SlideShare une entreprise Scribd logo
1  sur  5
Télécharger pour lire hors ligne
Question Bank 2004- 2023 | Bank Special Stack IT Job Solution
Stack
IT
Question
Bank
|
01789741518,
01761719838
|
Buy
Book:
stackvaly.com
|
Online
Exam:
exam.stackvaly.com

1
Bangladesh Bank
Exam Taker: BUET
Assistant Maintenance Engineer(AME)
Marks: 150 Time: 1.30 h Date: 21.09.2019
[ সকল প্রশ্নের উত্তর দিশ্নে হশ্নে ]
Solved by: Stack IT
1. What is the distributed DBMS and describe
its feature?
A distributed database management system
(DDBMS) is a collection of multiple, logically
interrelated databases distributed over a computer
network. They provided a mechanism that makes
the distribution of data transparent to users.
Feature of DDBMS is given bellow:
a) It is used to create, retrieve, update and
delete distributed databases.
b) It is designed for heterogeneous database
platforms.
c) It maintains confidentiality and data
integrity of the databases.
d) It ensures that the data modified at any site
is universally updated.
e) Location independent
f) Distributed transaction management
g) Distributed query processing
h) Hardware & Network independent
i) Operating system independent
j) Transaction transparency
k) DBMS independent.
2. How can we test ATM in distributed
banking system?
We can test ATM in distributed banking system by
following criteria:
a) Withdrawing money less than the account
balance.
b) Withdrawing money greater than the
account balance.
c) Withdrawing money equal to the account
balance.
d) Withdrawing money from an ATM and
from the internet at the same time.
e) Withdrawing money when the connection
to the bank’s networks is lost.
f) Withdrawing money from multiple ATMs
simultaneously.
g) Check the balance available.
h) Make a deposit at an ATM.
i) Try to enter invalid pin more than 3 times
and see if the account gets locked.
j) Try quick cash with drawl.
k) Try to buy stamps.
3. What is the importance of application
framework in web application
development?
a) Investing in the task, not in the
technology: This is the essential principle
of a framework, not having to reinvent the
wheel and doing away with foreboding, low
value- added tasks, for instance, the
development of generic components in
order to fully focus on the business rules.
b) Guaranteed upgradability &
maintenance: In the longer term, a
framework makes sure the longevity of your
applications. If a development team works
as they please, only that team will be able to
maintain and upgrade the application with
ease.
c) Open source: Being open source means
that frameworks are cost effective for both
the customer and developer. This doesn’t
mean that they aren’t of good quality. Most
of the well-known web frameworks used by
developers are free for use.
d) Efficiency: Efficiency is another vital
advantage for web developers. This is
because frameworks eliminate the need to
write a lot of repetitive code allowing
developers to build websites and
applications much quicker.
e) Integration: This is one of the most useful
features that have the ability to permit
developers to link with other tools such as
S
t
a
c
k
I
T
J
o
b
S
o
l
u
t
i
o
n
Question Bank 2004- 2023 | Bank Special Stack IT Job Solution
Stack
IT
Question
Bank
|
01789741518,
01761719838
|
Buy
Book:
stackvaly.com
|
Online
Exam:
exam.stackvaly.com

databases to the framework. One of the
most common criticisms levied against
frameworks is that they tend to make the
code a lot more complicated than it should
be. Also, rather than the reduced
development time claimed by its
proponents, frameworks actually result in a
more time- consuming process since users
will have to spend more time learning to use
them.
4. Differentiate between micro and macro
(Monolithic) kernel. What are the sub-
components of I/O manager in Windows
NT?
Micro kernel is a kernel which run services those
are minimal for operating system performance. In
this kernel all other operations are performed by
processor.
Macro kernel is a combination of micro and
monolithic kernel. In monolithic kernel all
operating system code is in single executable
image.
Sub-components of I/O manager:
a) Network redirector / Server
b) Cache manager
c) File systems
d) Network driver
e) Device driver
5. Write the short note on Node, Hub,
Backbone, Router and Gateway.
a) Node: Any system or device connected to
a network is called a node. A node is any
physical device within a network of other
tools that’s able to send, receive or forward
information. e.g. personal computer,
modem, switch, hub, server etc.
b) Hub: A Hub is a network connectivity
device that broadcasts data to every
computer or Ethernet based device
connected to it.
c) Backbone: A backbone is the part of the
computer network infrastructure that
interconnects different networks and
provides a path for exchange of data
between these different networks. A
backbone may interconnect different local
area networks in offices, campuses or
buildings.
d) Router: A router is a network connectivity
device that forwards data packets between
computer networks based on IP addresses.
Router is mainly network layer (layer-3)
device.
e) Gateway: A gateway is a component that
is part of two networks, which use different
protocols. It may be a router, firewall,
server or other device that enables traffic
to flow in and out of the network.
6. Write the categories of computer
architecture. What are the stages of DLX
pipelines?
Computer architecture: Computer architecture
refers to how a computer system is designed and
what technologies it is compatible with.
There are three categories of computer
architecture:
a) System design: This includes all hardware
components in the system, including data
processors aside from the CPU, such as the
graphics processing unit and direct memory
access. It also includes memory controllers,
data paths and miscellaneous things like
multiprocessing and virtualization.
b) Instruction set architecture (ISA): This is
the embedded programming language of the
central processing unit. It defines the CPU’s
functions and capabilities based on what
programming it can perform or process. This
includes the word size, processor register
types, memory addressing modes, data
formats and the instruction set that
programmers use.
c) Microarchitecture: This type of architecture
defines the data paths, data processing and
storage elements, as well as how they should
be implemented in the ISA.
DLX pipeline consists of five stages:
a) Instruction Fetch (IF): The instruction
fetch stage fetches the next instruction
from memory using the address in the PC
(program counter).
S
t
a
c
k
I
T
J
o
b
S
o
l
u
t
i
o
n
Question Bank 2004- 2023 | Bank Special Stack IT Job Solution
Stack
IT
Question
Bank
|
01789741518,
01761719838
|
Buy
Book:
stackvaly.com
|
Online
Exam:
exam.stackvaly.com

b) Instruction Decode (ID): The instruction
decode stage decodes the instruction in the
IR, calculates the next PC and reads any
operands required from the register file.
c) Execute (EX): The execute stage executes
the instruction. In fact, all ALU operations
are done in this stage.
d) Memory (MEM): The memory access
stage performs any memory access
required by the current instruction, so for
loads, it would load an operand from
memory. For stores it would store an
operand into memory. For all other
instructions it would do nothing.
e) Write Back (WB): For instructions that
have a result (a destination register) the
write back writes this back to the register
file. Note that this includes nearly all
instructions, except nops (no-operation)
and stores.
7. Differentiate among risk, threat and
vulnerability. What is SSL and TSL?
a) Risk: Risk is defined as the potential for
loss or damage of an asset when a threat
exploits a vulnerability. Examples of risk
include financial losses, loss of privacy,
reputational damage, legal implications
and even loss of life. Risk can also be
defined as: Risk = Threat probability *
potential loss / impact.
b) Threat: Anything that can exploit
vulnerability, intentionally or accidentally
and obtain damage or destroy an asset.
Common threats include things like:
i. An activist tries to steal data from
your website.
ii. A fire starts in your data center
iii. An administrator accidentally
turns off your website AWS
instance.
iv. A flood hits your headquarters
v. An insider tries to sell your
corporate secrets to a competitor
c) Vulnerability: Vulnerability refers to
weaknesses or gaps in a security program
that can be exploited by threats to gain
unauthorized access to an asset.
Common examples of
vulnerabilities include:
i. SQL injection
ii. Cross site scripting (XSS)
iii. Broken authentication and session
management
iv. Security misconfiguration
v. Insecure cryptographic storage
vi. Failure to restrict URL access
vii. Insufficient transport layer
protection
viii. Insecure direct object references
d) SSL: Secure Socket Layer (SSL) is a
standard protocol used to establish a
secured and an encrypted connection
between a server and the browser. SSL is
most commonly seen in payment and
banking web sites.
e) TLS: Transport Layer Security (TLS) is a
protocol that provides communication
security between client / server
applications that communicate with each
other over the internet. It enables privacy,
integrity and protection for the data that’s
transmitted between different nodes on the
internet.
8. Four 1 kbps connections are multiplexed
together. A unit is 1 bit. Find (A) the
duration of 1 bit before multiplexing (B) the
transmission rate of the link (C) the
duration of a time slot and (D) the duration
of a frame.
a) The duration of 1 bit is 1/1 Kbps, or 0.001
s (1 ms).
b) The rate of the link is 4 Kbps.
c) The duration of each time slot 1/4 ms or
250 us.
d) The duration of a frame 1 ms.
9. How can you implement AND gate & OR
gate using CMOS NAND & NOR gate?
a) CMOS two-input NAND and AND
gates:
S
t
a
c
k
I
T
J
o
b
S
o
l
u
t
i
o
n
Question Bank 2004- 2023 | Bank Special Stack IT Job Solution
Stack
IT
Question
Bank
|
01789741518,
01761719838
|
Buy
Book:
stackvaly.com
|
Online
Exam:
exam.stackvaly.com

Circuit Description: This applet demonstrates the
static two-input NAND and AND gates in CMOS
technology. Click the input switches or type the
('a','b') and ('c','d') bindkeys to control the two
gates.
The two-input NAND2 gate shown on the left is
built from four transistors. The series-connection
of the two n-channel transistors between GND and
the gate-output ensures that the gate-output is only
driven low (logical 0) when both gate inputs A or
B are high (logical 1). The complementary parallel
connection of the two transistors between VCC and
gate-output means that the gate-output is driven
high (logical 1) when one or both gate inputs are
low (logical 0). The net result is the logical NAND
function:
NAND AND
A B Y A B Y
0 0 1 0 0 0
0 1 1 0 1 0
1 0 1 1 0 0
1 1 0 1 1 1
As shown on the right, the corresponding AND
gate is constructed from the NAND followed by a
standard static inverter.
b) CMOS two-input NOR and OR gates:
Circuit Description: This applet demonstrates the
static two-input NOR and OR gates in CMOS
technology. Click the input switches or type the
('a','b') and ('c','d') bindkeys to control the two
gates.
The two-input NOR2 gate shown on the left is built
from four transistors. The parallel connection of the
two n-channel transistors between GND and the
gate-output ensures that the gate-output is driven
low (logical 0) when either gate input A or B is high
(logical 1). The complementary series-connection
of the two transistors between VCC and gate-
output means that the gate-output is driven high
(logical 1) when both gate inputs are low (logical
0). The net result is the logical NOR function:
NOR OR
A B Y A B Y
0 0 1 0 0 0
0 1 0 0 1 1
1 0 0 1 0 1
1 1 0 1 1 1
As shown on the right, the corresponding OR
gate is constructed from the NOR2 followed by
a standard static inverter.
10. A 3-phase 12 pole alternator running at 500
rpm, supplying power to a 8 pole induction
motor. If slip is 3%, what is the full load speed
of the motor?
Synchronous machine is operating at 500 rpm
⇒ 500 = 120 × f / 12 = 50 Hz
Induction machine synchronous speed
= (120 × 50)/ 8 = 750 rpm
Rotor full load speed, Nr = Ns (1 – s)
= 750 (1 - 0.03) = 727.5 rpm
11. The distance between Town X and Town Y
is twice the distance between Town X and Town
Z. The distance between Town Z and Town W
is 2/3 the distance between Town Z and Town X.
If the distance between Town Z and Town W is
18 miles, how far is Town X from Town Y?
Let us represent the respective distances using the
names of the towns.
 Let distance between town X and town Y
= XY;
 distance between town X and town Z =
XZ,
 distance between town Z and town W =
WZ.
S
t
a
c
k
I
T
J
o
b
S
o
l
u
t
i
o
n
Question Bank 2004- 2023 | Bank Special Stack IT Job Solution
Stack
IT
Question
Bank
|
01789741518,
01761719838
|
Buy
Book:
stackvaly.com
|
Online
Exam:
exam.stackvaly.com

Let us now connect these unknown using
equations.
 XY = 2 XZ, which can be equation 1.
WZ = 2/3 XZ, which can be equation 2.
The question says that WZ = 18. Substituting this
in equation 2,
18 = 2/3XZ which yields us XZ = 27. Substituting
this in equation 1, we have,
XY = 2*27 = 54.
Therefore, town X is 54 km away from town Y.
12. A company employs 20 workers for every 3
managers, and 5 managers for every director. If
the total number of employees at the company is
between 300 and 400, what is the number of
managers who work at the company?
Company employs 20 workers for every 3
managers => W : M = 20 : 3
Company employs 5 managers for every 1
director => M: D = 5: 1
Combined ratio would be W : M : D = 100 : 15 : 3
and the total number of employees at the company
is between 300 and 400
W : M : D = 100 : 15 : 3
means total of 118 people
W : M : D = 200 : 30 : 6
means total of 236 people
W : M : D = 300 : 45 : 9
means total of 354 people (total between 300
and 400)
W : M : D = 400 : 60 :12
means total of 472 people
13. Focus writing in English: Impact of
information technology in banking system
Banking environment has become highly
competitive today. Information technology refers
to the acquisition, processing, storage and
dissemination of all types of information using
computer technology and telecommunication
systems. Information technology architecture is an
integrated framework for acquiring and evolving
IT to achieve strategic goals. These technologies
are used for the input, storage, processing and
communication of information. Information
technology includes ancillary equipment, software,
firmware and similar procedures, services etc.
Modern high throughput technologies are
providing vast amounts of the sequences,
expression and functional data for genes and
protein. Recent developments of banking sector in
Bangladesh are Internet, Society for worldwide
inter-bank financial telecommunications (SWIFT),
Automated Teller Machine (ATM), Cash
dispensers, Electronic clearing service, Bank Net,
Chip card, Phone banking, Tele-banking, Internet
banking, Mobile banking, Anywhere banking,
Voice mail, E-banking Etc., The basic need of
Information Technology (IT) in Banking Sector are
Meeting Internal Requirements, Effective in Data
Handling, Extending Customer Services, Creative
Support for New Product Development, End-user
Development of the Non-technical Staff. Emerging
trends of information technology in banking sector
are Outsourcing, Integration, Distinctive Edge, IT
as Profit Centre, Prospering in Down Market.
Challenges faced by Bangladesh banking scenario
in Bangladesh are Meet customer expectations on
service and facility offered by the bank, Customer
retention, Managing the spread and sustain the
operating profit, Retaining the current market share
in the industry and the improving the same,
Completion from other players in the banking
industry. Other Information Technology enables
sophisticated product development, better market
infrastructure, implementation of reliable
techniques for control of risks and helps the
financial intermediaries to reach geographically
distant and diversified markets. Internet has
significantly influenced delivery channels of the
banks. Internet has emerged as an important
medium for delivery of banking products and
services. Information, communication and
networking, achieving inter branch connectivity,
moving towards Real Time gross settlement
(RTGS) environment the forecasting of liquidity by
building real time databases, The shift from
traditional banking to e-banking is changing
customer’s expectations. For a country like India,
which is one of the most promising emerging
markets, such isolation is nearly impossible. More
particularly in the area of Information technology,
where India has definitely an edge over its
competitors, remaining away or uniformity of the
world trends is untenable. Financial sector in
general and banking industry in particular is the
S
t
a
c
k
I
T
J
o
b
S
o
l
u
t
i
o
n

Contenu connexe

Tendances

Solution manual of assembly language programming and organization of the ibm ...
Solution manual of assembly language programming and organization of the ibm ...Solution manual of assembly language programming and organization of the ibm ...
Solution manual of assembly language programming and organization of the ibm ...Tayeen Ahmed
 
Focus writing [www.onlinebcs.com]
Focus writing [www.onlinebcs.com]Focus writing [www.onlinebcs.com]
Focus writing [www.onlinebcs.com]Itmona
 
Dynamic interconnection networks
Dynamic interconnection networksDynamic interconnection networks
Dynamic interconnection networksPrasenjit Dey
 
Computer Network Notes (Handwritten) UNIT 2
Computer Network Notes (Handwritten) UNIT 2Computer Network Notes (Handwritten) UNIT 2
Computer Network Notes (Handwritten) UNIT 2NANDINI SHARMA
 
operating system question bank
operating system question bankoperating system question bank
operating system question bankrajatdeep kaur
 
iso osi model
 iso osi model iso osi model
iso osi modelvishnu1204
 
Wifi cracking Step by Step Using CMD and Kali Linux 2018
Wifi cracking Step by Step Using CMD and Kali Linux 2018Wifi cracking Step by Step Using CMD and Kali Linux 2018
Wifi cracking Step by Step Using CMD and Kali Linux 2018Mohammad Fareed
 
BASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKSBASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKSKABILESH RAMAR
 
Introduction to computer network 4th edition
Introduction to computer network   4th editionIntroduction to computer network   4th edition
Introduction to computer network 4th editionEnsign Handoko
 
Backpatching in Compiler Construction
Backpatching in Compiler ConstructionBackpatching in Compiler Construction
Backpatching in Compiler ConstructionMuhammad Haroon
 
Naming And Binding (Distributed computing)
Naming And Binding (Distributed computing)Naming And Binding (Distributed computing)
Naming And Binding (Distributed computing)Sri Prasanna
 
Transport Layer Numericals
Transport Layer NumericalsTransport Layer Numericals
Transport Layer NumericalsManisha Keim
 
Os solved question paper
Os solved question paperOs solved question paper
Os solved question paperAnkit Bhatnagar
 

Tendances (20)

Solution manual of assembly language programming and organization of the ibm ...
Solution manual of assembly language programming and organization of the ibm ...Solution manual of assembly language programming and organization of the ibm ...
Solution manual of assembly language programming and organization of the ibm ...
 
Focus writing [www.onlinebcs.com]
Focus writing [www.onlinebcs.com]Focus writing [www.onlinebcs.com]
Focus writing [www.onlinebcs.com]
 
Dynamic interconnection networks
Dynamic interconnection networksDynamic interconnection networks
Dynamic interconnection networks
 
Operating System: Deadlock
Operating System: DeadlockOperating System: Deadlock
Operating System: Deadlock
 
Adbms lab manual
Adbms lab manualAdbms lab manual
Adbms lab manual
 
Computer Network Notes (Handwritten) UNIT 2
Computer Network Notes (Handwritten) UNIT 2Computer Network Notes (Handwritten) UNIT 2
Computer Network Notes (Handwritten) UNIT 2
 
operating system question bank
operating system question bankoperating system question bank
operating system question bank
 
iso osi model
 iso osi model iso osi model
iso osi model
 
Distributed Transaction
Distributed TransactionDistributed Transaction
Distributed Transaction
 
Switch security
Switch securitySwitch security
Switch security
 
Srs for banking system
Srs for banking systemSrs for banking system
Srs for banking system
 
Remote backup system
Remote backup systemRemote backup system
Remote backup system
 
Wifi cracking Step by Step Using CMD and Kali Linux 2018
Wifi cracking Step by Step Using CMD and Kali Linux 2018Wifi cracking Step by Step Using CMD and Kali Linux 2018
Wifi cracking Step by Step Using CMD and Kali Linux 2018
 
BASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKSBASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKS
 
Introduction to computer network 4th edition
Introduction to computer network   4th editionIntroduction to computer network   4th edition
Introduction to computer network 4th edition
 
Backpatching in Compiler Construction
Backpatching in Compiler ConstructionBackpatching in Compiler Construction
Backpatching in Compiler Construction
 
Naming And Binding (Distributed computing)
Naming And Binding (Distributed computing)Naming And Binding (Distributed computing)
Naming And Binding (Distributed computing)
 
Transport Layer Numericals
Transport Layer NumericalsTransport Layer Numericals
Transport Layer Numericals
 
Os solved question paper
Os solved question paperOs solved question paper
Os solved question paper
 
OS Unit 5 - Memory Management
OS Unit 5 - Memory ManagementOS Unit 5 - Memory Management
OS Unit 5 - Memory Management
 

Similaire à Bangladesh Bank Assistant Maintenance Engineer Question Solution.

