SlideShare a Scribd company logo
Question Bank 2004- 2023 | Bank Special Stack IT Job Solution
Stack
IT
Question
Bank
|
01789741518,
01761719838
|
Buy
Book:
stackvaly.com
|
Online
Exam:
exam.stackvaly.com

1
Bangladesh Bank
Exam Taker: BUET
Assistant Maintenance Engineer(AME)
Marks: 150 Time: 1.30 h Date: 21.09.2019
[ সকল প্রশ্নের উত্তর দিশ্নে হশ্নে ]
Solved by: Stack IT
1. What is the distributed DBMS and describe
its feature?
A distributed database management system
(DDBMS) is a collection of multiple, logically
interrelated databases distributed over a computer
network. They provided a mechanism that makes
the distribution of data transparent to users.
Feature of DDBMS is given bellow:
a) It is used to create, retrieve, update and
delete distributed databases.
b) It is designed for heterogeneous database
platforms.
c) It maintains confidentiality and data
integrity of the databases.
d) It ensures that the data modified at any site
is universally updated.
e) Location independent
f) Distributed transaction management
g) Distributed query processing
h) Hardware & Network independent
i) Operating system independent
j) Transaction transparency
k) DBMS independent.
2. How can we test ATM in distributed
banking system?
We can test ATM in distributed banking system by
following criteria:
a) Withdrawing money less than the account
balance.
b) Withdrawing money greater than the
account balance.
c) Withdrawing money equal to the account
balance.
d) Withdrawing money from an ATM and
from the internet at the same time.
e) Withdrawing money when the connection
to the bank’s networks is lost.
f) Withdrawing money from multiple ATMs
simultaneously.
g) Check the balance available.
h) Make a deposit at an ATM.
i) Try to enter invalid pin more than 3 times
and see if the account gets locked.
j) Try quick cash with drawl.
k) Try to buy stamps.
3. What is the importance of application
framework in web application
development?
a) Investing in the task, not in the
technology: This is the essential principle
of a framework, not having to reinvent the
wheel and doing away with foreboding, low
value- added tasks, for instance, the
development of generic components in
order to fully focus on the business rules.
b) Guaranteed upgradability &
maintenance: In the longer term, a
framework makes sure the longevity of your
applications. If a development team works
as they please, only that team will be able to
maintain and upgrade the application with
ease.
c) Open source: Being open source means
that frameworks are cost effective for both
the customer and developer. This doesn’t
mean that they aren’t of good quality. Most
of the well-known web frameworks used by
developers are free for use.
d) Efficiency: Efficiency is another vital
advantage for web developers. This is
because frameworks eliminate the need to
write a lot of repetitive code allowing
developers to build websites and
applications much quicker.
e) Integration: This is one of the most useful
features that have the ability to permit
developers to link with other tools such as
S
t
a
c
k
I
T
J
o
b
S
o
l
u
t
i
o
n
Question Bank 2004- 2023 | Bank Special Stack IT Job Solution
Stack
IT
Question
Bank
|
01789741518,
01761719838
|
Buy
Book:
stackvaly.com
|
Online
Exam:
exam.stackvaly.com

databases to the framework. One of the
most common criticisms levied against
frameworks is that they tend to make the
code a lot more complicated than it should
be. Also, rather than the reduced
development time claimed by its
proponents, frameworks actually result in a
more time- consuming process since users
will have to spend more time learning to use
them.
4. Differentiate between micro and macro
(Monolithic) kernel. What are the sub-
components of I/O manager in Windows
NT?
Micro kernel is a kernel which run services those
are minimal for operating system performance. In
this kernel all other operations are performed by
processor.
Macro kernel is a combination of micro and
monolithic kernel. In monolithic kernel all
operating system code is in single executable
image.
Sub-components of I/O manager:
a) Network redirector / Server
b) Cache manager
c) File systems
d) Network driver
e) Device driver
5. Write the short note on Node, Hub,
Backbone, Router and Gateway.
a) Node: Any system or device connected to
a network is called a node. A node is any
physical device within a network of other
tools that’s able to send, receive or forward
information. e.g. personal computer,
modem, switch, hub, server etc.
b) Hub: A Hub is a network connectivity
device that broadcasts data to every
computer or Ethernet based device
connected to it.
c) Backbone: A backbone is the part of the
computer network infrastructure that
interconnects different networks and
provides a path for exchange of data
between these different networks. A
backbone may interconnect different local
area networks in offices, campuses or
buildings.
d) Router: A router is a network connectivity
device that forwards data packets between
computer networks based on IP addresses.
Router is mainly network layer (layer-3)
device.
e) Gateway: A gateway is a component that
is part of two networks, which use different
protocols. It may be a router, firewall,
server or other device that enables traffic
to flow in and out of the network.
6. Write the categories of computer
architecture. What are the stages of DLX
pipelines?
Computer architecture: Computer architecture
refers to how a computer system is designed and
what technologies it is compatible with.
There are three categories of computer
architecture:
a) System design: This includes all hardware
components in the system, including data
processors aside from the CPU, such as the
graphics processing unit and direct memory
access. It also includes memory controllers,
data paths and miscellaneous things like
multiprocessing and virtualization.
b) Instruction set architecture (ISA): This is
the embedded programming language of the
central processing unit. It defines the CPU’s
functions and capabilities based on what
programming it can perform or process. This
includes the word size, processor register
types, memory addressing modes, data
formats and the instruction set that
programmers use.
c) Microarchitecture: This type of architecture
defines the data paths, data processing and
storage elements, as well as how they should
be implemented in the ISA.
DLX pipeline consists of five stages:
a) Instruction Fetch (IF): The instruction
fetch stage fetches the next instruction
from memory using the address in the PC
(program counter).
S
t
a
c
k
I
T
J
o
b
S
o
l
u
t
i
o
n
Question Bank 2004- 2023 | Bank Special Stack IT Job Solution
Stack
IT
Question
Bank
|
01789741518,
01761719838
|
Buy
Book:
stackvaly.com
|
Online
Exam:
exam.stackvaly.com

b) Instruction Decode (ID): The instruction
decode stage decodes the instruction in the
IR, calculates the next PC and reads any
operands required from the register file.
c) Execute (EX): The execute stage executes
the instruction. In fact, all ALU operations
are done in this stage.
d) Memory (MEM): The memory access
stage performs any memory access
required by the current instruction, so for
loads, it would load an operand from
memory. For stores it would store an
operand into memory. For all other
instructions it would do nothing.
e) Write Back (WB): For instructions that
have a result (a destination register) the
write back writes this back to the register
file. Note that this includes nearly all
instructions, except nops (no-operation)
and stores.
7. Differentiate among risk, threat and
vulnerability. What is SSL and TSL?
a) Risk: Risk is defined as the potential for
loss or damage of an asset when a threat
exploits a vulnerability. Examples of risk
include financial losses, loss of privacy,
reputational damage, legal implications
and even loss of life. Risk can also be
defined as: Risk = Threat probability *
potential loss / impact.
b) Threat: Anything that can exploit
vulnerability, intentionally or accidentally
and obtain damage or destroy an asset.
Common threats include things like:
i. An activist tries to steal data from
your website.
ii. A fire starts in your data center
iii. An administrator accidentally
turns off your website AWS
instance.
iv. A flood hits your headquarters
v. An insider tries to sell your
corporate secrets to a competitor
c) Vulnerability: Vulnerability refers to
weaknesses or gaps in a security program
that can be exploited by threats to gain
unauthorized access to an asset.
Common examples of
vulnerabilities include:
i. SQL injection
ii. Cross site scripting (XSS)
iii. Broken authentication and session
management
iv. Security misconfiguration
v. Insecure cryptographic storage
vi. Failure to restrict URL access
vii. Insufficient transport layer
protection
viii. Insecure direct object references
d) SSL: Secure Socket Layer (SSL) is a
standard protocol used to establish a
secured and an encrypted connection
between a server and the browser. SSL is
most commonly seen in payment and
banking web sites.
e) TLS: Transport Layer Security (TLS) is a
protocol that provides communication
security between client / server
applications that communicate with each
other over the internet. It enables privacy,
integrity and protection for the data that’s
transmitted between different nodes on the
internet.
8. Four 1 kbps connections are multiplexed
together. A unit is 1 bit. Find (A) the
duration of 1 bit before multiplexing (B) the
transmission rate of the link (C) the
duration of a time slot and (D) the duration
of a frame.
a) The duration of 1 bit is 1/1 Kbps, or 0.001
s (1 ms).
b) The rate of the link is 4 Kbps.
c) The duration of each time slot 1/4 ms or
250 us.
d) The duration of a frame 1 ms.
9. How can you implement AND gate & OR
gate using CMOS NAND & NOR gate?
a) CMOS two-input NAND and AND
gates:
S
t
a
c
k
I
T
J
o
b
S
o
l
u
t
i
o
n
Question Bank 2004- 2023 | Bank Special Stack IT Job Solution
Stack
IT
Question
Bank
|
01789741518,
01761719838
|
Buy
Book:
stackvaly.com
|
Online
Exam:
exam.stackvaly.com

