?
(a) CRAY (b) PARAM     (c) Both (a) and (b)  (d) None of the above

68.     Pick the odd man out of the following :(Which is different from others)  
(a) Internet    (b) Windows   (c) Unix   (d) Linux  (e) none of these

69.     What is the full form of WWW?
(a) World Wide Web            (b) World With Web
c) Work Wide Web              (d) World Wide Wet   (e) None of these

70.     Which of the following Command is required to reboot the computer?
(a) CTRL+ALT+DEL             (b) CTRL+ALT+TAB
(c) CTRL+ALT+SHIFT (d) CTRL+SHIFT+DEL     (e) none of these

71.     Pick the odd man out of the following :(Which is different from others)
(a) Operating system    (b) Interpreter    (c) Compiler
(d) Assembler                    (e) none of the above

72.     PC stands for
(a) Practical Computer    (b) Personal Computer    (c) Private Computer   (d) Personal Contact           (e) Personal Comprehension


73.     The computer code for interchange of information between terminals is   (a) BCDIC               (b) BCD         (c) ASCII       (d) None of the above

74.     The retrieval of information from the computer is called:
(a) Data processing      (b) Input       (c) Output      (d) All of the above  (e) either (b) or (c) above


75.     Which one of the following is NOT a computer language?
(a) MS-Excel            (b) BASIC      (c) COBOL         (d) C++

76.     "C" is
(a) A letter    (b) A word           (c) A language         (d) An alphabet

77.     Difference Engine was invented by:
(a) Charles Babbage         (b) John McCarthy    (c) Pascal
(d) Newton           (e) none of these

78.     First generation computer systems used:
(a) Transistors         (b) Vacuum Tubes    (c) Both (a) and (b)
(d) None of the above

79.     A byte is made up of
(a) Eight bytes         (b) Eight binary digits (c) Two binary digits
(d) Two decimal points

80.     Doing research by using an on-line database instead of a printed              set of  similar information offers which of the following advantage(s) ?
(a) More current information          (b) Easier to understand
(c) Better charts       (d) None of the above  
      
81.     Software programs that allow you to legally copy files and give              them                  away at no cost are called :
(a) Time sharing       (b) Public domain   (c)  Shareware                  
(d) None of the above

82.     The term used to describe physical components of the system is :
(a) Hardware   (b) Input       (c) Software      (d) None of the above

83.     Which of the following is used to indicate the location on the computer                monitor?
(a) Mouse  (b) Cursor  (c) Both (a) and (b)  (d) None of the    above

84.     If you intend designing an invitation card, the computer program suitable for the purpose will be
(a) MS-Word            (b) Desktop Publishing         (c) Simulation
(d) None of the above

85.     Which combination of keys needs to be pressed to make a percent sign?
(a) Shift+2              (b) Shift+3              (c) Shift+4    (d) Shift+5

86.     What process should be used to recall a document saved previously?
(a) Copy                 (b) Save                 (c) Retrieve   (d) Enter

87.     What term applies to a collection of related records in a database?
(a) Field                  (b) File          (c) Both (a) and (b)
(d) None of the above

88.     How are data organized in a spreadsheet?
(a) Rows and Columns  (b) Boxes      (c) Tables      (d) None of the above

89.     Which of the following mode we use to deliver e-mail ?
(a) Postal  (b) Courier     (c) Computer (d) Fax   (e) None of these

90.     VIRUS stands for
(a) Vital Information Recourse Under Siege         
(b) Vital Information Reason Under Siege
(c) Vital Information Recourse Under System
(d) Virus Information Recourse Under Siege

91.     ------ Is known as unauthorized access into others system.
(a) Hacking    (b) Encryption (c) Decryption  (d) None of the above

92.     Inbuilt storage device of a computer is referred to as:
           (a) floppy  (b) compact disc  (c) hard disk (d) any of these (e) none of these

93.    The process of transforming plaintext data into an unintelligible form such that the original data either cannot be recovered  or cannot be recovered without using an  inverse process is called:
         (a) securitization(b) rematerialisation   (c) dematerialization       
         (d) encryption          (e) none of these

