Bcom I Sem FIT Practical Record Q & Answers 1 50 ABED Sir
Bcom I Sem FIT Practical Record Q & Answers 1 50 ABED Sir
1|Page
B.Com I Sem – FIT – Practical Questions with Answers
Result:
The hardware components of the lab computer were successfully identified. The
system is equipped with an Intel Core i5 processor, 8 GB of DDR4 RAM, and an
SSD for storage.
Conclusion:
This practical helped in understanding how to identify the basic hardware
components of a computer using built-in system tools and third-party utilities.
2|Page
B.Com I Sem – FIT – Practical Questions with Answers
Scanner checkout
Input Microphone Used for voice input in virtual meetings and
customer support
Input Biometric Used for employee attendance and access
Scanner control
Output Monitor Displays information, dashboards, and reports
Output Printer Used for printing invoices, reports, and official
documents
Output Speakers Used for audio output in presentations and video
calls
Output Projector Used in meetings and conferences for displaying
presentations
Output Plotter Used in engineering firms for printing large
technical drawings
Result:
A comprehensive table of input and output devices was successfully
created along with their corresponding business applications.
Conclusion:
This practical helped in understanding the role of different input and output
devices in various business operations and how they contribute to the efficiency
of work processes.
3|Page
B.Com I Sem – FIT – Practical Questions with Answers
Task Manager / File Explorer
Procedure:
1. Log in to the lab computer and open the list of installed programs (via
Control Panel or Settings > Apps).
2. Identify and classify software into two categories: system software and
application software.
3. Note down at least three examples from each category installed on the
system.
4. Prepare a table showing the differences and examples.
Observations:
System Software Application Software
1. Microsoft Windows 10 (Operating 1. Microsoft Word (Word Processing)
System)
2. Device Drivers (e.g., Audio, Display 2. Google Chrome (Web Browser)
drivers)
3. Windows Defender (Security utility) 3. VLC Media Player (Multimedia
Playback)
Differences Between System Software and Application Software:
Criteria System Software Application Software
Purpose Manages and controls hardware Performs specific user-
and system operations oriented tasks
Dependency Works independently and is Depends on system
essential for system operation software to run
Examples Windows OS, Drivers, Antivirus MS Word, Excel, Chrome,
tools VLC Player
User Low-level interaction, mostly in High-level interaction for
Interaction the background performing tasks
Installation Comes pre-installed or required Installed based on user
during OS installation needs
Result:
Three examples each of system software and application software were
4|Page
B.Com I Sem – FIT – Practical Questions with Answers
successfully identified and the differences between the two were clearly
understood and tabulated.
Conclusion:
This practical provided clarity on how system software is essential for running
the computer and managing its resources, while application software helps users
perform specific tasks like document editing, browsing, and media playback.
5|Page
B.Com I Sem – FIT – Practical Questions with Answers
6|Page
B.Com I Sem – FIT – Practical Questions with Answers
4. Note down the OS Name, Version, and System Type (Architecture)
from the displayed information.
5. Optionally, open Command Prompt and type systeminfo to view detailed
OS specifications.
Observations:
OS Detail Information
Operating System Name Microsoft Windows 10 Pro
Version 22H2 (Build 19045.3448)
System Architecture 64-bit Operating System, x64-based CPU
(Note: Replace the values above with the actual specifications of your lab
computer if they differ.)
Result:
The complete Operating System details of the lab computer were successfully
identified and documented, including the name, version, and architecture.
Conclusion:
This practical helped in understanding how to access and interpret the technical
details of the installed Operating System. Knowing the OS version and
architecture is essential for installing compatible software and drivers, as well as
for troubleshooting.
7|Page
B.Com I Sem – FIT – Practical Questions with Answers
1. Understand the concepts of AI (Artificial Intelligence) and ML (Machine
Learning).
2. Research various industries where AI and ML are applied.
3. Note down specific applications used in different sectors and
their purposes.
4. Record the findings in a clear tabular format.
Observations:
Sector AI/ML Application Purpose / Use Case
Human AI Chatbots for Automates screening and
Resources Recruitment shortlisting of job candidates
Finance Fraud Detection Systems Detects suspicious transactions
using machine learning algorithms
Healthcare AI Diagnostics Tools Assists doctors in identifying
diseases from medical images
Retail Customer Recommends products based on
Recommendation user behavior and preferences
Systems
Manufacturing Predictive Maintenance Predicts machine failures to
prevent downtime
Education Intelligent Tutoring Adapts learning content based on
Systems student performance
Marketing AI-Powered Ad Targeting Delivers personalized ads based
on customer data
Transportation Self-driving Vehicles Uses AI to control autonomous
navigation and decision-making
Result:
A table showcasing AI and ML applications across various sectors was
successfully created, demonstrating the growing impact of these technologies
in real-world business scenarios.
Conclusion:
This practical provided valuable insight into how AI and ML are revolutionizing
different industries by automating tasks, improving decision-making, and
8|Page
B.Com I Sem – FIT – Practical Questions with Answers
enhancing customer experiences. Understanding these applications is essential
for leveraging emerging technologies in modern business environments.
7. List 5 IoT devices used in business (e.g., smart POS, RFID systems).
Mention their function and benefit.
9|Page
B.Com I Sem – FIT – Practical Questions with Answers
Result:
Five IoT devices used in businesses were identified and documented
successfully, along with their key functions and the benefits they provide to
operations.
Conclusion:
This practical enhanced understanding of how IoT devices play a crucial role in
modern business operations—optimizing efficiency, improving data accuracy,
and enabling smarter decision-making through real-time connectivity and
automation.
10 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
Observations:
Storage Type Speed Cost (per GB) Typical
Capacity
RAM Very High (Fastest) High 4 GB to 64 GB
ROM High (Read-only) Low A few MBs to
GBs
SSD High Medium to High 128 GB to 2 TB
HDD Moderate Low 500 GB to 10 TB
Cloud Depends on Internet Subscription- Virtually
Storage speed based Unlimited
Note: Actual performance and pricing may vary based on brand, model, and market
trends.
Result:
Five types of storage devices were successfully identified and compared. The
comparison helped understand the trade-offs between speed, cost, and capacity
for each type of storage.
Conclusion:
This practical provided insight into how different storage devices serve specific
purposes in a computer system. RAM and SSD offer speed, HDD and Cloud
provide large storage at a lower cost, while ROM is essential for system startup
and firmware storage. Choosing the right storage depends on system needs,
performance requirements, and budget.
9. Prepare a dos and don'ts checklist for digital privacy & security in
lab use.
Practical: Preparing a Do’s and Don’ts Checklist for Digital Privacy &
Security in Lab Use
Objective:
To understand and document best practices for maintaining digital privacy and
security while using computer systems in a lab environment.
Apparatus/Tools Used:
Lab Computer
11 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
Internet for reference
Text editor (MS Word/Excel)
Procedure:
1. Understand key aspects of digital privacy and security, such as password
protection, safe browsing, and data handling.
2. Identify actions that promote safety (Do’s) and actions that compromise
security (Don’ts).
3. Create a clear checklist format to serve as a reference for all lab users.
Observations:
Do’s Don’ts
Use strong, unique passwords for your Do not share your passwords with
accounts others
Log out of all accounts before leaving Do not leave your computer unlocked
the computer or unattended
Keep antivirus and security software Do not disable security settings or
updated firewalls
Only visit trusted websites and Do not click on unknown links or
download from safe sources download suspicious files
Report suspicious activity or security Do not ignore system alerts or
breaches warnings
Use incognito/private mode for Do not save personal passwords on
sensitive browsing public/shared computers
Backup important data regularly Do not store sensitive data on
unsecured devices or drives
Result:
A comprehensive checklist of digital privacy and security practices was successfully
prepared, providing clear guidance on what to do and what to avoid when using
lab systems.
Conclusion:
This practical highlighted the importance of responsible behavior in maintaining
digital security and privacy in a shared lab environment. Following these do’s
and don’ts helps prevent data breaches, malware infections, and unauthorized
access.
12 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
10. Convert decimal numbers (e.g., 25, 64, 128) into the
binary system.
Practical: Converting Decimal Numbers into the Binary System
Objective:
To convert given decimal numbers into their equivalent binary form using the
division-by-2 method.
