Combined 2 Bank Compiled Post: SO(IT) Date: 25.09.2021 Taker: AUST
Combined Bank
Stack
IT
Question
Bank
|
01789741518,
01761719838
|
Buy
Book:
stackvaly.com
|
Online
Exam:
exam.stackvaly.com
Banker Selection Committee
Combined 2 Bank
Compiled By: Stack IT Job Solution
Post: SO(IT) Exam Type: MCQ
Date: 25.09.2021 Time: 1 Hour
Exam Taker: AUST
1. Between a client and a web server, which of the
following is used for inspecting the data that is
sent from the client to the web server and
blocking attacks such as SOL injection?
Cluster
configuration
Load balancing
function
SSL-VPN
function
WAF
Explanation:
WAF mitigates such attacks by dynamically
monitoring client traffic flows for malicious injection
patterns and preventing unauthorized execution.
Answer: d
2. Which one of the following is false with respect
to 4G and 5G cellular network?
5G supports
faster bandwidth
compared to
4G.
Latency in 4G
networks is much
higher than 5G
network
4G uses a
narrow slice of
the available
spectrum from
600 MHz to 2.5
GHz
There will be data
session handoff
feature in 5G
network which is
not available in 4G
network
Explanation:
Handover, or handoff in 5G NR or 4G LTE happens
when a Data/Voice call is transferred from one cell to
the an adjacent cell as the Mobile user moves through
the network coverage area. Before any base station
software is released for field, it goes through multiple
level of testing's (regression, load etc.)
Answer: d
3. What is the propagation time for a 2.5 kbyte
message an e-mail) if the bandwidth of the
network is 1 Gbps? Assume that the distance
between the sender and the receiver is 12,000 km
and that light travels at 2.4 x 198 m/s.
50 ms 0.020 ms
100 ms 0.040 ms
Explanation:
Propagation time=12000*1000)/(2.4108)=50ms
Transmission time=(2500*8)/109=0.020ms
Answer: b
4. User passwords in Linux are stored as
Direct text data Encrypted using
some sort of
hashing function
Encrypted using
monoalphabetic
cipher
Encrypted using
homophonic
substitution cipher
Explanation:
The main storage methods for passwords are plain
text, hashed, hashed and salted, and reversibly
encrypted.
Answer: a
5. On a class B network, how many hosts are
available at each site with subnet mask of 248?
16,382 8,190
4,094 2,046
Explanation:
As subnet mask given 248(class B)it means
255.255.248.0
It's binary form
11111111.11111111.11111000.00000000
It means we have 5bit(from 3rd octet) used for subnet (2^5
= 32 subnet)&
Remaining 3bit + 8bit = 11bit.
(from 3rd octet & 4th octet respectively)are used for HOST
bit.
Hence Total No.of HOST = 2^11-2 = 2046.
Answer: d
6. A job which is schedule to run periodically at
fixed times or intervals is known as
Batch Job Cron job
Shell Script None of the above
Explanation:
The cron command-line utility, also known as cron
job is a job scheduler on Unix-like operating systems.
Users who set up and maintain software environments
use cron to schedule jobs to run periodically at fixed
times, dates, or intervals.
Answer: b
7. In Oracle DBMS, LGWR process is a
Foreground
Process
Background
Process
High Priority
Process
Batch Process
Explanation:
The log writer process (LGWR) is responsible for redo log
buffer management—writing the redo log buffer to a redo
log file on disk. LGWR writes all redo entries that have
been copied into the buffer since the last time it wrote. The
redo log buffer is a circular buffer.
Answer: b
8. The----- is an HFC network device installed
inside the distribution hub that receives data
S
t
a
c
k
I
T
J
o
b
S
o
l
u
t
i
o
n
To order Book Visit: stackvaly.com
To order Book Visit: stackvaly.com To order Book call: 01812603406
Combined Bank
Stack
IT
Question
Bank
|
01789741518,
01761719838
|
Buy
Book:
stackvaly.com
|
Online
Exam:
exam.stackvaly.com
from the internet and passes them to the
combiner
CM CMTS
DOCSIS MCNS
Explanation:
A cable modem termination system (CMTS) is a piece of
equipment, typically located in a cable company's headend
or hubsite, which is used to provide high speed data
services, such as cable Internet or Voice over Internet
Protocol, to cable subscribers.
Answer: b
9. Finding useful pattern from the data in a
database is known as
Data
Visualization
Data Mining
Data Analytics All of the above
Explanation:
The process of analyzing large databases to find useful
pattern is termed as data mining.
This procedure also includes database systems, statistical
methods and machine learning for computer science.
This step is actually used for discovering the various
patterns and knowledge on different matters from the huge
numbers of data; hence it is same as data analysis.
Answer: b
10. ----helps prevent power surges.
Surge
suppressor
Surge protector
UPS system High-grade multi-
meter
Explanation:
A surge suppressor (sometimes optimistically called a
"surge protector") is a device inserted in the alternating
current ( AC ) utility line and/or telephone line to prevent
damage to electronic equipment from voltage "spikes"
called transients.
Answer: a
11. NET can be used in the following
Development of
Desktop
Applications
Development of
Micro services and
containers
Development of
Cloud
Applications
All of the above
statements are true
Explanation:
.NET Framework is used to create and run software
applications. .NET apps can run on many operating
systems, using different implementations of .NET. .NET
Framework is used for running .NET apps on Windows.
