FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Download PTU MBA 2020 March 1st Sem Workshop On It For Managers Question Paper

Download PTU (I.K. Gujral Punjab Technical University Jalandhar (IKGPTU) ) MBA (Master of Business Administration) 2020 March 1st Sem Workshop On It For Managers Previous Question Paper

This post was last modified on 22 March 2020

PTU MBA 2020 March Previous Question Papers


Roll No. __________________

Total No. of Pages : 03

Total No. of Questions : 06

--- Content provided by⁠ FirstRanker.com ---

MBA (PIT) (Sem.-1)

WORKSHOP ON IT FOR MANAGERS

Subject Code: MBA-107

M.Code: 51187

Time: 3 Hrs.

--- Content provided by⁠ FirstRanker.com ---

Max. Marks : 60

INSTRUCTIONS TO CANDIDATES :

  1. SECTION-A contains SIX questions carrying TWO marks each and students has to attempt ALL questions.
  2. SECTIONS-B consists of FOUR questions each carrying TEN marks each and student has to attempt ALL questions.
  3. SECTION-C is consist of ONE Case Study carrying EIGHT marks.
  4. --- Content provided by‍ FirstRanker.com ---

  5. All Questions are Compulsory.

SECTION-A

  1. Write briefly :

    1. Why Application Software is needed?
    2. What are the features of EPROM?
    3. --- Content provided by FirstRanker.com ---

    4. What are the various versions of Windows operating system?
    5. Why operating system is needed in a computer?
    6. What is the advantage of SUMIF formula in MS-Excel?
    7. What are the special symbols in MS-Word?
  2. --- Content provided by FirstRanker.com ---

SECTION-B

  1. Discuss the role and importance of computers in business administration? Explain by citing examples: (10)
  2. How operating systems works as

    1. Resource Manager (5)
    2. Processor Manager (5)
    3. --- Content provided by‌ FirstRanker.com ---

  3. Write detailed notes on :

    1. Formatting commands in MS-Word (4)
    2. Role of Slide Sorter in MS-Excel (3)
    3. Role of Macro in MS-Excel (3)
    4. --- Content provided by FirstRanker.com ---

  4. Write detailed notes :

    1. Role of Central Processing Unit (5)
    2. Components of MS-Office (5)
  5. --- Content provided by‍ FirstRanker.com ---

SECTION-C

  1. When the employees who have smartphone and wants to bring it to work and use it on the job is termed as Bring Your Own Device (BYOD). Although BYOD can improve employee job satisfaction and productivity, it also can cause a number of problems. Today, the mobile digital landscape is much more complicated with a variety of devise and operating systems on the market that do not have well-developed tools for administration and security. Android has over 79 percent of the worldwide smartphone market, but it is more difficult to use corporate work than Apple mobile devices using iOS operating system. iOS is considered a closed system and runs only on a limited number of different Apple mobile devices. In contrast. Android's fragmentation makes it more difficult and costly for corporate IT to manage. Android's huge market consumer market share attracts many hackers. Android is also vulnerable because it has open source architecture and comes in multiple versions. If employees are allowed to work with more than one type of mobile device and operating system, companies need an effective way to keep track of all the devices employees are using. To access company information, the company's network must be configured to receive connections from that device. When employees make changes to their personal phone, companies will need to quickly ensure that their employees are still able to remain productive. Firms need an efficient inventory management system that keeps track of which devices employees are using, where the device is located, whether it is being used, and what software it is equipped with. For unprepared companies, keeping track of who gets to what data could be a nightmare. There are significant concerns with securing company information accessed with mobile devices. If a device is stolen or compromised, companies need ways to ensure that sensitive or confidential information isn't freely available to anyone. Mobility puts assets and data at a greater risk than they were located within company walls and on company machines. Companies often use technologies that allow them to wipe data from devices remotely, or encrypt data so that if stolen, it cannot be used. One company that has successfully impleneted BYOD is Intel Corporation. Intel hammered out a BYOD strategy and created an end-user service level agreement that clarified that end users were voluntarily using BYOD rather than being mandated by Intel. The comapny developed different policies, rules, and access limits for each type of device-smartphone, tablet or laptop with mutiple levels of controls in place. Intel maintains a list of approved devices, if a device does not meet its requirements, it is blocked from the network. Intel has internal app store and uses a variety of software and security tools, including mobile device management software and mobile app management software.

    Questions :

    1. According to you. list down the possible advantages and disadvantges of allowing employees to use their personal smartphones for work?
    2. Discuss Intel's strategy to curb the possible misuse of smartphones at workplace.
    3. --- Content provided by‌ FirstRanker.com ---

NOTE : Disclosure of Identity by writing Mobile No. or Making of passing request on any page of Answer Sheet will lead to UMC against the Student.

Visit FirstRanker.com for more question papers.


--- Content provided by FirstRanker.com ---


This download link is referred from the post: PTU MBA 2020 March Previous Question Papers