Professional Documents
Culture Documents
Medavakkam, Chennai-600100.
BBA
COMPUTER APPLICATIONS IN BUSINESS
MAM3H
UNIT – I
Part - A
1. What is word processor?
Choose Start All Programs to see a list of all your applications. Select
MS-Word application from the Microsoft Office group.
The application will be opened. Select the menu File Open, to open the
existing document in your system.
1
4. What are the properties of font setting in MS-Word?
Font (Text)
Style
Size
Color
8. Define MS Excel.
2
9. What is Electronic spreadsheet?
Click on the cell in your table where you want to see the total of the
selected cells.
Enter =sum( to this selected cell.
Now select the range with the numbers you want to total and press Enter
on your keyboard.
VLOOKUP function returns a value from a range (one row or one column) or
from an array. The VLOOKUP function is a built-in function in Excel that is
3
categorized as a Lookup/Reference Function. It can be used as a
worksheet function in Excel.
Pivot tables let you analyze large amounts of data using a variety of
functions. Excel makes it easy to create a new pivot table that suits your
needs. Pivot tables let you summarize data without the hassle of creating
formulas.
Part - B
1. Discuss the role of word processing in creating documents.
A word processor is an electronic device or computer software application
that performs the task of composition, editing, formatting and printing of
documents.
Having editing features like cut, copy and paste.
Typical features of a modern word processor include font application,
spell checking, grammar checking.
Creation of tables of contents.
Non-printing comments and annotations.
Generation of document statistics.
Linking and Embed objects, Mail Merge, Envelops and Labels, Letter
Wizard, Macro options etc. are the proof of stunning word processing
software.
4
3. Click the Font Dialog Box Launcher.
4. Select the Font, Font style, and Font size you want.
5
Relative cell references change when a formula is copied to another cell.
By default, a cell reference is relative. For example, when you refer to cell A2
from cell C2. A formula that contains a relative cell reference changes as
you copy it from one cell to another.
Part - C
1. Discuss different types of tools in MS Word.
Formatting options
Word count
AutoCorrect
Spelling and Grammar check
Fonts in WordArt
AutoText
AutoSummarize
Mail Merge
Creating Labels
Macros
Office Assistant
6
2. Discuss the various types of saving a document in word.
Word offers two ways to save a file: Save and Save As. These options work in
similar ways, with a few important differences:
Save: When we want to create or edit a document, we can use
the Save command to save the changes. We may use this command most
of the time. When we save a file, only need to choose a file name and
location for the first time. After that, we can click the Save command to
save it with the same name and location.
Save As: We'll use this command to create a copy of a document while
keeping the original. When we use Save As, we need to choose a different
name and/or location for the copied version.
To save a document:
It's important to save our document whenever we start a new project or
make changes to an existing one. Saving early and often can prevent our
work from being lost. Also need to pay close attention to, where you save the
document so it will be easy to find later.
1. Locate and select the Save command on the Quick Access toolbar.
2. If you're saving the file for the first time, the Save As dialog box will
appear in Backstage view.
3. Select the location where we want to save the document.
4. Enter a file name for the document to save the document to our
computer, then click Save.
5. The document will be saved. We can click the Save command again to
save our changes as we modify the document.
We can also access the Save command by pressing Ctrl+S on your
keyboard.
Using Save As to make a copy:
If you want to save a different version of a document while keeping the
original, you can create a copy. For example, if you have a file named ‘Sales
Report’, you could save it as ‘Sales Report 2’ so you'll be able to edit the new
file and still refer back to the original version.
7
To do this, you have to click the Save As command in Backstage view.
Just like when saving a file for the first time, you need to choose where to
save the file and give it a new file name.
8
5. Explain the process of mail merge in MS-Word.
Select document type
1. In the Mail Merge task pane, click Letters. This will allow you to send
letters to a group of people and personalize the results of the letter that
each person receives.
2. Click Next: Starting document.
Select the starting document
1. Click one of the following options:
Use the current document: Use the currently open document as your
main document.
Start from a template: Select one of the ready-to-use mail merge
templates.
Start from existing document: Open an existing document to use as
your mail merge main document.
2. In the Mail Merge task pane, click Next: Select recipients.
When you open or create a data source by using the Mail Merge Wizard,
you are telling Word to use a specific set of variable information for your
merge. Use the following method to attach the main document to the data
source.
Use an existing data source
To use an existing data source, follow these steps:
1. In the Mail Merge task pane, click Use an existing list.
2. In the Use an existing list section, click Browse.
3. In the Select Data Source dialog box, select the file that contains the
variable information that you want to use, and then click Open.
4. If the data source is not listed in the list of files, select the appropriate
Drive and Folder. If necessary, select the appropriate option in the All
Data Sources list. Select the file, and then click Open.
5. Word displays the Mail Merge Recipients dialog box. You can sort and
edit your data if you want to.
9
6. Click OK to return to the main document.
7. Save the main document.
8. When you save the main document at this point, you are also saving the
data source and attaching the data source to the main document.
9. Type the name that you want to give to your main document, and then
click Save.
10
5. MOD
Returns the remainder from a division between two supplied numbers.
6. PRODUCT
Returns the product of a supplied list of numbers.
11
UNIT – II
Part - A
1. Define ‘DBMS’.
Database Management System (DBMS) helps to store and retrieve data from
the database. It is also used for data processing information, generation and
decision-making for implementing almost all the organisation process.
2. What is a database?
A database is an organized collection of data. A relational database, on the
other hand, is a collection of schemas, tables, queries, reports, views, and
other elements.
3. What is a record?
A collection of related fields that constitute a row in a table.
6. Define indexing.
Indexes are used to quickly locate data without having to search every row
in a database table every time a database table is accessed.
7. Define DDL.
Data Definition Language (DDL) is a standard for commands that define the
different structures in a database. DDL statements create, modify, and
remove database objects such as tables, indexes, and users.
12
8. What is the purpose of DML?
DML is short name of Data Manipulation Language which deals with data
manipulation, and includes most common SQL statements.
Part - B
1. Explain the concepts of data base management system.
Tables are used to store and retrieve the data whenever needed.
Queries are used to view, change and analyse data.
Report shows the data in a desired format for print.
Primary key indexes the number in a sequence.
Indexing option enables no duplication or repetition of numbers.
Sorting the data in anyone of the two orders.
The query languages DDL, DML, TCL etc. helps to organize and
manipulate the data stored in the database.
13
Extensive conversion costs in moving form a file-based system to a
database system.
Initial training required for all programmers and users.
14
5. How can you understand the Menu Driven application programming?
Explain.
Menu
A list of options that may be displayed either vertically or horizontally on
a screen and from which one or more items may be selected using an input
device.
A menu driven form is one that allows you to navigate your way through
different levels of a system.
Method of creating a Menu Form:
1. Start by opening the database you want to use to create the form.
2. Now select the ‘CREATE’ tab at the top. Choose ‘Blank Form’.
3. To customise the form, click on the ‘VIEW’ icon and choosing the
‘DESIGN VIEW’ option.
4. Create buttons to open different parts of the database like label, text box,
command button etc.
5. Preview the form in ‘FORM VIEW’ and check your button to see if it
works.
Part - C
1. Explain the various functions of DBMS.
DBMS helps to store and retrieve data from the database.
To organize data processing information, generation and decision-making
for implementing almost all the organisation process.
The key components: Table, Query, Form, Report etc.
Tables are used to store and retrieve the data whenever needed.
Queries are used to view, change and analyse data.
Report shows the data in a desired format for print.
Primary key indexes the number in a sequence.
Indexing option enables no duplication or repetition of numbers.
15
Sorting the data in anyone of the two orders.
The query languages DDL, DML, TCL etc. helps to organize and
manipulate the data stored in the database.
16
Activate the Create tab.
On the Create tab, in the Reports group, click Report Wizard.
Click the Report button in the Reports group.
Access creates your report and displays your report in Layout view. You
can modify the report.
Access reports created simply by using the Report button which have
several sections. They are,
Sections of a Report: Report Header, Page Header, Detail Section, Page
Footer, Report Footer.
Arrange the controls like label, text box, command button etc. in the
above said sections with its field.
Run the Report.
17
deleting and updating data in a database. Performing read-only queries of
data is sometimes also considered a component of DML.
TCL:
TCL is short name of Transaction Control Language which deals with
transaction within a database.
Transaction Control Language (TCL) commands are used to manage
transactions in database. These are used to manage the changes made by
DML statements. It also allows statements to be grouped together into
logical transactions. Statements are COMMIT, ROLLBACK, SAVEPOINT etc.
18
UNIT – III
Part - A
1. Define EDI.
Electronic Data Interchange is the exchange as structured business
information between applications among trading partners through electronic
means.
2. What is EFT?
Electronic Funds Transfer (EFT) is the term used for EDI that involves the
transfer of funds between financial institutions. EFT (Electronic Funds
Transfer) refers to the sending of money electronically, that is required in
order to post the payment and credit the non-custodial parent.
3. What is transaction?
An instance of buying or selling something. A business deal and an
occurrence in which goods, services, or money are passed from one
person, account etc., to another. The act or process of doing business
with another person, company etc.
