You are on page 1of 1

IT KNOWLEDGE

Time allowed - 2 hours


Total marks - 100

[N.B. - The figures in the margin indicate full marks. Questions must be answered in English. Examiner will take
account of the quality of language and the manner in which the answers are presented. Different parts, if any, of
the same question must be answered in one place in order of sequence.]
Marks

1. (a) What are the characteristics of eCommerce? Describe in detail. 7


(b) What are the basic benefits of eCommerce? 3

2. What is BIOS (Basic Input Output System)? Where is BIOS located? What is the function
of BIOS? How can BIOS be updated? 2+2+3+3

3. What is security control? Describe four technologies/tools that are used to provide security. 2+8

4. Explain each of the following validation methods with an appropriate example. (i) Allowed 8
character check, (ii) consistency check, (iii) data type check, and (iv) logic check.

5. Explain with examples the following three components of information security: 6


(i) confidentiality, (ii) integrity, and (iii) availability.

6. The IT manager of an organization has been assigned the task to buy network switches to 4+4+2
build a Local Area Network (LAN) connecting 28 workstations, one network printer and a
server. During market visit, he found that only 6-port switches are available. What is the
minimum number of 6-port switches he needs to buy to build the LAN? Explain and justify
your answer. Also draw the block diagram of the resulting LAN topology to show the
connectivity among the devices. What is the name of the topology you have used?

7. Any communication system can be categorized in two ways: (i) based on data transmission 2+7
modes, a system which can be simplex, half duplex or duplex and (ii) based on information
transmission method, a system which can be unicast, multicast or broadcast. Now give
example of a communication system that uses both simplex and broadcast transmission.
Give definitions of simplex and broadcast transmissions and thereby justify your example.

8. What is a protocol in the context of computer network? Explain the following three 7
elements of a protocol with suitable examples: (i) syntax, (ii) semantics, and (iii) timing.

9. Discuss the impact of Information Technology (IT) on the following two aspects of internal 9
audit: (i) audit evidence, and (ii) segregation of duties.

10. (a) What is the purpose of internal control in an organization? What are the key phases for 5
evaluating internal controls?
(b) What are the roles played by control activities and information & communication in
internal controls? 4

11. (a) Define acceptance testing as a control over system implementation. What are the issues 6
it aims to provide as confirmation to the system users?
(b) What are the areas that should be addressed by performance testing as a control over
system implementation? Elaborate. 6

Page 1 of 1

You might also like