Solar technology Vehicle. (Image:Aptera)

Aptera, a developer of a futuristic-looking, solar-powered passenger car, has pulled the wraps off its first production vehicle, which it says will be rolling off the assembly line this year.

Chat GPT Plus Sbscription Introduced

The ChatGPT Plus Subscription will cost $20 for monthly basis and currently it is accessible only in the US.

AI startup will generate celebrity-like voice

ElevenLabs tweeted that it has witnessed a rise in the number of voice cloning since the tool was launched. The startup also asked Twitter users to provide feedback on how voice cloning can be stopped.

Firms adopt ChatGPT to develop solutions

It’s not that companies are new to using AI-powered chatbots to answer more than just basic customer queries.

Image editing features in Microsoft Edge

The feature comes with tools to make necessary changes like image cropping, adjusting brightness, exposure, saturation, Tint, Shadow and more.

Thursday, September 28, 2023

QBASIC (Theory)

 1.Modular programming

Modular programming is a technique used to divide program into many small, manageable, logical and functional modules or blocks.

2. Qbasic is called Modular Programming

QBasic is called modular programming because it divides program into many small, manageable, logical and functional modules or blocks.

3. Advantages of modular programming

i) Different programmers can design in different program modules independently.

ii) It is easy to design code and test the program modules independently.

 iii) It is possible to use a single module in different places which reduces program codes.

4. Main module

The top level controlling section or the entry point in modular programming is called main module.

5. Sub module

Sub module is a block of statement that solves a particular problem. it is a program which is written under the main module.

6. Procedure

Procedure is a block of statements that solves a particular program which performs one or more specific tasks and can be accessed from remote location.

7. SUB procedure

A SUB procedure is a small, logical and manageable functional part of program which prefers specific task and does not return any value.

8. FUNCTION procedure

A FUNCTION procedure is a small, logical and manageable functional part of a program which performs specific task and returns single value to the main program or calling module.

9. String function :String function is used with string it returns string value.

10. Numeric function :Numeric function is used with number it returns numeric value.

11. Library functions

 Library functions are built-in or readymade functions provided by QBASIC. E.g. MID$( ), LEN( ), SQR( ) etc.

12. User defined function

Function which is defined by the user according to the need is called user defined function.

13. Parameters

Parameters are variables that will receive data (arguments value) sent to the procedures (SUB program and FUNCTION). Formal parameters are called parameter.

14. Arguments

Arguments are the values that are sent to the procedures (SUB program and FUNCTION). Actual or real parameters are called arguments.

15. CALL statement

The function of CALL statement is to transfer the control to another procedure.

16. DECLARE statement

The function of DECLARE statement is to declare procedure such as FUNCTION or SUB in modular programming.

17. DIM SHARED statement

 i) It makes variable accessible to all modules.

 ii) It appears in main module/ program.

18. SHARED

 It is used in the sub program to share the values of certain variables between main module and sub program

 19. COMMON SHARED

It is used in the main program to share variable list between main module and all sub programs. This statement is used to declared variable global.

20. Local Variable

Variables which are declared inside the procedure are called local variables which are not visible to other modules or functions and can access only in its own module.

21. Global Variable

Variables which are declared outside the procedure are called global variables which are visible to other modules or functions. Its values can be accessed from any procedure or module.

22. Static variable

The variable which is declared by using the “STATIC” keyword is called static variable.

Handling of data file Questions and Answers

1. Data file

The file which contains data given by the user to the program and information provided by the user to the computer is called data file.

The different types of data file are:

a) Sequential Access files

 A data file that stores a sequential data file containing name, address of some people in the same order or in sequential order which takes long time to access from large volume of data.

b) Random access files

A data file that stores a sequential  data file randomly using large array or indexing method and can be retrieved or accessed and rewritten quickly from anywhere.

2. Program File

The file which contains a set of instructions that are needed for data processing is called program file.

3. Mode of data file

Mode of data file means opening a sequential file for one of the three modes of operation like output mode, input mode and append mode.

4. Modes of operation for opening a sequential file

a) Output Mode:

 It is used to create a new data file and write data in it. If the file already exists its current contents will be destroyed.

b) Input Mode: It is used to retrieve records or contents of existing data file.

c) Append Mode: It is used to add more records in existing file. If the specified file does not exist APPEND mode creates it.

5. File number

The number assigned to a file in order to identify it during processing is called file number.

