SlideShare a Scribd company logo
2
Most read
Question Bank 2004- 2023 | Bank Special Stack IT Job Solution
Stack
IT
Question
Bank
|
01789741518,
01761719838
|
Buy
Book:
stackvaly.com
|
Online
Exam:
exam.stackvaly.com

largest spender and beneficiary from information
technology. This endeavors to relate the
international trends in it with the Indian banking
industry.
2
Bangladesh Bank
Exam Taker: IBA
Assistant Programmer
Marks: 200 Time: 1.30 h Date: 25.10.2019
[MCQ- MCQ= 64*1.25=80, Written-120(deprt-100, Non-20)]
Solved by: Stack IT
1. Write a c program to find max price from
20 items.
#include<stdio.h>
int main () {
int items [20];
int i, max;
printf ("Enter the 20 items price:");
for (i=0; i<20; i++) {
scanf ("%d”, &items[i]);
}
max= items [0];
for (i=0; i<20; i++) {
if(max<items[i])
max=items[i];
}
printf ("Max prices is: %d”, max);
return 0;
}
2. 10 bits number taken randomly, find the
probability at least 1 bit is zero.
Total number = 210
= 1024
Successive number = 1023
Probability = (1023/1024) = 0.99
3. What protection do you provide for your
computer from malware?
Look at eight additional ways you can protect
yourself from viruses and malware:
a)Keep your software up to date.
b)Don't click on links within emails.
c)Use free antivirus software.
d)Back up your computer.
e)Use a strong password.
f) Use a firewall.
g)Minimize downloads.
h)Use a pop-up blocker.
4. A company needs key person for DBMS.
What is his/her duty as key person?
A company key person is database administrator
for DBMS.
Duty as key person:
a) Schema definition
b) Storage structure and access method
definition
c) Schema and physical organization
modification
d) Integrity constraint specification
5. (12345) base 10 to (?) base 8.
(12345)10 = (30071)8
6. Two OSI layers which known as "flow
Control" which are those? Write them and
explain.
Flow control is generally implemented on two
layers Datalink Layer (Layer 2) and Transport
Layer (Layer 4).
[Note: (i). Data link layer may provide flow control
"on the wire". (ii). Network layer provides flow
control between routers by ICMP. The end
terminals usually do not use the network layer
barely. IP does not provide flow control. (iii).
Transport layer, more specifically TCP provides
flow control by a backtracking algorithm while
UDP does not. TCP has various flow and
congestion avoiding protocols, such as TCP Vegas.
So, when routers have flow control problems, it is
handled in the network layer, when end points have
this problem, it's handled in the transport layer.]
S
t
a
c
k
I
T
J
o
b
S
o
l
u
t
i
o
n
Question Bank 2004- 2023 | Bank Special Stack IT Job Solution
Stack
IT
Question
Bank
|
01789741518,
01761719838
|
Buy
Book:
stackvaly.com
|
Online
Exam:
exam.stackvaly.com

