Professional Documents
Culture Documents
SYBMS Information Technology in Business Management I
SYBMS Information Technology in Business Management I
SYBMS Information Technology in Business Management I
2 B 3 8
62 AC B32 2961 1EB E3 DFAA18 0C2 2CF F82B B62
AC B3 96 E E3 DF 1 0C C 82 62 D3
AC B3 296 1E BE3 DF A1 80C 2C F82 B62 D3 962
2 1 B A 8 2 F B 9 A
CB B32 961 EB E3DDFA 180 0C2 CF8 82B 62DD39 62A CB
3 96 EB E3 F 18 C CF 2 62 3 62 C 32
B3 296 1E E3 DF A1 0C 2C 82 B6 D3 962 AC B3 96
2 B A 8 F B 2 9 2 1
32 961 1EB E3DDFA 180 0C2 2CF 82B 62DD39 62AACB B329 961 EBE
Q1.B
96 EB E3 F 18 C CF 82 62 3 62 C 32 61 EB 3
9.
8.
7.
6.
1.
10.
53451
29 1E E D A1 0C 2C 8 B6 D 96 AC B3 96 E E DF
61 B 3 FA 8 2 F 2B 2 39 2A B 2 1 B 3D A
8.
7.
6.
5.
4.
3.
2.
1.
61 EBE E3DDFA 180 0C2 CF8 82B 62DD39 62A CB 329 961E EBE E3D FA 180
E C 6 6 1
with
1E BE 3DF FA1 180C C2C F82 2B6 2D3 396 2AC CB3 3296 61E BE3 3DF FA1 80C C2C
BE 3D A 80 2C F8 B6 2D 96 2A B 29 1E BE D A1 80 2C F8
BE 3D FA 180 C2C F8 2B6 2D 396 2A CB 329 61E BE 3D FA1 80 C2C F8 2B6
a) NIC
c) virus
3D FA 180 C2 F8 2B 2D 39 2A CB 329 61E BE 3D FA 80 C2C F8 2B6 2D
c) Sum
FA 180 C2 CF 2B 62D 39 62A CB 32 61 BE 3D FA 180 C2 F8 2B 2D 39
a) IPMT
c) WordArt
a) Firewall
a) Web page
18 C2 CF 82B 62 39 62A CB 32 961 EB 3D FA 180 C2 CF 2B 62D 39 62A
c) Network
a) Phishing
c) Phishing
a) Intranet
Duration 2 ½ hours
a) Alignment
c) Website
c) Ultra net
0C C 82 62 D3 62 C 3 96 EB E3 F 18 C CF 82 62 3 62 C
c) Web server
c) hardware
a) Web blog
a) Procedure
2C F82 B6 D 96 AC B3 296 1E E3 DF A1 0C 2C 82 B6 D3 962 AC B3
NOTE :
c) Processing system
2A B 29 1E BE 3D A 80 2C F8 B6 2D 96 A B 29 1E E D A1
CB 32 61 B 3D FA 180 C2 F8 2B 2D 39 2A CB 329 61E BE 3D FA 80
i.
ii
iii
d) worm
b) Rate
2B 2D 39 2A CB 32 61 BE 3D FA 80 2 F8 2B 2D 39 2A B 29 1E b) spam
b) people
b) website
D3 62 AC B3 96 EB E3 F 18 0C CF 82 62 3 62 C 3 96 EB E3
d) software
b) Antivirus
d) web page
96 AC B3 296 1E E DF A1 0C 2C 82 B6 D3 962 AC B3 296 1EB E3 DF
d) web client
2A B 29 1E BE 3D A 80 2C F8 B6 2D 96 A B 29 1E E D A1
d) None of these
d) None of these
d) None of these
b) m –commerce
d) None of these
d) None of these
d) None of these
b) Modem
96 EB E3 F 18 C CF 82 62 3 62 C 32 61 EB 3 FA 18 C2 CF
Page 1 of 2
1E E DF A1 0C 2C 82 B6 D3 96 AC B3 96 E E3 DF 1 0C C 82
BE 3D A 80 2C F8 B6 2D 96 2A B 29 1E BE D A1 80 2C F8 B6
3D FA 180 C2 F8 2B 2D 39 2A CB 329 61E BE 3D FA 80 C2C F8 2B6 2D
FA 180 C2 CF 2B 62D 39 62A CB 32 61 BE 3D FA 180 C2 F8 2B 2D 39
18 C2 CF 82B 62 39 62A CB 32 961 EB 3D FA 180 C2 CF 2B 62D 39 62A
4. ______ Function returns the interest rate for an annuity.
0C C 82 62 D3 62 C 3 96 EB E3 F 18 C CF 82 62 3 62 C
2B62D3962ACB32961EBE3DFA180C2CF8
State whether the following statements are True or False (Any 7)
D3 62 AC B3 96 EB E3 F 18 0C CF 82 62 3 62 C 3 96 EB E3
96 AC B3 296 1E E DF A1 0C 2C 82 B6 D3 962 AC B3 296 1EB E3 DF
________ are the policies that govern the operation of a computer system.
32 961 EB E3D FA 180 C2 CF 2B 62D 39 62A CB 329 61 BE 3D FA 180 C2
96 EB E3 F 18 C CF 82 62 3 62 C 32 61 EB 3 FA 18 C2 CF
1E E DF A1 0C 2C 82 B6 D3 96 AC B3 96 E E3 DF 1 0C C 82
Figures to the right indicate full marks.
BE 3D A 80 2C F8 B6 2D 96 2A B 29 1E BE D A1 80 2C F8 B6
3. ________ is a type of internet fraud that seeks to acquire a user’s credentials by deception.
