Publicidad
Bangladesh Bank Assistant Maintenance Engineer Question Solution.
Bangladesh Bank Assistant Maintenance Engineer Question Solution.
Bangladesh Bank Assistant Maintenance Engineer Question Solution.
Bangladesh Bank Assistant Maintenance Engineer Question Solution.
Publicidad
Bangladesh Bank Assistant Maintenance Engineer Question Solution.
Próximo SlideShare
Assistant Programmer, Bangladesh BankAssistant Programmer, Bangladesh Bank
Cargando en ... 3
1 de 5
Publicidad

Más contenido relacionado

Publicidad
Publicidad

Bangladesh Bank Assistant Maintenance Engineer Question Solution.

  1. Question Bank 2004- 2023 | Bank Special Stack IT Job Solution Stack IT Question Bank | 01789741518, 01761719838 | Buy Book: stackvaly.com | Online Exam: exam.stackvaly.com 1 Bangladesh Bank Exam Taker: BUET Assistant Maintenance Engineer(AME) Marks: 150 Time: 1.30 h Date: 21.09.2019 [ সকল প্রশ্নের উত্তর দিশ্নে হশ্নে ] Solved by: Stack IT 1. What is the distributed DBMS and describe its feature? A distributed database management system (DDBMS) is a collection of multiple, logically interrelated databases distributed over a computer network. They provided a mechanism that makes the distribution of data transparent to users. Feature of DDBMS is given bellow: a) It is used to create, retrieve, update and delete distributed databases. b) It is designed for heterogeneous database platforms. c) It maintains confidentiality and data integrity of the databases. d) It ensures that the data modified at any site is universally updated. e) Location independent f) Distributed transaction management g) Distributed query processing h) Hardware & Network independent i) Operating system independent j) Transaction transparency k) DBMS independent. 2. How can we test ATM in distributed banking system? We can test ATM in distributed banking system by following criteria: a) Withdrawing money less than the account balance. b) Withdrawing money greater than the account balance. c) Withdrawing money equal to the account balance. d) Withdrawing money from an ATM and from the internet at the same time. e) Withdrawing money when the connection to the bank’s networks is lost. f) Withdrawing money from multiple ATMs simultaneously. g) Check the balance available. h) Make a deposit at an ATM. i) Try to enter invalid pin more than 3 times and see if the account gets locked. j) Try quick cash with drawl. k) Try to buy stamps. 3. What is the importance of application framework in web application development? a) Investing in the task, not in the technology: This is the essential principle of a framework, not having to reinvent the wheel and doing away with foreboding, low value- added tasks, for instance, the development of generic components in order to fully focus on the business rules. b) Guaranteed upgradability & maintenance: In the longer term, a framework makes sure the longevity of your applications. If a development team works as they please, only that team will be able to maintain and upgrade the application with ease. c) Open source: Being open source means that frameworks are cost effective for both the customer and developer. This doesn’t mean that they aren’t of good quality. Most of the well-known web frameworks used by developers are free for use. d) Efficiency: Efficiency is another vital advantage for web developers. This is because frameworks eliminate the need to write a lot of repetitive code allowing developers to build websites and applications much quicker. e) Integration: This is one of the most useful features that have the ability to permit developers to link with other tools such as S t a c k I T J o b S o l u t i o n
  2. Question Bank 2004- 2023 | Bank Special Stack IT Job Solution Stack IT Question Bank | 01789741518, 01761719838 | Buy Book: stackvaly.com | Online Exam: exam.stackvaly.com databases to the framework. One of the most common criticisms levied against frameworks is that they tend to make the code a lot more complicated than it should be. Also, rather than the reduced development time claimed by its proponents, frameworks actually result in a more time- consuming process since users will have to spend more time learning to use them. 4. Differentiate between micro and macro (Monolithic) kernel. What are the sub- components of I/O manager in Windows NT? Micro kernel is a kernel which run services those are minimal for operating system performance. In this kernel all other operations are performed by processor. Macro kernel is a combination of micro and monolithic kernel. In monolithic kernel all operating system code is in single executable image. Sub-components of I/O manager: a) Network redirector / Server b) Cache manager c) File systems d) Network driver e) Device driver 5. Write the short note on Node, Hub, Backbone, Router and Gateway. a) Node: Any system or device connected to a network is called a node. A node is any physical device within a network of other tools that’s able to send, receive or forward information. e.g. personal computer, modem, switch, hub, server etc. b) Hub: A Hub is a network connectivity device that broadcasts data to every computer or Ethernet based device connected to it. c) Backbone: A backbone is the part of the computer network infrastructure that interconnects different networks and provides a path for exchange of data between these different networks. A backbone may interconnect different local area networks in offices, campuses or buildings. d) Router: A router is a network connectivity device that forwards data packets between computer networks based on IP addresses. Router is mainly network layer (layer-3) device. e) Gateway: A gateway is a component that is part of two networks, which use different protocols. It may be a router, firewall, server or other device that enables traffic to flow in and out of the network. 