সমন্বিত ২ ব্যাংক (সোনালী ও জনতা)
পদের নাম: অফিসার (আইটি);
তারিখ: ০৩.০১.২৬
সময়: ১ ঘণ্টা
পূর্ণমান: ১০০
১. এক কথায় প্রকাশ করুন: অক্ষির অভিমুখে।
ক. প্রত্যক্ষ
খ. পরোক্ষ
গ. সমক্ষ
ঘ. চাক্ষুষ
উত্তর: ক
২. ‘প্রত্যয়' -এর বিপরীত শব্দ কী?
ক. উপচয়
খ. অপচয়
গ. সংশয়
ঘ. সন্দেহ
উত্তর: গ
৩. সে এখন যাবে না। -এই বাক্যে 'না' কোন পদ?
ক. বিশেষণ
গ. ক্রিয়া বিশেষণ
খ. অব্যয়
ঘ. অনুসর্গ
উত্তর: গ
৪. ‘অক্কা পাওয়া’ বাগধারার ফারসি ‘অক্কা' শব্দের অর্থ কী?
ক. প্ৰভু
খ. মৃত্যু
গ. বেহেশত
ঘ. আত্মা
উত্তর: ক
৫. শুদ্ধ বানান গুচ্ছ-
ক. পরিস্কার, পুরষ্কার
খ. বিকৃত, বিক্রীত
গ. স্বিকার, শীকার
ঘ. ধরণ, ধারনা
উত্তর: খ
৬. ‘ন্যূনতম’ শব্দের উচ্চারণ-
ক. নুনোতমো
খ. নুনুনোতমো
গ. নুনোতম্
ঘ. নুনোতম্
উত্তর: ক
৭. ‘কানে-কলম’ কোন সমাসের উদাহরণ?
ক. উপপদ তৎপুরুষ
খ. অলুক দ্বন্দ্ব
গ. প্রত্যয়ান্ত বহুব্রীহি
ঘ. অলুক বহুব্রীহি
উত্তর: ঘ
৮. 'Graphic' -এর বাংলা পরিভাষা কী?
ক. নকশা
খ. রৈখিক
গ. খসড়া
ঘ. অঙ্কন
উত্তর: খ
৯. ‘তীক্ষ্ণ’ শব্দের যুক্তব্যঞ্জনের সঠিক বিশ্লেষণ কোনটি ?
ক. ক্ + ষ্ + ণ
খ. ক্ + ষ্ + ন
গ. ক্ + ষ্ + ম
ঘ. ক্ + হ্ + ণ
উত্তর: ক
১০. 'Empty vessels sound much' - এর সঠিক বঙ্গানুবাদ কোনটি?
ক. যত কথা তত কাজ।
খ. অসারের তর্জন গর্জনই সার।
গ. মুখে বুলি লম্বা, কাজে অষ্টরম্ভা।
ঘ. এক মাঘে শীত যায় না ।
উত্তর: খ
১১. Pluck me a flower. The correct passive voice form is-
ক. Let a flower be plucked by me.
খ. Let a flower be plucked for me.
গ. Let me a flower be plucked to me.
ঘ. A flower is plucked by me.
উত্তর: খ
১২. Find out the correct form-
ক. I, you and Shuma are guilty.
খ. Shuma, you and I are guilty.
গ. Shuma, I and you are guilty.
ঘ. I, you and Shuma is guilty.
উত্তর: ক
১৩. The man who came here yesterday has applied for the post. The underlined clause is a/an _____ clause.
ক. Noun
খ. Adjective
গ. Adverbial
ঘ. Principal
উত্তর: খ
১৪. ______ opportunity comes responsibility.
ক. From
খ. Before
গ. Without
ঘ. With
উত্তর: ঘ
১৫. Are you sure that you ____ the killer before?
ক. will have seen
খ. had seen
গ. would have seen
ঘ. must have seen
উত্তর: খ
১৬. What is the antonym of 'segregate'?
ক. isolate
খ. combine
গ. divide
ঘ. sever
উত্তর: খ
১৭. _____ I bought you a new dress, would you be happy?
