In this post you will get complete solution of Information Technology in Business 2023 Question Paper FYUGP NEP B. Com 1st Sem, you can download this solved question paper in PDF.
Information Technology in Business Question Paper 2023 Solution in PDF Gauahti University FYUGP NEP B.Com 1st Sem
2023
COMMERCE
Paper Code: BCM0100703
(Information Technology in Business)
Full Marks: 30
Time: 1½ hours
The
figures in the margin indicate full marks for the questions.
Answer either in English or in Assamese.
1.
Choose the correct answer of the following: (1×5=5)
(a) Which one of the following is an input
device?
(a) MICR
(b) VDU
(c) Printer
(d) Speaker
Answer:
(a) MICR
b) Which one of the following is a spreadsheet
package?
(a) MS Word
(b) MS Excel
(c) MS Access
(d) MS PowerPoint
Answer:
(b) MS Excel
c) The
full form of SQL is:
(a) Standard Query Language
(b) Standard Quantum Language
(c) Structural Query Language
(d) Structured Query Language
Answer:
(d) Structured Query Language
d) Internet
is based on ______ Protocol.
(a) HTTP
(b) FTP
(c) TCP/IP
(d) OSI
Answer:
(c) TCP/IP
e) Which
memory is directly accessible to the CPU?
(a)RAM
(b) Hard Disk
(c) Secondary Memory
(d) Floppy Disk
Answer:
(a) RAM
2. Answer the following questions: (Any
five) (2×5=10)
(a) What is ALU?
ALU stands for Arithmetic Logic Unit. It is a part of the CPU that performs
arithmetic operations like addition, subtraction, multiplication, and division,
as well as logical operations like comparisons.
(b) What is a search engine?
A search engine is a software system that helps users find information on the
internet by retrieving relevant results based on keywords. Examples: Google,
Bing.
(c) What are the two types of
software?
- System Software:
Manages hardware and provides a platform for other software. Example:
Windows.
- Application Software:
Helps perform specific tasks. Example: MS Word.
(d) What is a record in a
database?
A record in a database is a collection of related data fields that represent a
single entity, like a student's details including Name, Roll Number, and Marks.
(e) What is TCL?
TCL stands for Transaction Control Language. It is used in databases to manage
transactions. Examples: COMMIT, ROLLBACK, SAVEPOINT.
(f) Differentiate between HTTP
and HTTPS.
HTTP (Hypertext Transfer Protocol) transfers data but is not secure. HTTPS
(Hypertext Transfer Protocol Secure) encrypts data, providing security for web
communication.
(g) What is a computer virus?
A computer virus is a harmful program that disrupts, damages, or steals
information from computer systems and spreads by attaching to files or
programs.
(h) How do you save a document in
MS Word?
To save a document in MS Word, click on the File menu, choose Save or Save As,
select a location, enter a file name, and click Save.
(i) What is a web browser? Give
an example.
A web browser is a software application used to access and view websites on the
internet. Example: Google Chrome.
(j) What is MIS?
MIS stands for Management Information System. It provides managers with
information for decision-making, planning, and controlling operations in an
organization.
3.
Answer the following questions: (Any three) (5×3=15)
(a) Mention the differences between
input and output devices.
Ans: Meaning:
- Input Devices:
Devices used to send data or instructions to a computer. Example:
Keyboard, Mouse.
- Output Devices:
Devices that receive data from a computer to display or produce results.
Example: Monitor, Printer.
Differences Between Input and Output
Devices:
Input
Devices |
Output
Devices |
Used to input data into a
computer. |
Used to output data from a
computer. |
Examples: Keyboard, Mouse,
Scanner. |
Examples: Monitor, Printer,
Speaker. |
Converts user actions into digital
data. |
Converts digital data into
human-readable form. |
Helps in data collection. |
Helps in presenting results. |
(b) Explain database architecture.
Ans: Database architecture
refers to the design of a database system, which defines how data is stored,
managed, and accessed. The architecture typically follows a layered approach,
ensuring efficient data processing and security.
Key Types of Database Architecture:
- Single-Tier Architecture: Data is directly accessed by the user, usually in
small-scale systems.
- Two-Tier Architecture:
Involves a client and a server, where the client directly communicates
with the database server.
