Introduction To Information System
Introduction To Information System
QUESTION BANK
Course DCA
01 t
-1 en
Code QB23D01-101
01 m
MODULE - I
u
Computer Fundamentals
3D oc
Category I Fill in the Blanks
B2 D
3
The process of a computer finding and loading the operating system is called
4 Bootstrapping
__________
C
9 The memory unit that stores the computer's firmware is known as the ______ BIOS
10 The place value of a digit in a number determines its ________and ________ Position,
Significance
A graphics card (GPU) is responsible for rendering ________ and _______ Images,
11
on the computer's display. Videos
01 t
-1 en
The EBCDIC coding system was commonly used on early IBM computers
19 8
and is based on __________bit encoding.
20
21
01 m
A __________ is equivalent to 1024 gigabytes.
The term __________ is often used interchangeably with the term character
u Terabyte
22 Analog
signals for transmission over phone lines.
A Bluetooth __________ is a device that acts as a bridge between Bluetooth
Gateway
Q IT
23
and non-Bluetooth devices, allowing them to communicate.
__________ cards are used to capture external audio or video signals, such as
-D
24 Capture
from a camera or gaming console.
A __________ port is a type of communication port used to transmit data one
25 Serial
C
bit at a time.
Solid-state drives are a type of storage unit that uses __________ memory for
26 Flash
data storage.
A computer's __________ memory is used to store frequently accessed data
27 Cache
for faster retrieval.
An __________ terminal is a type of computer terminal that has its own
28 Intelligent
processing capability.
A __________ terminal is a type of computer terminal that lacks processing
29 Dumb
capabilities.
01 t
Bluetooth is a wired communication technology that allows devices to
-1 en
4 False
communicate with each other over short distances.
Universal Serial Bus ports are commonly used for connecting external
5
6
01 m
devices like keyboards, mice, and flash drives to computers.
An operating system is not necessary for a computer to function; it's optional
u
software that can be installed if needed.
True
False
3D oc
RAM is a type of computer memory that permanently stores data even when
7 False
the computer is powered off.
B2 D
Supercomputers are typically used for everyday tasks such as web browsing
8 False
and word processing.
Q IT
Flash memory is commonly used in USB drives, SSDs, and memory cards
10 True
due to its non-volatile nature.
C
AK used for wireless headphones, speakers, and file transfers. An example is connecting a
smartphone to wireless headphones.
01 t
3 What is the ASCII coding system, and how is it used in computers?
-1 en
ASCII is a character encoding standard used for representing text and control characters in
AK
computers. Seven bits are used to represent each character in the ASCII code.
AK
01 m
Briefly explain the difference between volatile and non-volatile memory.
Volatile memory loses its data when the power is turned off, while non-volatile memory retains
u
data even when the power is off.
3D oc
5 Describe the purpose of a scanner as an input device.
A scanner is an input device designed to convert physical documents, images, or objects into
B2 D
AK digital format for storage, manipulation, and further processing on a computer or digital system.
Its primary purpose is to capture analog information and transform it into digital data.
Q IT
types, such as personal computers (PCs), workstations, and servers, in several key ways.
supercomputers stand out from other computer types due to their extraordinary processing
C
AK
power, specialized hardware and architecture, scalability, high cost, and their exclusive use for
scientific and research applications that demand exceptional computational capabilities. They
are essential tools for tackling some of the most challenging problems in science and engineering.
AK and versatile types of ports found on computers and peripheral devices. Primary purposes of a
USB port in a computer Data Transfer, Peripheral Connectivity, Charging device, etc.
01 t
11 Briefly explain the purpose of a parity bit in data transmission.
-1 en
A parity bit is used in data transmission as a simple error-checking mechanism to detect errors
in transmitted data. Its primary purpose is to help ensure the integrity of the transmitted data by
AK 01 m
adding an extra bit to each data byte or word.
u Even Parity
Odd Parity
3D oc
Error detection
Error Indication
B2 D
12 Briefly explain the significance of data and information in the context of computing.
Data is raw facts, and information is processed data. Computers transform data into information,
Q IT
AK
enabling decision-making and problem-solving.
-D
Briefly explain the differences between analog, digital, and hybrid computers, and
13
provide examples of each.
Data is raw facts, and information is processed data. Computers transform data into information,
C
AK
enabling decision-making and problem-solving.