Answer: d
12. What is the API level of Android version 11
24 25
31 None of the above
Explanation:
api level 30
Answer: d
13. What is the Internal Code name of Android
version 8.0?
Red Velvet
Cake
Oatmeal Cookie
Snow Cone Jelly Bean
Explanation:
Android Oreo, Internal Codename: Oatmeal Cookie
Answer: b
14. Which one of the following is false with respect
to cryptography?
Asymmetric key
system uses only
the private key
An asymmetric key
system makes use
of both the public
key and the private
key
An Asymmetric
key system is
used as a Public
Key
Infrastructure or
PKI for short
None of the above
statements is false
Explanation:
Answer:
15. A circuit has two different voltage sources that
are connected in a series-opposing form. If the
sources are rated at 6 V and 9 V. what is the total
source voltage?
3 V 16 V
7.5 V 8V
Explanation:
Answer: a
16. Java Virtual Machine
Acts as a full-
fledged
hypervisor
Converts byle
codes to Operating
System dependent
code
Is known as the
Compiler of
Java
programming
language
Mannges system
memory and
provides a portable
execution
environment for
Java-based
applications
Explanation:
Java virtual machine (JVM) is a virtual machine that
enables a computer to run Java programs as well as
programs written in other languages that are also compiled
to Java bytecode. The JVM is detailed by a specification
that formally describes what is required in a JVM
S
t
a
c
k
I
T
J
o
b
S
o
l
u
t
i
o
n
To order Book Visit: stackvaly.com
To order Book Visit: stackvaly.com To order Book call: 01812603406
Combined Bank
Stack
IT
Question
Bank
|
01789741518,
01761719838
|
Buy
Book:
stackvaly.com
|
Online
Exam:
exam.stackvaly.com
implementation. Having a specification ensures
interoperability of Java programs across different
implementations so that program authors using the Java
Development Kit (JDK) need not worry about
idiosyncrasies of the underlying hardware platform.
Answer: d
17. What is the typical speed of USB version 3.0?
4.8 Gbits per
second
610 MBps
6 Gbps Both a and b
Explanation:
The theoretical transfer speed of USB 3.0 is 4.8 Gbit/s
(600MBps) vs. 480 Mbit/s (60MBps) which is a 10X
improvement. Sustained transfer speeds (real life) for
external hard drives are about 85MBps for USB 3.0 and
about 22MBps for USB 2.0, so about a 5X improvement
but still a significant advancement in transfer speed.
Answer: d
18. In which type of circuit switching, delivery of
data is delayed because data must be stored and
retrieved from RAM
Space-division Time-division
Virtual Packet
Explanation:
time division switch An all-electronic switching
system based on time division multiplexing (TDM)
principles: an input digitized signal from a source is
connected to an output trunk by assigning a group of
bits from the input data stream to a time slot in a high-
speed TDM output data stream.
Answer: b
19. Which one of the following statements with
respect to REST API is false?
A REST API
would use a
GET request to
retrieve a record
A REST API
would use a
DELETE request
to delete a record
The operations
in a REST API
can be called
from any HTTP
client
None of the above
statements is false
Explanation:
REST APIs communicate via HTTP requests to perform
standard database functions like creating, reading, updating,
and deleting records (also known as CRUD) within a
resource. For example, a REST API would use a GET
request to retrieve a record, a POST request to create one, a
PUT request to update a record, and a DELETE request to
delete one. All HTTP methods can be used in API calls. A
well-designed REST API is similar to a website running in
a web browser with built-in HTTP functionality.
Answer: d
20. What is the maximum data rate of a channel with
a bandwidth of 200 KHz if we use four levels of
digital signaling?
400 Kbps 800 Kbps
1000 Kbps 1200 Kbps
Explanation:
What is the maximum data rate of a channel with a
bandwidth of 200 KHz if we use four levels of digital
signaling. Ans: Here, bandwidth = 200 KHz = 200000 Hz.
`. The maximum data rate can be calculated as Nmax= 2 ×
B × nb= 2 × 200000 × log24 = 8 × 108bps = 800 Kbps.
Answer: b
21. In which year were chips used inside the
computer for the first time?
1964 1974
1975 1981
Explanation:
In 1964 year was chip used inside the computer for the first
time.
Answer: a
22. Which one of the following is a No-SQL
Database?
MongoDB Casper DB
ZBase All of the above
Explanation:
MongoDB is a source-available cross-platform document-
oriented database program. Classified as a NoSQL database
program, MongoDB uses JSON-like documents with
optional schemas. MongoDB is developed by MongoDB
Inc. and licensed under the Server Side Public License.
Answer: a
23. What will be the output of the following SQL
"Select ROUND (232.420,-2) AS Round Value?
240 200
233 Syntax error
Explanation:
The ROUND() function rounds a number to a specified
number of decimal places.
Answer: b
24. SSDs are more durable than HDDs in extreme
and harsh environments because
They don't have
actuator arms
They use fast
Electronic Memory
They do not use
0/1 as data
storage unit
which is prone
to crash
All of the above
statements are true
Explanation:
Generally, SSDs are more durable than HDDs in extreme
and harsh environments because they don’t have moving
parts such as actuator arms. SSDs can withstand accidental
drops and other shocks, vibration, extreme temperatures,
and magnetic fields better than HDDs. Add to that their
small size and lower power consumption, and you can
understand why they’re a great fit for laptop computers and
mobile applications.
