SlideShare a Scribd company logo
1 of 2
Download to read offline
Question Bank 2004- 2023 | Bank Special Stack IT Job Solution
Stack
IT
Question
Bank
|
01789741518,
01761719838
|
Buy
Book:
stackvaly.com
|
Online
Exam:
exam.stackvaly.com

largest spender and beneficiary from information
technology. This endeavors to relate the
international trends in it with the Indian banking
industry.
2
Bangladesh Bank
Exam Taker: IBA
Assistant Programmer
Marks: 200 Time: 1.30 h Date: 25.10.2019
[MCQ- MCQ= 64*1.25=80, Written-120(deprt-100, Non-20)]
Solved by: Stack IT
1. Write a c program to find max price from
20 items.
#include<stdio.h>
int main () {
int items [20];
int i, max;
printf ("Enter the 20 items price:");
for (i=0; i<20; i++) {
scanf ("%d”, &items[i]);
}
max= items [0];
for (i=0; i<20; i++) {
if(max<items[i])
max=items[i];
}
printf ("Max prices is: %d”, max);
return 0;
}
2. 10 bits number taken randomly, find the
probability at least 1 bit is zero.
Total number = 210
= 1024
Successive number = 1023
Probability = (1023/1024) = 0.99
3. What protection do you provide for your
computer from malware?
Look at eight additional ways you can protect
yourself from viruses and malware:
a)Keep your software up to date.
b)Don't click on links within emails.
c)Use free antivirus software.
d)Back up your computer.
e)Use a strong password.
f) Use a firewall.
g)Minimize downloads.
h)Use a pop-up blocker.
4. A company needs key person for DBMS.
What is his/her duty as key person?
A company key person is database administrator
for DBMS.
Duty as key person:
a) Schema definition
b) Storage structure and access method
definition
c) Schema and physical organization
modification
d) Integrity constraint specification
5. (12345) base 10 to (?) base 8.
(12345)10 = (30071)8
6. Two OSI layers which known as "flow
Control" which are those? Write them and
explain.
Flow control is generally implemented on two
layers Datalink Layer (Layer 2) and Transport
Layer (Layer 4).
[Note: (i). Data link layer may provide flow control
"on the wire". (ii). Network layer provides flow
control between routers by ICMP. The end
terminals usually do not use the network layer
barely. IP does not provide flow control. (iii).
Transport layer, more specifically TCP provides
flow control by a backtracking algorithm while
UDP does not. TCP has various flow and
congestion avoiding protocols, such as TCP Vegas.
So, when routers have flow control problems, it is
handled in the network layer, when end points have
this problem, it's handled in the transport layer.]
S
t
a
c
k
I
T
J
o
b
S
o
l
u
t
i
o
n
Question Bank 2004- 2023 | Bank Special Stack IT Job Solution
Stack
IT
Question
Bank
|
01789741518,
01761719838
|
Buy
Book:
stackvaly.com
|
Online
Exam:
exam.stackvaly.com

7. What is firewall? Explain its work. Draw a
LAN network and a firewall where firewall
will be situated.
Firewall-A firewall is software used to maintain
the security of a private network. Firewalls block
unauthorized access to or from private networks
and are often employed to prevent unauthorized
Web users or illicit software from gaining access to
private networks Connected to the Internet. A
firewall may be implemented using hardware,
software, or a combination of both.
Firewalls generally use two or more of the
following methods:
a) Packet Filtering: Firewalls filter packets that
attempt to enter or leave a network and either
accept or reject them depending on the
predefined set of filter rules.
b) Application Gateway: The application
gateway technique employs security methods
applied to certain applications such as Telnet
and File Transfer Protocol servers.
c) Circuit-Level Gateway: A circuit-level
gateway applies these methods when a
connection such as Transmission Control
Protocol is established and packets start to
move.
d) Proxy Servers: Proxy servers can mask real
network addresses and intercept every
message that enters or leaves a network.
e) Stateful Inspection or Dynamic Packet
Filtering: This method compares not just the
header information, but also a packet’s most
important inbound and outbound data parts.
These are then compared to a trusted
information database for characteristic
matches. This determines whether the
information is authorized to cross the firewall
into the network.
8. Focus writing- combating of Cybercrime in
Bangladesh.
9. What is SOAP?
SOAP (Simple Object Access Protocol) is a
message protocol that allows distributed elements
of an application to communicate. SOAP can be
carried over a variety of lower-level protocols,
including the web-related Hypertext Transfer
Protocol (HTTP).
10. Suppose, you are implementing “Overdraft
Account (OD)” class using java for a
banking app. An OD type account is opened
with an approved loan limit (ex 100000/-).
The account holder can deposit any amount
of money in the OD account at any time.
S/he can draw an amount of money from the
account (acn) until sufficient acn balance.
S/he allowed to draw money beyond his/her
acn balance if the total over-drawing
amount remains within the loan limit. A
java sketch for OD acn is given bellow &
code is expected to run in multi-threading
mode. (same code with run by different
counter in the blank)
Code:
public class ODAccount extends
BankAccount {
double limit;
public void ODAccount (double
setLimit) {
$this->balance= 0; //super
class has balance property
$this->limit= setLimit;
}
public void depositMoney (double
deposit Amount) {
balance= balance+
depositAmount;
public void drawMoney
(double drawAmount) throws
ODLimit Exceeded {
if (balance –
drawAmount>=-1*limit)
balance= balance-
drawAmount;
else throw new
OD Limit Exceeded ();
}
S
t
a
c
k
I
T
J
o
b
S
o
l
u
t
i
o
n

More Related Content

What's hot

What's hot (20)

Computer Network notes (handwritten) UNIT 1
Computer Network notes (handwritten) UNIT 1Computer Network notes (handwritten) UNIT 1
Computer Network notes (handwritten) UNIT 1
 
Bangladesh telecommunication regulatory commision
Bangladesh telecommunication regulatory commisionBangladesh telecommunication regulatory commision
Bangladesh telecommunication regulatory commision
 
17. Recovery System in DBMS
17. Recovery System in DBMS17. Recovery System in DBMS
17. Recovery System in DBMS
 
Recovery techniques
Recovery techniquesRecovery techniques
Recovery techniques
 
DDBMS Paper with Solution
DDBMS Paper with SolutionDDBMS Paper with Solution
DDBMS Paper with Solution
 
Adbms lab manual
Adbms lab manualAdbms lab manual
Adbms lab manual
 
Dbms lab questions
Dbms lab questionsDbms lab questions
Dbms lab questions
 
Multiple Choice Questions on JAVA (object oriented programming) bank 2 -- bas...
Multiple Choice Questions on JAVA (object oriented programming) bank 2 -- bas...Multiple Choice Questions on JAVA (object oriented programming) bank 2 -- bas...
Multiple Choice Questions on JAVA (object oriented programming) bank 2 -- bas...
 
MYSQL.ppt
MYSQL.pptMYSQL.ppt
MYSQL.ppt
 
DBMS Unit - 7 - Transaction Processing
DBMS Unit - 7 - Transaction ProcessingDBMS Unit - 7 - Transaction Processing
DBMS Unit - 7 - Transaction Processing
 
Crash recovery in database
Crash recovery in databaseCrash recovery in database
Crash recovery in database
 
Dbms notes
Dbms notesDbms notes
Dbms notes
 
dbms notes.ppt
dbms notes.pptdbms notes.ppt
dbms notes.ppt
 
File system vs DBMS
File system vs DBMSFile system vs DBMS
File system vs DBMS
 
The Full Stack Web Development
The Full Stack Web DevelopmentThe Full Stack Web Development
The Full Stack Web Development
 
Specification-of-tokens
Specification-of-tokensSpecification-of-tokens
Specification-of-tokens
 
Transaction Properties in database | ACID Properties
Transaction Properties in database | ACID PropertiesTransaction Properties in database | ACID Properties
Transaction Properties in database | ACID Properties
 
Jdbc
JdbcJdbc
Jdbc
 
Join dependency
Join dependencyJoin dependency
Join dependency
 
Database
DatabaseDatabase
Database
 

Similar to Assistant Programmer, Bangladesh Bank

Managing microservices with Istio Service Mesh
Managing microservices with Istio Service MeshManaging microservices with Istio Service Mesh
Managing microservices with Istio Service MeshRafik HARABI
 
IRJET - Identification and Classification of IoT Devices in Various Appli...
IRJET -  	  Identification and Classification of IoT Devices in Various Appli...IRJET -  	  Identification and Classification of IoT Devices in Various Appli...
IRJET - Identification and Classification of IoT Devices in Various Appli...IRJET Journal
 
Banking and ATM networking reports
Banking and ATM networking reportsBanking and ATM networking reports
Banking and ATM networking reportsShakib Ansaar
 
Analysis Of Internet Protocol ( IP ) Datagrams
Analysis Of Internet Protocol ( IP ) DatagramsAnalysis Of Internet Protocol ( IP ) Datagrams
Analysis Of Internet Protocol ( IP ) DatagramsEmily Jones
 
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN AlgorithmIRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN AlgorithmIRJET Journal
 
IRJET- Proof of Document using Multichain and Ethereum
IRJET- Proof of Document using Multichain and EthereumIRJET- Proof of Document using Multichain and Ethereum
IRJET- Proof of Document using Multichain and EthereumIRJET Journal
 
COIT20262 Assignment 1 Term 1, 2018 Advanced Network Secur.docx
COIT20262 Assignment 1 Term 1, 2018 Advanced Network Secur.docxCOIT20262 Assignment 1 Term 1, 2018 Advanced Network Secur.docx
COIT20262 Assignment 1 Term 1, 2018 Advanced Network Secur.docxclarebernice
 
Network And Network Address Translation
Network And Network Address TranslationNetwork And Network Address Translation
Network And Network Address TranslationErin Moore
 
DECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORK
DECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORKDECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORK
DECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORKIRJET Journal
 
A study on practical uses of common Network protocols
A study on practical uses of common Network protocolsA study on practical uses of common Network protocols
A study on practical uses of common Network protocolsNeranjan Viduranga
 
Banking and ATM networking reports
Banking and ATM networking reportsBanking and ATM networking reports
Banking and ATM networking reportsShakib Ansaar
 
IRJET- Blockchain Technology a Literature Survey
IRJET- Blockchain Technology a Literature SurveyIRJET- Blockchain Technology a Literature Survey
IRJET- Blockchain Technology a Literature SurveyIRJET Journal
 
IOT introduction
IOT introductionIOT introduction
IOT introductionxinoe
 
Introduction-All 'bout IOT
Introduction-All 'bout IOTIntroduction-All 'bout IOT
Introduction-All 'bout IOTInxee
 

Similar to Assistant Programmer, Bangladesh Bank (20)

Managing microservices with Istio Service Mesh
Managing microservices with Istio Service MeshManaging microservices with Istio Service Mesh
Managing microservices with Istio Service Mesh
 
IRJET - Identification and Classification of IoT Devices in Various Appli...
IRJET -  	  Identification and Classification of IoT Devices in Various Appli...IRJET -  	  Identification and Classification of IoT Devices in Various Appli...
IRJET - Identification and Classification of IoT Devices in Various Appli...
 
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THINGCOMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
 
Banking and ATM networking reports
Banking and ATM networking reportsBanking and ATM networking reports
Banking and ATM networking reports
 
BANK MANAGEMENT SYSTEM report
BANK MANAGEMENT SYSTEM reportBANK MANAGEMENT SYSTEM report
BANK MANAGEMENT SYSTEM report
 
Analysis Of Internet Protocol ( IP ) Datagrams
Analysis Of Internet Protocol ( IP ) DatagramsAnalysis Of Internet Protocol ( IP ) Datagrams
Analysis Of Internet Protocol ( IP ) Datagrams
 
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN AlgorithmIRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
 
Cerita
CeritaCerita
Cerita
 
IRJET- Proof of Document using Multichain and Ethereum
IRJET- Proof of Document using Multichain and EthereumIRJET- Proof of Document using Multichain and Ethereum
IRJET- Proof of Document using Multichain and Ethereum
 