Circuit Description: This applet demonstrates the
static two-input NAND and AND gates in CMOS
technology. Click the input switches or type the
('a','b') and ('c','d') bindkeys to control the two
gates.
The two-input NAND2 gate shown on the left is
built from four transistors. The series-connection
of the two n-channel transistors between GND and
the gate-output ensures that the gate-output is only
driven low (logical 0) when both gate inputs A or
B are high (logical 1). The complementary parallel
connection of the two transistors between VCC and
gate-output means that the gate-output is driven
high (logical 1) when one or both gate inputs are
low (logical 0). The net result is the logical NAND
function:
NAND AND
A B Y A B Y
0 0 1 0 0 0
0 1 1 0 1 0
1 0 1 1 0 0
1 1 0 1 1 1
As shown on the right, the corresponding AND
gate is constructed from the NAND followed by a
standard static inverter.
b) CMOS two-input NOR and OR gates:
Circuit Description: This applet demonstrates the
static two-input NOR and OR gates in CMOS
technology. Click the input switches or type the
('a','b') and ('c','d') bindkeys to control the two
gates.
The two-input NOR2 gate shown on the left is built
from four transistors. The parallel connection of the
two n-channel transistors between GND and the
gate-output ensures that the gate-output is driven
low (logical 0) when either gate input A or B is high
(logical 1). The complementary series-connection
of the two transistors between VCC and gate-
output means that the gate-output is driven high
(logical 1) when both gate inputs are low (logical
0). The net result is the logical NOR function:
NOR OR
A B Y A B Y
0 0 1 0 0 0
0 1 0 0 1 1
1 0 0 1 0 1
1 1 0 1 1 1
As shown on the right, the corresponding OR
gate is constructed from the NOR2 followed by
a standard static inverter.
10. A 3-phase 12 pole alternator running at 500
rpm, supplying power to a 8 pole induction
motor. If slip is 3%, what is the full load speed
of the motor?
Synchronous machine is operating at 500 rpm
⇒ 500 = 120 × f / 12 = 50 Hz
Induction machine synchronous speed
= (120 × 50)/ 8 = 750 rpm
Rotor full load speed, Nr = Ns (1 – s)
= 750 (1 - 0.03) = 727.5 rpm
11. The distance between Town X and Town Y
is twice the distance between Town X and Town
Z. The distance between Town Z and Town W
is 2/3 the distance between Town Z and Town X.
If the distance between Town Z and Town W is
18 miles, how far is Town X from Town Y?
Let us represent the respective distances using the
names of the towns.
 Let distance between town X and town Y
= XY;
 distance between town X and town Z =
XZ,
 distance between town Z and town W =
WZ.
S
t
a
c
k
I
T
J
o
b
S
o
l
u
t
i
o
n
Question Bank 2004- 2023 | Bank Special Stack IT Job Solution
Stack
IT
Question
Bank
|
01789741518,
01761719838
|
Buy
Book:
stackvaly.com
|
Online
Exam:
exam.stackvaly.com

Let us now connect these unknown using
equations.
 XY = 2 XZ, which can be equation 1.
WZ = 2/3 XZ, which can be equation 2.
The question says that WZ = 18. Substituting this
in equation 2,
18 = 2/3XZ which yields us XZ = 27. Substituting
this in equation 1, we have,
XY = 2*27 = 54.
Therefore, town X is 54 km away from town Y.
12. A company employs 20 workers for every 3
managers, and 5 managers for every director. If
the total number of employees at the company is
between 300 and 400, what is the number of
managers who work at the company?
Company employs 20 workers for every 3
managers => W : M = 20 : 3
Company employs 5 managers for every 1
director => M: D = 5: 1
Combined ratio would be W : M : D = 100 : 15 : 3
and the total number of employees at the company
is between 300 and 400
W : M : D = 100 : 15 : 3
means total of 118 people
W : M : D = 200 : 30 : 6
means total of 236 people
W : M : D = 300 : 45 : 9
means total of 354 people (total between 300
and 400)
W : M : D = 400 : 60 :12
means total of 472 people
13. Focus writing in English: Impact of
information technology in banking system
Banking environment has become highly
competitive today. Information technology refers
to the acquisition, processing, storage and
dissemination of all types of information using
computer technology and telecommunication
systems. Information technology architecture is an
integrated framework for acquiring and evolving
IT to achieve strategic goals. These technologies
are used for the input, storage, processing and
communication of information. Information
technology includes ancillary equipment, software,
firmware and similar procedures, services etc.
Modern high throughput technologies are
providing vast amounts of the sequences,
expression and functional data for genes and
protein. Recent developments of banking sector in
Bangladesh are Internet, Society for worldwide
inter-bank financial telecommunications (SWIFT),
Automated Teller Machine (ATM), Cash
dispensers, Electronic clearing service, Bank Net,
Chip card, Phone banking, Tele-banking, Internet
banking, Mobile banking, Anywhere banking,
Voice mail, E-banking Etc., The basic need of
Information Technology (IT) in Banking Sector are
Meeting Internal Requirements, Effective in Data
Handling, Extending Customer Services, Creative
Support for New Product Development, End-user
Development of the Non-technical Staff. Emerging
trends of information technology in banking sector
are Outsourcing, Integration, Distinctive Edge, IT
as Profit Centre, Prospering in Down Market.
Challenges faced by Bangladesh banking scenario
in Bangladesh are Meet customer expectations on
service and facility offered by the bank, Customer
retention, Managing the spread and sustain the
operating profit, Retaining the current market share
in the industry and the improving the same,
Completion from other players in the banking
industry. Other Information Technology enables
sophisticated product development, better market
infrastructure, implementation of reliable
techniques for control of risks and helps the
financial intermediaries to reach geographically
distant and diversified markets. Internet has
significantly influenced delivery channels of the
banks. Internet has emerged as an important
medium for delivery of banking products and
services. Information, communication and
networking, achieving inter branch connectivity,
moving towards Real Time gross settlement
(RTGS) environment the forecasting of liquidity by
building real time databases, The shift from
traditional banking to e-banking is changing
customer’s expectations. For a country like India,
which is one of the most promising emerging
markets, such isolation is nearly impossible. More
particularly in the area of Information technology,
where India has definitely an edge over its
competitors, remaining away or uniformity of the
world trends is untenable. Financial sector in
general and banking industry in particular is the
S
t
a
c
k
I
T
J
o
b
S
o
l
u
t
i
o
n

