Friday, September 2, 2022

Major Challenges for economic development of Nepal | Loksewa old Question Paper 2078

Q. What do you mean by Economic Growth and Economic Development? What are the main challenges of economic development of Nepal? Give your answer with suitable example.


answer:
Economic growth can be defined as the increase or improvement in the inflation-adjusted market value of the goods and services produced by an economy over a certain period of time.

Economic development is the process of creating wealth that benefits the community as a whole. This is more than a jobs program, it's an investment that increases the prosperity and quality of life for all residents of your community. It is all about fostering and maintaining a healthy economy that can be considered economic development.



Challenges of Economic Development in Nepal


The economy of Nepal is still underdeveloped with low growth and a low per capita income of only $1034 per year. A rapid economic development of the country faces mounting challenges despite progress made in poverty reduction and socioeconomic transformation during the past two decades. The major challenges for the economic development of the country can be listed as below:

1. Poverty and Inequality
In Nepal, 18.6 percent of the people are still living in extreme poverty. In rural and urban areas as well as among different castes and ecological zones, poverty is highly disparate. One third of the population remains poor when we consider health, education, and other aspects of poverty. Furthermore, the income distribution has not significantly improved. Income inequality in Nepal is still high based on the Gini coefficient. Rapid economic growth and equitable income distribution are therefore required to break the vicious cycle of poverty and underdevelopment.

2. Unemployment
Approximately 5 lakh Nepalese youth join the labor market each year, but less than 10% find employment. Those who are not employed in the country go abroad to seek employment. The agriculture sector of the country is plagued by disguised unemployment. Therefore, creating job opportunities in both the public and private sectors is a challenge in addressing unemployment.

3. Practices of subsistence farming
Around two-thirds of the nation's workforce is employed in the agriculture sector, which contributes about one third of the nation's output. As a result of lack of modernization and commercialization of the agricultural sector, agricultural productivity is low, and we have to import food grains and vegetables from India in large quantities. The main problems are an inadequate irrigation system, traditional farming practices, and a lack of seeds and fertilizers. It is thus a great challenge to transform the agriculture sector through commercialization, expansion of irrigation facilities, road networks, storage, fertilizers and inputs, among others.

4. Geographical Difficulties
The topography of Nepal is challenging. Approximately 50 percent of the country is covered with hills and mountains. As a result, physical infrastructure development in all parts of the country has been very difficult. Therefore, connecting and mainstreaming all parts of the country to development is a great challenge.

5. Lack of Capital and Technology
The domestic saving ratio of the country has been low in recent years (around 10 percent). As a result, the resources needed for capital formation are insufficient. A lack of foreign investment in the country has been caused by political instability. As a result, utilizing the country's resources and developing new techniques have been a challenge, and adopting foreign technology to increase productivity has been challenging.

6. Timely Construction of Earthquake Damaged Buildings
Despite three years after the 2015 earthquake, only about half of the 5,00,000 houses damaged by the earthquake have been rebuilt. Reconstruction of government buildings, public schools, hospitals, old palaces, temples, and other historical monuments has not progressed as anticipated. In the present day, it is challenging to manage the resources necessary to construct them on time.

7. Meeting the Resources for the newly formed Federal Nepal 
As the 753 local bodies and seven provinces formed governments, the need for resources has increased rapidly. In order to address rising aspirations of the public, the central government has also needed more resources. In spite of this, tax revenue and other forms of revenue are not sufficient to cover such resource needs. In order to maintain a federal structure, it is challenging to manage the necessary resources.

8. Expanding the Financial Access
In spite of the growing number of financial institutions, access to financial services remains unsatisfactory. Bank branches and activities have been concentrated only in Kathmandu valley and some major Terai cities. There is still no commercial bank branch in any of the local level bodies. UNCDF survey results from 2014 show that only 40 percent of Nepalese have access to banks. As per a study done by the Nepal Rastra Bank in 2019, about 61 percent of Nepalese have access to a bank account. Consequently, it is difficult to increase financial literacy and expand financial access in order to benefit equally from this sector.

