SlideShare a Scribd company logo
1 of 8
Download to read offline
Examination Paper of Information Technology
1
IIBM Institute of Business Management
IIBM Institute of Business Management
Examination Paper MM.100
Information Technology & Management
Section A: Objective Type (30 marks)
 This section consists of multiple choice questions & short notes.
 Answer all the questions.
 Part One questions carry 1 mark each & Part two questions carry 5 marks each.
Part One:
Multiple Choices:
1. Computer crime is defined by
a. AITP
b. SWAT
c. Both (a) & (b)
d. None of the above
2. Prototyping is sometimes called
a. ASD
b. RSD
c. RAD
d. None of the above
3. Virtual reality is also called
a. Computer-simulated reality
b. Neurons
c. Software robots
d. Telepresence
4. A trackball is a stationary device related to the
a. Keyboard
b. Joystick
c. Mouse
d. All of the above
5. Hand-held microcomputer devices known as
a. Personal digital assistance
b. Super computers
c. Both (a) & (b)
d. None of the above
6. KMS stands for
a. Knowledge memory systems
b. Knowledge making system
c. Knowledge management systems
Examination Paper of Information Technology
2
IIBM Institute of Business Management
d. None of the above
7. A basic system component of information systems is
a. Memory
b. Processing
c. Storage
d. All of the above
8. How many characters uses the MICR system
a. 15 characters
b. 18 characters
c. 24 characters
d. 14 characters
9. EBCDIC stands for
a. Extended Binary Coded Decimal Interchange Code
b. Extended Binary Coded Decimal Instruction Code
c. Extended Binary Coded Data Interchange Code
d. Electronic Binary Coded Data Interchange Code
10. The smallest element of data is called
a. Byte
b. Bit
c. Giga byte
d. None of the above
Part Two:
1. Write a note on ‘Cache Memory’.
2. What do know about ‘Assembler’?
3. Write a note on ‘Optical Character Recognition’.
4. Explain the term ‘Electronic commerce’.
END OF SECTION A
Section B: Caselets (40 marks)
 This section consists of Caselets.
 Answer all the questions.
 Each caselet carries 20 marks.
 Detailed information should form the part of your answer (Word limit 200 to 250 words).
Examination Paper of Information Technology
3
IIBM Institute of Business Management
Caselet 1
It began as a trading site for nerds, the newly jobless, home-bound housewives, and bored retirees to
sell subprime goods: collectibles and attic trash. But eBay (www.ebay.com) quickly grew into a
teeming marketplace of 30 million, with its own laws and norms, such as a feedback system in
which buyers and sellers rate each other on each transaction. When that wasn’t quite enough, eBay
formed its own police force to patrol the listings for fraud and kick out offenders. The company even
has something akin to a bank: Its Paypal payment-processing unit allows buyers to make electronic
payments to eBay sellers who can’t afford a merchant credit card account. “eBay is creating a
second, virtual economy,” says W. Brian Arthur, an economist at think tank Santa Fe Institute. “It’s
opening up a whole new medium of exchange.” eBay’s powerful vortex is drawing diverse
products and players into its profitable economy, driving its sellers into the heart of traditional
retailing, a $2 trillion market. Among eBay’s 12 million daily listings are products from giants such
as Sears Roebuck, Home Depot, Walt Disney, and even IBM. More than a quarter of the offerings
are listed at fixed prices. The result, says Bernard H. Tenenbaum, president of a retail buyout firm, is
“They‘re coming right for the mainstream of the retail business.” So what started out as a pure
consumer auction market-place is now also becoming a big time business-to-consumer and even
business-to-business bazaar that is earning record profits for eBay’s stockholders. And as the eBay
economy expands, CEO Meg Whitman and her team may find that managing it could get a lot
tougher, especially because eBay’s millions of passionate and clamorous users demand a voice in all
major decisions. This process is clear in one of eBay’s most cherished institutions: the voice of the
Customer program. Every couple of months, the executives of eBay bring in as many as a dozen
sellers and buyers, especially its high selling “Power Sellers,” to ask them questions about how they
work and what else eBay needs to do. And at least twice a week, it holds hour-long teleconferences
to poll users on almost every new feature or policy, no matter how small. The result is that users
feel like owners, and they take the initiative to expand the eBay economy – often beyond
management’s wildest dreams. Stung by an aerospace down-turn, for instance, machine-tool shop
Reliable Tools Inc., tried listing a few items on eBay in late 1998. Some were huge, hulking chunks
of metal, such as a $7,000 2,300-pound milling machine. Yet they sold like ice cream in August.
