Bangladesh Bank Assistant Maintenance Engineer Question Solution.
Question Bank 2004- 2023 | Bank Special Stack IT Job Solution
Stack
IT
Question
Bank
|
01789741518,
01761719838
|
Buy
Book:
stackvaly.com
|
Online
Exam:
exam.stackvaly.com
1
Bangladesh Bank
Exam Taker: BUET
Assistant Maintenance Engineer(AME)
Marks: 150 Time: 1.30 h Date: 21.09.2019
[ সকল প্রশ্নের উত্তর দিশ্নে হশ্নে ]
Solved by: Stack IT
1. What is the distributed DBMS and describe
its feature?
A distributed database management system
(DDBMS) is a collection of multiple, logically
interrelated databases distributed over a computer
network. They provided a mechanism that makes
the distribution of data transparent to users.
Feature of DDBMS is given bellow:
a) It is used to create, retrieve, update and
delete distributed databases.
b) It is designed for heterogeneous database
platforms.
c) It maintains confidentiality and data
integrity of the databases.
d) It ensures that the data modified at any site
is universally updated.
e) Location independent
f) Distributed transaction management
g) Distributed query processing
h) Hardware & Network independent
i) Operating system independent
j) Transaction transparency
k) DBMS independent.
2. How can we test ATM in distributed
banking system?
We can test ATM in distributed banking system by
following criteria:
a) Withdrawing money less than the account
balance.
b) Withdrawing money greater than the
account balance.
c) Withdrawing money equal to the account
balance.
d) Withdrawing money from an ATM and
from the internet at the same time.
e) Withdrawing money when the connection
to the bank’s networks is lost.
f) Withdrawing money from multiple ATMs
simultaneously.
g) Check the balance available.
h) Make a deposit at an ATM.
i) Try to enter invalid pin more than 3 times
and see if the account gets locked.
j) Try quick cash with drawl.
k) Try to buy stamps.
3. What is the importance of application
framework in web application
development?
a) Investing in the task, not in the
technology: This is the essential principle
of a framework, not having to reinvent the
wheel and doing away with foreboding, low
value- added tasks, for instance, the
development of generic components in
order to fully focus on the business rules.
b) Guaranteed upgradability &
maintenance: In the longer term, a
framework makes sure the longevity of your
applications. If a development team works
as they please, only that team will be able to
maintain and upgrade the application with
ease.
c) Open source: Being open source means
that frameworks are cost effective for both
the customer and developer. This doesn’t
mean that they aren’t of good quality. Most
of the well-known web frameworks used by
developers are free for use.
d) Efficiency: Efficiency is another vital
advantage for web developers. This is
because frameworks eliminate the need to
write a lot of repetitive code allowing
developers to build websites and
applications much quicker.
e) Integration: This is one of the most useful
features that have the ability to permit
developers to link with other tools such as
S
t
a
c
k
I
T
J
o
b
S
o
l
u
t
i
o
n
Question Bank 2004- 2023 | Bank Special Stack IT Job Solution
Stack
IT
Question
Bank
|
01789741518,
01761719838
|
Buy
Book:
stackvaly.com
|
Online
Exam:
exam.stackvaly.com
databases to the framework. One of the
most common criticisms levied against
frameworks is that they tend to make the
code a lot more complicated than it should
be. Also, rather than the reduced
development time claimed by its
proponents, frameworks actually result in a
more time- consuming process since users
will have to spend more time learning to use
them.
4. Differentiate between micro and macro
(Monolithic) kernel. What are the sub-
components of I/O manager in Windows
NT?
Micro kernel is a kernel which run services those
are minimal for operating system performance. In
this kernel all other operations are performed by
processor.
Macro kernel is a combination of micro and
monolithic kernel. In monolithic kernel all
operating system code is in single executable
image.