Compare and contrast different types of video cards and their roles in computer
14
graphics.
Video cards like PCI, PCI Express, and AGP are used for rendering graphics and improving
AK
visual performance.
Define and compare various storage units, including bit, byte, kilobyte, megabyte,
15
gigabyte, terabyte, petabyte, exabyte, and nibble.
Various storage units are used to measure data storage capacity at different scales. Here are
AK definitions for common storage units: bit, byte, kilobyte, megabyte, gigabyte, terabyte, petabyte,
exabyte, and nibble.
01 t
AK
-1 en
Fourth Generation (1970s-1980s): Microprocessors and Personal Computers
Fifth Generation (1980s-Present): Integrated Circuits and Artificial Intelligence
Each generation of computers has brought about significant improvements in terms of speed,
01 m
size, storage capacity, and accessibility. These advancements have facilitated the development
u
of diverse applications, from scientific research and business automation to entertainment and
communication. The evolution of computing technology continues to shape our modern world
3D oc
and drive innovation in various fields.
Explain the importance of input devices in computer interaction, with examples of
B2 D
2
specialized input devices.
Input devices like keyboards and mice allow users to interact with computers, while specialized
Q IT
AK
devices such as scanners and graphic tablets serve specific purposes.
3 Discuss on various types of output devices and their applications in different settings.
-D
Output devices like printers and projectors provide visual or physical representations of
AK
computer-generated data.
C
Discuss methods for connecting peripherals to a computer, including cable connections and
4
wireless technologies like Bluetooth and Wi-Fi.
Connecting peripherals to a computer involves a variety of methods, including both cable
AK connections and wireless technologies. The choice of connection method depends on factors such
as the type of peripheral, convenience, data transfer speed, and reliability.
Explore the different number systems used in computers, provide examples, and explain
5
conversion rules between them.
Number systems include binary, decimal, octal, and hexadecimal, each with its own base and
AK
conversion rules.
Discuss coding systems like ASCII, BCD, and EBCDIC, and explain their applications in
6
data representation.
01 t
including uppercase and lowercase letters, numbers, symbols, and control characters.uses an 8-
-1 en
bit code to represent characters, with encoding not purely binary but more of a weighted binary
code. It reflects the punch-card heritage of early computing.
01 m
UNICODE is a comprehensive character encoding system that includes characters from nearly
all writing systems and languages, as well as symbols and emoji. Unicode assigns a unique code
u
point (numerical value) to each character in its repertoire. UTF (Unicode Transformation
3D oc
Format) encodings like UTF-8 and UTF-16 are used to represent these code points in binary
form.
B2 D
Q IT
-D
C
01 t
Fifth-generation computers are known for their ability to understand and
-1 en
4 respond to natural language and are associated with advancements in Artificial
___________ intelligence.
5
01 m
___________ is the raw, unprocessed facts and figures, while ___________ Data,
is data that has been processed and organized to have meaning.
u
The second generation of computers replaced vacuum tubes with
Information
Transistors
3D oc
6
___________ , which made computers smaller, faster, and more reliable.
A ___________ is a software program that translates source code written in
B2 D
01 t
-1 en
In a ___________OS, multiple programs or tasks can run concurrently,
Multitasking,
20 sharing the CPU's processing time while a ___________ OS is capable of
Multiprocessing
utilizing multiple processors or CPU cores to execute tasks in parallel.
21 01 m
Data is often considered the building block of ___________ as it is used to
u
make decisions and take actions.
The ITES industry has created employment opportunities in various
Information
3D oc
22 Economic
countries and has contributed to ___________ development.
___________ software serves as the backbone of a computer system,
B2 D
23 managing hardware resources and providing essential functions like memory System
management and task scheduling.
Q IT
01 t
A RTOS is intended for distributed computing environments where multiple
False
-1 en
5
computers work together as a single system.
ITES has played a significant role in economic globalization by enabling
6 True
7
01 m
companies to outsource tasks to different parts of the world.
System software ensures the proper functioning of a computer and serves as
u
an interface between the hardware and the user.
True
3D oc
Word processors, spreadsheets, and video editing software are examples of
8 False
system software.
B2 D
01 t
-1 en
slowing down the program.
AK
01 m
that enhance the functionality, performance, and maintenance of a computer system. These
u
programs serve various purposes, such as optimizing system resources, managing files, ensuring
security, and troubleshooting issues. Utility software typically doesn't perform tasks directly
3D oc
related to user productivity but rather assists in system management and maintenance. Antivirus
s/w, disk cleanup tools etc.
B2 D
AK
telemarketing
What is data digitization, and why is it important?
-D
7
Data digitization is the process of converting analog data into digital format, enabling easy
AK
storage, retrieval, and analysis.
C
AK for various applications. GIS allows for spatial analysis and mapping, with applications in urban
planning, environmental management, and logistics.
AK Two emerging technologies that offer new ways of interacting with the digital world.
AK and decentralized way. It consists of a chain of blocks, where each block contains a collection of
transactions, and a cryptographic hash of the previous block in the chain.
01 t
-1 en
The Internet of Things (IoT) is a technology paradigm that refers to the interconnectedness of
everyday physical objects and devices to the internet, allowing them to collect, exchange, and
AK
01 m
process data, and even take actions based on that data. IoT has rapidly evolved and is
transforming various industries and aspects of our daily lives.
u
15 Briefly explain on 5G Technology.
3D oc
5G, or the fifth generation of wireless technology, is a significant advancement in
AK telecommunications and mobile computing. It offers higher data speeds, lower latency, increased
B2 D
Discuss the role of Information Technology (IT) in modern society, highlighting its
1
advantages and disadvantages.
IT plays a crucial role in various aspects of society, such as communication, automation, and
AK data management. Advantages include efficiency, communication and convenience, but it also
brings challenges like privacy concerns, security risks and job displacement.
Discuss the roles and functions of peripheral devices in a computer system and provide
2
examples.
Peripheral devices extend the capabilities of computers, including input devices like keyboards
AK
and output devices like monitors.
Discuss on off the shelf and custom software-programming. Also give a comparison on the
3
same.
01 t
intermediaries between users/applications and hardware, ensuring efficient resource utilization
-1 en
and system stability.
Provide an overview of the different types of operating systems, such as Batch processing,
5
AK
01 m
Multiprocessing, Time-sharing, Real-Time, and Distributed OS, with examples of each.
u
These types of operating systems serve specific purposes, including batch processing of jobs,
simultaneous execution on multiple processors, and real-time event handling.
3D oc
Discuss on following:
6
a) Cloud Computing b) Edge Computing c) Quantum Computing
B2 D
Cloud computing is a technology that allows users to access and use computing resources and
services over the internet, often referred to as "the cloud." Instead of owning and managing
Q IT
physical hardware and software, users can depend cloud providers' infrastructure to run
applications, store data, and perform various computing tasks
-D
Edge computing is a distributed computing paradigm that brings data processing and
AK computation closer to the data source, typically at or near the "edge" of a network. In contrast to
C
traditional cloud computing, where data is sent to centralized data centers for processing, edge
computing processes data locally on devices, edge servers, or gateway devices.
Quantum computing is a cutting-edge and rapidly evolving field of computing that harnesses
the principles of quantum mechanics to perform certain types of computations significantly faster
than classical computers.
01 t
-1 en
The Master Boot Record is responsible for loading the operating system into
4 Boot
memory and initiating the __________ process.
6
01 m
The __________ is a text-based interface in Linux that allows users to interact
with the operating system using commands.
u
The command __________ is used to create a new directory in Linux.
Terminal
mkdir
3D oc
The proprietary UNIX -based operating system developed by IBM for its server
7 AIX
systems is called __________
B2 D
8 Windows and Linux use the __________ command to create a new directory. mkdir
9 In Linux, __________ shows the network path to a remote host. traceroute
Q IT
self-replicate
spread when these files are executed.
The payload of a virus is the part of the code responsible for performing
12 __________ actions like data corruption, system damage, or unauthorized Malicious
access.
Boot sector viruses target the __________of a computer's hard drive or Master Boot
13
removable media. Record/MBR
Polymorphic viruses use code__________ techniques to change their
14 appearance with each infection, making them harder to detect by antivirus Mutation
software.
15 The infection vector refers to the method a __________ uses to spread. Virus
The __________ is the first software program to run when a computer starts,
17 POST
responsible for checking hardware components' functionality.
