Sunteți pe pagina 1din 27

CHAPTER-1

1. Briefly explain steps of computerized processing.


2. Differentiate manual and computerized processing.
3. Explain Data and Information.
4. Mention Sub-disciplines of computing.
5. Explain Accounting process.
6. Explain P2P AND O2C.
7. Briefly explain some examples of Business Process.
8. What is CTQ? Explain with example.
9. Briefly explain different types of Business Process.
10. What are various layer viewed in organization in BPM. Explain.
11. Differentiate function based and process based organization.
12. Briefly explain various factors which are essential for success of a BPR project.
13. Briefly explain activities of TQM.
14. Write short notes
• Fundamental Rethinking
• Radical Redesign
• Dramatic Improvement
• BPR
15. Briefly explain stages of six-sigma.
16. What are various principles of BPM? Explain
17. What are various practices of BPM? Explain
18. Briefly explain the key factors of BPM implementation.
19. What are various needs of BPM implementation?
20. Elaborate BPM L-Cycle.
21. Mention disadvantages of BPA.
22. What challenges IT personnel face in BPM implementation?
23. Explain pillars of BPA.
24. Briefly Explain pillars of BPM.
25. Briefly Explain functions of AIS.
26. What are the various capabilities of on organization gains with the use of BPMS?
OR
How would you explain impact of IT on BPM?
27. Write short notes.
• Value chain automation
• Processing cycles of AIS
• Orchestration
28. What is E-R diagram? Briefly explain its components.
29. What are various record relationships? Explain.
30. What is DFD? Explain components.
31. What are the various types of DFD? Compare.
32. What is flowchart? Mention its advantages and disadvantages.
33. What are the various types of flowchart? Explain.
34. Mention Advantages and disadvantages of E-R diagram
35. Mention Advantages and disadvantages of DFD.
36. Briefly explain decision tree.
37. What are the various parts of decision table?
38. What are the various components of decision table?
39. What are the variousAdvantages and disadvantages of decision table?
40. Differentiate between DFD and flowchart.
41. Differentiate between flowchart and decision table
42. What is documentation and what are its advantages? Explain.

Chapter 2
Q.1What is cloud computing Architectural considerations ?

• Front End
• Back End

Q.2 what is infrastructure as a service (iaas) ?

• Virtual machine disk storage


• Virtual local area network (VLANs)
• Load balancers
• Ip address
• Software bundles

Q.3 What are characteristics of Iaas modal?

• Virtual machines with pre-installed software.


• Virtual machines with pre-installed Operating Systems such as Windows, Linux, and
solaris,
• On-demand availability of resources.
• Allows to store copies of particular data in different locations
• The computing resources can be easily scaled up and down

Q.4What is software as service as service (saas)

• Billing and Invoicing system


• Customer relationship management (CRM) applications
• Help Desk Applications
• Human Resource (HR) Solutions

Q. 5What are Characteristics of SaaS ?

• SaaS makes the software available over the internet


• The Software Are maintained by the vendor rather than where they are running
• The license to the software may be subscription based or usage based. And it is
billed on recurring basis
• SaaS applications are cost effective since they do not require and maintenance at
end user side
• They are available on demand
• They can be scaled up or down on demand
• They are automatically upgraded and updated
• All users are running same version of the software

Q. 6 What are the platform as a sevice (Paas)?

• Feature of Point and click tool


• Disadvantage of using PaaS is that the developer Lock in with a particular vendor

Q.7 What are the Characteristics of PaaS ?

• Provides API to develop web base application


• PaaS offers browser based development environment
• Built-in security , scalability and web service interfaces
• Work flow and approval processes
• Easy to integrate with other applications on the same platform

Q.8 What is network as as service (SaaS)?

• Custom routing protocols


• Virtualized network infrastructure
• Network as a utility
• Pay per use

Q.9 What is component of mobile computing?

• Mobile communication
• Mobile hard ware
• Mobile software

Q.10 What is business application of mobile computing?

• It has universal reach


• Any time and all time availability
• Video, web-browsing, gaming and other entertainment related applications.
• Service delivery to client
• All time connectivity
• Productivity increases as employee can communicate anytime.
• Improved management due to better communication
• Business processes can be transformed by using mobile devices
• Users get freedom to roam.

