0% found this document useful (0 votes)
157 views85 pages

Bcom I Sem FIT Practical Record Q & Answers 1 50 ABED Sir

The document contains practical questions and answers for B.Com I Semester students focusing on Fundamentals of Information Technology. It covers various topics such as identifying hardware components, differentiating between system and application software, listing IT applications in finance, and understanding AI, ML, and IoT devices. Each section includes objectives, procedures, observations, results, and conclusions to enhance students' understanding of IT concepts and their applications in business.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
157 views85 pages

Bcom I Sem FIT Practical Record Q & Answers 1 50 ABED Sir

The document contains practical questions and answers for B.Com I Semester students focusing on Fundamentals of Information Technology. It covers various topics such as identifying hardware components, differentiating between system and application software, listing IT applications in finance, and understanding AI, ML, and IoT devices. Each section includes objectives, procedures, observations, results, and conclusions to enhance students' understanding of IT concepts and their applications in business.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 85

B.

Com I Sem – FIT – Practical Questions with Answers


B.Com (Computer Applications) (CBCS)-I Semester

Fundamentals of Information Technology (FIT)


Practical Questions with Answers

1. Identify the hardware components of your lab computer (CPU,


RAM, storage type).

Practical: Identification of Hardware Components of a Computer System


Objective:
To identify and record the key hardware components (CPU, RAM, and storage
type) of the lab computer.
Apparatus/Tools Used:
 Lab computer system
 System Information tool / Task Manager / BIOS / Third-party software
(e.g., CPU-Z, Speccy)
Procedure:
1. Turn on the lab computer and log into the operating system.
2. Open the System Information window (e.g., by pressing Windows + R,
typing msinfo32, and pressing Enter).
3. Note the Processor (CPU) details listed under "System Summary."
4. Check the Installed Physical Memory (RAM) in the same window.
5. To identify the Storage Type, open Task Manager (Ctrl + Shift + Esc),
go to the Performance tab, and select the disk to view whether it is an
HDD or SSD. Alternatively, use third-party software for more detailed
storage information.
Observations:
Component Specification
Processor (CPU) Intel Core i5-10400 @ 2.90GHz
RAM 8 GB DDR4
Storage Type 256 GB SSD (Solid State Drive)

1|Page
B.Com I Sem – FIT – Practical Questions with Answers
Result:
The hardware components of the lab computer were successfully identified. The
system is equipped with an Intel Core i5 processor, 8 GB of DDR4 RAM, and an
SSD for storage.
Conclusion:
This practical helped in understanding how to identify the basic hardware
components of a computer using built-in system tools and third-party utilities.

2. Create a table showing examples of input and output devices


with their business applications.

Practical: Identification of Input and Output Devices with Business


Applications
Objective:
To list various input and output devices along with their respective examples
and business applications.
Apparatus/Tools Used:
 Computer system
 Internet access or textbook for reference
 MS Word / Excel for table creation
Procedure:
1. Understand the definitions of input and output devices.
2. Identify commonly used input and output devices in business
environments.
3. Create a table showing examples of these devices along with their
practical business applications.
Observations:
Device Device Name Business Application
Type
Input Keyboard Used for data entry in accounting software (e.g.,
Tally, ERP)
Input Mouse Used for navigation and graphic design tasks
Input Barcode Used in retail for scanning product information at

2|Page
B.Com I Sem – FIT – Practical Questions with Answers

Scanner checkout
Input Microphone Used for voice input in virtual meetings and
customer support
Input Biometric Used for employee attendance and access
Scanner control
Output Monitor Displays information, dashboards, and reports
Output Printer Used for printing invoices, reports, and official
documents
Output Speakers Used for audio output in presentations and video
calls
Output Projector Used in meetings and conferences for displaying
presentations
Output Plotter Used in engineering firms for printing large
technical drawings
Result:
A comprehensive table of input and output devices was successfully
created along with their corresponding business applications.
Conclusion:
This practical helped in understanding the role of different input and output
devices in various business operations and how they contribute to the efficiency
of work processes.

3. Differentiate between system software and application software


by listing at least 3 installed examples on your PC.

Practical: Differentiation between System Software and Application


Software
Objective:
To understand the difference between system software and application software
by identifying and listing examples of each installed on the lab computer.
Apparatus/Tools Used:
 Lab computer
 System Settings / Control Panel / Installed Programs

3|Page
B.Com I Sem – FIT – Practical Questions with Answers
 Task Manager / File Explorer

Procedure:
1. Log in to the lab computer and open the list of installed programs (via
Control Panel or Settings > Apps).
2. Identify and classify software into two categories: system software and
application software.
3. Note down at least three examples from each category installed on the
system.
4. Prepare a table showing the differences and examples.
Observations:
System Software Application Software
1. Microsoft Windows 10 (Operating 1. Microsoft Word (Word Processing)
System)
2. Device Drivers (e.g., Audio, Display 2. Google Chrome (Web Browser)
drivers)
3. Windows Defender (Security utility) 3. VLC Media Player (Multimedia
Playback)
Differences Between System Software and Application Software:
Criteria System Software Application Software
Purpose Manages and controls hardware Performs specific user-
and system operations oriented tasks
Dependency Works independently and is Depends on system
essential for system operation software to run
Examples Windows OS, Drivers, Antivirus MS Word, Excel, Chrome,
tools VLC Player
User Low-level interaction, mostly in High-level interaction for
Interaction the background performing tasks
Installation Comes pre-installed or required Installed based on user
during OS installation needs
Result:
Three examples each of system software and application software were

4|Page
B.Com I Sem – FIT – Practical Questions with Answers
successfully identified and the differences between the two were clearly
understood and tabulated.

Conclusion:
This practical provided clarity on how system software is essential for running
the computer and managing its resources, while application software helps users
perform specific tasks like document editing, browsing, and media playback.

4. List IT applications in one functional area (Finance, HR, Marketing,


or SCM) using a table.

Practical: Listing IT Applications in One Functional Area


Objective:
To identify and list Information Technology (IT) applications used in one specific
business functional area using a tabular format. The chosen area for this
practical is Finance.
Apparatus/Tools Used:
 Lab computer
 Internet / Reference books
 MS Word or Excel for tabular documentation
Procedure:
1. Select one functional area of a business – in this case, Finance.
2. Research and identify various IT applications used in financial operations.
3. Record the name, purpose, and usage of each application in a table
format.
4. Analyze how each application supports financial functions in a business.
Observations:
IT Application Purpose Usage in Finance
Name
Tally ERP Accounting and financial Used for managing ledgers,
management vouchers, payroll, and inventory
SAP FICO Financial accounting and Used for financial reporting, asset
controlling module management, and cost control

5|Page
B.Com I Sem – FIT – Practical Questions with Answers

QuickBooks Business accounting Used by small to mid-sized firms


software for invoicing and bookkeeping
Oracle Enterprise financial Handles financial planning, risk
Financials management management, and compliance
Microsoft Excel Data analysis and Used for budgeting, forecasting,
reporting tool and creating financial reports
Result:
A list of commonly used IT applications in the Finance functional area was
successfully created, showing how technology supports financial operations in
various types of businesses.
Conclusion:
This practical demonstrated that IT applications play a crucial role in
streamlining financial activities such as accounting, reporting, budgeting, and
compliance. Choosing the right tools increases efficiency, accuracy, and decision-
making capabilities in the finance department.

5. Identify and document the full Operating System (OS) details of


your lab computer, including Name, Version, and Architecture.

Practical: Identification of Operating System (OS) Details


Objective:
To identify and document the complete Operating System (OS) information of
the lab computer, including the OS Name, Version, and System Architecture.
Apparatus/Tools Used:
 Lab Computer
 System Information Tool (msinfo32)
 Settings > System > About
 Command Prompt (optional)
Procedure:
1. Turn on the lab computer and log into the system.
2. Press Windows + R to open the Run dialog box, type msinfo32, and press
Enter to open the System Information window.
3. Alternatively, go to Settings > System > About to view basic OS
details.

6|Page
B.Com I Sem – FIT – Practical Questions with Answers
4. Note down the OS Name, Version, and System Type (Architecture)
from the displayed information.
5. Optionally, open Command Prompt and type systeminfo to view detailed
OS specifications.

Observations:
OS Detail Information
Operating System Name Microsoft Windows 10 Pro
Version 22H2 (Build 19045.3448)
System Architecture 64-bit Operating System, x64-based CPU
(Note: Replace the values above with the actual specifications of your lab
computer if they differ.)
Result:
The complete Operating System details of the lab computer were successfully
identified and documented, including the name, version, and architecture.
Conclusion:
This practical helped in understanding how to access and interpret the technical
details of the installed Operating System. Knowing the OS version and
architecture is essential for installing compatible software and drivers, as well as
for troubleshooting.

6. Prepare a table showing AI and ML applications in different


sectors (e.g., HR recruitment bots, Finance-fraud detection).

Practical: AI and ML Applications in Different Sectors


Objective:
To identify and document various applications of Artificial Intelligence (AI) and
Machine Learning (ML) across different business sectors using a tabular format.
Apparatus/Tools Used:
 Lab Computer
 Internet / Reference materials on AI and ML
 MS Word or Excel for table preparation
Procedure:

7|Page
B.Com I Sem – FIT – Practical Questions with Answers
1. Understand the concepts of AI (Artificial Intelligence) and ML (Machine
Learning).
2. Research various industries where AI and ML are applied.
3. Note down specific applications used in different sectors and
their purposes.
4. Record the findings in a clear tabular format.
Observations:
Sector AI/ML Application Purpose / Use Case
Human AI Chatbots for Automates screening and
Resources Recruitment shortlisting of job candidates
Finance Fraud Detection Systems Detects suspicious transactions
using machine learning algorithms
Healthcare AI Diagnostics Tools Assists doctors in identifying
diseases from medical images
Retail Customer Recommends products based on
Recommendation user behavior and preferences
Systems
Manufacturing Predictive Maintenance Predicts machine failures to
prevent downtime
Education Intelligent Tutoring Adapts learning content based on
Systems student performance
Marketing AI-Powered Ad Targeting Delivers personalized ads based
on customer data
Transportation Self-driving Vehicles Uses AI to control autonomous
navigation and decision-making
Result:
A table showcasing AI and ML applications across various sectors was
successfully created, demonstrating the growing impact of these technologies
in real-world business scenarios.
Conclusion:
This practical provided valuable insight into how AI and ML are revolutionizing
different industries by automating tasks, improving decision-making, and

8|Page
B.Com I Sem – FIT – Practical Questions with Answers
enhancing customer experiences. Understanding these applications is essential
for leveraging emerging technologies in modern business environments.

7. List 5 IoT devices used in business (e.g., smart POS, RFID systems).
Mention their function and benefit.

Practical: Identification of IoT Devices Used in Business


Objective:
To identify and document five commonly used Internet of Things (IoT) devices in
business environments, along with their functions and benefits.
Apparatus/Tools Used:
 Lab computer
 Internet access for research
 Word processing software (MS Word/Excel) for documentation
Procedure:
1. Understand the concept of IoT (Internet of Things) — devices connected
to the internet that collect, send, and receive data.
2. Research business environments to identify IoT devices currently in use.
3. List at least five devices along with their functions and business benefits.
4. Document the information in a tabular format for clarity.
Observations:
IoT Device Function Business Benefit
Smart POS Processes payments and Speeds up transactions,
Systems collects sales data in real- enhances customer
time experience
RFID Systems Tracks inventory through Improves inventory
radio frequency accuracy and reduces
identification manual tracking
Smart Controls office/store Saves energy and reduces
Thermostats temperature based utility costs
on
usage patterns
Connected Monitors premises remotely Enhances security and
Security Cameras and records security footage allows 24/7 surveillance

9|Page
B.Com I Sem – FIT – Practical Questions with Answers

IoT-enabled Fleet Tracks location, speed, and Improves logistics efficiency


Trackers status of delivery vehicles and ensures timely delivery

Result:
Five IoT devices used in businesses were identified and documented
successfully, along with their key functions and the benefits they provide to
operations.
Conclusion:
This practical enhanced understanding of how IoT devices play a crucial role in
modern business operations—optimizing efficiency, improving data accuracy,
and enabling smarter decision-making through real-time connectivity and
automation.

8. Identify different types of storage (RAM, ROM, SSD, HDD,


Cloud). Create a comparison table based on speed, cost, and
capacity.

