Sie sind auf Seite 1von 19

F-2, Block, Amity Campus

Sec-125, Nodia (UP)


India 201303
ASSIGNMENTS
PROGRAM:
SEMESTER-I

Subject Name & Code


Study COUNTRY
Permanent Enrollment Number (PEN)
Student Name

: Computers In Management (ABF105 (T))


: Somalia
: BFIA01512010-2013019
: Mohamed Abdullahi Khalaf

INSTRUCTIONS
a) Students are required to submit all three assignment sets.
ASSIGNMENT
Assignment A
Assignment B
Assignment C

DETAILS
Five Subjective Questions
Three Subjective Questions + Case Study
45 Objective Questions

MARKS
10
10
10

b)
c)
d)
e)

Total weightage given to these assignments is 30%. OR 30 Marks


All assignments are to be completed as typed in word/pdf.
All questions are required to be attempted.
All the three assignments are to be completed by due dates (specified from
time to time) and need to be submitted for evaluation by Amity University.
f) The evaluated assignment marks will be made available within six weeks.
Thereafter, these will be destroyed at the end of each semester.
g) The students have to attach a scanned signature in the form.
Date: 15.12.2010

Signature:

( ) Tick mark in front of the assignments submitted


Assignment A

Assignment B

Computers in Management

-2-

Assignment C

Assignment 'A'
1. What do you understand by an Information System? Explain various
categories of information system.
Answer:
Information system (IS): Is combination of hardware, software, infrastructure and
trained personnel organized to facilitate planning, control, coordination, and decision
making.
It is any written, electronic, or graphical method of communicating information. The
basis of an information system is the sharing and processing of informations and
ideas. Computers and telecommunication technologies have become essential
information system components. Therefore, any combination of information
technology and people's activities using that technology to support operations,
management, and decision-making becomes an information system.
Beynon-Davies defines an information system as an example of a system concerned
with the manipulation of signs. An information system is a type of socio-technical
system. An information system is a mediating construct between actions and
technology.
In a very broad sense, the term information system is frequently used to refer not
only to the information and communication technology (ICT) an organization uses,
but also to the way in which people interact with this technology in support of
business processes.
The information systems support different types of decisions at different levels of the
organizational hierarchy.
For most businesses, there are a variety of requirements for information. Senior
managers need information to help with their business planning. Middle management
needs more detailed information to help them monitor and control business
activities. Employees with operational roles need information to help them carry out
their duties.
As a result, businesses tend to have several information systems operating at the same
time. These are the main categories of information systems:
a) Executive Support Systems (MIS): are designed to help senior management
make strategic decisions. It gathers, analyses, and summarizes the key internal
and external information used in the business.
b) Management Information Systems (MIS): Are mainly concerned with
internal sources of information. It usually takes data from the transaction
processing systems and summarizes it into a series of management reports. It is
used by middle management and operational supervisors.
c) Decision-Support Systems (DSS): are specifically designed to help
management make decisions in situations where there is uncertainty about the
-3-

possible outcomes of those decisions. DSS comprise tools and techniques to


help gather relevant information and analyses the options and alternatives. It
often involves use of complex spreadsheet and databases to create "what-if"
models.
d) Knowledge Management Systems (KMS): are designed to help businesses
create and share information. These are used in a business where employees
create new knowledge and expertise which can be shared by others in the
organization to create commercial opportunities.
e) Transaction Processing Systems (TPS): are designed to process routine
transactions efficiently and accurately. A business will have several TPS; for
example:
Billing systems to send invoices to customers.
Systems to calculate the weekly and monthly payroll and tax payments.
Production and purchasing systems to calculate raw material
requirements.
Stock control systems to process all movements into, within and out of
the business.
f) Office Automation Systems (OAS): are systems that try to improve the
productivity of employees who need to process data and information. The best
example is the software systems used to improve the productivity of employees
working in an office (Microsoft Office) or systems that allow employees to
work from home or whilst on the move.
2. Show with reference to a block diagram, the structure of a digital
computer and the interconnection of various units. Explain the
functions of various units briefly.
Answer:
In order that a digital computer can solve problems, it should be equipped
with the following components:

Input devices: These are devices that enable you to enter data or give
instructions to your computer. The most commonly used input devices are
keyboard, mouse, others include scanner, digital cameras, joystick, trackball,
and touchpad.