Apparatus/Tools Used:
Lab Computer (optional)
Calculator / Pen and Paper
Knowledge of number systems
Procedure:
1. Understand that binary is a base-2 number system using only 0s and 1s.
2. Use the division-by-2 method to convert a decimal number into binary:
o Divide the decimal number by 2
o Write down the remainder
o Repeat the process with the quotient until the quotient becomes 0
o The binary number is obtained by reading the remainders in
reverse order
13 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
Result:
The given decimal numbers (25, 64, and 128) were successfully converted into
their binary equivalents using the division method.
Conclusion:
This practical helped in understanding the process of converting decimal
numbers into binary, which is fundamental in computer systems and digital
electronics, as binary is the core language of computers.
14 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
2. Research and find real-world business examples that illustrate each type
of IP.
3. Prepare a clear table listing the types of IP alongside the examples and
brief descriptions.
Observations:
Type of Definition Real-World Description
Intellectual Business
Property Example
Patent Legal protection granted Tesla, Inc. Tesla holds patents for
for an invention or its electric vehicle
process battery
technology
Result:
A table listing the four main types of Intellectual Property with corresponding
real-world business examples was successfully created.
Conclusion:
This practical helped in understanding the significance of Intellectual Property rights
and how businesses use patents, copyrights, trademarks, and trade secrets to
protect their innovations, branding, and competitive advantages.
15 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
12. Prepare a short Word document or PowerPoint slide
explaining how digital businesses protect their intellectual
property (e.g.. software licensing, watermarking, copyright
notices).
16 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
3. Copyright Notices:
Businesses display copyright symbols (©), along with the year and
owner’s name, on digital products to assert legal ownership.
Copyright notices inform users of protected content and the
consequences of infringement.
This helps deter unauthorized use and supports legal enforcement
if violations occur.
4. Additional Methods (Optional):
Digital Rights Management (DRM): Controls and restricts how
digital content is accessed or copied.
Encryption: Protects software and data by encoding them to
prevent unauthorized access.
Patents and Trademarks: Legally protect unique inventions and
brand identifiers in the digital space.
Result:
The key methods digital businesses use to protect their intellectual property
were identified and explained, providing a clear understanding of how IP
protection works in the digital economy.
Conclusion:
This practical clarified that protecting intellectual property is crucial for digital
businesses to maintain their competitive edge, prevent piracy, and secure
revenue. Employing legal and technological safeguards helps ensure content and
software are used only as intended.
You can use this for your Word document or PowerPoint slide:
17 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
Slide 2 / Main Content:
Protection Description
Method
Software Defines usage rights; prevents illegal copying or sharing
Licensing through licensing agreements.
Watermarking Embeds marks in digital content to identify ownership and
discourage unauthorized use.
Copyright Displays © symbol and owner info to assert legal ownership
Notices and warn against infringement.
Additional DRM, encryption, patents, and trademarks provide further
Methods protection and control over digital assets.
18 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
4. Starting from the second row, enter the employee data as given:
o Emp_ID: 101, Name: Arjun, Dept: HR, DOJ: 01-01-24, Salary:
50000
o Emp_ID: 102, Name: Meena, Dept: Finance, DOJ: 15-02-24,
Salary: 60000
o Emp_ID: 103, Name: Kiran, Dept: Sales, DOJ: 12-03-24, Salary:
45000
o Emp_ID: 104, Name: Neha, Dept: IT, DOJ: 25-04-24, Salary:
70000
5. Format the DOJ column to display dates correctly (e.g., dd-mm-yy).
6. Format the Salary column as currency or number without decimals for
clarity.
7. Optionally, use Excel Table feature (Ctrl + T) to convert the data into a
table for easier sorting and filtering.
8. Save the workbook with an appropriate file name (e.g.,
EmployeeDatabase.xlsx).
Observations:
Emp_IDName Dept DOJ Salary
101 Arjun HR 01-01-24 50,000
102 Meena Finance 15-02-24 60,000
103 Kiran Sales 12-03-24 45,000
104 Neha IT 25-04-24 70,000
Result:
A database-like table was successfully created in Excel with proper column
headings and formatted data entries. The table can now be used for data
management, sorting, and analysis.
Conclusion:
This practical demonstrated how to organize and manage data in a tabular format
using Excel, a fundamental skill in business and IT environments. Using Excel
tables improves data handling efficiency and accuracy.
19 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
If you want, I can help you create an Excel file with this table that you can
download and use directly. Would you like me to prepare that?
Sorted Data:
Emp_ID Name Dept DOJ Salary
104 Neha IT 25-04-24 70,000
102 Meena Finance 15-02-24 60,000
101 Arjun HR 01-01-24 50,000
103 Kiran Sales 12-03-24 45,000
20 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
Result:
The employee data was successfully sorted in descending order based on the
Salary column. Neha, with the highest salary of 70,000, appears at the top, and
Kiran with the lowest salary of 45,000 appears at the bottom.
Conclusion:
Sorting data in Excel is a crucial operation that helps analyze datasets efficiently.
Sorting by salary from high to low allows businesses to quickly identify top
earners or focus on salary-based decisions.
21 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
Result:
Filtering was successfully applied to display only the employee(s) from the Sales
department. In this case, only Kiran appears in the filtered view.
Conclusion:
This practical demonstrated how filtering in Excel helps extract specific data
from a large dataset. Filtering by department is useful in HR, payroll, or
departmental reporting to focus on particular employee groups.
Apparatus/Tools Used:
Lab Computer with Microsoft Excel
Employee salary dataset
Basic Excel functions (e.g., SUM)
Procedure:
1. Open a new Excel worksheet.
2. Create a table with two columns:
o Column A: Salary as Number
o Column B: Salary as Text
3. In Column A, enter numeric salary values (e.g., 50000, 60000).
4. In Column B, enter the same values but as text (e.g., by placing an
apostrophe ' before the number or formatting the cell as “Text”).
5. Use the =SUM() function on both columns and compare the results.
22 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
Observations:
Salary as Number Salary as Text
50000 '50000
60000 '60000
45000 '45000
Calculations:
=SUM(A2:A4) ➝ 155000 (Correct total)
=SUM(B2:B4) ➝ 0 or Error (Text values are ignored in calculation)
Result:
Excel successfully calculated the total when salary values were entered as
numbers. However, when the same values were entered as text, Excel did not
include them in the total.
Conclusion:
This practical clearly demonstrates that Excel treats text and numbers
differently.
Numeric data types are required for any arithmetic operation (e.g.,
addition, average).
If numeric-looking data is stored as text, it will not work correctly in
calculations, leading to errors or incorrect results.
Understanding data types is essential for ensuring accurate data analysis
and avoiding calculation mistakes.
Apparatus/Tools Used:
23 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
Lab Computer with Microsoft Excel
Employee Salary Dataset
Excel Chart Tools
Procedure:
1. Open the existing Excel file with the employee data.
2. Ensure the data includes the following columns: Dept and Salary.
3. Use the AVERAGEIF function to calculate average salary for each
department.
Example formula:
=AVERAGEIF(B2:B5, "HR", C2:C5)
4. Create a new summary table with unique department names and their
average salaries.
5. Select this summary table.
6. Go to Insert > Chart, and choose either:
o Bar Chart – for clear comparison
o Pie Chart – for proportional representation
7. Add appropriate chart title, axis labels (for bar chart), and data labels.
Sample Dataset:
Emp_ID Name Dept DOJ Salary
101 Arjun HR 01-01-24 50000
102 Meena Finance 15-02-24 60000
103 Kiran Sales 12-03-24 45000
104 Neha IT 25-04-24 70000
24 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
Step 2 – Create a Bar Chart or Pie Chart Using This Summary
(Bar Chart Example):
Y-axis (Salary)
|
|
| ⬛
| ⬛ ⬛
| ⬛ ⬛ ⬛
| ⬛ ⬛ ⬛ ⬛
| | | | | X-axis (Departments)
HR Finance Sales IT
Result:
A bar chart (or pie chart) was successfully created showing the average salary
for each department. The IT department had the highest average salary, and
Sales had the lowest.