Practical: Comparison of Different Types of Storage Devices


Objective:
To identify various types of storage used in computing (RAM, ROM, SSD, HDD,
and Cloud Storage) and compare them based on speed, cost, and capacity.
Apparatus/Tools Used:
 Lab computer
 Internet / Reference materials
 Word Processor (MS Word/Excel) for table preparation
Procedure:
1. Study the basic concepts of computer storage – primary and secondary
storage.
2. Identify five common types: RAM, ROM, SSD, HDD, and Cloud Storage.
3. Compare these storage types based on three criteria: speed, cost, and
capacity.
4. Organize the findings in a comparative table for clarity.

10 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
Observations:
Storage Type Speed Cost (per GB) Typical
Capacity
RAM Very High (Fastest) High 4 GB to 64 GB
ROM High (Read-only) Low A few MBs to
GBs
SSD High Medium to High 128 GB to 2 TB
HDD Moderate Low 500 GB to 10 TB
Cloud Depends on Internet Subscription- Virtually
Storage speed based Unlimited
Note: Actual performance and pricing may vary based on brand, model, and market
trends.
Result:
Five types of storage devices were successfully identified and compared. The
comparison helped understand the trade-offs between speed, cost, and capacity
for each type of storage.
Conclusion:
This practical provided insight into how different storage devices serve specific
purposes in a computer system. RAM and SSD offer speed, HDD and Cloud
provide large storage at a lower cost, while ROM is essential for system startup
and firmware storage. Choosing the right storage depends on system needs,
performance requirements, and budget.

9. Prepare a dos and don'ts checklist for digital privacy & security in
lab use.

Practical: Preparing a Do’s and Don’ts Checklist for Digital Privacy &
Security in Lab Use
Objective:
To understand and document best practices for maintaining digital privacy and
security while using computer systems in a lab environment.
Apparatus/Tools Used:
 Lab Computer

11 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
 Internet for reference
 Text editor (MS Word/Excel)
Procedure:
1. Understand key aspects of digital privacy and security, such as password
protection, safe browsing, and data handling.
2. Identify actions that promote safety (Do’s) and actions that compromise
security (Don’ts).
3. Create a clear checklist format to serve as a reference for all lab users.
Observations:
Do’s Don’ts
Use strong, unique passwords for your Do not share your passwords with
accounts others
Log out of all accounts before leaving Do not leave your computer unlocked
the computer or unattended
Keep antivirus and security software Do not disable security settings or
updated firewalls
Only visit trusted websites and Do not click on unknown links or
download from safe sources download suspicious files
Report suspicious activity or security Do not ignore system alerts or
breaches warnings
Use incognito/private mode for Do not save personal passwords on
sensitive browsing public/shared computers
Backup important data regularly Do not store sensitive data on
unsecured devices or drives
Result:
A comprehensive checklist of digital privacy and security practices was successfully
prepared, providing clear guidance on what to do and what to avoid when using
lab systems.
Conclusion:
This practical highlighted the importance of responsible behavior in maintaining
digital security and privacy in a shared lab environment. Following these do’s
and don’ts helps prevent data breaches, malware infections, and unauthorized
access.

12 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
10. Convert decimal numbers (e.g., 25, 64, 128) into the
binary system.
Practical: Converting Decimal Numbers into the Binary System
Objective:
To convert given decimal numbers into their equivalent binary form using the
division-by-2 method.
Apparatus/Tools Used:
 Lab Computer (optional)
 Calculator / Pen and Paper
 Knowledge of number systems
Procedure:
1. Understand that binary is a base-2 number system using only 0s and 1s.
2. Use the division-by-2 method to convert a decimal number into binary:
o Divide the decimal number by 2
o Write down the remainder
o Repeat the process with the quotient until the quotient becomes 0
o The binary number is obtained by reading the remainders in
reverse order

Observations and Conversions:


Decimal Number Binary Conversion Steps Binary Equivalent
25 25 ÷ 2 = 12, remainder = 1 11001
12 ÷ 2 = 6, remainder = 0
6 ÷ 2 = 3, remainder = 0
3 ÷ 2 = 1, remainder = 1
1 ÷ 2 = 0, remainder = 1

64 64 ÷ 2 = 32, remainder = 0 1000000


32 ÷ 2 = 16, remainder = 0
16 ÷ 2 = 8, remainder = 0
8 ÷ 2 = 4, remainder = 0
4 ÷ 2 = 2, remainder = 0
2 ÷ 2 = 1, remainder = 0
1 ÷ 2 = 0, remainder = 1

13 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers

128 128 ÷ 2 = 64, remainder = 0 10000000


64 ÷ 2 = 32, remainder = 0
32 ÷ 2 = 16, remainder = 0
16 ÷ 2 = 8, remainder = 0
8 ÷ 2 = 4, remainder = 0
4 ÷ 2 = 2, remainder = 0
2 ÷ 2 = 1, remainder = 0
1 ÷ 2 = 0, remainder = 1

Result:
The given decimal numbers (25, 64, and 128) were successfully converted into
their binary equivalents using the division method.
Conclusion:
This practical helped in understanding the process of converting decimal
numbers into binary, which is fundamental in computer systems and digital
electronics, as binary is the core language of computers.

11. Create a table listing different types of Intellectual Property (IP)-


Patent, Copyright, Trademark, and Trade Secret-with one real-
world business example for each.

Practical: Listing Different Types of Intellectual Property (IP) with Real-


World Business Examples
Objective:
To identify and document different types of Intellectual Property (IP) along with
real-world examples from businesses for each type.
Apparatus/Tools Used:
 Lab computer
 Internet or textbooks for research
 MS Word or Excel for table preparation
Procedure:
1. Study the definitions and characteristics of different types of Intellectual
Property: Patent, Copyright, Trademark, and Trade Secret.

14 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
2. Research and find real-world business examples that illustrate each type
of IP.
3. Prepare a clear table listing the types of IP alongside the examples and
brief descriptions.
Observations:
Type of Definition Real-World Description
Intellectual Business
Property Example
Patent Legal protection granted Tesla, Inc. Tesla holds patents for
for an invention or its electric vehicle
process battery
technology

Copyright Protection of original Microsoft Copyright protects


creative works (books, Windows OS and
music, software) Office software
products

Trademark A symbol, word, or phraseNike The “Swoosh” logo is a


legally registered to registered trademark
represent symbol
a company or product

Trade Secret Confidential business Coca-Cola The recipe of Coca- Cola


information that Company is a well- guarded
provides competitive trade secret
advantage

Result:
A table listing the four main types of Intellectual Property with corresponding
real-world business examples was successfully created.
Conclusion:
This practical helped in understanding the significance of Intellectual Property rights
and how businesses use patents, copyrights, trademarks, and trade secrets to
protect their innovations, branding, and competitive advantages.

15 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
12. Prepare a short Word document or PowerPoint slide
explaining how digital businesses protect their intellectual
property (e.g.. software licensing, watermarking, copyright
notices).

Practical: Methods Digital Businesses Use to Protect Their Intellectual


Property
Objective:
To understand and explain common techniques digital businesses use to
safeguard their intellectual property (IP).
Apparatus/Tools Used:
 Lab computer
 Internet research
 MS Word / PowerPoint for documentation
Procedure:
1. Research how digital businesses protect their software, digital content,
and branding from unauthorized use or copying.
2. Identify key protection methods such as software licensing, watermarking,
and copyright notices.
3. Summarize these methods clearly for documentation or presentation.

Explanation: How Digital Businesses Protect Their Intellectual Property


1. Software Licensing:
 Digital businesses distribute their software under specific licensing
agreements that define how the software can be used, copied, or shared.
 Licensing controls access and usage rights, preventing illegal copying
or distribution.
 Examples include proprietary licenses, open-source licenses, and
subscription models.
2. Watermarking:
 Digital watermarking involves embedding invisible or visible marks in
digital content such as images, videos, or documents.
 Watermarks help trace ownership and discourage unauthorized copying
or distribution.
 Common in stock photography, digital media, and ebooks.

16 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers

3. Copyright Notices:
 Businesses display copyright symbols (©), along with the year and
owner’s name, on digital products to assert legal ownership.
 Copyright notices inform users of protected content and the
consequences of infringement.
 This helps deter unauthorized use and supports legal enforcement
if violations occur.
4. Additional Methods (Optional):
 Digital Rights Management (DRM): Controls and restricts how
digital content is accessed or copied.
 Encryption: Protects software and data by encoding them to
prevent unauthorized access.
 Patents and Trademarks: Legally protect unique inventions and
brand identifiers in the digital space.

Result:
The key methods digital businesses use to protect their intellectual property
were identified and explained, providing a clear understanding of how IP
protection works in the digital economy.
Conclusion:
This practical clarified that protecting intellectual property is crucial for digital
businesses to maintain their competitive edge, prevent piracy, and secure
revenue. Employing legal and technological safeguards helps ensure content and
software are used only as intended.

You can use this for your Word document or PowerPoint slide:

Title: Protecting Intellectual Property in Digital Businesses


Slide 1 / Document Introduction:
 Importance of Intellectual Property (IP) protection in digital businesses.

17 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
Slide 2 / Main Content:
Protection Description
Method
Software Defines usage rights; prevents illegal copying or sharing
Licensing through licensing agreements.
Watermarking Embeds marks in digital content to identify ownership and
discourage unauthorized use.
Copyright Displays © symbol and owner info to assert legal ownership
Notices and warn against infringement.
Additional DRM, encryption, patents, and trademarks provide further
Methods protection and control over digital assets.

13. Create a database-like table in Excel with these columns: Emp_ID,


Name, Dept, DOJ, Salary.
Emp IDName Dept DOJ Salary
101 Arjun HR 01-01-24 50000
102 Meena Finance 15-02-24 60000
103 Kiran Sales 12-03-24 45000
104 Neha IT 25-04-24 70000

Practical: Creating a Database-Like Table in Excel Objective:


To create and format a structured database-like table in Microsoft Excel with
specific columns and employee data.
Apparatus/Tools Used:
 Lab computer with Microsoft Excel installed
 Employee data for input
Procedure:
1. Open Microsoft Excel on the lab computer.
2. Create a new blank worksheet.
3. In the first row, enter the column headers as follows: Emp_ID, Name,
Dept, DOJ, and Salary.

18 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
4. Starting from the second row, enter the employee data as given:
o Emp_ID: 101, Name: Arjun, Dept: HR, DOJ: 01-01-24, Salary:
50000
o Emp_ID: 102, Name: Meena, Dept: Finance, DOJ: 15-02-24,
Salary: 60000
o Emp_ID: 103, Name: Kiran, Dept: Sales, DOJ: 12-03-24, Salary:
45000
o Emp_ID: 104, Name: Neha, Dept: IT, DOJ: 25-04-24, Salary:
70000
5. Format the DOJ column to display dates correctly (e.g., dd-mm-yy).
6. Format the Salary column as currency or number without decimals for
clarity.
7. Optionally, use Excel Table feature (Ctrl + T) to convert the data into a
table for easier sorting and filtering.
8. Save the workbook with an appropriate file name (e.g.,
EmployeeDatabase.xlsx).

Observations:
Emp_IDName Dept DOJ Salary
101 Arjun HR 01-01-24 50,000
102 Meena Finance 15-02-24 60,000
103 Kiran Sales 12-03-24 45,000
104 Neha IT 25-04-24 70,000

Result:
A database-like table was successfully created in Excel with proper column
headings and formatted data entries. The table can now be used for data
management, sorting, and analysis.
Conclusion:
This practical demonstrated how to organize and manage data in a tabular format
using Excel, a fundamental skill in business and IT environments. Using Excel
tables improves data handling efficiency and accuracy.

19 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
If you want, I can help you create an Excel file with this table that you can
download and use directly. Would you like me to prepare that?

14.Apply sorting (Salary high-low) for the above dataset.

Practical: Applying Sorting (Salary High to Low) on Employee Data in


Excel
Objective:
To apply sorting on the employee dataset in Excel based on the Salary column
in descending order (highest to lowest).
Apparatus/Tools Used:
 Lab computer with Microsoft Excel
 Previously created employee dataset
Procedure:
1. Open the Excel workbook containing the employee database table.
2. Select any cell within the table.
3. Go to the Data tab on the Excel ribbon.
4. Click on the Sort button to open the Sort dialog box.
5. In the dialog box, choose Salary as the column to sort by.
6. Select Largest to Smallest to sort salaries from high to low.
7. Click OK to apply the sorting.
8. Verify that the entire table is sorted correctly, with employees listed from
the highest salary to the lowest.

Sorted Data:
Emp_ID Name Dept DOJ Salary
104 Neha IT 25-04-24 70,000
102 Meena Finance 15-02-24 60,000
101 Arjun HR 01-01-24 50,000
103 Kiran Sales 12-03-24 45,000

20 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
Result:
The employee data was successfully sorted in descending order based on the
Salary column. Neha, with the highest salary of 70,000, appears at the top, and
Kiran with the lowest salary of 45,000 appears at the bottom.
Conclusion:
Sorting data in Excel is a crucial operation that helps analyze datasets efficiently.
Sorting by salary from high to low allows businesses to quickly identify top
earners or focus on salary-based decisions.

15. Apply filtering (Dept - Sales) for the above dataset.

Practical: Applying Filtering (Department - Sales) on Employee Data in


Excel
Objective:
To apply a filter in Excel to display only the employees who belong to the Sales
department from the existing dataset.
Apparatus/Tools Used:
 Lab computer with Microsoft Excel
 Employee dataset (previously created and sorted)
Procedure:
1. Open the Excel workbook containing the employee data table.
2. Click on any cell within the table to activate it.
3. Go to the Data tab on the Excel ribbon.
4. Click on Filter. Small dropdown arrows will appear on each column
header.
5. Click on the dropdown arrow in the Dept (Department) column.
6. Uncheck Select All, then check only Sales.
7. Click OK to apply the filter.
8. Excel will now display only the records where the department is Sales.

Filtered Data (Dept - Sales):


Emp_ID Name Dept DOJ Salary
103 Kiran Sales 12-03-24 45,000

21 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
Result:
Filtering was successfully applied to display only the employee(s) from the Sales
department. In this case, only Kiran appears in the filtered view.
Conclusion:
This practical demonstrated how filtering in Excel helps extract specific data
from a large dataset. Filtering by department is useful in HR, payroll, or
departmental reporting to focus on particular employee groups.

16. Demonstrate data types: Enter salary as text vs number and


check the difference in calculations.

Practical: Demonstrating Data Types in Excel – Salary as Text vs Number


Objective:
To understand how Excel handles different data types—specifically the
difference between text and number—by entering salary data in both formats
and observing the impact on calculations.

Apparatus/Tools Used:
 Lab Computer with Microsoft Excel
 Employee salary dataset
 Basic Excel functions (e.g., SUM)

Procedure:
1. Open a new Excel worksheet.
2. Create a table with two columns:
o Column A: Salary as Number
o Column B: Salary as Text
3. In Column A, enter numeric salary values (e.g., 50000, 60000).
4. In Column B, enter the same values but as text (e.g., by placing an
apostrophe ' before the number or formatting the cell as “Text”).
5. Use the =SUM() function on both columns and compare the results.

22 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
Observations:
Salary as Number Salary as Text
50000 '50000
60000 '60000
45000 '45000
Calculations:
 =SUM(A2:A4) ➝ 155000 (Correct total)
 =SUM(B2:B4) ➝ 0 or Error (Text values are ignored in calculation)

Result:
Excel successfully calculated the total when salary values were entered as
numbers. However, when the same values were entered as text, Excel did not
include them in the total.

Conclusion:
This practical clearly demonstrates that Excel treats text and numbers
differently.
 Numeric data types are required for any arithmetic operation (e.g.,
addition, average).
 If numeric-looking data is stored as text, it will not work correctly in
calculations, leading to errors or incorrect results.
Understanding data types is essential for ensuring accurate data analysis
and avoiding calculation mistakes.

17. Create a chart (bar/pie) showing department-wise average salary


for the same dataset.

Practical: Creating a Chart Showing Department-wise Average Salary


Objective:
To calculate the average salary for each department in the given dataset and
visualize the results using a bar chart or pie chart in Microsoft Excel.

Apparatus/Tools Used:

23 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
 Lab Computer with Microsoft Excel
 Employee Salary Dataset
 Excel Chart Tools

Procedure:
1. Open the existing Excel file with the employee data.
2. Ensure the data includes the following columns: Dept and Salary.
3. Use the AVERAGEIF function to calculate average salary for each
department.
Example formula:
=AVERAGEIF(B2:B5, "HR", C2:C5)
4. Create a new summary table with unique department names and their
average salaries.
5. Select this summary table.
6. Go to Insert > Chart, and choose either:
o Bar Chart – for clear comparison
o Pie Chart – for proportional representation
7. Add appropriate chart title, axis labels (for bar chart), and data labels.

Sample Dataset:
Emp_ID Name Dept DOJ Salary
101 Arjun HR 01-01-24 50000
102 Meena Finance 15-02-24 60000
103 Kiran Sales 12-03-24 45000
104 Neha IT 25-04-24 70000

Step 1 – Average Salary per Department (Summary Table):


Department Average Salary
HR 50000
Finance 60000
Sales 45000
IT 70000

24 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
Step 2 – Create a Bar Chart or Pie Chart Using This Summary
(Bar Chart Example):
Y-axis (Salary)
|
|
| ⬛
| ⬛ ⬛
| ⬛ ⬛ ⬛
| ⬛ ⬛ ⬛ ⬛
| | | | | X-axis (Departments)
HR Finance Sales IT

Result:
A bar chart (or pie chart) was successfully created showing the average salary
for each department. The IT department had the highest average salary, and
Sales had the lowest.

Conclusion:
This practical helped in visualizing numeric data (average salary) using Excel’s
chart tools. Charts enhance data understanding by presenting trends and
comparisons in a visually effective way, useful in business reports and decision-
making.

18. Convert data types and observe calculation errors for


mismatched values (numeric vs text).

Practical: Convert Data Types and Observe Calculation Errors for


Mismatched Values (Numeric vs Text)
Objective:
To understand how mismatched data types (text vs number) in Excel affect
calculations and how to identify and correct these errors.

25 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
Apparatus/Tools Used:
 Lab computer with Microsoft Excel
 Sample dataset with mixed data types
 Excel functions (SUM, VALUE, ISTEXT, ISNUMBER)

Procedure:
1. Open a new Excel worksheet.
2. Enter salary values in two columns:
o Column A (valid numeric values)
o Column B (values formatted or entered as text)
3. Apply the SUM() function to both columns and compare the results.
4. Use Excel’s ISTEXT() and ISNUMBER() functions to check the data type of
each cell.
5. Attempt to convert text-formatted numbers to numeric using VALUE() or
by reformatting the cells.
6. Recalculate and compare the corrected results.

Sample Dataset:
Salary (Number) Salary (Text)
50000 '50000
60000 '60000
45000 '45000
(Note: A leading apostrophe ‘ makes the value text in Excel.)

Step-by-Step Calculations:
 =SUM(A2:A4) → ◻ 155000 (Correct calculation with numbers)
 =SUM(B2:B4) → ◻ 0 or incorrect (Text values ignored in summation)

Error Identification:
 =ISTEXT(B2) → ◻ TRUE
 =ISNUMBER(B2) → ◻ FALSE
 =VALUE(B2) → ◻ Converts to number (50000)

26 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers

Correcting Text to Number:


 Select Column B → Format Cells → Number
 Or use formula: =VALUE(B2) → Place result in a new column
 Recalculate with =SUM(C2:C4) for corrected results.

Result:
Mismatched data types caused calculation errors. Text values that looked like
numbers were ignored in formulas. After converting them properly to numeric
values, Excel performed the calculations correctly.

Conclusion:
This practical shows the importance of consistent data types in Excel. Even
though text may look like a number, Excel will not treat it as numeric unless it's
formatted or converted properly. Knowing how to identify and fix these issues
ensures accuracy in calculations and reports.

19. Create an Excel sheet with sales data and calculate the total -
Qty Price.
Emp ID Name Dept DOJ Salary
101 Arjun HR 01-01-24 50000
102 Meena Finance 15-02-24 60000
103 Kiran Sales 12-03-24 45000
104 Neha IT 25-04-24 70000

Practical: Create an Excel Sheet with Sales Data and Calculate Total (Qty
× Price)
Objective:
To create a sales data table in Excel using employee information and perform a
calculation for Total Sales using quantity and price.

27 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
Apparatus/Tools Used:
 Lab computer with Microsoft Excel
 Basic knowledge of Excel formulas
 Sample employee and sales data

Procedure:
1. Open Microsoft Excel and create a new worksheet.
2. Enter the given employee data in columns: Emp ID, Name, Dept, DOJ,
Salary.
3. Add new columns for Qty (Quantity Sold) and Price per Unit.
4. Insert a formula in a new column (Total) to multiply Quantity and Price:
o =Qty * Price
o Example: =F2 * G2
5. Apply the formula to all rows.
6. Use =SUM() to calculate the Total Sales at the bottom of the column.

Sample Excel Table:


Emp Name Dept DOJ Salary Qty Price Total (Qty ×
ID Price)
101 Arjun HR 01-01- 50000 10 100 1000
2024
102 Meena Finance 15-02- 60000 5 200 1000
2024
103 Kiran Sales 12-03- 45000 8 150 1200
2024
104 Neha IT 25-04- 70000 4 300 1200
2024
Formula in Total column (H2):
=F2*G2
Grand Total (Total Sales):
=SUM(H2:H5) → 4400

28 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
Result:
The sales data was entered successfully, and the total sales amount for each
employee was calculated using the formula Qty × Price. The final total sales
across all employees amounted to 4400.

Conclusion:
This practical demonstrated the use of formulas in Excel for basic arithmetic
operations. Using Qty × Price and the SUM() function, we can easily compute
and analyze sales data, which is a common task in business reporting.

20. Apply the SUM and AVERAGE functions to calculate the total
and mean price.

Practical: Applying SUM and AVERAGE Functions in Excel (Total & Mean
Price)
Objective:
To use Excel’s built-in functions — SUM and AVERAGE — to calculate the total
price and average price from the sales data.

Apparatus/Tools Used:
 Lab computer with Microsoft Excel
 Previously created sales data table
 Excel formula bar

Procedure:
1. Open the Excel sheet that contains the sales data with Price column.
2. Select a blank cell below the Price column to calculate the total price.
3. Use the =SUM() function to add all the prices:
o Example: =SUM(G2:G5)
4. In another blank cell, apply the =AVERAGE() function to find the mean
price:
o Example: =AVERAGE(G2:G5)
5. Press Enter after each formula to see the result.
6. Label the cells appropriately for clarity (e.g., Total Price, Average Price).

29 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers

Sample Data (Price Column Only):


Price ( ₹)

100

200

150

300

Calculations:
 Total Price:
=SUM(G2:G5) → 750
 Average Price:
=AVERAGE(G2:G5) → 187.5

Result:
The total of all prices was calculated as ₹7 50, and the average price was found to
be ₹1 87.5 using Excel’s SUM and AVERAGE functions.

Conclusion:
This practical demonstrated how to perform basic statistical calculations in Excel.
The SUM() function adds numeric values, while AVERAGE() computes the mean.
These functions are essential for financial analysis, budgeting, and reporting in
business applications.

21. Use IF to check if Total> 20,000-"High Sale" else "Low Sale."

Practical: Using IF Function in Excel to Classify Sales as "High Sale" or


"Low Sale"
Objective:
To use the IF function in Microsoft Excel to evaluate sales performance. If the Total
Sales amount is greater than ₹20,000, it should display "High Sale"; otherwise,
it should display "Low Sale".

30 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
Apparatus/Tools Used:
 Lab Computer with Microsoft Excel
 Sales data including the Total (Qty × Price) column
 Excel’s built-in IF function

Procedure:
1. Open the existing Excel sheet that contains the sales data with a Total
column.
2. Add a new column header titled Sales Status (e.g., in Column I).
3. In the first cell under Sales Status (e.g., I2), enter the following formula:
4. =IF(H2>20000, "High Sale", "Low Sale")
Here, H2 refers to the Total Sales amount of the first row.
5. Press Enter.
6. Drag the fill handle down to apply the formula to the remaining rows.
7. Observe the result — each row will now display High Sale or Low Sale
based on the value in the Total column.

Sample Data Table (Including Sales Status):


Emp ID Name Dept Qty Price Total (Qty × Price) Sales Status
101 Arjun HR 10 100 1000 Low Sale
102 Meena Finance 5 200 1000 Low Sale
103 Kiran Sales 8 150 1200 Low Sale
104 Neha IT 4 300 1200 Low Sale

In this example, all Total values are below 20,000, so the output is "Low Sale"
for all rows. If any total exceeds 20,000, the output will be "High Sale" for that
row.

