আইটি, কম্পিউটার ইঞ্জিনিয়ার তথা ইলেকট্রিক্যাল এন্ড ইলেকট্রনিক্স গ্রেজুয়েট যারা গভারমেন্ট,স্বায়ত্তশাসিত,পাবলিক লিমিটেড তথা প্রতিষ্ঠিত সফটওয়ার ফার্মে যারা চাকুরি খুজছেন তাদের জন্য আমরা যারা বিভিন্ন সরকারি প্রতিষ্ঠানে ভিন্ন ভিন্ন পোস্টে কমরত তাদের কিছু দায়িত্ব থেকেই যায়, আমাদের জুনিয়রদের গাইড করার ব্যাপারে। আমরা মনে প্রানে বিশ্বাস করি যে, আমাদের জুনিয়রা আমাদের চাইতে অনেক অনেকগুন পারদর্শী তারপরও যদি এই গাইডলাইন গুলো হয়ত আত্মবিশ্বাস আরো বাড়িয়ে দিবে।

Assistant Programmer of multiple ministry-2016

Assistant Programmer of multiple ministry-2016

Q-1. Give the full form of: CDMA, LCD, DVD, HDTV, HTML, LED, EDGE , XML, RAID and DAT

Ans:

CDMA- Code Division Multiple Access.

LCD-Liquid Crystal Display

DVD-Digital Versatile Disc

HDTV-High-Definition Television

LED-Light-Emitting Diode

EDGE-Enhanced Data GSM Environment

XML-Extensible Markup Language

RAID- Redundant Array of Independent Disks

DAT-Digital Audio Tape

Q-2. Write a short note on video RAM, E-R Model, SDLC Model, and sensor based network

Ans:

Video RAM: VRAM (video RAM) is a reference to any type of random access memory (RAM) used to store image data for a computer display.

All types of VRAM are special arrangements of dynamic RAM (DRAM). VRAM is a buffer between the computer processor and the display, and is often called the frame buffer. When images are to be sent to the display, they are first read by the processor as data from some form of main (non-video) RAM and then written to VRAM.

ER model

  • ER model stands for an Entity-Relationship model. It is a high-level data model. This model is used to define the data elements and relationship for a specified system.
  • It develops a conceptual design for the database. It also develops a very simple and easy to design view of data.
  • In ER modeling, the database structure is portrayed as a diagram called an entity-relationship diagram.

Software Development Life Cycle : Software Development Life Cycle, SDLC for short, is a well-defined, structured sequence of stages in software engineering to develop the intended software product.[ SDLC, Programmer at Ministry of Finance-2013]

SDLC Activities :SDLC provides a series of steps to be followed to design and develop a software product efficiently. SDLC framework includes the following steps:


Sensor based network:sensor network comprises a group of tiny, typically battery-powered devices and wireless infrastructure that monitor and record conditions in any number of environments -- from the factory floor to the data center to a hospital lab and even out in the wild. The sensor network connects to the Internet, an enterprise WAN or LAN, or a specialized industrial network so that collected data can be transmitted to back-end systems for analysis and used in applications

Q-3.Explain Nested Structure and Array of structure with example.

Ans:

Nested Structure in C

C provides us the feature of nesting one structure within another structure by using which, complex data types are created. For example, we may need to store the address of an entity employee in a structure. The attribute address may also have the subparts as street number, city, state, and pin code. Hence, to store the address of the employee, we need to store the address of the employee into a separate structure and nest the structure address into the structure employee. Consider the following program

#include<stdio.h>
struct address
{
char city[20];
int pin;
char phone[14];
};
struct employee
{
char name[20];
struct address add;
};
void main ()
{
struct employee emp;
printf("Enter employee information?\n");
scanf("%s %s %d %s",emp.name,emp.add.city, &emp.add.pin, emp.add.phone);
printf("Printing the employee information....\n");
printf("name: %s\nCity: %s\nPincode: %d\nPhone: %s",emp.name,emp.add.city,emp.add.pin,emp.add.phone);
}

Array of structure : Structure is collection of different datatypes ( variables ) which are grouped together. Whereas, array of structures is nothing but collection of structures. This is also called as structure array in C.
#include<stdio.h>
#include <string.h>
struct student{
int rollno;
char name[10];
};
int main(){
int i;
struct student st[5];
printf("Enter Records of 5 students");
for(i=0;i<5;i++){
printf("\nEnter Rollno:");
scanf("%d",&st[i].rollno);
printf("\nEnter Name:");
scanf("%s",&st[i].name);
}
printf("\nStudent Information List:");
for(i=0;i<5;i++){
printf("\nRollno:%d, Name:%s",st[i].rollno,st[i].name);
}
return 0;
}

Q-4. Write the algorithm to convert infix expressions to postfix expression.

Ans:Algorithm to convert Infix To Postfix

Let, X is an arithmetic expression written in infix notation. This algorithm finds the equivalent postfix expression Y.

  1. Push “(“onto Stack, and add “)” to the end of X.
  2. Scan X from left to right and repeat Step 3 to 6 for each element of X until the Stack is empty.
  3. If an operand is encountered, add it to Y.
  4. If a left parenthesis is encountered, push it onto Stack.
  5. If an operator is encountered ,then:
    1. Repeatedly pop from Stack and add to Y each operator (on the top of Stack) which has the same precedence as or higher precedence than operator.
    2. Add operator to Stack.
      [End of If]
  6. If a right parenthesis is encountered ,then:
    1. Repeatedly pop from Stack and add to Y each operator (on the top of Stack) until a left parenthesis is encountered.
    2. Remove the left Parenthesis.
      [End of If]
      [End of If]
  7. END.

Q-5.Explain pass by value and pass by reference in C Language with examples.

