{"id":24444,"date":"2013-03-16T14:15:06","date_gmt":"2013-03-16T08:45:06","guid":{"rendered":"http:\/\/www.kopykitab.com\/blog\/?p=24444"},"modified":"2020-06-01T10:16:23","modified_gmt":"2020-06-01T04:46:23","slug":"24444","status":"publish","type":"post","link":"https:\/\/www.kopykitab.com\/blog\/24444\/","title":{"rendered":""},"content":{"rendered":"<h1 style=\"text-align: center\">CA PE II Question Papers \u00a0Group\u00a0II<\/h1>\n<h1 style=\"text-align: center\">Information Technology \u00a0May 2007<\/h1>\n<p>&nbsp;<\/p>\n<p>This\u00a0Paper\u00a0has 48 answerable questions with 0 answered.<\/p>\n<p><em id=\"__mceDel\"><br \/>\nTotal No. of Questions\u20147]<br \/>\nTime Allowed : 3 Hours <\/em><\/p>\n<p>Maximum Marks : 100<br \/>\nAnswers to questions\u00a0are to be given only in English except in the cases of candidates who have opted for Hindi medium. If a candidate who has not opted for Hindi medium,\u00a0answers\u00a0in Hindi, his\u00a0answers\u00a0in Hindi will not be valued.<br \/>\nQuestion\u00a0No.1 is compulsory<br \/>\nAnswer\u00a0any four from the rest<br \/>\nMarks<br \/>\n1. (a) Convert the following from one number system to another system along with the working notes: 5&#215;1=5<br \/>\n(i) (3cB 98)18 = ()2 (0)<br \/>\n(ii) (&#8212;&#8212;&#8212;-)16 = 8 (0)<br \/>\n(iii) (111.12)8 = ()2 (0)<br \/>\n(iv) (10101010.101)2 = ()10 (0)<br \/>\n(v) (123.15)10 = ()16 (0)<br \/>\n(b) Describe briefly, the following terms with reference to\u00a0Information Technology: 5&#215;1=5<br \/>\n(i) FTP (0)<br \/>\n(ii) DBMS (0)<br \/>\n(iii) Duplex\u00a0Printing (0)<br \/>\n(iv) Gateways (0)<br \/>\n(v) Asymmetric Crypto System. (0)<br \/>\n(c) Give one or two reasons for each of the following: 5&#215;1=5<br \/>\n(i) Use of Firewall in the system. (0)<br \/>\n(ii) Need of Macro in spread sheet (0)<br \/>\n(iii) Use of USB Port (0)<br \/>\n(iv) Use of Router (0)<br \/>\n(v) Use of Multiplexer (0)<br \/>\n(d) Write True or False for each of the following statements: 5&#215;1=5<br \/>\n(i) Network database\u00a0structure can be used to\u00a0answer\u00a0ad hoe queries. (0)<br \/>\n(ii) Computer Output Microfilm (COM) is Inspire as well as Output device (0)<br \/>\n(iii) One GB represents 10,48,567 bytes. (0)<br \/>\n(iv) Laser printers speed is measured in PPM (0)<br \/>\n(v) Screen resolution is measured in terms of Picture elements. (0)<br \/>\n2. Distinguish between the following: 5&#215;4=20<br \/>\n(i) Master file and Transaction file. (0)<br \/>\n(ii) Logical record and Physical record (0)<br \/>\n(iii) Audio conferencing\u00a0and video conferencing (0)<br \/>\n(iv) Sequential file organisation and Direct file organisation. (0)<br \/>\n(v) Client\u2013server model and Peer to Peer model. (0)<br \/>\n3. (a) Explain in brief, the floppy disk as an auxiliary device. 5 (0)<br \/>\n(b) What is database\u00a0structure? Explain\u00a0relational database\u00a0structure. 5 (0)<br \/>\n(c) A company offers discounts to customers on the following basis:<br \/>\nQuantity ordered Normal discount<br \/>\nLess than 101<br \/>\nFrom 101 to 500<br \/>\nFrom 501 to 1,000<br \/>\nMore than 1,000 5%<br \/>\n10%<br \/>\n15%<br \/>\n20%<br \/>\nThe normal discount as given above is admissible only if the Customer&#8217;s account balance is below Rs. 1,000 and the order value is Rs. 10,000 or more. If the admit does not satisfy both of these conditions, the discount is reduced by 2% and if only one condition is violated, the discount is reduced by 1%.<\/p>\n<p>Draw a Flow chart to print customer name, discount offered and net amount payable for 25 customers.<\/p>\n<p>10 (0)<br \/>\n4. (a) Explain the various views of a slide in MS\u2014Power Point. 5 (0)<br \/>\n(b) Define an operating system and explain various functions performed by it. 5 (0)<br \/>\n(c) What are the integrity controls that DBMS package may offer? Explain in brief 10 (0)<br \/>\n5. (a) Describe the benefits of SAN. 5 (0)<br \/>\n(b) Explain the various views of a slide in MS\u2013Power Point. 5 (0)<br \/>\n(c) Explain the various tools available to protect the information from intrusion and misuse. 5 (0)<br \/>\n(d) Define the following functions used in MS\u2013EXCEL: 5&#215;1=5<br \/>\n(i) LOG (0)<br \/>\n(ii) LEN (0)<br \/>\n(iii) ROUND (0)<br \/>\n(iv) COUNT (0)<br \/>\n6. (a) What is Image processing? Explain the steps required for image processing. 5 (0)<br \/>\n(b) Discuss the objectives of\u00a0information Technology\u00a0Act, 2000. 5 (0)<br \/>\n(c) Explain the following techniques of audit used by internal auditors: 5<br \/>\n(i) System activity file interrogation. (0)<br \/>\n(ii) Program comparison (0)<br \/>\n(d) Explain general management concerns in E\u2013commerce. 5 (0)<br \/>\n7. Write short notes on the following.\u00a0Answer\u00a0any four: 5&#215;4=20<br \/>\n(i) Voice messaging (0)<br \/>\n(ii) Wireless networks (0)<br \/>\n(iii) File management system (0)<br \/>\n(iv) Diagnostic routines (0)<br \/>\n(v) White box approach for audit (0)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CA PE II Question Papers \u00a0Group\u00a0II Information Technology \u00a0May 2007 &nbsp; This\u00a0Paper\u00a0has 48 answerable questions with 0 answered. Total No. of Questions\u20147] Time Allowed : 3 Hours Maximum Marks : 100 Answers to questions\u00a0are to be given only in English except in the cases of candidates who have opted for Hindi medium. If a candidate &#8230; <a title=\"\" class=\"read-more\" href=\"https:\/\/www.kopykitab.com\/blog\/24444\/\" aria-label=\"More on \">Read more<\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"","fifu_image_alt":""},"categories":[4731,120,4930],"tags":[],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.kopykitab.com\/blog\/wp-json\/wp\/v2\/posts\/24444"}],"collection":[{"href":"https:\/\/www.kopykitab.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kopykitab.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kopykitab.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kopykitab.com\/blog\/wp-json\/wp\/v2\/comments?post=24444"}],"version-history":[{"count":0,"href":"https:\/\/www.kopykitab.com\/blog\/wp-json\/wp\/v2\/posts\/24444\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.kopykitab.com\/blog\/wp-json\/wp\/v2\/media?parent=24444"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kopykitab.com\/blog\/wp-json\/wp\/v2\/categories?post=24444"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kopykitab.com\/blog\/wp-json\/wp\/v2\/tags?post=24444"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}