9. Meeting the Sustainable Development Goals by 2030
In order to achieve the sustainable development goals, Nepal has committed itself to make significant improvements to health and education facilities as well as rapid income growth by 2030. Achieving such goals requires a lot of resources and commitment. It is a great challenge, given the present state of resource mobilization, to manage resources to meet the objectives of the country.

10. Revitalizing the industrial sector
Over the years, industrial output has lost share of gross value added. Its contribution to GDP in 2001 was around 9 percent, but it declined gradually over time, reaching 5.6 percent in 2019. Increasing our product's competitive capacity is challenging for reviving the industrial sector.

11. Expansion on trade deficit
A rapid increase in imports has led to an alarming expansion of the trade deficit in recent years. Currently, it is about Rs. 13.2 billion per year. Trade deficit GDP ratio exceeded 38 percent. It is challenging to reduce such a deficit by promoting our exports and substituting imports.

These are the some of the notable challenges in context of Nepal. There are other many challenges which you can describe on your own.

NRB IT Policy and Guideliness 2012(2067) | Loksewa IT Engineers 2079

Q. Write down the major areas covered by NRB IT guidelines 2012(NRB IT Policy 2067). (10)

answer:
NRB has formulated the IT policy for its own implementation and for all licensed banks and financial institutions. The Nepal Rastra Bank formulates its own information technology guidelines (NRB IT Guidelines). NRB's IT policy has the following objectives:
  • Ensure that IT infrastructure is stable, secure, and standardized.
  • Ensure the confidentiality, integrity, and availability of information.
  • To increase awareness of the IT system in order to increase efficiency, effectiveness, and economy.
  • Minimizing IT-related risks.
  • Ensure that the financial sector's information system operates efficiently.


The major areas covered by NRB IT guidelines 2012(2068 B.S) are:

1) IT Governance
  • The use of IT resources by a bank should be efficient, effective, and economical in order to satisfy the bank's business demands.
  • It is important for risk management policies to consider IT-related risks.
  • Before adopting a new technology or system, a bank needs to perform a detailed risk analysis.
  • Banks should monitor and measure the performance of their IT functions and report to appropriate management levels.
2) Information Security
  • A bank should harden their system, which means that their OS, firewall, and system software should be configured with the highest level of security.
  • The bank should maintain a comprehensive mechanism to protect itself against computer viruses.
  • Secure cryptographic techniques and end-to-end encryption should be used by banks to protect customer PINs, user passwords and other sensitive information.
  • All ATMs should be equipped with CCTV systems and appropriate lighting.
  • To safeguard their web applications and databases, banks should implement adequate security measures.
3) Information Security Education
  • A bank should implement an information security awareness program and periodically conduct it among its employees, vendors, customers, and other concerned parties.
  • Ensure that customers are adequately educated so that they are able to conduct banking operations securely.
  • It is important for banks to use appropriate customer authentication systems when accessing their systems.
4) Information Disclosure and Grievance Handling
  • Banks should provide clear information about the dispute resolution process in case of security breaches or fraudulent account access.
  • The website of a bank should include information about their security and privacy policies as well as fees and commissions.
  • If a customer complains, the bank shall handle the grievance.
  • Banks should inform their customers clearly about the risks and benefits of e-banking, online banking, and mobile banking.
5) Outsourcing Management
  • Banks should ensure that their service providers can provide the performance, reliability, capacity, and security that they require.
  • Before entering into an outsourcing agreement, a bank should evaluate the economic, social, and political risks.
  • Banks should ensure that outsourcing agreements do not adversely affect the quality and availability of banking services.
6) IT Operations
  • A safe environment for IT operation should be ensured by the board and higher management.
  • In order to deliver timely, reliable, secure information, banks should have adequate hardware, software, and operating capabilities.
  • IT risk assessments should be conducted periodically by banks.
7)  IT Disaster Recovery and Business Continuity Planning 
  • Business continuity planning (BCP) frameworks have become more critical with the introduction of the electronic delivery channel and 24/7 service availability.
  • BCPs should consider all potential manmade and natural disasters, security threats, regularity requirements, and outsourcing dependencies.
  • In order to maintain a 'fail-safe system' with minimum downtime, a bank needs to maintain an economic, efficient, and effective disaster recovery system
8) Information System Acquisition, Development, and Implementation
  • Inadequate testing and bad design contribute to many software failures.
  • Security requirements should be met by applications that handle customer financial information.
  • Prior to implementing the system, all vulnerabilities, loopholes, and defects should be fixed.
9) Information System Audit
  • A bank should conduct periodic IS audits to ensure that the controls framework and security procedures are effective.
  • An external IS auditor should be appointed if the bank does not have enough staff.
10) Fraud Management
  • In order to submit a report to Nepal Rastra Bank, a bank should identify and document all electronic attacks.
  • A customer should be informed about fraud and how to identify, avoid, and protect against it.
 Nepal Rastra Bank NRB IT Policy
The various NRB IT Policy are described below:
  • Achieve efficient, effective and economic IT operation by implementing appropriate IT systems, such as Financial Information Systems (FIS), Management Information Systems (MIS), Enterprise Resource Planning Systems (ERPs), Real-time Gross Settlement Systems (RTGS), Scripless Security Settlement Systems (SSSS), etc.
  • Ensure that physical IT infrastructure is well-structured, secure, and properly documented.
  • Ensure information security at multiple levels.
  • Implement an audit of IT systems.
  • Maintain a data backup and recovery policy by developing, implementing and maintaining it.
  • Maintain a Disaster Recovery Planning (DRP) System that is efficient, effective, and economically feasible so that the system is a "fail safe system" with little downtime. In addition, develop and maintain a Business Continuity Plan (BCP).
  • Implement IT outsourcing and third-party involvement mechanisms.
  • Ensure that all offices have a uniform and legitimate IT infrastructure.
  • Provide IT directives to banks and financial institutions that are licensed.
  • Standardize IT procurement and monitor it as technology changes.
  • Implement a "NRB IT Code of Conduct" to ensure proper use of IT resources at the NRB.
  • Enhance the capacity building of employees in information technology
These guidelines and policies are intended to regulate and guide IT-related activities in commercial banks with the aim of strengthening banks to deal with emerging cyber frauds, manage information technology prudently and reduce risks associated with IT implementation.