6. Write the categories of computer architecture. What are the stages of DLX pipelines? Computer architecture: Computer architecture refers to how a computer system is designed and what technologies it is compatible with. There are three categories of computer architecture: a) System design: This includes all hardware components in the system, including data processors aside from the CPU, such as the graphics processing unit and direct memory access. It also includes memory controllers, data paths and miscellaneous things like multiprocessing and virtualization. b) Instruction set architecture (ISA): This is the embedded programming language of the central processing unit. It defines the CPU’s functions and capabilities based on what programming it can perform or process. This includes the word size, processor register types, memory addressing modes, data formats and the instruction set that programmers use. c) Microarchitecture: This type of architecture defines the data paths, data processing and storage elements, as well as how they should be implemented in the ISA. DLX pipeline consists of five stages: a) Instruction Fetch (IF): The instruction fetch stage fetches the next instruction from memory using the address in the PC (program counter). S t a c k I T J o b S o l u t i o n
  3. Question Bank 2004- 2023 | Bank Special Stack IT Job Solution Stack IT Question Bank | 01789741518, 01761719838 | Buy Book: stackvaly.com | Online Exam: exam.stackvaly.com b) Instruction Decode (ID): The instruction decode stage decodes the instruction in the IR, calculates the next PC and reads any operands required from the register file. c) Execute (EX): The execute stage executes the instruction. In fact, all ALU operations are done in this stage. d) Memory (MEM): The memory access stage performs any memory access required by the current instruction, so for loads, it would load an operand from memory. For stores it would store an operand into memory. For all other instructions it would do nothing. e) Write Back (WB): For instructions that have a result (a destination register) the write back writes this back to the register file. Note that this includes nearly all instructions, except nops (no-operation) and stores. 7. Differentiate among risk, threat and vulnerability. What is SSL and TSL? a) Risk: Risk is defined as the potential for loss or damage of an asset when a threat exploits a vulnerability. Examples of risk include financial losses, loss of privacy, reputational damage, legal implications and even loss of life. Risk can also be defined as: Risk = Threat probability * potential loss / impact. b) Threat: Anything that can exploit vulnerability, intentionally or accidentally and obtain damage or destroy an asset. Common threats include things like: i. An activist tries to steal data from your website. ii. A fire starts in your data center iii. An administrator accidentally turns off your website AWS instance. iv. A flood hits your headquarters v. An insider tries to sell your corporate secrets to a competitor c) Vulnerability: Vulnerability refers to weaknesses or gaps in a security program that can be exploited by threats to gain unauthorized access to an asset. Common examples of vulnerabilities include: i. SQL injection ii. Cross site scripting (XSS) iii. Broken authentication and session management iv. Security misconfiguration v. Insecure cryptographic storage vi. Failure to restrict URL access vii. Insufficient transport layer protection viii. Insecure direct object references d) SSL: Secure Socket Layer (SSL) is a standard protocol used to establish a secured and an encrypted connection between a server and the browser. SSL is most commonly seen in payment and banking web sites. e) TLS: Transport Layer Security (TLS) is a protocol that provides communication security between client / server applications that communicate with each other over the internet. It enables privacy, integrity and protection for the data that’s transmitted between different nodes on the internet. 8. Four 1 kbps connections are multiplexed together. A unit is 1 bit. Find (A) the duration of 1 bit before multiplexing (B) the transmission rate of the link (C) the duration of a time slot and (D) the duration of a frame. a) The duration of 1 bit is 1/1 Kbps, or 0.001 s (1 ms). b) The rate of the link is 4 Kbps. c) The duration of each time slot 1/4 ms or 250 us. d) The duration of a frame 1 ms. 9. How can you implement AND gate & OR gate using CMOS NAND & NOR gate? a) CMOS two-input NAND and AND gates: S t a c k I T J o b S o l u t i o n
  4. Question Bank 2004- 2023 | Bank Special Stack IT Job Solution Stack IT Question Bank | 01789741518, 01761719838 | Buy Book: stackvaly.com | Online Exam: exam.stackvaly.com Circuit Description: This applet demonstrates the static two-input NAND and AND gates in CMOS technology. Click the input switches or type the ('a','b') and ('c','d') bindkeys to control the two gates. The two-input NAND2 gate shown on the left is built from four transistors. The series-connection of the two n-channel transistors between GND and the gate-output ensures that the gate-output is only driven low (logical 0) when both gate inputs A or B are high (logical 1). The complementary parallel connection of the two transistors between VCC and gate-output means that the gate-output is driven high (logical 1) when one or both gate inputs are low (logical 0). The net result is the logical NAND function: NAND AND A B Y A B Y 0 0 1 0 0 0 0 1 1 0 1 0 1 0 1 1 0 0 1 1 0 1 1 1 As shown on the right, the corresponding AND gate is constructed from the NAND followed by a standard static inverter. b) CMOS two-input NOR and OR gates: Circuit Description: This applet demonstrates the static two-input NOR and OR gates in CMOS technology. Click the input switches or type the ('a','b') and ('c','d') bindkeys to control the two gates. The two-input NOR2 gate shown on the left is built from four transistors. The parallel connection of the two n-channel transistors between GND and the gate-output ensures that the gate-output is driven low (logical 0) when either gate input A or B is high (logical 1). The complementary series-connection of the two transistors between VCC and gate- output means that the gate-output is driven high (logical 1) when both gate inputs are low (logical 0). The net result is the logical NOR function: NOR OR A B Y A B Y 0 0 1 0 0 0 0 1 0 0 1 1 1 0 0 1 0 1 1 1 0 1 1 1 As shown on the right, the corresponding OR gate is constructed from the NOR2 followed by a standard static inverter. 10. A 3-phase 12 pole alternator running at 500 rpm, supplying power to a 8 pole induction motor. If slip is 3%, what is the full load speed of the motor? Synchronous machine is operating at 500 rpm ⇒ 500 = 120 × f / 12 = 50 Hz Induction machine synchronous speed = (120 × 50)/ 8 = 750 rpm Rotor full load speed, Nr = Ns (1 – s) = 750 (1 - 0.03) = 727.5 rpm 11. The distance between Town X and Town Y is twice the distance between Town X and Town Z. The distance between Town Z and Town W is 2/3 the distance between Town Z and Town X. If the distance between Town Z and Town W is 18 miles, how far is Town X from Town Y? Let us represent the respective distances using the names of the towns.  Let distance between town X and town Y = XY;  distance between town X and town Z = XZ,  distance between town Z and town W = WZ. S t a c k I T J o b S o l u t i o n
  5. Question Bank 2004- 2023 | Bank Special Stack IT Job Solution Stack IT Question Bank | 01789741518, 01761719838 | Buy Book: stackvaly.com | Online Exam: exam.stackvaly.com Let us now connect these unknown using equations.  XY = 2 XZ, which can be equation 1. WZ = 2/3 XZ, which can be equation 2. The question says that WZ = 18. Substituting this in equation 2, 18 = 2/3XZ which yields us XZ = 27. Substituting this in equation 1, we have, XY = 2*27 = 54. Therefore, town X is 54 km away from town Y. 12. A company employs 20 workers for every 3 managers, and 5 managers for every director. If the total number of employees at the company is between 300 and 400, what is the number of managers who work at the company? Company employs 20 workers for every 3 managers => W : M = 20 : 3 Company employs 5 managers for every 1 director => M: D = 5: 1 Combined ratio would be W : M : D = 100 : 15 : 3 and the total number of employees at the company is between 300 and 400 W : M : D = 100 : 15 : 3 means total of 118 people W : M : D = 200 : 30 : 6 means total of 236 people W : M : D = 300 : 45 : 9 means total of 354 people (total between 300 and 400) W : M : D = 400 : 60 :12 means total of 472 people 13. Focus writing in English: Impact of information technology in banking system Banking environment has become highly competitive today. Information technology refers to the acquisition, processing, storage and dissemination of all types of information using computer technology and telecommunication systems. Information technology architecture is an integrated framework for acquiring and evolving IT to achieve strategic goals. These technologies are used for the input, storage, processing and communication of information. Information technology includes ancillary equipment, software, firmware and similar procedures, services etc. Modern high throughput technologies are providing vast amounts of the sequences, expression and functional data for genes and protein. Recent developments of banking sector in Bangladesh are Internet, Society for worldwide inter-bank financial telecommunications (SWIFT), Automated Teller Machine (ATM), Cash dispensers, Electronic clearing service, Bank Net, Chip card, Phone banking, Tele-banking, Internet banking, Mobile banking, Anywhere banking, Voice mail, E-banking Etc., The basic need of Information Technology (IT) in Banking Sector are Meeting Internal Requirements, Effective in Data Handling, Extending Customer Services, Creative Support for New Product Development, End-user Development of the Non-technical Staff. Emerging trends of information technology in banking sector are Outsourcing, Integration, Distinctive Edge, IT as Profit Centre, Prospering in Down Market. Challenges faced by Bangladesh banking scenario in Bangladesh are Meet customer expectations on service and facility offered by the bank, Customer retention, Managing the spread and sustain the operating profit, Retaining the current market share in the industry and the improving the same, Completion from other players in the banking industry. Other Information Technology enables sophisticated product development, better market infrastructure, implementation of reliable techniques for control of risks and helps the financial intermediaries to reach geographically distant and diversified markets. Internet has significantly influenced delivery channels of the banks. Internet has emerged as an important medium for delivery of banking products and services. Information, communication and networking, achieving inter branch connectivity, moving towards Real Time gross settlement (RTGS) environment the forecasting of liquidity by building real time databases, The shift from traditional banking to e-banking is changing customer’s expectations. For a country like India, which is one of the most promising emerging markets, such isolation is nearly impossible. More particularly in the area of Information technology, where India has definitely an edge over its competitors, remaining away or uniformity of the world trends is untenable. Financial sector in general and banking industry in particular is the S t a c k I T J o b S o l u t i o n
Publicidad