1336 . Which one of the following protocols is used for receiving emails?
- A. SMTP
- B. POP3
- C. HTTP
- D. FTP
![]() |
![]() |
![]() |
সোনালী ও জনতা ব্যাংক - অফিসার(আইটি) - 02.10.2021
More
1337 . Which one of the following statements is true?
- A. Cache Memories are larger than RAM
- B. Cache Memories are smaller than RAM
- C. Information in ROM can be written by users
- D. ROM are faster than RAM
- E. None of these
![]() |
![]() |
![]() |
1338 . Which one of the following techniques, is used to hide information inside a picture?
- A. Bitmapping
- B. Image rendering
- C. Rootkits
- D. Steganography
![]() |
![]() |
![]() |
সমন্বিত ৮ ব্যাংক ও ১ টি আর্থিক প্রতিষ্ঠান || অফিসার জেনারেল (10-03-2023)
More
1339 . Which one of the following theories of Communism is not a Doctrine of Kal Marx?
- A. Dialectical Materialism
- B. Historical Materialism
- C. Class Struggle
- D. Theory of New Democracy
![]() |
![]() |
![]() |
1340 . Which one of the following tools is used in Business intelligence?
- A. OLAP
- B. Data mining
- C. Web mining
- D. All of these
- E. None of these
![]() |
![]() |
![]() |
1341 . Which one of these also known as read /write memory ?
- A. RAM
- B. ROM
- C. DVD
- D. Hard Disk
![]() |
![]() |
![]() |
1342 . Which one of these planets is nearest to the earth?
- A. Mercuty
- B. Mars
- C. Venus
- D. Pluto
![]() |
![]() |
![]() |
1343 . Which one off the following is not an application software?
- A. Microsoft Office suite
- B. Red Haat Linux
- C. Adobe Photo
- D. Google Crome Brower
![]() |
![]() |
![]() |
সিকিউরিটি প্রিন্টিং কর্পোরেশন বাংলাদেশ | সহকারী ব্যবস্থাপক- 26-11-2021
More
1344 . Which one works as an out and input device?
- A. Keyboard
- B. Scanner
- C. Mouse
- D. Monitor
- E. Modem
![]() |
![]() |
![]() |
1345 . Which one works as both an output and input device ?
- A. Modem
- B. Scanner
- C. Mouse
- D. Monitor
![]() |
![]() |
![]() |
Bangladesh Bank - Assistant Director - 2010
More
1346 . Which operation does F1 key perform for all types of applications?
- A. Windows shutdown
- B. File open
- C. Help
- D. Save
![]() |
![]() |
![]() |
সোনালী ও জনতা ব্যাংক - অফিসার(আইটি) - 02.10.2021
More
1347 . which part of a class is invoked when an object is initialize in java?
- A. constructor
- B. fields
- C. methods
- D. class
![]() |
![]() |
![]() |
Sonali &- Janata Bank Ltd. Senior Officer (IT/ICT) 08.06.2018
More
1348 . Which programming language is used extensively for artificial intelligence?
- A. C
- B. Java
- C. J2EE
- D. Prolog
![]() |
![]() |
![]() |
সোনালী ও জনতা ব্যাংক - অফিসার(আইটি) - 02.10.2021
More
1349 . which protocol is used for secured web browsing.
- A. www
- B. RSA
- C. fip
- D. https
![]() |
![]() |
![]() |
Sonali- Rupali- Bangladesh Krishi- Rajshahi krishi unnayn-Investment Corporation of Bangladesh | 30.11.2018
More
1350 . Which sever can you use to dynamically assign IP addresses to the PC s in a LAN?
- A. DHCP server
- B. Web server
- C. DNS sever
- D. FTP server
![]() |
![]() |
![]() |
Sonali &-Janata Bank | Officer (IT)| 04.01.2019
More