94.     NEFT stands for:
(a) National Equity Fund Trading     (b) National Electronic Funds Transfer      (c) Normal Exchange Fed Trading   (d) National Euro Finance Terminals
(e) none of these

95.     Firewall protects the computer from the risk of:
          (a) data mining  (b) data duplexing     (c) mother board crash       (d) hacking       (e) none of the above       

96.     The reporting of currency chest operations is done through:
          (a) INDONET  (b) NICNET   (c) INET  (d) SWIFT      (e) INFINET

97.        The committee on technology issues relating to payment systems, cheque clearing   and security settlement was headed by:
          (a) W.S.saraf                    (b) Y.B.Damle           (c) S.S.Tarapore     
(d) Dr. C. Rangarajan         (e) K.S.Shere

98.     The working group to give recommendations in the area of cheque truncation and e-   cheque was headed by:
          (a) Dr. N.L.Mitra       (b) B.D. Narang     (c) Dr. Burman        (d) Zarir Cama     (e) none of these

99.     The first bank in India to launch credit card was:
          (a) SBI      (b) Central Bank of India     (c) BOB         (d) PNB        
(e) Syndicate Bank

100.    Star, Ring and Bus topologies are related to:
          (a) CBS (b) ATM         (c) Networking layouts        (d) all of these  
          (e) none of these
    
101.    The network topology in which there are bidirectional links between possible mode           is:
          (a) Ring         (b) Star (c) Tree        (d) bus          (e) none of these

102.    The most common method being used by banks to transfer funds from one place to another is called:
          (a) EDI          (b) Fax         (c) Internet    (d) TT  (e) none of these 

103.    As at end-January 2015 the number of branches having NEFT facility was around:
          (a) 128155      (b) 55000      (c) 81500      (d) 37,600     (e) 43,700

104.    Copy printed through computer printer is called -----copy.
(a) hard    (b) soft    (c) paper       (d) ancillary   (e) none of  the above

105.    Route adopted by large companies for payment of dividends to shareholders is called
(a)ECS Debit  (b) RTGS  (c) ECS Credit  (d) either (b) or(c)   
(e) either (a) or (c)

106.  The way in which computer devices are interconnected is referred to as:
          (a) modem    (b) network   (c) LAN    (d) topology    (e) either (a) or (c)

         (a) Dr. C. Rangarajan         (b) Dr K.C.Chakrabarty       (c) Dr Bimal Jalan         (d) Dr. K.P.Krishnan            (e) Dr. K.G. Karmakar

108.  The technique to reveal strategic information stored in data warehouse is called:
          (a) data analysis  (b) data processing   (c) data search    (d) data mining           (e) none of these

109.   Full form of WAN is:
           (a) Wide Area Network  (b) Widely Acclaimed Negotiator    
(c) Wide Artificial network (d) Wide Arabic Network                                             (e)none of these

110.   An information system that immediately responds to the physical systems is called:
          (a) Live system        (b) On-line System    (c) Off-line system   (d) Real time system     (e) none of these 

111.    MICR is a cheque clearing technology used by banks. It stands for:
          (a) Magnetised Instruments Clearing Reader        (b) Magnetic Ink Character Reader    (c) Magnetic Ink Character Recognition               
(d) Mobile Insulated Character Recognition (e) none of these

112.    Digital signals are converted into analog signals at the transmitting end by:          (a) Digital signature             (b) UPS         (c) Modem     (d) Multiplexer         (e) none of these

113.   Stand alone computer system which is best suited for decision making process involving processing and analysis of data is also referred to as:
          (a) modem    (b) work station       (c) node  (d) either (a) or (b)
(e) either (b) or (c)

114.    Super computers, main-frame computers and mini computers fall in the category of:          (a) Stand alone computers   (b) Multi user computers      (c) LAN         (d) WAN          (e) none of these

115.   Working Group on information security, electronic banking, technology risk management, and cyber frauds which submitted its report in January, 2011 was headed by:
          (a) B.D.Narang        (b) Dr. C.Rangarajan          (c) Dr. G.Gopalakrishna            (d) P.Vijayabhaskar  (e) Dr. K.C.Chakrabarty

116.    Society for Worldwide Inter-bank Financial Telecommunications (SWIFT) was founded by -----banks spread over 15 countries.
          (a) 123   (b) 512         (c) 102   (d) 239         (e) none of these.

