{"id":24417,"date":"2013-03-16T13:59:17","date_gmt":"2013-03-16T08:29:17","guid":{"rendered":"http:\/\/www.kopykitab.com\/blog\/?p=24417"},"modified":"2020-06-01T10:16:24","modified_gmt":"2020-06-01T04:46:24","slug":"ca-pe-ii-question-papers-group-ii-information-technology-june-2009","status":"publish","type":"post","link":"https:\/\/www.kopykitab.com\/blog\/ca-pe-ii-question-papers-group-ii-information-technology-june-2009\/","title":{"rendered":"CA PE II Question Papers Group II Information Technology June 2009"},"content":{"rendered":"<h1 style=\"text-align: center\">CA PE II Question Papers Group\u00a0II<\/h1>\n<h1 style=\"text-align: center\">\u00a0Information Technology June 2009<\/h1>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>This\u00a0Paper\u00a0has 53 answerable questions with 0 answered.<\/p>\n<p>Total No. of Questions \u2014 7]<br \/>\nTime Allowed : 3 Hours<\/p>\n<p>Maximum Marks : 100<br \/>\nAnswers to questions\u00a0are to be given only in English except in the cases of candidates who have opted for Hindi medium. If a candidate who has not opted for Hindi medium,\u00a0answers\u00a0in Hindi, his\u00a0answers\u00a0in Hindi will not be valued.<br \/>\nQuestion\u00a0No.1 is compulsory<br \/>\nAnswer any four from the rest<br \/>\nMarks<br \/>\n1. (a) Convert the following from one number system to another number system along with the working notes: 1&#215;5=5<br \/>\n(i)<br \/>\n(101.011)2 =( ) 10<br \/>\n(0)<br \/>\n(ii)<br \/>\n(173.45)10 = ( ) 8<br \/>\n(0)<br \/>\n(iii)<br \/>\n(3314.4)10 = ( ) 16<br \/>\n(0)<br \/>\n(iv)<br \/>\n(4B23.3)16 = ( ) 10<br \/>\n(0)<br \/>\n(v)<br \/>\n(0234.14)8 = ( ) 10<br \/>\n(0)<br \/>\n(b) Give brief answer of the following: 1&#215;5=5<br \/>\n(i) What is the concept of\u00a0Firmware? (0)<br \/>\n(ii) Give one application area where Hierarchical\u00a0database\u00a0structure is most successful. (0)<br \/>\n(iii) In communication protocol, what does Semantics stand for? (0)<br \/>\n(iv) Why L1 cache memory is better than L2 cache memory? (0)<br \/>\n(v) Give at least one condition where IT Act, 2000 shall not be applicable. (0)<br \/>\n(c) Give one or more reasons of use for each of the following: 1&#215;5=5<br \/>\n(i) Driver (0)<br \/>\n(ii) Firewall (0)<br \/>\n(iii) Router (0)<br \/>\n(iv) Spooling Software (0)<br \/>\n(v) DDL (0)<br \/>\n(d) Write True or False for each of the following with justification: 1&#215;5=5<br \/>\n(i) Thermal printer is an\u00a0impact printer. (0)<br \/>\n(ii) DML is used for processing of data in\u00a0database. (0)<br \/>\n(iii) Browser is a client hardware device used to look at various kinds of Internet resources. (0)<br \/>\n(iv) Smart terminals are non\u2013user programmable. (0)<br \/>\n(v) Multiprocessing refers to the use of two or more CPUs to perform work. (0)<br \/>\n2. Distinguish between the following: 4&#215;5=20<br \/>\n(i) Hardware and Software (0)<br \/>\n(ii) Data bus and Address bus (0)<br \/>\n(iii) Circuit switching and Packet switching (0)<br \/>\n(iv) Compiler and Interpreter (0)<br \/>\n(v) Social portal and Transaction portal (0)<br \/>\n3. (a) Discuss the managerial problems of File processing system. 5 (0)<br \/>\n(b) Explain the salient features of Bus networking topology. 5 (0)<br \/>\n(c) A labourer in a manufacturing company gets his wage as per following calculations:<br \/>\nBasic pay =<br \/>\n=<br \/>\n= 10 \ufffd\u2013N if N \u226410<br \/>\n12 \ufffd\u2013N if N \u226415<br \/>\n15 \ufffd\u2013N if N &gt;15<br \/>\nHe is also awarded a quality related bonus as per following norms:<\/p>\n<p>If QI \u2264 0.5;<br \/>\nIf QI \u2264 0.75; Bonus = 0.0<br \/>\nBonus = 10% of basic pay<br \/>\nIf QI \u2264 0.9; Bonus = 20% of basic pay<br \/>\nIf QI &gt; 0.9; Bonus = 30% of basic pay<br \/>\nWhere N = Number of items manufactured<br \/>\nQI = Quality index<br \/>\nFor the above conditions, draw a flow chart to calculate and print basic pay, bonus and total pay received by the labourer.