0% found this document useful (0 votes)
42 views35 pages

Introduction To Information System

The document is a question bank for the DCA course under the 2023 Scheme, focusing on the subject 'Introduction to Information Systems.' It includes various categories of questions such as fill-in-the-blanks, true or false, short answer, and essay-type questions covering computer fundamentals and information technology. The content is structured to assess knowledge on topics like hardware, software, coding systems, and the evolution of computer generations.

Uploaded by

tourmaxtvm37
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
42 views35 pages

Introduction To Information System

The document is a question bank for the DCA course under the 2023 Scheme, focusing on the subject 'Introduction to Information Systems.' It includes various categories of questions such as fill-in-the-blanks, true or false, short answer, and essay-type questions covering computer fundamentals and information technology. The content is structured to assess knowledge on topics like hardware, software, coding systems, and the evolution of computer generations.

Uploaded by

tourmaxtvm37
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 35

CENTRE FOR DEVELOPMENT OF IMAGING TECHNOLOGY

(Under Government of Kerala)

QUESTION BANK
Course DCA

Scheme 2023 Scheme Version 1

Subject INTRODUCTION TO INFORMATION SYSTEM

01 t
-1 en
Code QB23D01-101

01 m
MODULE - I
u
Computer Fundamentals
3D oc
Category I Fill in the Blanks
B2 D

SI.No Questions Answer Key


_________ is the representation of data and instructions using the binary
1 Binary code
number system.
Q IT

2 A computer's clock speed is measured in __________ per second. Cycles


A byte is made up of 8 bits, allowing for __________ different values. 256
-D

3
The process of a computer finding and loading the operating system is called
4 Bootstrapping
__________
C

An __________ manages resources like CPU, memory, and storage. Operating


5
system
6 The process of a computer starting up is known as __________ Booting
A computer's __________ is the main circuit board containing the CPU,
7 Motherboard
RAM, and other essential components.
Converting a number from one base to another is called __________
8 Radix
conversion.

9 The memory unit that stores the computer's firmware is known as the ______ BIOS

10 The place value of a digit in a number determines its ________and ________ Position,
Significance
A graphics card (GPU) is responsible for rendering ________ and _______ Images,
11
on the computer's display. Videos

Question Bank Code: QB23D01-101 Page 1 of 35


12 A gigabyte (GB) is approximately one __________ bytes. Billion

13 Unicode is a coding system that uses _________ bits to represent characters. 16


A __________ typically has two buttons and a scroll wheel for interacting
14 Mouse
with a computer's graphical user interface.
__________ memory allows a computer to use a portion of its storage space
15 Virtual
as additional RAM.

16 A __________is one billionth of a second. Nanosecond


The power supply unit (PSU) converts __________ energy from the wall
17 Electrical
outlet to power the computer's components.

18 A __________ is equal to half a byte or four bits. Nibble

01 t
-1 en
The EBCDIC coding system was commonly used on early IBM computers
19 8
and is based on __________bit encoding.

20

21
01 m
A __________ is equivalent to 1024 gigabytes.

The term __________ is often used interchangeably with the term character
u Terabyte

encoding, referring to the method of representing characters in a computer Encoding


3D oc
system.
Modems are used for converting digital data from a computer into __________
B2 D

22 Analog
signals for transmission over phone lines.
A Bluetooth __________ is a device that acts as a bridge between Bluetooth
Gateway
Q IT

23
and non-Bluetooth devices, allowing them to communicate.
__________ cards are used to capture external audio or video signals, such as
-D

24 Capture
from a camera or gaming console.
A __________ port is a type of communication port used to transmit data one
25 Serial
C

bit at a time.
Solid-state drives are a type of storage unit that uses __________ memory for
26 Flash
data storage.
A computer's __________ memory is used to store frequently accessed data
27 Cache
for faster retrieval.
An __________ terminal is a type of computer terminal that has its own
28 Intelligent
processing capability.
A __________ terminal is a type of computer terminal that lacks processing
29 Dumb
capabilities.

To improve security, Bluetooth devices can use various __________ and


30 Authentication
encryption methods to protect data during transmission.

Question Bank Code: QB23D01-101 Page 2 of 35


Category II True or False

SI.No Questions Answer Key


A computer's motherboard is the main circuit board that connects all of its
1 True
components, including the CPU, RAM, and storage devices.

Software refers to the physical components of a computer, such as the hard


2 False
drive and motherboard.

Virtual memory is a physical storage device, separate from RAM, used to


3 False
store data temporarily when RAM is full.

01 t
Bluetooth is a wired communication technology that allows devices to

-1 en
4 False
communicate with each other over short distances.

Universal Serial Bus ports are commonly used for connecting external
5

6
01 m
devices like keyboards, mice, and flash drives to computers.
An operating system is not necessary for a computer to function; it's optional
u
software that can be installed if needed.
True

False
3D oc
RAM is a type of computer memory that permanently stores data even when
7 False
the computer is powered off.
B2 D

Supercomputers are typically used for everyday tasks such as web browsing
8 False
and word processing.
Q IT

Mainframe computers are often used by large organizations for processing


9 True
and managing massive amounts of data and transactions.
-D

Flash memory is commonly used in USB drives, SSDs, and memory cards
10 True
due to its non-volatile nature.
C

Optical drives, such as DVD or Blu-ray drives, are becoming increasingly


11 False
common in modern computers due to their high-speed data access.
An Ethernet port is used for wireless connectivity in laptops and desktop
12 False
computers.
An SSD uses spinning disks to store data and is generally faster than an
13 False
HDD.
Binary code, which consists of 0s and 1s, is the fundamental language of
14 True
computers.

A sound card is essential for connecting a computer to the internet and


15 True
establishing network connections.

Question Bank Code: QB23D01-101 Page 3 of 35


Category III Short Answer

SI.No Questions & Answer Keys (AK)


1 Briefly explain the difference between hardware and software with examples.
Hardware refers to the physical components of a computer. Eg: mouse, keyboard.
AK
Software refers to the programs and instructions that run on it. Eg: Microsoft Word, photoshop

2 Briefly describe Bluetooth connectivity and its applications.


Bluetooth is a wireless technology used for short-range data and device connectivity, commonly

AK used for wireless headphones, speakers, and file transfers. An example is connecting a
smartphone to wireless headphones.

01 t
3 What is the ASCII coding system, and how is it used in computers?

-1 en
ASCII is a character encoding standard used for representing text and control characters in
AK
computers. Seven bits are used to represent each character in the ASCII code.

AK
01 m
Briefly explain the difference between volatile and non-volatile memory.
Volatile memory loses its data when the power is turned off, while non-volatile memory retains
u
data even when the power is off.
3D oc
5 Describe the purpose of a scanner as an input device.
A scanner is an input device designed to convert physical documents, images, or objects into
B2 D

AK digital format for storage, manipulation, and further processing on a computer or digital system.
Its primary purpose is to capture analog information and transform it into digital data.
Q IT

6 What distinguishes a supercomputer from other computer types?


Supercomputers are a distinct category of computers that differ significantly from other computer
-D

types, such as personal computers (PCs), workstations, and servers, in several key ways.
supercomputers stand out from other computer types due to their extraordinary processing
C

AK
power, specialized hardware and architecture, scalability, high cost, and their exclusive use for
scientific and research applications that demand exceptional computational capabilities. They
are essential tools for tackling some of the most challenging problems in science and engineering.

7 Briefly explain the primary function of the CPU.


Executes instructions and performs calculations in a computer. the CPU serves as the "brain" of
the computer, executing instructions, performing calculations, and managing the overall
AK
operation of the computer system. It plays a crucial role in determining the system's performance
and responsiveness.
8 What does SMPS stand for, and what is its function?
SMPS (Switched-Mode Power Supply) is a critical component in modern electronics, serving
AK
the purpose of converting high-voltage AC power from the mains into low-voltage, regulated

Question Bank Code: QB23D01-101 Page 4 of 35


DC power for the operation of electronic devices while maintaining high efficiency and
compactness. Characteristics: Voltage Conversion, Efficiency, Regulation, Switching Operation

9 Briefly explain the purpose of a USB port in a computer.


USB port in a computer serves several important purposes, making it one of the most common

AK and versatile types of ports found on computers and peripheral devices. Primary purposes of a
USB port in a computer Data Transfer, Peripheral Connectivity, Charging device, etc.

10 Briefly explain the role of an operating system in a computer.


An operating system manages hardware resources and provides a user interface for running
AK
software.

01 t
11 Briefly explain the purpose of a parity bit in data transmission.

-1 en
A parity bit is used in data transmission as a simple error-checking mechanism to detect errors
in transmitted data. Its primary purpose is to help ensure the integrity of the transmitted data by

AK 01 m
adding an extra bit to each data byte or word.
u Even Parity
Odd Parity
3D oc
Error detection
Error Indication
B2 D

12 Briefly explain the significance of data and information in the context of computing.
Data is raw facts, and information is processed data. Computers transform data into information,
Q IT

AK
enabling decision-making and problem-solving.
-D

Briefly explain the differences between analog, digital, and hybrid computers, and
13
provide examples of each.
Data is raw facts, and information is processed data. Computers transform data into information,
C

AK
enabling decision-making and problem-solving.

Compare and contrast different types of video cards and their roles in computer
14
graphics.
Video cards like PCI, PCI Express, and AGP are used for rendering graphics and improving
AK
visual performance.

Define and compare various storage units, including bit, byte, kilobyte, megabyte,
15
gigabyte, terabyte, petabyte, exabyte, and nibble.

Various storage units are used to measure data storage capacity at different scales. Here are

AK definitions for common storage units: bit, byte, kilobyte, megabyte, gigabyte, terabyte, petabyte,
exabyte, and nibble.

Question Bank Code: QB23D01-101 Page 5 of 35


Category IV Essay Type Questions
SI.No Questions & Answer Keys (AK)
1 Discuss the evolution of computer generations and key advancements in each generation.
The evolution of computer generations represents the progression of computing technology over
time, marked by significant advancements in hardware and software capabilities. Computer
generations are typically divided into five distinct generations, each characterized by specific
developments and innovations.
First Generation (1940s-1950s): Vacuum Tubes
Second Generation (1950s-1960s): Transistors
Third Generation (1960s-1970s): Integrated Circuits (ICs)

01 t
AK

-1 en
Fourth Generation (1970s-1980s): Microprocessors and Personal Computers
Fifth Generation (1980s-Present): Integrated Circuits and Artificial Intelligence
Each generation of computers has brought about significant improvements in terms of speed,

01 m
size, storage capacity, and accessibility. These advancements have facilitated the development
u
of diverse applications, from scientific research and business automation to entertainment and
communication. The evolution of computing technology continues to shape our modern world
3D oc
and drive innovation in various fields.
Explain the importance of input devices in computer interaction, with examples of
B2 D

2
specialized input devices.
Input devices like keyboards and mice allow users to interact with computers, while specialized
Q IT

AK
devices such as scanners and graphic tablets serve specific purposes.

3 Discuss on various types of output devices and their applications in different settings.
-D

Output devices like printers and projectors provide visual or physical representations of
AK
computer-generated data.
C

Discuss methods for connecting peripherals to a computer, including cable connections and
4
wireless technologies like Bluetooth and Wi-Fi.
Connecting peripherals to a computer involves a variety of methods, including both cable

AK connections and wireless technologies. The choice of connection method depends on factors such
as the type of peripheral, convenience, data transfer speed, and reliability.
Explore the different number systems used in computers, provide examples, and explain
5
conversion rules between them.
Number systems include binary, decimal, octal, and hexadecimal, each with its own base and
AK
conversion rules.
Discuss coding systems like ASCII, BCD, and EBCDIC, and explain their applications in
6
data representation.

Question Bank Code: QB23D01-101 Page 6 of 35


Coding systems like ASCII, BCD, and EBCDIC are methods used in computing to represent and
encode characters and data for processing and storage. Each of these coding systems has its own
set of characters, encoding methods, and applications.
ASCII uses a 7-bit encoding scheme (extended ASCII uses 8 bits) to represent characters. It
includes control characters (e.g., newline, tab) and printable characters (e.g., letters, numbers,
symbols).
BCD represents decimal digits (0-9) using binary code. Each decimal digit is encoded with a 4-
bit binary number. each decimal digit is individually converted into its binary equivalent. For
example, the decimal number 725 is represented as 0111 0010 0101 in BCD.
AK
EBCDIC is an 8-bit character encoding system that includes a wide range of characters,

01 t
including uppercase and lowercase letters, numbers, symbols, and control characters.uses an 8-

-1 en
bit code to represent characters, with encoding not purely binary but more of a weighted binary
code. It reflects the punch-card heritage of early computing.

01 m
UNICODE is a comprehensive character encoding system that includes characters from nearly
all writing systems and languages, as well as symbols and emoji. Unicode assigns a unique code
u
point (numerical value) to each character in its repertoire. UTF (Unicode Transformation
3D oc
Format) encodings like UTF-8 and UTF-16 are used to represent these code points in binary
form.
B2 D
Q IT
-D
C

Question Bank Code: QB23D01-101 Page 7 of 35


MODULE - II Basics of Information Technology

Category I Fill in the Blanks

SI.No Questions Answer Key


The software that manages computer hardware and provides a user-friendly
1 Operating
interface is known as an ___________ system.
A computer's ___________ is a form of non-volatile memory used for long-
2 Hard drive
term data storage, even when the computer is powered off.
The first generation of computers used ___________ tubes for processing
3 Vacuum
and magnetic drums for storage.

01 t
Fifth-generation computers are known for their ability to understand and

-1 en
4 respond to natural language and are associated with advancements in Artificial
___________ intelligence.

5
01 m
___________ is the raw, unprocessed facts and figures, while ___________ Data,
is data that has been processed and organized to have meaning.
u
The second generation of computers replaced vacuum tubes with
Information

Transistors
3D oc
6
___________ , which made computers smaller, faster, and more reliable.
A ___________ is a software program that translates source code written in
B2 D

7 a high-level programming language into machine code or a lower-level Compiler


language.
Q IT

A ___________ operating system is designed to manage a single user's tasks


8 Single-user
on a computer.
-D

Data is typically in the form of numbers, text, or symbols, while information


9 Processed
is data that has been ___________ to provide context and value.
C

The main advantage of ITES is its ability to ___________ business processes


10 Automate
and improve efficiency.
ITES jobs often require strong ___________ skills and the ability to work
11 Communication
with technology.
___________ is a common practice in ITES, where companies delegate
12 Outsourcing
specific tasks or processes to external service providers.
___________ software is designed for specific tasks or applications and is
13 Application
used by end-users to perform various functions.
An operating system is an example of ___________ software, as it controls
14 System
the computer's fundamental operations and user interactions.

Question Bank Code: QB23D01-101 Page 8 of 35


System software includes device drivers, utilities, and the ___________ that
15 Shell
manages the user interface and input/output operations.
The fourth generation of computers saw the development of microprocessors,
16 Personal
which enabled the creation of ___________ computers.
The third generation of computers introduced the use of ___________
17 Integrated
circuits, which further improved speed and efficiency.
An ___________is a program that reads and executes code line by line,
18 Interpreter
translating it into machine code on the fly.
The process of converting source code into machine code or an intermediate
19 Compilation
code is known as ___________

01 t
-1 en
In a ___________OS, multiple programs or tasks can run concurrently,
Multitasking,
20 sharing the CPU's processing time while a ___________ OS is capable of
Multiprocessing
utilizing multiple processors or CPU cores to execute tasks in parallel.

21 01 m
Data is often considered the building block of ___________ as it is used to
u
make decisions and take actions.
The ITES industry has created employment opportunities in various
Information
3D oc
22 Economic
countries and has contributed to ___________ development.
___________ software serves as the backbone of a computer system,
B2 D

23 managing hardware resources and providing essential functions like memory System
management and task scheduling.
Q IT

A ___________ OS is intended for distributed computing environments


24 Distributed
where multiple computers work together as a single system.
-D

One of the primary functions of an operating system is to manage computer


25 Resources
____________ efficiently.
C

Off-the-shelf software, also known as ___________ software, is pre-


26 Commercial
packaged and available for purchase or download.
___________ software can offer a competitive advantage by providing
27 Custom
unique features and tailored solutions.
Microsoft Windows and macOS are examples of ___________operating
28 Desktop
systems designed for personal computers.
___________ OS allows multiple users to interact with the computer
29 Time-sharing
simultaneously, providing each user with a portion of the CPU's time.
The process of converting data into information involves organizing,
30 Analyzing
___________ , and interpreting the data.