19
6. Write the applications of EDI.
Retail Sector
Manufacturing Sector
Automobile Sector
Financial Sector
7. Explain FEDI.
The electronic transmission of payments and payment related information
in standard formats between companies and/or their banks. Financial
Electronic Data Interchange (FEDI) includes electronic formats for invoices,
payment initiation, and remittance information processed through a
financial institution or communications intermediary.
20
Part - B
1. Discuss about the basic concepts of EDI.
EDI is the computer-to-computer exchange of business documents, such
as purchase orders and invoices, in a standard electronic format,
between trading partners.
A payee’s bank account is electronically credited and the payer’s account
is electronically credited, such an exchange is known as Electronic Fund
Transfer (EFT).
Business partners: The exchange of EDI documents is typically between
two different companies, referred to as business partners or trading
partners.
A standard format describes what each piece of information is and in
what format, named as EDI Standard, which is used to read and
understand the documents.
There are several EDI standards in use today, including ANSI, EDIFACT,
TRADACOMS and ebXML.
21
Using EDI can reduce the order-to-cash cycle time by more than 20%,
improving business partner transactions and relationships.
Promotes corporate social responsibility and sustainability by replacing
paper-based processes with electronic alternatives. This will both save
you money and reduce your CO2 (Carbon dioxide) emissions.
22
Part - C
1. Explain the various EDI standards.
An EDI standard is the series of uniform message formats used to create
Computer readable versions of traditional paper documents.
There are several EDI standards in use today, including ANSI ASC X12,
EDIFACT, TRADACOMS and ebXML. And, for each standard there are many
different versions, e.g., ANSI 5010 or EDIFACT version D12, Release A.
When two businesses decide to exchange EDI documents, they must agree
on the specific EDI standard and version.
The Accredited Standards Committee X12 is also known as ASC X12.
The membership of ASC X12 includes technologists and business process
experts, encompassing health care, insurance, transportation, finance,
government, supply chain and other industries.
United Nations recommends the Electronic Data Interchange for
Administration, Commerce and Transport (EDIFACT) is a set of
internationally agreed upon standards, directories and guidelines for the
electronic interchange of structured data that relate, in particular, to trade
in goods and services.
23
Automobile Sector
In automobile sector, EDI is used to keep customers updated with the
current product and pricing information during the purchase cycle. An
advance shipping notice is transmitted through EDI to the customers to
prepare a loading schedule and to ensure proper receipt of the product.
Financial Sector
In the financial sector, EDI replaces the labour intensive activities of
collecting, processing and dispersing payments with an electronic
system. It facilitates the flow of payment. A payee’s bank account is
electronically credited and the payer’s account is electronically credited,
such an exchange is known as Electronic Fund Transfer (EFT).
24
Industrialization, advanced technology, including transportation,
globalization, multinational corporations, and outsourcing are all having a
major impact on the international trade system. Increasing international
trade is crucial to the continuance of globalization.
For import and export of goods, materials, payments, receipts etc. may
need EDI compulsorily. For this purpose, Financial EDI (FEDI) may be
helpful. FEDI can be done through Bank, Bank Cheque, ACH (Automated
Clearing House) etc. Through FEDI, International Trade can be possible.
25
UNIT – IV
Part - A
1. What is an Internet?
2. Define WWW.
The World Wide Web (abbreviated WWW or the Web) is an information space
where documents and other web resources are identified by Uniform
Resource Locators (URLs), and can be accessed via the Internet.
3. What is e-mail?
4. What is an IP address?
Each host Computer on the Internet has a unique number called the IP
(Internet Protocol) address. An IP address is a number that identifies a
device.
5. What is a protocol?
26
6. What is Inter protocol suite?
7. What is TCP/IP?
8. Define HTTP.
The Computer that requests some service from another Computer is called
Client. And the Computer which gets the requests of Client and responses
to the request is called Server in a Network.
Every system on the Internet has a unique address called IP address. The
DNS makes easier by allowing a familiar string of letters, the Domain Name,
to be used instead of IP address. It can be created with different categories.
28
Part - B
1. Explain the basic concepts of Internet.
The World Wide Web (abbreviated WWW or the Web) is an information
space where documents and other web resources are identified by
Uniform Resource Locators (URLs), and can be accessed via the Internet.
A protocol is a collection of rules for formatting, ordering and error
checking the data sent across a network.
An IP address is a number that identifies a device.
The DNS makes easier by allowing a familiar string of letters, the Domain
Name, to be used instead of IP address.
The Computer that requests some service from another Computer is
called Client.
The Computer which gets the requests of Client and responses to the
request is called Server.
