I-6(IST) Revised Syllabus |
|||
Time Allowed : 3 Hours | Full Marks : 100 | ||
The figures in the margin on the right side indicate full marks. | |||
Answer Question No. 1 which is compulsory and any five from the rest. | |||
Marks |
1. | (a) | Match coloumn 1 with coloumn 2:
|
1x10=10 | ||||||||||||||||||||||||||||||||||||||||||||
(b) | Complete the following sentences by putting an appropriate word in the blank position:
|
1x5=5 | |||||||||||||||||||||||||||||||||||||||||||||
(c) | Expand the following abbrevations:
|
1x5=5 | |||||||||||||||||||||||||||||||||||||||||||||
2. | (a) | Convert the following from one number system to another system:
|
2x2 | ||||||||||||||||||||||||||||||||||||||||||||
(b) | Give the advantages and disadvantages of the magnetic tape. | 6 | |||||||||||||||||||||||||||||||||||||||||||||
(c) | Distinguish between the microprocessor and microcomputer. | 6 | |||||||||||||||||||||||||||||||||||||||||||||
3. | (a) | What is database? Briefly describe the characteristics of the database. | 2+6 | ||||||||||||||||||||||||||||||||||||||||||||
(b) | What is DBMS? Mention any six advantages of DBMS. | 2+6 | |||||||||||||||||||||||||||||||||||||||||||||
4. | (a) | What is multimedia processor? | 6 | ||||||||||||||||||||||||||||||||||||||||||||
(b) | Explain briefly the operationby an office automation system. Why is it required? | 6+4 | |||||||||||||||||||||||||||||||||||||||||||||
5. | (a) | What is a virus scanner? Briefly describe the functions of virus scanner. | 6 | ||||||||||||||||||||||||||||||||||||||||||||
(b) | What is an interface device? Describe some of them that are commonly available. |
2+8 |
Please turn over |
( 2 )
I-6(IST) Revised syallabus |
Marks |
6. | (a) | What do you understand by Detective controls, preventive controls and corrective Controls in the contest of auditing a computer system? |
8 |
(b) | What do you undeerstand by Quality in regard to software? describe briefly the main tools, which are generally employed for quality assurance of software. |
8 | |
7. | (a) | Briefly explain any three tools that are available to protect information against misuse. |
8 |
(b) | What is Intranet? Give the purpose and advantages of Intranet. | 2+6 | |
8. | (a) | Explain an Electronic payment system with an example. Give the applications of Electronic payment system. |
6 |
(b) | What are the steps required in auditing a computer applicationsystem? Eplain them. | 10 | |
__________ |
Disclaimer ♣ Privacy Policy ♣ Terms of Service ♣ Who We Are
© Krishbhavara ♣