CIT-001 : FUNDAMENTALS OF COMPUTER SYSTEMS Time : 2 hours
Maximum Marks : 50 (VVeightage : 75%)
Note : Question no.1 is compulsory. Attempt any four from the remaining.
1.
Answer the following objective type questions. Each objective type question carries one mark :
10x1=10
(a)
Which of the following operator is "boolean AND" operator ? (ii) & II (i) (iii) && (iv) &= (b) Tuple in a database is also known as : (i) Column (ii) Table (iii) Row (iv) Relation (c) Which of the following is not a type of DBMS ? (i) Relational (ii) Sequential (iii) Hierarchical (iv) Dynamic (d) "An attribute that may take on more than one value for a given entity instance" is known as : (i) Key attribute (ii) Derived attribute (iii) Multivalued attribute (iv) Functional attribute
CIT-001
1
P.T.O.
Which of the following network topology is most reliable ? (ii) Ring (i) Bus (iv) Mesh (iii) Star Resolution of monitor screen is calculated by (i) pixels (ii) dots per inch (iii) electrons per inch (iv) all of the above (g) Scanner is a/an device. (i) complex (ii) output (iii) input (iv) (ii) and (iii) both (h) "DOS" means (i) Direct Open System (ii) Direct Operating System (iii) Disk Open Software (iv) Disk Operating System (i) What is the size of " Double" data type in C language ? (i) 2 (ii) 16 (iii) 8 (iv) 4 (j) 'LDA' code in assembly language is used to represent : (i) Link dynamic register A (ii) Load data (iii) Load register A (iv) Link register A 2.
Write a program in C language, which finds the 10 greater number, among any three numbers. Also, draw the flowchart of this program.
3.
What is assembler ? Differenciate between 10 compiler and interpreter. Give the example languages for each.
CIT-001
2
4.
(a) Draw an ER-diagram for the following relations (with primary key underlined) : teacher (Emp_ID, tname, department, address) student (Reg_NO., Sname, father name, course_code, programme, year) class (tname, programme, department, Room No, Emp_ID, course_code) (b) What is Real Time System ? Explain its types.
6
4
5.
List and explain different types of information security threats. Also, briefly give possible solutions for each.
10
6.
(a) Explain the process of packet filtering. (b) What is meant by 'Virtual Memory'? Explain its advantages.
5 5
7.
(a) Compare and contrast between following network topologies : (i) BUS (ii) RING (iii) STAR (iv) MESH (b) Write the use of cache memory.
CIT-001 CERTIFICATE IN INFORMATION TECHNOLOGY (CIT) Term ...
10x1=10. (a) Which of the following operator is "boolean. AND" operator ? (i) I I. (ii) &. (iii) &&. (iv) &= (b) Tuple in a database is also known as : (i) Column. (ii) Table. (iii) Row. (iv) Relation. (c) Which of the following is not a type of. DBMS ? (i) Relational. (ii) Sequential. (iii) Hierarchical (iv) Dynamic. (d) "An attribute that may ...
Explain any two technologies used for. E-learning. (b) What is computer vision ? Explain any two applications of computer vision. 5. 15. (a) What are the different types of e-commerce models ? Discuss them with appropriate examples. 5. (b) What are t
sound, graphics, photographs/images, animation, simulation, games, video, etc. 1. 10. ... applications of computer vision. 5. 15. (a) What are the different types of ...
mark. 10x1.10. (a) The is a cable which carries signals representing data from one place to another. (i). Register. (ii) Bus. (iii) Multiplexer. (iv) Interface. CIT-001.
(c) A group of 8-bits is known as. (i) word. (ii) byte. (iii) nibble. (iv) kilobyte. (d) The information which is permanently stored in a ROM chip is called as. (i) hardware. (ii) software. (iii) firmware. (iv) application software. (e) Operating Sys
Each objective type question carries one mark : 10x1=10. (a) Which of the following operator is "boolean. AND" operator ? (i) I I. (ii) &. (iii) &&. (iv) &= (b) Tuple in a database is also known as : (i) Column. (ii) Table. (iii) Row. (iv) Relation .
CERTIFICATE IN INFORMATION. TECHNOLOGY (CIT). Term-End Examination. June, 2014. CIT-003 : WEB BASED TECHNOLOGIES AND. MULTIMEDIA APPLICATIONS. Time : 2 hours. Maximum Marks : 50. (Weightage : 75%). Note : There are two sections in this paper. Section
none of the above. (g) Frame page : (i) acts like a container. (ii) stores HTML text based web pages only. (iii) cannot contain another frame. (iv) none of the above. (h) â¢MPEG is used as : picture storage video compression standard frame storage n
5. 4. (a) Explain the use of ICT in e-Learning. 5. (b) Explain medical transcription process with. 5 the help of a diagram. 5. Explain MIS as an integrated application. Also 10 explain Do's and Don'ts in development of MIS. 6. What is embedded operat
(c) Knowledge Management System cannot be used for creating and sharing information. (d) Digital Signature cannot be used for authentication and integrity. (e) user id and password is used as a security tool in online banking. (f) Internet Relay Chat
(e) user id and password is used as a security tool in online banking. (f) Internet Relay Chat (IRC) is used for synchronous, multi-person, text ... (i) A touch screen is a display which can detect the presence and location of a touch within the disp
10. What layer in TCP/IP stack is equivalent to the. Transport Layer of the OSI model ? (a) Application. (b) Host to Host. (c) Internet. (d) Network Access. SECTION - B. (Attempt all the very short answer type questions.) 11. What is email spoofing ?
OSEI-044 (P) : SERVER SECURITY. Time : 3 hours. Maximum Marks : 100. Note : (i) Attempt any two out of three questions. Each question carries 40 marks.
I OSEI-044 I. No. of Printed Pages : 5. ADVANCED CERTIFICATE IN INFORMATION. SECURITY (ACISE). Term-End Examination. June, 2016. 00286. OSEI-044 : SERVER SECURITY. Time : 2 hours. Maximum Marks : 50. Note : (i). Section-A : Answer all the objective q
I CIC-05. No. of Printed Pages : 8 ... You cannot close MS-Word application by ... aTT.TITT -. 1 10 cam. `achC4779 t I 371k rtfq. Trt fq-*77- 31f-*7 ch. 10x2=20. 1.
examples. 10+10. 5. Explain, with examples from your teaching experience, the difference between errors, mistakes and lapses. 20. 6. "Language is very closely associated with power." Do you agree with this statement ? Give reasons. Which languages ha
(c) Auto Style. (d) Pre - formatted. ppt. 7. To insert a new slide in the current presentation, we can choose : (a) Ctrl+M. (b) Ctrl+N. (c) Ctr1+0. (d) Ctrl+F. CIC-05. 2 ...
(b) Secure Socket Layer (SSL). (c) Firewalls. (d) Authentication. 15. (a) What is Software Maintenance ? What is its significance ? 5. (b) What is Computer Vision ...