CERTIFICATE IN INFORMATION TECHNOLOGY (CIT) Term-End Examination December, 2013 CIT-002 : INTRODUCTION TO INFORMATION TECHNOLOGY Time : 2 hours
Maximum Marks : 50 (Weightage : 75%)
Note : There are two Sections A and B in this paper. All questions of Section-A are compulsory. Answer any three questions from Section-B.
1.
SECTION - A 1x10=10 State true/false for the followings : (a) For e-Learning, knowledge of ICT is required. (b) One advantage of e-commerce is to have access of global market. (c) Internet is a private network. (d) EFT stands for Electronic File Transfer. (e) Knowledge is organized and processed information. (f) Cyber crime takes place in a virtual space through digital environment. (g) CASE stands for Computer Added System Engineering. (h) MIS may help in increasing the efficiency of an organization.
CIT-002
1
P.T.O.
(i) DACNET is an e-governance project executed by NIC. (1) For office automation use of ICT is not required. 2.
(a) What are advantages of using information system in an organization ? Explain with an example. (b) What is digital identity ? Explain need of it with an example.
5
5
SECTION - B (a) Explain briefly, the different dimensions of digital divide. (b) Explain the security issues in e-commerce.
5
4.
(a) Explain the use of ICT in e-Learning. (b) Explain medical transcription process with the help of a diagram.
5 5
5.
Explain MIS as an integrated application. Also 10 explain Do's and Don'ts in development of MIS.
6.
What is embedded operating system? Classify the 10 embeded operating system and briefly describe each category.
CIT-002 No. of Printed Pages : 2 CERTIFICATE IN INFORMATION ...
5. 4. (a) Explain the use of ICT in e-Learning. 5. (b) Explain medical transcription process with. 5 the help of a diagram. 5. Explain MIS as an integrated application. Also 10 explain Do's and Don'ts in development of MIS. 6. What is embedded operating system? Classify the 10 embeded operating system and briefly describe.
... and disadvantages of 5+5 the following training aids : (i) Posters. (ii) Films. 2. Explain what is Food Safe Facility and what are 20 the key features of such facility ? 3. (a) What are the safety measures to be taken 10 by the following to ensur
(e) user id and password is used as a security tool in online banking. (f) Internet Relay Chat (IRC) is used for synchronous, multi-person, text ... (i) A touch screen is a display which can detect the presence and location of a touch within the disp
(c) Knowledge Management System cannot be used for creating and sharing information. (d) Digital Signature cannot be used for authentication and integrity. (e) user id and password is used as a security tool in online banking. (f) Internet Relay Chat
I CIC-05. No. of Printed Pages : 8 ... You cannot close MS-Word application by ... aTT.TITT -. 1 10 cam. `achC4779 t I 371k rtfq. Trt fq-*77- 31f-*7 ch. 10x2=20. 1.
December, 2014. OSEI-042 : SECURING INTERNET ACCESS. Time : 2 hours. Maximum Marks : 50. Note : Section A : Answer all the objective type questions. Section B : Answer all the very short answer type questions. Section C ... wavelength radio transmiss
(c) Auto Style. (d) Pre - formatted. ppt. 7. To insert a new slide in the current presentation, we can choose : (a) Ctrl+M. (b) Ctrl+N. (c) Ctr1+0. (d) Ctrl+F. CIC-05. 2 ...
SECTION C. Attempt any two out of three short answer type questions. 2x5=10. 12. Provide the key security issues for SOAP web services. 5. 13. Write the advantages and disadvantages of e-mail. 5. 14. A scripting language allows control of one or more
(ii) Difference between spelling & sound. (iii) Difference between stress and intonation. (iv) Types of questions. (b) Identify the root , prefix and suffix in the. 5 following words. unavoidable, impossibility , unwearable, implanted, irregularity.
sub ( to show location ) anti ( to show attitude) out ( to show rank) over ( to show an action which is excessive) a ( add to a verb to form an adjective). CTE-2. 2 ...
Yeast grow best under slightly medium. (ii) Bacterial food refers to food borne illness caused by the presence of a bacterial toxin formed in the food. (iii) A disease is said to be when it is common in the certain place. (iv) Free flowing salt has a
POST GRADUATE CERTIFICATE IN CYBER. LAW (PGCCL). 00. Term-End Examination tr). O. June, 2015. MIR-014 : PRIVACY AND DATA PROTECTION. Time : 3 hours. Maximum Marks : 100. Note : (i) Answer all questions from Part A. Each questions carries 2 marks. (ii
OSEI-042 (P) : SECURING INTERNET ACCESS. Time : 3 hours. Maximum Marks : 100. Note : (a) Attempt any two out of three questions ... Browse Internet Using Google chrome and do the 40 following : (a) View the history file of this week. (b) Delete histo
(a) View the history file of this week. (b) Delete history of 24 hours. (c) Delete temporary Internet ... Visit two online banking website (s). Without logging into them, ...
ADMINISTRATION. (DNA). Term-End Examination ... (c) Explain the principles of supervision in ... (b) Explain the elements of evaluation with help of examples.
different factors that influence change in gene frequencies over a ... What is Genetic Polymorphism? Examine briefly 20 ... (b) Hap Map Project. (c) Ethical , Legal ...
r r -1:cr l r, 10 Tzt I 9z-1 9 . wrrrq -Etr-ffuff -vrff Tzt 4;1. I TITIFTft t mil)k-7-4T. )0I- -terT*74 Yid. IR I. (q) 111:1T7 p1T 2IT 13. T -g3TE rig t-u trTdT 2TT Feb 3Tcrq 3TK1 ...
No. of Printed Pages : 2. OSEI-044 (P) um ADVANCED CERTIFICATE IN INFORMATION. SECURITY. Term-End Practical Examination. June, 2015. OSEI-044 (P) : SERVER SECURITY. Time : 3 hours. Maximum Marks : 100. Note : (i) Attempt any two out of three question