Write down the functions of:

6. OPEN statement:

It opens a sequential file for one of the three possible operations (reading, writing, appending).

7. WRITE statement

It sends one or more data items to the specified file. It inserts commas between the data items. It encloses strings in double quotation marks.

8. PRINT#:

It adds spaces between data items while storing data. It does not enclose strings in double quotation marks.

9. CLOSE statement :It closes one or all open files.

10. INPUT# statement :It reads data from the sequential data file.

11. EOF( ) function :It is used to test the end of records with in a file.

12. LINE INPUT statement:

 It reads the entire line or maximum 255 characters form the keyboard or the sequential file.

13. INPUT$ function:

It reads the specified number of characters form the data file.

14. NAME statement

The NAME statement renames a file on a diskette. Only file name changes, data and program line remains intact.

15. KILL statement

The KILL statement deletes the file or files from the specified drive and directory.

16. MKDIR statement :It creates a sub directory which is used to manage files.

17. CHDIR statement:  It allows QBASIC to change from one directory to another.

18. RMDIR statement

It is used to remove or delete only the subdirectories from a disk. It can remove only empty subdirectories.

19. FILES statement:

The FILES statement displays the files of the current sub directory or specified sub directory.

20. SHELL:

The SHELL statement allows a program to run external programs or command line statements in Windows, MAC OS and Linux.

21. INT

It rounds and returns the largest integer less than or equal to a numeric expression.

22. PRINT

 Display result on screen.

23. MID$ ( )

It is a string function that returns the specified number of characters from the specified location of string.

24. LEN ( )

Returns the number of characters in a string or the number of bytes required to store a variable.

25. SQR ( )

Returns the square root of a numeric expression.

Wednesday, September 27, 2023

Computer Security

 1. What is computer Security / Cyber Security? How can you secure your computer?

Ans: Computer security, also known as cyber security, refers to the practice of protecting computer systems, networks, and data from various forms of threats, attacks, and unauthorized access.

We can secure our computer using following way:

a) Use the best antivirus software, which not only provides protection to your PC but also internet protection and guards against cyber threats.

b) Do not download untrusted email attachments as these may carry harmful malware.

c) Never download software from unreliable sites as they may come with a virus that may infect your system as soon as you install the software.

2. What do you mean by information Security (infosec)? Write key principle of infosec.

The processes and methodologies which are designed and implemented to protect print, electronic, or any other form of confidential, private and sensitive information or data from unauthorized access, use, misuse, disclosure, destruction, modification, or disruption.

Key principles of Information Security

a) Confidentiality:- Only authorized users can access the data resources and information.

b) Integrity:- Only authorized users should be able to modify the data when needed.

c) Availability:- Data should be available to users when needed.

3. What is Security Threats? Explain possible security threats.

A risk which can potentially harm computer systems and organization which could be physical such as someone stealing a computer that contains vital data and non-physical such as a virus attack phishing, etc.

Possible Security Threats

Internal: The threats include fire, unstable power supply, humidity in the rooms, housing of the hardware, etc.

External: These threats include Lightning, floods, earthquakes, etc.

Human: These threats include theft, vandalism of the infrastructure and/or hardware, disruption, accidental or intentional errors.

-Loss or corruption of system data.

-Disrupt business operations that rely on computer systems.

-Loss of sensitive information.

-Unauthorized access to computer systems resources such as data.

Phishing: Phishing is the fake attempt to obtain sensitive information such as usernames, passwords and credit card

Botnet: A botnet is a logical collection of Internet-connected devices such as computers, smart phones or internet of things (IoT) devices whose security have been breached and control is given away to a third party.

Rootkit: A rootkit is a malicious code (kit) that hides in system area provides continued Administrator's (root) privileged access to a computer

Keylogger: Keylogger is hardware or software for recording the keys pressed on a keyboard secretly so that person using the keyboard does not know that their actions are being monitored.

Hacker: A computer hacker is any skilled computer expert who uses his/her technical knowledge to overcome a problem.

4. What is malicious code (Malware)?

Malicious code, also known as malware, refers to any software or code that is designed to harm, or gain unauthorized access to computer systems, networks, or data that includes computer viruses, worms, Trojan horses and spyware.