S
t
a
c
k
I
T
J
o
b
S
o
l
u
t
i
o
n
To order Book Visit: stackvaly.com
To order Book Visit: stackvaly.com To order Book call: 01812603406
Combined Bank
Stack
IT
Question
Bank
|
01789741518,
01761719838
|
Buy
Book:
stackvaly.com
|
Online
Exam:
exam.stackvaly.com
Answer: a
25. Which one of the following statements is false?
Data mining is
considered as a
process of
extracting data
from large data
sets
Data warehouse is
the process of
pooling all the
relevant data
together.
Data warehouse
is created with
the data
generated by
Data Mining for
future use.
None of the above
statements is false
Explanation:
A data warehouse is a relational database that stores historic
operational data from across an organization, for reporting,
analysis and exploration.
Data mining is a process of reviewing and processing large
quantities of data to discover important patterns, findings or
correlations which might be important for the business. Its
common uses include analysis and predictive modeling for
marketing campaigns, pricing, fraud detection, financial
forecasting, and analyzing website traffic.
Answer: c
26. If the end office receives two bursts of analog
signals with frequencies of 697 and 1477 Hz,
then the number has been punched.
1 2
3 4
Explanation:
Answer: c
27. Which one of the following statements is true
with respect to a Printer Daemon process?
The printer
daemon of
Operating
System runs in
kernel mode.
Jobs in the printer
daemon queue
cannot be removed
once inserted.
Printer daemon
application runs
only when it is
printing
Printer daemon
runs as a service in
Operating System
Explanation:
LPD stands for Line Printer Daemon, is a general TCP/IP
daemon on UNIX networks that is used for receiving and
spooling print jobs on a print server. The Line Printer
Daemon (LPD) print server might be connected directly to
the print device, or it might be a network print device that
supports LPD. UNIX clients send their jobs to the printer
by using the Line Printer Remote (LPR) utility; you can use
another utility called Line Printer Queue (LPQ) to check the
status of print jobs spooled on the server.
Answer: d
28. When a beam of light travels through media of
two different densities, if the angle of incidence
is greater than the critical angle ------- occurs.
Refraction Incidence
Reflection Criticism
Explanation:
If the angle of incidence is bigger than the critical angle, the
refracted ray will not emerge from the medium, but will be
reflected back into the medium. This is called total internal
reflection. The critical angle occurs when the angle of
incidence where the angle of refraction is
(text{90})(text{°}).
Answer: a
29. In the protocol the symmetric key is
K=G<sup>xy</sup> mod N. where G and N are
public numbers.
Needham-
Schroeder
Otway - Rees
Diffie – Hellman Kerberos
Explanation:
Diffie-Hellman
Answer: c
30. Which of the following statements is false?
64-bit processor
is more capable
than a 32-bit
processor
because it can
handle more
data at once
A Computer works
with Hexa Decimal
number System
A 32-bit system
can access 232
memory
addresses
None of the above
statements is false
Explanation:
1 GB = 1024 MB
1 MB = 1024 KB
1 KB = 1024 B
1 B = 8 bits
So, 32-bit address bus has access to 2^32 locations
with 8 bits(1Byte) of information.
2^32 locations =2^2 * 2^10 * 2^10 * 2^10 locations
2^32 locations =2^2 * 2^10 * 2^10 * 1024 bits
2^32 locations =2^2 * 2^10 * 1024 Kbits
2^32 locations =2^2 * 1024 Mbits
2^32 locations =4 Gbits of location containing 8
bits(1Byte) of information.
Therefore, 4 Gbits * 8 bits = 4GB information.
Answer: c
31. Which one of the following statements is true?
S
t
a
c
k
I
T
J
o
b
S
o
l
u
t
i
o
n
To order Book Visit: stackvaly.com
To order Book Visit: stackvaly.com To order Book call: 01812603406
Combined Bank
Stack
IT
Question
Bank
|
01789741518,
01761719838
|
Buy
Book:
stackvaly.com
|
Online
Exam:
exam.stackvaly.com
Cache memory
is a small
amount of
memory which
is a part of the
Random-Access
Memory
Cache memory is
used to temporarily
hold instructions
and data that the
CPU is likely to
reuse
Cache Memory
is cheaper
memory
All of the above
statements are true
Explanation:
Cache memory is a type of high-speed random access
memory (RAM) which is built into the processor . Data can
be transferred to and from cache memory more quickly than
from RAM. As a result, cache memory is used to
temporarily hold data and instructions that the processor is
likely to reuse.
Answer: b
32. Which error detection method involves the use of
purity bits?
Simple parity
check
Two-dimensional
parity check
CRC (a) and (b)
Explanation:
Parity check bits are calculated for each row, which is
equivalent to a simple parity check bit. Parity check bits are
also calculated for all columns, then both are sent along
with the data. At the receiving end these are compared with
the parity bits calculated on the received data.
Answer: b
32. A DNS response is classified as if the
information comes from a cache memory.
Authoritative Recursive
Unauthoritative Iterative
Explanation:
A recursive DNS lookup is where one DNS server
communicates with several other DNS servers to hunt down
an IP address and return it to the client. This is in contrast to
an iterative DNS query, where the client communicates
directly with each DNS server involved in the lookup.
While this is a very technical definition, a closer look at the
DNS system and the difference between recursion and
iteration should help clear things up.
Answer: b
33. An email contains a textual birthday greeting, a
picture of a cake, and a song. The order is not
important. What is the Content-type?
Multipart/digest Multipart/alternativ
e
Multipart/mixed Multipart/parallel
Explanation:
The primary subtype for multipart, "mixed", is
intended for use when the body parts are independent
and intended to be displayed serially. Any multipart
subtypes that an implementation does not recognize
should be treated as being of subtype "mixed"
Answer: c
35. Which one of the following statements is true
with respect to a Database Management System?
Super key and
candidate keys
are similar
Candidate Keys
and Unique Keys
are similar
Unique Keys
and Primary
keys are similar
Candidate Keys
and Primary keys
are similar
Explanation:
Both Primary key and Unique Key are used to uniquely
define of a row in a table. Primary Key creates a clustered
index of the column whereas a Unique creates an
unclustered index of the column . A Primary Key doesn't
allow NULL value , however a Unique Key does allow one
NULL value .
Answer: c
36. ---is a client-server program that provides an IP
address, subnet mask, IP address of a router, and
IP address of a name server to a computer.
NAT DHCP
CIDR ISP
Explanation:
DHCP. DHCP is the Dynamic Host Configuration Protocol.
It is used to automatically provide IP addressing
information to clients. A DHCP server can assign IP
addresses, subnet masks, a DNS server address, and much
more.
Answer: b
37. The Average-case Time Complexity of the
binary search algorithm is
O(n/2log n) O(n log n)
O(log n) O(1)
Explanation:
Time complexity is O(logN)-
Recurrence relation-> T(n)=T(n/2)+1
Answer: c
38. A standard that allows a telephone connected to
a public telephone network to talk to a computer
connected to the Internet is---
SIP H.323
IEEE 802.3 V.90bis
Explanation:
H. 323 is an ITU Telecommunication Standardization
Sector (ITU-T) recommendation that describes protocols
for the provision of audio-visual (A/V) communication
sessions on all packet networks. H. ... 323 is widely used in
IP based videoconferencing, Voice over Internet Protocol
(VoIP) and Internet telephony.
Answer: b
39. An Ethernet LAN using the OSPF protocol with
five attached routers can be called a network.
Point-to-point Stub
S
t
a
c
k
I
T
J
o
b
S
o
l
u
t
i
o
n
To order Book Visit: stackvaly.com
To order Book Visit: stackvaly.com To order Book call: 01812603406
Combined Bank
Stack
IT
Question
Bank
|
01789741518,
01761719838
|
Buy
Book:
stackvaly.com
|
Online
Exam:
exam.stackvaly.com
Transient Virtual
Explanation:
Transient link: If there lies large number of routers
attached to a network. There can be Lan, wifi, several
different routers then this configuration is termed as
transient link. It can be represented with two topology:
Realistic and Unrealistic.
Answer: c
40. The term LPDDR means
Low-Power
Discrete Data
Rate.
Low-processing
Double Data Rate
Low-
Programmable
Double Data
Rate
None of the above
Explanation:
LPDDR, an abbreviation for Low-Power Double Data
Rate
Answer: d
41. What is the maximum data rate in IEEE
802.11n?
300 Mbps 600 Mbps
1 Gbps 832 Mbps
Explanation:
IEEE 802.11n/ac are two recent enhancements that increase
the data rates of WLANs significantly thanks to the use of
channel bonding, spatial multiplexing, an additional short
guard interval, and new modulation and coding schemes.
They offer a maximum transmission rate of 600 Mbps for
802.11n and 7 Gbps for 802.11ac.
Answer: b
42. The binary search algorithm is used to search for
a given item when items are sorted. If the
number of items is 1 million, which of the
following is the closest to the maximum number
of comparisons required to find the item.
15 20
25 30
Explanation:
blog(1000000)/log 2=19.932.
Answer: b
43. What is the min and max number of tables
required to convert an ER diagram with 2 entities
and 1 relationship between them with partial
participation constraints of both entities?
Min 1 and max
2
Min 1 and max 3
Min 2 and max
3
Min 2 and max 2
Explanation:
Maximum number of tables required is 3 in case of many to
many relationships between entities. Minimum number of
tables is 1 in case of unary relationship and total
participation of atleast one entity. But in case of partial
participation of both entities, minimum number of tables
required is 2.
Answer: c
44. Major function of a transport layer in the OSI
model is to perform
Peer to peer
message
encryption
Node to node
message delivery
Transparent
transfer of data
between end
users
None of the above
Explanation:
Layer 4 of the OSI Model: Transport Layer provides
transparent transfer of data between end users, providing
reliable data transfer services to the upper layers. ... The
transport layer also provides the acknowledgement of the
successful data transmission and sends the next data if no
errors occurred.
Answer: c
45. At any iteration of simplex method, if j (Zi-C)
corresponding to any non-basic variable Xj is
obtained as zero, the solution under the test is
Degenerate
solution
Unbounded
solution
Alternative
solution
Optimal solution
Explanation:
Answer: c
46. An IPv6 basic header is fixed as
32 bytes long 40 bytes long
64 bits long 128 bit long
Explanation:
IPv6 does not include a Header Length field because the
IPv6 header is always a fixed length of 40 bytes. Each
extension header is either a fixed length or indicates its own
length. Replaced by the IPv6 Traffic Class field. Replaced
by the IPv6 Payload Length field, which indicates only the
size of the payload.
Answer: b
47. Which of the following neural networks uses
supervised learning?