Sub-components of I/O manager:
a) Network redirector / Server
b) Cache manager
c) File systems
d) Network driver
e) Device driver
5. Write the short note on Node, Hub,
Backbone, Router and Gateway.
a) Node: Any system or device connected to
a network is called a node. A node is any
physical device within a network of other
tools that’s able to send, receive or forward
information. e.g. personal computer,
modem, switch, hub, server etc.
b) Hub: A Hub is a network connectivity
device that broadcasts data to every
computer or Ethernet based device
connected to it.
c) Backbone: A backbone is the part of the
computer network infrastructure that
interconnects different networks and
provides a path for exchange of data
between these different networks. A
backbone may interconnect different local
area networks in offices, campuses or
buildings.
d) Router: A router is a network connectivity
device that forwards data packets between
computer networks based on IP addresses.
Router is mainly network layer (layer-3)
device.
e) Gateway: A gateway is a component that
is part of two networks, which use different
protocols. It may be a router, firewall,
server or other device that enables traffic
to flow in and out of the network.
6. Write the categories of computer
architecture. What are the stages of DLX
pipelines?
Computer architecture: Computer architecture
refers to how a computer system is designed and
what technologies it is compatible with.
There are three categories of computer
architecture:
a) System design: This includes all hardware
components in the system, including data
processors aside from the CPU, such as the
graphics processing unit and direct memory
access. It also includes memory controllers,
data paths and miscellaneous things like
multiprocessing and virtualization.
b) Instruction set architecture (ISA): This is
the embedded programming language of the
central processing unit. It defines the CPU’s
functions and capabilities based on what
programming it can perform or process. This
includes the word size, processor register
types, memory addressing modes, data
formats and the instruction set that
programmers use.
c) Microarchitecture: This type of architecture
defines the data paths, data processing and
storage elements, as well as how they should
be implemented in the ISA.
DLX pipeline consists of five stages:
a) Instruction Fetch (IF): The instruction
fetch stage fetches the next instruction
from memory using the address in the PC
(program counter).
S
t
a
c
k
I
T
J
o
b
S
o
l
u
t
i
o
n
Question Bank 2004- 2023 | Bank Special Stack IT Job Solution
Stack
IT
Question
Bank
|
01789741518,
01761719838
|
Buy
Book:
stackvaly.com
|
Online
Exam:
exam.stackvaly.com
b) Instruction Decode (ID): The instruction
decode stage decodes the instruction in the
IR, calculates the next PC and reads any
operands required from the register file.
c) Execute (EX): The execute stage executes
the instruction. In fact, all ALU operations
are done in this stage.
d) Memory (MEM): The memory access
stage performs any memory access
required by the current instruction, so for
loads, it would load an operand from
memory. For stores it would store an
operand into memory. For all other
instructions it would do nothing.
e) Write Back (WB): For instructions that
have a result (a destination register) the
write back writes this back to the register
file. Note that this includes nearly all
instructions, except nops (no-operation)
and stores.
7. Differentiate among risk, threat and
vulnerability. What is SSL and TSL?
a) Risk: Risk is defined as the potential for
loss or damage of an asset when a threat
exploits a vulnerability. Examples of risk
include financial losses, loss of privacy,
reputational damage, legal implications
and even loss of life. Risk can also be
defined as: Risk = Threat probability *
potential loss / impact.
b) Threat: Anything that can exploit
vulnerability, intentionally or accidentally
and obtain damage or destroy an asset.
Common threats include things like:
i. An activist tries to steal data from
your website.
ii. A fire starts in your data center
iii. An administrator accidentally
turns off your website AWS
instance.
iv. A flood hits your headquarters
v. An insider tries to sell your
corporate secrets to a competitor
c) Vulnerability: Vulnerability refers to
weaknesses or gaps in a security program
that can be exploited by threats to gain
unauthorized access to an asset.
