How To Exam?

a knowledge trading engine...


The Institute of Chartered Financial Analysts of India University 2005 PE- II Information Technology - exam paper

Thursday, 31 January 2013 02:45Web



CA PE - II:: Information Technology : May 2005

Roll No.....................

Total No. of Questions7 ]    [Total No. of Printed Pages4

Time Allowed 3 Hours    Maximum Marks 100

MP

Answers to questions are to be given only in English except in the cases of candidates who have opted for Hindi medium. If a candidate who has not opted for Hindi medium, answers in Hindi, his answers in Hindi

will not be valued.

Question No.l is compulsory

Answer any four from the rest

Marks

1. (a) Convert the following from one number system to another system along 1x5=5 with the working notes:

(i)    (1267.3125)io =( ) 2

(ii)    (10110.101)2 =( )io

(iii)    (1234)8 =( ) 16

(iv)    (B2C)i6 =( ) 2 (V) (10110111.1)2 = ( )8

(b) Describe briefly, the following terms with reference to information Technology: 1x5=5

(i)    Asymmetric crypto system

(ii)    Subroutine

(iii)    Parity bit

(iv)    Object oriented Database

(v)    FTP.

MP

(c)    Give one or two reasons for each of the following:

Marks

1x5=5


(i)    Use of Serial Interface.

(ii)    Use of Spooling Software.

(iii)    Use of Fire wall in the system.

(iv)    Need of Repeaters in the network.

(v)    Need of Reference files.

(d)    Write True or False for each of the following:

1x5=5


(i) Flash memory chips are one form of static RAM chip.

(ii)    A sequential access file can reside only on a magnetic tape.

(iii)    A Personnel Computer based on the Intel 80386 chipset has 32 bit processor.

(iv)    The speed of Dot matrix printer is measured in terms of CPS.

(v)    Outline view of MS-POWER POINt permits frequent switching between text and object on a slide.

2.    Distinguish between the following:

4x5=20


(i)    Synchronous and Asynchronous data transmission.

(ii)    RAM and ROM

(iii)    Multiprogramming and Multiprocessing

(iv)    Third generation and Fourth generation languages.

(v)    Fixed length field and Variable length field (with reference to database).

3.    (a) Describe briefly, why a file processing system reduces effectiveness of the

5

5

P.T.O.


end user applications?

(b) Describe the salient features of Hierarchical database.

MP

(c) A bank has 500 employees. The salary paid to each employee is sum of his 10 basic pay. Dearness Allowance and House rent allowance. For the purpose of computing house rent allowance bank has classified his employees into three classes A, B and C. The house rent allowance for each class is computed at the rate of 30 percent, 20 percent and 10 percent of the basic pay respectively. The dearness allowance is computed at a flat rate of 60 percent of the basic pay.

each of the following salary slab:

(i)    Above Rs. 30,000

(ii)    Rs. 15,001 to Rs. 30,000

(iii)    Rs. 8,001 to Rs. 15,000

(iv)    Less than or equal to Rs. 8,000.

4.    (a) Explain the working principle of Electronic Data Interchange (EDI).    5

(b)    Describe the various services provided by Data centre.    5

(c)    Discuss the various components of a Local Area Network (LAN)    10

5.    (a) With reference to word processing, differentiate between the following:    3+2=5

(i)    Text Editor and Word Processor

(ii)    Type face and Font.

(b) What do you mean by Artificial Intelligence? Describe any two types of    5

artificial intelligence used in Information Technology.

( . Describe any five categories with their purposes under which various    5

functions available in MS-EXCEL are classified.

(d)    Define the following functions used in MS-EXCEL:    5

(i)    IRR

(ii)    LEN

(iii)    DMIN

(iv)    POWER

(v)    MOD (X/Y).

MP    Marks

6.    (a) Which areas of DBMS should be addressed while maintaining a    5

database?

(b)    Describe the Integrated Test Facility (ITF) method used in conducting    5 audit

(c)    Describe about the various actions which warrants penalty under the    5 Section 43 of the IT Act, 2000.

(d)    Briefly explain the various tools available to protect informations against    5 instructions.

7.    Write short notes on the following:    5x4=20

(i)    Firmware

(ii)    Data dictionary

(iii)    Storage area network

(iv)    Microsoft windows.

MP







Attachment:

( 0 Votes )

Add comment


Security code
Refresh

Earning:   Approval pending.
You are here: PAPER The Institute of Chartered Financial Analysts of India University 2005 PE- II Information Technology - exam paper