Question Bank 2004- 2023 | Bank Special Stack IT Job Solution
Stack
IT
Question
Bank
|
01789741518,
01761719838
|
Buy
Book:
stackvaly.com
|
Online
Exam:
exam.stackvaly.com

largest spender and beneficiary from information
technology. This endeavors to relate the
international trends in it with the Indian banking
industry.
2
Bangladesh Bank
Exam Taker: IBA
Assistant Programmer
Marks: 200 Time: 1.30 h Date: 25.10.2019
[MCQ- MCQ= 64*1.25=80, Written-120(deprt-100, Non-20)]
Solved by: Stack IT
1. Write a c program to find max price from
20 items.
#include<stdio.h>
int main () {
int items [20];
int i, max;
printf ("Enter the 20 items price:");
for (i=0; i<20; i++) {
scanf ("%d”, &items[i]);
}
max= items [0];
for (i=0; i<20; i++) {
if(max<items[i])
max=items[i];
}
printf ("Max prices is: %d”, max);
return 0;
}
2. 10 bits number taken randomly, find the
probability at least 1 bit is zero.
Total number = 210
= 1024
Successive number = 1023
Probability = (1023/1024) = 0.99
3. What protection do you provide for your
computer from malware?
Look at eight additional ways you can protect
yourself from viruses and malware:
a)Keep your software up to date.
b)Don't click on links within emails.
c)Use free antivirus software.
d)Back up your computer.
e)Use a strong password.
f) Use a firewall.
g)Minimize downloads.
h)Use a pop-up blocker.
4. A company needs key person for DBMS.
What is his/her duty as key person?
A company key person is database administrator
for DBMS.
Duty as key person:
a) Schema definition
b) Storage structure and access method
definition
c) Schema and physical organization
modification
d) Integrity constraint specification
5. (12345) base 10 to (?) base 8.
(12345)10 = (30071)8
6. Two OSI layers which known as "flow
Control" which are those? Write them and
explain.
Flow control is generally implemented on two
layers Datalink Layer (Layer 2) and Transport
Layer (Layer 4).
[Note: (i). Data link layer may provide flow control
"on the wire". (ii). Network layer provides flow
control between routers by ICMP. The end
terminals usually do not use the network layer
barely. IP does not provide flow control. (iii).
Transport layer, more specifically TCP provides
flow control by a backtracking algorithm while
UDP does not. TCP has various flow and
congestion avoiding protocols, such as TCP Vegas.
So, when routers have flow control problems, it is
handled in the network layer, when end points have
this problem, it's handled in the transport layer.]
S
t
a
c
k
I
T
J
o
b
S
o
l
u
t
i
o
n
Question Bank 2004- 2023 | Bank Special Stack IT Job Solution
Stack
IT
Question
Bank
|
01789741518,
01761719838
|
Buy
Book:
stackvaly.com
|
Online
Exam:
exam.stackvaly.com

7. What is firewall? Explain its work. Draw a
LAN network and a firewall where firewall
will be situated.
Firewall-A firewall is software used to maintain
the security of a private network. Firewalls block
unauthorized access to or from private networks
and are often employed to prevent unauthorized
Web users or illicit software from gaining access to
private networks Connected to the Internet. A
firewall may be implemented using hardware,
software, or a combination of both.
Firewalls generally use two or more of the
following methods:
a) Packet Filtering: Firewalls filter packets that
attempt to enter or leave a network and either
accept or reject them depending on the
predefined set of filter rules.
b) Application Gateway: The application
gateway technique employs security methods
applied to certain applications such as Telnet
and File Transfer Protocol servers.
c) Circuit-Level Gateway: A circuit-level
gateway applies these methods when a
connection such as Transmission Control
Protocol is established and packets start to
move.
d) Proxy Servers: Proxy servers can mask real
network addresses and intercept every
message that enters or leaves a network.
e) Stateful Inspection or Dynamic Packet
Filtering: This method compares not just the
header information, but also a packet’s most
important inbound and outbound data parts.
These are then compared to a trusted
information database for characteristic
matches. This determines whether the
information is authorized to cross the firewall
into the network.
8. Focus writing- combating of Cybercrime in
Bangladesh.
9. What is SOAP?
SOAP (Simple Object Access Protocol) is a
message protocol that allows distributed elements
of an application to communicate. SOAP can be
carried over a variety of lower-level protocols,
including the web-related Hypertext Transfer
Protocol (HTTP).
10. Suppose, you are implementing “Overdraft
Account (OD)” class using java for a
banking app. An OD type account is opened
with an approved loan limit (ex 100000/-).
The account holder can deposit any amount
of money in the OD account at any time.
S/he can draw an amount of money from the
account (acn) until sufficient acn balance.
S/he allowed to draw money beyond his/her
acn balance if the total over-drawing
amount remains within the loan limit. A
java sketch for OD acn is given bellow &
code is expected to run in multi-threading
mode. (same code with run by different
counter in the blank)
Code:
public class ODAccount extends
BankAccount {
double limit;
public void ODAccount (double
setLimit) {
$this->balance= 0; //super
class has balance property
$this->limit= setLimit;
}
public void depositMoney (double
deposit Amount) {
balance= balance+
depositAmount;
public void drawMoney
(double drawAmount) throws
ODLimit Exceeded {
if (balance –
drawAmount>=-1*limit)
balance= balance-
drawAmount;
else throw new
OD Limit Exceeded ();
}
S
t
a
c
k
I
T
J
o
b
S
o
l
u
t
i
o
n

