Bank IT Question, Computer
Bank IT Question, Computer
2|Page
Exam aid Computer
151. To divide a class C network into a maximum of 14 subnets – each
capable of having up to 14 hosts, the subnet mask use should be
a) 255.255.255.0 b) 255.255.255.192 Ans. D
c) 255.255.255.78 d) 255.255.255.240
152. Email is a protocol of the following layer?
a) Physical Layer b) Data link layer Ans. C
c) Application Layer d) TCP layer
153. ALU stores the computed result immediately in
Ans. D
a) Memory Address register b) PC
c) General register d) Accumulator
154. Which protocol is used for secured web browsing
a) WWW b) RSA Ans. C
c) http d) ftp
155. Which tool could be used for deleting vulnerability through SQL
Injection
a) Nmap b) Metasploit Ans. B
c) Bit defender d) UML
156. Which software is mostly used for virtualization?
Ans. A
a) VMWare b) Oracle DBMS
c) Windows XP d) Linux
157. How many layer Internet protocol suite?
a) 7 b) 5 Ans. D
c) 3 d) 4
The TCP/IP protocol suite maps to a four-layer conceptual model known as the DARPA
model, which was named after the U.S. government agency that initially developed
TCP/IP. The four layers of the DARPA model are: Application, Transport, Internet, and
Network Interface
158. The Term push and Pop is related to the
a) Array b) Lists Ans. C
b) Stacks d) All of the above
a stack is an abstract data type that serves as a collection of elements, with two principal
operations: push, which adds an element to the collection, and. pop, which removes the
most recently added element that was not yet removed.
159. POP3 is a protocol for
a) Email sending b) Email Receiving Ans. B
c) Email Composing d) Email Storing
160. The step by step instructions that solve a problem are called?
a) An algorithm b) A list Ans. A
c) A plan d) None of them
161. Which OS is recommended for real time systems?
a) Windows b) Unix Ans. D
c) Oracle d) None of them
A real-time operating system (RTOS) is an operating system (OS) intended
to serve real-time applications that process data as it comes in, typically
without buffer delays. Example : eCos, LynxOS, QNX, RTAI, RTLinux
3|Page
IT, Engineer and Programmer, Computer Question
162. Which one loads first when you boot up your Computer?
a) BIOS b) Operating System Ans. A
c) Keyboard driver d) None of them
163. A path for carrying signals between a source and a destination is known
as
a) Router b) Channel.
Ans. B
c) Link d) Block
Assistant Programmer Recruitment Test (SBL) - 2016
164. The transformation of a message into an encoded from is known as
a) Memories b) Encoding
Ans. B
c) Decoding d) None of them
165. An acronym for conference on Data systems language is?
a) DASD b) CCD Ans. C
c) CODASYL d) None of them
CODASYL is an acronym for "Conference/Committee on Data Systems
Languages". This was a consortium formed in 1959 to guide the development of
a standard programming language that could be used on many computers.
166. Which protocol can cause overload on a CPU of a managed device?
a) NetFlow b) WCCP Ans. D
c) IP SLA d) SNMP
167. Which type of cable is used to connect the COM port of a host to the
COM port of a router or switch? Ans. C
a) Crossover b) Straight-through
c) Rolled d) Shielded twisted pair
To connect to a router or switch console port, you would use an RJ45 UTP
rolled cable
168. Which of the following protocol uses both TCP and UDP ports?
a) SMTP b) telnet
Ans. D
c) FTP d) DNS
DNS can use either the User Datagram Protocol (UDP) or Transmission Control
Protocol (TCP) with a destination port of 53.
169. An algorithm that calls itself directly or indirectly is known as
a) Sub algorithm b) Recursion Ans. B
c) Polish notation d) Traversal algorithm
170. In Java which operator is used to create an object
a) Class b) scanf Ans. A
c) Print d) None of them
171. A class that is inherited in java is called a
Ans. A
a) Subclass b) Super class
c) Static class d) Implement class
172. Which of the following TCP/IP address constitute the loop back
address?
a) 1.1.1.1 b) 255.255.255.0 Ans. D
c) 127.0.0.0 d) 127.0.0.1
4|Page
Exam aid Computer
Loopback address is a special IP number (127.0.0.1) that is designated for the
software loopback interface of a machine
173. Which one is universal logic gate?
Ans. A
a) NAND b) AND
c) OR d) NOT
The NAND and NOR gates are universal gates
5|Page
IT, Engineer and Programmer, Computer Question
68. Which one is a layer 3 (Network Layer) protocol?
a) UDP b) DNS Ans. D
c) TCP d) IP
Layer 3 Network: Responsible for logical addressing and routing IP, ICMP,
ARP, RIP, IGRP, and routers
69. In most applications F1 stands for?
a) Save b) Save as Ans. C
c) Help d) Cut-Paste
70. Elaboration of VIRUS is-
Ans. B
a) Versatile Information Research Under Seize
b) Vital Information Resource Under Seize.
c) Volume of information Resource under Seize
d) Video Information Resource Under Seize.
