{"id":24413,"date":"2013-03-16T12:02:00","date_gmt":"2013-03-16T06:32:00","guid":{"rendered":"http:\/\/www.kopykitab.com\/blog\/?p=24413"},"modified":"2020-06-01T10:16:24","modified_gmt":"2020-06-01T04:46:24","slug":"ca-pe-ii-exam-papers-group-ii-information-technology-november-2009","status":"publish","type":"post","link":"https:\/\/www.kopykitab.com\/blog\/ca-pe-ii-exam-papers-group-ii-information-technology-november-2009\/","title":{"rendered":"CA PE II Exam Papers Group II Information Technology November 2009"},"content":{"rendered":"<h1 style=\"text-align: center\">CA PE II \u00a0Exam Papers \u00a0Group\u00a0II<\/h1>\n<h1 style=\"text-align: center\">Information Technology November 2009<\/h1>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>This\u00a0Paper\u00a0has 48 answerable questions with 0 answered.<\/p>\n<p>Total No. of Questions \u2014 7]<br \/>\nTime Allowed : 3 Hours<\/p>\n<p>Maximum Marks : 100<br \/>\nQuestion\u00a0No.1 is compulsory<br \/>\nAnswer any four from the rest<br \/>\nMarks<br \/>\n1. (a) Convert the following from one number system to another number system along with the working notes: 1&#215;5=5<br \/>\n(i)<br \/>\n(43.375)10 = ( ) 2<br \/>\n(0)<br \/>\n(ii)<br \/>\n(243)8 = ( ) 16<br \/>\n(0)<br \/>\n(iii)<br \/>\n(7B.773)16 = ( ) 10<br \/>\n(0)<br \/>\n(iv)<br \/>\n(163)10 = ( ) 8<br \/>\n(0)<br \/>\n(v)<br \/>\n(1000001.1010011)2 = ( ) 10<br \/>\n(0)<br \/>\n(b) Describe briefly, the following terms with reference to\u00a0Information Technology: 1&#215;5=5<br \/>\n(i) ASCII (0)<br \/>\n(ii) Access Time (0)<br \/>\n(iii) Extranet (0)<br \/>\n(iv) Repeater (0)<br \/>\n(v) Overlaying (0)<br \/>\n(c) Give one or more reasons of use for each of the following: 1&#215;5=5<br \/>\n(i) RS\u2013232C Port (0)<br \/>\n(ii) Circuit Switching (0)<br \/>\n(iii) Address Bus (0)<br \/>\n(iv) Cache memory in a processor (0)<br \/>\n(v) Digital Signature (0)<br \/>\n(d) Write True of False for each of the following: 1&#215;5=5<br \/>\n(i) Flash memory is a volatile memory. (0)<br \/>\n(ii) Data bus is a mechanical device that connects CPU and other hardware devices on the motherboard. (0)<br \/>\n(iii) An object program is a machine language program that can be directly executed by a particular computer. (0)<br \/>\n(iv) MS\u2013Windows is a multiprogramming and multitasking operating system. (0)<br \/>\n(v) More RAM can make the\u00a0computer run faster. (0)<br \/>\n2. Distinguish between the following: 4&#215;5=20<br \/>\n(i) CMOS and BIOS (0)<br \/>\n(ii) Dumb terminal and Intelligent terminal (0)<br \/>\n(iii) Batch processing and Interactive processing (0)<br \/>\n(iv) Synchronous transmission and Asynchronous transmission (0)<br \/>\n(v) Black box approach of audit and White box approach of audit. (0)<br \/>\n3. (a) What is meant by the \u2018Direct Access File Organization\u2019? Describe the &#8220;Direct Sequential Access&#8221; method. 5 (0)<br \/>\n(b) What is Decision Support System? Explain various components of Decision Support System. 5 (0)<br \/>\n(c) A\u00a0book publisher\u00a0of Accounts and Computer books offers discount to customers on the basis of Customer type and Subject as detailed below:<br \/>\nCustomer type Subject Discount (%)<br \/>\nBook seller<\/p>\n<p>Library Accounts<br \/>\nComputer<br \/>\nAccounts<br \/>\nComputer 10<br \/>\n20<br \/>\n5<br \/>\n10<br \/>\nIf number of copies purchased is more than 10, then additional discount of 2% is allowed irrespective of the customer type and subject.<\/p>\n<p>It is also assumed that there are 25 customers and complete details of each customer like customer name, type, subject, number of copies and unit price is required to be entered through the console.