7. What is firewall? Explain its work. Draw a
LAN network and a firewall where firewall
will be situated.
Firewall-A firewall is software used to maintain
the security of a private network. Firewalls block
unauthorized access to or from private networks
and are often employed to prevent unauthorized
Web users or illicit software from gaining access to
private networks Connected to the Internet. A
firewall may be implemented using hardware,
software, or a combination of both.
Firewalls generally use two or more of the
following methods:
a) Packet Filtering: Firewalls filter packets that
attempt to enter or leave a network and either
accept or reject them depending on the
predefined set of filter rules.
b) Application Gateway: The application
gateway technique employs security methods
applied to certain applications such as Telnet
and File Transfer Protocol servers.
c) Circuit-Level Gateway: A circuit-level
gateway applies these methods when a
connection such as Transmission Control
Protocol is established and packets start to
move.
d) Proxy Servers: Proxy servers can mask real
network addresses and intercept every
message that enters or leaves a network.
e) Stateful Inspection or Dynamic Packet
Filtering: This method compares not just the
header information, but also a packet’s most
important inbound and outbound data parts.
These are then compared to a trusted
information database for characteristic
matches. This determines whether the
information is authorized to cross the firewall
into the network.
8. Focus writing- combating of Cybercrime in
Bangladesh.
9. What is SOAP?
SOAP (Simple Object Access Protocol) is a
message protocol that allows distributed elements
of an application to communicate. SOAP can be
carried over a variety of lower-level protocols,
including the web-related Hypertext Transfer
Protocol (HTTP).
10. Suppose, you are implementing “Overdraft
Account (OD)” class using java for a
banking app. An OD type account is opened
with an approved loan limit (ex 100000/-).
The account holder can deposit any amount
of money in the OD account at any time.
S/he can draw an amount of money from the
account (acn) until sufficient acn balance.
S/he allowed to draw money beyond his/her
acn balance if the total over-drawing
amount remains within the loan limit. A
java sketch for OD acn is given bellow &
code is expected to run in multi-threading
mode. (same code with run by different
counter in the blank)
Code:
public class ODAccount extends
BankAccount {
double limit;
public void ODAccount (double
setLimit) {
$this->balance= 0; //super
class has balance property
$this->limit= setLimit;
}
public void depositMoney (double
deposit Amount) {
balance= balance+
depositAmount;
public void drawMoney
(double drawAmount) throws
ODLimit Exceeded {
if (balance –
drawAmount>=-1*limit)
balance= balance-
drawAmount;
else throw new
OD Limit Exceeded ();
}
S
t
a
c
k
I
T
J
o
b
S
o
l
u
t
i
o
n

More Related Content

PDF
Combined Bank Question Solution(Updated) 25/10/2021 Assistant Hardware Engine...
PDF
BPSC Previous Year Question for AP, ANE, AME, ADA, AE
PDF
Bangladesh Bank Assistant Maintenance Engineer Question Solution.
PPT
Advance Java Programming( CM5I) 4. Networking Basics
PDF
Bangladesh telecommunication regulatory commision
PDF
E governance in secretariat(sachivalaya vahini)
PDF
A PROJECT PRESENTATION ON ONLINE MOVIE TICKET BOOKING SYSTEM Internal Guide By
DOC
Kality CS Model_Exit_Exams_with_answer - Copy (2).doc
Combined Bank Question Solution(Updated) 25/10/2021 Assistant Hardware Engine...
BPSC Previous Year Question for AP, ANE, AME, ADA, AE
Bangladesh Bank Assistant Maintenance Engineer Question Solution.
Advance Java Programming( CM5I) 4. Networking Basics
Bangladesh telecommunication regulatory commision
E governance in secretariat(sachivalaya vahini)
A PROJECT PRESENTATION ON ONLINE MOVIE TICKET BOOKING SYSTEM Internal Guide By
Kality CS Model_Exit_Exams_with_answer - Copy (2).doc

What's hot (20)

PDF
Bank Question Solution-ADBA Previous Year Question for AP, ANE, AME, ADA, AE
PDF
BTCL Assistant Manager Previous Year Question by Stack IT Job Solution
PPT
Basic Web Concepts
PDF
Computer Graphics End Semester Question Paper
DOC
Subnet questions with ans(networking)
PPTX
Elements of dynamic programming
PPTX
Overview of Data Base Systems Concepts and Architecture
PPTX
Paging & segmentation; advantages and disadvantage
PPTX
Recovery in Multi database Systems
PPTX
IPv4 Addressing
PPT
Real time scheduling - basic concepts
PDF
DBMS Unit - 6 - Transaction Management
PPTX
Disk scheduling & Disk management
PPT
PPTX
IP Address - IPv4 & IPv6
PDF
Care for network and computer hardware
PPTX
Internetworking
PPT
PPT
Instruction cycle
PDF
Pipelining and ILP (Instruction Level Parallelism)
Bank Question Solution-ADBA Previous Year Question for AP, ANE, AME, ADA, AE
BTCL Assistant Manager Previous Year Question by Stack IT Job Solution
Basic Web Concepts
Computer Graphics End Semester Question Paper
Subnet questions with ans(networking)
Elements of dynamic programming
Overview of Data Base Systems Concepts and Architecture
Paging & segmentation; advantages and disadvantage
Recovery in Multi database Systems
IPv4 Addressing
Real time scheduling - basic concepts
DBMS Unit - 6 - Transaction Management
Disk scheduling & Disk management
IP Address - IPv4 & IPv6
Care for network and computer hardware
Internetworking
Instruction cycle
Pipelining and ILP (Instruction Level Parallelism)
Ad

