July 19
July 19
July 19
Computer generations classification is mainly based on the basic devices used. Also, the
considerations are the architecture, languages, modes of operation, etc. The function performed
by the computer and the speed of their operations have been changing since the old days to the
most modern computer. Based on the period of development and the features incorporated, the
computers are classified into different generations- First generation to Fifth generation. This is
called the computer generation.
Technology to be used: These machines will incorporate Bio-chip and VVLSI (Very
Very Large Scale Integration) or Ultra-Large Scale Integration (ULSI)
The computer will have Artificial Intelligence (AI).
Natural language will be used to develop programs.
The computer will have parallel processing in full fledge.
The operating speed will be in terms of LIPS(Logical Inference per Second)
These aim is to solve highly complex problems, which require great intelligence and
expertise when solved by people.
Quantum computation, molecular and nanotechnology will be used completely.
(b) What are the main functions of RAM, BIOS and hard disk?
Ans:
RAM stands for Random Access Memory. RAM is a type of primary memory in computer and other
computing devices. RAM is made up of semiconductors, thus it is a type of semiconductor memory.
RAM allows the user/CPU to randomly access any part of the data regardless of its position. RAM is a
volatile memory which means the data in RAM is dependent on the power supply and as lost when
power is switched off.
There are many basic and main functions of random access memory, which are given below.
Reading Files
Temporary Storage
Loading Applications
This is also the work of RAM memory. Your computer hard disk stores large amounts of data.
And because of storing large amounts of data, the hard disk slowdown of your computer works.
Due to storing a large amount of data on a computer hard disk, if you have to retrieve a file, then
you have to search that file in your computer which takes a lot of time because all the data on the
hard disk is scattered.
That program or files of the computer which have been used, then RAM saves the data in a
temporary way, which is the main function of the computer RAM.
RAM also stores the data that is used resentingly or the programs or files that are being used
repeatedly in your computer system.
A “BIOS” (Basic Input/output system) is software or firmware capable of starting your computer
system.
The BIOS Power on Self Test is started when the computer system is started, but to ensure that
all the hardware connected to the system is working properly
There are four main functions of BIOS are available in most computers
POST: Checks your computer system’s processor memory, chipsets, videos, adapters,
disk controllers, disk drives, keyboards, and other hardware to check if they are working
properly.
SETUP: enables configuring your computer system’s motherboard and chipset settings
System configuration and setup programs are typically a menu-based program that is
activated by pressing a Special Key during POST.
BIOS: It is a collection of drivers that acts as a basic interface between your computer
system and the OS and your hardware when it boots.
BOOTSTRAP LOADER: Hard disk is required to load the OS, hard disk drives read
the boot sector. It is a program that is stored in the ROM or EPROM of your computer
that when the computer is powered on. Is automated by the processor. Loading the OS
from a floppy disk or hard disk into the main memory (RAM) of the computer makes the
program work until the process is successfully completed in the boot memory (RAM),
then the main copy is made to the OS, then Till the user cannot use the computer.
A hard disk is also known as a hard drive or fixed disk. It is said to be rigid magnetic disc that
stores data. It is located within a drive unit. Hard disk is a non-volatile storage device that
contains platters and magnetic disks rotating at high speeds. Non-volatile means the data retains
when the computer shuts down.
It is installed internally in our computer systems. Hard disk is located within a drive unit on the
computer's motherboard and comprises one or more platters packed in an air-sealed casing
The hard disk is a secondary storage device, which is designed to store data permanently. The
secondary storage devices include a large storage capacity as compared to the primary storage
devices. The data stored in a hard disk is retained when our computer system shuts down. The
data stored in the hard disk can be of many types such as the operating system, installed
software, documents, and other files of computer.
Every computer contains atleast one hard drive to store data and software. In Windows operating
system, the hard drive is known to be the C drive, and in MAC, it is simply called as the hard drive. The
desktop computers which have external hard drives are used for backup purposes or additional storage.
The main function of a Hard Disk is to store computer data forever. Therefore it is also called Permanent
Storage. This data can be of many types, such as your personal files, documents, software, operating
system etc. How much data can be stored in these hard disks, it depends on the storage capacity of the
Hard Disk. Today you will find such hard disks whose capacity to store data ranges from gigabytes to
terabytes
(c) Describe the features of any two widely used application packages.