Full Form Category Term. Vital Information Resources Under Siege Computer
Software’s VIRUS. Virtual Information Resource Under Seize Networking VIRUS. Vital
Information Resource Under Siege Software’s VIRUS. Very Important Resource Under
Search Software’s VIRUS.
71. Which of the following device doesn’t use scanning as a first step in its
working principle?
Ans. A
a) Plotter b) Bar Code Reader
c) MICR d) OCR
72. IN a flowchart, a diamond generally stands for-
Ans. B
a) Start / End b) Decision
c) Processing d) Input / output
73. The file extension. EXE generally refers to what kind of file?
a) Excel file b) MS Excess file Ans. C
c) Executable file d) Audio file
74. In an email address “[email protected]”, the portion “bbb” indicates?
a) Domain name b) TCP/IP Layer name
Ans. A
c) Domain type d) Protocol name
75. The type of internet connection might be compared to regular telephone
call, in a term of its duration:
a) Baseband b) Broadband Ans. C
c) Dial up d) Satellite
76. What must do to return compressed files to their original state?
a) Extract b) Archive
Ans. A
c) Zip d) Delete
77. What does the term SCSI stands for?
a) Small Computer Software Interface Ans. B
b) Small Computer System Interface
c) Small Computer Storage Interface
d) Small Computer Storage Interface
78. The term dot per inch refers to- Ans. B
a) Speed b) Resolution
c) Output d) Colors
6|Page
Exam aid Computer
JANATA BANK LTD
7|Page
IT, Engineer and Programmer, Computer Question
15. What does DNS database contains ? Ans. D
a) Name server records
b) Hostname-to-address records
c) Hostname aliases
d) all of these
16. On which number system does computer work?
a) Binary b) Decimal Ans. A
d) Octal d) Hexadecimal
17. Two sets are called disjoint if the ----is an empty set.
a) intersection b) union Ans. A
c) difference d) complement
In mathematics, two sets are said to be disjoint sets if they have no element in
common. Equivalently, disjoint sets are sets whose intersection is the empty set.
18. Which one of the following is the core property of Object Oriented
Programming?
Ans. D
a) Encapsulation, Object
b) Encapsulation, inheritance
c) polymorphism, overloading
d) Encapsulation, polymorphism, and inheritance
There are three major features in object-oriented programming:
encapsulation, inheritance and polymorphism.
19. What are the three main types of computer languages? Ans. D
a) Machine language, assembly language and high-level language
b) Structural language, functional language and object-oriented language
c) Imperative language, functional language and declarative language
d) all of these
20. How many times the following for loop will be executed?
a) Undefined b) 100
Ans. B
c) 99 d) 10
��িট অস�ূনর্
21. In object Oriented Programming a property can be accessed from---
a) anywhere of the project b) only from its own class
Ans. B
c) parent class d) child class
22. Which of the following is not the state of a process in Process Control
Block (PCB)?
a) Old b) New Ans. A
c) Waiting d) Running
23. When new data are to inserted into a data structure, but there is no
available space; this situation is usually called--------
a) underflow b) overflow Ans. B
c) houseful d) saturated
8|Page
Exam aid Computer
24. To represent hierarchical relationship between element, which data
structure is suitable?
Ans. C
a) Desuetude b) Priority
c) Tree d) Graph
Tree has hierarchical relationship because there is parent child relationship in
tree.
25. Which format is usually used to store data a computer?
a) BCD b) Decimal Ans. A
c) Hexadecimal d) Octal
The data usually used by computers have to be stored and represented in a
particular format for ease of use
26. Swap space exists in---
a) CPU b) random memory Ans. D
c) primary memory d) secondary memory
27. Which of the following is Cloud Platform by Microsoft?
a) Azure b) AWS Ans. A
c) cloud era d) Open stack
Microsoft Azure is an open, flexible, enterprise-grade cloud computing
platform
28. Which is equivalent is 1GB?
a) 104 B b) 106 B Ans. D
8
b) 10 B d) 109 B
29. To convert paper into an editable document, a scanner would employ---
--technology.