Conclusion:
This practical helped in visualizing numeric data (average salary) using Excel’s
chart tools. Charts enhance data understanding by presenting trends and
comparisons in a visually effective way, useful in business reports and decision-
making.
25 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
Apparatus/Tools Used:
Lab computer with Microsoft Excel
Sample dataset with mixed data types
Excel functions (SUM, VALUE, ISTEXT, ISNUMBER)
Procedure:
1. Open a new Excel worksheet.
2. Enter salary values in two columns:
o Column A (valid numeric values)
o Column B (values formatted or entered as text)
3. Apply the SUM() function to both columns and compare the results.
4. Use Excel’s ISTEXT() and ISNUMBER() functions to check the data type of
each cell.
5. Attempt to convert text-formatted numbers to numeric using VALUE() or
by reformatting the cells.
6. Recalculate and compare the corrected results.
Sample Dataset:
Salary (Number) Salary (Text)
50000 '50000
60000 '60000
45000 '45000
(Note: A leading apostrophe ‘ makes the value text in Excel.)
Step-by-Step Calculations:
=SUM(A2:A4) → ◻ 155000 (Correct calculation with numbers)
=SUM(B2:B4) → ◻ 0 or incorrect (Text values ignored in summation)
Error Identification:
=ISTEXT(B2) → ◻ TRUE
=ISNUMBER(B2) → ◻ FALSE
=VALUE(B2) → ◻ Converts to number (50000)
26 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
Result:
Mismatched data types caused calculation errors. Text values that looked like
numbers were ignored in formulas. After converting them properly to numeric
values, Excel performed the calculations correctly.
Conclusion:
This practical shows the importance of consistent data types in Excel. Even
though text may look like a number, Excel will not treat it as numeric unless it's
formatted or converted properly. Knowing how to identify and fix these issues
ensures accuracy in calculations and reports.
19. Create an Excel sheet with sales data and calculate the total -
Qty Price.
Emp ID Name Dept DOJ Salary
101 Arjun HR 01-01-24 50000
102 Meena Finance 15-02-24 60000
103 Kiran Sales 12-03-24 45000
104 Neha IT 25-04-24 70000
Practical: Create an Excel Sheet with Sales Data and Calculate Total (Qty
× Price)
Objective:
To create a sales data table in Excel using employee information and perform a
calculation for Total Sales using quantity and price.
27 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
Apparatus/Tools Used:
Lab computer with Microsoft Excel
Basic knowledge of Excel formulas
Sample employee and sales data
Procedure:
1. Open Microsoft Excel and create a new worksheet.
2. Enter the given employee data in columns: Emp ID, Name, Dept, DOJ,
Salary.
3. Add new columns for Qty (Quantity Sold) and Price per Unit.
4. Insert a formula in a new column (Total) to multiply Quantity and Price:
o =Qty * Price
o Example: =F2 * G2
5. Apply the formula to all rows.
6. Use =SUM() to calculate the Total Sales at the bottom of the column.
28 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
Result:
The sales data was entered successfully, and the total sales amount for each
employee was calculated using the formula Qty × Price. The final total sales
across all employees amounted to 4400.
Conclusion:
This practical demonstrated the use of formulas in Excel for basic arithmetic
operations. Using Qty × Price and the SUM() function, we can easily compute
and analyze sales data, which is a common task in business reporting.
20. Apply the SUM and AVERAGE functions to calculate the total
and mean price.
Practical: Applying SUM and AVERAGE Functions in Excel (Total & Mean
Price)
Objective:
To use Excel’s built-in functions — SUM and AVERAGE — to calculate the total
price and average price from the sales data.
Apparatus/Tools Used:
Lab computer with Microsoft Excel
Previously created sales data table
Excel formula bar
Procedure:
1. Open the Excel sheet that contains the sales data with Price column.
2. Select a blank cell below the Price column to calculate the total price.
3. Use the =SUM() function to add all the prices:
o Example: =SUM(G2:G5)
4. In another blank cell, apply the =AVERAGE() function to find the mean
price:
o Example: =AVERAGE(G2:G5)
5. Press Enter after each formula to see the result.
6. Label the cells appropriately for clarity (e.g., Total Price, Average Price).
29 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
100
200
150
300
Calculations:
Total Price:
=SUM(G2:G5) → 750
Average Price:
=AVERAGE(G2:G5) → 187.5
Result:
The total of all prices was calculated as ₹7 50, and the average price was found to
be ₹1 87.5 using Excel’s SUM and AVERAGE functions.
Conclusion:
This practical demonstrated how to perform basic statistical calculations in Excel.
The SUM() function adds numeric values, while AVERAGE() computes the mean.
These functions are essential for financial analysis, budgeting, and reporting in
business applications.
30 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
Apparatus/Tools Used:
Lab Computer with Microsoft Excel
Sales data including the Total (Qty × Price) column
Excel’s built-in IF function
Procedure:
1. Open the existing Excel sheet that contains the sales data with a Total
column.
2. Add a new column header titled Sales Status (e.g., in Column I).
3. In the first cell under Sales Status (e.g., I2), enter the following formula:
4. =IF(H2>20000, "High Sale", "Low Sale")
Here, H2 refers to the Total Sales amount of the first row.
5. Press Enter.
6. Drag the fill handle down to apply the formula to the remaining rows.
7. Observe the result — each row will now display High Sale or Low Sale
based on the value in the Total column.
In this example, all Total values are below 20,000, so the output is "Low Sale"
for all rows. If any total exceeds 20,000, the output will be "High Sale" for that
row.
Result:
The IF function was successfully used to categorize each sale as either "High
Sale" or "Low Sale", based on whether the Total Sales value exceeded
₹20,000.
31 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
Conclusion:
This practical demonstrated how Excel’s IF function helps in decision-making
tasks. It is a powerful tool for adding logic to your spreadsheet, enabling
automatic classification, risk flagging, or performance analysis.
Apparatus/Tools Used:
Lab computer with Microsoft Excel
Product dataset (including Prod ID, Name, Category, Price)
Excel’s VLOOKUP function
Procedure:
1. Open a new Excel worksheet.
2. Create a sample product table (lookup table) with the following columns:
o Prod_ID, Product_Name, Category, Price
3. In another cell, create an input field to enter a Prod ID to search.
4. Use the VLOOKUP function to retrieve product details based on that ID.
32 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
Step 2 – Search Input & VLOOKUP Formula:
Search Prod_ID: P102
In a new cell (e.g., G3), use the following formula to find the Product Name of
P102:
=VLOOKUP(G2, A2:D5, 2, FALSE)
Explanation of the formula:
G2: Cell containing the Prod_ID to search
A2:D5: The lookup table range
2: Column index number for Product_Name in the table
FALSE: Exact match required
You can repeat similar formulas to get other details like Category or Price:
Category: =VLOOKUP(G2, A2:D5, 3, FALSE)
Price: =VLOOKUP(G2, A2:D5, 4, FALSE)
Result:
When the user enters P102 in the search box (G2), the VLOOKUP formula
returns:
o Product Name: Mouse
o Category: Electronics
o Price: ₹400
Conclusion:
This practical successfully demonstrated how the VLOOKUP function can be
used to search and retrieve specific data based on a unique identifier like
Product ID. It is widely used in inventory systems, sales reports, and business
analysis to automate lookups and improve data efficiency.
33 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
Objective:
To create and use a Pivot Table in Microsoft Excel that summarizes Total Sales
grouped by each Product.
Apparatus/Tools Used:
Lab computer with Microsoft Excel
Sample sales dataset (including Product Name, Quantity, Price, and Total)
Excel’s Pivot Table feature
Procedure:
1. Open Excel and enter or open the sales dataset containing columns
such as:
o Product Name, Quantity, Price, Total Sales (Qty × Price)
2. Ensure the data is organized in tabular format without blank rows or
columns.
3. Select the entire dataset.
4. Go to the Insert tab and click PivotTable.
5. Choose whether to place the Pivot Table in a new worksheet or the
existing one.
6. In the Pivot Table Field List:
o Drag Product Name to the Rows area.
o Drag Total Sales to the Values area (it will automatically use
SUM).