Cisco Activity
Cisco ActivityCisco Activity
Cisco Activity
 
Database Exam Help
Database Exam HelpDatabase Exam Help
Database Exam Help
 
Designing Internet of things
Designing Internet of thingsDesigning Internet of things
Designing Internet of things
 
COIT20262 Assignment 1 Term 1, 2018 Advanced Network Secur.docx
COIT20262 Assignment 1 Term 1, 2018 Advanced Network Secur.docxCOIT20262 Assignment 1 Term 1, 2018 Advanced Network Secur.docx
COIT20262 Assignment 1 Term 1, 2018 Advanced Network Secur.docx
 
Network And Network Address Translation
Network And Network Address TranslationNetwork And Network Address Translation
Network And Network Address Translation
 
DECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORK
DECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORKDECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORK
DECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORK
 
A study on practical uses of common Network protocols
A study on practical uses of common Network protocolsA study on practical uses of common Network protocols
A study on practical uses of common Network protocols
 
Banking and ATM networking reports
Banking and ATM networking reportsBanking and ATM networking reports
Banking and ATM networking reports
 
IRJET- Blockchain Technology a Literature Survey
IRJET- Blockchain Technology a Literature SurveyIRJET- Blockchain Technology a Literature Survey
IRJET- Blockchain Technology a Literature Survey
 
IOT introduction
IOT introductionIOT introduction
IOT introduction
 
Introduction-All 'bout IOT
Introduction-All 'bout IOTIntroduction-All 'bout IOT
Introduction-All 'bout IOT
 

More from Engr. Md. Jamal Uddin Rayhan

Bangladesh Bank Data entry control operator Question Solution.
Bangladesh Bank Data entry control operator Question Solution.Bangladesh Bank Data entry control operator Question Solution.
Bangladesh Bank Data entry control operator Question Solution.Engr. Md. Jamal Uddin Rayhan
 
BTCL Assistant Manager Previous Year Question by Stack IT Job Solution
BTCL Assistant Manager Previous Year Question by Stack IT Job SolutionBTCL Assistant Manager Previous Year Question by Stack IT Job Solution
BTCL Assistant Manager Previous Year Question by Stack IT Job SolutionEngr. Md. Jamal Uddin Rayhan
 
Combined 2 Bank Compiled Post: ADA Date: 25.09.2021 Taker: AUST
Combined 2 Bank Compiled Post: ADA Date: 25.09.2021  Taker: AUSTCombined 2 Bank Compiled Post: ADA Date: 25.09.2021  Taker: AUST
Combined 2 Bank Compiled Post: ADA Date: 25.09.2021 Taker: AUSTEngr. Md. Jamal Uddin Rayhan
 
Linux Command For Beginners 6 - copy commands for linux | BUET Pattern Job Pr...
Linux Command For Beginners 6 - copy commands for linux | BUET Pattern Job Pr...Linux Command For Beginners 6 - copy commands for linux | BUET Pattern Job Pr...
Linux Command For Beginners 6 - copy commands for linux | BUET Pattern Job Pr...Engr. Md. Jamal Uddin Rayhan
 

More from Engr. Md. Jamal Uddin Rayhan (8)

DESCO AE CSE Question Solution
DESCO AE CSE Question SolutionDESCO AE CSE Question Solution
DESCO AE CSE Question Solution
 
OSI Model Cheat Sheet
OSI Model Cheat SheetOSI Model Cheat Sheet
OSI Model Cheat Sheet
 
Bangladesh Bank Data entry control operator Question Solution.
Bangladesh Bank Data entry control operator Question Solution.Bangladesh Bank Data entry control operator Question Solution.
Bangladesh Bank Data entry control operator Question Solution.
 
