[go: up one dir, main page]

0% found this document useful (0 votes)
117 views3 pages

Bis Two Mark Questions

The document provides a series of definitions and explanations related to Business Information Systems, covering topics such as operating systems, planning, software, and various technologies like RDBMS and GIS. It also addresses concepts like e-commerce, cloud computing, and decision-making processes. Additionally, it outlines cyber crimes, data mining, and the scope of e-business.

Uploaded by

Sankar Ganesh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
117 views3 pages

Bis Two Mark Questions

The document provides a series of definitions and explanations related to Business Information Systems, covering topics such as operating systems, planning, software, and various technologies like RDBMS and GIS. It also addresses concepts like e-commerce, cloud computing, and decision-making processes. Additionally, it outlines cyber crimes, data mining, and the scope of e-business.

Uploaded by

Sankar Ganesh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Business Information System

Two mark questions and answer


1. What is an OS and give examples?
An operating system, or "OS," is software that communicates with the hardware and allows
other programs to run. It is comprised of system software, Common desktop operating
systems include Windows, OS X, and Linux.
2. Define Planning.
Planning an information system that will meet the information needs of an organization is a
difficult task. ... The three stages are strategic MIS planning, organizational information
requirements analysis, and resource allocation.
3. Define Software
Software is a set of instructions or programs instructing a computer to do specific tasks.Software
is a generic term used to describe computer programs that run on PCs, mobile phones, tablets, or
other smart devices

4. What is the function of ALU in Micro system?

 Arithmetic operation (addition, subtraction, multiplication and division)


 Logical operations (OR, AND, NOT etc.)
 Decision making.

5. What is the use of RDBMS?


RDBMS is a software system which is used to store only data which need to be stored in the
form of tables. In this kind of system, data is managed and stored in rows and columns which is
known as tuples and attributes. RDBMS is a powerful data management system and is widely
used across the world.
6. Define MIS.
MIS broadly refers to a computer-based system that provides managers with the tools to
organize evaluate and efficiently manage departments within an organization.
7. What is the Benefits of E commerce?
E-commerce improves the brand image of the company. E-commerce helps organization to
provide better customer services. E-commerce helps to simplify the business processes and
makes them faster and efficient. E-commerce reduces the paper work.
8. Define GIS
A geographic information system (GIS) is a system designed to capture, store, manipulate,
analyze, manage, and present all types of geographical data, In other words, data that is in some
way referenced to locations on the earth. Coupled with this data is usually tabular data known as
attribute data.
9. What is the use of Information technology?
Information Technology is the study or use of computers and telecommunications to store,
retrieve, transmit, or send data. The term IT is commonly used as a synonym for computers and
their networks, but it also encompasses other information distribution technologies, like
television and smart phones.
10. Define SDLC.
The system development life cycle refers to the processing of planning, creating, testing, and
deploying an information system. SDLC uses a number of development methodologies to
achieve this objective.
11. What is error detection?
When data is transmitted from one device to another device, the system does not guarantee
whether the data received by the device is identical to the data transmitted by another device. An
Error is a situation when the message received at the receiver end is not identical to the message
transmitted.
12. What are the different types of cyber crime?
 Hacking
 Identity Theft
 Scamming.
 Computer Viruses.
 Ransomware.
 DDoS Attack.

13. Define Data mining.


Data mining is the process of sorting through large data sets to identify patterns and relationships
to solve problems through data analysis.
14. What is Cloud computing with examples?
Cloud Computing is the use of hardware and software to deliver a service over a network
(typically the Internet). ... An example of a Cloud Computing provider is Google's Gmail.
Gmail users can access files and applications hosted by Google via the internet from any device.
15. Define CMM
The Capability Maturity Model (CMM) is a methodology used to develop and refine an
organization's software development process.

16. What does disaster management mean?


Disaster Management can be defined as the organization and management of resources and
responsibilities for dealing with all humanitarian aspects of emergencies, in
particular, preparedness, response and recovery in order to lessen the impact
of disasters. Disasters are the consequences of natural or human hazards.
17. What is decision making?
Decision-making is the process of making choices by identifying a decision,
gatheringinformation, and assessing alternative resolutions. Using step- by- step decision making
process can help make deliberate,thoughtful decisions by organizing relevant information and
defining alternatives.
18. What is WWW?
WWW stands for World Wide Web, generally known as the web, it is accessed through the
internet that contains lots of information which includes images, videos, pages, and other online
information. The users access the information from WWW by using application software is
called a web browser.
19. Define Pervasive Computing.
The paradigm of pervasive computing describes ubiquitous computing environments that provide
anytime and anywhere access to information services while making the presence of the system
invisible to the user.
20. What is the scope of E- business?
E-Business is a Broad Concept which also includes E-Commerce. E-business Includes all the
activities of Production, Product Development, Finance, Human Resource Management and
Buying and Selling of Products.

You might also like