__________ software allows users to try out a limited version of a program
18 Demoware
before purchasing the full version.
The __________ is a small, specialized program located at the beginning of a
19 MBR
storage device, such as a hard drive, that contains the boot loader.
01 t
To change the current working directory, you can use the __________
-1 en
21 Cd
command.
__________is a powerful concept in operating systems that enables multiple
22
23
01 m
threads of execution to run concurrently within a single process.
u Multithreading
Commands like tar, zip, rsync, dd, and cpio are used to create __________ and Backups,
3D oc
__________of files and directories. Archives
Windows and Linux use the__________command to check network
24 Ping
B2 D
connectivity.
Virtual machines are useful for running multiple OS on a __________ physical
Q IT
When antivirus software detects a virus, it may __________ the infected file,
26 Quarantine
isolating it from the rest of the system to prevent further damage.
C
The help command is used to display the manual pages for other commands,
1 False
providing detailed information about their usage.
Commands like apt, yum, dnf, pacman, and zypper are used to manage software
01 t
4 True
-1 en
packages on the system.
POST manages hardware initialization, the BIOS checks, and the boot process,
5 False
6
01 m
ensuring the computer can start and load the operating system.
To move or rename files and directories in Linux, you can use the mv
u
command.
True
3D oc
When working in DOS mode, one can perform different tasks, such as file
7 management, system administration, and program execution, by entering True
B2 D
commands.
8 pwd, touch, chown are examples of text processing commands. False
Q IT
The commands "dir" in Windows and "ls" in Linux lists the files and folders in
9 True
the current directory.
-D
Macro viruses target the master boot record (MBR) of a computer's hard drive
10 False
or removable media.
C
12 known viruses by comparing file signatures with a database of known malware False
signatures.
Brain virus was a ransomware virus that spread globally in 2017, and caused
14 False
widespread damage to organizations in various industries.
Commands like ping, traceroute, netstat, ifconfig, iptables, and ssh are used to
15 True
manage network connections and troubleshoot networking issues.
01 t
Utility s/w offers tools for system maintenance. Utility s/w types - antivirus, file management
-1 en
AK system, compression tools, disk management tools, disk cleanup tools, disk fragmenter, backup
utility.
3
AK
01 m
Differentiate compiler and interpreter.
Compilers and interpreters are both tools used in the field of computer programming to convert
u
high-level programming languages into machine code that a computer can understand and
3D oc
execute.
4 What are the main functions of an operating system?
B2 D
AK Managing hardware resources, providing a user interface, executing and managing programs.
5 Describe Free and Open Source Software (FOSS).
Q IT
FOSS is software that is freely available for use, modification, and redistribution, with the source
AK
code open to the public.
-D
6 Discuss the characteristics and purposes of demo ware, shareware, and freeware.
Demo ware provides limited features for free to encourage purchasing. Shareware is free
C
AK initially, requiring payment after a trial period. Freeware is entirely free without usage
restrictions.
7 What is firmware, and how does it differ from software? Provide examples of firmware.
Firmware is software embedded in hardware. It's permanent, unlike software which is installed
AK
on an OS. Examples: BIOS in computers, firmware in IoT devices.
8 What multithreading is and its advantages in multitasking environments.
Multithreading enables a program to run multiple threads simultaneously, enhancing system
AK
responsiveness and efficiency.
9 Give the primary functions of an operating system and how they benefit computer users.
Functions include hardware management, providing a user interface, and managing programs,
AK
enhancing user experience and system efficiency.
01 t
causing the system to malfunction. Viruses can spread through infected files, email attachments,
-1 en
and downloads from the internet.
12 How are viruses named? Give examples.
AK
13
01 m
Viruses are often named based on their characteristics, behavior, or the file they infect. include
u
ILOVEYOU, Mydoom, and Code Red.
What does BIOS stand for and discuss?
3D oc
BIOS, which stands for Basic Input/Output System, is a fundamental software component in a
computer system. It is stored on a non-volatile memory chip on the computer's motherboard, and
B2 D
AK
its primary purpose is to perform essential functions during the boot-up process and to initialize
and manage hardware components. give key aspects of BIOS.
Q IT
AK computer. Its primary purpose is to perform a series of diagnostic tests on the computer's
hardware components immediately after the computer is powered on or restarted.
