Documente Academic
Documente Profesional
Documente Cultură
Q.1. What strategic role can information technology play in business process
reengineering and total quality management?
2. The BehaviouralApproach
(a) Based on the impact of the behaviour and also on the response
of the people in the organization.
(b) Motivational Feasibility forms a very important and demanding
part of such an approach towards MIS development.
Business modelling,
Computer science,
Operations research
Design,
Implementation,
Business integration,
Management.
The sociological approach looks at these aspects from the point of
view of how groups work together and the nature of organisations.
The psychological approach looks at how people perceive and use
information systems, especially with respect to decision making.
The economic approach looks at how IT systems affect control
structures and costs both within a company and in markets.
Q.3. What are the benefits & limitations of the relational database model for business
application today? Why is the object-orienteddatabase model gaining acceptance for
developing application and managing the hypermedia database at the business
website?
A.3. Relational Database Model is based on tables and for management purposes. This
model was invented by Edgar F. Codd in 1969.Edgar at that time was working at IBM.
In the relational model of a database, all data is represented in terms of tuples
&groupedintorelations. A database organized in terms of the relational model is a
relational database.
(1)Easy to use:In Relational model data is easily presented & visible. So revision
becomes quite easy as the information is stored insimple tables & rows. Such data is
attractive for the first time user.
(2)Flexibility:An operator or a user can easily link & extract the data & can get the
desired information easily.
(3)Precision: The usage of relational algebra and calculus in the manipulation of the
relations between the tables ensures that here is noambiguity (doubtfulness
or uncertainty), which may otherwise come while establishing the links in a
complicatednetwork type database.
A.4. Client Server there was one powerful computer (known as server) which acts as
a provider of information to other sub-ordinate workstations (called client). Now
Let us discuss the benefits and drawbacks of Server-Client computing over P2P
computing:-
Q.5. How can information systems support a companys business operations, discuss making
by their managers, and give them a competitive advantage? Give examples to illustrate
your answer?
A.5. Information technology provides a platform for a company to connect the global world
with Internet. Internet has a wide range of customers, buyers, service providers, technical
staff, etc. with the help of Internet business can run on a single website like General
Electric Company Information system and technology provide various channels to
communication like E-mail, Instant messages, SMS servers, etc to all employees at any
time all over the world. This type of software helps to saving time and cost. Of the
company
Software are very important for a company for instant Information of stocks, assets
valuation, sales, purchases, and service.
Decision making is very easy to the management after IT because its provide latest
information to the management for employee, stocks, sales, purchase, and services, etc
Q.6 What is meant by Network topology along with different network models?
A.6. In computer networking, topology refers to the layout of connected devices. This article
introduces the standard topologies of networking.
Topology in Network Design
Think of a topology as a network's virtual shape or structure. This shape does not
necessarily correspond to the actual physical layout of the devices on the network. For
example, the computers on a home LAN may be arranged in a circle in a family room, but
it would be highly unlikely to find a ring topology there.
Network topologies are categorized into the following basic types:
bus
ring
star
tree
mesh
More complex networks can be built as hybrids of two or more of the above basic
topologies.
Bus Topology
Bus networks (not to be confused with the system bus of a computer) use a common
backbone to connect all devices. A single cable, the backbone functions as a shared
communication medium that devices attach or tap into with an interface connector. A
device wanting to communicate with another device on the network sends a broadcast
message onto the wire that all other devices see, but only the intended recipient actually
accepts and processes the message.
Ethernet bus topologies are relatively easy to install and don't require much cabling
compared to the alternatives. 10Base-2 ("ThinNet") and 10Base-5 ("ThickNet") both were
popular Ethernet cabling options many years ago for bus topologies. However, bus
networks work best with a limited number of devices. If more than a few dozen computers
are added to a network bus, performance problems will likely result. In addition, if the
backbone cable fails, the entire network effectively becomes unusable.
Ring Topology
In a ring network, every device has exactly two neighbors for communication purposes.
All messages travel through a ring in the same direction (either "clockwise" or
"counterclockwise"). A failure in any cable or device breaks the loop and can take down
the entire network.
To implement a ring network, one typically uses FDDI, SONET, or Token Ring technology.
Ring topologies are found in some office buildings or school campuses.
Star Topology
Many home networks use the star topology. A star network features a central connection
point called a "hub node" that may be a network hub, switch orrouter. Devices typically
connect to the hub with Unshielded Twisted Pair (UTP) Ethernet.
Compared to the bus topology, a star network generally requires more cable, but a failure
in any star network cable will only take down one computer's network access and not the
entire LAN. (If the hub fails, however, the entire network also fails.)
Tree Topology
Tree topologies integrate multiple star topologies together onto a bus. In its simplest form,
only hub devices connect directly to the tree bus, and each hub functions as the root of a
tree of devices. This bus/star hybrid approach supports future expandability of the
network much better than a bus (limited in the number of devices due to the broadcast
traffic it generates) or a star (limited by the number of hub connection points) alone.
Mesh Topology
Mesh topologies involve the concept of routes. Unlike each of the previous topologies,
messages sent on a mesh network can take any of several possible paths from source to
destination. (Recall that even in a ring, although two cable paths exist, messages can
only travel in one direction.) Some WANs, most notably the Internet, employ mesh
routing.
A mesh network in which every device connects to every other is called a full mesh. As
shown in the illustration below, partial mesh networks also exist in which some devices
connect only indirectly to others.
Q.7. Why there is a trend toward cross-functional integrated enterprise systems in business?
Q.8 How do you think sales force automation affects salesperson productivity, marketing
management and competitive advantage?
Most salesforce automation (SFA) implementations I have endured became little more
than spreadsheet-producing beating sticks that worried and inept sales managers use to
beat more inflated pipeline guesses out of their scared, under-quota sales people that
become more creative during a sales meeting than Darren Stephens explaining to his
boss on "Bewitched" why there is a monkey wearing a tutu while riding a donkey in his
living room.
Now the good news: "Perfect practice makes perfect." John Wooden used to stress this
during his championship run at UCLA. If you create and automate tested, effective
campaigns with proven "next steps" that are triggered by key events, i.e. a prospect
downloads a free report or white paper or signs up for a webinar or seminar, your sales
staff will become exponentially more productive and profitable for your organization.
And in sales it's all about compressing sales cycles. If you can do more, faster and better
with fewer people you will bury your competition and dominate your segment and/or
region in no time flat.
ASSIGNMENT-B
Mr. Joshua , Director of the ZION Bank has Customers all over world. A customer may have
one or more accounts in the Bank wide spread across one or more branches. Customers open
bank accounts with a specified opening balance and thereafter may either deposit funds into
the account or withdraws accounts from them. The transactions involve the opening of
accounts, assignments of Account Numbers, Deposit and Withdrawal transactions etc. One of
the most frequent requests for specific transactions carried out in the Bank. Customers would
often want to transfer funds from one account of theirs to another. The account Numbering
scheme now uniquely identifies the Bank Branch to which the account belongs. Customers
often travel to the bank branch to request for a new cheque book. To ensure that Customers
are ensured of high level security, the E-Banking services need to provide Customers with a
unique Personal Identification password which can be changed from time to time. All Services
are
accessible only on correct password verification. The Customer may also look for information
on Interest rates on Fixed Term Deposits which often change from time to time.
Q.1 How Mr. Joshua is going to maintain information on Bank branches and security password
information on customers.
A.1 Mr. Joshua is going to maintain information on bank branches and security
passwords through proper information systems and network models. The
installation of proper information systems will help collect, process, store, and
disseminate data in the form of information needed to carry out the functions
of the bank and management. This system will put in place a database to
collect, maintain, and store all information on the different bank branches and
information on its clients and customers. This database will ensure that data
on the various accounts the different bank branches are holding, information
on the numerous clients of the bank, and the various services that the bank
offers to its clients are readily available for use of permitted users.
