SYBMS Information Technology in Business Management I

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

96 2AC CB3 3296 61E BE 3DF FA1 80C C2C F82

2 B 3 8
62 AC B32 2961 1EB E3 DFAA18 0C2 2CF F82B B62
AC B3 96 E E3 DF 1 0C C 82 62 D3
AC B3 296 1E BE3 DF A1 80C 2C F82 B62 D3 962
2 1 B A 8 2 F B 9 A
CB B32 961 EB E3DDFA 180 0C2 CF8 82B 62DD39 62A CB
3 96 EB E3 F 18 C CF 2 62 3 62 C 32
B3 296 1E E3 DF A1 0C 2C 82 B6 D3 962 AC B3 96
2 B A 8 F B 2 9 2 1
32 961 1EB E3DDFA 180 0C2 2CF 82B 62DD39 62AACB B329 961 EBE

Q1.B
96 EB E3 F 18 C CF 82 62 3 62 C 32 61 EB 3

9.
8.
7.
6.
1.

10.

53451
29 1E E D A1 0C 2C 8 B6 D 96 AC B3 96 E E DF
61 B 3 FA 8 2 F 2B 2 39 2A B 2 1 B 3D A

8.
7.
6.
5.
4.
3.
2.
1.
61 EBE E3DDFA 180 0C2 CF8 82B 62DD39 62A CB 329 961E EBE E3D FA 180
E C 6 6 1

with
1E BE 3DF FA1 180C C2C F82 2B6 2D3 396 2AC CB3 3296 61E BE3 3DF FA1 80C C2C
BE 3D A 80 2C F8 B6 2D 96 2A B 29 1E BE D A1 80 2C F8
BE 3D FA 180 C2C F8 2B6 2D 396 2A CB 329 61E BE 3D FA1 80 C2C F8 2B6

a) NIC

c) virus
3D FA 180 C2 F8 2B 2D 39 2A CB 329 61E BE 3D FA 80 C2C F8 2B6 2D

c) Sum
FA 180 C2 CF 2B 62D 39 62A CB 32 61 BE 3D FA 180 C2 F8 2B 2D 39

a) IPMT

c) WordArt
a) Firewall

a) Web page
18 C2 CF 82B 62 39 62A CB 32 961 EB 3D FA 180 C2 CF 2B 62D 39 62A

c) Network

a) Phishing
c) Phishing

a) Intranet
Duration 2 ½ hours

a) Alignment

c) Website
c) Ultra net
0C C 82 62 D3 62 C 3 96 EB E3 F 18 C CF 82 62 3 62 C

c) Web server

c) hardware

a) Web blog
a) Procedure
2C F82 B6 D 96 AC B3 296 1E E3 DF A1 0C 2C 82 B6 D3 962 AC B3
NOTE :

F8 B6 2D 396 2A B 29 1E BE D A1 80C 2C F8 B6 2D 96 AC B3 296


2B 2D 39 2A CB 32 61 BE 3D FA 80 2 F8 2B 2D 39 2A B 29 1E
62 39 62 C 32 961 EB 3D FA 18 C2 CF 2B 62D 39 62A CB 32 61 B
D3 62 AC B3 96 EB E3 F 18 0C CF 82 62 3 62 C 3 96 EB E3
96 AC B3 296 1E E DF A1 0C 2C 82 B6 D3 962 AC B3 296 1EB E3 DF

c) Processing system
2A B 29 1E BE 3D A 80 2C F8 B6 2D 96 A B 29 1E E D A1
CB 32 61 B 3D FA 180 C2 F8 2B 2D 39 2A CB 329 61E BE 3D FA 80
i.
ii
iii

32 961 EB E3D FA 180 C2 CF 2B 62D 39 62A CB 329 61 BE 3D FA 180 C2


96 EB E3 F 18 C CF 82 62 3 62 C 32 61 EB 3 FA 18 C2 CF
1E E DF A1 0C 2C 82 B6 D3 96 AC B3 96 E E3 DF 1 0C C 82
BE 3D A 80 2C F8 B6 2D 96 2A B 29 1E BE D A1 80 2C F8 B6

EPS is electronic payment system


3D FA 180 C2 F8 2B 2D 39 2A CB 329 61E BE 3D FA 80 C2C F8 2B6 2D
Q1. Choose correct alternatives. (Any 8)