7. The Pivot Table will now display the total sales for each product.
34 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
Pivot Table Output (Summarised):
Product Name Total Sales ( ₹)
Keyboard 10,500
Mouse 10,000
Printer 10,000
Grand Total 30,500
Result:
A Pivot Table was successfully created to summarize the total sales amount for
each product. The Keyboard and Printer both contributed ₹10,000 or more
in sales, and the Grand Total was ₹30,500.
Conclusion:
This practical demonstrated how to use Excel’s Pivot Table feature to quickly
analyze and summarize large datasets. Pivot Tables allow users to group, sort,
and total data efficiently, making them essential tools in business analytics and
reporting.
Apparatus/Tools Used:
Lab computer with Microsoft Excel
Product-wise sales dataset
Excel Chart Tools (Insert → Charts)
Procedure:
1. Open the Excel file containing product-wise sales data.
2. Ensure the data includes two columns:
35 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
o Product Name
o Total Sales
3. Select the range of cells containing this data (including headers).
o Example: A1:B4
4. Go to the Insert tab on the ribbon.
5. In the Charts group, select Insert Column or Bar Chart → Choose
Clustered Column.
6. A column chart will appear on the worksheet.
7. Add chart elements:
o Chart Title: “Sales by Product”
o Axis Titles: X-axis = Product Name, Y-axis = Total Sales (₹)
o Enable Data Labels for clarity.
36 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
Result:
A column chart was successfully created, clearly displaying the total sales for
each product. This visual representation makes it easy to compare product
performance at a glance.
Conclusion:
This practical demonstrated how to use Excel’s charting tools to convert raw
data into a visual format. Column charts are ideal for comparing quantities
across different categories, such as sales figures per product, making them
useful in sales analysis, presentations, and business reports.
25. Using the given data, create a Pivot Table in Excel to find the
total and average salary by department.
Employee Name Department Salary(Rs.)
A Sales 3000
B Accounts 4000
C Marketing 5000
D Sales 6000
E Accounts 4000
F Marketing 8000
Using the given data, create a Pivot Table in Excel to find the total and
average salary by department.
Employee Name Department Salary (Rs.)
A Sales 3000
B Accounts 4000
C Marketing 5000
D Sales 6000
E Accounts 4000
F Marketing 8000
37 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
Steps to Create Pivot Table in Excel:
1. Open Microsoft Excel and enter the above data into a worksheet
in three columns: Employee Name, Department, and Salary (Rs.).
2. Select the Data Range:
Click and drag to select the entire table, including headers (A1:C7).
3. Insert Pivot Table:
o Go to the Insert tab on the Ribbon.
o Click on PivotTable.
o In the dialog box, choose:
Select the table/range: $A$1:$C$7
Choose where to place the Pivot Table: Select New
Worksheet.
o Click OK.
4. Set Up Pivot Table Fields:
o Drag Department to the Rows area.
o Drag Salary (Rs.) to the Values area.
It will default to Sum of Salary (Rs.).
o Drag Salary (Rs.) to the Values area again.
Click on the dropdown arrow, select Value Field
Settings, choose Average, and click OK.
5. Format the Values (Optional):
o Right-click on the salary values and choose Number Format →
Select Currency or Number format for better readability.
38 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
Explanation:
The Pivot Table groups the salary data by department and calculates:
o The Total Salary (Sum) for each department.
o The Average Salary for employees in each department.
This method is useful for summarizing data efficiently without manually
calculating totals or averages.
Conclusion:
Using a Pivot Table in Excel is a powerful way to analyze and summarize data. In
this case, we found both the total and average salaries for each department in
just a few steps. It saves time and reduces errors compared to manual
calculations.
Objective:
To find and record the operating system details such as the OS name, version,
and system type (e.g., 64-bit) of the computer.
39 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
40 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
Version 12.5
System Type 64-bit
Conclusion:
The operating system details can be identified using built-in tools or commands
specific to each OS. Knowing the OS version is essential for compatibility,
troubleshooting, and software installations.
27. Use a utility software: compress a folder into .zip and extract it.
Objective:
To demonstrate how to use a utility software (such as File Explorer in Windows,
or third-party tools like WinRAR/7-Zip) to compress a folder into a .zip file and
then extract it.
Tools Used:
Windows File Explorer (Built-in utility)
(Alternatively: 7-Zip, WinRAR, or any compression software)
41 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
o A .zip file named MyDocuments.zip will be created in the same
location.
Result Table:
Action Performed Tool Used Output
Compressed a folder Windows File Explorer MyDocuments.zip created
Extracted the .zip file Windows File Explorer Folder extracted with original files
Conclusion:
Using utility software like Windows File Explorer or third-party tools, users can easily
compress files and folders into .zip format to reduce size or share them efficiently.
The extraction process restores the original contents without any data loss.
Objective:
To demonstrate the use of Microsoft Word features by creating a document that
includes a heading, a table, an image, and uses built-in styles for formatting.
Software Used:
Microsoft Word (Any version, e.g., Word 2016/2019/Office 365)
42 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
Steps to Perform the Task:
1. Open Microsoft Word:
Go to Start Menu → Microsoft Word, or double-click the Word icon.
2. Insert a Heading:
Click in the document and type a title, e.g.,
“Student Performance Report”
Highlight the title.
Go to the Home tab and click on Heading 1 under the Styles group.
Center the heading using the Center Alignment button.
3. Insert a Table:
Press Enter below the heading.
Go to the Insert tab → Click Table → Choose 3x4 (3 columns, 4 rows).
Enter sample data, e.g.:
Name Subject Marks
A Mathematics 85
B Science 78
C English 92
Use Table Design tab to apply a style (e.g., Grid Table 5 Dark - Accent
1).
4. Insert an Image:
Press Enter after the table.
Go to the Insert tab → Click Pictures → Choose This Device.
Select an image (e.g., a chart or student photo) from your computer and
click Insert.
Resize and position the image as needed.
43 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
o Font: Calibri, Size: 12 pt
o Use styles like Normal, Emphasis, or Quote.
Result Overview:
Component Action Taken
Heading Inserted and styled using Heading 1
Table Inserted a 3×4 table with student data
Image Inserted from local storage
Styles Applied Used built-in styles for formatting
Conclusion:
This activity demonstrates the basic yet essential features of Microsoft Word for
creating professional documents. By inserting structured data (tables), visual
elements (images), and applying consistent formatting (styles), users can
improve the readability and presentation of their documents.
Objective:
To create personalized interview call letters using Mail Merge in Microsoft Word
by merging a standard letter template with candidate details from a data source
(Excel).
Software Used:
Microsoft Word
Microsoft Excel
44 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
To,
<<Name>>
Subject: Interview Call Letter for the position of <<Position Applied>>
Dear <<Name>>,
We are pleased to inform you that you have been shortlisted for the interview
round. Please attend the interview as per the details below:
45 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
Regards,
HR Department
ABC Corporation
Result:
5 personalized letters will be generated, one for each candidate, with their
name, interview date, time, and venue automatically filled in.
To,
Ananya Roy
Subject: Interview Call Letter for the position of Software Engineer
We are pleased to inform you that you have been shortlisted for the interview
round. Please attend the interview as per the details below:
Date: 20-Oct-2025
Time: 10:00 AM
46 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
Venue: Room 101, ABC Corp
Regards,
HR Department
ABC Corporation
Conclusion:
Mail Merge is a powerful feature in Microsoft Word that allows sending
personalized letters to multiple recipients efficiently. It reduces manual work and
ensures consistency in formatting and content for bulk communication.
Objective:
To create a professional resume using Microsoft Word by applying formatting
tools, layout features, and styles to organize personal, educational, and career-
related information clearly and effectively.
Software Used:
Microsoft Word
47 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
o Email Address
o LinkedIn Profile (optional)
o Location (City, State)
John Doe
Phone: +91-9876543210 | Email: [email protected] LinkedIn:
linkedin.com/in/johndoe | Location: Pune, Maharashtra
48 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
- **Online Portfolio Website** – Created a personal website using HTML, CSS,
and JavaScript.
- **Library Management System** – Developed using C++ as part of the
academic project.
8. Declaration
**Declaration**
I hereby declare that the information provided above is true to the best of my
knowledge.
