0% found this document useful (0 votes)
63 views8 pages

What Is The Job Profile of IT Officer in Banks?

The document provides information on the job profile of an IT Officer in banks. It states that IT Officers are recruited at bank branches as needed and are responsible for maintaining the data center which stores core banking applications and data. They must ensure the data center runs smoothly 24/7 without issues. IT Officers also maintain banking software used by bank employees and troubleshoot any issues. They handle the ATM section and ensure smooth functioning of ATM machines. IT Officers work on hardware aspects in addition to software like Finacle, FlexCube and SAP. Their roles include setting up accounts, training employees on software updates, testing new technology, and ensuring security and safety.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
63 views8 pages

What Is The Job Profile of IT Officer in Banks?

The document provides information on the job profile of an IT Officer in banks. It states that IT Officers are recruited at bank branches as needed and are responsible for maintaining the data center which stores core banking applications and data. They must ensure the data center runs smoothly 24/7 without issues. IT Officers also maintain banking software used by bank employees and troubleshoot any issues. They handle the ATM section and ensure smooth functioning of ATM machines. IT Officers work on hardware aspects in addition to software like Finacle, FlexCube and SAP. Their roles include setting up accounts, training employees on software updates, testing new technology, and ensuring security and safety.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

What is the Job Profile of IT Officer in banks?

1. The IT Officers are recruited at the various branches of the banks wherever there is a
requirement through IBP S Specialist officer exam.
2. Along with different types of banking software like Finacle, SAP, BanCS , etc, they need to
work upon the hardware parts in the banks as well
Job Profile of the IT Officers
A. The IT Officers are recruited at the various branches of the banks wherever there is a
requirement.
B. They take care of the Data Centre, which is the main part of the banks in which the data and
core banking applications are saved.
C. The IT officers are responsible for maintaining and supporting this data centre, so that it
remains functional 24x7, without any malfunction in it.
D. The IT Officers also need to look after the banking software that is installed in the banks in
which the officers and clerical cadres are working on a day to day basis.
E. They need to troubleshoot any communication or software issues that arise in these
computers while working.
F. The ATM section of the banks is also handled by the IT officers.
G. They are responsible for smooth functioning of the ATM machines and need to repair any
disputes in the machine with immediate effect.
H. They often need to visit the ATMs in shifts and are given responsibility to install them in the
new places.
I. They are also required to go report at the project office, where all the banking branch
support of IT takes place.
J. They look after the security and surveillance of the bank and its mechanisms as well.
K. They make sure that the computers are protected with right anti-virus and the surveillance
cameras and the set-up is working properly in the banks.
L. Along with different types of banking software like Finacle, FLEXCUBE, BanCS, SAP etc,
they need to work upon the hardware parts in the banks as well.
M. Setting of accounts, making employees know about the modifications in the application
software, testing and evaluating new technology used by banks, safety and security checks
and assisting fellow workers are some of the roles of the IT Officer in any bank.
1. In MS Word, which one of the following options is used to create different formatting for
Different sections?
Answer: Section break.
2. Which of the following is a series of recorded commands automate a task?
Answer: Macro
3. Which of the following features allow you to combine a form letter with the contents of a
database (usually a name and address file), creating a separate copy of the letter for each
entry in the database?
Answer: Mail Merge
4. Which of the following short cut keys do you use to find a specific word in a document?
Answer: Ctrl+F
5. In MS Excel,which of the following can be used to copy only the value of a cell to another
where the value of the source cell was derived through a formula?
Answer: Copy, Paste Special, Value
6. In MS PowerPoint, which one of the following function keys is used to start a slide show?
Answer: F5
7. In Windows operating system, what is the shortcut key for printing a word document?
Answer: Alt+P
8. Which one of the following is true about firewalls?
Answer: It filters network traffic
9. In a computer, after the booting process which file executes automatically?
Answer:  config.sys
10. Which one of the following commands can be used to recreate a storage disk’s tracks and
sectore?
Answer: FORMAT
11. Which one of the following enables the mobile devices to access Internet resources?
Answer: WAP
12. In MS Excel, which one of the following options will you use to show the results of the top
10 students in class where the class size is 100?
Answer: All of these
13. Which one of the following Operating Systems is not a multitasking operating system?
Answer: DOS
14. An authority, appointed by an Islamic financial institution, which supervises and ensures
both the Shari’ ah compliance of new product development and the operations is called-
Answer: Shari’ ah Regulatory Agency
15. Which of the following model of Islamic financing can be used for large fixed assets
financing such as houses, transport, machinery etc?
Answer: Diminishing Musharakah
16. Which of the following is the first private commercial hank in Bangladesh?
Answer: AB Bank Ltd.
17. Devaluation of money results in an increase in which of the following?
Answer: Money Supply
18. Which of the following is a specialized bank?
Answer: Bangladesh Krishi Bank

