SlideShare a Scribd company logo
1 of 5
Download to read offline
Question Bank 2004- 2023 | Bank Special Stack IT Job Solution
Stack
IT
Question
Bank
|
01789741518,
01761719838
|
Buy
Book:
stackvaly.com
|
Online
Exam:
exam.stackvaly.com

1
Bangladesh Bank
Exam Taker: BUET
Assistant Maintenance Engineer(AME)
Marks: 150 Time: 1.30 h Date: 21.09.2019
[ সকল প্রশ্নের উত্তর দিশ্নে হশ্নে ]
Solved by: Stack IT
1. What is the distributed DBMS and describe
its feature?
A distributed database management system
(DDBMS) is a collection of multiple, logically
interrelated databases distributed over a computer
network. They provided a mechanism that makes
the distribution of data transparent to users.
Feature of DDBMS is given bellow:
a) It is used to create, retrieve, update and
delete distributed databases.
b) It is designed for heterogeneous database
platforms.
c) It maintains confidentiality and data
integrity of the databases.
d) It ensures that the data modified at any site
is universally updated.
e) Location independent
f) Distributed transaction management
g) Distributed query processing
h) Hardware & Network independent
i) Operating system independent
j) Transaction transparency
k) DBMS independent.
2. How can we test ATM in distributed
banking system?
We can test ATM in distributed banking system by
following criteria:
a) Withdrawing money less than the account
balance.
b) Withdrawing money greater than the
account balance.
c) Withdrawing money equal to the account
balance.
d) Withdrawing money from an ATM and
from the internet at the same time.
e) Withdrawing money when the connection
to the bank’s networks is lost.
f) Withdrawing money from multiple ATMs
simultaneously.
g) Check the balance available.
h) Make a deposit at an ATM.
i) Try to enter invalid pin more than 3 times
and see if the account gets locked.
j) Try quick cash with drawl.
k) Try to buy stamps.
3. What is the importance of application
framework in web application
development?
a) Investing in the task, not in the
technology: This is the essential principle
of a framework, not having to reinvent the
wheel and doing away with foreboding, low
value- added tasks, for instance, the
development of generic components in
order to fully focus on the business rules.
b) Guaranteed upgradability &
maintenance: In the longer term, a
framework makes sure the longevity of your
applications. If a development team works
as they please, only that team will be able to
maintain and upgrade the application with
ease.
c) Open source: Being open source means
that frameworks are cost effective for both
the customer and developer. This doesn’t
mean that they aren’t of good quality. Most
of the well-known web frameworks used by
developers are free for use.
d) Efficiency: Efficiency is another vital
advantage for web developers. This is
because frameworks eliminate the need to
write a lot of repetitive code allowing
developers to build websites and
applications much quicker.
e) Integration: This is one of the most useful
features that have the ability to permit
developers to link with other tools such as
S
t
a
c
k
I
T
J
o
b
S
o
l
u
t
i
o
n
Question Bank 2004- 2023 | Bank Special Stack IT Job Solution
Stack
IT
Question
Bank
|
01789741518,
01761719838
|
Buy
Book:
stackvaly.com
|
Online
Exam:
exam.stackvaly.com

databases to the framework. One of the
most common criticisms levied against
frameworks is that they tend to make the
code a lot more complicated than it should
be. Also, rather than the reduced
development time claimed by its
proponents, frameworks actually result in a
more time- consuming process since users
will have to spend more time learning to use
them.
4. Differentiate between micro and macro
(Monolithic) kernel. What are the sub-
components of I/O manager in Windows
NT?
Micro kernel is a kernel which run services those
are minimal for operating system performance. In
this kernel all other operations are performed by
processor.
Macro kernel is a combination of micro and
monolithic kernel. In monolithic kernel all
operating system code is in single executable
image.
Sub-components of I/O manager:
a) Network redirector / Server
b) Cache manager
c) File systems
d) Network driver
e) Device driver
5. Write the short note on Node, Hub,
Backbone, Router and Gateway.
a) Node: Any system or device connected to
a network is called a node. A node is any
physical device within a network of other
tools that’s able to send, receive or forward
information. e.g. personal computer,
modem, switch, hub, server etc.
b) Hub: A Hub is a network connectivity
device that broadcasts data to every
computer or Ethernet based device
connected to it.
c) Backbone: A backbone is the part of the
computer network infrastructure that
interconnects different networks and
provides a path for exchange of data
between these different networks. A
backbone may interconnect different local
area networks in offices, campuses or
buildings.
d) Router: A router is a network connectivity
device that forwards data packets between
computer networks based on IP addresses.
Router is mainly network layer (layer-3)
device.
e) Gateway: A gateway is a component that
is part of two networks, which use different
protocols. It may be a router, firewall,
server or other device that enables traffic
to flow in and out of the network.
6. Write the categories of computer
architecture. What are the stages of DLX
pipelines?
Computer architecture: Computer architecture
refers to how a computer system is designed and
what technologies it is compatible with.
There are three categories of computer
architecture:
a) System design: This includes all hardware
components in the system, including data
processors aside from the CPU, such as the
graphics processing unit and direct memory
access. It also includes memory controllers,
data paths and miscellaneous things like
multiprocessing and virtualization.
b) Instruction set architecture (ISA): This is
the embedded programming language of the
central processing unit. It defines the CPU’s
functions and capabilities based on what
programming it can perform or process. This
includes the word size, processor register
types, memory addressing modes, data
formats and the instruction set that
programmers use.
c) Microarchitecture: This type of architecture
defines the data paths, data processing and
storage elements, as well as how they should
be implemented in the ISA.
DLX pipeline consists of five stages:
a) Instruction Fetch (IF): The instruction
fetch stage fetches the next instruction
from memory using the address in the PC
(program counter).
S
t
a
c
k
I
T
J
o
b
S
o
l
u
t
i
o
n
Question Bank 2004- 2023 | Bank Special Stack IT Job Solution
Stack
IT
Question
Bank
|
01789741518,
01761719838
|
Buy
Book:
stackvaly.com
|
Online
Exam:
exam.stackvaly.com