Date: 17-Oct-2025
Place: Pune
(Signature)
Result Overview:
Section Included Content Example
Name and Contact Info John Doe, Email, Phone, LinkedIn
Career Objective Short and clear objective
Education Table format with degrees and scores
Skills Listed as bullet points
Projects/Internships Academic or personal projects
Personal Details DOB, Languages, Hobbies
Declaration Formal statement with signature
49 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
Conclusion:
Creating a resume in MS Word involves organizing your personal, academic, and
professional information in a structured format. Word's formatting tools like
tables, headings, bullets, and styles help create a clean and professional
document that is ready for job applications.
Objective:
To create an engaging PowerPoint presentation on the topic “Digital Business
Trends”, using features such as slide layout, images, text formatting, and slide
transitions.
Software Used:
Microsoft PowerPoint
50 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
✅ Slide 2: Introduction to Digital Business
Content:
o Definition of digital business
o Importance in today’s economy
Image: Icon or image showing digital workflows
Use Title and Content Layout
Transition: Push
✅ Slide 5: Conclusion
Key Points:
o Digital business is evolving rapidly
o Companies must adapt to remain competitive
Include a quote or infographic
End with “Thank You”
Transition: Zoom
51 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
Design Theme: Use any built-in professional theme (e.g., Ion, Integral,
or Wisp)
Images: Inserted from royalty-free sources or stock images
Transitions: Applied to all slides via Transitions Tab
Animations: Applied to bullets or images for visual effect
Result Overview:
Slide Title Key Feature
No.
Slide 1 Digital Business Trends Title, Subtitle, Image, Fade
Slide 2 Introduction Text + Image, Push transition
Slide 3 Top Trends in 2025 SmartArt + Bullet Points, Wipe
Slide 4 Benefits of Digital Two-column layout, Split
Transformation transition
Slide 5 Conclusion Summary, Quote/Image, Zoom
Conclusion:
Microsoft PowerPoint provides powerful tools to create professional presentations
with text, images, transitions, and animations. This activity helps in
understanding how to effectively communicate ideas using visual design,
structure, and storytelling.
Objective:
To create an engaging PowerPoint presentation on the topic “Digital Business
Trends”, using features such as slide layout, images, text formatting, and slide
transitions.
Software Used:
Microsoft PowerPoint
52 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
53 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
o Left: Text (Benefits like efficiency, speed, reach)
o Right: Image showing digital growth/statistics
Apply a mild animation to each bullet
Transition: Split
✅ Slide 5: Conclusion
Key Points:
o Digital business is evolving rapidly
o Companies must adapt to remain competitive
Include a quote or infographic
End with “Thank You”
Transition: Zoom
Result Overview:
Slide Title Key Feature
No.
Slide 1 Digital Business Trends Title, Subtitle, Image, Fade
Slide 2 Introduction Text + Image, Push transition
Slide 3 Top Trends in 2025 SmartArt + Bullet Points, Wipe
Slide 4 Benefits of Digital Two-column layout, Split
Transformation transition
Slide 5 Conclusion Summary, Quote/Image, Zoom
54 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
Conclusion:
Microsoft PowerPoint provides powerful tools to create professional presentations
with text, images, transitions, and animations. This activity helps in
understanding how to effectively communicate ideas using visual design,
structure, and storytelling.
Objective:
To understand and list commonly used shortcut keys in Microsoft Excel that help
in improving speed, efficiency, and productivity while working with spreadsheets.
Explanation:
Shortcut keys in MS Excel allow users to perform various functions quickly
without using the mouse. They are especially useful for data entry, formatting,
navigation, and executing commands. Knowing these shortcuts improves
workflow and reduces time spent on repetitive tasks.
55 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
Conclusion:
Learning and using shortcut keys in MS Excel enhances user efficiency and
allows faster navigation and manipulation of data. These shortcuts are valuable
for students, professionals, and anyone working with large sets of data in
spreadsheets.
Objective:
To learn and list commonly used shortcut keys in Microsoft Word that help in
efficiently performing various tasks such as editing, formatting, navigating, and
managing documents.
Explanation:
Shortcut keys in MS Word are combinations of keys that provide quick access to
commands and features without using the mouse. They improve productivity
and save time when working with documents by simplifying repetitive tasks.
56 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
Commonly Used Shortcut Keys in MS Word
Shortcut Key Function / Description
Ctrl + N Create a new document
Ctrl + O Open an existing document
Ctrl + S Save the current document
Ctrl + P Open the Print dialog box
Ctrl + C Copy selected text or object
Ctrl + X Cut selected text or object
Ctrl + V Paste copied or cut content
Ctrl + Z Undo the last action
Ctrl + Y Redo the last undone action
Ctrl + A Select all text in the document
Ctrl + F Find text in the document
Ctrl + H Find and replace text
Ctrl + B Apply bold formatting
Ctrl + I Apply italic formatting
Ctrl + U Apply underline formatting
Ctrl + E Center align text
Ctrl + L Left align text
Ctrl + R Right align text
Ctrl + J Justify text alignment
Ctrl + 1 Single-line spacing
Ctrl + 2 Double-line spacing
Ctrl + Enter Insert a page break
Ctrl + Shift + > Increase font size
Ctrl + Shift + < Decrease font size
Ctrl + Home Move to the beginning of the document
Ctrl + End Move to the end of the document
Ctrl + Backspace Delete the previous word
Alt + Ctrl + S Split the window
F7 Spell and grammar check
57 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
Conclusion:
Shortcut keys in MS Word are valuable tools that help users navigate, format,
and edit documents efficiently. Regular use of these shortcuts saves time and
enhances overall productivity while working on word processing tasks.
Objective:
To understand and compare different types of network topologies used in
computer networks, focusing on their structure, advantages, disadvantages, and
applications.
Explanation:
Network topology refers to the physical or logical arrangement of nodes
(computers, devices) in a network. The choice of topology affects network
performance, scalability, maintenance, and fault tolerance. The most common
types are Star, Bus, Ring, and Mesh.
58 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
Conclusion:
Each network topology has its own strengths and weaknesses.
Star topology is commonly used for its simplicity and manageability.
Bus topology is outdated but cost-effective for small networks.
Ring topology offers better performance than bus under heavy load
but is less fault tolerant.
Mesh topology provides maximum reliability and is used in
critical environments despite higher costs.
Choosing the right topology depends on the size, budget, and reliability
requirements of the network.
59 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
Objective:
To identify and understand various networking devices used in computer
networks along with their primary functions to facilitate communication and data
transfer.
Explanation:
Networking devices are hardware components that help establish, maintain, and
manage network communication between computers, servers, and other
devices. Each device plays a specific role in ensuring data is transmitted
efficiently and securely across the network.
60 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
Conclusion:
Understanding networking devices and their functions is essential for designing,
managing, and troubleshooting networks. Each device has a specific role that
contributes to efficient data communication and network security.
37. Find IP address and DNS of your system (Hint: Command Prompt →
ipconfig).
Find IP address and DNS of your system. (Hint: Use Command Prompt →
ipconfig)
Objective:
To find and note down the IP address and DNS server addresses of the computer
using the Command Prompt utility in Windows.
Explanation:
The IP address is a unique identifier assigned to your computer on a network,
allowing it to communicate with other devices.
The DNS (Domain Name System) server translates website names (like
www.google.com) into IP addresses that computers use to communicate.
Using the Windows Command Prompt with the command ipconfig allows you to
view network configuration details including IP address and DNS servers.
61 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
Steps to Find IP Address and DNS:
1. Press Windows + R keys to open the Run dialog box.
2. Type cmd and press Enter to open the Command Prompt.
3. In the Command Prompt window, type the following command and press
Enter:
4. ipconfig /all
5. Look for the active network adapter (e.g., Ethernet adapter or Wi-Fi
adapter).
6. Find the following details:
o IPv4 Address (This is your system’s IP address)
o DNS Servers (Lists the IP addresses of DNS servers used)
Conclusion:
Using the ipconfig command in Command Prompt is a quick and effective way to
find important network details such as the IP address and DNS servers of your
system. These details are essential for troubleshooting network issues and
configuring network settings.
62 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
Procedure:
1. Open Google Search:
Launch your preferred web browser and navigate to www.google.com.
2. Enter Search Query:
In the search bar, type "Digital Marketing Tools" and press Enter.