Since then, says Reliable’s auction manager, Richard Smith, the company’s eBay business has
“turned into a monster.” Now the Irwindale (California) shop’s $1 million in monthly eBay sales
constitutes 75% of its overall business. Pioneers such as Reliable promoted eBay to set up an
industrial products marketplace in January that’s on track to top $500 million in gross sales this
year.Then there is eBay Motors. When eBay manager Simon Rothman first recognized a market for
cars on cars on eBay in early 1999, he quickly realized that such high-ticket items would require a
different strategy than simply opening a new category. To jump-start its supply of cars and
customers, eBay immediately bought a collector-car auction company, Kruse International, for $150
million in stock, and later did a deal to include listings from online classifieds site, AutoTrader.com.
Rothman also arranged insurance and warranty plans, an escrow service, and shipping and
inspection services.This approach worked wonder. Sales of cars and car parts, at a $5 billion-plus
annual clip, are eBay's single largest market. That has catapulted eBay in front of No. 1 U.S. auto
dealer AutoNation in number of used cars sold. About half of the sellers are brick-and-mortar dealers
who now have a much larger audience than their local area. “eBay is by far one of my better sources
for buyers,” says Bradley Bonifacius, Internet sales director at Dean Stallings Ford in Oak Ridge,
Tennessee.And for now, the big corporations, which still account for under 5 percent of eBay’s
gross sales, seem to be bringing in more customers then they steal. Motorola Inc., for example,
helped kick off a new wholesale business for eBay last year, selling excess and returned cell phones
in large lots. Thanks to the initiative of established companies such as Motorola, eBay’s wholesale
business jumped ninefold, to $23 million, in the first quarter.As businesses on eBay grow larger,
they spur the creation of even more businesses. A new army of merchants, for example, is making a
Examination Paper of Information Technology
4
IIBM Institute of Business Management
business out of selling on eBay for other people. From almost none a couple of years ago, these so
called Trading Assistants now number nearly 23,000. This kind of organic growth makes it
exceedingly though to predict how far the eBay economy can go. Whitman professes not to know.
“We don’t actually control this,” she admits. “We are not building this company by ourselves. We
have a unique partner – million of people.”
1. Why has eBay become such a successful and diverse online marketplace? Visit the eBay website
to help you answer, and check out their many trading categories, specialty sites, international
sites, and other features.
2. Why do you think eBay has become the largest online/offline seller of used cars, and the largest
online seller of certain other products, like computers and photographic equipment?
Caselet 2
It’s no secret that somewhere in a back room in the typical Fortune 500 company, there’s a team of
analytical wizards running sophisticated data mining queries that mine for gems such as data about
about the company’s best customers – those top 20 percent of clients that produce 80 percent of the
company’s profits. These jewels can be a business’s most valuable intellectual property, which
makes them very valuable to competitors. What’s to prevent that data set from walking out the door
or falling into the wrong hands? Some times, not much. Many companies lack the internal controls
to prevent that information from leaking. The problem is that such data is as hard to protect as it is to
find. Owens & Minor Inc. (www.ownes-minor.com), a $4 billion medical supplies distributor,
counts some of the nation’s largest health care organizations among its customers. In late 1996, it
started mining data internally using business intelligence software from Business Objects SA. “From
the beginning, we were aware of security issues around this strategic information about our
operations,” says Don Stoller, senior director of information systems at Owens & Minor. “For
example, a sales executive in Dallas should only have access to analyses from his region.” It is
always possible that someone who has legitimate access will abuse that trust, but companies can
minimize that potential by strictly limiting access to only those who need it. thus, Owens & Minor
uses role-level security functions that clearly define who has access to which data. “This meant we
had to build a separate security table in our Oracle database,” says Stoller. A few years later, when
the company wanted to open its systems to suppliers and customers, security became even more
important. In 1998, Owens & Minor moved quickly to take advantage of Web-intelligence software
from Business Objects that’s designed to Web-enable business intelligence systems. The result was
Wisdom, an extranet Web portal that lets Owens & Minor’s suppliers and customers access their
own transactional data and generate sophisticated analyses and reports from it.“It business-to-
business transactions, security is key,” says Stoller. “We had to make absolutely sure that Jhonson &
Jhonson, for example, could not see any 3M’s information. This meant we had to set up specific
customer and supplier security tables, and we had to maintain new, secured database views using the
Oracle DBMS and Business Objects.”Wisdom was such a success that Owens & Minor decided to
go into the intelligence business with the launch of wisdom2 in the spring of 2000. “We capture data
out of a hospital’s materials management system and load it into our data warehouse,” Stoller
explains. A hospital can then make full use of its business-intelligence software to mine and analyze
purchasing data. Owens & Minor receives a licensing and maintenance fee for the services.Layers of
security and encryption require a considerable amount of overhead data for systems administration.
