BPSC Previous Year Question for Assistant Programmer, Assistant Maintenance Engineer, Assistant Network Engineer by Stack IT job Solution
Book : Stack IT job Solution (A pattern Based IT job solution)
বুয়েট, কুয়েট, রুয়েট, ডুয়েট, পিএসসি, টেলিকম, আইবিএ, এমআইএস
সহ যেকোন প্যার্টানে জব প্রস্তুতির একমাত্র বই।
Order Link: https://stackvaly.com/product/stack-it-job-solution-p3qxo
WhatsApp: 01789741518
BPSC Previous Year Question for Assistant Programmer, Assistant Maintenance Engineer, Assistant Network Engineer by Stack IT job Solution
Book : Stack IT job Solution (A pattern Based IT job solution)
বুয়েট, কুয়েট, রুয়েট, ডুয়েট, পিএসসি, টেলিকম, আইবিএ, এমআইএস
সহ যেকোন প্যার্টানে জব প্রস্তুতির একমাত্র বই।
Order Link: https://stackvaly.com/product/stack-it-job-solution-p3qxo
WhatsApp: 01789741518
Three main Architectures For Parallel Database.pptxshailajawesley023
In Parallel Databases, mainly there are three architectural designs for parallel DBMS. They are as follows:
Shared Memory Architecture
Shared Disk Architecture
Shared Nothing Architecture
Description: In a shared-memory system, multiple CPUs (Central Processing Units) are connected to a common pool of main memory through an interconnection network.
Functionality: All CPUs can access and share data stored in the common main memory.
Advantages :
It has high-speed data access for a limited number of processors.
The communication is efficient.
Disadvantages :
It cannot use beyond 80 or 100 CPUs in parallel.
The bus or the interconnection network gets block due to the increment of the large number of CPUs.
Description: In a shared-disk system, each CPU has its private memory but can access all disks directly through an interconnection network.
Functionality: CPUs can independently access data stored on disks without relying on shared memory.
Advantages :
The interconnection network is no longer a bottleneck each CPU has its own memory.
Load-balancing is easier in shared disk architecture.
There is better fault tolerance.
Disadvantages :
If the number of CPUs increases, the problems of interference and memory contentions also increase.
There’s also exists a scalability problem.
Description: In a shared-nothing system, each CPU has its local main memory and disk space. No two CPUs can access the same storage area directly.
Functionality: CPUs communicate with each other through a network connection rather than sharing memory or disks.
Advantages :
It has better scalability as no sharing of resources is done
Multiple CPUs can be added
Disadvantages:
The cost of communications is higher as it involves sending of data and software interaction at both ends
The cost of non-local disk access is higher than the cost of shared disk architectures.
BPSC Previous Year Question for Assistant Programmer, Assistant Maintenance Engineer, Assistant Network Engineer by Stack IT job Solution
Book : Stack IT job Solution (A pattern Based IT job solution)
বুয়েট, কুয়েট, রুয়েট, ডুয়েট, পিএসসি, টেলিকম, আইবিএ, এমআইএস
সহ যেকোন প্যার্টানে জব প্রস্তুতির একমাত্র বই।
Order Link: https://stackvaly.com/product/stack-it-job-solution-p3qxo
WhatsApp: 01789741518
BPSC Previous Year Question for Assistant Programmer, Assistant Maintenance Engineer, Assistant Network Engineer by Stack IT job Solution
Book : Stack IT job Solution (A pattern Based IT job solution)
বুয়েট, কুয়েট, রুয়েট, ডুয়েট, পিএসসি, টেলিকম, আইবিএ, এমআইএস
সহ যেকোন প্যার্টানে জব প্রস্তুতির একমাত্র বই।
Order Link: https://stackvaly.com/product/stack-it-job-solution-p3qxo
WhatsApp: 01789741518
Three main Architectures For Parallel Database.pptxshailajawesley023
In Parallel Databases, mainly there are three architectural designs for parallel DBMS. They are as follows:
Shared Memory Architecture
Shared Disk Architecture
Shared Nothing Architecture
Description: In a shared-memory system, multiple CPUs (Central Processing Units) are connected to a common pool of main memory through an interconnection network.
Functionality: All CPUs can access and share data stored in the common main memory.
Advantages :
It has high-speed data access for a limited number of processors.
The communication is efficient.
Disadvantages :
It cannot use beyond 80 or 100 CPUs in parallel.
The bus or the interconnection network gets block due to the increment of the large number of CPUs.
Description: In a shared-disk system, each CPU has its private memory but can access all disks directly through an interconnection network.
Functionality: CPUs can independently access data stored on disks without relying on shared memory.
Advantages :
The interconnection network is no longer a bottleneck each CPU has its own memory.
Load-balancing is easier in shared disk architecture.
There is better fault tolerance.
Disadvantages :
If the number of CPUs increases, the problems of interference and memory contentions also increase.
There’s also exists a scalability problem.
Description: In a shared-nothing system, each CPU has its local main memory and disk space. No two CPUs can access the same storage area directly.
Functionality: CPUs communicate with each other through a network connection rather than sharing memory or disks.
Advantages :
It has better scalability as no sharing of resources is done
Multiple CPUs can be added
Disadvantages:
The cost of communications is higher as it involves sending of data and software interaction at both ends
The cost of non-local disk access is higher than the cost of shared disk architectures.
Fundamentals of Database Systems questions and answers with explanation for fresher's and experienced for interview, competitive examination and entrance test.
Memory system, and not processor speed, is often the bottleneck for many applications.
Memory system performance is largely captured by two parameters, latency and bandwidth.
Latency is the time from the issue of a memory request to the time the data is available at the processor.
Bandwidth is the rate at which data can be pumped to the processor by the memory system.
Introduction to the Network Layer: Network layer services, packet switching, network layer performance, IPv4 addressing, forwarding of IP packets, Internet Protocol, ICMPv4, Mobile IP Unicast Routing: Introduction, routing algorithms, unicast routing protocols. Next generation IP: IPv6 addressing, IPv6 protocol, ICMPv6 protocol, transition from IPv4 to IPv6. Introduction to the Transport Layer: Introduction, Transport layer protocols (Simple protocol, Stop-and-wait protocol, Go-Back-n protocol, Selective repeat protocol, Bidirectional protocols), Transport layer services, User datagram protocol, Transmission control protocol
Boehm Software Quality Model is an important Software Quality Model. Introduced in 1978, it helps define the usability, maintainability, and portability of the product. Learn more: www.professionalqa.com/boehm-software-quality-model
Fundamentals of Database Systems questions and answers with explanation for fresher's and experienced for interview, competitive examination and entrance test.
Memory system, and not processor speed, is often the bottleneck for many applications.
Memory system performance is largely captured by two parameters, latency and bandwidth.
Latency is the time from the issue of a memory request to the time the data is available at the processor.
Bandwidth is the rate at which data can be pumped to the processor by the memory system.
Introduction to the Network Layer: Network layer services, packet switching, network layer performance, IPv4 addressing, forwarding of IP packets, Internet Protocol, ICMPv4, Mobile IP Unicast Routing: Introduction, routing algorithms, unicast routing protocols. Next generation IP: IPv6 addressing, IPv6 protocol, ICMPv6 protocol, transition from IPv4 to IPv6. Introduction to the Transport Layer: Introduction, Transport layer protocols (Simple protocol, Stop-and-wait protocol, Go-Back-n protocol, Selective repeat protocol, Bidirectional protocols), Transport layer services, User datagram protocol, Transmission control protocol
Boehm Software Quality Model is an important Software Quality Model. Introduced in 1978, it helps define the usability, maintainability, and portability of the product. Learn more: www.professionalqa.com/boehm-software-quality-model
What are the security requirements and challenges of Grid and Cloud .pdfarishmarketing21
What are the security requirements and challenges of Grid and Cloud Computing?
Solution
security issues:
A. Policies:
1) Inside Threats: good supervision should be done for having trusted employees .
2) Access Control:Digital signature can be implemented
for access control.
3) System Portability: The problem of vendor lock-in
should be handled .
B. Software Security:
1) Virtualization technology: up to date version of
virtualization product should be installed for the
security reasons.
2) Host Operating System:should be up to date and
secure from hackers
3) Guest Operating System: should be up to date and
secure from hackers
4) Data Encryption:should be done on all the data for
its safety.
C)Physical security:
1) Backup:Either a backup plan should be provided
automatically for each customer, or they can use the
plans provided elsewhere in the cloud.
2) Server Location:It should be at appropriate place. Room should have adequate space and
isolated. A
Cooling System and Fire Suppression System should
be installed there.
3) Firewall: Cloud Computing service providers should
provide a complete firewall solution to their clients.
Challenges:
A)No clear standard:Grid computing
uses various standards, but all grids are
not use same standards. Example all grid
operating system such as Linux, Apache,and My SQL are using WSRF,
WWW, SOAP and XML standards.
B)Distributed computing Vs Grid
computing: Grid computing involves
dynamic virtual organisation, resource
sharing and peer to peer computing. The
Grid intends to make access to
computing power, scientific data
repositories and experimental facilities
as easy as the Web makes access to
information. Same all facilities provide
the grid computing. So it is a challenge
for grid computing.
C)Lack of grid enabled software: The
software, which are enabled the grid
computing are less, It has limited
software on Grid. Much software has
not copyright issues and source code of
licence. It is need for more company
developing grid-enabled version, need
more developers on grid development
and need to develop open source
software.
D)Sharing Resources between Various
types of Services:Grid used for
sharing resource from various sites and
grid hosts. It handles a massive amount
of data as a grid platform. A lot of sites
and multiple servers gathered there it is
so complex infrastructure. It provides
difficulty for hardware resource sharing
within virtual organisation..
The Indo-American Journal of Agricultural and Veterinary Sciences is an online international journal published quarterly. It is a peer-reviewed journal that focuses on disseminating high-quality original research work, reviews, and short communications of the publishable paper.
An Exploration of Grid Computing to be Utilized in Teaching and Research at TUEswar Publications
Taiz University (TU) has a hundreds of computing resources on different campuses for use in areas from offices work to general access student labs. However, these resources are not used to their full potential. Grid computing is a technology that is capable to unify these resources and utilize them in very significant way. The difficulties of funding a complete grid computing environment and also, the difficulties of grid tools makes teachers and researchers in TU unable to involve in teaching and research in grid computing or in distributed computing. These problems raised up our awareness to mitigate this problem by build a simple environment for Grid
computing from resources are available in TU and the built environment we can use it for teaching and research.
The objective of this paper is to build, implement and testing a grid computing environment (Globus Toolkit). To achieving this objective we built the hardware and software parts, and configured several basic grid services commands line and web portal. The test result for basic grid services have been indicated that our proposed grid computing model is promising and can use in teaching and research in TU. The paper takes a look at how grid computing is realizing this aim and have created unbelievable opportunities for students, teachers and
researchers at TU in addition the result of this paper will make TU a pilot to the other universities in whole Yemen in field of Grid and distributing computing.
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Consider introducing the overall objective of the network design/tutorialoutletPittock
FOR MORE CLASSES VISIT
tutorialoutletdotcom
Network Design Proposal Template Network Design Proposal
Prepared for:
University of Maryland University College
Prepared by:
Student Name I. Physical Network Design
Introduction
Question 1The OSI model has seven layers where each layer pe.docxssuser774ad41
Question 1
The OSI model has seven layers where each layer performs various functions that are integrated to ensure that the network performs efficiently. The layers are arranged as follows from the bottom to the top layer:
a) The physical layer:
This is the first layer of the model and it has several functions. These are:
i. Bit synchronization:
The physical layer is very crucial in terms of timing and synchronizing the period and the amount of bits that are transferred between the sender and the recipient of a message. It uses a clock to ensure accurate and reliable synchronization.
ii. Bit rate control:
The physical layer also controls the bandwidth in a network by determining the number of bits that are transferred over the network channel within the specified time which is seconds in most cases.
iii. Physical topologies:
The physical layer also determines the design which is used to connect all the devices that make up the network. These include routers, switches, hubs and other equipment used in a network.
iv. Transmission mode:
The connection of devices in the physical layer determines how data between the communicating devices flows. There are various transmission modes which are supported by the physical layer. These are simplex, half-duplex and full-duplex. In simplex, data flows in only one direction. In half-duplex data can flow in both directions but not simultaneously. In the full-duplex transmission mode, data flows in both directions at the same time.
