I—6(IST) Revised Syllabus |
|||
Time Allowed : 3 Hours | Full Marks : 100 | ||
The figures on the right in the margin indicate full marks. | |||
Answer Question 1, which is compulsory, and any five from the rest. | |||
Marks |
1. | (a) | For each part below, choose the most appropriate one and write its number only in the answer sheet. Match column (1) with column (2): |
|||||||||||||||||||||||||||||||||||||||||||||
|
1x10 | ||||||||||||||||||||||||||||||||||||||||||||||
(b) | Put an appropriate word in the blank position:
|
1x5 | |||||||||||||||||||||||||||||||||||||||||||||
(c) | Each statement below is either TRUE or FALSE. Choose the most appropriate one:
|
1x5 | |||||||||||||||||||||||||||||||||||||||||||||
2. | (a) | "Bus has an important role to play in the functioning of a microprocessor". Briefly explain the statement and the role of various types of bus. |
4 | ||||||||||||||||||||||||||||||||||||||||||||
(b) | What do you understand by memory dump? What number systems are used for such purpose and which one is easier to work with? |
4 | |||||||||||||||||||||||||||||||||||||||||||||
(c) | Convert to binary:
|
4 | |||||||||||||||||||||||||||||||||||||||||||||
(d) | What is a Firewall? Can it prevent a virus from entering the system? What steps must be taken to prevent virus from infecting a computer? |
4 |
Please turn over |
( 2 )
F-6(IST) Revised syllabus |
Marks |
3. | (a) | what is meant by E-commerce? Mention at least four advantages offered by E-commerce. |
4 | ||||||
(b) | what is meant by digital signature and how is it created and verified? Explain your answer with reference to key pair. |
6 | |||||||
(c) | Which Act defines Certifying Authority in India? Mention the functions of Certifying Authorities (CA) in India in the context of digital signature. |
6 | |||||||
4. | (a) | Describe the functionality of a Client Server architecture. Where is it appropriate? | 4 | ||||||
(b) | "A computer works on programs which must be planned and documented." Please explain why planning is necessary prior to the programming and how Flow Chart and Decision Table are helpful to fulfill this objective. |
6 | |||||||
(c) | What are the implications of the following pairs of terminology in an information system environment?
|
2x3 | |||||||
5. | (a) | Explain the following terms used in connection with the working of the Internet:
(i) Browser (ii) Virtual Reality |
2x3 | ||||||
(b) | What is automated office? List down the components of the automated office and their major functions. | 6 | |||||||
(c) | Explain briefly "system" and its characteristics. What do you understand by integration of systems? | 6 | |||||||
6. | (a) | What is meant by RDBMS? Name two commonly used RDBMS. | 4 | ||||||
(b) | What are the responsibilities discharged and the nature of problems during implementation phase handled by a System Analysis in a database environment? |
6 | |||||||
(c) | What is an operating system? Why is it necessary for a computer system? | 6 | |||||||
7. | (a) | What is information system audit and its key elements? | 4 | ||||||
(b) | What is Parity Checking? Convert the digit 9 into its EBCDIC representation and add a suitable parity bit so that it conforms the odd parity convention of EBCDIC. |
6 | |||||||
(c) | "While computerization has an array of advantages, it also exposes the company to a number of hazards. "Name some of these hazards and some measures to avoid them. |
6 | |||||||
8. | (a) | What is World Wide Web? How will you distinguish it from Internet? | 4 | ||||||
(b) | What do you understand by Software Quality? What are main tools that are normally employed for quality assurance of software? |
6 | |||||||
(c) | What are the features of a good source document design? What safeguards should be taken to ensure success before making changes to source documents? |
6 | |||||||
__________ |
Disclaimer ♣ Privacy Policy ♣ Terms of Service ♣ Who We Are
© Krishbhavara ♣