This Paper has 37 answerable questions with 10 answered.
I–6(IST) Revised Syllabus |
Time Allowed : 3 Hours | Full Marks : 100 |
The figures on the right in the margin indicate full marks. |
Answer Question No. 1 which is compulsory and any five from the rest. |
Marks |
1. | (a) | Match column (1) with column (2): (1) | (2) | (i) | Peripherals | (a) | List of choices for user | (ii) | Registers | (b) | Converting programs into executable code | (iii) | Data Bus | (c) | Number system | (iv) | Cache | (d) | Input, output and auxiliary storage devices | (v) | Compiling | (e) | Standard of measurement | (vi) | Coding | (f) | Receive, hold and process data | (vii) | Parity Bit | (g) | Physical connection for data transfer | (viii) | Menu | (h) | Last digit used for verification | (ix) | Benchmark | (i) | High speed buffer memory | (x) | Binary | (j) | Writing the actual computer program | | 1x10=10 | (0) |
| (b) | Complete the following by putting an appropriate word or two in the blanks: | 1x5=5 | |
| | (i) | The logic of a computer program including the sequence of instructions is known as ________ | | (0) |
| | (ii) | Information of a permanent nature is stored in a ________ file. | | (0) |
| | (iii) | ________ allows data retrieval and updates in an interactive manner from a database. | | (0) |
| | (iv) | Data representation in the form of two-dimensional tables is known as a ________. | | (0) |
| | (v) | Total which is used for checking and validation and do not have any significance in accounting is called ________. | | (0) |
| (c) | Choose the most appropriate answer from the four alternatives in the set: | 1x5=5 | |
| | (i) | A network topology where all computers are connected to a central hub is called (A) ring | (B) bus | (C) star | (D) token | | | (0) |
| | (ii) | A number system with a base of 8 is known as (A) binary | (B) decimal | (C) hexadecimal | (D) octal | | | (0) |
| | (iii) | Transistor Technology was used in which generation of Computers? (A) First | (B) Second | (C) Third | (D) Fourth | | | (0) |
| | (iv) | Which of the following is NOT an operating system? (A) OS/2 | (B) WinXP | (C) Oracle | (D) UNIX | | | (0) |
| | (v) | A common coding language for the World Wide Web (WWW) is (A) HTML | (B) Front page | (C) Netscape | (D) List server | | | (0) |
2. | (a) | Explain Cyber laws and their legal framework in India. | 4 | (0) |
| (b) | What are the private key and public key? Discuss their impact with relation to digital signature and e–business transactions. | 6 | (0) |
| (c) | What do you understand by Certifying Authority? Under present law discuss some of their functions, appointment and power. | 6 | (0) |
3. | (a) | What is "Internet"? What are the methods used to access the internet from a Computer? | 1+4 | (0) |
| (b) | What is DNS? Describe the forms of address for identifying the Computers over the Internet. | 1+4 | (0) |
| (c) | Describe the three common services that can be obtained through the Internet. | 6 | (0) |
4. | (a) | "In the current turbulent scenario organizations are confronted with a range of problems that never existed before. These are cash flow, supply chain, new markets, competition and increasing customer expectations where ERP cannot really help much." Can you explain what is "ERP". Give reasons whether you agree or disagree with the above statement? | 2+6 | (0) |
| (b) | Mention some critical steps in the implementation of "ERP". Name three commonly used ERP packages. | 5+3 | (0) |
|
5. | (a) | Define Information System (IS) Audit. Why are internal controls important for IS Audit? Mention any five critical areas of Internal Control. | 2+2+5 | (0) |
| (b) | What is DDP? Why is MIS considered critical for an organization? How is BPR useful to an organization? | 1+2+4 | (0) |
6. | (a) | Expand BCD to its full form and explain its use in Computers Code? What is the need for the EBCDIC Code? Mention the common standard in use at present. | 3+2+1 | (0) |
| (b) | Consider "BCD" as hexadecimal number and convert the value to | 2+2 | (0) |
| (c) | How is a “Computer Virus” different from a “Bug”? Mention the preventive measures needed to ensure that Computer systems are free from Virus. | 2+4 | (0) |
7. | (a) | What is a DBMS? What is primary key and what are its constraints? Name a commonly used DBMS. | 2+3+1 | (0) |
| (b) | Expand the following abbreviations: | 1x10=10 | |
| | (i) | SQL | | (1) |
| | (ii) | DBA | | (1) |
| | (iii) | DSS | | (1) |
| | (iv) | VOIP | | (1) |
| | (v) | CASE | | (1) |
| | (vi) | TPS | | (1) |
| | (vii) | MIPS | | (1) |
| | (viii) | VLSI | | (1) |
| | (ix) | TCP | | (1) |
| | (x) | OLTP. | | (1) |
8. | (a) | Name the different stages in the Systems Development Life Cycle. What is changeover and what are the methods that are followed? | 6+4 | (0) |
| (b) | Describe the significance of benchmarks. What are the three categories of Controls? | 3+3 | (0) |