Sybms (Sem-Iii) IT in Business Management - I: Question Bank With Answers
Sybms (Sem-Iii) IT in Business Management - I: Question Bank With Answers
Sybms (Sem-Iii) IT in Business Management - I: Question Bank With Answers
IT in Business Management - I
QUESTION BANK WITH ANSWERS
Cache memory:
Cache memory is a very high speed semiconductor memory which can
speed up the CPU.>It is used to hold those parts of data and program
which are most frequently used by the CPU.
It is located between Processor and RAM. It is smallest and fastest
memory.
It is volatile and temporary memory.
Cache memory has limited capacity.
RAM:
It stands for random access memory.
It performs read/write operations which stores data until the machine is
working.
It provides temporary storage
It is a volatile memory
RAM is of two types −
• Static RAM (SRAM)
• Dynamic RAM (DRAM)
Static RAM:
The word static indicates that the memory retains its contents as long
as power is being supplied. However, data is lost when the power gets
down due to volatile nature.
Data is stored in SRAM with the help of flip flops. As it is fixed, there is
no need to refresh the memory.
Characteristic of Static RAM
• Long life
• No need to refresh
• Faster
• Used as cache memory
• Expensive
• High power consumption
Secondary memory:
This type of memory is also known as external memory or non-volatile.
It is slower than the main memory. These are used for storing
data/information permanently.
CPU directly does not access these memories, instead they are accessed
via input-output routines.
The contents of secondary memories are first transferred to the main
memory, and then the CPU can access it.
It is known as the backup memory.
Data is permanently stored even if power is switched off.
Optical storage devices save data as patterns of dots that can be read
using light. A laser beam is the usual light source.
Dots can be created using the laser beam (for media that is writable such as
CD-Rs). The beam is used in a high-power mode to actually mark the surface
Flash memory storage is a form of non-volatile memory that was born out of
a combination of the traditional EPROM and E2PROM.Flash memory is
a non-volatile memory chip used for storage and for transferring data between
a personal computer (PC) and digital devices. Easily portable (e.g. USB
memory sticks, camera flash cards, etc).
2. LAN:
A local-area network (LAN) is a computer network that spans a relatively small
area. Most often, a LAN is confined to a single room, building or group of
buildings. The smallest LAN may only use two computers, while larger LANs
can accommodate thousands of computers. Local Area Networks cover a small
physical area, like a home, office, or a small group of buildings, such as a
school or airport.
LAN is generally limited to specific geographical area less than 2 K.M.,
supporting high speed networks. A wide variety of LANs have been built and i
nstalled, but a few types have more recently become dominant. The most wide
ly used LAN system is the Ethernet system based on the bus topology.
3.MAN:
A metropolitan area network, or MAN, consists of a computer network across
an entire city, college campus or small region. A MAN is larger than a LAN,
which is typically limited to a single building or site. Depending on the
configuration, this type of network can cover an area from several miles to
tens of miles. A MAN is often used to connect several LANs together to form a
bigger network.
The network size falls intermediate between LAN and WAN. A MAN typically c
overs an area of between 5 and 50 km diameter. Many MANs cover an area th
e size of a city.
Characteristics of MAN
1) It generally covers towns and cities (50 kms)
2) It is developed in 1980s.
3) Communication medium used for MAN are optical fibers, cables etc.
4) Data rates adequate for distributed computing applications.
4.WAN:
Wide Area Network (Figure 8) is a network system connecting cities, countries
users and computers in one location can communicate with users and
computers in other locations.
Characteristics of WAN
1) It generally covers large distances (states, countries, continents).
2) Communication medium used are satellite, public telephone networks whic
h are connected by routers.
3) Routers forward packets from one to another a route from the sender to th
e receiver.
Ans :
Ans:
Digital Economy :
1) e-business infrastructure :
2) e-business:
3) e-commerce :
Ans:
Operating System :
3. Real time OS
6. Mobile OS
MODULE 2
Q1. What are header and footer? How to insert it in word? Explain with
example.
Ans:
Header and Footer:
Headers and footers allow you to repeat text at the top or bottom of the
page. Page numbers and dates are frequently inserted in footers.
Header and Footer allow you to add additional information like dates, file
names, page numbers at the top or bottom of your document. The basic steps
to set up a header and footer are given below;
If you select the Blank option it displays Design tab with header and footer
tools.
Once the Design tab is active you can add Date and Time to Header or Footer
by clicking the Date & Time command. On clicking it displays 'Date & Time'
dialog box. Select the desired date format, time format or date & time format.
Example :
1. IF Function
Judging by the number of IF-related comments on our blog, it's the most
popular function in Excel. In simple terms, you use an IF formula to ask
Excel to test a certain condition and return one value or perform one
calculation if the condition is met, and another value or calculation if the
condition is not met:
IF(logical_test, [value_if_true], [value_if_false])
For example, the following IF statement instructs Excel to check the value
in A2 and return "OK" if it's greater than or equal to 3, "Not OK" if it's less
than 3:
=IF(A2>=3, "OK", "Not OK")
2. AND & OR :
These are the two most popular logical functions to check multiple criteria.
The difference is how they do this:
AND returns TRUE if all of the conditions are met, FALSE otherwise.
OR returns TRUE if any of the conditions is met, FALSE otherwise.
While rarely used on their own, these functions come in very handy as
part of bigger formulas.
For example, to check the quantity in 2 columns and return "Good" if both
values are greater than zero, you use the following IF formula with an
embedded AND statement:
=IF(AND(A2>0, B2>0), "Good", "")
If you are happy with just one value being greater than 0 (either A2 or B2),
then use the OR statement:
Create the main document with the fixed contents you need,
Choose an existing Data Source, or create a new one,
Add the merge field placeholders into the main document taking into
account that when you perform the mail merge, the mail merge fields
become filled with information from your data file. Since the information
can be of different size, make sure the placeholders are big enough to
contain the most lengthy one, and set the desired alignment, anchorage,
etc. of the placeholder.
Merge the data with the main document, and preview the result. If
possible, preview each copy of the document before you print the whole set.
Advantages :
1. Time saving as it does lots of letters.
2. It is quick and easy to do.
3. Easy to store the information.
4. Only one letter needed to be created.
Q1. How to configure Microsoft Outlook in your PC? Write all possible
steps.
Ans:
Outlook :
Outlook is a great tool for communication, time and information
management
and collaboration.
Outlook is comprehensive tool that enables you to manage you email,
calendar, contacts, tasks and more all in one place.
Outlook is versatile component for users to manage personal information
and to communicates with others.
Follow the steps detailed below to use microsoft office outlook express to
send/receive email.
Steps :
1. Open Outlook. Select Account Settings... from the Tools menu
2. On the E-mail tab, click New
3. Select "Manually configure server settings or additional server types" and
click Next >
4. Select Internet E-mail and click Next >
5. Your Name: Enter the name you wish recipients to see when they receive
your message.
6. Click on the Outgoing Server tab, and check the box labeled My outgoing
server (SMTP) requires authentication.
7. Click on the Advanced tabUnder Incoming Server (POP3), the port number
should be set to 110.
Under Outgoing Server(SMTP), the port numbershould be set to 587.
8. Click OK Click Next. Click Finish.
6. Attractive offers
There is a lot of competition happening online. The e-commerce sites are
flooded with offers and discounts to attract customers. These are
their marketing techniques which are profitable for the customers too.
3. Security issues
Online transactions always face the threat of lack of security. Many sites
do not have Cash On Delivery (COD) option. It is risky for the customers
to give all the card details while doing online payment.
4. No delivery in remote areas
Most sites boast of delivery in every nook and corner. But in reality,
when the product arrives it can be noticed that it has been redirected
many times. Finally it is the quality of the product that is being
compromised.
5. Technical difficulties
Lack of enough bandwidth is a problem in many countries. There are
also problems of compatibility of the e-commerce application with
certain operating systems. As the software field is developing fast, many
utilities become outdated within no time.
6. Late Delivery
The products ordered online may not reach you at the correct time. Even
though they say that it takes only a few days, it rarely reaches on time.
You then have to take the pain of tracking it and wait patiently till it is
delivered.
Types of Ecommerce :
1. Business-to-Business (B2B)
2. Business-to-Consumer (B2C)
3. Consumer-to-Consumer (C2C)
4. Consumer-to-Business (C2B)
1) Business-to-Business (B2B):
In the B2C model, a consumer goes to the website, selects a catalog, orders
the catalog, and an email is sent to the business organization. After receiving
the order, goods are dispatched to the customer. Following are the key
features of the B2C model −
Example : Amazon.com
3) Consumer-to-Consumer (C2C) :
This consists of electronic transactions of products and services between
two customers. These are mainly conducted through a third party that
provides an online platform for these transactions. Sites, where old items
are bought and sold, are examples of C2C eCommerce.
Example : OLX.com
4) Consumer-to-Business (C2B) :
In this, a complete reversal of the selling and buying process takes place.
This is very relevant for crowd sourcing projects. In this case, individuals
make their items or services and sell them to companies. Some examples
are proposals for company site or logo, royalty free photographs, design
elements and so on.
Risk Avoidance
Risk avoidance is the opposite of risk acceptance. It is the action that avoids
any exposure to the risk whatsoever. It’s important to note that risk avoidance
is usually the most expensive of all risk mitigation options.
Risk Limitation
Risk limitation is the most common risk management strategy used by
businesses. This strategy limits a company’s exposure by taking some action.
It is a strategy employing a bit of risk acceptance along with a bit of risk
avoidance or an average of both. An example of risk limitation would be a
company accepting that a disk drive may fail and avoiding a long period of
failure by having backups.
Risk Transference
Risk transference is the involvement of handing risk off to a willing third party.
For example, numerous companies outsource certain operations such as
Trojan Horse
A Trojan Horse is also a sort of destructive program that remains disguised in
a normal software program. It is not exactly a virus, as it cannot replicate
itself. However, there is possibility that virus program may remain concealed
in the Trojan Horse.
Deleting data
Blocking data
Modifying data
Copying data
Disrupting the performance of computers or computer networks.
USER
APPLICATION LAYER
TRANSPORT
LAYER