TYBCOM SEM-6 :
Computer Systems & Applications Paper-II
(Chapter wise Most Imp Questions with Solutions)
Unit 1: Advanced Excel (Very Important – Practical + Theory)
Long Questions
-
Explain advanced Excel functions with suitable examples (IF, VLOOKUP, HLOOKUP, INDEX, MATCH).
-
Explain Pivot Table and its applications in business.
-
What is Macro? Explain steps to record and run a macro.
-
Explain Data Validation and Conditional Formatting with examples.
-
Explain financial functions in Excel (PMT, NPV, IRR).
Repeated Short Notes
-
Sorting and Filtering
-
Charts and Graphs
-
Logical Functions
-
What-if Analysis
-
Goal Seek
Unit 2: Database Management System (DBMS)
Long Questions
-
Define DBMS and explain its advantages and disadvantages.
-
Explain database models (Hierarchical, Network, Relational).
-
Explain normalization with 1NF, 2NF and 3NF.
-
Explain Primary Key, Foreign Key and Candidate Key.
-
Explain SQL commands with examples (SELECT, INSERT, UPDATE, DELETE).
Repeated Short Notes
-
Data Redundancy
-
Data Integrity
-
ER Model
-
ACID Properties
-
Structured Query Language
Unit 3: E-Commerce
Long Questions
-
Define E-Commerce and explain its features and advantages.
-
Explain types of E-Commerce (B2B, B2C, C2C, C2B).
-
Explain Electronic Payment System and its types.
-
Explain security issues in E-Commerce.
-
Explain EDI (Electronic Data Interchange).
Repeated Short Notes
-
Digital Signature
-
Encryption
-
Online Banking
-
Payment Gateway
-
Advantages and Limitations of E-Commerce
Unit 4: E-Business and E-Governance
Long Questions
-
Define E-Business and differentiate it from E-Commerce.
-
Explain E-Governance and its types (G2C, G2B, G2G).
-
Explain applications of E-Governance in India.
-
Explain benefits and challenges of E-Governance.
Repeated Short Notes
-
M-Commerce
-
ERP
-
CRM
-
E-Tendering
-
Digital India
Unit 5: Cyber Laws and IT Act
Long Questions
-
Explain objectives and features of the Information Technology Act, 2000.
-
Explain types of Cyber Crimes.
-
What is Hacking? Explain penalties under IT Act.
-
Explain Digital Signature and its legal recognition.
-
Explain Cyber Security measures.
Repeated Short Notes
-
Phishing
-
Identity Theft
-
Data Protection
-
Cyber Terrorism
-
Malware
0 Comments