Both Stoller and Michael Rasmussen, an analyst at Giga Information Group, say that’s the main
reason security concerns about business intelligence are often swept under the carpet. The issues of
authentication (identifying the user) and authorization (what things the user is allowed to do) must
be addressed, usually across different applications, Rasmussen says, adding, “Systems
Examination Paper of Information Technology
5
IIBM Institute of Business Management
administration can be a real nightmare.”“We are going through some of this,” says David Merager,
director of Web services and corporate applications at Vivendi Universal Games Inc.
(www.vugames.com). “Our business intelligence needs more security attention.” Business
intelligence reports come from two systems: an Oracle-based for budgets on a Microsoft SQL Server
database. The heart of the business intelligence system consists of Microsoft’s OLAP application
and software from Comshare Inc. that provides the Web-based front end for the analytics. “Our
budget teams use these reports to do real-time analyses,” says Merager. Rodger Sayles, manager
of data warehousing at Vivendi Universal, says one way to secure such a system is to assign roles to
all users within the Microsoft application. Roles determine precisely what a user is allowed to see
and do and are usually managed within a directory. If your computing architecture is amenable to a
single, centralized directory that supports roles, this may be an attractive solution. “The problem is
that once you have over 40 distinct roles, you run into performance issues, and we have identified
about 70 user roles,” Sayles explains. He says there’s way around this difficulty. “I think we are
going to use a combination of Web portals and user roles. A user would sign on through a particular
Web portal, which would effectively place the user in a role category. This reduces the overhead
burden on the application,” says Sayles.
1. Why have developments in IT helped to increase the value of the data resources of many
companies?
2. How can companies use IT to meet the challenges of data resources security?
END OF SECTION B
Section D: Applied Theory (30 marks)
 This section consists of Long Questions.
 Answer all the questions.
 Each question carries 15 marks.
 Detailed information should form the part of your answer (Word limit 150 to 200 words).
1. What potential security problems do you see in the increasing use of intranets and extranets in
business? What might be done to solve such problems? Give several examples?
2. Suppose you are a manager being asked to develop e-business and e-commerce applications to
gain a competitive advantage in an important market for your company. What reservations might
you have about doing so? Why?
END OF SECTION C
Examination Paper of Information Technology
6
IIBM Institute of Business Management
IIBM Institute of Business Management
Examination Paper MM.100
Database Management Systems
Section A: Objective Type (30 marks)
 This section consists of Multiple Choice and Short answer type questions.
 Answer all the questions.
 Part one questions carry 2 marks each & Part Two questions carry 5 marks each.
Part One:
Multiple choices:
1. The normal language of database is
a. PHP
b. SQL
c. C++
d. Java
2. DDL, a database system language
a. Creates table
b. Manipulates table
c. Cannot work with table
d. None
3. Symbol for one to one relationship is………………………………………………………
4. HDBMS stands for
a. Hello DBMS
b. Hierarchical DBMS
c. Hyper DBMS
d. High DBMS
5. In Anti joining of R►S means ……………………………………………………………
Part Two:
1. What are “Foreign Keys”?
Examination Paper of Information Technology
7
IIBM Institute of Business Management
2. Differentiate between ‘DBMS’ and ‘RDBMS’.
3. Write the syntax to Insert charts into a table from another table.
4. What are ‘Armstrong’s Axioms’.
5. Write short ‘Boyce-Codd Normal Form (BCNF)’.
END OF SECTION A.