Similar to Assistant Programmer, Bangladesh Bank (20)

PDF
Principles of Information Security 4th Edition Whitman Test Bank
PDF
Guide to Firewalls and VPNs 3rd Edition Whitman Test Bank
PDF
Guide to Firewalls and VPNs 3rd Edition Whitman Test Bank
PDF
Principles of Information Security 4th Edition Whitman Test Bank
PDF
Guide to Firewalls and VPNs 3rd Edition Whitman Test Bank
PDF
Principles of Information Security 6th Edition Whitman Solutions Manual
PPTX
Sapna ppt
PPTX
Firewall and its purpose
PDF
Guide to Firewalls and VPNs 3rd Edition Whitman Test Bank
PDF
Immediate download Principles of Information Security 4th Edition Whitman Tes...
PDF
Principles of Information Security 6th Edition Whitman Solutions Manual
PDF
Principles of Information Security 6th Edition Whitman Solutions Manual
PDF
Principles of Information Security 6th Edition Whitman Solutions Manual
PDF
what is firewall in information security?
PDF
Principles of Information Security 4th Edition Whitman Test Bank
PDF
Combined 2 Bank Compiled Post: SO(IT) Date: 25.09.2021 Taker: AUST
PPTX
Network security
PPTX
network security, group policy and firewalls
PDF
Principles of Information Security 4th Edition Whitman Test Bank
PDF
Principles of Information Security 6th Edition Whitman Solutions Manual
Principles of Information Security 4th Edition Whitman Test Bank
Guide to Firewalls and VPNs 3rd Edition Whitman Test Bank
Guide to Firewalls and VPNs 3rd Edition Whitman Test Bank
Principles of Information Security 4th Edition Whitman Test Bank
Guide to Firewalls and VPNs 3rd Edition Whitman Test Bank
Principles of Information Security 6th Edition Whitman Solutions Manual
Sapna ppt
Firewall and its purpose
Guide to Firewalls and VPNs 3rd Edition Whitman Test Bank
Immediate download Principles of Information Security 4th Edition Whitman Tes...
Principles of Information Security 6th Edition Whitman Solutions Manual
Principles of Information Security 6th Edition Whitman Solutions Manual
Principles of Information Security 6th Edition Whitman Solutions Manual
what is firewall in information security?
Principles of Information Security 4th Edition Whitman Test Bank
Combined 2 Bank Compiled Post: SO(IT) Date: 25.09.2021 Taker: AUST
Network security
network security, group policy and firewalls
Principles of Information Security 4th Edition Whitman Test Bank
Principles of Information Security 6th Edition Whitman Solutions Manual
Ad

More from Engr. Md. Jamal Uddin Rayhan (8)

PDF
DESCO AE CSE Question Solution
PDF
OSI Model Cheat Sheet
PDF
Bangladesh Bank Data entry control operator Question Solution.
PDF
Senior Officer , Pubali Bank Limited
PDF
Combined 2 Bank Compiled Post: ADA Date: 25.09.2021 Taker: AUST
PDF
Linux Command For Beginners 6 - copy commands for linux | BUET Pattern Job Pr...
PDF
Titas gas sub-assistant engineer question pattern
PPTX
information security and backup system
DESCO AE CSE Question Solution
OSI Model Cheat Sheet
Bangladesh Bank Data entry control operator Question Solution.
Senior Officer , Pubali Bank Limited
Combined 2 Bank Compiled Post: ADA Date: 25.09.2021 Taker: AUST
Linux Command For Beginners 6 - copy commands for linux | BUET Pattern Job Pr...
Titas gas sub-assistant engineer question pattern
information security and backup system