Ans:Pass by value: In this approach we pass copy of actual variables in function as a parameter. Hence any modification on parameters inside the function will not reflect in the actual variable. For example:

#include<stdio.h>

int main(){

    int a=5,b=10;

    swap(a,b);

    printf("%d      %d",a,b);

    return 0;

void swap(int a,int b){

    int temp;

    temp =a;

    a=b;

    b=temp;

}

Pass by reference: In this approach we pass memory address actual variables in function as a parameter. Hence any modification on parameters inside the function will reflect in the actual variable. For example:

 #incude<stdio.h>

int main(){

    int a=5,b=10;

    swap(&a,&b);

    printf("%d %d",a,b);

    return 0;

void swap(int *a,int *b){

    int  *temp;

    *temp =*a;

    *a=*b;

    *b=*temp;

}

Q-6.Write a C program that reads a positive integer, calculate the factorial number using recursion and print the result.

Ans:

#include<stdio.h>

#include<conio.h>

int fact(int);

int main()

{

intx,n;

printf(" Enter the Number to Find Factorial :");

scanf("%d",&n);

    x=fact(n);

printf(" Factorial of %d is %d",n,x);

getch();

return 0;

}

int fact(int n)

{

if(n==0)

return(1);

return(n*fact(n-1));

}

Q-7.What is mean the term ‘‘ Peer to peer protocol”?

Ans: Peer-to-peer (P2P) is a decentralized communications model in which each party has the same capabilities and either party can initiate a communication session. Unlike the client/server model, in which the client makes a service request and the server fulfills the request, the P2P network model allows each node to function as both a client and server.

P2P systems can be used to provide anonymized routing of network traffic, massive parallel computing environments, distributed storage and other functions. Most P2P programs are focused on media sharing and P2P is therefore often associated with software piracy and copyright violation.

Q-8.Explain how data is transmitted along a fiber optic cable.

The light pulses are essentially tiny particles of light ricocheting down each optical fiber of the fiber optic cables. The light is kept inside the pipe by utilizing two things: the principle of total internal reflection and the structure of the cable itself. Light traveling in a clear glass filament can leak out of the edges, but if the light strikes the glass at a shallow angle, then total internal reflection occurs and the light is contained within the glass filament. The optical cable itself is constructed of two separate parts. The core of the cable, where the light travels, is in the middle. The cladding is a layer of glass around the core which helps keep the light signals contained within the core.

Q-9.What is MAC address ?

Ans: A MAC address is the unique identifier that is assigned by the manufacturer to a piece of network hardware (like a wireless card or an ethernet card). MAC stands for Media Access Control, and each identifier is intended to be unique to a particular device.

A MAC address consists of six sets of two characters, each separated by a colon. 00:1B:44:11:3A:B7 is an example of a MAC address

Q-10.What is the difference between DOMAIN and WORK GROUP?

Ans:

In a domain:
-There will be one or computers are the servers. The security and permissions are controlled by network administrators.
-A user with an account on the domain can log onto any computer system, without having the account on that computer.
-The number of computer systems can be hundreds or thousands of computers.
-The computers can be connected to different local networks

In a workgroup:
-All computer systems are peers and no computer can not control another computer
-Every computer sets user accounts. To make use of any system, one must have an account on that computer.
-The numbers of computer systems are limited to ten or twenty.
-Every computer must be part of the same LAN or subnet.

Domain

Workgroup

Centralized administrator

No Centralized administrator

Client/Server Network

Peer-Peer Network

For Data security

Not much security for Data, User & Groups

Centralized login

Local login

Multiple Login possible

Single Login Only

Good for large Network

Good for Small Network


Q-11.What is the file transfer protocol ?list out the steps involved in downloading /uploading a file by using FTP service:

Ans: File Transfer Protocol (FTP) is a standard Internet protocol for transmitting files between computers on the Internet over TCP/IP connections. FTP is a client-server protocol where a client will ask for a file, and a local or remote server will provide it.

Download a single file from server using FTP

Step I : ftp to remote server

1, ftp domain.com

2, ftp IP-Address-of-server

3, ftp Host-name-of-server

Step II : Execute the following command to download file.

get file-name-to-download

Example:

get download1.txt

 Upload a single file to server using FTP 

Step I : Connect to ftp account.

Step II : Type the ‘put’ command as bellow:

put file-to-upload

Example:

put upload1.txt

For uploading multiple files, use ‘mput’ instead of ‘put’.

mput upload1.txt upload2.txt upload3.txt

Q-12.What is an anonymous FTP site ? What is used ?

Ans:

A method for downloading public files using the File Transfer Protocol (FTP).

Anonymous FTP is called anonymous because you don't need to identify yourself before accessing files.

 In general, you enter the word anonymous or ftp when the host prompts you for a username; you can enter anything for the password, such as your e-mail address or simply the word "guest". In many cases, when you access an anonymous FTP site, you won't even be prompted for your name and password.

Anonymous FTP is beneficial for the distribution of large files to the public, without having to assign large numbers of login and password combinations for FTP access.

Q-13.Consider the following set of processes, with the length of the CPU-burst time given in milliseconds

Q-14. What is race condition ? Give an example .

Ans:

A race condition or race hazard is a scenario in an electronic processing system where the result of a calculation might be affected by an unforeseen or uncontrolled sequence of events. The underlying concept is that the results of a process should never be affected by one of the operations "winning a race" (finishing first).

Race condition example
Consider the following set of operations:
1. variable a = 1
2. variable a = a * 5
3. variable b = a - 1
If these operations are processed in the proper sequence, variable b should equal 4. But if operation 3 is executed before operation 2 has completed, b would equal 0.

 

 


একটি মন্তব্য পোস্ট করুন

0 মন্তব্যসমূহ