C
01 t
accessibility, productivity, system control, reduce strain, ease of use. Examples of Common
-1 en
Keyboard Shortcuts in Windows: Ctrl + C (Copy) and Ctrl + V (Paste) etc.
Describe the booting process of a computer, including the roles of BIOS, POST and the
3
AK
01 m
Master Boot Record (MBR).
u
BIOS initiates hardware checks via POST, which then loads the MBR to start the boot process.
Discuss the different types of operating systems, such as Batch Processing, Single User,
3D oc
4
Multi User, Multiprogramming and Multi-Tasking.
Batch Processing executes tasks sequentially, Single User OS supports one user, Multi User OS
B2 D
AK
networking commands,
System monitoring and management commands
File and directory management Commands
Provide an overview of the early versions of Windows operating systems, including their
6
key features and limitations.
Older Windows versions like Windows 3.1, 95, and 98 introduced graphical interfaces but
had limitations in stability and security.
AK Windows 3.1 (1992):
Key Features: Enhanced GUI with Program Manager and File Manager. Improved
multitasking support. Introduction of TrueType fonts.
01 t
Limitations: Still based on the Windows 9x kernel, prone to instability. Limited security
-1 en
features. Lacked native support for multi-user environments
01 mu
3D oc
B2 D
Q IT
-D
C
01 t
SCM systems optimize the flow of ___________ and ___________ within a Goods ,
-1 en
4
business and between suppliers and customers Information
KMS support the creation, storage, and sharing of ___________within an
Knowledge
5
6
01 m
organization.
___________ includes the DSS elements as well as groupware to help groups Group
u
make effective decisions.
Support
System/GSS
3D oc
MIS uses various types of ___________ to present data and information in a
7 Reports
meaningful way.
B2 D
DSS and business intelligence tools are often integrated into MIS to facilitate
8 Strategic
___________ decision-making.
Q IT
In MIS, the process of transforming raw data into useful information is called Data
9
___________ processing
-D
14 organisation, its work processes, and interactions with the outside world or the Managerial
external environment.
___________ are a knowledge-based IS, constructed using ideas from Experts
15
artificial intelligence research. System
01 t
-1 en
MIS helps organizations improve ___________ and operational efficiency
21 Productivity
through better information management.
MIS helps operational management in making ___________ decisions to
22
23
01 m
ensure daily tasks are carried out efficiently.
u
___________ is a key characteristic of MIS, as it ensures that information is
readily available when needed.
Routine
Accessibility
3D oc
A Knowledge Worker System (KWS) is an information system designed to
24 Knowledge
support the activities of ___________ workers.
B2 D
The two processes used to complete the ___________ are batch processing
26 Transaction
and online transaction processing.
-D
4 Data retrieval involves distributing information to those who need it. False
Enterprise Resource Planning (ERP) systems are integrated software
5 True
applications that help organizations manage their core business processes.
A Decision Support System (DSS) assists in customer relationships by
6 False
providing data analysis and information.
An organised system of people, processes, software, databases, and devices
7 False
used to carry out and record commercial transactions is known as a TPS.
Enterprise Resource Planning (ERP) systems are a type of Enterprise System
01 t
-1 en
8 that often includes modules for various functional areas like finance, HR, and True
manufacturing.
The three primary levels of management that MIS serves are top management,
9
10
01 m
middle management, and operational management.
u
One of the key characteristics of MIS is customization to meet specific
organizational needs.
True
True
3D oc
11 Timeliness is not a crucial characteristic of MIS. False
The primary function of MIS is to transform irrelevant data into meaningful
B2 D
12 False
information.
The technological component of MIS includes hardware, software, and
Q IT
13 True
networks.
Enterprise Systems are typically specialized systems that focus on specific
-D
14 False
departmental needs.
Business Process Management (BPM) systems are a type of Enterprise System
C
15 False
that does not involve the automation of workflows.
2 Define System.
A system is made up of a number of connected parts that cooperate to accomplish a single
AK objective. A computer system is made up of a variety of hardware and software parts that
collaborate to carry out particular tasks.
01 t
Briefly explain the dimensions of information system.
-1 en
4
Information Systems encompass various dimensions, which include Organization,
AK
Management, and Information Technology.
