You are on page 1of 1

Information Technology

Time allowed-3 hours


Total Marks-100

[N.B.- Questions must be answered in English. Examiner will take account of the quality of language and
of the manner in which the answers are presented. Different parts, if any, of the same question
must be answered in one place in order of sequence. Answer any EIGHT questions. All questions
are of equal value.]

1. (a) Define basic functionalities of Computer system.


(b) Exemplify binary equivalent of 4210 and decimal equivalent of 47068
(c) Broadly define the “Generation of Computer”.

2. (a) What is the actual difference between a LAN & WAN?


(b) What are a server and a client? What turns a computer into a server, or a client; is it hardware
or software?
(c) What is the difference between a server-based LAN and a peer-to-peer LAN?

3. (a) What is a database model? Name four commonly used database models and describes any one.
(b) What is a data dictionary? How is it created/updated?
(c) List the advantages of database-oriented approach of organizing data.

4. (a) Between a business continuity solution and a disaster recovery solution, which one is more
important and why?
(b) What are the security concerns of the backed-up data?
(c) Define social engineering and phishing attacks? How can you protect yourself from these?

5. (a) What are the roles of an accountant in the software development or acquisition process?
(b) What are roles of an accountant in the software implementation process?
(c) How do you depreciate a software asset? Should the expenditure for enhancing (not
procuring) IT security be recognized as asset, or expense in the accounting process? Explain
your opinion.

6. (a) Differentiate between authentication and authorization.


(b) What is encryption? List some of the encryption algorithms.
(c) What are the various security aspects that an OS normally needs to deal with as part of the
internal security of a computer system.

7. (a) How do you implement internal controls in IT systems?


(b) How to design internal controls over financial reporting, when financial reporting is
performed totally from the software application? Explain briefly the major points.
(c) What are the additional controls needed, when the software interfaces are web-
based? Explain the materiality of the payroll processing functions to be performed by web-
interfaces from the control perspective.

8. (a) What is security policy? To protect an organization’s information what security policy need
to follow according to you.
(b) What is MIS? What are the differences between MIS and ERP?
(c) Define ERP? List some of the advantages and disadvantages of ERP.

9. Write Short notes of the following:


(a) IP Phone
(b) Digital Signature
(c) Social Network
(d) Bandwidth

- The End -

You might also like