2019 - Computer-ApplicationsInformationTechnologyMayJune2019
2019 - Computer-ApplicationsInformationTechnologyMayJune2019
2019 - Computer-ApplicationsInformationTechnologyMayJune2019
of Printed Pages : 8
Question Booklet Serial Number
Time : 3 Hours
'Max'. Marks: 70
INSTRUCTIONS TO CANDIDATES
1., Immediately after the commencement of the Examinatiofr, you should check that
this Booklet does not have any unprinted or torn or missing pages or items, etc. If
any of the above defects is found, get it replaced by a Complete Question Booklet
of the available series.
3. Enter the name of the Subject, Reg. Nb., Question Booklet version code and affix
' Signature on the OMR Sheet. As the answer
sheets are designed to suit the
Optical Mark Reader (O.M.R.) system, special care should be taken to fill those
b. A1l the answers should be marked only on the OMR sheet provided and only with
a black or blue ink batl point pen. If more than one circle is shaded/wrongly
shaded/half shaded for a given question no marks will be awarded.
6. Immediately after the final bell indicating the closure of the examination, stop
making any further markings in the OMR Arrswer Sheet. Be seated till the OMR
i Answer Sheet is collected. After handing over the OMR Answer Sheet to the
Invigilator you may leave the examination hatl.
GS-689 2
1iililIiltililffi il t tl
PART . A
Answer all questions. Each question carries 1 mark.
1x4O=40
1. How to increase font size of the selected text by one point er,€r]' trme '-)
5. Ctrl+B :
6. The basic unit of worksheet into which you enter data in Excel is ca11ed :
D
3 GS-689
i lltiilt tilIt til ililI lillt ltii iilt
D
P.T.O.
GS-689 4
rilliltililtilt]il illrilrtill
2L. Which of the following is not a clock stakeholder ?
(a) Cloud provider (b) Clients (c) End users (d) Cloud users
26. is concentrated with the buying and selling information, products and
services over computer communication networks.
(a) Commerce (b) E-Commerce (c) E-Business (d) None of these
D
Il irl lllff b GS-689
lll lllll llil iliilili
31. which of the following is part of four main types of e-commerce
?
(a) B2B (b) B2c (c) c2B (d) Alt the above
D
P.T.O.
cs-689 6
lt[ilt lillll fll llllillllllffi llll
PART - B
Answer all questions. Each question carri.es 2 marl-:s. 2N15=3O
43. The process of transfering fiies from one r:ompuler lo alother computer on the
Internet :
45. How can we replace a font on ali slides with annther: font in PowerPoint ?
46. Which method we don't neecl to specify the field tyl:e and siZe rvhile creating a
table ?
(a) Design view
(b) While using wiz'ard
(c) Create table bY entering data
id) All the above
47. Authentication is done bY :
44. MIS :
{a) create and s}rare documenls that supports day day office activities'
(b) process business transactions.
(c) capture and Reproduce the knowledges of an e::pert problem solver'
(d) use the transaction data to produce information needed b-V managers to run
the tlusiness.
D
7 GS-689
ilirilililtiltilililfiiltlill
49. How is IP address spoofing detected ?
(a) Installing and configr,rring iDS that can read the Ip header
(b) comparing 'I'-TL values of the actuar and spoofed address
(c) Implemented a firer,-",a1l to the netu,ork
(d) Identify all TCP sessions that :u-e initiated but does not complete successfully
50' Which of the following option rs not in Insertment of MSword ?
available
(a) Chart tb) Clipart (c) Word art (d) Graph
51. what is the most important actir.ity in system hacking ?
ie (a) Information gathering (b) Cracking passwords
(c) Escalating prii'ileges (d) Covering tracks
52. By security in e-commerce we mean :
-oOo-
run
D
P.T.O.