Você está na página 1de 12

ASSIGNMENT

PROGRAM:
SEMESTER:
Computers in Management
Subject Name :
Temporary Number (SEN) :
Permanent Enrollment Number
(PEN) :
Student Name :

INSTRUCTIONS
a) Students are required to submit all three assignment sets.
ASSIGNMENT
Assignment A
Assignment B
Assignment C

DETAILS
Five Subjective Questions
Three Subjective Questions + Case
Study
40 Objective Questions

MARKS
10
10
10

b) Total weightage given to these assignments is 30%. OR 30 Marks


c) All assignments are to be completed as typed in word/pdf.
d) All questions are required to be attempted.
e) All the three assignments are to be completed by due dates (specified
from time to time) and need to be submitted for evaluation by Amity
University.
( ) Tick mark in front of the assignments submitted
Assignment A
Assignment B
Assignment C

Assignment 'A'
1. What do you understand by an Information System? Explain various
categories of information system.
Answer. Information System is an integrated set of components for collecting,
storing, and processing data and for delivering information, knowledge, and
digital products. Information System aims to support operations, management
and decision making.
Computer-based Information Systems:

2. Show with reference to a block diagram, the structure of a digital computer


and the interconnection of various units. Explain the functions of various units
briefly.
Answer. The main components of a digital computer are:
Input devices (keyboard, mouse, etc.)
Central Processing Unit (CPU)
Memory
Output devices (video terminal, printer, etc.)
Files/Storage Devices (floppy disks, hard disks, etc.)
There may be one or more control units that check and regulates information
flow.

The input devices are used to feed inputs/data/commands.


The central processing unit (CPU) contains electronic circuits that cause
processing to occur.
The memory also called Random Access Memory or RAM (temporary memory) is
the main memory of the computer. It consists of electronic components that
store data including numbers, letters of the alphabet, graphics and sound. Any
information stored in RAM is lost when the computer is turned off.
The output devices make the information resulting from the processing available
for use. The two output devices more commonly used are the printer and the
computer screen.
The auxiliary storage devices are used to store data/files when they are not
being used in memory.

3. What do you understand by a database management system? Explain the


advantages of database management system over conventional file oriented
data processing system.
Answer. A Database (DB) is a collection of related data. A Database
Management System (DBMS) is a collection of programs/procedures/functions
that enables users to create and maintain a database in an effective and
efficient manner.
The advantages of database management system over conventional file
oriented data processing system:
DBMS is good for larger databases whereas, File Systems are limited to
smaller databases
DBMS ensures data integrity by managing transactions (ACID test =
atomicity, consistency, isolation, durability) whereas, File Systems have
Redundancy and Integrity issues.
DBMS enforces design criteria in relation to data format and structure.
DBMS provides Backup & Recovery controls and Advanced Security
whereas, File Systems have limited functionality (i.e. no support for
complicated transactions, recovery, etc.)
DBMS supports simultaneous access whereas, File System typically does
not support multi-user access
4. Explain the various file-accessing techniques in data management system.
Also state the advantages and limitations of each technique.
Answer. The following are file-accessing techniques with their advantages and
limitations Sequential: A simple access method, information in a file is accessed
sequentially one record after another.
If you want to read something that starts at byte number 100, you have to read
and ignore the first 99 bytes. So, it could be time consuming if you want to
access some particular records/data.
Sequential access is best suited where most of the records in a file are to be
processed. For example: transaction files.
Random or Direct: access allows you to go directly to the exact location you
want. Sometimes it is not necessary to process every record in a file or it may
not be necessary to process records in the order in which they are present or
record of a file is to be accessed only if some key value in that records is known.
In all such cases, Random or Direct access is used. For example: master files.
Databases often allow query processing that involves immediate access to large
amounts of information. All reservation systems fall into this category.

Index-based: This access method is a combination of both the sequential access


as well as the direct access. The main concept is to access a file directly first
and then sequentially from that point onwards. This access method involves
maintaining an index. The index is a pointer to a block. To access a record in a
file, a direct access of the index is made. The information obtained from this
access is used to access the file. For example, the direct access to a file will give
the block address and within the block the record is accessed sequentially.
The main advantage in this type of access is that both direct and sequential
access of files is possible.

