Monday 7 November 2011

Computer architecture(2005 pattern) question papers

Computer architecture(2005 pattern) question papers
Computer architecture(2005 pattern) for MCA.

1. A) explain 64 bit architecture in detail.
B) what are the registers available in dma ? Explain the data transfer modes of Dma.
2. Compare various local buses with respect to characteristics.
3. Explain hard disk controller and ils function.
4. What is pipelining ? Explain instruction pipelining with example.
5. What is counter ? Explain any two types of counters.
-> write short notes

A) half adder.
B) system buses.
C) floating point unit.
D) handshaking.
E) spec bench mark.

organisational behaviour new pattern

organisational behaviour new pattern
organisational behaviour question paper for mca

.define the term organisational behaviour. explain the various models of
organisational behaviour. what are its implications for a multinational it.
company ?
what is stress ? is it always bad for individuals ?
. define change. what are factors responsible for changes ?
. what are the various theories of motivation ? explain any one theory of motivation.
'.elaborate the nature, importance and scope of leadership.
define t.q.m. explain any three techniques of t.q.m.
write short notes on any three :
a) group dynamics
b) personality
c) organisational culture
d) lnlrapersonal conflict.

information system audit -new pattern

information system audit  -new pattern
Information system audit  -new pattern
a) network controls.
b) isaca standards.
c) software configuration management.
d) organization structure, c) e-commerce.

2, explain the various steps involved in risk assessment.

5. briefly explain various validation controls to be applied at field, record, file and
batch level with example.

n. a) write in brief about segregation of duties.
b) differentiate the role of database administrator and data administrator
in auditing process.

what are various steps involved in security mechanisms under physical access
controls ?

you are on the internal audit staff of lensar ltd., a large producer of health and beauty products. your organizations main computer installation has a file library consisting of 5000 reels of tapes and 1000 disk packs. as being internal audit manager, identify 5 major threats and their respective controls. prepare a report which covers :
a) the objectives of audit.
b) identified threats and controls.
c) major controls to be examined w.r.t. physical access and logical access of file library.
d) list down the techniques and different agents for the evidence collection process for the case study.

decision support systems -2005 patterns

decision support systems -2005 patterns
decision support systems -2005 patterns  examination  questionas.

1. why is implementing mss technologies more complex than implementing mis technologies ?   discuss the major determinants of successful mss implementation.    
2. give the schematic view of dss and explain each of the components of dss in
brief.
3. relate data warehousing to olap and data visualization.
4. explain the traditional system development life cycle. why is prototyping considered to be a suitable process for the development of dss ?
5. what are the major benefits of integrating eis and dss ? what problems can occur?
6. write short notes on any four of the following :

a) erp
b) knowledge based expert system
c) data mining
d) gis
e) intelligent dss

biometric identification | E-Logistics | Embedded System

biometric identification | E-Logistics | Embedded System


biometric identification | E-Logistics | Embedded System questions in Mca .
1. The core area of Inovative Software Solutions is product development. They have four offices situated at four major cities. As a Business Continuity Steering Committee head, you are advised to suggest suitable Business Continuity Plan Structure.
2. A) Explain in detail following areas of biometric identification :
a) Hand Geometry.
a2) Retina Scan.
ai) Brain Mapping.
B) Discuss usage of Cyber laws in E-Governance.
3. A) Define Embedded System. Explain Real Time Operating System.
4. B) What is GIS ? How does GIS works ?
5. A) What is E-Logistics ? Explain how E-Logistics system works in the
Organisation.

B) What is Knowledge Management ? Explain Knowledge Management
Architecture in detail.

1) Data Mining.
2) LMS and LCMS.
3) Securities in E-banking.
4) BPO Aggrement.
5) Types of Embedded System.

Current Trends In Information Technology

Current Trends In Information Technology
 Current trends in information technology

  1.  Abc private ltd.' is a manufacturing company doing all the transaction online through intranet. Extranet and internet.
  2. As a security measure suggest suitable alternative firewall types for xyz.

  3.  What is knowledge management ? Explain difference between tacit and explicit
  4. Knowledge along with examples. 10
  5.  What is gis ? Explain map making with suitable example.
  6.  What is bpo ? Explain laws of bpo.
  7.  Explain various h-banking services provided by icici/hdfc.
  8.  Explain various models of e-governance in detail.
  9. Define embedded system. What arc various components of embedded system ? 
  10. 'Penalties for damage to computer, computer system, computer network'.
  11. Synchronous vs. Asynchronous learning.
  12. E-logistics.
  13. Types of mobility.
  14. Data mining.