Phone:+91-88823 09876

Amity Solved Assignment of Computer Application in Business

Body: 

Computer Application in Business

 

ASSIGNMENT-A

1. What do you understand by an Information System? Explain various categories of information system.

2. Show with reference to a block diagram, the structure of a digital computer and the interconnection of various units. Explain the functions of various units briefly.

3. What do you understand by a database management system? Explain the advantages of database management system over conventional file oriented data processing system.

4. Explain the various file-accessing techniques in data management system. Also state the advantages and limitations of each technique.

5. What is meant by Local Area Network and Wide Area Network? Differentiate between them and give one example of each.

ASSIGNMENT-B

1. What is an Internet? How it differs from Intranet? Explain the various Internet Tools.

2. What is multimedia? List the common multimedia devices. Explain the Application areas of multimedia system.

3. What do you understand by electronic data interchange? What is the purpose of EDI? State its advantages over traditional paper-based document transfer system.

Case Study

Compare the Conventional Banking System with Electronic Banking System covering all details on ATM, Telebanking , Payment systems (various cards like credit card , smart card etc) etc.

ASSIGNMENT-C

1. Computer can not do anything without a:

 

a. Chip

b. Memory

c. Output device

d. Software

e. None of these

 

2. Primary storage is--------------as compared to secondary storage.

 

a. Slow and inexpensive

b. Fast and inexpensive

c. Fast and expensive

d. Slow and expensive

e. None of the above

 

3. The memory which is programmed at the time it is manufactured:

 

a. ROM

b. RAM

c. PROM

d. EPROM

e. None of the above

 

4. Which of the following isn‘t used in the storage phase of a computer based information system?

 

a. Magnetic disk

b. Keyboard

c. Diskette

d. Hard disk

e. None of the above

 

5. A kind of serial dot œ matrix printer that forms characters with magnetically charged ink-sprayed dots is called:

 

a. Laser Printer

b. Ink-Jet printer

c. Both of the above

d. None of the above

 

6. Which of the following is not applications software?

 

a. Word processing

b. Spreadsheet

c. UNIX

d. Desktop publishing

e. None of the above

 

7. A translator which reads an entire program written in a high-level language and converts it into machine language code is called:

 

a. Assembler

b. Translator

c. Compiler

d. System Software

 

8. The database structure that treats files as tables is:

 

a. Relational database

b. Hierarchical database

c. Network database

d. All of the above

e. None of the above

 

9. Combining of records from two or more files into a single ordered file is called:

 

a. Sorting

b. Searching

c. Merging

d. None of the above

 

10. Which of the following is a query language?

 

a. Dbase

b. Access

c. Fox Pro

d. All of the above

e. None of the above

 

11. Which of the following are popular DBMS packages?

 

a. Dbase

b. Access

c. FoxPro

d. All of the above

e. None of the above

 

12. Web browser is a:

 

a. Hardware

b. Software

c. Hyperlink

d. All of the above

e. None of the above

 

13. Which of the following communication system uses simplex transmission mode?

 

a. Radio

b. Televison

c. Cable

d. All of the above

e. None of the above

 

14. Searching on a net can be done through:

 

a. Search Engines

b. Indexes

c. Both of these

d. None of these

 

15. Private networks set up by companies for their employees for purposes such as e-mail, group, brainstorming, access to corporate database etc is called:

 

a. Internet

b. Intranet

c. Pop-up-windows

d. All of these above

e. None of the above

 

16. Which of the following functions is supported by e-mail systems?

 

a. Composition

b. Reporting

c. Transfer

d. Disposition

e. All of the above

 

17. The internal structure of the World Wide Web is built on a set of rules called:

 

a. Hyper Text Transfer Protocol

b. TCP/IP

c. All of the above

d. None of the above

 

18. Which of the following is not a wide area network?

 

a. ARPANET

b. INDONET

c. OMNINET

d. None of the above

 

19. Is used to connect a terminal to a computer through public telephone lines.

 

a. Modem

b. Internet

c. Network

d. None of these

 

20. Following is the disadvantage of using interpreters.

 

a. Fast response

b. easy to write

c. Less memory requirements

d. Time consuming

 

21. To install multimedia facility into a computer one needs:

 

a. Sound card

b. Speakers

c. CD-ROM

d. All of the above

e. None of the above

 

22. The links that take the user to new page is:

 

a. Hypertext

b. Hyperlink

c. Hyper Text Transfer Protocol

d. All of the above

 

23. Application software can be acquired through:

 

a. Customs programming

b. Pre-written packages

c. Both of the above

d. None of the above

 

24. Which of the following is not an utility program?

 

a. Editing

b. Sorting

c. Merging

d. None of the above

 

25. The malicious program that damages your computer is called:

 

a. Worm

b. Viruses

c. Bugs

d. None of the above

 

26. Data entry can be performed with all of the following except?

 

a. OCR

b. COM

c. Voice œ recognition systems

d. None of the above

 

27. The two kinds of main memory are:

 

a. Primary and Secondary

b. Random and sequential

c. RAM and ROM

d. All of the above

 

28. What is the name of the screen symbol that shows the placement of the next character?

 

a. Mouse

b. Cursor

c. Track Ball

d. All of the above

 

29. A command that lets you change one or more fields in a record is:

 

a. Insert

b. Delete

c. Modify

d. None of the above

 

30. Data elements of related type are grouped into?

 

a. Record

b. Title

c. String

d. All of the above

 

31. A Hacker is:

 

a. A software program

b. An unauthorized person

c. A virus

d. All of the above

 

32. The interface between user and computer system is provided by:

 

a. Compiler

b. Utility programs

c. Operating systems

d. All of the above

 

33. The process of navigating and exploring the World Wide Web is called:

 

a. Browsing

b. Surfing

c. Both of the above

d. None of the above

 

34. An unauthorized access to network can be prevented through:

 

a. Passwords

b. Digital signatures

c. Encryption

d. All of the above

 

35. Which of the following is not a search engine?

 

a. Altavista

b. Lycos

c. Infoseek

d. Gopher

 

36. Computer Network spanning a global area is:

 

a. LAN

b. MAN

c. WAN

d. All the above

 

37. Transmission Channels used in LAN are:

 

a. Coaxial cable

b. Fiber-optics cable

c. Twisted wire

d. Both (a) and (b)

e. All of the above

 

38. Remote access to distant computers is called:

 

a. Telnet

b. FTP

c. Both of the above

d. None of the above

 

39. The floppy disks comes in two sizes. They are:

 

a. 3.5 inch & 5.25 inch

b. 2 inch and 3.5 inch

c. 2 inch and 4.25 inch

d. None of the above

 

40. 1 Byte is equal to combination of:

 

a. 16 bits

b. 8 bits

c. 2 bits

d. None of the above

 

Solve by www.solvezone.in contact for more detail - 8882309876

Title:
Amity Solved Assignment of Computer Application in Business (With Online Typing & Filling)
Short Name or Subject Code:  Computer Application in Business
Short Description:  Solution will be available after successful payment of amount
University:  Amity
Service Type:  Assignments
Select Semester:  Semester- II Select Cource:  B.Com
commerce line item type: 
Price: 
₹800.00
Product: