{"id":24475,"date":"2013-03-16T14:37:37","date_gmt":"2013-03-16T09:07:37","guid":{"rendered":"http:\/\/www.kopykitab.com\/blog\/?p=24475"},"modified":"2020-06-01T10:16:22","modified_gmt":"2020-06-01T04:46:22","slug":"ca-pe-ii-question-papers-group-ii-information-technology-may-2005","status":"publish","type":"post","link":"https:\/\/www.kopykitab.com\/blog\/ca-pe-ii-question-papers-group-ii-information-technology-may-2005\/","title":{"rendered":"CA PE II Question Papers Group II Information Technology May 2005"},"content":{"rendered":"<h1 style=\"text-align: center\">CA PE II Question Papers Group\u00a0II<\/h1>\n<h1 style=\"text-align: center\">Information Technology May 2005<\/h1>\n<p>&nbsp;<\/p>\n<p>This\u00a0Paper\u00a0has 48 answerable questions with 0 answered.<\/p>\n<p><em id=\"__mceDel\"><br \/>\nTotal No. of Questions\u20147]<br \/>\nTime Allowed : 3 Hours<\/em><\/p>\n<p>Maximum Marks : 100<br \/>\nAnswers to questions\u00a0are to be given only in English except in the cases of candidates who have opted for Hindi medium. If a candidate who has not opted for Hindi medium,\u00a0answers\u00a0in Hindi, his\u00a0answers\u00a0in Hindi will not be valued.<br \/>\nQuestion\u00a0No.1 is compulsory<br \/>\nAnswer any four from the rest<br \/>\nMarks<br \/>\n1. (a) Convert the following from one number system to another system along with the working notes: 5&#215;1=5<br \/>\n(i) (1267.3125)10 = ()2 (0)<br \/>\n(ii) (10110.101)2 = ()10 (0)<br \/>\n(iii) (1234)8 = ()16 (0)<br \/>\n(iv) (B2C)16 = ()2 (0)<br \/>\n(v) (10110111.1)2 = ()8 (0)<br \/>\n(b) Describe briefly, the following terms with reference to\u00a0Information Technology: 5&#215;1=5<br \/>\n(i) Asymmetric crypto system (0)<br \/>\n(ii) Subroutine (0)<br \/>\n(iii) Parity bit (0)<br \/>\n(iv) Object oriented Database (0)<br \/>\n(v) FTP (0)<br \/>\n(c) Give one or two reasons for each of the following: 5&#215;1=5<br \/>\n(i) Use of Serial Interface (0)<br \/>\n(ii) Use of Spooling Software. (0)<br \/>\n(iii) Use of\u00a0Fire wall\u00a0in the system (0)<br \/>\n(iv) Need of Repeaters in the network. (0)<br \/>\n(v) Need of Reference files. (0)<br \/>\n(d) Write True or False for each of the following: 5&#215;1=5<br \/>\n(i) Flash memory chips are one form of static RAM chip. (0)<br \/>\n(ii) A sequential access file can reside only on a magnetic tape. (0)<br \/>\n(iii) A Personnel Computer based on the Intel 80386 chipset has 32 bit processor (0)<br \/>\n(iv) The speed of Dot matrix printer is measured in terms of CPS. (0)<br \/>\n(v) Outline view of MS\u2013POWER POINT permits frequent switching between text and object on a slide. (0)<br \/>\n2. Distinguish between the following: 5&#215;4=20<br \/>\n(i) Synchronous and Asynchronous data transmission. (0)<br \/>\n(ii) RAM and ROM (0)<br \/>\n(iii) Multiprogramming and Multiprocessing (0)<br \/>\n(iv) Third generation and Fourth generation languages. (0)<br \/>\n(v) Fixed length field and Variable length field (with reference to database). (0)<br \/>\n3. (a) Describe briefly, why a file processing system reduces effectiveness of the end user applications? 5 (0)<br \/>\n(b) Describe the salient features of Hierarchical database. 5 (0)<br \/>\n(c) A bank has 500 employees. The salary paid to each employee is sum of his basic pay. Dearness Allowance and\u00a0House rent allowance. For the purpose of computing\u00a0house rent allowance\u00a0bank has classified his employees into three classes A, B and C. The\u00a0house rent allowance\u00a0for each class is computed at the rate of 30 percent, 20 percent and 10 percent of the basic pay respectively. The dearness allowance is computed at a\u00a0flat rate\u00a0of 60 percent of the basic pay.