ADL 06 Computers in Management V1

Contact for best and lowest cost solution or email
ADL 06 Computers in Management V1
Assignment – A
Question 1) What do you undesrtand by an Information System? Explain various
categories of information system.
Question 2) Show with reference to a block diagram, the structure of a digital
computer and the interconnection of various units. Explain the functions of
various units briefly.
Question 3) What do you understand by a database management system? Explain the
advantages of database management system over conventional file oriented data
processing syatem.
Question 4) Explain the various file-accessing techniques in data management
system. Also state the advantages and limitations of each technique.
Question 5) What is meant by Local Area Network and Wide Area Network?
Differentiate between them and give one example of each.
Assignment – B
Question 1) What is an Internet? How it differs from Intranet? Explain the
various Internet Tools.
Question 2) What is multimedia? List the common multimedia devices. Explain the
Application areas of multimedia system.
Question 3) What do you understand by electronic data interchange? What is the
purpose of EDI? State its advantages over traditional paper-based document
transfer syatem.
Case Study
Compare the Conventional Banking System with Electronic Banking System covering
all details on ATM, Telebanking , Payment systems (various cards like credit
card , smart card etc) etc.


Assignment – C
1. Computer can not do anything without a:
(a) Chip
(b) Memory
(c) Output device
(d) Software
(e) None of these
2. Primary storage is————–as compared to secondary storage.
(a) Slow and inexpensive
(b) Fast and inexpensive
(c) Fast and expensive
(d) Slow and expensive
(e) None of the above
3. The memory which is programmed at the time it is manufactured:
(a) ROM
(b) RAM
(c) PROM
(e) None of the above
4. Which of the following isn’t used in the storage phase of a computerœbased
information system?
(a) Magnetic disk
(b) Keyboard
(c) Diskette
(d) Hard disk
(e) None of the above
5. A kind of serial dot œ matrix printer that forms characters with magnetically
charged ink-sprayed dots is called:
(a) Laser Printer
(b) Ink-Jet printer
(c) Both of the above
(d) None of the above
6. Which of the following is not applications software?
(a) Word processing
(b) Spreadsheet
(c) UNIX
(d) Desktop publishing
(e) None of the above
7. A translator which reads an entire program written in a high-level language
and converts it into machine language code is called:
(a) Assembler
(b) Translator
(c) Compiler
(d) System Software
8. The database structure that treats files as tables is:
(a) Relational database
(b) Hierarchical database
(c) Network database
(d) All of the above
(e) None of the above
9. Combining of records from two or more files into a single ordered file is
(a) Sorting
(b) Searching
(c) Merging
(d) None of the above
10) Which of the following is a query language?
(a) Dbase
(b) Access
(c) Fox Pro
(d) All of the above
(e) None of the above
11) Which of the following are popular DBMS packages?
(a) Dbase
(b) Access
(c) FoxPro
(d) All of the above
(e) None of the above
12) Web browser is a:
(a) Hardware
(b) Software
(c) Hyperlink
(d) All of the above
(e) None of the above
13) Which of the following communication system uses simplex transmission mode?
(a) Radio
(b) Television
(c) Cable
(d) All of the above
(e) None of the above
14) Searching on a net can be done through:
(a) Search Engines
(b) Indexes
(c) Both of these
(d) None of these
15) Private networks set up by companies for their employees for purposes such
as e-mail, group brainstorming, access to corporate database etc is called:
(a) Internet
(b) Intranet
(c) Pop-up-windows
(d) All of these above
(e) None of the above
16) Which of the following functions is supported by e-mail systems?
(a) Composition
(b) Reporting
(c) Transfer
(d) Disposition
(e) All of the above
17) The internal structure of the World Wide Web is built on a set of rules
(a) Hyper Text Transfer Protocol
(b) TCP/IP
(c) All of the above
(d) None of the above
18. Which of the following is not a wide area network?
(d) None of the above
19) ___________ is used to connect a terminal to a computer through public
telephone lines.
(a) Modem
(b) Internet
(c) Network
(d) None of these
20) Following is the disadvantage of using interpreters.
(a) Fast response
(b) easy to write
(c) Less memory requirements
(d) Time consuming
21) To install multimedia facility into a computer one needs:
(a) Sound card
(b) Speakers
(c) CD-ROM
(d) All of the above
(e) None of the above
22) The links that take the user to new page is:
(a) Hypertext
(b) Hyperlink
(c) Hyper Text Transfer Protocol
(d) All of the above
23) Application software can be acquired through:
(a) Customs programming
(b) Pre-written packages
(c) Both of the above
(d) None of the above
24) Which of the following is not an utility program?
(a) Editing
(b) Sorting
(c) Merging
(d) None of the above
25) The malicious program that damages your computer is called:
(a) Worm
(b) Viruses
(c) Bugs
(d) None of the above
26) Data entry can be performed with all of the following except?
(a) OCR
(b) COM
(c) Voice œ recognition systems
(d) None of the above
27) The two kinds of main memory are:
(a) Primary and Secondary
(b) Random and sequential
(c) RAM and ROM
(d) All of the above
28) What is the name of the screen symbol that shows the placement of the next
(a) Mouse
(b) Cursor
(c) Track Ball
(d) All of the above
29) A command that lets you change one or more fields in a record is:
(a) Insert
(b) Delete
(c) Modify
(d) None of the above
30) Data elements of related type are grouped into?
(a) Record
(b) Title
(c) String
(d) All of the above
31) A Hacker is:
(a) A software program
(b) An unauthorized person
(c) A virus
(d) All of the above
32) The interface between user and computer system is provided by:
(a) Compiler
(b) Utility programs
(c) Operating systems
(d) All of the above
33) The process of navigating and exploring the World Wide Web is called:
(a) Browsing
(b) Surfing
(c) Both of the above
(d) None of the above
34) An unauthorized access to network can be prevented through:
(a) Passwords
(b) Digital signatures
(c) Encryption
(d) All of the above
35) Which of the following is not a search engine?
(a) Altavista
(b) Lycos
(c) Infoseek
(d) Gopher
36) Computer Network spanning a global area is:
(a) LAN
(b) MAN
(c) WAN
(d) All the above
37) Transmission Channels used in LAN are:
(a) Coaxial cable
(b) Fiber-optics cable
(c) Twisted wire
(d) Both (a) and (b)
(e) All of the above
38) Remote access to distant computers is called:
(a) Telnet
(b) FTP
(c) Both of the above
(d) None of the above
39) The floppy disks comes in two sizes. They are:
(a) 3.5 inch & 5.25 inch
(b) 2 inch and 3.5 inch
(c) 2 inch and 4.25 inch
(d) None of the above
40) 1 Byte is equal to combination of:
(a) 16 bits
(b) 8 bits
(c) 2 bits
(d) None of the above

Contact for best and lowest cost solution or email

Comments are closed.