image

Solution of Assignment Synopsis & Project Dissertation Report


Note: ⇩    Fill the Name, Email and Mobile to get unlock the priclist...!!!!

PRODUCT DETAILS

Online-Typing-and-Filling

Title Name Amity Solved Assignment MBA for Information Technology And Management
University AMITY
Service Type Assignment
Course MBA
Semester Semester-III-IT Course: MBA
Short Name or Subject Code Information Technology And Management
Commerce line item Type Semester-III-IT Course: MBA
Product Assignment of MBA Semester-III-IT (AMITY)
Price

PRICE INR

Click to View Price
Download File (Purchase the product for download...!!!)

Solved Assignment


  Questions :-

Information Technology And Management

Assignment- A

1.What is a computer and what are the different characteristics of computer?
2.What are the basic features of OOPs?
3. What is an operating system and what are various types of operating system available in market?
4. What is memory management? Differentiate cache memory from main memory.
5. What are the different components of Database management system?
6. What is ERP? Explain the general Implementation methodology of ERP.
7. What do you understand by IT Enable services? What are the major segments of IT enable services?
What is IT enabled Services?
What is the Key IT enabled Services?

8. Write short notes on any three of the following.
a. E-commerce
b. HTTP
c. SAP
d. DBMS
e. Telnet

Assignment- B

Case Detail :

Read the case study given below and answer the questions given at the end
Company A is an educational service provider for a museum, responsible for the provision of information to public and research users on the holdings of a large collection of artifacts of national importance.
Company A is not in the business of producing the applications software but in the procurement of systems, particularly multimedia applications from leading companies in the field. The contract specifies that product acceptance is dependent on it reaching certain end requirements of usability, quality , and user friendly as the majority of end users of these products are usually people with little or no informatics skills, but highly discretionary needs.

  1. Discuss in detail what kind of I.T infrastructure can be adopted and implemented for new setup so that after successful implementation, the training costs of this infrastructure can also be avoided.

Assignment- C

1. When a key is pressed on the keyboard, which standard is used for converting the keystroke into the corresponding bits?
a. ANSI
b. ASCII
c. EBCDIC
d. ISO

2. Which device is used as the standard pointing device in a Graphical User Environment?
a. Keyboard
b. Mouse
c. Joystick
d. Track ball

3. Which of the following is not an output device?
a. Scanner
b. Printer
c. Flat Screen
d. Touch Screen

4. Which of the following devices have a limitation that we can only access information but cannot erase or modify it?
a. Floppy Disk
b. Hard Disk
c. Tape Drive
d. CDROM

5. Which technology is used in Compact disks?
a. Mechanica
b. Electrical
c. Electro Magnetic
d. Laser

6. Which of the following storage devices can store maximum amount of data?
a. Floppy Disk
b. Hard Disk
c. Compact Disk
d. Magneto Optic Disk

7. The programs which are as permanent as hardware and stored in ROM is known as—
a. Hard ware
b. Soft ware
c. Firm ware
d. ROM ware

8. EPROM can be used for—
a. Erasing the contents of ROM
b. Reconstructing the contents of ROM
c. Erasing and reconstructing the contents of ROM
d. Duplicating ROM

9. The contents of information are stored in—
a. Memory data register
b. Memory address register
c. Memory access register
d. Memory arithmetic register

10. Algorithm and Flow chart help us to—
a. Know the memory capacity
b. Identify the base of a number system
c. Direct the output to a printer
d. Specify the problem completely and clearly

11. Which of the following is the oldest spread sheet package?
a. VisiCalc
b. Lotus 1-2-3
c. Excel
d. Star Calc

12. How many characters can be typed in a single cell in Excel?
a. 256
b. 1024
c. 32,000
d. 65,535

13. A Worksheet can have a maximum of ___ number of rows—
a. 256
b. 1024
c. 32,000
d. 65,535

14. Comments put in cells are called—
a. Smart Tip
b. Cell Tip
c. Web Tip
d. Soft Tip

15. Comments can be added to cells using—
a. Edit -> Comments
b. Insert -> Comment
c. File -> Comments
d. View -> Comments

16. Which menu option can be used to split windows into two?
a. Format -> Window
b. View -> Window ->Split
c. View -> Split
d. Window -> Split

