assignmentssolution@gmail.com

Get Assignments and Projects prepared by experts at a very nominal fee.

More than 8 years in assisting assignments and projects/dissertation/thesis of MBA,BBA,BCA,MCA,PhD and others-

Contact us at : Email : assignmentssolution@gmail.com

Help for : SMU, IIBM,IMT, NMIMS, NIBM ,KSBM, KAIZAN, ISBM, SYMBIOSIS, NIMS, IGNOU, XAVIER, XIBMS, ISM, PSBM, NSBM, NIRM, ISBM, ISMRC, ICMIND, UPES and many others.

Help in : Assignments, projects, M.Phil,Ph.D disseration & thesis,case studies

Courses,MBA,BBA,PhD,MPhil,EMBA,MIB,DMS,MMS,BMS,GDS etc

Contact us at : Email : assignmentssolution@gmail.com



Thursday 30 May 2013

IIBM Exam papers : contact us for answers at assignmentssolution@gmail.com

Examination Paper of Semester IV
IIBM Institute of Business Management 1
IIBM Institute of Business Management
Semester-IV Examination Paper MM.100
Information System
Section A: Objective Type (30 marks)
This section consists of Multiple Choice questions & Short Answer type questions.
Answer all the questions.
Part one questions carry 1 mark each & Part Two questions carry 5 marks each.
Part One:
Multiple Choices:
1. Stationary device related to the mouse is
a. Trackball
b. Pointing Stick
c. Electronic mouse
d. None of the above
2. Assembler language is also called
a. First generation languages
b. Second generation languages
c. Fourth generation languages
d. None of the above
3. HTML stands for
a. Hypertext Markup Language
b. Hypertext Multimedia Language
c. Hypertext Media Language
d. None of the above
4. Telecommunications networks covering a large geographic area is called
a. Local area networks
b. Broad band
c. Wide area networks
d. Virtual private network
5. Customer focused marketing process that is based on using the Internet, Intranet & Extranet to
establish two-way transactions between a business and its customers or potential customers
a. Target marketing
b. Focused marketing
c. General marketing
d. Interactive marketing
Examination Paper of Semester IV
IIBM Institute of Business Management 2
6. The obsessive use of computers, or the unauthorized access and use of networked computer
systems is
a. Hacking
b. Cyber Thefting
c. Computer crime
d. None of the above
7. Practice of sending extremely critical, derogatory and often vulgar e-mail messages or newsgroup
posting to other users on the Internet or online services is
a. Spamming
b. Flaming
c. Computer crime
d. None of the above
8. Security measures provided by computers devices that measure physical traits that make each
individual unique is
a. Biometric security
b. IT security
c. Firewall security
d. None of the above
9. Midrange systems is
a. High-end network servers
b. Dependent on network servers for Windows software, processing power and storage
c. Client network servers
d. None of the above
10. D.B.M.S help in eradicating problem of
a. Data Redundancy
b. Data Dependency
c. Both (a) & (b)
d. None of the above
Part Two:
1. What are the advantages of a database management approach to the file processing approach?
2. Write a short note on Electronic data interchange?
3. Define Neural Networks?
4. Define the following
a. Prototyping
b. End-user development
END OF SECTION A
Examination Paper of Semester IV
IIBM Institute of Business Management 3
Section B: Caselets (40 marks)
Caselet 1
Most companies store reams of data about their customers. The IT challenge has been how to
integrate and massage that information so the business units can respond immediately to changes in
sales and customer preferences.
Hency Schein Inc. (www.henryschein.com) has it figured out. The $2.8 billion distributor of
health care products designed and built a data warehouse with an in-house team of six IS
professionals. CIO Jim Harding says he knew..
1. What are some of the key requirements for building a good data warehouse? Use Henry Schein
Inc. as an example.
2. What are the key software tools needed to construct and use a data warehouse?
Caselet 2
The return on investment from voice-over-Internet protocol (VOIP) technology has proved difficult,
in part because upfront costs can be high and traditional long-distance phone charges have dropped
in recent years. Adding voice requires that all elements of the corporate network be tested – and in
some cases replaced or upgraded – for VOIP applicat..
1. What are the main business benefits that can be gained by companies that switch to VOIP
telephone systems?
2. What are some of the major cost factors that may limit a positive rate of return from investment
in VOIP projects?
END OF SECTION B
Examination Paper of Semester IV
IIBM Institute of Business Management 6
Section C: Applied Theory (30 marks)
1. What can be done to improve the security of business by using Internet?
2. What role does database management play in managing data as a Business resources?
END OF SECTION C
---------------------------------------------------------------- ***- -------------------------------------------------------

No comments:

Post a Comment