This Paper has 40 answerable questions with 4 answered.
1—6(IST) Revised Syllabus |
Time Allowed : 3 Hours | Full Marks : 100 |
The figures in the margin on the right side indicate full marks. |
Answer Question No. 1 which is compulsory and any five from the rest. |
Marks |
1. | (a) | For each part below, choose the most appropriate one and write its number only in the answer sheet: Match column (1) with column (2): (1) | (2) | (i) (ii)
(iii) (iv) (v)
(vi) (vii) (viii)
(ix) (x) | Modern Interface
Intelligent terminal Telnet Multiplexer
HTML File volatility Loop
ERP e–commerce | A. B.
C. D. E.
F. G. H.
I. J. | Several devices to share one communication line The device that permits electrical digital signals to be transmitted to a server over regular telephone lines Computer–to–Computer order processing through a network An encoding scheme used to create a web document Repeated execution of sequence until occurrence of a terminal condition Rate of update of records Local processing facility Interested information system covering all functional and business areas of an organization Relationship between human and hardware Application level protocol of TCP/IP suite. | | 1x10 | (0) |
| (b) | Put an appropriate word in blank position out of the ten options given in the following table: (a) Firewall (f) Boundary | (b) Folder (g) Register | (c) Code (h) Hash | (d) Data Independence (i) Digital Signature | (e) Firmware (j) Program | | 1x5 | |
| | (i) | _______ is a place that a user can create to store files. | | (0) |
| | (ii) | A _______ consists of a number of digits or characters or a combination of both to denote a specific entity. | | (0) |
| | (iii) | _______ is a combination of hardware and software to provide one of the most effective types of security on Internet. | | (0) |
| | (iv) | A computer program permanently stores in ROM or PROM are called _______ | | (0) |
| | (v) | _______ defined as the capacity to change the scheme at one level of database without having to change the schema at the next higher level. | | (0) |
| (c) | Each statement below is either TRUE or FALSE . Choose the most appropriate one. | 1x5 | |
| | (i) | The CPU is considered the "brain" of the computer. | | (0) |
| | (ii) | Trackballs in computers serve the same purpose as a Modern does. | | (0) |
| | (iii) | Sequential files are suited for online inquiry processing. | | (0) |
| | (iv) | Digital signal is more prone to noice than analog signal. | | (0) |
| | (v) | A computer is not much of use without an operating system. | | (0) |
2. | (a) | What is an operating system? Why is it necessary for a computer system? | 6 | (0) |
| (b) | What is a computer virus? What is the remedy available for computer viruses? How does it differ from a bug? | 6 | (0) |
| (c) | Convert the following from one number system to another number system. | 4 | |
| | (i) | | | (0) |
| | (ii) | (101.011)2 | = | ( ________ )10 | | | (0) |
3. | (a) | "The Internet is a client/server model". How do you get information through this model? | 6 | (0) |
| (b) | What types of control are usually exercised on computer outputs? | 6 | (0) |
| (c) | Write the full form of the following abbreviations: | 4 | |
| | (i) | A/D | | (1) |
| | (ii) | EFTS | | (1) |
| | (iii) | PDA | | (1) |
| | (iv) | RDBMS | | (1) |
4. | (a) | What is Intranet? Give the advantages of Intranet. | 6 | (0) |
| (b) | Explain different types of data communication modes. | 6 | (0) |
| (c) | Explain the following terms used in connection with the working of the Internet: | 2x2 | |
| | (i) | Browser | | (0) |
| | (ii) | Virtual Reality | | (0) |
|
5. | (a) | What are the conditions prescribed in IT Act 2000 for the purpose of Electronic Governance to retain documents, records or information in electronic form for any specified period. | 8 | (0) |
| (b) | What purposes are served by registers in a computer system? Name three such registers along with their purposes. | 4 | (0) |
| (c) | What is bootstrapping? Why is it necessary? | 4 | (0) |
6. | (a) | Explain briefly the test data technique in conducting computer, assisted audit. How is file interrogation programme better than clerical audit method? | 8 | (0) |
| (b) | Distinguish between Impact printers and Non–impact printers. | 4 | (0) |
| (c) | What is the difference between System software and Application software? | 4 | (0) |
7. | (a) | What do you mean by programme maintenance? Name some of the frequent problems encountered with software. | 8 | (0) |
| (b) | What is meant by RDBMS? Name two commonly used RDBMS. | 4 | (0) |
| (c) | How is digital signature created and verified? | 4 | (0) |
8. | Write short note on any four of the following: | 4x4 | |
| (a) | Protocol options for communications | | (0) |
| (b) | Software quality and quality assurance tools | | (0) |
| (c) | Open and Closed systems | | (0) |
| (d) | Encryption | | (0) |
| (e) | E–commerce | | (0) |
| (f) | Firewall and its benefits. | | (0) |