b) Instruction Decode (ID): The instruction
decode stage decodes the instruction in the
IR, calculates the next PC and reads any
operands required from the register file.
c) Execute (EX): The execute stage executes
the instruction. In fact, all ALU operations
are done in this stage.
d) Memory (MEM): The memory access
stage performs any memory access
required by the current instruction, so for
loads, it would load an operand from
memory. For stores it would store an
operand into memory. For all other
instructions it would do nothing.
e) Write Back (WB): For instructions that
have a result (a destination register) the
write back writes this back to the register
file. Note that this includes nearly all
instructions, except nops (no-operation)
and stores.
7. Differentiate among risk, threat and
vulnerability. What is SSL and TSL?
a) Risk: Risk is defined as the potential for
loss or damage of an asset when a threat
exploits a vulnerability. Examples of risk
include financial losses, loss of privacy,
reputational damage, legal implications
and even loss of life. Risk can also be
defined as: Risk = Threat probability *
potential loss / impact.
b) Threat: Anything that can exploit
vulnerability, intentionally or accidentally
and obtain damage or destroy an asset.
Common threats include things like:
i. An activist tries to steal data from
your website.
ii. A fire starts in your data center
iii. An administrator accidentally
turns off your website AWS
instance.
iv. A flood hits your headquarters
v. An insider tries to sell your
corporate secrets to a competitor
c) Vulnerability: Vulnerability refers to
weaknesses or gaps in a security program
that can be exploited by threats to gain
unauthorized access to an asset.
Common examples of
vulnerabilities include:
i. SQL injection
ii. Cross site scripting (XSS)
iii. Broken authentication and session
management
iv. Security misconfiguration
v. Insecure cryptographic storage
vi. Failure to restrict URL access
vii. Insufficient transport layer
protection
viii. Insecure direct object references
d) SSL: Secure Socket Layer (SSL) is a
standard protocol used to establish a
secured and an encrypted connection
between a server and the browser. SSL is
most commonly seen in payment and
banking web sites.
e) TLS: Transport Layer Security (TLS) is a
protocol that provides communication
security between client / server
applications that communicate with each
other over the internet. It enables privacy,
integrity and protection for the data that’s
transmitted between different nodes on the
internet.
8. Four 1 kbps connections are multiplexed
together. A unit is 1 bit. Find (A) the
duration of 1 bit before multiplexing (B) the
transmission rate of the link (C) the
duration of a time slot and (D) the duration
of a frame.
a) The duration of 1 bit is 1/1 Kbps, or 0.001
s (1 ms).
b) The rate of the link is 4 Kbps.
c) The duration of each time slot 1/4 ms or
250 us.
d) The duration of a frame 1 ms.
9. How can you implement AND gate & OR
gate using CMOS NAND & NOR gate?
a) CMOS two-input NAND and AND
gates:
S
t
a
c
k
I
T
J
o
b
S
o
l
u
t
i
o
n
Question Bank 2004- 2023 | Bank Special Stack IT Job Solution
Stack
IT
Question
Bank
|
01789741518,
01761719838
|
Buy
Book:
stackvaly.com
|
Online
Exam:
exam.stackvaly.com

Circuit Description: This applet demonstrates the
static two-input NAND and AND gates in CMOS
technology. Click the input switches or type the
('a','b') and ('c','d') bindkeys to control the two
gates.
The two-input NAND2 gate shown on the left is
built from four transistors. The series-connection
of the two n-channel transistors between GND and
the gate-output ensures that the gate-output is only
driven low (logical 0) when both gate inputs A or
B are high (logical 1). The complementary parallel
connection of the two transistors between VCC and
gate-output means that the gate-output is driven
high (logical 1) when one or both gate inputs are
low (logical 0). The net result is the logical NAND
function:
NAND AND
A B Y A B Y
0 0 1 0 0 0
0 1 1 0 1 0
1 0 1 1 0 0
1 1 0 1 1 1
As shown on the right, the corresponding AND
gate is constructed from the NAND followed by a
standard static inverter.
b) CMOS two-input NOR and OR gates:
Circuit Description: This applet demonstrates the
static two-input NOR and OR gates in CMOS
technology. Click the input switches or type the
('a','b') and ('c','d') bindkeys to control the two
gates.
The two-input NOR2 gate shown on the left is built
from four transistors. The parallel connection of the
two n-channel transistors between GND and the
gate-output ensures that the gate-output is driven
low (logical 0) when either gate input A or B is high
(logical 1). The complementary series-connection
of the two transistors between VCC and gate-
output means that the gate-output is driven high
(logical 1) when both gate inputs are low (logical
0). The net result is the logical NOR function:
NOR OR
A B Y A B Y
0 0 1 0 0 0
0 1 0 0 1 1
1 0 0 1 0 1
1 1 0 1 1 1
As shown on the right, the corresponding OR
gate is constructed from the NOR2 followed by
a standard static inverter.
10. A 3-phase 12 pole alternator running at 500
rpm, supplying power to a 8 pole induction
motor. If slip is 3%, what is the full load speed
of the motor?
Synchronous machine is operating at 500 rpm
⇒ 500 = 120 × f / 12 = 50 Hz
Induction machine synchronous speed
= (120 × 50)/ 8 = 750 rpm
Rotor full load speed, Nr = Ns (1 – s)
= 750 (1 - 0.03) = 727.5 rpm
11. The distance between Town X and Town Y
is twice the distance between Town X and Town
Z. The distance between Town Z and Town W
is 2/3 the distance between Town Z and Town X.
If the distance between Town Z and Town W is
18 miles, how far is Town X from Town Y?
Let us represent the respective distances using the
names of the towns.
 Let distance between town X and town Y
= XY;
 distance between town X and town Z =
XZ,
 distance between town Z and town W =
WZ.
S
t
a
c
k
I
T
J
o
b
S
o
l
u
t
i
o
n
Question Bank 2004- 2023 | Bank Special Stack IT Job Solution
Stack
IT
Question
Bank
|
01789741518,
01761719838
|
Buy
Book:
stackvaly.com
|
Online
Exam:
exam.stackvaly.com

Let us now connect these unknown using
equations.
 XY = 2 XZ, which can be equation 1.
WZ = 2/3 XZ, which can be equation 2.
The question says that WZ = 18. Substituting this
in equation 2,
18 = 2/3XZ which yields us XZ = 27. Substituting
this in equation 1, we have,
XY = 2*27 = 54.
Therefore, town X is 54 km away from town Y.
12. A company employs 20 workers for every 3
managers, and 5 managers for every director. If
the total number of employees at the company is
between 300 and 400, what is the number of
managers who work at the company?
Company employs 20 workers for every 3
managers => W : M = 20 : 3
Company employs 5 managers for every 1
director => M: D = 5: 1
Combined ratio would be W : M : D = 100 : 15 : 3
and the total number of employees at the company
is between 300 and 400
W : M : D = 100 : 15 : 3
means total of 118 people
W : M : D = 200 : 30 : 6
means total of 236 people
W : M : D = 300 : 45 : 9
means total of 354 people (total between 300
and 400)
W : M : D = 400 : 60 :12
means total of 472 people
13. Focus writing in English: Impact of
information technology in banking system
Banking environment has become highly
competitive today. Information technology refers
to the acquisition, processing, storage and
dissemination of all types of information using
computer technology and telecommunication
systems. Information technology architecture is an
integrated framework for acquiring and evolving
IT to achieve strategic goals. These technologies
are used for the input, storage, processing and
communication of information. Information
technology includes ancillary equipment, software,
firmware and similar procedures, services etc.
Modern high throughput technologies are
providing vast amounts of the sequences,
expression and functional data for genes and
protein. Recent developments of banking sector in
Bangladesh are Internet, Society for worldwide
inter-bank financial telecommunications (SWIFT),
Automated Teller Machine (ATM), Cash
dispensers, Electronic clearing service, Bank Net,
Chip card, Phone banking, Tele-banking, Internet
banking, Mobile banking, Anywhere banking,
Voice mail, E-banking Etc., The basic need of
Information Technology (IT) in Banking Sector are
Meeting Internal Requirements, Effective in Data
Handling, Extending Customer Services, Creative
Support for New Product Development, End-user
Development of the Non-technical Staff. Emerging
trends of information technology in banking sector
are Outsourcing, Integration, Distinctive Edge, IT
as Profit Centre, Prospering in Down Market.
Challenges faced by Bangladesh banking scenario
in Bangladesh are Meet customer expectations on
service and facility offered by the bank, Customer
retention, Managing the spread and sustain the
operating profit, Retaining the current market share
in the industry and the improving the same,
Completion from other players in the banking
industry. Other Information Technology enables
sophisticated product development, better market
infrastructure, implementation of reliable
techniques for control of risks and helps the
financial intermediaries to reach geographically
distant and diversified markets. Internet has
significantly influenced delivery channels of the
banks. Internet has emerged as an important
medium for delivery of banking products and
services. Information, communication and
networking, achieving inter branch connectivity,
moving towards Real Time gross settlement
(RTGS) environment the forecasting of liquidity by
building real time databases, The shift from
traditional banking to e-banking is changing
customer’s expectations. For a country like India,
which is one of the most promising emerging
markets, such isolation is nearly impossible. More
particularly in the area of Information technology,
where India has definitely an edge over its
competitors, remaining away or uniformity of the
world trends is untenable. Financial sector in
general and banking industry in particular is the
S
t
a
c
k
I
T
J
o
b
S
o
l
u
t
i
o
n