More Related Content

What's hot

Computer architecture multi processor
Computer architecture multi processorComputer architecture multi processor
Computer architecture multi processor
Mazin Alwaaly
 
Scheduling in cloud
Scheduling in cloudScheduling in cloud
Scheduling in cloud
Dr.Manjunath Kotari
 
3510Chapter6Part2 (1).pdf
3510Chapter6Part2 (1).pdf3510Chapter6Part2 (1).pdf
3510Chapter6Part2 (1).pdf
SoyallRobi
 
Internet Of Things (Question Paper) [October – 2018 | Choice Based Syllabus]
Internet Of Things (Question Paper) [October – 2018 | Choice Based Syllabus]Internet Of Things (Question Paper) [October – 2018 | Choice Based Syllabus]
Internet Of Things (Question Paper) [October – 2018 | Choice Based Syllabus]
Mumbai B.Sc.IT Study
 
Bangladesh Bank Assistant Programmer Question and Solution.pdf
Bangladesh Bank Assistant Programmer Question and Solution.pdfBangladesh Bank Assistant Programmer Question and Solution.pdf
Bangladesh Bank Assistant Programmer Question and Solution.pdf
Radhio's IT Solution
 
network ram parallel computing
network ram parallel computingnetwork ram parallel computing
network ram parallel computing
Niranjana Ambadi
 
Mcq tableau.docx
Mcq tableau.docxMcq tableau.docx
Mcq tableau.docx
RakeshNimhan
 
Hardware multithreading
Hardware multithreadingHardware multithreading
Hardware multithreading
Fraboni Ec
 
Fundamentals of Database Systems Questions and Answers
Fundamentals of Database Systems Questions and AnswersFundamentals of Database Systems Questions and Answers
Fundamentals of Database Systems Questions and Answers
Abdul Rahman Sherzad
 
Limitations of memory system performance
Limitations of memory system performanceLimitations of memory system performance
Limitations of memory system performance
Syed Zaid Irshad
 
Challenges and advantages of grid computing
Challenges and advantages of grid computingChallenges and advantages of grid computing
Challenges and advantages of grid computing
Pooja Dixit
 
Fragmentation and types of fragmentation in Distributed Database
Fragmentation and types of fragmentation in Distributed DatabaseFragmentation and types of fragmentation in Distributed Database
Fragmentation and types of fragmentation in Distributed Database
Abhilasha Lahigude
 
Network Layer & Transport Layer
Network Layer & Transport LayerNetwork Layer & Transport Layer
Network Layer & Transport Layer
Sweta Kumari Barnwal
 
program flow mechanisms, advanced computer architecture
program flow mechanisms, advanced computer architectureprogram flow mechanisms, advanced computer architecture
program flow mechanisms, advanced computer architecture
Pankaj Kumar Jain
 
Boehm Software Quality Model
Boehm Software Quality ModelBoehm Software Quality Model
Boehm Software Quality Model
Professional QA
 
Unit 1 architecture of distributed systems
Unit 1 architecture of distributed systemsUnit 1 architecture of distributed systems
Unit 1 architecture of distributed systemskaran2190
 
OSI Network Reference Model
OSI Network Reference ModelOSI Network Reference Model
OSI Network Reference Model
chandrakant Mallick
 
VTU 7TH SEM CSE DATA WAREHOUSING AND DATA MINING SOLVED PAPERS OF DEC2013 JUN...
VTU 7TH SEM CSE DATA WAREHOUSING AND DATA MINING SOLVED PAPERS OF DEC2013 JUN...VTU 7TH SEM CSE DATA WAREHOUSING AND DATA MINING SOLVED PAPERS OF DEC2013 JUN...
VTU 7TH SEM CSE DATA WAREHOUSING AND DATA MINING SOLVED PAPERS OF DEC2013 JUN...
vtunotesbysree
 
Enterprise Java (November – 2018) [Choice Based | Question Paper]
Enterprise Java (November – 2018) [Choice Based | Question Paper]Enterprise Java (November – 2018) [Choice Based | Question Paper]
Enterprise Java (November – 2018) [Choice Based | Question Paper]
Mumbai B.Sc.IT Study
 
Os solved question paper
Os solved question paperOs solved question paper
Os solved question paperAnkit Bhatnagar
 

What's hot (20)

Computer architecture multi processor
Computer architecture multi processorComputer architecture multi processor
Computer architecture multi processor
 
Scheduling in cloud
Scheduling in cloudScheduling in cloud
Scheduling in cloud
 
3510Chapter6Part2 (1).pdf
3510Chapter6Part2 (1).pdf3510Chapter6Part2 (1).pdf
3510Chapter6Part2 (1).pdf
 
Internet Of Things (Question Paper) [October – 2018 | Choice Based Syllabus]
Internet Of Things (Question Paper) [October – 2018 | Choice Based Syllabus]Internet Of Things (Question Paper) [October – 2018 | Choice Based Syllabus]
Internet Of Things (Question Paper) [October – 2018 | Choice Based Syllabus]
 
Bangladesh Bank Assistant Programmer Question and Solution.pdf
Bangladesh Bank Assistant Programmer Question and Solution.pdfBangladesh Bank Assistant Programmer Question and Solution.pdf
Bangladesh Bank Assistant Programmer Question and Solution.pdf
 
network ram parallel computing
network ram parallel computingnetwork ram parallel computing
network ram parallel computing
 
Mcq tableau.docx
Mcq tableau.docxMcq tableau.docx
Mcq tableau.docx
 
Hardware multithreading
Hardware multithreadingHardware multithreading
Hardware multithreading
 
Fundamentals of Database Systems Questions and Answers
Fundamentals of Database Systems Questions and AnswersFundamentals of Database Systems Questions and Answers
Fundamentals of Database Systems Questions and Answers
 
Limitations of memory system performance
Limitations of memory system performanceLimitations of memory system performance
Limitations of memory system performance
 
Challenges and advantages of grid computing
Challenges and advantages of grid computingChallenges and advantages of grid computing
Challenges and advantages of grid computing
 
Fragmentation and types of fragmentation in Distributed Database
Fragmentation and types of fragmentation in Distributed DatabaseFragmentation and types of fragmentation in Distributed Database
Fragmentation and types of fragmentation in Distributed Database
 
Network Layer & Transport Layer
Network Layer & Transport LayerNetwork Layer & Transport Layer
Network Layer & Transport Layer
 
program flow mechanisms, advanced computer architecture
program flow mechanisms, advanced computer architectureprogram flow mechanisms, advanced computer architecture
program flow mechanisms, advanced computer architecture
 
Boehm Software Quality Model
Boehm Software Quality ModelBoehm Software Quality Model
Boehm Software Quality Model
 
Unit 1 architecture of distributed systems
Unit 1 architecture of distributed systemsUnit 1 architecture of distributed systems
Unit 1 architecture of distributed systems
 
OSI Network Reference Model
OSI Network Reference ModelOSI Network Reference Model
OSI Network Reference Model
 
VTU 7TH SEM CSE DATA WAREHOUSING AND DATA MINING SOLVED PAPERS OF DEC2013 JUN...
VTU 7TH SEM CSE DATA WAREHOUSING AND DATA MINING SOLVED PAPERS OF DEC2013 JUN...VTU 7TH SEM CSE DATA WAREHOUSING AND DATA MINING SOLVED PAPERS OF DEC2013 JUN...
VTU 7TH SEM CSE DATA WAREHOUSING AND DATA MINING SOLVED PAPERS OF DEC2013 JUN...
 
