Question Bank CAB
Question Bank CAB
1. Explain the classification of computers on the basis of technology, purpose and size.(8
marks)
2. What is information system? How is it different from IT? (8 marks)
3. What are the components of Information System? Explain with an example of your
choice.(8 marks)
4. Explain the major 3 roles of information system and elaborate on the types of
information system with examples. (12 marks)
5. Briefly explain the Role/changes bought by Information Systems in today’s
Business.(8 marks)
6. Business Pressure.
Chapter 2
1. State the advantages and application of Database management system. (8 marks)
2. Differentiate the traditional file management system with database system (8 marks)
3. Explain the various data base models like hierarchical, entity relationship and
relational model. (8 marks)
4. Briefly explain the data warehouse usage and its components. (12 marks)
5. Elaborate on Datamining and its applications in any of the two areas of your choice.
(12 marks)
Chapter 3 theory questions
1. Briefly explain the difference between excel and Access. State the advantages and
usage of using Access.(12 marks)
2. Explain the steps in creating a table and a form in MS access.(8 marks)
3. State the steps followed while using mail merge in MS word. What are the
advantages.(8 marks)
4. Explain the four functions which let you count up the number of cells matching
certain criteria in Excel.(8 marks)
5. State the steps in creating Pivot tables and its uses.(8 marks)
Chapter 4
1. Briefly explain about cybercrime? Sate the technologies and cybercrime protection
measures taken by companies? According to you, suggest ways on how you can
protect yourself from cybercrime. (12 marks)
2. Difference between Adware and Spyware. State the measures to overcome it ? (8
marks)
3. Differentiate Hacker and Cracker. Briefly explain the common hacking tactics used
by them.(8 marks)
4. Briefly explain the privacy issues and the ways to protect it.(8 marks)
5. Briefly explain the challenges of IT and explain the security management tools used
to protect from cyber-attacks. (12 marks)
Practical Questions
1. Write steps of mail merge.
2. How will you create table and query in MS Access? Write steps.
3. State differences between Absolute and relative reference in Excel?
4. Vlookup and Hlookup