Furthermore, the installation of a proper information system ensures that
information is properly secured and used only by those with access to the
system.
Q.2 Draw MIS design for the above case study covering every aspect of e-Bank.
A.2
Online
Banking
Login Services Contact About
Create/Manage/V FAQ
iew Accounts
Transfer Funds
Pay Bills
Order
Statements
Search
Transactions
ASSIGNMENT-C
1. Which of them does not support decision making?
Options
DSS,
GDSS,
ESS
All of above
Options
Options
Start topology
Options
5. Which one of the following functional business systems supports the finance business
function?
Options
Cash Management
Financial forecasting
Both a & b
Neither a or b
6. The utility called located in the System Tools folder, allows you to select when and
how often maintenance tasks are performed.
Options
Disk Cleanup
Scheduled Tasks
Disk Defragmenter
System Restore
7. Which type of network connects each node to the next, forming a loop.
Options
Star topology
Bus Topology
Ring Topology
8. Which is the most common network topology where each node is connected to a switch.
Options
Star topology
Ring topology
Bus topology
Options
Image
Resolution
Contrast
Setting
10. The manages the hardware components including the CPU, memory storage, and
peripheral devices.
Options
Operating System
Device Drivers
Motherboard
Ports
Options
Top Management
Middle management
Operational management
None of above
12. Which of the following is not a way DSS, GDSS, and ESS support decision
making?
Options
Provide information about different aspects of the decision situation and the decision
process
Stimulate decision making by helping managers question decision procedures or explore
Options
Model-driven.
Data-driven.
Data mart.
Data warehouse.
14. The technology for finding hidden patterns and relationships in large databases and inferring rules from them
to predict future behavior best describes:
Options
Data warehousing.
Knowledge acquisition.
Data mining.
Data clustering.
15. Which of the following is NOT a type of information yielded from data mining?
Options
Sequences
Classification
Clustering
Intelligence
Options
Database.
Software system.
User interface.
Inference engine.
Options
Optimization analysis.
Sensitivity analysis.
Forecasting.
Goal-seeking.
18. According to the textbook, National Gypsum uses its DSS application for:
Options
19. A system with software that can analyze and display data using digitized maps to enhance
planning and decision making best describes:
Options
Options
Decision-support system.
21. GDSS software tools that allow individuals to simultaneously and anonymously
contribute ideas on the meeting topics are called:
Options
Electronic questionnaires.
Idea organizers.
Improving preplanning.
Increasing participation.
Options
Hardware.
Software tools.
A data warehouse.
A user interface.
Options
25. A useful tool used during the electronic meeting activity of idea
generation is:
Options
Group matrix.
Policy formation.
Topic commenter.
Personal productivity.
Options
Decision-support system.
Options
Protocol
A technology
A virus
Options
Transaction
Phases
Business processes
Business functions
Options
Tapping
Backlog
Privacy
Security
Options
Computer
Motherboard
CPU
Operating System
Options
ALU
CPU
RAM
ROM
Options
Motherboard
Software
Control Unit
Hardware
Options
Options
35. What determines how a system will work to meet the business needs defined during
system investigation?
Options
System Implementation
System development
System Review
None
36. Who is involved in helping users determine what outputs tey need and
constructing the plans needed to produce these outputs?
Options
CIO
Application programmer
System Programmer
System Analyst
37. What consists of all activities that, if delayed would delay the
entire project?
Options
Deadline activities
Slack activities
RAD tasks
Options
Organizational Learning
Organizational change
Continuous improvement
Re-engineering
39. What is the measure of the output achieved divided by input required
Options
Efficiency
Effectiveness
Productivity
Return on Investment
40. What components of a decision support system allow decisions makers to easily
access and manipulate the DSS and to use common business terms and phrases?
Options