Publicité
Combined 2 Bank Compiled Post: SO(IT)  Date: 25.09.2021  Taker: AUST
Combined 2 Bank Compiled Post: SO(IT)  Date: 25.09.2021  Taker: AUST
Combined 2 Bank Compiled Post: SO(IT)  Date: 25.09.2021  Taker: AUST
Combined 2 Bank Compiled Post: SO(IT)  Date: 25.09.2021  Taker: AUST
Publicité
Combined 2 Bank Compiled Post: SO(IT)  Date: 25.09.2021  Taker: AUST
Combined 2 Bank Compiled Post: SO(IT)  Date: 25.09.2021  Taker: AUST
Combined 2 Bank Compiled Post: SO(IT)  Date: 25.09.2021  Taker: AUST
Combined 2 Bank Compiled Post: SO(IT)  Date: 25.09.2021  Taker: AUST
Combined 2 Bank Compiled Post: SO(IT)  Date: 25.09.2021  Taker: AUST
Publicité
Combined 2 Bank Compiled Post: SO(IT)  Date: 25.09.2021  Taker: AUST
Combined 2 Bank Compiled Post: SO(IT)  Date: 25.09.2021  Taker: AUST
Prochain SlideShare
BPSC Previous Year Question for AP, ANE, AME, ADA, AE BPSC Previous Year Question for AP, ANE, AME, ADA, AE
Chargement dans ... 3
1 sur 11
Publicité

Contenu connexe

Publicité
Publicité

Combined 2 Bank Compiled Post: SO(IT) Date: 25.09.2021 Taker: AUST

  1. Combined Bank Stack IT Question Bank | 01789741518, 01761719838 | Buy Book: stackvaly.com | Online Exam: exam.stackvaly.com Banker Selection Committee Combined 2 Bank Compiled By: Stack IT Job Solution Post: SO(IT) Exam Type: MCQ Date: 25.09.2021 Time: 1 Hour Exam Taker: AUST 1. Between a client and a web server, which of the following is used for inspecting the data that is sent from the client to the web server and blocking attacks such as SOL injection?  Cluster configuration  Load balancing function  SSL-VPN function  WAF Explanation: WAF mitigates such attacks by dynamically monitoring client traffic flows for malicious injection patterns and preventing unauthorized execution. Answer: d 2. Which one of the following is false with respect to 4G and 5G cellular network?  5G supports faster bandwidth compared to 4G.  Latency in 4G networks is much higher than 5G network  4G uses a narrow slice of the available spectrum from 600 MHz to 2.5 GHz  There will be data session handoff feature in 5G network which is not available in 4G network Explanation: Handover, or handoff in 5G NR or 4G LTE happens when a Data/Voice call is transferred from one cell to the an adjacent cell as the Mobile user moves through the network coverage area. Before any base station software is released for field, it goes through multiple level of testing's (regression, load etc.) Answer: d 3. What is the propagation time for a 2.5 kbyte message an e-mail) if the bandwidth of the network is 1 Gbps? Assume that the distance between the sender and the receiver is 12,000 km and that light travels at 2.4 x 198 m/s.  50 ms  0.020 ms  100 ms  0.040 ms Explanation: Propagation time=12000*1000)/(2.4108)=50ms Transmission time=(2500*8)/109=0.020ms Answer: b 4. User passwords in Linux are stored as  Direct text data  Encrypted using some sort of hashing function  Encrypted using monoalphabetic cipher  Encrypted using homophonic substitution cipher Explanation: The main storage methods for passwords are plain text, hashed, hashed and salted, and reversibly encrypted. Answer: a 5. On a class B network, how many hosts are available at each site with subnet mask of 248?  16,382  8,190  4,094  2,046 Explanation: As subnet mask given 248(class B)it means 255.255.248.0 It's binary form 11111111.11111111.11111000.00000000 It means we have 5bit(from 3rd octet) used for subnet (2^5 = 32 subnet)& Remaining 3bit + 8bit = 11bit. (from 3rd octet & 4th octet respectively)are used for HOST bit. Hence Total No.of HOST = 2^11-2 = 2046. Answer: d 6. A job which is schedule to run periodically at fixed times or intervals is known as  Batch Job  Cron job  Shell Script  None of the above Explanation: The cron command-line utility, also known as cron job is a job scheduler on Unix-like operating systems. Users who set up and maintain software environments use cron to schedule jobs to run periodically at fixed times, dates, or intervals. Answer: b 7. In Oracle DBMS, LGWR process is a  Foreground Process  Background Process  High Priority Process  Batch Process Explanation: The log writer process (LGWR) is responsible for redo log buffer management—writing the redo log buffer to a redo log file on disk. LGWR writes all redo entries that have been copied into the buffer since the last time it wrote. The redo log buffer is a circular buffer. Answer: b 8. The----- is an HFC network device installed inside the distribution hub that receives data S t a c k I T J o b S o l u t i o n To order Book Visit: stackvaly.com To order Book Visit: stackvaly.com To order Book call: 01812603406