BTCL Assistant Manager Previous Year Question by Stack IT Job Solution
BTCL Assistant Manager Previous Year Question by Stack IT Job SolutionBTCL Assistant Manager Previous Year Question by Stack IT Job Solution
BTCL Assistant Manager Previous Year Question by Stack IT Job Solution
 
Combined 2 Bank Compiled Post: ADA Date: 25.09.2021 Taker: AUST
Combined 2 Bank Compiled Post: ADA Date: 25.09.2021  Taker: AUSTCombined 2 Bank Compiled Post: ADA Date: 25.09.2021  Taker: AUST
Combined 2 Bank Compiled Post: ADA Date: 25.09.2021 Taker: AUST
 
Linux Command For Beginners 6 - copy commands for linux | BUET Pattern Job Pr...
Linux Command For Beginners 6 - copy commands for linux | BUET Pattern Job Pr...Linux Command For Beginners 6 - copy commands for linux | BUET Pattern Job Pr...
Linux Command For Beginners 6 - copy commands for linux | BUET Pattern Job Pr...
 
Titas gas sub-assistant engineer question pattern
Titas gas sub-assistant engineer question patternTitas gas sub-assistant engineer question pattern
Titas gas sub-assistant engineer question pattern
 
information security and backup system
information security and backup systeminformation security and backup system
information security and backup system
 

Recently uploaded

Application deck- Cyril Caudroy-2024.pdf
Application deck- Cyril Caudroy-2024.pdfApplication deck- Cyril Caudroy-2024.pdf
Application deck- Cyril Caudroy-2024.pdfCyril CAUDROY
 
AICTE PPT slide of Engineering college kr pete
AICTE PPT slide of Engineering college kr peteAICTE PPT slide of Engineering college kr pete
AICTE PPT slide of Engineering college kr peteshivubhavv
 
Black and White Minimalist Co Letter.pdf
Black and White Minimalist Co Letter.pdfBlack and White Minimalist Co Letter.pdf
Black and White Minimalist Co Letter.pdfpadillaangelina0023
 
LinkedIn for Your Job Search in April 2024
LinkedIn for Your Job Search in April 2024LinkedIn for Your Job Search in April 2024
LinkedIn for Your Job Search in April 2024Bruce Bennett
 
Jumark Morit Diezmo- Career portfolio- BPED 3A
Jumark Morit Diezmo- Career portfolio- BPED 3AJumark Morit Diezmo- Career portfolio- BPED 3A
Jumark Morit Diezmo- Career portfolio- BPED 3Ajumarkdiezmo1
 
8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR
8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR
8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCRdollysharma2066
 
Unlock Your Creative Potential: 7 Skills for Content Creator Evolution
Unlock Your Creative Potential: 7 Skills for Content Creator EvolutionUnlock Your Creative Potential: 7 Skills for Content Creator Evolution
Unlock Your Creative Potential: 7 Skills for Content Creator EvolutionRhazes Ghaisan
 
The Next Things To Immediately Do About Mating Press
The Next Things To Immediately Do About Mating PressThe Next Things To Immediately Do About Mating Press
The Next Things To Immediately Do About Mating Pressmatingpress170
 
Escorts Service Near Surya International Hotel, New Delhi |9873777170| Find H...
Escorts Service Near Surya International Hotel, New Delhi |9873777170| Find H...Escorts Service Near Surya International Hotel, New Delhi |9873777170| Find H...
Escorts Service Near Surya International Hotel, New Delhi |9873777170| Find H...nitagrag2
 
定制(SCU毕业证书)南十字星大学毕业证成绩单原版一比一
定制(SCU毕业证书)南十字星大学毕业证成绩单原版一比一定制(SCU毕业证书)南十字星大学毕业证成绩单原版一比一
定制(SCU毕业证书)南十字星大学毕业证成绩单原版一比一z xss
 
Storytelling, Ethics and Workflow in Documentary Photography
Storytelling, Ethics and Workflow in Documentary PhotographyStorytelling, Ethics and Workflow in Documentary Photography
Storytelling, Ethics and Workflow in Documentary PhotographyOrtega Alikwe
 
LinkedIn Strategic Guidelines April 2024
LinkedIn Strategic Guidelines April 2024LinkedIn Strategic Guidelines April 2024
LinkedIn Strategic Guidelines April 2024Bruce Bennett
 