b) Data Link Layer:
This is the second layer of the OSI model. Some of its functions include:
i. Framing:
Data that is being transmitted is segmented into pieces known as frames to make the transmission process easier. The Data link layer facilitates the framing process to ensure that the receiver acquires the accurate and relevant information within the shortest possible time.
ii. Physical addressing:
The frames require adequate data regarding the sender and the recipient to ensure that a message does not fail to reach the intended recipient. The Data Link Layer achieves this by adding a MAC address to the header section of each of the frames that are being transmitted.
iii. Error control:
The use of frames in the DLL enables the network layer to detect when frames do not reach the intended recipient. In return, the DLL is able to retransmit the lost or damaged frames using the details in the headers.
iv. Flow control:
The DLL ensures that the flow of data between the sender and the recipient is constant. This techniques ensures the stability of the communication channel that is established when transmitting data.
v. Access control:
The assigning of MAC addresses to all the computers in a network enables the Data Link Layer to determine the machines with access to certain resources.
c) Network layer:
The functions of the third OSI model layer are:
i. Routing:
The network layer assesses the different routes that a frame can use to reach its recipient and it chooses the best rou ...
Bangladesh Bank Data entry control operator Question Solution.
Apps link: https://play.google.com/store/apps/details?id=itjobsolution.stackitquestionbank.mcqandwrittenquestionbank
Combined 2 Bank Compiled Post: ADA Date: 25.09.2021 Taker: AUST
Stack IT Job Solution বই থেকে যেই প্রশ্নগুলো হুবুহু কমন পড়েছে সেগুলো পেজ নাম্বারসহ দেওয়া ছে।
ধন্যবাদ সবাইকে Stack IT এর সাথে থাকার জন্য ।
This comprehensive program covers essential aspects of performance marketing, growth strategies, and tactics, such as search engine optimization (SEO), pay-per-click (PPC) advertising, content marketing, social media marketing, and more
The Impact of Artificial Intelligence on Modern Society.pdfssuser3e63fc
Just a game Assignment 3
1. What has made Louis Vuitton's business model successful in the Japanese luxury market?
2. What are the opportunities and challenges for Louis Vuitton in Japan?
3. What are the specifics of the Japanese fashion luxury market?
4. How did Louis Vuitton enter into the Japanese market originally? What were the other entry strategies it adopted later to strengthen its presence?
5. Will Louis Vuitton have any new challenges arise due to the global financial crisis? How does it overcome the new challenges?Assignment 3
1. What has made Louis Vuitton's business model successful in the Japanese luxury market?
2. What are the opportunities and challenges for Louis Vuitton in Japan?
3. What are the specifics of the Japanese fashion luxury market?
4. How did Louis Vuitton enter into the Japanese market originally? What were the other entry strategies it adopted later to strengthen its presence?
5. Will Louis Vuitton have any new challenges arise due to the global financial crisis? How does it overcome the new challenges?Assignment 3
1. What has made Louis Vuitton's business model successful in the Japanese luxury market?
2. What are the opportunities and challenges for Louis Vuitton in Japan?
3. What are the specifics of the Japanese fashion luxury market?
4. How did Louis Vuitton enter into the Japanese market originally? What were the other entry strategies it adopted later to strengthen its presence?
5. Will Louis Vuitton have any new challenges arise due to the global financial crisis? How does it overcome the new challenges?
Want to move your career forward? Looking to build your leadership skills while helping others learn, grow, and improve their skills? Seeking someone who can guide you in achieving these goals?
You can accomplish this through a mentoring partnership. Learn more about the PMISSC Mentoring Program, where you’ll discover the incredible benefits of becoming a mentor or mentee. This program is designed to foster professional growth, enhance skills, and build a strong network within the project management community. Whether you're looking to share your expertise or seeking guidance to advance your career, the PMI Mentoring Program offers valuable opportunities for personal and professional development.
Watch this to learn:
* Overview of the PMISSC Mentoring Program: Mission, vision, and objectives.
* Benefits for Volunteer Mentors: Professional development, networking, personal satisfaction, and recognition.
* Advantages for Mentees: Career advancement, skill development, networking, and confidence building.
* Program Structure and Expectations: Mentor-mentee matching process, program phases, and time commitment.