117.    The automated clearing system of UK is called:
          (a) CHIPS  (b) CHAPS     (c) CHATS   (d) MICE    (e) none of these

118.    Number of devices supported by LAN can be maximum:
          (a) 7             (b) 12           (c) 100          (d) 1000        (e) 25

119.    Device called modem was invented by:
          (a) Microsoft            (b) Apple Computers           (c) Intel Corporation   d) AT&T Information Systems    (e) Infosys Technologies

120.    Full form of SPNS is:
          (a) Shared Payment Network System      
(b) Synchronized Payment Network system
          (c) Swift payment Negotiated settlement   (d) Shared Protocol Network System          (e) none of these

121.    As the data stored in a computer is vulnerable to loss, at the end of the day it is generally downloaded on a CD or floppy. The process is called:
          (a) data storage       (b) data transmission (c) backup     (d) RAM       (e) none of these

122.    A computer system consists of several devices like CPU, monitor, mouse etc. Together they are called:
          (a) computer peripherals   (b) computer components    (c) computer bits             (d) computer equipments     (e) none of the above

123.    Which of the following is not covered under computer related crimes?
          (a) data spying  b) data didling  (c) data mining         (d) data duplexing            (e) none of these    

124.    When a number of computers are connected to a CPU in the same building it is called:
(a) WAN  (b) LAN  (c) RAM  (d) Off site network  (e) none of these

125.    Feeding of data into computer system is called
(a)Input (b) output (c) booting     (d) skimming  (e) none of these

126.    Institute for Development & Research in Banking Technology has advised all banks    to allot IFSC to all their branches and inform them the same so that IFSC directory           can be compiled. IFSC stands for:
(a) International Financial System Code    
(b) Indian Financial System Code    (c) Intra bank Financial System Code         d) International Financial Synchronizing Code      (e) None of these

127.    The working group on Electronic money was headed by:
          (a) Damle      (b) S.S.tarapore       (c) Zarir Cama         (d) Dr. Barman  (e) none of these    

128.    India’s largest wide area network is:
          (a) INDONET  (b) NICNET  (c) INET (d) SWIFT (e) none of these

129.    In which of the following topology system, the breakdown of one station can disable the entire network?
          (a) Star    (b) Ring  (c) Bus    (d) all of these      (e) none of these

130.    Starting the computer and loading the files is called:
          (a) processing   (b) booting  (c) input  (d) output  (e) truncation 

131.    IFSC consists of a 11 digit code with the first ----- alpha characters representing the bank, and the last 6 numeric characters representing the branch.
          (a) 3             (b) 5             (c) 4             (d)      2        (e) 6

132.    As per Information Technology Act, 2000 the key to verify the source of electronic   message, its integrity and non-repudiation is called:
          (a) truncation        (b) synchronization   (c) encryption         

          (d) digital signature             (e) none of these









































51
C
52
A
53
B
54
B
55
C
56
B
57
B
58
A
59
C
60
A
61
A
62
B
63
C
64
C
65
B
66
C
67
B
68
A
69
A
70
A
71
A
72
B
73
C
74
C
75
A
76
C
77
A
78
B
79
B
80
A
81
B
82
A
83
B
84
B
85
D
86
C
87
B
88
A
89
C
90
A
91
A
92
C
93
D
94
B
95
D
96
E
97
A
98
C
99
B
100
C
101
A
102
A
103
A
104
A
105
C
106
D
107
B
108
D
109
A
110
D
111
C
112
C
113
E
114
B
115
D
116
C
117
D
118
B
119
D
120
A
121
C
122
A
123
C
124
B
125
A
126
B
127
C
128
B
129
B
130
B
131
C
132
D