Digital Marketing Training Institute in Mohali, India
Digital Marketing Training Institute in Mohali, IndiaDigital Marketing Training Institute in Mohali, India
Digital Marketing Training Institute in Mohali, IndiaDigital Discovery Institute
 
办理学位证(Massey证书)新西兰梅西大学毕业证成绩单原版一比一
办理学位证(Massey证书)新西兰梅西大学毕业证成绩单原版一比一办理学位证(Massey证书)新西兰梅西大学毕业证成绩单原版一比一
办理学位证(Massey证书)新西兰梅西大学毕业证成绩单原版一比一A SSS
 
办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改
办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改
办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改yuu sss
 
Escort Service Andheri WhatsApp:+91-9833363713
Escort Service Andheri WhatsApp:+91-9833363713Escort Service Andheri WhatsApp:+91-9833363713
Escort Service Andheri WhatsApp:+91-9833363713Riya Pathan
 
Gurgaon Call Girls: Free Delivery 24x7 at Your Doorstep G.G.N = 8377087607
Gurgaon Call Girls: Free Delivery 24x7 at Your Doorstep G.G.N = 8377087607Gurgaon Call Girls: Free Delivery 24x7 at Your Doorstep G.G.N = 8377087607
Gurgaon Call Girls: Free Delivery 24x7 at Your Doorstep G.G.N = 8377087607dollysharma2066
 
定制英国克兰菲尔德大学毕业证成绩单原版一比一
定制英国克兰菲尔德大学毕业证成绩单原版一比一定制英国克兰菲尔德大学毕业证成绩单原版一比一
定制英国克兰菲尔德大学毕业证成绩单原版一比一z zzz
 
原版定制卡尔加里大学毕业证(UC毕业证)留信学历认证
原版定制卡尔加里大学毕业证(UC毕业证)留信学历认证原版定制卡尔加里大学毕业证(UC毕业证)留信学历认证
原版定制卡尔加里大学毕业证(UC毕业证)留信学历认证diploma001
 
办理老道明大学毕业证成绩单|购买美国ODU文凭证书
办理老道明大学毕业证成绩单|购买美国ODU文凭证书办理老道明大学毕业证成绩单|购买美国ODU文凭证书
办理老道明大学毕业证成绩单|购买美国ODU文凭证书saphesg8
 

Recently uploaded (20)

Application deck- Cyril Caudroy-2024.pdf
Application deck- Cyril Caudroy-2024.pdfApplication deck- Cyril Caudroy-2024.pdf
Application deck- Cyril Caudroy-2024.pdf
 
AICTE PPT slide of Engineering college kr pete
AICTE PPT slide of Engineering college kr peteAICTE PPT slide of Engineering college kr pete
AICTE PPT slide of Engineering college kr pete
 
Black and White Minimalist Co Letter.pdf
Black and White Minimalist Co Letter.pdfBlack and White Minimalist Co Letter.pdf
Black and White Minimalist Co Letter.pdf
 
LinkedIn for Your Job Search in April 2024
LinkedIn for Your Job Search in April 2024LinkedIn for Your Job Search in April 2024
LinkedIn for Your Job Search in April 2024
 
Jumark Morit Diezmo- Career portfolio- BPED 3A
Jumark Morit Diezmo- Career portfolio- BPED 3AJumark Morit Diezmo- Career portfolio- BPED 3A
Jumark Morit Diezmo- Career portfolio- BPED 3A
 
8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR
8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR
8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR
 
Unlock Your Creative Potential: 7 Skills for Content Creator Evolution
Unlock Your Creative Potential: 7 Skills for Content Creator EvolutionUnlock Your Creative Potential: 7 Skills for Content Creator Evolution
Unlock Your Creative Potential: 7 Skills for Content Creator Evolution
 
The Next Things To Immediately Do About Mating Press
The Next Things To Immediately Do About Mating PressThe Next Things To Immediately Do About Mating Press
The Next Things To Immediately Do About Mating Press
 
Escorts Service Near Surya International Hotel, New Delhi |9873777170| Find H...
Escorts Service Near Surya International Hotel, New Delhi |9873777170| Find H...Escorts Service Near Surya International Hotel, New Delhi |9873777170| Find H...
Escorts Service Near Surya International Hotel, New Delhi |9873777170| Find H...
 
