IT in Bussiness – Past (old) Papers for BBA/MBA
IT in Bussiness – Past (old) Papers for BBA/MBA
Here, we are showing you past (old) papers of IT in Bussiness for BBA and MBA classes.
IT in Bussiness – Paper 1 for BBA
Course Code: Confidential | Course Title: IT in Bussiness |
Teacher’s Name: Confidential | Total Marks: 20 |
Date & Time: Confidential | Total Time: 2 Hours |
Student’s Name: | Reg. No: |
Instruction:
All questions are compulsory.
Q#1
Explain the following in detail with examples. (4)
Word processing software, database software, Application suites
Q#2:
Explain the followings ; (4)
FTP, HTTP, MODEM
Q#3:
How does cache works? What are the advantages of using more cache. (4)
Q#4:
Explain LAN, WAN and MAN in details. (6)
IT in Bussiness – Paper 2 for BBA
Course Code: Confidential | Course Title: IT in Bussiness |
Teacher’s Name: Confidential | Total Marks: 20 |
Date & Time: Confidential | Total Time: 2 Hours |
Student’s Name: | Reg. No: |
Instruction:
- All questions are compulsory.
Q#1
Explain the following in detail with examples. (4)
Ring Topology Star Topology, Bus topology
Q#2:
What is computer security? Explain the goals to obtain computer security. (4)
Q#3:
Differentiate between packet sniffing, Man in the middle and phishing attacks. (4)
Q#4:
What are the operating system and graphical user interface? Explain in details (6)
IT in Bussiness – Paper 3 for BBA
Course Code: Confidential | Course Title: IT in Bussiness |
Teacher’s Name: Confidential | Total Marks: 60 |
Date & Time: Confidential | Total Time: 2 Hours |
Student’s Name: | Reg. No: |
Instructions: All questions are compulsory.
Q1: (10+10=20)
- You have a business of selling and purchasing Hard disks. You want to buy 200 hard disks. You need to test each hard disk separately with HD Tune. Explain in detail how HD tune is helpful for monitoring a hard disk.?
- You want to start a website for business purpose. What kind of top-level domain you purchase from internet service providers. Explain in detail Domain name service and IP address.
Q2: (6)
Explain multithreading and multi-tasking in detail?
Q3: (10)
Your credit card and its login details like password etc are very secret information to log in your account.
Explain in detail how an attacker can attack your system?
What kind of attacks are possible. Explain each attack?
Also, describe how you save your system from different attacks?
Q4: (12)
Suppose you are the owner of XYZ mobile company. You want to test each mobile phone before the deployment of a mobile phone in the market. Explain each phase of testing that how would you test your product before launching in the market?
Q5: (6+6=12)
Convert the following into binary number system
- 10AF16
- 7058
IT in Bussiness – Paper 4 for BBA
Course Code: Confidential | Course Title: IT in Bussiness |
Teacher’s Name: Confidential | Total Marks: 36 |
Date & Time: Confidential | Total Time: 2 Hours |
Student’s Name: | Reg. No: |
Q#1: 3+3+3=9 Marks
- Differentiate between DRAM and MRAM?
- RAM is mounted on the motherboard as a memory, then why a computer system needs a cache?
- What is the purpose of reading/Write Arm and Read/Write head in a hard disk?
Q#2: 3+3+3=9 Marks
- Differentiate between system software and application software with the help of at least two examples?
- What are Application Suits? Give Examples.
- What is simulation software? Give an example.
Q#3: 3+3+3=9 Marks
- What is cloud computing?
- What are the mandatory requirements to makes a USB bootable for windows?
- Suppose you are working in a bank. Unfortunately, you delete the data from your computer, and also delete it from recycle bin. Then how would you recover the lost data?
Q#4: 3+3+3=9 Marks
- What are the interfaces used to connect hard disk and CD Drive within the motherboard?
- Explain the concept of cores in a processor? Especially Dual core, Core i3, and Core i7.
- Suppose you are the manufacturer of XYZ product. You want to hide some information from the customer. But the information should be on the XYX product. How the customer will read the hidden information?
IT in Bussiness – Paper 5 for BBA
Course Code: Confidential | Course Title: IT in Bussiness |
Teacher’s Name: Confidential | Total Marks: 36 |
Date & Time: Confidential | Total Time: 2 Hours |
Student’s Name: | Reg. No: |
Instruction:
- All questions are compulsory.
Q#1 What is antivirus? Explain a different kind of actions performed by antiviruses? (9)
Q#2 (9)
- Explain a different kind of web attacks?
- How would you differentiate between SRAM, DRAM, and MRAM?
Q#3 (9)
- Differentiate between a firewall and antispam
- What is the purpose of Data shredder?
Q#4
What is online advertising? Explain a different kind of online advertising? How online advertisement is better than a traditional advertisement. (9)
IT in Bussiness – Paper 6 for BBA
Course Code: Confidential | Course Title: IT in Bussiness |
Teacher’s Name: Confidential | Total Marks: 60 |
Date & Time: Confidential | Total Time: 2 Hours |
Student’s Name: | Reg. No: |
Instruction:
- All questions are compulsory.
Q#1
- Differentiate between DNS and IP address. How IP address helps in the calculation of cost per click. (6)
- What is malware? Enlist a different kind of malicious codes? (6)
Q#2
You are working in a company XYZ. You are asked to makes your system secure by given the following instructions;
Instruction 1: safezoneTo browse the web in a private, secure environment, invisible to the rest of your system.
Instruction 2: sandbox to run potentially suspicious applications automatically in a completely isolated environment.
Instruction 3: firewall to prevent unauthorized access to or from a private network.
Instruction 4: antispam stop the irrelevant or unsolicited messages sent over the Internet
- How would you obey the given instructions by what security counter-measures?
Recognize the counter-measure for each instruction and give the reason. (12)
Q#3
- How online advertisement is better than billboards and other traditional advertisement methods? Explain different kind of online advertisement? (6)
- Suppose you want to sell your computer, but your PC have personal data. You want to delete the data permanently from your PC so that nobody can’t recover the data from your PC. What countermeasures you perform to permanently delete your personal data. (6)
Q#4
- How would you compare the TCP/IP with UDP? What protocols are built on the foundation established by TCP/IP? (4)
- How to get the ads from Google Adsense and what is the procedure to put the advertisement on website? (4)
- Differentiate between guided and unguided media. How fiber optic is better than coaxial cable. (4)
Q#5
- How you differentiate between network attack and web attack? Explain in detail the SQL injection attack and man-in-the-middle attack. (6)
- What is computer security? How you can achieve security. (6)
IT in Bussiness – Paper 7 for BBA
Course Code: Confidential | Course Title: IT in Bussiness |
Teacher’s Name: Confidential | Total Marks: 18 |
Date & Time: Confidential | Total Time: 2 Hours |
Student’s Name: | Reg. No: |
Note:
All questions are compulsory and they carry equal marks.
Question No. 1: (6 marks)
What is Online advertisement? Write at least six advantages of online advertisement.
Question No. 2: (6 marks)
Explain the following;
- Shareware
- Freeware
- Customized software
Question No. 3: (6 marks)
What is a computer network? Explain a different kind of computer network protocols?
IT in Bussiness – Paper 1 for MBA
Course Code: Confidential | Course Title: IT in Bussiness |
Teacher’s Name: Confidential | Total Marks: 18 |
Date & Time: Confidential | Total Time: 2 Hours |
Student’s Name: | Reg. No: |
Note:
All questions are compulsory and they carry equal marks.
Question No. 1: (6 marks)
Differentiate between virtual marketing and viral marketing? Explain different methods of viral marketing?
Question No. 2: (6 marks)
Explain the followings;
- Pay per click
- Pay per action
- LAN, WAN
- Star topology
Question No. 3: (6 marks)
What are guided and unguided media? How computers are connected through cables and signals? Explain in detail.
IT in Bussiness – Paper 2 for MBA
Course Code: Confidential | Course Title: IT in Bussiness |
Teacher’s Name: Confidential | Total Marks: 30 |
Date & Time: Confidential | Total Time: 2 Hours |
Student’s Name: | Reg. No: |
Note:
All questions are compulsory and carry equal marks.
Question No. 1: (6 marks)
What is E-advertisement? Explain the advantages of online advertisement.