  2. Combined Bank Stack IT Question Bank | 01789741518, 01761719838 | Buy Book: stackvaly.com | Online Exam: exam.stackvaly.com from the internet and passes them to the combiner  CM  CMTS  DOCSIS  MCNS Explanation: A cable modem termination system (CMTS) is a piece of equipment, typically located in a cable company's headend or hubsite, which is used to provide high speed data services, such as cable Internet or Voice over Internet Protocol, to cable subscribers. Answer: b 9. Finding useful pattern from the data in a database is known as  Data Visualization  Data Mining  Data Analytics  All of the above Explanation: The process of analyzing large databases to find useful pattern is termed as data mining. This procedure also includes database systems, statistical methods and machine learning for computer science. This step is actually used for discovering the various patterns and knowledge on different matters from the huge numbers of data; hence it is same as data analysis. Answer: b 10. ----helps prevent power surges.  Surge suppressor  Surge protector  UPS system  High-grade multi- meter Explanation: A surge suppressor (sometimes optimistically called a "surge protector") is a device inserted in the alternating current ( AC ) utility line and/or telephone line to prevent damage to electronic equipment from voltage "spikes" called transients. Answer: a 11. NET can be used in the following  Development of Desktop Applications  Development of Micro services and containers  Development of Cloud Applications  All of the above statements are true Explanation: .NET Framework is used to create and run software applications. .NET apps can run on many operating systems, using different implementations of .NET. .NET Framework is used for running .NET apps on Windows. Answer: d 12. What is the API level of Android version 11  24  25  31  None of the above Explanation: api level 30 Answer: d 13. What is the Internal Code name of Android version 8.0?  Red Velvet Cake  Oatmeal Cookie  Snow Cone  Jelly Bean Explanation: Android Oreo, Internal Codename: Oatmeal Cookie Answer: b 14. Which one of the following is false with respect to cryptography?  Asymmetric key system uses only the private key  An asymmetric key system makes use of both the public key and the private key  An Asymmetric key system is used as a Public Key Infrastructure or PKI for short  None of the above statements is false Explanation: Answer: 15. A circuit has two different voltage sources that are connected in a series-opposing form. If the sources are rated at 6 V and 9 V. what is the total source voltage?  3 V  16 V  7.5 V  8V Explanation: Answer: a 16. Java Virtual Machine  Acts as a full- fledged hypervisor  Converts byle codes to Operating System dependent code  Is known as the Compiler of Java programming language  Mannges system memory and provides a portable execution environment for Java-based applications Explanation: Java virtual machine (JVM) is a virtual machine that enables a computer to run Java programs as well as programs written in other languages that are also compiled to Java bytecode. The JVM is detailed by a specification that formally describes what is required in a JVM S t a c k I T J o b S o l u t i o n To order Book Visit: stackvaly.com To order Book Visit: stackvaly.com To order Book call: 01812603406
  3. Combined Bank Stack IT Question Bank | 01789741518, 01761719838 | Buy Book: stackvaly.com | Online Exam: exam.stackvaly.com implementation. Having a specification ensures interoperability of Java programs across different implementations so that program authors using the Java Development Kit (JDK) need not worry about idiosyncrasies of the underlying hardware platform. Answer: d 17. What is the typical speed of USB version 3.0?  4.8 Gbits per second  610 MBps  6 Gbps  Both a and b Explanation: The theoretical transfer speed of USB 3.0 is 4.8 Gbit/s (600MBps) vs. 480 Mbit/s (60MBps) which is a 10X improvement. Sustained transfer speeds (real life) for external hard drives are about 85MBps for USB 3.0 and about 22MBps for USB 2.0, so about a 5X improvement but still a significant advancement in transfer speed. Answer: d 18. In which type of circuit switching, delivery of data is delayed because data must be stored and retrieved from RAM  Space-division  Time-division  Virtual  Packet Explanation: time division switch An all-electronic switching system based on time division multiplexing (TDM) principles: an input digitized signal from a source is connected to an output trunk by assigning a group of bits from the input data stream to a time slot in a high- speed TDM output data stream. Answer: b 19. Which one of the following statements with respect to REST API is false?  A REST API would use a GET request to retrieve a record  A REST API would use a DELETE request to delete a record  The operations in a REST API can be called from any HTTP client  None of the above statements is false Explanation: REST APIs communicate via HTTP requests to perform standard database functions like creating, reading, updating, and deleting records (also known as CRUD) within a resource. For example, a REST API would use a GET request to retrieve a record, a POST request to create one, a PUT request to update a record, and a DELETE request to delete one. All HTTP methods can be used in API calls. A well-designed REST API is similar to a website running in a web browser with built-in HTTP functionality. Answer: d 20. What is the maximum data rate of a channel with a bandwidth of 200 KHz if we use four levels of digital signaling?  