Privacy Preservation in cloud Environment using AES Algorithm
Privacy Preservation in cloud Environment using AES AlgorithmPrivacy Preservation in cloud Environment using AES Algorithm
Privacy Preservation in cloud Environment using AES AlgorithmIRJET Journal
 
What are the security requirements and challenges of Grid and Cloud .pdf
What are the security requirements and challenges of Grid and Cloud .pdfWhat are the security requirements and challenges of Grid and Cloud .pdf
What are the security requirements and challenges of Grid and Cloud .pdfarishmarketing21
 
Essay On Active Directory
Essay On Active DirectoryEssay On Active Directory
Essay On Active DirectoryTammy Moncrief
 
lec1.pptx
lec1.pptxlec1.pptx
lec1.pptxMusab58
 
DELL EMC DEA-1TT5 Updated Dumps 2023
DELL EMC DEA-1TT5 Updated Dumps 2023DELL EMC DEA-1TT5 Updated Dumps 2023
DELL EMC DEA-1TT5 Updated Dumps 2023VictoriaMeisel
 
An Exploration of Grid Computing to be Utilized in Teaching and Research at TU
An Exploration of Grid Computing to be Utilized in Teaching and Research at TUAn Exploration of Grid Computing to be Utilized in Teaching and Research at TU
An Exploration of Grid Computing to be Utilized in Teaching and Research at TUEswar Publications
 
Custom Software Development Checklist by Michael Cordova
Custom Software Development Checklist by Michael CordovaCustom Software Development Checklist by Michael Cordova
Custom Software Development Checklist by Michael Cordovahoolikar77
 
Analysis Of Internet Protocol ( IP ) Datagrams
Analysis Of Internet Protocol ( IP ) DatagramsAnalysis Of Internet Protocol ( IP ) Datagrams
Analysis Of Internet Protocol ( IP ) DatagramsEmily Jones
 
Consider introducing the overall objective of the network design/tutorialoutlet
Consider introducing the overall objective of the network design/tutorialoutletConsider introducing the overall objective of the network design/tutorialoutlet
Consider introducing the overall objective of the network design/tutorialoutletPittock
 
thilaganga journal 1
thilaganga journal 1thilaganga journal 1
thilaganga journal 1thilaganga
 
Blockchain solution architecture deliverable
Blockchain solution architecture deliverableBlockchain solution architecture deliverable
Blockchain solution architecture deliverableSarmad Ibrahim
 
Question 1The OSI model has seven layers where each layer pe.docx
Question 1The OSI model has seven layers where each layer pe.docxQuestion 1The OSI model has seven layers where each layer pe.docx
Question 1The OSI model has seven layers where each layer pe.docxssuser774ad41
 
EDT 323 Internet and Intranet 2022 Final.pptx
EDT 323 Internet and Intranet 2022 Final.pptxEDT 323 Internet and Intranet 2022 Final.pptx
EDT 323 Internet and Intranet 2022 Final.pptxGambari Amosa Isiaka
 
A Decentralized Application for Secure Private and Group Messaging in a Peer-...
A Decentralized Application for Secure Private and Group Messaging in a Peer-...A Decentralized Application for Secure Private and Group Messaging in a Peer-...
A Decentralized Application for Secure Private and Group Messaging in a Peer-...IRJET Journal
 
Application Of An Operating System Security
Application Of An Operating System SecurityApplication Of An Operating System Security
Application Of An Operating System SecurityAmber Wheeler
 

Similaire à Bangladesh Bank Assistant Maintenance Engineer Question Solution. (20)

Future prediction-ds
Future prediction-dsFuture prediction-ds
Future prediction-ds
 
Privacy Preservation in cloud Environment using AES Algorithm
Privacy Preservation in cloud Environment using AES AlgorithmPrivacy Preservation in cloud Environment using AES Algorithm
Privacy Preservation in cloud Environment using AES Algorithm
 
What are the security requirements and challenges of Grid and Cloud .pdf
What are the security requirements and challenges of Grid and Cloud .pdfWhat are the security requirements and challenges of Grid and Cloud .pdf
What are the security requirements and challenges of Grid and Cloud .pdf
 
computer networks
computer networkscomputer networks
computer networks
 
Essay On Active Directory
Essay On Active DirectoryEssay On Active Directory
Essay On Active Directory
 
publishable paper
publishable paperpublishable paper
publishable paper
 
lec1.pptx
lec1.pptxlec1.pptx
lec1.pptx
 
DELL EMC DEA-1TT5 Updated Dumps 2023
DELL EMC DEA-1TT5 Updated Dumps 2023DELL EMC DEA-1TT5 Updated Dumps 2023
DELL EMC DEA-1TT5 Updated Dumps 2023
 
Ijetcas14 583
Ijetcas14 583Ijetcas14 583
Ijetcas14 583
 
An Exploration of Grid Computing to be Utilized in Teaching and Research at TU
An Exploration of Grid Computing to be Utilized in Teaching and Research at TUAn Exploration of Grid Computing to be Utilized in Teaching and Research at TU
An Exploration of Grid Computing to be Utilized in Teaching and Research at TU
 
Custom Software Development Checklist by Michael Cordova
Custom Software Development Checklist by Michael CordovaCustom Software Development Checklist by Michael Cordova
Custom Software Development Checklist by Michael Cordova
 
Analysis Of Internet Protocol ( IP ) Datagrams
Analysis Of Internet Protocol ( IP ) DatagramsAnalysis Of Internet Protocol ( IP ) Datagrams
Analysis Of Internet Protocol ( IP ) Datagrams
 
D033017020
D033017020D033017020
D033017020
 
Consider introducing the overall objective of the network design/tutorialoutlet
Consider introducing the overall objective of the network design/tutorialoutletConsider introducing the overall objective of the network design/tutorialoutlet
Consider introducing the overall objective of the network design/tutorialoutlet
 
thilaganga journal 1
thilaganga journal 1thilaganga journal 1
thilaganga journal 1
 
Blockchain solution architecture deliverable
Blockchain solution architecture deliverableBlockchain solution architecture deliverable
Blockchain solution architecture deliverable
 
Question 1The OSI model has seven layers where each layer pe.docx
Question 1The OSI model has seven layers where each layer pe.docxQuestion 1The OSI model has seven layers where each layer pe.docx
Question 1The OSI model has seven layers where each layer pe.docx
 
EDT 323 Internet and Intranet 2022 Final.pptx
EDT 323 Internet and Intranet 2022 Final.pptxEDT 323 Internet and Intranet 2022 Final.pptx
EDT 323 Internet and Intranet 2022 Final.pptx
 
A Decentralized Application for Secure Private and Group Messaging in a Peer-...
A Decentralized Application for Secure Private and Group Messaging in a Peer-...A Decentralized Application for Secure Private and Group Messaging in a Peer-...
A Decentralized Application for Secure Private and Group Messaging in a Peer-...
 
