1. | (a) | Match Column 1 with Column 2 and write your answers only in A, B, ........, J for each part below: Column 1 | Column 2 | (i) (ii) (iii) (iv) (v) (vi) (vii) (viii) (ix) (x) | Seek time Buffer Facsimile Firmware Generator Downtime Spooling IBG Diagnostic Routine Pascal | A. B. C. D. E. F. G. H. I. J. | Software substituted for hardware and stored in ROM Malfunctioning of a computer Program that constructs other programs to perform For read/write head to move to the desired track in disk system To reduce the speed mismatch between I/O devices and CPU Stores information on temporary basis Indicates system problems Uses structured programming techniques Separation of blocks of records on magnetic tape Transmission of pictures, texts and graphs. | | 1x10 | (0) |
| (b) | Put an appropriate word in blank position out of the ten options given in the following table: (a) Standard | (b) Object | (c) Location | (d) Boolean algebra | (e) Response | (f) Quality | (g) Program | (h) Cylinder | (i) People | (j) Loop | | | | 1x5 | |
| | (i) | _____________ deals with logical proposition which are either true or false. | | (0) |
| | (ii) | A set of corresponding tracks in all the surfaces in a disk pack is called a ______________ . | | (0) |
| | (iii) | In ERP, an enterprise model is built around ______________ technology, processes, and products/services. | | (0) |
| | (iv) | Fully compiled program that is ready to be loaded into the computer is called an ______________ program. | | (0) |
| | (v) | Total elapsed time between submission of a command and data to a computer and getting the result of computation is called _____________ time. | | (0) |
| (c) | Each statement below is either TRUE or FALSE . Choose the most appropriate one. | 1x5 | |
| | (i) | A multiplexer converts several data communication lines into one large signal at the sending location. | | (0) |
| | (ii) | One billionth of a second is known as giga second. | | (0) |
| | (iii) | Both magnetic disk and magnetic tape can be used for sequential processing of data. | | (0) |
| | (iv) | Two or more CPUs are required for multiprogramming. | | (0) |
| | (v) | With a 5 bit binary number, the maximum decimal value that can be expressed is 16. | | (0) |
2. | (a) | Classify and describe the following printers: | 2x2 | (0) |
| (b) | What is multiprocessing? Give its advantages and limitations. | 6 | (0) |
| (c) | Name the three components of a network and briefly explain the role of each of them. | 6 | (0) |
3. | (a) | How do you define a system? What is a computer system? Justify your answer. | 4 | (0) |
| (b) | What is the basic idea behind Business Process Re–engineering? How is it achieved? What are the benefits derived from BPR? | 6 | (0) |
| (c) | What do you understand by Software Quality? What are main tools that are normally employed for quality assurance of software? | 6 | (0) |
4. | (a) | What are the characteristics and features of an ERP? | 4 | (0) |
| (b) | Describe briefly the various transmission techniques. | 6 | (0) |
| (c) | What are the responsibilities discharged and the nature of problems during implementation phase handled by a System Analyst in a database environment? | 6 | (0) |
|
5. | (a) | Write the full form of the following abbreviations: | 1x4 | |
| | (i) | BIOS | | (1) |
| | (ii) | DFD | | (1) |
| | (iii) | INGRES | | (1) |
| | (iv) | CASE | | (1) |
| (b) | What is an operating system? Why is it necessary for a computer system? | 6 | (0) |
| (c) | What is the role played by “Firewall’ in Internet? What purpose does a leased line serve? | 6 | (0) |
6. | (a) | Convert the following number system into as indicated: (i) | (890)10 | = | ( ________ )2 | (ii) | (1023)10 | = | ( ________ )16 | | 2x2 | (0) |
| (b) | Distinguish between the following: | 2x3 | |
| | (i) | Intelligent and Dumb terminals: | | (0) |
| | (ii) | Syntax and logical errors. | | (0) |
| | (iii) | Indexed Sequential and Direct Access Method for records in a file. | | (0) |
| (c) | What are the objectives of Information Technology Act, 2000? How is it helpful in promoting E–Commerce? | 6 | (0) |
7. | (a) | What are information system audit and its key elements? | 4 | (0) |
| (b) | What are the major tasks performed by the Generalized Audit Programmes? | 6 | (0) |
| (c) | What are the features of a good source document design? What safeguards should be taken to ensure success before making changes to source documents? | 6 | (0) |
8. | Write short note on any four of the following: | 4x4 | |
| (a) | Open and Closed Systems; | | (0) |
| (b) | Requirement of Audit Charter; | | (0) |
| (c) | World Wide Web (WWW); | | (0) |
| (d) | Algorithm; | | (0) |
| (e) | Network Topologies; | | (0) |
| (f) | EBCDIC | | (0) |