Ans:
Features of a word processors
A word wrap which automatically starts a new line if there is insufficient room at the
hand margin
Availability of different fonts, character sizes and styles
Text paragraph and page formatting eg text alignment, indenting, page number etc
Search and replace command which allow replacement of every incidence of a certain
combination of characters with a set of characters
Undo which allows action that have been performed to be reversed
Printing of documents single or multiple choices
Mail merging that is very essential while similar letters have to be sent
Ability to create and import tables, text and graphics from other programs
A web browser is a software application that is used to access the world wide web(www) or as known by
everyone on the Internet. It is an interface between us and the information available on the web.
1. Home button – Clicking the ‘Home’ button brings the user directly back to the home page of the
browser. We can set any webpage as the home page. Usually people prefer to have search
engines like – Google.com as their home page.
2. Address bar – The address bar is where the URL of the desired website is entered. This bar helps
us to navigate to the desired website of our choice.
3. Refresh button – The refresh button is to reload the page. In some cases, the page locally stores
and saves the information. This prevents users from seeing the updated information. Therefore,
the refresh button is helpful in such cases.
4. Bookmarks – This option is to save a particular website for reference later in the future. It is
used to mark pages that might be important or prove to be useful in the future.
5. Tabbed browsing – This feature helps to open new screens on the same browser for multiple
browsing at the same time.
Ans: Previous
Ans: Previous
3.(a) Discuss the benefits of database against flat file. Describe SMS banking and internet banking.
Ans:
A flat file/ flat form database is a system that stores data within a single table. It is known as a flatform
database due to it only containing a two dimensional structure (data fields and records).
This can reduce the risk of the data being loss as the database can be saved in a variety of different
forms.
This type of database makes it simple for the editor to update as the data is split into separate data
fields instead of multiple tables.
(b) Discuss about the functionalities of a modern core banking software. What do you understand by
ERP software?
Ans: Previous
Ans: Previous
(b) What are the features of AML software? How can we manage the risks of internet banking?
Identify, classify and assess risks that are relevant to the bank's operations and systems.
- Develop a documented plan containing policies, practices and procedures that address and control
these risks.
- Update the plan periodically to take account of changes in technology, legal requirements and business
environment including external and internal threats and security vulnerabilities.
The aim of this set of guidelines is to require banks to adopt risk management principles and security
practices which will assist them in:
- Establishing a sound and robust technology risk management framework. Strengthening system
security, reliability, availability and recoverability.
- Deploying strong cryptography and authentication mechanisms to protect customer data and
transactions.
- All banks providing internet banking must erect a sound and robust risk management process that will
enable them to identify, assess, measure and respond to technology risks in a proactive and effective
manner.
5. (a) Briefly discuss about electronic fund transfer system and its benefits. What is National Payment
Switch?
Ans: Previous
(b) Discuss about shared ATM network and e-payment gateway and use of those.
Ans: Previous
6. (a) Discuss about mobile banking and RTGS. Discuss about SWIFT and its use in banks.
Ans: Previous
Ans: Previous
7. (a) Discuss about how computer can help foreign exchange dealings. What is spyware?
Spyware is any software that installs itself on your computer and starts covertly monitoring your
online behavior without your knowledge or permission. Spyware is a kind of malware that
secretly gathers information about a person or organization and relays this data to other parties.
In some cases, these may be advertisers or marketing data firms, which is why spyware is
sometimes referred to as “adware.” It is installed without user consent by methods such as a
drive-by download, a trojan included with a legitimate program or a deceptive pop-up window.
Spyware uses your internet connection to relay personal information such as your name, address,
browsing habits, preferences, interests or downloads. Other forms of spyware hijack your
browser to point it to another website, cause your device to place calls or send texts
automatically, or serve annoying ads even when you are offline. Spyware that steals your
username, password or other credentials is referred to as a “keylogger” – an insidious
prerequisite for cyber crime.
Overview. Spyware is mostly classified into four types: adware, system monitors, tracking including
web tracking, and trojans; examples of other notorious types include digital rights management
capabilities that "phone home", keyloggers, rootkits, and web beacons.
