vq:n ffi - Collegenp
Transcript of vq:n ffi - Collegenp
trNq.ffir flerr vqr+eft ! qtsn+l qrfl-fiq
qr+t kfiqq( . 6ruzre1 3rftrqf,
*'tr' fuqtqr+t fqfuq;
(zF) " kfun.rftffi" : loo qrng
.1-ffiq *ftrs *rqar:rTrqf,r srw kqq fq-flqq-flz qs-dT yhrft m t+trq qr eh{ftrqk$ R-+.rqqr t{ kw+ Tq-.{ srffiH mra+ n-a sfroi rrg+.r I
qrflfiTm vflu:ffi qil .q.{ sIRref, tsrkPdrot T6-q T(mI qIfiT rrffi h?rikd st"i t{qrorqr{ Tr+-f, Efqrrf, rrfr
dt+\r+1 tqrc Efir { qililq m.rqnT gn-+T m-'iq s+q-{R-drqe}-qpE ffi 6qc( f{flm, qqqrgfufU, arcRqrq"l, 4rA{, +cT, hq-q dqT q?q it+q ar-O-qR vErn-{qcFr g<riqr g.qrar-f,{-m
ffi{-+. ( qzr6rk6 fl-{+] qfte{q qt qKd qT--dqa.rr-+i stqq ffi ai r
ftrkd rtsn+1 v.d{r:
,k.d. q?t k.rq ttrg --_G._9r{rt{,qr
r nG (rq-rtY {'l Y qlcl ST'F q-sr{K wffi sTrqrs
1
qTI{TFT
nar., AftFS, EF'ffi tsT( Y { ?o
100 YO i qu-cT({IW tsdT t
1 1o 1o
3TrRis sqefr q dd sdr Y { Ro
Erlt s-f,( -t1 1o lo
Rffi-qwt
tqr q-qefrEF-
ffig'fl Y { ?o
100 YO t qirfl"qITfr g.f,T a
1 1o lo
q ffits+r Y { Ro
ilq} wR Ji 1o 1o
qEat:
tl fufu-a TfteTr+l TaT q-r ffi qr erffi E{ qqrqr dftri g r (+ qqT+J s-rn 3Tkar-{ s r kRe-*qfte{rqr qftHrfr-A ffi r qffi rilqrqLt tt q* m gt qlrqrfqr w-r kq vfren r
G) qr{rt-srqr tilI+T qar$BrE lri qr.sryqror fuF{ $qril{ Effi yqq q}iiri g r
(t) T{T qrd-zrfiTfir q-rzkEqf,flm W Afu\EFr r+q-flqh q[d-Tfi-q'-qr qtor (q, hzrq aerr fitf,t-{qfterml ffirr<r fr-{ qfr-qr ?fiTrB qqtrm w{ orqq {ffi T{ qTg{fr-rrfl qqr?-s q\-dr
6sr5q rd I
lvt kka qterrqr q-.q{ .rfl+] s-tr TiE q-{f,q qrfi={ ykqro 3r-+ TM r lon*a .rftmr:n ewe q**rq-tnaqqlg-+{ q\-+T +nr er;a-qidi qfte{rqr a"Fqfra qr wsi u1 r
1U fuqfi[d Yqrtr€frt rfi-q-l qszT qr* vq":n m \-gt Tq!:FT 5 m gsrr<r q& rrm (Two or Moreparts of a single question) qI gser yqa w<nfA g€ m qfr fuwofi-6-{ (Short notes) efarT qtri
frqT/TrTd : Tff{fuEF
cfd : f(
(q) : 3Imqfnt : 10 Yydg
BI
@ ffidqrn=lkk:ffi loe\e / o\ /1o
G,flF
(1 )
t-I
I
I
:.DTE6[, ffitIEII3TrEfiFiltrfrff
fr, Frru: Aqrd {E fu V{, lo{c', i-+ aqr kfi-q ven sqaft ({, Roul, it+-q +qr nqlq"il?i t{, Roqy, v€qk t1fr-+-tw G-fr qrgueft-St ft-+nq t{, ?oqx, "Faqfr E{, loEl, f4qtdq
tg@fr-+l sT-n-qT-{ E{, ?oEt osrr iqm {rV qo.-{rc qrft qf+-qd f{i{r+ sq{ft qmorft r
ifuS yunfr: elzlar(uTT, F{srg?,-q, A-+4T gzr'rt aql mptatr, M 3ilfui6 Pq-rr-eqT ifq,T
ffi q6iq, qftqrq qzrcslT, ffiq ffi TqTq=TT, {kfl, +ts, znf,q r e{Fotfi'R, iqrq-qT Afu-f
M flfie{ui f,arT +fi den k{Tq qRtT-6-{-+1 fi.rs, +-f,q t eftl+"R, tt{-$ Mr qEqT;F[T,
aFRR nqr qfika-r, At+-ff Eqqqrqil frfuq t ;qfr+pror sr{rirf,{' i
qfu-tr t{r6{: h&q +fl, +-qt fr{r, h}qq, gkilwt, d-+ "nqrra +riffi 3Tz[ar{uTT, sf,ffi {ysl-t, +tq r fu +t'Eqr 3nil'kf, Tl-i-{rril{, zEqi qfr-, +-qi+} flfrqt{q, Branchless Banking,
Any Branch Banking System (ABBS), Mobile Banking, lnternet Banking, SWIFT, Debit Card,
Credit Card, ATM, PoS, QR code, Online account, Good for Payment Cheque, Manager's
Cheque, Locker, Financial Literacy, Digital Literacy, Kisan Credit Card/Apps, Opportunities
and Challenges of Digital Banking in Nepal, it{-g qr<rq-fr (Banking Terminology) t
sF k+.rt {o k.: ffir (qrq;rT, t+smfr-{, +r{iv".+fu, (qfu, *v, v{w, Rrro-{rcqo. IT{q"IT,
ornflr+1 BtzrcstrT, qielm+1 err.FR, h-flqm gqq q{ guiq qeT aeIT 3{zRR i Tfift-do, qfq