Output devices: These are devices that allow what is on the computer to bee
seen or heard. Output devices include Monitors and printer.

Processing unit: The processing unit contains these elements:


-

Central processing unit (CPU): this is often referred to as the brain of


the computer. It performs the core processing, logic control, and
calculation work on the information. A CPU typically consists of:

-4-

a- Arithmetic and logical unit (ALU): This is the basic operational


units of the CPU that perform arithmetic operations on integers and
real numbers, and of units that perform logical operations.
b- A control unit: This unit is responsible for controlling flow of data
and instructions.

External memory: The amount of memory resident in the CPU is very small
and is inadequate to accommodate all programs and data. Out-of-theprocessor memory provides the desired storage space. External memory is
classified into two categories:
-

Main (or primary) memory: This is a high-speed memory that stays close
to the CPU. Programs are first loaded in the main memory and then
executed. Usually main memory is volatile, i.e., its contents are lost after
power-down.
Secondary memory: This is inexpensive, bigger and low-speed memory.
It is off-line storage. To store programs and data for future processing,
one requires secondary storage to be permanent. Examples are floppy
disks, hard disks, and CDROM disks.

The interconnection diagram for a simple computer is shown below.


Secondary
Storage

Primary
Storage
Input Devices

Output Devices

Control Unit

A. L. U

3. What do you understand by a database management system? Explain


the advantages of database management system over conventional file
oriented data processing system.
Answer:
Database management system (DBMS) is a collection of programs (software) that
allows a computer to perform database functions of storing, retrieving, adding,
deleting and modifying data. Relational database management systems (RDBMS)

-5-

implement the relational model of tables and relationships. Examples of DBMS


include Microsoft Access, MySQL, Microsoft SQL Server, Oracle and FileMaker Pro.
The advantages of the database management systems over conventional file-oriented
data processing systems are:
a) Warehouse of Information: The database management systems are
warehouses of information, where large amount of data can be stored.
b) Defining Attributes: The unique data field in a table is assigned a primary key.
This helps in identification of data, checks for duplicates, thereby reducing data
redundancy.
c) Systematic Storage: The data is stored in form of tables, in which the primary
key helps to eliminate data redundancy, enabling systematic storage of data.
d) No Language Dependence: The database management systems are not
language dependent. Therefore, they can be used with various languages.
e) Table Joins: The data in two or more tables can be integrated into a single
table. This enables to reduce the size of the database and helps in easy retrieval
of data.
f) Multiple Usages: The database can be used simultaneously by a number of
users. Various users can retrieve the same data simultaneously. The data in the
database can also be modified, based on the privileges assigned to users.
g) Data Security: Data is the most important asset. Therefore, there is a need for
data security. Database management systems help to keep the data secured.
h) Privileges: Different privileges can be given to different users, for example,
some users are allowed edit the database, but not to delete.
4. Explain the various file-accessing techniques in data management
system. Also state the advantages and limitations of each technique.
Answer:
There are many ways in which files in data management system can be accessed,
these include; accessing it in a form view, table view, query, report, page, or macros.
5. What is meant by Local Area Network and Wide Area Network?
Differentiate between them and give one example of each.
Answer:
Local Area Network (LAN) is a group of computers connected together so that
they can share files, folders, printers, and peripherals. It is made up of computers
connected by cables in the same building or campus. Computers can be networked in
several ways, the simplest is peer-to-peer setup that allows peripherals and files to be
shared. Another way is to connect PCs through a central computer called server,
where other computers drives and folders are shared as well as peripherals.

