2008 question paper team c (aditya pagariya) (1)

Upload: santakumar51

Post on 06-Apr-2018

217 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/3/2019 2008 Question Paper Team C (Aditya Pagariya) (1)

    1/41

    PG PROGRAM 2008QUESTION PAPER

    PRESENTATION

    PRESENTED BY:TEAM-C

    Section - E

  • 8/3/2019 2008 Question Paper Team C (Aditya Pagariya) (1)

    2/41

    Part A

    (mcqS)

  • 8/3/2019 2008 Question Paper Team C (Aditya Pagariya) (1)

    3/41

    1.COMPUTER IS A/ANDEVICE

    THAT ACCEPTS DATA AND ASINPUTS AND PRODUCES .AS

    OUTPUT.

    (A)Electronic , information, instruction

    (B) Electronic ,instruction , information

    (C)Automatic ,information , instruction

    (D)Computing ,data , information

    (E)Hardware ,software, reports

  • 8/3/2019 2008 Question Paper Team C (Aditya Pagariya) (1)

    4/41

    3.PICK THE ODD MAN OUT..

    (A)RAM.(B)ROM.

    (C)Hard Disc.

    (D)Mouse.

    (E)Compact Disc.

  • 8/3/2019 2008 Question Paper Team C (Aditya Pagariya) (1)

    5/41

    4.WHAT IS NOT TRUE ABOUT DATA

    AND INFORMATION?

    (A)Information is processed data.

    (B)Information is arranged data.(C)Information is data put in a context.

    (D)Data leads to a greater understanding of

    the situation.

    (E)Information enables better decisions.

  • 8/3/2019 2008 Question Paper Team C (Aditya Pagariya) (1)

    6/41

    5.WHICH OF THE FOLLOWING IS NOT A

    REASON TO USE IS IN DECISION MAKING?

    a) Automate decisionb) Handle large amount of data

    c) Improve response time

    d) Handle complexity

    e) Improve access to information

  • 8/3/2019 2008 Question Paper Team C (Aditya Pagariya) (1)

    7/41

    7.ENTERPRISES RESOURCES

    PLANNING(ERP)ARE NOT

    a) Transaction processing system

    b) Used to integrate business process acrosscompany departments

    c) Inexpensive to procure, adapt & install

    d) Helpful only in planning stages

    e) C&D

  • 8/3/2019 2008 Question Paper Team C (Aditya Pagariya) (1)

    8/41

    8.PICK THE ODD MAN OUT

    a) Star

    b) Bus

    c) Loop

    d) Mesh

    e) Ring

  • 8/3/2019 2008 Question Paper Team C (Aditya Pagariya) (1)

    9/41

    9. IN SDLC, WHEN IS THE PROJECT TEAM

    ASSEMBLED?

    a) At the start of the Feasibility

    b) After the Feasibility is positive

    c) When the management decides to go in for a new

    system

    d) When the programming starts

    e) When the design starts

  • 8/3/2019 2008 Question Paper Team C (Aditya Pagariya) (1)

    10/41

    10. WHAT IS SSL ?

    a) Secure Sign-on Layer

    b) Secure Socket Layer

    c) Secure Software Layer

    d) Secure Session Layer

    e) Safe Software Layer

  • 8/3/2019 2008 Question Paper Team C (Aditya Pagariya) (1)

    11/41

    12. TO BE PART OF A LAN, A COMPUTER

    SHOULD BE EQUIPPED WITH:

    a) Token Ring

    b) Ethernet

    c) Network Interface Card

    d) a OR b

    e) (a OR b) plus c

  • 8/3/2019 2008 Question Paper Team C (Aditya Pagariya) (1)

    12/41

    16. WHICH ONE OF THE FOLLOWING IS AN

    EXAMPLE OF A DECISION AT A TACTICAL LEVEL

    OF MANAGEMENT

    a) Opening a new country operation

    b) Deciding to develop a new product

    c) Tracking daily sales

    d) Appraising employee performance

    e) Scheduling production

  • 8/3/2019 2008 Question Paper Team C (Aditya Pagariya) (1)

    13/41

    17. A TROJAN HORSE IS:

    a) Does not spread by itself

    b) Is used by people to defraud banks

    c) Can be used to encrypt files for security

    d) Invented by a Greek hacker

    e) A popular computer game

  • 8/3/2019 2008 Question Paper Team C (Aditya Pagariya) (1)

    14/41

    18. THE FOLLOWING IS/ARE PROCESS

    MODELS FOR IS DEVELOPMENT:

    a) Analysis, Design & Development

    b) Waterfall, RAD, prototyping

    c) Business Analysis, Technical Design,

    Implementation

    d) Use interviews, Design & Construction

    e) Design, Development & QA

  • 8/3/2019 2008 Question Paper Team C (Aditya Pagariya) (1)

    15/41

    19. THE ISO/OSI MODEL IS NOT:

    a) A7-layer model

    b) An enabler of standardizationc) Vendor specific

    d) About segregation of functions among layers

    e) All the above

  • 8/3/2019 2008 Question Paper Team C (Aditya Pagariya) (1)