Enterprise Java (November – 2018) [Choice Based | Question Paper]
Enterprise Java (November – 2018) [Choice Based | Question Paper]Enterprise Java (November – 2018) [Choice Based | Question Paper]
Enterprise Java (November – 2018) [Choice Based | Question Paper]
 
Os solved question paper
Os solved question paperOs solved question paper
Os solved question paper
 

Similar to Bangladesh Bank Assistant Maintenance Engineer Question Solution.

Future prediction-ds
Future prediction-dsFuture prediction-ds
Future prediction-ds
Muhammad Umar Farooq
 
Privacy Preservation in cloud Environment using AES Algorithm
Privacy Preservation in cloud Environment using AES AlgorithmPrivacy Preservation in cloud Environment using AES Algorithm
Privacy Preservation in cloud Environment using AES Algorithm
IRJET Journal
 
What are the security requirements and challenges of Grid and Cloud .pdf
What are the security requirements and challenges of Grid and Cloud .pdfWhat are the security requirements and challenges of Grid and Cloud .pdf
What are the security requirements and challenges of Grid and Cloud .pdf
arishmarketing21
 
computer networks
computer networkscomputer networks
computer networks
Gicheru Onesmus
 
Essay On Active Directory
Essay On Active DirectoryEssay On Active Directory
Essay On Active Directory
Tammy Moncrief
 
publishable paper
publishable paperpublishable paper
publishable paper
chaitanya451336
 
lec1.pptx
lec1.pptxlec1.pptx
lec1.pptx
Musab58
 
DELL EMC DEA-1TT5 Updated Dumps 2023
DELL EMC DEA-1TT5 Updated Dumps 2023DELL EMC DEA-1TT5 Updated Dumps 2023
DELL EMC DEA-1TT5 Updated Dumps 2023
VictoriaMeisel
 
Ijetcas14 583
Ijetcas14 583Ijetcas14 583
Ijetcas14 583
Iasir Journals
 
An Exploration of Grid Computing to be Utilized in Teaching and Research at TU
An Exploration of Grid Computing to be Utilized in Teaching and Research at TUAn Exploration of Grid Computing to be Utilized in Teaching and Research at TU
An Exploration of Grid Computing to be Utilized in Teaching and Research at TU
Eswar Publications
 
Custom Software Development Checklist by Michael Cordova
Custom Software Development Checklist by Michael CordovaCustom Software Development Checklist by Michael Cordova
Custom Software Development Checklist by Michael Cordova
hoolikar77
 
Analysis Of Internet Protocol ( IP ) Datagrams
Analysis Of Internet Protocol ( IP ) DatagramsAnalysis Of Internet Protocol ( IP ) Datagrams
Analysis Of Internet Protocol ( IP ) Datagrams
Emily Jones
 
D033017020
D033017020D033017020
D033017020
ijceronline
 
Consider introducing the overall objective of the network design/tutorialoutlet
Consider introducing the overall objective of the network design/tutorialoutletConsider introducing the overall objective of the network design/tutorialoutlet
Consider introducing the overall objective of the network design/tutorialoutlet
Pittock
 
thilaganga journal 1
thilaganga journal 1thilaganga journal 1
thilaganga journal 1
thilaganga
 
Blockchain solution architecture deliverable
Blockchain solution architecture deliverableBlockchain solution architecture deliverable
Blockchain solution architecture deliverable
Sarmad Ibrahim
 
Question 1The OSI model has seven layers where each layer pe.docx
Question 1The OSI model has seven layers where each layer pe.docxQuestion 1The OSI model has seven layers where each layer pe.docx
Question 1The OSI model has seven layers where each layer pe.docx
ssuser774ad41
 
EDT 323 Internet and Intranet 2022 Final.pptx
EDT 323 Internet and Intranet 2022 Final.pptxEDT 323 Internet and Intranet 2022 Final.pptx
EDT 323 Internet and Intranet 2022 Final.pptx
Gambari Amosa Isiaka
 
A Decentralized Application for Secure Private and Group Messaging in a Peer-...
A Decentralized Application for Secure Private and Group Messaging in a Peer-...A Decentralized Application for Secure Private and Group Messaging in a Peer-...
A Decentralized Application for Secure Private and Group Messaging in a Peer-...
IRJET Journal
 
Application Of An Operating System Security
Application Of An Operating System SecurityApplication Of An Operating System Security
Application Of An Operating System Security
Amber Wheeler
 

Similar to Bangladesh Bank Assistant Maintenance Engineer Question Solution. (20)

Future prediction-ds
Future prediction-dsFuture prediction-ds
Future prediction-ds
 
Privacy Preservation in cloud Environment using AES Algorithm
Privacy Preservation in cloud Environment using AES AlgorithmPrivacy Preservation in cloud Environment using AES Algorithm
Privacy Preservation in cloud Environment using AES Algorithm
 
What are the security requirements and challenges of Grid and Cloud .pdf
What are the security requirements and challenges of Grid and Cloud .pdfWhat are the security requirements and challenges of Grid and Cloud .pdf
What are the security requirements and challenges of Grid and Cloud .pdf
 
computer networks
computer networkscomputer networks
computer networks
 
Essay On Active Directory
Essay On Active DirectoryEssay On Active Directory
Essay On Active Directory
 
publishable paper
publishable paperpublishable paper
publishable paper
 
lec1.pptx
lec1.pptxlec1.pptx
lec1.pptx
 
DELL EMC DEA-1TT5 Updated Dumps 2023
DELL EMC DEA-1TT5 Updated Dumps 2023DELL EMC DEA-1TT5 Updated Dumps 2023
DELL EMC DEA-1TT5 Updated Dumps 2023
 
Ijetcas14 583
Ijetcas14 583Ijetcas14 583
Ijetcas14 583
 
An Exploration of Grid Computing to be Utilized in Teaching and Research at TU
An Exploration of Grid Computing to be Utilized in Teaching and Research at TUAn Exploration of Grid Computing to be Utilized in Teaching and Research at TU
An Exploration of Grid Computing to be Utilized in Teaching and Research at TU
 
Custom Software Development Checklist by Michael Cordova
Custom Software Development Checklist by Michael CordovaCustom Software Development Checklist by Michael Cordova
Custom Software Development Checklist by Michael Cordova
 
Analysis Of Internet Protocol ( IP ) Datagrams
Analysis Of Internet Protocol ( IP ) DatagramsAnalysis Of Internet Protocol ( IP ) Datagrams
Analysis Of Internet Protocol ( IP ) Datagrams
 
D033017020
D033017020D033017020
D033017020
 
Consider introducing the overall objective of the network design/tutorialoutlet
Consider introducing the overall objective of the network design/tutorialoutletConsider introducing the overall objective of the network design/tutorialoutlet
Consider introducing the overall objective of the network design/tutorialoutlet
 
thilaganga journal 1
thilaganga journal 1thilaganga journal 1
thilaganga journal 1
 
Blockchain solution architecture deliverable
Blockchain solution architecture deliverableBlockchain solution architecture deliverable
Blockchain solution architecture deliverable
 
Question 1The OSI model has seven layers where each layer pe.docx
Question 1The OSI model has seven layers where each layer pe.docxQuestion 1The OSI model has seven layers where each layer pe.docx
Question 1The OSI model has seven layers where each layer pe.docx
 
EDT 323 Internet and Intranet 2022 Final.pptx
EDT 323 Internet and Intranet 2022 Final.pptxEDT 323 Internet and Intranet 2022 Final.pptx
EDT 323 Internet and Intranet 2022 Final.pptx
 
A Decentralized Application for Secure Private and Group Messaging in a Peer-...
A Decentralized Application for Secure Private and Group Messaging in a Peer-...A Decentralized Application for Secure Private and Group Messaging in a Peer-...
A Decentralized Application for Secure Private and Group Messaging in a Peer-...
 
Application Of An Operating System Security
Application Of An Operating System SecurityApplication Of An Operating System Security
Application Of An Operating System Security
 

More from Engr. Md. Jamal Uddin Rayhan

DESCO AE CSE Question Solution
DESCO AE CSE Question SolutionDESCO AE CSE Question Solution
DESCO AE CSE Question Solution
Engr. Md. Jamal Uddin Rayhan
 
OSI Model Cheat Sheet
OSI Model Cheat SheetOSI Model Cheat Sheet
OSI Model Cheat Sheet
Engr. Md. Jamal Uddin Rayhan
 
Bangladesh Bank Data entry control operator Question Solution.
Bangladesh Bank Data entry control operator Question Solution.Bangladesh Bank Data entry control operator Question Solution.
Bangladesh Bank Data entry control operator Question Solution.
Engr. Md. Jamal Uddin Rayhan
 
Senior Officer , Pubali Bank Limited
Senior Officer , Pubali Bank LimitedSenior Officer , Pubali Bank Limited
Senior Officer , Pubali Bank Limited
Engr. Md. Jamal Uddin Rayhan
 
Bangladesh telecommunication regulatory commision
Bangladesh telecommunication regulatory commisionBangladesh telecommunication regulatory commision
Bangladesh telecommunication regulatory commision
Engr. Md. Jamal Uddin Rayhan
 
BTCL Assistant Manager Previous Year Question by Stack IT Job Solution
BTCL Assistant Manager Previous Year Question by Stack IT Job SolutionBTCL Assistant Manager Previous Year Question by Stack IT Job Solution
BTCL Assistant Manager Previous Year Question by Stack IT Job Solution
Engr. Md. Jamal Uddin Rayhan
 
Combined 2 Bank Compiled Post: ADA Date: 25.09.2021 Taker: AUST
Combined 2 Bank Compiled Post: ADA Date: 25.09.2021  Taker: AUSTCombined 2 Bank Compiled Post: ADA Date: 25.09.2021  Taker: AUST
Combined 2 Bank Compiled Post: ADA Date: 25.09.2021 Taker: AUST
Engr. Md. Jamal Uddin Rayhan
 
Combined 2 Bank Compiled Post: SO(IT) Date: 25.09.2021 Taker: AUST
Combined 2 Bank Compiled Post: SO(IT)  Date: 25.09.2021  Taker: AUSTCombined 2 Bank Compiled Post: SO(IT)  Date: 25.09.2021  Taker: AUST
Combined 2 Bank Compiled Post: SO(IT) Date: 25.09.2021 Taker: AUST
Engr. Md. Jamal Uddin Rayhan
 
Linux Command For Beginners 6 - copy commands for linux | BUET Pattern Job Pr...
Linux Command For Beginners 6 - copy commands for linux | BUET Pattern Job Pr...Linux Command For Beginners 6 - copy commands for linux | BUET Pattern Job Pr...
Linux Command For Beginners 6 - copy commands for linux | BUET Pattern Job Pr...
Engr. Md. Jamal Uddin Rayhan
 
Titas gas sub-assistant engineer question pattern
Titas gas sub-assistant engineer question patternTitas gas sub-assistant engineer question pattern
Titas gas sub-assistant engineer question pattern
Engr. Md. Jamal Uddin Rayhan
 
information security and backup system
information security and backup systeminformation security and backup system
information security and backup system
Engr. Md. Jamal Uddin Rayhan
 

More from Engr. Md. Jamal Uddin Rayhan (11)

DESCO AE CSE Question Solution
DESCO AE CSE Question SolutionDESCO AE CSE Question Solution
DESCO AE CSE Question Solution
 
OSI Model Cheat Sheet
OSI Model Cheat SheetOSI Model Cheat Sheet
OSI Model Cheat Sheet
 
Bangladesh Bank Data entry control operator Question Solution.
Bangladesh Bank Data entry control operator Question Solution.Bangladesh Bank Data entry control operator Question Solution.
Bangladesh Bank Data entry control operator Question Solution.
 
Senior Officer , Pubali Bank Limited
Senior Officer , Pubali Bank LimitedSenior Officer , Pubali Bank Limited
Senior Officer , Pubali Bank Limited
 
Bangladesh telecommunication regulatory commision
Bangladesh telecommunication regulatory commisionBangladesh telecommunication regulatory commision
Bangladesh telecommunication regulatory commision
 
BTCL Assistant Manager Previous Year Question by Stack IT Job Solution
BTCL Assistant Manager Previous Year Question by Stack IT Job SolutionBTCL Assistant Manager Previous Year Question by Stack IT Job Solution
BTCL Assistant Manager Previous Year Question by Stack IT Job Solution
 
Combined 2 Bank Compiled Post: ADA Date: 25.09.2021 Taker: AUST
Combined 2 Bank Compiled Post: ADA Date: 25.09.2021  Taker: AUSTCombined 2 Bank Compiled Post: ADA Date: 25.09.2021  Taker: AUST
Combined 2 Bank Compiled Post: ADA Date: 25.09.2021 Taker: AUST
 
Combined 2 Bank Compiled Post: SO(IT) Date: 25.09.2021 Taker: AUST
Combined 2 Bank Compiled Post: SO(IT)  Date: 25.09.2021  Taker: AUSTCombined 2 Bank Compiled Post: SO(IT)  Date: 25.09.2021  Taker: AUST
Combined 2 Bank Compiled Post: SO(IT) Date: 25.09.2021 Taker: AUST
 
Linux Command For Beginners 6 - copy commands for linux | BUET Pattern Job Pr...
Linux Command For Beginners 6 - copy commands for linux | BUET Pattern Job Pr...Linux Command For Beginners 6 - copy commands for linux | BUET Pattern Job Pr...
Linux Command For Beginners 6 - copy commands for linux | BUET Pattern Job Pr...
 
Titas gas sub-assistant engineer question pattern
Titas gas sub-assistant engineer question patternTitas gas sub-assistant engineer question pattern
Titas gas sub-assistant engineer question pattern
 
information security and backup system
information security and backup systeminformation security and backup system
information security and backup system
 

Recently uploaded

Operating system. short answes and Interview questions .pdf
Operating system. short answes and Interview questions .pdfOperating system. short answes and Interview questions .pdf
Operating system. short answes and Interview questions .pdf
harikrishnahari6276
 
15385-LESSON PLAN- 7TH - SS-Insian Constitution an Introduction.pdf
15385-LESSON PLAN- 7TH - SS-Insian Constitution an Introduction.pdf15385-LESSON PLAN- 7TH - SS-Insian Constitution an Introduction.pdf
15385-LESSON PLAN- 7TH - SS-Insian Constitution an Introduction.pdf
gobogo3542
 
My Story of Getting into Tech By Gertrude Chilufya Westrin
My Story of Getting into Tech By Gertrude Chilufya WestrinMy Story of Getting into Tech By Gertrude Chilufya Westrin
My Story of Getting into Tech By Gertrude Chilufya Westrin
AlinaseFaith
 
DIGITAL MARKETING COURSE IN CHENNAI.pptx
DIGITAL MARKETING COURSE IN CHENNAI.pptxDIGITAL MARKETING COURSE IN CHENNAI.pptx
DIGITAL MARKETING COURSE IN CHENNAI.pptx
FarzanaRbcomcs
 
135. Reviewer Certificate in Journal of Engineering
135. Reviewer Certificate in Journal of Engineering135. Reviewer Certificate in Journal of Engineering
135. Reviewer Certificate in Journal of Engineering
Manu Mitra
 
131. Reviewer Certificate in BP International
131. Reviewer Certificate in BP International131. Reviewer Certificate in BP International
131. Reviewer Certificate in BP International
Manu Mitra
 