Thursday, September 1, 2022

Artificial Intelligence and its Component | Loksewa 078 question paper

 Q. What is AI? Describe in detail the components of AI. (10 marks)

answer:

John McCarthy, the father of Artificial Intelligence, defined it as "the science and engineering of creating intelligent machines, particularly intelligent computer programs".

An artificial intelligence system is one that makes a computer, a computer-controlled robot, or software think intelligently, like an intelligent human.

The goal of Artificial Intelligence is to create expert system and to implement human intelligence into machines.  Artificial Intelligence  is a technology based on a number of disciplines like computer science, biology, psychology, linguistics, mathematics, engineering and so on. 

The basic components of Artificial Intelligence can be mentioned below:

  1. Learning
  2. Reasoning
  3. Problem-solving
  4. Perception
  5. Language Understanding
components

Learning

AI relies heavily on learning in a number of different ways. Trial and error is the simplest form of learning. By doing this, the program remembers the section that has given the desired output and discards all other trial actions. An example is the case of mate-in-one chess problems, where moves are tested at random until one is found that results in mate. Whenever the computer is confronted with the same problem, the program recalls the successful move and produces the same result immediately.
Learning is of three types. They are:
  • Supervised Learning- computer algorithms are trained using input data that are labeled for particular results
  • Unsupervised Learning- A type of algorithm that learns patterns from untagged data.
  • Semi-supervised Learning- large amounts of unlabeled data are mixed with a small amount of labeled data during training.
  • Reinforcement Learning- algorithms are trained to explore their environments independently.

Reasoning

In other words, reasoning involves generating judgments based on the information provided. A strict rule of validity is applied to perform the reasoning. The two types of reasoning are deductive and inductive. Deductive reasoning involves the truth of the premises guaranteeing the truth of the conclusion, whereas, inductive reasoning involves the truth of the premises supporting the conclusion but it cannot be fully dependent on them. Programming logic generally relies on deductive inferences. Inferences that are relevant to the given problem or situation are drawn by reasoning.

