Computer Applications in Business PYQ 2017

Read paper here or download the pdf file and share it with your mates

Q1. (a) State True or false-

( i) ROM is a volatile memory.

(ii) A network is interconnection of computers that enables  the users to share network resources.

(iii) A foreign key always uniquely identifies a record.

(iv) Chart crated on the worksheet is called embedded charts

(B) Answer in one line:

(i)  Define topology.

(il) What is folder?

(il) What is the use of random sampling?

Answers.

(a) State True or False:

(i) False. ROM (Read-Only Memory) is a non-volatile memory, meaning its contents are retained even when power is turned off.

(ii) True. A network is an interconnection of computers that enables users to share network resources such as data, files, printers, etc.

(iii) False. A foreign key may or may not uniquely identify a record, as it refers to the primary key of another table and may have duplicate values in the referencing table.

(iv) True. Charts created on a worksheet in a spreadsheet software are commonly referred to as embedded charts, as they are integrated within the worksheet itself.

 

(B) Answer in one line:

(i) Topology refers to the physical or logical layout of a computer network.

(ii) A folder is a directory or container used to store files and other folders in a hierarchical manner on a computer’s file system.

(iii) Random sampling is used in statistics and research to select a random subset of individuals or data points from a larger population for analysis or study.

 

 

Q2. What do you understand by network topology? Describe three commonly used network topology .

Ans. Network topology refers to the physical or logical layout of a computer network, which determines how devices such as computers, switches, routers, and servers are interconnected. There are various types of network topologies, and three commonly used ones are:

Bus Topology: In a bus topology, all devices in a network are connected to a single communication channel, which acts as a shared medium. Each device has its own unique address, and data is transmitted in both directions along the bus. However, when two devices transmit data simultaneously, a collision may occur, leading to data loss or corruption. Bus topology is simple and inexpensive to implement, but it can suffer from performance degradation and is not widely used in modern networks.

Star Topology: In a star topology, all devices in a network are connected to a central device, such as a switch or a hub. The central device acts as a point of connection for all devices and manages the flow of data between them. Each device in a star topology has its own dedicated connection to the central device, which eliminates the risk of collisions. Star topology is widely used in Ethernet networks and is easy to manage, but it requires more cabling and can suffer from a single point of failure if the central device fails.

Mesh Topology: In a mesh topology, all devices in a network are interconnected with each other, forming multiple redundant paths for data transmission. Each device in a mesh topology can communicate directly with any other device, creating a highly resilient and fault-tolerant network. Mesh topology provides high scalability and reliability, but it requires more cabling and is more complex to manage.

Other common network topologies include ring topology, tree topology, and hybrid topology, which combine different types of topologies. The choice of network topology depends on various factors such as the size of the network, the required level of redundancy, the cost of implementation, and the type of data transmission requirements.

 

OR

 

Q2. What is a Payment Gateway? How it works?

Ans. A payment gateway is a technology solution that enables online merchants to securely accept and process electronic payments from customers for goods and services purchased online. It acts as an intermediary between the customer, the merchant, and the financial institutions involved in the payment process, such as banks and credit card companies.

The process of how a payment gateway works can be summarized as follows:

Customer places an order: The customer selects products or services on the merchant’s website and proceeds to the checkout page to initiate the payment process.

Payment information is entered: The customer enters payment information, such as credit card details, into the checkout page. The payment gateway encrypts the payment data to ensure it is transmitted securely over the internet.

Payment data is transmitted: The encrypted payment data is transmitted from the merchant’s website to the payment gateway for processing.

Payment authorization: The payment gateway verifies the payment information with the respective financial institution, such as the customer’s bank or credit card company, to ensure the payment details are valid and that the customer has sufficient funds or credit to complete the transaction.

Transaction approval or decline: The financial institution sends a response to the payment gateway indicating whether the transaction is approved or declined. The payment gateway then relays this information to the merchant’s website.

Confirmation to customer: The customer receives a confirmation or decline notification on the merchant’s website, indicating the outcome of the transaction.

Settlement and funds transfer: If the transaction is approved, the payment gateway initiates the settlement process, where the funds from the customer’s account are transferred to the merchant’s account. This process may involve additional steps, such as clearing and settlement with the respective financial institutions, depending on the payment method used.