Common examples of
vulnerabilities include:
i. SQL injection
ii. Cross site scripting (XSS)
iii. Broken authentication and session
management
iv. Security misconfiguration
v. Insecure cryptographic storage
vi. Failure to restrict URL access
vii. Insufficient transport layer
protection
viii. Insecure direct object references
d) SSL: Secure Socket Layer (SSL) is a
standard protocol used to establish a
secured and an encrypted connection
between a server and the browser. SSL is
most commonly seen in payment and
banking web sites.
e) TLS: Transport Layer Security (TLS) is a
protocol that provides communication
security between client / server
applications that communicate with each
other over the internet. It enables privacy,
integrity and protection for the data that’s
transmitted between different nodes on the
internet.
8. Four 1 kbps connections are multiplexed
together. A unit is 1 bit. Find (A) the
duration of 1 bit before multiplexing (B) the
transmission rate of the link (C) the
duration of a time slot and (D) the duration
of a frame.
a) The duration of 1 bit is 1/1 Kbps, or 0.001
s (1 ms).
b) The rate of the link is 4 Kbps.
c) The duration of each time slot 1/4 ms or
250 us.
d) The duration of a frame 1 ms.
9. How can you implement AND gate & OR
gate using CMOS NAND & NOR gate?
a) CMOS two-input NAND and AND
gates:
S
t
a
c
k
I
T
J
o
b
S
o
l
u
t
i
o
n
Question Bank 2004- 2023 | Bank Special Stack IT Job Solution
Stack
IT
Question
Bank
|
01789741518,
01761719838
|
Buy
Book:
stackvaly.com
|
Online
Exam:
exam.stackvaly.com
Circuit Description: This applet demonstrates the
static two-input NAND and AND gates in CMOS
technology. Click the input switches or type the
('a','b') and ('c','d') bindkeys to control the two
gates.
The two-input NAND2 gate shown on the left is
built from four transistors. The series-connection
of the two n-channel transistors between GND and
the gate-output ensures that the gate-output is only
driven low (logical 0) when both gate inputs A or
B are high (logical 1). The complementary parallel
connection of the two transistors between VCC and
gate-output means that the gate-output is driven
high (logical 1) when one or both gate inputs are
low (logical 0). The net result is the logical NAND
function:
NAND AND
A B Y A B Y
0 0 1 0 0 0
0 1 1 0 1 0
1 0 1 1 0 0
1 1 0 1 1 1
As shown on the right, the corresponding AND
gate is constructed from the NAND followed by a
standard static inverter.
b) CMOS two-input NOR and OR gates:
Circuit Description: This applet demonstrates the
static two-input NOR and OR gates in CMOS
technology. Click the input switches or type the
('a','b') and ('c','d') bindkeys to control the two
gates.
The two-input NOR2 gate shown on the left is built
from four transistors. The parallel connection of the
two n-channel transistors between GND and the
gate-output ensures that the gate-output is driven
low (logical 0) when either gate input A or B is high
(logical 1). The complementary series-connection
of the two transistors between VCC and gate-
output means that the gate-output is driven high
(logical 1) when both gate inputs are low (logical
0). The net result is the logical NOR function:
NOR OR
A B Y A B Y
0 0 1 0 0 0
0 1 0 0 1 1
1 0 0 1 0 1
1 1 0 1 1 1
As shown on the right, the corresponding OR
gate is constructed from the NOR2 followed by
a standard static inverter.
10. A 3-phase 12 pole alternator running at 500
rpm, supplying power to a 8 pole induction
motor. If slip is 3%, what is the full load speed
of the motor?
Synchronous machine is operating at 500 rpm
⇒ 500 = 120 × f / 12 = 50 Hz
Induction machine synchronous speed
= (120 × 50)/ 8 = 750 rpm
Rotor full load speed, Nr = Ns (1 – s)
= 750 (1 - 0.03) = 727.5 rpm
11. The distance between Town X and Town Y
is twice the distance between Town X and Town
Z. The distance between Town Z and Town W
is 2/3 the distance between Town Z and Town X.
If the distance between Town Z and Town W is
18 miles, how far is Town X from Town Y?
Let us represent the respective distances using the
names of the towns.