(A) Multilayer perceptron
(B) Self organizing feature map
(C) Hopfield network
A only B only
A and B only A and C only
Explanation:
Multilayer perceptron neural networks uses supervised
learning
Self organizing feature map neural networks uses
unsupervised learning
Hopfield network neural networks uses unsupervised
S
t
a
c
k
I
T
J
o
b
S
o
l
u
t
i
o
n
To order Book Visit: stackvaly.com
To order Book Visit: stackvaly.com To order Book call: 01812603406
Combined Bank
Stack
IT
Question
Bank
|
01789741518,
01761719838
|
Buy
Book:
stackvaly.com
|
Online
Exam:
exam.stackvaly.com
learning
So, option (A) is correct.
Answer: a
48. Which of the following services uses both TCP
and UDP ports?
DNS TFTP
SSH TELNET
Explanation:
DNS uses TCP for zone exchanges between servers and
UDP when a client is trying to resolve a hostname to an IP
address.
Answer: a
49. Which of the following Linux command has
incorrect syntax?
cat sampie.txt
grep-v a| sort –r
Chown :group3
File1
Chmod a+rx
viewer.sh
None of the above
Explanation:
Answer: b
50. In software development, value adjustment
factors include the following among others:
the criticality of
the performance
and reusability
of the code.
number of lines of
code in the
software.
number of
technical
manpower and
hardware costs.
time period
available and the
level of user
friendliness.
Explanation:
The value adjustment factor (VAF) is based on 14 general
system characteristics out of which Reusability is one of
them.
Answer: a
51. What is the maximum size of a file allowed in
Linux with the following data Block Size=4KB,
inode data pointer size = 4 byte
1 TB Less than 4TB
2TB+2GB+2M
B+ 64KB
More than 4 TB
Explanation:
Answer: b
52. In a two-level memory hierarchy, the access time
of the memory 12 nanoseconds, and the access
time of the main memory is 1.5 microseconds.
The hit ratio is 0.98. what is the average access
time of the two-level memory system?
13.5 nsec 42 nsec
7.56 nsec 76 nsec
Explanation:
Suppose 100 instructions are accessed from cache.
So, 98 instructions will take 12 ns × 98 and 2
instructions will take 1500 ns × 2.
So, average access time = (12 × 98 + 3000)/100 =
41.76 ns
Answer: b
53. A single switch port is considered as
A separate
unicast domain
A separate
broadcast domain
A separate
multicast
domain
A separate
collision domain
Explanation:
Answer: d
54. Which UNIX/Linux command is used to make
all files and sub-directories in the directory
"progs" executable by all users?
chmod -R a+x
progs
chmod -R 222
progs
chmod -X a+x
progs
chmod -X 222
progs
Explanation:
chmod− R a+x progs is used to make all files and sub-
directories in the directory “progs” executable by all users.
So, option (A) is correct.
Answer: a
55. An Access point operates in which layer of OSI
model?
Data link Layer Presentation layer
Physical layer Transport layer
Explanation:
AP serves as a connectivity provider for clients on wireless,
it maintains MAC entries against each client. It provides IP
using DHCP server on LAN side. Forwards traffic on WAN
side (can be on static or dynamic IP). Works on Layer 2 and
mostly can be said as connectivity provider between wired
and wireless.
Answer: a
56. Which of the following Process scheduling
algorithm is highly improbable to be
implemented?
FCFS
Scheduling
Priority Scheduling
Shortest Job
First Scheduling
None of the above
Explanation:
Shortest Job First (SJF) is an algorithm in which the process
having the smallest execution time is chosen for the next
execution. This scheduling method can be preemptive or
non-preemptive. It significantly reduces the average waiting
time for other processes awaiting execution. The full form
of SJF is Shortest Job First.
Answer: c
57. Consider the following program fragment in
S
t
a
c
k
I
T
J
o
b
S
o
l
u
t
i
o
n
To order Book Visit: stackvaly.com
To order Book Visit: stackvaly.com To order Book call: 01812603406
Combined Bank
Stack
IT
Question
Bank
|
01789741518,
01761719838
|
Buy
Book:
stackvaly.com
|
Online
Exam:
exam.stackvaly.com
assembly language:
mov ax, 0h
mov cx, 0A h
do loop:
dec ax
loop doloop
What is the value of ax and cx registers after the
completion of the doloop ?
ax=FFF5 h and
cx=Oh
ax=FFF6 h and
ex=Oh
ax=FFF7 h and
ex=0Ah
ax=FFF5 h and
ex=0Ah
Explanation:
In 8086, dec instruction is to decrement.
loop instruction decrements the value of cx register by 1
until it becomes 0h.
(ax = 0h or we can say 0000h. I am taking two hexadecimal
digits from LSB to simplify calculations. ax = 00h)
Answer: b
58. How many core/threads does the Intel Core i7-
9700K processor have?
6/12 4/8
8/8 8/16
Explanation:
Model Core i7-9700K
Cores / Threads 8 / 8
Base Frequency 3.6 GHz
Boost Frequency 4.9 GHz (1 Core)4.8 GHz (2 Core)4.7
GHz (4 Core)4.6 GHz (6 / 8 Core)
Memory Support DDR4-2666
Answer: c
59. Assuming the existence of a start and end nodes
for a program graph (PG), the total number of
Paths is equivalent to------- set of fest data
required to test software,
Minimum Maximum
Optimum Supreme
Explanation:
Assuming the existence of a start and end nodes for a
program graph, total number of patterns required in a set of
data to test the software is Minimum.