Result:
The IF function was successfully used to categorize each sale as either "High
Sale" or "Low Sale", based on whether the Total Sales value exceeded
₹20,000.

31 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
Conclusion:
This practical demonstrated how Excel’s IF function helps in decision-making
tasks. It is a powerful tool for adding logic to your spreadsheet, enabling
automatic classification, risk flagging, or performance analysis.

22. Create a VLOOKUP formula to search product details by Prod ID.

Practical: Using VLOOKUP to Search Product Details by Product ID in


Excel
Objective:
To learn how to use the VLOOKUP function in Excel to search for product details
based on a given Product ID (Prod ID).

Apparatus/Tools Used:
 Lab computer with Microsoft Excel
 Product dataset (including Prod ID, Name, Category, Price)
 Excel’s VLOOKUP function

Procedure:
1. Open a new Excel worksheet.
2. Create a sample product table (lookup table) with the following columns:
o Prod_ID, Product_Name, Category, Price
3. In another cell, create an input field to enter a Prod ID to search.
4. Use the VLOOKUP function to retrieve product details based on that ID.

Step 1 – Sample Product Table (A1:D5):


Prod_ID Product_Name Category Price ( ₹)
P101 Keyboard Electronics 700
P102 Mouse Electronics 400
P103 Printer Office 5000
P104 Chair Furniture 2500

32 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
Step 2 – Search Input & VLOOKUP Formula:
Search Prod_ID: P102

In a new cell (e.g., G3), use the following formula to find the Product Name of
P102:
=VLOOKUP(G2, A2:D5, 2, FALSE)
Explanation of the formula:
 G2: Cell containing the Prod_ID to search
 A2:D5: The lookup table range
 2: Column index number for Product_Name in the table
 FALSE: Exact match required
You can repeat similar formulas to get other details like Category or Price:
 Category: =VLOOKUP(G2, A2:D5, 3, FALSE)
 Price: =VLOOKUP(G2, A2:D5, 4, FALSE)

Result:
 When the user enters P102 in the search box (G2), the VLOOKUP formula
returns:
o Product Name: Mouse
o Category: Electronics
o Price: ₹400

Conclusion:
This practical successfully demonstrated how the VLOOKUP function can be
used to search and retrieve specific data based on a unique identifier like
Product ID. It is widely used in inventory systems, sales reports, and business
analysis to automate lookups and improve data efficiency.

23. Create a Pivot Table summarising total sales by product.

Practical: Creating a Pivot Table to Summarise Total Sales by Product in


Excel

33 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
Objective:
To create and use a Pivot Table in Microsoft Excel that summarizes Total Sales
grouped by each Product.

Apparatus/Tools Used:
 Lab computer with Microsoft Excel
 Sample sales dataset (including Product Name, Quantity, Price, and Total)
 Excel’s Pivot Table feature

Procedure:
1. Open Excel and enter or open the sales dataset containing columns
such as:
o Product Name, Quantity, Price, Total Sales (Qty × Price)
2. Ensure the data is organized in tabular format without blank rows or
columns.
3. Select the entire dataset.
4. Go to the Insert tab and click PivotTable.
5. Choose whether to place the Pivot Table in a new worksheet or the
existing one.
6. In the Pivot Table Field List:
o Drag Product Name to the Rows area.
o Drag Total Sales to the Values area (it will automatically use
SUM).
7. The Pivot Table will now display the total sales for each product.

Sample Sales Data Table:


Product Name Quantity Price ( ₹) Total Sales ( ₹)
Keyboard 10 700 7000
Mouse 15 400 6000
Printer 2 5000 10000
Keyboard 5 700 3500
Mouse 10 400 4000

34 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
Pivot Table Output (Summarised):
Product Name Total Sales ( ₹)
Keyboard 10,500
Mouse 10,000
Printer 10,000
Grand Total 30,500

Result:
A Pivot Table was successfully created to summarize the total sales amount for
each product. The Keyboard and Printer both contributed ₹10,000 or more
in sales, and the Grand Total was ₹30,500.

Conclusion:
This practical demonstrated how to use Excel’s Pivot Table feature to quickly
analyze and summarize large datasets. Pivot Tables allow users to group, sort,
and total data efficiently, making them essential tools in business analytics and
reporting.

24. Create a chart (column chart) of sales by product.

Practical: Creating a Column Chart to Visualize Sales by Product in


Excel Objective:
To create a column chart in Microsoft Excel that visually represents total sales
by product, using sales data.

Apparatus/Tools Used:
 Lab computer with Microsoft Excel
 Product-wise sales dataset
 Excel Chart Tools (Insert → Charts)

Procedure:
1. Open the Excel file containing product-wise sales data.
2. Ensure the data includes two columns:

35 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
o Product Name
o Total Sales
3. Select the range of cells containing this data (including headers).
o Example: A1:B4
4. Go to the Insert tab on the ribbon.
5. In the Charts group, select Insert Column or Bar Chart → Choose
Clustered Column.
6. A column chart will appear on the worksheet.
7. Add chart elements:
o Chart Title: “Sales by Product”
o Axis Titles: X-axis = Product Name, Y-axis = Total Sales (₹)
o Enable Data Labels for clarity.

Sample Data Table:


Product Name Total Sales ( ₹)
Keyboard 10,500
Mouse 10,000
Printer 10,000

Column Chart Visualization:


(This is a text representation of the actual chart)
Sales by Product
|
| ⬛
| ⬛
| ⬛ ⬛
| ⬛ ⬛
| ⬛ ⬛
| ⬛ ⬛
| ⬛ ⬛
| Keyboard Mouse Printer → Product Name

36 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
Result:
A column chart was successfully created, clearly displaying the total sales for
each product. This visual representation makes it easy to compare product
performance at a glance.

Conclusion:
This practical demonstrated how to use Excel’s charting tools to convert raw
data into a visual format. Column charts are ideal for comparing quantities
across different categories, such as sales figures per product, making them
useful in sales analysis, presentations, and business reports.

25. Using the given data, create a Pivot Table in Excel to find the
total and average salary by department.
Employee Name Department Salary(Rs.)
A Sales 3000
B Accounts 4000
C Marketing 5000
D Sales 6000
E Accounts 4000
F Marketing 8000

Using the given data, create a Pivot Table in Excel to find the total and
average salary by department.
Employee Name Department Salary (Rs.)
A Sales 3000
B Accounts 4000
C Marketing 5000
D Sales 6000
E Accounts 4000
F Marketing 8000

37 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
Steps to Create Pivot Table in Excel:
1. Open Microsoft Excel and enter the above data into a worksheet
in three columns: Employee Name, Department, and Salary (Rs.).
2. Select the Data Range:
Click and drag to select the entire table, including headers (A1:C7).
3. Insert Pivot Table:
o Go to the Insert tab on the Ribbon.
o Click on PivotTable.
o In the dialog box, choose:
 Select the table/range: $A$1:$C$7
 Choose where to place the Pivot Table: Select New
Worksheet.
o Click OK.
4. Set Up Pivot Table Fields:
o Drag Department to the Rows area.
o Drag Salary (Rs.) to the Values area.
 It will default to Sum of Salary (Rs.).
o Drag Salary (Rs.) to the Values area again.
 Click on the dropdown arrow, select Value Field
Settings, choose Average, and click OK.
5. Format the Values (Optional):
o Right-click on the salary values and choose Number Format →
Select Currency or Number format for better readability.

Final Pivot Table Output:


Department Sum of Salary (Rs.) Average of Salary (Rs.)
Accounts 8000 4000
Marketing 13000 6500
Sales 9000 4500
Grand Total 30000 5000 (Overall Avg.)

38 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
Explanation:
 The Pivot Table groups the salary data by department and calculates:
o The Total Salary (Sum) for each department.
o The Average Salary for employees in each department.
 This method is useful for summarizing data efficiently without manually
calculating totals or averages.

Conclusion:
Using a Pivot Table in Excel is a powerful way to analyze and summarize data. In
this case, we found both the total and average salaries for each department in
just a few steps. It saves time and reduces errors compared to manual
calculations.

26. Identify OS details (Windows/Linux/macOS version) of your


system.
Practical Record: Operating System Details

Objective:
To find and record the operating system details such as the OS name, version,
and system type (e.g., 64-bit) of the computer.

Method 1: For Windows Users


Steps to Identify OS Details in Windows:
1. Press Windows + R keys to open the Run dialog box.
2. Type winver and press Enter.
o A window will appear showing the Windows version and build
number.
3. Alternatively:
o Right-click on This PC → Select Properties.
o Under Device Specifications and Windows Specifications,
note the OS name, version, edition, and system type.

39 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers

Recorded Details (Example):


Item Details
OS Name Windows 10 Pro
Version 21H2
OS Build 19044.3324
System Type 64-bit Operating System, x64-based processor

Method 2: For Linux Users


Steps to Identify OS Details in Linux:
1. Open the Terminal.
2. Type the following command and press Enter:
3. lsb_release -a
4. To check kernel and system architecture:
5. uname -a
Recorded Details (Example):
Item Details
OS Name Ubuntu
Version 20.04 LTS
Kernel Version 5.15.0-91-generic
System Type 64-bit

Method 3: For macOS Users


Steps to Identify OS Details in macOS:
1. Click on the Apple menu -left corner.
2. Select About This Mac.
3. A window will open showing:
o macOS name (e.g., Monterey)
o Version number (e.g., 12.5)
o System specifications
Recorded Details (Example):
Item Details
OS Name macOS Monterey

40 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers

Version 12.5
System Type 64-bit

Conclusion:
The operating system details can be identified using built-in tools or commands
specific to each OS. Knowing the OS version is essential for compatibility,
troubleshooting, and software installations.

27. Use a utility software: compress a folder into .zip and extract it.

Practical Record: Using Utility Software – File Compression and


Extraction

Objective:
To demonstrate how to use a utility software (such as File Explorer in Windows,
or third-party tools like WinRAR/7-Zip) to compress a folder into a .zip file and
then extract it.

Tools Used:
 Windows File Explorer (Built-in utility)
(Alternatively: 7-Zip, WinRAR, or any compression software)

Part A: Compress a Folder into .zip Format


Steps:
1. Create a Folder:
o Right-click on desktop or inside any directory.
o Click New → Folder.
o Name it, e.g., MyDocuments.
2. Add Files to Folder:
o Place some files (documents, images, etc.) inside MyDocuments.
3. Compress (Zip) the Folder:
o Right-click on the folder MyDocuments.
o Select Send to → Compressed (zipped) folder.

41 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
o A .zip file named MyDocuments.zip will be created in the same
location.

Part B: Extract a .zip File


Steps:
1. Locate the MyDocuments.zip file.
2. Right-click on it and select Extract All….
3. Choose a destination folder and click Extract.
4. The contents of the zip file will be extracted to the selected location.

Result Table:
Action Performed Tool Used Output
Compressed a folder Windows File Explorer MyDocuments.zip created
Extracted the .zip file Windows File Explorer Folder extracted with original files

Conclusion:
Using utility software like Windows File Explorer or third-party tools, users can easily
compress files and folders into .zip format to reduce size or share them efficiently.
The extraction process restores the original contents without any data loss.

28. Create a Word document: insert a heading, table, image, and


apply styles.
Practical Record: Creating a Word Document with Formatting

Objective:
To demonstrate the use of Microsoft Word features by creating a document that
includes a heading, a table, an image, and uses built-in styles for formatting.

Software Used:
 Microsoft Word (Any version, e.g., Word 2016/2019/Office 365)

42 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
Steps to Perform the Task:
1. Open Microsoft Word:
 Go to Start Menu → Microsoft Word, or double-click the Word icon.

2. Insert a Heading:
 Click in the document and type a title, e.g.,
“Student Performance Report”
 Highlight the title.
 Go to the Home tab and click on Heading 1 under the Styles group.
 Center the heading using the Center Alignment button.

3. Insert a Table:
 Press Enter below the heading.
 Go to the Insert tab → Click Table → Choose 3x4 (3 columns, 4 rows).
 Enter sample data, e.g.:
Name Subject Marks
A Mathematics 85
B Science 78
C English 92
 Use Table Design tab to apply a style (e.g., Grid Table 5 Dark - Accent
1).

4. Insert an Image:
 Press Enter after the table.
 Go to the Insert tab → Click Pictures → Choose This Device.
 Select an image (e.g., a chart or student photo) from your computer and
click Insert.
 Resize and position the image as needed.

5. Apply Styles to Text:


 Select some paragraph text or table heading.
 Go to the Home tab and apply styles like:
o Bold, Italics

43 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
o Font: Calibri, Size: 12 pt
o Use styles like Normal, Emphasis, or Quote.

Result Overview:
Component Action Taken
Heading Inserted and styled using Heading 1
Table Inserted a 3×4 table with student data
Image Inserted from local storage
Styles Applied Used built-in styles for formatting

Conclusion:
This activity demonstrates the basic yet essential features of Microsoft Word for
creating professional documents. By inserting structured data (tables), visual
elements (images), and applying consistent formatting (styles), users can
improve the readability and presentation of their documents.

29. Perform a Mail Merge for an interview call letter to 5


candidates. Practical Record: Performing a Mail Merge in MS Word

Objective:
To create personalized interview call letters using Mail Merge in Microsoft Word
by merging a standard letter template with candidate details from a data source
(Excel).

Software Used:
 Microsoft Word
 Microsoft Excel

Steps to Perform Mail Merge:


Step 1: Create the Data Source (Excel File)
1. Open Microsoft Excel.
2. Create a table with the following fields:

44 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers

Name Position Interview Time Venue


Applied Date
Ananya Roy Software 20-Oct-2025 10:00 Room 101, ABC
Engineer AM Corp
Ramesh Data Analyst 20-Oct-2025 11:00 Room 101, ABC
Iyer AM Corp
Neha Singh Web Developer 20-Oct-2025 12:00 Room 101, ABC
PM Corp
Aman System Admin 21-Oct-2025 10:00 Room 102, ABC
Mehta AM Corp
Pooja Patel UI/UX Designer 21-Oct-2025 11:00 Room 102, ABC
AM Corp
3. Save the file as:
Candidates.xlsx

Step 2: Create the Interview Call Letter (Main Document in Word)


1. Open Microsoft Word and type the sample letter below:
Date: <<Interview Date>>

To,
<<Name>>
Subject: Interview Call Letter for the position of <<Position Applied>>

Dear <<Name>>,

We are pleased to inform you that you have been shortlisted for the interview
round. Please attend the interview as per the details below:

Date: <<Interview Date>> Time:


<<Time>>
Venue: <<Venue>>

Please carry a copy of your resume and ID proof.

45 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers

Regards,
HR Department
ABC Corporation

Step 3: Start Mail Merge


1. Go to Mailings tab → Click Start Mail Merge → Choose Letters.
2. Click Select Recipients → Choose Use an Existing List….
3. Browse and select Candidates.xlsx.
4. Insert merge fields:
o Use Insert Merge Field to place fields like <<Name>>,
<<Position Applied>>, etc., in the correct positions.
5. Click Preview Results to verify each letter.
6. Click Finish & Merge → Choose Edit Individual Documents or Print
Documents.

Result:
5 personalized letters will be generated, one for each candidate, with their
name, interview date, time, and venue automatically filled in.

Sample Output (1 Letter):


Date: 20-Oct-2025

To,
Ananya Roy
Subject: Interview Call Letter for the position of Software Engineer

Dear Ananya Roy,

We are pleased to inform you that you have been shortlisted for the interview
round. Please attend the interview as per the details below:

Date: 20-Oct-2025
Time: 10:00 AM

46 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
Venue: Room 101, ABC Corp

Please carry a copy of your resume and ID proof.

Regards,
HR Department
ABC Corporation

Conclusion:
Mail Merge is a powerful feature in Microsoft Word that allows sending
personalized letters to multiple recipients efficiently. It reduces manual work and
ensures consistency in formatting and content for bulk communication.

30. Prepare a resume in MS Word.

Practical Record: Resume Creation Using MS Word

Objective:
To create a professional resume using Microsoft Word by applying formatting
tools, layout features, and styles to organize personal, educational, and career-
related information clearly and effectively.

Software Used:
 Microsoft Word

Steps to Prepare a Resume in MS Word:


1. Open Microsoft Word
 Click on the Start Menu → Search and open Microsoft Word.
 Select Blank Document.

2. Add a Heading (Your Name and Contact Info)


 Type your Full Name at the top in bold, large font (e.g., 16–18 pt).
 Below that, type:
o Mobile Number

47 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
o Email Address
o LinkedIn Profile (optional)
o Location (City, State)
John Doe
Phone: +91-9876543210 | Email: [email protected] LinkedIn:
linkedin.com/in/johndoe | Location: Pune, Maharashtra

3. Insert a Section: Career Objective


 Use bold text or Heading style for section titles.
 Example:
**Career Objective**
A motivated and detail-oriented graduate seeking an entry-level position in a
reputable organization where I can apply my skills and contribute to team
success.

4. Add Education Section


Use a table or bullet points to list academic qualifications clearly.
**Education**

| Qualification | Institution | Year | Percentage/CGPA |


| | | | |
| B.Sc. Computer Sci. | XYZ College, Mumbai | 2024 | 8.5 CGPA |
HSC (12th) | ABC Junior College | 2021 | 75% |
SSC (10th) | DEF High School | 2019 | 82% |

5. Add Skills Section


List technical and soft skills relevant to the job.
**Skills**
- Programming: C, C++, Python
- MS Office, Excel, Word, PowerPoint
- Good communication and teamwork

6. Add Projects or Internships (if any)


**Projects**

48 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
- **Online Portfolio Website** – Created a personal website using HTML, CSS,
and JavaScript.
- **Library Management System** – Developed using C++ as part of the
academic project.

7. Add Personal Details


**Personal Details**
- Date of Birth: 01-Jan-2003
- Languages Known: English, Hindi, Marathi
- Hobbies: Reading, Traveling, Blogging

8. Declaration
**Declaration**
I hereby declare that the information provided above is true to the best of my
knowledge.

Date: 17-Oct-2025
Place: Pune

(Signature)

Result Overview:
Section Included Content Example
Name and Contact Info John Doe, Email, Phone, LinkedIn
Career Objective Short and clear objective
Education Table format with degrees and scores
Skills Listed as bullet points
Projects/Internships Academic or personal projects
Personal Details DOB, Languages, Hobbies
Declaration Formal statement with signature

49 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
Conclusion:
Creating a resume in MS Word involves organizing your personal, academic, and
professional information in a structured format. Word's formatting tools like
tables, headings, bullets, and styles help create a clean and professional
document that is ready for job applications.

31. Design a PowerPoint (5 slides) about "Digital Business Trends" with


transitions and images.

Practical Record: PowerPoint Presentation Design

Objective:
To create an engaging PowerPoint presentation on the topic “Digital Business
Trends”, using features such as slide layout, images, text formatting, and slide
transitions.

Software Used:
 Microsoft PowerPoint

Steps to Design the PowerPoint Presentation:


1. Open Microsoft PowerPoint
 Go to Start Menu → Microsoft PowerPoint
 Select Blank Presentation

2. Create 5 Slides with the Following Structure

✅ Slide 1: Title Slide


 Title: Digital Business Trends
 Subtitle: Emerging Technologies Transforming the Business World
 Image: Insert a relevant image (e.g., digital globe, AI icons)
 Apply Title Slide Layout
 Transition: Fade

50 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
✅ Slide 2: Introduction to Digital Business
 Content:
o Definition of digital business
o Importance in today’s economy
 Image: Icon or image showing digital workflows
 Use Title and Content Layout
 Transition: Push

✅ Slide 3: Top Trends in 2025


 Bullet Points:
o Artificial Intelligence (AI) and Machine Learning
o Cloud Computing
o E-commerce Expansion
o Automation and Robotics
 Insert a SmartArt graphic to visualize trends
 Transition: Wipe

✅ Slide 4: Benefits of Digital Transformation


 Use 2-Column Layout
o Left: Text (Benefits like efficiency, speed, reach)
o Right: Image showing digital growth/statistics
 Apply a mild animation to each bullet
 Transition: Split

✅ Slide 5: Conclusion
 Key Points:
o Digital business is evolving rapidly
o Companies must adapt to remain competitive
 Include a quote or infographic
 End with “Thank You”
 Transition: Zoom

Additional Formatting Used:


 Fonts: Calibri / Segoe UI (Readable fonts)

51 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
 Design Theme: Use any built-in professional theme (e.g., Ion, Integral,
or Wisp)
 Images: Inserted from royalty-free sources or stock images
 Transitions: Applied to all slides via Transitions Tab
 Animations: Applied to bullets or images for visual effect

Result Overview:
Slide Title Key Feature
No.
Slide 1 Digital Business Trends Title, Subtitle, Image, Fade
Slide 2 Introduction Text + Image, Push transition
Slide 3 Top Trends in 2025 SmartArt + Bullet Points, Wipe
Slide 4 Benefits of Digital Two-column layout, Split
Transformation transition
Slide 5 Conclusion Summary, Quote/Image, Zoom

Conclusion:
Microsoft PowerPoint provides powerful tools to create professional presentations
with text, images, transitions, and animations. This activity helps in
understanding how to effectively communicate ideas using visual design,
structure, and storytelling.

32. Create a PowerPoint with 4 slides explaining ERP, CRM, DBMS,


and their business benefits.
Practical Record: PowerPoint Presentation Design

Objective:
To create an engaging PowerPoint presentation on the topic “Digital Business
Trends”, using features such as slide layout, images, text formatting, and slide
transitions.

Software Used:
 Microsoft PowerPoint

52 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers

Steps to Design the PowerPoint Presentation:


1. Open Microsoft PowerPoint
 Go to Start Menu → Microsoft PowerPoint
 Select Blank Presentation

2. Create 5 Slides with the Following Structure

✅ Slide 1: Title Slide


 Title: Digital Business Trends
 Subtitle: Emerging Technologies Transforming the Business World
 Image: Insert a relevant image (e.g., digital globe, AI icons)
 Apply Title Slide Layout
 Transition: Fade

✅ Slide 2: Introduction to Digital Business


 Content:
o Definition of digital business
o Importance in today’s economy
 Image: Icon or image showing digital workflows
 Use Title and Content Layout
 Transition: Push

✅ Slide 3: Top Trends in 2025


 Bullet Points:
o Artificial Intelligence (AI) and Machine Learning
o Cloud Computing
o E-commerce Expansion
o Automation and Robotics
 Insert a SmartArt graphic to visualize trends
 Transition: Wipe

✅ Slide 4: Benefits of Digital Transformation


 Use 2-Column Layout

53 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
o Left: Text (Benefits like efficiency, speed, reach)
o Right: Image showing digital growth/statistics
 Apply a mild animation to each bullet
 Transition: Split

✅ Slide 5: Conclusion
 Key Points:
o Digital business is evolving rapidly
o Companies must adapt to remain competitive
 Include a quote or infographic
 End with “Thank You”
 Transition: Zoom

Additional Formatting Used:


 Fonts: Calibri / Segoe UI (Readable fonts)
 Design Theme: Use any built-in professional theme (e.g., Ion, Integral,
or Wisp)
 Images: Inserted from royalty-free sources or stock images
 Transitions: Applied to all slides via Transitions Tab
 Animations: Applied to bullets or images for visual effect

Result Overview:
Slide Title Key Feature
No.
Slide 1 Digital Business Trends Title, Subtitle, Image, Fade
Slide 2 Introduction Text + Image, Push transition
Slide 3 Top Trends in 2025 SmartArt + Bullet Points, Wipe
Slide 4 Benefits of Digital Two-column layout, Split
Transformation transition
Slide 5 Conclusion Summary, Quote/Image, Zoom

54 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
Conclusion:
Microsoft PowerPoint provides powerful tools to create professional presentations
with text, images, transitions, and animations. This activity helps in
understanding how to effectively communicate ideas using visual design,
structure, and storytelling.

33. List out the shortcut keys used in MS


Excel. List out the shortcut keys used in MS
Excel.

Objective:
To understand and list commonly used shortcut keys in Microsoft Excel that help
in improving speed, efficiency, and productivity while working with spreadsheets.

Explanation:
Shortcut keys in MS Excel allow users to perform various functions quickly
without using the mouse. They are especially useful for data entry, formatting,
navigation, and executing commands. Knowing these shortcuts improves
workflow and reduces time spent on repetitive tasks.