Problem-Solving

Problem-solving is a third major component of the development of artificial intelligence programs and systems. In the development of AI, problem-solving is perhaps the most crucial element since artificial intelligence is all about making computers and systems solve problems like humans do. A more advanced application of AI can include developing efficient algorithms, analyzing root causes in order to identify a desirable solution, and developing heuristics.

Perception

Different sense-organs, either real or artificial, are necessary for intelligent agents to work within the environment and to detect objects in it. An agent uses sense organs such as cameras and temperature sensors to scan its environment. This is called perception. Upon capturing a scene, perceiver analyses the different objects in it, extracting their features and relationships.

Language Understanding

Using Natural Language Processing, machines or robots understand and process human speech and infer knowledge from it. Additionally, it involves the active participation of a machine in the form of dialog i.e. an NLP system focuses on a machine's or robot's output of text or verbal information. Speech and written text can be input and output of an NLP system.

Wednesday, August 31, 2022

Process Scheduling Algorithms | Loksewa 2078 Question paper

 Q. Describe various process scheduling algorithms.  10 marks.

answer:
There are various algorithms which are used by the Operating System to schedule the processes on the processor.

The main reasons for scheduling algorithm are:
  1. To Maximize CPU utilization
  2. For Fair allocation of CPU
  3. To Maximize throughput
  4. To Minimize  turnaround time
  5. To Minimize waiting time
  6. To Minimize response time
Process scheduling algorithms consist of six types. Algorithms can either be non-preemptive or preemptive. Typically, non-preemptive algorithms prevent processes from being preempted until they have completed their allotted time, while preemptive scheduling is based on priority, in which a scheduler may preempt a low priority running process at any time when a high priority process becomes ready.

1.First Come First Service(FCFS)
This algorithm is the simplest algorithm. Those processes that arrive first will get the CPU.The faster the arrival time, the sooner the CPU will be available. It is the non-preemptive type of scheduling and is implemented by using FIFO queue.

Advantages:

  • Easy to implement
  • First come, first serve method

  • Disadvantages:
    •  It suffers from Convoy effect.
    •  average waiting time is much higher than the other algorithms
    • not much efficient
    2. Shortest Job First
       First, the process with the shortest burst time at a particular instant of time will be executed. In other words, it is a non-preemptive approach i.e. as soon as a process begins executing, it will be fully completed, and then some other process will take its place.

    Advantages
    • Best approach to minimize waiting time 
    • used for long term scheduling
    Disadvantages:
    • It has starvation
    • Many times it becomes complicated to predict the length of the upcoming CPU request
    3. Shortest Remaining Time
    This is the preemptive approach of the Shortest Job First algorithm. Here, at every instant of time, the CPU will check for some shortest job.

    Advantages:
    • Short processes will be executed first.
    Disadvantages:
    • It may result in starvation if short processes keep on coming.
    4. Priority Based Scheduling
    In this algorithm, the priority will be assigned to each of the processes. The higher the priority, the sooner will the process get the CPU. If the priority of the two processes is same then they will be scheduled according to their arrival time.

    Advantages:
    • The average waiting time is less than FCFS
    • Less complex
    Disadvantages:
    • It has Starvation Problem. This is the problem in which a process has to wait for a longer amount of time to get scheduled into the CPU. This condition is called the starvation problem.
    5. Round Robin
    The  algorithm where each process is cyclically assigned a fixed time slot. It is the preemptive version of First come First Serve CPU Scheduling algorithm. Round Robin CPU Algorithm generally focuses on Time Sharing technique.

    Advantages:
    • No starvation will be there in round-robin because every process will get chance for its execution.
    • Used in time-sharing systems.
    Disadvantages:
    • Need to  perform a lot of context switching here, which will keep the CPU idle

    6.Multilevel Queue Scheduling
    During multilevel queue scheduling, we divide a process into batches or queues, and give each queue a priority. It is thus necessary to maintain multiple queues for processes that share common characteristics, each queue having its own priority, and using some scheduling algorithm.

