You are on page 1of 41

PG PROGRAM 2008 QUESTION PAPER PRESENTATION

PRESENTED BY: TEAM-C Section - E

Part A (mcqS)

1.COMPUTER IS A/ANDEVICE THAT ACCEPTS DATA AND AS INPUTS AND PRODUCES .AS OUTPUT.
(A)Electronic , information, instruction (B) Electronic ,instruction , information (C)Automatic ,information , instruction (D)Computing ,data , information (E)Hardware ,software, reports

3.PICK THE ODD MAN OUT..

(A)RAM. (B)ROM. (C)Hard Disc. (D)Mouse. (E)Compact Disc.

4.WHAT IS NOT TRUE ABOUT DATA AND INFORMATION?


(A)Information is processed data. (B)Information is arranged data. (C)Information is data put in a context. (D)Data leads to a greater understanding of the situation. (E)Information enables better decisions.

5.WHICH OF THE FOLLOWING IS NOT A REASON TO USE IS IN DECISION MAKING?

a) b) c) d) e)

Automate decision Handle large amount of data Improve response time Handle complexity Improve access to information

7.ENTERPRISES RESOURCES PLANNING(ERP) ARE NOT

a) b)

c) d) e)

Transaction processing system Used to integrate business process across company departments Inexpensive to procure, adapt & install Helpful only in planning stages C&D

8.PICK THE ODD MAN OUT

a) b) c) d) e)

Star Bus Loop Mesh Ring

9. IN SDLC, WHEN IS THE PROJECT TEAM ASSEMBLED?


a) b) c)

d) e)

At the start of the Feasibility After the Feasibility is positive When the management decides to go in for a new system When the programming starts When the design starts

10. WHAT IS SSL ?

a) b) c) d) e)

Secure Sign-on Layer Secure Socket Layer Secure Software Layer Secure Session Layer Safe Software Layer

12. TO BE PART OF A LAN, A COMPUTER SHOULD BE EQUIPPED WITH:

a) b) c) d) e)

Token Ring Ethernet Network Interface Card a OR b (a OR b) plus c

16. WHICH ONE OF THE FOLLOWING IS AN


EXAMPLE OF A DECISION AT A TACTICAL LEVEL OF MANAGEMENT

a) b) c) d) e)

Opening a new country operation Deciding to develop a new product Tracking daily sales Appraising employee performance Scheduling production

17. A TROJAN HORSE IS:

a) b) c) d) e)

Does not spread by itself Is used by people to defraud banks Can be used to encrypt files for security Invented by a Greek hacker A popular computer game

18. THE FOLLOWING IS/ARE PROCESS MODELS FOR IS DEVELOPMENT:

a) b) c)

d) e)

Analysis, Design & Development Waterfall, RAD, prototyping Business Analysis, Technical Design, Implementation Use interviews, Design & Construction Design, Development & QA

19. THE ISO/OSI MODEL IS NOT:


A 7-layer model An enabler of standardization Vendor specific About segregation of functions among layers All the above

a) b) c) d) e)

20. PICK THE FALSE STATEMENT(S) FROM BELOW:


a)

b) c) d) e)

Baud rate is signaling speed while bit rate is transmission speed Baud rate can at best equal bit rate Baud rate is always higher than bit rate a & c a & b

21.WHICH OF THE FOLLOWING IS NOT A TRUE STATEMENT ABOUT A ROUTER?


a.) Handles different protocols b.) Used mainly for amplification & restoration of signals in a WAN c. ) Uses to separate different network segments d. ) Uses logical addresses e. ) Can route communication to another router if destination is unknown

22. PICK THE STATEMENT(S) THAT DO NOT DESCRIBE THE RAD MODEL:

a. b. c. d. e.

It is focused on speed It requires extensive user participation It achieves optimal technical performance It is not suitable for complex scientific applications All of the above

24. MODULATION TECHNIQUES CANNOT


a.

b. c.

d. e.

enable transmission of digital signals over an analog carrier help reduce ups and downs in transmission Can modify amplitude, frequency or phase of the carrier reduce risk of interference b&d

25. IN EXCEL, WHAT DOES $A$1 INDICATE IN A FORMULA?


a. b. c.

d.

e.

The cell holds currency value The reference always points to the same cell All numbers in the cell will be converted into Dollars It will change when you copy the formula to another cell It is a cell in another sheet

27. EXCEL ENABLES:

a. b. c. d. e.

a 2-D representation of problems Supports formulae entry Provides built-in functions Helps decision making All the above

28. AN OPERATING SYSTEM IS TO A PC


a. b. c. d. e.

What a General is to an army What intelligence is to a living being What a hammer is to a worker What a film director is to a movie None of the above

29. HALF DUPLEX COMMUNICATION IMPLIES:


a. b. c. d.

e.