Q.11 What are mobile computing concerns?

• Security
• Dangers of misrepresentation
• Power consumption
• Potential health hazards

Q.12 What is application software?

• Application suite
• Enterprise software
• Enterprise infrastructure software
• Information worker software
• Content access software
• Educational software
• Media development software

Q.13 What are benefits of application software?

• Addressing user needs


• Less threat from virus
• Regular updates

Q.14 What are disadvantages of application software?

• Development is costly
• Infection from malware

Q.15 What are database management systems (DBMS)?

• Knowing its information needs


• Acquiring that information
• Organizing that information in a meaningful way
• Assuring information quality
• Providing software tools so that users in the enterprise can access information they
require
• Perform various operation on the files
• Adding new files to database
• Deleting existing files from database
• Inserting data in existing files
• Modifying data in existing files
• Deleting data in existing files
• Retrieving or querying data from existing files

Q.16 What is database modal?

• Hierarchical Database Modal


• Network Database Modal
• Relational Database Modal l
• Object Oriented Database Modal

Q.17 Hierarchical Database Model points

• Mainframe computers
• Oldest methods
• Pyramid fashion
• Higher level records and lower level record
• Family tree as parents
• Root record
• A parent record may have more than one child record linked to it
• Top down

Q. 18 Hierarchical database modal advantage?

• Rapid updating

Q.19 Hierarchical database modal disadvantage?

• Lack of linkage
• Rigidity

Q. 20 What is Network database modal?

• Hierarchical structure
• Upside down tree (interconnected network of records)
• Children are called members and parents are called owners
• Unlike hierarchical in network structure
• Network database are principally used on mainframe computers

Q. 21 Network Database Modal advantage

• More flexible

Q.22 Network database Modal disadvantage

• Predefined
• Limit to the number of connections

Q.23 What is Relational Database Model?

• Relationship between data file is relational


• Comman data elements or a key field
• Key field that uniquely identifies each row
• Flexible than either the hierarchical or NDS
• Table or files are called relations
• Row or records are called as tuples
• Columns are referred to as attributes or fields
• Key fields can be used to connect one table to data to another

Q.24 RDM advantage

• Relational databases can e used with little or no training


• Database entries can be modified without redefining the entire structure
• It is highly flexible

Q.25 RDM disadvantage

• Little bit slower than earlier modals


• Not very practical in case of multimedia

Q.26 What is object oriented database model(OOD)?

• OOD represent a significant advancement over other database


• OOD is able to handle many new data types including, graphics, photographs, audio
and video
• Stroe data from a variety of media sources
• OODMS users can define their own data access methods
• OOD use small reusable chunks of software called objects

Q.27 Objects consists of two elements

• A piece of data Ex- sound, video, text


• The instructions or software programs called as methods

Q. 28 OOD of Advantages

• Enhanced multimedia Capability


• Easy modification

Q.29 OOD disadvantages

• Costly
• Resistance to change

Q. 30 Advantage of a DBMS?

• Permitting data sharing


• Minimizing Data Redundancy
• Integrity can be maintained
• Program and file consistency
• User-friendly
• Improved security
• Program /data indepdence

Q. 31 Disadvantages of DBMS?

• Cost
• Security

Q.32 What are system software activities or functions of O/S?

• Performing hardware functions


• User Interfaces
• Hardware Independence
• API
• Memory Management
• Task Management
• Networking Capability
• Logical access security
• File management

Q33. What are the need for Information Technology?


• Processing and transmission of information
• Storage retrievel
• Differentiate their products and services

Q34 What are the reason for the all-pervasive use of IT for business?
A) Communication Capabilities
B) Data and Information Management
C) Automated Processes

Q35 What are the different security process and procedures for data and Information
Management?
• Authentications and passwords
• Encryption of data to prevent unauthorized use
• Tracking lost devices

Q36 Components of IT Risks.


• Business risks
• Technology risks
• Operational risk and other risks.

Q37 What are the five sub-disciplines of the computing field?


• Computer Science
• Computer Engineering
• Information Systems
• Information Technology
• Software Engineering

Q38 What are the different types of Server?


• File Server
• Print Server
• Network Server
• Database server
• Application Server
• Web Servers
• Mail Server

Q39 What are the different types of Cloud Computing Environment?


• Public Cloud
• Private Cloud

Q40 Differetiate between CISC & RISC?


CISC RISC
• In this more emphasis is on • Emphasis is on software.
hardware. • Small and limited number of
• Instructions are lengthy and complex. instructions
• High cycles per second. • Cycles per second are low.
• Consumers more power. • Consumes less power
• More expensive and complex • Less Expensive.
• In the memory-to-memory: LOAD & • Register-to-register LOAD & STORE
STORE incorporated in instructions. are independent instructions.
Q41 What are the Objectives of Audit.
• Existence
• Authorization
• Valuation
• Cutoff
• Compliance
• Operational
• Assisting management in findng ways to implementing internal control
recommendations

Q42 What are the main functions of CPU is to execute programs stored in memory?
• Control Unit(CU)
• Arithmetic and Logic Unit(ALU)
• Registers

Q43 Types of Data Storage Devices.


• Internal memory
• Primary Memory
• Random Access Memory(RAM)
• Read Only Momory(ROM)
• Secondary Memory
• Virual Memory

Q44 Describe Output Devices.


• Cathode ary tube(CRT)
• Liquid Crystal Display(LCD)
• Laser printer
• Ink-jet printer
• Plotter
• Speakers

Q45 What are the benefits of a computer network?


• Distributed nature of information
• Resource Sharing
• Computational Power
• Reliability
• User communication

Q46 What are recent technologies/devices?


• Bluetooth
• Wi-Fi
• Laptop & Notebook
• Tablet Computer or Tablet
• Smart Phone
• Touchpad
• Ipad
• Ipod
• Ultra-Mobile PC(UMPC)
• Android

Q47 What are the phases of developing information system life cycle?
Phase 1 : System Investigation
• Feasibility Study
• Technical Feasibility
• Economic Feasibility
• Legal Feasibility
• Operational Feasibility
• Schedule Feasibility
Phase 2 : System Analysis
• Interviewing Staff
• Examine current business
• Sending out questionnaires
• Observation of current procedures
Phase 3 : System Designing
• Hardware Platform
• Software
• Outputs
• Inputs
• User Interface
• Modular design
• Test Plan
• Conversion Plan
• Documentation
Phase 4 : System Implementation

• Installation
• Conversion

Fixed length v/s Variable length Instruction

1 Commonly used on RISC machines Commonly used on CISC machines


2 Reduced amount of memory required for More memory required .(memory wasted as each
program as each instruction use exactly the instruction occupy same amount of space)
same amount what it requires.
3 Instructions vary in their length. All instructions are of same length
4 More time required for execution Less time required for execution comparatively.
comparatively.
5 Fetching and decoding takes In this case fetching and decoding is easier.
more time and effort.

Recent technology /devices

1) Bluetooth
• A wireless technology having short distance coverage i.e. of 50 metres [164 feet].
• Used by both fixed as well as mobile devices.
• It creates PAN.
• Devices which utilizes Bluetooth includes a) Printer b) Keyboard c) mouse d) Laptop and
desktop e) Cell phone and headphones
2) Wi-Fi
• It uses radio waves to provide high internet and network connections .
• Range of Wi-Fi is limited. Range typically of 120 feet.
• Wi-Fi the registered trademark is owned by Wi-Fi Alliance.
• Wi-Fi Alliance defines Wi-Fi as: “Any WLAN product that is based on IEEE 802.11
standards”.
• It is less served as compared to wired connection.
• Wi-Fi network use radio waves technologies called 802.11 to provide secure,
reliable, fast wireless connectivity.
• Suitable for small business also
• It is less costly and flexible.
3) Laptop:-
• The name “laptop” is derived from the fact that it is small enough portable
computer which can sit on lap.
4) Notebook: -
• It is extremely light weight personal computer (weight < 3 kgs).
• It uses Flat panel technology to produce non bulky display screen.
• It is very similar to Laptop.
5) Tablet computer or tablet:
• It is small in size , one piece general – purpose computer.
• In this touch screen is used as input device.
• Can be operated using stylus or fingers.
• It is popular due to ease of use and portability.
• Some features are a) Input Method : input through touch interface on screen
b) Size: very small in size and weight is < 1 kg.
c) Battery life: low power consumption and high battery life.
d) Storage capacity: 16 to 64 gigabytes of storage.
e) Software: Android and Ios are most popular.
f) Wireless: It is portable and can utilize Bluetooth, Wi-Fi or
mobile connectivity.
g) Performance: processing power is less as compared to laptop
etc . Mainly suitable for emails, web browsing.

6) Smart Phone:

• Built on mobile Operating system with combined features of traditional PDA and cellular
phone.

• It allows user to store information, email and install programs along with a mobile phone.
• Features are -High resolution, touch screens , browsers

7. Touch pad:

• It is a pointing devices featuring a tactile sensor that can translate the motion and position
of a user’s finger to a relative position on screen.
• Touch pad are also found on PDA and some portable media players.
• Wireless touch pads are also available.

8. I Pad :

• Runs on version of iOS.


• Apple introduced responsive multi-touch gestures like moving two fingers apart to zoom in.
• Better compare to windows tablet as it uses less power and gives better battery life.

9. I Pod :

• Portable media player designed and marketed by Apple .Inc.


• Four versions are: i) iPod ii)ultra compact iPod shuffle iii)compact iPod Nano iv) the touch
screen iPod touch v) hard – drive based iPod classic.
• Features : i) can serve as data storage device ii) storage capacity varies by model ranging
from 2GB for the iPod shuffle to 160 GB for the iPod classic .

10. Ultra – mobile PC (UMPC):

• Launched by Microsoft and Intel in spring 2006


• Smaller than subnotebooks, have TFT display measuring (diagonally) about 12.7 to 17.8 cm
are operated like tablets PCs using touch screen or stylus and can also have a physical
keyboard.
• The first generation UMPCs were simple PCs running Linux or an adapted version of
Microsoft’s tablet PC operating system.

11) Android: Linux based operating system

Features are:

• Enable developers to create compelling mobile applications .


• Best android devices are Samsung , HTC , Motorola ,Sony Asus and more.
• Available in all shapes ,sizes ,vibrant high resolution and cameras.
• Open source and the permissive licensing allows the software to be freely modified.
• Provides access to wide –range of useful libraries and other tools .

Chapter-3

TELECOMMUNICATION AND NETWORKS

Q1 what are the Business Value of Telecommunication?

ANS:

➢ Overcome geographic barriers


➢ Overcome time barriers
➢ Overcome cost barriers
➢ Overcome structural barriers

Q2 what are the Advantage of computer network in an organization?

ANS:

➢ File Sharing
➢ Resource Sharing
➢ Remote Access
➢ Shared Database
➢ Fault Tolerance
➢ Internet Access & Security

Q3 what are the component of Telecommunication Network Model?

ANS:
➢ Terminals
➢ Telecommunications Processors
➢ Telecommunications Media
➢ Telecommunications Control Software

Q4 what are the Component of Telecommunications Processors

➢ Network Interface Card(NIC)


➢ Modems
➢ Multiplexers
➢ Internetwork Processors
• Switch
• Hub
• Bridge
• Repeater
• Gateway

Q5 what are the Component of Telecommunications Media / Channels?

➢ Guided Media / Bound Media


• Twisted- Pair Wire
• Coaxial Cable
• Fiber Optics
➢ Unguided Media / Unbound Media
• Terrestrial Microwave
• Radio Waves
• Micro Waves
• Infrared Waves
• Communication Satellites

Q 6what is Twisted-Pair Wire?

ANS:

➢ Twisted-Pair is Ordinary telephone wire.


➢ Consisting of Copper wire twisted into pairs.
➢ It is the most widely used media for telecommunication.
➢ It used for both voice & data transmission.
➢ High Interference.
➢ It is used extensively in home and office telephon.

Q7 what is Coaxial Cable?

ANS

➢ Co-axial Cables are used in computer networks are of two types thick
co-axial & thin co-axial cable.
➢ Co-axial cables can carry large volume of data.
➢ It allows high speed data transmission.
➢ It is used extensively in office buildings & other work site for local
area networks.