* Success Stories and Testimonials: Inspiring examples from past participants.
* How to Get Involved: Steps to participate and resources available for support throughout the program.
Learn how you can make a difference in the project management community and take the next step in your professional journey.
About Hector Del Castillo
Hector is VP of Professional Development at the PMI Silver Spring Chapter, and CEO of Bold PM. He's a mid-market growth product executive and changemaker. He works with mid-market product-driven software executives to solve their biggest growth problems. He scales product growth, optimizes ops and builds loyal customers. He has reduced customer churn 33%, and boosted sales 47% for clients. He makes a significant impact by building and launching world-changing AI-powered products. If you're looking for an engaging and inspiring speaker to spark creativity and innovation within your organization, set up an appointment to discuss your specific needs and identify a suitable topic to inspire your audience at your next corporate conference, symposium, executive summit, or planning retreat.
About PMI Silver Spring Chapter
We are a branch of the Project Management Institute. We offer a platform for project management professionals in Silver Spring, MD, and the DC/Baltimore metro area. Monthly meetings facilitate networking, knowledge sharing, and professional development. For event details, visit pmissc.org.
Bangladesh Bank Assistant Maintenance Engineer Question Solution.
1. Question Bank 2004- 2023 | Bank Special Stack IT Job Solution
Stack
IT
Question
Bank
|
01789741518,
01761719838
|
Buy
Book:
stackvaly.com
|
Online
Exam:
exam.stackvaly.com
1
Bangladesh Bank
Exam Taker: BUET
Assistant Maintenance Engineer(AME)
Marks: 150 Time: 1.30 h Date: 21.09.2019
[ সকল প্রশ্নের উত্তর দিশ্নে হশ্নে ]
Solved by: Stack IT
1. What is the distributed DBMS and describe
its feature?
A distributed database management system
(DDBMS) is a collection of multiple, logically
interrelated databases distributed over a computer
network. They provided a mechanism that makes
the distribution of data transparent to users.
Feature of DDBMS is given bellow:
a) It is used to create, retrieve, update and
delete distributed databases.
b) It is designed for heterogeneous database
platforms.
c) It maintains confidentiality and data
integrity of the databases.
d) It ensures that the data modified at any site
is universally updated.
e) Location independent
f) Distributed transaction management
g) Distributed query processing
h) Hardware & Network independent
i) Operating system independent
j) Transaction transparency
k) DBMS independent.
2. How can we test ATM in distributed
banking system?
We can test ATM in distributed banking system by
following criteria:
a) Withdrawing money less than the account
balance.
b) Withdrawing money greater than the
account balance.
c) Withdrawing money equal to the account
balance.
d) Withdrawing money from an ATM and
from the internet at the same time.
e) Withdrawing money when the connection
to the bank’s networks is lost.
f) Withdrawing money from multiple ATMs
simultaneously.
g) Check the balance available.
h) Make a deposit at an ATM.
i) Try to enter invalid pin more than 3 times
and see if the account gets locked.
j) Try quick cash with drawl.
k) Try to buy stamps.
3. What is the importance of application
framework in web application
development?
a) Investing in the task, not in the
technology: This is the essential principle
of a framework, not having to reinvent the
wheel and doing away with foreboding, low
value- added tasks, for instance, the
development of generic components in
order to fully focus on the business rules.
b) Guaranteed upgradability &
maintenance: In the longer term, a
framework makes sure the longevity of your
applications. If a development team works
as they please, only that team will be able to
maintain and upgrade the application with
ease.
c) Open source: Being open source means
that frameworks are cost effective for both
the customer and developer. This doesn’t
mean that they aren’t of good quality. Most
of the well-known web frameworks used by
developers are free for use.
d) Efficiency: Efficiency is another vital
advantage for web developers. This is
because frameworks eliminate the need to
write a lot of repetitive code allowing
developers to build websites and
applications much quicker.
e) Integration: This is one of the most useful
features that have the ability to permit
developers to link with other tools such as
S
t
a
c
k
I
T
J
o
b
S
o
l
u
t
i
o
n
2. Question Bank 2004- 2023 | Bank Special Stack IT Job Solution
Stack
IT
Question
Bank
|
01789741518,
01761719838
|
Buy
Book:
stackvaly.com
|
Online
Exam:
exam.stackvaly.com
databases to the framework. One of the
most common criticisms levied against
frameworks is that they tend to make the
code a lot more complicated than it should
be. Also, rather than the reduced
development time claimed by its
proponents, frameworks actually result in a
more time- consuming process since users
will have to spend more time learning to use
them.