3. Review Search Results:
Examine the first page of search results to identify the top 5 listings.
These are typically the most relevant and authoritative sources related to
the search term.
4. List and Explain Top 5 Results:
Based on the current search results, the top 5 listings are:
1. HubSpot Blog – "The 28 Best Digital Marketing Tools"
HubSpot's blog post provides an extensive list of 28 digital
marketing tools, including HubSpot itself, Ahrefs, Canva, Google
Analytics, and Mailchimp. It offers a comprehensive overview of
each tool's features and benefits, making it a valuable resource for
marketers seeking to enhance their digital marketing strategies.
HubSpot Blog
2. Wikipedia – "Adobe Experience Cloud"
This Wikipedia page details Adobe Experience Cloud, a suite of
integrated online marketing and web analytics products by Adobe.
It covers the suite's history, features, and its role in digital
marketing, providing a solid understanding of Adobe's offerings in
this space. Wikipedia
3. Wikipedia – "Optimizely"
The Wikipedia entry for Optimizely discusses its experimentation
products, including web and feature experimentation, CMS, content
marketing platform, customer data platform, and email campaign
tools. It highlights how Optimizely aids in optimizing digital
experiences through data-driven insights. Wikipedia
4. Wikipedia – "Act-On"
This page provides information about Act-On, a subscription-based
SaaS product for marketing automation. It outlines Act-On's tools
for email marketing, landing pages, social media prospecting, CRM
63 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
integration, lead management, webinar management, and
analytics, emphasizing its role in streamlining marketing efforts.
Wikipedia
5. Wikipedia – "Predis.ai"
Predis.ai's Wikipedia entry describes it as an AI-based ad creative
and social media content generation tool. It details the platform's
features, including auto-posting, content calendar, and scheduling
tools, catering to small and medium businesses, advertising
agencies, freelancers, and e-commerce store owners. Wikipedia
Conclusion:
The top 5 search results provide a diverse range of digital marketing tools, each
offering unique features to enhance various aspects of digital marketing. From
comprehensive suites like HubSpot and Adobe Experience Cloud to specialized
tools like Optimizely and Predis.ai, marketers have access to a plethora of
resources to optimize their strategies and achieve better results.
Note: The search results may vary based on location, search history, and other
factors. It's advisable to perform the search personally to get the most accurate
and up-to-date information.
1. Introduction
Amazon and Flipkart are two leading e-commerce platforms in India, each
offering a unique shopping experience. This analysis compares their features,
delivery services, and promotional offers to provide a comprehensive
understanding for consumers.
2. Platform Features
Amazon
Global Reach: Operates in multiple countries, offering a vast selection of
international and local products.
64 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
Amazon Prime: Provides benefits like free one-day and same-day
delivery, early access to sales, and streaming services including
Prime Video and Prime Music.
Exclusive Brands: Offers in-house brands such as AmazonBasics,
Solimo, and Echo devices.
Flipkart
Indian Focus: Primarily caters to the Indian market with a strong
understanding of local consumer preferences.
Flipkart Black: A subscription service offering benefits like 5% SuperCoin
cashback, exclusive "Black Deals," and a ₹1 flight cancellation or
rescheduling option through Cleartrip Business Today.
Exclusive Brands: Features brands like MarQ, SmartBuy, and Anmi,
focusing on affordability and value.
3. Delivery Services
Amazon
Amazon Now: Offers ultra-fast 10-minute delivery in select cities like
Bengaluru, Delhi, and Mumbai for daily essentials The Times of India.
Scheduled Delivery: Provides scheduled two-hour delivery slots for large
appliances, allowing customers to plan deliveries in advance The Sun.
Coverage: Extensive delivery network across India, ensuring timely
deliveries in most regions.
Flipkart
Flipkart Minutes: Offers rapid delivery for daily essentials, though
service reliability can vary by location.
Delivery Challenges: Some users have reported delays and
cancellations, especially in non-metro areas Reddit.
Coverage: Strong presence in Tier 2 and Tier 3 cities, focusing on
regional accessibility.
4. Promotional Offers
Amazon
Great Indian Festival: Annual sale event offering significant discounts
across various categories.
65 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
Bank Offers: Collaborates with banks like HDFC to provide additional
discounts during sales.
Exchange Offers: Provides exchange options for smartphones, often
with competitive trade-in values.
Flipkart
Big Billion Days: Flagship sale event with deep discounts, especially on
electronics and fashion coupondabba.com.
Bank Offers: Partners with banks like SBI to offer extra savings during
sales.
Exchange Offers: Known for offering higher trade-in values on
smartphones compared to competitors Analytics Insight.
5. Conclusion
Both Amazon and Flipkart offer compelling reasons for consumers to choose their
platforms. Amazon excels in delivery speed and global product availability,
making it ideal for those seeking quick and reliable service. Flipkart, with its
strong local focus and value-oriented offerings, appeals to budget-conscious
shoppers and those looking for regional accessibility. The choice between the
two depends on individual preferences and priorities.
1. Introduction
Amazon and Flipkart are two leading e-commerce platforms in India, each offering a
unique shopping experience. This analysis compares their features, delivery
services, and promotional offers to provide a comprehensive understanding for
consumers.
2. Platform Features
Amazon
Global Reach: Operates in multiple countries, offering a vast selection of
international and local products.
66 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
Amazon Prime: Provides benefits like free one-day and same-day
delivery, early access to sales, and streaming services including
Prime Video and Prime Music.
Exclusive Brands: Offers in-house brands such as AmazonBasics,
Solimo, and Echo devices.
Flipkart
Indian Focus: Primarily caters to the Indian market with a strong
understanding of local consumer preferences.
Flipkart Black: A subscription service offering benefits like 5% SuperCoin
cashback, exclusive "Black Deals," and a ₹1 flight cancellation or
rescheduling option through Cleartrip Business Today.
Exclusive Brands: Features brands like MarQ, SmartBuy, and Anmi,
focusing on affordability and value.
3. Delivery Services
Amazon
Amazon Now: Offers ultra-fast 10-minute delivery in select cities like
Bengaluru, Delhi, and Mumbai for daily essentials The Times of India.
Scheduled Delivery: Provides scheduled two-hour delivery slots for large
appliances, allowing customers to plan deliveries in advance The Sun.
Coverage: Extensive delivery network across India, ensuring timely
deliveries in most regions.
Flipkart
Flipkart Minutes: Offers rapid delivery for daily essentials, though
service reliability can vary by location.
Delivery Challenges: Some users have reported delays and
cancellations, especially in non-metro areas Reddit.
Coverage: Strong presence in Tier 2 and Tier 3 cities, focusing on
regional accessibility.
4. Promotional Offers
Amazon
Great Indian Festival: Annual sale event offering significant discounts
across various categories.
67 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
Bank Offers: Collaborates with banks like HDFC to provide additional
discounts during sales.
Exchange Offers: Provides exchange options for smartphones, often
with competitive trade-in values.
Flipkart
Big Billion Days: Flagship sale event with deep discounts, especially on
electronics and fashion coupondabba.com.
Bank Offers: Partners with banks like SBI to offer extra savings during
sales.
Exchange Offers: Known for offering higher trade-in values on
smartphones compared to competitors Analytics Insight.
5. Conclusion
Both Amazon and Flipkart offer compelling reasons for consumers to choose their
platforms. Amazon excels in delivery speed and global product availability,
making it ideal for those seeking quick and reliable service. Flipkart, with its
strong local focus and value-oriented offerings, appeals to budget-conscious
shoppers and those looking for regional accessibility. The choice between the
two depends on individual preferences and priorities.
2. Materials Required
A device connected to the internet (Laptop, PC, smartphone, or tablet)
Internet browser (Chrome, Firefox, Edge, etc.)
Access to the website: speedtest.net
68 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
3. Procedure
1. Open the internet browser on your device.
2. Go to the website speedtest.net.
3. Click on the “Go” button to start the speed test.
4. Wait for the test to complete. The website will automatically measure:
o Download speed (how fast data is received from the internet)
o Upload speed (how fast data is sent to the internet)
5. Record the speeds shown on the screen.
4. Observations/Results
Parameter Measured Speed (Mbps)
Download Speed [Your measured download speed]
Upload Speed [Your measured upload speed]
Example:
Download Speed: 85.4 Mbps
Upload Speed: 24.7 Mbps
5. Explanation
Download Speed: This indicates how quickly data from the internet can
be downloaded to your device. It affects activities such as streaming
videos, browsing websites, and downloading files. Higher speeds mean
smoother and faster experiences.