AK
01 m
Mention in short, the functions of IS.
u
Input, storage, processing, output, and feedback are the five distinct functions that make up
information systems. A system made up of both people and computers that processes or interprets
3D oc
How does the 'Management' element of an Information System impact decision-making
6
within an organization?
B2 D
management:
Top-level management relies on Information Systems for strategic decision-making, such as
-D
AK
decisions, and analyze performance.
Bottom-level management benefits from automation and data processing capabilities to
streamline operations and enhance efficiency.
The 'Management' element facilitates decision-making by providing timely, accurate information
to meet the specific needs of each level of management, thus contributing to the organization's
success.
AK level managers rely on BIS to assess the efficiency of processes, allocate resources, and make
tactical decisions to ensure that the organization's day-to-day activities run smoothly. These
systems empower middle-level managers with real-time insights into various aspects of the
business, helping them take actions to optimize operations.
01 t
How do BIS benefit bottom-level management within organizations?
-1 en
9
BIS are beneficial for bottom-level management within organizations by automating routine and
repetitive tasks. These systems streamline processes such as data entry, inventory management,
AK
01 m
and order processing, allowing bottom-level managers to focus on operational tasks that require
u
human intervention. Business Information Systems enhance efficiency, reduce manual
workloads, and ensure that processes are executed consistently. They also enable bottom-level
3D oc
managers to access up-to-date data, track performance, and respond to day-to-day operational
challenges effectively, ultimately contributing to the smooth functioning of the organization at
B2 D
AK on providing high-level insights and is typically used for long-term planning and decision-
making. Unlike other systems, EIS provides a consolidated view of an organization's
C
performance, market trends, and external factors that affect strategic direction.
What are the typical functions of a Management Information System (MIS) within an
11
organization?
The functions of an MIS typically include data collection, data processing, data storage, data
AK retrieval, and data dissemination. It also provides decision support tools, reporting capabilities,
and facilitates communication within the organization.
AK professionals, known as knowledge workers, in their tasks that involve creating, manipulating,
and disseminating knowledge and information within an organization. Knowledge workers are
01 t
-1 en
systems are designed to manage customer data, interactions, and engagement, enabling
AK
businesses to provide better customer service, improve sales, and build long-term customer
loyalty.
15 01 m
Explain the role of Supply Chain Management (SCM) in an organization and provide an
u
example of its application.
SCM focuses on optimizing the end-to-end processes involved in the production and delivery of
3D oc
products and services. It ensures the efficient movement of materials, information, and finances
AK throughout the supply chain. An example of SCM application is using software like Oracle SCM
B2 D
Cloud to streamline inventory management, demand forecasting, and logistics, reducing costs
and improving order fulfillment.
Q IT
Define a Decision Support System (DSS) and provide an example where a DSS can be
16
applied.
-D
DSS is a system designed to help users make decisions by providing data analysis and modeling
tools. For instance, in the financial industry, a DSS can be applied to assist investment analysts
C
AK
in evaluating potential investment opportunities. It can analyze historical market data, assess risk
factors, and generate recommendations for portfolio diversification.
AK long-term planning. Middle-level management uses them for daily operations and monitoring
performance. Bottom-level management benefits from these systems by automating routine
tasks, like data entry and inventory tracking. For example, an Executive Information System
AK objectives by collecting, processing, and storing data and generating reports. For instance, an
MIS can help a retail company monitor inventory levels and reorder products when they are low,
ensuring efficient stock management.
01 t
Explain in detail the components that make up the IS. Also describe the key elements of
-1 en
3
IS.
It specifies how information moves through the system. An information system's goal is to collect
AK
01 m
data, process that data, and then present that information to the user in a way that is appropriate
u
for them. Computer H/w, Computer S/w, databses, network ans human resources make up the
components of IS. The essential elements of the information system are Functional
3D oc
Characteristics, Usable characteristics, Transactional characteristics, Operational characteristics,
Revision characteristics and Scalable characteristics.
B2 D
Explain in detail the role of Artificial Intelligence and Expert Systems in Business
4
Information Systems.
Q IT
AI and Expert Systems are advanced components of Business Information Systems. AI employs
machine learning and data analysis to provide insights and automate tasks. Expert Systems, on
-D
the other hand, mimic human expertise in specific domains. They are used for tasks like medical
AK
diagnosis or troubleshooting technical issues. These technologies enhance decision-making,
C
AK of management within an organization. These levels include the Operational level, the Tactical
level, and the Strategic level.