400 Kbps  800 Kbps  1000 Kbps  1200 Kbps Explanation: What is the maximum data rate of a channel with a bandwidth of 200 KHz if we use four levels of digital signaling. Ans: Here, bandwidth = 200 KHz = 200000 Hz. `. The maximum data rate can be calculated as Nmax= 2 × B × nb= 2 × 200000 × log24 = 8 × 108bps = 800 Kbps. Answer: b 21. In which year were chips used inside the computer for the first time?  1964  1974  1975  1981 Explanation: In 1964 year was chip used inside the computer for the first time. Answer: a 22. Which one of the following is a No-SQL Database?  MongoDB  Casper DB  ZBase  All of the above Explanation: MongoDB is a source-available cross-platform document- oriented database program. Classified as a NoSQL database program, MongoDB uses JSON-like documents with optional schemas. MongoDB is developed by MongoDB Inc. and licensed under the Server Side Public License. Answer: a 23. What will be the output of the following SQL "Select ROUND (232.420,-2) AS Round Value?  240  200  233  Syntax error Explanation: The ROUND() function rounds a number to a specified number of decimal places. Answer: b 24. SSDs are more durable than HDDs in extreme and harsh environments because  They don't have actuator arms  They use fast Electronic Memory  They do not use 0/1 as data storage unit which is prone to crash  All of the above statements are true Explanation: Generally, SSDs are more durable than HDDs in extreme and harsh environments because they don’t have moving parts such as actuator arms. SSDs can withstand accidental drops and other shocks, vibration, extreme temperatures, and magnetic fields better than HDDs. Add to that their small size and lower power consumption, and you can understand why they’re a great fit for laptop computers and mobile applications. S t a c k I T J o b S o l u t i o n To order Book Visit: stackvaly.com To order Book Visit: stackvaly.com To order Book call: 01812603406
  4. Combined Bank Stack IT Question Bank | 01789741518, 01761719838 | Buy Book: stackvaly.com | Online Exam: exam.stackvaly.com Answer: a 25. Which one of the following statements is false?  Data mining is considered as a process of extracting data from large data sets  Data warehouse is the process of pooling all the relevant data together.  Data warehouse is created with the data generated by Data Mining for future use.  None of the above statements is false Explanation: A data warehouse is a relational database that stores historic operational data from across an organization, for reporting, analysis and exploration. Data mining is a process of reviewing and processing large quantities of data to discover important patterns, findings or correlations which might be important for the business. Its common uses include analysis and predictive modeling for marketing campaigns, pricing, fraud detection, financial forecasting, and analyzing website traffic. Answer: c 26. If the end office receives two bursts of analog signals with frequencies of 697 and 1477 Hz, then the number has been punched.  1  2  3  4 Explanation: Answer: c 27. Which one of the following statements is true with respect to a Printer Daemon process?  The printer daemon of Operating System runs in kernel mode.  Jobs in the printer daemon queue cannot be removed once inserted.  Printer daemon application runs only when it is printing  Printer daemon runs as a service in Operating System Explanation: LPD stands for Line Printer Daemon, is a general TCP/IP daemon on UNIX networks that is used for receiving and spooling print jobs on a print server. The Line Printer Daemon (LPD) print server might be connected directly to the print device, or it might be a network print device that supports LPD. UNIX clients send their jobs to the printer by using the Line Printer Remote (LPR) utility; you can use another utility called Line Printer Queue (LPQ) to check the status of print jobs spooled on the server. Answer: d 28. When a beam of light travels through media of two different densities, if the angle of incidence is greater than the critical angle ------- occurs.  Refraction  Incidence  Reflection  Criticism Explanation: If the angle of incidence is bigger than the critical angle, the refracted ray will not emerge from the medium, but will be reflected back into the medium. This is called total internal reflection. The critical angle occurs when the angle of incidence where the angle of refraction is (text{90})(text{°}). Answer: a 29. In the protocol the symmetric key is K=G<sup>xy</sup> mod N. where G and N are public numbers.  Needham- Schroeder  Otway - Rees  Diffie – Hellman  Kerberos Explanation: Diffie-Hellman Answer: c 30. Which of the following statements is false?  