More Related Content

What's hot

Bangladesh Bank Assistant Programmer Question and Solution.pdf
Bangladesh Bank Assistant Programmer Question and Solution.pdfBangladesh Bank Assistant Programmer Question and Solution.pdf
Bangladesh Bank Assistant Programmer Question and Solution.pdfRadhio's IT Solution
 
Assembly language solution
Assembly language  solutionAssembly language  solution
Assembly language solutionAhsan Riaz
 
Bcic exam question solution 2021
Bcic exam question solution 2021Bcic exam question solution 2021
Bcic exam question solution 2021MohonDas
 
فتاوی شامی مترجم جلد 04 .pdf
فتاوی شامی مترجم جلد 04 .pdfفتاوی شامی مترجم جلد 04 .pdf
فتاوی شامی مترجم جلد 04 .pdfFaizan ali Siddiqui
 
CCNA-2 SRWE Mod-12 WLAN Concepts
CCNA-2 SRWE Mod-12 WLAN ConceptsCCNA-2 SRWE Mod-12 WLAN Concepts
CCNA-2 SRWE Mod-12 WLAN ConceptsMukesh Chinta
 
Ministry of food all previous question solution
Ministry of food all previous question solutionMinistry of food all previous question solution
Ministry of food all previous question solutionItmona
 
كتاب القاعدة النورانية
كتاب القاعدة النورانية كتاب القاعدة النورانية
كتاب القاعدة النورانية انتصار مراد
 
Medhufushi Island Resort Experience Certificate
Medhufushi Island Resort Experience CertificateMedhufushi Island Resort Experience Certificate
Medhufushi Island Resort Experience CertificateGyan Ranjan
 
EY Promotion Letter.PDF
EY Promotion Letter.PDFEY Promotion Letter.PDF
EY Promotion Letter.PDFMuhammed Baqir
 
Dbbl probationary-officer-software-job-exam-question
Dbbl probationary-officer-software-job-exam-questionDbbl probationary-officer-software-job-exam-question
Dbbl probationary-officer-software-job-exam-questionItmona
 

What's hot (20)

Bangladesh Bank Assistant Programmer Question and Solution.pdf
Bangladesh Bank Assistant Programmer Question and Solution.pdfBangladesh Bank Assistant Programmer Question and Solution.pdf
Bangladesh Bank Assistant Programmer Question and Solution.pdf
 
NIIT docs
NIIT docsNIIT docs
NIIT docs
 
Easiest and efficient methods of spoken english
Easiest and efficient methods of spoken englishEasiest and efficient methods of spoken english
Easiest and efficient methods of spoken english
 
Assembly language solution
Assembly language  solutionAssembly language  solution
Assembly language solution
 
Price list cable brb
Price list cable brbPrice list cable brb
Price list cable brb
 
شهادة خبرة 3
شهادة خبرة 3شهادة خبرة 3
شهادة خبرة 3
 
Bengali proverb with english translation
Bengali proverb with english translationBengali proverb with english translation
Bengali proverb with english translation
 
Bcic exam question solution 2021
Bcic exam question solution 2021Bcic exam question solution 2021
Bcic exam question solution 2021
 
فتاوی شامی مترجم جلد 04 .pdf
فتاوی شامی مترجم جلد 04 .pdfفتاوی شامی مترجم جلد 04 .pdf
فتاوی شامی مترجم جلد 04 .pdf
 
CCNA-2 SRWE Mod-12 WLAN Concepts
CCNA-2 SRWE Mod-12 WLAN ConceptsCCNA-2 SRWE Mod-12 WLAN Concepts
CCNA-2 SRWE Mod-12 WLAN Concepts
 
Ministry of food all previous question solution
Ministry of food all previous question solutionMinistry of food all previous question solution
Ministry of food all previous question solution
 
كتاب القاعدة النورانية
كتاب القاعدة النورانية كتاب القاعدة النورانية
كتاب القاعدة النورانية
 
Medhufushi Island Resort Experience Certificate
Medhufushi Island Resort Experience CertificateMedhufushi Island Resort Experience Certificate
Medhufushi Island Resort Experience Certificate
 
Most common words you should know volume 05
Most common words you should know volume 05 Most common words you should know volume 05
Most common words you should know volume 05
 
EY Promotion Letter.PDF
EY Promotion Letter.PDFEY Promotion Letter.PDF
EY Promotion Letter.PDF
 
Current affairs bcs special hd
Current affairs bcs special hdCurrent affairs bcs special hd
Current affairs bcs special hd
 
Most common words you should know volume 06 academic vocabulary
Most common words you should know volume 06 academic vocabularyMost common words you should know volume 06 academic vocabulary
Most common words you should know volume 06 academic vocabulary
 
BS Degree
BS DegreeBS Degree
BS Degree
 
Dbbl probationary-officer-software-job-exam-question
Dbbl probationary-officer-software-job-exam-questionDbbl probationary-officer-software-job-exam-question
Dbbl probationary-officer-software-job-exam-question
 
конспект ргв
конспект ргвконспект ргв
конспект ргв
 

Similar to Bangladesh Bank Assistant Maintenance Engineer Question Solution.