定制(SCU毕业证书)南十字星大学毕业证成绩单原版一比一
定制(SCU毕业证书)南十字星大学毕业证成绩单原版一比一定制(SCU毕业证书)南十字星大学毕业证成绩单原版一比一
定制(SCU毕业证书)南十字星大学毕业证成绩单原版一比一
 
Storytelling, Ethics and Workflow in Documentary Photography
Storytelling, Ethics and Workflow in Documentary PhotographyStorytelling, Ethics and Workflow in Documentary Photography
Storytelling, Ethics and Workflow in Documentary Photography
 
LinkedIn Strategic Guidelines April 2024
LinkedIn Strategic Guidelines April 2024LinkedIn Strategic Guidelines April 2024
LinkedIn Strategic Guidelines April 2024
 
Digital Marketing Training Institute in Mohali, India
Digital Marketing Training Institute in Mohali, IndiaDigital Marketing Training Institute in Mohali, India
Digital Marketing Training Institute in Mohali, India
 
办理学位证(Massey证书)新西兰梅西大学毕业证成绩单原版一比一
办理学位证(Massey证书)新西兰梅西大学毕业证成绩单原版一比一办理学位证(Massey证书)新西兰梅西大学毕业证成绩单原版一比一
办理学位证(Massey证书)新西兰梅西大学毕业证成绩单原版一比一
 
办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改
办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改
办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改
 
Escort Service Andheri WhatsApp:+91-9833363713
Escort Service Andheri WhatsApp:+91-9833363713Escort Service Andheri WhatsApp:+91-9833363713
Escort Service Andheri WhatsApp:+91-9833363713
 
Gurgaon Call Girls: Free Delivery 24x7 at Your Doorstep G.G.N = 8377087607
Gurgaon Call Girls: Free Delivery 24x7 at Your Doorstep G.G.N = 8377087607Gurgaon Call Girls: Free Delivery 24x7 at Your Doorstep G.G.N = 8377087607
Gurgaon Call Girls: Free Delivery 24x7 at Your Doorstep G.G.N = 8377087607
 
定制英国克兰菲尔德大学毕业证成绩单原版一比一
定制英国克兰菲尔德大学毕业证成绩单原版一比一定制英国克兰菲尔德大学毕业证成绩单原版一比一
定制英国克兰菲尔德大学毕业证成绩单原版一比一
 
原版定制卡尔加里大学毕业证(UC毕业证)留信学历认证
原版定制卡尔加里大学毕业证(UC毕业证)留信学历认证原版定制卡尔加里大学毕业证(UC毕业证)留信学历认证
原版定制卡尔加里大学毕业证(UC毕业证)留信学历认证
 
办理老道明大学毕业证成绩单|购买美国ODU文凭证书
办理老道明大学毕业证成绩单|购买美国ODU文凭证书办理老道明大学毕业证成绩单|购买美国ODU文凭证书
办理老道明大学毕业证成绩单|购买美国ODU文凭证书
 