Q8 what is Fiber Optics?

ANS:

➢ This Media consists of one or more hair-thin filaments of glass


fiber wrapped in a protective jacket.
➢ Optical fibers can carry digital as well as analog signals.
➢ It provides increased speed and greater carrying capacity.
➢ Speed of Communication is 10,000 times faster than that of
microwave and satellite system.
➢ Fiber optics cable s are easy to install since they are smaller and
more flexible.

Q9 what are the Features/Functions of Telecommunications Software?

ANS:

➢ Network Management
➢ Traffic Management
➢ Security
➢ Network Monitoring
➢ Capacity Planning

Q10 Define Types of network for Area Coverage Based?

ANS:
➢ Local Area Network(LAN)
➢ Wide Area Network(WAN)
➢ Metropolitan Area Network(MAN)

Q 11 what are the Characteristics of LAN?

ANS:

➢ Inexpensive transmission media.


➢ Inexpensive device such as modems, repeaters and transceiver are
used.
➢ Easy physical connection of devices to the media.
➢ High data transmission rates.

Q12 what are the benefits of Local Area Network (LAN)?

ANS:

➢ Security
➢ Expanded PC Usage
➢ Distributed Processing
➢ Electronic Mail & Message Broadcasting
➢ Data Management Benefits
➢ Software Cost & up-gradation

Q13 Define Types of network for Functional Based Classification?

ANS:

A. Client-Server Networks:
➢ Client
• Fat Client
• Thin Client
• Hybrid Client
➢ Server
B. Peer to Peer Network:
C. Multi-Tire Architecture:
➢ Single Tire System / One-Tire Architecture
➢ Two- Tire System / Two-Tire Architecture
➢ N- Tire System / N-Tire Architecture

Q14 Define Types of Network for Ownership Based Classification?

ANS:

➢ Public Data Network


➢ Private Data Network
➢ Virtual Private Network(VPN)

Q15 what are the types of Network Topologies?

ANS:

➢ Star Topology
➢ Bus Topology
➢ Ring Topology
➢ Mesh Topology

Q16 what is Star Topology?

ANS:

➢ All nodes are emerging from centralized control


➢ The processing nodes in a star network topology.
➢ A star network is particularly appropriate for organization.

Q 17 what are the Advantage of Star Topology.

ANS:

➢ It is easy to add new nodes and remove existing nodes.


➢ A node failure does not bring down the entire network.
➢ It is easier to diagnose network problems through a central hub.

Q 18 what are the disadvantage of Star Topology?

ANS:

➢ If the central hub fails, the whole network ceases to function.


➢ It cost more to cable a star configuration than other topologies.

Q19 what is Bus Topology?


ANS:

➢ A single Cable connects all computers.


➢ Each computer is connected to a shared cable.
➢ Both ends of cable are terminated with a terminator

Q20 what are the advantage of Bus Topology?

ANS:

➢ Reliable in very small networks as well as easy to use and


understand.
➢ Requires the last amount of cable to connect the computers.
➢ It is easy to extend.
➢ A repeater can also be used to extend a bus configuration.

Q21 what are the disadvantage of Bus Topology.

ANS:

➢ Heavy network traffic can show a bus considerably because any


computers can transmit at any time
➢ Each connection between two cables weakens to trouble shoot.

Q22 what is Ring Topology?

ANS:

➢ In this topology, the network cable passes from one node to another
until all nodes are connected in the form of loop or ring.
➢ There is a direct point-to-point link between two neighboring nodes.
➢ There is no any master node for controlling other nodes.

Q 23 what are the advantage of Ring Topology?

ANS:

➢ Ring network offer high performance for a small number of


workstation.
➢ Ring Networks can span longer distances then other types of
networks.

Q 24 what are the disadvantage of Ring Topology?


ANS:

➢ Relatively Expensive and difficult to install.


➢ Failure of one computer on the network can affect the whole
network.
➢ It is difficult to trouble shoot a ring network.

Q25 Define Transmission Technologies?

ANS:

➢ Serial Transmission
➢ Parallel Transmission
➢ Synchronous Transmission
➢ Asynchronous Transmission
➢ Transmission Modes
1) Simplex
2) Half-duplex
3) Full-duplex

➢ Transmission Techniques:
• Switching Technique
1) Circuit Switching
2) Pocket Switching
3) Message Switching

Q26 Define Seven Layer Of OSI Model?

ANS:

1) Application Layer
2) Presentation layer
3) Session Layer
4) Transport Layer
5) Network Layer
6) Data Link Layer
7) Physical Layer

Q27 What are the eight steps involve in the following security programs?
ANS:
➢ Preparing project plan for enforcing security
➢ Asset identification
➢ Asset valuation
➢ Threat identification
➢ Threats probability of occurrence assessment
➢ Exposure analysis
➢ Controls adjustment
➢ Report generation outlining the levels of security to be provided for
individual systems, end user, etc.

Q28 what are primary IDS technologies?


ANS:
➢ Network Intrusion Detection
➢ Host-based Intrusion Detection
➢ Hybrid Intrusion Detection
➢ Network-Node Intrusion Detection

Q29 what are the two basic approaches to Encryptions?


ANS:
➢ Hardware Encryption
➢ Software Encryption

Q30 what are the popular network security protocols?


ANS:
➢ Secure Shell(SSH)
➢ Secure File Transfer Protocol
➢ Secure Hypertext Transfer Protocol (HTTPS)
➢ Secure Socket Layer(SSL)

Q31 what are Network Security Techniques?


ANS:
➢ Firewall
➢ Message authentication
➢ Site Blocking
➢ Anti-Malware

Q32 briefly explain & analysis of network administration & management?


ANS:
➢ Operation
➢ Administration
➢ Maintenance
➢ Provisioning

Q33. What is an internet application?

ANS:

• Email, browsing the sites on the world wide web.


• E-commerce transactions between businesses and their suppliers
and customers
• The internet provides electronic discussion forums and bulletin
board systems
• Downloading software and information files
• Real-time conversations with other internet users
• The internet allows gathering information through online services
using web browser search engines

Q34. Business use of the internet

ANS:

• Strategic business alliances


• Providing customer and vendor support
• Collaboration among business partners
• Buying and selling products and services
• Marketing , sales and customer service applications
• Emergence of applications in engineering , manufacturing , human
resources and accounting
• Enterprise communications and colabortion
• New web-based markets
• Developing new information based products accessible on the Web.
• Generating revenue through electronic commerce applications is a
growing source of business value
• Electronic commerce

Q35. What is intranet?

ANS:

• Information system that facilitates communication with the


organization
• Using web browsers web servers and data warehouse in a single
view
• It also uses TCP/IP protocol as in the case of internet
• Minimal cost
• Timely and competitive

Q36. Advantage of business use of intranet

ANS:

• Workforce productivity
• Time
• Communication
• Web publishing
• Business operations and management
• Cost- effective
• Promote common corporate culture
• Enhance collaboration
• Cross-platform capability

Q37. Intranet applications

ANS:

• Secured access
• Facilitate infra-office communication
• Facilitate information sharing
• Intranets also be set up to provide an electronic directory service
• Whiteboard, and electronic chat space
• Group ware offers

Q38. What is extranet?

ANS:

• Extension of intranet
• Specific application
• Isolates business communication
• Privacy and security

Q39.what is the use extranet in companies

ANS:

• Exchange large volumes of data using Electronic Data Interchange


• Share product
• Collaborate with other
• Provide or access services provided by one company
• Share news of common interest exclusively with partner companies

Q40.Rules of Extranet

ANS:

• Be as flexible as the business


• Deploy in “internet time”
• Protect the interests of the data owner
• Serve the partner as a customer
• Drive information to the decision maker

Q41. Information system and Telecommunication

ANS:

• Increased efficiency of operations


• Effective management
• Innovation in the market place

Q42. Telecommunication may provide these values through following


impacts
ANS:

• Reduce time : Time compression


• Overcoming geographical dispersion
• Restructuring business relationship: relationship management with
customer and elimination of intermediaries

Q43. Electronic Commerce

ANS:

• E-commerce refers to buying and selling

Q45. Benefits of e-commerce application and implementation

• Reduction in costs to buyers


• Reduction in errors, time and overhead costs in information
processing
• Reduction in costs to suppliers
• Reduction in time to complete business transactions
• Easier entry into new markets especially geographically remote
markets
• Faster time to market as business processes are linked
o Reduction in overhead costs through uniformity
automation etc.sk
• Reduction in use of ecologically damaging materials
• Reduction in advertising costs

Q46. Risks involved in E-commerce

ANS:

• Integrity
• Non repudiation
• Authenticity
• Confidentiality
• Privacy availability
• Reliability
• Scalability
• Easy of use
• Payment methods

Q47. Types of E- commerce

ANS:

• Four classes
o Business to business
o Business to consumer
o Consumer to business
o Consumer to consumer
o Business to employee

+ EFT: ELECTRONIC FUND TRANSFER

1. ATM
2. Pre-authorized transfer
3. PoS transaction
4. Telephone transfer

Please use these questions and answers along with book and class
notes…
CHAPTER 4 QUESTIONS

1. Briefly explain various components of information system.


2. What are various roles of IS in business?
3. Briefly explain types of IS.
4. What is TPS? Explain processing cycle of a TPS.
5. Briefly explain characteristics of TPS.
6. Explain. How can one qualify TPS?
7. What is OAS? Explain applications of OAS.
8. Differentiate Explicit and Tacit knowledge.
9. What is KMS? Mention importance of knowledge.
10. How can you link information and knowledge?
11. What are the reasons of increasing momentum of importance of knowledge? Explain.
12. Mention Do’s and Don’t of MIS development.
13. What is DSS? Explain components.
14. What are the various phases of DSS?
15. Mention applications or usage of DSS?
16. What is EIS? Explain components.
17. What is ERP? Explain stages of ERP.
18. Briefly explain some definitions of CRM.
19. What are the various benefits of CRM?
20. What is SCM? Explain its components.
21. Briefly explain various modules of HRMS.
22. What is CBS? Mention some elements or features of CBS.
23. What do you mean by Universal Banking System?
24. Compare Infosys finacle and oracle flexcube.
25. Briefly explain components of AIS.
26. What do you mean by artificial intelligence? Mention some of its commercial application.
27. What is ES? Explain its components.
28. Explain various types of expert system.
29. What are the various problems domains of ES?
30. What do you mean by business intelligence? Explain B.I. tools.
31. What is report? What are advantages of using report?
32. Mention benefits of reporting through MIS or IT for small to medium enterprises and large
enterprises.
33. What are general functions possessed by access control?
34. Explain various types of access control.
35. What do you mean by principle of least priviledge?
36. Briefly explain credit card processing.
37. What are various types of smart card? Explain.
38. Briefly explain electronic purse.
39. Briefly explain different system of electronic cheque.
40. Differentiate electronic cheque & paper cheque.
41. Explain step by step online transaction processing in an e-commerce environment.

CHAPTER 5 QUESTIONS
1. Define business application and its types?
2. What is BPA? Explain reasons and objectives of BPA
3. Briefly explain steps involved in implementing BPA.
4. Explain any 6 applications that help to achieve BPA.
5. Define
• Data
• Information
• Manual info. Cycle
6. On what basis does one choose info. Delivery channel?
7. What are the objectives of control in BPA?
8. What are the major applications of the concept of virtualization?
9. Explain type so virtualization with appropriate examples.
10. Explain Grid computing.
11. Explain in detail benefits of grid computing.
12. What do you mean by resource in grid computation & explain few of them.
13. Write a short note on using grid with respect to user’s perspective and an administrative
prospective
14. Explain application of grid computing.
15. Discuss the constraints that need to be taken into consideration while developing a secured
grid architecture.
16. Define cloud computing.
17. Write characteristics of cloud computing
18. Differentiate between advantage and disadvantage of cloud computing.
19. Differentiate between input controls and output controls
20. What do you mean by database controls? Discuss in brief.
21. Discuss Boundary controls in detail.
22. How process controls are used to have consistency in the control process?
23. Discuss communication control in brief.
24. Differentiate between system development management controls and programming
management controls under managerial functions based controls

Note 1:- kindly use with the class notes and book.
Note 2:- in case you find any difficulty whatsapp on 8447269330 ,
plz whatsapp only no call

S-ar putea să vă placă și