Personal Brand exploration KE.pdf for assignment
Personal Brand exploration KE.pdf for assignmentPersonal Brand exploration KE.pdf for assignment
Personal Brand exploration KE.pdf for assignment
ragingokie
 
太阳城娱乐-太阳城娱乐推荐-太阳城娱乐官方网站| 立即访问【ac123.net】
太阳城娱乐-太阳城娱乐推荐-太阳城娱乐官方网站| 立即访问【ac123.net】太阳城娱乐-太阳城娱乐推荐-太阳城娱乐官方网站| 立即访问【ac123.net】
太阳城娱乐-太阳城娱乐推荐-太阳城娱乐官方网站| 立即访问【ac123.net】
foismail170
 
Luke Royak's Personal Brand Exploration!
Luke Royak's Personal Brand Exploration!Luke Royak's Personal Brand Exploration!
Luke Royak's Personal Brand Exploration!
LukeRoyak
 
The Impact of Artificial Intelligence on Modern Society.pdf
The Impact of Artificial Intelligence on Modern Society.pdfThe Impact of Artificial Intelligence on Modern Society.pdf
The Impact of Artificial Intelligence on Modern Society.pdf
ssuser3e63fc
 
Heidi Livengood Resume Senior Technical Recruiter / HR Generalist
Heidi Livengood Resume Senior Technical Recruiter / HR GeneralistHeidi Livengood Resume Senior Technical Recruiter / HR Generalist
Heidi Livengood Resume Senior Technical Recruiter / HR Generalist
HeidiLivengood
 
Widal Agglutination Test: A rapid serological diagnosis of typhoid fever
Widal Agglutination Test: A rapid serological diagnosis of typhoid feverWidal Agglutination Test: A rapid serological diagnosis of typhoid fever
Widal Agglutination Test: A rapid serological diagnosis of typhoid fever
taexnic
 
皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】
皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】
皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】
larisashrestha558
 
salivary gland disorders.pdf nothing more
salivary gland disorders.pdf nothing moresalivary gland disorders.pdf nothing more
salivary gland disorders.pdf nothing more
GokulnathMbbs
 
How to create an effective K-POC tutorial
How to create an effective K-POC tutorialHow to create an effective K-POC tutorial
How to create an effective K-POC tutorial
vencislavkaaa
 
Andrea Kate Portfolio Presentation.pdf
Andrea Kate  Portfolio  Presentation.pdfAndrea Kate  Portfolio  Presentation.pdf
Andrea Kate Portfolio Presentation.pdf
andreakaterasco
 
How Mentoring Elevates Your PM Career | PMI Silver Spring Chapter
How Mentoring Elevates Your PM Career | PMI Silver Spring ChapterHow Mentoring Elevates Your PM Career | PMI Silver Spring Chapter
How Mentoring Elevates Your PM Career | PMI Silver Spring Chapter
Hector Del Castillo, CPM, CPMM
 
欧洲杯投注app-欧洲杯投注app推荐-欧洲杯投注app| 立即访问【ac123.net】
欧洲杯投注app-欧洲杯投注app推荐-欧洲杯投注app| 立即访问【ac123.net】欧洲杯投注app-欧洲杯投注app推荐-欧洲杯投注app| 立即访问【ac123.net】
欧洲杯投注app-欧洲杯投注app推荐-欧洲杯投注app| 立即访问【ac123.net】
foismail170
 
Full Sail_Morales_Michael_SMM_2024-05.pptx
Full Sail_Morales_Michael_SMM_2024-05.pptxFull Sail_Morales_Michael_SMM_2024-05.pptx
Full Sail_Morales_Michael_SMM_2024-05.pptx
mmorales2173
 
132. Acta Scientific Pharmaceutical Sciences
132. Acta Scientific Pharmaceutical Sciences132. Acta Scientific Pharmaceutical Sciences
132. Acta Scientific Pharmaceutical Sciences
Manu Mitra
 

Recently uploaded (20)

Operating system. short answes and Interview questions .pdf
Operating system. short answes and Interview questions .pdfOperating system. short answes and Interview questions .pdf
Operating system. short answes and Interview questions .pdf
 
15385-LESSON PLAN- 7TH - SS-Insian Constitution an Introduction.pdf
15385-LESSON PLAN- 7TH - SS-Insian Constitution an Introduction.pdf15385-LESSON PLAN- 7TH - SS-Insian Constitution an Introduction.pdf
15385-LESSON PLAN- 7TH - SS-Insian Constitution an Introduction.pdf
 
My Story of Getting into Tech By Gertrude Chilufya Westrin
My Story of Getting into Tech By Gertrude Chilufya WestrinMy Story of Getting into Tech By Gertrude Chilufya Westrin
My Story of Getting into Tech By Gertrude Chilufya Westrin
 
DIGITAL MARKETING COURSE IN CHENNAI.pptx
DIGITAL MARKETING COURSE IN CHENNAI.pptxDIGITAL MARKETING COURSE IN CHENNAI.pptx
DIGITAL MARKETING COURSE IN CHENNAI.pptx
 
135. Reviewer Certificate in Journal of Engineering
135. Reviewer Certificate in Journal of Engineering135. Reviewer Certificate in Journal of Engineering
135. Reviewer Certificate in Journal of Engineering
 
131. Reviewer Certificate in BP International
131. Reviewer Certificate in BP International131. Reviewer Certificate in BP International
131. Reviewer Certificate in BP International
 
Personal Brand exploration KE.pdf for assignment
Personal Brand exploration KE.pdf for assignmentPersonal Brand exploration KE.pdf for assignment
Personal Brand exploration KE.pdf for assignment
 
太阳城娱乐-太阳城娱乐推荐-太阳城娱乐官方网站| 立即访问【ac123.net】
太阳城娱乐-太阳城娱乐推荐-太阳城娱乐官方网站| 立即访问【ac123.net】太阳城娱乐-太阳城娱乐推荐-太阳城娱乐官方网站| 立即访问【ac123.net】
太阳城娱乐-太阳城娱乐推荐-太阳城娱乐官方网站| 立即访问【ac123.net】
 
Luke Royak's Personal Brand Exploration!
Luke Royak's Personal Brand Exploration!Luke Royak's Personal Brand Exploration!
Luke Royak's Personal Brand Exploration!
 
The Impact of Artificial Intelligence on Modern Society.pdf
The Impact of Artificial Intelligence on Modern Society.pdfThe Impact of Artificial Intelligence on Modern Society.pdf
The Impact of Artificial Intelligence on Modern Society.pdf
 
Heidi Livengood Resume Senior Technical Recruiter / HR Generalist
Heidi Livengood Resume Senior Technical Recruiter / HR GeneralistHeidi Livengood Resume Senior Technical Recruiter / HR Generalist
Heidi Livengood Resume Senior Technical Recruiter / HR Generalist
 
Widal Agglutination Test: A rapid serological diagnosis of typhoid fever
Widal Agglutination Test: A rapid serological diagnosis of typhoid feverWidal Agglutination Test: A rapid serological diagnosis of typhoid fever
Widal Agglutination Test: A rapid serological diagnosis of typhoid fever
 
皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】
皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】
皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】
 
salivary gland disorders.pdf nothing more
salivary gland disorders.pdf nothing moresalivary gland disorders.pdf nothing more
salivary gland disorders.pdf nothing more
 
How to create an effective K-POC tutorial
How to create an effective K-POC tutorialHow to create an effective K-POC tutorial
How to create an effective K-POC tutorial
 
Andrea Kate Portfolio Presentation.pdf
Andrea Kate  Portfolio  Presentation.pdfAndrea Kate  Portfolio  Presentation.pdf
Andrea Kate Portfolio Presentation.pdf
 
