Includes all the solved answers of IT/Computer Engineers , computer operator. Send us question get solution.
Friday, September 2, 2022
Major Challenges for economic development of Nepal | Loksewa old Question Paper 2078
NRB IT Policy and Guideliness 2012(2067) | Loksewa IT Engineers 2079
Q. Write down the major areas covered by NRB IT guidelines 2012(NRB IT Policy 2067). (10)
- Ensure that IT infrastructure is stable, secure, and standardized.
- Ensure the confidentiality, integrity, and availability of information.
- To increase awareness of the IT system in order to increase efficiency, effectiveness, and economy.
- Minimizing IT-related risks.
- Ensure that the financial sector's information system operates efficiently.
- The use of IT resources by a bank should be efficient, effective, and economical in order to satisfy the bank's business demands.
- It is important for risk management policies to consider IT-related risks.
- Before adopting a new technology or system, a bank needs to perform a detailed risk analysis.
- Banks should monitor and measure the performance of their IT functions and report to appropriate management levels.
- A bank should harden their system, which means that their OS, firewall, and system software should be configured with the highest level of security.
- The bank should maintain a comprehensive mechanism to protect itself against computer viruses.
- Secure cryptographic techniques and end-to-end encryption should be used by banks to protect customer PINs, user passwords and other sensitive information.
- All ATMs should be equipped with CCTV systems and appropriate lighting.
- To safeguard their web applications and databases, banks should implement adequate security measures.
- A bank should implement an information security awareness program and periodically conduct it among its employees, vendors, customers, and other concerned parties.
- Ensure that customers are adequately educated so that they are able to conduct banking operations securely.
- It is important for banks to use appropriate customer authentication systems when accessing their systems.
- Banks should provide clear information about the dispute resolution process in case of security breaches or fraudulent account access.
- The website of a bank should include information about their security and privacy policies as well as fees and commissions.
- If a customer complains, the bank shall handle the grievance.
- Banks should inform their customers clearly about the risks and benefits of e-banking, online banking, and mobile banking.
- Banks should ensure that their service providers can provide the performance, reliability, capacity, and security that they require.
- Before entering into an outsourcing agreement, a bank should evaluate the economic, social, and political risks.
- Banks should ensure that outsourcing agreements do not adversely affect the quality and availability of banking services.
- A safe environment for IT operation should be ensured by the board and higher management.
- In order to deliver timely, reliable, secure information, banks should have adequate hardware, software, and operating capabilities.
- IT risk assessments should be conducted periodically by banks.
- Business continuity planning (BCP) frameworks have become more critical with the introduction of the electronic delivery channel and 24/7 service availability.
- BCPs should consider all potential manmade and natural disasters, security threats, regularity requirements, and outsourcing dependencies.
- In order to maintain a 'fail-safe system' with minimum downtime, a bank needs to maintain an economic, efficient, and effective disaster recovery system
- Inadequate testing and bad design contribute to many software failures.
- Security requirements should be met by applications that handle customer financial information.
- Prior to implementing the system, all vulnerabilities, loopholes, and defects should be fixed.
- A bank should conduct periodic IS audits to ensure that the controls framework and security procedures are effective.
- An external IS auditor should be appointed if the bank does not have enough staff.
- In order to submit a report to Nepal Rastra Bank, a bank should identify and document all electronic attacks.
- A customer should be informed about fraud and how to identify, avoid, and protect against it.
- Achieve efficient, effective and economic IT operation by implementing appropriate IT systems, such as Financial Information Systems (FIS), Management Information Systems (MIS), Enterprise Resource Planning Systems (ERPs), Real-time Gross Settlement Systems (RTGS), Scripless Security Settlement Systems (SSSS), etc.
- Ensure that physical IT infrastructure is well-structured, secure, and properly documented.
- Ensure information security at multiple levels.
- Implement an audit of IT systems.
- Maintain a data backup and recovery policy by developing, implementing and maintaining it.
- Maintain a Disaster Recovery Planning (DRP) System that is efficient, effective, and economically feasible so that the system is a "fail safe system" with little downtime. In addition, develop and maintain a Business Continuity Plan (BCP).
- Implement IT outsourcing and third-party involvement mechanisms.
- Ensure that all offices have a uniform and legitimate IT infrastructure.
- Provide IT directives to banks and financial institutions that are licensed.
- Standardize IT procurement and monitor it as technology changes.
- Implement a "NRB IT Code of Conduct" to ensure proper use of IT resources at the NRB.
- Enhance the capacity building of employees in information technology
Thursday, September 1, 2022
Artificial Intelligence and its Component | Loksewa 078 question paper
Q. What is AI? Describe in detail the components of AI. (10 marks)
answer:
John McCarthy, the father of Artificial Intelligence, defined it as "the science and engineering of creating intelligent machines, particularly intelligent computer programs".
An artificial intelligence system is one that makes a computer, a computer-controlled robot, or software think intelligently, like an intelligent human.
The goal of Artificial Intelligence is to create expert system and to implement human intelligence into machines. Artificial Intelligence is a technology based on a number of disciplines like computer science, biology, psychology, linguistics, mathematics, engineering and so on.
The basic components of Artificial Intelligence can be mentioned below:
- Learning
- Reasoning
- Problem-solving
- Perception
- Language Understanding
Learning
- Supervised Learning- computer algorithms are trained using input data that are labeled for particular results
- Unsupervised Learning- A type of algorithm that learns patterns from untagged data.
- Semi-supervised Learning- large amounts of unlabeled data are mixed with a small amount of labeled data during training.
- Reinforcement Learning- algorithms are trained to explore their environments independently.
Reasoning
Problem-Solving
Perception
Language Understanding
Wednesday, August 31, 2022
Process Scheduling Algorithms | Loksewa 2078 Question paper
Q. Describe various process scheduling algorithms. 10 marks.
- To Maximize CPU utilization
- For Fair allocation of CPU
- To Maximize throughput
- To Minimize turnaround time
- To Minimize waiting time
- To Minimize response time
Advantages:
- It suffers from Convoy effect.
- average waiting time is much higher than the other algorithms
- not much efficient
- Best approach to minimize waiting time
- used for long term scheduling
- It has starvation
- Many times it becomes complicated to predict the length of the upcoming CPU request
- Short processes will be executed first.
- It may result in starvation if short processes keep on coming.
- The average waiting time is less than FCFS
- Less complex
- It has Starvation Problem. This is the problem in which a process has to wait for a longer amount of time to get scheduled into the CPU. This condition is called the starvation problem.
- No starvation will be there in round-robin because every process will get chance for its execution.
- Used in time-sharing systems.
- Need to perform a lot of context switching here, which will keep the CPU idle
- It has a low scheduling overhead.
- Starvation problem
- It is inflexible in nature
Tuesday, August 30, 2022
Deadlock in Operating System | Loksewa 2078
Q. What do you mean by Deadlock? What are the necessary conditions for the deadlock to occur? (2+3+5) marks
answer:
Deadlock is a situation where two or more processes are waiting for each other. When a process requests resources and those resources are not available, the process enters a waiting state. Sometimes, a waiting process is permanently unable to change state because the resources it has requested are held by other waiting processes. This situation is called deadlock. Lets take a real time example, To obtain a voter card, you must provide proof of address, but to obtain proof of address, you must already have a voter card. So it depends on one another. Until any one step is not resolved this deadlock situation exists even in real life.
@missionofficer |
Necessary Conditions of Deadlock
There are four different conditions that result in Deadlock. These four conditions are also known as Coffman conditions and these conditions are not mutually exclusive. They are:
1. Mutual
When this scenario occurs, only one process at a time can hold a resource, during which it cannot be shared with other applications. In addition, this is a critical policy applied by operating systems to prevent conflicts from occurring when two or more processes are using the resource simultaneously, which may result in incomplete data being saved.
Nevertheless, this is a necessary condition for deadlocks to occur. The programs would not have to wait for each other if they could share the same resources.
2. Hold and Wait
A process must be handled at least one resource and waiting to require additional resources that are currently being held by the other processes.
3. No Preemption
It is not possible to forcefully prevent a resource from being included in a process by another process. As an example, if a process P1 is using a resource R, another process P2 cannot forcefully take it. Hence, various scheduling algorithms do not seem to be needed if that's the case. P2 can request and wait for the process P1 to release the resource R, which would be useful for the process P1.
4, Circular Wait
Circular wait involves processes waiting for each other in a circle. Consequently, no one releases their own resource; everyone waits for each other to release it. Here, everyone is waiting to receive the resource. This is called a circular wait. To reach a deadlock, all four conditions need to be met. If a deadlock occurs, either the operating system needs to perform some work or the system needs to be rebooted.
As soon as the circular wait is broken, the issue will be resolved since each program can then get the resources they need.
Therefore, All four conditions are necessary for deadlock to occur. If any single one is prevented or resolved, the deadlock is resolved.
Monday, August 29, 2022
Nepal Bank Limited Level 6 IT Question Paper | 2079/05/12
The following are the questions asked for the exam of IT assistant level 6 on date 2079/05/12.