    16/41

    20. PICK THE FALSE STATEMENT(S)

    FROM BELOW:

    a) Baud rate is signaling speed while bit rate is

    transmission speed

    b) Baud rate can at best equal bit rate

    c) Baud rate is always higher than bit rate

    d) a & c

    e) a & b

  • 8/3/2019 2008 Question Paper Team C (Aditya Pagariya) (1)

    17/41

    21.WHICH OF THE FOLLOWING IS NOTA

    TRUE STATEMENT ABOUT A ROUTER?

    a.) Handles different protocols

    b.) Used mainly for amplification &restoration of signals in a WAN

    c. ) Uses to separate different network

    segments

    d. ) Uses logical addressese. ) Can route communication to another

    router if destination is unknown

  • 8/3/2019 2008 Question Paper Team C (Aditya Pagariya) (1)

    18/41

    22. PICK THE STATEMENT(S) THAT DO NOT

    DESCRIBE THE RAD MODEL:

    a. It is focused on speed

    b. It requires extensive user participation

    c. It achieves optimal technical performance

    d. It is not suitable for complex scientific applications

    e. All of the above

  • 8/3/2019 2008 Question Paper Team C (Aditya Pagariya) (1)

    19/41

    24. MODULATION TECHNIQUES CANNOT

    a. enable transmission of digital signals over an

    analog carrier

    b. help reduce ups and downs in transmission

    c. Can modify amplitude, frequency or phase of

    the carrier

    d. reduce risk of interference

    e. b&d

  • 8/3/2019 2008 Question Paper Team C (Aditya Pagariya) (1)

    20/41

    25. IN EXCEL, WHAT DOES $A$1INDICATE IN A

    FORMULA?

    a. The cell holds currency value

    b. The reference always points to the same cell

    c. All numbers in the cell will be converted intoDollars

    d. It will change when you copy the formula to

    another cell

    e. It is a cell in another sheet

  • 8/3/2019 2008 Question Paper Team C (Aditya Pagariya) (1)

    21/41

    27. EXCEL ENABLES:

    a. a 2-D representation of problems

    b. Supports formulae entry

    c. Provides built-in functions

    d. Helps decision making

    e. All the above

  • 8/3/2019 2008 Question Paper Team C (Aditya Pagariya) (1)

    22/41

    28. AN OPERATING SYSTEM IS TO APC

    a. What a General is to an army

    b.

    What intelligence is to a living beingc. What a hammer is to a worker

    d. What a film director is to a movie

    e. None of the above

  • 8/3/2019 2008 Question Paper Team C (Aditya Pagariya) (1)

    23/41

    29. HALF DUPLEX COMMUNICATION IMPLIES:

    a. One side is human & the other side is a computer

    b.

    Only one party can communicate at a timec. Communication is always in one direction

    d. Only half the transmission is guaranteed to be

    delivered

    e. Uses50%

    Time Division multiplexing

  • 8/3/2019 2008 Question Paper Team C (Aditya Pagariya) (1)

    24/41

    30. SOLVER IN EXCEL:

    a. Is a HELP facility to solve problems

    b. Is for optimization of problems

    c. Helps back calculation of inputs from a givengoal

    d. Helps create Macros

    e. Is for entering scientific formula

  • 8/3/2019 2008 Question Paper Team C (Aditya Pagariya) (1)

    25/41

    Part B

  • 8/3/2019 2008 Question Paper Team C (Aditya Pagariya) (1)

    26/41

    ASYNCHRONOUS COMMUNICATION

    Asynchronous communications is the method of

    communications most widely used for PC

    communications.

    Through asynchronous communications, data istransmitted one byte at a time with each byte

    containing one start bit, eight data bits, and one

    stop bit, thus yielding a total of ten bits.

    The asynchronous communication technique is a

    transmission technique which is most widelyused by personal computers to provide

    connectivity to printers, modems, fax machines,

    etc.

  • 8/3/2019 2008 Question Paper Team C (Aditya Pagariya) (1)

    27/41

    SYNCHRONOUS COMMUNICATION

    Through synchronous communications, data is

    transmitted as frames of large data blocks rather

    than bulky individual bytes.

    Advantage of synchronous is that it is moreefficient than asynchronous.

    Some examples are e-mail messages, discussion

    boards, blogging, and text messaging over cell

    phones.

  • 8/3/2019 2008 Question Paper Team C (Aditya Pagariya) (1)

    28/41

    DIFFERENCE BETWEEN SYNCHRONOUS ANDASYNCHRONOUS COMMUNICATION

    It is based on

    synchronization between the

    sender and the receiver

    This communication doesn't

    need any synchronization

    between the sender and the

    receiver

    Both must be synchronized

    before actual communication

    takes place

    Sender may send the information

    at anytime without waiting for

    the receiver to be ready to receive

    the information

    in synch comm between two

    nodes, first connection will be

    established and the

    communication will take place

    in asynch comm there is no need

    to establish a connection before

    data transmission

  • 8/3/2019 2008 Question Paper Team C (Aditya Pagariya) (1)

    29/41

    Q3]A) COMPUTER VIRUSES

    oA computer virus is a small software

    program that spreads from one computer to

    another computer and that interferes with

    computer operation. A computer virus may

    corrupt or delete data on a computer, use

    an e-mail program to spread the virus to

    other computers, or even delete everything

    on the hard disk.

