How To Exam?

a knowledge trading engine...


Pondicherry University 2007 B.C.A Computer Application , information technology - Question Paper

Monday, 28 January 2013 12:45Web

(Pondicherry university)
B.C.A DEGREE EXAMINATION, NOVEMBER 2007.

First semester

info TECHNOLOGY

PART-A (10*2=20 MARKS)

ans all ques..

1. What are binary coded decimals?
2. a binary digit is called ________________.
3. Define database processing.
4. The 3 key attributes of info are ___________________.
5. Which of the subsequent is a telecommunications media?
(a) Modem (b) Multiplexer
(c) Concentrator (d) Coaxial cable.

6. What are communication processors?
7. EDI stands for ________________.
8. Name any 2 popular search engines.
9. What is code breaking?
10. Which of the subsequent is an encryption system?
(a)EDS (b) DES
(c) EFR (d) VPN



PART-B (5*6=30 MARKS)

ans any 5 ques..

11. How is binary subtraction done? discuss with examples.
12. discuss decimal to binary conversion method with suitable examples.
13. define the characteristics of a data in a database.
14. elaborate the kinds of database management systems? Briefly discuss about any two.
15. discuss the 2 kinds of network architectures.
16. define the functions of telecommunications software.
17. elaborate the future-trends in virtual reality?
18. discuss the computer crime by authorized users and through unauthorized users.


PART-C (5*10=50 MARKS)

Answers all ques..

19. (a) elaborate complements? discuss 9’s and 10’s complements with examples.
Or
(b) define octal number system with suitable examples.

20. (a) explain the problems related with distributed systems.
Or
(b) What is file processing? discuss in detail.

21. (a) provide an overview of world wide web.
Or
(b) explain the usage of e-mail in detail.

22. (a) elaborate business-to-business and business-to-customer e-commerce? discuss.
Or
(b) discuss the different tools used in the multimedia projects.

23. (a) what is cryptography? explain the advantages and limitations of ctyptography.
Or
(b) Name the 3 major categories of viruses and discuss the techniques that can be used to detect and eliminate viruses.




( 4 Votes )

Add comment


Security code
Refresh

Earning:   Approval pending.
You are here: PAPER Pondicherry University 2007 B.C.A Computer Application , information technology - Question Paper