0% found this document useful (0 votes)
300 views

Computer Applications and Information Technology2018

Computer application jdjdjosowkwjwjwjjw And information technology 2018

Uploaded by

shilpa mouni
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
300 views

Computer Applications and Information Technology2018

Computer application jdjdjosowkwjwjwjjw And information technology 2018

Uploaded by

shilpa mouni
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 14
SM — 669 VI SEMESTER B.A/B.Sc/B.C.A/B.S.W./ B.Sc. (FAD) EXAMINATION, MAY/JUNE 2018 (CBCS) (Fresh+Repeaters) (2016-17 and Onwards) COMPUTER APPLICATIONS AND INFORMATION TECHNOLOGY Version Code 16201 “ON ‘IS 18100g UORSeND Time Allowed : 3 Hours Maximum Marks : INSTRUCTIONS TO CANDIDATES 1. Immediately after the commencement of the Examination, you should check that this Booklet does not have any unprinted or torn or missing pages or items, ete. Ifany of the above defects is found, get it replaced by a Complete Question Booklet of the available series. 2. Write clearly the Question Booklet Version Code A, B, C, Dor E, inthe appropriate space provided for the purpose, in the OMR Answer Sheet. 3. Enter the name of the Subject, Reg. No., Question Booklet version code and affix Signature on the OMR sheet. As the answer sheets are designed to sult the Optical Mark Reader (O.M.R.) system, special care should be taken to fill those items accurately. 4. This Question Booklet contains 55 questions, Part — A contains 40 questions of one mark each and Part — B contains 15 questions of two marks each. All questions must be attempted. Each question contains four answers, among them one correct answer should be selected and shade the corresponding option in the OMR sheet. 5. Allthe answers should be marked only on the OMR sheet provided and only with a black or blue ink ball point pen. If more than one circle is shaded / wrongly shaded / half shaded for a given question no marks will be awarded. 6. Immediately after the final bell indicating the closure of the examination, stop making any further markings in the OMR Answer Sheet. Be seated till the OMR Answer Sheet is collected. After handing over the OMR Answer Sheet to the Invigilator you may leave the examination hall. SM - 669 2 PART-A Answer all the questions. Each question carries one mark. (40x1=40) n » » - What is the default file extension for all word documents ? a) tt b) .word ¢) .dots d) .doc Which key on the keyboard can be used for slide show 7 a) FA b) F2 ©) F5 4) F10 . The value of primary key is a) Null b) Zero ¢) Not null d) Both a) and c) In mail merge operation, which of the following might represent the main document ? a) Asales brochure b) A form letter ¢) A database of names and addresses d) All of above SPACE FOR ROUGH WORK 2 sl Nn + SM - 669 DED stands for a) Data Flow Description b) Data Flow Diagram ) Data File Diagram d) None of these . DML is used for a) Description of logical structure of database b) Addition of new structures in database ©) Manipulation and processing of database d) Definition of physical structure Which of the following is not a browser ? a) Microsoft bing b) Netscape navigator ¢) Mozilla firefox d) Opera What are the columns in Microsoft Access table called ? a) Reports b) Rows c) Fields 4) Records SPACE FOR ROUGH WORK SM -669 a 9. The actual mail transfer is done through a) UA’s b) MTA c) MAA d) None 10. In cryptography, the order of the letters in a message is rearranged by a) Transpositional ciphers b) Substitution ciphers ©) a) and b) d) None 11. MRP stands for a) Manufacturing Resource Planning b) Master Resource Production c) Management Reaction Planning d) Material Requirements Planning 12. Cloud concept related to pooling and sharing of resources is a) Polymorphism b) Abstraction ©) Virtualisation d) None SPACE FOR ROUGH WORK ‘ANH & SM - 669 13. da, You can check the conditions against when applying conditional formatting. a) Cell value b) Formula c) Both a) and b) d) None What is the shortcut key to replace a data with another in a sheet ? a) Ctrl+R b) Ctrl + Shift +R ©) Cirl+H d) Ctrl +F ‘An asymmetric key encryption uses a) 1 key b) Skey c) 2key d) 4 key . Verification is process of a) Access 'b) Login ¢) Logout ) Authentication SPACE FOR ROUGH WORK SM — 669 2 17. Which of the following is not the way to deploy cloud computing resources ? a) Public cloud b) Private cloud ©) Generic cloud d) Hybrid cloud 18. Virus is a) Program b) Warm ©) Object d) Interrupt 19. NIST stands for a) National Institute of Social Trust ») National Institute of Standards and Technology ¢) National Institute of Science and Technology 4) National Institute of Science