Application Of An Operating System Security
Application Of An Operating System SecurityApplication Of An Operating System Security
Application Of An Operating System Security
 

Plus de Engr. Md. Jamal Uddin Rayhan

Plus de Engr. Md. Jamal Uddin Rayhan (8)

DESCO AE CSE Question Solution
DESCO AE CSE Question SolutionDESCO AE CSE Question Solution
DESCO AE CSE Question Solution
 
OSI Model Cheat Sheet
OSI Model Cheat SheetOSI Model Cheat Sheet
OSI Model Cheat Sheet
 
Bangladesh Bank Data entry control operator Question Solution.
Bangladesh Bank Data entry control operator Question Solution.Bangladesh Bank Data entry control operator Question Solution.
Bangladesh Bank Data entry control operator Question Solution.
 
Senior Officer , Pubali Bank Limited
Senior Officer , Pubali Bank LimitedSenior Officer , Pubali Bank Limited
Senior Officer , Pubali Bank Limited
 
Bangladesh telecommunication regulatory commision
Bangladesh telecommunication regulatory commisionBangladesh telecommunication regulatory commision
Bangladesh telecommunication regulatory commision
 
Combined 2 Bank Compiled Post: ADA Date: 25.09.2021 Taker: AUST
Combined 2 Bank Compiled Post: ADA Date: 25.09.2021  Taker: AUSTCombined 2 Bank Compiled Post: ADA Date: 25.09.2021  Taker: AUST
Combined 2 Bank Compiled Post: ADA Date: 25.09.2021 Taker: AUST
 
Titas gas sub-assistant engineer question pattern
Titas gas sub-assistant engineer question patternTitas gas sub-assistant engineer question pattern
Titas gas sub-assistant engineer question pattern
 
information security and backup system
information security and backup systeminformation security and backup system
information security and backup system
 

Dernier

Call Girls Devanahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Devanahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Devanahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Devanahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service B...amitlee9823
 
Virgin Call Girls Delhi Service-oriented sexy call girls ☞ 9899900591 ☜ Rita ...
Virgin Call Girls Delhi Service-oriented sexy call girls ☞ 9899900591 ☜ Rita ...Virgin Call Girls Delhi Service-oriented sexy call girls ☞ 9899900591 ☜ Rita ...
Virgin Call Girls Delhi Service-oriented sexy call girls ☞ 9899900591 ☜ Rita ...poojakaurpk09
 
Escorts Service Cambridge Layout ☎ 7737669865☎ Book Your One night Stand (Ba...
Escorts Service Cambridge Layout  ☎ 7737669865☎ Book Your One night Stand (Ba...Escorts Service Cambridge Layout  ☎ 7737669865☎ Book Your One night Stand (Ba...
Escorts Service Cambridge Layout ☎ 7737669865☎ Book Your One night Stand (Ba...amitlee9823
 
Call Girls Jayanagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Jayanagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...Call Girls Jayanagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Jayanagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...amitlee9823
 
Call Girls Alandi Road Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Alandi Road Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Alandi Road Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Alandi Road Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
OSU毕业证留学文凭,制做办理
OSU毕业证留学文凭,制做办理OSU毕业证留学文凭,制做办理
OSU毕业证留学文凭,制做办理cowagem
 
Delhi Call Girls South Ex 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls South Ex 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls South Ex 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls South Ex 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Call Girls Bidadi ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Call Girls Bidadi ☎ 7737669865☎ Book Your One night Stand (Bangalore)Call Girls Bidadi ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Call Girls Bidadi ☎ 7737669865☎ Book Your One night Stand (Bangalore)amitlee9823
 
Joshua Minker Brand Exploration Sports Broadcaster .pptx
Joshua Minker Brand Exploration Sports Broadcaster .pptxJoshua Minker Brand Exploration Sports Broadcaster .pptx
Joshua Minker Brand Exploration Sports Broadcaster .pptxsportsworldproductio
 
Internship Report].pdf iiwmoosmsosmshkssmk
Internship Report].pdf iiwmoosmsosmshkssmkInternship Report].pdf iiwmoosmsosmshkssmk
Internship Report].pdf iiwmoosmsosmshkssmkSujalTamhane
 
Call Girls Bidadi Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Bidadi Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Bidadi Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Bidadi Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangaloreamitlee9823
 
Top Rated Pune Call Girls Deccan ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated  Pune Call Girls Deccan ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...Top Rated  Pune Call Girls Deccan ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated Pune Call Girls Deccan ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...Call Girls in Nagpur High Profile
 
Production Day 1.pptxjvjbvbcbcb bj bvcbj
Production Day 1.pptxjvjbvbcbcb bj bvcbjProduction Day 1.pptxjvjbvbcbcb bj bvcbj
Production Day 1.pptxjvjbvbcbcb bj bvcbjLewisJB
 
Book Paid Saswad Call Girls Pune 8250192130Low Budget Full Independent High P...
Book Paid Saswad Call Girls Pune 8250192130Low Budget Full Independent High P...Book Paid Saswad Call Girls Pune 8250192130Low Budget Full Independent High P...
Book Paid Saswad Call Girls Pune 8250192130Low Budget Full Independent High P...ranjana rawat
 
CALL ON ➥8923113531 🔝Call Girls Nishatganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Nishatganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Nishatganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Nishatganj Lucknow best sexual serviceanilsa9823
 
Resumes, Cover Letters, and Applying Online
Resumes, Cover Letters, and Applying OnlineResumes, Cover Letters, and Applying Online
Resumes, Cover Letters, and Applying OnlineBruce Bennett
 
Dark Dubai Call Girls O525547819 Skin Call Girls Dubai
Dark Dubai Call Girls O525547819 Skin Call Girls DubaiDark Dubai Call Girls O525547819 Skin Call Girls Dubai
Dark Dubai Call Girls O525547819 Skin Call Girls Dubaikojalkojal131
 
Dombivli Call Girls, 9892124323, Kharghar Call Girls, chembur Call Girls, Vas...
Dombivli Call Girls, 9892124323, Kharghar Call Girls, chembur Call Girls, Vas...Dombivli Call Girls, 9892124323, Kharghar Call Girls, chembur Call Girls, Vas...
Dombivli Call Girls, 9892124323, Kharghar Call Girls, chembur Call Girls, Vas...Pooja Nehwal
 
Hot Call Girls |Delhi |Janakpuri ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Janakpuri ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Janakpuri ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Janakpuri ☎ 9711199171 Book Your One night Standkumarajju5765
 
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Sa...
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Sa...Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Sa...
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Sa...Pooja Nehwal
 

Dernier (20)

Call Girls Devanahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Devanahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Devanahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Devanahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
 
Virgin Call Girls Delhi Service-oriented sexy call girls ☞ 9899900591 ☜ Rita ...
Virgin Call Girls Delhi Service-oriented sexy call girls ☞ 9899900591 ☜ Rita ...Virgin Call Girls Delhi Service-oriented sexy call girls ☞ 9899900591 ☜ Rita ...
Virgin Call Girls Delhi Service-oriented sexy call girls ☞ 9899900591 ☜ Rita ...
 
Escorts Service Cambridge Layout ☎ 7737669865☎ Book Your One night Stand (Ba...
Escorts Service Cambridge Layout  ☎ 7737669865☎ Book Your One night Stand (Ba...Escorts Service Cambridge Layout  ☎ 7737669865☎ Book Your One night Stand (Ba...
Escorts Service Cambridge Layout ☎ 7737669865☎ Book Your One night Stand (Ba...
 
Call Girls Jayanagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Jayanagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...Call Girls Jayanagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Jayanagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
 
Call Girls Alandi Road Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Alandi Road Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Alandi Road Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Alandi Road Call Me 7737669865 Budget Friendly No Advance Booking
 
OSU毕业证留学文凭,制做办理
OSU毕业证留学文凭,制做办理OSU毕业证留学文凭,制做办理
OSU毕业证留学文凭,制做办理
 
Delhi Call Girls South Ex 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls South Ex 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls South Ex 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls South Ex 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Call Girls Bidadi ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Call Girls Bidadi ☎ 7737669865☎ Book Your One night Stand (Bangalore)Call Girls Bidadi ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Call Girls Bidadi ☎ 7737669865☎ Book Your One night Stand (Bangalore)
 
Joshua Minker Brand Exploration Sports Broadcaster .pptx
Joshua Minker Brand Exploration Sports Broadcaster .pptxJoshua Minker Brand Exploration Sports Broadcaster .pptx
Joshua Minker Brand Exploration Sports Broadcaster .pptx
 
Internship Report].pdf iiwmoosmsosmshkssmk
Internship Report].pdf iiwmoosmsosmshkssmkInternship Report].pdf iiwmoosmsosmshkssmk
Internship Report].pdf iiwmoosmsosmshkssmk
 
Call Girls Bidadi Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Bidadi Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Bidadi Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Bidadi Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
Top Rated Pune Call Girls Deccan ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated  Pune Call Girls Deccan ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...Top Rated  Pune Call Girls Deccan ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated Pune Call Girls Deccan ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
 
Production Day 1.pptxjvjbvbcbcb bj bvcbj
Production Day 1.pptxjvjbvbcbcb bj bvcbjProduction Day 1.pptxjvjbvbcbcb bj bvcbj
Production Day 1.pptxjvjbvbcbcb bj bvcbj
 
Book Paid Saswad Call Girls Pune 8250192130Low Budget Full Independent High P...
Book Paid Saswad Call Girls Pune 8250192130Low Budget Full Independent High P...Book Paid Saswad Call Girls Pune 8250192130Low Budget Full Independent High P...
Book Paid Saswad Call Girls Pune 8250192130Low Budget Full Independent High P...
 
CALL ON ➥8923113531 🔝Call Girls Nishatganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Nishatganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Nishatganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Nishatganj Lucknow best sexual service
 
Resumes, Cover Letters, and Applying Online
Resumes, Cover Letters, and Applying OnlineResumes, Cover Letters, and Applying Online
Resumes, Cover Letters, and Applying Online
 
Dark Dubai Call Girls O525547819 Skin Call Girls Dubai
Dark Dubai Call Girls O525547819 Skin Call Girls DubaiDark Dubai Call Girls O525547819 Skin Call Girls Dubai
Dark Dubai Call Girls O525547819 Skin Call Girls Dubai
 
Dombivli Call Girls, 9892124323, Kharghar Call Girls, chembur Call Girls, Vas...
Dombivli Call Girls, 9892124323, Kharghar Call Girls, chembur Call Girls, Vas...Dombivli Call Girls, 9892124323, Kharghar Call Girls, chembur Call Girls, Vas...
Dombivli Call Girls, 9892124323, Kharghar Call Girls, chembur Call Girls, Vas...
 
Hot Call Girls |Delhi |Janakpuri ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Janakpuri ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Janakpuri ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Janakpuri ☎ 9711199171 Book Your One night Stand
 
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Sa...
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Sa...Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Sa...
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Sa...
 

Bangladesh Bank Assistant Maintenance Engineer Question Solution.