How Mentoring Elevates Your PM Career | PMI Silver Spring Chapter
How Mentoring Elevates Your PM Career | PMI Silver Spring ChapterHow Mentoring Elevates Your PM Career | PMI Silver Spring Chapter
How Mentoring Elevates Your PM Career | PMI Silver Spring Chapter
 
欧洲杯投注app-欧洲杯投注app推荐-欧洲杯投注app| 立即访问【ac123.net】
欧洲杯投注app-欧洲杯投注app推荐-欧洲杯投注app| 立即访问【ac123.net】欧洲杯投注app-欧洲杯投注app推荐-欧洲杯投注app| 立即访问【ac123.net】
欧洲杯投注app-欧洲杯投注app推荐-欧洲杯投注app| 立即访问【ac123.net】
 
Full Sail_Morales_Michael_SMM_2024-05.pptx
Full Sail_Morales_Michael_SMM_2024-05.pptxFull Sail_Morales_Michael_SMM_2024-05.pptx
Full Sail_Morales_Michael_SMM_2024-05.pptx
 
132. Acta Scientific Pharmaceutical Sciences
132. Acta Scientific Pharmaceutical Sciences132. Acta Scientific Pharmaceutical Sciences
132. Acta Scientific Pharmaceutical Sciences
 

Bangladesh Bank Assistant Maintenance Engineer Question Solution.