Section B: Long Answers type Questions (40 marks)
 This section consists of Long Questions.
 Answer all the questions.
 Each question carries 15 marks.
 Detailed information should form the part of your answer (Word limit 200 to 250 words).
1. Elaborate the testing of Serializability techniques with example.
2. Explain the working of lock manager.
3. What is deadlock? How is a deadlock detected? Enumerate the method for recovery from
the deadlock.
4. Explain why a transaction execution should be atomic. Explain ACID properties,
considering the following transaction.
Ti: read (A);
A : = A- 50;
Write (A);
Read (B);
B : = B + 50;
Write (B)
END OF SECTION B
Examination Paper of Information Technology
8
IIBM Institute of Business Management
Section C: Applied Theory (30 marks)
 This section consists of Long Questions.
 Answer all the questions.
 Each question carries 15 marks.
 Detailed information should form the part of your answer (Word limit 150 to 200 words).
1. The HR manager has decided to raise the salary for all the employees in department
number 30 by 0.25. Whenever any such raise is given to the EMPLOYEES, a record for
the same is maintained in the EMP-RAISE table. It includes the employee number, the
date when the raise was given and the actual raise. Write a PL/SQL block to update the
salary of each employee and insert a record in the EMP-RAISE table.
2. Retrieve the salesman name in ‘New Delhi’ whose efforts have resulted into atleast one
sales transaction.
Table Name : SALES-MAST
Salesman-no Name City
B0001
B0002
B0003
B0004
B0005
B0006
B0007
Puneet Kumar
Pravin Kumar
Radha Krishna
Brijesh Kumar
Tushar Kumar
Nitin Kumar
Mahesh Kumar
Varanasi
Varanasi
New Delhi
New Delhi
Allahabad
Allahabad
Gr. Noida
Table Name : SALES-ORDER
Order-no Order-date Salesman-no
S0001
S0002
S0003
S0004
S0005
S0006
10-Apr-07
28-Apr-07
05-May-07
12-June-07
15-July-07
18-Aug-07
B0001
B0002
B0003
B0004
B0005
B0006
END OF SECTION C
S-2-301012

More Related Content

Recently uploaded

Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsManeerUddin
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 

Recently uploaded (20)

Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture hons
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 

Featured

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 

Featured (20)

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 

Examination paper information technology & management & data base management systems

  • 1. Examination Paper of Information Technology 1 IIBM Institute of Business Management IIBM Institute of Business Management Examination Paper MM.100 Information Technology & Management Section A: Objective Type (30 marks)  This section consists of multiple choice questions & short notes.  Answer all the questions.  Part One questions carry 1 mark each & Part two questions carry 5 marks each. Part One: Multiple Choices: 1. Computer crime is defined by a. AITP b. SWAT c. Both (a) & (b) d. None of the above 2. Prototyping is sometimes called a. ASD b. RSD c. RAD d. None of the above 3. Virtual reality is also called a. Computer-simulated reality b. Neurons c. Software robots d. Telepresence 4. A trackball is a stationary device related to the a. Keyboard b. Joystick c. Mouse d. All of the above 5. Hand-held microcomputer devices known as a. Personal digital assistance b. Super computers c. Both (a) & (b) d. None of the above 6. KMS stands for a. Knowledge memory systems b. Knowledge making system c. Knowledge management systems
  • 2. Examination Paper of Information Technology 2 IIBM Institute of Business Management d. None of the above 7. A basic system component of information systems is a. Memory b. Processing c. Storage d. All of the above 8. How many characters uses the MICR system a. 15 characters b. 18 characters c. 24 characters d. 14 characters 9. EBCDIC stands for a. Extended Binary Coded Decimal Interchange Code b. Extended Binary Coded Decimal Instruction Code c. Extended Binary Coded Data Interchange Code d. Electronic Binary Coded Data Interchange Code 10. The smallest element of data is called a. Byte b. Bit c. Giga byte d. None of the above Part Two: 1. Write a note on ‘Cache Memory’. 2. What do know about ‘Assembler’? 3. Write a note on ‘Optical Character Recognition’. 4. Explain the term ‘Electronic commerce’. END OF SECTION A Section B: Caselets (40 marks)  This section consists of Caselets.  Answer all the questions.  Each caselet carries 20 marks.  Detailed information should form the part of your answer (Word limit 200 to 250 words).