17. Which of the following is not a valid data type in Excel?
a. Number
b. Character
c. Label
d. Date/Time

18. Data can be arranged in a worksheet in an easy to understand manner using—
a. Auto Formatting
b. Applying Styles
c. Changing fonts
d. All of these

19. Which area in an Excel window allows entering values and formulas?
a. Title Bar
b. Menu Bar
c. Formula Bar
d. Standard Tool Bar
20. Multiple calculations can be made in a single formula using—
a. Standard Formulas
b. Array Formula
c. Complex Formulas
d. Smart Formula

21. An Excel Workbook is a collection of—
a. Workbooks
b. Worksheets
c. Charts
d. Worksheets and Charts

22. Which of the following is not a database application?
a. DBase
b. Edit
c. FoxPro
d. Access

23. which of the following is a database management tool developed by Microsoft?
a. DBase
b. Access
c. Personal Oracle
d. Sybase

24. HSAM stands for—
a. Hierarchic Sequential Access Method
b. Hierarchic Standard Access Method
c. Hierarchic Sequential and Method
d. Hierarchic Standard and Method

25. Threats to database security may be—
a. Direct
b. Indirect
c. Both Direct and Indirect
d. None of these

26. Which of the following is not a logical database structure?
a. Chain
b. Network
c. Tree
d. Relational

27. An organized collection of logically related data is known as—
a. Data
b. Meta data
c. Database
d. Database
28. The processing of an application between a client and a ____ processor.
a. Front end
b. Back end
c. Both
d. None of these

29. The____ is not formal enough to be implemented directly in a programming language.
a. Analysis model
b. E R model
c. Object oriented model
d. Object oriented data mode

30. Size of a database are usually measured in terms of—
a. Terabytes
b. Megabytes
c. Data bytes
d. Giga bytes

31. In databases, locking level is also called as—
a. Granularity
b. S lock
c. X lock
d. Dead lock

32. Wired networks—
a. Can be simpler to secure than wireless networks
b. Can involve running long wires through walls
c. Generally use Ethernet cables
d. All of the above

33. Wireless networks—
a. Can only have one type of operating system on them
b. Have a limited range that can be furthered reduced by physical obstacles
c. Only work with laptops
d. Are quite difficult to secure

34. Modems—
a. Stand for "Modulator/demodulators"
b. Connect to multiple computers
c. Broadcast wireless signals
d. Only work with AOL

35. What is a router?
a. A device that make ensures that all devices on your network get power
b. A device that manages the data flow of a network
c. A device that always has a firewall for security
d. A device that connects to the internet and a modem

36. ______ shares characteristics with both hardware and software.
a. Operating system
b. Software
c. Data
d. None

37. Which of the following statements is true about ERP Implementation?
a. “As-Is” stage follows “To-Be” stage.
b. “To-Be” stage follows “As-Is” stage.
c. “Go-Live” stage and “As-Is” stage can proceed simultaneously
d. None of the above

38. Which of the following factor does not contribute to the success of ERP?
a. Focus on business processes and requirements first.
b. Focus on achieving a healthy ERP ROI (Return on Investment), including post-implementation performance measurement.
c. Strong project management and resource commitment.
d. Lack of budget.

39. Who plays and important role in the selection of ERP Package?
a. Consultants
b. Vendors
c. Users
d. All of the above.

40. Enterprise¬-wide resource planning systems (ERP systems) attempt to—
a. Integrate all corporate information in one central database.
b. They do not allow information to be retrieved from many different organiza¬tional positions.
c. They allow any organizational object to be made invisible.
d. They allow information to be stored in multiple databases.

  Answers :-

Only after macking the payment you would be able to see the answer...!!!

Review

Average user rating

4.8 / 5

Rating breakdown

5
80% Complete (danger)
1
4
80% Complete (danger)
1
3
80% Complete (danger)
0
2
80% Complete (danger)
0
1
80% Complete (danger)
0

January 29, 2015
This was nice in buy
Assignment from solve zone is probably one of the first preference of students.

October 09, 2016
This was nice in buy
I recommend a website that was really helpful throughout your session.

March 19, 2017
Some day ago
This was nice in buy
This was good in buy . I found all the answer correct and meaningful and had scored good marks
Back to top