  • 8/3/2019 2008 Question Paper Team C (Aditya Pagariya) (1)

    30/41

    TYPES OF COMPUTER VIRUSES

    y Boot sector virus

    y Browser highjacker

    y Direct action viruses

    y File infected viruses

    y Macro viruses

    y Multi partite viruses

    y Resident viruses

  • 8/3/2019 2008 Question Paper Team C (Aditya Pagariya) (1)

    31/41

    Q3]B)DECISION SUPPORT SYSTEMS

    oAdecision support system (DSS) is a

    computer-based information system that

    supports business or organizational decision-

    making activities. DSSs serve the

    management, operations, and planning

    levels of an organization and help to make

    decisions, which may be rapidly changing

    and not easily specified in advance.

  • 8/3/2019 2008 Question Paper Team C (Aditya Pagariya) (1)

    32/41

    Q:3(C) PROTOTYPING APPROACH AND ITS

    PROS AND CORNS

    Prototyping is the process of building a

    model of a system. In terms of an

    information system, prototypes areemployed to help system designers build an

    information system that intuitive and easy

    to manipulate for end users.

    Prototyping is an iterative process that ispart of the analysis phase of the systems

    development life cycle.

  • 8/3/2019 2008 Question Paper Team C (Aditya Pagariya) (1)

    33/41

    Pros

    Reduces development time.

    Reduces development costs.

    Requires user involvement.

    Developers receive quantifiable user feedback.

    Facilitates system implementation since users know

    what to expect.

    Results in higher user satisfaction.

    Exposes developers to potential future system

    enhancements.

  • 8/3/2019 2008 Question Paper Team C (Aditya Pagariya) (1)

    34/41

    Cons

    Can lead to insufficient analysis.

    Users expect the performance of the ultimate system

    to be the same as the prototype.

    Developers can become too attached to their prototypes Can cause systems to be left unfinished and/or

    implemented before they are ready.

    Sometimes leads to incomplete documentation.

    If sophisticated software prototypes (4th GL or CASETools) are employed, the time saving benefit of

    prototyping can be lost.

  • 8/3/2019 2008 Question Paper Team C (Aditya Pagariya) (1)

    35/41

    Q:3(D) PUBLIC KEY INFRASTRUCTURE

    PKI is a security architecture that has beenintroduced to provide an increased level of confidencefor exchanging information over an increasinglyinsecure Internet.

    A PKI including the use of encryption, digital

    signatures, public keys, private keys, digitalcertificates, Certificate Authorities, certificaterevocation and storage. A PKI infrastructure isexpected to offer its users the following benefits:

    certainty of the quality of information sent andreceived electronically

    certainty of the source and destination of thatinformation

    certainty of the privacy of that information

  • 8/3/2019 2008 Question Paper Team C (Aditya Pagariya) (1)

    36/41

    WHAT DO YOU UNDERSTAND BY E-BUSINESS ?

    Electronic Business is commonly defined as e-

    business is the conduct of business on the

    internet ,not only buying and selling of goods

    and services but also servicing customers andcollaborating with business partners and

    conducting electronic transactions within an

    organization.

    One of the best examples of e-business isAmazon n e BAY

  • 8/3/2019 2008 Question Paper Team C (Aditya Pagariya) (1)

    37/41

    CONT.

    E-business can be conducted using the web andthe internet.

    Virtual Organization

    Eg- ebay

    Click and Mortar OrganizationsEg- Walmart

    E-business covers the entire business process:

    Electronic purchasing and

    supply chain management, processing orders

    electronically which involve online payment via

    credit cards or debit cards, handling customer

    service.

  • 8/3/2019 2008 Question Paper Team C (Aditya Pagariya) (1)

    38/41

    E-BUSINESS HELPS WITH REAL

    LIFE BUSINESS:

    Cut costs and transaction times

    Save time and money by improving

    internal and external functions

    Promote, market and sell around the

    world around the clock through a website

    Improve customer support,communication and relationship

    management

    Compete globally without setting offices

  • 8/3/2019 2008 Question Paper Team C (Aditya Pagariya) (1)

    39/41

    Q5]IN EXCEL,

    WHAT IS MEANT BYGOAL SEEK? EG?

    Goal Seek is part of a suite of commands sometimes called what-if

    analysis tools. When you know the desired result of a

    single formula but not the input value the formula needs to

    determine the result. When goal seeking, Microsoft Excel varies

    the value in one specific cell until a formula that's dependent on

    that cell returns the result you want.

  • 8/3/2019 2008 Question Paper Team C (Aditya Pagariya) (1)

    40/41

    GOAL SEEK

    For example, use Goal Seek to change the

    interest rate in cell B3 incrementally until the

    payment value in B4 equals $900.00.

  • 8/3/2019 2008 Question Paper Team C (Aditya Pagariya) (1)

    41/41

    Thank You