A Graph is a non-linear data structure consisting of nodes
and edges. The nodes are sometimes also referred to as
vertices and the edges are lines or arcs that connect any two
nodes in the graph. ... Graphs are used to solve many real-
life problems. Graphs are used to represent networks.
At-Home Help. A pattern is a group of numbers, shapes, or
objects that follow a rule while repeating or changing. To
extend a pattern you can use a table or a pattern rule that
relates the term number to the pattern rule. A term number
is the number that tells the position of an item in a pattern.
Types of testing: Automated Testing. Automated testing
refers to a type of testing that uses independant software to
test the system being tested. Automated testing can be used
to perform other types of testing such as functional or
performance testing.
Amount of testing performed by a set of test cases is called
Test Coverage. ... In other words, test coverage is defined
as a technique which determines whether our test cases are
actually covering the application code and how much code
is exercised when we run those test cases.
Answer: a
60. Which of the following statements is false with
respect to SSL?
Secure Sockets
Layer (SSL) is a
security protocol
that provides
privacy,
authentication,
and integrity to
Internet
communications
SSL evolved into
Transport Layer
Security (TLS)
SSL's final
version was SSL
4.0
None of the above
statements is false
Explanation:
Answer: c
Final version is 3.0
General Part
1. সামন্তবাদ ক ান ইউর াপীয় কদরে প্রথম সূত্রপাত হয়?
ইতালি রালিয়া
ইংিযান্ড ফ্রান্স
Ans: D
2. ধর ত্রী সরেলন ক াথায় অনুরিত হয়?
আলফ্রকার জ াহানেসবার্গ যুক্তরানের
ওয়ালিংটে
ব্রাল নির লরওলিন লেনরানত ইতালির জরাম
Ans: C
3. আইওএস কমাবাইল অপার টিং রসরেমট ক ান প্ররতিান
বাজা জাত র ?
অ্যানেি আইলবএম
গুর্ি মাইনরাসফট
Ans: A
4. ‘বযক্ত’ েরে রবপ ীতাথথ েে ক ানট?
তযক্ত র্ৃঢ়
গ্রাহয দ্রঢ়
Ans: B
S
t
a
c
k
I
T
J
o
b
S
o
l
u
t
i
o
n
To order Book Visit: stackvaly.com
To order Book Visit: stackvaly.com To order Book call: 01812603406
Combined Bank
Stack
IT
Question
Bank
|
01789741518,
01761719838
|
Buy
Book:
stackvaly.com
|
Online
Exam:
exam.stackvaly.com
5. মুরক্তযুরে পটভ
ূ রমরত রিত াবযগ্রন্থ ক ানট?
জেকনে অ্রণ্য লিয়নযাদ্ধা লিয়তম
বন্দী লিলবর জেনক লেলিদ্ধ জিাবাে
Ans: C
6. াজী নজরুল ইসলারম ‘অরিবীণা’ ারবয প্রথম রবতা ক ানট
আর্মেী লবনদ্রাহী
জকারবােী িিনয়াল্লাস
Ans: D
7. ক ানট বীন্দ্রনাথ ঠাকুর াবযগ্রন্থ?
জিি জিখা জিি লিে
জিি িশ্ন জিি কো
Ans: A
8. মুনী কিৌধু ী ‘মুখ া মণী বেী ণ’ এ ট -
উেেযাস অ্েুবাি োটক
জ াটর্ল্প িবন্ধ
Ans: B
9. ‘বন্ধন’ েরে সঠি অক্ষ রবনযাস ক ানট-
ব+ে+ধ+ন্ বন্ + ধন্
বান্ + ধন্ ব+ন্ধ+ে
Ans: B
10. বহুব্রীরহ সমাসবে পদ ক ানটী?
েশ্রুলত তনোবে
অ্েমেীয় র্াসমহি
Ans: C
11. ‘রবষাদ রসন্ধ
ু ’ এ ট-
র্নবিণ্া গ্রন্থ আত্ম ীবেী
ধমগলবিয়ক িবন্ধ ইলতহাস আশ্রয়ী
উেেযাস
Ans: D
12. বািংলা থয ভাষা আরদ গ্রন্থ ক ানট?
িভু লযশুর বাণ্ী ফু িমলণ্ ও করুণ্ার
লববরণ্
ক
ৃ োর িানের অ্েগনভি আত্ম ীবেী
Ans: C
13. উপসর্থ ক ানট?
অ্লত জেনক
জেনয় দ্বারা
Ans: A
14. র্ণপ্রজাতন্ত্রী বািংলারদরে সিংরবধান প্রবরতথ ত হয়?
১৭ এলিি ১৯৭১ ২৬ মাে
গ ১৯৭৩
১৬ লিনসম্বর ১৯৭২ ৭ মাে
গ ১৯৭২
Ans: C
15. বঙ্গবন্ধ
ু আর্ তলা ষড়যন্ত্র মামলা কমাট আসারম সিংখযা রিল
তজন?
৩৪ ে ৩২ ে
৩৫ ে ৩৬ ে
Ans: C
16. আইন প্রণয়রন ক্ষমতা
আইে মন্ত্রণ্ািনয়র াতীয় সংসনির
রােেলতর লিকানরর
Ans: B
17. পাবথতয িট্টগ্রাম োরন্তি
ু রক্ত ত সারল স্বাক্ষর ত হয়?