Question Bank Code: QB23D01-101 Page 9 of 35


Category II True or False

SI.No Questions Answer Key


1 Assembly language is considered a high-level programming language False
Real-time operating systems (RTOS) are used in applications where tasks
2 True
must be completed within a specific time frame, such as embedded systems.
Windows is an open-source Unix-like operating system that is commonly
3 False
used for web servers and supercomputers.
An IP address, short for Internet Protocol address, is a unique numerical label
4 True
assigned to each device connected to a network.

01 t
A RTOS is intended for distributed computing environments where multiple
False

-1 en
5
computers work together as a single system.
ITES has played a significant role in economic globalization by enabling
6 True

7
01 m
companies to outsource tasks to different parts of the world.
System software ensures the proper functioning of a computer and serves as
u
an interface between the hardware and the user.
True
3D oc
Word processors, spreadsheets, and video editing software are examples of
8 False
system software.
B2 D

Information has the potential to reduce uncertainty and improve decision-


9 True
making by providing insights and context.
Q IT

10 ITES stands for Information Technology-Enabled Systems. False


Off-the-shelf software is designed to meet the general needs of a broad user
11 True
-D

base and is typically less flexible.


Data is often considered the building block of information, as it is used to
12 True
C

make decisions and take actions.


The kernel is a key component of the operating system that acts as an
13 True
intermediary between user programs and hardware.
Custom software development allows for precise control over functionality,
14 False
but it cannot be more expensive and time-consuming.
Network OS focuses on managing and optimizing network resources,
15 True
facilitating communication and data sharing among devices in a network.

Category III Short Answer

SI.No Questions & Answer Keys (AK)


1 What are the characteristics of Information Technology (IT)?

AK Characteristics include speed, accuracy, automation, and scalability.

Question Bank Code: QB23D01-101 Page 10 of 35


2 Differentiate between system software and application software.
System software includes the operating system, while application software serves specific user
AK
tasks, like word processing.

3 What are the roles of IT in society?


IT plays a crucial role in automating processes, improving communication, and enhancing
AK
productivity in various sectors.

4 Differentiate compiler and interpreter.


A compiler translates the entire source code into machine code before execution, resulting in
faster execution since no translation is needed during runtime. On the other hand, an interpreter
AK
translates code line by line during execution, making it easier to detect errors but potentially

01 t
-1 en
slowing down the program.

5 Define utility software. Mention some of them.


Utility software refers to a category of software applications designed to perform specific tasks

AK
01 m
that enhance the functionality, performance, and maintenance of a computer system. These
u
programs serve various purposes, such as optimizing system resources, managing files, ensuring
security, and troubleshooting issues. Utility software typically doesn't perform tasks directly
3D oc
related to user productivity but rather assists in system management and maintenance. Antivirus
s/w, disk cleanup tools etc.
B2 D

6 Describe the role of IT in telemarketing.


customer relationship management (CRM) systems, automated dialing, and data analysis in
Q IT

AK
telemarketing
What is data digitization, and why is it important?
-D

7
Data digitization is the process of converting analog data into digital format, enabling easy
AK
storage, retrieval, and analysis.
C

8 What is BPO, and how does IT play a role in it?


Business Process Outsourcing involves outsourcing non-core business functions, often supported
AK
by IT tools and technologies.

9 What does GIS stand for, and how is it used?


Geographic Information System is used to capture, store, analyze, and display geographic data

AK for various applications. GIS allows for spatial analysis and mapping, with applications in urban
planning, environmental management, and logistics.

10 Differentiate between Single-user and Multi-user operating system.


A multi-user operating system enables simultaneous access to a single machine by numerous
AK
users. Single User Operating System enables one user at a time is working on a single task.

11 Briefly explain the concept of medical transcription.

Question Bank Code: QB23D01-101 Page 11 of 35


Medical transcription involves converting spoken medical records into written, electronic
AK
documents.

12 Write a short note on Virtual and Augmented Reality.

AK Two emerging technologies that offer new ways of interacting with the digital world.

13 Briefly explain about Blockchain.


Digital ledger technology that allows transactions to be recorded, verified, and stored in a secure

AK and decentralized way. It consists of a chain of blocks, where each block contains a collection of
transactions, and a cryptographic hash of the previous block in the chain.

14 Briefly explain about Internet of Things.

01 t
-1 en
The Internet of Things (IoT) is a technology paradigm that refers to the interconnectedness of
everyday physical objects and devices to the internet, allowing them to collect, exchange, and
AK

01 m
process data, and even take actions based on that data. IoT has rapidly evolved and is
transforming various industries and aspects of our daily lives.
u
15 Briefly explain on 5G Technology.
3D oc
5G, or the fifth generation of wireless technology, is a significant advancement in

AK telecommunications and mobile computing. It offers higher data speeds, lower latency, increased
B2 D

network capacity, and improved connectivity compared to its predecessors.

16 What is payroll management, and how is IT used in it?


Q IT

Payroll management involves calculating and disbursing employee salaries, a process


AK
streamlined by IT systems.
-D

Category IV Essay Type Questions

SI.No Questions & Answer Keys (AK)


C

Discuss the role of Information Technology (IT) in modern society, highlighting its
1
advantages and disadvantages.
IT plays a crucial role in various aspects of society, such as communication, automation, and
AK data management. Advantages include efficiency, communication and convenience, but it also
brings challenges like privacy concerns, security risks and job displacement.
Discuss the roles and functions of peripheral devices in a computer system and provide
2
examples.
Peripheral devices extend the capabilities of computers, including input devices like keyboards
AK
and output devices like monitors.
Discuss on off the shelf and custom software-programming. Also give a comparison on the
3
same.

Question Bank Code: QB23D01-101 Page 12 of 35


Off-the-shelf software refers to standardised software applications that are mass-produced,
widely available, and ready for use. give pros and cons.
AK
Custom software, on the other hand, is software that is built specifically to meet the needs of a
particular organization or individual. give pros and cons.
4 Explore the structure and functions of operating systems in computer systems.
Operating systems (OS) are fundamental software components that manage computer hardware
resources and provide an interface for users and applications to interact with the system. They
play a central role in the operation of computer systems. Operating systems are essential for
AK managing the complex hardware and software interactions in modern computer systems,
providing a stable and user-friendly environment for various applications and users. They act as

01 t
intermediaries between users/applications and hardware, ensuring efficient resource utilization

-1 en
and system stability.
Provide an overview of the different types of operating systems, such as Batch processing,
5

AK
01 m
Multiprocessing, Time-sharing, Real-Time, and Distributed OS, with examples of each.
u
These types of operating systems serve specific purposes, including batch processing of jobs,
simultaneous execution on multiple processors, and real-time event handling.
3D oc
Discuss on following:
6
a) Cloud Computing b) Edge Computing c) Quantum Computing
B2 D

Cloud computing is a technology that allows users to access and use computing resources and
services over the internet, often referred to as "the cloud." Instead of owning and managing
Q IT

physical hardware and software, users can depend cloud providers' infrastructure to run
applications, store data, and perform various computing tasks
-D

Edge computing is a distributed computing paradigm that brings data processing and
AK computation closer to the data source, typically at or near the "edge" of a network. In contrast to
C

traditional cloud computing, where data is sent to centralized data centers for processing, edge
computing processes data locally on devices, edge servers, or gateway devices.
Quantum computing is a cutting-edge and rapidly evolving field of computing that harnesses
the principles of quantum mechanics to perform certain types of computations significantly faster
than classical computers.