Upload Speed: This shows how fast data from your device is uploaded to
the internet. It impacts activities like video calls, sending emails with
attachments, and uploading files to the cloud. Higher upload speeds
improve performance in these areas.
The speeds can vary based on network congestion, time of day, the device
used, and distance from the router or ISP infrastructure.
6. Conclusion
The speed test provides a snapshot of your internet connection quality. Regular
monitoring can help identify issues or verify ISP claims about internet speeds. A
stable and high-speed internet connection improves overall online experience.
69 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
42. Share a file via Bluetooth or LAN cable and document the steps.
2. Materials Required
Two computers or devices with Bluetooth capability and/or LAN ports
A LAN cable (Ethernet cable) for wired transfer or Bluetooth enabled on
both devices
A file to share (e.g., a document, image, or video)
3. Procedure
Option A: Sharing a File via Bluetooth
1. Enable Bluetooth
o On both devices, turn on Bluetooth from the settings menu.
o Ensure both devices are discoverable.
2. Pair Devices
o On one device, search for available Bluetooth devices.
o Select the other device from the list.
o Confirm the pairing code on both devices to establish a connection.
3. Send the File
o Locate the file you want to share.
o Right-click the file and select Send to > Bluetooth device
(on Windows) or use the share option on other OS.
o Choose the paired device from the list.
o Accept the incoming file on the receiving device.
o Wait for the transfer to complete.
4. Verify Transfer
o Check the destination folder (usually the Bluetooth folder or
Downloads) on the receiving device to confirm the file is received.
70 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
Option B: Sharing a File via LAN Cable
1. Connect Devices
o Connect both computers using a LAN cable (Ethernet cable).
2. Configure Network Settings
o Set static IP addresses on both devices within the same subnet.
Example:
Device 1 IP: 192.168.1.1, Subnet mask: 255.255.255.0
Device 2 IP: 192.168.1.2, Subnet mask: 255.255.255.0
3. Enable File Sharing
o On the device sending the file, enable file sharing on the folder
containing the file.
o Right-click the folder > Properties > Sharing > Share > select users
and permissions.
4. Access Shared Folder
o On the receiving device, open File Explorer.
o Enter the IP address of the sending device in the format
\\192.168.1.1 in the address bar.
o Browse to the shared folder.
5. Copy the File
o Locate the file in the shared folder.
o Copy and paste it to the desired location on the receiving device.
6. Verify Transfer
o Check the copied file on the receiving device for successful transfer.
4. Explanation
Bluetooth sharing is convenient for small files and requires no
cables, but it is slower and suitable for short distances.
LAN cable sharing provides a faster and more reliable
method, especially for large files, but requires network
configuration.
Both methods are useful for direct file transfer without internet access.
71 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
5. Conclusion
Sharing files via Bluetooth or LAN cable is a practical and effective way to
transfer data between devices. Choosing the appropriate method depends on the
file size, device compatibility, and transfer speed requirements.
44. Prepare a table with SaaS, PaaS, and IaaS examples and
their business use. Example:
Cloud Service Model Examples Business Use
SaaS
PaaS
IaaS
Practical Record: Cloud Service Models – SaaS, PaaS, and IaaS with
Examples and Business Uses
1. Objective
To understand the different cloud service models — Software as a Service
(SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS) —
along with examples and their business applications.
72 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
environments.
IaaS Amazon Web Offers virtualized computing
(Infrastructure Services (AWS resources over the internet.
as a Service) EC2), Microsoft Businesses use it for scalable
Azure VMs, Google storage, networking, and computing
Compute Engine power, eliminating the need for
physical hardware.
3. Explanation
SaaS delivers software applications via the internet on a subscription
basis. Users can access the applications on-demand, reducing the need for
installation and maintenance. This model is suitable for organizations
looking to provide easy access to business tools without managing
software updates or infrastructure.
PaaS provides a platform allowing developers to build, test, and deploy
applications without worrying about hardware or operating systems. It
accelerates application development and simplifies the process of
scaling.
IaaS offers fundamental IT infrastructure such as virtual machines,
storage, and networks on a pay-as-you-go basis. It is ideal for businesses
requiring flexible and scalable resources for hosting applications,
websites, or data storage without investing in physical servers.
4. Conclusion
Understanding SaaS, PaaS, and IaaS is critical for businesses adopting cloud
technologies. Each service model serves different needs — SaaS focuses on end-
user applications, PaaS supports development environments, and IaaS provides
underlying infrastructure. Choosing the appropriate model helps organizations
optimize resources, reduce costs, and improve scalability.
73 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
45. Compare Public, Private, and Hybrid clouds with examples in a table.
74 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
3. Explanation
Public Cloud: Provides on-demand computing resources accessible to
multiple customers. It offers high scalability and cost efficiency but with
less control over data security and infrastructure.
Private Cloud: Provides exclusive resources to a single organization,
offering more control, security, and customization. It often requires higher
investment in infrastructure and maintenance.
Hybrid Cloud: Integrates public and private clouds, enabling
organizations to optimize workloads and data placement. It helps meet
security and compliance requirements while benefiting from the
scalability of public clouds.
4. Conclusion
Each cloud deployment model serves distinct business needs:
Public clouds are ideal for flexible, scalable, and cost-efficient solutions.
Private clouds suit businesses needing high security and control.
Hybrid clouds provide a balanced approach for organizations wanting
the best of both worlds.
Selecting the appropriate cloud deployment depends on factors like data
sensitivity, budget, compliance, and scalability requirements.
75 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
46. Create a strong password and test it on an online strength
checker like "How Secure is My Password."
2. Materials Required
Device with internet access (computer, laptop, smartphone)
Web browser
Access to an online password strength checker such as How Secure Is My
Password
3. Procedure
Step 1: Creating a Strong Password
Follow best practices for password creation:
o Use a minimum of 12 characters.
o Include a combination of uppercase letters, lowercase letters,
numbers, and special characters.
o Avoid common words, predictable patterns, or personal information.
Example of a strong password created:
G7!p#9rQw2@Lm4
Step 2: Testing Password Strength
1. Open the web browser and go to How Secure Is My Password.
2. Enter the created password in the input field.
3. Observe the password strength rating provided by the tool.
4. Note the estimated time it would take for the password to be cracked.
4. Observations/Results
Parameter Details
Created Password G7!p#9rQw2@Lm4
76 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
5. Explanation
A strong password is essential to protect online accounts from
unauthorized access.
Password strength checkers analyze the complexity, length, and
unpredictability of passwords.
The example password contains a mix of character types and
sufficient length, making it difficult to crack.
Longer and more complex passwords significantly increase the time
and resources required for hacking attempts.
6. Conclusion
Creating and testing strong passwords is a crucial step in maintaining online
security. Using tools like "How Secure Is My Password" helps users ensure their
passwords are robust enough to withstand cyberattacks. Always use unique,
complex passwords for different accounts and consider using a password
manager for convenience.
2. Materials Required
Device with internet access (computer, laptop, or smartphone)
Google account credentials (email and password)
Mobile phone capable of receiving SMS or running an authenticator app
(e.g., Google Authenticator)
77 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
3. Procedure
Step 1: Enabling 2FA on Gmail
1. Open a web browser and go to https://myaccount.google.com/security.
2. Under the section “Signing in to Google”, find “2-Step Verification”
and click “Get Started”.
3. Sign in to your Google account again for verification.
4. Choose your primary 2FA method:
o Phone Prompt (recommended): Google sends a prompt to your
phone.
o Text message or voice call: Receive a code via SMS or call.
5. Follow the on-screen instructions to set up the chosen method. For
example, enter your phone number and verify it by entering the code sent
to you.
6. Once set up, 2FA will be enabled for your account.
Step 2: Demonstrating the Authentication Process
1. Log out of your Gmail account or open an incognito/private browsing
window.
