2019 - Computer-ApplicationsInformationTechnologyMayJune2019

Download as pdf or txt
Download as pdf or txt
You are on page 1of 7

No.

of Printed Pages : 8
Question Booklet Serial Number

GS-6gg Iiltilll]il illtl]tll] 105094


vI semester
fl ilil
Z2 +
B.A. / B. S"78. C.A. / B. S.W. / B. Sc. (FAD)
Version Code Examination, May/June - 2olg
COMPUTER APPLICATIONS AND TNT'ORIVIATION TECHNOIOGY
{CBCS} (F'+R} (2()16- L7 StOnwards)

Time : 3 Hours
'Max'. Marks: 70
INSTRUCTIONS TO CANDIDATES
1., Immediately after the commencement of the Examinatiofr, you should check that
this Booklet does not have any unprinted or torn or missing pages or items, etc. If
any of the above defects is found, get it replaced by a Complete Question Booklet
of the available series.

2. Write clearly the Question Booklet Version Code A, B, C; D or E in the appropriate


space provided for the purpose, in the OMR Answer Sheet.

3. Enter the name of the Subject, Reg. Nb., Question Booklet version code and affix
' Signature on the OMR Sheet. As the answer
sheets are designed to suit the
Optical Mark Reader (O.M.R.) system, special care should be taken to fill those

4. This Question Booklet contains 55 questions, Part - A contains 4O questions of


one mark each. Part - B contains 15 questions of triro marks each. All questions
must be attempted. Each question contains four answers, among them one correct
answer should be selected and shade the corresponding option in the OMR Sheet.

b. A1l the answers should be marked only on the OMR sheet provided and only with
a black or blue ink batl point pen. If more than one circle is shaded/wrongly
shaded/half shaded for a given question no marks will be awarded.

6. Immediately after the final bell indicating the closure of the examination, stop
making any further markings in the OMR Arrswer Sheet. Be seated till the OMR
i Answer Sheet is collected. After handing over the OMR Answer Sheet to the
Invigilator you may leave the examination hatl.
GS-689 2
1iililIiltililffi il t tl
PART . A
Answer all questions. Each question carries 1 mark.
1x4O=40
1. How to increase font size of the selected text by one point er,€r]' trme '-)

(a) by pressing ctrl+l (b) by pressing ctrl+{


(c) by pressing ctrl+) (d) by pressing ctrl+(
2. The no. of ways you can save the document is :

(a) 2 (b) 3 (c) 4 (d) s

3. What is IP stands for ?


(a) Internet Protocol (b) Internet Provider
(c) Internet Procedure (d) Internet'Processor

4, Which is the default alignment in word ?


(a) Left (b) Right (c) Center (d) Justify

5. Ctrl+B :

(a) Searches a selected text (b) Pastes a selected text


(c) Bolds a seiected text (d) Opens a specified file

6. The basic unit of worksheet into which you enter data in Excel is ca11ed :

(a) Cell (b) Table (c) Box (d) Column

7. Fundamental HTML block is knourr as :

(a) HTMLbody (b) HTML tag


(c) HTML attribute (d) HTML element

8. What is Data Encryption Standard (DES) ?


' (a) Biock cipher (b) Stream cipher (c) Bit cipher (dt \one
9. Portrait and Landscape are
(a) Paper size (b) Page layout
(c) Page orientation (d) Page margin

-. documents in a standard format is known as


10. Electronic exchange of business :

(a) E-commerce (b) E-Business (c) EDI (d) None of these


11. Which of the following is not a powerpoint view ?
(a) Slide shower view (b) Slide view
(c) Presentation view (d) Outline view

D
3 GS-689
i lltiilt tilIt til ililI lillt ltii iilt

L2' Electronic exchange of Business d.ocuments in a standard format is known as

(a) E-Comrnerce {b) E-Business


(c) EDI (d) None of the above

13. Which of the following is not a cloud. stakeholder ?


(a) Cloud providers ib) Ciients
(c) End user (d) Cloud user

L4. The term attribute refers to a -.-- of a table.


(al Record (b) Column (c) Tuple {d) Key

15. Computer virus program is usually hidden in :


(a) Operating system (b) Application program
(c) Disk driver (d) (a) and (b)
16. EDI requires :
(a) representation of common business documents in computer readable forms
(b) data entry operators by receivers
(c) special value added networks
(d) special hardware at co-operating business premise
L7. B2C Commerce :
{a} includes services such as legal advice
(b) only shopping physical goods
{c) only customer should approach customers to sell
(d) customers shourd approach business to business
18. What is anti-virus ?
(a) It is a computer (b) It is a program
(c) It is an application (d) It is a comp.rny name

L9. PowerPoint slides can have :


(a) title, text, graphs (b) drawn objects, shapes
(c) clipart, drawn art, visual (d) any of the above

20. HTTP is _ protocol.


'' (a) application layer (b) transport layer
(c) network layer (d) none of the above

D
P.T.O.
GS-689 4
rilliltililtilt]il illrilrtill
2L. Which of the following is not a clock stakeholder ?
(a) Cloud provider (b) Clients (c) End users (d) Cloud users

22. Virus are :

(a) Man made (b) Naturally occur


(c) Machine made (d) A11 the above

23. A digital signature need a :

(a) Public key system (b) Private key system


(c) Fublic and private key system (d) None of the above

24. Saas stands for :

(a) Software as service (b) System Softrvare and Sen-ices


(c) Software as a system (d) Sl.stem as Service

25. Which of the follor,r.ing used to read a HTML page ?


(a) Web server (b) Web browser (c) Web matrix (d) Web network

26. is concentrated with the buying and selling information, products and
services over computer communication networks.
(a) Commerce (b) E-Commerce (c) E-Business (d) None of these

27. Which of the following is not a type of MS Access database object ?


(a) Table (b) Form (c) Worksheets (d) Modules

28. What ii a Hash function ?


(a) It creates a small flexible data
(b) Creates a small fixed block of data
(c) Creates encrypted block of data
(d) None of the above

29. A Relational database consists of collection of :

(a) Tables (b) Fields (c) Records (d) Keys

30. The tuples of the relations can be of order.


(a) Any (b) Same -- (c) Sorted (d) Constant

D
Il irl lllff b GS-689
lll lllll llil iliilili
31. which of the following is part of four main types of e-commerce
?
(a) B2B (b) B2c (c) c2B (d) Alt the above

32' The Greater than (') is an example of -- operator.


(a) Arithmetic (b) Logical (c) conditionar (d) Rerational

33. Which key can be used to view slide show ?


(a) Fs (b) F2 (c) F7 (d) Fe

34. What is the maximum zoolrr. size in powerpoint ?


(a) 100% (b) 2Oo% (c) 3}oyo (d) 4oO%

35. The r-irus spreads in an apprication software is called as:


(a) Boot virus (b) Macro virus (c) File virus (d) Anti_virus

36. Crypt Analysis is used :


(a) to find some insecurity in a cryptographic scheme
(b) to increase speed
(c) to encrypt data
(d) none of the above

37. The shortcut key to save document in word :

(a) ctrl+A 1b) ctrl+c (c) ctrl+v (d) ctrl+s


38. DDL stands for :

(a) Data Definition Languages (b) Database Definition Languages


(c) Data Dictionary (d) None of the above

39' An Information System that supports planning and assessment


needs of executive
management in :
(a) DSS (b) rps (c) ERp (d) Mrp

40. Which one is not a function in MS-Excel ?


(a) SUM (b) AVG (c) MAx (d) MrN

D
P.T.O.
cs-689 6
lt[ilt lillll fll llllillllllffi llll

PART - B
Answer all questions. Each question carri.es 2 marl-:s. 2N15=3O

4L. \fulhich HTMI, tag makes the text center aligned ?

{a} center (b) smail (c) h1 (d) fcnt

42. Which tag is used to dispiay a picture in HTML page ?


(a) img (b) picture ic) image (d) src

43. The process of transfering fiies from one r:ompuler lo alother computer on the
Internet :

(a) Uploading (b) Forwarding (c) FTP {d} Downioadins

44" An advantage of database management apprcach is


{a} data is dePendent on Progralns
(b) data reciunciartcv increases
(c) data integrated ald can be accessed by multipie ilrogranis
(d) none of the allot'e

45. How can we replace a font on ali slides with annther: font in PowerPoint ?

(ai Tools *+ Fonts (b) Edit -+ Font:


(c) Format -+ Replace fonrs (dt Tools ---+ Replace fonts

46. Which method we don't neecl to specify the field tyl:e and siZe rvhile creating a
table ?
(a) Design view
(b) While using wiz'ard
(c) Create table bY entering data
id) All the above
47. Authentication is done bY :

(a) Conventiona-l errcryPtion (b) Scrambiin E :lai.a


(c) Both (a) and {b} (d) None of the above

44. MIS :
{a) create and s}rare documenls that supports day day office activities'
(b) process business transactions.
(c) capture and Reproduce the knowledges of an e::pert problem solver'
(d) use the transaction data to produce information needed b-V managers to run
the tlusiness.

D
7 GS-689
ilirilililtiltilililfiiltlill
49. How is IP address spoofing detected ?
(a) Installing and configr,rring iDS that can read the Ip header
(b) comparing 'I'-TL values of the actuar and spoofed address
(c) Implemented a firer,-",a1l to the netu,ork
(d) Identify all TCP sessions that :u-e initiated but does not complete successfully
50' Which of the following option rs not in Insertment of MSword ?
available
(a) Chart tb) Clipart (c) Word art (d) Graph
51. what is the most important actir.ity in system hacking ?
ie (a) Information gathering (b) Cracking passwords
(c) Escalating prii'ileges (d) Covering tracks
52. By security in e-commerce we mean :

(i) Protecting an organization's d.ata resource for unauthorised. access


(ii) Preventing disasters from happening
(iii) Authenticating messages received. by an organization
(iv) Protecting messages sent on the internet from being read and understood
by unauthorized persons/organizations.
(a) (i), (ii) (b) (ii), (iii) (c) (iii), (iv) (d) (i), (iii), (iv)

53. <title> tag is used :

(a) to display content of the webpage


(b) to display headings to the webpage
qa (c) to display title bar information of the webpage
(d) none of the above
54. which type of software is self-replicating that causes damages to the file and
system ?
(a) Virus (b) Trojan horse (c) Boots (d) Worms
55. Block cipher processes :

(a) 1000 bits at a time


(b) One bit block of data at a time
(c) (a) and (b)
(d) None of the abor.e

-oOo-
run

D
P.T.O.

You might also like