Assistant Programmer, Bangladesh Bank

  • 1. Question Bank 2004- 2023 | Bank Special Stack IT Job Solution Stack IT Question Bank | 01789741518, 01761719838 | Buy Book: stackvaly.com | Online Exam: exam.stackvaly.com largest spender and beneficiary from information technology. This endeavors to relate the international trends in it with the Indian banking industry. 2 Bangladesh Bank Exam Taker: IBA Assistant Programmer Marks: 200 Time: 1.30 h Date: 25.10.2019 [MCQ- MCQ= 64*1.25=80, Written-120(deprt-100, Non-20)] Solved by: Stack IT 1. Write a c program to find max price from 20 items. #include<stdio.h> int main () { int items [20]; int i, max; printf ("Enter the 20 items price:"); for (i=0; i<20; i++) { scanf ("%d”, &items[i]); } max= items [0]; for (i=0; i<20; i++) { if(max<items[i]) max=items[i]; } printf ("Max prices is: %d”, max); return 0; } 2. 10 bits number taken randomly, find the probability at least 1 bit is zero. Total number = 210 = 1024 Successive number = 1023 Probability = (1023/1024) = 0.99 3. What protection do you provide for your computer from malware? Look at eight additional ways you can protect yourself from viruses and malware: a)Keep your software up to date. b)Don't click on links within emails. c)Use free antivirus software. d)Back up your computer. e)Use a strong password. f) Use a firewall. g)Minimize downloads. h)Use a pop-up blocker. 4. A company needs key person for DBMS. What is his/her duty as key person? A company key person is database administrator for DBMS. Duty as key person: a) Schema definition b) Storage structure and access method definition c) Schema and physical organization modification d) Integrity constraint specification 5. (12345) base 10 to (?) base 8. (12345)10 = (30071)8 6. Two OSI layers which known as "flow Control" which are those? Write them and explain. Flow control is generally implemented on two layers Datalink Layer (Layer 2) and Transport Layer (Layer 4). [Note: (i). Data link layer may provide flow control "on the wire". (ii). Network layer provides flow control between routers by ICMP. The end terminals usually do not use the network layer barely. IP does not provide flow control. (iii). Transport layer, more specifically TCP provides flow control by a backtracking algorithm while UDP does not. TCP has various flow and congestion avoiding protocols, such as TCP Vegas. So, when routers have flow control problems, it is handled in the network layer, when end points have this problem, it's handled in the transport layer.] S t a c k I T J o b S o l u t i o n
  • 2. Question Bank 2004- 2023 | Bank Special Stack IT Job Solution Stack IT Question Bank | 01789741518, 01761719838 | Buy Book: stackvaly.com | Online Exam: exam.stackvaly.com 7. What is firewall? Explain its work. Draw a LAN network and a firewall where firewall will be situated. Firewall-A firewall is software used to maintain the security of a private network. Firewalls block unauthorized access to or from private networks and are often employed to prevent unauthorized Web users or illicit software from gaining access to private networks Connected to the Internet. A firewall may be implemented using hardware, software, or a combination of both. Firewalls generally use two or more of the following methods: a) Packet Filtering: Firewalls filter packets that attempt to enter or leave a network and either accept or reject them depending on the predefined set of filter rules. b) Application Gateway: The application gateway technique employs security methods applied to certain applications such as Telnet and File Transfer Protocol servers. c) Circuit-Level Gateway: A circuit-level gateway applies these methods when a connection such as Transmission Control Protocol is established and packets start to move. d) Proxy Servers: Proxy servers can mask real network addresses and intercept every message that enters or leaves a network. e) Stateful Inspection or Dynamic Packet Filtering: This method compares not just the header information, but also a packet’s most important inbound and outbound data parts. These are then compared to a trusted information database for characteristic matches. This determines whether the information is authorized to cross the firewall into the network. 8. Focus writing- combating of Cybercrime in Bangladesh. 9. What is SOAP? SOAP (Simple Object Access Protocol) is a message protocol that allows distributed elements of an application to communicate. SOAP can be carried over a variety of lower-level protocols, including the web-related Hypertext Transfer Protocol (HTTP). 10. Suppose, you are implementing “Overdraft Account (OD)” class using java for a banking app. An OD type account is opened with an approved loan limit (ex 100000/-). The account holder can deposit any amount of money in the OD account at any time. S/he can draw an amount of money from the account (acn) until sufficient acn balance. S/he allowed to draw money beyond his/her acn balance if the total over-drawing amount remains within the loan limit. A java sketch for OD acn is given bellow & code is expected to run in multi-threading mode. (same code with run by different counter in the blank) Code: public class ODAccount extends BankAccount { double limit; public void ODAccount (double setLimit) { $this->balance= 0; //super class has balance property $this->limit= setLimit; } public void depositMoney (double deposit Amount) { balance= balance+ depositAmount; public void drawMoney (double drawAmount) throws ODLimit Exceeded { if (balance – drawAmount>=-1*limit) balance= balance- drawAmount; else throw new OD Limit Exceeded (); } S t a c k I T J o b S o l u t i o n