ser Key and Primary Key. (CH: 4] :
orithm check a number is prime ornot prime. [CH: 5]
subnet mask and network address from the given IP address ~
0
output: [CH: 24]
a, #include
#include
int mainQ{
char str1[20] = “Bangladesh”;
char str2;
str1[4] = ‘\0°;
str2 = strlen(str1);
printf(“%s”, str1);
return 0;
i
b. #include
int main(){
int i;
for i<5; +4i){
)
continue;
printf(“%d\n”, i);
}
return 0;oud Computing? Write advantages and disadvantages of it. (CH: 14]
ig the difference between Hub, Router and Switch? (CH: 10]
ence between Spoofing & Phishing? (CH: 13]
js Click Fraud? Give example. [CH: 24]
ference between Binary Insertion sort and Insertion sort, [CH: 5]
ve example of Selection Sort. (CH: 5]
raw an entity relationship diagram of a real life scenario for recipe ofa restaurant. [CH: 4]
structor (instructor id, name, dept_name, salry), course (course_id, course_name, credit)
HI: 4]
fa, Show all the instructors whose salary is more than at least one salary of the Biology
department.
. Delete all the employees from instructor list whose salary is less than average salary.
f. Give 5 percent bonus to all instructors whose salary is less than the average salary.
What is Cryptography? [CH: 24]
Text-"Assistant Programmer”, what will be the output text in ease of Caesar Cipher (-3)?
What is a Public Key? [CH: 24]
What is loT? Describe it. [CH: 24]
What is Web 3.0? What are the differences betw
Draw a UML use-case diagram for Credit Card. [CH: 24]
n Web 2.0 and Web 3.0? (CH: 24]
36th BC
algorithm to sort “n” number always in O (n Log n) time,
Write a sorting ie
onality of “Priority Queue”? How to implement these functions
What are the main functi
by using “Heap”? (CH: 24]
What is Race peri Ci ‘ondition? F ‘tek Ne ae this? [CH: 2]
ibe “Huffman’s Algorithm”. 1
Fist ae a LK Filp Flop to a T Flip Flop? (CH: 24]
Explain Early Binding & Late Binding with example. [CH: 6]
ecisin Method overloading & Method overriding with example. (CH: 6]
i o implement Enqueue & Dequeue operation array of Circular
Write pseudo ation, here ay Pola ic 4 queue. [(CHeSiam
iff between Grapl vee? What is Hamiltanian Gray ¥
What are the di ae yey Lit full adder eireuit (CH; 7} ph? (CH; 24]
Design a 4-Bit Oren Latch & Flip- Flop. (Ch-7) :
B Distinguish between 1 ca CISC RSG Art =i haan
; a Tee
at are differen
ivt s be
ical mouse does work? [CH: 24)
the functionality of Push down ‘automata. [CH: 24]
does Protected Memory Management work? [CH: 24]
ing following numbers: 28 / 25 / 30/ 15/100
What is Big-O, Big-Theta? [CH: 5]
Explain NP-Heard & NP- Complete with example. [CH: 5]
‘What is Minimum Spanning Tree? (CH: 5]
Write down about Divide & Conquer algorithi
& Conquer and Dynamic programming? [CH: 24] :
Explain how to Bellman Ford algorithm can identify a negative cycle of a graph.
Describe Agile Method. [CH: 12]
Explain each component of Unit Test Environment. (CH: 12]
What are the reasons of failure of a Software project? [CH: 24]
Describe the disadvantages of prototype technique. [CH: 24}
What is COCOMO Model? (CH: 24] a
Explain Banker’s Algorithm for Deadlock handling. [CH: 24] : 4
Explain swapping & Memory protection system. [CH: 24]
Distinguish between paging & segmentation. [ 4] } :
Explain Native Baysian Model with example. (CH: 24] j
Describe the procedure of Genetic Algorithm. [CH: 24) i
What is Database Normalization? Why INF, 2NF, 3NF & BCNF are implemented? [(
What are the differences between DDL & DML? [CH: 24]
How “Hash Indexing” & “B+ Tree Indexing” do work? [CH: 4]
What is Primary Key & Foreign Key? [CH: 4]
What is SQL? Write down two example of SQL. [CH: 4]
What is VPN? How it works? [CH: 10]
et is Digital signature? How public key & private key encryption does
it are the differences between FDM & TDM? [CH: 24]
DNS does work? (CH: 24]
DoS & Brute Force Attack. (CH: 13]
m. What are the differences betwe
it Programmer of Investment Corporation B: