Upload
santakumar51
View
217
Download
0
Embed Size (px)
Citation preview
8/3/2019 2008 Question Paper Team C (Aditya Pagariya) (1)
1/41
PG PROGRAM 2008QUESTION PAPER
PRESENTATION
PRESENTED BY:TEAM-C
Section - E
8/3/2019 2008 Question Paper Team C (Aditya Pagariya) (1)
2/41
Part A
(mcqS)
8/3/2019 2008 Question Paper Team C (Aditya Pagariya) (1)
3/41
1.COMPUTER IS A/ANDEVICE
THAT ACCEPTS DATA AND ASINPUTS AND PRODUCES .AS
OUTPUT.
(A)Electronic , information, instruction
(B) Electronic ,instruction , information
(C)Automatic ,information , instruction
(D)Computing ,data , information
(E)Hardware ,software, reports
8/3/2019 2008 Question Paper Team C (Aditya Pagariya) (1)
4/41
3.PICK THE ODD MAN OUT..
(A)RAM.(B)ROM.
(C)Hard Disc.
(D)Mouse.
(E)Compact Disc.
8/3/2019 2008 Question Paper Team C (Aditya Pagariya) (1)
5/41
4.WHAT IS NOT TRUE ABOUT DATA
AND INFORMATION?
(A)Information is processed data.
(B)Information is arranged data.(C)Information is data put in a context.
(D)Data leads to a greater understanding of
the situation.
(E)Information enables better decisions.
8/3/2019 2008 Question Paper Team C (Aditya Pagariya) (1)
6/41
5.WHICH OF THE FOLLOWING IS NOT A
REASON TO USE IS IN DECISION MAKING?
a) Automate decisionb) Handle large amount of data
c) Improve response time
d) Handle complexity
e) Improve access to information
8/3/2019 2008 Question Paper Team C (Aditya Pagariya) (1)
7/41
7.ENTERPRISES RESOURCES
PLANNING(ERP)ARE NOT
a) Transaction processing system
b) Used to integrate business process acrosscompany departments
c) Inexpensive to procure, adapt & install
d) Helpful only in planning stages
e) C&D
8/3/2019 2008 Question Paper Team C (Aditya Pagariya) (1)
8/41
8.PICK THE ODD MAN OUT
a) Star
b) Bus
c) Loop
d) Mesh
e) Ring
8/3/2019 2008 Question Paper Team C (Aditya Pagariya) (1)
9/41
9. IN SDLC, WHEN IS THE PROJECT TEAM
ASSEMBLED?
a) At the start of the Feasibility
b) After the Feasibility is positive
c) When the management decides to go in for a new
system
d) When the programming starts
e) When the design starts
8/3/2019 2008 Question Paper Team C (Aditya Pagariya) (1)
10/41
10. WHAT IS SSL ?
a) Secure Sign-on Layer
b) Secure Socket Layer
c) Secure Software Layer
d) Secure Session Layer
e) Safe Software Layer
8/3/2019 2008 Question Paper Team C (Aditya Pagariya) (1)
11/41
12. TO BE PART OF A LAN, A COMPUTER
SHOULD BE EQUIPPED WITH:
a) Token Ring
b) Ethernet
c) Network Interface Card
d) a OR b
e) (a OR b) plus c
8/3/2019 2008 Question Paper Team C (Aditya Pagariya) (1)
12/41
16. WHICH ONE OF THE FOLLOWING IS AN
EXAMPLE OF A DECISION AT A TACTICAL LEVEL
OF MANAGEMENT
a) Opening a new country operation
b) Deciding to develop a new product
c) Tracking daily sales
d) Appraising employee performance
e) Scheduling production
8/3/2019 2008 Question Paper Team C (Aditya Pagariya) (1)
13/41
17. A TROJAN HORSE IS:
a) Does not spread by itself
b) Is used by people to defraud banks
c) Can be used to encrypt files for security
d) Invented by a Greek hacker
e) A popular computer game
8/3/2019 2008 Question Paper Team C (Aditya Pagariya) (1)
14/41
18. THE FOLLOWING IS/ARE PROCESS
MODELS FOR IS DEVELOPMENT:
a) Analysis, Design & Development
b) Waterfall, RAD, prototyping
c) Business Analysis, Technical Design,
Implementation
d) Use interviews, Design & Construction
e) Design, Development & QA
8/3/2019 2008 Question Paper Team C (Aditya Pagariya) (1)
15/41
19. THE ISO/OSI MODEL IS NOT:
a) A7-layer model
b) An enabler of standardizationc) Vendor specific
d) About segregation of functions among layers
e) All the above
8/3/2019 2008 Question Paper Team C (Aditya Pagariya) (1)
16/41
20. PICK THE FALSE STATEMENT(S)
FROM BELOW:
a) Baud rate is signaling speed while bit rate is
transmission speed
b) Baud rate can at best equal bit rate
c) Baud rate is always higher than bit rate
d) a & c
e) a & b
8/3/2019 2008 Question Paper Team C (Aditya Pagariya) (1)
17/41
21.WHICH OF THE FOLLOWING IS NOTA
TRUE STATEMENT ABOUT A ROUTER?
a.) Handles different protocols
b.) Used mainly for amplification &restoration of signals in a WAN
c. ) Uses to separate different network
segments
d. ) Uses logical addressese. ) Can route communication to another
router if destination is unknown
8/3/2019 2008 Question Paper Team C (Aditya Pagariya) (1)
18/41
22. PICK THE STATEMENT(S) THAT DO NOT
DESCRIBE THE RAD MODEL:
a. It is focused on speed
b. It requires extensive user participation
c. It achieves optimal technical performance
d. It is not suitable for complex scientific applications
e. All of the above
8/3/2019 2008 Question Paper Team C (Aditya Pagariya) (1)
19/41
24. MODULATION TECHNIQUES CANNOT
a. enable transmission of digital signals over an
analog carrier
b. help reduce ups and downs in transmission
c. Can modify amplitude, frequency or phase of
the carrier
d. reduce risk of interference
e. b&d
8/3/2019 2008 Question Paper Team C (Aditya Pagariya) (1)
20/41
25. IN EXCEL, WHAT DOES $A$1INDICATE IN A
FORMULA?
a. The cell holds currency value
b. The reference always points to the same cell
c. All numbers in the cell will be converted intoDollars
d. It will change when you copy the formula to
another cell
e. It is a cell in another sheet
8/3/2019 2008 Question Paper Team C (Aditya Pagariya) (1)
21/41
27. EXCEL ENABLES:
a. a 2-D representation of problems
b. Supports formulae entry
c. Provides built-in functions
d. Helps decision making
e. All the above
8/3/2019 2008 Question Paper Team C (Aditya Pagariya) (1)
22/41
28. AN OPERATING SYSTEM IS TO APC
a. What a General is to an army
b.
What intelligence is to a living beingc. What a hammer is to a worker
d. What a film director is to a movie
e. None of the above
8/3/2019 2008 Question Paper Team C (Aditya Pagariya) (1)
23/41
29. HALF DUPLEX COMMUNICATION IMPLIES:
a. One side is human & the other side is a computer
b.
Only one party can communicate at a timec. Communication is always in one direction
d. Only half the transmission is guaranteed to be
delivered
e. Uses50%
Time Division multiplexing
8/3/2019 2008 Question Paper Team C (Aditya Pagariya) (1)
24/41
30. SOLVER IN EXCEL:
a. Is a HELP facility to solve problems
b. Is for optimization of problems
c. Helps back calculation of inputs from a givengoal
d. Helps create Macros
e. Is for entering scientific formula
8/3/2019 2008 Question Paper Team C (Aditya Pagariya) (1)
25/41
Part B
8/3/2019 2008 Question Paper Team C (Aditya Pagariya) (1)
26/41
ASYNCHRONOUS COMMUNICATION
Asynchronous communications is the method of
communications most widely used for PC
communications.
Through asynchronous communications, data istransmitted one byte at a time with each byte
containing one start bit, eight data bits, and one
stop bit, thus yielding a total of ten bits.
The asynchronous communication technique is a
transmission technique which is most widelyused by personal computers to provide
connectivity to printers, modems, fax machines,
etc.
8/3/2019 2008 Question Paper Team C (Aditya Pagariya) (1)
27/41
SYNCHRONOUS COMMUNICATION
Through synchronous communications, data is
transmitted as frames of large data blocks rather
than bulky individual bytes.
Advantage of synchronous is that it is moreefficient than asynchronous.
Some examples are e-mail messages, discussion
boards, blogging, and text messaging over cell
phones.
8/3/2019 2008 Question Paper Team C (Aditya Pagariya) (1)
28/41
DIFFERENCE BETWEEN SYNCHRONOUS ANDASYNCHRONOUS COMMUNICATION
It is based on
synchronization between the
sender and the receiver
This communication doesn't
need any synchronization
between the sender and the
receiver
Both must be synchronized
before actual communication
takes place
Sender may send the information
at anytime without waiting for
the receiver to be ready to receive
the information
in synch comm between two
nodes, first connection will be
established and the
communication will take place
in asynch comm there is no need
to establish a connection before
data transmission
8/3/2019 2008 Question Paper Team C (Aditya Pagariya) (1)
29/41
Q3]A) COMPUTER VIRUSES
oA computer virus is a small software
program that spreads from one computer to
another computer and that interferes with
computer operation. A computer virus may
corrupt or delete data on a computer, use
an e-mail program to spread the virus to
other computers, or even delete everything
on the hard disk.
8/3/2019 2008 Question Paper Team C (Aditya Pagariya) (1)
30/41
TYPES OF COMPUTER VIRUSES
y Boot sector virus
y Browser highjacker
y Direct action viruses
y File infected viruses
y Macro viruses
y Multi partite viruses
y Resident viruses
8/3/2019 2008 Question Paper Team C (Aditya Pagariya) (1)
31/41
Q3]B)DECISION SUPPORT SYSTEMS
oAdecision support system (DSS) is a
computer-based information system that
supports business or organizational decision-
making activities. DSSs serve the
management, operations, and planning
levels of an organization and help to make
decisions, which may be rapidly changing
and not easily specified in advance.
8/3/2019 2008 Question Paper Team C (Aditya Pagariya) (1)
32/41
Q:3(C) PROTOTYPING APPROACH AND ITS
PROS AND CORNS
Prototyping is the process of building a
model of a system. In terms of an
information system, prototypes areemployed to help system designers build an
information system that intuitive and easy
to manipulate for end users.
Prototyping is an iterative process that ispart of the analysis phase of the systems
development life cycle.
8/3/2019 2008 Question Paper Team C (Aditya Pagariya) (1)
33/41
Pros
Reduces development time.
Reduces development costs.
Requires user involvement.
Developers receive quantifiable user feedback.
Facilitates system implementation since users know
what to expect.
Results in higher user satisfaction.
Exposes developers to potential future system
enhancements.
8/3/2019 2008 Question Paper Team C (Aditya Pagariya) (1)
34/41
Cons
Can lead to insufficient analysis.
Users expect the performance of the ultimate system
to be the same as the prototype.
Developers can become too attached to their prototypes Can cause systems to be left unfinished and/or
implemented before they are ready.
Sometimes leads to incomplete documentation.
If sophisticated software prototypes (4th GL or CASETools) are employed, the time saving benefit of
prototyping can be lost.
8/3/2019 2008 Question Paper Team C (Aditya Pagariya) (1)
35/41
Q:3(D) PUBLIC KEY INFRASTRUCTURE
PKI is a security architecture that has beenintroduced to provide an increased level of confidencefor exchanging information over an increasinglyinsecure Internet.
A PKI including the use of encryption, digital
signatures, public keys, private keys, digitalcertificates, Certificate Authorities, certificaterevocation and storage. A PKI infrastructure isexpected to offer its users the following benefits:
certainty of the quality of information sent andreceived electronically
certainty of the source and destination of thatinformation
certainty of the privacy of that information
8/3/2019 2008 Question Paper Team C (Aditya Pagariya) (1)
36/41
WHAT DO YOU UNDERSTAND BY E-BUSINESS ?
Electronic Business is commonly defined as e-
business is the conduct of business on the
internet ,not only buying and selling of goods
and services but also servicing customers andcollaborating with business partners and
conducting electronic transactions within an
organization.
One of the best examples of e-business isAmazon n e BAY
8/3/2019 2008 Question Paper Team C (Aditya Pagariya) (1)
37/41
CONT.
E-business can be conducted using the web andthe internet.
Virtual Organization
Eg- ebay
Click and Mortar OrganizationsEg- Walmart
E-business covers the entire business process:
Electronic purchasing and
supply chain management, processing orders
electronically which involve online payment via
credit cards or debit cards, handling customer
service.
8/3/2019 2008 Question Paper Team C (Aditya Pagariya) (1)
38/41
E-BUSINESS HELPS WITH REAL
LIFE BUSINESS:
Cut costs and transaction times
Save time and money by improving
internal and external functions
Promote, market and sell around the
world around the clock through a website
Improve customer support,communication and relationship
management
Compete globally without setting offices
8/3/2019 2008 Question Paper Team C (Aditya Pagariya) (1)
39/41
Q5]IN EXCEL,
WHAT IS MEANT BYGOAL SEEK? EG?
Goal Seek is part of a suite of commands sometimes called what-if
analysis tools. When you know the desired result of a
single formula but not the input value the formula needs to
determine the result. When goal seeking, Microsoft Excel varies
the value in one specific cell until a formula that's dependent on
that cell returns the result you want.
8/3/2019 2008 Question Paper Team C (Aditya Pagariya) (1)
40/41
GOAL SEEK
For example, use Goal Seek to change the
interest rate in cell B3 incrementally until the
payment value in B4 equals $900.00.
8/3/2019 2008 Question Paper Team C (Aditya Pagariya) (1)
41/41
Thank You