64-bit processor is more capable than a 32-bit processor because it can handle more data at once  A Computer works with Hexa Decimal number System  A 32-bit system can access 232 memory addresses  None of the above statements is false Explanation: 1 GB = 1024 MB 1 MB = 1024 KB 1 KB = 1024 B 1 B = 8 bits So, 32-bit address bus has access to 2^32 locations with 8 bits(1Byte) of information. 2^32 locations =2^2 * 2^10 * 2^10 * 2^10 locations 2^32 locations =2^2 * 2^10 * 2^10 * 1024 bits 2^32 locations =2^2 * 2^10 * 1024 Kbits 2^32 locations =2^2 * 1024 Mbits 2^32 locations =4 Gbits of location containing 8 bits(1Byte) of information. Therefore, 4 Gbits * 8 bits = 4GB information. Answer: c 31. Which one of the following statements is true? S t a c k I T J o b S o l u t i o n To order Book Visit: stackvaly.com To order Book Visit: stackvaly.com To order Book call: 01812603406
  5. Combined Bank Stack IT Question Bank | 01789741518, 01761719838 | Buy Book: stackvaly.com | Online Exam: exam.stackvaly.com  Cache memory is a small amount of memory which is a part of the Random-Access Memory  Cache memory is used to temporarily hold instructions and data that the CPU is likely to reuse  Cache Memory is cheaper memory  All of the above statements are true Explanation: Cache memory is a type of high-speed random access memory (RAM) which is built into the processor . Data can be transferred to and from cache memory more quickly than from RAM. As a result, cache memory is used to temporarily hold data and instructions that the processor is likely to reuse. Answer: b 32. Which error detection method involves the use of purity bits?  Simple parity check  Two-dimensional parity check  CRC  (a) and (b) Explanation: Parity check bits are calculated for each row, which is equivalent to a simple parity check bit. Parity check bits are also calculated for all columns, then both are sent along with the data. At the receiving end these are compared with the parity bits calculated on the received data. Answer: b 32. A DNS response is classified as if the information comes from a cache memory.  Authoritative  Recursive  Unauthoritative  Iterative Explanation: A recursive DNS lookup is where one DNS server communicates with several other DNS servers to hunt down an IP address and return it to the client. This is in contrast to an iterative DNS query, where the client communicates directly with each DNS server involved in the lookup. While this is a very technical definition, a closer look at the DNS system and the difference between recursion and iteration should help clear things up. Answer: b 33. An email contains a textual birthday greeting, a picture of a cake, and a song. The order is not important. What is the Content-type?  Multipart/digest  Multipart/alternativ e  Multipart/mixed  Multipart/parallel Explanation: The primary subtype for multipart, "mixed", is intended for use when the body parts are independent and intended to be displayed serially. Any multipart subtypes that an implementation does not recognize should be treated as being of subtype "mixed" Answer: c 35. Which one of the following statements is true with respect to a Database Management System?  Super key and candidate keys are similar  Candidate Keys and Unique Keys are similar  Unique Keys and Primary keys are similar  Candidate Keys and Primary keys are similar Explanation: Both Primary key and Unique Key are used to uniquely define of a row in a table. Primary Key creates a clustered index of the column whereas a Unique creates an unclustered index of the column . A Primary Key doesn't allow NULL value , however a Unique Key does allow one NULL value . Answer: c 36. ---is a client-server program that provides an IP address, subnet mask, IP address of a router, and IP address of a name server to a computer.  NAT  DHCP  CIDR  ISP Explanation: DHCP. DHCP is the Dynamic Host Configuration Protocol. It is used to automatically provide IP addressing information to clients. A DHCP server can assign IP addresses, subnet masks, a DNS server address, and much more. Answer: b 37. The Average-case Time Complexity of the binary search algorithm is  O(n/2log n)  O(n log n)  O(log n)  O(1) Explanation: Time complexity is O(logN)- Recurrence relation-> T(n)=T(n/2)+1 Answer: c 38. A standard that allows a telephone connected to a public telephone network to talk to a computer connected to the Internet is---  SIP  H.323  IEEE 802.3  V.90bis Explanation: H. 323 is an ITU Telecommunication Standardization Sector (ITU-T) recommendation that describes protocols for the provision of audio-visual (A/V) communication sessions on all packet networks. H. ... 323 is widely used in IP based videoconferencing, Voice over Internet Protocol (VoIP) and Internet telephony. Answer: b 39. An Ethernet LAN using the OSPF protocol with five attached routers can be called a network.  Point-to-point  Stub S t a c k I T J o b S o l u t i o n To order Book Visit: stackvaly.com To order Book Visit: stackvaly.com To order Book call: 01812603406