Recently uploaded (20)

PPTX
Overview Planner of Soft Skills in a single ppt
PDF
APNCET2025RESULT Result Result 2025 2025
PDF
servsafecomprehensive-ppt-full-140617222538-phpapp01.pdf
PPTX
Slideham presentation for the students a
PPTX
Definition and Relation of Food Science( Lecture1).pptx
PDF
Shopify Store Management_ Complete Guide to E-commerce Success.pdf
PDF
ELA Parts of Speech Pronoun Educational Presentation in Green 3D Gradient Sty...
PDF
Career Overview of John Munro of Hilton Head
PDF
Beyond the Lab Coat - Perjalanan Karier di Dunia Pasca-Fisika S1
PDF
iTop VPN Crack Latest Version 2025 Free Download With Keygen
PPTX
employee on boarding for jobs for freshers try it
PDF
CV of Architect Professor A F M Mohiuddin Akhand.pdf
PPTX
The Stock at arrangement the stock and product.pptx
PPT
2- CELL INJURY L1 Medical (2) gggggggggg
PPTX
mathsportfoliomanvi-211121071838 (1).pptx
PPTX
Core Characteristics and Abilities of an Effective Teacher_0.pptx
PPTX
_Dispute Resolution_July 2022.pptxmhhghhhh
PPT
ALLIED MATHEMATICS -I UNIT III MATRICES.ppt
PPTX
microtomy kkk. presenting to cryst in gl
PPT
Gsisgdkddkvdgjsjdvdbdbdbdghjkhgcvvkkfcxxfg
Overview Planner of Soft Skills in a single ppt
APNCET2025RESULT Result Result 2025 2025
servsafecomprehensive-ppt-full-140617222538-phpapp01.pdf
Slideham presentation for the students a
Definition and Relation of Food Science( Lecture1).pptx
Shopify Store Management_ Complete Guide to E-commerce Success.pdf
ELA Parts of Speech Pronoun Educational Presentation in Green 3D Gradient Sty...
Career Overview of John Munro of Hilton Head
Beyond the Lab Coat - Perjalanan Karier di Dunia Pasca-Fisika S1
iTop VPN Crack Latest Version 2025 Free Download With Keygen
employee on boarding for jobs for freshers try it
CV of Architect Professor A F M Mohiuddin Akhand.pdf
The Stock at arrangement the stock and product.pptx
2- CELL INJURY L1 Medical (2) gggggggggg
mathsportfoliomanvi-211121071838 (1).pptx
Core Characteristics and Abilities of an Effective Teacher_0.pptx
_Dispute Resolution_July 2022.pptxmhhghhhh
ALLIED MATHEMATICS -I UNIT III MATRICES.ppt
microtomy kkk. presenting to cryst in gl
Gsisgdkddkvdgjsjdvdbdbdbdghjkhgcvvkkfcxxfg

Assistant Programmer, Bangladesh Bank

  • 1. Question Bank 2004- 2023 | Bank Special Stack IT Job Solution Stack IT Question Bank | 01789741518, 01761719838 | Buy Book: stackvaly.com | Online Exam: exam.stackvaly.com largest spender and beneficiary from information technology. This endeavors to relate the international trends in it with the Indian banking industry. 2 Bangladesh Bank Exam Taker: IBA Assistant Programmer Marks: 200 Time: 1.30 h Date: 25.10.2019 [MCQ- MCQ= 64*1.25=80, Written-120(deprt-100, Non-20)] Solved by: Stack IT 1. Write a c program to find max price from 20 items. #include<stdio.h> int main () { int items [20]; int i, max; printf ("Enter the 20 items price:"); for (i=0; i<20; i++) { scanf ("%d”, &items[i]); } max= items [0]; for (i=0; i<20; i++) { if(max<items[i]) max=items[i]; } printf ("Max prices is: %d”, max); return 0; } 2. 10 bits number taken randomly, find the probability at least 1 bit is zero. Total number = 210 = 1024 Successive number = 1023 Probability = (1023/1024) = 0.99 3. What protection do you provide for your computer from malware? Look at eight additional ways you can protect yourself from viruses and malware: a)Keep your software up to date. b)Don't click on links within emails. c)Use free antivirus software. d)Back up your computer. e)Use a strong password. f) Use a firewall. g)Minimize downloads. h)Use a pop-up blocker. 4. A company needs key person for DBMS. What is his/her duty as key person? A company key person is database administrator for DBMS. Duty as key person: a) Schema definition b) Storage structure and access method definition c) Schema and physical organization modification d) Integrity constraint specification 5. (12345) base 10 to (?) base 8. (12345)10 = (30071)8 6. Two OSI layers which known as "flow Control" which are those? Write them and explain. Flow control is generally implemented on two layers Datalink Layer (Layer 2) and Transport Layer (Layer 4). [Note: (i). Data link layer may provide flow control "on the wire". (ii). Network layer provides flow control between routers by ICMP. The end terminals usually do not use the network layer barely. IP does not provide flow control. (iii). Transport layer, more specifically TCP provides flow control by a backtracking algorithm while UDP does not. TCP has various flow and congestion avoiding protocols, such as TCP Vegas. So, when routers have flow control problems, it is handled in the network layer, when end points have this problem, it's handled in the transport layer.] S t a c k I T J o b S o l u t i o n
  • 2. Question Bank 2004- 2023 | Bank Special Stack IT Job Solution Stack IT Question Bank | 01789741518, 01761719838 | Buy Book: stackvaly.com | Online Exam: exam.stackvaly.com 7. What is firewall? Explain its work. Draw a LAN network and a firewall where firewall will be situated. Firewall-A firewall is software used to maintain the security of a private network. Firewalls block unauthorized access to or from private networks and are often employed to prevent unauthorized Web users or illicit software from gaining access to private networks Connected to the Internet. A firewall may be implemented using hardware, software, or a combination of both. Firewalls generally use two or more of the following methods: a) Packet Filtering: Firewalls filter packets that attempt to enter or leave a network and either accept or reject them depending on the predefined set of filter rules. b) Application Gateway: The application gateway technique employs security methods applied to certain applications such as Telnet and File Transfer Protocol servers. c) Circuit-Level Gateway: A circuit-level gateway applies these methods when a connection such as Transmission Control Protocol is established and packets start to move. d) Proxy Servers: Proxy servers can mask real network addresses and intercept every message that enters or leaves a network. e) Stateful Inspection or Dynamic Packet Filtering: This method compares not just the header information, but also a packet’s most important inbound and outbound data parts. These are then compared to a trusted information database for characteristic matches. This determines whether the information is authorized to cross the firewall into the network. 8. Focus writing- combating of Cybercrime in Bangladesh. 9. What is SOAP? SOAP (Simple Object Access Protocol) is a message protocol that allows distributed elements of an application to communicate. SOAP can be carried over a variety of lower-level protocols, including the web-related Hypertext Transfer Protocol (HTTP). 10. Suppose, you are implementing “Overdraft Account (OD)” class using java for a banking app. An OD type account is opened with an approved loan limit (ex 100000/-). The account holder can deposit any amount of money in the OD account at any time. S/he can draw an amount of money from the account (acn) until sufficient acn balance. S/he allowed to draw money beyond his/her acn balance if the total over-drawing amount remains within the loan limit. A java sketch for OD acn is given bellow & code is expected to run in multi-threading mode. (same code with run by different counter in the blank) Code: public class ODAccount extends BankAccount { double limit; public void ODAccount (double setLimit) { $this->balance= 0; //super class has balance property $this->limit= setLimit; } public void depositMoney (double deposit Amount) { balance= balance+ depositAmount; public void drawMoney (double drawAmount) throws ODLimit Exceeded { if (balance – drawAmount>=-1*limit) balance= balance- drawAmount; else throw new OD Limit Exceeded (); } S t a c k I T J o b S o l u t i o n