Se ha denunciado esta presentación.
Se está descargando tu SlideShare. ×

Assistant Programmer, Bangladesh Bank

Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Anuncio

Eche un vistazo a continuación

1 de 2 Anuncio

Más Contenido Relacionado

Presentaciones para usted (20)

Similares a Assistant Programmer, Bangladesh Bank (20)

Anuncio

Más reciente (20)

Anuncio

Assistant Programmer, Bangladesh Bank

  1. 1. Question Bank 2004- 2023 | Bank Special Stack IT Job Solution Stack IT Question Bank | 01789741518, 01761719838 | Buy Book: stackvaly.com | Online Exam: exam.stackvaly.com largest spender and beneficiary from information technology. This endeavors to relate the international trends in it with the Indian banking industry. 2 Bangladesh Bank Exam Taker: IBA Assistant Programmer Marks: 200 Time: 1.30 h Date: 25.10.2019 [MCQ- MCQ= 64*1.25=80, Written-120(deprt-100, Non-20)] Solved by: Stack IT 1. Write a c program to find max price from 20 items. #include<stdio.h> int main () { int items [20]; int i, max; printf ("Enter the 20 items price:"); for (i=0; i<20; i++) { scanf ("%d”, &items[i]); } max= items [0]; for (i=0; i<20; i++) { if(max<items[i]) max=items[i]; } printf ("Max prices is: %d”, max); return 0; } 2. 10 bits number taken randomly, find the probability at least 1 bit is zero. Total number = 210 = 1024 Successive number = 1023 Probability = (1023/1024) = 0.99 3. What protection do you provide for your computer from malware? Look at eight additional ways you can protect yourself from viruses and malware: a)Keep your software up to date. b)Don't click on links within emails. c)Use free antivirus software. d)Back up your computer. e)Use a strong password. f) Use a firewall. g)Minimize downloads. h)Use a pop-up blocker. 4. A company needs key person for DBMS. What is his/her duty as key person? A company key person is database administrator for DBMS. Duty as key person: a) Schema definition b) Storage structure and access method definition c) Schema and physical organization modification d) Integrity constraint specification 5. (12345) base 10 to (?) base 8. (12345)10 = (30071)8 6. Two OSI layers which known as "flow Control" which are those? Write them and explain. Flow control is generally implemented on two layers Datalink Layer (Layer 2) and Transport Layer (Layer 4). [Note: (i). Data link layer may provide flow control "on the wire". (ii). Network layer provides flow control between routers by ICMP. The end terminals usually do not use the network layer barely. IP does not provide flow control. (iii). Transport layer, more specifically TCP provides flow control by a backtracking algorithm while UDP does not. TCP has various flow and congestion avoiding protocols, such as TCP Vegas. So, when routers have flow control problems, it is handled in the network layer, when end points have this problem, it's handled in the transport layer.] S t a c k I T J o b S o l u t i o n
  2. 2. Question Bank 2004- 2023 | Bank Special Stack IT Job Solution Stack IT Question Bank | 01789741518, 01761719838 | Buy Book: stackvaly.com | Online Exam: exam.stackvaly.com 7. What is firewall? Explain its work. Draw a LAN network and a firewall where firewall will be situated. Firewall-A firewall is software used to maintain the security of a private network. Firewalls block unauthorized access to or from private networks and are often employed to prevent unauthorized Web users or illicit software from gaining access to private networks Connected to the Internet. A firewall may be implemented using hardware, software, or a combination of both. Firewalls generally use two or more of the following methods: a) Packet Filtering: Firewalls filter packets that attempt to enter or leave a network and either accept or reject them depending on the predefined set of filter rules. b) Application Gateway: The application gateway technique employs security methods applied to certain applications such as Telnet and File Transfer Protocol servers. c) Circuit-Level Gateway: A circuit-level gateway applies these methods when a connection such as Transmission Control Protocol is established and packets start to move. d) Proxy Servers: Proxy servers can mask real network addresses and intercept every message that enters or leaves a network. e) Stateful Inspection or Dynamic Packet Filtering: This method compares not just the header information, but also a packet’s most important inbound and outbound data parts. These are then compared to a trusted information database for characteristic matches. This determines whether the information is authorized to cross the firewall into the network. 8. Focus writing- combating of Cybercrime in Bangladesh. 9. What is SOAP? SOAP (Simple Object Access Protocol) is a message protocol that allows distributed elements of an application to communicate. SOAP can be carried over a variety of lower-level protocols, including the web-related Hypertext Transfer Protocol (HTTP). 10. Suppose, you are implementing “Overdraft Account (OD)” class using java for a banking app. An OD type account is opened with an approved loan limit (ex 100000/-). The account holder can deposit any amount of money in the OD account at any time. S/he can draw an amount of money from the account (acn) until sufficient acn balance. S/he allowed to draw money beyond his/her acn balance if the total over-drawing amount remains within the loan limit. A java sketch for OD acn is given bellow & code is expected to run in multi-threading mode. (same code with run by different counter in the blank) Code: public class ODAccount extends BankAccount { double limit; public void ODAccount (double setLimit) { $this->balance= 0; //super class has balance property $this->limit= setLimit; } public void depositMoney (double deposit Amount) { balance= balance+ depositAmount; public void drawMoney (double drawAmount) throws ODLimit Exceeded { if (balance – drawAmount>=-1*limit) balance= balance- drawAmount; else throw new OD Limit Exceeded (); } S t a c k I T J o b S o l u t i o n

×