  • 1. Question Bank 2004- 2023 | Bank Special Stack IT Job Solution Stack IT Question Bank | 01789741518, 01761719838 | Buy Book: stackvaly.com | Online Exam: exam.stackvaly.com 1 Bangladesh Bank Exam Taker: BUET Assistant Maintenance Engineer(AME) Marks: 150 Time: 1.30 h Date: 21.09.2019 [ সকল প্রশ্নের উত্তর দিশ্নে হশ্নে ] Solved by: Stack IT 1. What is the distributed DBMS and describe its feature? A distributed database management system (DDBMS) is a collection of multiple, logically interrelated databases distributed over a computer network. They provided a mechanism that makes the distribution of data transparent to users. Feature of DDBMS is given bellow: a) It is used to create, retrieve, update and delete distributed databases. b) It is designed for heterogeneous database platforms. c) It maintains confidentiality and data integrity of the databases. d) It ensures that the data modified at any site is universally updated. e) Location independent f) Distributed transaction management g) Distributed query processing h) Hardware & Network independent i) Operating system independent j) Transaction transparency k) DBMS independent. 2. How can we test ATM in distributed banking system? We can test ATM in distributed banking system by following criteria: a) Withdrawing money less than the account balance. b) Withdrawing money greater than the account balance. c) Withdrawing money equal to the account balance. d) Withdrawing money from an ATM and from the internet at the same time. e) Withdrawing money when the connection to the bank’s networks is lost. f) Withdrawing money from multiple ATMs simultaneously. g) Check the balance available. h) Make a deposit at an ATM. i) Try to enter invalid pin more than 3 times and see if the account gets locked. j) Try quick cash with drawl. k) Try to buy stamps. 3. What is the importance of application framework in web application development? a) Investing in the task, not in the technology: This is the essential principle of a framework, not having to reinvent the wheel and doing away with foreboding, low value- added tasks, for instance, the development of generic components in order to fully focus on the business rules. b) Guaranteed upgradability & maintenance: In the longer term, a framework makes sure the longevity of your applications. If a development team works as they please, only that team will be able to maintain and upgrade the application with ease. c) Open source: Being open source means that frameworks are cost effective for both the customer and developer. This doesn’t mean that they aren’t of good quality. Most of the well-known web frameworks used by developers are free for use. d) Efficiency: Efficiency is another vital advantage for web developers. This is because frameworks eliminate the need to write a lot of repetitive code allowing developers to build websites and applications much quicker. e) Integration: This is one of the most useful features that have the ability to permit developers to link with other tools such as S t a c k I T J o b S o l u t i o n
  • 2. Question Bank 2004- 2023 | Bank Special Stack IT Job Solution Stack IT Question Bank | 01789741518, 01761719838 | Buy Book: stackvaly.com | Online Exam: exam.stackvaly.com databases to the framework. One of the most common criticisms levied against frameworks is that they tend to make the code a lot more complicated than it should be. Also, rather than the reduced development time claimed by its proponents, frameworks actually result in a more time- consuming process since users will have to spend more time learning to use them. 4. Differentiate between micro and macro (Monolithic) kernel. What are the sub- components of I/O manager in Windows NT? Micro kernel is a kernel which run services those are minimal for operating system performance. In this kernel all other operations are performed by processor. Macro kernel is a combination of micro and monolithic kernel. In monolithic kernel all operating system code is in single executable image. Sub-components of I/O manager: a) Network redirector / Server b) Cache manager c) File systems d) Network driver e) Device driver 5. Write the short note on Node, Hub, Backbone, Router and Gateway. a) Node: Any system or device connected to a network is called a node. A node is any physical device within a network of other tools that’s able to send, receive or forward information. e.g. personal computer, modem, switch, hub, server etc. b) Hub: A Hub is a network connectivity device that broadcasts data to every computer or Ethernet based device connected to it. c) Backbone: A backbone is the part of the computer network infrastructure that interconnects different networks and provides a path for exchange of data between these different networks. A backbone may interconnect different local area networks in offices, campuses or buildings. d) Router: A router is a network connectivity device that forwards data packets between computer networks based on IP addresses. Router is mainly network layer (layer-3) device. e) Gateway: A gateway is a component that is part of two networks, which use different protocols. It may be a router, firewall, server or other device that enables traffic to flow in and out of the network. 6. Write the categories of computer architecture. What are the stages of DLX pipelines? Computer architecture: Computer architecture refers to how a computer system is designed and what technologies it is compatible with. There are three categories of computer architecture: a) System design: This includes all hardware components in the system, including data processors aside from the CPU, such as the graphics processing unit and direct memory access. It also includes memory controllers, data paths and miscellaneous things like multiprocessing and virtualization. b) Instruction set architecture (ISA): This is the embedded programming language of the central processing unit. It defines the CPU’s functions and capabilities based on what programming it can perform or process. This includes the word size, processor register types, memory addressing modes, data formats and the instruction set that programmers use. c) Microarchitecture: This type of architecture defines the data paths, data processing and storage elements, as well as how they should be implemented in the ISA. DLX pipeline consists of five stages: a) Instruction Fetch (IF): The instruction fetch stage fetches the next instruction from memory using the address in the PC (program counter). S t a c k I T J o b S o l u t i o n
  • 3. Question Bank 2004- 2023 | Bank Special Stack IT Job Solution Stack IT Question Bank | 01789741518, 01761719838 | Buy Book: stackvaly.com | Online Exam: exam.stackvaly.com b) Instruction Decode (ID): The instruction decode stage decodes the instruction in the IR, calculates the next PC and reads any operands required from the register file. c) Execute (EX): The execute stage executes the instruction. In fact, all ALU operations are done in this stage. d) Memory (MEM): The memory access stage performs any memory access required by the current instruction, so for loads, it would load an operand from memory. For stores it would store an operand into memory. For all other instructions it would do nothing. e) Write Back (WB): For instructions that have a result (a destination register) the write back writes this back to the register file. Note that this includes nearly all instructions, except nops (no-operation) and stores. 7. Differentiate among risk, threat and vulnerability. What is SSL and TSL? a) Risk: Risk is defined as the potential for loss or damage of an asset when a threat exploits a vulnerability. Examples of risk include financial losses, loss of privacy, reputational damage, legal implications and even loss of life. Risk can also be defined as: Risk = Threat probability * potential loss / impact. b) Threat: Anything that can exploit vulnerability, intentionally or accidentally and obtain damage or destroy an asset. Common threats include things like: i. An activist tries to steal data from your website. ii. A fire starts in your data center iii. An administrator accidentally turns off your website AWS instance. iv. A flood hits your headquarters v. An insider tries to sell your corporate secrets to a competitor c) Vulnerability: Vulnerability refers to weaknesses or gaps in a security program that can be exploited by threats to gain unauthorized access to an asset. Common examples of vulnerabilities include: i. SQL injection ii. Cross site scripting (XSS) iii. Broken authentication and session management iv. Security misconfiguration v. Insecure cryptographic storage vi. Failure to restrict URL access vii. Insufficient transport layer protection viii. Insecure direct object references d) SSL: Secure Socket Layer (SSL) is a standard protocol used to establish a secured and an encrypted connection between a server and the browser. SSL is most commonly seen in payment and banking web sites. e) TLS: Transport Layer Security (TLS) is a protocol that provides communication security between client / server applications that communicate with each other over the internet. It enables privacy, integrity and protection for the data that’s transmitted between different nodes on the internet. 