Privacy Preservation in cloud Environment using AES Algorithm
Privacy Preservation in cloud Environment using AES AlgorithmPrivacy Preservation in cloud Environment using AES Algorithm
Privacy Preservation in cloud Environment using AES AlgorithmIRJET Journal
 
What are the security requirements and challenges of Grid and Cloud .pdf
What are the security requirements and challenges of Grid and Cloud .pdfWhat are the security requirements and challenges of Grid and Cloud .pdf
What are the security requirements and challenges of Grid and Cloud .pdfarishmarketing21
 
Essay On Active Directory
Essay On Active DirectoryEssay On Active Directory
Essay On Active DirectoryTammy Moncrief
 
lec1.pptx
lec1.pptxlec1.pptx
lec1.pptxMusab58
 
DELL EMC DEA-1TT5 Updated Dumps 2023
DELL EMC DEA-1TT5 Updated Dumps 2023DELL EMC DEA-1TT5 Updated Dumps 2023
DELL EMC DEA-1TT5 Updated Dumps 2023VictoriaMeisel
 
An Exploration of Grid Computing to be Utilized in Teaching and Research at TU
An Exploration of Grid Computing to be Utilized in Teaching and Research at TUAn Exploration of Grid Computing to be Utilized in Teaching and Research at TU
An Exploration of Grid Computing to be Utilized in Teaching and Research at TUEswar Publications
 
Custom Software Development Checklist by Michael Cordova
Custom Software Development Checklist by Michael CordovaCustom Software Development Checklist by Michael Cordova
Custom Software Development Checklist by Michael Cordovahoolikar77
 
Analysis Of Internet Protocol ( IP ) Datagrams
Analysis Of Internet Protocol ( IP ) DatagramsAnalysis Of Internet Protocol ( IP ) Datagrams
Analysis Of Internet Protocol ( IP ) DatagramsEmily Jones
 
Consider introducing the overall objective of the network design/tutorialoutlet
Consider introducing the overall objective of the network design/tutorialoutletConsider introducing the overall objective of the network design/tutorialoutlet
Consider introducing the overall objective of the network design/tutorialoutletPittock
 
thilaganga journal 1
thilaganga journal 1thilaganga journal 1
thilaganga journal 1thilaganga
 
Blockchain solution architecture deliverable
Blockchain solution architecture deliverableBlockchain solution architecture deliverable
Blockchain solution architecture deliverableSarmad Ibrahim
 
Question 1The OSI model has seven layers where each layer pe.docx
Question 1The OSI model has seven layers where each layer pe.docxQuestion 1The OSI model has seven layers where each layer pe.docx
Question 1The OSI model has seven layers where each layer pe.docxssuser774ad41
 
EDT 323 Internet and Intranet 2022 Final.pptx
EDT 323 Internet and Intranet 2022 Final.pptxEDT 323 Internet and Intranet 2022 Final.pptx
EDT 323 Internet and Intranet 2022 Final.pptxGambari Amosa Isiaka
 
A Decentralized Application for Secure Private and Group Messaging in a Peer-...
A Decentralized Application for Secure Private and Group Messaging in a Peer-...A Decentralized Application for Secure Private and Group Messaging in a Peer-...
A Decentralized Application for Secure Private and Group Messaging in a Peer-...IRJET Journal
 
Application Of An Operating System Security
Application Of An Operating System SecurityApplication Of An Operating System Security
Application Of An Operating System SecurityAmber Wheeler
 

Similar to Bangladesh Bank Assistant Maintenance Engineer Question Solution. (20)

Future prediction-ds
Future prediction-dsFuture prediction-ds
Future prediction-ds
 
Privacy Preservation in cloud Environment using AES Algorithm
Privacy Preservation in cloud Environment using AES AlgorithmPrivacy Preservation in cloud Environment using AES Algorithm
Privacy Preservation in cloud Environment using AES Algorithm
 
What are the security requirements and challenges of Grid and Cloud .pdf
What are the security requirements and challenges of Grid and Cloud .pdfWhat are the security requirements and challenges of Grid and Cloud .pdf
What are the security requirements and challenges of Grid and Cloud .pdf
 
computer networks
computer networkscomputer networks
computer networks
 
Essay On Active Directory
Essay On Active DirectoryEssay On Active Directory
Essay On Active Directory
 
publishable paper
publishable paperpublishable paper
publishable paper
 
lec1.pptx
lec1.pptxlec1.pptx
lec1.pptx
 
DELL EMC DEA-1TT5 Updated Dumps 2023
DELL EMC DEA-1TT5 Updated Dumps 2023DELL EMC DEA-1TT5 Updated Dumps 2023
DELL EMC DEA-1TT5 Updated Dumps 2023
 
Ijetcas14 583
Ijetcas14 583Ijetcas14 583
Ijetcas14 583
 
An Exploration of Grid Computing to be Utilized in Teaching and Research at TU
An Exploration of Grid Computing to be Utilized in Teaching and Research at TUAn Exploration of Grid Computing to be Utilized in Teaching and Research at TU
An Exploration of Grid Computing to be Utilized in Teaching and Research at TU
 
Custom Software Development Checklist by Michael Cordova
Custom Software Development Checklist by Michael CordovaCustom Software Development Checklist by Michael Cordova
Custom Software Development Checklist by Michael Cordova
 
Analysis Of Internet Protocol ( IP ) Datagrams
Analysis Of Internet Protocol ( IP ) DatagramsAnalysis Of Internet Protocol ( IP ) Datagrams
Analysis Of Internet Protocol ( IP ) Datagrams
 
D033017020
D033017020D033017020
D033017020
 
Consider introducing the overall objective of the network design/tutorialoutlet
Consider introducing the overall objective of the network design/tutorialoutletConsider introducing the overall objective of the network design/tutorialoutlet
Consider introducing the overall objective of the network design/tutorialoutlet
 
thilaganga journal 1
thilaganga journal 1thilaganga journal 1
thilaganga journal 1
 
Blockchain solution architecture deliverable
Blockchain solution architecture deliverableBlockchain solution architecture deliverable
Blockchain solution architecture deliverable
 
Question 1The OSI model has seven layers where each layer pe.docx
Question 1The OSI model has seven layers where each layer pe.docxQuestion 1The OSI model has seven layers where each layer pe.docx
Question 1The OSI model has seven layers where each layer pe.docx
 
EDT 323 Internet and Intranet 2022 Final.pptx
EDT 323 Internet and Intranet 2022 Final.pptxEDT 323 Internet and Intranet 2022 Final.pptx
EDT 323 Internet and Intranet 2022 Final.pptx
 
A Decentralized Application for Secure Private and Group Messaging in a Peer-...
A Decentralized Application for Secure Private and Group Messaging in a Peer-...A Decentralized Application for Secure Private and Group Messaging in a Peer-...
A Decentralized Application for Secure Private and Group Messaging in a Peer-...
 
