vq:n ffi - Collegenp

5
trN q.ffir flerr vqr+eft ! qtsn+l qrfl-fiq qr+t kfiq q( . 6ruzre1 3rftrqf, *'tr' fu qtqr+t fqfuq; (zF) " kfun.rftffi" : loo qrng .1-ffiq *ftrs *rqar: rTrqf,r srw kqq fq-flqq-flz qs-dT yhrft m t+trq qr eh{ftrqk$ R-+.rqqr t{ kw+ Tq-.{ srffi H mra+ n-a sfroi rrg+.r I qrflfiTm vflu: ffi qil .q.{ sIRref, tsrkPdrot T6-q T(mI qIfiT rrffi h?rikd st"i t{qrorqr{ Tr+-f, Efqrrf, rrfr dt+\r+1 tqrc Efir { qililq m.rqnT gn-+T m-'iq s+q-{R-drqe}-qpE ffi 6qc( f{flm, qqqr gfufU, arcRqrq"l, 4rA{, +cT, hq-q dqT q?q it+q ar-O-qR vErn-{qcFr g<riqr g.qrar-f,{-m ffi{-+. ( qzr6rk6 fl-{+] qfte{q qt qKd qT--dqa.rr-+i stqq ffi ai r ftrkd rtsn+1 v.d{r: ,k.d. q?t k.rq ttrg --_G._ 9r{rt {,qr r nG (rq-rt Y {'l Y qlcl ST'F q-sr{K wffi sTrqrs 1 qTI{ TFT nar., AftFS, EF' ffi tsT( Y { ?o 100 YO i qu-cT ({IW tsdT t 1 1o 1o 3TrRis sqefr q dd sdr Y { Ro Erlt s-f,( -t 1 1o lo R ffi-q wt tqr q-qefr EF- ffig'fl Y { ?o 100 YO t qirfl" qITfr g.f,T a 1 1o lo q ffits+r Y { Ro ilq} wR J i 1o 1o qEat: tl fufu-a TfteTr+l TaT q-r ffi qr erffi E{ qqrqr dftri g r (+ qqT+J s-rn 3Tkar-{ s r kRe-* qfte{rqr qftHrfr-A ffi r qffi rilqrqLt tt q* m gt qlrqrfqr w-r kq vfren r G) qr{rt-srqr tilI+T qar$BrE lri qr.sryqror fuF{ $qril{ Effi yqq q}iiri g r (t) T{T qrd-zrfiTfir q-rzkEqf,flm W Afu\EFr r+q-flqh q[d-Tfi-q'-qr qtor (q, hzrq aerr fitf,t-{ qfterml ffirr<r fr-{ qfr-qr ?fiTrB qqtrm w{ orqq {ffi T{ qTg{fr-rrfl qqr?-s q\-dr 6sr5q rd I lvt kka qterrqr q-.q{ .rfl+] s-tr TiE q-{f,q qrfi={ ykqro 3r-+ TM r lon*a .rftmr:n ewe q* *rq-tnaqqlg-+{ q\-+T +nr er;a-qidi qfte{rqr a"Fqfra qr wsi u1 r 1U fuqfi[d Yqrtr€frt rfi-q-l qszT qr* vq":n m \-gt Tq!:FT 5 m gsrr<r q& rrm (Two or More parts of a single question) qI gser yqa w<nfA g€ m qfr fuwofi-6-{ (Short notes) efarT qtri frqT/TrTd : Tff{fuEF cfd : f( (q) : 3Imqfnt : 10 Yydg BI @ ffidqrn=lkk: ffi loe\e / o\ /1o G,flF

Transcript of vq:n ffi - Collegenp

Page 1: vq:n ffi - Collegenp

trNq.ffir flerr vqr+eft ! qtsn+l qrfl-fiq

qr+t kfiqq( . 6ruzre1 3rftrqf,

*'tr' fuqtqr+t fqfuq;

(zF) " kfun.rftffi" : loo qrng

.1-ffiq *ftrs *rqar:rTrqf,r srw kqq fq-flqq-flz qs-dT yhrft m t+trq qr eh{ftrqk$ R-+.rqqr t{ kw+ Tq-.{ srffiH mra+ n-a sfroi rrg+.r I

qrflfiTm vflu:ffi qil .q.{ sIRref, tsrkPdrot T6-q T(mI qIfiT rrffi h?rikd st"i t{qrorqr{ Tr+-f, Efqrrf, rrfr

dt+\r+1 tqrc Efir { qililq m.rqnT gn-+T m-'iq s+q-{R-drqe}-qpE ffi 6qc( f{flm, qqqrgfufU, arcRqrq"l, 4rA{, +cT, hq-q dqT q?q it+q ar-O-qR vErn-{qcFr g<riqr g.qrar-f,{-m

ffi{-+. ( qzr6rk6 fl-{+] qfte{q qt qKd qT--dqa.rr-+i stqq ffi ai r

ftrkd rtsn+1 v.d{r:

,k.d. q?t k.rq ttrg --_G._9r{rt{,qr

r nG (rq-rtY {'l Y qlcl ST'F q-sr{K wffi sTrqrs

1

qTI{TFT

nar., AftFS, EF'ffi tsT( Y { ?o

100 YO i qu-cT({IW tsdT t

1 1o 1o

3TrRis sqefr q dd sdr Y { Ro

Erlt s-f,( -t1 1o lo

Rffi-qwt

tqr q-qefrEF-

ffig'fl Y { ?o

100 YO t qirfl"qITfr g.f,T a

1 1o lo

q ffits+r Y { Ro

ilq} wR Ji 1o 1o

qEat:

tl fufu-a TfteTr+l TaT q-r ffi qr erffi E{ qqrqr dftri g r (+ qqT+J s-rn 3Tkar-{ s r kRe-*qfte{rqr qftHrfr-A ffi r qffi rilqrqLt tt q* m gt qlrqrfqr w-r kq vfren r

G) qr{rt-srqr tilI+T qar$BrE lri qr.sryqror fuF{ $qril{ Effi yqq q}iiri g r

(t) T{T qrd-zrfiTfir q-rzkEqf,flm W Afu\EFr r+q-flqh q[d-Tfi-q'-qr qtor (q, hzrq aerr fitf,t-{qfterml ffirr<r fr-{ qfr-qr ?fiTrB qqtrm w{ orqq {ffi T{ qTg{fr-rrfl qqr?-s q\-dr

6sr5q rd I

lvt kka qterrqr q-.q{ .rfl+] s-tr TiE q-{f,q qrfi={ ykqro 3r-+ TM r lon*a .rftmr:n ewe q**rq-tnaqqlg-+{ q\-+T +nr er;a-qidi qfte{rqr a"Fqfra qr wsi u1 r

1U fuqfi[d Yqrtr€frt rfi-q-l qszT qr* vq":n m \-gt Tq!:FT 5 m gsrr<r q& rrm (Two or Moreparts of a single question) qI gser yqa w<nfA g€ m qfr fuwofi-6-{ (Short notes) efarT qtri

frqT/TrTd : Tff{fuEF

cfd : f(

(q) : 3Imqfnt : 10 Yydg

BI

@ ffidqrn=lkk:ffi loe\e / o\ /1o

G,flF

Page 2: vq:n ffi - Collegenp

(1 )

t-I

I

I

:.DTE6[, ffitIEII3TrEfiFiltrfrff

fr, Frru: Aqrd {E fu V{, lo{c', i-+ aqr kfi-q ven sqaft ({, Roul, it+-q +qr nqlq"il?i t{, Roqy, v€qk t1fr-+-tw G-fr qrgueft-St ft-+nq t{, ?oqx, "Faqfr E{, loEl, f4qtdq

tg@fr-+l sT-n-qT-{ E{, ?oEt osrr iqm {rV qo.-{rc qrft qf+-qd f{i{r+ sq{ft qmorft r

ifuS yunfr: elzlar(uTT, F{srg?,-q, A-+4T gzr'rt aql mptatr, M 3ilfui6 Pq-rr-eqT ifq,T

ffi q6iq, qftqrq qzrcslT, ffiq ffi TqTq=TT, {kfl, +ts, znf,q r e{Fotfi'R, iqrq-qT Afu-f

M flfie{ui f,arT +fi den k{Tq qRtT-6-{-+1 fi.rs, +-f,q t eftl+"R, tt{-$ Mr qEqT;F[T,

aFRR nqr qfika-r, At+-ff Eqqqrqil frfuq t ;qfr+pror sr{rirf,{' i

qfu-tr t{r6{: h&q +fl, +-qt fr{r, h}qq, gkilwt, d-+ "nqrra +riffi 3Tz[ar{uTT, sf,ffi {ysl-t, +tq r fu +t'Eqr 3nil'kf, Tl-i-{rril{, zEqi qfr-, +-qi+} flfrqt{q, Branchless Banking,

Any Branch Banking System (ABBS), Mobile Banking, lnternet Banking, SWIFT, Debit Card,

Credit Card, ATM, PoS, QR code, Online account, Good for Payment Cheque, Manager's

