CA PE II Question Papers Group II Information Technology June 2009

CA PE II Question Papers Group II

 Information Technology June 2009

 

 

This Paper has 53 answerable questions with 0 answered.

Total No. of Questions — 7]
Time Allowed : 3 Hours

Maximum Marks : 100
Answers to questions are to be given only in English except in the cases of candidates who have opted for Hindi medium. If a candidate who has not opted for Hindi medium, answers in Hindi, his answers in Hindi will not be valued.
Question No.1 is compulsory
Answer any four from the rest
Marks
1. (a) Convert the following from one number system to another number system along with the working notes: 1×5=5
(i)
(101.011)2 =( ) 10
(0)
(ii)
(173.45)10 = ( ) 8
(0)
(iii)
(3314.4)10 = ( ) 16
(0)
(iv)
(4B23.3)16 = ( ) 10
(0)
(v)
(0234.14)8 = ( ) 10
(0)
(b) Give brief answer of the following: 1×5=5
(i) What is the concept of Firmware? (0)
(ii) Give one application area where Hierarchical database structure is most successful. (0)
(iii) In communication protocol, what does Semantics stand for? (0)
(iv) Why L1 cache memory is better than L2 cache memory? (0)
(v) Give at least one condition where IT Act, 2000 shall not be applicable. (0)
(c) Give one or more reasons of use for each of the following: 1×5=5
(i) Driver (0)
(ii) Firewall (0)
(iii) Router (0)
(iv) Spooling Software (0)
(v) DDL (0)
(d) Write True or False for each of the following with justification: 1×5=5
(i) Thermal printer is an impact printer. (0)
(ii) DML is used for processing of data in database. (0)
(iii) Browser is a client hardware device used to look at various kinds of Internet resources. (0)
(iv) Smart terminals are non–user programmable. (0)
(v) Multiprocessing refers to the use of two or more CPUs to perform work. (0)
2. Distinguish between the following: 4×5=20
(i) Hardware and Software (0)
(ii) Data bus and Address bus (0)
(iii) Circuit switching and Packet switching (0)
(iv) Compiler and Interpreter (0)
(v) Social portal and Transaction portal (0)
3. (a) Discuss the managerial problems of File processing system. 5 (0)
(b) Explain the salient features of Bus networking topology. 5 (0)
(c) A labourer in a manufacturing company gets his wage as per following calculations:
Basic pay =
=
= 10 �–N if N ≤10
12 �–N if N ≤15
15 �–N if N >15
He is also awarded a quality related bonus as per following norms:

If QI ≤ 0.5;
If QI ≤ 0.75; Bonus = 0.0
Bonus = 10% of basic pay
If QI ≤ 0.9; Bonus = 20% of basic pay
If QI > 0.9; Bonus = 30% of basic pay
Where N = Number of items manufactured
QI = Quality index
For the above conditions, draw a flow chart to calculate and print basic pay, bonus and total pay received by the labourer.

10 (0)
4. (a) In what ways issue of data center down time can be resolved efficiently? 5 (0)
(b) Discuss the importance of ‘Data volume and usage analysis’ in the design of database. 5 (0)
(c) What do you mean by database? Describe any four components of a databaseenvironment. 10 (0)
5. (a) Distinguish between the following with respect to word processing: 3+2=5
(i) Text editor and Word Processor. (0)
(ii) Type face and Font. (0)
(b) What are the different views available in MS–POWER POINT to make the presentation? How can one switch over from one view to another view? 5 (0)
(c) Explain the use of following tools related to MS–WORD: 1×5=5
(i) Drop cap (0)
(ii) Section break (0)
(iii) AutoText (0)
(iv) Autofit (0)
(v) Bullet (0)
(d) Define the following functions with respect to Spread Sheet: 1×5=5
(i) NPER (0)
(ii) PROPER (0)
(iii) PMT (0)
(iv) ROUND (0)
(v) POWER (0)
6. (a) Explain an auditing technique suitable for on-line real–time applications such asbanking. 5 (0)
(b) Explain the various features required in a Generalized Audit Package. 5 (0)
(c) Describe the compositions and powers of Cyber Regulation Appellate Tribunal. 5 (0)
(d) List the possible threats and vulnerabilities to the security of system assets. 5 (0)
7. Write short notes on any four of the following: 5×4=20
(i) Bubble Memory (0)
(ii) MICR (0)
(iii) Storage Area Network (0)
(iv) Object Oriented Database (0)
(v) Encryption (0)

Leave a Comment