FA 180 C2 CF 2B 62D 39 62A CB 32 61 BE 3D FA 180 C2 F8 2B 2D 39


18 C2 CF 82B 62 39 62A CB 32 961 EB 3D FA 180 C2 CF 2B 62D 39 62A
0C C 82 62 D3 62 C 3 96 EB E3 F 18 C CF 82 62 3 62 C
2C F82 B6 D 96 AC B3 296 1E E3 DF A1 0C 2C 82 B6 D3 962 AC B3
F8 B6 2D 396 2A B 29 1E BE D A1 80C 2C F8 B6 2D 96 AC B3 296

d) worm

b) Rate
2B 2D 39 2A CB 32 61 BE 3D FA 80 2 F8 2B 2D 39 2A B 29 1E b) spam

b) people

Gmail is Google’s paid e-mail service.


b) Indent
b) Extranet
62 39 62 C 32 961 EB 3D FA 18 C2 CF 2B 62D 39 62A CB 32 61 B

b) website
D3 62 AC B3 96 EB E3 F 18 0C CF 82 62 3 62 C 3 96 EB E3

d) software
b) Antivirus

d) web page
96 AC B3 296 1E E DF A1 0C 2C 82 B6 D3 962 AC B3 296 1EB E3 DF

each other to form a single body of information.

d) web client
2A B 29 1E BE 3D A 80 2C F8 B6 2D 96 A B 29 1E E D A1

URL stands for universal resource locator.


CB 32 61 B 3D FA 180 C2 F8 2B 2D 39 2A CB 329 61E BE 3D FA 80

d) None of these

d) None of these
d) None of these

b) m –commerce
d) None of these
d) None of these

32 961 EB E3D FA 180 C2 CF 2B 62D 39 62A CB 329 61 BE 3D FA 180 C2

d) None of these
b) Modem

96 EB E3 F 18 C CF 82 62 3 62 C 32 61 EB 3 FA 18 C2 CF

Page 1 of 2
1E E DF A1 0C 2C 82 B6 D3 96 AC B3 96 E E3 DF 1 0C C 82
BE 3D A 80 2C F8 B6 2D 96 2A B 29 1E BE D A1 80 2C F8 B6
3D FA 180 C2 F8 2B 2D 39 2A CB 329 61E BE 3D FA 80 C2C F8 2B6 2D
FA 180 C2 CF 2B 62D 39 62A CB 32 61 BE 3D FA 180 C2 F8 2B 2D 39
18 C2 CF 82B 62 39 62A CB 32 961 EB 3D FA 180 C2 CF 2B 62D 39 62A
4. ______ Function returns the interest rate for an annuity.

0C C 82 62 D3 62 C 3 96 EB E3 F 18 C CF 82 62 3 62 C

__________ is basically a journal that is available on the web.


2C F82 B6 D 96 AC B3 296 1E E3 DF A1 0C 2C 82 B6 D3 962 AC B3
F8 B6 2D 396 2A B 29 1E BE D A1 80C 2C F8 B6 2D 96 AC B3 296
2B 2D 39 2A CB 32 61 BE 3D FA 80 2 F8 2B 2D 39 2A B 29 1E

A pivot table is way to present information in a report format.


All questions are compulsory.

a) Office automation system b) Executive Information system

Word press is world’s most popular platform used by websites


62 39 62 C 32 961 EB 3D FA 18 C2 CF 2B 62D 39 62A CB 32 61 B

2B62D3962ACB32961EBE3DFA180C2CF8
State whether the following statements are True or False (Any 7)
D3 62 AC B3 96 EB E3 F 18 0C CF 82 62 3 62 C 3 96 EB E3
96 AC B3 296 1E E DF A1 0C 2C 82 B6 D3 962 AC B3 296 1EB E3 DF

A Bridge helps to join two separates computer networks together.


_________ are styles that can be applied to text to create a visual effect.
2A B 29 1E BE 3D A 80 2C F8 B6 2D 96 A B 29 1E E D A1
A ________ monitors all of the traffic entering your computer networks.

CB 32 61 B 3D FA 180 C2 F8 2B 2D 39 2A CB 329 61E BE 3D FA 80

________ are the policies that govern the operation of a computer system.
32 961 EB E3D FA 180 C2 CF 2B 62D 39 62A CB 329 61 BE 3D FA 180 C2
96 EB E3 F 18 C CF 82 62 3 62 C 32 61 EB 3 FA 18 C2 CF
1E E DF A1 0C 2C 82 B6 D3 96 AC B3 96 E E3 DF 1 0C C 82
Figures to the right indicate full marks.

BE 3D A 80 2C F8 B6 2D 96 2A B 29 1E BE D A1 80 2C F8 B6

Facebook, simply a blog, is basically a journal that is available on the web.


A business expert system is a basic information system based on data input.
3D FA 180 C2 F8 2B 2D 39 2A CB 329 61E BE 3D FA 80 C2C F8 2B6 2D
FA 180 C2 CF 2B 62D 39 62A CB 32 61 BE 3D FA 180 C2 F8 2B 2D 39
18 C2 CF 82B 62 39 62A CB 32 961 EB 3D FA 180 C2 CF 2B 62D 39 62A
0C C 82 62 D3 62 C 3 96 EB E3 F 18 C CF 82 62 3 62 C
2C F82 B6 D 96 AC B3 296 1E E3 DF A1 0C 2C 82 B6 D3 962 AC B3
F8 B6 2D 396 2A B 29 1E BE D A1 80C 2C F8 B6 2D 96 AC B3 2
2B 2D 39 2A CB 32 61 BE 3D FA 80 2 F8 2B 2D 39 2A B 29
8 Marks
Max marks: 75

3. ________ is a type of internet fraud that seeks to acquire a user’s credentials by deception.
Draw neat and clean diagram whenever necessary.

62 39 62 C 32 961 EB 3D FA 18 C2 CF 2B 62D 39 62A CB 32


D3 62 AC B3 96 EB E3 F 18 0C CF 82 62 3 62 C 3 96
2. A _________ is defined as a “group of computers connected together to share the resources”

96 AC B3 296 1E E DF A1 0C 2C 82 B6 D3 962 AC B3 296 1


2A B 29 1E BE 3D A 80 2C F8 B6 2D 96 A B 29 1E
Paper / Subject Code: 80301 / Information Technology in Business Management I

CB 32 61 B 3D FA 180 C2 F8 2B 2D 39 2A CB 329 61E


5. ________ refer to the application of computes and communication technology to office functions.

7 Marks
________ is the generic term for a collection of private computer networks within an organization.

32 961 EB E3D FA 180 C2 CF 2B 62D 39 62A CB 329 61 B


_________ is a collection of web pages maintained by a single person or organization that are linked

96 EB E3 F 18 C CF 82 62 3 62 C 32 61 EB
1E E DF A1 0C 2C 82 B6 D3 96 AC B3 96 E E
BE 3D A 80 2C F8 B6 2D 96 2A B 29 1E BE
3D FA 180 C2 F8 2B 2D 39 2A CB 329 61E BE 3
FA 180 C2 CF 2B 62D 39 62A CB 32 61 BE 3D
18 C2 CF 82B 62 39 62A CB 32 961 EB 3D
0C C 82 62 D3 62 C 3 96 EB E3 F
2C F82 B6 D 96 AC B3 296 1E E3 DF
F8 B6 2D 396 2A B 29 1E BE D A1
2B 2D 39 2A CB 32 61 BE 3D FA
62 39 62 C 32 961 EB 3D FA 18
D A B 9 E E
96 2AC CB3 3296 61E BE 3DF FA1 80C C2C F82
2 B 3 8
62 AC B32 2961 1EB E3 DFAA18 0C2 2CF F82B B62
AC B3 96 E E3 DF 1 0C C 82 62 D3
AC B3 296 1E BE3 DF A1 80C 2C F82 B62 D3 962
2 1 B A 8 2 F B 9 A
CB B32 961 EB E3DDFA 180 0C2 CF8 82B 62DD39 62A CB
3 96 EB E3 F 18 C CF 2 62 3 62 C 32
B3 296 1E E3 DF A1 0C 2C 82 B6 D3 962 AC B3 96
2 B A 8 F B 2 9 2 1
32 961 1EB E3DDFA 180 0C2 2CF 82B 62DD39 62AACB B329 961 EBE

Q5.
96 EB E3 F 18 C CF 82 62 3 62 C 32 61 EB 3

53451
29 1E E D A1 0C 2C 8 B6 D 96 AC B3 96 E E DF
61 B 3 FA 8 2 F 2B 2 39 2A B 2 1 B 3D A
9.
61 EBE E3DDFA 180 0C2 CF8 82B 62DD39 62A CB 329 961E EBE E3D FA 180
E C 6 6 1
1E BE 3DF FA1 180C C2C F82 2B6 2D3 396 2AC CB3 3296 61E BE3 3DF FA1 80C C2C

5. Hub
BE 3D A 80 2C F8 B6 2D 96 2A B 29 1E BE D A1 80 2C F8
BE 3D FA 180 C2C F8 2B6 2D 396 2A CB 329 61E BE 3D FA1 80 C2C F8 2B6
3D FA 180 C2 F8 2B 2D 39 2A CB 329 61E BE 3D FA 80 C2C F8 2B6 2D
FA 180 C2 CF 2B 62D 39 62A CB 32 61 BE 3D FA 180 C2 F8 2B 2D 39
18 C2 CF 82B 62 39 62A CB 32 961 EB 3D FA 180 C2 CF 2B 62D 39 62A