One side is human & the other side is a computer Only one party can communicate at a time Communication is always in one direction Only half the transmission is guaranteed to be delivered Uses 50% Time Division multiplexing

30. SOLVER IN EXCEL:


a. b. c.

d. e.

Is a HELP facility to solve problems Is for optimization of problems Helps back calculation of inputs from a given goal Helps create Macros Is for entering scientific formula

Part B

ASYNCHRONOUS COMMUNICATION
Asynchronous communications is the method of communications most widely used for PC communications. Through asynchronous communications, data is transmitted one byte at a time with each byte containing one start bit, eight data bits, and one stop bit, thus yielding a total of ten bits. The asynchronous communication technique is a transmission technique which is most widely used by personal computers to provide connectivity to printers, modems, fax machines, etc.

SYNCHRONOUS COMMUNICATION

Through synchronous communications, data is transmitted as frames of large data blocks rather than bulky individual bytes. Advantage of synchronous is that it is more efficient than asynchronous. Some examples are e-mail messages, discussion boards, blogging, and text messaging over cell phones.

DIFFERENCE BETWEEN SYNCHRONOUS AND


ASYNCHRONOUS COMMUNICATION

It is based on synchronization between the sender and the receiver

This communication doesn't need any synchronization between the sender and the receiver Sender may send the information at anytime without waiting for the receiver to be ready to receive the information in asynch comm there is no need to establish a connection before data transmission

Both must be synchronized before actual communication takes place

in synch comm between two nodes, first connection will be established and the communication will take place

Q3] A) COMPUTER VIRUSES


o A computer virus is a small software program that spreads from one computer to another computer and that interferes with computer operation. A computer virus may corrupt or delete data on a computer, use an e-mail program to spread the virus to other computers, or even delete everything on the hard disk.

TYPES OF COMPUTER VIRUSES

y y y y y y y

Boot sector virus Browser highjacker Direct action viruses File infected viruses Macro viruses Multi partite viruses Resident viruses

Q3]B)DECISION SUPPORT SYSTEMS

A decision support system (DSS) is a computer-based information system that supports business or organizational decisionmaking activities. DSSs serve the management, operations, and planning levels of an organization and help to make decisions, which may be rapidly changing and not easily specified in advance.
o

Q:3(C) PROTOTYPING APPROACH AND ITS PROS AND CORNS


Prototyping

is the process of building a model of a system. In terms of an information system, prototypes are employed to help system designers build an information system that intuitive and easy to manipulate for end users. Prototyping is an iterative process that is part of the analysis phase of the systems development life cycle.

Pros
Reduces development time. Reduces development costs. Requires user involvement. Developers receive quantifiable user feedback. Facilitates system implementation since users know what to expect. Results in higher user satisfaction. Exposes developers to potential future system enhancements.

Cons
Can lead to insufficient analysis. Users expect the performance of the ultimate system to be the same as the prototype. Developers can become too attached to their prototypes Can cause systems to be left unfinished and/or implemented before they are ready. Sometimes leads to incomplete documentation. If sophisticated software prototypes (4th GL or CASE Tools) are employed, the time saving benefit of prototyping can be lost.

Q:3(D) PUBLIC KEY INFRASTRUCTURE


PKI is a security architecture that has been introduced to provide an increased level of confidence for exchanging information over an increasingly insecure Internet. A PKI including the use of encryption, digital signatures, public keys, private keys, digital certificates, Certificate Authorities, certificate revocation and storage. A PKI infrastructure is expected to offer its users the following benefits: certainty of the quality of information sent and received electronically certainty of the source and destination of that information certainty of the privacy of that information

WHAT DO YOU UNDERSTAND BY E-BUSINESS ?


Electronic

Business is commonly defined as ebusiness is the conduct of business on the internet ,not only buying and selling of goods and services but also servicing customers and collaborating with business partners and conducting electronic transactions within an organization. One of the best examples of e-business is Amazon n e BAY

CONT.
E-business

can be conducted using the web and the internet. Virtual Organization Eg- ebay Click and Mortar Organizations Eg- Walmart E-business covers the entire business process: Electronic purchasing and supply chain management, processing orders electronically which involve online payment via credit cards or debit cards, handling customer service.

E-BUSINESS HELPS WITH REAL LIFE BUSINESS:


Cut

costs and transaction times Save time and money by improving internal and external functions Promote, market and sell around the world around the clock through a website Improve customer support, communication and relationship management Compete globally without setting offices

Q5]IN EXCEL, WHAT IS MEANT BY GOAL SEEK? EG?


Goal Seek is part of a suite of commands sometimes called what-if analysis tools. When you know the desired result of a single formula but not the input value the formula needs to determine the result. When goal seeking, Microsoft Excel varies the value in one specific cell until a formula that's dependent on that cell returns the result you want.

GOAL SEEK
For example, use Goal Seek to change the interest rate in cell B3 incrementally until the payment value in B4 equals $900.00.

Thank You

You might also like