Topic: Banking, Management and General IT
Full Marks: 100
Section "A"
1.State different types of communication in a bank on problem solving and decision making process. (10)
2. Briefly describe the need and importance of management information system (MIS) in bank and Financial Institutions. (5+5=10)
3. Justify the role of "Group Dynamics and Team Work" in delivering a quality service of a bank you are working out when to work. Don't you think informal group dynamics may hinder the expected level of service of the bank? Discuss logically with suitable examples. (10)
4. What do you mean by Banking Technology? Briefly explain the role of Technology in competitive banking business. How can Nepal bank limited upgrade its technical efficiency compared to private sector banks? (2+8=10=20)
Section "B"
5. Write down the major areas covered by NRB IT guidelines 2012(NRB IT Policy 2067). (10)
6. What are the guiding principles for categorizing bank's ICT systems into critical and non critical systems? Prescribe the procedure to be followed during the troubleshooting and maintenance of banks critical ICT system. (4+6=10)
7. Explain decision support system with suitable example. How can decision support system help for rational decision making in banking sector. (5+5=10)
8. Increasing use of Information Technology (IT) in banks and development of technologically complex products require a systematic monitoring and management of technology risk in banks. Inadequate IT risk management functions may also result in huge financial losses. Nepal Rastra Bank (NRB) has also issued IT guidelines 2012 for the banks as a guiding document for managing IT functions and IT risk. (5+5+10=20)
In this contest,
i) Identify major IT risk in banks
ii) How are provisions of IT guidelines 2012 issued by NRB useful for banks in IT risk management
ii) Prepare a brief IT risk management Framework for a bank
Sunday, August 28, 2022
Computer Applications And Memory Hierarchy | NBL 2078 question paper
Q. What are the different applications of computer? Explain with examples. Describe about the Memory Hierarchy of computer system. (6+4)marks.
1) Application suites
Packed with many programs that have user interfaces, functions, and the ability to interact with the user; these include Microsoft Office, Adobe Creativity suite, security suites, game applications, and many others.
2) Enterprise Software
Labels the requirements of an organization and also manages the flow of data in a huge environment. It includes automated billing systems, email marketing, business intelligence, content management, etc.
3) Enterprise Infrastructure Software
Provides the functionality needed to support enterprise software systems.Mainlyusedbycompanies,societies,andorganizationsthatrequire high investment in network security, surveillance systems, transportation, sewage, telecommunications, electricity, water, etc. For example, firmware, operating systems, cryptography, etc.
4) Educational Software
Contains content on a variety of subjects that can be used bystudentsandindividuals. There are websites that offer educational software on a variety of topics, and their vast databases make them easy-to-use applications. Examples include: Google Earth, NASA, Encyclopedia Encarta Timeline, etc.
5) Multimedia Software
Used to develop media in everyday life. There are various audio, video, image editing tools, and print media that can be used to maximize business growth. For example Picasa, Window Movie maker, Adobe Photoshop, etc.
6) Content Access Software
Used to access content within a website to publish digital content and entertainment. Examples Media player, Web browser, etc.
7) Informationsoftware
These software are used to address the needs of individuals by creating and managing information for individual projects within a department. Examples: word processors, spreadsheets, email and blog clients, etc.
Memory Hierarchy
Typically, a memory unit can be classified into two categories:
- The memory unit that establishes direct communication with the CPU is called Main Memory. The main memory is often referred to as RAM (Random Access Memory).
- The memory units that provide backup storage are called Auxiliary Memory. For instance, magnetic disks and magnetic tapes are the most commonly used auxiliary memories.
auxiliary memory
Secondary memory is known to be the cheapest, largest, and slowest memory available in a computer system. Auxiliary storage provides storage space for programs and data that are stored for long-term storage or that are not used immediately. Examples: magnetic tape, magnetic disk, hard disk, zip disk, and floppy disk.
main memory
- Random Access Memory (RAM) integrated circuit chip.
- Integrated read-only memory (ROM) circuits.
The goals of memory hierarchy are-
- To obtain the highest possible average access speed
- To minimize the total cost of the entire memory system
Featured post
Major Challenges for economic development of Nepal | Loksewa old Question Paper 2078
Q. Wha t do you mean by Economic Growth and Economic Development? What are the main challenges of economic development of Nepal? Give your ...
Popular Posts
-
Q. What are the different layers in Open System Interconnection(OSI) Model Reference Model? Provide a brief description of each layer. (3...
-
Q. Write down the major areas covered by NRB IT guidelines 2012(NRB IT Policy 2067). (10) answer: NRB has formulated the IT policy for its o...
-
The following are the questions asked for the exam of IT assistant level 6 on date 2079/05/12. Topic: Banking, Management and General IT ...