    Advantages:
    • It has a low scheduling overhead.
    Disadvantages:
    • Starvation problem
    • It is inflexible in nature
    Note:  For further strengthening the answers we can still add some small examples. This can be refer in internet. Take one example and utilize in all the scheduling algorithms, it will save the time and makes the answer precise

    Tuesday, August 30, 2022

    Deadlock in Operating System | Loksewa 2078

     Q. What do you mean by Deadlock? What are the necessary conditions for the deadlock to occur? (2+3+5) marks

    answer:

    Deadlock is a situation where two or more processes are waiting for each other. When a process requests resources and those resources are not available, the process enters a waiting state. Sometimes, a waiting process is permanently unable to change state because the resources it has requested are held by other waiting processes. This situation is called deadlock. Lets take a real time example, To obtain a voter card, you must provide proof of address, but to obtain proof of address, you must already have a voter card. So it depends on one another. Until any one step is not resolved this deadlock situation exists even in real life.

    @missionofficer

    Necessary Conditions of Deadlock

    There are four different conditions that result in Deadlock. These four conditions are also known as Coffman conditions and these conditions are not mutually exclusive.  They are:

    1. Mutual

    When this scenario occurs, only one process at a time can hold a resource, during which it cannot be shared with other applications. In addition, this is a critical policy applied by operating systems to prevent conflicts from occurring when two or more processes are using the resource simultaneously, which may result in incomplete data being saved.

    Nevertheless, this is a necessary condition for deadlocks to occur. The programs would not have to wait for each other if they could share the same resources.

    2. Hold and Wait

    A process must be handled at least one resource and waiting to require additional resources that are currently being held by the other processes.

    3. No Preemption

    It is not possible to forcefully prevent a resource from being included in a process by another process. As an example, if a process P1 is using a resource R, another process P2 cannot forcefully take it. Hence, various scheduling algorithms do not seem to be needed if that's the case. P2 can request and wait for the process P1 to release the resource R, which would be useful for the process P1.

    4, Circular  Wait

    Circular wait involves processes waiting for each other in a circle. Consequently, no one releases their own resource; everyone waits for each other to release it. Here, everyone is waiting to receive the resource. This is called a circular wait. To reach a deadlock, all four conditions need to be met. If a deadlock occurs, either the operating system needs to perform some work or the system needs to be rebooted.

    As soon as the circular wait is broken, the issue will be resolved since each program can then get the resources they need.

    Therefore, All four conditions are necessary for deadlock to occur. If any single one is prevented or resolved, the deadlock is resolved.

    Monday, August 29, 2022

    Nepal Bank Limited Level 6 IT Question Paper | 2079/05/12

    The following are the questions asked for the exam of IT assistant level 6 on date 2079/05/12.

    Topic: Banking, Management and General IT                                              

    Full Marks: 100

                                                                            Section "A"

    1.State different types of communication in a bank on problem solving and decision making process. (10)

    2. Briefly describe the need and importance of management information system (MIS) in bank and Financial Institutions. (5+5=10)

    3. Justify the role of "Group Dynamics and Team Work" in delivering a quality service of a bank you are working out when to work. Don't you think informal group dynamics may hinder the expected level of service of the bank? Discuss  logically with suitable examples. (10)

    4. What do you mean by Banking Technology? Briefly explain the role of Technology in competitive banking business. How can Nepal bank limited upgrade its technical efficiency compared to private sector banks? (2+8=10=20)


                                                                               Section "B"

    5. Write down the major areas covered by NRB IT guidelines 2012(NRB IT Policy 2067). (10)

    6. What are the guiding principles for categorizing bank's ICT systems into critical and non critical systems? Prescribe the procedure to be followed during the troubleshooting and maintenance of banks critical ICT system. (4+6=10)

    7.  Explain decision support system with suitable example. How can decision support system help for rational decision making in banking sector. (5+5=10)

    8.  Increasing use of Information Technology (IT) in banks and development of technologically complex products require a systematic monitoring and management of technology risk in banks. Inadequate IT risk management functions may also result in huge financial losses. Nepal Rastra Bank (NRB) has also issued IT guidelines 2012 for the banks as a guiding document for managing IT  functions and IT risk.              (5+5+10=20)                                                                  

