IICT Fall 2021 Part B
IICT Fall 2021 Part B
IICT Fall 2021 Part B
Question 1 [3 + 3 + 3 + 3 + 3 = 15 Marks]
c) State the difference between the “Two Content” slide and a “Comparison slide” in
PowerPoint
Page 1 of 12
d) What are the main reasons behind a computer virus? List all the major sources of viruses.
HTML Tags: Tags are the starting and ending parts of an HTML element. They
begin with < symbol and end with > symbol. Whatever written inside < and >
are called tags.
HTML elements: Elements enclose the contents in between the tags. They
consist of some kind of structure or expression. It generally consists of a
start tag, content and an end tag.
Question 2 [8 + 4 + 6 = 18Marks]
Page 2 of 12
b) Define the following terms with the help of at least one examples:
1. Meta-data.
The dictionary or catalog stores information about the database itself This is data
about data or ‘metadata’
2. Unstructured Data.
3. Semi-structured Data.
Data may have certain structure but not all information collected has identical
structure Some attributes may exist in some of the entities of a particular type but not
in others
4. Tuples
Tuples are the rows of any tables, Information is stored as tuples or records in
relations or tables.
1. What is a URL?
Page 3 of 12
5. Who is the internet service provider?
Question 3 [5+5+5=15Marks]
Read the given scenario carefully and answer the questions accordingly:
A waiter takes an order at a table, and then enters it online via one of the six terminals located in the
restaurant dining room. The order is routed to a printer in the appropriate preparation area: the cold
item printer if it is a salad, the hot item printer if it is a hot sandwich, or the bar printer if it is a drink.
A customer’s meal check-listing (bill) the items ordered and the respective prices are automatically
generated. This ordering system eliminates the old three-carbon-copy guest check system as well as
any problems caused by a waiter’s handwriting. When the kitchen runs out of a food item, the cooks
send out an ‘out of the stock message, which will be displayed on the dining room terminals when
waiters try to order that item. This gives the waiters faster feedback, enabling them to give better
service to the customers. Other systems feature aid management in the planning and control of their
restaurant business. The system provides up-to-the-minute information on the food items ordered and
breaks out percentages showing sales of each item versus total sales. This helps management plan
menus according to customers’ tastes. The system also compares the weekly sales totals versus food
costs, allowing planning for tighter cost controls. In addition, whenever an order is voided, the reasons
for the void are keyed in. This may help later in management decisions, especially if the voids are
consistently related to food or service. Acceptance of the system by the users is exceptionally high
since the waiters and waitresses were involved in the selection and design process. All potential users
were asked to give their impressions and ideas about the various systems available before one was
chosen.
Questions:
1. What type of system has been used in the above-mentioned scenario, define it briefly? Comment
what could be done better.
Page 4 of 12
2. Identify different components of the information system discussed in the given scenario and
assign them proper categories.
3. Information system has their effect on society. Discuss what type of effect the above-mentioned
system has on its customers?
Considering the scenario given in the image and answer the questions below:
Page 5 of 12
Scenario 1:
You can see a Local network containing Jasmine, Jon, Nick and Alice’s machines. Nick and Alice try
to send a message to Jasmine at the same time which results in a collision. In the network Exponential
backoff is applied to resolve the collisions. What happens when the collision happens? Briefly explain
the given scenario:
In an Exponential backoff at each collision the waiting time is increased. When the collision happens a
random time slot let's say 10 seconds for Nick and 15 seconds for Alice is added to resolve the collision.
If the collision happens again the waiting time will be increased again. Let's say instead of 15 seconds Alice
has to wait for 25 seconds.
Scenario 2:
You can see a data packet that is being sent from Nick’s machine to a website codingbat.com Describe
in detail the life cycle of this data packet. Mention all the protocols and paths involved. When Nick
writes the address codingbat.com in the browser what steps are involved before the packet is sent out
to the Router.
Page 6 of 12
Just check that the students have mentioned and described correctly about Domain name server, IP address,
MAC Address and Routing of the data packet forms source to destination.
33 100001 41 21
Question 6 [8 + 7 = 15 Marks]
Page 7 of 12
Solution:
++
Page 8 of 12
b) Write down the excel formula for assigning grades, the criteria will be the number of
complaints that are lodged against the customer service center. This means the fewer the
complaints; the more is the quality of service. i.e.,
Page 9 of 12
Question 7 [5 +10 = 15 Marks]
a. Carefully understand the HTML and CSS code and draw the output
HTML :
CSS:
Page 10 of 12
Solution:
Page 11 of 12
b. Carefully understand the HTML code and draw the output
Solution
Page 12 of 12