Transaction record keeping: The payment gateway typically maintains a record of all transactions processed, including transaction details, payment data, and authorization responses, for record-keeping, reconciliation, and dispute resolution purposes.

Overall, a payment gateway provides a secure and efficient way for online merchants to accept and process electronic payments, ensuring that sensitive payment information is transmitted and stored securely, and that transactions are authorized and settled accurately.

 

 

 

Q3. How traditional file system is different from database system?

Ans. A traditional file system and a database system are two different approaches to organizing and managing data. Here are some key differences between the two:

Data Structure: In a traditional file system, data is stored in separate files, each with its own structure and format. There may be redundancy and inconsistency in data across different files, and data relationships may not be well-defined. In contrast, a database system uses a centralized and structured approach to store data in a database, with a defined data model (such as a relational, hierarchical, or object-oriented model) that establishes relationships between data entities.

Data Integrity: In a traditional file system, data integrity (i.e., accuracy, consistency, and reliability of data) relies on manual checks and validations, which can be prone to errors. In a database system, data integrity is maintained through built-in mechanisms such as constraints, triggers, and rules that ensure data consistency, enforce data integrity rules, and prevent data duplication or inconsistency.

Data Sharing and Accessibility: In a traditional file system, data is typically stored in separate files, and sharing or accessing data across multiple applications or users can be challenging. In a database system, data can be easily shared and accessed by multiple applications or users concurrently, with proper access controls and permissions.

Data Scalability and Flexibility: In a traditional file system, adding, modifying, or deleting data may require changes to multiple files and programs, making it less scalable and flexible. In a database system, data can be easily modified, updated, or deleted using standardized database operations, making it more scalable and flexible in handling changing business requirements.

Data Management and Administration: In a traditional file system, data management and administration tasks such as data backup, recovery, security, and maintenance are typically performed manually, which can be time-consuming and error-prone. In a database system, these tasks can be automated and managed through a centralized database management system (DBMS), which provides tools and features for efficient data management, backup, recovery, and security.

Data Consistency and Redundancy: In a traditional file system, data redundancy and inconsistency may occur due to the lack of central control and standardization, resulting in duplicate data and potential data integrity issues. In a database system, data redundancy can be minimized through normalization techniques, and data consistency is maintained through proper data management practices, such as transaction management and concurrency control.

Overall, a database system provides a more structured, efficient, and scalable approach to managing and organizing data compared to a traditional file system, which may be more manual, error-prone, and less flexible in handling data-related tasks.

 

 

OR

 

Q3. What is operating system (OS)? Explain the types of operating system based on processing capability.

Ans. An operating system (OS) is a software program that manages and controls the hardware resources of a computer system, and provides a convenient and efficient interface for users to interact with the computer and run applications.

Based on processing capability, operating systems can be categorized into the following types:

Single-user, single-tasking OS: This type of operating system allows only one user to run one task or application at a time. Examples include older versions of MS-DOS (Microsoft Disk Operating System) and early versions of Apple Macintosh OS.

Single-user, multi-tasking OS: This type of operating system allows a single user to run multiple tasks or applications concurrently, where each task or application runs in the background and appears to be executing simultaneously. Examples include modern versions of Microsoft Windows, MacOS, and Linux.

Multi-user OS: This type of operating system allows multiple users to run multiple tasks or applications concurrently, where each user can have their own user account with separate settings, privileges, and resources. Examples include server operating systems such as Windows Server, Linux distributions for servers, and mainframe operating systems like IBM z/OS.

Real-time OS: This type of operating system is designed to handle real-time applications that require immediate and deterministic responses to external events. Real-time operating systems are used in embedded systems, industrial control systems, and other time-sensitive applications where the system must respond to events in real-time without delays. Examples include VxWorks, QNX, and FreeRTOS.

Distributed OS: This type of operating system is designed to manage and coordinate the resources of a network of interconnected computers, allowing them to work together as a single system. Distributed operating systems are used in large-scale distributed computing environments such as cloud computing, grid computing, and cluster computing. Examples include Google’s Android (for mobile devices) and distributed versions of Linux such as Red Hat Enterprise Linux (RHEL) and Ubuntu Server.

These are some common types of operating systems based on processing capability. Each type of operating system has its own features, advantages, and use cases, depending on the requirements of the computer system or application it serves.