29
It supports human communication via electronic mail (e-mail), chat
rooms, newsgroups, and audio and video transmission and allows people
to work collaboratively at many different locations.
30
4. Explain the allocation of second level domains in DNS.
The DNS makes easier by allowing a familiar string of letters, the Domain
Name, to be used instead of IP address. A second level forms the core of a
web address and it is based on the nature of the owner. Second-level
domains commonly refer to the organization that registered the domain
name. A two-letter second-level domain is formally reserved. For example,
in example.com, example is the second-level domain of the .com TLD.
Some domain name registries introduce a second-level hierarchy to a TLD
that indicates the type of entity intended to register an SLD under it.
31
Generic Top-Level Domain is one of the two TLD. It defines the type of
organization associated with the domain such as the .com.
Country Code Top-Level Domain is one of the two TLD. It is two letters
TLD which is generally used for a Country.
Part - C
1. Discuss about IP address and Internet protocol.
IP address:
Each host Computer on the Internet has a unique number called the IP
(Internet Protocol) address. An IP address is a number that identifies a
device.
TCP/IP:
Transmission Control Protocol (TCP) controls disassembling of a message
into packets before it is transmitted over the Internet. Internet Protocol (IP)
specifies the addressing details of each packet. IP is responsible for moving
packet of data from node to node. TCP/IP specifies how data is exchanged
over the internet by providing end-to-end communications. The two main
protocols in the internet protocol suite serve specific functions.
HTTP:
Hypertext Transfer Protocol (HTTP) is the foundation of data communication
for the World Wide Web. This protocol governs the rule that is used to send
32
a page or pages containing hypertext. HTTP is the protocol to exchange or
transfer hypertext.
FTP:
File Transfer Protocol (FTP) helps the Internet users to transfer files such as
text, graphics, sound and so on from one Computer to another. The File
Transfer Protocol (FTP) is a standard network protocol used for the transfer
of Computer files between a client and server on a Computer network.
33
In Internet chatrooms, people might be preying on others or trying to
stalk or abuse them.
The Internet contains content that many people find offensive.
Criminals may steal people's personal information or trick people into
sending them money.
34
UNIT – V
Part - A
1. What is an audit?
An audit is a systematic and independent examination of books, accounts,
statutory records, documents and vouchers of an organization to ascertain
how far the financial statements as well as non-financial disclosures present
a true and fair view of the concern.
2. What is an IS audit?
An Information Technology audit, or Information Systems audit, is an
examination of the management controls within an Information
Technology (IT) infrastructure. The evaluation of obtained evidence
determines if the information systems are safeguarding assets,
maintaining data integrity.
35
5. What are the requirements of IS audit?
Change controls
Data consistency
Documentation
Backup, recovery
36
Part - B
1. Make a comparison between Traditional audit and IS audit.
Traditional audit:
In traditional audit, all business transactions are checked with the help
of vouchers.
It will not prefer to discover waste and misuse of fund.
Detection of fraud is the secondary object.
IS audit:
The decision taken by the management.
Prefers to discover waste and misuse of fund.
Detection of fraud is the primary object.
37
4. Discuss the various applications of IS audit.
IS Auditing involves providing independent evaluations of an
organization’s policies, procedures, standards, measures, and practices
for safeguarding electronic information from loss, damage, unintended
disclosure, or denial of availability.
An application audit is a specific audit of one application. For example,
an audit of an excel spreadsheet with embedded macros used to analyze
data and generate reports could be considered an Application Audit.
An example would be the payroll process of a company, which may span
across several different servers, databases, operating systems,
applications, etc.
Application audits usually involve in-depth evaluation of logical security
for the application.
Part - C
1. Explain the basic terms in IS auditing.
Independent
Examination
Records
Opinion
Integrity
Recommend
Limit
Risk
38
Financial Statements can be broken down into two key components:
the profit-and-loss statement and the balance sheet.
There are three components of an audit risk from the viewpoint of
the auditor – inherent risk, control risk and detection risk.
39
4. Reporting
5. Follow-up
6. Reports
Emerging Issues
There are also new audits being imposed by various standard boards
which are required to be performed, depending upon the audited
organization, which will affect IT and ensure that IT departments are
performing certain functions and controls appropriately to be considered
compliant. Examples of such audits are SSAE 16, ISAE 3402, and
ISO27001:2013.
Security
Auditing information security is a vital part of any IT audit. The broad
scope of auditing information security includes such topics as data
centers (the physical security of data centers and the logical security of
databases, servers and network infrastructure components), networks and
application security.
40
An example would be the payroll process of a company, which may span
across several different servers, databases, operating systems,
applications, etc.
Application audits usually involve in-depth evaluation of logical security
for the application.
41