Você está na página 1de 18

AMITY SCHOOL OF DISTANCE LEARNING

Post Box No. 503, Sector-44


Noida 201303
Information Technology & Management
Assignment A
Marks 10
Answer all questions.
Q.1 What is a computer and what are the different characteristics of computer?
Ans. 1 A computer is a device that accepts information (in the form of digitalized data) and manipulates it
for some result based on a program or sequence of instructions on how the data is to be processed.
Complex computers also include the means for storing data (including the program, which is also a form
of data) for some necessary duration. A program may be invariable and built into the computer (and
called logic circuitry as it is on microprocessors) or different programs may be provided to the computer
(loaded into its storage and then started by an administrator or user). Today's computers have both kinds
of programming.
1. Speed
The computer is a very high speed electronic device. The operations on the data inside the computer are
performed through electronic circuits according to the given instructions. The data and instructions flow
along these circuits with high speed that is close to the speed of light. Computer can perform million of
billion of operations on the data in one second. The computer generates signals during the operation
process therefore the speed of computer is usually measure in mega hertz (MHz) or gega hertz (GHz). It
means million cycles units of frequency is hertz per second. Different computers have different speed.
2. Arithmetical and Logical Operations
A computer can perform arithmetical and logical operations. In arithmetic operations, it performs the
addition, subtraction, multiplication and division on the numeric data. In logical operation it compares the
numerical data as well as alphabetical data.
3. Accuracy
In addition to being very fast, computer is also very accurate device. it gives accurate output result
provided that the correct input data and set of instructions are given to the computer. It means that output
is totally depended on the given instructions and input data. If input data is in-correct then the resulting
output will be in-correct. In computer terminology it is known as garbage-in garbage-out.
4. Reliability
The electronic components in modern computer have very low failure rate. The modern computer can
perform very complicated calculations without creating any problem and produces consistent (reliable)
results. In general, computers are very reliable. Many personal computers have never needed a service
call. Communications are also very reliable and generally available whenever needed.
5. Storage
A computer has internal storage (memory) as well as external or secondary storage. In secondary
storage, a large amount of data and programs (set of instructions) can be stored for future use. The
stored data and programs are available any time for processing. Similarly information downloaded from
the internet can be saved on the storage media.

6. Retrieving data and programs


The data and program stored on the storage media can be retrieved very quickly for further processing. It
is also very important feature of a computer.
7. Automation
A computer can automatically perform operations without interfering the user during the operations. It
controls automatically different devices attached with the computer. It executes automatically the program
instructions one by one.
8. Versatility
Versatile means flexible. Modern computer can perform different kind of tasks one by one of
simultaneously. It is the most important feature of computer. At one moment your are playing game
on computer, the next moment you are composing and sending emails etc. In colleges and universities
computers are use to deliver lectures to the students. The talent of computer is dependent on
the software.
9. Communications
Today computer is mostly used to exchange messages or data through computer networks all over the
world. For example the information can be received or send through the internet with the help
of computer. It is most important feature of the modern information technology.
10. Diligence
A computer can continually work for hours without creating any error. It does not get tired while working
after hours of work it performs the operations with the same accuracy as well as speed as the first one.
11. No Feelings
Computer is an electronic machine. It has no feelings. It detects objects on the basis of instructions given
to it. Based on our feelings, taste, knowledge and experience: we can make certain decisions and
judgments in our daily life. On the other hand, computer can not make such judgments on their own. Their
judgments are totally based on instructions given to them.
12. Consistency
People often have difficulty to repeat their instructions again and again. For example, a lecturer feels
difficulty to repeat a same lecture in a class room again and again. Computer can repeat actions
consistently (again and again) without loosing its concentration:
13. Precision
Computers are not only fast and consistent but they also perform operations very accurately and
precisely. For example, in manual calculations and rounding fractional values (That is value with decimal
point can change the actual result). In computer however, you can keep the accuracy and precision upto
the level, you desire. The length calculations remain always accurate.
2.What are the basic features of OOPs?
Features of OOP
OOP stands for Object Oriented Programming and the language that support this Object Oriented
programming features is called Object oriented Programming Language. An example of a language that
support this Object oriented features is C++.
Features of Object oriented Programming
The Objects Oriented programming language supports all the features of normal programming
languages. In addition it supports some important concepts and terminology which has made it popular
among programming methodology.
The important features of Object Oriented programming are:

Inheritance
Polymorphism

Data Hiding

Encapsulation

Overloading

Reusability

Let us see a brief overview of these important features of Object Oriented programming
But before that it is important to know some new terminologies used in Object Oriented programming
namely

Objects
Classes

Objects:
In other words object is an instance of a class.
Classes:
These contain data and functions bundled together under a unit. In other words class is a collection of
similar objects. When we define a class it just creates template or Skelton. So no memory is created
when class is created. Memory is occupied only by object.
Example:
Class classname
{
Data
Functions
};
main ( )
{
classname objectname1, objectname 2,..;
}
In other words classes acts as data types for objects.