  6. Combined Bank Stack IT Question Bank | 01789741518, 01761719838 | Buy Book: stackvaly.com | Online Exam: exam.stackvaly.com  Transient  Virtual Explanation: Transient link: If there lies large number of routers attached to a network. There can be Lan, wifi, several different routers then this configuration is termed as transient link. It can be represented with two topology: Realistic and Unrealistic. Answer: c 40. The term LPDDR means  Low-Power Discrete Data Rate.  Low-processing Double Data Rate  Low- Programmable Double Data Rate  None of the above Explanation: LPDDR, an abbreviation for Low-Power Double Data Rate Answer: d 41. What is the maximum data rate in IEEE 802.11n?  300 Mbps  600 Mbps  1 Gbps  832 Mbps Explanation: IEEE 802.11n/ac are two recent enhancements that increase the data rates of WLANs significantly thanks to the use of channel bonding, spatial multiplexing, an additional short guard interval, and new modulation and coding schemes. They offer a maximum transmission rate of 600 Mbps for 802.11n and 7 Gbps for 802.11ac. Answer: b 42. The binary search algorithm is used to search for a given item when items are sorted. If the number of items is 1 million, which of the following is the closest to the maximum number of comparisons required to find the item.  15  20  25  30 Explanation: blog(1000000)/log 2=19.932. Answer: b 43. What is the min and max number of tables required to convert an ER diagram with 2 entities and 1 relationship between them with partial participation constraints of both entities?  Min 1 and max 2  Min 1 and max 3  Min 2 and max 3  Min 2 and max 2 Explanation: Maximum number of tables required is 3 in case of many to many relationships between entities. Minimum number of tables is 1 in case of unary relationship and total participation of atleast one entity. But in case of partial participation of both entities, minimum number of tables required is 2. Answer: c 44. Major function of a transport layer in the OSI model is to perform  Peer to peer message encryption  Node to node message delivery  Transparent transfer of data between end users  None of the above Explanation: Layer 4 of the OSI Model: Transport Layer provides transparent transfer of data between end users, providing reliable data transfer services to the upper layers. ... The transport layer also provides the acknowledgement of the successful data transmission and sends the next data if no errors occurred. Answer: c 45. At any iteration of simplex method, if j (Zi-C) corresponding to any non-basic variable Xj is obtained as zero, the solution under the test is  Degenerate solution  Unbounded solution  Alternative solution  Optimal solution Explanation: Answer: c 46. An IPv6 basic header is fixed as  32 bytes long  40 bytes long  64 bits long  128 bit long Explanation: IPv6 does not include a Header Length field because the IPv6 header is always a fixed length of 40 bytes. Each extension header is either a fixed length or indicates its own length. Replaced by the IPv6 Traffic Class field. Replaced by the IPv6 Payload Length field, which indicates only the size of the payload. Answer: b 47. Which of the following neural networks uses supervised learning? (A) Multilayer perceptron (B) Self organizing feature map (C) Hopfield network  A only  B only  A and B only  A and C only Explanation: Multilayer perceptron neural networks uses supervised learning Self organizing feature map neural networks uses unsupervised learning Hopfield network neural networks uses unsupervised S t a c k I T J o b S o l u t i o n To order Book Visit: stackvaly.com To order Book Visit: stackvaly.com To order Book call: 01812603406
  7. Combined Bank Stack IT Question Bank | 01789741518, 01761719838 | Buy Book: stackvaly.com | Online Exam: exam.stackvaly.com learning So, option (A) is correct. Answer: a 48. Which of the following services uses both TCP and UDP ports?  DNS  TFTP  SSH  TELNET Explanation: DNS uses TCP for zone exchanges between servers and UDP when a client is trying to resolve a hostname to an IP address. Answer: a 49. Which of the following Linux command has incorrect syntax?  cat sampie.txt grep-v a| sort –r  Chown :group3 File1  Chmod a+rx viewer.sh  None of the above Explanation: Answer: b 50. In software development, value adjustment factors include the following among others:  the criticality of the performance and reusability of the code.  number of lines of code in the software.  number of technical manpower and hardware costs.  time period available and the level of user friendliness. Explanation: The value adjustment factor (VAF) is based on 14 general system characteristics out of which Reusability is one of them. Answer: a 51. What is the maximum size of a file allowed in Linux with the following data Block Size=4KB, inode data pointer size = 4 byte  1 TB  Less than 4TB  2TB+2GB+2M B+ 64KB  More than 4 TB Explanation: Answer: b 52. In a two-level memory hierarchy, the access time of the memory 12 nanoseconds, and the access time of the main memory is 1.5 microseconds. The hit ratio is 0.98. what is the average access time of the two-level memory system?  