This Paper has 45 answerable questions with 5 answered.
1–6(IST) Revised Syllabus | |
Time Allowed : 3 Hours | Full Marks : 100 |
The figures in the margin on the right side indicate full marks. |
Answer Question No. 1 which is compulsory and any five questions from the rest. |
Marks |
1. | (a) | Match Column (1) with Column (2) and write your answers only in A, B, —, J for each part below:
| 1x10 | (0) | ||||||||||||
(b) | Put an appropriate word in blank position out of the ten options given in the following table:
| 1x5 | ||||||||||||||
(i) | One of the objectives of information system auditing is safeguarding of _________ . | (0) | ||||||||||||||
(ii) | _________ support system refers to a problem solving system. | (0) | ||||||||||||||
(iii) | The purpose of ___________ check bit is to prevent data corruption during the process of data transfer. | (0) | ||||||||||||||
(iv) | Audit ___________ locates the original source of input for verification. | (0) | ||||||||||||||
(v) | Network components of three basic building blocks viz. ________, clients and communication media. | (0) | ||||||||||||||
(c) | Each statement below is either TRUE or FALSE. Choose the most appropriate one: | 1x5 | ||||||||||||||
(i) | Compiler converts machine language to a high level language program. | (0) | ||||||||||||||
(ii) | ‘Upload’ implies transfer of a file from a local connected device to a remote computer. | (0) | ||||||||||||||
(iii) | In the Windows System, a Folder is a storage area for Files and Sub–folders. | (0) | ||||||||||||||
(iv) | Undefined terms in computer programs constitute logical errors. | (0) | ||||||||||||||
(v) | ‘Packet switching’ on the Internet refers to method of data movement. | (0) | ||||||||||||||
2. | (a) | What are the steps involved in the implementation of ERP? What are the benefits to be derived after implementation? | 5+5 | (0) | ||||||||||||
(b) | Calculate the decimal and hexadecimal equivalent of octal number 333. | 2+2 | (0) | |||||||||||||
(c) | How do you justify ‘computer’ to be termed as a ‘system’? | 2 | (0) | |||||||||||||
3. | (a) | How do you distinguish ‘Internet’ from ‘Internet’? What are the purposes served by Intranet? Describe the various types of advantages from availability of Intranet. | 2+2+4 | (0) | ||||||||||||
(b) | In the context of Information Technology Act, 2000, explain the following terms: (i) ‘Electronic Record’ and ‘Unauthorised Access’ (ii) ‘Authentication’ and ‘Authorization’. | 2+2 2+2 | (0) | |||||||||||||
4. | (a) | Distinguish between the following: | 2x4 | |||||||||||||
(i) | LAN and WAN; | (0) | ||||||||||||||
(ii) | Auditing around the computer and auditing through the computer; | (0) | ||||||||||||||
(iii) | Distributed and proprietary databases; | (0) | ||||||||||||||
(iv) | Preventive and detective controls; | (0) | ||||||||||||||
(b) | Write the full form of the following abbreviations: | 1x5 | ||||||||||||||
(i) | B–ISDN; | (1) | ||||||||||||||
(ii) | DML; | (1) | ||||||||||||||
(iii) | IDEA; | (1) | ||||||||||||||
(iv) | GUI; | (1) | ||||||||||||||
(v) | EFTS; | (1) | ||||||||||||||
(c) | Define ‘Private Key’ and ‘Public Key’ under IT Act, 2000. | 3 | (0) | |||||||||||||
5. | (a) | Who are End Users in a DBMS and how they may be categorized? | 1+4 | (0) | ||||||||||||
(b) | What are the features of SAP? Name three platforms for the application of SAP. | 3+3 | (0) | |||||||||||||
(c) | What are the factors to be considered before changeover to a new information system? | 5 | (0) | |||||||||||||
6. | (a) | What is the role of Database Administrator in a database environment? | 4 | (0) | ||||||||||||
(b) | Clarify the inter–relationship among ‘system’, ‘sub–system’, ‘synergy’ and ‘structure’. | 4 | (0) | |||||||||||||
(c) | What is the purpose of whole–of–program testing? What is the objective of each type of test carried under it? Is it applicable for all types of programs? | 1+4+1 | (0) | |||||||||||||
(d) | What do you mean by ‘Home Page’ and ‘URL’ in the Internet? | 1+1 | (0) | |||||||||||||
7. | (a) | What are the factors that may affect the security of the computer system of an organisation? | 6 | (0) | ||||||||||||
(b) | How does time–sharing work in a computer installation and what are its advantages? | 2+2 | (0) | |||||||||||||
(c) | What do you mean ‘peripherals’? Classify ‘peripherals’ with examples. | 2+2 | (0) | |||||||||||||
(d) | Explain the concept of ‘memory dump’ with an example. | 2 | (0) | |||||||||||||
8. | Write short note on any four of the following: | 4x4 | ||||||||||||||
(a) | Communication Protocols in Internet; | (0) | ||||||||||||||
(b) | Digital signature; | (0) | ||||||||||||||
(c) | Selection of an ERP Package; | (0) | ||||||||||||||
(d) | Criteria in choosing the file organisation method; | (0) | ||||||||||||||
(e) | Pseudo code; | (0) | ||||||||||||||
(f) | Transaction Processing System; | (0) | ||||||||||||||
(g) | Hacking with computer system under IT Act 2000; | (0) | ||||||||||||||
(h) | Methods of accessing ‘Internet’ | (0) |