- Three-Tier Architecture: Has three layers - the client (user interface),
application layer (business logic), and database layer (data storage).
This is common in enterprise systems for better security and scalability.
(c) Differentiate between HTML and XHTML.
Ans: Meaning:
- HTML (HyperText Markup Language): A standard language used to create webpages with a
focus on structure and design.
- XHTML (Extensible HyperText Markup Language): A stricter, XML-based version of HTML, designed to
improve compatibility and error-handling in web development.
Differences Between HTML and XHTML:
HTML |
XHTML |
Less strict syntax rules. |
Stricter syntax rules. |
Tags can be written in uppercase
or lowercase. |
Tags must be written in lowercase. |
Does not require all tags to be
closed. |
All tags must be properly closed. |
More forgiving with errors. |
Less forgiving; errors cause
failure. |
Based on SGML (Standard
Generalized Markup Language). |
Based on XML (Extensible Markup
Language). |
(d) Explain the functions of an operating system.
Ans: An Operating System
(OS) is software that acts as an intermediary between the computer hardware
and the user. It manages computer resources and provides essential services to
both software and hardware. The primary functions of an operating system
include:
- Process Management:
The OS manages the execution of processes, allocates resources, and
ensures that processes do not interfere with each other.
- Memory Management:
It controls the computer's memory by allocating space for data and
programs, ensuring that each process has enough memory to run efficiently.
- File Management:
The OS manages files and directories, allowing for their creation,
deletion, and access. It ensures proper organization and retrieval of data
stored in files.
- Device Management:
It manages input/output devices such as the keyboard, mouse, and printer,
ensuring smooth communication between hardware and software.
- Security and Access Control: The OS enforces security measures to protect data and
prevent unauthorized access. It uses authentication methods like passwords
to ensure only authorized users can access the system.
- User Interface:
It provides an interface for users to interact with the computer, whether
through command-line or graphical user interfaces (GUI).
(e) What is a computer network? Explain the types of network topologies.
Ans: A Computer Network
is a system of interconnected computers that share resources, such as data,
hardware, and software, over communication channels. Networks enable computers
to communicate with each other and exchange information.
Types of Network Topologies:
Network topology refers to the physical or logical layout of the devices in a
network. Common types of network topologies are:
- Bus Topology:
- All devices are connected to a single central cable
(bus).
- It is easy to install but can suffer from data
collisions as the network grows.
- Star Topology:
- All devices are connected to a central device, like a
hub or switch.
- It is highly reliable as failure in one device does
not affect others but requires more cables.
- Ring Topology:
- Devices are connected in a circular fashion, and data
travels in one direction around the ring.
- It is efficient but can be disrupted if a single
device or connection fails.
- Mesh Topology:
- Each device is connected to every other device in the
network.
- It is highly reliable but can be complex and expensive
to install.
- Hybrid Topology:
- A combination of two or more topologies.
- It offers the benefits of multiple topologies and can
be customized based on network requirements.
(f) Briefly discuss the applications of Information Technology.
Ans:- Information Technology
(IT) has widespread applications across various fields. Some of the key
applications include:
- Education:
- IT facilitates online learning platforms, virtual
classrooms, and access to educational resources, enhancing learning
opportunities for students worldwide.
- Healthcare:
- IT is used in maintaining electronic health records
(EHR), telemedicine, medical imaging, and patient management systems,
improving healthcare delivery and patient care.
- Business and Commerce:
- IT enables e-commerce, online banking, inventory
management, and business automation, streamlining operations and
improving customer service.
- Entertainment:
- IT supports digital media, gaming, streaming services,
and content creation tools, providing entertainment options to users
globally.
- Communication:
- IT powers communication tools like email, instant
messaging, video conferencing, and social media, making it easier for
individuals and organizations to stay connected.
- Government:
- IT helps in digital governance, public service
delivery, and the management of government resources, improving
transparency and efficiency in administrative functions.
- Science and Research:
- IT enables data analysis, simulations, and
collaboration in scientific research, accelerating discovery and
innovation in fields like medicine, engineering, and space exploration.
Through these applications, IT has
become an essential tool for improving efficiency, productivity, and quality of
life across different sectors.
-0000-
Also Read;