Draw neat and clean diagram whenever necessary.
7 Marks
________ is the generic term for a collection of private computer networks within an organization.
96 EB E3 F 18 C CF 82 62 3 62 C 32 61 EB
1E E DF A1 0C 2C 82 B6 D3 96 AC B3 96 E E
BE 3D A 80 2C F8 B6 2D 96 2A B 29 1E BE
3D FA 180 C2 F8 2B 2D 39 2A CB 329 61E BE 3
FA 180 C2 CF 2B 62D 39 62A CB 32 61 BE 3D
18 C2 CF 82B 62 39 62A CB 32 961 EB 3D
0C C 82 62 D3 62 C 3 96 EB E3 F
2C F82 B6 D 96 AC B3 296 1E E3 DF
F8 B6 2D 396 2A B 29 1E BE D A1
2B 2D 39 2A CB 32 61 BE 3D FA
62 39 62 C 32 961 EB 3D FA 18
D A B 9 E E
96 2AC CB3 3296 61E BE 3DF FA1 80C C2C F82
2 B 3 8
62 AC B32 2961 1EB E3 DFAA18 0C2 2CF F82B B62
AC B3 96 E E3 DF 1 0C C 82 62 D3
AC B3 296 1E BE3 DF A1 80C 2C F82 B62 D3 962
2 1 B A 8 2 F B 9 A
CB B32 961 EB E3DDFA 180 0C2 CF8 82B 62DD39 62A CB
3 96 EB E3 F 18 C CF 2 62 3 62 C 32
B3 296 1E E3 DF A1 0C 2C 82 B6 D3 962 AC B3 96
2 B A 8 F B 2 9 2 1
32 961 1EB E3DDFA 180 0C2 2CF 82B 62DD39 62AACB B329 961 EBE
Q5.
96 EB E3 F 18 C CF 82 62 3 62 C 32 61 EB 3
53451
29 1E E D A1 0C 2C 8 B6 D 96 AC B3 96 E E DF
61 B 3 FA 8 2 F 2B 2 39 2A B 2 1 B 3D A
9.
61 EBE E3DDFA 180 0C2 CF8 82B 62DD39 62A CB 329 961E EBE E3D FA 180
E C 6 6 1
1E BE 3DF FA1 180C C2C F82 2B6 2D3 396 2AC CB3 3296 61E BE3 3DF FA1 80C C2C
5. Hub
BE 3D A 80 2C F8 B6 2D 96 2A B 29 1E BE D A1 80 2C F8
BE 3D FA 180 C2C F8 2B6 2D 396 2A CB 329 61E BE 3D FA1 80 C2C F8 2B6
3D FA 180 C2 F8 2B 2D 39 2A CB 329 61E BE 3D FA 80 C2C F8 2B6 2D
FA 180 C2 CF 2B 62D 39 62A CB 32 61 BE 3D FA 180 C2 F8 2B 2D 39
18 C2 CF 82B 62 39 62A CB 32 961 EB 3D FA 180 C2 CF 2B 62D 39 62A
3. Trojan horse
0C C 82 62 D3 62 C 3 96 EB E3 F 18 C CF 82 62 3 62 C
2C F82 B6 D 96 AC B3 296 1E E3 DF A1 0C 2C 82 B6 D3 962 AC B3
F8 B6 2D 396 2A B 29 1E BE D A1 80C 2C F8 B6 2D 96 AC B3 296
2B 2D 39 2A CB 32 61 BE 3D FA 80 2 F8 2B 2D 39 2A B 29 1E
62 39 62 C 32 961 EB 3D FA 18 C2 CF 2B 62D 39 62A CB 32 61 B
D3 62 AC B3 96 EB E3 F 18 0C CF 82 62 3 62 C 3 96 EB E3
4. Digital Organization
96 AC B3 296 1E E DF A1 0C 2C 82 B6 D3 962 AC B3 296 1EB E3 DF
2A B 29 1E BE 3D A 80 2C F8 B6 2D 96 A B 29 1E E D A1
2B 2D 39 2A CB 32 61 BE 3D FA 80 2 F8 2B 2D 39 2A B 29 1E
Page 2 of 2
Q4. A. Explain in brief Business Model based on Revenue?
1E E DF A1 0C 2C 82 B6 D3 96 AC B3 96 E E3 DF 1 0C C 82
OR
OR
OR
OR
BE 3D A 80 2C F8 B6 2D 96 2A B 29 1E BE D A1 80 2C F8 B6
**************
3D FA 180 C2 F8 2B 2D 39 2A CB 329 61E BE 3D FA 80 C2C F8 2B6 2D
Artificial intelligence is the area of computer science
2B62D3962ACB32961EBE3DFA180C2CF8
D3 62 AC B3 96 EB E3 F 18 0C CF 82 62 3 62 C 3 96 EB E3
96 AC B3 296 1E E DF A1 0C 2C 82 B6 D3 962 AC B3 296 1EB E3 DF
2A B 29 1E BE 3D A 80 2C F8 B6 2D 96 A B 29 1E E D A1
CB 32 61 B 3D FA 180 C2 F8 2B 2D 39 2A CB 329 61E BE 3D FA 80
Q3. A. Explain RATE, PPMT and PV financial functions with proper examples.
B. What is Operating System? Explain different Operating Systems in detail?
10. The term open source refers to something people can modify and share because its design is publicly accessible.
7 Marks
8 Marks
7 Marks
8 Marks
7 Marks
8 Marks
7 Marks
8 Marks
7 Marks
8 Marks
8 Marks
B. What is Information technology? Discuss any five reasons why IT is successful in India.7 Marks