4. Differentiate between micro and macro
(Monolithic) kernel. What are the sub-
components of I/O manager in Windows
NT?
Micro kernel is a kernel which run services those
are minimal for operating system performance. In
this kernel all other operations are performed by
processor.
Macro kernel is a combination of micro and
monolithic kernel. In monolithic kernel all
operating system code is in single executable
image.
Sub-components of I/O manager:
a) Network redirector / Server
b) Cache manager
c) File systems
d) Network driver
e) Device driver
5. Write the short note on Node, Hub,
Backbone, Router and Gateway.
a) Node: Any system or device connected to
a network is called a node. A node is any
physical device within a network of other
tools that’s able to send, receive or forward
information. e.g. personal computer,
modem, switch, hub, server etc.
b) Hub: A Hub is a network connectivity
device that broadcasts data to every
computer or Ethernet based device
connected to it.
c) Backbone: A backbone is the part of the
computer network infrastructure that
interconnects different networks and
provides a path for exchange of data
between these different networks. A
backbone may interconnect different local
area networks in offices, campuses or
buildings.
d) Router: A router is a network connectivity
device that forwards data packets between
computer networks based on IP addresses.
Router is mainly network layer (layer-3)
device.
e) Gateway: A gateway is a component that
is part of two networks, which use different
protocols. It may be a router, firewall,
server or other device that enables traffic
to flow in and out of the network.
6. Write the categories of computer
architecture. What are the stages of DLX
pipelines?
Computer architecture: Computer architecture
refers to how a computer system is designed and
what technologies it is compatible with.
There are three categories of computer
architecture:
a) System design: This includes all hardware
components in the system, including data
processors aside from the CPU, such as the
graphics processing unit and direct memory
access. It also includes memory controllers,
data paths and miscellaneous things like
multiprocessing and virtualization.
b) Instruction set architecture (ISA): This is
the embedded programming language of the
central processing unit. It defines the CPU’s
functions and capabilities based on what
programming it can perform or process. This
includes the word size, processor register
types, memory addressing modes, data
formats and the instruction set that
programmers use.
c) Microarchitecture: This type of architecture
defines the data paths, data processing and
storage elements, as well as how they should
be implemented in the ISA.
DLX pipeline consists of five stages:
a) Instruction Fetch (IF): The instruction
fetch stage fetches the next instruction
from memory using the address in the PC
(program counter).
S
t
a
c
k
I
T
J
o
b
S
o
l
u
t
i
o
n
3. Question Bank 2004- 2023 | Bank Special Stack IT Job Solution
Stack
IT
Question
Bank
|
01789741518,
01761719838
|
Buy
Book:
stackvaly.com
|
Online
Exam:
exam.stackvaly.com
b) Instruction Decode (ID): The instruction
decode stage decodes the instruction in the
IR, calculates the next PC and reads any
operands required from the register file.
c) Execute (EX): The execute stage executes
the instruction. In fact, all ALU operations
are done in this stage.
d) Memory (MEM): The memory access
stage performs any memory access
required by the current instruction, so for
loads, it would load an operand from
memory. For stores it would store an
operand into memory. For all other
instructions it would do nothing.
e) Write Back (WB): For instructions that
have a result (a destination register) the
write back writes this back to the register
file. Note that this includes nearly all
instructions, except nops (no-operation)
and stores.
7. Differentiate among risk, threat and
vulnerability. What is SSL and TSL?
a) Risk: Risk is defined as the potential for
loss or damage of an asset when a threat
exploits a vulnerability. Examples of risk
include financial losses, loss of privacy,
reputational damage, legal implications
and even loss of life. Risk can also be
defined as: Risk = Threat probability *
potential loss / impact.
b) Threat: Anything that can exploit
vulnerability, intentionally or accidentally
and obtain damage or destroy an asset.