ক. If
খ. When
গ. As
ঘ. Since
উত্তর: ক
১৮. I want you to understand that worldly gains cannot guarantee ____ everlasting happiness?
ক. the
খ. an
গ. No article
ঘ. a
উত্তর: গ
১৯. Which of the following words is spelt wrong?
ক. Commitment
খ. Disciplinary
গ. Jewelery
ঘ. Absorption
উত্তর: গ
২০. "The biriyani tastes as good as it looks." Make comparative degree of adjectives:
ক. The biriyani looks better than it tastes.
খ. The biriyani tastes better than it looks.
গ. The biriyani both tastes and looks better.
ঘ. The biriyani tastes no better than it looks.
উত্তর: খ
২১. How many linear factors of have 8+ 4x + 6x²+3x³- 2x⁴ - x⁵ have?
ক. 0
গ. 2
খ. 1
ঘ. 3
উত্তর: ঘ
২২. The factor 4x⁴ + 1 is:
ক. (2x²+2x-1)(2x² - 2x + 1)
খ. (2x² + 2x + 1)(2x² - 2x-1)
গ . (2x²+2x-1)(2x² - 2x-1)
ঘ. (2x²+2x+1)(2x² - 2x + 1)
উত্তর: ঘ
২৩. A train 220 m long is moving at 45 km/h. The time taken by the train to cross a tunnel 260 m long, is:
ক. 25.4 sec
খ. 35.4 sec
গ. 38.4 sec
ঘ. 40.4 sec
উত্তর: গ. 38.4 sec
২৪. Two trucks 300 km away are travelling towards each other with a constant speed. Truck A is moving at a constant speed of 70 km/h while Truck B is moving at a constant speed of 50 km/h. How long does it take for them to meet?
ক. 5 hours
খ. 3 hours
গ. 4 hours
ঘ. 6 hours
উত্তর:
নোট: সঠিক উত্তর: 2.5 hours
3. A restaurant makes 20% profit after selling a set menu at a discount of 20%. What is the percentage increase of marked price?
ক. 30%
খ. 20%
গ. 40%
ঘ. 50%
উত্তর: ঘ
2. A ladder rests against a wall that is perpendicular to the ground. If the bottom of the ladder is 4m away from the bottom of the wall, while the tip of the ladders is at a height of 3m, what is the length of the ladder?
