No. of Printed Pages : 5

ICIT-001

CERTIFICATE IN INFORMATION TECHNOLOGY (CIT) Term-End Examination 0046 7 June, 2015 CIT-001 : FUNDAMENTALS OF COMPUTER SYSTEMS Maximum Marks : 50

Time : 2 hours

(Weightage 75%) Note : Question no. 1 is compulsory. Attempt any four questions from the remaining.

1. Answer the following objective type questions. Each objective type question carries one mark. 10x1.10 (a) The is a cable which carries signals representing data from one place to another.

CIT-001

(i)

Register

(ii)

Bus

(iii)

Multiplexer

(iv)

Interface 1

P.T.O.

(b)

memory is used to increase the speed of processing by making current programs and data available to the CPU at a rapid rate. (i)

RAM

(ii)

ROM

(iii)

Cache

(iv)

Magnetic tape

(c) A group of 8-bits is known as (i)

word

(ii)

byte

(iii)

nibble

(iv)

kilobyte

(d) The information which is permanently stored in a ROM chip is called as (i)

hardware

(ii)

software

(iii)

firmware

(iv)

application software

(e) Operating System (0/S) is a

CIT-001

(i)

system software

(ii)

application software

(iii)

utility

(iv)

accessory

2

(f) The processing system in which the jobs are bundled together along with the instructions necessary to allow them to be processed without intervention is called as processing system. (i) batch serial (ii) (iii) spooling batch (iv) multiprogramming (g) Medical devices, industrial control systems and flight controlling systems use (i) Time sharing 0/S (ii) Network 0/S (iii) Batch 0/S (iv) Real time 0/S (h) The process of converting binary signal to analog signal by a modem is called as (i) Modulation (ii) Demodulation (iii) Transmission (iv) Compression (i) We prefer computer networking for the reason(s) (i) Resources sharing (ii) Scalability (iii) High reliability and expenditure saving (iv) All of the above CIT-001

3

P.T.O.

(j) The aim(s) of information security is /are (i)

Integrity

(ii)

Confidentiality

(iii)

Availability

(iv)

All of the above

2. List and describe briefly the types of threats which can breach the network security of an organisation.

10

3. Compare the following storage devices w.r.t. the parameters like capacity, advantages, disadvantages and storage mechanism :

10

(i)

Hard disk

(ii)

CD-ROM

(iii)

Magnetic tape

(iv)

Pen drive/Flash drive

4. (a) List and describe the classification of printers on the basis of quality.

5

(b) Explain the following types of operating systems briefly. Also give two applications which use these 0/S.

5

CIT-001

(i)

Batch 0/S

(ii)

Network 0/S

4

5.

6.

7.

Write an algorithm and draw the corresponding flow chart to find the average of a list of "n" numbers given as input.

10

(a) Write a program in C language to check whether a given number is odd or even.

5

(b) Describe the mechanism of Asymmetric key encryption system.

5

(a) Discuss bus topology with the help of a neat diagram and list its advantages and disadvantages.

5

(b) List and describe any five network applications.

5

CIT-001

5

2,000

CERTIFICATE IN INFORMATION TECHNOLOGY (CIT) Term-End ...

(c) A group of 8-bits is known as. (i) word. (ii) byte. (iii) nibble. (iv) kilobyte. (d) The information which is permanently stored in a ROM chip is called as. (i) hardware. (ii) software. (iii) firmware. (iv) application software. (e) Operating System (0/S) is a. (i) system software. (ii) application software. (iii) utility. (iv) accessory. CIT-001.

35KB Sizes 2 Downloads 227 Views

Recommend Documents

CERTIFICATE IN INFORMATION TECHNOLOGY (CIT)
CERTIFICATE IN INFORMATION. TECHNOLOGY (CIT). Term-End Examination. June, 2014. CIT-003 : WEB BASED TECHNOLOGIES AND. MULTIMEDIA APPLICATIONS. Time : 2 hours. Maximum Marks : 50. (Weightage : 75%). Note : There are two sections in this paper. Section

CERTIFICATE IN INFORMATION TECHNOLOGY (CIT)
none of the above. (g) Frame page : (i) acts like a container. (ii) stores HTML text based web pages only. (iii) cannot contain another frame. (iv) none of the above. (h) •MPEG is used as : picture storage video compression standard frame storage n

CERTIFICATE IN INFORMATION TECHNOLOGY (CIT) Term-End ...
Explain any two technologies used for. E-learning. (b) What is computer vision ? Explain any two applications of computer vision. 5. 15. (a) What are the different types of e-commerce models ? Discuss them with appropriate examples. 5. (b) What are t

CERTIFICATE IN INFORMATION TECHNOLOGY (CIT) Term-End ...
sound, graphics, photographs/images, animation, simulation, games, video, etc. 1. 10. ... applications of computer vision. 5. 15. (a) What are the different types of ...