Member functions:
The functions defined inside the class as above are called member functions.
Here the concept of Data Hiding figures

Data Hiding:
This concept is the main heart of an Object oriented programming. The data is hidden inside the class by
declaring it as private inside the class. When data or functions are defined as private it can be accessed
only by the class in which it is defined. When data or functions are defined as public then it can be
accessed anywhere outside the class. Object Oriented programming gives importance to protecting data

which in any system. This is done by declaring data as private and making it accessible only to the class
in which it is defined. This concept is called data hiding. But one can keep member functions as public.

So above class structure becomes

Example:

Class classname
{
private:
datatype data;
public:
Member functions
};
main ( )
{
classname objectname1,objectname2,..;
}

Encapsulation:
The technical term for combining data and functions together as a bundle is encapsulation.

Inheritance:
Inheritance as the name suggests is the concept of inheriting or deriving properties of an exiting class to
get new class or classes. In other words we may have common features or characteristics that may be
needed by number of classes. So those features can be placed in a common tree class called base class
and the other classes which have these characteristics can take the tree class and define only the new
things that they have on their own in their classes. These classes are called derived class. The main
advantage of using this concept of inheritance in Object oriented programming is it helps in reducing the
code size since the common characteristic is placed separately called as base class and it is just referred
in the derived class. This provide the users the important usage of terminology called as reusability

Reusability:
This usage is achieved by the above explained terminology called as inheritance. Reusability is nothing
but re- usage of structure without changing the existing one but adding new features or characteristics to
it. It is very much needed for any programmers in different situations. Reusability gives the following
advantages to users
It helps in reducing the code size since classes can be just derived from existing one and one need to add
only the new features and it helps users to save their time.

For instance if there is a class defined to draw different graphical figures say there is a user who want to
draw graphical figure and also add the features of adding color to the graphical figure. In this scenario
instead of defining a class to draw a graphical figure and coloring it what the user can do is make use of
the existing class for drawing graphical figure by deriving the class and add new feature to the derived
class namely add the feature of adding colors to the graphical figure.

Polymorphism and Overloading:


Poly refers many. So Polymorphism as the name suggests is a certain item appearing in different forms or
ways. That is making a function or operator to act in different forms depending on the place they are
present is called Polymorphism. Overloading is a kind of polymorphism. In other words say for instance
we know that +, - operate on integer data type and is used to perform arithmetic additions and
subtractions. But operator overloading is one in which we define new operations to these operators and
make them operate on different data types in other words overloading the existing functionality with new
one. This is a very important feature of object oriented programming methodology which extended the
handling of data type and operations.
Thus the above given important features of object oriented programming among the numerous features it
have gives the following advantages to the programming world. The advantages are namely
Data Protection or security of data is achieved by concept of data hiding
Reduces program size and saves time by the concept of reusability which is achieved by the
terminology of Inheritance
Operators can be given new functions as per user which extends the usage.
Q.3 What is an operating system and what are various types of operating system available in market?
A.3 An operating system (OS) is software, consisting of programs and data, that runs on computers and
manages the computer hardware and provides common services for efficient execution of various
application software.
For hardware functions such as input and output and memory allocation, the operating system acts as an
intermediary between application programs and the computer hardware, [1][2] although the application code
is usually executed directly by the hardware, but will frequently call the OS or be interrupted by it.
Operating systems are found on almost any device that contains a computerfromcellular
phones and video game consoles to supercomputers and web servers.

Examples of popular modern operating systems for personal computers are Microsoft
Windows, Mac OS X, and GNU/Linux.

TYPES OF OPERATING SYSTEMS


Most simple, single-function computers (such as in microwave ovens with digital keypads) do not require
an operating system. In fact, trying to implement an operating system in these computers would be
overkill. On the other hand, all personal desktop and laptop computers and servers do require an

operating system. While there are hundreds of operating systems available, the most popular by far are
the Microsoft Windows family of operating systems, the Macintosh operating system, and the Unix family
of operating systems.
There are four general types of operating systems. Their use depends on the type of computer and the
type of applications that will be run on those computers.
1. Real-time operating systems (RTOS) are used to control machinery, scientific instruments, and
industrial systems. In general, the user does not have much control over the functions performed
by the RTOS.
2. Single-user, single task operating systems allow one user to do one thing at a time. And example
of a single-user, single task operating system is the operating system used by personal digital
assistants (PDAs), also known as handheld computers.
3. Single-user, multi-tasking operating systems allow a single user to simultaneously run multiple
applications on their computer. This is the type of operating system found on most personal
desktop and laptop computers. The Windows (Microsoft) and Macintosh (Apple) platforms are the
most popular single-user, multi-tasking operating systems.
4. Multi-user operating systems allow multiple users to simultaneously use the resources on a single
computer. Unix is an example of a multi-user operating system.

Q.4 Define following terms


A. Internet: The Internet is a global system of interconnected computer networks that use the
standard Internet Protocol Suite (TCP/IP) to serve billions of users worldwide. It is a network of
networks that consists of millions of private, public, academic, business, and government networks, of
local to global scope, that are linked by a broad array of electronic and optical networking technologies.
The Internet carries a vast range of information resources and services, such as the interlinked hypertext documents of the World Wide Web (WWW) and the infrastructure to support electronic
mail.
Most traditional communications media including telephone, music, film, and television are being
reshaped or redefined by the Internet. Newspaper, book and other print publishing are having to adapt
to Web sites and blogging. The Internet has enabled or accelerated new forms of human interactions
through instant messaging, Internet forums, and social networking. Online shopping has boomed both for

major retail outlets and small artisans and traders. Business-to-business and financial services on the
Internet affect supply chains across entire industries.
B. Intranet: An intranet is a private computer network that uses Internet Protocol technologies to
securely share any part of an organization's information or network operating system within that
organization. The term is used in contrast to internet, a network between organizations, and instead
refers to a network within an organization. Sometimes the term refers only to the organization's
internal website, but may be a more extensive part of the organization's information technology
infrastructure. It may host multiple private websites and constitute an important component and focal
point of internal communication and collaboration.
C. Extranet: An extranet is a private network that uses Internet protocols, network connectivity. An
extranet can be viewed as part of a company's intranet that is extended to users outside the
company, usually via the Internet. It has also been described as a "state of mind" in which the Internet
is perceived as a way to do business with a selected set of other companies (business-to-business,
B2B), in isolation from all other Internet users. In contrast, business-to-consumer (B2C) models
involve known servers of one or more companies, communicating with previously unknown consumer
users.
Q.5 What is E-commerce? Discuss the framework of E-commerce.
Electronic commerce, commonly known as e-commerce or eCommerce, or e-business consists of the
buying and selling of products or services over electronic systems such as the Internet and
other computer networks. The amount of trade conducted electronically has grown extraordinarily with
widespread Internet usage. The use of commerce is conducted in this way, spurring and drawing on
innovations in electronic funds transfer, supply chain management, Internet marketing, online transaction
processing, electronic data interchange (EDI), inventory management systems, and automated data
collection systems. Modern electronic commerce typically uses the World Wide Web at least at some
point in the transaction's lifecycle, although it can encompass a wider range of technologies such as email as well.
A large percentage of electronic commerce is conducted entirely electronically for virtual items such as
access to premium content on a website, but most electronic commerce involves the transportation of
physical items in some way. Online retailers are sometimes known as e-tailers and online retail is
sometimes known as e-tail. Almost all big retailers have electronic commerce presence on the World
Wide Web.
Framework
The vision outlined above for electronic commerce assumes a set of basic infrastructure services and
standards consistent with a broad architectural framework. This framework must permit the flexibility,
interoperability, and openness needed for the successful evolution of electronic commerce over the NII.
This framework, and its services and products, will offer the consumer a diverse set of interoperable
choices, rather than a collection of independent solutions that may not work in concert.

Many of today's ambitious electronic commerce initiatives vary in their approach to security and privacy,
their ability to handle micro payments, and their applicability to various types of transactions. They also
differ in their business models -- for example, in their pricing strategy and in their assumptions as to who
bears the risk in case of insufficient funds or disputes. Such diversity promotes innovation and allows for
provider and consumer choices. Still, to achieve wide acceptance and scale to truly mass markets, a
broad framework is needed, which encompasses the following requirements and idiosyncrasies of
conducting new forms of business in the emerging electronic environment.
Interoperability -- Electronic commerce must be based on a common set of services and standards that
ensure interoperability. Preferably, service providers and application designers will be able to use these
services and standards as building blocks that can be combined, enhanced, and customized.
Maximum flexibility for innovation -- As the NII evolves; it will grow and mature in ways not even
imagined today. As it does so, new services and businesses will emerge. For example, the NII's electronic
marketplace will provide new opportunities for narrow case marketing to very short-lived niche markets.
Existing services and products will be redefined and modified. The electronic commerce framework must
be sufficiently flexible to accommodate all of these changes and be able to address new applications and
requirements as they arise.
Information-intensive products -- A particularly important class of products on the NII are those that are
pure information. These products are actually enabled by information technology, not just distributed more
efficiently by it. Information products include electronic publications, catalogs, videos, and the like, as well
as interactive video games, software programs, electronic tokens, customized design specifications, and
even electronic keys to hotel rooms, cars, storage compartments, and airport boarding gates. Many of
these products will not be simply ``offered'' by a vendor; they will be designed or tailored by a customer.
Customers can, for example, choose their own selection of articles to be bound in an electronic book, or
customize their own clothing designs. This capability adds a customer-driven activity -- a design phase -to the purchase cycle. It is likely that for these products, ordering, billing, payment, and distribution would
be tightly integrated and happen virtually simultaneously.
New revenue collection methods -- Electronic commerce will need to support advanced types of
revenue collection in addition to traditional methods (e.g., payment upon receipt, payment in advance,
etc.). For example, an information product service provider could distribute its product widely and charge
on a usage basis; that is, charge the customer only when the information (be it a software program, digital
document, or electronic key that opens and starts a rental car) is used. One innovative approach that
permits usage accounting and payment is called meterware. It provides local hardware and/or software
to record and bill customers continuously based on their product usage. Meterware, electronic cash and
checks that don't need an online payment processor, and other advanced revenue collection ideas create

opportunities for reaching new customers and for distributing products and services. These methods
make a lot of sense in a low distribution cost environment supported by the electronic commerce
infrastructure.
Legacy systems -- Many "legacy systems" exist in the electronic commerce domain. These include
paper checks, mainframe-based settlement and payment systems, and EDI VANs. None of these legacy
systems will go away overnight: A successful electronic commerce infrastructure must let the user transfer
easily and transparently between these older systems and newer, all-electronic systems, applications,
and processes.
Transaction devices -- Electronic commerce transactions will involve all kinds of legacy and newly
developed devices and media, and networks over which these are delivered. Electronic commerce must
accommodate the technologies and devices needed to reach and sustain the mass market.
A framework developed with all of these needs and considerations in mind will form the strongest basis
for a powerful and useful electronic commerce infrastructure. We next describe the specific activities and
functions this infrastructure must support.

Information Technology & Management


Assignment B
Marks 10
Answer all questions.
1.

What are the different components of Database management system?

A Database Management System (DBMS) is a set of computer programs that controls the creation,
maintenance, and the use of a database. It allows organizations to place control of database development
in the hands of database administrators (DBAs) and other specialists. A DBMS is a system software
package that helps the use of integrated collection of data records and files known as databases. It allows
different user application programs to easily access the same database. DBMSs may use any of a variety
of database models, such as the network model or relational model. In large systems, a DBMS allows
users and other software to store and retrieve data in a structured way. Instead of having to write
computer programs to extract information, user can ask simple questions in a query language. Thus,
many DBMS packages provide Fourth-generation programming language (4GLs) and other application
development features. It helps to specify the logical organization for a database and access and use the
information within a database. It provides facilities for controlling data access, enforcing data integrity,
managing concurrency, and restoring the database from backups. A DBMS also provides the ability to
logically present database information to users.

Components of DBMS

DBMS Engine accepts logical request from the various other DBMS subsystems, converts them
into physical equivalents, and actually accesses the database and data dictionary as they exist on a
storage device.

Data Definition Subsystem helps user to create and maintain the data dictionary and define the
structure of the files in a database.

Data Manipulation Subsystem helps user to add, change, and delete information in a database
and query it for valuable information. Software tools within the data manipulation subsystem are most
often the primary interface between user and the information contained in a database. It allows user
to specify its logical information requirements.

Application Generation Subsystem contains facilities to help users to develop transactionintensive applications. It usually requires that user perform a detailed series of tasks to process a
transaction. It facilitates easy-to-use data entry screens, programming languages, and interfaces.

Data Administration Subsystem helps users to manage the overall database environment by
providing facilities for backup and recovery, security management, query optimization, concurrency
control, and change management.

2.

What is ERP? Explain the general Implementation methodology of ERP.

Ans 2. Enterprise Resource Planning (ERP) is an integrated computer-based system used to manage
internal and external resources, including tangible assets, financial resources, materials, and human
resources. Its purpose is to facilitate the flow of information between all business functions inside the
boundaries of the organization and manage the connections to outside stakeholders. Built on a
centralized database and normally utilizing a common computing platform, ERP systems consolidate all
business operations into a uniform and enterprise-wide system environment.
An ERP system can either reside on a centralized server or be distributed across modular hardware and
software units that provide "services" and communicate on a local area network. The distributed design
allows a business to assemble modules from different vendors without the need for the placement of
multiple copies of complex and expensive computer systems in areas which will not use their full capacity.

Implementation:
Businesses have a wide scope of applications and processes throughout their functional units; producing
ERP software systems that are typically complex and usually impose significant changes on staff
work practices.[12] Implementing ERP software is typically too complex for "in-house" skill, so it is
desirable and highly advised to hire outside consultants who are professionally trained to
implement these systems.[1] This is typically the most cost effective way.[2] There are three types of
services that may be employed for - Consulting, Customization, Support. [12] The length of time to
implement an ERP system depends on the size of the business, the number of modules, the extent
of customization, the scope of the change and the willingness of the customer to take ownership for
the project. ERP systems are modular, so they don't all need be implemented at once. It can be
divided into various stages, or phase-ins. The typical project is about 14 months and requires
around 150 consultants.[13] A small project (e.g., a company of less than 100 staff) can be planned
and delivered within 39 months; however, a large, multi-site or multi-country implementation can
take years. The length of the implementations is closely tied to the amount of customization
desired.
To implement ERP systems, companies often seek the help of an ERP vendor or of thirdparty consulting companies. These firms typically provide three areas of professional services:
consulting; customization; and support. The client organization can also employ independent
program management, business analysis, change management, and UAT specialists to
ensure their business requirements remain a priority during implementation

3.

What do you understand by IT Enable services? What are the major segments of IT enable
services?

IT Enabled services (ITES), also called web enabled services or remote services or Tele-working, covers
the entire gamut of operations which exploit information technology for improving efficiency of an
organization. These services provide a wide range of career options that include opportunities in call
Centres, medical transcription, medical billing and coding, back office operations, revenue claims
processing, legal databases, content development, payrolls, logistics management, GIS (Geographical
Information System), HR services, web services etc.
Medical Transcription
Medical transcription seems a simple process but it requires enormous attention as the errors can lead to
business and legal issues. Medical transcription is a process wherein a doctor verbally dictates the history
of the patient. This is recorded in the electronic format, which is being done by the outsourcing services
provider, known as Medical Transcriptions. The task of the IT enabled services provider is not only
confined to preparing the common reports for every patient, but also includes recording of several other
mission critical information of the patients, such as laboratory reports, clinical reports, diagnosis,
medicines prescribed etc. As the information is of utmost importance it is necessary for the offshore
outsourcing services provider to listen and record the details in the way desired by the client. With the
help of such critical details the doctors can only defend themselves if their patients are suing them, as the
information supplements as legal proof. Besides this, it is also a great help to the insurance companies for
the claims made. Such IT enabled services have already proved that it has huge potential not only in few
regions but also everywhere across the globe.
Online Education and Training

Like any other sector, in IT enabled services sector the online education and training segment is on the
threshold of prosperity. One of the greatest advantages that this segment has is that it disregards the
geographical bars. Outsourcing services provider from around the globe specializing in the field of online
education and training are now benefiting out of this. Now the students and the trainees from corporate
can easily equip themselves with the latest advancement in educational and training segment. The
knowledge provided is not only limited to the computer hardware/software section but is also into other
diversified fields. There are some critical factors like the amount of bandwidth, cost of hardware and
infrastructure that needs to be considered in order to implement online education and training effectively
through abundant offshore resources
Call Centers
The most famous of all the IT enabled service is the call centers. Call centers are used for customeroriented activities like support and services, telemarketing, technical support, providing valuable
information. The call centers have wide database access to Internet for vital information complimented
with expert human resource. Advantages of Outsourcing to India like liberal government policy,
knowledge base, and language familiarity makes it a prominent contender for outsourcing services.. This
sector is most steady of all the sectors in the category of IT enabled services
Data Processing
Irrespective of any field the data has always been critical for any organization. The traditional form of data
processing has time and again proved its limitations. In order to provide effective and efficient information
to the clients the use of information technology plays a major role. The outsourcing services provided by
the offshore outsourcing services provider range from data entry, statistical analysis, customer tracking
reports etc. Data processing covers up all major sectors such as banks, insurance, telecom and
government.
Data Digitization
Data digitization is nothing but the digital format of the non-digital menu scripts. Even the sounds and the
images these days are digitized. The offhsore outsourcing services providers in the field of Data
digitization serves major segments such as- government, museums, research centers, and educational
sectors.

Case Study
Company A is an Educational service for a museum, responsible for the provision of information to public
and research users on the holdings of a large national collection of artifacts.
Company A is not in the business of producing the applications or the software but in the procurement of
system, particularly multimedia application, from leading edge companies in the field. The contract must
specify that product acceptance is dependent on it reaching certain requirements for usability, quality in
use, and ease of use as the majority of the end users of these products are usually people with little or no
informatics skills, but highly discretionary needs.
Question:
Q. Discuss in detail what I.T infrastructure can be adapted and implemented for this kind of new setup so
that the after successfully implementing this infrastructure the training costs can also be avoided.

Ans. Leading IT Companies can be identified by huge, well-designed buildings, situated in significant
locations, and comprising lavish campuses. Besides the common infrastructures required in all
industries, IT companies of India require the following exclusive infrastructures:

Latest high-end machines that is able to support all sorts of hardwares and softwares.
Server

Router

Latest softwares that should be updated from time to time

Skilled professionals with suitable training aids

Skilled and dynamic manpower

Sound network and security policies

Low Labor cost

Huge resources of manpower

High level of education and skill

Features
Local Area Network (LAN) providing 100% connectivity to the entire campus,
Wireless access to LAN in select open areas within the campus

State-of-the-art audio-visual facilities in lecture theatres and classrooms

Internet browsing facilities and integrated e-mail system accessible from anywhere in the
campus, facilitating intra-campus and external collaboration

Internet Connectivity
E-mail system
Data Centre
Audio Visual Facilities
Connectivity and projection from any prominent audio-visual device / media
Touch-pad operation, controlling cameras, lighting, voice, and window-drapes

Information Technology & Management


Assignment C

1. When a key is pressed on the keyboard, which standard is used for converting the keystroke into the
corresponding bits?
a) ANSI

b) ASCII
c) EBCDIC
d) ISO
2. Which device is used as the standard pointing device in a Graphical User Environment?
a) Keyboard
b) Mouse
c) Joystick
d) Track ball
3. Which of the following is not an output device?
a) Scanner
b) Printer
c) Flat Screen
d) Touch Screen
4. Which of the following devices have a limitation that we can only information to it but cannot erase or
modify it
a) Floppy Disk
b) Hard Disk
c) Tape Drive
d) CDROM
5. Which technology is used in Compact disks?
a) Mechanical
b) Electrical
c) Electro Magnetic
d) Laser
6. Which of the following storage devices can store maximum amount of data?
a) Floppy Disk
b) Hard Disk
c) Compact Disk
d) Magneto Optic Disk
7. The programs which are as permanent as hardware and stored in ROM is known as
a) Hardware
b) Software
c) Firmware
d) ROMware
8. EPROM can be used for
a) Erasing the contents of ROM
b) Reconstructing the contents of ROM
c) Erasing and reconstructing the contents of ROM
d) Duplicating ROM
9. The contents of information are stored in
a) Memory data register
b) Memory address register
c) Memory access register
d) Memory arithmetic register
10. Algorithm and Flow chart help us to
a) Know the memory capacity
b) Identify the base of a number system

c) Direct the output to a printer


d) Specify the problem completely and clearly
11. Which of the following is the oldest spread sheet package?
a) VisiCalc
b) Lotus 1-2-3
c) Excel
d) StarCalc
12. How many characters can be typed in a single cell in Excel?
a) 256
b) 1024
c) 32,000
d) 65,535
13. A Worksheet can have a maximum of ___ number of rows
a) 256
b) 1024
c) 32,000
d) 65,536
14. Comments put in cells are called
a) Smart Tip
b) Cell Tip
c) Web Tip
d) Soft Tip
15. Comments can be added to cells using
a) Edit -> Comments
b) Insert -> Comment
c) File -> Comments
d) View -> Comments
16. Which menu option can be used to split windows into two?
a) Format -> Window
b) View -> Window ->Split
c) Window -> Split
d) View -> Split
17. Which of the following is not a valid data type in Excel?
a) Number
b) Character
c) Label
d) Date/Time
18. Data can be arranged in a worksheet in an easy to understand manner using
a) Auto Formatting
b) Applying Styles
c) Changing fonts
d) All of these
19. Which area in an Excel window allows entering values and formulas?
a) Title Bar
b) Menu Bar
c) Formula Bar
d) Standard Tool Bar

20. Multiple calculations can be made in a single formula using


a) Standard Formulas
b) Array Formula
c) Complex Formulas
d) Smart Formula
21. An Excel Workbook is a collection of
a) Workbooks
b) Worksheets
c) Charts
d) Worksheets and Charts
22. Which of the following is not a database application?
a) dBase
b) Edit
c) FoxPro
d) Access
23. which of the following is a database management tool developed by Microsoft?
a) dBase
b) Access
c) Personal Oracle
d) Sybase
24. HSAM stands for ____
a) Hierarchic Sequential Access Method
b) Hierarchic Standard Access Method
c) Hierarchic Sequential and Method
d) Hierarchic Standard and Method
25. Threats to data security may be ____ threats to the database.
a) Direct
b) Indirect
c) Both Direct and Indirect
d) None of these
26. Which of the following is not a logical database structure?
a) Chain
b) Network
c) Tree
d) Relational
27. An organized collection of logically related data is known as
a) Data
b) Meta data
c) Database
d) Data versus Information
28. The processing of an application between a client and a ____ processor.
a) Front end
b) Back end
c) Both
d) None of these
29. The____ is not formal enough to be implemented directly in a programming language.

a)
b)
c)
d)

Analysis model
E R model
Object oriented model
Object oriented data mode

30. Size of a database are usually measured in terms of


a) Terabytes
b) Megabytes
c) Data bytes
d) Giga bytes
31. In databases, locking level is also called as
a) Granularity
b) S lock
c) X lock
d) Dead lock
32. Wired networks...
a) Can be simpler to secure than wireless networks
b) Can involve running long wires through walls
c) Generally use Ethernet cables
d) All of the above
33. Wireless networks...
a) Can only have one type of operating system on them
b) Have a limited range that can be furthered reduced by physical obstacles
c) Only work with laptops
d) Are quite difficult to secure
34. Modems
a) Stand for "Modulator/demodulators"
b) Connect to multiple computers
c) Broadcast wireless signals
d) Only work with AOL
35. What is a router?
a) A device that make sures all devices on your network get power
b) A device that manages the data flow of a network
c) A device that always has a firewall for security
d) A device that connects to the internet and a modem
36. ______ shares characteristics with both hardware and software
a) Operating system
b) Software
c) Data
d) None
37. Which of the following statements is true about ERP Implementation?
a) As-Is stage follows To-Be stage.
b) To-Be stage follows As-Is stage.
c) Go-Live stage and As-Is stage can proceed simultaneously.
d) None of the above.

38. Which of the following factor does not contribute to the success of ERP?
a) Focus on business processes and requirements first.
b) Focus on achieving a healthy ERP ROI (Return on Investment), including post-implementation
performance measurement.
c) Strong project management and resource commitment.
d) Lack of budget.
39. Who plays and important role in the selection of ERP Package?
a) Consultants
b) Vendors
c) Users
d) All of the above.
40. Enterprise-wide resource planning systems (ERP systems) attempt to:
a) Integrate all corporate information in one central database
b) They do not allow information to be retrieved from many different organizational positions
c) They allow any organizational object to be made invisible.
d) They allow information to be stored in multiple databases.

Você também pode gostar