ক. 7 m
খ. 35 m
গ. 5 m
ঘ. 25 m
উত্তর: গ
29. A box having height 2m, length 10m and width 7m have the top lid open. What is the surface are of the box?
ক. 138
খ. 118
গ. 104
ঘ. 208
উত্তর: ক
গ. 51
ঘ. 49
উত্তর: গ
29. Which two pairs of x satisfies the equaltion (x+3)² = x + 5?
ক. 1, 4
খ. 1, – 4
গ.-1,-4
ঘ. − 1, 4
উত্তর: গ
30. The H.C.F. and L.C.M. of two numbers are 12 and 288 respectively. If one of the numbers is 96, find the other-
ক. 34
গ. 38
খ. 36
ঘ. 40
উত্তর: খ
31. Which of the following is a buffer state?
ক. . Bangladesh
খ. Pakistan
গ. Maldives
ঘ. Bhutan
উত্তর: ঘ
32. Where is the Ethnic Cultural Academy Birisiri situated?
ক. Rangamati
খ. Habiganj
গ. Netrakona
ঘ. Mymensing
উত্তর: গ
33. Which of the following Bengali scientists is famous for inventing Mercurous Nitrite?
ক. Satyendra Nath Bose
খ. Jagadish Chandra Bose
গ. Muhammad Qudrat-i-Khuda
ঘ. Prafulla Chandra Roy
উত্তর: ঘ
34. Which organization led the Language Movement first?
ক.East Pakistan Muslim Leagu
খ. Tamaddun Majlish
গ. All-Party Central Language Action Committee
ঘ. Dhaka University Language Action Committee
উত্তর: খ
35. What does NPSB stand for in Bangladesh's banking sector?
ক. National Payment System of Banks
খ. National Payment Switch Bangladesh
গ. National Processing Service Bureau
ঘ. Network Payment and Settlement Board
উত্তর: খ
36. Which country introduced the Al-powered, document-free corridor?
ক. United States
খ. United Kingdom
গ. United Arab Emirates
ঘ. Singapore immigration
উত্তর: গ
37. In which district the 'Tin Bigha Corridor' is located?
ক. Nilphamari
খ. Lalmonirhat
গ. Rangpur
ঘ. Kurigram
উত্তর: খ
38. The International Literacy Day-
ক. 4 October
St. 8 September
2. 4 September
ঘ. 8 November
উত্তর: গ
39. First Computer in Bangladesh was installed at the
ক. Dhaka University Science Library
খ. ICDDRB
গ. Atomic Energy Center
ঘ. BCSIR
উত্তর: গ
40. Where did artist Hamidur Rahman create
his mural titled "Borak Duldul"?
ক. TSC
খ. Bangla Academy
গ. Curzon Hall
ঘ. Dhaka University Library
উত্তর: ঘ
41. OOP stands for:
ক. Object Oriented Programming
খ. Open Office Protocol
গ. Object Operating Program
ঘ. Output Oriented Process
উত্তর: ক
42. Which attack floods a system with traffic?
ক. Phishing
গ. Spoofing
খ. DoS
ঘ. Sniffing
উত্তর: খ
43. HTTPS is more secure than HTTP because it uses:
ক. IP
খ. Encryption
গ. Cookies
ঘ. Proxy
উত্তর: খ
44. Firewall is used to:
ক. Store data
খ. Monitor network traffic
গ. Compile programs
ঘ. Create backups
উত্তর: খ
45. Which model is known as linear sequential model?
ক. Agile
খ. Spiral
গ. Waterfall
ঘ. V-Model
উত্তর: গ
46. Cloud computing provides:
ক. Hardware only
খ. Software only
গ. On-demand resources
ঘ. Offline services
উত্তর: গ
47. Which protocol is used for file transfer?
ক. SMTP
খ. FTP
গ. SNMP
ঘ. TELNET
উত্তর: খ
48. IPv4 address size is:
ক. 16-bit
খ. 32-bit
গ. 64-bit
ঘ. 128-bit
উত্তর: খ
49. Which layer is responsible for routing in OSI model?
ক. Network
খ. Transport
গ. Data Link
ঘ. Session
উত্তর: ক
50. Which tool is used for version control?
ক. Git
খ. Jenkins
গ. Docker
ঘ. Maven
উত্তর: ক
51. Which storage has fastest access speed?
ক. HDD
খ. SSD
গ. Cache
ঘ. DVD
উত্তর: ঘ
52. Which component is often referred to as the "brain" of the computer?
ক. Hard Drive
খ. Central Processing Unit (CPU)
গ. RAM
ঘ. Power Supply Unit
উত্তর: খ
53. What does "GUI" stand for in computing?
ক. Global User Interface
খ. Graphical User Interface
গ. General Utility Interface
ঘ. Graphical Unit Interconnection
উত্তর: খ
54. Which protocol is primarily used for securely browsing the web?
ক. HTTP
খ. FTP
গ. HTTPS
ঘ. SMTP
উত্তর: গ
55. A user reports the internet is down. You can Ping 8.8.8.8 but cannot browse "www.goo". What is the most likely issue?
ক. The ISP gateway is down
খ. The DNS server is unreachable or misconfigured
গ. The network cable is unplugged
ঘ. The DHCP server is full
উত্তর: খ
56. What is "Cloud Storage"?
ক. Storing data on your local hard drive
খ. Storing data on the internet servers managed by a provider
গ. Storing data on a CD-ROM
ঘ. Printing data on paper
উত্তর: খ
57. Which concept ensures that a sender cannot deny having sent a message?
ক. Confidentiality
খ. Integrity
গ. Non-repudiation
ঘ. Availability bed
58. Which command in Linux is used to
change the permissions of a file?