The main types are:
Keyloggers: This is one of the most dangerous types. A keylogger records the user's
keystrokes on their computer. ...
Adware: This is the most common type. ...
Infostealers: Just like the keylogger, this type operates without the user realizing that it is
collecting and sending information from the computer.
(b) What benefits bank may gain by using Data warehouse, Data mining and Business Intelligence
software?
Ans:
Used to develop insights and guide decision-making via business intelligence (BI), data
warehouses often contain a combination of both current and historical data that has been
extracted, transformed, and loaded (ETL) from several sources, including internal and external
databases.
Data warehousing can help businesses in the financial sector in several ways.
First, it can provide a complete picture of an organization's financial health. This information can
make more informed decisions about where to allocate resources.
Second, data warehousing can enable businesses to track crucial financial indicators over time.
Financial data quality is enhanced through data warehouses, which can extract accurate and
reliable information from numerous sources.
Third, data warehousing can help businesses in the financial sector comply with regulations.
Financial institutions are subject to several regulations, and data warehousing can help ensure
they have the necessary information to meet these requirements.
Data warehouses are used in the same way by most financial institutions. The following are some
ways the financial industry uses data warehousing:
Data warehouses allow companies to gather and analyze client information to improve service
delivery and strengthen customer connections. Financial firms may collect every client
interaction with data warehouses, allowing you to examine what influences purchasing decisions
and other consumer behaviors. Data warehouses simplify this by allowing you to quickly record
and track large quantities of consumer and historical data from various sources.
Increase Insights
Data warehouses play a significant role in predictive and real-time analytics for many financial
institutions. They make it possible to store data centrally and access historical information
quickly so you can start discovering patterns. This helps you get ready for future events and
make better decisions overall. Additionally, data warehouses are great for storing critical
financial details like customer insights and fraud detection info.
Minimize Risks
Investors, competitors, and other entities pose particular risks to financial institutions.
Streamlining data analysis and managing risks through enhanced machine-learning algorithms is
crucial.
Data warehousing helps automate your risk management process using algorithms and machine
learning (among others).
A data warehouse's ability to quickly centralize data from multiple sources can speed up your
analytics, allowing you to derive powerful insights efficiently and make decisions promptly to
minimize risks.
Data mining is the process of analyzing enormous amounts of information and datasets, extracting (or
“mining”) useful intelligence to help organizations solve problems, predict trends, mitigate risks, and
find new opportunities. Data mining is like actual mining because, in both cases, the miners are sifting
through mountains of material to find valuable resources and elements.
Marketing: One of the most widely used areas of data mining for the banking industry is
marketing. The bank‟s marketing department can use data mining to analyse customer
databases. Data mining carry various analyses on collected data to determine the consumer
behavior with reference to product, price and distribution channel. The reaction of the customers
for the existing and new products can also be known based on which banks will try to promote
the product, improve quality of products and service and gain competitive advantage. Bank
analysts can also analyze the past trends, determine the present demand and forecast the
customer behavior of various products and services in order to grab more business
opportunities and anticipate behavior patterns.
Risk Management: Data mining is widely used for risk management in the banking industry.
Bank executives need to know whether the customers they are dealing with are reliable or not.
Offering new customers credit cards, extending existing customers lines of credit, and approving
loans can be risky decisions for banks if they do not know anything about their customers.
Fraud Detection: Another popular area where data mining can be used in the banking industry
is in fraud detection. Being able to detect fraudulent actions is an increasing concern for
many businesses; and with the help of data mining more fraudulent actions are being detected
and reported. Two different approaches have been developed by financial institutions to detect
fraud patterns. In the first approach, a bank taps the data warehouse of a third party and use
data mining programs to identify fraud patterns. The bank can then cross-reference those
patterns with its own database for signs of internal trouble. In the second approach, fraud
pattern identification is based strictly on the bank‟s own internal information.
Customer Relationship Management: Today customers have wide range of products and
services provided by different banks. Hence, banks have to cater the needs of the customer by
providing such products and services which they prefer. This will result in customer loyalty and
customer retention. Data mining techniques helps to analyze the customers who are loyal from
those who shift to other banks for better services. If the customer is shifting from his bank
to another, reasons for such shifting and the last transaction performed before shifting can be
known which will help the banks to perform better and retain its customers.