and Transition 20. In which type of banking, electronic financial transaction are done ? a) E-banking b) POS banking ¢) M-banking d) Universal banking 21. Landscape is a) Font style b) Paper size c) Page layout d) Page orientation SPACE FOR ROUGH WORK Ow a ‘SM - 669 22. Which of the following are types of sound files ? a) Log files b) DAT files c) Wav files d) DRV files 23. Digital signature preserves a) Authenticity b) Integrity c) Both a) and b) d) None of the above 24. is the incoming e-mail server. a) POP b) SMTP c) SMIP d) PPD 25. Which is not the font size available in MS-Word ? a) 10 b) 14 ce) 13 d) 12 26. Which of the following file extension is not valid ? a) xis b) -Rif c) .docx d) .jpeeg 27. Maximum zoom allowed in MS-Word is a) 100 b) 450 c) 500 d) 250 SPACE FOR ROUGH WORK SM - 669 8 ‘IMA 28. The intersection of row and column is called a) Data set b) Cell ¢) Data d) Set 29. Computer security can be increased by using a) Firewall b) Antivirus ©) Password d) All of the above 30. HTML is _ language. a) Scripting b) Markup ©) Programming d) Network 31. COBIT stands for a) Control Objective for Information and Related Technology ) Consumer Objective for information and Related Threats ¢) Common Object for Information and Related Threats d) Consumer Orientation for Information and Related Timing SPACE FOR ROUGH WORK 32. 33. 35. (ORO * SM - 669 SQL stands for a) Structured Questioning Language b) Standard Query Language c) Standard Questioning Language d) Server Side Query Lanugage The process to discover plaintext or key is a) Cryptanalysis b) Cryptodesign ¢) Cryptography d) Cryptoprocess Which of these file format can be added to PowerPoint presentation ? a) jpg b) .giv c) .wav d) All of above The solution for all business need is a) EDI b) ERP c) SAS d) None of the above . Hacking refers to a) Data access without permission b) Data updation without permission c) Data deletion without permission d) All of the above SPACE FOR ROUGH WORK ‘SM - 669 “10- ‘A 37. What is the default font used in MS-Word 2007 document ? a) Times New Roman b) Arial ¢) Calibri d) Monotype 38. What is the maximum penalty for damage to computer, computer systems with virus, denial of access as per Section 43 ? a) Rs. 50 lakh b) Rs. 1 crore c) Rs. 5 crore d) Rs. 75 lakh 39. The term e-commerce includes a) Electronic trading of physical goods b) Electronic provision of services such as after sales support ©) All the steps involved in trade, such as on-line marketing d) All of the above 40. Which of the following are the forms of E-banking ? i) Internet banking ii) Telephone banking ili) Electronic check conversion iv) Electronic bill payment a) i), ii), iii) only b) i) only ©) i) and ii) only d) All of the above SPACE FOR ROUGH WORK a SM - 669 PART-B Answer ail the questions. Each question carries 2 marks. (15x2=30) 41. Objects on the slide that hold text are called a) Place holders b) Object holders ¢) Auto layout d) Text holders 42. Which command brings you to first slide in your presentation 7 a) Next slide button b) Page up c) Ctri + Home d) Ctrl + Shift + Home 43. DSS stands for a) Decision Support System b) Decision Signature System c) Distinguished Standard System d) Data Standard System SPACE FOR ROUGH WORK ‘SM - 669 “12 ‘AQ 8 44. Which one of the following statement is not correct for digital signature ? a) It is Authentication Mechanism b) It cannot be duplicated ¢) Itis created by encrypting information q) It is the scanned image of one's signature 45. Which Section of IT Act deals with cyber terrorism ? a) Section 66C b) Section 66B c) Section 66F d) Section 664 46. Personal or sensitive information on one’s computer can be done a) Cracking b) Hacking ¢) Phishing 4) Stalking 47. Input message in cryptography is called a) Plaintext b) Ciphertext c) Encrypted data d) None SPACE FOR ROUGH WORK Oe et 13 ‘SM - 669 48. Borders can be applied to a) Cells b) Paragraph ©) Text d) All of above 49. Expert systems are part of a) First generation languages b) Second generation language ) Third generation language ) Fifth generation language 50. SMTP utilizes as the transport layer protocol for electronic mail transfer. a) TCP b) UDP c) DCCP ¢) SCTP 5 . Which of the following is not a database ? a) MySQL b) Quick base c) Sybase d) Probase SPACE FOR ROUGH WORK SM - 669 14 52. FTP uses the services of a) UDP b) IP c) TCP @) None of the above 53. Fundamental HTML block is known as a) HTML body b) HTML tag ©) HTML attribute d) HTML element 54. The database schema is written in a) HLL b) DML ©) DDL d) DCL 55. Which of the following is not a type of page margin 7 a) Left b) Right c) Center d) Top ‘SPACE FOR ROUGH WORK

You might also like