Ans. D
a) UPC b) scanning
c) conversion d) OCR
30. What is the Hexadecimal form of (2016) 10?
a) 5A0 b) 7A0 Ans. D
c) 5E0 d) 7E0
31. The degree of any vertex of a graph is:
a) Number of vertices in a graph
Ans. A
b) Number of vertices incident with the vertex
c) Number of vertices adjacent to the vertex
d) Number of edged incident to the vertex of the graph
In graph theory, the degree (or valency) of a vertex of a graph is the number
of edges incident to the vertex, with loops counted twice.
32. Which bus used to connect the monitor to the CPU?
a) PCI bus b) STE bus Ans. D
c) Memory bus d) SCSI bus
33. When we substract-3 from 2, the answer is------
a) 0001 b) 1101 Ans. C
c) 0101 d) 1001
34. Which approach is used in the client server model of the cluster?
a) Load configuration b) FIFO
Ans. D
b) LIFO d) Round robin
9|Page
IT, Engineer and Programmer, Computer Question
BANGLADESH BANK
Assistant Director (IT) Recruitment Test - 2016
103. On which aspect the analog computers are better than digital?
a) Speed b) Accuracy
Ans. B
c) Reliability d) Automatic
104. How many numbers could ENIAC store in its internal memory?
a) 100 b) 20 Ans. B
c) 80 d) 40
105. Binary circuit elements have
a) One stable state b) two stable state Ans. B
c) Three stable state d) None of these
106. Which of the following is used for manufacturing chips?
a) Control bus b) Control unit Ans. D
c) Parity unit d) Semiconductor
107. Which of the following terms is the most closely related to main
memory? Ans. D
a) Non-volatile b) Permanent
c) Control unit d) Temporary
108. The word length of a computer is measured in
a) Bytes b) Millimeters
Ans. D
c) Meters d) Bits
109. Which unit holds data permanently?
a) Input unit b) Secondary storage unit Ans. B
c) Output unit d) Primary Memory unit
110. Before a disk can be used to store data, it must be
a) Formatted b) Reformatted Ans. A
c) Addressed d) None of these
111. Magnetic tape can serve as
a) Secondary storage media b) Output media
Ans. A
c) Input media d) All of them
112. Which technology is used in Compact disks?
a) Mechanical b) Electrical
Ans. D
c) Electro Magnetic d) Laser
113. Which of the following is a storage device?
a) Tape b) Hard Disk Ans. D
c) Floppy Disk d) All of them
114. Which of the following is a class of computers based on model?
a) Digital Computers b) Hybrid Computers
Ans. D
c) Analog Computers d) AT Computers
115. Central Processing Unit is combination of
a) Control and storage
Ans. D
b) Control and output unit
c) Arithmetic logic and input unit
d) Arithmetic logic and control unit
10 | P a g e
Exam aid Computer
116. What does the disk drive of computer do?
a) Rotate the disk Ans. D
b) Read the disk
c) Load a program from the disk into the memory
d) Both B and C
117. Which of the following produces the best quality graphics
reproduction?
a) Laser printer b) Ink Jet printer Ans. C
c) Plotter d) Dot matrix printer
118. What type of device is computer keyboard?
a) Memory b) Output Ans. D
c) Storage d) Input
119. Which of the following is not true?
a) Transistors are much smaller Ans. C
b) Transistors produce low heat
c) Transistors were less reliable
d) Transistors were used in radios and other electronic devices
120. Typical data transfer rates in LAN are of the order of
a) Bits per sec b) Kilobits per sec Ans. C
c) Megabits per sec d) None of them
121. Which was the most popular first-generation computer?
a) IBM 1650 b) IBM 360 Ans. A
c) IBM 1130 d) IBM 2700
122. The computer code of the interchange of information between
terminals is
a) ASCII b) BCD Ans. A
c) EBCDIC d) All of them
123. Which of the following is internal memory?
a) Disks b) Pen Drives Ans. C
c) RAM d) CDs
124. Which of the following memories needs refreshing?
a) SRAM b) DRAM
Ans. B
c) ROM d) All of them
125. Which of the items below are considered removable storage media?
a) Removable hard disk cartridges
b) (Magneto-optical) disk Ans. D
c) Flexible disks cartridges
d) All of them
126. Which of the following is not a form of data?
Ans. D
a) numbers and characters b) images
c) sound d) None of these
127. The control unit of a microprocessor-
a) stores data in the memory
Ans. C
b) accepts input data from keyboard
c) performs arithmetic/logic function
11 | P a g e
IT, Engineer and Programmer, Computer Question
BANGLADESH KRISHI BANK
12 | P a g e
Exam aid Computer
5. Which of the following connectivity devices typically work at the Physical
layer of the OSI model?
a) Router b) Bridge Ans. C
c) Repeater d) Gateway
6. A network-connected computer has IP address 201.102.133.25 and subnet
mask 255.255.0.0. Which of the following indicates the Host Id of this
computer?
Ans.
a) 201. 102. 133 b) 133. 25
c) 201. 102 d) 25
7. DWDM is the technology for boosting transmission capacity of optical
fiber cable. What is the elaboration of DWDM?
a) Dual Work Dense Multiplexing
Ans. C
b) Double Wavelength Decrease Multiplexing
c) Dense Wavelength Division Multiplexing
d) None of these
24. Which of the following protocols uses both TCP and UDP ports?
a) SMTP b) Telnet Ans. D
c) FTP d) DNS
25. Two dimensional arrays are also called
a) tables arrays b) matrix arrays
Ans. C
c) both a and b d) None of the above
26. Which of the following is an SQL trigger supported by Oracle?
a) BEFORE b) INSTEAD OF
Ans. D
b) AFTER d) All of the above
27. K iterations by Newton-Raphson method of finding square root of a
number increases accuracy in number of digits :
a) K b) 2k Ans. B
c) 3k d) 4k
28. The complexity of Binary search algorithm is ---
a) O(n) b) O(log n) Ans. B
c) On(n2) d) O(n log n)
29. The smallest element of an array's index is called its ---
a) Lower bound b) Upper bound Ans. A
c) Range d) Extraction
30. Which one of following is not a valid identifier?
a) –mysum b) mysun Ans. C
c) my-sun d) -my-sun
31. What is the value of 'd' after this line of code has been executed? double
d=Math.round(2.5 + Math.random() );
a) 2 b) 2.5 Ans. C
c) 3 d) 4
13 | P a g e
IT, Engineer and Programmer, Computer Question
32. Which of the following TCP/IP addresses constitute the loopback
address?
a) 1.1.1.1 b) 255.255.255.255
Ans. D
c) 127.0.0.0 d) 127.0.0.1
33. Which one is modern light weight message exchange format?
a) XML b) M
Ans. C
c) JSON d) HTML
34. The only language understood by a digital computer is called
a) Assembly language b) High level language Ans. C
c) Binary language d) None of the above
35. Which of the following name does not relate to stacks?
Ans. A
a) FIFO list b) LIFO list
c) Piles d) Push-down lists
36. Which of the following will produce an answer that is closest in value to
a double, d, while not being greater than d?
a) (int)Math.min(d) b) (int)Math.max.(d) Ans. D
c) (int)Math.abs(d) d) (int)Math.floor(d)
37. Which keyword must be used to inherit a class in Java?
Ans. A
a) Extends b) super
c) This d) extent
38. Which of the following is the destructor for the class ‘Vehicle'
a) *Vehicle() b) *Vehicle(int value) Ans. C
c) ~Vehicle() d) ~Vehicle(int value)
39. A class that is inherited in Java is called a --
Ans. B
a) Subclass b) super class
c) static class d) implement class
39. Which one of these interfaces is implemented by Thread class?
a) Set b) Connections Ans. C
c) Runnable d) None of the above
40. which one is less costly for insertion operation at a particular position?
a) Array b) queue Ans. C
c) link list d) stack
41. Register Circuit is not used in?
a) digital clocks b) computers Ans. D
c) RAM d) none of these
42. Which one is a universal logic gate?
a) NAND b) AND Ans. A
c) OR d) NOT
43. The data structure required to evaluate a postfix expression is --
a) Queue b) stack
Ans. B
c) Array d) linked-list
44. Which of the declaration is correct?
a) int length; b) char int; Ans. A
c) int long; d) float double;
14 | P a g e
Exam aid Computer
45. In Java, which operator is used to create an object ---
a) class b) scanf Ans. D
c) print d) None of the above
46.. The operator that be overloaded is----
a) ++ b) : : Ans. B
c) ~ d) ()
47. Which type of cable is used to connect the COM port of a host to the
COM port of a router or switch?
a) Crossover b) Straight-through Ans. C
c) Rolled d) none of these
48. Which protocol can causes overload on a managed device?
Ans. D
a) Netflow b) WCCP
c) IP SLA d) SNMP
49. Which of the following is a group of one or more attributes that uniquely
identifies a row?
a) Key b) Determinant Ans. A
c) Tuple d) Relation
50. For every relationship, how many possible sets of minimum cardinalities
are there?