3. Trojan horse
0C C 82 62 D3 62 C 3 96 EB E3 F 18 C CF 82 62 3 62 C
2C F82 B6 D 96 AC B3 296 1E E3 DF A1 0C 2C 82 B6 D3 962 AC B3
F8 B6 2D 396 2A B 29 1E BE D A1 80C 2C F8 B6 2D 96 AC B3 296
2B 2D 39 2A CB 32 61 BE 3D FA 80 2 F8 2B 2D 39 2A B 29 1E
62 39 62 C 32 961 EB 3D FA 18 C2 CF 2B 62D 39 62A CB 32 61 B
D3 62 AC B3 96 EB E3 F 18 0C CF 82 62 3 62 C 3 96 EB E3

4. Digital Organization
96 AC B3 296 1E E DF A1 0C 2C 82 B6 D3 962 AC B3 296 1EB E3 DF
2A B 29 1E BE 3D A 80 2C F8 B6 2D 96 A B 29 1E E D A1

1. Linux Operating System


CB 32 61 B 3D FA 180 C2 F8 2B 2D 39 2A CB 329 61E BE 3D FA 80
32 961 EB E3D FA 180 C2 CF 2B 62D 39 62A CB 329 61 BE 3D FA 180 C2

Write Short Notes (Any 3)


96 EB E3 F 18 C CF 82 62 3 62 C 32 61 EB 3 FA 18 C2 CF
1E E DF A1 0C 2C 82 B6 D3 96 AC B3 96 E E3 DF 1 0C C 82
BE 3D A 80 2C F8 B6 2D 96 2A B 29 1E BE D A1 80 2C F8 B6
3D FA 180 C2 F8 2B 2D 39 2A CB 329 61E BE 3D FA 80 C2C F8 2B6 2D

2. Electronic payment system(EPS)


FA 180 C2 CF 2B 62D 39 62A CB 32 61 BE 3D FA 180 C2 F8 2B 2D 39
18 C2 CF 82B 62 39 62A CB 32 961 EB 3D FA 180 C2 CF 2B 62D 39 62A
0C C 82 62 D3 62 C 3 96 EB E3 F 18 C CF 82 62 3 62 C
2C F82 B6 D 96 AC B3 296 1E E3 DF A1 0C 2C 82 B6 D3 962 AC B3
F8 B6 2D 396 2A B 29 1E BE D A1 80C 2C F8 B6 2D 96 AC B3 296
Q3. A. What is IP Address? How is it assigned?
Q2. A. explain the concept of database in detail.

2B 2D 39 2A CB 32 61 BE 3D FA 80 2 F8 2B 2D 39 2A B 29 1E

Q4. A. Compare LAN, MAN and WAN in detail.


62 39 62 C 32 961 EB 3D FA 18 C2 CF 2B 62D 39 62A CB 32 61 B

B. Explain the Concept of Bridges & Routers


B. Write a short note on bulk Email software.
D3 62 AC B3 96 EB E3 F 18 0C CF 82 62 3 62 C 3 96 EB E3
96 AC B3 296 1E E DF A1 0C 2C 82 B6 D3 962 AC B3 296 1EB E3 DF

B. What is Hosting? What are types of Hosting?


2A B 29 1E BE 3D A 80 2C F8 B6 2D 96 A B 29 1E E D A1
CB 32 61 B 3D FA 180 C2 F8 2B 2D 39 2A CB 329 61E BE 3D FA 80
32 961 EB E3D FA 180 C2 CF 2B 62D 39 62A CB 329 61 BE 3D FA 180 C2
96 EB E3 F 18 C CF 82 62 3 62 C 32 61 EB 3 FA 18 C2 CF

Q5. A. What is Risk Mitigation? Explain its Strategies

Page 2 of 2
Q4. A. Explain in brief Business Model based on Revenue?
1E E DF A1 0C 2C 82 B6 D3 96 AC B3 96 E E3 DF 1 0C C 82

OR
OR
OR
OR

BE 3D A 80 2C F8 B6 2D 96 2A B 29 1E BE D A1 80 2C F8 B6

**************
3D FA 180 C2 F8 2B 2D 39 2A CB 329 61E BE 3D FA 80 C2C F8 2B6 2D
Artificial intelligence is the area of computer science

FA 180 C2 CF 2B 62D 39 62A CB 32 61 BE 3D FA 180 C2 F8 2B 2D 39


18 C2 CF 82B 62 39 62A CB 32 961 EB 3D FA 180 C2 CF 2B 62D 39 62A
0C C 82 62 D3 62 C 3 96 EB E3 F 18 C CF 82 62 3 62 C
2C F82 B6 D 96 AC B3 296 1E E3 DF A1 0C 2C 82 B6 D3 962 AC B3
B. Explain the difference Between VLOOKUP and HLOOKUP
B. Difference between B2B and B2C E-commerce with example.

