COURSE NAME: B.COM III YEAR SUB- IT & IB NAME……………..…… PAPER CODE: - C-304 ROLL NO……………….. Time: 2:00 Hour M.M: 100 This paper contains 100 Questions of one mark each. 1. …… elements in ISA evaluate the reliability of a particular system: A) Exposers B) Causes C) Controls D) All (a), (b) and (c) 2. If A = (1011)2 , B= (1001)2 , then calculate C= A x B = ? A) (110011)2 B) (100011)2 C) (100001)2 D) 111100)2 3. Calculate: (110110111)2 = (?)8 A) (567)8 B) (677)8 C) (667)8 D) (766)8 4. Convert: (110111111001)2 = (?)16 A) (9DF)16 B) (9FD)16 C) (FD9)16 D) (DF9)16 5. Which is an incorrect option? A) 1 byte = 8 bites B) 1 kb = 1024 bytes C) 1mb = (1000) kilo bytes D) 1 nibble = 4 bites 6. …… Ensure that EDI transactions are sent securely are reliably. A) VAN B) FTPS C) VPN D) FEDI 7. Free E-mail services hot mail started in India by: A) Saber bhatiya B) Rajeev Gandhi C) WIRO D) Infosys 8. The ……… performs simple mathematics for the CPU. A) BUS B) DIMM C) CPU D) ALU 9. Any component of the computer you can see and touch: A) Software B) Peripheral C) Storage D) Hardware 10. The full form of ftp: A) File transfer process B) File transfer protocol C) File transfer program D) File transfer pole 11. In hexadecimal number system the value of B is: A) 02 B) 01 C) 11 D) 09 12. Thich of these is known as point and draw device. A) Mouse B) Scanner C) Printer D) CD-ROM 13. The binary equivalent of (15)10 is: A) 1110 B) 1101 C) 1111 D) 1011 14. The ‘md’ is the command of A) Unix B) DOS C) Windows-95 D) FTP 15. 1 MB is equal to: A) 1024 KB B) 1024 x 1024 bytes C) 1024 x 1024 x 1024 bytes D) (a) and (b) both 16. Programs stored in ROM are called: A) Hardware B) Firmware C) Software D) None of the above 17. The OSI contains: A) 5 layers B) 6 layers C) 7 layers D) 8 layers 18. A program for viewing web pages Is called: A) Word processor B) Spreadsheet C) Protocol D) A browser 19. Among, which is not a web browser: A) Internet explorer B) Mozilla C) Net scape navigator D) Foxpro 20. A device needed to communicate with computers using telephones lines is a: A) Disk B) CUP C) VDU D) Modem 21. In ….. Topology if a computer network cable is broken whole network goes down: A) Bus B) Star C) Ring D) Mesh 22. In communication the meaning of www. Is: A) With wide web B) Wide world web C) Web wide world D) World wide web 23. Ethernet uses: A) Bus topology B) Ring topology C) Mesh topology D) All of the above 24. In GUI, G stands for: A) Giga B) Grand C) Global D) Graphical 25. The full form of FAT is: A) Fixed allocation table B) Free allocation table C) File allocation table D) File allow table 26. Hexadecimal equivalent of (121)10 is: A) 81 B) 79 C) 97 D) 72 27. The POS stands for: A) Place of sale B) Point of scale C) Priority of sale D) None of these 28. New technology includes: A) Smart phones B) E-Mails C) Tablets D) All of these 29. Which of these is a limitation of WAP? A) High speed B) High cost C) Large amount of data transfer D) None of the above 30. A term related to sending data to a satellite is ………. A) Uplink B) Downlink C) Demodulate D) Modulate 31. Computers are essentially….. Tools: A) Living B) Thinking C) Problem solving D) Reasoning 32. CAM stands for: A) Computer advanced mobile B) Computer aided manufacturing C) Computer aided mobile D) All 33. Original name of internet was: A) Apple B) Micro light C) ARPANET C) None of these 34. ….. Is a volatile memory: A) Cache B) RAM C) ROM D) Auxiliary memory 35. FDDI uses………. As transmission media: A) Optical fiber B) Coaxial cable C) Open wires D) Twisted pair cables 36. (111100011001)2 =(?)16 A) (F91)16 B) (F19)16 C) (A19)16 D) (A91)16 37. The ASCII value of character ‘f’ is: A) 102 B) 50 C) 70 D) 072 38. …….. Allows you to connect and login to a remote computer: A) Telnet B) FTP C) HTTP D) None of these 39. HTTP is a …….. Protocol: A) Application layer B) Transport layer C) Network layer D) None of these 40. Which of the following is a data link protocol? A) Ethernet B) Point to point protocol C) HDLC D) All of these 41. All of the following are top level domains except: A) .com B) .mil C) army D) .org 42. The full form of UDP is: A) User database protocol B) User disk protocol C) User domain protocol D) User datagram protocol 43. Calculate (1101)2 + (1000)2 = ? A) (101010)2 B) (2111)2 C) (10001)2 D) (11110)2 44. Which of following language is used for A.I.: A) FORTRAN B) PROLOG C) COBAL D) C 45. The central device in star topology is: A) STP server B) Hub/switch C) PDC D) Router 46. What is the commonly used paper size: A) A4 B) A3 C) A5 D) A6 47. USB devices are: A) Portable B) Light weight C) Re-writable D) All of above 48. Full form of ASCII …………………………………………………………………………………………………. A) Full form of BCD …………………………………………………………………………………………………... 49. DPI stands for: A) Decimal per inch B) Dots per inch C) Delay per inch D) None of these 50. Hard disk is also known as: A) Winchester disk B) Wind disk C) Air disk D) None of these 51. MS Office does not contain: A) Word B) Excel C) Power point D) Adobe reader 52. EDI has the advantages of: A) No time delays B) No uncertainty C) No errors D) All of these 53. Which of the following is not an EDI standard? A) TCP/IP B) X.12 C) EDIFACT D) X.400 54. The entire string of an EDI message is called: A) Transaction B) Data segment C) Data document D) Data transaction 55. The physical layer is responsible for: A) Line coding B) Channel coding C) Modulation D) All of these 56. The network layer concerns with: A) Bits B) Frames C) Packets D) None of these 57. Which one of the following is not a function of network layer? A) Routing B) inter networking C) Congesting control D) None of these 58. A 4 byte IP address consist of: A) Network address B) Host address C) Both (a) and (b) D) None of these 59. Which one of the following tasks is not done by data link layer? A) Framing B) Error control C) Flow control D) Channel coding 60. Full form of DNS ……………………………………………………………………………………… 61. Which one of the following is not used to generic dynamic web page? A) PHP B) ASP.NET C) JSP D) None of these 62. Information system audit provide the audit service of: A) IT governance B) Information systems C) Integrated audits D) All of the above 63. ……. Act upon causes in order to reduce exposures: A) Controls B) Inspection C) Integrated audits D) None of these 64. ……. Audit looks at the information follow: A) Internal B) IS C) Traditional D) None of these 65. IT audit can be applied in the implementation of: A) Financial audits B) Performance audits C) Both of (a) and (B) D) None of these 66. Is audit is performed in federal agencies in: A) Spain B) France C) Germany D) England 67. GIGO stands for: A) Garbage in garbage out B) Garbage internal garbage out C) Garbage in garbage outsourcing D) None of the above 68. In which language the source program is written: A) English B) High level C) Symbolic D) Spanish 69. The …….. Is the physical path over which a message travels: A) P path B) Medium C) Protocol D) Route 70. A set of rules that governs data communication: A) Protocols B) Standards C) Rfcs D) None of these 71. A computer on internet is identified by: A) E mail address B) Street address C) I.P. Address D) None of these 72. Internet explorer fail under: A) Operating system B) Compiler C) Browser D) IP address 73. Moving from one website to another is called: A) Downloading B) Browsing C) Uploading D) Attachments 74. Calculate : (11111)2 – (1101)2 = ? A) (11101)2 B) (10001)2 C) (10010)2 D) (10111)2 75. If A = TRUE ,B = FALSE then calculate C = (A)’ and (B) A) True B) False C) True and false D) None of the above 76. In power point presentation the key for slide show is used: A) F4 B) F2 C) F8 D) F5 77. Which key is used to check spelling? A) F3 B) F7 C) F5 D) F9 78. Measurement unit of sound frequency is: A) Megabyte B) Kilobyte C) Hertz D) Gigabyte 79. Who developed UNIX operating system A) AT & T B) Intel C) Bell laboratory D) Coral 80. Which one is false from the following: A) (ABC)16 B) (2109)8 C) (1101)10 D) (1101)2 81. Real time textual talk is popularly known as: A) Surfing B) Chatting C) Down loading D) (a) and (B) 82. When you open internet, the first page is known as: A) Master page B) First page C) Main page D) Home page 83. Which one of the following is not a search engine? A) Bing B) Google C) Yahoo D) Window 84. Firewall in computer is used for A) Security B) Data Transmission C) Authentication D) Monitoring 85. MAC OS is developed by which company A) IBM B) Apple C) Microsoft D) Samsung 86. .gif is an Extension of A) Image file B) Video file C) Audio file D) Word file 87. Computer Hard Disk was First Introduced in 1956 by A) Dell B) IBM C) Apple D) Microsoft 88. In Computer World, Trojan refer to A) Virus B) Malware C) Worm D) Spyware 89. What is the extension type of the Excel 2007 files? A) .xls B) .xlsx C) .xsl D) None of Above 90. Total number of Function keys on Computer Keyboard A) 10 B) 12 C) 14 D) 8 91. Oracle is a 92. Operating System B) RDBMS C) Interpreter D) Compiler 93. UPS Stands for A) Universal Power Supply C) Universal Power Source B) Uninterruptible Power Standby D) Uninterruptible Power Supply 94. System Software is an interface between ___________________________________ A) Hardware & Application Software C) Application Software & User B) RAM & ROM D) CPU & UPS 95. Which of the following is not a component in multimedia? A) Audio B) Video C) Data D) Pen drive 96. The __________________ protect system from Hackers A) Antivirus B) Backup C) Firewall D) Hard disk 97. ‘IoT’ refers to A) Internet of Things C) Intranet of Teleservices B) International Organization of Teleservices D) International Organization of Telecommunication 98. Mark Zuckerberg is the owner of A) Facebook B) Google C) Linux D) LinkedIn 99. Which is an Input Device A) Monitor B) Printer C) Mouse D) None of these 100. Network Interface Card (NIC) is generally used for A) Connectivity B) Programming C) Printing D) None of these
2016 - Using Modern Plant Trait Relationships Between Observed and Theoretical Maximum Stomatal Conductance and Vein Density To Examine Patterns of Plant Macroevolution