0% found this document useful (0 votes)
53 views2 pages

Question Bank CAB

The document contains questions about information systems, databases, Microsoft applications like Excel and Access, cybersecurity topics, and practical questions related to mail merge, creating tables and queries in Access, references in Excel, and VLOOKUP and HLOOKUP functions. It is organized into four chapters that cover information systems, databases, Microsoft Office applications, and cybersecurity and privacy. The practical questions section asks about performing specific tasks in applications like mail merge and creating tables in Access.

Uploaded by

Asis Mahalik
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
53 views2 pages

Question Bank CAB

The document contains questions about information systems, databases, Microsoft applications like Excel and Access, cybersecurity topics, and practical questions related to mail merge, creating tables and queries in Access, references in Excel, and VLOOKUP and HLOOKUP functions. It is organized into four chapters that cover information systems, databases, Microsoft Office applications, and cybersecurity and privacy. The practical questions section asks about performing specific tasks in applications like mail merge and creating tables in Access.

Uploaded by

Asis Mahalik
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Chapter 1

1. Explain the classification of computers on the basis of technology, purpose and size.(8
marks)
2. What is information system? How is it different from IT? (8 marks)
3. What are the components of Information System? Explain with an example of your
choice.(8 marks)
4. Explain the major 3 roles of information system and elaborate on the types of
information system with examples. (12 marks)
5. Briefly explain the Role/changes bought by Information Systems in today’s
Business.(8 marks)
6. Business Pressure.

Chapter 2
1. State the advantages and application of Database management system. (8 marks)
2. Differentiate the traditional file management system with database system (8 marks)
3. Explain the various data base models like hierarchical, entity relationship and
relational model. (8 marks)
4. Briefly explain the data warehouse usage and its components. (12 marks)
5. Elaborate on Datamining and its applications in any of the two areas of your choice.
(12 marks)
Chapter 3 theory questions
1. Briefly explain the difference between excel and Access. State the advantages and
usage of using Access.(12 marks)
2. Explain the steps in creating a table and a form in MS access.(8 marks)
3. State the steps followed while using mail merge in MS word. What are the
advantages.(8 marks)
4. Explain the four functions which let you count up the number of cells matching
certain criteria in Excel.(8 marks)
5. State the steps in creating Pivot tables and its uses.(8 marks)

Chapter 4
1. Briefly explain about cybercrime? Sate the technologies and cybercrime protection
measures taken by companies? According to you, suggest ways on how you can
protect yourself from cybercrime. (12 marks)
2. Difference between Adware and Spyware. State the measures to overcome it ? (8
marks)
3. Differentiate Hacker and Cracker. Briefly explain the common hacking tactics used
by them.(8 marks)
4. Briefly explain the privacy issues and the ways to protect it.(8 marks)
5. Briefly explain the challenges of IT and explain the security management tools used
to protect from cyber-attacks. (12 marks)
Practical Questions
1. Write steps of mail merge.
2. How will you create table and query in MS Access? Write steps.
3. State differences between Absolute and relative reference in Excel?
4. Vlookup and Hlookup

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy