This Paper has 43 answerable questions with 5 answered.
1—6(IST) Revised Syllabus |
Time Allowed : 3 Hours | Full Marks : 100 |
The figures in the margin on the right side indicate full marks. |
Answer Question No. 1 which is compulsory and any five questions from the rest. |
Marks |
1. | (a) | Match Column 1 with Column 2 and write your answers only in A, B, —, J for each part below: 1 | 2 | (i) (ii) (iii) (iv) (v) (vi) (vii) (viii)
(ix) (x) | Hybrid Computer Query language Encryption TCP/IP Bandwidth Fourth generation Redundancy Debugging
Multimedia HTTP | A. B. C. D. E. F. G. H.
I. J. | Relation to measurement of network speed Analogue or digital output Very Large Scale Integration (VLSI) Use of more than on media for information presentation Removing program error Eliminating duplication Scrambling of data A method used to make hypertext documents readable on the World Wide Web Selection of data in a database Software that converts data into small packets and passes the same from one host computer to another | | 1x10 | (0) |
| (b) | Fill up the blanks with appropriate words: | 1x5 | |
| | (i) | A group of circuits interconnecting all sections of the microprocessor is called a _______. | | (0) |
| | (ii) | _______ defined as the capacity to change the scheme at one level of database without having to change the schema at the next higher level. | | (0) |
| | (iii) | A _______ is a set of standards or rules. | | (0) |
| | (iv) | _______ are sets of corresponding tracks in all the surfaces in a disk pack. | | (0) |
| | (v) | _______ are information processing system frequently used by accountants, managers and auditor to assist them in the decision making process. | | (0) |
| (c) | State whether the following statements are TRUE or FALSE: | 1x5 | |
| | (i) | Cache memory operates between CPU and main memory . | | (0) |
| | (ii) | A Cyber Appellate Tribunal shall consist of one person only. | | (0) |
| | (iii) | Sequential files are suited for online inquiry processing. | | (0) |
| | (iv) | Online processing and real–time processing are same. | | (0) |
| | (v) | One of the major functions of Public Key infrastructure includes issuing and revoking public key certificates. | | (0) |
2. | (a) | Distinguish between the following: | 2x4 | |
| | (i) | Internet and Extranet; | | (0) |
| | (ii) | System Maintenance and System Development; | | (0) |
| | (iii) | Control Unit and Arithmetic Logic Unit; | | (0) |
| | (iv) | Impact Printers and Non–impact printers. | | (0) |
| (b) | What is system software? How does it differ from application software? List any four types of system software. | 4 | (0) |
| (c) | Convert to binary: | 4 | |
| | (i) | (14.625)10 | = | ( ________ )2 | | | (0) |
| | (ii) | (0.875)10 | = | ( ________ )2 | | | (0) |
3. | (a) | What is a Firewall? Can it prevent a virus from entering the system? What steps must be taken to prevent virus from infecting a computer? | 5 | (0) |
| (b) | Explain the Client Server model with respect to Internet. | 5 | (0) |
| (c) | What is an automated office? List the automated office components along with their major functions. | 6 | (0) |
4. | (a) | Explain the terms ‘Validity Check’ and ‘Hash Total’. | 5 | (0) |
| (b) | What is debugging? Explain the two kinds of the errors, which programmers usually deal with. | 5 | (0) |
| (c) | What is prototyping approach of developing a system? What are the advantages and disadvantages of it? What are the two types of prototyping approaches to system development? | 6 | (0) |
|
5. | (a) | What are the characteristics and features of an ERP? | 5 | (0) |
| (b) | What is I/O interface? Give the functions and examples of I/O interface. | 5 | (0) |
| (c) | Which act defines Certifying Authority in India? Mention the functions of Certifying Authorities (CA) in India in the context of digital signature? | 6 | (0) |
6. | (a) | Write the full form of the following abbreviations: | 5 | |
| | (i) | MAC | | (1) |
| | (ii) | NIC | | (1) |
| | (iii) | USART | | (1) |
| | (iv) | RDBMS | | (1) |
| | (v) | OT–PROM | | (1) |
| (b) | Describe the objectives which are supported by an information system auditing. | 5 | (0) |
| (c) | What do you understand Software Quality? What are main tools that are normally employed for quality assurance of software? | 6 | (0) |
7. | (a) | What are the responsibilities discharged and the nature of problems during implementation phase handled by a System Analyst in a database environment? | 5 | (0) |
| (b) | Describe the database along with its key functions. | 5 | (0) |
| (c) | What are the major tasks performed by the Generalized Audit Programmes? | 6 | (0) |
8. | Write short note on any four of the following: | 4x4 | |
| (a) | Characteristics of a good coding system | | (0) |
| (b) | TCP/IP | | (0) |
| (c) | Operating system | | (0) |
| (d) | Protocol options | | (0) |
| (e) | Data independence | | (0) |
| (f) | Hierarchical database. | | (0) |