ক. chown
গ. chgrp
খ. chmod
ঘ. umask
উত্তর: খ. chmod
59. Which command is used to display the IP configuration on a Windows host?
ক. ipconfig
খ. route print
গ. netstat
ঘ. tracert
উত্তর: ক
60. Which of the following describes a "Phishing" attack?
ক. Scanning ports to find open services
খ. Sending fraudulent emails to trick users into revealing credentials
গ. Overloading a server with traffic
ঘ. Intercepting Wi-Fi signals from a parking lot
উত্তর: খ
61. What is the result of the logic operation: (1 AND 0) OR (1 AND 1)?
ক. 0
খ. 1
গ. Null
ঘ. -1
উত্তর: খ
62. Which of the following is a key principle of "Agile" project management?
ক. Detailed documentation is more important than working software
খ. Following a plan is more important than responding to change
গ. Iterative development and development and customer collaboration
ঘ. Contract negotiation is the primary goal
উত্তর: গ
63. hich of the following effectively mitigates "Social Engineering" attacks?
ক. Installing a stronger firewall
খ. Regular security awareness training for employees
গ. Increasing the complexity of database passwords
ঘ. Upgrading the server RAM
উত্তর: খ
64. hat is the correct binary representation of the IP address 192.168.1.1?
ক. 11000000.10101000.00000001.00000001
খ. 10100000.10101000.00000001.00000001
গ. 11000000.10001000.00000001.00000001
ঘ. 11000000.10101000.00000011.00000001
উত্তর: ক
65. What is the definition of "Throughput" in networking?
ক. The theoretical maximum speed of the medium
খ. The actual amount of data successfully transferred over a period
গ. The time it takes for a packet to travel to the destination
ঘ. The number of errors on the line উত্তর: খ
66. What is a "Logic Gate" that outputs 1 only if the inputs are different (e.g., 1 and 0)?
ক. AND
খ. OR
গ. XOR
ঘ. NAND
উত্তর: গ
67. Which of the following is an Administrative Control?
ক. Security Guards
খ. User Training Program
গ. Smart Cards
ঘ. Encryption
উত্তর: খ
68. Which port must be open to allow sending emails from a client to a server?
ক. 25 or 587
খ. 110
গ. 143
ঘ. 443
উত্তর: ক
69. Which of the following is the most secure method for remote administration of a Linux server?
ক. Telnet using root account
খ. SSH using password authentication
গ. SSH using key-based authentication
ঘ. VNC without encryption
উত্তর: গ
70. What describes a "Dictionary Attack"?
ক. Guessing passwords by trying every word in a pre-defined list
খ. Trying every possible combination of characters (Brute Force)
গ. Stealing the physical password notebook
ঘ. Asking the user for their password
উত্তর: ক
71. What is the primary purpose of a "Demilitarized Zone" (DMZ)?
ক. To store the core database
খ. To host public-facing services (Web, Email) separate from the internal LAN
গ. To connect the CEO's computer to the internet
ঘ. To test viruses safely
উত্তর: খ
72. Which command is used to view active connections and listening ports?
ক. netstat
খ. nslookup
গ. ping
ঘ. ipconfig
উত্তর: ক
73. What is the decimal value of the binary number 111?
ক. 3
খ. 5
গ. 7
T. 9
উত্তর: গ
74. The data structure required to check whether an expression contains a balanced parenthesis is?
ক. Stack
খ. Queue
গ. Tree
ঘ. Array
উত্তর: ক
75. What data structure is often results in a time-space tradeoff by using extra memory to speed up operations?
ক. Arrays
খ. Hash tables
গ. Stacks
ঘ. Queues
উত্তর: খ
76. Which dynamic programming approach starts solving from the smallest subproblems?
ক. Greedy approach
খ. Recursive approach
গ. Top-down approach
ঘ. Bottom-up approach
উত্তর: ঘ
77. Which of the following service use TCP?
ক. DHCP
খ. SMTP
গ. CSMA
ঘ. DNS
উত্তর: খ
78. Which standard TCP port is assigned for contacting SSH servers?
ক. 21
খ. 22
গ. 23
ঘ. 24
উত্তর: খ
79. The memory that is allocated for any object is-
ক. Cache
খ. HDD
গ. ROM
ঘ. RAM
উত্তর: ঘ
80. What does ACID stand for in database transactions?
ক. All Columns in Database
খ. Atomicity, Consistency, Isolation, Durability.