  • 3. Examination Paper of Information Technology 3 IIBM Institute of Business Management Caselet 1 It began as a trading site for nerds, the newly jobless, home-bound housewives, and bored retirees to sell subprime goods: collectibles and attic trash. But eBay (www.ebay.com) quickly grew into a teeming marketplace of 30 million, with its own laws and norms, such as a feedback system in which buyers and sellers rate each other on each transaction. When that wasn’t quite enough, eBay formed its own police force to patrol the listings for fraud and kick out offenders. The company even has something akin to a bank: Its Paypal payment-processing unit allows buyers to make electronic payments to eBay sellers who can’t afford a merchant credit card account. “eBay is creating a second, virtual economy,” says W. Brian Arthur, an economist at think tank Santa Fe Institute. “It’s opening up a whole new medium of exchange.” eBay’s powerful vortex is drawing diverse products and players into its profitable economy, driving its sellers into the heart of traditional retailing, a $2 trillion market. Among eBay’s 12 million daily listings are products from giants such as Sears Roebuck, Home Depot, Walt Disney, and even IBM. More than a quarter of the offerings are listed at fixed prices. The result, says Bernard H. Tenenbaum, president of a retail buyout firm, is “They‘re coming right for the mainstream of the retail business.” So what started out as a pure consumer auction market-place is now also becoming a big time business-to-consumer and even business-to-business bazaar that is earning record profits for eBay’s stockholders. And as the eBay economy expands, CEO Meg Whitman and her team may find that managing it could get a lot tougher, especially because eBay’s millions of passionate and clamorous users demand a voice in all major decisions. This process is clear in one of eBay’s most cherished institutions: the voice of the Customer program. Every couple of months, the executives of eBay bring in as many as a dozen sellers and buyers, especially its high selling “Power Sellers,” to ask them questions about how they work and what else eBay needs to do. And at least twice a week, it holds hour-long teleconferences to poll users on almost every new feature or policy, no matter how small. The result is that users feel like owners, and they take the initiative to expand the eBay economy – often beyond management’s wildest dreams. Stung by an aerospace down-turn, for instance, machine-tool shop Reliable Tools Inc., tried listing a few items on eBay in late 1998. Some were huge, hulking chunks of metal, such as a $7,000 2,300-pound milling machine. Yet they sold like ice cream in August. Since then, says Reliable’s auction manager, Richard Smith, the company’s eBay business has “turned into a monster.” Now the Irwindale (California) shop’s $1 million in monthly eBay sales constitutes 75% of its overall business. Pioneers such as Reliable promoted eBay to set up an industrial products marketplace in January that’s on track to top $500 million in gross sales this year.Then there is eBay Motors. When eBay manager Simon Rothman first recognized a market for cars on cars on eBay in early 1999, he quickly realized that such high-ticket items would require a different strategy than simply opening a new category. To jump-start its supply of cars and customers, eBay immediately bought a collector-car auction company, Kruse International, for $150 million in stock, and later did a deal to include listings from online classifieds site, AutoTrader.com. Rothman also arranged insurance and warranty plans, an escrow service, and shipping and inspection services.This approach worked wonder. Sales of cars and car parts, at a $5 billion-plus annual clip, are eBay's single largest market. That has catapulted eBay in front of No. 1 U.S. auto dealer AutoNation in number of used cars sold. About half of the sellers are brick-and-mortar dealers who now have a much larger audience than their local area. “eBay is by far one of my better sources for buyers,” says Bradley Bonifacius, Internet sales director at Dean Stallings Ford in Oak Ridge, Tennessee.And for now, the big corporations, which still account for under 5 percent of eBay’s gross sales, seem to be bringing in more customers then they steal. Motorola Inc., for example, helped kick off a new wholesale business for eBay last year, selling excess and returned cell phones in large lots. Thanks to the initiative of established companies such as Motorola, eBay’s wholesale business jumped ninefold, to $23 million, in the first quarter.As businesses on eBay grow larger, they spur the creation of even more businesses. A new army of merchants, for example, is making a