Application Of An Operating System Security
Application Of An Operating System SecurityApplication Of An Operating System Security
Application Of An Operating System Security
 

More from Engr. Md. Jamal Uddin Rayhan

More from Engr. Md. Jamal Uddin Rayhan (8)

DESCO AE CSE Question Solution
DESCO AE CSE Question SolutionDESCO AE CSE Question Solution
DESCO AE CSE Question Solution
 
OSI Model Cheat Sheet
OSI Model Cheat SheetOSI Model Cheat Sheet
OSI Model Cheat Sheet
 
Bangladesh Bank Data entry control operator Question Solution.
Bangladesh Bank Data entry control operator Question Solution.Bangladesh Bank Data entry control operator Question Solution.
Bangladesh Bank Data entry control operator Question Solution.
 
Senior Officer , Pubali Bank Limited
Senior Officer , Pubali Bank LimitedSenior Officer , Pubali Bank Limited
Senior Officer , Pubali Bank Limited
 
Combined 2 Bank Compiled Post: ADA Date: 25.09.2021 Taker: AUST
Combined 2 Bank Compiled Post: ADA Date: 25.09.2021  Taker: AUSTCombined 2 Bank Compiled Post: ADA Date: 25.09.2021  Taker: AUST
Combined 2 Bank Compiled Post: ADA Date: 25.09.2021 Taker: AUST
 
Linux Command For Beginners 6 - copy commands for linux | BUET Pattern Job Pr...
Linux Command For Beginners 6 - copy commands for linux | BUET Pattern Job Pr...Linux Command For Beginners 6 - copy commands for linux | BUET Pattern Job Pr...
Linux Command For Beginners 6 - copy commands for linux | BUET Pattern Job Pr...
 
Titas gas sub-assistant engineer question pattern
Titas gas sub-assistant engineer question patternTitas gas sub-assistant engineer question pattern
Titas gas sub-assistant engineer question pattern
 
information security and backup system
information security and backup systeminformation security and backup system
information security and backup system
 

Recently uploaded

加利福尼亚艺术学院毕业证文凭证书( 咨询 )证书双学位
加利福尼亚艺术学院毕业证文凭证书( 咨询 )证书双学位加利福尼亚艺术学院毕业证文凭证书( 咨询 )证书双学位
加利福尼亚艺术学院毕业证文凭证书( 咨询 )证书双学位obuhobo
 
办理学位证(纽伦堡大学文凭证书)纽伦堡大学毕业证成绩单原版一模一样
办理学位证(纽伦堡大学文凭证书)纽伦堡大学毕业证成绩单原版一模一样办理学位证(纽伦堡大学文凭证书)纽伦堡大学毕业证成绩单原版一模一样
办理学位证(纽伦堡大学文凭证书)纽伦堡大学毕业证成绩单原版一模一样umasea
 
Notes of bca Question paper for exams and tests
Notes of bca Question paper for exams and testsNotes of bca Question paper for exams and tests
Notes of bca Question paper for exams and testspriyanshukumar97908
 
Vip Modals Call Girls (Delhi) Rohini 9711199171✔️ Full night Service for one...
Vip  Modals Call Girls (Delhi) Rohini 9711199171✔️ Full night Service for one...Vip  Modals Call Girls (Delhi) Rohini 9711199171✔️ Full night Service for one...
Vip Modals Call Girls (Delhi) Rohini 9711199171✔️ Full night Service for one...shivangimorya083
 
Dubai Call Girls Naija O525547819 Call Girls In Dubai Home Made
Dubai Call Girls Naija O525547819 Call Girls In Dubai Home MadeDubai Call Girls Naija O525547819 Call Girls In Dubai Home Made
Dubai Call Girls Naija O525547819 Call Girls In Dubai Home Madekojalkojal131
 
Production Day 1.pptxjvjbvbcbcb bj bvcbj
Production Day 1.pptxjvjbvbcbcb bj bvcbjProduction Day 1.pptxjvjbvbcbcb bj bvcbj
Production Day 1.pptxjvjbvbcbcb bj bvcbjLewisJB
 
女王大学硕士毕业证成绩单(加急办理)认证海外毕业证
女王大学硕士毕业证成绩单(加急办理)认证海外毕业证女王大学硕士毕业证成绩单(加急办理)认证海外毕业证
女王大学硕士毕业证成绩单(加急办理)认证海外毕业证obuhobo
 
PM Job Search Council Info Session - PMI Silver Spring Chapter
PM Job Search Council Info Session - PMI Silver Spring ChapterPM Job Search Council Info Session - PMI Silver Spring Chapter
PM Job Search Council Info Session - PMI Silver Spring ChapterHector Del Castillo, CPM, CPMM
 
The Impact of Socioeconomic Status on Education.pdf
The Impact of Socioeconomic Status on Education.pdfThe Impact of Socioeconomic Status on Education.pdf
The Impact of Socioeconomic Status on Education.pdftheknowledgereview1
 
Low Rate Call Girls Gorakhpur Anika 8250192130 Independent Escort Service Gor...
Low Rate Call Girls Gorakhpur Anika 8250192130 Independent Escort Service Gor...Low Rate Call Girls Gorakhpur Anika 8250192130 Independent Escort Service Gor...
Low Rate Call Girls Gorakhpur Anika 8250192130 Independent Escort Service Gor...Suhani Kapoor
 
VIP Call Girl Bhilai Aashi 8250192130 Independent Escort Service Bhilai
VIP Call Girl Bhilai Aashi 8250192130 Independent Escort Service BhilaiVIP Call Girl Bhilai Aashi 8250192130 Independent Escort Service Bhilai
VIP Call Girl Bhilai Aashi 8250192130 Independent Escort Service BhilaiSuhani Kapoor
 
Delhi Call Girls Preet Vihar 9711199171 ☎✔👌✔ Whatsapp Body to body massage wi...
Delhi Call Girls Preet Vihar 9711199171 ☎✔👌✔ Whatsapp Body to body massage wi...Delhi Call Girls Preet Vihar 9711199171 ☎✔👌✔ Whatsapp Body to body massage wi...
Delhi Call Girls Preet Vihar 9711199171 ☎✔👌✔ Whatsapp Body to body massage wi...shivangimorya083
 
Preventing and ending sexual harassment in the workplace.pptx
Preventing and ending sexual harassment in the workplace.pptxPreventing and ending sexual harassment in the workplace.pptx
Preventing and ending sexual harassment in the workplace.pptxGry Tina Tinde
 
CFO_SB_Career History_Multi Sector Experience
CFO_SB_Career History_Multi Sector ExperienceCFO_SB_Career History_Multi Sector Experience
CFO_SB_Career History_Multi Sector ExperienceSanjay Bokadia
 
Employee of the Month - Samsung Semiconductor India Research
Employee of the Month - Samsung Semiconductor India ResearchEmployee of the Month - Samsung Semiconductor India Research
Employee of the Month - Samsung Semiconductor India ResearchSoham Mondal
 
VIP Call Girls Service Cuttack Aishwarya 8250192130 Independent Escort Servic...
VIP Call Girls Service Cuttack Aishwarya 8250192130 Independent Escort Servic...VIP Call Girls Service Cuttack Aishwarya 8250192130 Independent Escort Servic...
VIP Call Girls Service Cuttack Aishwarya 8250192130 Independent Escort Servic...Suhani Kapoor
 