    In this contest,

    i) Identify major IT risk in banks

    ii) How are provisions of IT guidelines 2012 issued by NRB useful for banks in IT risk management 

    ii) Prepare a brief IT risk management Framework for a bank

    Sunday, August 28, 2022

    Computer Applications And Memory Hierarchy | NBL 2078 question paper

     Q. What are the different applications of computer? Explain with examples. Describe about the Memory Hierarchy of computer system. (6+4)marks.

    answer:


    The term application refers to software, which is a set of instructions or code written in a program to perform an action or task on a computer. Applications are designed and developed to run on the system software, which is the operating system. Different types of computer applications:

    1) Application suites

    Packed with many programs that have user  interfaces, functions, and the ability to interact with the user; these include Microsoft Office, Adobe Creativity suite, security suites, game applicationsand many others.

    2) Enterprise Software

    Labels the requirements of an organization and also manages the flow of data in a huge environment. It includes automated billing systemsemail marketing, business intelligencecontent management, etc.

    3) Enterprise Infrastructure Software

    Provides the functionality needed to support enterprise software systems.Mainlyusedbycompanies,societies,andorganizationsthatrequire high investment in network security, surveillance systems, transportation, sewage, telecommunications, electricitywateretc. For examplefirmwareoperating systems, cryptographyetc.

    4) Educational Software

    Contains content on variety of subjects that can be used bystudentsandindividuals. There are websites that offer educational software on variety of topicsand their vast databases make them easy-to-use applicationsExamples include: Google Earth, NASA, Encyclopedia Encarta Timelineetc.

    5) Multimedia Software

    Used to develop media in everyday life. There are various audio, videoimage editing tools, and print media that can be used to maximize business growth. For  example Picasa, Window Movie maker, Adobe  Photoshopetc.


    6) Content Access Software

    Used to access content within a website to publish digital content and entertainment. Examples Media player, Web browser, etc.

    7) Informationsoftware

    These software are used to address the needs of individuals by creating and managing information for individual projects within department. Examples: word processors, spreadsheets, email and blog clientsetc.

    Memory Hierarchy

    In computer architecture, the memory hierarchy separates computer storage into a hierarchy based on response time. It ranges from the slowest but high capacity auxiliary memory to the fastest but low capacity cache memory.

    Typically, a memory unit can be classified into two categories:

    1. The memory unit that establishes direct communication with the CPU is called Main Memory. The main memory is often referred to as RAM (Random Access Memory).
    2. The memory units that provide backup storage are called Auxiliary Memory. For instance, magnetic disks and magnetic tapes are the most commonly used auxiliary memories.

    auxiliary memory

    Secondary memory is known to be the cheapest, largest, and slowest memory available in a computer system. Auxiliary storage provides storage space for programs and data that are stored for long-term storage or that are not used immediately. Examples: magnetic tape, magnetic disk, hard disk, zip disk, and floppy disk.

    main memory

    A computer system's main memory is often referred to as random access memory (RAM). This memory block communicates directly with the CPU and auxiliary memory devices through the I/O processor. Programs not currently needed in main memory are moved to secondary memory to make room for programs and data in current use. The main memory is divided into two main blocks:

    • Random Access Memory (RAM) integrated circuit chip.
    • Integrated read-only memory (ROM) circuits.

    The goals of memory hierarchy are-

    • To obtain the highest possible average access speed
    • To minimize the total cost of the entire memory system

    Characteristics:

    Capacity - As we go down the hierarchy, capacity increases.
    Access time - As we go down the hierarchy, the access time increases.
    Performance - Previously, computer system design was without memory hierarchy, and the speed gap between main memory and processor registers widens due to the huge difference in access time, this which leads to a decrease in system performance. The expansion was therefore mandatory. The extension was designed due to the increased system performance in the memory hierarchy model.
     Cost per bit As we move up the hierarchy, the cost per bit increases.

    Featured post

    Major Challenges for economic development of Nepal | Loksewa old Question Paper 2078

    Q. Wha t do you mean by Economic Growth and Economic Development?  What are the main challenges of economic development of Nepal? Give your ...

    Popular Posts