Organisation : National Institute of Electronics & Information Technology
Exam : A Level Course
Paper: System Analysis
Document Type : Model Question Paper
Year : 2015
Website : http://beta.nielit.gov.in/content/question-paper-january-2015
Download Model/Sample Question Paper :
IT Tools : https://www.pdfquestion.in/uploads/8910-Tools.pdf
Internet Technology : https://www.pdfquestion.in/uploads/8910-ITdesign.pdf
C’ Language : https://www.pdfquestion.in/uploads/8910-Clang.pdf
Architecture : https://www.pdfquestion.in/uploads/8910-Architech.pdf
System Analysis : https://www.pdfquestion.in/uploads/8910-Design.pdf
Data Structure : https://www.pdfquestion.in/uploads/8910-C++.pdf
DBMS : https://www.pdfquestion.in/uploads/8910-DBMS.pdf
OS, Unix : https://www.pdfquestion.in/uploads/8910-OXUNIX.pdf
A Level Course Model Question Paper 2015 :
Important Instructions :
1. Question Paper in English and Hindi and Candidate can choose any one language.
2. In case of discrepancies in language, English version will be treated as final.
Related : NIELIT O Level Course Exam Model Question Paper : www.pdfquestion.in/8907.html
3. There Are Two Parts In This Module/Paper. Part One Contains Four Questions And Part Two Contains Five Questions.
4. Part One Is To Be Answered In The Omr Answer Sheet Only, Supplied With The Question Paper, As Per The Instructions Contained Therein. Part One Is Not To Be Answered In The Answer Book.
5. Maximum Time Allotted For Part One Is One Hour. Answer Book For Part Two Will Be Supplied At The Table When The Answer Sheet For Part One Is Returned. However, Candidates, Who Complete Part One Earlier Than One Hour, Can Collect The Answer Book For Part Two Immediately After Handing Over The Answer Sheet For Part One.
Internet Technology And Web Design :
Part One :
Answer all the questions :
1.1 What is World Wide Web?
A) A computer game
B) A software program
C) Another name for the Internet
D) The part of the Internet that enables information sharing
1.2 Which of the following protocol is used by remote login?
A) telnet
B) ftp
C) smtp
D) ntp
1.3 What is a spider?
A) A computer virus
B) A program that catalogs Web sites
C) A hacker who breaks into computer systems
D) An application for viewing web pages
1.4 Which of the following is a search engine?
A) Twitter
B) Facebook
C) myspace
D) google
1.5 What is a good way to protect sensitive information sent via e-mail?
A) Write it in another language
B) Keep the message in attachment
C) Encrypt the message
D) Send as a blind copy
1.6 What is the HTML element to bold a text?
A) <b>
B) <bold>
C) <wide>
D) <big>
1.7 Which of the following is NOT considered to be malware?
A) viruses
B) spyware
C) worm
D) adware
1.8 https is a
A) Scripting language
B) Browser
C) Secure connection
D) Authoring tool
1.9 Copyright law protects
A) Tangible property
B) Intangible property
C) The name of a particular good or service
D) Ideas contained in varied forms of expression
1.10 What is a Web Crawler?
A) A program that index web sites
B) A computer virus
C) A Browser
D) A hacker community
2. Each statement below is either TRUE or FALSE. Choose the most appropriate one and ENTER in the “OMR” answer sheet supplied with the question paper, following instructions therein. (1×10)
2.1 UDP stands for User Datagram Protocol.
2.2 Apache is most popular web browser.
2.3 A CAPTCHA is a program to vary a computer.
2.4 You can legally download and use freeware for as long as you want without having to pay for it.
2.5 DVD is a Digital Versatile Disc.
2.6 JavaScript execute on the web server.
2.7 NNTP is a Network News Transfer Protocol.
2.8 Ripping is the process of copying data from CD to Hard disk.
2.9 IMAP is a geographic information system.
2.10 A password is a string of characters used for authenticating a user on a computer system.
3. Match words and phrases in column X with the closest related meaning/ word(s)/phrase(s) in column Y. Enter your selection in the “OMR” answer sheet supplied with the question paper, following instructions therein. (1×10)
X Y
3.1 Search files on ftp server A. Bandwidth
3.2 Maximum data transfer rate B. CSMA/CD
3.3 Reduce size of a file C. Hacker
3.4 Authenticate the contents of electronic documents D. Amazon
3.5 Ethernet technology E. XML
3.6 Business over the Internet F. OL
3.7 Gain unauthorized access G. Transport layer
3.8 Program Code freely available H. Authoring tool
3.9 Publish content on the Web Server I. Open source
3.10 Extensible Markup Language J. Archie
4. Each statement below has a blank space to fit one of the word(s) or phrase(s) in the list below. Enter your choice in the “OMR” answer sheet supplied with the question paper, following instructions therein. (1×10)
A. Dreamweaver B. Bing C. Encryption D. PPP E. Skype F. HTML G. DPI H. Botnet I. LIST J. IRC K. IP L. <BR> M. APRANET
4.1 ________ refers to multiple computers that have been infected with malicious software.
4.2 The Internet was launched in 1969 and was originally called ________.
4.3 ________ is the process of converting data to an unrecognizable form.
4.4 ________ is a file that links to other information.
4.5 WEB server requires ________ address to connect to Internet.
4.6 ________ Internet standard for dial-up modem connections.
4.7 ________ is a search engine developed by Microsoft.
4.8 ________ is an Internet phone service.
4.9 ________ is protocol to chat on Internet.
4.10 HTML tag for creating a line break is ________.
Part Two : (Answer any FOUR questions)
5. a) Explain DNS addressing.
b) What is ISDN? What are the advantages of ISDN?
c) What is the Internet? (5+5+5)
6. a) How does Web Servers and Web Browser Work together?
b) What is Outlook Express? How to use it?
c) What is a Firewall? Explain the hardware firewall? (5+5+5)
7. a) What is PKI?
b) Write a HTML program to display the following list.
List Example:
i) HTML Examples
ii) HTML Tutorial
iii) HTML Codes
iv) and much more!
8. a) What is a Metasearch Engine? What are the advantages of Metasearch Engine?
b) What is E-commerce? How is it incorporating technology in sale of goods?
c) How to upload and download files using FTP server. (5+5+5)
9. Write any three of the following:
a) Write about Internet Crime.
b) Write about JavaScript.
c) Write about MIME.
d) Write about IRC.
e) Write about IPv4 addressing.