CERTIFICATE IN INFORMATION TECHNOLOGY (CIT) Term-End ...
mark. 10x1.10. (a) The is a cable which carries signals representing data from one place to another. (i). Register. (ii) Bus. (iii) Multiplexer. (iv) Interface. CIT-001.

CIT-001 CERTIFICATE IN INFORMATION TECHNOLOGY (CIT) Term ...
Each objective type question carries one mark : 10x1=10. (a) Which of the following operator is "boolean. AND" operator ? (i) I I. (ii) &. (iii) &&. (iv) &= (b) Tuple in a database is also known as : (i) Column. (ii) Table. (iii) Row. (iv) Relation .

CIT-001 CERTIFICATE IN INFORMATION TECHNOLOGY (CIT) Term ...
10x1=10. (a) Which of the following operator is "boolean. AND" operator ? (i) I I. (ii) &. (iii) &&. (iv) &= (b) Tuple in a database is also known as : (i) Column. (ii) Table. (iii) Row. (iv) Relation. (c) Which of the following is not a type of. DBM

CIT-002 No. of Printed Pages : 2 CERTIFICATE IN INFORMATION ...
5. 4. (a) Explain the use of ICT in e-Learning. 5. (b) Explain medical transcription process with. 5 the help of a diagram. 5. Explain MIS as an integrated application. Also 10 explain Do's and Don'ts in development of MIS. 6. What is embedded operat

CIT-002 No. of Printed Pages : 2 00 CERTIFICATE IN INFORMATION ...
(c) Knowledge Management System cannot be used for creating and sharing information. (d) Digital Signature cannot be used for authentication and integrity. (e) user id and password is used as a security tool in online banking. (f) Internet Relay Chat

CIT-002 No. of Printed Pages : 2 00 CERTIFICATE IN INFORMATION ...
(e) user id and password is used as a security tool in online banking. (f) Internet Relay Chat (IRC) is used for synchronous, multi-person, text ... (i) A touch screen is a display which can detect the presence and location of a touch within the disp

ADVANCED CERTIFICATE IN INFORMATION SECURITY (ACISE ...
OSEI-044 (P). No. of Printed Pages : 2. ADVANCED CERTIFICATE IN INFORMATION. SECURITY (ACISE). Term-End Practical Examination. 00284. December ...

ADVANCED CERTIFICATE IN INFORMATION SECURITY (ACISE)
10. What layer in TCP/IP stack is equivalent to the. Transport Layer of the OSI model ? (a) Application. (b) Host to Host. (c) Internet. (d) Network Access. SECTION - B. (Attempt all the very short answer type questions.) 11. What is email spoofing ?

ADVANCED CERTIFICATE IN INFORMATION SECURITY (ACISE ...
OSEI-044 (P) : SERVER SECURITY. Time : 3 hours. Maximum Marks : 100. Note : (i) Attempt any two out of three questions. Each question carries 40 marks.

ADVANCED CERTIFICATE IN INFORMATION SECURITY (ACISE)
I OSEI-044 I. No. of Printed Pages : 5. ADVANCED CERTIFICATE IN INFORMATION. SECURITY (ACISE). Term-End Examination. June, 2016. 00286. OSEI-044 : SERVER SECURITY. Time : 2 hours. Maximum Marks : 50. Note : (i). Section-A : Answer all the objective q

CIT
(b) Secure Socket Layer (SSL). (c) Firewalls. (d) Authentication. 15. (a) What is Software Maintenance ? What is its significance ? 5. (b) What is Computer Vision ...

No. of Printed Pages : 2 ADVANCED CERTIFICATE IN INFORMATION ...
OSE-043 : INFORMATION TECHNOLOGY. SECURITY ... in dealing with information security issues. 4. ... What are the advantages of Web Standards ? 5. 6.

Technology Development Corporation Information Technology ...
environment, and best practices to develop innovative alternatives for business ... Development Corporation Information Technology Consulting Services.pdf.

LR IN Information Technology - Polytechnics - Kerala Technical ...
LR IN Information Technology - Polytechnics - Kerala Technical Education.pdf. LR IN Information Technology - Polytechnics - Kerala Technical Education.pdf.

CERTIFICATE IN ARABIC LANGUAGE
Translate the following Arabic sentences, related to "conversation between father and son, into Arabic. Li. L.4›: ci.At : (al-abb : hal t'rif ma wajibuna naHwa ...