<br \/>\nDraw a flow chart to determine the percentage of employee falling in the each of the following salary slab:<br \/>\n(i) Above Rs. 30,000<br \/>\n(ii) Rs. 15,001 to Rs. 30,000<br \/>\n(iii) Rs. 8,001 to Rs. 15,000<br \/>\n(iv) Less than or equal to Rs. 8,000.<br \/>\n10 (0)<br \/>\n4. (a) Explain the working principle of\u00a0Electronic Data Interchange\u00a0(EDI). 5 (0)<br \/>\n(b) Describe the various services provided by Data centre. 5 (0)<br \/>\n(c) Discuss the various components of a Local Area Network (LAN) 10 (0)<br \/>\n5. (a) With reference to word processing, differentiate between the following: 3+2=5<br \/>\n(i) Text Editor and Word Processor (0)<br \/>\n(ii) Type face and Font. (0)<br \/>\n(b) What do you mean by Artificial Intelligence? Describe any two types of artificial intelligence used in\u00a0Information Technology. 5 (0)<br \/>\n(c) Describe any five categories with their purposes under which various functions available in MS\u2013EXCEL are classified. 5 (0)<br \/>\n(d) Define the following functions used in MS\u2013EXCEL: 5&#215;1=5<br \/>\n(i) IRR (0)<br \/>\n(ii) LEN (0)<br \/>\n(iii) DMIN (0)<br \/>\n(iv) POWER (0)<br \/>\n(v) MOD (X\/Y) (0)<br \/>\n6. (a) Which areas of DBMS should be addressed while maintaining a database? 5 (0)<br \/>\n(b) Describe the Integrated Test Facility (ITF) method used in conducting audit 5 (0)<br \/>\n(c) Describe about the various actions which warrants penalty under the Section 43 of the IT Act, 2000. 5 (0)<br \/>\n(d) Briefly explain the various tools available to protect informations against instructions. 5 (0)<br \/>\n7. Write short notes on the following: 4&#215;5=20<br \/>\n(i) Firmware (0)<br \/>\n(ii) Data dictionary (0)<br \/>\n(iii) Storage area network (0)<br \/>\n(iv) Microsoft windows (0)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CA PE II Question Papers Group\u00a0II Information Technology May 2005 &nbsp; This\u00a0Paper\u00a0has 48 answerable questions with 0 answered. Total No. of Questions\u20147] Time Allowed : 3 Hours Maximum Marks : 100 Answers to questions\u00a0are to be given only in English except in the cases of candidates who have opted for Hindi medium. If a candidate &#8230; <a title=\"CA PE II Question Papers Group II Information Technology May 2005\" class=\"read-more\" href=\"https:\/\/www.kopykitab.com\/blog\/ca-pe-ii-question-papers-group-ii-information-technology-may-2005\/\" aria-label=\"More on CA PE II Question Papers Group II Information Technology May 2005\">Read more<\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"","fifu_image_alt":""},"categories":[4731,120,4930],"tags":[],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.kopykitab.com\/blog\/wp-json\/wp\/v2\/posts\/24475"}],"collection":[{"href":"https:\/\/www.kopykitab.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kopykitab.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kopykitab.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kopykitab.com\/blog\/wp-json\/wp\/v2\/comments?post=24475"}],"version-history":[{"count":0,"href":"https:\/\/www.kopykitab.com\/blog\/wp-json\/wp\/v2\/posts\/24475\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.kopykitab.com\/blog\/wp-json\/wp\/v2\/media?parent=24475"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kopykitab.com\/blog\/wp-json\/wp\/v2\/categories?post=24475"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kopykitab.com\/blog\/wp-json\/wp\/v2\/tags?post=24475"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}