Question Bank Code: QB23D01-101 Page 13 of 35


MODULE - III Basics of Software
Category I Fill in the Blanks
SI.No Questions Answer Key
__________ software provides tools and functions that help manage and
1 maintain the computer system, such as antivirus programs and disk cleanup Utility
utilities.
__________is software that is permanently stored on hardware devices, such
2 Firmware
as the software embedded in devices like printers or routers.
__________ is a firmware program that initializes and manages essential
3 BIOS
hardware components when a computer is powered on.

01 t
-1 en
The Master Boot Record is responsible for loading the operating system into
4 Boot
memory and initiating the __________ process.

6
01 m
The __________ is a text-based interface in Linux that allows users to interact
with the operating system using commands.
u
The command __________ is used to create a new directory in Linux.
Terminal

mkdir
3D oc
The proprietary UNIX -based operating system developed by IBM for its server
7 AIX
systems is called __________
B2 D

8 Windows and Linux use the __________ command to create a new directory. mkdir
9 In Linux, __________ shows the network path to a remote host. traceroute
Q IT

__________ is a containerization technology that allows applications to be


10 Docker
packaged into self-contained units called containers.
-D

__________is key characteristic of a computer virus is its ability to


Replication,
11 __________ by inserting its code into other files or programs, allowing it to
C

self-replicate
spread when these files are executed.
The payload of a virus is the part of the code responsible for performing
12 __________ actions like data corruption, system damage, or unauthorized Malicious
access.
Boot sector viruses target the __________of a computer's hard drive or Master Boot
13
removable media. Record/MBR
Polymorphic viruses use code__________ techniques to change their
14 appearance with each infection, making them harder to detect by antivirus Mutation
software.
15 The infection vector refers to the method a __________ uses to spread. Virus

Question Bank Code: QB23D01-101 Page 14 of 35


__________ is a category of software that is distributed for free, but its source
16 Freeware
code is not available for modification or distribution.

The __________ is the first software program to run when a computer starts,
17 POST
responsible for checking hardware components' functionality.
__________ software allows users to try out a limited version of a program
18 Demoware
before purchasing the full version.
The __________ is a small, specialized program located at the beginning of a
19 MBR
storage device, such as a hard drive, that contains the boot loader.

20 The __________ command is used to copy files or directories in Linux. cp

01 t
To change the current working directory, you can use the __________

-1 en
21 Cd
command.
__________is a powerful concept in operating systems that enables multiple
22

23
01 m
threads of execution to run concurrently within a single process.
u Multithreading

Commands like tar, zip, rsync, dd, and cpio are used to create __________ and Backups,
3D oc
__________of files and directories. Archives
Windows and Linux use the__________command to check network
24 Ping
B2 D

connectivity.
Virtual machines are useful for running multiple OS on a __________ physical
Q IT

25 machine, or for creating a sandboxed environment for testing or development Single


purposes.
-D

When antivirus software detects a virus, it may __________ the infected file,
26 Quarantine
isolating it from the rest of the system to prevent further damage.
C

__________ is a type of malware that disguises itself as a legitimate program


27 Trojan horse
but contains a hidden malicious component.

To identify and stop harmful behavior, __________technique includes running


28 files and applications in a virtual environment that is separate from the rest of Sandboxing
the system.
__________is a way in which the viruses can be hidden in online
29 advertisements or pop-ups, and when the user clicks on the ad, the virus can Malvertising
infect their computer.

A type of malware called __________that encrypts files on a victim's computer


30 and demands payment in exchange for the decryption key. Ransomware

Question Bank Code: QB23D01-101 Page 15 of 35


Category II True or False

SI.No Questions Answer Key

The help command is used to display the manual pages for other commands,
1 False
providing detailed information about their usage.

Android OS for smartphones and Chromebooks for computers are based on


2 False
Windows OS.
Very small independent software providers (ISV) also distribute freeware to
3 False
raise their brand's visibility and reputation in the marketplace.

Commands like apt, yum, dnf, pacman, and zypper are used to manage software

01 t
4 True

-1 en
packages on the system.

POST manages hardware initialization, the BIOS checks, and the boot process,
5 False

6
01 m
ensuring the computer can start and load the operating system.
To move or rename files and directories in Linux, you can use the mv
u
command.
True
3D oc
When working in DOS mode, one can perform different tasks, such as file
7 management, system administration, and program execution, by entering True
B2 D

commands.
8 pwd, touch, chown are examples of text processing commands. False
Q IT

The commands "dir" in Windows and "ls" in Linux lists the files and folders in
9 True
the current directory.
-D

Macro viruses target the master boot record (MBR) of a computer's hard drive
10 False
or removable media.
C

A worm is a self-replicating malware that spreads independently by exploiting


11 True
vulnerabilities in a computer or network.

Heuristic Analysis is a common method used by antivirus software to identify

12 known viruses by comparing file signatures with a database of known malware False
signatures.

13 POLP stands for Principles of Lower Privilege. False

Brain virus was a ransomware virus that spread globally in 2017, and caused
14 False
widespread damage to organizations in various industries.

Commands like ping, traceroute, netstat, ifconfig, iptables, and ssh are used to
15 True
manage network connections and troubleshoot networking issues.

Question Bank Code: QB23D01-101 Page 16 of 35


Category III Short Answer

SI.No Questions & Answer Keys (AK)


Define software. Briefly explain the distinctions between system software, application
1
software.
System s/w is a fundamental software component that manages and controls the computer
hardware. It serves as an intermediary between the hardware and the application software. serves
AK
as an intermediary between the hardware and the application s/w. give features of system s/w
and its examples. Application s/w performs specific tasks.
2 Define utility software. Write on different types of utility software.

01 t
Utility s/w offers tools for system maintenance. Utility s/w types - antivirus, file management

-1 en
AK system, compression tools, disk management tools, disk cleanup tools, disk fragmenter, backup
utility.
3

AK
01 m
Differentiate compiler and interpreter.
Compilers and interpreters are both tools used in the field of computer programming to convert
u
high-level programming languages into machine code that a computer can understand and
3D oc
execute.
4 What are the main functions of an operating system?
B2 D

AK Managing hardware resources, providing a user interface, executing and managing programs.
5 Describe Free and Open Source Software (FOSS).
Q IT

FOSS is software that is freely available for use, modification, and redistribution, with the source
AK
code open to the public.
-D

6 Discuss the characteristics and purposes of demo ware, shareware, and freeware.
Demo ware provides limited features for free to encourage purchasing. Shareware is free
C

AK initially, requiring payment after a trial period. Freeware is entirely free without usage
restrictions.
7 What is firmware, and how does it differ from software? Provide examples of firmware.
Firmware is software embedded in hardware. It's permanent, unlike software which is installed
AK
on an OS. Examples: BIOS in computers, firmware in IoT devices.
8 What multithreading is and its advantages in multitasking environments.
Multithreading enables a program to run multiple threads simultaneously, enhancing system
AK
responsiveness and efficiency.
9 Give the primary functions of an operating system and how they benefit computer users.

Functions include hardware management, providing a user interface, and managing programs,
AK
enhancing user experience and system efficiency.

Question Bank Code: QB23D01-101 Page 17 of 35


10 What is firmware, and how does it differ from software? Provide examples of firmware.
Firmware is a type of software that is closely associated with hardware components in computer
systems and electronic devices. It is a set of instructions and code that is permanently or semi-
AK permanently stored in a hardware component, typically in non-volatile memory, and is
responsible for controlling the operation of that specific piece of hardware. It's permanent, unlike
software which is installed on an OS. Examples: BIOS in computers, firmware in IoT devices.
11 Define Virus. How does a virus spread in a computer?
A computer virus is a type of malicious software or malware that is designed to replicate itself
and infect a computer or other computing devices. Computer viruses are typically designed to
AK perform harmful actions on the infected system, such as corrupting data, stealing information, or

01 t
causing the system to malfunction. Viruses can spread through infected files, email attachments,

-1 en
and downloads from the internet.
12 How are viruses named? Give examples.

AK

13
01 m
Viruses are often named based on their characteristics, behavior, or the file they infect. include
u
ILOVEYOU, Mydoom, and Code Red.
What does BIOS stand for and discuss?
3D oc
BIOS, which stands for Basic Input/Output System, is a fundamental software component in a
computer system. It is stored on a non-volatile memory chip on the computer's motherboard, and
B2 D

AK
its primary purpose is to perform essential functions during the boot-up process and to initialize
and manage hardware components. give key aspects of BIOS.
Q IT

14 What is the purpose of POST in the booting process?


POST, which stands for Power-On Self-Test, is an essential part of the booting process of a
-D

AK computer. Its primary purpose is to perform a series of diagnostic tests on the computer's
hardware components immediately after the computer is powered on or restarted.
C

15 Discuss on different operating systems.


Operating systems are software that manage computer hardware and provide an environment for
running applications. There are various operating systems, each designed for specific purposes
AK
and types of hardware. Give a single line note on : Windows OS, Linux, Unix, Apple OS, macOS,
Solaris

Category IV Essay Type Questions


SI.No Questions & Answer Keys (AK)
Describe the importance of User Account Management in Windows and its associated
1
security implications.
User Account Management (UAM) in Windows is a critical aspect of system administration, and
AK
it plays a significant role in both system usability and security. It is fundamental for maintaining

Question Bank Code: QB23D01-101 Page 18 of 35


the security and integrity of a Windows system. It enables administrators to control access,
enforce security policies, and track user activities. Properly implemented UAM reduces security
risks and safeguards sensitive data in both personal and enterprise computing environments.
Give importance of User Account Management (UAM) and is security implications of User
Account Management in short
Discuss the role of keyboard shortcuts in Windows, providing examples of common
2
shortcuts and their benefits.
Keyboard shortcuts in Windows play a significant role in enhancing productivity, efficiency, and
ease of use for both novice and experienced users. These shortcuts allow users to perform various
AK tasks without relying solely on a mouse or touchpad. These shortcuts improve efficiency,

01 t
accessibility, productivity, system control, reduce strain, ease of use. Examples of Common

-1 en
Keyboard Shortcuts in Windows: Ctrl + C (Copy) and Ctrl + V (Paste) etc.
Describe the booting process of a computer, including the roles of BIOS, POST and the
3

AK
01 m
Master Boot Record (MBR).
u
BIOS initiates hardware checks via POST, which then loads the MBR to start the boot process.
Discuss the different types of operating systems, such as Batch Processing, Single User,
3D oc
4
Multi User, Multiprogramming and Multi-Tasking.
Batch Processing executes tasks sequentially, Single User OS supports one user, Multi User OS
B2 D

AK supports multiple users, Multiprogramming handles multiple programs, and Multi-Tasking


allows simultaneous execution of tasks.
Q IT

5 Discuss on Different Linux Commands.


System backup and archives commands
-D

Text processing commands


Package management commands
C

AK
networking commands,
System monitoring and management commands
File and directory management Commands
Provide an overview of the early versions of Windows operating systems, including their
6
key features and limitations.
Older Windows versions like Windows 3.1, 95, and 98 introduced graphical interfaces but
had limitations in stability and security.
AK Windows 3.1 (1992):
Key Features: Enhanced GUI with Program Manager and File Manager. Improved
multitasking support. Introduction of TrueType fonts.

Question Bank Code: QB23D01-101 Page 19 of 35


Limitations: Still relied on MS-DOS for certain functions. Limited networking capabilities.
Lack of native 32-bit support.
Windows 95 (1995):
Key Features: Significant departure from MS-DOS, with a 32-bit architecture. Start Menu for
easy application access. Plug and Play hardware support.
Limitations: Relatively high system requirements for its time. Limited stability, prone to
crashes. Lack of support for modern file systems.
Windows 98 (1998):
Key Features: Improved GUI with Active Desktop and Internet Explorer integration. Support
for USB devices and improved hardware compatibility.FAT32 file system support.

01 t
Limitations: Still based on the Windows 9x kernel, prone to instability. Limited security

-1 en
features. Lacked native support for multi-user environments

01 mu
3D oc
B2 D
Q IT
-D
C

Question Bank Code: QB23D01-101 Page 20 of 35


MODULE - IV Basics of Information System

Category I Fill in the Blanks

SI.No Questions Answer Key


A ___________ is a set of components that work together to achieve a
1 System
common goal.
___________ is responsible for making decisions and ensuring the system
2 Management
meets organizational goals.
CRM systems are designed to improve ___________ by managing customer
Customer
3
interactions and data. relationships

01 t
SCM systems optimize the flow of ___________ and ___________ within a Goods ,

-1 en
4
business and between suppliers and customers Information
KMS support the creation, storage, and sharing of ___________within an
Knowledge
5

6
01 m
organization.
___________ includes the DSS elements as well as groupware to help groups Group
u
make effective decisions.
Support
System/GSS
3D oc
MIS uses various types of ___________ to present data and information in a
7 Reports
meaningful way.
B2 D

DSS and business intelligence tools are often integrated into MIS to facilitate
8 Strategic
___________ decision-making.
Q IT

In MIS, the process of transforming raw data into useful information is called Data
9
___________ processing
-D

___________management requires detailed and specific information for


10 Middle
decision-making.
C

CRM is primarily used to manage customer relationships, not


11 Supplier
___________relationships.
KWS may incorporate ___________ tools to assist in data analysis and
12 Data mining
modeling.
KWS is particularly valuable in industries such as ___________and Research,
13
___________, where knowledge and expertise are essential. Development
An EIS's primary objective is to enable ___________ learning about an

14 organisation, its work processes, and interactions with the outside world or the Managerial
external environment.
___________ are a knowledge-based IS, constructed using ideas from Experts
15
artificial intelligence research. System

Question Bank Code: QB23D01-101 Page 21 of 35


MIS helps managers at different levels of an ___________ with strategic,
16 Organization
tactical, and operational decisions.
Decision support systems are a type of MIS that assists in ___________
17 Complex
decision-making processes.
Security measures are crucial to protect data from ___________ access and
18 Unauthorized
ensure confidentiality.
Transaction Processing Systems (TPS) are responsible for recording and
19 Transactional
processing ___________data.
Executive Information Systems (EIS) provide top-level executives with
20 Summarized
___________ insights for strategic decision-making.

01 t
-1 en
MIS helps organizations improve ___________ and operational efficiency
21 Productivity
through better information management.
MIS helps operational management in making ___________ decisions to
22

23
01 m
ensure daily tasks are carried out efficiently.
u
___________ is a key characteristic of MIS, as it ensures that information is
readily available when needed.
Routine

Accessibility
3D oc
A Knowledge Worker System (KWS) is an information system designed to
24 Knowledge
support the activities of ___________ workers.
B2 D

KWS assists knowledge workers in tasks such as ___________,problem-


25 Analysis
solving, and decision-making.
Q IT

The two processes used to complete the ___________ are batch processing
26 Transaction
and online transaction processing.
-D

___________ systems ensure that all employees adhere to company standards


27 HR
and let controlling organisational information to circulate within the firm.
C

___________is a business system that combines several systems and


28 EAI
applications.
The___________ system combines software for inventory management,
29 ERP
finance, purchasing, and human resources.
Information systems are utilised to___________in company operations,
30 Assist
analysis, and decision-making.

Category II True or False

SI.No Questions Answer Key


Information system combines hardware, software, data, procedures, and
1 True
people to support organizational activities.

2 MIS does not assist in controlling organizational processes. False

Question Bank Code: QB23D01-101 Page 22 of 35


An MIS is a computer-based system that provides managers with timely
3 True
information to help make informed decisions.

4 Data retrieval involves distributing information to those who need it. False
Enterprise Resource Planning (ERP) systems are integrated software
5 True
applications that help organizations manage their core business processes.
A Decision Support System (DSS) assists in customer relationships by
6 False
providing data analysis and information.
An organised system of people, processes, software, databases, and devices
7 False
used to carry out and record commercial transactions is known as a TPS.
Enterprise Resource Planning (ERP) systems are a type of Enterprise System

01 t
-1 en
8 that often includes modules for various functional areas like finance, HR, and True
manufacturing.
The three primary levels of management that MIS serves are top management,
9

10
01 m
middle management, and operational management.
u
One of the key characteristics of MIS is customization to meet specific
organizational needs.
True

True
3D oc
11 Timeliness is not a crucial characteristic of MIS. False
The primary function of MIS is to transform irrelevant data into meaningful
B2 D

12 False
information.
The technological component of MIS includes hardware, software, and
Q IT

13 True
networks.
Enterprise Systems are typically specialized systems that focus on specific
-D

14 False
departmental needs.
Business Process Management (BPM) systems are a type of Enterprise System
C

15 False
that does not involve the automation of workflows.

Category III Short Answer

SI.No Questions & Answer Keys (AK)


1 Differentiate between data and information.
Data is raw facts and figures, while information is processed data that is meaningful and relevant.
AK
For example, "12062022" is data, but "12th June 2022" is information.

2 Define System.
A system is made up of a number of connected parts that cooperate to accomplish a single

AK objective. A computer system is made up of a variety of hardware and software parts that
collaborate to carry out particular tasks.

Question Bank Code: QB23D01-101 Page 23 of 35


Define the concept of 'Data' and 'Information' within the context of Information Systems.
3
Provide examples to illustrate the difference.
Data refers to raw, unprocessed facts, figures, or symbols. It is the foundation of Information
Systems and represents discrete, unorganized elements. For instance, a list of customer names
and phone numbers is data. Information is the result of processing and organizing data to provide
context and meaning. It is data that has been transformed into a meaningful format, making it
AK
useful for decision-making. For example, a report that summarizes customer purchase history
and preferences is information. Data becomes information when it is processed and structured to
serve a purpose, such as helping organizations make informed decisions or understand patterns
and trends.

01 t
Briefly explain the dimensions of information system.

-1 en
4
Information Systems encompass various dimensions, which include Organization,
AK
Management, and Information Technology.

AK
01 m
Mention in short, the functions of IS.
u
Input, storage, processing, output, and feedback are the five distinct functions that make up
information systems. A system made up of both people and computers that processes or interprets
3D oc
How does the 'Management' element of an Information System impact decision-making
6
within an organization?
B2 D

The 'Management' element of an Information System plays a vital role in decision-making at


various organizational levels. It provides relevant data and information to different levels of
Q IT

management:
Top-level management relies on Information Systems for strategic decision-making, such as
-D

long-term planning and market analysis.


Middle-level management uses Information Systems to monitor daily operations, make tactical
C

AK
decisions, and analyze performance.
Bottom-level management benefits from automation and data processing capabilities to
streamline operations and enhance efficiency.
The 'Management' element facilitates decision-making by providing timely, accurate information
to meet the specific needs of each level of management, thus contributing to the organization's
success.

7 How do Business Information Systems support top-level management in organizations?


BIS provide crucial support to top-level management in organizations by offering strategic
information. Top-level management uses this information for long-term planning, setting
AK
organizational goals, and making high-level strategic decisions. BIS assist top-level managers in
understanding market trends, assessing financial performance, and formulating strategies for the

Question Bank Code: QB23D01-101 Page 24 of 35


future. They help executives gather and analyze data from various sources to make informed
decisions that shape the organization's overall direction.

8 What is the role of BIS for middle-level management in organizations?


BIS play a pivotal role in supporting middle-level management. These systems assist middle-
level managers in monitoring and controlling daily operations. They provide operational data,
performance metrics, and reports that are essential for decision-making at this level. Middle-

AK level managers rely on BIS to assess the efficiency of processes, allocate resources, and make
tactical decisions to ensure that the organization's day-to-day activities run smoothly. These
systems empower middle-level managers with real-time insights into various aspects of the
business, helping them take actions to optimize operations.

01 t
How do BIS benefit bottom-level management within organizations?

-1 en
9
BIS are beneficial for bottom-level management within organizations by automating routine and
repetitive tasks. These systems streamline processes such as data entry, inventory management,

AK
01 m
and order processing, allowing bottom-level managers to focus on operational tasks that require
u
human intervention. Business Information Systems enhance efficiency, reduce manual
workloads, and ensure that processes are executed consistently. They also enable bottom-level
3D oc
managers to access up-to-date data, track performance, and respond to day-to-day operational
challenges effectively, ultimately contributing to the smooth functioning of the organization at
B2 D

the operational level.

10 What is an EIS, and how does it differ from other BIS?


Q IT

An EIS is a specialized system for top-level executives in an organization. It offers strategic


information and allows executives to access critical data quickly. EIS is distinguished by its focus
-D

AK on providing high-level insights and is typically used for long-term planning and decision-
making. Unlike other systems, EIS provides a consolidated view of an organization's
C

performance, market trends, and external factors that affect strategic direction.
What are the typical functions of a Management Information System (MIS) within an
11
organization?
The functions of an MIS typically include data collection, data processing, data storage, data

AK retrieval, and data dissemination. It also provides decision support tools, reporting capabilities,
and facilitates communication within the organization.

12 Define Knowledge worker system.


A KWS is a type of specialized information system designed to support individuals or

AK professionals, known as knowledge workers, in their tasks that involve creating, manipulating,
and disseminating knowledge and information within an organization. Knowledge workers are

Question Bank Code: QB23D01-101 Page 25 of 35


typically involved in activities that require problem-solving, critical thinking, creativity, and the
application of specialized expertise.

13 Name some essential resources required for the operation of a MIS.


Resources for an MIS include:
Skilled personnel to operate and manage the system. Adequate hardware and software
AK
infrastructure. Reliable data sources. Secure data storage facilities. Appropriate networking and
communication resources.
What is the main objective of Customer Relationship Management (CRM) in an
14
organization?
The main objective of CRM is to enhance an organization's relationship with its customers. CRM

01 t
-1 en
systems are designed to manage customer data, interactions, and engagement, enabling
AK
businesses to provide better customer service, improve sales, and build long-term customer
loyalty.

15 01 m
Explain the role of Supply Chain Management (SCM) in an organization and provide an
u
example of its application.
SCM focuses on optimizing the end-to-end processes involved in the production and delivery of
3D oc
products and services. It ensures the efficient movement of materials, information, and finances

AK throughout the supply chain. An example of SCM application is using software like Oracle SCM
B2 D

Cloud to streamline inventory management, demand forecasting, and logistics, reducing costs
and improving order fulfillment.
Q IT

Define a Decision Support System (DSS) and provide an example where a DSS can be
16
applied.
-D

DSS is a system designed to help users make decisions by providing data analysis and modeling
tools. For instance, in the financial industry, a DSS can be applied to assist investment analysts
C

AK
in evaluating potential investment opportunities. It can analyze historical market data, assess risk
factors, and generate recommendations for portfolio diversification.

Category IV Essay Type Questions


SI.No Questions & Answer Keys (AK)
Describe the roles of Business Information Systems in supporting top-level, middle-level,
1
and bottom-level management in an organization.
Business Information Systems serve different roles at various management levels. Top-level
management relies on these systems for strategic decision-making, such as market analysis and

AK long-term planning. Middle-level management uses them for daily operations and monitoring
performance. Bottom-level management benefits from these systems by automating routine
tasks, like data entry and inventory tracking. For example, an Executive Information System

Question Bank Code: QB23D01-101 Page 26 of 35


(EIS) provides top-level executives with real-time financial data for strategic decisions, while a
Transaction Processing System (TPS) assists bottom-level management by processing daily sales
transactions.
Discuss the objectives of a Management Information System (MIS) and how it contributes
2
to an organization's efficiency. Provide examples of how MIS achieves these objectives.
The objectives of an MIS include providing timely, accurate, and relevant information to support
decision-making, improve efficiency, and enhance competitiveness. MIS achieves these

AK objectives by collecting, processing, and storing data and generating reports. For instance, an
MIS can help a retail company monitor inventory levels and reorder products when they are low,
ensuring efficient stock management.