Cheque, Locker, Financial Literacy, Digital Literacy, Kisan Credit Card/Apps, Opportunities

and Challenges of Digital Banking in Nepal, it{-g qr<rq-fr (Banking Terminology) t

sF k+.rt {o k.: ffir (qrq;rT, t+smfr-{, +r{iv".+fu, (qfu, *v, v{w, Rrro-{rcqo. IT{q"IT,

ornflr+1 BtzrcstrT, qielm+1 err.FR, h-flqm gqq q{ guiq qeT aeIT 3{zRR i Tfift-do, qfq

f{+.rg ilfi t{. trffi tm kftrqqrq-fr, RoE?, d'm oqr ffiq g+rTrqr sTd-.d cndq{i'fr qtrrar

lr.iqt 3rTrmq (q[ Br{qtrtm I

(l)

(1)

(Y)

GilTB-Gt:

ffi ( 3ntY6 T$qfrfr

Y yaT xt 3r+ =?o

t Tqq X 10 3{"F' =1o

(1) Management: Organization concept, Structure, objectives & principles, Communication

System, Organization change & development, Organization cultural, Organization

governance, Management concBpt, Principles, Types & Functions, Key management

process, Current issues of mdnagement, Management lnformation System and itscomportance, Time Management, Crisis Management, Conflict Management, Change

Management, Knowledge Management, Record Management, Stress Management

oncept, function and importance

Training & development, Job de

Of HRM, HR

scription, Job

nce appralsal,

Moral values,

(21

RWard& Punishment, Performaan n&ource lnformation System,.t

ll,ationl &^Col lective Ba rgen i ng/0'*rt'

GME-fi: tr1,;iln ilqT 3[f6"g flffift

waqmrrdr EzF[-* furrr;rq

Human Resource Management: C

Planning, Recruitment & selection,

specification & Job analysis, Moti ,ffi,Career Planning, Employee ethicff;HuRetirement -rution, tnrrffi

Page 3: vq:n ffi - Collegenp

(3) Economics: Characterstics of Nepalese economy, GDP, National lncome, Percapita

lncome, lnterest Rate, lnflation, lnvestment, Saving, Government Securities, Balance of

Payment, Money market, Capital market.

(4) Strategic & Risk Management: Strategic planning framework, Strategy formulation

process and methods, SWOT analysis, Risk Management Concept, ldentification,

Types, Measurement, Cyber securities, lT risk management techniques and

strategies, Contingency planning and management.

(5) Project Management: Concept, Project identification, formulation, appraisal,

implementation, monitoring,evaluation and control.

(6) Fiscal & Monetary policy: Concept, feature, objectives and instruments of monetary

policy& fiscal policy.

(7) lnformation Technology: Computer System (lnput Device, Output Device), Operating

System, Application software, MS office system, lnternet, lntranet, Extranet and e-mail

system, Database management system, Hardware, Networking, Backup, Related

threats. Need of core banking system (CBS) in banking business, lmportance & related

risks of CBS in banking institution.

.Uil:SiTtUtrtrfr

GM3-2fi': t{f $qrtft-Eqr-cl sd-(qTqT 3fl{

_ _Y Y:1_I"1

? qar xlrffigfiT-*kqrwq

9qilq 1 ? i1 Y

yqT T@tT R 1 1 1

(1) Gomputer organization and architecturea. Basic computer lnstruction (Memory reference, Resister reference)

b. The instruction set, the number of bits used to represent various data types, l/O

mechanisms, memory addressing techniques

Structure and Function (Data processing, data storage, data movement, control)

Designing and performance (pipelining, onboard L1 & L2 cache, branch prediction,)

Computer componentsRISC/CISC architectureParallel processing -SISD/MISD/SIMD/MIMD

Clusters: Configuration, benefitsVon Neumann/Harvard Architecture

Simplified lnstructional Computer (SlC)

lnput/ Output organization: l/O module function, l/O mapping

(21Design and analysis of algorithma. Properties of functions: Monotonicity,

b. Clustering.c. Minimum spanning T*e@d. Proximity of DistributaoVe. Streaming algorithms.

ITBN;ic prdh"rties of Boolean functions.,",,::' ". '!-)

I;,r,:4 A:9*aa'-r- >r

Page 4: vq:n ffi - Collegenp

(3) Artificial lntel ligencea. Agents in Artificial lntelligenceb. Difference between Al (Artificial lntelligence), Bl (Business lntelligence) & Machine

learning.c. Search and optimization, Neural Networks, Languages, Probabilistic methods for

uncertain reasoning

(4) Oigltal Design: Digital and Analog Systems. Number Systems, Logic Elements,

Combinational Logic Circuits, Sequential Logic, Arithmetic Circuits, MSI Logic Circuits,

Registers and Counters, lC logic families

(5) Software Engineering Principles:Software Architecture, Data Design, Software design:

Design for reuse, design for change, design notations, design evaluation and validation,

Software Architecture, Context diagram and DFD, Object Modeling: Object-Oriented Concept,

Object Structure, Object Feature, Class and Object, Use Case Diagram, State Diagram, Event

Flow Diagram, Software quality attributes, Software process model, Process iteration, Data

and object models, Multiprocessor architecture, System design: Real-time operating systems,

Monitoring and control systems, Planning verification and validation, System testing:

Component testing, Test case design, Test automation, Software Risk, Risk identification,

Software productivity, Quality management: quality assurance, Statistical software quality

assurance, Software reliability, Capability Maturity Model lntegration (CMMI).

GFIB-G[: QHT HTTftft

ffir{ ktrrrna

tcr q. 1 ? ?I x

g1t.t q-@It 1 1 1 ?

(1 ) lnformation security

a. Goals of lnformation Security

b. Challenges and Constraints, Cyber Threats: - Cyber Warfare-Cyber Crime-Cyber Terrorism-

Cyber Espionage

c. Cyber Security Vulnerabilities and Cyber Security Safeguards: , vulnerabilities in

software, System administration, Complex Network Architectures, Open Access to

Organizational Data, Weak Authentication, Unprotected Broadband communications,

Poor Cyber Security Awareness. Cyber Security Safeguards- Overview, Access

control, Audit,Authentication, Biometrlcs, Cryptography, Deception, Denial of Service

Filters, Ethical Hacking, Firewalls, lntrusion Detection Systems, Response, Scanning,

Security policy, Threat Managoment.

d. Securing Web Application, Services and Servers:Basic security for HTTP Applications

and Services, Basic Security for SOAP Services, ldentity Management and Web

Services, Authorization Patterns

(2) Database systems and lmplementation

Concepts: Common Data types, concept of Tables,_Fields, Records, Relationships and lndexing

Data Abstraction and Data lndependence, Sch r\stances, Concepts of DDL, DML and

DCL, Data Models: Logical, Physical and Cdrineeptual, E-R Model, Entities and Entities sets,

Relationship and Relationship setl $trong fntlty Sets, Attributes and Keys, E-R

Page 5: vq:n ffi - Collegenp

Diagram, Relational Languages: SQL Queries and Sub-Queries, Set Operations, Relations(Joined, Derived), Queries under DDL and DML Commands, Database Constraints andNormalization: Assertions and Triggering, Functional Dependencies (Chase Algorithm), Multi-

valued and Joined Dependencies, Different Normal Forms (1st,2nd,3rd, BCNF, DKNF), QueryProcessing and Optimization: Creating, modifying and deleting Query/formslreports , CrashRecovery: Failure Classification, Recovery and Atomicity, Log-based Recovery, Advanced

Recovery Techniques, Advanced database Concepts: Concept of Object-Oriented and

Distributed Database Model, Properties of Parallel and Distributed Databases, Concept of Data

warehouse Database

(3) Networking and Open Standards

Computer Networking: Network Protocols (TCP/IP and OSI), Evolution of Networking:

ARPANET, !V\nn/V, lnternet; Network Topologies; Types of Network: PAN, LAN, WAN, MAN ;

Wired Technologies: Twisted pair cable, coaxial cable, optical fiber ;Wireless Technologies:Bluetooth, infrared, radio link, microwave link, radio link and satellite link ; Network devices:MODEM, Hub, switch, repeater, gateway - and their functions; ldentifying computers and users

over a network: Basic concept of domain name, MAC (Media Access Control) and lP Address,domain name resolution;

(4)Electronics Commerce: History of Electronic Commerce, Advantages and Disadvantage of E-

commerce, Roadmap of e-commerce in Nepal, Managing the e-Enterprise, E-businessEnterprise, Organization of Business in an e-Enterprise, E-business Models Based on theRelationship of Transaction Parties, e-commerce Sales Life Cycle (ESLC) Model, An Overview ofRisks Associated with lnternet Transactions, lnternet Associated Risks, lntranet Associated Risks,

risks associated with Business Transaction Data, Electronic Payment Systems, Electronic Cash,

Smart Cards and Electronic Payment Systems, Credit Card Based Electronic Payment Systems,Risks and Electronic Payment Systems

(5)Data Warehousing and mining: OLTP Systems; Characteristics of Data Warehouse,Data Warehouse Types, Data Warehouse development Life Cycle, Kimball LifecycleDiagram, Data warehouse architectures, E-R Modeling: Dimensional Modeling: Data

Warehouse Schemas; Granularity, Star Schema Keys: Snowflake Schema. Fact

Constellation Schema:Characteristics of OLAP, Process and advantageous of OLAP,

Multidimensional Data: OLAP Architectures; MOLAP, ROLAP, HOLA: Hypercube & Multi

cubes

(6) Banking and Relevant Lawsa. ICT Policy,2072b. Nepal Rastra Bank-lT Policy and

c. Cyber Secu rity Sta nd a rdsGuidelines 2012.

d. Digital Marketing