Commonly Used Shortcut Keys in MS Excel


Shortcut Key Function / Description
Ctrl + N Create a new workbook
Ctrl + O Open an existing workbook
Ctrl + S Save the current workbook
Ctrl + P Open the Print dialog box
Ctrl + C Copy the selected cells
Ctrl + X Cut the selected cells
Ctrl + V Paste the copied/cut content
Ctrl + Z Undo the last action
Ctrl + Y Redo the last undone action
Ctrl + F Find within the worksheet
Ctrl + H Find and replace content
Ctrl + A Select all cells in the worksheet

55 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers

Ctrl + Arrow Keys Move to the edge of the data region


Ctrl + Space Select the entire column
Shift + Space Select the entire row
Ctrl + Shift + L Apply or remove filters
Alt + E + S + V Paste Special
Ctrl + ; Insert current date
Ctrl + Shift + "+" Insert a new row or column
Ctrl + "-" Delete the selected row or column
F2 Edit the active cell
F4 Repeat the last action
F7 Spell check
Alt + Enter Start a new line within a cell
Ctrl + 1 Open Format Cells dialog box

Conclusion:
Learning and using shortcut keys in MS Excel enhances user efficiency and
allows faster navigation and manipulation of data. These shortcuts are valuable
for students, professionals, and anyone working with large sets of data in
spreadsheets.

34. List out the shortcut keys used in MS


Word. List out the shortcut keys used in MS
Word.

Objective:
To learn and list commonly used shortcut keys in Microsoft Word that help in
efficiently performing various tasks such as editing, formatting, navigating, and
managing documents.

Explanation:
Shortcut keys in MS Word are combinations of keys that provide quick access to
commands and features without using the mouse. They improve productivity
and save time when working with documents by simplifying repetitive tasks.

56 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
Commonly Used Shortcut Keys in MS Word
Shortcut Key Function / Description
Ctrl + N Create a new document
Ctrl + O Open an existing document
Ctrl + S Save the current document
Ctrl + P Open the Print dialog box
Ctrl + C Copy selected text or object
Ctrl + X Cut selected text or object
Ctrl + V Paste copied or cut content
Ctrl + Z Undo the last action
Ctrl + Y Redo the last undone action
Ctrl + A Select all text in the document
Ctrl + F Find text in the document
Ctrl + H Find and replace text
Ctrl + B Apply bold formatting
Ctrl + I Apply italic formatting
Ctrl + U Apply underline formatting
Ctrl + E Center align text
Ctrl + L Left align text
Ctrl + R Right align text
Ctrl + J Justify text alignment
Ctrl + 1 Single-line spacing
Ctrl + 2 Double-line spacing
Ctrl + Enter Insert a page break
Ctrl + Shift + > Increase font size
Ctrl + Shift + < Decrease font size
Ctrl + Home Move to the beginning of the document
Ctrl + End Move to the end of the document
Ctrl + Backspace Delete the previous word
Alt + Ctrl + S Split the window
F7 Spell and grammar check

57 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
Conclusion:
Shortcut keys in MS Word are valuable tools that help users navigate, format,
and edit documents efficiently. Regular use of these shortcuts saves time and
enhances overall productivity while working on word processing tasks.

35. Compare and contrast different network topologies (Star, Bus,


Ring, Mesh).
Compare and contrast different network topologies (Star, Bus,
Ring, Mesh).

Objective:
To understand and compare different types of network topologies used in
computer networks, focusing on their structure, advantages, disadvantages, and
applications.

Explanation:
Network topology refers to the physical or logical arrangement of nodes
(computers, devices) in a network. The choice of topology affects network
performance, scalability, maintenance, and fault tolerance. The most common
types are Star, Bus, Ring, and Mesh.

Comparison Table of Network Topologies


Topology Structure Advantages Disadvantages Use Cases
Star All nodes are - Easy to - If central hub Offices,
connected to a install fails, entire LANs, Home
central hub or and network fails Networks
switch. manage - More
- Failure in cable
one cable required
doesn’t affect
others
Bus All devices share - Simple and - Difficult to Small
a single cheap to troubleshoot networks,
communication install - A break in the Temporary

58 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers

line (backbone). - Requires less main cable can setups


cable crash the
network
Ring Each node is - Data flows in - One node Token Ring
connected to one direction, failure can networks,
exactly two other reducing affect entire MANs
nodes, forming a collision network
circular path. - Performs - Difficult to
better under reconfigure
heavy load
than bus

Mesh Every node is - Highly - Expensive and Military,


connected to reliable and complex to set up Critical
every other node fault tolerant - Requires a lot Systems,
(full mesh) or - Redundant of cabling Internet
partially connections Backbone
connected. ensure no
single point of
failure

Diagrams (Optional for Practical Record):


If drawing is required, simple block diagrams of each topology can be sketched
on the left page or below the table using labeled circles and lines.

Conclusion:
Each network topology has its own strengths and weaknesses.
 Star topology is commonly used for its simplicity and manageability.
 Bus topology is outdated but cost-effective for small networks.
 Ring topology offers better performance than bus under heavy load
but is less fault tolerant.
 Mesh topology provides maximum reliability and is used in
critical environments despite higher costs.
Choosing the right topology depends on the size, budget, and reliability
requirements of the network.

59 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers

36. Prepare the list of networking devices and their functions.

Prepare the list of networking devices and their functions.

Objective:
To identify and understand various networking devices used in computer
networks along with their primary functions to facilitate communication and data
transfer.

Explanation:
Networking devices are hardware components that help establish, maintain, and
manage network communication between computers, servers, and other
devices. Each device plays a specific role in ensuring data is transmitted
efficiently and securely across the network.

List of Common Networking Devices and Their Functions


Device Function
Router Connects multiple networks and directs data packets
between them; manages traffic on the internet or LAN.
Switch Connects devices within a LAN and uses MAC addresses
to forward data to the correct device.
Hub Connects multiple Ethernet devices in a network but
broadcasts data to all connected devices.
Modem Converts digital data from a computer into analog signals
for transmission over phone lines and vice versa.
Access Point Provides wireless access to a wired network, enabling Wi-
Fi connectivity for devices.
Network Interface Hardware component that connects a computer to a
Card (NIC) network (wired or wireless).
Repeater Amplifies and regenerates signals to extend the range of
a network.
Bridge Connects two or more network segments, improving

60 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers

traffic management within a LAN.


Gateway Connects different types of networks (e.g., LAN to WAN),
performing protocol conversions.
Firewall Monitors and controls incoming and outgoing network
traffic based on security rules.
Proxy Server Acts as an intermediary between a user and the internet
to provide anonymity and content filtering.

Conclusion:
Understanding networking devices and their functions is essential for designing,
managing, and troubleshooting networks. Each device has a specific role that
contributes to efficient data communication and network security.

37. Find IP address and DNS of your system (Hint: Command Prompt →
ipconfig).

Find IP address and DNS of your system. (Hint: Use Command Prompt →
ipconfig)

Objective:
To find and note down the IP address and DNS server addresses of the computer
using the Command Prompt utility in Windows.

Explanation:
The IP address is a unique identifier assigned to your computer on a network,
allowing it to communicate with other devices.
The DNS (Domain Name System) server translates website names (like
www.google.com) into IP addresses that computers use to communicate.
Using the Windows Command Prompt with the command ipconfig allows you to
view network configuration details including IP address and DNS servers.

61 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
Steps to Find IP Address and DNS:
1. Press Windows + R keys to open the Run dialog box.
2. Type cmd and press Enter to open the Command Prompt.
3. In the Command Prompt window, type the following command and press
Enter:
4. ipconfig /all
5. Look for the active network adapter (e.g., Ethernet adapter or Wi-Fi
adapter).
6. Find the following details:
o IPv4 Address (This is your system’s IP address)
o DNS Servers (Lists the IP addresses of DNS servers used)

Sample Output (Example):


Ethernet adapter Ethernet:

Connection-specific DNS Suffix . : example.com


IPv4 Address.........................: 192.168.1.10
Subnet Mask..........................: 255.255.255.0
Default Gateway.....................: 192.168.1.1
DNS Servers..........................: 8.8.8.8
8.8.4.4

Conclusion:
Using the ipconfig command in Command Prompt is a quick and effective way to
find important network details such as the IP address and DNS servers of your
system. These details are essential for troubleshooting network issues and
configuring network settings.

38. Perform a Google search on "Digital Marketing Tools" and list


the top 5 results.
Practical Record: Google Search on "Digital Marketing Tools"
Objective:
To perform a Google search for the term "Digital Marketing Tools" and list the
top 5 results, providing an explanation for each.

62 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
Procedure:
1. Open Google Search:
Launch your preferred web browser and navigate to www.google.com.
2. Enter Search Query:
In the search bar, type "Digital Marketing Tools" and press Enter.
3. Review Search Results:
Examine the first page of search results to identify the top 5 listings.
These are typically the most relevant and authoritative sources related to
the search term.
4. List and Explain Top 5 Results:
Based on the current search results, the top 5 listings are:
1. HubSpot Blog – "The 28 Best Digital Marketing Tools"
HubSpot's blog post provides an extensive list of 28 digital
marketing tools, including HubSpot itself, Ahrefs, Canva, Google
Analytics, and Mailchimp. It offers a comprehensive overview of
each tool's features and benefits, making it a valuable resource for
marketers seeking to enhance their digital marketing strategies.
HubSpot Blog
2. Wikipedia – "Adobe Experience Cloud"
This Wikipedia page details Adobe Experience Cloud, a suite of
integrated online marketing and web analytics products by Adobe.
It covers the suite's history, features, and its role in digital
marketing, providing a solid understanding of Adobe's offerings in
this space. Wikipedia
3. Wikipedia – "Optimizely"
The Wikipedia entry for Optimizely discusses its experimentation
products, including web and feature experimentation, CMS, content
marketing platform, customer data platform, and email campaign
tools. It highlights how Optimizely aids in optimizing digital
experiences through data-driven insights. Wikipedia
4. Wikipedia – "Act-On"
This page provides information about Act-On, a subscription-based
SaaS product for marketing automation. It outlines Act-On's tools
for email marketing, landing pages, social media prospecting, CRM

63 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
integration, lead management, webinar management, and
analytics, emphasizing its role in streamlining marketing efforts.
Wikipedia
5. Wikipedia – "Predis.ai"
Predis.ai's Wikipedia entry describes it as an AI-based ad creative
and social media content generation tool. It details the platform's
features, including auto-posting, content calendar, and scheduling
tools, catering to small and medium businesses, advertising
agencies, freelancers, and e-commerce store owners. Wikipedia
Conclusion:
The top 5 search results provide a diverse range of digital marketing tools, each
offering unique features to enhance various aspects of digital marketing. From
comprehensive suites like HubSpot and Adobe Experience Cloud to specialized
tools like Optimizely and Predis.ai, marketers have access to a plethora of
resources to optimize their strategies and achieve better results.
Note: The search results may vary based on location, search history, and other
factors. It's advisable to perform the search personally to get the most accurate
and up-to-date information.

39. Compare two e-commerce websites (e.g., Amazon vs Flipkart) with


respect to features, delivery, and offers.

Practical Record: Comparative Analysis of Amazon and Flipkart

1. Introduction
Amazon and Flipkart are two leading e-commerce platforms in India, each
offering a unique shopping experience. This analysis compares their features,
delivery services, and promotional offers to provide a comprehensive
understanding for consumers.

2. Platform Features
Amazon
 Global Reach: Operates in multiple countries, offering a vast selection of
international and local products.

64 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
 Amazon Prime: Provides benefits like free one-day and same-day
delivery, early access to sales, and streaming services including
Prime Video and Prime Music.
 Exclusive Brands: Offers in-house brands such as AmazonBasics,
Solimo, and Echo devices.
Flipkart
 Indian Focus: Primarily caters to the Indian market with a strong
understanding of local consumer preferences.
 Flipkart Black: A subscription service offering benefits like 5% SuperCoin
cashback, exclusive "Black Deals," and a ₹1 flight cancellation or
rescheduling option through Cleartrip Business Today.
 Exclusive Brands: Features brands like MarQ, SmartBuy, and Anmi,
focusing on affordability and value.

3. Delivery Services
Amazon
 Amazon Now: Offers ultra-fast 10-minute delivery in select cities like
Bengaluru, Delhi, and Mumbai for daily essentials The Times of India.
 Scheduled Delivery: Provides scheduled two-hour delivery slots for large
appliances, allowing customers to plan deliveries in advance The Sun.
 Coverage: Extensive delivery network across India, ensuring timely
deliveries in most regions.
Flipkart
 Flipkart Minutes: Offers rapid delivery for daily essentials, though
service reliability can vary by location.
 Delivery Challenges: Some users have reported delays and
cancellations, especially in non-metro areas Reddit.
 Coverage: Strong presence in Tier 2 and Tier 3 cities, focusing on
regional accessibility.

