1. | (a) | For each part below, choose the most appropriate one and write its number only in the answer sheet: Match column (1) with column (2): (1) | (2) | (i) | Bus | (A) | Science and art of secret writing | (ii) | Cryptography | (B) | All the components communicate with each other only through the host computer | (iii) | Client/Server | (C) | Combination of inputs and the resultant output in the tabular form | (iv) | Truth table | (D) | Use of parties external to the organization to provide goods or services to the organization. | (v) | Star topology | (E) | Circuits that provide a communication path between a CPU, storage and peripherals | (vi) | Peer–to–peer | (F) | To retrieve file from a remote machine to a local machine | (vii) | Inverted Tree | (G) | Identification of an Internet site | (viii) | Down load | (H) | Collection of computers with same access right as every other computer on the network | (ix) | Outsourcing | (I) | Collection of computers holding shareable resources and computers | (x) | DomainName | (J) | Hierarchical data structure | | 1x10 | (0) |
| (b) | Put an appropriate word in blank position: | 1x5 | |
| | (i) | _______ are used in computer system to receive and hold information temporarily and pass it on as directed by the control unit. | | (0) |
| | (ii) | _______ contains information about the location of a document. | | (0) |
| | (iii) | _______ is a problem solving system with close interaction between a man and a machine. | | (0) |
| | (iv) | _______ refers to an imitation of actual computer instruction. | | (0) |
| | (v) | _______ are designed to guard against risks inherent in certain data processing operation. | | (0) |
| (c) | Each statement below is either TRUE or FALSE. Choose the most appropriate one: | 1x5 | |
| | (i) | Cache memory operates between CPU and main memory. | | (0) |
| | (ii) | In the relational data structure, a row is known as attribute. | | (0) |
| | (iii) | Terminal does not have a CPU and serves as an I/O device for the host. | | (0) |
| | (iv) | HTML is a protocol used in Internet technology. | | (0) |
| | (v) | The data residing in ROM are lost as soon as the power is failed. | | (0) |
2. | (a) | What is parity bit? Why is it used? | 4 | (0) |
| (b) | Explain the terms ‘Validity Check’ and ‘Hash Total’. | 4 | (0) |
| (c) | Convert to binary: (i) (890)10 (ii) (345)8 | 4 | (0) |
| (d) | What do you mean by the ‘outsourcing’? What are the major reasons for outsourcing of information system function? | 4 | (0) |
3. | (a) | What is meant by E–commerce? Mention at least four advantages offered by E–commerce. | 4 | (0) |
| (b) | What is I/O interface? Give the functions and example of I/O interface. | 4 | (0) |
| (c) | How does secondary storage differ from a primary storage? | 4 | (0) |
| (d) | Explain the significance of the "Secure Electronic Record" and "Secure Digital Signature" in connection with the information Technology Act, 2000. | 4 | (0) |
4. | (a) | Write the full form of the following abbreviations: (i) (ii) (iii) (iv) | FDDI, B–ISDN, USART, RDBMS. | | 4 | (1) |
| (b) | Who is a Database Administrator and what is his role? | 4 | (0) |
| (c) | What do you understand by the auditing around the computer and auditing through the computer? | 4 | (0) |
| (d) | Why is audit charter required? | 4 | (0) |
|
5. | (a) | Describe the differences between ring and star topologies. | 4 | (0) |
| (b) | Briefly explain a Wide Area Network (WAN)? | 4 | (0) |
| (c) | What is main purpose of Telnet? | 4 | (0) |
| (d) | Explain the functions of an Operating System in a computer. | 4 | (0) |
6. | (a) | What is meant by ‘coding’? What are the characteristics of a good coding system? | 4 | (0) |
| (b) | What are information system audit and its key elements? | 4 | (0) |
| (c) | Distinguish between the following: | 2x4 | |
| | (i) | CD ROM Disks and WORM Disks; | | (0) |
| | (ii) | Serial and Parallel Transmission; | | (0) |
| | (iii) | Master file and Transaction file; | | (0) |
| | (iv) | Multiprogramming and Multiprocessing. | | (0) |
7. | (a) | What do you understand Software Quality? What are main tools that are normally employed for quality assurance of software? | 6 | (0) |
| (b) | What is Parity Checking? Convert the digit 9 into its EBCDIC representation and add a suitable parity bit so that it conforms the odd parity convention of EBCDIC. | 6 | (0) |
| (c) | What are objectives of a database? | 4 | (0) |
8. | Write short notes on any four of the following: | 4x4 | |
| (a) | World Wide Web (WWW); | | (0) |
| (b) | Internet; | | (0) |
| (c) | Magnetic Ink Character Recognition; | | (0) |
| (d) | TCP/IP; | | (0) |
| (e) | Major Internet Services; | | (0) |
| (f) | Firewall and its benefits. | | (0) |