Documente Academic
Documente Profesional
Documente Cultură
Q.1.
A.1.
Q.2
2.
(a) Based on the impact of the behaviour and also on the response
of the people in the organization.
(b) Motivational Feasibility forms a very important and demanding
part of such an approach towards MIS development.
3. The Socio Technical Approach
(a) In the beginning, this approach was finding it hard to survive
but now it is being accepted worldwide and is also being
implemented at a very large scale.
(b) Involves key involvement of both of the above explained
approaches.
(c) Improves the performance of the information system as a
whole.
Porter Millar postulates
Porter and Millar were the ones, who explained the affect of the
information technology on the competition. According to them
information technology is affecting competition in the following
ways:
(a) Causes changes in the structure of the industry and as a result
of this, rule of competitions are altered.
(b) Spawning of the whole new business takes place, and in much
of the cases it is caused from within the companys existing
operations.
(c) Competitive advantage is created usually because of the new
ways; the companies get to outperform their rivals.
Business modelling,
Computer science,
Operations research
Q.3.
A.3.
What are the benefits & limitations of the relational database model for business
application today? Why is the object-oriented database model gaining acceptance for
developing application and managing the hypermedia database at the business
website?
Relational Database Model is based on tables and for management purposes. This
model was invented by Edgar F. Codd in 1969.Edgar at that time was working at IBM.
In the relational model of a database, all data is represented in terms of tuples &
grouped into relations. A database organized in terms of the relational model is a
relational database.
S.No
.
Name
City
State
Rooms
1 ABC
A
AA
12
2 XYZ
S
DD
23
3 AAA
D
SS
34
4 CCC
F
FF
43
5 BBB
G
GG
12
6 DDD
H
HH
32
7 FFF
J
JJ
45
From S.No. to Room rates are attributes
From 1 to 7 is tuple
Front
Desk
Yes
Yes
Yes
Yes
Yes
Yes
No
Restauran
t
Yes
Yes
Yes
Yes
No
No
No
Travel
Desk
Yes
Yes
Yes
Yes
Yes
No
No
Parking
No
Yes
Yes
Yes
Yes
Yes
Yes
Room
Rate
1000
2000
1200
2300
3000
1000
700
(3) Precision: The usage of relational algebra and calculus in the manipulation of the
relations between the tables ensures that here is no ambiguity (doubtfulness
or uncertainty), which may otherwise come while establishing the links in a
complicated network type database.
(4) Security: Security control & authorization can be implemented on various tables,
which gives a sense of control to the created of the table. If someone requires the
protective data then he needs to have the permission from the creator.
(5) Data Independence: Data independence is achieved more easily with normalization
structure used in a relational database than in the more complicated tree or network
structure.
(6) Data Manipulation Language: The possibility of responding to query by means
of a language based on relational algebra and relational calculus e.g SQL is easy in
the relational database approach. For data organized in other structure the query
language either becomes complex or extremely limited in its capabilities.
Limitations of relational database model
(1) Performance: A major constraint in the use of relational database system is
machine performance. If there is an enormous data in the tables then the
performance gets affected in responding to the sql queries.
(2) Physical Storage Consumption: With an interactive system, for example an
operation like join would depend upon the physical storage also. It is, therefore
common in relational databases to tune the databases and in such a case the
physical data layout would be chosen so as to give good performance in the most
frequently run operations. It therefore would naturally result in the fact that the lays
frequently run operations would tend to become even more shared.
(3) Slow extraction of meaning from data: If the data is naturally organized in a
hierarchical manner and stored as such, the hierarchical approach may give quick
meaning for that data. Object-oriented database model gaining acceptance for
developing application and managing the hypermedia database at the business
website because its innovative. Multimedia-web based applications for internet &
corporate intranets/ extranets have become a major application area for object
technology. Object-oriented database model can handle complex data such as
graphics, pictures, voice & text, better than the old structure. They are easy to use &
they are the key technology being used in multimedia based applications for Internet
& corporate extranets. As well as they support inheritance-new objects which can be
automatically created by replacing some or all the characteristics of one or more
parent objectives.
Q.4.
What are the business benefit and management problems of client/server networks?
Discuss also in Network Computing and Peer-to-peer networks?
A.4.
Client Server there was one powerful computer (known as server) which acts as
a provider of information to other sub-ordinate workstations (called client). Now
Let us discuss the benefits and drawbacks of Server-Client computing over P2P
computing:-
(3) Back-up and Recovery possible: As all the data is stored on server its easy to
make a back-up of it. Also, in case of some break-down if data is lost, it can be
recovered easily and efficiently. While in peer computing we have to take back-up at
every workstation.
