Sample Paper CA Inter – Paper 7A : Information Technology (Old Course) May 2019 Examination provided by ICAI. The pattern of CA Inter question paper would be 30% objective and 70% descriptive under the Old and New Schemes.
1 In Database Management Systems (DBMS) concept, which of the following statement is not correct?
(a) File is a collection of Records
(b) Field is a collection of characters
(c) Characters of a collection of bits
(d) Record is a collection of files
2 An aspiring CA in his interview CA was asked to provide correct sequence of the following sub-processes that represent Accounting Process Flow. The sub-processes are – (1) Source Document, (2) Financial Statement, (3) Adjustments, (4) Ledger, (5) Adjusted Trial Balance, (6) Closing Entries, (7) Journal and (8) Trial Balance. What should be the answer?
3 In a three-tier architecture, which layer is responsible for controlling application functionality by performing detailed processing?
(a) Application Layer
(b) Operating System Layer
(c) Database Layer
(d) Session Layer
4 Google App Engine is an example of ___________.
(a) Network as a Service (NaaS)
(b) Platform as a Service (PaaS)
(c) Infrastructure as a Service (IaaS)
(d) Communication as a Service (CaaS)
5 In Open Systems Interconnection (OSI) Model, _____________ provides for full-duplex, half-duplex or simplex operation; and establishes checkpointing; adjournment, termination, and restart procedures.
(a) Network Layer
(b) Presentation Layer
(c) Transport Layer
(d) Session Layer
6 In Flowchart, which symbol is used for Decision?
7. Which of the following step is not involved in an Application Access Control mechanism process?
8 What does ACID Test in a Transaction Processing System (TPS) stand for?
(a) Atomicity, Confidentiality, Isolation, Durability
(b) Authenticity, Confidentiality, Integrity, Durability
(c) Authenticity, Consistency, Integrity, Durability
(d) Atomicity, Consistency, Isolation, Durability
9 In Computer networks, _________ is defined as an inherent weakness in the design, configuration, or implementation of a network or system that renders it susceptible to a threat.
10 In terms of Computer Network Topology, which of the following statement is incorrect?
(a) Star network has a central unit that has a number of terminals tied into it.
(b) In Bus network, even if one node fails, it does not affect the entire network.
(c) Ring networks do not require a central computer to control activity nor does it need a file server.
(d) In Mesh network, if one node fails, the whole system breaks down.
11 Which of the threat is not covered under Security Management Controls?
(a) Natural Calamities
(b) Structural Damage
12 The data transmission through keyboard is an example of _______________ mode.
(c) Full – Duplex
(d) Half Simplex
13 In terms of Entity-Relationship (E-R) Diagram, which of the following statement is incorrect?
(a) Boxes are commonly used to represent entities.
(b) Diamonds are normally used to represent relationships.
(c) Diamonds are normally used to for decision making.
(d) Ovals are used to represent attributes.
14 The steps involved during the processing of Credit card are (i) Authorization (ii) Clearing (iii) Funding and (iv) Batching Arrange them sequentially.
(a) (i), (iv), (ii), (iii)
(b) (i), (ii), (iii), (iv)
(c) (iv), (iii), (ii), (i)
(d) (ii), (iii), (i), (iv)
15 Tick the incorrect statement.
(a) Variable length instructions are commonly used with Complex Instruction Set Computer (CISC) machines.
(b) Memory space is wasted by Complex Instruction Set Computer (CISC).
(c) Fixed length instructions are commonly used with Reduced Instruction Set Computer (RISC) processors.
(d) Fixed length instructions are commonly used on Complex Instruction Set Computer (CISC) machines.
16 Which of the following is not true about Secondary Storage memory devices?
(a) Random Access Memory (RAM) is an example of Secondary Storage device.
(b) Greater capacity (they are available in large size)
(c) Non-volatile (contents are permanent in nature)
(d) Slow speed (slower in speed compared to registers or primary storage)
17 In computer network, _________refers to the ability of a network to recover from any kind of error like connection failure, loss of data etc.
18 Arrange the following phases of System Development Life Cycle (SDLC) in order. (i) Investigate (ii) Maintenance and Review (iii) Analyse (iv) Implement (v) Design
(a) (i), (ii), (iii), (v), (iv)
(b) (i), (iii), (v), (iv), (ii)
(c) (ii), (i), (iii), (v), (iv)
(d) (i), (iii), (iv), (v), (ii)
19 Audit Trail is an example of ____________ Control.
20 Which of the following does not constitute part of Phase II: System Analysis of System Development Life Cycle (SDLC)?
(a) Observation of current procedures
(b) Sending out questionnaires
(c) Interviewing staff
(d) Technical Feasibility