১৯৯৩ ২০০১
১৯৯৭ ১৯৯৯
Ans: C
18. বািংলারদরে প্রথম স্বাধীন নবাব ক ?
েবাব লসরা উনদৌিা ইলিয়াস িাহ
মুলিগি কুলি খাে আিাউলদে হুনসে িা
Ans: C
19. বায়ুমন্ডরল কয স্তর কবতা ত ঙ্গ প্ররতফরলত হয়?
স্ট্রানটালিয়ার ওন ােস্তর
ট্রনোলিয়ার আয়নোলিয়ার
Ans: D
20. ‘ ালাপারন’ ন দুই ারে মরধয অমীমািংসীত ভ
ূ খন্ড?
ভারত ও জেোি বাংিানিি ও ভারত
োলকস্তাে ও েীে ভু টাে ও ভারত
Ans: A
21. The warning of the authority falls on deaf ears. Here
warning does the function of ……….
Adverb Adjective
Verb Noun
Explanation:
The + verb + ing + of দ্বা া verbal noun র্ঠিত হয় । সুত ািং প্রদত্ত
বার য warning েেট noun।
Ans: D
22. “ A rolling stone gaters no moss” the complex form
of the sentence is ……..
Since a stone is rolling,
it gathers no moss
Though a stone
rolls, it gathers no
moss
A stone what rolls
fathers no moss.
A stone that rolls
gathers no moss
Explanation:
Participle যুক্ত simple sentence - জক complex করনত হনি participle অ্ংিনক
subordinate clause -এ রুোন্তলরত করনত হয় এবং বালক অ্ংি main clause লহনসনব
অ্েলরবলতগ ত োনক। িিত্ত বানকয ' rolling' হনে present participle , যার subordinate
clause হনিা ' A stone which /that rolls যা (ঘ) option -এ উনল্লখ আন ।
Answer: D
23. Education is enlightening . Here ‘ enlightening’ is ….
A gerund A participle
An infinitive A fine verb
Explanation:
Verb+ing যলি noun এর মনতা কা কনর তনব তানক Gerund বনি। এখানে
enlightening িব্দটি noun এর েল িনে বনসন । তাই সঠিক উত্তর Gerund.
Answer: B
24. The comparison of unlike things using the words on
as is known to be……..
Metaphor Simile
S
t
a
c
k
I
T
J
o
b
S
o
l
u
t
i
o
n
To order Book Visit: stackvaly.com
To order Book Visit: stackvaly.com To order Book call: 01812603406
Combined Bank
Stack
IT
Question
Bank
|
01789741518,
01761719838
|
Buy
Book:
stackvaly.com
|
Online
Exam:
exam.stackvaly.com
Alliteration Personification
Explanation:
A simile is a comparison between two unlike objects using the
words like or as in the sentence.
Answer: B
25. In English grammar …. Deals with formation of
sentences.
Morphology Etymology
Syntax Samantics
Explanation:
Linguistics বা ভািালবজ্ঞানে Morphology - িনব্দর র্ঠে লেনয়, Etymology - িনব্দর
উৎেলত্ত ও ইলতহাস লেনয়, Syntax - বানকযর র্ঠে লেনয় এবং Semantics - িব্দ এবং
বানকযর অ্েগ লেনয় আনিােো কনর।
Answer: C
26. Give the antonym of the word ‘transitory’
Temporary permanent
Transparent Short lived
Answer: B
27. Choose the pari of the words that expresses a
relationship similar to that of “ Harm:Damage”…..
Sweet:sour Injure :
Incapacitate
Stout : weak Hook : Crook
Explanation:
Harm (ক্ষলত করা) : Danage ( ক্ষলত করা , ধ্বংস করা) । অ্েগাৎ কাউনক ধ্বংস
করার েয ক্ষলত করা হয়। Option গুনিার মনধয Sweet (লমলি/মধুর ) : Sour (
(টক) , এরা লবেরীতােগক : Injure ( আঘাত করা, ক্ষত করা ) : Incapacitate
(অ্ক্ষম করা, আঘানতর দ্বারা দুবগি করা ), অ্েগাৎ কাউনক অ্ক্ষম করার েয আঘাত দ্বারা
দুবগি করা) , অ্েগাৎ কাউনক অ্ক্ষম করার েয আঘাত করা হয়; Stout (অ্টি,
িলক্তিািী): Weak (দুবগি) এরা Antonymous এবং Hook ( বাাঁকানো ,বর
হওয়া) , : Crook (বর করা বা হওয়া ) এরা Synonymous হনিও সম্পকগ র্ত
লিক জেনক এক েয়। সুতরাং (খ) সঠিক উত্তর।
Answer: B
28. Which word is the determiner in the sentence “will it
take much time?”
Will Take
much time
Explanation:
Determiner হনে noun / pronoun - এর লেলিগি , অ্লেলিগিতা , সংখযা বা
েলরমাণ্ লেনিগিক। Option -গুনিার মনধয 'will ' হনে Future Indefinite
Tense -এর auxiliary verb, much হনে time -এর েলরমাণ্ লেনিগিক ,take
হনে finite + transitive verb এবং time হনে objective noun । সুতরাং
'much' হনে determiner।
Answer: C
29. Which is the correct sentence?
He insisted on seeing
her
He insisted for
seeing her
He insisted in seeing her He insisted to be
seeing her.
