Assistant Programmer of Bangladesh Bank(BB) Exam Question 2019
Exam Held: 25 October 2019
Number of Posts: 22 Exam taker: DU Arts Faculty,
Total 200 Marks (MCQ= 64*1.25=80), Time=2 Hours(10am-12pm)
No negative marking & Scientific Calculator is allowed.
Q1. Suppose, u have purchased 20 different items from a super shop. Write a program to find the item with the maximum price using c/c++/java.(item prices are unique)
Q2. Suppose, u r implementing “Overdraft Account (OD)” class using java for a banking app. An OD type account is opened with an approved loan limit (ex 100000/-). The account holder can deposit any amount of money in the OD account at any time. S/he can draw an amount of money from the account (acn) until sufficient acn balance. S/he allowed to draw money beyond his/her acn balance if the total over-drawing amount remains within the loan limit. A java sketch for OD acn is given bellow & code is expected to run in multi threading mode. (same code with run by different counter in the blank)
Program Code:
public class ODAccount extends BankAccount{
double limit;
public void ODAccount (double setLimit) {
$this->balance= 0; //super class has balance property
$this->limit= setLimit;
}
public void depositMoney (double deposit Amount) {
balance= balance+ depositAmount;
public void drawMoney (double drawAmount) throws ODLimit Exceeded {
if(balance – drawAmount>=-1*limit)
balance= balance- drawAmount;
else throw new OD Limit Exceeded();
}
}
Output =?
Mr. Fraud one of ur frnd has an OD acn with 300.00 loan limit & 420.00 @ any instant. Thus he can draw up to 720.00.He needs total of 800/- & he applies a trick as he knows the code sructure. He writes 2 cheques of 400.00/- & produce both cheques at two bank simultaneously. Explain probability he is able to draw amount of his OD limit. How can u handle the problems mentioned in the question. Write necessary java codes to solve the problem.
Q3. What is SOAP? Advantages of using SOAP.
Q4. What encryption techniques are there in PHP? Main difference among GET,POST &REQUEST
method.
Q5. How would u know whether an email sent to u with an attachment is free from viruses?
Q6. Role of cookies in case of launching a Cross Site Request Forgery (CSRF) attack. How we can
prevent this type of attack?
Q7. What steps would u take to secure ur computer from malware attack?
Q8. a) Database design for mobile subsciber billing system of a mobile phone operator.
voters=(voter id, name, father, mother)
subscribers= (mobno, client name, clientdob, voterid)
billrates= (usetype, unit, limit, rate) [use type= voice/data, unit= second/kilobite]
usage= (mob no, usetype, useamount)
For the given relational schema write relational algebra expression & sql statements to find
the following things:
1. Find voter id, name, father, mobile no of the subscriber having mobile no= 07777-111-222.
2. mobile numbers (mob no) with bill amount more than Tk 1200.
b) Tasks of DBMS key person.
Q9. Role of firewall & draw that shows where should be positioned with relation to protect LAN.
Q10. OSI uses flow control in 2 layers. Write down the layer names & operation of flow control
in these layers.
Q11. int *getSquare (int x)
{
int result=0;
result= x*x;
return & result;
int main()
{ int x= 10;
int *res= getSquare(x);
printf(“%d”, *result);
return 0;
}
}
Output =?
MCQ Part
Q1. Program code:
Output =?
Q2. 1st year- 2nd year price increase by 8%
2nd-3rd year price decrease 6% what is called- Disinflation, Deflation, Stagflation
Q3. Type of polymorphism: class B extends class A{}
class c extends A {} – A. Compile time polymorphism, B & C other opts
Q4. Program code:
public int byMystery(boolean b1, boolean b2) {
if (b1 && b2) {
return 100;
}
else if (b1 ।। b2) {
return 200;
else
return 300
}
Output =?
Q5. DNS hijacking
Q6. Data structure can’t hold non-homogeneous data element- Array....
Q7. DHCP uses UDP port.....?
Q8. Division pattern of problems in divide & conquer approach is: iterative, parallel, rear, random
Q9. referential constraint, assertion, primary key, foreign key – build Q
Q10. explicit, clone, discard, backpressure
Q12. for sending direct.. data to server (complete this)
Q13. In which style comments are written- */*Comments*/, */../*,**/.../**
Q14. Complexity of Binary Search:
Q15. Worse case in linear search when occur?
Q16. inheriting, bit cipher, stream cipher, blok cipher ; complete the question
N.B: few of questions don't collect, so sorry.
Math Part
Q1. A software Engineer earned 1000,000/-. She paid 20% income tax on the royalties. Invested 50,000/- @ one rate & the rest @ a rate that was 1% lower, earning 6,100/- annual interest on the 2 investments. What was the lower rate?
Q2. A sequence of 10 bits is randomly generated. Probability of at least one of them bits is 01.
Q3. Base 8 expansion of (12345)10 .
Q4. Recurrence relation an= 6an-1 – 9an-2 with initial conditions a0=1 & a1=6.
Post a Comment