COMPLETE SOLUTIONS
Course
RCIS
1. What is the primary function of a DBMS (Database Management System)?
Answer:
A DBMS allows users and applications to create, access, manage, and manipulate databases.
It ensures data integrity, security, concurrency control, and data independence.
2. Explain the difference between primary key and foreign key in relational databases.
Solution:
Primary Key: A unique identifier for each record in a table.
Example: StudentID in a Students table.
Foreign Key: A field in one table that refers to the primary key in another table,
establishing a relationship.
Example: StudentID in an Enrollments table (refers to Students table).
3. What are the four components of an information system?
Answer:
1. Hardware – physical devices (computers, servers).
2. Software – programs and applications.
3. Data – raw facts for processing.
4. People & Processes – users and workflows that use/manage systems.
4. Define Moore’s Law and its significance in CIS.
Solution:
Moore’s Law predicts that the number of transistors on a microchip doubles about every two
years, implying exponential growth in processing power.
Significance: Guides expectations for hardware evolution, system upgrades, and IT
investment planning.
,5. What is the difference between LAN and WAN?
Answer:
LAN (Local Area Network): Covers a small geographic area (e.g., office, campus),
faster, more secure.
WAN (Wide Area Network): Covers large areas (e.g., internet), connects multiple
LANs over public infrastructure.
6. What is the Systems Development Life Cycle (SDLC), and what are its key phases?
Solution:
SDLC is a structured process for developing information systems.
Phases:
1. Planning
2. Analysis
3. Design
4. Implementation
5. Testing
6. Deployment
7. Maintenance
7. Describe two common cybersecurity threats and how to mitigate them.
Answer:
Phishing: Fake emails trick users into giving personal data → mitigate with user
training and email filters.
Ransomware: Encrypts user files until ransom is paid → mitigate with backups,
endpoint protection, and user caution.
8. What is cloud computing and name three common service models.
Solution:
Cloud computing delivers computing services over the internet.
Service models:
, 1. IaaS (Infrastructure as a Service) – e.g., AWS EC2
2. PaaS (Platform as a Service) – e.g., Google App Engine
3. SaaS (Software as a Service) – e.g., Microsoft 365
9. Explain the purpose of normalization in database design.
Answer:
Normalization organizes data to reduce redundancy and dependency, improving data
integrity and query performance.
Example: Splitting customer data into separate Customers and Orders tables.
10. What is an ERP system and how does it benefit organizations?
Solution:
ERP (Enterprise Resource Planning) integrates core business functions (finance, HR, supply
chain) into a unified system.
Benefits:
Improved efficiency
Real-time data visibility
Streamlined processes
Better decision-making
11. What is the difference between structured and unstructured data?
Answer:
Structured data: Organized in databases with defined fields (e.g., spreadsheets, SQL
tables).
Unstructured data: No pre-defined format (e.g., emails, videos, social media).
12. Describe the client-server model.
Solution:
A client sends a request to a server, which processes it and returns a response.
Examples: Web browsing (browser = client, web server = server).
, 13. What is the purpose of an IP address?
Answer:
It uniquely identifies a device on a network, allowing data routing and communication over
TCP/IP-based systems.
14. What is the difference between RAM and ROM?
Solution:
RAM: Temporary, volatile memory used for active processes.
ROM: Permanent, non-volatile memory storing firmware (e.g., BIOS).
15. What is a firewall and what does it do?
Answer:
A firewall filters network traffic based on security rules, blocking unauthorized access while
permitting safe communication.
16. What is the difference between open-source and proprietary software?
Solution:
Open-source: Code is publicly available for use/modification (e.g., Linux).
Proprietary: Code is owned, restricted (e.g., Microsoft Office).
17. Define a function in programming.
Answer:
A function is a reusable block of code that performs a specific task.
Example in Python:
python
CopyEdit
def add(x, y):
return x + y