F8 B6 2D 396 2A B 29 1E BE D A1 80C 2C F8 B6 2D 96 AC B3 296


2B 2D 39 2A CB 32 61 BE 3D FA 80 2 F8 2B 2D 39 2A B 29 1E
62 39 62 C 32 961 EB 3D FA 18 C2 CF 2B 62D 39 62A CB 32 61 B

2B62D3962ACB32961EBE3DFA180C2CF8
D3 62 AC B3 96 EB E3 F 18 0C CF 82 62 3 62 C 3 96 EB E3
96 AC B3 296 1E E DF A1 0C 2C 82 B6 D3 962 AC B3 296 1EB E3 DF
2A B 29 1E BE 3D A 80 2C F8 B6 2D 96 A B 29 1E E D A1
CB 32 61 B 3D FA 180 C2 F8 2B 2D 39 2A CB 329 61E BE 3D FA 80
Q3. A. Explain RATE, PPMT and PV financial functions with proper examples.
B. What is Operating System? Explain different Operating Systems in detail?

32 961 EB E3D FA 180 C2 CF 2B 62D 39 62A CB 329 61 BE 3D FA 180 C2


96 EB E3 F 18 C CF 82 62 3 62 C 32 61 EB 3 FA 18 C2 CF
1E E DF A1 0C 2C 82 B6 D3 96 AC B3 96 E E3 DF 1 0C C 82
BE 3D A 80 2C F8 B6 2D 96 2A B 29 1E BE D A1 80 2C F8 B6
Q2. A. Compare management information system with executive information system.

3D FA 180 C2 F8 2B 2D 39 2A CB 329 61E BE 3D FA 80 C2C F8 2B6 2D


FA 180 C2 CF 2B 62D 39 62A CB 32 61 BE 3D FA 180 C2 F8 2B 2D 39
18 C2 CF 82B 62 39 62A CB 32 961 EB 3D FA 180 C2 CF 2B 62D 39 62A
0C C 82 62 D3 62 C 3 96 EB E3 F 18 C CF 82 62 3 62 C
2C F82 B6 D 96 AC B3 296 1E E3 DF A1 0C 2C 82 B6 D3 962 AC B3
F8 B6 2D 396 2A B 29 1E BE D A1 80C 2C F8 B6 2D 96 AC B3 2
2B 2D 39 2A CB 32 61 BE 3D FA 80 2 F8 2B 2D 39 2A B 29
62 39 62 C 32 961 EB 3D FA 18 C2 CF 2B 62D 39 62A CB 32
D3 62 AC B3 96 EB E3 F 18 0C CF 82 62 3 62 C 3 96
96 AC B3 296 1E E DF A1 0C 2C 82 B6 D3 962 AC B3 296 1
2A B 29 1E BE 3D A 80 2C F8 B6 2D 96 A B 29 1E
Paper / Subject Code: 80301 / Information Technology in Business Management I

10. The term open source refers to something people can modify and share because its design is publicly accessible.

CB 32 61 B 3D FA 180 C2 F8 2B 2D 39 2A CB 329 61E


7 Marks
8 Marks

7 Marks
8 Marks
7 Marks
8 Marks
7 Marks
8 Marks
7 Marks
8 Marks
7 Marks
8 Marks
8 Marks
B. What is Information technology? Discuss any five reasons why IT is successful in India.7 Marks

32 961 EB E3D FA 180 C2 CF 2B 62D 39 62A CB 329 61 B


96 EB E3 F 18 C CF 82 62 3 62 C 32 61 EB
1E E DF A1 0C 2C 82 B6 D3 96 AC B3 96 E E 15 Marks
BE 3D A 80 2C F8 B6 2D 96 2A B 29 1E BE
3D FA 180 C2 F8 2B 2D 39 2A CB 329 61E BE 3
FA 180 C2 CF 2B 62D 39 62A CB 32 61 BE 3D
18 C2 CF 82B 62 39 62A CB 32 961 EB 3D
0C C 82 62 D3 62 C 3 96 EB E3 F
2C F82 B6 D 96 AC B3 296 1E E3 DF
F8 B6 2D 396 2A B 29 1E BE D A1
2B 2D 39 2A CB 32 61 BE 3D FA
62 39 62 C 32 961 EB 3D FA 18
D A B 9 E E

You might also like