IT for Management
Assignment – A
Q1: What do understand by electronic data interchange along with its advantage and disadvantage? Also discuss the components of EDI system.
Q2: What are the various security threats that computer organizations are facing today and why providing security is necessary? What is the advantage of using fire wall?
Q3: What is computer network? What do you understand by network topology? Describe three network topologies with appropriate examples.
Q4: Write short notes on any three of the following.
2. Transaction Processing systems & Management Processing Systems
4. Operating System
Q5: What are the major categories of application software? Discuss each category in details.
Q6: What do you understand by interactive input devices? Discuss a situation where they are used appropriately.
Q7: Explain the concept behind Batch processing and transaction processing system.
Q8: What do you understand by generations of computers? To which generation the personal computers fall? Describe the characteristics and capability of personal computers.
Assignment – B
Please read the case study given below and answer questions given at the end.
Banking industry now a day’s depends heavily on automation of its operations that not only automates its functioning but at the same time provides enough intelligent information for quick and effective decision making. The total branch automation system covers all retail banking functions performed in a branch both in front office and also in back office. Its powerful management information system enables senior management to take timely strategic decisions in most dynamic market environment.
XYZ is a nationalized bank with more than 1000 branches with focus on information technology Tyra Information System has obtained the Total Branch Automation tender competing with number of companies at the RFI stage and also against established players at RFP stage. The system has been implemented at 300 branches. It runs on UNIX WARE business edition operating system and standard Oracle RDBMS It supports following modules and functions.
” Demand Liabilities( Savings, Current, Flexi Deposits)
” Time Liabilities( Term Deposit, Daily Deposits)
” Fund based advances( Cash Credits, Overdrafts, Loans, Bill Discounting)
” Non Fund Based Advances( Bank Guarantee, Letter of Credit)
” Customer Services(Issue of Cheque Books, Cheque stock maintenance, Stop Payments, Standing Instructions, Lockers, Tax Collection, Pension)
” Remittances( Demand Drafts, Pay Orders, Mail Transfers, Telegraphic Transfers)
” Online Transactions Processing( Cash ,Transfer, Clearing)
” Signature & Photograph maintenance & retrieval
” Nonperforming Assets
” Share Accounting
” Branch General Ledger Accounting
” ATM interface
” Tele banking/IVRS Interface
” Mobile Banking Interface
” Remote Banking/Information Kiosk Interface
” Any Branch Banking
Q1: Highlight the advantages and limitations of computer applications in Indian Banking Industry
Assignment – C
Q1. Computers are also known by the name–
Two state Back device
Two state Front device
Two state forward device
One state front device
Q2. Cache Memory is–
Small memory between CPU main memory whose access time in close to processing speed of CPU
Erasable non-programmable memory
Q3. What provides an interface between Hardware and user?
Q4. RAM is known by–
Random Access Memory
Q5. 1 Byte equals to
Q6. Computers carrying operation on data which can vary continuously and are measurable such as time, lengths, weights etc–
None of the above
Q7. A group of conducting wires or lines over which electrical signals corresponding to data and instructions are transmitted is–
Q8. Which of the following is not a Programming Language?
Q9. A database structures that treats files as tables is–
Q10. Which of the following is a language?
Q11. A processing system wherein data is gathered for a time and collected into a group before they are entered into the computer system–
Real time Processing
Q12. Which of the following is not property of DBMS?
Increase date Redundancy
Integration of data
Improved in Security
Achieving Data Independence
Q13. The facility which defines the conceptual scheme and also gives some details about how to implement this scheme in the physical devices is called–
DML Pre Compiler
Data Manipulation Language
Data definition Language
Q14. Users who interact with the system by writing database application like computer aided design system are called–
Q15. Groups of specially wrapped and insulated wire lines that are able to transmit data at high rates–
Q16. Which of the following is not a type of computer network?
Local Area Network
Metropolitan Area Network
City Area network
Wide Area Network
Q17. Which of the following is a DBMS?
Q18. Web Browser is a–
Q19. Which of the following is not a device used in LAN?
Q20. Which of the following is not a domain name?
Q21. To install multimedia facility into a computer, one does not essentially need–
Q22. Malicious programs that damages your computer is called–
Q23. What is the name of the screen symbol that shows the placement of the next character?
Q24. Which of the following is not an impact device?
Q25. Which of the following file formats is used for art work?
Q26. A system which involves the digitization of telephone network so that voice, data, text, music etc. can be provided to end users from single end-user terminals–
Q27. The two kinds of main memory are–
Floppy drive and CD Drive memory
Primary and Secondary Memory
Random and Sequential Memory
RAM and ROM
Q28. Data Elements of related type are grouped into–
Q29. A command that lets you change one or more fields in a record is–
Q30. Which of the following is not a search engine?
Q31. The floppy discs comes in two sizes they are–
3.5 inch & 5.25 inch
2 inch and 3.5 inch
2 inch and 4.25 inch
2.5 inch and 5.5 inch
Q32. Which of the following topology is least affected by addition or removal of a node?
Q33. A host on the internet finds another host by its–
Q34. Which of the following browser is not free?
Q35. Which of the following is not the main component of EDI SYSTEM?
Q36. Which of the following is essentially not a pre-requisite of E-commerce?
A Web Site
A shopping Cart Programme to list the products or services and a way to collect purchases information
To have a printer
A method to get the funds in bank account
Q37. What is the method of safeguard used for the safeguarding highly confidential information such as corporate data or credit card information is being transmitted across the Internet?
Firewalls and Proxy Servers
Q38. What is the full form of HTML?
High transfer markup language
High transmission metropolitan language
Hyper test markup language
Hyper text metropolitan language
Q39. URL stands for–
Ultimate Resource Locator
Uniform Resource Locator
Uniform Retrieval Language
Ultimate Retrieval Language
Q40. Multimedia S/W used for video editing is–