  • 4. Examination Paper of Information Technology 4 IIBM Institute of Business Management business out of selling on eBay for other people. From almost none a couple of years ago, these so called Trading Assistants now number nearly 23,000. This kind of organic growth makes it exceedingly though to predict how far the eBay economy can go. Whitman professes not to know. “We don’t actually control this,” she admits. “We are not building this company by ourselves. We have a unique partner – million of people.” 1. Why has eBay become such a successful and diverse online marketplace? Visit the eBay website to help you answer, and check out their many trading categories, specialty sites, international sites, and other features. 2. Why do you think eBay has become the largest online/offline seller of used cars, and the largest online seller of certain other products, like computers and photographic equipment? Caselet 2 It’s no secret that somewhere in a back room in the typical Fortune 500 company, there’s a team of analytical wizards running sophisticated data mining queries that mine for gems such as data about about the company’s best customers – those top 20 percent of clients that produce 80 percent of the company’s profits. These jewels can be a business’s most valuable intellectual property, which makes them very valuable to competitors. What’s to prevent that data set from walking out the door or falling into the wrong hands? Some times, not much. Many companies lack the internal controls to prevent that information from leaking. The problem is that such data is as hard to protect as it is to find. Owens & Minor Inc. (www.ownes-minor.com), a $4 billion medical supplies distributor, counts some of the nation’s largest health care organizations among its customers. In late 1996, it started mining data internally using business intelligence software from Business Objects SA. “From the beginning, we were aware of security issues around this strategic information about our operations,” says Don Stoller, senior director of information systems at Owens & Minor. “For example, a sales executive in Dallas should only have access to analyses from his region.” It is always possible that someone who has legitimate access will abuse that trust, but companies can minimize that potential by strictly limiting access to only those who need it. thus, Owens & Minor uses role-level security functions that clearly define who has access to which data. “This meant we had to build a separate security table in our Oracle database,” says Stoller. A few years later, when the company wanted to open its systems to suppliers and customers, security became even more important. In 1998, Owens & Minor moved quickly to take advantage of Web-intelligence software from Business Objects that’s designed to Web-enable business intelligence systems. The result was Wisdom, an extranet Web portal that lets Owens & Minor’s suppliers and customers access their own transactional data and generate sophisticated analyses and reports from it.“It business-to- business transactions, security is key,” says Stoller. “We had to make absolutely sure that Jhonson & Jhonson, for example, could not see any 3M’s information. This meant we had to set up specific customer and supplier security tables, and we had to maintain new, secured database views using the Oracle DBMS and Business Objects.”Wisdom was such a success that Owens & Minor decided to go into the intelligence business with the launch of wisdom2 in the spring of 2000. “We capture data out of a hospital’s materials management system and load it into our data warehouse,” Stoller explains. A hospital can then make full use of its business-intelligence software to mine and analyze purchasing data. Owens & Minor receives a licensing and maintenance fee for the services.Layers of security and encryption require a considerable amount of overhead data for systems administration. Both Stoller and Michael Rasmussen, an analyst at Giga Information Group, say that’s the main reason security concerns about business intelligence are often swept under the carpet. The issues of authentication (identifying the user) and authorization (what things the user is allowed to do) must be addressed, usually across different applications, Rasmussen says, adding, “Systems