4. Promotional Offers
Amazon
 Great Indian Festival: Annual sale event offering significant discounts
across various categories.

65 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
 Bank Offers: Collaborates with banks like HDFC to provide additional
discounts during sales.
 Exchange Offers: Provides exchange options for smartphones, often
with competitive trade-in values.
Flipkart
 Big Billion Days: Flagship sale event with deep discounts, especially on
electronics and fashion coupondabba.com.
 Bank Offers: Partners with banks like SBI to offer extra savings during
sales.
 Exchange Offers: Known for offering higher trade-in values on
smartphones compared to competitors Analytics Insight.

5. Conclusion
Both Amazon and Flipkart offer compelling reasons for consumers to choose their
platforms. Amazon excels in delivery speed and global product availability,
making it ideal for those seeking quick and reliable service. Flipkart, with its
strong local focus and value-oriented offerings, appeals to budget-conscious
shoppers and those looking for regional accessibility. The choice between the
two depends on individual preferences and priorities.

40. Analyse a company's social media account (e.g., Zomato


on Instagram). Make a table: Content Type vs Engagement.

1. Introduction
Amazon and Flipkart are two leading e-commerce platforms in India, each offering a
unique shopping experience. This analysis compares their features, delivery
services, and promotional offers to provide a comprehensive understanding for
consumers.

2. Platform Features
Amazon
 Global Reach: Operates in multiple countries, offering a vast selection of
international and local products.

66 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
 Amazon Prime: Provides benefits like free one-day and same-day
delivery, early access to sales, and streaming services including
Prime Video and Prime Music.
 Exclusive Brands: Offers in-house brands such as AmazonBasics,
Solimo, and Echo devices.
Flipkart
 Indian Focus: Primarily caters to the Indian market with a strong
understanding of local consumer preferences.
 Flipkart Black: A subscription service offering benefits like 5% SuperCoin
cashback, exclusive "Black Deals," and a ₹1 flight cancellation or
rescheduling option through Cleartrip Business Today.
 Exclusive Brands: Features brands like MarQ, SmartBuy, and Anmi,
focusing on affordability and value.

3. Delivery Services
Amazon
 Amazon Now: Offers ultra-fast 10-minute delivery in select cities like
Bengaluru, Delhi, and Mumbai for daily essentials The Times of India.
 Scheduled Delivery: Provides scheduled two-hour delivery slots for large
appliances, allowing customers to plan deliveries in advance The Sun.
 Coverage: Extensive delivery network across India, ensuring timely
deliveries in most regions.
Flipkart
 Flipkart Minutes: Offers rapid delivery for daily essentials, though
service reliability can vary by location.
 Delivery Challenges: Some users have reported delays and
cancellations, especially in non-metro areas Reddit.
 Coverage: Strong presence in Tier 2 and Tier 3 cities, focusing on
regional accessibility.

4. Promotional Offers
Amazon
 Great Indian Festival: Annual sale event offering significant discounts
across various categories.

67 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
 Bank Offers: Collaborates with banks like HDFC to provide additional
discounts during sales.
 Exchange Offers: Provides exchange options for smartphones, often
with competitive trade-in values.
Flipkart
 Big Billion Days: Flagship sale event with deep discounts, especially on
electronics and fashion coupondabba.com.
 Bank Offers: Partners with banks like SBI to offer extra savings during
sales.
 Exchange Offers: Known for offering higher trade-in values on
smartphones compared to competitors Analytics Insight.

5. Conclusion
Both Amazon and Flipkart offer compelling reasons for consumers to choose their
platforms. Amazon excels in delivery speed and global product availability,
making it ideal for those seeking quick and reliable service. Flipkart, with its
strong local focus and value-oriented offerings, appeals to budget-conscious
shoppers and those looking for regional accessibility. The choice between the
two depends on individual preferences and priorities.

41. Run a speed test (speedtest.net) and record Download/Upload


speed.

Practical Record: Internet Speed Test


1. Objective
To measure the current internet connection speed by recording the download and
upload speeds using the online tool Speedtest.net.

2. Materials Required
 A device connected to the internet (Laptop, PC, smartphone, or tablet)
 Internet browser (Chrome, Firefox, Edge, etc.)
 Access to the website: speedtest.net

68 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
3. Procedure
1. Open the internet browser on your device.
2. Go to the website speedtest.net.
3. Click on the “Go” button to start the speed test.
4. Wait for the test to complete. The website will automatically measure:
o Download speed (how fast data is received from the internet)
o Upload speed (how fast data is sent to the internet)
5. Record the speeds shown on the screen.

4. Observations/Results
Parameter Measured Speed (Mbps)
Download Speed [Your measured download speed]
Upload Speed [Your measured upload speed]
Example:
Download Speed: 85.4 Mbps
Upload Speed: 24.7 Mbps

5. Explanation
 Download Speed: This indicates how quickly data from the internet can
be downloaded to your device. It affects activities such as streaming
videos, browsing websites, and downloading files. Higher speeds mean
smoother and faster experiences.
 Upload Speed: This shows how fast data from your device is uploaded to
the internet. It impacts activities like video calls, sending emails with
attachments, and uploading files to the cloud. Higher upload speeds
improve performance in these areas.
 The speeds can vary based on network congestion, time of day, the device
used, and distance from the router or ISP infrastructure.

6. Conclusion
The speed test provides a snapshot of your internet connection quality. Regular
monitoring can help identify issues or verify ISP claims about internet speeds. A
stable and high-speed internet connection improves overall online experience.

69 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
42. Share a file via Bluetooth or LAN cable and document the steps.

Practical Record: Sharing a File via Bluetooth or LAN Cable


1. Objective
To transfer a file between two computers/devices using Bluetooth or a LAN cable
and document the steps involved.

2. Materials Required
 Two computers or devices with Bluetooth capability and/or LAN ports
 A LAN cable (Ethernet cable) for wired transfer or Bluetooth enabled on
both devices
 A file to share (e.g., a document, image, or video)

3. Procedure
Option A: Sharing a File via Bluetooth
1. Enable Bluetooth
o On both devices, turn on Bluetooth from the settings menu.
o Ensure both devices are discoverable.
2. Pair Devices
o On one device, search for available Bluetooth devices.
o Select the other device from the list.
o Confirm the pairing code on both devices to establish a connection.
3. Send the File
o Locate the file you want to share.
o Right-click the file and select Send to > Bluetooth device
(on Windows) or use the share option on other OS.
o Choose the paired device from the list.
o Accept the incoming file on the receiving device.
o Wait for the transfer to complete.
4. Verify Transfer
o Check the destination folder (usually the Bluetooth folder or
Downloads) on the receiving device to confirm the file is received.

70 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
Option B: Sharing a File via LAN Cable
1. Connect Devices
o Connect both computers using a LAN cable (Ethernet cable).
2. Configure Network Settings
o Set static IP addresses on both devices within the same subnet.
Example:
 Device 1 IP: 192.168.1.1, Subnet mask: 255.255.255.0
 Device 2 IP: 192.168.1.2, Subnet mask: 255.255.255.0
3. Enable File Sharing
o On the device sending the file, enable file sharing on the folder
containing the file.
o Right-click the folder > Properties > Sharing > Share > select users
and permissions.
4. Access Shared Folder
o On the receiving device, open File Explorer.
o Enter the IP address of the sending device in the format
\\192.168.1.1 in the address bar.
o Browse to the shared folder.
5. Copy the File
o Locate the file in the shared folder.
o Copy and paste it to the desired location on the receiving device.
6. Verify Transfer
o Check the copied file on the receiving device for successful transfer.

4. Explanation
 Bluetooth sharing is convenient for small files and requires no
cables, but it is slower and suitable for short distances.
 LAN cable sharing provides a faster and more reliable
method, especially for large files, but requires network
configuration.
 Both methods are useful for direct file transfer without internet access.

71 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
5. Conclusion
Sharing files via Bluetooth or LAN cable is a practical and effective way to
transfer data between devices. Choosing the appropriate method depends on the
file size, device compatibility, and transfer speed requirements.

44. Prepare a table with SaaS, PaaS, and IaaS examples and
their business use. Example:
Cloud Service Model Examples Business Use
SaaS
PaaS
IaaS

Practical Record: Cloud Service Models – SaaS, PaaS, and IaaS with
Examples and Business Uses
1. Objective
To understand the different cloud service models — Software as a Service
(SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS) —
along with examples and their business applications.

2. Table of Cloud Service Models, Examples, and Business Uses


Cloud Service Examples Business Use
Model
SaaS (Software Google Workspace Used for accessing software
as a Service) (Docs, Gmail), applications over the internet
Salesforce, Zoom without installation. Enables
collaboration, customer relationship
management (CRM), and
communication tools.

PaaS (Platform Microsoft Azure App Provides a platform to develop, test,


as a Service) Services, Google and deploy applications quickly
App Engine, Heroku without managing underlying
infrastructure. Useful for software
development and testing

72 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers

environments.
IaaS Amazon Web Offers virtualized computing
(Infrastructure Services (AWS resources over the internet.
as a Service) EC2), Microsoft Businesses use it for scalable
Azure VMs, Google storage, networking, and computing
Compute Engine power, eliminating the need for
physical hardware.

3. Explanation
 SaaS delivers software applications via the internet on a subscription
basis. Users can access the applications on-demand, reducing the need for
installation and maintenance. This model is suitable for organizations
looking to provide easy access to business tools without managing
software updates or infrastructure.
 PaaS provides a platform allowing developers to build, test, and deploy
applications without worrying about hardware or operating systems. It
accelerates application development and simplifies the process of
scaling.
 IaaS offers fundamental IT infrastructure such as virtual machines,
storage, and networks on a pay-as-you-go basis. It is ideal for businesses
requiring flexible and scalable resources for hosting applications,
websites, or data storage without investing in physical servers.

4. Conclusion
Understanding SaaS, PaaS, and IaaS is critical for businesses adopting cloud
technologies. Each service model serves different needs — SaaS focuses on end-
user applications, PaaS supports development environments, and IaaS provides
underlying infrastructure. Choosing the appropriate model helps organizations
optimize resources, reduce costs, and improve scalability.

73 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
45. Compare Public, Private, and Hybrid clouds with examples in a table.

Practical Record: Comparison of Public, Private, and Hybrid Clouds with


Examples
1. Objective
To compare the three primary cloud deployment models—Public Cloud, Private
Cloud, and Hybrid Cloud—highlighting their characteristics, examples, and
typical business uses.

2. Comparison Table of Cloud Deployment Models


Cloud Description Examples Business Use
Deployment
Model
Public Cloud Cloud services are Amazon Web Suitable for businesses
delivered over the Services needing cost-effective,
public internet and (AWS), scalable resources with
shared across Microsoft minimal management
multiple Azure, Google overhead. Ideal for
organizations. Cloud Platform startups, small to
(GCP) medium businesses, and
applications with
variable
workloads.
Private Cloud VMware Used by organizations
Cloud infrastructure is vSphere, requiring enhanced
dedicated to a OpenStack, security, control, and
single organization Microsoft Azure customization, such as
and can be hosted Stack financial institutions,
on-premises or by government agencies,
a third party. and enterprises with
strict compliance needs.

Hybrid Combines public Microsoft Azure Offers flexibility to


Cloud and private clouds, Hybrid, AWS balance security and
allowing data and Outposts, scalability. Businesses

74 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers

applications to be Google Anthos use hybrid clouds to keep


shared between sensitive data on private
them. clouds while leveraging
public clouds for less
critical workloads or
scaling.

3. Explanation
 Public Cloud: Provides on-demand computing resources accessible to
multiple customers. It offers high scalability and cost efficiency but with
less control over data security and infrastructure.
 Private Cloud: Provides exclusive resources to a single organization,
offering more control, security, and customization. It often requires higher
investment in infrastructure and maintenance.
 Hybrid Cloud: Integrates public and private clouds, enabling
organizations to optimize workloads and data placement. It helps meet
security and compliance requirements while benefiting from the
scalability of public clouds.

4. Conclusion
Each cloud deployment model serves distinct business needs:
 Public clouds are ideal for flexible, scalable, and cost-efficient solutions.
 Private clouds suit businesses needing high security and control.
 Hybrid clouds provide a balanced approach for organizations wanting
the best of both worlds.
Selecting the appropriate cloud deployment depends on factors like data
sensitivity, budget, compliance, and scalability requirements.

75 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
46. Create a strong password and test it on an online strength
checker like "How Secure is My Password."

Practical Record: Creating and Testing a Strong Password


1. Objective
To create a strong password and evaluate its strength using an online password
strength checker, ensuring it meets security standards to protect personal
information.

2. Materials Required
 Device with internet access (computer, laptop, smartphone)
 Web browser
 Access to an online password strength checker such as How Secure Is My
Password

3. Procedure
Step 1: Creating a Strong Password
 Follow best practices for password creation:
o Use a minimum of 12 characters.
o Include a combination of uppercase letters, lowercase letters,
numbers, and special characters.
o Avoid common words, predictable patterns, or personal information.
 Example of a strong password created:
G7!p#9rQw2@Lm4
Step 2: Testing Password Strength
1. Open the web browser and go to How Secure Is My Password.
2. Enter the created password in the input field.
3. Observe the password strength rating provided by the tool.
4. Note the estimated time it would take for the password to be cracked.

4. Observations/Results
Parameter Details
Created Password G7!p#9rQw2@Lm4

76 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers

Strength Rating Very Strong


Estimated Crack Time Centuries or more

5. Explanation
 A strong password is essential to protect online accounts from
unauthorized access.
 Password strength checkers analyze the complexity, length, and
unpredictability of passwords.
 The example password contains a mix of character types and
sufficient length, making it difficult to crack.
 Longer and more complex passwords significantly increase the time
and resources required for hacking attempts.

6. Conclusion
Creating and testing strong passwords is a crucial step in maintaining online
security. Using tools like "How Secure Is My Password" helps users ensure their
passwords are robust enough to withstand cyberattacks. Always use unique,
complex passwords for different accounts and consider using a password
manager for convenience.

47. Enable Two-Factor Authentication (2FA) for a Gmail account


and show the authentication process.

Practical Record: Enabling Two-Factor Authentication (2FA) for a Gmail


Account and Demonstrating the Authentication Process
1. Objective
To enable Two-Factor Authentication (2FA) on a Gmail account to enhance
security, and to demonstrate how the 2FA process works during login.

2. Materials Required
 Device with internet access (computer, laptop, or smartphone)
 Google account credentials (email and password)
 Mobile phone capable of receiving SMS or running an authenticator app
(e.g., Google Authenticator)

77 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers

3. Procedure
Step 1: Enabling 2FA on Gmail
1. Open a web browser and go to https://myaccount.google.com/security.
2. Under the section “Signing in to Google”, find “2-Step Verification”
and click “Get Started”.
3. Sign in to your Google account again for verification.
4. Choose your primary 2FA method:
o Phone Prompt (recommended): Google sends a prompt to your
phone.
o Text message or voice call: Receive a code via SMS or call.
5. Follow the on-screen instructions to set up the chosen method. For
example, enter your phone number and verify it by entering the code sent
to you.
6. Once set up, 2FA will be enabled for your account.
Step 2: Demonstrating the Authentication Process
1. Log out of your Gmail account or open an incognito/private browsing
window.
2. Attempt to log in to Gmail using your email and password.
3. After entering correct credentials, Google will prompt you for a second
verification step:
o If using Phone Prompt, tap “Yes” on your mobile device.
o If using SMS, enter the verification code sent to your phone.
4. Upon successful verification, you will be granted access to your Gmail
account.

4. Observations/Results
 Two-Factor Authentication was successfully enabled on the Gmail account.
 During login, the system requested the second factor for authentication.
 The account was accessed only after the correct second factor
was provided, adding an extra layer of security.

78 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
5. Explanation
Two-Factor Authentication (2FA) adds an additional security layer by requiring
not only a password but also a second verification step (something you have,
like your phone). This significantly reduces the risk of unauthorized access, even
if the password is compromised.

6. Conclusion
Enabling 2FA on Gmail enhances account security by requiring two forms of
identification during login. It is an effective method to protect personal
information from unauthorized access and is highly recommended for all online
accounts.

48. Create a Word document listing 10 safe browsing tips.

Practical Record: Creating a Word Document Listing 10 Safe Browsing


Tips
1. Objective
To create a Microsoft Word document containing important safe browsing tips to
promote secure internet usage and protect personal information online.

2. Materials Required
 Computer or laptop with Microsoft Word installed (or any word processing
software)
 Internet access for researching safe browsing tips (optional)

3. Procedure
1. Open Microsoft Word on your computer.
2. Create a new blank document.
3. Set the title of the document as “10 Safe Browsing Tips”.
4. Write the following safe browsing tips clearly in a numbered list format:

79 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
4. 10 Safe Browsing Tips
1. Use Strong and Unique Passwords
Always create strong passwords using a combination of letters, numbers,
and symbols, and avoid reusing passwords across sites.
2. Keep Your Software Updated
Regularly update your browser, operating system, and security software
to protect against vulnerabilities.
3. Enable Two-Factor Authentication (2FA)
Use 2FA wherever possible to add an extra layer of security to your
accounts.
4. Avoid Clicking on Suspicious Links
Do not click on unknown or unsolicited links received via email, messages,
or websites.
5. Use Secure Websites (HTTPS)
Only enter personal information on websites that use HTTPS encryption,
indicated by a padlock symbol in the address bar.
6. Clear Browsing Data Regularly
Clear cookies, cache, and browsing history periodically to prevent tracking
and data leaks.
7. Use a Reliable Antivirus and Anti-Malware Program
Install and update security software to detect and prevent threats while
browsing.
8. Be Careful with Public Wi-Fi
Avoid conducting sensitive activities on public Wi-Fi networks unless using
a VPN (Virtual Private Network).
9. Check Website Privacy Policies
Understand how websites use your data by reviewing their privacy policies
before sharing personal information.
10.Log Out of Accounts After Use
Always sign out from websites, especially on shared or public devices, to
prevent unauthorized access.

80 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
5. Saving and Sharing the Document
 Save the document with a meaningful name such as
Safe_Browsing_Tips.docx.
 The file can be shared via email or cloud storage for educational purposes.

6. Explanation
Creating a document with safe browsing tips helps users become more aware of
potential online risks and adopt better security habits. Presenting the
information in a Word document makes it easy to distribute and refer to for
improving internet safety practices.

7. Conclusion
The Word document serves as a useful guide for individuals to browse the
internet securely. Following these tips helps protect against cyber threats like
phishing, malware, and identity theft.

49. Create a PowerPoint/report on cyber threats (Malware, Phishing,


DoS) with business examples.

Practical Record: Creating a PowerPoint/Report on Cyber Threats


(Malware, Phishing, DoS) with Business Examples
1. Objective
To prepare a presentation/report explaining common cyber threats — Malware,
Phishing, and Denial of Service (DoS) attacks — along with real-world business
examples, to understand their impact and preventive measures.

2. Materials Required
 Computer with Microsoft PowerPoint or Word installed
 Internet access for research on cyber threats and business case studies

3. Procedure
Step 1: Research Cyber Threats
 Gather information on Malware, Phishing, and DoS attacks.
 Find business cases where these attacks caused significant impact.

81 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
Step 2: Prepare PowerPoint Slides / Report Sections
Slide/Section Content Details
Title Slide Cyber Threats: Malware, Phishing, and DoS Attacks
Introduction Brief overview of cyber threats and their relevance to
businesses
Malware Definition, types (virus, ransomware, spyware), business
example (e.g., WannaCry ransomware attack on NHS)
Phishing Explanation of phishing attacks, common techniques,
business example (e.g., Google & Facebook phishing scam
resulting in $100 million loss)
Denial of Service Description of DoS and Distributed DoS (DDoS) attacks,
(DoS) business example (e.g., Dyn DNS DDoS attack affecting
Twitter, Amazon)
Impact on Financial loss, data breach, reputation damage, operational
Businesses disruption
Prevention & Security measures like antivirus, employee training,
Mitigation firewalls, multi-factor authentication
Conclusion Summary and importance of cybersecurity awareness in
businesses
References Sources of information and business examples
Step 3: Design and Finalize
 Add relevant images, charts, or diagrams to enhance understanding.
 Use bullet points and concise text for clarity.
 Review and save the presentation/report.

4. Explanation
 Malware is malicious software designed to harm or exploit systems. For
example, the WannaCry ransomware attack in 2017 affected hospitals,
causing severe operational issues.
 Phishing involves fraudulent emails or websites to steal sensitive
information. A major scam targeting Google and Facebook led to a loss of
over $100 million.

82 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
 Denial of Service (DoS) attacks overwhelm servers, causing service
outages. The Dyn DNS DDoS attack in 2016 disrupted many major
websites.
 Businesses face financial, legal, and reputational risks due to these
attacks.
 Preventive measures including employee awareness, updated
security software, and strong access controls are vital.

5. Conclusion
Cyber threats such as Malware, Phishing, and DoS attacks pose significant risks to
businesses worldwide. Understanding these threats and implementing security
measures is essential to protect assets and maintain trust.

50. Prepare a short report (in Word) summarising cyber laws in India
(IT Act, DPDPA 2023) and their importance for digital businesses.

Practical Record: Summary of Cyber Laws in India – IT Act, 2000 and


Digital Personal Data Protection Act, 2023
1. Objective
To prepare a concise report summarizing key cyber laws in India—the Information
Technology Act, 2000 (IT Act) and the Digital Personal Data Protection Act, 2023
(DPDP Act)—and their significance for digital businesses.

2. Materials Required
 Computer with Microsoft Word or any word processing software
 Internet access for research

3. Procedure
Step 1: Research
 Gather information on the IT Act, 2000 and DPDP Act, 2023 from credible
sources such as government websites, legal publications, and news
articles.
Step 2: Structure the Report
 Open a new document in Microsoft Word.

83 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
 Title the document as "Cyber Laws in India: IT Act, 2000 and Digital
Personal Data Protection Act, 2023".
 Organize the content into the following sections:
1. Introduction
2. Information Technology Act, 2000
3. Digital Personal Data Protection Act, 2023
4. Importance for Digital Businesses
5. Conclusion
Step 3: Write the Report

4. Report Content
Title: Cyber Laws in India: IT Act, 2000 and Digital Personal Data Protection Act,
2023
1. Introduction
In the digital age, safeguarding information and ensuring secure online
transactions are paramount. India has enacted cyber laws to address these
concerns and regulate digital activities.
2. Information Technology Act, 2000 (IT Act)
The IT Act, 2000 was the first legislation in India to address cybercrimes and
electronic commerce. It provides a legal framework for electronic governance by
recognizing electronic records and digital signatures. The Act defines
cybercrimes and prescribes penalties for civil wrongs. It also established the
Controller of Certifying Authorities to regulate the issuance of digital signatures
and the Cyber Appellate Tribunal to resolve disputes arising from this law.
3. Digital Personal Data Protection Act, 2023 (DPDP Act)
The DPDP Act, 2023 aims to protect personal data and establish a comprehensive
data protection regime in India. It applies to both Indian residents and
businesses involved in the collection of personal data. The Act permits personal
data collection for lawful purposes, contingent on obtaining consent from the
individual or establishing legitimate reasons as prescribed in the law. It
necessitates data collectors to provide clear notices detailing the specifics of
data usage, the rights of the individual, and grievance redress mechanisms.

84 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
4. Importance for Digital Businesses
 Compliance: Businesses must adhere to these laws to avoid legal
repercussions.
 Consumer Trust: Ensuring data protection fosters trust among
consumers.
 Operational Security: Implementing cybersecurity measures
protects business operations from cyber threats.
 International Standards: Aligning with global data protection
standards facilitates international trade and partnerships.
5. Conclusion
The IT Act, 2000 and DPDP Act, 2023 are pivotal in shaping the digital landscape
in India. Digital businesses must understand and comply with these laws to
operate securely and maintain consumer confidence.

Step 4: Formatting and Finalization


 Use appropriate headings and subheadings for clarity.
 Ensure the text is well-organized and free from grammatical errors.
 Save the document with a meaningful name, such as
Cyber_Laws_in_India_Report.docx.

5. Explanation
This report provides a comprehensive overview of India's cyber laws,
highlighting their relevance and importance for digital businesses.
Understanding these laws is crucial for businesses to operate within the legal
framework and protect both their interests and those of their consumers.

6. Conclusion
The IT Act, 2000 and DPDP Act, 2023 are foundational to India's digital legal
infrastructure. Digital businesses must stay informed about these laws to ensure
compliance and foster a secure digital environment.

85 | P a g e

You might also like