f{+.rg ilfi t{. trffi tm kftrqqrq-fr, RoE?, d'm oqr ffiq g+rTrqr sTd-.d cndq{i'fr qtrrar
lr.iqt 3rTrmq (q[ Br{qtrtm I
(l)
(1)
(Y)
GilTB-Gt:
ffi ( 3ntY6 T$qfrfr
Y yaT xt 3r+ =?o
t Tqq X 10 3{"F' =1o
(1) Management: Organization concept, Structure, objectives & principles, Communication
System, Organization change & development, Organization cultural, Organization
governance, Management concBpt, Principles, Types & Functions, Key management
process, Current issues of mdnagement, Management lnformation System and itscomportance, Time Management, Crisis Management, Conflict Management, Change
Management, Knowledge Management, Record Management, Stress Management
oncept, function and importance
Training & development, Job de
Of HRM, HR
scription, Job
nce appralsal,
Moral values,
(21
RWard& Punishment, Performaan n&ource lnformation System,.t
ll,ationl &^Col lective Ba rgen i ng/0'*rt'
GME-fi: tr1,;iln ilqT 3[f6"g flffift
waqmrrdr EzF[-* furrr;rq
Human Resource Management: C
Planning, Recruitment & selection,
specification & Job analysis, Moti ,ffi,Career Planning, Employee ethicff;HuRetirement -rution, tnrrffi
(3) Economics: Characterstics of Nepalese economy, GDP, National lncome, Percapita
lncome, lnterest Rate, lnflation, lnvestment, Saving, Government Securities, Balance of
Payment, Money market, Capital market.
(4) Strategic & Risk Management: Strategic planning framework, Strategy formulation
process and methods, SWOT analysis, Risk Management Concept, ldentification,
Types, Measurement, Cyber securities, lT risk management techniques and
strategies, Contingency planning and management.
(5) Project Management: Concept, Project identification, formulation, appraisal,
implementation, monitoring,evaluation and control.
(6) Fiscal & Monetary policy: Concept, feature, objectives and instruments of monetary
policy& fiscal policy.
(7) lnformation Technology: Computer System (lnput Device, Output Device), Operating
System, Application software, MS office system, lnternet, lntranet, Extranet and e-mail
system, Database management system, Hardware, Networking, Backup, Related
threats. Need of core banking system (CBS) in banking business, lmportance & related
risks of CBS in banking institution.
.Uil:SiTtUtrtrfr
GM3-2fi': t{f $qrtft-Eqr-cl sd-(qTqT 3fl{
_ _Y Y:1_I"1
? qar xlrffigfiT-*kqrwq
9qilq 1 ? i1 Y
yqT T@tT R 1 1 1
(1) Gomputer organization and architecturea. Basic computer lnstruction (Memory reference, Resister reference)
b. The instruction set, the number of bits used to represent various data types, l/O
mechanisms, memory addressing techniques
Structure and Function (Data processing, data storage, data movement, control)
Designing and performance (pipelining, onboard L1 & L2 cache, branch prediction,)
Computer componentsRISC/CISC architectureParallel processing -SISD/MISD/SIMD/MIMD
Clusters: Configuration, benefitsVon Neumann/Harvard Architecture
Simplified lnstructional Computer (SlC)
lnput/ Output organization: l/O module function, l/O mapping
(21Design and analysis of algorithma. Properties of functions: Monotonicity,
b. Clustering.c. Minimum spanning T*e@d. Proximity of DistributaoVe. Streaming algorithms.