Common threats include things like:
i. An activist tries to steal data from
your website.
ii. A fire starts in your data center
iii. An administrator accidentally
turns off your website AWS
instance.
iv. A flood hits your headquarters
v. An insider tries to sell your
corporate secrets to a competitor
c) Vulnerability: Vulnerability refers to
weaknesses or gaps in a security program
that can be exploited by threats to gain
unauthorized access to an asset.
Common examples of
vulnerabilities include:
i. SQL injection
ii. Cross site scripting (XSS)
iii. Broken authentication and session
management
iv. Security misconfiguration
v. Insecure cryptographic storage
vi. Failure to restrict URL access
vii. Insufficient transport layer
protection
viii. Insecure direct object references
d) SSL: Secure Socket Layer (SSL) is a
standard protocol used to establish a
secured and an encrypted connection
between a server and the browser. SSL is
most commonly seen in payment and
banking web sites.
e) TLS: Transport Layer Security (TLS) is a
protocol that provides communication
security between client / server
applications that communicate with each
other over the internet. It enables privacy,
integrity and protection for the data that’s
transmitted between different nodes on the
internet.
8. Four 1 kbps connections are multiplexed
together. A unit is 1 bit. Find (A) the
duration of 1 bit before multiplexing (B) the
transmission rate of the link (C) the
duration of a time slot and (D) the duration
of a frame.
a) The duration of 1 bit is 1/1 Kbps, or 0.001
s (1 ms).
b) The rate of the link is 4 Kbps.
c) The duration of each time slot 1/4 ms or
250 us.
d) The duration of a frame 1 ms.
9. How can you implement AND gate & OR
gate using CMOS NAND & NOR gate?
a) CMOS two-input NAND and AND
gates:
S
t
a
c
k
I
T
J
o
b
S
o
l
u
t
i
o
n
4. Question Bank 2004- 2023 | Bank Special Stack IT Job Solution
Stack
IT
Question
Bank
|
01789741518,
01761719838
|
Buy
Book:
stackvaly.com
|
Online
Exam:
exam.stackvaly.com
Circuit Description: This applet demonstrates the
static two-input NAND and AND gates in CMOS
technology. Click the input switches or type the
('a','b') and ('c','d') bindkeys to control the two
gates.
The two-input NAND2 gate shown on the left is
built from four transistors. The series-connection
of the two n-channel transistors between GND and
the gate-output ensures that the gate-output is only
driven low (logical 0) when both gate inputs A or
B are high (logical 1). The complementary parallel
connection of the two transistors between VCC and
gate-output means that the gate-output is driven
high (logical 1) when one or both gate inputs are
low (logical 0). The net result is the logical NAND
function:
NAND AND
A B Y A B Y
0 0 1 0 0 0
0 1 1 0 1 0
1 0 1 1 0 0
1 1 0 1 1 1
As shown on the right, the corresponding AND
gate is constructed from the NAND followed by a
standard static inverter.
b) CMOS two-input NOR and OR gates:
Circuit Description: This applet demonstrates the
static two-input NOR and OR gates in CMOS
technology. Click the input switches or type the
('a','b') and ('c','d') bindkeys to control the two
gates.
The two-input NOR2 gate shown on the left is built
from four transistors. The parallel connection of the
two n-channel transistors between GND and the
gate-output ensures that the gate-output is driven
low (logical 0) when either gate input A or B is high
(logical 1). The complementary series-connection
of the two transistors between VCC and gate-
output means that the gate-output is driven high
(logical 1) when both gate inputs are low (logical
0). The net result is the logical NOR function:
NOR OR
A B Y A B Y
0 0 1 0 0 0
0 1 0 0 1 1
1 0 0 1 0 1
1 1 0 1 1 1
As shown on the right, the corresponding OR
gate is constructed from the NOR2 followed by
a standard static inverter.
10. A 3-phase 12 pole alternator running at 500
rpm, supplying power to a 8 pole induction
motor. If slip is 3%, what is the full load speed
of the motor?
Synchronous machine is operating at 500 rpm
⇒ 500 = 120 × f / 12 = 50 Hz
Induction machine synchronous speed
= (120 × 50)/ 8 = 750 rpm
Rotor full load speed, Nr = Ns (1 – s)
= 750 (1 - 0.03) = 727.5 rpm
11. The distance between Town X and Town Y
is twice the distance between Town X and Town
Z. The distance between Town Z and Town W
is 2/3 the distance between Town Z and Town X.