8.(a)Discuss about 'Agent banking' and 'booth banking'. How banks take care of security concerns of
using credit card?
Ensuring our online security has never been as crucial as it is today. While we have all faced digital
dangers in the past, the threats have reached entirely new heights due to the rapid development of
technology and our increasing online presence. We are no longer using the internet only to browse and
read websites and play games. Now, it has infiltrated almost every aspect of our professional and
personal lives, from working or studying to managing our finances or contacting our healthcare
providers. While we can face fraudulent actions in any of these areas of life, the financial one is in the
biggest danger.
Designate just one credit card for all your online purchases. This way, you keep yourself from
exposing multiple accounts to hackers and can easily check for suspicious charges. Some banks
even offer special cards for online usage. Get set up to receive text message or email alerts each
time a purchase is made on your account. Whenever possible, check out as a guest when making
a purchase instead of creating an account that stores your card information in a profile, too.
Check with your credit card company to see if it offers a virtual-number service. This feature
creates a temporary one-time card number for each purchase transaction you make online. Your
real card information isn't exposed during the checkout process, but the temporary number is still
linked to your account to register your purchase activity. If hackers obtain your data later on,
they won't have your real card number.
Passwords for your online card and banking profiles should be unique and complex to prevent
hackers from accessing multiple accounts using the same login information. Generally, an
effective password is long, contains both upper- and lower-case letters, has numbers and uses
symbols (if permitted). Try using a phrase or an entire sentence to create complexity, replacing
words like "to" with the number 2 and "and" with ampersands. Use memorable phrases that you
won't forget — but that also don't contain any personal details — and don't write your passwords
down anywhere.
(4) Remember "S Is for Secure"
Always make sure your connection to a website is secure. When you see the lock symbol in your
Internet browser's URL field, and the address starts with "https" rather than "http", this indicates
that the transaction is encrypted. This isn’t 100 per cent safe, since cybercriminals can obtain
legitimate security certificates, but it does prevent opportunistic scams.
Choose retailers that you're familiar with. If you aren't familiar with a site, do some research to
find out more about it. Also take note of the design; if it looks off or unprofessional, find your
product elsewhere. There are plenty of reputable ecommerce sites to choose from.
For online shopping, only use secure, reputable websites and avoid shopping on public Wi-Fi.
Cyber criminals often spy on public Wi-Fi networks and intercept data that transferred across the
link. Public network can leave you vulnerable to these attacks enabling hackers to access your
confidential financial information, banking credentials, account passwords and other sensitive
data. Read more about Public Wi-Fi security.
Use security software that protects both your desktop and mobile devices. Many of us shop on
the small screen, and that can make us more vulnerable to hackers. Cover yourself with antivirus
software or a comprehensive Internet Security software that offers protection on all devices.
Stay on top of updates for your operating system and other software. Often, these updates patch
security holes to keep you safer. When you get a notification that an update is available,
download it right away.
Ans: Previous
Ans: Previous
(b) Describe about cyber crime and cyber law in Bangladesh.
Generally Cyber crime, or computer related crime, is crime that involves a computer and a
network. The computer may have been used in the commission of a crime, or it may be the
target.
Bangladesh does not have any officially recognized national cybercrime policies/strategies.
There are some Cybercrime prevention agencies like The Bangladesh Telecommunication
Regulatory Commission (BTRC), Bangladesh Computer Security Incident Response Team
(bdCERT) have been set up for the purpose of curbing cybercrimes.
Bangladesh has also set up various specialized cybercrime police stations. Cyber incident
response unit and ‘a cybercrime investigation cell’ and ‘IT Crime Forensic Lab’ are set up by the
Bangladesh police to fight against cybercrime or crime related with computer and other IT
technology.
In the Digital Security Act 2018, a Digital Security Agency is established, in order to ensure the
fulfilling of the Act.
Cybercrime legislation
State of cybercrime legislation
Substantive law
Procedural law
Safeguards
Problem Areas:
1. Telecommunications
4. Telecommunications piracy
6. Telemarketing fraud
Digital Security Act 2018: On 2018 Government has passed this Act to ensure digital security
and prevent crimes committed on digital platforms.