ITBN;ic prdh"rties of Boolean functions.,",,::' ". '!-)
I;,r,:4 A:9*aa'-r- >r
(3) Artificial lntel ligencea. Agents in Artificial lntelligenceb. Difference between Al (Artificial lntelligence), Bl (Business lntelligence) & Machine
learning.c. Search and optimization, Neural Networks, Languages, Probabilistic methods for
uncertain reasoning
(4) Oigltal Design: Digital and Analog Systems. Number Systems, Logic Elements,
Combinational Logic Circuits, Sequential Logic, Arithmetic Circuits, MSI Logic Circuits,
Registers and Counters, lC logic families
(5) Software Engineering Principles:Software Architecture, Data Design, Software design:
Design for reuse, design for change, design notations, design evaluation and validation,
Software Architecture, Context diagram and DFD, Object Modeling: Object-Oriented Concept,
Object Structure, Object Feature, Class and Object, Use Case Diagram, State Diagram, Event
Flow Diagram, Software quality attributes, Software process model, Process iteration, Data
and object models, Multiprocessor architecture, System design: Real-time operating systems,
Monitoring and control systems, Planning verification and validation, System testing:
Component testing, Test case design, Test automation, Software Risk, Risk identification,
Software productivity, Quality management: quality assurance, Statistical software quality
assurance, Software reliability, Capability Maturity Model lntegration (CMMI).
GFIB-G[: QHT HTTftft
ffir{ ktrrrna
tcr q. 1 ? ?I x
g1t.t q-@It 1 1 1 ?
(1 ) lnformation security
a. Goals of lnformation Security
b. Challenges and Constraints, Cyber Threats: - Cyber Warfare-Cyber Crime-Cyber Terrorism-
Cyber Espionage
c. Cyber Security Vulnerabilities and Cyber Security Safeguards: , vulnerabilities in
software, System administration, Complex Network Architectures, Open Access to
Organizational Data, Weak Authentication, Unprotected Broadband communications,
Poor Cyber Security Awareness. Cyber Security Safeguards- Overview, Access
control, Audit,Authentication, Biometrlcs, Cryptography, Deception, Denial of Service
Filters, Ethical Hacking, Firewalls, lntrusion Detection Systems, Response, Scanning,
Security policy, Threat Managoment.
d. Securing Web Application, Services and Servers:Basic security for HTTP Applications
and Services, Basic Security for SOAP Services, ldentity Management and Web
Services, Authorization Patterns
(2) Database systems and lmplementation
Concepts: Common Data types, concept of Tables,_Fields, Records, Relationships and lndexing
Data Abstraction and Data lndependence, Sch r\stances, Concepts of DDL, DML and
DCL, Data Models: Logical, Physical and Cdrineeptual, E-R Model, Entities and Entities sets,
Relationship and Relationship setl $trong fntlty Sets, Attributes and Keys, E-R
Diagram, Relational Languages: SQL Queries and Sub-Queries, Set Operations, Relations(Joined, Derived), Queries under DDL and DML Commands, Database Constraints andNormalization: Assertions and Triggering, Functional Dependencies (Chase Algorithm), Multi-
valued and Joined Dependencies, Different Normal Forms (1st,2nd,3rd, BCNF, DKNF), QueryProcessing and Optimization: Creating, modifying and deleting Query/formslreports , CrashRecovery: Failure Classification, Recovery and Atomicity, Log-based Recovery, Advanced
Recovery Techniques, Advanced database Concepts: Concept of Object-Oriented and
Distributed Database Model, Properties of Parallel and Distributed Databases, Concept of Data
warehouse Database
(3) Networking and Open Standards
Computer Networking: Network Protocols (TCP/IP and OSI), Evolution of Networking:
ARPANET, !V\nn/V, lnternet; Network Topologies; Types of Network: PAN, LAN, WAN, MAN ;
Wired Technologies: Twisted pair cable, coaxial cable, optical fiber ;Wireless Technologies:Bluetooth, infrared, radio link, microwave link, radio link and satellite link ; Network devices:MODEM, Hub, switch, repeater, gateway - and their functions; ldentifying computers and users
over a network: Basic concept of domain name, MAC (Media Access Control) and lP Address,domain name resolution;
(4)Electronics Commerce: History of Electronic Commerce, Advantages and Disadvantage of E-
commerce, Roadmap of e-commerce in Nepal, Managing the e-Enterprise, E-businessEnterprise, Organization of Business in an e-Enterprise, E-business Models Based on theRelationship of Transaction Parties, e-commerce Sales Life Cycle (ESLC) Model, An Overview ofRisks Associated with lnternet Transactions, lnternet Associated Risks, lntranet Associated Risks,
risks associated with Business Transaction Data, Electronic Payment Systems, Electronic Cash,
Smart Cards and Electronic Payment Systems, Credit Card Based Electronic Payment Systems,Risks and Electronic Payment Systems
(5)Data Warehousing and mining: OLTP Systems; Characteristics of Data Warehouse,Data Warehouse Types, Data Warehouse development Life Cycle, Kimball LifecycleDiagram, Data warehouse architectures, E-R Modeling: Dimensional Modeling: Data
Warehouse Schemas; Granularity, Star Schema Keys: Snowflake Schema. Fact
Constellation Schema:Characteristics of OLAP, Process and advantageous of OLAP,
Multidimensional Data: OLAP Architectures; MOLAP, ROLAP, HOLA: Hypercube & Multi
cubes
(6) Banking and Relevant Lawsa. ICT Policy,2072b. Nepal Rastra Bank-lT Policy and
c. Cyber Secu rity Sta nd a rdsGuidelines 2012.
d. Digital Marketing