13.5 nsec  42 nsec  7.56 nsec  76 nsec Explanation: Suppose 100 instructions are accessed from cache. So, 98 instructions will take 12 ns × 98 and 2 instructions will take 1500 ns × 2. So, average access time = (12 × 98 + 3000)/100 = 41.76 ns Answer: b 53. A single switch port is considered as  A separate unicast domain  A separate broadcast domain  A separate multicast domain  A separate collision domain Explanation: Answer: d 54. Which UNIX/Linux command is used to make all files and sub-directories in the directory "progs" executable by all users?  chmod -R a+x progs  chmod -R 222 progs  chmod -X a+x progs  chmod -X 222 progs Explanation: chmod− R a+x progs is used to make all files and sub- directories in the directory “progs” executable by all users. So, option (A) is correct. Answer: a 55. An Access point operates in which layer of OSI model?  Data link Layer  Presentation layer  Physical layer  Transport layer Explanation: AP serves as a connectivity provider for clients on wireless, it maintains MAC entries against each client. It provides IP using DHCP server on LAN side. Forwards traffic on WAN side (can be on static or dynamic IP). Works on Layer 2 and mostly can be said as connectivity provider between wired and wireless. Answer: a 56. Which of the following Process scheduling algorithm is highly improbable to be implemented?  FCFS Scheduling  Priority Scheduling  Shortest Job First Scheduling  None of the above Explanation: Shortest Job First (SJF) is an algorithm in which the process having the smallest execution time is chosen for the next execution. This scheduling method can be preemptive or non-preemptive. It significantly reduces the average waiting time for other processes awaiting execution. The full form of SJF is Shortest Job First. Answer: c 57. Consider the following program fragment in S t a c k I T J o b S o l u t i o n To order Book Visit: stackvaly.com To order Book Visit: stackvaly.com To order Book call: 01812603406
  8. Combined Bank Stack IT Question Bank | 01789741518, 01761719838 | Buy Book: stackvaly.com | Online Exam: exam.stackvaly.com assembly language: mov ax, 0h mov cx, 0A h do loop: dec ax loop doloop What is the value of ax and cx registers after the completion of the doloop ?  ax=FFF5 h and cx=Oh  ax=FFF6 h and ex=Oh  ax=FFF7 h and ex=0Ah  ax=FFF5 h and ex=0Ah Explanation: In 8086, dec instruction is to decrement. loop instruction decrements the value of cx register by 1 until it becomes 0h. (ax = 0h or we can say 0000h. I am taking two hexadecimal digits from LSB to simplify calculations. ax = 00h) Answer: b 58. How many core/threads does the Intel Core i7- 9700K processor have?  6/12  4/8  8/8  8/16 Explanation: Model Core i7-9700K Cores / Threads 8 / 8 Base Frequency 3.6 GHz Boost Frequency 4.9 GHz (1 Core)4.8 GHz (2 Core)4.7 GHz (4 Core)4.6 GHz (6 / 8 Core) Memory Support DDR4-2666 Answer: c 59. Assuming the existence of a start and end nodes for a program graph (PG), the total number of Paths is equivalent to------- set of fest data required to test software,  Minimum  Maximum  Optimum  Supreme Explanation: Assuming the existence of a start and end nodes for a program graph, total number of patterns required in a set of data to test the software is Minimum. A Graph is a non-linear data structure consisting of nodes and edges. The nodes are sometimes also referred to as vertices and the edges are lines or arcs that connect any two nodes in the graph. ... Graphs are used to solve many real- life problems. Graphs are used to represent networks. At-Home Help. A pattern is a group of numbers, shapes, or objects that follow a rule while repeating or changing. To extend a pattern you can use a table or a pattern rule that relates the term number to the pattern rule. A term number is the number that tells the position of an item in a pattern. Types of testing: Automated Testing. Automated testing refers to a type of testing that uses independant software to test the system being tested. Automated testing can be used to perform other types of testing such as functional or performance testing. Amount of testing performed by a set of test cases is called Test Coverage. ... In other words, test coverage is defined as a technique which determines whether our test cases are actually covering the application code and how much code is exercised when we run those test cases. Answer: a 60. Which of the following statements is false with respect to SSL?  Secure Sockets Layer (SSL) is a security protocol that provides privacy, authentication, and integrity to Internet communications  SSL evolved into Transport Layer Security (TLS)  SSL's final version was SSL 4.0  None of the above statements is false Explanation: Answer: c Final version is 3.0 General Part 1. সামন্তবাদ ক ান ইউর াপীয় কদরে প্রথম সূত্রপাত হয়? ইতালি রালিয়া ইংিযান্ড ফ্রান্স Ans: D 2. ধর ত্রী সরেলন ক াথায় অনুরিত হয়? আলফ্রকার জ াহানেসবার্গ যুক্তরানের ওয়ালিংটে ব্রাল নির লরওলিন লেনরানত ইতালির জরাম Ans: C 3. আইওএস কমাবাইল অপার টিং রসরেমট ক ান প্ররতিান বাজা জাত র ? অ্যানেি আইলবএম গুর্ি মাইনরাসফট Ans: A 4. ‘বযক্ত’ েরে রবপ ীতাথথ েে ক ানট? তযক্ত র্ৃঢ় গ্রাহয দ্রঢ় Ans: B S t a c k I T J o b S o l u t i o n To order Book Visit: stackvaly.com To order Book Visit: stackvaly.com To order Book call: 01812603406