01 t
-1 en
people. It's designed to collect, process, store, and disseminate data and information to facilitate
decision-making and efficient operations. MIS systems offer several advantages and come with
certain disadvantages. Additionally, there are various types of MIS systems tailored to specific
AK
01 m
organizational needs.
u
MIS plays a vital role in modern organizations by providing the infrastructure for efficient
decision-making and operations. The advantages of MIS, including data integration and
3D oc
efficiency, are balanced by potential disadvantages such as cost and complexity. There are
various types of MIS systems, each tailored to specific organizational needs and management
B2 D
levels. Successful MIS implementation depends on careful planning, skilled personnel, and
ongoing maintenance.
Q IT
7
b) Business Intelligence (BI)
c) Enterprise Application Integration (EAI)
C
01 t
and integrity in a database.
-1 en
Data stored in a database can be retrieved, updated, deleted, and inserted
5 CRUD
using SQL _____________ statements.
6
01 m
Normalization is the process of organizing data in a database to reduce
_____________ and improve data integrity.
u
The process of combining data from multiple tables in a database is called
Redundancy
Joining
7
3D oc
_____________
A database system that stores data in tables and supports SQL queries is
8 Relational
B2 D
securing databases.
A _____________ key is used to establish relationships between tables in a
10 Foreign
-D
relational database.
A _____________database is suitable for unstructured or semi-structured
11 NoSQL
C
data.
Forms can be used for data __________ and for ____________information. Entry,
12
Displaying
13 _____________ is used for defining and managing database schema. DDL
01 t
23 Worksheet
-1 en
range you want to import.
____________ is a widely used relational database often associated with
24 Oracle
enterprise-level applications.
25 01 m
Data ____________ is the process of transforming unprocessed, machine-
u
readable data into relevant information.
Processing
27 Hierarchical
with parent-child relationships.
28 The logical schema and ________ schema are different levels of abstraction. Conceptual
Q IT
29 ___________ users of the database system need not be aware of its existence Native
In a DBMS, DBAs have the authority to____________ or ____________
-D
30 Grant, Revoke
access permissions to users and roles.
6 extract insights, while data processing involve storing and managing data in False
a structured and secure way.
One advantage of a DBMS is improved data consistency through centralized
7 True
data management.
8 To import an Excel file into MS Access, go to the Internal Data tab. False
NoSQL databases are not suitable for scenarios with high data volume and
9 False
complex data structures.
Database architects must consider factors like security, data consistency, and
10 True
disaster recovery when designing a database architecture.
01 t
-1 en
NoSQL databases are suitable for scenarios with high data volume and
11 True
complex data structures.
ACID properties which maintain data in a good state in case of failure. True
12
13
14
01 m
The physical schema of a database describes how data is logically organized. False
u
Data independence means that changes to one level of the schema do not
True
affect the other levels.
3D oc
End users can directly access the physical storage of the database without
15 False
using SQL.
B2 D
A DBMS offers data independence, data integrity, and support for complex queries, while a
AK
file-based system lacks these features.
C
01 t
Cloud databases enable you to manage and access both structured and unstructured data over
-1 en
AK
the internet or a cloud platform.
Distinguish between Data Processing Systems and Data Management Systems. Discuss
7
01 m
the advantages of using a DBMS over traditional data processing.
u
Data Processing Systems focus on data transformation, while Data Management Systems
(DBMS) emphasize data storage and retrieval. DBMS offers data integrity, security, and easier
AK
3D oc
data access.
In a DBMS, a schema or level refers to the organization and structure of the database. It defines
how data is stored, accessed, and the relationships between data elements. The schema or level
Q IT
in a DBMS is a hierarchical framework that consists of the physical schema (dealing with storage
AK
details), the logical schema (defining the database's overall structure), and the view schema
-D
(providing tailored views of the data for users and applications). Each level serves a distinct
purpose in managing and interacting with a database.
C
01 t
Specialized users are experts in database systems and are responsible for tasks related to the
-1 en
database's design, administration, and maintenance. They have in-depth knowledge of database
architecture, optimization, security, and performance tuning.