Ans. C
a) Two b) Three
c) Four d) Six
51. The SQL statement that queries or reads data from a table is --
a) SELECT b) READ
Ans. A
c) QUERY d) None of the above
52. What is the minimum length of character array argv in the above code?
1 Ans.
undefined
-1
53. Which control statement can be executed at least once?
Ans. C
a) While b) for
c) do—while d) All of the above
54. An algorithm that calls itself or indirectly is known as --
a) sub algorithm b) Recursion Ans. B
c) Polish notation d) Traversal algorithm
55. Two main measures for the efficiency of an algorithm are --
a) processor and memory b) Complexity and capacity Ans. C
c) Time and space d) Data and space
56. Which of the following correctly shows the hierarchy of arithmetic
operations in C?
Ans. D
a) /+*- b) *-/+
c) +-/* d) /*+-
57. How many instances of an abstract class can be created?
Ans.
a) 1 b) 2
c) 13
15 | P a g e
IT, Engineer and Programmer, Computer Question
58. Which of the following cannot be checked in a switch-case statement?
a) Character b) Integer Ans. C
c) Float d) None of the above
59. Which of the following is a design pattern?
a) List b) Queue Ans. C
c) Factory d) All of the above
60. The main threat of Cloud based provisioning is :
a) Cost b) Security Ans. B
c) Virtualization d) All of the above
61. Link list can be implemented by using?
a) Array b) Pointers Ans. B
c) both a and b d) None of the above
62. Which of the following data structure is linear type? Ans. D
a) Strings b) Lists
c) Queues d) All of the above
63. In Java, which one will be used for comparing whether the two String
object str1 and str2 are same --
Ans. B
a) str1==str2 b) str1,equalslgnore Case(atr2)
c) str1==str2 d) All of the above
64. Which data structure allows deleting data elements from front and
inserting at rear?
a) Stacks b) Queues Ans. B
c) Deques d) Binary search tree
16 | P a g e
Exam aid Computer
4. Which of the following shortcut keys do you use to fine a specific word
in a document?
Ans. C
a) Ctrl+C b) Ctrl+X
c) Ctrl+F d) Ctrl+S
5. In Ms Excel, which of the following can be used to copy only the value of
a cell to another where the value of the source cell was derived through a
formula?
a) Copy, Value b) Paste Value Ans. C
c) Copy Paste Special Value d) Copy, paste Value
6. In Ms Power Point, which of the following function keys is used to start
a slide show?
a) F12 b) F10 Ans. D
b) F5 d) F1
7. In windows operating system what is the short cut keys for printing a
word document?
a) Ctrl+shift+P b) Shift+P Ans.
c) Ctrl+Alt+p d) Alt+P
8. Which of the following is true about firewalls?
a) In filters network traffic Ans. A
b) It can be either a hardware or software device
c) It follows a set of rules
d) All of those
9. In a computer, after the booting process which file executes
automatically?
a) Autoex.bat b) Config.sys Ans. B
c) Command.com d) Io.sys
10. Which one of the following commands can be used to recreate a storage
disk’s tracks and sectors?
a) FDISK b) CHKDSK Ans. C
c) FORMAT d) ATTRIB
11. Which one of the following enable the mobile devices to access internet
resources?
a) WAP b) ISP Ans. A
c) TCP d) HTTP
12. In Ms Excel, which one of the following options will you use to show the
results of the top 10 students in class where the class size is 100?
a) Sort Ascending b) Sort Descending Ans. B
c) Conditional sorting d) Filter
13. Which one of the following tools is used in Business intelligence?
a) OLAP b) Data mining
c) Web mining d) All of these Ans. D
17 | P a g e
IT, Engineer and Programmer, Computer Question
14. Which one of the following Operating system is not a multitasking
operating system?
a) DOS b) Linux Ans. A
c) Windows 98 d) Unix
18 | P a g e