Assistant Programmer, Bangladesh Bank

  • 1.
    Question Bank 2004-2023 | Bank Special Stack IT Job Solution Stack IT Question Bank | 01789741518, 01761719838 | Buy Book: stackvaly.com | Online Exam: exam.stackvaly.com largest spender and beneficiary from information technology. This endeavors to relate the international trends in it with the Indian banking industry. 2 Bangladesh Bank Exam Taker: IBA Assistant Programmer Marks: 200 Time: 1.30 h Date: 25.10.2019 [MCQ- MCQ= 64*1.25=80, Written-120(deprt-100, Non-20)] Solved by: Stack IT 1. Write a c program to find max price from 20 items. #include<stdio.h> int main () { int items [20]; int i, max; printf ("Enter the 20 items price:"); for (i=0; i<20; i++) { scanf ("%d”, &items[i]); } max= items [0]; for (i=0; i<20; i++) { if(max<items[i]) max=items[i]; } printf ("Max prices is: %d”, max); return 0; } 2. 10 bits number taken randomly, find the probability at least 1 bit is zero. Total number = 210 = 1024 Successive number = 1023 Probability = (1023/1024) = 0.99 3. What protection do you provide for your computer from malware? Look at eight additional ways you can protect yourself from viruses and malware: a)Keep your software up to date. b)Don't click on links within emails. c)Use free antivirus software. d)Back up your computer. e)Use a strong password. f) Use a firewall. g)Minimize downloads. h)Use a pop-up blocker. 4. A company needs key person for DBMS. What is his/her duty as key person? A company key person is database administrator for DBMS. Duty as key person: a) Schema definition b) Storage structure and access method definition c) Schema and physical organization modification d) Integrity constraint specification 5. (12345) base 10 to (?) base 8. (12345)10 = (30071)8 6. Two OSI layers which known as "flow Control" which are those? Write them and explain. Flow control is generally implemented on two layers Datalink Layer (Layer 2) and Transport Layer (Layer 4). [Note: (i). Data link layer may provide flow control "on the wire". (ii). Network layer provides flow control between routers by ICMP. The end terminals usually do not use the network layer barely. IP does not provide flow control. (iii). Transport layer, more specifically TCP provides flow control by a backtracking algorithm while UDP does not. TCP has various flow and congestion avoiding protocols, such as TCP Vegas. So, when routers have flow control problems, it is handled in the network layer, when end points have this problem, it's handled in the transport layer.] S t a c k I T J o b S o l u t i o n
  • 2.
    Question Bank 2004-2023 | Bank Special Stack IT Job Solution Stack IT Question Bank | 01789741518, 01761719838 | Buy Book: stackvaly.com | Online Exam: exam.stackvaly.com 7. What is firewall? Explain its work. Draw a LAN network and a firewall where firewall will be situated. Firewall-A firewall is software used to maintain the security of a private network. Firewalls block unauthorized access to or from private networks and are often employed to prevent unauthorized Web users or illicit software from gaining access to private networks Connected to the Internet. A firewall may be implemented using hardware, software, or a combination of both. Firewalls generally use two or more of the following methods: a) Packet Filtering: Firewalls filter packets that attempt to enter or leave a network and either accept or reject them depending on the predefined set of filter rules. b) Application Gateway: The application gateway technique employs security methods applied to certain applications such as Telnet and File Transfer Protocol servers. c) Circuit-Level Gateway: A circuit-level gateway applies these methods when a connection such as Transmission Control Protocol is established and packets start to move. d) Proxy Servers: Proxy servers can mask real network addresses and intercept every message that enters or leaves a network. e) Stateful Inspection or Dynamic Packet Filtering: This method compares not just the header information, but also a packet’s most important inbound and outbound data parts. These are then compared to a trusted information database for characteristic matches. This determines whether the information is authorized to cross the firewall into the network. 8. Focus writing- combating of Cybercrime in Bangladesh. 9. What is SOAP? SOAP (Simple Object Access Protocol) is a message protocol that allows distributed elements of an application to communicate. SOAP can be carried over a variety of lower-level protocols, including the web-related Hypertext Transfer Protocol (HTTP). 10. Suppose, you are implementing “Overdraft Account (OD)” class using java for a banking app. An OD type account is opened with an approved loan limit (ex 100000/-). The account holder can deposit any amount of money in the OD account at any time. S/he can draw an amount of money from the account (acn) until sufficient acn balance. S/he allowed to draw money beyond his/her acn balance if the total over-drawing amount remains within the loan limit. A java sketch for OD acn is given bellow & code is expected to run in multi-threading mode. (same code with run by different counter in the blank) Code: public class ODAccount extends BankAccount { double limit; public void ODAccount (double setLimit) { $this->balance= 0; //super class has balance property $this->limit= setLimit; } public void depositMoney (double deposit Amount) { balance= balance+ depositAmount; public void drawMoney (double drawAmount) throws ODLimit Exceeded { if (balance – drawAmount>=-1*limit) balance= balance- drawAmount; else throw new OD Limit Exceeded (); } S t a c k I T J o b S o l u t i o n