5. What is meant by Local Area Network and Wide Area Network? Differentiate
between them and give one example of each.
Answer. A Local Area Network (LAN) is a computer network that interconnects
computers in a local/limited area such as a home, office building, school, etc.
A Wide Area Network (WAN) is a telecommunication network that covers a broad
area (i.e. that links across regional or national boundaries) using private or
public network transports.
The main characteristics of LANs, in comparison to WANs, include their usually
higher data-transfer rates, smaller geographic area, and lack of a need for
leased telecommunication lines.
Business and government entities utilize WANs to relay data among different
teams/departments from various geographical locations. This mode of
telecommunication allows a business to effectively carry out its daily functional
regardless of location.
Example of LAN 2 or more computers connected in a small office or an internet
cafe.
Example of WAN - the Internet can be considered a WAN as it is used by
businesses, governments, organizations and individuals across a broad area for
various purposes.

Assignment 'B'
1. What is an Internet? How it differs from Intranet? Explain the various Internet
Tools.
Answer.
Internet is a network of networks, a global collection of numerous computers
worldwide with the objective of sharing information. It uses TCP/IP protocols and
packet switching.
Internet offers a variety of services, such as e-mail, Telnet, File Transfer, etc.
Intranet is an in-house network, which allows internal circulation and access of
information within a company, to its offices and personnel.
Intranet is Intra+ Net, an internal or private Internet used strictly within the
boundaries of a company, university, or organization. "Inter" means "between or
among," hence the difference between the Internet and an Intranet.
Internet tools:
TELNET is a service on the internet which enables a network to log on to any
computer. It gives host the full command of another machine. After logging, one
can use software and another applications/programs, stored on the remote
computer, you logged in. Telnet requires access permission in terms of userid
and password.
GOPHER is a protocol used for searching and retrieving information from remote
sites on internet. It is a menu based system which contains the pages as a
hierarchy. These menus are clickable items and clicking on them, you may go to
another menu or get the information in the form of text.
File Transfer Protocol (FTP) is a utility to transfer of files from one computer to
another. After a proper authentication, it can be used to transfer source code for
any application, audio, video, picture, graphics etc.
2. What is multimedia? List the common multimedia devices. Explain the
Application areas of multimedia system.
Answer.
Multimedia is media and content that uses a combination of different content
forms. It is a term used for computer input and output in the form/combination
of text, graphics, sound, still images, animation, video and/or interactivity
content forms.
List of some common multimedia devices Tablet computer
MP3 player
Smartphones

Memory card
Sound card in personal computer

Application areas of multimedia system Multimedia is used in various areas including, but not limited to, advertisements,
entertainment, education, engineering, medicine, mathematics, business and
scientific research. Several examples are as follows:
Entertainment - multimedia is heavily used in the entertainment industry,
especially to develop special effects in movies and animations.
Multimedia games are a popular pastime and are software programs
available either as CD-ROMs or online.
In Education, multimedia is used to produce computer-based training courses
(popularly called CBTs) and reference books like encyclopedia. A CBT lets the
user go through a series of presentations, text about a particular topic, and
associated illustrations in various information formats.
In the Industrial sector, multimedia is used as a way to help present information
to shareholders, superiors and co-workers. Multimedia is also helpful for
providing employee training, advertising and selling products all over the world
via virtually unlimited web-based technology
In Medicine, doctors can get trained by looking at a virtual surgery or they can
simulate how the human body is affected by diseases spread by viruses and
bacteria and then develop techniques to prevent it.
3. What do you understand by electronic data interchange? What is the purpose
of EDI? State its advantages over traditional paper-based document transfer
system.
Answer. Electronic Data Interchange (EDI) is a method of transferring data
between different computer systems or computer networks. It is a protocol
maintained by the American National Standards Institute used for the computerto-computer exchange of business transactions.
It is commonly used by big companies for e-commerce purposes, such as
sending orders to warehouses or tracking their order.
For instance, organizations might replace bills of landing and even cheques with
appropriate EDI messages.
To summarize, the key benefits of using EDI are:
Expedient transmissions
Automated data entry
Receipt verification

