0% found this document useful (0 votes)
50 views

Information Technology & Its Application in Business-M-1 - General

The document contains questions for an exam on information technology and its applications in business. It includes multiple choice questions testing knowledge of topics like data storage, database concepts, computer networks, cyber security, and IT terms. The questions cover both basic concepts and more advanced topics.

Uploaded by

Keshav Pandit
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
50 views

Information Technology & Its Application in Business-M-1 - General

The document contains questions for an exam on information technology and its applications in business. It includes multiple choice questions testing knowledge of topics like data storage, database concepts, computer networks, cyber security, and IT terms. The questions cover both basic concepts and more advanced topics.

Uploaded by

Keshav Pandit
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

U(3rd Sm.)-Information Tech. & Appl. etc.

(1) -G/SEC-3.1 Chg/CBCS

2021
INFORMATION TECHNOLOGY &
ITS APPLICATION IN BUSINESS–M-1 — GENERAL
Paper : SEC-3.1 Chg
Module – 1
Full Marks : 40
Group - A
Answer any five questions. 2×5

1. Which one of the following is an example of information?


(A) Pay-roll (B) Invoice
(C) Marks of candidates (D) All of these.
2. Permanent data is mainly stored in
(A) Temporary File (B) Master File
(C) Cover File (D) Arch File.
3. How many primary keys can be there in a table?
(A) 1 (B) 2 (C) 3 (D) 4.
4. ARPANET was developed for
(A) Commercial Organizations (B) Colleges
(C) Military Communication (D) Rich People.
5. Who invented VIRUS ?
(A) Frederick C. Cohen (B) Frederick B. Cohen
(C) Friedman B. Cohen (D) Frederick B. Cathy.
6. Legal recognition of electronic signatures is defined under which section of the IT Act, 2000?
(A) Section 5 (B) Section 6 (C) Section 4 (D) Section 8
7. XML stands for
(A) Expanded Mark-up Language (B) Extended Mark-up Language
(C) Extended Mark-up Link (D) Expanded Mark-up Link.
8. The objectives of the Information Technology Act, 2000 is/are :
(A) to stop cyber crime
(B) to provide legal recognition to electronic document
(C) to provide facility of filing document online
(D) All of the above.
Please Turn Over
U(3rd Sm.)-Information Tech. & Appl. etc.
-G/SEC-3.1 Chg/CBCS (2)
9. Which virus overwrites the original boot code with infected one?
(A) Trojan Horse (B) Boot sector virus (C) Polymorphic virus (D) Multipartite virus.
10. Most of the organisations use to establish intra-organizational communication.
(A) Wide Area Network (B) Value Added Network
(C) Local Area Network (D) Metropolitan Area Network.

Group - B
Answer any ten questions. 3×10

11. This system makes use of the output generated by Transaction processing system. It refers to which
system?
(A) Management Information System (B) Decision Support System
(C) Office Automation System (D) Transaction Processing System.
12. Which one of the following reports is generated by MIS?
(A) Detailed Report (B) Summary Report
(C) Exception Report (D) All of these.
13. is responsible for the design, construction and maintenance of the database.
(A) Application Programmer (B) End User
(C) Database Administrator (D) File Manager.
14. Audio cassette is an example of
(A) Serial Data Processing System (B) Batch Data Processing System
(C) Centralised Data Processing System (D) Real Time Data Processing System.
15. IP Address is generally written in
(A) Binary numbers (B) Octal numbers
(C) Decimal numbers (D) Hexa Decimal numbers.
16. Each and every Web Page on Web containing resources like documents or data has an unique address
which is called –
(A) Domain Name System (B) World Wide Web
(C) Uniform Resource Locators (D) Hyperlink.
17. Which malicious program monitors activities of users and also personal information of the users?
(A) Virus (B) Worms (C) Adware (D) Spyware.
18. A digital signature shall be used by using
(A) Private key cryptography (B) Public key cryptography
(C) Receiving key cryptography (D) Sending key cryptography.
U(3rd Sm.)-Information Tech. & Appl. etc.
(3) -G/SEC-3.1 Chg/CBCS

19. Stealing of legally protected software is known as


(A) Software piracy (B) Copyright piracy
(C) Phising (D) Morphing.
20. It is like the wall around a castle or city. It refers to
(A) Security (B) Guard (C) Firewall (D) Wall.
21. SEO stands for
(A) Search Engine Optimization (B) Source Engine Optimization
(C) Search Engine Origin (D) Source Engine Optimization.
22. Usually hypertext links are in and .
(A) green, bold (B) blue, underlined (C) red, italics (D) black, left aligned.
23. The different columns of a table in DBMS is known as
(A) Table (B) Tuple (C) Cardinality (D) Attribute.
24. The word redundancy means
(A) Shortage of data (B) Distorted data
(C) Duplication of data (D) Back-up data.
25. An offshoot or sub-system of BPO is
(A) LPO (B) CPO (C) KPO (D) DPO.

You might also like