This Paper has 44 answerable questions with 5 answered.
I—6(IST) Revised Syllabus |
Time Allowed : 3 Hours | Full Marks : 100 |
The figures in the margin on the right side indicate full marks. |
Answer Question 1, which is compulsory, and any five questions from the rest. |
Marks |
1. | (a) | For each part below, choose the most appropriate one and write its number only in the answer sheet: Match column (1) with column (2): (1) | (2) | (i) (ii) (iii) (iv) (v) (vi) (vii) (viii) (ix) (x) | Mass Storage Debugging Intelligent terminal DHTML Windows 2000 Trojan Horse Search Engine DSS Query language Black box test | (A) (B) (C) (D) (E) (F) (G) (H) (I) (J) | Helps in creating Web page Virus hidden inside data or program Secondary Storage Removing program error Operating System Problem solving system Without internal logic Selection of data in a database Local processing facility Program to locate relevant data | | 1x10 | (0) |
| (b) | Put an appropriate word in blank position: | 1x5 | |
| | (i) | A _______ is a set of standards or rules. | | (0) |
| | (ii) | _______ screen is an input device. | | (0) |
| | (iii) | _______ is the art of secret or hidden message. | | (0) |
| | (iv) | Relational database stores the data in the form of _______ | | (0) |
| | (v) | _______ is computer to computer communication using a standard data format to exchange business information electronically between independent organization. | | (0) |
| (c) | Write the full form of the following abbreviations: | 1x5 | |
| | (i) | EPROM | | (1) |
| | (ii) | HTTP | | (1) |
| | (iii) | WAN | | (1) |
| | (iv) | DFD | | (1) |
| | (v) | MICR | | (1) |
2. | (a) | What is meant by "back–up" of computer files? Why is it necessary to keep back–up of computer file? | 4 | (0) |
| (b) | What is boot strapping? How does it relate to DOS? | 4 | (0) |
| (c) | Convert (7305)8 to Binary and (1023)10 to Hexadecimal. | 4 | (0) |
| (d) | Explain the various components of CPU with the help of diagram. What are the input and output devices? | 4 | (0) |
3. | (a) | How is digital signature created and verified? | 4 | (0) |
| (b) | Describe about the various actions, which warrants penalty under the Section 43 of the IT Act 2000. | 8 | (0) |
| (c) | Describe briefly, what is a "Firewall". | 4 | (0) |
4. | (a) | What are the common security threats over Internet? Mention any four. | 4 | (0) |
| (b) | Select True/False from the following statements: | 1x4 | |
| | (i) | In LAN each computer can fulfil a function: | | (0) |
| | (ii) | CD–ROM are produced on a mass scale. | | (0) |
| | (iii) | Online processing and real–time processing are same. | | (0) |
| | (iv) | Sequential files are suited for online inquiry processing. | | (0) |
| (c) | What is the difference between systems software and applications software? | 4 | (0) |
| (d) | How does secondary storage differ from a primary storage? | 4 | (0) |
|
5. | (a) | What is an operating system? Why is it necessary for a computer system? | 6 | (0) |
| (b) | What are non–impact printers? Explain the difference between Dot Matrix and Laser Printers. | 4 | (0) |
| (c) | What types of control are usually exercised on computer outputs? | 6 | (0) |
6. | (a) | Describe the differences and similarities between a URL and an e–mail address. | 4 | (0) |
| (b) | Describe the salient features of the hierarchical database. | 7 | (0) |
| (c) | Describe briefly any three of the following terms with reference to Information Technology. | 2x3 | |
| | (i) | Asynchronous Transmission; | | (0) |
| | (ii) | Secure System; | | (0) |
| | (iii) | Stored Program Concept; | | (0) |
| | (iv) | Bandwidth; | | (0) |
| | (v) | Web Browser. | | (0) |
7. | (a) | What is system testing and what do we test in this testing? | 6 | (0) |
| (b) | What do you mean by system analyst? What are the multifaceted roles of a system analyst? | 6 | (0) |
| (c) | What are the characteristics and features of an ERP? | 4 | (0) |
8. | Write short notes on any four: | 4x4 | |
| (a) | Internet hierarchy; | | (0) |
| (b) | Time–sharing; | | (0) |
| (c) | Parity bit; | | (0) |
| (d) | Data independence; | | (0) |
| (e) | Audit trail; | | (0) |
| (f) | Open and Closed systems. | | (0) |