Data validation
Compliance

Case Study
Compare the Conventional Banking System with Electronic Banking System
covering all details on ATM, Telebanking, Payment systems (various cards like
credit card , smart card etc) etc.
Answer.
Most people are quite familiar with how a bank operates. The concept is very
simple; you take your money to the bank and they will keep it safe for you and
you can collect it later. There are other uses of a bank, such as loans and
interest. But with nearly everything going digital, including money transfers,
paychecks, bill payments and debit cards, cash is practically becoming obsolete.
Most people are probably very comfortable walking into their local bank and
depositing a check or making a withdrawal. However, they must also be familiar
with the lines associated with doing even the most basic transaction. Also, they
would need to keep in mind all the bank holidays and the timings when the bank
will not be open. And if they get late to reach due to some reason, they will just
have to wait until the next day.
There are some benefits of conventional banking system though, as over the
period of time, banks have improved to a great extent. For example, regular
monitoring through surveillance cameras can deduct fraud cases.
It provides a number of services such as notaries, loan officers, and safety
deposit boxes (lockers).
Bank tellers and employees are trained to give customers the best service
possible, while online banking requires that a customer do all the work
themselves.
This system also has some serious flaws in hours of operation and convenience,
which is why electronic banking can be so appealing. Online banking can be
intimidating if you are new to the idea. But over the past decade, looking at the
easy access, higher interest rates and overall better quality service, more
people have been converting from traditional banking to electronic banking.
Electronic banking means internet banking or modern banking or online bill. In
this method, customer gets his bank account ID and password and he can check
his account, pay his bills and print his receipt through any computer, which is
connected to the internet. Electronic banking system consists of a service that
allows you to conduct transactions without physically being in a bank branch.
This includes ATMs, internet banking, pay-to-phone banking and direct deposit
accounts. With this banking system you will get full access to your account,
without going to a bank personally. You will have quick and easy 24-hour access
from anywhere in the world. The online bank won't ever be closed for a holiday.
You won't have to rush over to the bank after work and fight lines because it
allows you to access your account from any computer with an internet
connection.

The disadvantages of electronic banking system may include hacking, spyware


program, computer virus and breaking online password. Since this system has
started, hackers are using computer viruses to get information on your account
as well as the password to illegally transfer all your money with them. It is much
easier to have your account information stolen over the internet than at a
conventional bank. People can stop this crime by using a strong password, and
not sharing information like user name and pin number of your account, but the
possibility cannot be totally ruled out.

Assignment 'C'
1. Computer cannot do anything without a:
b. Memory
2. Primary storage is--------------as compared to secondary storage.
c. Fast and expensive
3. The memory which is programmed at the time it is manufactured:
a. ROM
4. Which of the following isnt used in the storage phase of a computer based
information system?
b. Keyboard
5. A kind of serial dot oe matrix printer that forms characters with magnetically
charged ink-sprayed dots is called:
d. None of the above
6. Which of the following is not applications software?
c. UNIX
7. A translator which reads an entire program written in a high-level language
and converts it into machine language code is called:
c. Compiler
8. The database structure that treats files as tables is:
e. None of the above
9. Combining of records from two or more files into a single ordered file is called:
c. Merging
10. Which of the following is a query language?
e. None of the above
11. Which of the following are popular DBMS packages?
d. All of the above
12. Web browser is a:
b. Software
13. Which of the following communication system uses simplex transmission
mode?
d. All of the above
14. Searching on a net can be done through:
a. Search Engines

15. Private networks set up by companies for their employees for purposes such
as e-mail, group, brain-storming, access to corporate database, etc. is called:
b. Intranet
16. Which of the following functions is supported by e-mail systems?
c. Transfer
17. The internal structure of the World Wide Web is built on a set of rules called:
c. All of the above
18. Which of the following is not a wide area network?
c. OMNINET
19. ___________ is used to connect a terminal to a computer through public
telephone lines.
a. Modem
20. Following is the disadvantage of using interpreters.
d. Time consuming
21. To install multimedia facility into a computer one needs:
d. All of the above
22. The links that take the user to new page is:
b. Hyperlink
23. Application software can be acquired through:
a. Customs programming
24. Which of the following is not an utility program?
d. None of the above
25. The malicious program that damages your computer is called:
a. Worm
26. Data entry can be performed with all of the following except?
b. COM
27. The two kinds of main memory are:
c. RAM and ROM
28. What is the name of the screen symbol that shows the placement of the
next character?
b. Cursor

29. A command that lets you change one or more fields in a record is:
d. None of the above
30. Data elements of related type are grouped into?
a. Record
31. A Hacker is:
b. An unauthorized person
32. The interface between user and computer system is provided by:
c. Operating systems
33. The process of navigating and exploring the World Wide Web is called:
c. Both of the above
34. An unauthorized access to network can be prevented through:
d. All of the above
35. Which of the following is not a search engine?
d. Gopher
36. Computer Network spanning a global area is:
c. WAN
37. Transmission Channels used in LAN are:
e. All of the above
38. Remote access to distant computers is called:
a. Telnet
39. The floppy disks come in two sizes. They are:
d. None of the above
40. 1 Byte is equal to combination of:
b. 8 bits

Você também pode gostar