(4) Upgradation and Scalability in Client-server set-up: Changes can be made easily
by just upgrading the server. Also new resources and systems can be added by
making necessary changes in server.
(5) Accessibility: From various platforms in the network, server can be accessed
remotely.
(6) As new information is uploaded in database, each workstation need not have its own
storage capacities increased (as may be the case in peer-to-peer systems). All the
changes are made only in central computer on which server database exists.
(7) Security: Rules defining security and access rights can be defined at the time of setup of server.
(8) Servers can play different roles for different clients.
Q.5.
How can information systems support a companys business operations, discuss making
by their managers, and give them a competitive advantage? Give examples to illustrate
your answer?
A.5.
Information technology provides a platform for a company to connect the global world
with Internet. Internet has a wide range of customers, buyers, service providers, technical
staff, etc. with the help of Internet business can run on a single website like General
Electric Company Information system and technology provide various channels to
communication like E-mail, Instant messages, SMS servers, etc to all employees at any
time all over the world. This type of software helps to saving time and cost. Of the
company
Software are very important for a company for instant Information of stocks, assets
valuation, sales, purchases, and service.
Decision making is very easy to the management after IT because its provide latest
information to the management for employee, stocks, sales, purchase, and services, etc
The management can make a decision after check IT reports.
Q.6
A.6.
In computer networking, topology refers to the layout of connected devices. This article
introduces the standard topologies of networking.
Topology in Network Design
Think of a topology as a network's virtual shape or structure. This shape does not
necessarily correspond to the actual physical layout of the devices on the network. For
example, the computers on a home LAN may be arranged in a circle in a family room, but
it would be highly unlikely to find a ring topology there.
Network topologies are categorized into the following basic types:
bus
ring
star
tree
mesh
More complex networks can be built as hybrids of two or more of the above basic
topologies.
Bus Topology
Bus networks (not to be confused with the system bus of a computer) use a common
backbone to connect all devices. A single cable, the backbone functions as a shared
communication medium that devices attach or tap into with an interface connector. A
device wanting to communicate with another device on the network sends a broadcast
message onto the wire that all other devices see, but only the intended recipient actually
accepts and processes the message.
Ethernet bus topologies are relatively easy to install and don't require much cabling
compared to the alternatives. 10Base-2 ("ThinNet") and 10Base-5 ("ThickNet") both were
popular Ethernet cabling options many years ago for bus topologies. However, bus
networks work best with a limited number of devices. If more than a few dozen
computers are added to a network bus, performance problems will likely result. In
addition, if the backbone cable fails, the entire network effectively becomes unusable.
Ring Topology
In a ring network, every device has exactly two neighbors for communication purposes.
All messages travel through a ring in the same direction (either "clockwise" or
"counterclockwise"). A failure in any cable or device breaks the loop and can take down
the entire network.
To implement a ring network, one typically uses FDDI, SONET, or Token Ring
technology. Ring topologies are found in some office buildings or school campuses.
Star Topology
Many home networks use the star topology. A star network features a central connection
point called a "hub node" that may be a network hub, switch orrouter. Devices typically
connect to the hub with Unshielded Twisted Pair (UTP) Ethernet.
Compared to the bus topology, a star network generally requires more cable, but a failure
in any star network cable will only take down one computer's network access and not the
entire LAN. (If the hub fails, however, the entire network also fails.)
Tree Topology
Tree topologies integrate multiple star topologies together onto a bus. In its simplest
form, only hub devices connect directly to the tree bus, and each hub functions as the
root of a tree of devices. This bus/star hybrid approach supports future expandability of
the network much better than a bus (limited in the number of devices due to the
broadcast traffic it generates) or a star (limited by the number of hub connection points)
alone.
Mesh Topology
Mesh topologies involve the concept of routes. Unlike each of the previous topologies,
messages sent on a mesh network can take any of several possible paths from source to
destination. (Recall that even in a ring, although two cable paths exist, messages can
only travel in one direction.) Some WANs, most notably the Internet, employ mesh
routing.
A mesh network in which every device connects to every other is called a full mesh. As
shown in the illustration below, partial mesh networks also exist in which some devices
connect only indirectly to others.
Q.7.
A.7.
Q.8
How do you think sales force automation affects salesperson productivity, marketing
management and competitive advantage?
A.8
ASSIGNMENT-B
Mr. Joshua , Director of the ZION Bank has Customers all over world. A customer may have
one or more accounts in the Bank wide spread across one or more branches. Customers open
bank accounts with a specified opening balance and thereafter may either deposit funds into
the account or withdraws accounts from them. The transactions involve the opening of
accounts, assignments of Account Numbers, Deposit and Withdrawal transactions etc. One of
the most frequent requests for specific transactions carried out in the Bank. Customers would
often want to transfer funds from one account of theirs to another. The account Numbering
scheme now uniquely identifies the Bank Branch to which the account belongs. Customers
often travel to the bank branch to request for a new cheque book. To ensure that Customers
are ensured of high level security, the E-Banking services need to provide Customers with a
unique Personal Identification password which can be changed from time to time. All Services
are
accessible only on correct password verification. The Customer may also look for information
on Interest rates on Fixed Term Deposits which often change from time to time.
Q.1
How Mr. Joshua is going to maintain information on Bank branches and security password
information on customers.
A.1
Draw MIS design for the above case study covering every aspect of e-Bank.
Q.2
A.2
Online Banking
Login
Services
Create/Manage/View
Accounts
Transfer Funds
Pay Bills
Order Statements
Search Transactions
ASSIGNMENT-C
Which of them does not support decision making?
1.
Options
DSS,
GDSS,
ESS
All of above
2.
Options
Transaction price system secret socket layer
Transaction processing system
Transfer peer system
Transfer protocol system
Contact
About
FAQ
3.
Options
Local area network
Wide area network
Start topology
None of the above
4.
Options
5.
Which one of the following functional business systems supports the finance business function?
Options
Cash Management
Financial forecasting
Both a & b
Neither a or b
6.
Options
Disk Cleanup
Scheduled Tasks
Disk Defragmenter
System Restore
7.
Which type of network connects each node to the next, forming a loop.
Options
Star topology
Bus Topology
Ring Topology
All of the above
Which is the most common network topology where each node is connected to a switch.
8.
Options
Star topology
Ring topology
Bus topology
Local area network
9.
Options
Image
Resolution
Contrast
Setting
10. The
manages the hardware components including the CPU, memory storage, and peripheral
devices.
Options
Operating System
Device Drivers
Motherboard
Ports
11. ESS is helpful for-Options
Top Management
Middle management
Operational management
None of above
12. Which of the following is not a way DSS, GDSS, and ESS support decision making?
Options
Automate certain decision procedures
Provide information about different aspects of the decision situation and the decision process
Stimulate decision making by helping managers question decision procedures or explore different
solution designs
Generate monthly, hardcopy reports
13. Which of the following is primarily a stand-alone DSS that uses some type
15. Which of the following is NOT a type of information yielded from data mining?
Options
Sequences
Classification
Clustering
Intelligence
16. Each of the following is a DSS component EXCEPT:
Options
Database.
Software system.
User interface.
Inference engine.
17.
Options
Optimization analysis.
Sensitivity analysis.
Forecasting.
Goal-seeking.
18. According to the textbook, National Gypsum uses its DSS application for:
Options
Identifying customer buying patterns and fraud detection.
Price, advertising, and promotion selection.
Defense contract analysis.
Corporate planning and forecasting.
19. A system with software that can analyze and display data using digitized maps to enhance
generation is:
Options
Group matrix.
Policy formation.
Topic commenter.
Personal productivity.
26. An information system at the strategic level of an
Options
Transaction
Phases
Business processes
Business functions
29. The computer can potentially be used to monitor most of our
Options
Computer
Motherboard
CPU
Operating System
31. The nonvolatile, permanent memory that
Options
ALU
CPU
RAM
ROM
32. The computer and equipment that
transactional e-commerce
businesses provide?
Options
Sale of goods and services.
Sale of goods only.
Online sale of goods.
Online sale of transactions.
34. Which of the following best
describes a Business-toBusiness?
Options
Sale of goods online to a consumer.
Sale of goods online to many
consumers.
Sale of goods to a business from a
Brick and Mortar business.
Sale of goods to a business online
only.
35. What determines how a system will work to meet the business needs defined during
system investigation?
Options
System Implementation
System development
System Review
None
36. Who is involved in helping users determine what outputs tey need and
entire project?
Options
Deadline activities
Slack activities
RAD tasks
The critical path
38. The concept in which organizations adapt to new
Options
Efficiency
Effectiveness
Productivity
Return on Investment
40. What components of a decision support system allow decisions makers to easily
access and manipulate the DSS and to use common business terms and phrases?
Options