গ. Automated Commit in Database
ঘ. Association of Conditions in Data
উত্তর: খ
81. Which neural network architecture is the foundation of most modern LLMs?
ক. Bayesian Network
খ. Convolutional Neural Network (CNN)
গ. Transformer
ঘ. Autoencoder
উত্তর: গ
82. If a process fails, most operating system write the error information to a-
ক. new file
খ. another running process
গ. log file
ঘ. database
উত্তর: গ
83. Which data structure is generally used for implementing recursion?
ক. Stack
খ. Queue
গ. List
ঘ. Array
উত্তর: ক
84. Which of the following tags is used to define an image in HTML?
ক.<img
খ. < image >
গ. < picture >
ঘ. <src>
উত্তর: ক
85. What does CSS stand for?
ক. Computer Style Sheets
খ. Creative Style Sheets
গ. Cascading Style Sheets
ঘ. Colorful Style Sheets
উত্তর: গ
86. Which of the following is a type of memory that retains its contents even when the power is turned off?
ক. RAM
খ. ROM
গ. Cache memory
ঘ. Register
উত্তর: খ
87. After groups have been established, SQL applies predicates in the clause, allowing aggregate functions to be used.
ক. Having
খ. Where
গ. With
ঘ. Select
উত্তর: ক
88. An administrator is troubleshooting network connectivity and would like to view the path that packets are taking from workstation A to server 1. Which of the following command line tools is MOST appropriate to use?
ক. traceroute
খ. dig
গ. ping
ঘ. route
উত্তর: ক
89. Wrapping data and its related functionality into a single entity is known as-
ক. Abstraction
খ. Encapsulation
গ. Polymorphism
ঘ. Modularity
উত্তর: খ
90. In the Model-View-Controller (MVC) architecture used in web applications, which component is responsible for handling HTTP requests such as GET and POST?
ক. Model
খ. View
গ. Controller
ঘ. Both Model and View
উত্তর: গ
91. Source code translation and Program modularization are the activities of-
ক. Reverse engineering
খ. Forward engineering
গ. Reengineering
ঘ. Testing
উত্তর: গ
92. Which one of these is NOT shared by the same process's threads?
ক. Address Space
খ. Stack
গ. Message Queue
ঘ. File Descriptor Table
উত্তর: গ
93. If a process is executing in its critical section, then no other processes can be executing in their critical section. What is this condition called?
ক. mutual exclusion
খ. race condition
গ. critical condition
ঘ. critical condition
উত্তর: ক
94. Which statement best describes a public IP
address?
ক. Used only within a local network
খ. Not routable on the internet
গ. Assigned only by local routers
ঘ. Unique and globally routable on the Internet
উত্তর: ঘ
95. Which scheduling algorithm gives minimum average waiting time?
ক. FCFS
খ. Round Robin
গ. SIF
ঘ. Priority
উত্তর: গ
96. Context switching occurs in:
ক. Compiler
ঘ. Memory
গ. CPU
ঘ. I/O device
উত্তর: গ
97. Port number for HTTP is:
ক. 21
খ. 25
গ. 80
ঘ. 443
98. Which language is used to manage databases?
ক. HTML
খ. SQL
গ. XML
ঘ. Java
উত্তর: গ
উত্তর: খ
99. Which command is used to remove a table?
ক. DELETE
খ. DROP
গ. REMOVE
ঘ. TRUNCATE
উত্তর: খ
100. Which is not a programming language?
ক. Python
খ. HTML
গ. Java
ঘ. C++
উত্তর: ক


0 Comments