  • 5. Examination Paper of Information Technology 5 IIBM Institute of Business Management administration can be a real nightmare.”“We are going through some of this,” says David Merager, director of Web services and corporate applications at Vivendi Universal Games Inc. (www.vugames.com). “Our business intelligence needs more security attention.” Business intelligence reports come from two systems: an Oracle-based for budgets on a Microsoft SQL Server database. The heart of the business intelligence system consists of Microsoft’s OLAP application and software from Comshare Inc. that provides the Web-based front end for the analytics. “Our budget teams use these reports to do real-time analyses,” says Merager. Rodger Sayles, manager of data warehousing at Vivendi Universal, says one way to secure such a system is to assign roles to all users within the Microsoft application. Roles determine precisely what a user is allowed to see and do and are usually managed within a directory. If your computing architecture is amenable to a single, centralized directory that supports roles, this may be an attractive solution. “The problem is that once you have over 40 distinct roles, you run into performance issues, and we have identified about 70 user roles,” Sayles explains. He says there’s way around this difficulty. “I think we are going to use a combination of Web portals and user roles. A user would sign on through a particular Web portal, which would effectively place the user in a role category. This reduces the overhead burden on the application,” says Sayles. 1. Why have developments in IT helped to increase the value of the data resources of many companies? 2. How can companies use IT to meet the challenges of data resources security? END OF SECTION B Section D: Applied Theory (30 marks)  This section consists of Long Questions.  Answer all the questions.  Each question carries 15 marks.  Detailed information should form the part of your answer (Word limit 150 to 200 words). 1. What potential security problems do you see in the increasing use of intranets and extranets in business? What might be done to solve such problems? Give several examples? 2. Suppose you are a manager being asked to develop e-business and e-commerce applications to gain a competitive advantage in an important market for your company. What reservations might you have about doing so? Why? END OF SECTION C
  • 6. Examination Paper of Information Technology 6 IIBM Institute of Business Management IIBM Institute of Business Management Examination Paper MM.100 Database Management Systems Section A: Objective Type (30 marks)  This section consists of Multiple Choice and Short answer type questions.  Answer all the questions.  Part one questions carry 2 marks each & Part Two questions carry 5 marks each. Part One: Multiple choices: 1. The normal language of database is a. PHP b. SQL c. C++ d. Java 2. DDL, a database system language a. Creates table b. Manipulates table c. Cannot work with table d. None 3. Symbol for one to one relationship is……………………………………………………… 4. HDBMS stands for a. Hello DBMS b. Hierarchical DBMS c. Hyper DBMS d. High DBMS 5. In Anti joining of R►S means …………………………………………………………… Part Two: 1. What are “Foreign Keys”?
  • 7. Examination Paper of Information Technology 7 IIBM Institute of Business Management 2. Differentiate between ‘DBMS’ and ‘RDBMS’. 3. Write the syntax to Insert charts into a table from another table. 4. What are ‘Armstrong’s Axioms’. 5. Write short ‘Boyce-Codd Normal Form (BCNF)’. END OF SECTION A. Section B: Long Answers type Questions (40 marks)  This section consists of Long Questions.  Answer all the questions.  Each question carries 15 marks.  Detailed information should form the part of your answer (Word limit 200 to 250 words). 1. Elaborate the testing of Serializability techniques with example. 2. Explain the working of lock manager. 3. What is deadlock? How is a deadlock detected? Enumerate the method for recovery from the deadlock. 4. Explain why a transaction execution should be atomic. Explain ACID properties, considering the following transaction. Ti: read (A); A : = A- 50; Write (A); Read (B); B : = B + 50; Write (B) END OF SECTION B
  • 8. Examination Paper of Information Technology 8 IIBM Institute of Business Management Section C: Applied Theory (30 marks)  This section consists of Long Questions.  Answer all the questions.  Each question carries 15 marks.  Detailed information should form the part of your answer (Word limit 150 to 200 words). 1. The HR manager has decided to raise the salary for all the employees in department number 30 by 0.25. Whenever any such raise is given to the EMPLOYEES, a record for the same is maintained in the EMP-RAISE table. It includes the employee number, the date when the raise was given and the actual raise. Write a PL/SQL block to update the salary of each employee and insert a record in the EMP-RAISE table. 2. Retrieve the salesman name in ‘New Delhi’ whose efforts have resulted into atleast one sales transaction. Table Name : SALES-MAST Salesman-no Name City B0001 B0002 B0003 B0004 B0005 B0006 B0007 Puneet Kumar Pravin Kumar Radha Krishna Brijesh Kumar Tushar Kumar Nitin Kumar Mahesh Kumar Varanasi Varanasi New Delhi New Delhi Allahabad Allahabad Gr. Noida Table Name : SALES-ORDER Order-no Order-date Salesman-no S0001 S0002 S0003 S0004 S0005 S0006 10-Apr-07 28-Apr-07 05-May-07 12-June-07 15-July-07 18-Aug-07 B0001 B0002 B0003 B0004 B0005 B0006 END OF SECTION C S-2-301012