Types of malware

a) Virus: A virus is a man made destructive program which disturbs the normal functioning of the computer system. It is the most common type of malware which can execute itself and spread by infecting other programs or files.

b) Worm: Worms are self-replicating programs that can spread across networks without human intervention.

c) Trojan horse: Trojans appear as legitimate software but contain hidden malicious functionality. They can perform actions like stealing data, providing unauthorized access, or installing other malware

d) Spyware: Spyware monitors a user's activities without their knowledge, often collecting sensitive information such as passwords, credit card details, and browsing habits..

e) Adware: Adware displays unwanted advertisements to users, often generating revenue for attackers through pay-per-click schemes. While not always explicitly harmful, it can be disruptive and compromise user privacy.

f) Ransomware: Ransomware encrypts a victim's data and demands a ransom in exchange for the decryption key. It can lead to data loss and operational disruption.

5. How can you protect a system from infection?

a) Never download files from unknown or suspicious sources.

b) Install antivirus software that features automatic updates and has the capability to detect all types of infections.

c) Delete spam and junk emails without forwarding.

d) Always scan a pen drive from an unknown source for viruses before using it.

e) Regularly back up your documents, photos, and important email messages to the cloud or to an external hard drive. In the event of an infection, your information will not be lost.

6. What are security mechanisms?

A mechanism that is designed to detect, prevent, or recover from a security attack. It includes

Authentication Systems,  Firewalls, Cryptography, Antivirus Software, Backup System

Authentication.

7. What is authentication? Write its types.

Authentication is the process of verifying the identity of a person or device.

Authentication system makes sure that right people enters the system and access the right information.

Types of Authentication are Password,  Biometric

8. What is Password? What are the criteria for strong password?

A set of secret characters or words used to authenticate access to a digital system.

Password ensures that unauthorized users do not access the computer. It secures the data by protecting the data from unauthorized access as it is very difficult to guess and determine and changed regularly.

Any four criteria for strong password are:

a) Do not keep a password which can be easily guessed such as date of birth, nickname, etc.

b) Do not keep word as password that is currently popular.

c) Keep a password with mixture of alphabet, symbols and numbers which is difficult to guess.

d) Keep changing your password regularly.

9. What is Biometric?

Biometrics are physical or behavioral human characteristics that can be used to digitally identify a person to grant access to systems, devices or data scanning from device database.

Examples of these biometric identifiers are fingerprints, facial patterns and voice.

10. What is Firewall?

A firewall is a network security device or software application designed to monitor, filter, and control incoming and outgoing network traffic based on predetermined security rules.

Firewall blocks unwanted traffic as well as malicious software from infecting your computer.

(Hardware firewalls are found on most network routers and can be configured through the router setup screen.)

11. What is Cryptography? Write its features.

A technique of securing information and communications through use of codes so that only those person for whom the information is intended can understand it and process it.

Thus preventing unauthorized access to information.

Unreadable form of the text which is encrypted is called cipher text.

Features of Cryptography

a) Confidentiality: Information can only be accessed by the person for whom it is intended.

b) Integrity: Information cannot be modified in storage or transition between sender and intended receiver without any addition to information being detected.

c) Non-repudiation: The creator/sender of information cannot deny his or her intention to send information at later stage.

d) Authentication: The identities of sender and receiver are confirmed. As well as destination/origin of information is confirmed.

12. What is encryption? Why is it used?

Encryption is a process which transforms the original information into an unrecognizable form. That's why a hacker is not able to read the data as senders use an encryption algorithm.

It is used for the following purpose:

-Data is encrypted to make it safe from stealing.

-to keep their trade secret from their competitors.

13. What do you mean by decryption?

Decryption is a process of converting encoded/encrypted data in a form that is readable and understood by a human or a computer. 

14. How is encryption is differ from decryption? Write.

a) Encryption is a process of converting normal data into an unreadable form whereas Decryption is a method of converting the unreadable/coded data into its original form.

b) Encryption is done by the person who is sending the data to the destination, but the decryption is done at the person who is receiving the data.

c) The same algorithm with the same key is used for both the encryption-decryption processes.

15. What is antivirus software? Write with example and its uses.

Antivirus software is software designed to detect and remove virus from computer system and ensures virus free environment. E.g. Kaspersky, NAV, MSAV, McAfee, NOD 32 etc.

-Main use of antivirus is to protect computer from viruses and remove viruses that are detected and also protects data and programs from being corrupted.

16. What is backup system? Write its purpose.

It is the system of copying data and programs into another location or creating a duplicate copy of it in a secured place.

-A copy of a file which is used in the event of the original file being corrupted.

-Backup is vital to computer security system in order to save the data from being lost or damaged due to accidental or intentional harm.

17. What do you mean by hardware Security? Write its measures and explain any two.

The security given to the machine and peripheral hardware from theft and from electronic intrusion (interruption) and damage.

Different hardware security measures are:

a) Regular Maintenance     b) Insurance    c) Dust free environment  d) Protection from Fire

e) Protection from Thief     f) Air condition system   g) Power Protection device (Volt guard, Spike guard, UPS)

18. What do you mean by power Protection Device? Write with examples.

An electric device that controls electric voltage and provides enough backup to the computer system when there is power failure. Computer needs 220 volts to 240 volts constantly.

Some common power protection devices are:

a) UPS      b) Volt Guard   c) CVT  d) Stabilizer   e) Spike Guard  f) Surge Suppressor

19. Why is Power Protection Device needed?

To protect computer system from damage, expensive data loss and unnecessary down time (is out of action or unavailable for use).

20. What do you mean by volt guard?

A power protection device that provides constant output voltage to the computer system in case of high input voltage coming from the source.

21. What is UPS ? Write its importance.

UPS is a battery supported power protection device which controls the electric voltage and supplies clean and continuous power to the computer system even during power failures.

The importance of UPS in computer security system is that it controls fluctuation of electric voltage and provides enough backup electric power to the computer system when there is power failure.

22. What is Spike Guard

A device designed to protect electrical devices from voltage spikes.

Automatically maintains a constant voltage level.

23. What is software security? Write its different measures.

The protection of computer data, information and software from being damaged or lost knowingly or unknowingly is called software security.

      Some software security measures are: a. Password  b. Backup    c. Antivirus,    

d. Fragmentation,     e. scandisk, etc.

24. Define defragmentation and fragmentation.

The process of rewriting part of file to a contiguous sector on a disk. It increase disk access speed or performance.

The process of scattering part of same disk over random location.

 

***

Contemporary Technology

 1.  What is contemporary technology?

Contemporary Technology refers to the latest innovation and technology that has become a part of our daily life. These technologies have great influence over the life of humans. Services like E-mail, E-Commerce, chat, Video Conferencing, and Live streaming are some of the common contemporary technology that we encounter on daily basis.

2. What is Cloud Computing? Write with examples.

Cloud Computing is the use of hardware and software to deliver a service over a network (typically the Internet). With cloud computing, users can access files and use applications from any device that can access the Internet.   Examples of Cloud Computing

a)     Drop box, Face book, Gmail        b)     Google Drive, Apple iCloud   c)  Google Photos, Online Photoshop

3. What are the uses of Cloud Computing?

      a)     Store, backup and recovers data b) Host websites and blogs  c) Make communication and send emails

4.  Write advantages and disadvantages of cloud computing.

Advantages:

- Cloud allows us to quickly and easily access store information anywhere, anytime in the whole world, using an internet connection.

- Once the data is stored in the cloud, it is easier to get back-up and restore that data using the cloud.

- Cloud computing allows us to easily access all cloud data via mobile.

- Data security is one of the biggest advantages of cloud computing. Data is securely stored and handled.

 Disadvantages

 - If you do not have good internet connectivity, you cannot access these data.

- While sending the data on the cloud, there may be a chance that your organization's information is hacked by Hackers.

-  The cloud providers may sometimes face technical outages that can happen due to various reasons, such as loss of power, low Internet connectivity, etc.

- Cloud computing companies fail to provide proper support to the customers.

5. What are the types of cloud computing?

Clouds can be classified as public, private, and hybrid.

Public cloud is made available to the general public or a large industry group.

Private cloud computing environment resides within the boundaries of an organization and is used exclusively for the organizational benefits

Hybrid cloud is the combination of both public and private cloud. It might run non-core applications in a public cloud, while maintaining core applications and data in a private cloud.

6. What are service model provided by cloud computing?

1. IaaS (Infrastructure as a Service): In this service, computing infrastructural components like server hardware, storage, bandwidth, and other fundamental computing resources are provided through the cloud.

2 Saas (Software as a Service): This service includes complete software on the can access software hosted on the cloud without installing it on the user's own computer.

   3. PaaS (Platform as a Service): It allows the user to rent virtualized servers and associated services used to run existing applications, or to design, develop, test, deploy and host applications.