Dubai Call Girls Starlet O525547819 Call Girls Dubai Showen Dating
Dubai Call Girls Starlet O525547819 Call Girls Dubai Showen DatingDubai Call Girls Starlet O525547819 Call Girls Dubai Showen Dating
Dubai Call Girls Starlet O525547819 Call Girls Dubai Showen Datingkojalkojal131
 
(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...
(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...
(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...gurkirankumar98700
 
Call Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts Service
Call Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts ServiceCall Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts Service
Call Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts Servicejennyeacort
 

Recently uploaded (20)

加利福尼亚艺术学院毕业证文凭证书( 咨询 )证书双学位
加利福尼亚艺术学院毕业证文凭证书( 咨询 )证书双学位加利福尼亚艺术学院毕业证文凭证书( 咨询 )证书双学位
加利福尼亚艺术学院毕业证文凭证书( 咨询 )证书双学位
 
办理学位证(纽伦堡大学文凭证书)纽伦堡大学毕业证成绩单原版一模一样
办理学位证(纽伦堡大学文凭证书)纽伦堡大学毕业证成绩单原版一模一样办理学位证(纽伦堡大学文凭证书)纽伦堡大学毕业证成绩单原版一模一样
办理学位证(纽伦堡大学文凭证书)纽伦堡大学毕业证成绩单原版一模一样
 
Notes of bca Question paper for exams and tests
Notes of bca Question paper for exams and testsNotes of bca Question paper for exams and tests
Notes of bca Question paper for exams and tests
 
Vip Modals Call Girls (Delhi) Rohini 9711199171✔️ Full night Service for one...
Vip  Modals Call Girls (Delhi) Rohini 9711199171✔️ Full night Service for one...Vip  Modals Call Girls (Delhi) Rohini 9711199171✔️ Full night Service for one...
Vip Modals Call Girls (Delhi) Rohini 9711199171✔️ Full night Service for one...
 
Dubai Call Girls Naija O525547819 Call Girls In Dubai Home Made
Dubai Call Girls Naija O525547819 Call Girls In Dubai Home MadeDubai Call Girls Naija O525547819 Call Girls In Dubai Home Made
Dubai Call Girls Naija O525547819 Call Girls In Dubai Home Made
 
Production Day 1.pptxjvjbvbcbcb bj bvcbj
Production Day 1.pptxjvjbvbcbcb bj bvcbjProduction Day 1.pptxjvjbvbcbcb bj bvcbj
Production Day 1.pptxjvjbvbcbcb bj bvcbj
 
女王大学硕士毕业证成绩单(加急办理)认证海外毕业证
女王大学硕士毕业证成绩单(加急办理)认证海外毕业证女王大学硕士毕业证成绩单(加急办理)认证海外毕业证
女王大学硕士毕业证成绩单(加急办理)认证海外毕业证
 
FULL ENJOY Call Girls In Gautam Nagar (Delhi) Call Us 9953056974
FULL ENJOY Call Girls In Gautam Nagar (Delhi) Call Us 9953056974FULL ENJOY Call Girls In Gautam Nagar (Delhi) Call Us 9953056974
FULL ENJOY Call Girls In Gautam Nagar (Delhi) Call Us 9953056974
 
PM Job Search Council Info Session - PMI Silver Spring Chapter
PM Job Search Council Info Session - PMI Silver Spring ChapterPM Job Search Council Info Session - PMI Silver Spring Chapter
PM Job Search Council Info Session - PMI Silver Spring Chapter
 
The Impact of Socioeconomic Status on Education.pdf
The Impact of Socioeconomic Status on Education.pdfThe Impact of Socioeconomic Status on Education.pdf
The Impact of Socioeconomic Status on Education.pdf
 
Low Rate Call Girls Gorakhpur Anika 8250192130 Independent Escort Service Gor...
Low Rate Call Girls Gorakhpur Anika 8250192130 Independent Escort Service Gor...Low Rate Call Girls Gorakhpur Anika 8250192130 Independent Escort Service Gor...
Low Rate Call Girls Gorakhpur Anika 8250192130 Independent Escort Service Gor...
 
VIP Call Girl Bhilai Aashi 8250192130 Independent Escort Service Bhilai
VIP Call Girl Bhilai Aashi 8250192130 Independent Escort Service BhilaiVIP Call Girl Bhilai Aashi 8250192130 Independent Escort Service Bhilai
VIP Call Girl Bhilai Aashi 8250192130 Independent Escort Service Bhilai
 
Delhi Call Girls Preet Vihar 9711199171 ☎✔👌✔ Whatsapp Body to body massage wi...
Delhi Call Girls Preet Vihar 9711199171 ☎✔👌✔ Whatsapp Body to body massage wi...Delhi Call Girls Preet Vihar 9711199171 ☎✔👌✔ Whatsapp Body to body massage wi...
Delhi Call Girls Preet Vihar 9711199171 ☎✔👌✔ Whatsapp Body to body massage wi...
 
Preventing and ending sexual harassment in the workplace.pptx
Preventing and ending sexual harassment in the workplace.pptxPreventing and ending sexual harassment in the workplace.pptx
Preventing and ending sexual harassment in the workplace.pptx
 
CFO_SB_Career History_Multi Sector Experience
CFO_SB_Career History_Multi Sector ExperienceCFO_SB_Career History_Multi Sector Experience
CFO_SB_Career History_Multi Sector Experience
 
Employee of the Month - Samsung Semiconductor India Research
Employee of the Month - Samsung Semiconductor India ResearchEmployee of the Month - Samsung Semiconductor India Research
Employee of the Month - Samsung Semiconductor India Research
 
VIP Call Girls Service Cuttack Aishwarya 8250192130 Independent Escort Servic...
VIP Call Girls Service Cuttack Aishwarya 8250192130 Independent Escort Servic...VIP Call Girls Service Cuttack Aishwarya 8250192130 Independent Escort Servic...
VIP Call Girls Service Cuttack Aishwarya 8250192130 Independent Escort Servic...
 
Dubai Call Girls Starlet O525547819 Call Girls Dubai Showen Dating
Dubai Call Girls Starlet O525547819 Call Girls Dubai Showen DatingDubai Call Girls Starlet O525547819 Call Girls Dubai Showen Dating
Dubai Call Girls Starlet O525547819 Call Girls Dubai Showen Dating
 
(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...
(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...
(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...
 
Call Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts Service
Call Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts ServiceCall Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts Service
Call Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts Service
 

Bangladesh Bank Assistant Maintenance Engineer Question Solution.