01 t
Explain in detail the components that make up the IS. Also describe the key elements of

-1 en
3
IS.
It specifies how information moves through the system. An information system's goal is to collect

AK
01 m
data, process that data, and then present that information to the user in a way that is appropriate
u
for them. Computer H/w, Computer S/w, databses, network ans human resources make up the
components of IS. The essential elements of the information system are Functional
3D oc
Characteristics, Usable characteristics, Transactional characteristics, Operational characteristics,
Revision characteristics and Scalable characteristics.
B2 D

Explain in detail the role of Artificial Intelligence and Expert Systems in Business
4
Information Systems.
Q IT

AI and Expert Systems are advanced components of Business Information Systems. AI employs
machine learning and data analysis to provide insights and automate tasks. Expert Systems, on
-D

the other hand, mimic human expertise in specific domains. They are used for tasks like medical
AK
diagnosis or troubleshooting technical issues. These technologies enhance decision-making,
C

automate processes, and support complex problem-solving within organizations, ultimately


improving efficiency and accuracy.
Elaborate with a diagram the different levels of MIS and the functions that each level
5
does.
A MIS typically consists of different levels that cater to the information needs of various levels

AK of management within an organization. These levels include the Operational level, the Tactical
level, and the Strategic level.

Question Bank Code: QB23D01-101 Page 27 of 35


What is MIS? Compare and contrast the advantages and disadvantages of MIS. What are
6
the main types of MIS?
MIS is a crucial component of modern organizations, encompassing technology, processes, and

01 t
-1 en
people. It's designed to collect, process, store, and disseminate data and information to facilitate
decision-making and efficient operations. MIS systems offer several advantages and come with
certain disadvantages. Additionally, there are various types of MIS systems tailored to specific

AK
01 m
organizational needs.
u
MIS plays a vital role in modern organizations by providing the infrastructure for efficient
decision-making and operations. The advantages of MIS, including data integration and
3D oc
efficiency, are balanced by potential disadvantages such as cost and complexity. There are
various types of MIS systems, each tailored to specific organizational needs and management
B2 D

levels. Successful MIS implementation depends on careful planning, skilled personnel, and
ongoing maintenance.
Q IT

Define the following:


a) Human Resource Management System (HRMS)
-D

7
b) Business Intelligence (BI)
c) Enterprise Application Integration (EAI)
C

A HRMS is a comprehensive software solution designed to streamline and automate various


aspects of human resource management within an organization
BI is a technology-driven process that involves the collection, analysis, and presentation of
relevant business information and data to support decision-making in an organization. BI tools
AK
and systems allow users to access, transform, and visualize data to derive insights, identify
trends, and make informed decisions.
EAI is a set of technologies, processes, and practices that enable different software applications
and systems to communicate and work together seamlessly within an organization.

Question Bank Code: QB23D01-101 Page 28 of 35


MODULE - V Basics of Databases

Category I Fill in the Blanks


SI.No Questions Answer Key
A database is a structured collection of _____________ organized for
1 Data
efficient retrieval and manipulation.

2 In a database, data is typically organized into _____________ and tables. Records


Columns,
3 A table in a database consists of _____________ and _____________
Rows
A database _____________ is a set of rules that ensures data consistency
4 Schema

01 t
and integrity in a database.

-1 en
Data stored in a database can be retrieved, updated, deleted, and inserted
5 CRUD
using SQL _____________ statements.

6
01 m
Normalization is the process of organizing data in a database to reduce
_____________ and improve data integrity.
u
The process of combining data from multiple tables in a database is called
Redundancy

Joining
7
3D oc
_____________
A database system that stores data in tables and supports SQL queries is
8 Relational
B2 D

called a _____________ database system.


Database _____________ are responsible for designing, maintaining, and
9 Administrators
Q IT

securing databases.
A _____________ key is used to establish relationships between tables in a
10 Foreign
-D

relational database.
A _____________database is suitable for unstructured or semi-structured
11 NoSQL
C

data.

Forms can be used for data __________ and for ____________information. Entry,
12
Displaying
13 _____________ is used for defining and managing database schema. DDL

14 _____________ computing is the future of data processing. Cloud


Atomicity,
ACID stands for _____________ Consistency,
15 Isolation,
Durability
Data in a database can be processed and managed to provide meaningful
16 Information
____________
Data management systems focus on ____________ data, ensuring its
17 Managing
storage, retrieval, and organization.

Question Bank Code: QB23D01-101 Page 29 of 35


The unique identifier for each row in a database table is called a
18 Primary
____________ key.
Data processing involves the manipulation and transformation of
19 Data
____________ to produce desired outcomes.
____________ are individuals who interact with a database to retrieve,
20 Users
update, and manipulate data.
____________ is a database design technique used to minimize data
21 Normalization
redundancy.

22 The process of designing a database schema is called data ____________ Modeling


When importing an Excel file, you can specify the ____________ or named

01 t
23 Worksheet

-1 en
range you want to import.
____________ is a widely used relational database often associated with
24 Oracle
enterprise-level applications.

25 01 m
Data ____________ is the process of transforming unprocessed, machine-
u
readable data into relevant information.
Processing

The ____________ schema defines the relationships between tables in a


3D oc
26 Logical
database.
In a ____________database model, data is organized in a tree-like structure
B2 D

27 Hierarchical
with parent-child relationships.

28 The logical schema and ________ schema are different levels of abstraction. Conceptual
Q IT

29 ___________ users of the database system need not be aware of its existence Native
In a DBMS, DBAs have the authority to____________ or ____________
-D

30 Grant, Revoke
access permissions to users and roles.

Category II True or False


C

SI.No Questions Answer Key


1 Database architecture refers to the design and structure of a database system. True
A NoSQL database system is designed to handle relational data and is often
2 False
used for unstructured or semi-structured data.
The process of adding, updating, or deleting data in a database is known as
3 True
data manipulation.
The internal schema represents the overall structure of a database, including
4 False
all tables, relationships, and constraints.
A foreign key establishes relationships between tables in a relational
5 True
database.

Question Bank Code: QB23D01-101 Page 30 of 35


Data management systems involves manipulating and analyzing data to

6 extract insights, while data processing involve storing and managing data in False
a structured and secure way.
One advantage of a DBMS is improved data consistency through centralized
7 True
data management.

8 To import an Excel file into MS Access, go to the Internal Data tab. False
NoSQL databases are not suitable for scenarios with high data volume and
9 False
complex data structures.
Database architects must consider factors like security, data consistency, and
10 True
disaster recovery when designing a database architecture.

01 t
-1 en
NoSQL databases are suitable for scenarios with high data volume and
11 True
complex data structures.
ACID properties which maintain data in a good state in case of failure. True
12
13

14
01 m
The physical schema of a database describes how data is logically organized. False
u
Data independence means that changes to one level of the schema do not
True
affect the other levels.
3D oc
End users can directly access the physical storage of the database without
15 False
using SQL.
B2 D

Category III Short Answer


Q IT

SI.No Questions & Answer Keys (AK)


1 How does a DBMS differ from a file-based data management system?
-D

A DBMS offers data independence, data integrity, and support for complex queries, while a
AK
file-based system lacks these features.
C

2 How do data management systems differ from data processing systems?


DBMS focus on the storage, organization, and retrieval of data, while data processing systems
AK
emphasize data transformation and analysis.

3 Briefly explain data independence and its importance in a database.


Data independence allows changes to the data structure without affecting the application
AK
programs, enhancing system flexibility and maintenance.

4 Discuss in short on Database components.


The database system is made up of numerous components. Each component is highly important
to the environment of the database management system. A database environment is a system of
AK
interconnected elements that includes people, software, hardware, technology, database handling
techniques, and data as well as controls the management and u se of a group of data.

Question Bank Code: QB23D01-101 Page 31 of 35


5 Differentiate Object oriented databases and Distributed databases.
In an object-oriented database, just like in object-oriented programming, data is represented by
objects and classes (OOPS concept). Programming classes in OOPS have member functions that
display the characteristics of the database class.
In distributed type, the information is dispersed among several different places In this type, the
AK
information is dispersed among several different places to ensure high accessibility. Examples
include Amazon SimpleDB, Apache Ignite, Apache to ensure high accessibility. Examples
include Amazon SimpleDB, Apache Ignite, Apache Cassandra, and Apache HBase.Cassandra,
and Apache HBase.

6 Write a short note on cloud-based database.

01 t
Cloud databases enable you to manage and access both structured and unstructured data over

-1 en
AK
the internet or a cloud platform.
Distinguish between Data Processing Systems and Data Management Systems. Discuss
7
01 m
the advantages of using a DBMS over traditional data processing.
u
Data Processing Systems focus on data transformation, while Data Management Systems
(DBMS) emphasize data storage and retrieval. DBMS offers data integrity, security, and easier
AK
3D oc
data access.

8 In short, explain DBMS Schema or Level.


B2 D

In a DBMS, a schema or level refers to the organization and structure of the database. It defines
how data is stored, accessed, and the relationships between data elements. The schema or level
Q IT

in a DBMS is a hierarchical framework that consists of the physical schema (dealing with storage
AK
details), the logical schema (defining the database's overall structure), and the view schema
-D

(providing tailored views of the data for users and applications). Each level serves a distinct
purpose in managing and interacting with a database.
C

9 Discuss in short on ER model with example.


The Entity-Relationship (ER) model is a conceptual data model used to represent the structure
of a database. It focuses on defining entities, their attributes, and the relationships between them.
Key Components of the ER Model:
Entity: An entity is an object or concept with distinct properties (attributes). Entities are typically

AK represented as rectangles in ER diagrams. For example, in a library database, "Book" and


"Author" are entities.
Attribute: Attributes are properties or characteristics that describe an entity. They are typically
represented as ovals connected to the corresponding entity in ER diagrams. For the "Author"
entity, attributes might include "Name" and "Birthdate."

Question Bank Code: QB23D01-101 Page 32 of 35


Relationship: A relationship represents an association between two or more entities. It describes
how entities are connected. Relationships are typically represented as diamond shapes in ER
diagrams. In a library database, there might be a relationship between "Book" and "Author" to
show that authors write books.

10 Define the following: Native users, Sophisticated Users, Specialized Users.


Native users, also known as end users or casual users, are individuals who interact with a
database to access, retrieve, and manipulate data as part of their daily tasks.
Sophisticated users are individuals who have a deeper understanding of a database and its
functionality. They may have intermediate to advanced knowledge of SQL (Structured Query
AK
Language) and can create complex queries, reports, or data analyses.

01 t
Specialized users are experts in database systems and are responsible for tasks related to the

-1 en
database's design, administration, and maintenance. They have in-depth knowledge of database
architecture, optimization, security, and performance tuning.

11
01 m
What is the benefit of importing Excel files into SQL?
u
Importing Excel files into SQL databases offers a range of benefits, including improved data
management, data integrity, security, scalability, and the ability to perform advanced data
3D oc
AK
analysis and reporting. It also provides a foundation for a more structured and efficient data
management process within an organization.
B2 D

12 In short differentiate between One-one, one-many, many-many relational models.


The key difference between these relational model types lies in the number of records associated
Q IT

between tables. One-to-one has a one-to-one correspondence, one-to-many allows one record to
AK
be related to multiple records in another table, and many-to-many permits multiple records to be
-D

related to multiple records in another table using an intermediary table.

13 Briefly explain on Data Control Language with syntax.


C

DCL is a subset of SQL that deals with the control and management of access to data in a
RDBMS. DCL provides a set of commands and statements that are used to define and regulate
the permissions and privileges granted to users and roles in a database. Its primary purpose is to
ensure data security, integrity, and compliance with privacy and regulatory requirements. There
are two main DCL commands: GRANT and REVOKE

AK The GRANT command is used to give specific permissions or privileges to users or roles in a
database.
Syntax: GRANT <permissions> ON <object> TO <user or role>;
The REVOKE command is used to take back or revoke previously granted permissions or
privileges from users or roles in a database.
Syntax: REVOKE <permissions> ON <object> FROM <user>;

Question Bank Code: QB23D01-101 Page 33 of 35


14 Define Data Query Language.
DQL is used for retrieving and querying data from a RDBMS. DQL provides commands and
statements that allow users to specify what data they want to retrieve from one or more database
tables. The primary purpose of DQL is to query and filter data based on specific criteria and
AK
return a result set that matches the query conditions. SQL provides a variety of commands and
functions for retrieving data from a database, including SELECT, FROM, WHERE, GROUP
BY, and ORDER BY.

15 Differentiate between 1NF, 2NF and 3NF in short


1NF deals with atomicity and eliminating repeating groups, 2NF focuses on eliminating partial

AK dependencies, and 3NF aims to remove transitive dependencies, leading to a more organized and

01 t
efficient database structure.

-1 en
Category IV Essay Type Questions

1
01 m
SI.No Questions & Answer Keys (AK)
Elaborate on Database architecture with pictorial representation.
u
Database architecture focuses on the design, development, implementation, and management of
computer programs that store and organize information for corporations, agencies, and
3D oc
institutions. In order to address user needs, a database architect creates and implements software.
In a one-tier DBMS architecture, the entire DBMS software, including the user interface,
application logic, data management, and storage components, all run on a single machine or
B2 D

platform. This architecture is sometimes referred to as a "standalone" or "single-user"


architecture because it is designed for a single user or a single application running on a single
AK
Q IT

machine.
Two-tier DBMS architecture, also known as client-server architecture, introduces a separation
between the user interface and the data management components. It consists of two main tiers:
-D

the client tier and the server tier.


Three-tier DBMS architecture extends the client-server model by adding an intermediate
application server tier between the client and the database server. Each tier has a specific role in
C

this architecture.
2 Describe types of Database Systems. Explain the strengths and weaknesses of each.
DBMS can be categorized into several types based on their data models and architecture. The
choice of database system depends on the specific needs of an application. Hierarchical and
network databases are more suitable for data with well-defined hierarchical and networked

AK structures, but they lack the flexibility and query capabilities of relational databases. Relational
databases are versatile and provide structured data storage, making them suitable for a wide range
of applications. However, the optimal choice will depend on the nature of the data and the
requirements of the application.
Explain the roles and responsibilities of Database Administrators (DBAs) and Database
3
Users in the context of a DBMS. Why are these roles important?

Question Bank Code: QB23D01-101 Page 34 of 35


DBAs are responsible for the overall management and maintenance of the database system,
ensuring its integrity, performance, and security. Database users, on the other hand, interact with

AK the database to retrieve and manipulate data to support their specific tasks and responsibilities.
These roles are interdependent and critical for the successful operation of a database management
system.

4 Compare and contrast on MySQL, NoSQL, and Oracle databases.


MySQL, NoSQL, and Oracle are three popular database management systems, each with its own
characteristics and best-use scenarios. MySQL is suitable for traditional relational data, NoSQL

AK databases are ideal for flexible and scalable data storage, and Oracle Database excels in
enterprise-level applications. It's important to consider factors like data model, scalability, query

01 t
language, compliance, use cases, licensing, and community support when making a selection.

-1 en
Explain the concept of Forms in MS Access. Describe the steps involved in creating a
5
form and editing data using forms.

01 m
Forms are user-friendly interfaces. Creating a form involves selecting fields and data sources.
u
Users can edit data using forms for improved data entry and validation.
Forms in MS Access make it much more convenient for users to interact with data, especially
AK
3D oc
for data entry and editing. They offer a user-friendly, organized, and controlled way to view and
manipulate information stored in a database.
B2 D

Explain Relational Model and its significance in database design. Explain the roles of
6
Data Definition Language (DDL) and Data Manipulation Language (DML).
Q IT

The Relational Model is a fundamental framework for organizing and managing data in a
relational database. It was introduced by Edgar F. Codd in the 1970s and has since become the
-D

most widely used model for data storage and retrieval in modern database systems. The key
concept of the Relational Model is that data is organized into tables or relations, where each table
C

contains rows (tuples) and columns (attributes).In this model, data is represented in a structured
and tabular format, which is often referred to as a relational database. The tables contain related
information, and the relationships between tables are defined by common attributes. The

AK Relational Model emphasizes the principles of data integrity, consistency, and simplicity. It
offers a powerful and flexible way to store, query, and manipulate data.
Significance of the Relational Model in Database Design: Data Organization, Data Integrity,
Flexibility, Query Language, Normalization.
DDL and DML play distinct but complementary roles: DDL defines the structure and constraints
of the database, while DML allows users to interact with and manipulate the data stored within
that structure.

Question Bank Code: QB23D01-101 Page 35 of 35

You might also like