7.  What is Artificial intelligence? Write its applications.

Artificial intelligence (AI) is an area of computer science that emphasizes the creation of intelligent machines that work and reacts like humans.  John McCarthy coined the term Artificial Intelligence in the year 1955.

Applications of AI

a)     Gaming − AI plays crucial role in strategic games such as chess, poker, tic-tac-toe, etc., where machine can think of large number of possible positions.

b)     Natural Language Processing − It is possible to interact with the computer that understands natural language spoken by humans.   c.  Expert Systems    d. Vision Systems  e)     Intelligent Robots 

Examples of AI

a)     Siri / Alexa- both use AI to help you complete tasks or answer questions on your mobile devices.

b)     Netflix / Youtube  - uses advanced predictive technology to suggest shows based on your viewing preferences or rating.

c)     Facebook Feed - filter content that is most likely to be of interest to the particular Facebook user and predict what they will want to see.

 8. What is Virtual Reality? Write its uses.

An artificial environment created with computer hardware and software and presented to the user in such a way that it appears and feels like a real environment.

To "enter" a virtual reality, a user wears special gloves, earphones, and goggles, all of which receive their input from the computer system.

Application areas of VR

a)     It can be used in medical studies to enable students to know the human body structure.

b)     It can be used in scientific research laboratories so that scientist can easily research on a specific topic.

c)     It can be used in entertainment like in games and movies to make the gaming experience more real and to allow individual to experience adventures under extreme conditions.

d)     It can be used in driving schools as it gives a real look of roads and traffic.

9. What is E-Governance? Describe its model.

It is the use of ICT and its application by the government for the provision of information and public services to the people. The basic purpose of e-governance is to simplify processes for all, i.e. government, citizens, businesses, etc. at National, State and local levels.

Models of E-Governance

Government-to-Citizen(G2C)

G2C-is transaction between the government to citizens. It helps the ordinary people to reduce the time and cost to conduct a transaction and access to the services anytime from anywhere which includes online registration of birth/ death/marriage certificates, filling of income taxes, electricity bills, license renewals etc.

 Government-to-business (G2B)

G2B it is the transaction between government to business. It enhances the efficiency and quality of communication and transparency of government projects which includes online application forms, renewing licenses, registration etc.

 Government-to-Government (G2G)

 G2G it is the transaction between government to government and share the same database using online communication. It provides safe and secure inter-relationship between domestic or foreign government.

 Government-to-Employee (G2E)

G2E it is the transaction between government to employee for providing  online facilities to the employees like applying for leave, reviewing salary payment record and checking the balance of holiday.

it is also the relationship between employees, government institutions, and their management.

 10. What are the advantages and disadvantages of E-government?

Advantages of E-Governance

a) Electronic technologies make communication better, and faster. It will take very less time for any policy, or scheme to reach to the people.

b)  The use of e-governance helps make all functions of the business transparent.  All the information of each and every policy will be directly available to the citizens.

Disadvantages of  E-Governance

a)     Loss of Interpersonal Communication       

b)     High Setup Cost and Technical Difficulties 

c)     Leakage of Personal Information               

d)     Cybercrime

 11. What is Mobile Computing? Write its features and benefits.

 A technology that allows access and transmission of data, voice and video via a computer or any other wireless enabled device without having to be connected to a fixed physical link at anytime and anywhere.

Benefits of Mobile Computing

a)     Connectivity: You can stay connected to all sources at all times.

b)     Social Engagement: You can interact with a variety of users via the Internet.

c)     PersonalizationYou can modify your mobile computing to your individual needs.

Features of Mobile Computing

a)     Easy to handle and carry these small devices.  

 b)   Ability to share data and collaboration between users.

c)     Data can be transferred easily between users.  d)     The presence of high speed connections has also promoted the use of mobile computing.

 12. What is The Internet of Things (IoT)? Write its components.

A system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers (UIDs) and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction.

  The term "The Internet of Things" was coined by Kevin Ashton in a presentation to Proctor & Gamble in 1999.

  A technology that connects all electronic devices together and prompts them to exchange information without any human intervention.