19. Treasury Bills are sold which of the following organization?


Answer: Bangladesh Bank
20. Where is the Headquarters of International Atomic Energy Agency ( IAEA) Located?
Answer: Vienna
21. How many Districts in Bangladesh Have Borders with India?
Answer: 30 Borders.
22. In MS Word, Which of the following function key activates the Spell Checking?
Answer: F7
1. Which of the following is a linking function?
A. Execution of program
B. Makes address of programs known to each other
C. Accept and conversion of source code
D. Loading of program
E. None of these
2. Who Provide Connection Oriented Service for Sending a message on Network:
A. TCP
B. UDP
C. IP
D. RIP
E. None of these
3. For network traffic measurement we need not use:
A. Hardware and software approach
B. Passive and active approach
C. Top to bottom approach
D. On-line and off-line approach
E. None of these
4. Which of the following graphical notations is used to describe the data flow between various
processes of a system?
A. Data flow diagram
B. Data name rationalization
C. Entity relation diagram
D. Data analysis diagram
E. None of these
5. Which keyword is not used in java?
A. void
B. private
C. Boolean
D. Static
E. None of these
Bank IT Officer/Specialist Exam Sample Question Paper
1. The _____ states that a foreign key must either match a primary key value in another relation or
it must be null.
(a) entity integrity rule
(b) referential integrity constraint
(c) action assertion
(d) composite attribute
(e) None of these
2. An applet __________
(a) is an interpreted program that runs on the client
(b) tracks the number of visitors to a Website
(c) is a compiled program that usually runs on the client
(d) collects data from visitors to a Website
(e) None of these
3. A _____ sometimes called a boot sector virus, executes when a computer boots up because it
resides in the boot sector of a floppy disk or the master boot record of a hard disk.
(a) system virus
(b) Trojan horse virus
(c) file virus
(d) macro virus
(e) None of these
4. Which error detection method uses one's complement arithmetic?
(a) Simply parity check
(b) Checksum
(c) Two-dimensional parity check
(d) CRC
(e) None of these
5. A result of a computer virus can not lead to ___.
(a) Disk Crash
(b) Mother Board Crash
(c) Corruption of program
(d) Deletion of files
(e) None of these
6. The network interface card of LAN is related to following layer of OSI Model-
(a) Transport
(b) Network
(c) Data Link
(d) Physical
(e) All of these
7. Which of the following does not describe a data warehouse?
(a) Subject-oriented
(b) Integrated
(c) Time-variant
(d) Updateable
(e) None of these
8. Which of the following is true ?
(a) Logical design is software-dependent
(b) In a distributed database, database is stored in one physical location
(c) Conceptual design translates the logical design into internal model
(d) Logical design is software independent
(e) None of these
9. A range check _____
(a) ensures that only the correct data type is entered into a field
(b) verifies that all required data is present
(c) determines whether a number is within a specified limit
(d) tests if the data in two or more associated fields is logical
(e) None of these
10. The total set of interlinked hypertext documents worldwide is-
(a) HTTP
(b) Browser
(c) WWW
(d) B2B
(e) None of these
11. With the object-oriented (OO) approach, an object encapsulates, or_____.a programmer.
(a) carries out, the details of an object for
(b) hides, the details of an object from
(c) reveals, the details of an object to
(d) extends, the details of an object beyond
(e) None of these
12. Every computer connected to an intranet or extranet must have a distinct_____
(a) firewall
(b) proxy server
(c) IP address
(d) domain name
(e) None of these
13. A table of bits in which each row represents the distinct values of a key?
(a) Join index
(b) Bitmap index
(c) B + Tree
(d) Hierarchical index
(e) None of these
14. The degree of detail that should be incorporated into a database depends on what?
(a) Data integrity
(b) The type of database
(c) The user's perspective
(d) The business practices and policies
(e) None of these
15. The ___.converts digital signals to analog signals for the purpose of transmitting data over
telephone lines.
(a) Modem
(b) Router
(c) Gateway
(d) Bridge
(e) All of these
16. Before a package can be used in a java program it must be___.
(a) executed
(b) referenced
(c) imported
(d) declared
(e) None of these
17. Choose the correct way to indicate that a line in a C++ program is a comment line, that is, a
line the will not be executed as an instruction___.
(a) begin the line with a # sign
(b) begin the line with double slashes (/ /)
(c) begin and end the line with double hyphens (-_-)
(d) indent the line
(e) None of these
18. Programming language built into user programs such as Word and Excel are known as____
(a) 4GLs
(b) macro languages
(c) object-oriented languages
(d) visual programming languages
(e) None of these
19. Firewalls are used to protect against___.
(a) Unauthorized Attacks
(b) Virus Attacks
(c) Data Driven Attacks
(d) Fire Attacks
(e) All of these
20. This is a standard way for a Web server to pass a Web user's request to an application
program and to receive data back to forward to the user-
(a) Interrupt request
(b) Forward DNS lookup
(c) Data-Link layer
(d) File Transfer Protocol
(e) Common gateway interface
21. Three SQL, DDL, CREATE commands are__.
(a) Schema, Base and Table
(b) Base, Table and Schema
(c) Key, Base and Table
(d) Schema, Table and View
(e) None of these
22. Data are ________ in client/server computing.
(a) never sent to the client machine
(b) sent in very large sections to save processing time
(c) sent only upon the client's request
(d) sent in complete copies for the client to filter and sort
(e) sent from the client to the server for processing
23. Which of the following will not eliminates the ambiguities of a null value?
(a) Define the attribute as required
(b) Define subtypes
(c) Define each attribute as having an initial value that is recognized as blank
(d) Define supertypes
(e) None of these
24. The____directory is mandatory for every disk.
(a) Root
(b) Base
(c) Sub
(d) Case
(e) None of these
25. This is a group of servers that share work and may be able to back each other up if one server
fails.
(a) Channel bank
(b) Cluster
(c) Tiger team
(d) Serverless backup
(e) Logical unit

You might also like