11
01 m
What is the benefit of importing Excel files into SQL?
u
Importing Excel files into SQL databases offers a range of benefits, including improved data
management, data integrity, security, scalability, and the ability to perform advanced data
3D oc
AK
analysis and reporting. It also provides a foundation for a more structured and efficient data
management process within an organization.
B2 D
between tables. One-to-one has a one-to-one correspondence, one-to-many allows one record to
AK
be related to multiple records in another table, and many-to-many permits multiple records to be
-D
DCL is a subset of SQL that deals with the control and management of access to data in a
RDBMS. DCL provides a set of commands and statements that are used to define and regulate
the permissions and privileges granted to users and roles in a database. Its primary purpose is to
ensure data security, integrity, and compliance with privacy and regulatory requirements. There
are two main DCL commands: GRANT and REVOKE
AK The GRANT command is used to give specific permissions or privileges to users or roles in a
database.
Syntax: GRANT <permissions> ON <object> TO <user or role>;
The REVOKE command is used to take back or revoke previously granted permissions or
privileges from users or roles in a database.
Syntax: REVOKE <permissions> ON <object> FROM <user>;
AK dependencies, and 3NF aims to remove transitive dependencies, leading to a more organized and
01 t
efficient database structure.
-1 en
Category IV Essay Type Questions
1
01 m
SI.No Questions & Answer Keys (AK)
Elaborate on Database architecture with pictorial representation.
u
Database architecture focuses on the design, development, implementation, and management of
computer programs that store and organize information for corporations, agencies, and
3D oc
institutions. In order to address user needs, a database architect creates and implements software.
In a one-tier DBMS architecture, the entire DBMS software, including the user interface,
application logic, data management, and storage components, all run on a single machine or
B2 D
machine.
Two-tier DBMS architecture, also known as client-server architecture, introduces a separation
between the user interface and the data management components. It consists of two main tiers:
-D
this architecture.
2 Describe types of Database Systems. Explain the strengths and weaknesses of each.
DBMS can be categorized into several types based on their data models and architecture. The
choice of database system depends on the specific needs of an application. Hierarchical and
network databases are more suitable for data with well-defined hierarchical and networked
AK structures, but they lack the flexibility and query capabilities of relational databases. Relational
databases are versatile and provide structured data storage, making them suitable for a wide range
of applications. However, the optimal choice will depend on the nature of the data and the
requirements of the application.
Explain the roles and responsibilities of Database Administrators (DBAs) and Database
3
Users in the context of a DBMS. Why are these roles important?
AK the database to retrieve and manipulate data to support their specific tasks and responsibilities.
These roles are interdependent and critical for the successful operation of a database management
system.
AK databases are ideal for flexible and scalable data storage, and Oracle Database excels in
enterprise-level applications. It's important to consider factors like data model, scalability, query
01 t
language, compliance, use cases, licensing, and community support when making a selection.
-1 en
Explain the concept of Forms in MS Access. Describe the steps involved in creating a
5
form and editing data using forms.
01 m
Forms are user-friendly interfaces. Creating a form involves selecting fields and data sources.
u
Users can edit data using forms for improved data entry and validation.
Forms in MS Access make it much more convenient for users to interact with data, especially
AK
3D oc
for data entry and editing. They offer a user-friendly, organized, and controlled way to view and
manipulate information stored in a database.
B2 D
Explain Relational Model and its significance in database design. Explain the roles of
6
Data Definition Language (DDL) and Data Manipulation Language (DML).
Q IT
The Relational Model is a fundamental framework for organizing and managing data in a
relational database. It was introduced by Edgar F. Codd in the 1970s and has since become the
-D
most widely used model for data storage and retrieval in modern database systems. The key
concept of the Relational Model is that data is organized into tables or relations, where each table
C
contains rows (tuples) and columns (attributes).In this model, data is represented in a structured
and tabular format, which is often referred to as a relational database. The tables contain related
information, and the relationships between tables are defined by common attributes. The
AK Relational Model emphasizes the principles of data integrity, consistency, and simplicity. It
offers a powerful and flexible way to store, query, and manipulate data.
Significance of the Relational Model in Database Design: Data Organization, Data Integrity,
Flexibility, Query Language, Normalization.
DDL and DML play distinct but complementary roles: DDL defines the structure and constraints
of the database, while DML allows users to interact with and manipulate the data stored within
that structure.