2. Attempt to log in to Gmail using your email and password.
3. After entering correct credentials, Google will prompt you for a second
verification step:
o If using Phone Prompt, tap “Yes” on your mobile device.
o If using SMS, enter the verification code sent to your phone.
4. Upon successful verification, you will be granted access to your Gmail
account.
4. Observations/Results
Two-Factor Authentication was successfully enabled on the Gmail account.
During login, the system requested the second factor for authentication.
The account was accessed only after the correct second factor
was provided, adding an extra layer of security.
78 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
5. Explanation
Two-Factor Authentication (2FA) adds an additional security layer by requiring
not only a password but also a second verification step (something you have,
like your phone). This significantly reduces the risk of unauthorized access, even
if the password is compromised.
6. Conclusion
Enabling 2FA on Gmail enhances account security by requiring two forms of
identification during login. It is an effective method to protect personal
information from unauthorized access and is highly recommended for all online
accounts.
2. Materials Required
Computer or laptop with Microsoft Word installed (or any word processing
software)
Internet access for researching safe browsing tips (optional)
3. Procedure
1. Open Microsoft Word on your computer.
2. Create a new blank document.
3. Set the title of the document as “10 Safe Browsing Tips”.
4. Write the following safe browsing tips clearly in a numbered list format:
79 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
4. 10 Safe Browsing Tips
1. Use Strong and Unique Passwords
Always create strong passwords using a combination of letters, numbers,
and symbols, and avoid reusing passwords across sites.
2. Keep Your Software Updated
Regularly update your browser, operating system, and security software
to protect against vulnerabilities.
3. Enable Two-Factor Authentication (2FA)
Use 2FA wherever possible to add an extra layer of security to your
accounts.
4. Avoid Clicking on Suspicious Links
Do not click on unknown or unsolicited links received via email, messages,
or websites.
5. Use Secure Websites (HTTPS)
Only enter personal information on websites that use HTTPS encryption,
indicated by a padlock symbol in the address bar.
6. Clear Browsing Data Regularly
Clear cookies, cache, and browsing history periodically to prevent tracking
and data leaks.
7. Use a Reliable Antivirus and Anti-Malware Program
Install and update security software to detect and prevent threats while
browsing.
8. Be Careful with Public Wi-Fi
Avoid conducting sensitive activities on public Wi-Fi networks unless using
a VPN (Virtual Private Network).
9. Check Website Privacy Policies
Understand how websites use your data by reviewing their privacy policies
before sharing personal information.
10.Log Out of Accounts After Use
Always sign out from websites, especially on shared or public devices, to
prevent unauthorized access.
80 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
5. Saving and Sharing the Document
Save the document with a meaningful name such as
Safe_Browsing_Tips.docx.
The file can be shared via email or cloud storage for educational purposes.
6. Explanation
Creating a document with safe browsing tips helps users become more aware of
potential online risks and adopt better security habits. Presenting the
information in a Word document makes it easy to distribute and refer to for
improving internet safety practices.
7. Conclusion
The Word document serves as a useful guide for individuals to browse the
internet securely. Following these tips helps protect against cyber threats like
phishing, malware, and identity theft.
2. Materials Required
Computer with Microsoft PowerPoint or Word installed
Internet access for research on cyber threats and business case studies
3. Procedure
Step 1: Research Cyber Threats
Gather information on Malware, Phishing, and DoS attacks.
Find business cases where these attacks caused significant impact.
81 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
Step 2: Prepare PowerPoint Slides / Report Sections
Slide/Section Content Details
Title Slide Cyber Threats: Malware, Phishing, and DoS Attacks
Introduction Brief overview of cyber threats and their relevance to
businesses
Malware Definition, types (virus, ransomware, spyware), business
example (e.g., WannaCry ransomware attack on NHS)
Phishing Explanation of phishing attacks, common techniques,
business example (e.g., Google & Facebook phishing scam
resulting in $100 million loss)
Denial of Service Description of DoS and Distributed DoS (DDoS) attacks,
(DoS) business example (e.g., Dyn DNS DDoS attack affecting
Twitter, Amazon)
Impact on Financial loss, data breach, reputation damage, operational
Businesses disruption
Prevention & Security measures like antivirus, employee training,
Mitigation firewalls, multi-factor authentication
Conclusion Summary and importance of cybersecurity awareness in
businesses
References Sources of information and business examples
Step 3: Design and Finalize
Add relevant images, charts, or diagrams to enhance understanding.
Use bullet points and concise text for clarity.
Review and save the presentation/report.
4. Explanation
Malware is malicious software designed to harm or exploit systems. For
example, the WannaCry ransomware attack in 2017 affected hospitals,
causing severe operational issues.
Phishing involves fraudulent emails or websites to steal sensitive
information. A major scam targeting Google and Facebook led to a loss of
over $100 million.
82 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
Denial of Service (DoS) attacks overwhelm servers, causing service
outages. The Dyn DNS DDoS attack in 2016 disrupted many major
websites.
Businesses face financial, legal, and reputational risks due to these
attacks.
Preventive measures including employee awareness, updated
security software, and strong access controls are vital.
5. Conclusion
Cyber threats such as Malware, Phishing, and DoS attacks pose significant risks to
businesses worldwide. Understanding these threats and implementing security
measures is essential to protect assets and maintain trust.
50. Prepare a short report (in Word) summarising cyber laws in India
(IT Act, DPDPA 2023) and their importance for digital businesses.
2. Materials Required
Computer with Microsoft Word or any word processing software
Internet access for research
3. Procedure
Step 1: Research
Gather information on the IT Act, 2000 and DPDP Act, 2023 from credible
sources such as government websites, legal publications, and news
articles.
Step 2: Structure the Report
Open a new document in Microsoft Word.
83 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
Title the document as "Cyber Laws in India: IT Act, 2000 and Digital
Personal Data Protection Act, 2023".
Organize the content into the following sections:
1. Introduction
2. Information Technology Act, 2000
3. Digital Personal Data Protection Act, 2023
4. Importance for Digital Businesses
5. Conclusion
Step 3: Write the Report
4. Report Content
Title: Cyber Laws in India: IT Act, 2000 and Digital Personal Data Protection Act,
2023
1. Introduction
In the digital age, safeguarding information and ensuring secure online
transactions are paramount. India has enacted cyber laws to address these
concerns and regulate digital activities.
2. Information Technology Act, 2000 (IT Act)
The IT Act, 2000 was the first legislation in India to address cybercrimes and
electronic commerce. It provides a legal framework for electronic governance by
recognizing electronic records and digital signatures. The Act defines
cybercrimes and prescribes penalties for civil wrongs. It also established the
Controller of Certifying Authorities to regulate the issuance of digital signatures
and the Cyber Appellate Tribunal to resolve disputes arising from this law.
3. Digital Personal Data Protection Act, 2023 (DPDP Act)
The DPDP Act, 2023 aims to protect personal data and establish a comprehensive
data protection regime in India. It applies to both Indian residents and
businesses involved in the collection of personal data. The Act permits personal
data collection for lawful purposes, contingent on obtaining consent from the
individual or establishing legitimate reasons as prescribed in the law. It
necessitates data collectors to provide clear notices detailing the specifics of
data usage, the rights of the individual, and grievance redress mechanisms.
84 | P a g e
B.Com I Sem – FIT – Practical Questions with Answers
4. Importance for Digital Businesses
Compliance: Businesses must adhere to these laws to avoid legal
repercussions.
Consumer Trust: Ensuring data protection fosters trust among
consumers.
Operational Security: Implementing cybersecurity measures
protects business operations from cyber threats.
International Standards: Aligning with global data protection
standards facilitates international trade and partnerships.
5. Conclusion
The IT Act, 2000 and DPDP Act, 2023 are pivotal in shaping the digital landscape
in India. Digital businesses must understand and comply with these laws to
operate securely and maintain consumer confidence.
5. Explanation
This report provides a comprehensive overview of India's cyber laws,
highlighting their relevance and importance for digital businesses.
Understanding these laws is crucial for businesses to operate within the legal
framework and protect both their interests and those of their consumers.
6. Conclusion
The IT Act, 2000 and DPDP Act, 2023 are foundational to India's digital legal
infrastructure. Digital businesses must stay informed about these laws to ensure
compliance and foster a secure digital environment.
85 | P a g e