<\/p>\n<p>10 (0)<br \/>\n4. (a) In what ways issue of data center down time can be resolved efficiently? 5 (0)<br \/>\n(b) Discuss the importance of \u2018Data volume and usage analysis\u2019 in the design of\u00a0database. 5 (0)<br \/>\n(c) What do you mean by\u00a0database? Describe any four components of a\u00a0databaseenvironment. 10 (0)<br \/>\n5. (a) Distinguish between the following with respect to word processing: 3+2=5<br \/>\n(i) Text editor and Word Processor. (0)<br \/>\n(ii) Type face and Font. (0)<br \/>\n(b) What are the different views available in MS\u2013POWER POINT to make the presentation? How can one switch over from one view to another view? 5 (0)<br \/>\n(c) Explain the use of following tools related to MS\u2013WORD: 1&#215;5=5<br \/>\n(i) Drop cap (0)<br \/>\n(ii) Section break (0)<br \/>\n(iii) AutoText (0)<br \/>\n(iv) Autofit (0)<br \/>\n(v) Bullet (0)<br \/>\n(d) Define the following functions with respect to Spread Sheet: 1&#215;5=5<br \/>\n(i) NPER (0)<br \/>\n(ii) PROPER (0)<br \/>\n(iii) PMT (0)<br \/>\n(iv) ROUND (0)<br \/>\n(v) POWER (0)<br \/>\n6. (a) Explain an auditing technique suitable for on-line real\u2013time applications such asbanking. 5 (0)<br \/>\n(b) Explain the various features required in a Generalized Audit Package. 5 (0)<br \/>\n(c) Describe the compositions and powers of Cyber Regulation Appellate Tribunal. 5 (0)<br \/>\n(d) List the possible threats and vulnerabilities to the\u00a0security\u00a0of system assets. 5 (0)<br \/>\n7. Write short notes on any four of the following: 5&#215;4=20<br \/>\n(i) Bubble Memory (0)<br \/>\n(ii) MICR (0)<br \/>\n(iii) Storage Area Network (0)<br \/>\n(iv) Object Oriented Database (0)<br \/>\n(v) Encryption (0)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CA PE II Question Papers Group\u00a0II \u00a0Information Technology June 2009 &nbsp; &nbsp; This\u00a0Paper\u00a0has 53 answerable questions with 0 answered. Total No. of Questions \u2014 7] Time Allowed : 3 Hours Maximum Marks : 100 Answers to questions\u00a0are to be given only in English except in the cases of candidates who have opted for Hindi medium. &#8230; <a title=\"CA PE II Question Papers Group II Information Technology June 2009\" class=\"read-more\" href=\"https:\/\/www.kopykitab.com\/blog\/ca-pe-ii-question-papers-group-ii-information-technology-june-2009\/\" aria-label=\"More on CA PE II Question Papers Group II Information Technology June 2009\">Read more<\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"","fifu_image_alt":""},"categories":[4731,120,4930],"tags":[],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.kopykitab.com\/blog\/wp-json\/wp\/v2\/posts\/24417"}],"collection":[{"href":"https:\/\/www.kopykitab.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kopykitab.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kopykitab.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kopykitab.com\/blog\/wp-json\/wp\/v2\/comments?post=24417"}],"version-history":[{"count":0,"href":"https:\/\/www.kopykitab.com\/blog\/wp-json\/wp\/v2\/posts\/24417\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.kopykitab.com\/blog\/wp-json\/wp\/v2\/media?parent=24417"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kopykitab.com\/blog\/wp-json\/wp\/v2\/categories?post=24417"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kopykitab.com\/blog\/wp-json\/wp\/v2\/tags?post=24417"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}