 

 

Q4. Explain the following with example:

(i) Primary Key

(ii) Alternate key

(ili) Secondary Key

Ans.  (i) Primary Key: In a relational database, a primary key is a unique identifier for a record or row in a table. It uniquely identifies each record in the table and ensures that each record has a unique identity. A primary key must have the following properties:

Unique: No two records in the table can have the same primary key value.

Non-null: A primary key value cannot be null or empty.

Stable: A primary key value should remain unchanged over the lifetime of the record.

Example: Consider a “Students” table in a database with the following fields: StudentID (primary key), Name, Age, and Grade. In this case, the StudentID field serves as the primary key, uniquely identifying each student record in the table.

(ii) Alternate Key: An alternate key is a candidate key that is not chosen as the primary key for a table. It is also unique and can uniquely identify each record in the table, but it is not selected as the primary key. A table can have multiple alternate keys.

Example: Continuing with the “Students” table example, if in addition to the StudentID, both the Name and the Email fields are also unique and can identify each student record, then Name and Email could be alternate keys in the table.

(iii) Secondary Key: A secondary key is a key that is used for data retrieval or indexing purposes, but it is not unique. Unlike primary and alternate keys, a secondary key may have duplicate values. Secondary keys are used to speed up data retrieval operations and improve query performance.

Example: In the “Students” table, if there is a field called Grade, which represents the grade level of the student, and multiple students can have the same grade, then Grade could be used as a secondary key. It can be used to quickly retrieve all the students belonging to a particular grade level without enforcing uniqueness.

 

OR

 

 

Q4. What is DBMS? Explain its advantages and limitations?

Ans. DBMS stands for Database Management System, which is a software application that enables users to interact with a database and manage its data. It provides an organized and systematic way of storing, managing, and retrieving data in a database.

Advantages of DBMS:

Data Integrity: DBMS enforces integrity constraints to ensure that data entered into the database is accurate and consistent. It prevents data duplication, maintains referential integrity, and allows for data validation, thereby improving data quality and reliability.

Data Security: DBMS provides mechanisms to define access controls, authentication, and authorization to protect data from unauthorized access, modification, or deletion. It allows for user-level security, role-based permissions, and encryption, enhancing data security and confidentiality.

Data Consistency and Centralized Management: DBMS provides a centralized system for managing data, ensuring that data is consistent across different applications and users. It eliminates data redundancy and inconsistencies, which reduces the chances of data discrepancies and improves data integrity.

Data Sharing and Concurrent Access: DBMS allows for concurrent access to the database by multiple users or applications, enabling data sharing and collaboration among different users or departments. It provides mechanisms for concurrency control and transaction management, ensuring data integrity and consistency in a multi-user environment.

Data Backup and Recovery: DBMS provides features for data backup, recovery, and disaster management. It allows for scheduled backups, point-in-time recovery, and transaction log management, which helps in protecting data from accidental loss, hardware failures, or disasters.

Limitations of DBMS:

Cost and Complexity: DBMS software can be expensive to acquire, implement, and maintain. It requires skilled personnel for administration, configuration, and maintenance, which adds to the overall cost and complexity of the system.

Performance Overhead: DBMS introduces some performance overhead due to its additional layers of abstraction, data modelling, and processing. Complex queries or transactions may require additional processing time, which can affect system performance.

Scalability and Flexibility: DBMS may have limitations in terms of scalability and flexibility, especially with regards to handling large volumes of data or accommodating changes in data structures or business requirements. Upgrading or modifying a DBMS can be complex and time-consuming.

Dependence on DBMS Vendor: Organizations using a particular DBMS may become dependent on the vendor for support, upgrades, and bug fixes. Switching to a different DBMS may involve migration efforts and potential compatibility issues.

Security Risks: While DBMS provides data security features, it is still vulnerable to security risks such as SQL injection attacks, unauthorized access, or insider threats. Organizations need to implement additional security measures to protect against these risks.

In summary, DBMS offers many advantages in terms of data integrity, security, consistency, sharing, and recovery. However, it also has limitations in terms of cost, complexity, performance overhead, scalability, and dependence on vendors. Organizations need to carefully evaluate their requirements and considerations before choosing and implementing a DBMS.

0

Scroll to Top