Question No. 2: (6 marks)
What is the purpose of the following;
HTTP, Search engine, Cyberspace, Server and client, Freeware Software, cookie
Question No. 3: (6 marks)
Your credit card and its login details like password etc are very secret information to log in your account. So you need to secure your computer from viruses and attacks.
- Explain in detail how an attacker can attack your system?
- What kind of attacks are possible. Explain each attack?
- Also, describe how you save your system from different attacks?
Question No. 4: (6 marks)
What is the information system? Explain the organization, management, and technology perspectives on the information system. How does information system help in your business?
Question No. 5: (6 marks)
How Hub, Switches, Router, and MODEM helps in connecting the computers within a network?
IT in Bussiness – Paper 3 for MBA
Course Code: Confidential | Course Title: IT in Bussiness |
Teacher’s Name: Confidential | Total Marks: 18 |
Date & Time: Confidential | Total Time: 2 Hours |
Student’s Name: | Reg. No: |
Note:
All questions are compulsory and they carry equal marks.
Question No. 1: (6 marks)
What is E-Commerce? Explain B2B, B2C, and C2C.
Question No. 2: (6 marks)
What is system software and application software? Explain their types with examples?
Question No. 3: (6 marks)
Explain RAM and ROM with their types and examples in detail.
IT in Bussiness – Paper 4 for MBA
Course Code: Confidential | Course Title: IT in Bussiness |
Teacher’s Name: Confidential | Total Marks: 30 |
Date & Time: Confidential | Total Time: 2 Hours |
Student’s Name: | Reg. No: |
Note:
All questions are compulsory and carry equal marks.
Question No. 1: (5+5= 10 marks)
- What is E-payment? Explain different E-payment methods.
- What factors involved in the selection of E-payment method?
Question No. 2: (5 marks)
What is antivirus? Explain Firewall, Anti-spam and data shredder.
Question No. 3: (5 marks)
Differentiate between the following ;
- Operating system and Application software
- B2B and C2C
- Portrait and Landscape orientation of page(Microsoft Word)
Question No. 4: ( 5+5=10 marks)
- What is a database system? If you are HR (Human Resource ) manager and wants to save the record of the employee, then the database system or file system is better for you? Explain with the reasoning that how better?
- Write the Microsoft access query for the following table.
Rollno | Name | Class | Marks | Result |
1 | Ali | BBA-1 | 66 | Pass |
2 | Akram | BBA-2 | 22 | Fail |
3 | Asad | BBA-3 | 68 | Pass |
4 | Arshad | BBA-2 | 55 | Pass |
Table Name: Progress
- Show the full record of all student enrolled in BBA-1
- Show only the Rollno and Name of those students who are in BBA-1 and Fail.
- Show the full record of students with marks greater than 33 and enrolled in BBA-3
IT in Bussiness – Paper 5 for MBA
Course Code: Confidential | Course Title: IT in Bussiness |
Teacher’s Name: Confidential | Total Marks: 18 |
Date & Time: Confidential | Total Time: 2 Hours |
Student’s Name: | Reg. No: |
Note:
All questions are compulsory and carry equal marks.
Question No. 1: (6 marks)
What is antivirus? How you can secure your computer from malicious programs?
Question No. 2: (6 marks)
How the database is better than a traditional file system? Explain in detail.
Question No. 3: (6 marks)
Write the Microsoft access database query for the following;
- Show the full table.
- Show the full row of those students who are fee defaulters.
Roll No | Class | Fee |
1 | BBA-1 | 10,000 |
2 | BBA-1 | 10,000 |
3 | BBA-1 | 0.00 |
4 | BBA-1 | 10,00 |
IT in Bussiness – Paper 6 for MBA
Course Code: Confidential | Course Title: IT in Bussiness |
Teacher’s Name: Confidential | Total Marks: 34 |
Date & Time: Confidential | Total Time: 45 Minutes |
Student’s Name: | Reg. No: |
Instruction:
- All questions are compulsory.
Q#2
What is online advertising? Explain a different kind of online advertising? (8)
Q#3 (9)
- Explain a different kind of network attacks?
- Draw a diagram of hard disk indicating the read-write/arm, read/write head, platters, plug connection, and flexible connector
Q#4 (9)
- Differentiate between safe zone and sandbox
- What is the purpose of Data shredder?
Q#5
What is antivirus? Explain a different kind of actions performed by antiviruses? (8)