Digital Security Rules 2020: According to Section 60 of the Digital Security Act 2018
Government published the Digital Security Rules 2020.
Ans:
Encryption is the process of translating plain text data (plaintext) into something that appears to be
random and meaningless (ciphertext). Decryption is the process of converting ciphertext back to
plaintext.
The Procedure of the Encryption Process
Data, Encryption engine, and key management are the three main components of the encryption
process. The data to be secured is encrypted using an encryption algorithm. The sender decides
on the type of algorithm to be used and the variable to be used as a key. Then this encrypted data
can be decrypted only using a proper key shared by the sender.
Encryption-Process
The encryption algorithms are of two types – symmetrical and asymmetrical. Symmetric Cypers
are popularly known as the secret key encryption. This algorithm uses a single key. Here, the key
is shared by the sender to the authorized recipients. Advanced Encryption Standard is the widely
used symmetric algorithm.
The asymmetric encryption algorithm is also known as private key encryption. This algorithm
uses two different keys – a private key, public key. These keys are logically linked. Here, prime
numbers are used to make the key. This makes the reverse engineering of encryption more
difficult. Rivest – Shamir – Adleman is the popularly used asymmetric encryption algorithm.
Decryption is the process of transforming data that has been rendered unreadable through encryption
back to its unencrypted form. In decryption, the system extracts and converts the garbled data and
transforms it to texts and images that are easily understandable not only by the reader but also by the
system. Decryption may be accomplished manually or automatically. It may also be performed with a set
of keys or passwords.
Decryption is a process that transforms encrypted information into its original format.
The process of encryption transforms information from its original format — called plaintext —
into an unreadable format — called ciphertext — while it is being shared or transmitted.
To do this, parties to a private conversation use an encryption scheme, called an algorithm, and
the keys to encrypt and decrypt messages. (Encrypted messages are called ciphertext, as
algorithms are also called ciphers.)
Message recipients decrypt the information back into its original, readable format. Future
messages when passed through the system are encrypted, and vice versa.
(a) E-governance
Ans: Previous
Ans: Previous
Ans: Previous
Ans:
A Private Cloud is a model of cloud computing where the infrastructure is dedicated to a single user
organization. A private cloud can be hosted either at an organization’s own data center, at a third party
colocation facility, or via a private cloud provider who offers private cloud hosting services and may or
may not also offer traditional public shared multi-tenant cloud infrastructure.
Private Clouds offer the same control and security as traditional on-premises infrastructure. Here
are some reasons why organizations opt for private cloud computing:
Security: Private cloud security is enhanced since traffic to a private cloud is typically limited to
the organization’s own transactions. Public cloud providers must handle traffic from millions of
users and transactions simultaneously, thus opening a greater chance for malicious traffic. Since
private clouds consist of dedicated physical infrastructure, the organization has better control
over the server, network, and application security.
Predictable performance: Because the hardware is dedicated rather than multi-tenant,
workload performance is predictable and unaffected by other organizations sharing
infrastructure or bandwidth.
Long-term savings: While it can be expensive to set up the infrastructure to support a private
cloud, it can pay off in the long term. If an organization already has the hardware and network
required for hosting, a private cloud can be much more cost-effective over time compared to
paying monthly fees to use someone else’s servers on the public cloud.
Predictable costs: Public cloud costs can be very unpredictable based on usage, storage charges,
and data egress charges. Private cloud costs are the same each month, regardless of the
workloads, an organization is running or how much data is moved.
Regulatory governance: Regulations such as the EU’s GDPR may dictate where data resides and
where computing occurs. In those regions where public cloud providers cannot offer service, a
private cloud may be required. Additionally, organizations with sensitive data such as financial
or legal firms may opt for private cloud storage to ensure they have complete control over
personally identifiable or sensitive information.
Types of Private Cloud. Depending on who manages the private cloud environment and
where the cloud solution is hosted, a private cloud can be classified into four major types
– virtual private cloud, managed private cloud, hosted private cloud, and on-premise
private cloud.
HP Data Centers, Microsoft, Elastra-private cloud, and Ubuntu are the example of a
private cloud.
(e) Phishing
Ans: Previous
Ans: Previous