 

Components of IoT

a)     Sensors/Devices - Sensors/Devices collect data from their environment. e.g. Our phone is a device that has multiple sensors like GPS, camera, Motion etc. where data is being collected based on surroundings

b)     Connectivity to Cloud - The sensors/devices can be connected to the cloud and store, through a variety of methods including: Bluetooth, WiFi, Cellular etc.

c)     Data Processing  - Software perform data processing on cloud data to get a analyzed or computed data.    e.g Computing the temperature within an acceptable range.

d)     User Interface - The analyzed or computed data is made useful to the end user via and alert(email, text, notification). e.g a alert message when temperature is beyond the acceptable range.

13. What are the application field of IoT? Applications of Internet of Things (IoT)

a)     Smart home - Smart home encapsulates the connectivity inside your homes. It includes smoke detectors, home appliances, light bulbs, windows, door locks, etc.

b)     Smart City - Smart city offers all types of use cases which include traffic management, water distribution, waste management, etc.

c)     Parking Sensors - IOT technology helps users to identify the real-time availability of parking spaces on their phone.

d)     Connected Cars - IOT helps automobile companies handle billing, parking, insurance, and other related stuff automatically.

e)     Activity Trackers - Helps you to capture heart rate pattern, calorie expenditure, activity levels, and skin temperature on your wrist.

14. What are the advantages and disadvantages of IoT?

Advantage of IOT

a)     Accessing information is easy; you can control a device that is miles apart in real time.

b)     Communication between the connected devices becomes more transparent and easier.

c)     Transferring data packets over a network reduces both time and money.

d)     Automation is the need of the hour; IOT reduces human intervention and efficiency of services

Disadvantage of IOT

a)     There is a huge risk of leakage of confidential data, when sent over a network.

b)     Due to its complex network, a single loophole can put the entire system down, affecting everyone.

c)     With automation, the need of human labor reduces drastically.

d)     Today’s lifestyle is technology driven, we depend on the technology for the tiniest of tasks.

 15. What is E-learning? Write its advantages and disadvantages.

E-learning is a new concept of delivering digital contents in learner oriented environment using information and communication technology (ICT). Delivery of the digital content is the main characteristic of e-learning.

 Advantages of e-learning:

a)     It is easy for customization.

b)     There is no any geographical limitation for learning.

c)     It is quite favorable for learner as it can happen at any time and anywhere.

d)     It reduces or eliminates travel costs to attend learning events.

e)     It reduces or eliminates need for classroom/instructor infrastructure.

 Disadvantages of e-learning:

a)     Learners with low motivation or bad study habits may fall behind

b)     Students may feel isolated from the instructor and classmates

c)     Instructor may not always be available when students are studying or need help

d)     Slow Internet connections or older computers may make accessing course materials frustrating

e)     Managing computer files and online learning software can sometimes seem complex for students with beginner-level computer skills

16. What is  E-Banking? Write its features.

It is the facility provided by bank to conduct financial transactions via the Internet like  funds transfer, payment of bills, opening bank accounts online, and much more.  A customer needs a device, an Internet connection, and a bank card to register.

Features of E-Banking

a)     Faster Transactions

b)     Lowers Transaction Cost

c)      Provides 24×7 Service -

d)     Reduces The Chances of Error

e)     Develops Loyalty in Customers

17.  What is internet banking? Write its features, advantages and disadvantages.

Internet Banking

It is the facility offered by banks and financial institutions that allow customers to use banking services over the internet. Customers need not visit their bank’s branch office to avail each and every small service by using PC or laptop and smart phone with internet connection. 

  Kumari Bank was the initiator of internet banking in Nepal. It started its e-banking services in 2002. 

Features of Internet Banking

a)     The customer can view account statements.

b)     The customer can check the history of the transactions for a given period by the concerned bank.

c)     Bank, statements, various types of forms, applications can be downloaded.

d)     The customer can transfer funds, pay any kind of bill, recharge mobiles, DTH connections, etc.

e)     The customer can buy and sell on e-commerce platforms.

Advantages of Internet Banking

a)     The customers get permanent access to his/her bank anytime and anywhere.

b)     Transactions are safe and highly secure.

c)     Immediate funds transfer helps the user in time of urgent need.

d)     It saves valuable time of the users.

Disadvantages of Internet Banking

a)     Internet Requirement

b)     Transaction Security

 c)     Difficult for Beginners

d)     Securing Password

18. What is mobile banking?

Mobile banking is the act of making financial transactions on a mobile device (cell phone, tablet, etc.).

by downloading Mobile App or SMS system and used for balance inquiry, transaction history,  fund transfer, utility payment, merchant payment, third party payment, etc.