  • 1. Question Bank 2004- 2023 | Bank Special Stack IT Job Solution Stack IT Question Bank | 01789741518, 01761719838 | Buy Book: stackvaly.com | Online Exam: exam.stackvaly.com 1 Bangladesh Bank Exam Taker: BUET Assistant Maintenance Engineer(AME) Marks: 150 Time: 1.30 h Date: 21.09.2019 [ সকল প্রশ্নের উত্তর দিশ্নে হশ্নে ] Solved by: Stack IT 1. What is the distributed DBMS and describe its feature? A distributed database management system (DDBMS) is a collection of multiple, logically interrelated databases distributed over a computer network. They provided a mechanism that makes the distribution of data transparent to users. Feature of DDBMS is given bellow: a) It is used to create, retrieve, update and delete distributed databases. b) It is designed for heterogeneous database platforms. c) It maintains confidentiality and data integrity of the databases. d) It ensures that the data modified at any site is universally updated. e) Location independent f) Distributed transaction management g) Distributed query processing h) Hardware & Network independent i) Operating system independent j) Transaction transparency k) DBMS independent. 2. How can we test ATM in distributed banking system? We can test ATM in distributed banking system by following criteria: a) Withdrawing money less than the account balance. b) Withdrawing money greater than the account balance. c) Withdrawing money equal to the account balance. d) Withdrawing money from an ATM and from the internet at the same time. e) Withdrawing money when the connection to the bank’s networks is lost. f) Withdrawing money from multiple ATMs simultaneously. g) Check the balance available. h) Make a deposit at an ATM. i) Try to enter invalid pin more than 3 times and see if the account gets locked. j) Try quick cash with drawl. k) Try to buy stamps. 3. What is the importance of application framework in web application development? a) Investing in the task, not in the technology: This is the essential principle of a framework, not having to reinvent the wheel and doing away with foreboding, low value- added tasks, for instance, the development of generic components in order to fully focus on the business rules. b) Guaranteed upgradability & maintenance: In the longer term, a framework makes sure the longevity of your applications. If a development team works as they please, only that team will be able to maintain and upgrade the application with ease. c) Open source: Being open source means that frameworks are cost effective for both the customer and developer. This doesn’t mean that they aren’t of good quality. Most of the well-known web frameworks used by developers are free for use. d) Efficiency: Efficiency is another vital advantage for web developers. This is because frameworks eliminate the need to write a lot of repetitive code allowing developers to build websites and applications much quicker. e) Integration: This is one of the most useful features that have the ability to permit developers to link with other tools such as S t a c k I T J o b S o l u t i o n
  • 2. Question Bank 2004- 2023 | Bank Special Stack IT Job Solution Stack IT Question Bank | 01789741518, 01761719838 | Buy Book: stackvaly.com | Online Exam: exam.stackvaly.com databases to the framework. One of the most common criticisms levied against frameworks is that they tend to make the code a lot more complicated than it should be. Also, rather than the reduced development time claimed by its proponents, frameworks actually result in a more time- consuming process since users will have to spend more time learning to use them. 4. Differentiate between micro and macro (Monolithic) kernel. What are the sub- components of I/O manager in Windows NT? Micro kernel is a kernel which run services those are minimal for operating system performance. In this kernel all other operations are performed by processor. Macro kernel is a combination of micro and monolithic kernel. In monolithic kernel all operating system code is in single executable image. Sub-components of I/O manager: a) Network redirector / Server b) Cache manager c) File systems d) Network driver e) Device driver 5. Write the short note on Node, Hub, Backbone, Router and Gateway. a) Node: Any system or device connected to a network is called a node. A node is any physical device within a network of other tools that’s able to send, receive or forward information. e.g. personal computer, modem, switch, hub, server etc. b) Hub: A Hub is a network connectivity device that broadcasts data to every computer or Ethernet based device connected to it. c) Backbone: A backbone is the part of the computer network infrastructure that interconnects different networks and provides a path for exchange of data between these different networks. A backbone may interconnect different local area networks in offices, campuses or buildings. d) Router: A router is a network connectivity device that forwards data packets between computer networks based on IP addresses. Router is mainly network layer (layer-3) device. e) Gateway: A gateway is a component that is part of two networks, which use different protocols. It may be a router, firewall, server or other device that enables traffic to flow in and out of the network. 6. Write the categories of computer architecture. What are the stages of DLX pipelines? Computer architecture: Computer architecture refers to how a computer system is designed and what technologies it is compatible with. There are three categories of computer architecture: a) System design: This includes all hardware components in the system, including data processors aside from the CPU, such as the graphics processing unit and direct memory access. It also includes memory controllers, data paths and miscellaneous things like multiprocessing and virtualization. b) Instruction set architecture (ISA): This is the embedded programming language of the central processing unit. It defines the CPU’s functions and capabilities based on what programming it can perform or process. This includes the word size, processor register types, memory addressing modes, data formats and the instruction set that programmers use. c) Microarchitecture: This type of architecture defines the data paths, data processing and storage elements, as well as how they should be implemented in the ISA. DLX pipeline consists of five stages: a) Instruction Fetch (IF): The instruction fetch stage fetches the next instruction from memory using the address in the PC (program counter). S t a c k I T J o b S o l u t i o n
  • 3. Question Bank 2004- 2023 | Bank Special Stack IT Job Solution Stack IT Question Bank | 01789741518, 01761719838 | Buy Book: stackvaly.com | Online Exam: exam.stackvaly.com b) Instruction Decode (ID): The instruction decode stage decodes the instruction in the IR, calculates the next PC and reads any operands required from the register file. c) Execute (EX): The execute stage executes the instruction. In fact, all ALU operations are done in this stage. d) Memory (MEM): The memory access stage performs any memory access required by the current instruction, so for loads, it would load an operand from memory. For stores it would store an operand into memory. For all other instructions it would do nothing. e) Write Back (WB): For instructions that have a result (a destination register) the write back writes this back to the register file. Note that this includes nearly all instructions, except nops (no-operation) and stores. 7. Differentiate among risk, threat and vulnerability. What is SSL and TSL? a) Risk: Risk is defined as the potential for loss or damage of an asset when a threat exploits a vulnerability. Examples of risk include financial losses, loss of privacy, reputational damage, legal implications and even loss of life. Risk can also be defined as: Risk = Threat probability * potential loss / impact. b) Threat: Anything that can exploit vulnerability, intentionally or accidentally and obtain damage or destroy an asset. Common threats include things like: i. An activist tries to steal data from your website. ii. A fire starts in your data center iii. An administrator accidentally turns off your website AWS instance. iv. A flood hits your headquarters v. An insider tries to sell your corporate secrets to a competitor c) Vulnerability: Vulnerability refers to weaknesses or gaps in a security program that can be exploited by threats to gain unauthorized access to an asset. Common examples of vulnerabilities include: i. SQL injection ii. Cross site scripting (XSS) iii. Broken authentication and session management iv. Security misconfiguration v. Insecure cryptographic storage vi. Failure to restrict URL access vii. Insufficient transport layer protection viii. Insecure direct object references d) SSL: Secure Socket Layer (SSL) is a standard protocol used to establish a secured and an encrypted connection between a server and the browser. SSL is most commonly seen in payment and banking web sites. e) TLS: Transport Layer Security (TLS) is a protocol that provides communication security between client / server applications that communicate with each other over the internet. It enables privacy, integrity and protection for the data that’s transmitted between different nodes on the internet. 