December, 2013 BFN-002 : HAZARDS TO FOOD SAFETY Maximum Marks : 100
Time : 3 hours
Note : Attempt five questions in all. Question No. 1 is compulsory. All questions carry equal marks. 1.
(a) Enlist the different types of hazards.
4
(b) Fill in the blanks :
6
(i)
Yeast grow best under slightly medium.
(ii)
Bacterial food refers to food borne illness caused by the presence of a bacterial toxin formed in the food.
(iii) A disease is said to be when it is common in the certain place. (iv) Free flowing salt has agent added to prevent formation of lumps.
BFN-002
(v)
substances are those where is used generally recognised as safe.
(vi)
is one of the adulterant found in coffee. 1
P.T.O.
2.
3.
(c) Differentiate between the following sets of terms, giving examples. (i) Food contamination and Food adulteration. (ii) Food infection and food intoxication. (iii) Yeast and Molds. (iv) Mycotoxins and Alfatoxins. (v) Sequestrate and Antioxidants.
10
(a) Enumerate the measures you would adopt to safeguard the food from different hazards. (b) "Contamination of foodstuffs with chemical hazards can occur from various sources in the environment". Justify the statement giving appropriate examples.
8
12
(a) Give two examples for each of the 4 following : (i) Pathogenic bacteria causing food poisoning. (ii) Viruses implicated in food borne diseases. (iii) Mycotoxins found in food. (iv) Parasitic protozoa causing food safety problems. (b) Indicate the, sign, symptoms, food involved, route of transmission and preventive measures for the disease caused by each of the above mentioned situations (in part a). 4+4+4+4=16
BFN-002
2
4. Explain the following briefly : 5+5+5+5=20 (a) Classification of bacteria according to the temperature at which they grow. (b) Classification of bacteria based on their response to oxygen. (c) Influence of hydrogen-ion concentration on growth of organisms. (d) Measures to adopt for reducing exposure to mycotoxins. 5.
(a) List some of the emerging pathogens of concern in the recent times. (b) Give the possible reasons for their emergence. (c) Discuss why these pathogens are a serious health hazard. (d) Briefly explain the measures which should be adopted to control or keep a check on these pathogens.
3 5 5 7
6.
(a) What are food additives ? Why are they used 14 in foods ? Briefly explain their functions giving examples. (b) Briefly explain the safety issues linked with 6 food additives.
7.
(a) List the natural occuring toxicants found in the following : 2+2=4 —Plant foods —Animal foods (b) List the harmful effects of the toxicants found in the plant and animal foods. 8+8=16
BFN-002
3
P.T.O.
8.
Write short notes on any four of the following : 5+5+5+5=20 (a) Metallic contaminants and their ill effects. (b) (c) (d) (e)
BFN-002
Health hazards of pesticide residue Conditions when food is considered adulterated Anti-nutritional substances present in foods. Botulism
Yeast grow best under slightly medium. (ii) Bacterial food refers to food borne illness caused by the presence of a bacterial toxin formed in the food. (iii) A disease is said to be when it is common in the certain place. (iv) Free flowing salt has agent added to prevent formation of lumps. (v) substances are those where is used ...
December, 2014. OSEI-042 : SECURING INTERNET ACCESS. Time : 2 hours. Maximum Marks : 50. Note : Section A : Answer all the objective type questions. Section B : Answer all the very short answer type questions. Section C ... wavelength radio transmiss
SECTION C. Attempt any two out of three short answer type questions. 2x5=10. 12. Provide the key security issues for SOAP web services. 5. 13. Write the advantages and disadvantages of e-mail. 5. 14. A scripting language allows control of one or more
r r -1:cr l r, 10 Tzt I 9z-1 9 . wrrrq -Etr-ffuff -vrff Tzt 4;1. I TITIFTft t mil)k-7-4T. )0I- -terT*74 Yid. IR I. (q) 111:1T7 p1T 2IT 13. T -g3TE rig t-u trTdT 2TT Feb 3Tcrq 3TK1 ...
I CIC-05. No. of Printed Pages : 8 ... You cannot close MS-Word application by ... aTT.TITT -. 1 10 cam. `achC4779 t I 371k rtfq. Trt fq-*77- 31f-*7 ch. 10x2=20. 1.
5. 4. (a) Explain the use of ICT in e-Learning. 5. (b) Explain medical transcription process with. 5 the help of a diagram. 5. Explain MIS as an integrated application. Also 10 explain Do's and Don'ts in development of MIS. 6. What is embedded operat
... and disadvantages of 5+5 the following training aids : (i) Posters. (ii) Films. 2. Explain what is Food Safe Facility and what are 20 the key features of such facility ? 3. (a) What are the safety measures to be taken 10 by the following to ensur
(c) Auto Style. (d) Pre - formatted. ppt. 7. To insert a new slide in the current presentation, we can choose : (a) Ctrl+M. (b) Ctrl+N. (c) Ctr1+0. (d) Ctrl+F. CIC-05. 2 ...
(ii) Difference between spelling & sound. (iii) Difference between stress and intonation. (iv) Types of questions. (b) Identify the root , prefix and suffix in the. 5 following words. unavoidable, impossibility , unwearable, implanted, irregularity.
sub ( to show location ) anti ( to show attitude) out ( to show rank) over ( to show an action which is excessive) a ( add to a verb to form an adjective). CTE-2. 2 ...
POST GRADUATE CERTIFICATE IN CYBER. LAW (PGCCL). 00. Term-End Examination tr). O. June, 2015. MIR-014 : PRIVACY AND DATA PROTECTION. Time : 3 hours. Maximum Marks : 100. Note : (i) Answer all questions from Part A. Each questions carries 2 marks. (ii
crop cultivation and livestock rearing in order to ensure food safety. (d) What are the most commonly used modes 5 for consumer education programmes ? 3.
OSEI-042 (P) : SECURING INTERNET ACCESS. Time : 3 hours. Maximum Marks : 100. Note : (a) Attempt any two out of three questions ... Browse Internet Using Google chrome and do the 40 following : (a) View the history file of this week. (b) Delete histo
(e) user id and password is used as a security tool in online banking. (f) Internet Relay Chat (IRC) is used for synchronous, multi-person, text ... (i) A touch screen is a display which can detect the presence and location of a touch within the disp
registry, and take the snapshot. Then remove the folder and then revert the registry entries and take another snapshot and finally generate the comparison report of the snapshots. 40. 3. Do the website auditing of http: SedulityGroups.in and generate
No. of Printed Pages : 2. OSEI-044 (P) um ADVANCED CERTIFICATE IN INFORMATION. SECURITY. Term-End Practical Examination. June, 2015. OSEI-044 (P) : SERVER SECURITY. Time : 3 hours. Maximum Marks : 100. Note : (i) Attempt any two out of three question
Dec 3, 2014 - CITL-001(P)/S3. CERTIFICATE IN INFORMATION TECHNOLOGY (CIT). Term-End Practical Examination ... (iv) Publisher. (v) Year. (vi) Category. (vii) Cost. (viii) Book Count. (b) Write HTML code to create a web form to enter the details of Boo
(c) Knowledge Management System cannot be used for creating and sharing information. (d) Digital Signature cannot be used for authentication and integrity. (e) user id and password is used as a security tool in online banking. (f) Internet Relay Chat