8. Four 1 kbps connections are multiplexed together. A unit is 1 bit. Find (A) the duration of 1 bit before multiplexing (B) the transmission rate of the link (C) the duration of a time slot and (D) the duration of a frame. a) The duration of 1 bit is 1/1 Kbps, or 0.001 s (1 ms). b) The rate of the link is 4 Kbps. c) The duration of each time slot 1/4 ms or 250 us. d) The duration of a frame 1 ms. 9. How can you implement AND gate & OR gate using CMOS NAND & NOR gate? a) CMOS two-input NAND and AND gates: S t a c k I T J o b S o l u t i o n
  • 4. Question Bank 2004- 2023 | Bank Special Stack IT Job Solution Stack IT Question Bank | 01789741518, 01761719838 | Buy Book: stackvaly.com | Online Exam: exam.stackvaly.com Circuit Description: This applet demonstrates the static two-input NAND and AND gates in CMOS technology. Click the input switches or type the ('a','b') and ('c','d') bindkeys to control the two gates. The two-input NAND2 gate shown on the left is built from four transistors. The series-connection of the two n-channel transistors between GND and the gate-output ensures that the gate-output is only driven low (logical 0) when both gate inputs A or B are high (logical 1). The complementary parallel connection of the two transistors between VCC and gate-output means that the gate-output is driven high (logical 1) when one or both gate inputs are low (logical 0). The net result is the logical NAND function: NAND AND A B Y A B Y 0 0 1 0 0 0 0 1 1 0 1 0 1 0 1 1 0 0 1 1 0 1 1 1 As shown on the right, the corresponding AND gate is constructed from the NAND followed by a standard static inverter. b) CMOS two-input NOR and OR gates: Circuit Description: This applet demonstrates the static two-input NOR and OR gates in CMOS technology. Click the input switches or type the ('a','b') and ('c','d') bindkeys to control the two gates. The two-input NOR2 gate shown on the left is built from four transistors. The parallel connection of the two n-channel transistors between GND and the gate-output ensures that the gate-output is driven low (logical 0) when either gate input A or B is high (logical 1). The complementary series-connection of the two transistors between VCC and gate- output means that the gate-output is driven high (logical 1) when both gate inputs are low (logical 0). The net result is the logical NOR function: NOR OR A B Y A B Y 0 0 1 0 0 0 0 1 0 0 1 1 1 0 0 1 0 1 1 1 0 1 1 1 As shown on the right, the corresponding OR gate is constructed from the NOR2 followed by a standard static inverter. 10. A 3-phase 12 pole alternator running at 500 rpm, supplying power to a 8 pole induction motor. If slip is 3%, what is the full load speed of the motor? Synchronous machine is operating at 500 rpm ⇒ 500 = 120 × f / 12 = 50 Hz Induction machine synchronous speed = (120 × 50)/ 8 = 750 rpm Rotor full load speed, Nr = Ns (1 – s) = 750 (1 - 0.03) = 727.5 rpm 11. The distance between Town X and Town Y is twice the distance between Town X and Town Z. The distance between Town Z and Town W is 2/3 the distance between Town Z and Town X. If the distance between Town Z and Town W is 18 miles, how far is Town X from Town Y? Let us represent the respective distances using the names of the towns.  Let distance between town X and town Y = XY;  distance between town X and town Z = XZ,  distance between town Z and town W = WZ. S t a c k I T J o b S o l u t i o n
  • 5. Question Bank 2004- 2023 | Bank Special Stack IT Job Solution Stack IT Question Bank | 01789741518, 01761719838 | Buy Book: stackvaly.com | Online Exam: exam.stackvaly.com Let us now connect these unknown using equations.  XY = 2 XZ, which can be equation 1. WZ = 2/3 XZ, which can be equation 2. The question says that WZ = 18. Substituting this in equation 2, 18 = 2/3XZ which yields us XZ = 27. Substituting this in equation 1, we have, XY = 2*27 = 54. Therefore, town X is 54 km away from town Y. 12. A company employs 20 workers for every 3 managers, and 5 managers for every director. If the total number of employees at the company is between 300 and 400, what is the number of managers who work at the company? Company employs 20 workers for every 3 managers => W : M = 20 : 3 Company employs 5 managers for every 1 director => M: D = 5: 1 Combined ratio would be W : M : D = 100 : 15 : 3 and the total number of employees at the company is between 300 and 400 W : M : D = 100 : 15 : 3 means total of 118 people W : M : D = 200 : 30 : 6 means total of 236 people W : M : D = 300 : 45 : 9 means total of 354 people (total between 300 and 400) W : M : D = 400 : 60 :12 means total of 472 people 13. Focus writing in English: Impact of information technology in banking system Banking environment has become highly competitive today. Information technology refers to the acquisition, processing, storage and dissemination of all types of information using computer technology and telecommunication systems. Information technology architecture is an integrated framework for acquiring and evolving IT to achieve strategic goals. These technologies are used for the input, storage, processing and communication of information. Information technology includes ancillary equipment, software, firmware and similar procedures, services etc. Modern high throughput technologies are providing vast amounts of the sequences, expression and functional data for genes and protein. Recent developments of banking sector in Bangladesh are Internet, Society for worldwide inter-bank financial telecommunications (SWIFT), Automated Teller Machine (ATM), Cash dispensers, Electronic clearing service, Bank Net, Chip card, Phone banking, Tele-banking, Internet banking, Mobile banking, Anywhere banking, Voice mail, E-banking Etc., The basic need of Information Technology (IT) in Banking Sector are Meeting Internal Requirements, Effective in Data Handling, Extending Customer Services, Creative Support for New Product Development, End-user Development of the Non-technical Staff. Emerging trends of information technology in banking sector are Outsourcing, Integration, Distinctive Edge, IT as Profit Centre, Prospering in Down Market. Challenges faced by Bangladesh banking scenario in Bangladesh are Meet customer expectations on service and facility offered by the bank, Customer retention, Managing the spread and sustain the operating profit, Retaining the current market share in the industry and the improving the same, Completion from other players in the banking industry. Other Information Technology enables sophisticated product development, better market infrastructure, implementation of reliable techniques for control of risks and helps the financial intermediaries to reach geographically distant and diversified markets. Internet has significantly influenced delivery channels of the banks. Internet has emerged as an important medium for delivery of banking products and services. Information, communication and networking, achieving inter branch connectivity, moving towards Real Time gross settlement (RTGS) environment the forecasting of liquidity by building real time databases, The shift from traditional banking to e-banking is changing customer’s expectations. For a country like India, which is one of the most promising emerging markets, such isolation is nearly impossible. More particularly in the area of Information technology, where India has definitely an edge over its competitors, remaining away or uniformity of the world trends is untenable. Financial sector in general and banking industry in particular is the S t a c k I T J o b S o l u t i o n