  9. Combined Bank Stack IT Question Bank | 01789741518, 01761719838 | Buy Book: stackvaly.com | Online Exam: exam.stackvaly.com 5. মুরক্তযুরে পটভ ূ রমরত রিত াবযগ্রন্থ ক ানট? জেকনে অ্রণ্য লিয়নযাদ্ধা লিয়তম বন্দী লিলবর জেনক লেলিদ্ধ জিাবাে Ans: C 6. াজী নজরুল ইসলারম ‘অরিবীণা’ ারবয প্রথম রবতা ক ানট আর্মেী লবনদ্রাহী জকারবােী িিনয়াল্লাস Ans: D 7. ক ানট বীন্দ্রনাথ ঠাকুর াবযগ্রন্থ? জিি জিখা জিি লিে জিি িশ্ন জিি কো Ans: A 8. মুনী কিৌধু ী ‘মুখ া মণী বেী ণ’ এ ট - উেেযাস অ্েুবাি োটক জ াটর্ল্প িবন্ধ Ans: B 9. ‘বন্ধন’ েরে সঠি অক্ষ রবনযাস ক ানট- ব+ে+ধ+ন্ বন্ + ধন্ বান্ + ধন্ ব+ন্ধ+ে Ans: B 10. বহুব্রীরহ সমাসবে পদ ক ানটী?  েশ্রুলত তনোবে অ্েমেীয় র্াসমহি Ans: C 11. ‘রবষাদ রসন্ধ ু ’ এ ট- র্নবিণ্া গ্রন্থ আত্ম ীবেী ধমগলবিয়ক িবন্ধ ইলতহাস আশ্রয়ী উেেযাস Ans: D 12. বািংলা থয ভাষা আরদ গ্রন্থ ক ানট? িভু লযশুর বাণ্ী ফু িমলণ্ ও করুণ্ার লববরণ্ ক ৃ োর িানের অ্েগনভি আত্ম ীবেী Ans: C 13. উপসর্থ ক ানট? অ্লত জেনক জেনয় দ্বারা Ans: A 14. র্ণপ্রজাতন্ত্রী বািংলারদরে সিংরবধান প্রবরতথ ত হয়? ১৭ এলিি ১৯৭১ ২৬ মাে গ ১৯৭৩ ১৬ লিনসম্বর ১৯৭২ ৭ মাে গ ১৯৭২ Ans: C 15. বঙ্গবন্ধ ু আর্ তলা ষড়যন্ত্র মামলা কমাট আসারম সিংখযা রিল তজন? ৩৪ ে ৩২ ে ৩৫ ে ৩৬ ে Ans: C 16. আইন প্রণয়রন ক্ষমতা আইে মন্ত্রণ্ািনয়র  াতীয় সংসনির রােেলতর লিকানরর Ans: B 17. পাবথতয িট্টগ্রাম োরন্তি ু রক্ত ত সারল স্বাক্ষর ত হয়? ১৯৯৩ ২০০১ ১৯৯৭ ১৯৯৯ Ans: C 18. বািংলারদরে প্রথম স্বাধীন নবাব ক ? েবাব লসরা উনদৌিা ইলিয়াস িাহ মুলিগি কুলি খাে আিাউলদে হুনসে িা Ans: C 19. বায়ুমন্ডরল কয স্তর কবতা ত ঙ্গ প্ররতফরলত হয়? স্ট্রানটালিয়ার ওন ােস্তর ট্রনোলিয়ার আয়নোলিয়ার Ans: D 20. ‘ ালাপারন’ ন দুই ারে মরধয অমীমািংসীত ভ ূ খন্ড? ভারত ও জেোি বাংিানিি ও ভারত োলকস্তাে ও েীে ভু টাে ও ভারত Ans: A 21. The warning of the authority falls on deaf ears. Here warning does the function of ………. Adverb Adjective Verb Noun Explanation: The + verb + ing + of দ্বা া verbal noun র্ঠিত হয় । সুত ািং প্রদত্ত বার য warning েেট noun। Ans: D 22. “ A rolling stone gaters no moss” the complex form of the sentence is ……..  Since a stone is rolling, it gathers no moss  Though a stone rolls, it gathers no moss  A stone what rolls fathers no moss.  A stone that rolls gathers no moss Explanation: Participle যুক্ত simple sentence - জক complex করনত হনি participle অ্ংিনক subordinate clause -এ রুোন্তলরত করনত হয় এবং বালক অ্ংি main clause লহনসনব অ্েলরবলতগ ত োনক। িিত্ত বানকয ' rolling' হনে present participle , যার subordinate clause হনিা ' A stone which /that rolls যা (ঘ) option -এ উনল্লখ আন । Answer: D 23. Education is enlightening . Here ‘ enlightening’ is ….  A gerund  A participle  An infinitive  A fine verb Explanation: Verb+ing যলি noun এর মনতা কা কনর তনব তানক Gerund বনি। এখানে enlightening িব্দটি noun এর েল িনে বনসন । তাই সঠিক উত্তর Gerund. Answer: B 24. The comparison of unlike things using the words on as is known to be……..  Metaphor  Simile S t a c k I T J o b S o l u t i o n To order Book Visit: stackvaly.com To order Book Visit: stackvaly.com To order Book call: 01812603406
  10. Combined Bank Stack IT Question Bank | 01789741518, 01761719838 | Buy Book: stackvaly.com | Online Exam: exam.stackvaly.com  Alliteration  Personification Explanation: A simile is a comparison between two unlike objects using the words like or as in the sentence. Answer: B 25. In English grammar …. Deals with formation of sentences.  Morphology  Etymology  Syntax  Samantics Explanation: Linguistics বা ভািালবজ্ঞানে Morphology - িনব্দর র্ঠে লেনয়, Etymology - িনব্দর উৎেলত্ত ও ইলতহাস লেনয়, Syntax - বানকযর র্ঠে লেনয় এবং Semantics - িব্দ এবং বানকযর অ্েগ লেনয় আনিােো কনর। Answer: C 26. Give the antonym of the word ‘transitory’  Temporary  permanent  Transparent  Short lived Answer: B 27. Choose the pari of the words that expresses a relationship similar to that of “ Harm:Damage”…..  Sweet:sour  Injure : Incapacitate  Stout : weak  Hook : Crook Explanation: Harm (ক্ষলত করা) : Danage ( ক্ষলত করা , ধ্বংস করা) । অ্েগাৎ কাউনক ধ্বংস করার েয ক্ষলত করা হয়। Option গুনিার মনধয Sweet (লমলি/মধুর ) : Sour ( (টক) , এরা লবেরীতােগক : Injure ( আঘাত করা, ক্ষত করা ) : Incapacitate (অ্ক্ষম করা, আঘানতর দ্বারা দুবগি করা ), অ্েগাৎ কাউনক অ্ক্ষম করার েয আঘাত দ্বারা দুবগি করা) , অ্েগাৎ কাউনক অ্ক্ষম করার েয আঘাত করা হয়; Stout (অ্টি, িলক্তিািী): Weak (দুবগি) এরা Antonymous এবং Hook ( বাাঁকানো ,বর হওয়া) , : Crook (বর করা বা হওয়া ) এরা Synonymous হনিও সম্পকগ র্ত লিক জেনক এক েয়। সুতরাং (খ) সঠিক উত্তর। Answer: B 28. Which word is the determiner in the sentence “will it take much time?”  