If the distance between Town Z and Town W is
18 miles, how far is Town X from Town Y?
Let us represent the respective distances using the
names of the towns.
Let distance between town X and town Y
= XY;
distance between town X and town Z =
XZ,
distance between town Z and town W =
WZ.
S
t
a
c
k
I
T
J
o
b
S
o
l
u
t
i
o
n
5. Question Bank 2004- 2023 | Bank Special Stack IT Job Solution
Stack
IT
Question
Bank
|
01789741518,
01761719838
|
Buy
Book:
stackvaly.com
|
Online
Exam:
exam.stackvaly.com
Let us now connect these unknown using
equations.
XY = 2 XZ, which can be equation 1.
WZ = 2/3 XZ, which can be equation 2.
The question says that WZ = 18. Substituting this
in equation 2,
18 = 2/3XZ which yields us XZ = 27. Substituting
this in equation 1, we have,
XY = 2*27 = 54.
Therefore, town X is 54 km away from town Y.
12. A company employs 20 workers for every 3
managers, and 5 managers for every director. If
the total number of employees at the company is
between 300 and 400, what is the number of
managers who work at the company?
Company employs 20 workers for every 3
managers => W : M = 20 : 3
Company employs 5 managers for every 1
director => M: D = 5: 1
Combined ratio would be W : M : D = 100 : 15 : 3
and the total number of employees at the company
is between 300 and 400
W : M : D = 100 : 15 : 3
means total of 118 people
W : M : D = 200 : 30 : 6
means total of 236 people
W : M : D = 300 : 45 : 9
means total of 354 people (total between 300
and 400)
W : M : D = 400 : 60 :12
means total of 472 people
13. Focus writing in English: Impact of
information technology in banking system
Banking environment has become highly
competitive today. Information technology refers
to the acquisition, processing, storage and
dissemination of all types of information using
computer technology and telecommunication
systems. Information technology architecture is an
integrated framework for acquiring and evolving
IT to achieve strategic goals. These technologies
are used for the input, storage, processing and
communication of information. Information
technology includes ancillary equipment, software,
firmware and similar procedures, services etc.
Modern high throughput technologies are
providing vast amounts of the sequences,
expression and functional data for genes and
protein. Recent developments of banking sector in
Bangladesh are Internet, Society for worldwide
inter-bank financial telecommunications (SWIFT),
Automated Teller Machine (ATM), Cash
dispensers, Electronic clearing service, Bank Net,
Chip card, Phone banking, Tele-banking, Internet
banking, Mobile banking, Anywhere banking,
Voice mail, E-banking Etc., The basic need of
Information Technology (IT) in Banking Sector are
Meeting Internal Requirements, Effective in Data
Handling, Extending Customer Services, Creative
Support for New Product Development, End-user
Development of the Non-technical Staff. Emerging
trends of information technology in banking sector
are Outsourcing, Integration, Distinctive Edge, IT
as Profit Centre, Prospering in Down Market.
Challenges faced by Bangladesh banking scenario
in Bangladesh are Meet customer expectations on
service and facility offered by the bank, Customer
retention, Managing the spread and sustain the
operating profit, Retaining the current market share
in the industry and the improving the same,
Completion from other players in the banking
industry. Other Information Technology enables
sophisticated product development, better market
infrastructure, implementation of reliable
techniques for control of risks and helps the
financial intermediaries to reach geographically
distant and diversified markets. Internet has
significantly influenced delivery channels of the
banks. Internet has emerged as an important
medium for delivery of banking products and
services. Information, communication and
networking, achieving inter branch connectivity,
moving towards Real Time gross settlement
(RTGS) environment the forecasting of liquidity by
building real time databases, The shift from
traditional banking to e-banking is changing
customer’s expectations. For a country like India,
which is one of the most promising emerging
markets, such isolation is nearly impossible. More
particularly in the area of Information technology,
where India has definitely an edge over its
competitors, remaining away or uniformity of the
world trends is untenable. Financial sector in
general and banking industry in particular is the
S
t
a
c
k
I
T
J
o
b
S
o
l
u
t
i
o
n