Let distance between town X and town Y
= XY;
distance between town X and town Z =
XZ,
distance between town Z and town W =
WZ.
S
t
a
c
k
I
T
J
o
b
S
o
l
u
t
i
o
n
Question Bank 2004- 2023 | Bank Special Stack IT Job Solution
Stack
IT
Question
Bank
|
01789741518,
01761719838
|
Buy
Book:
stackvaly.com
|
Online
Exam:
exam.stackvaly.com
Let us now connect these unknown using
equations.
XY = 2 XZ, which can be equation 1.
WZ = 2/3 XZ, which can be equation 2.
The question says that WZ = 18. Substituting this
in equation 2,
18 = 2/3XZ which yields us XZ = 27. Substituting
this in equation 1, we have,
XY = 2*27 = 54.
Therefore, town X is 54 km away from town Y.
12. A company employs 20 workers for every 3
managers, and 5 managers for every director. If
the total number of employees at the company is
between 300 and 400, what is the number of
managers who work at the company?
Company employs 20 workers for every 3
managers => W : M = 20 : 3
Company employs 5 managers for every 1
director => M: D = 5: 1
Combined ratio would be W : M : D = 100 : 15 : 3
and the total number of employees at the company
is between 300 and 400
W : M : D = 100 : 15 : 3
means total of 118 people
W : M : D = 200 : 30 : 6
means total of 236 people
W : M : D = 300 : 45 : 9
means total of 354 people (total between 300
and 400)
W : M : D = 400 : 60 :12
means total of 472 people
13. Focus writing in English: Impact of
information technology in banking system
Banking environment has become highly
competitive today. Information technology refers
to the acquisition, processing, storage and
dissemination of all types of information using
computer technology and telecommunication
systems. Information technology architecture is an
integrated framework for acquiring and evolving
IT to achieve strategic goals. These technologies
are used for the input, storage, processing and
communication of information. Information
technology includes ancillary equipment, software,
firmware and similar procedures, services etc.
Modern high throughput technologies are
providing vast amounts of the sequences,
expression and functional data for genes and
protein. Recent developments of banking sector in
Bangladesh are Internet, Society for worldwide
inter-bank financial telecommunications (SWIFT),
Automated Teller Machine (ATM), Cash
dispensers, Electronic clearing service, Bank Net,
Chip card, Phone banking, Tele-banking, Internet
banking, Mobile banking, Anywhere banking,
Voice mail, E-banking Etc., The basic need of
Information Technology (IT) in Banking Sector are
Meeting Internal Requirements, Effective in Data
Handling, Extending Customer Services, Creative
Support for New Product Development, End-user
Development of the Non-technical Staff. Emerging
trends of information technology in banking sector
are Outsourcing, Integration, Distinctive Edge, IT
as Profit Centre, Prospering in Down Market.
Challenges faced by Bangladesh banking scenario
in Bangladesh are Meet customer expectations on
service and facility offered by the bank, Customer
retention, Managing the spread and sustain the
operating profit, Retaining the current market share
in the industry and the improving the same,
Completion from other players in the banking
industry. Other Information Technology enables
sophisticated product development, better market
infrastructure, implementation of reliable
techniques for control of risks and helps the
financial intermediaries to reach geographically
distant and diversified markets. Internet has
significantly influenced delivery channels of the
banks. Internet has emerged as an important
medium for delivery of banking products and
services. Information, communication and
networking, achieving inter branch connectivity,
moving towards Real Time gross settlement
(RTGS) environment the forecasting of liquidity by
building real time databases, The shift from
traditional banking to e-banking is changing
customer’s expectations. For a country like India,
which is one of the most promising emerging
markets, such isolation is nearly impossible. More
particularly in the area of Information technology,
where India has definitely an edge over its
competitors, remaining away or uniformity of the
world trends is untenable. Financial sector in
general and banking industry in particular is the
S
t
a
c
k
I
T
J
o
b
S
o
l
u
t
i
o
n