Will  Take  much  time Explanation: Determiner হনে noun / pronoun - এর লেলিগি , অ্লেলিগিতা , সংখযা বা েলরমাণ্ লেনিগিক। Option -গুনিার মনধয 'will ' হনে Future Indefinite Tense -এর auxiliary verb, much হনে time -এর েলরমাণ্ লেনিগিক ,take হনে finite + transitive verb এবং time হনে objective noun । সুতরাং 'much' হনে determiner। Answer: C 29. Which is the correct sentence?  He insisted on seeing her  He insisted for seeing her  He insisted in seeing her  He insisted to be seeing her. Answer: a 30. If a part of a speech or writing breaks the theme, it is called……  Pomposity  Digression  Exaggrration  Anti-climax Explanation: যলি জকানো বক্তবয বা জিখা মূিভাব জেনক লবেু যত হনয় েনে তখে তানক digression (মূি িসঙ্গ জেনক লবেু যলত ) বিা হয়। 'সুতরাং সঠিক উত্তর (খ) । Answer: B 31. The product of two positive numbers is p. if each of the numbers is increased by 2, the new product is how much greater than twice the sum of the two original numbers.  P times  2p times  (p+4) times  (2p+3) times Explanation: Let the two no's be a and b; Given product of the no's is p = ab; If the each nos is increased by 2 then the new product will be (a+2)(b+2) = ab + 2a + 2b + 4 = ab + 2(a+b) + 4 = p + 2(a+b) + 4 Hence the new product is (p+4) times greater than twice the sum of the two original numbers. Answer: C 32. A jar contains white, red and green marbles in the ratio 2:3:5. Six more green marbles are added to the jars, and then the ratio becomes 2:3:7. How many white marbles are there in the jar?  2  4  6  8 Explanation: Ratio of W : R : G= 2: 3:5। If 6 Green is added, Ratio becomes W: R:G = 2: 3:7 Difference of ratio for 6 marbles = 7 – 5 = 2 For 1 ratio = 3 marbles .'. White marbles = 2×3 = 6 (ans)Answer: C 33. If a, b and c are 3 consecutive integers and a>b>c , which of the following has the maximum value?  C+b/a  A+b/c  B+c/a  C+a/b Explanation: ধলর, a = 3, b = 2, c = 1 b+ ( c/a) = 2 + 1/3 = 2 1/3 c + ( a/b) = 1 + 3/2 = 2.5 c + ( b/a) = 1 + 2/3 = 1 2/3 a + ( b/c) = 3 + 2/1 = 5 a +( b/c) এর মাে সনবগাচ্চ। Answer: b 34. A dozen eggs and 10 pounds of apples are currently at the same price. If the price of a dozen eggs rises by 10 percent and the price of apples rises by 2 %. How much more will it cost to buy a dozen eggs and 10 pounds of apples.  2%  10%  6%  12% Explanation: As same price, Let one dozen eggs=100 ten pounds of apples=100 So total amount 200 S t a c k I T J o b S o l u t i o n To order Book Visit: stackvaly.com To order Book Visit: stackvaly.com To order Book call: 01812603406
  11. Combined Bank Stack IT Question Bank | 01789741518, 01761719838 | Buy Book: stackvaly.com | Online Exam: exam.stackvaly.com Eggs price rises 10%=100+10=110 Apples price rises 2%=100+2=102 Rises total amount 212 Just rises amount 12 So cost price will 12*100/200=6% Ans: 6% Answer: C 35. There are n students in a scholl. IF r% among the students are 12 years of younger, which of the following expressions represents the number of students who are older than 12 ?  n(1-r)  100(1-r)  n(1-r) /100  n(100-r)/100 Explanation: The number of student who are 12 years or younger = n*r% =nr/100 The number of student who are older than 12 = n - nr/100 = n(100-r)/100 Answer: D 36. Length of a train is 170 meters and speed of train is 63 km/hour. This train can pass a bridge in 30 seconds, the find the length of the bridge.  355m  325m  365m  312m Explanation: Given speed = 63 km/hr = 63 × 5/18 = 35/2 m/s Let the length of the bridge = x mts Given time taken to cover the distance of (170 + x)mts is 30 sec. We know speed = distance/time 35 / 2 = ( 170 + x ) / 30 x = 355 mts. Answer: a 37. If x3 <x2 <x then the value of x could be  0  1  1/3  square root of 3 Answer: C 38. A wholesaler sells goods to a retailer at a profit of 20% the retailer sells to the customer, who pays 80% more than the cost of the wholesaler. What is the retailer’s profit ?  40%  50%  60%  70% Explanation: Let the cost of the wholeselle be W. Then, Buying price of the retailer = 1.2W The customer pays = W + 0.8W = 1.8W So, profit of the retailer = (1.8 - 1.2)/1.2 x 100% = 50% Answer: b 39. The hypotenuse of a right triangle is 2 centimeters more than the longer side of the triangle. The shorter side of the triangle is 7 centimeters less than the longer side. Find the length of the hypotenuse.  13  15  17  19 Answer: c 40. Equal amounts of water were poured into two empty jars of different capacities, which made one jar 1/4 full and other jar 1/3 full. If the water in the jar with lesser capacity is then poured into the jar with greater capacity, what fraction of the larger jar will be filled with water?  1/3  ¼  1/5  1/2 Explanation: Some amount of water made bigger jar 1/4 full, then the same amount of water (stored for a while in smaller jar) were added to bigger jar, so bigger jar is 1/4+1/4=1/2 full. Answer: D S t a c k I T J o b S o l u t i o n To order Book Visit: stackvaly.com To order Book Visit: stackvaly.com To order Book call: 01812603406
Publicité