<\/p>\n<p>Draw a program flow chart to calculate and print the net amount paid by each customer along with customer name. Also print the total discount allowed to all the customers.<\/p>\n<p>10 (0)<br \/>\n4. (a) Describe \u2018Mesh Network\u2019 as a\u00a0network topology. Also mention its advantages and disadvantages. 5 (0)<br \/>\n(b) Explain various\u00a0security\u00a0mechanisms to protect the information from intrusion and misuse. 5 (0)<br \/>\n(c) What is Document imaging? Explain various steps required for document imaging along with its advantages. 10 (0)<br \/>\n5. (a) Explain various data integrity controls, which are used in a\u00a0database\u00a0environment to ensure the accuracy and completeness of data. 5 (0)<br \/>\n(b) Write the various steps for creating a new macro in MS\u2013Excel. 5 (0)<br \/>\n(c) Power Point 2000 offers different views to help you to create your presentations. Describe them briefly. 5 (0)<br \/>\n(d) Define the following functions used in MS\u2013Excel: 5<br \/>\n(i) ROUND (0)<br \/>\n(ii) LEN (0)<br \/>\n(iii) DCOUNT (0)<br \/>\n(iv) DB (0)<br \/>\n(v) LOWER (0)<br \/>\n6. (a) What are the conditions prescribed in IT Act, 2000 for the purpose of Electronic Governance to retain documents, records or information in electronic form for any specified period? 5 (0)<br \/>\n(b) Explain the following miscellaneous techniques of audit in a computerized environment :<br \/>\n(i) System Activity file interrogation<br \/>\n(ii) Program Comparison<br \/>\n5 (0)<br \/>\n(c) Explain salient features of E.X. NGN Financial\u00a0Accounting package. 5 (0)<br \/>\n(d) Explain Local Area Network (LAN) and its basic components. 5 (0)<br \/>\n7. Write short notes on any four of the following : 5&#215;4=20<br \/>\n(i) Diagnostic Routines (0)<br \/>\n(ii) Electronic Data Interchange (EDI) (0)<br \/>\n(iii) Graphical User Interface (GUI) (0)<br \/>\n(iv) Turn Around Documents (0)<br \/>\n(v) Storage Area Network (SAN) (0)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CA PE II \u00a0Exam Papers \u00a0Group\u00a0II Information Technology November 2009 &nbsp; &nbsp; This\u00a0Paper\u00a0has 48 answerable questions with 0 answered. Total No. of Questions \u2014 7] Time Allowed : 3 Hours Maximum Marks : 100 Question\u00a0No.1 is compulsory Answer any four from the rest Marks 1. (a) Convert the following from one number system to another &#8230; <a title=\"CA PE II Exam Papers Group II Information Technology November 2009\" class=\"read-more\" href=\"https:\/\/www.kopykitab.com\/blog\/ca-pe-ii-exam-papers-group-ii-information-technology-november-2009\/\" aria-label=\"More on CA PE II Exam Papers Group II Information Technology November 2009\">Read more<\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"","fifu_image_alt":""},"categories":[4731,120,4930],"tags":[],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.kopykitab.com\/blog\/wp-json\/wp\/v2\/posts\/24413"}],"collection":[{"href":"https:\/\/www.kopykitab.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kopykitab.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kopykitab.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kopykitab.com\/blog\/wp-json\/wp\/v2\/comments?post=24413"}],"version-history":[{"count":0,"href":"https:\/\/www.kopykitab.com\/blog\/wp-json\/wp\/v2\/posts\/24413\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.kopykitab.com\/blog\/wp-json\/wp\/v2\/media?parent=24413"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kopykitab.com\/blog\/wp-json\/wp\/v2\/categories?post=24413"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kopykitab.com\/blog\/wp-json\/wp\/v2\/tags?post=24413"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}