Computers in Management 1


SKU: AMSEQ-041 Category:

Assignment – A

Question 1) What do you undesrtand by an Information System? Explain various categories of information system.

Question 2) Show with reference to a block diagram, the structure of a digital computer and the interconnection of various units. Explain the functions of various units briefly.

Question 3) What do you understand by a database management system? Explain the advantages of database management system over conventional file oriented data processing syatem.

Question 4) Explain the various file-accessing techniques in data management system. Also state the advantages and limitations of each technique.

Question 5) What is meant by Local Area Network and Wide Area Network? Differentiate between them and give one example of each.

Assignment – B

Question 1) What is an Internet? How it differs from Intranet? Explain the various Internet Tools.

Question 2) What is multimedia? List the common multimedia devices. Explain the Application areas of multimedia system.

Question 3) What do you understand by electronic data interchange? What is the purpose of EDI? State its advantages over traditional paper-based document transfer syatem.

Case Study

Compare the Conventional Banking System with Electronic Banking System covering all details on ATM, Telebanking , Payment systems (various cards like credit card , smart card etc) etc.

Assignment – C

1. Computer can not do anything without a:
(a) Chip
(b) Memory
(c) Output device
(d) Software
(e) None of these

2. Primary storage is————–as compared to secondary storage.
(a) Slow and inexpensive
(b) Fast and inexpensive
(c) Fast and expensive
(d) Slow and expensive
(e) None of the above

3. The memory which is programmed at the time it is manufactured:
(a) ROM
(b) RAM
(c) PROM
(e) None of the above

4. Which of the following isn’t used in the storage phase of a computerœbased information system?
(a) Magnetic disk
(b) Keyboard
(c) Diskette
(d) Hard disk
(e) None of the above

5. A kind of serial dot œ matrix printer that forms characters with magnetically charged ink-sprayed dots is called:
(a) Laser Printer
(b) Ink-Jet printer
(c) Both of the above
(d) None of the above

6. Which of the following is not applications software?
(a) Word processing
(b) Spreadsheet
(c) UNIX
(d) Desktop publishing
(e) None of the above

7. A translator which reads an entire program written in a high-level language and converts it into machine language code is called:
(a) Assembler
(b) Translator
(c) Compiler
(d) System Software

8. The database structure that treats files as tables is:
(a) Relational database
(b) Hierarchical database
(c) Network database
(d) All of the above
(e) None of the above

9. Combining of records from two or more files into a single ordered file is called:
(a) Sorting
(b) Searching
(c) Merging
(d) None of the above

10) Which of the following is a query language?
(a) Dbase
(b) Access
(c) Fox Pro
(d) All of the above
(e) None of the above

11) Which of the following are popular DBMS packages?
(a) Dbase
(b) Access
(c) FoxPro
(d) All of the above
(e) None of the above

12) Web browser is a:
(a) Hardware
(b) Software
(c) Hyperlink
(d) All of the above
(e) None of the above

13) Which of the following communication system uses simplex transmission mode?
(a) Radio
(b) Television
(c) Cable
(d) All of the above
(e) None of the above

14) Searching on a net can be done through:
(a) Search Engines
(b) Indexes
(c) Both of these
(d) None of these

15) Private networks set up by companies for their employees for purposes such as e-mail, group brainstorming, access to corporate database etc is called:
(a) Internet
(b) Intranet
(c) Pop-up-windows
(d) All of these above
(e) None of the above

16) Which of the following functions is supported by e-mail systems?
(a) Composition
(b) Reporting
(c) Transfer
(d) Disposition
(e) All of the above

17) The internal structure of the World Wide Web is built on a set of rules called:
(a) Hyper Text Transfer Protocol
(b) TCP/IP
(c) All of the above
(d) None of the above

18. Which of the following is not a wide area network?
(d) None of the above

19) ___________ is used to connect a terminal to a computer through public telephone lines.
(a) Modem
(b) Internet
(c) Network
(d) None of these

20) Following is the disadvantage of using interpreters.
(a) Fast response
(b) easy to write
(c) Less memory requirements
(d) Time consuming

21) To install multimedia facility into a computer one needs:
(a) Sound card
(b) Speakers
(c) CD-ROM
(d) All of the above
(e) None of the above

22) The links that take the user to new page is:
(a) Hypertext
(b) Hyperlink
(c) Hyper Text Transfer Protocol
(d) All of the above

23) Application software can be acquired through:
(a) Customs programming
(b) Pre-written packages
(c) Both of the above
(d) None of the above

24) Which of the following is not an utility program?
(a) Editing
(b) Sorting
(c) Merging
(d) None of the above

25) The malicious program that damages your computer is called:
(a) Worm
(b) Viruses
(c) Bugs
(d) None of the above

26) Data entry can be performed with all of the following except?
(a) OCR
(b) COM
(c) Voice œ recognition systems
(d) None of the above

27) The two kinds of main memory are:
(a) Primary and Secondary
(b) Random and sequential
(c) RAM and ROM
(d) All of the above

28) What is the name of the screen symbol that shows the placement of the next character?
(a) Mouse
(b) Cursor
(c) Track Ball
(d) All of the above

29) A command that lets you change one or more fields in a record is:
(a) Insert
(b) Delete
(c) Modify
(d) None of the above

30) Data elements of related type are grouped into?
(a) Record
(b) Title
(c) String
(d) All of the above

31) A Hacker is:
(a) A software program
(b) An unauthorized person
(c) A virus
(d) All of the above

32) The interface between user and computer system is provided by:
(a) Compiler
(b) Utility programs
(c) Operating systems
(d) All of the above

33) The process of navigating and exploring the World Wide Web is called:
(a) Browsing
(b) Surfing
(c) Both of the above
(d) None of the above

34) An unauthorized access to network can be prevented through:
(a) Passwords
(b) Digital signatures
(c) Encryption
(d) All of the above

35) Which of the following is not a search engine?
(a) Altavista
(b) Lycos
(c) Infoseek
(d) Gopher

36) Computer Network spanning a global area is:
(a) LAN
(b) MAN
(c) WAN
(d) All the above

37) Transmission Channels used in LAN are:
(a) Coaxial cable
(b) Fiber-optics cable
(c) Twisted wire
(d) Both (a) and (b)
(e) All of the above

38) Remote access to distant computers is called:
(a) Telnet
(b) FTP
(c) Both of the above
(d) None of the above

39) The floppy disks comes in two sizes. They are:
(a) 3.5 inch & 5.25 inch
(b) 2 inch and 3.5 inch
(c) 2 inch and 4.25 inch
(d) None of the above

40) 1 Byte is equal to combination of:
(a) 16 bits
(b) 8 bits
(c) 2 bits
(d) None of the above



There are no reviews yet.

Be the first to review “Computers in Management 1”

Your email address will not be published. Required fields are marked *

PlaceholderComputers in Management 1