  • 1. Question Bank 2004- 2023 | Bank Special Stack IT Job Solution Stack IT Question Bank | 01789741518, 01761719838 | Buy Book: stackvaly.com | Online Exam: exam.stackvaly.com 1 Bangladesh Bank Exam Taker: BUET Assistant Maintenance Engineer(AME) Marks: 150 Time: 1.30 h Date: 21.09.2019 [ সকল প্রশ্নের উত্তর দিশ্নে হশ্নে ] Solved by: Stack IT 1. What is the distributed DBMS and describe its feature? A distributed database management system (DDBMS) is a collection of multiple, logically interrelated databases distributed over a computer network. They provided a mechanism that makes the distribution of data transparent to users. Feature of DDBMS is given bellow: a) It is used to create, retrieve, update and delete distributed databases. b) It is designed for heterogeneous database platforms. c) It maintains confidentiality and data integrity of the databases. d) It ensures that the data modified at any site is universally updated. e) Location independent f) Distributed transaction management g) Distributed query processing h) Hardware & Network independent i) Operating system independent j) Transaction transparency k) DBMS independent. 2. How can we test ATM in distributed banking system? We can test ATM in distributed banking system by following criteria: a) Withdrawing money less than the account balance. b) Withdrawing money greater than the account balance. c) Withdrawing money equal to the account balance. d) Withdrawing money from an ATM and from the internet at the same time. e) Withdrawing money when the connection to the bank’s networks is lost. f) Withdrawing money from multiple ATMs simultaneously. g) Check the balance available. h) Make a deposit at an ATM. i) Try to enter invalid pin more than 3 times and see if the account gets locked. j) Try quick cash with drawl. k) Try to buy stamps. 3. What is the importance of application framework in web application development? a) Investing in the task, not in the technology: This is the essential principle of a framework, not having to reinvent the wheel and doing away with foreboding, low value- added tasks, for instance, the development of generic components in order to fully focus on the business rules. b) Guaranteed upgradability & maintenance: In the longer term, a framework makes sure the longevity of your applications. If a development team works as they please, only that team will be able to maintain and upgrade the application with ease. c) Open source: Being open source means that frameworks are cost effective for both the customer and developer. This doesn’t mean that they aren’t of good quality. Most of the well-known web frameworks used by developers are free for use. d) Efficiency: Efficiency is another vital advantage for web developers. This is because frameworks eliminate the need to write a lot of repetitive code allowing developers to build websites and applications much quicker. e) Integration: This is one of the most useful features that have the ability to permit developers to link with other tools such as S t a c k I T J o b S o l u t i o n
  • 2. Question Bank 2004- 2023 | Bank Special Stack IT Job Solution Stack IT Question Bank | 01789741518, 01761719838 | Buy Book: stackvaly.com | Online Exam: exam.stackvaly.com databases to the framework. One of the most common criticisms levied against frameworks is that they tend to make the code a lot more complicated than it should be. Also, rather than the reduced development time claimed by its proponents, frameworks actually result in a more time- consuming process since users will have to spend more time learning to use them. 4. Differentiate between micro and macro (Monolithic) kernel. What are the sub- components of I/O manager in Windows NT? Micro kernel is a kernel which run services those are minimal for operating system performance. In this kernel all other operations are performed by processor. Macro kernel is a combination of micro and monolithic kernel. In monolithic kernel all operating system code is in single executable image. Sub-components of I/O manager: a) Network redirector / Server b) Cache manager c) File systems d) Network driver e) Device driver 5. Write the short note on Node, Hub, Backbone, Router and Gateway. a) Node: Any system or device connected to a network is called a node. A node is any physical device within a network of other tools that’s able to send, receive or forward information. e.g. personal computer, modem, switch, hub, server etc. b) Hub: A Hub is a network connectivity device that broadcasts data to every computer or Ethernet based device connected to it. c) Backbone: A backbone is the part of the computer network infrastructure that interconnects different networks and provides a path for exchange of data between these different networks. A backbone may interconnect different local area networks in offices, campuses or buildings. d) Router: A router is a network connectivity device that forwards data packets between computer networks based on IP addresses. Router is mainly network layer (layer-3) device. e) Gateway: A gateway is a component that is part of two networks, which use different protocols. It may be a router, firewall, server or other device that enables traffic to flow in and out of the network. 6. Write the categories of computer architecture. What are the stages of DLX pipelines? Computer architecture: Computer architecture refers to how a computer system is designed and what technologies it is compatible with. There are three categories of computer architecture: a) System design: This includes all hardware components in the system, including data processors aside from the CPU, such as the graphics processing unit and direct memory access. It also includes memory controllers, data paths and miscellaneous things like multiprocessing and virtualization. b) Instruction set architecture (ISA): This is the embedded programming language of the central processing unit. It defines the CPU’s functions and capabilities based on what programming it can perform or process. This includes the word size, processor register types, memory addressing modes, data formats and the instruction set that programmers use. c) Microarchitecture: This type of architecture defines the data paths, data processing and storage elements, as well as how they should be implemented in the ISA. DLX pipeline consists of five stages: a) Instruction Fetch (IF): The instruction fetch stage fetches the next instruction from memory using the address in the PC (program counter). S t a c k I T J o b S o l u t i o n
  • 3. Question Bank 2004- 2023 | Bank Special Stack IT Job Solution Stack IT Question Bank | 01789741518, 01761719838 | Buy Book: stackvaly.com | Online Exam: exam.stackvaly.com b) Instruction Decode (ID): The instruction decode stage decodes the instruction in the IR, calculates the next PC and reads any operands required from the register file. c) Execute (EX): The execute stage executes the instruction. In fact, all ALU operations are done in this stage. d) Memory (MEM): The memory access stage performs any memory access required by the current instruction, so for loads, it would load an operand from memory. For stores it would store an operand into memory. For all other instructions it would do nothing. e) Write Back (WB): For instructions that have a result (a destination register) the write back writes this back to the register file. Note that this includes nearly all instructions, except nops (no-operation) and stores. 7. Differentiate among risk, threat and vulnerability. What is SSL and TSL? a) Risk: Risk is defined as the potential for loss or damage of an asset when a threat exploits a vulnerability. Examples of risk include financial losses, loss of privacy, reputational damage, legal implications and even loss of life. Risk can also be defined as: Risk = Threat probability * potential loss / impact. b) Threat: Anything that can exploit vulnerability, intentionally or accidentally and obtain damage or destroy an asset. Common threats include things like: i. An activist tries to steal data from your website. ii. A fire starts in your data center iii. An administrator accidentally turns off your website AWS instance. iv. A flood hits your headquarters v. An insider tries to sell your corporate secrets to a competitor c) Vulnerability: Vulnerability refers to weaknesses or gaps in a security program that can be exploited by threats to gain unauthorized access to an asset. Common examples of vulnerabilities include: i. SQL injection ii. Cross site scripting (XSS) iii. Broken authentication and session management iv. Security misconfiguration v. Insecure cryptographic storage vi. Failure to restrict URL access vii. Insufficient transport layer protection viii. Insecure direct object references d) SSL: Secure Socket Layer (SSL) is a standard protocol used to establish a secured and an encrypted connection between a server and the browser. SSL is most commonly seen in payment and banking web sites. e) TLS: Transport Layer Security (TLS) is a protocol that provides communication security between client / server applications that communicate with each other over the internet. It enables privacy, integrity and protection for the data that’s transmitted between different nodes on the internet. 8. Four 1 kbps connections are multiplexed together. A unit is 1 bit. Find (A) the duration of 1 bit before multiplexing (B) the transmission rate of the link (C) the duration of a time slot and (D) the duration of a frame. a) The duration of 1 bit is 1/1 Kbps, or 0.001 s (1 ms). b) The rate of the link is 4 Kbps. c) The duration of each time slot 1/4 ms or 250 us. d) The duration of a frame 1 ms. 9. How can you implement AND gate & OR gate using CMOS NAND & NOR gate? a) CMOS two-input NAND and AND gates: S t a c k I T J o b S o l u t i o n
  • 4. Question Bank 2004- 2023 | Bank Special Stack IT Job Solution Stack IT Question Bank | 01789741518, 01761719838 | Buy Book: stackvaly.com | Online Exam: exam.stackvaly.com Circuit Description: This applet demonstrates the static two-input NAND and AND gates in CMOS technology. Click the input switches or type the ('a','b') and ('c','d') bindkeys to control the two gates. The two-input NAND2 gate shown on the left is built from four transistors. The series-connection of the two n-channel transistors between GND and the gate-output ensures that the gate-output is only driven low (logical 0) when both gate inputs A or B are high (logical 1). The complementary parallel connection of the two transistors between VCC and gate-output means that the gate-output is driven high (logical 1) when one or both gate inputs are low (logical 0). The net result is the logical NAND function: NAND AND A B Y A B Y 0 0 1 0 0 0 0 1 1 0 1 0 1 0 1 1 0 0 1 1 0 1 1 1 As shown on the right, the corresponding AND gate is constructed from the NAND followed by a standard static inverter. b) CMOS two-input NOR and OR gates: Circuit Description: This applet demonstrates the static two-input NOR and OR gates in CMOS technology. Click the input switches or type the ('a','b') and ('c','d') bindkeys to control the two gates. The two-input NOR2 gate shown on the left is built from four transistors. The parallel connection of the two n-channel transistors between GND and the gate-output ensures that the gate-output is driven low (logical 0) when either gate input A or B is high (logical 1). The complementary series-connection of the two transistors between VCC and gate- output means that the gate-output is driven high (logical 1) when both gate inputs are low (logical 0). The net result is the logical NOR function: NOR OR A B Y A B Y 0 0 1 0 0 0 0 1 0 0 1 1 1 0 0 1 0 1 1 1 0 1 1 1 As shown on the right, the corresponding OR gate is constructed from the NOR2 followed by a standard static inverter. 10. A 3-phase 12 pole alternator running at 500 rpm, supplying power to a 8 pole induction motor. If slip is 3%, what is the full load speed of the motor? Synchronous machine is operating at 500 rpm ⇒ 500 = 120 × f / 12 = 50 Hz Induction machine synchronous speed = (120 × 50)/ 8 = 750 rpm Rotor full load speed, Nr = Ns (1 – s) = 750 (1 - 0.03) = 727.5 rpm 11. The distance between Town X and Town Y is twice the distance between Town X and Town Z. The distance between Town Z and Town W is 2/3 the distance between Town Z and Town X. If the distance between Town Z and Town W is 18 miles, how far is Town X from Town Y? Let us represent the respective distances using the names of the towns.  Let distance between town X and town Y = XY;  distance between town X and town Z = XZ,  distance between town Z and town W = WZ. S t a c k I T J o b S o l u t i o n
  • 5. Question Bank 2004- 2023 | Bank Special Stack IT Job Solution Stack IT Question Bank | 01789741518, 01761719838 | Buy Book: stackvaly.com | Online Exam: exam.stackvaly.com Let us now connect these unknown using equations.  XY = 2 XZ, which can be equation 1. WZ = 2/3 XZ, which can be equation 2. The question says that WZ = 18. Substituting this in equation 2, 18 = 2/3XZ which yields us XZ = 27. Substituting this in equation 1, we have, XY = 2*27 = 54. Therefore, town X is 54 km away from town Y. 12. A company employs 20 workers for every 3 managers, and 5 managers for every director. If the total number of employees at the company is between 300 and 400, what is the number of managers who work at the company? Company employs 20 workers for every 3 managers => W : M = 20 : 3 Company employs 5 managers for every 1 director => M: D = 5: 1 Combined ratio would be W : M : D = 100 : 15 : 3 and the total number of employees at the company is between 300 and 400 W : M : D = 100 : 15 : 3 means total of 118 people W : M : D = 200 : 30 : 6 means total of 236 people W : M : D = 300 : 45 : 9 means total of 354 people (total between 300 and 400) W : M : D = 400 : 60 :12 means total of 472 people 13. Focus writing in English: Impact of information technology in banking system Banking environment has become highly competitive today. Information technology refers to the acquisition, processing, storage and dissemination of all types of information using computer technology and telecommunication systems. Information technology architecture is an integrated framework for acquiring and evolving IT to achieve strategic goals. These technologies are used for the input, storage, processing and communication of information. Information technology includes ancillary equipment, software, firmware and similar procedures, services etc. Modern high throughput technologies are providing vast amounts of the sequences, expression and functional data for genes and protein. Recent developments of banking sector in Bangladesh are Internet, Society for worldwide inter-bank financial telecommunications (SWIFT), Automated Teller Machine (ATM), Cash dispensers, Electronic clearing service, Bank Net, Chip card, Phone banking, Tele-banking, Internet banking, Mobile banking, Anywhere banking, Voice mail, E-banking Etc., The basic need of Information Technology (IT) in Banking Sector are Meeting Internal Requirements, Effective in Data Handling, Extending Customer Services, Creative Support for New Product Development, End-user Development of the Non-technical Staff. Emerging trends of information technology in banking sector are Outsourcing, Integration, Distinctive Edge, IT as Profit Centre, Prospering in Down Market. Challenges faced by Bangladesh banking scenario in Bangladesh are Meet customer expectations on service and facility offered by the bank, Customer retention, Managing the spread and sustain the operating profit, Retaining the current market share in the industry and the improving the same, Completion from other players in the banking industry. Other Information Technology enables sophisticated product development, better market infrastructure, implementation of reliable techniques for control of risks and helps the financial intermediaries to reach geographically distant and diversified markets. Internet has significantly influenced delivery channels of the banks. Internet has emerged as an important medium for delivery of banking products and services. Information, communication and networking, achieving inter branch connectivity, moving towards Real Time gross settlement (RTGS) environment the forecasting of liquidity by building real time databases, The shift from traditional banking to e-banking is changing customer’s expectations. For a country like India, which is one of the most promising emerging markets, such isolation is nearly impossible. More particularly in the area of Information technology, where India has definitely an edge over its competitors, remaining away or uniformity of the world trends is untenable. Financial sector in general and banking industry in particular is the S t a c k I T J o b S o l u t i o n