Answer: a
30. If a part of a speech or writing breaks the theme, it is
called……
Pomposity Digression
Exaggrration Anti-climax
Explanation:
যলি জকানো বক্তবয বা জিখা মূিভাব জেনক লবেু যত হনয় েনে তখে তানক digression
(মূি িসঙ্গ জেনক লবেু যলত ) বিা হয়। 'সুতরাং সঠিক উত্তর (খ) ।
Answer: B
31. The product of two positive numbers is p. if each of
the numbers is increased by 2, the new product is
how much greater than twice the sum of the two
original numbers.
P times 2p times
(p+4) times (2p+3) times
Explanation:
Let the two no's be a and b;
Given product of the no's is p = ab;
If the each nos is increased by 2 then the new product will be
(a+2)(b+2) = ab + 2a + 2b + 4
= ab + 2(a+b) + 4
= p + 2(a+b) + 4
Hence the new product is (p+4) times greater than twice the
sum of the two original numbers.
Answer: C
32. A jar contains white, red and green marbles in the
ratio 2:3:5. Six more green marbles are added to the
jars, and then the ratio becomes 2:3:7. How many
white marbles are there in the jar?
2 4
6 8
Explanation:
Ratio of W : R : G= 2: 3:5।
If 6 Green is added, Ratio becomes W: R:G = 2: 3:7
Difference of ratio for 6 marbles = 7 – 5 = 2
For 1 ratio = 3 marbles
.'. White marbles = 2×3 = 6 (ans)Answer: C
33. If a, b and c are 3 consecutive integers and a>b>c ,
which of the following has the maximum value?
C+b/a A+b/c
B+c/a C+a/b
Explanation:
ধলর, a = 3, b = 2, c = 1
b+ ( c/a) = 2 + 1/3 = 2 1/3
c + ( a/b) = 1 + 3/2 = 2.5
c + ( b/a) = 1 + 2/3 = 1 2/3
a + ( b/c) = 3 + 2/1 = 5
a +( b/c) এর মাে সনবগাচ্চ।
Answer: b
34. A dozen eggs and 10 pounds of apples are currently
at the same price. If the price of a dozen eggs rises by
10 percent and the price of apples rises by 2 %. How
much more will it cost to buy a dozen eggs and 10
pounds of apples.
2% 10%
6% 12%
Explanation:
As same price,
Let one dozen eggs=100
ten pounds of apples=100
So total amount 200
S
t
a
c
k
I
T
J
o
b
S
o
l
u
t
i
o
n
To order Book Visit: stackvaly.com
To order Book Visit: stackvaly.com To order Book call: 01812603406
Combined Bank
Stack
IT
Question
Bank
|
01789741518,
01761719838
|
Buy
Book:
stackvaly.com
|
Online
Exam:
exam.stackvaly.com
Eggs price rises 10%=100+10=110
Apples price rises 2%=100+2=102
Rises total amount 212
Just rises amount 12
So cost price will 12*100/200=6%
Ans: 6%
Answer: C
35. There are n students in a scholl. IF r% among the
students are 12 years of younger, which of the
following expressions represents the number of
students who are older than 12 ?
n(1-r) 100(1-r)
n(1-r) /100 n(100-r)/100
Explanation:
The number of student who are 12 years or younger = n*r%
=nr/100
The number of student who are older than 12 = n - nr/100 =
n(100-r)/100
Answer: D
36. Length of a train is 170 meters and speed of train is
63 km/hour. This train can pass a bridge in 30
seconds, the find the length of the bridge.
355m 325m
365m 312m
Explanation:
Given speed = 63 km/hr = 63 × 5/18 = 35/2 m/s
Let the length of the bridge = x mts
Given time taken to cover the distance of (170 + x)mts is 30
sec.
We know speed = distance/time
35 / 2 = ( 170 + x ) / 30
x = 355 mts.
Answer: a
37. If x3
<x2
<x then the value of x could be
0 1
1/3 square root of 3
Answer: C
38. A wholesaler sells goods to a retailer at a profit of
20% the retailer sells to the customer, who pays 80%
more than the cost of the wholesaler. What is the
retailer’s profit ?
40% 50%
60% 70%
Explanation:
Let the cost of the wholeselle be W.
Then, Buying price of the retailer = 1.2W
The customer pays = W + 0.8W = 1.8W
So, profit of the retailer = (1.8 - 1.2)/1.2 x 100% = 50%
Answer: b
39. The hypotenuse of a right triangle is 2 centimeters
more than the longer side of the triangle. The shorter
side of the triangle is 7 centimeters less than the
longer side. Find the length of the hypotenuse.
13 15
17 19
Answer: c
40. Equal amounts of water were poured into two empty
jars of different capacities, which made one jar 1/4
full and other jar 1/3 full. If the water in the jar with
lesser capacity is then poured into the jar with
greater capacity, what fraction of the larger jar will
be filled with water?
1/3 ¼
1/5 1/2
Explanation:
Some amount of water made bigger jar 1/4 full, then the same
amount of water (stored for a while in smaller jar) were added
to bigger jar, so bigger jar is 1/4+1/4=1/2 full.
Answer: D
S
t
a
c
k
I
T
J
o
b
S
o
l
u
t
i
o
n
To order Book Visit: stackvaly.com
To order Book Visit: stackvaly.com To order Book call: 01812603406