8. Four 1 kbps connections are multiplexed together. A unit is 1 bit. Find (A) the duration of 1 bit before multiplexing (B) the transmission rate of the link (C) the duration of a time slot and (D) the duration of a frame. a) The duration of 1 bit is 1/1 Kbps, or 0.001 s (1 ms). b) The rate of the link is 4 Kbps. c) The duration of each time slot 1/4 ms or 250 us. d) The duration of a frame 1 ms. 9. How can you implement AND gate & OR gate using CMOS NAND & NOR gate? a) CMOS two-input NAND and AND gates: S t a c k I T J o b S o l u t i o n
  • 4. Question Bank 2004- 2023 | Bank Special Stack IT Job Solution Stack IT Question Bank | 01789741518, 01761719838 | Buy Book: stackvaly.com | Online Exam: exam.stackvaly.com Circuit Description: This applet demonstrates the static two-input NAND and AND gates in CMOS technology. Click the input switches or type the ('a','b') and ('c','d') bindkeys to control the two gates. The two-input NAND2 gate shown on the left is built from four transistors. The series-connection of the two n-channel transistors between GND and the gate-output ensures that the gate-output is only driven low (logical 0) when both gate inputs A or B are high (logical 1). The complementary parallel connection of the two transistors between VCC and gate-output means that the gate-output is driven high (logical 1) when one or both gate inputs are low (logical 0). The net result is the logical NAND function: NAND AND A B Y A B Y 0 0 1 0 0 0 0 1 1 0 1 0 1 0 1 1 0 0 1 1 0 1 1 1 As shown on the right, the corresponding AND gate is constructed from the NAND followed by a standard static inverter. b) CMOS two-input NOR and OR gates: Circuit Description: This applet demonstrates the static two-input NOR and OR gates in CMOS technology. Click the input switches or type the ('a','b') and ('c','d') bindkeys to control the two gates. The two-input NOR2 gate shown on the left is built from four transistors. The parallel connection of the two n-channel transistors between GND and the gate-output ensures that the gate-output is driven low (logical 0) when either gate input A or B is high (logical 1). The complementary series-connection of the two transistors between VCC and gate- output means that the gate-output is driven high (logical 1) when both gate inputs are low (logical 0). The net result is the logical NOR function: NOR OR A B Y A B Y 0 0 1 0 0 0 0 1 0 0 1 1 1 0 0 1 0 1 1 1 0 1 1 1 As shown on the right, the corresponding OR gate is constructed from the NOR2 followed by a standard static inverter. 10. A 3-phase 12 pole alternator running at 500 rpm, supplying power to a 8 pole induction motor. If slip is 3%, what is the full load speed of the motor? Synchronous machine is operating at 500 rpm ⇒ 500 = 120 × f / 12 = 50 Hz Induction machine synchronous speed = (120 × 50)/ 8 = 750 rpm Rotor full load speed, Nr = Ns (1 – s) = 750 (1 - 0.03) = 727.5 rpm 11. The distance between Town X and Town Y is twice the distance between Town X and Town Z. The distance between Town Z and Town W is 2/3 the distance between Town Z and Town X. If the distance between Town Z and Town W is 18 miles, how far is Town X from Town Y? Let us represent the respective distances using the names of the towns.  Let distance between town X and town Y = XY;  distance between town X and town Z = XZ,  distance between town Z and town W = WZ. S t a c k I T J o b S o l u t i o n
  • 5. Question Bank 2004- 2023 | Bank Special Stack IT Job Solution Stack IT Question Bank | 01789741518, 01761719838 | Buy Book: stackvaly.com | Online Exam: exam.stackvaly.com Let us now connect these unknown using equations.  XY = 2 XZ, which can be equation 1. WZ = 2/3 XZ, which can be equation 2. The question says that WZ = 18. Substituting this in equation 2, 18 = 2/3XZ which yields us XZ = 27. Substituting this in equation 1, we have, XY = 2*27 = 54. Therefore, town X is 54 km away from town Y. 12. A company employs 20 workers for every 3 managers, and 5 managers for every director. If the total number of employees at the company is between 300 and 400, what is the number of managers who work at the company? Company employs 20 workers for every 3 managers => W : M = 20 : 3 Company employs 5 managers for every 1 director => M: D = 5: 1 Combined ratio would be W : M : D = 100 : 15 : 3 and the total number of employees at the company is between 300 and 400 W : M : D = 100 : 15 : 3 means total of 118 people W : M : D = 200 : 30 : 6 means total of 236 people W : M : D = 300 : 45 : 9 means total of 354 people (total between 300 and 400) W : M : D = 400 : 60 :12 means total of 472 people 13. Focus writing in English: Impact of information technology in banking system Banking environment has become highly competitive today. Information technology refers to the acquisition, processing, storage and dissemination of all types of information using computer technology and telecommunication systems. Information technology architecture is an integrated framework for acquiring and evolving IT to achieve strategic goals. These technologies are used for the input, storage, processing and communication of information. Information technology includes ancillary equipment, software, firmware and similar procedures, services etc. Modern high throughput technologies are providing vast amounts of the sequences, expression and functional data for genes and protein. Recent developments of banking sector in Bangladesh are Internet, Society for worldwide inter-bank financial telecommunications (SWIFT), Automated Teller Machine (ATM), Cash dispensers, Electronic clearing service, Bank Net, Chip card, Phone banking, Tele-banking, Internet banking, Mobile banking, Anywhere banking, Voice mail, E-banking Etc., The basic need of Information Technology (IT) in Banking Sector are Meeting Internal Requirements, Effective in Data Handling, Extending Customer Services, Creative Support for New Product Development, End-user Development of the Non-technical Staff. Emerging trends of information technology in banking sector are Outsourcing, Integration, Distinctive Edge, IT as Profit Centre, Prospering in Down Market. Challenges faced by Bangladesh banking scenario in Bangladesh are Meet customer expectations on service and facility offered by the bank, Customer retention, Managing the spread and sustain the operating profit, Retaining the current market share in the industry and the improving the same, Completion from other players in the banking industry. Other Information Technology enables sophisticated product development, better market infrastructure, implementation of reliable techniques for control of risks and helps the financial intermediaries to reach geographically distant and diversified markets. Internet has significantly influenced delivery channels of the banks. Internet has emerged as an important medium for delivery of banking products and services. Information, communication and networking, achieving inter branch connectivity, moving towards Real Time gross settlement (RTGS) environment the forecasting of liquidity by building real time databases, The shift from traditional banking to e-banking is changing customer’s expectations. For a country like India, which is one of the most promising emerging markets, such isolation is nearly impossible. More particularly in the area of Information technology, where India has definitely an edge over its competitors, remaining away or uniformity of the world trends is untenable. Financial sector in general and banking industry in particular is the S t a c k I T J o b S o l u t i o n