-6-

Wide Area Network (WAN) is a computer networks that covers a large


geographical area. Typically a WAN consists of two or more local area networks
(LAN).
Computers connected to a wide-area network are often connected through public
networks, such as the telephone system. They can also be connected through leased
lines or satellites. The largest WAN in existence is the Internet.
The main differences between local area networks (LAN) and wide area networks
(WAN) are:
a) A local area network (LAN) exists in a house, university or campus, while a
wide area network (WAN) exists over many buildings separated by a vast
distance, may be in different countries or continents.
b) The maximum speed of a LAN can be 1000 megabits per second, while the
speed of a WAN can go up to 150 megabits per second.
c) Computers in a LAN can share a printers and peripherals if they are in the
same LAN. On the other hand, a WAN cannot share a printer.
d) A LAN doesnt need a dedicated computer to direct traffic to and from the
Internet, unlike a WAN that needs a special-purpose computer, whose only
purpose is to send and receive data from the Internet.
e) A WAN is more expensive than a LAN.
f) It is easy to set up and expand a LAN. The equipments needed for a LAN is a
network interface card (NIC), cable, switch, and hub. But it is difficult to set
up or expand a WAN. The equipment needed include modems, and routers.
g) Another difference is the networking standard used. A LAN uses the Ethernet
standard, while a WAN uses the T1 standard.

-7-

Assignment 'B'
1. What is an Internet? How it differs from Intranet? Explain the various
Internet Tools.
Answer:
Internet, sometimes called (the Net), is a worldwide system of computer networks
in which users at any one computer can, if they have permission, get information
from any other computer and sometimes talk directly to users at other computers.
An Intranet is a computer network that is designed to work like the internet but in
a much smaller scale and is restricted only to the employees of the company.
An intranet often gets confused with the Internet. While there are a lot of
similarities between them, they really are two different things. Simply put, the
Internet is the global World Wide Web, while an intranet is a private Internet
operating within a company. Both the Internet and an intranet use TCP/IP
protocol as well as features like e-mail and typical World Wide Web standards.
One main difference is that users of an intranet can get on the Internet, but
thanks to protection measures like computer firewalls, global Internet users
cannot get onto an intranet unless they have access to it. In fact, an intranet can
be ran without an Internet connection. While Internet technologies like browsers,
servers, and chat scripts are still used, an intranet can be a separate entity as long
as its owners do not require that users have access to information found on the
Internet.
There are handful of Internet Tools used to get access to it, these are Applications,
clients and servers; enable storage of information on servers for access by users who
have client software for a range of purposes more complex than just utility tasks

Serverwatch: Information about Internet servers; includes news, downloads,


and reviews of Web, mail, news, ftp, and other servers; part of internet.com
FTP RFC: File Transfer Protocol (FTP); describes FTP terms and operation;
Request for Comments 959, J. Reynolds, J. Reynolds, October 1985
FTPplanet: Directory of File Transfer Protocol information and software;
includes instruction guides, help, and technical information about using FTP
FTP Clients: File Transfer Protocol software; description and reviews of
downloadable software for transferring files over the Internet; from
internet.com portal
Telnet RFC: The Remote User Telnet Service; describes the telnet protocol
and its operation; Request for Comments 818, J. Postel, November 1982
Telnet Clients: Telnet software; description and reviews of downloadable
software for allowing you to login to a remote computer host and use it as if
on a terminal; from internet.com portal
WWW: World Wide Web Consortium; develops interoperable technologies
(specifications, guidelines, software, and tools) for the World Wide Web
-8-

WWW Browsers: Web Browsers; a list of downloads for Web browser


software with reviews; from internet.com portal
Webreference: Web technician's reference; includes discussion of technical
issues involved in Web implementation
Web Development: Web content development; discussion of a methodology
for Web content development involving issues of audience and purpose
HTML Station: HTML reference; includes demonstrations, tutorials, codes,
specification summaries, techniques/technologies descriptions, and
supporting information about hypertext markup language (HTML) and
related technologies

2. What is multimedia? List the common multimedia devices. Explain the


Application areas of multimedia system.
Answer:
Multimedia is used to refer to computer-based interactive communication
processes that incorporate text, graphics, sound, animation, and video. The word
interactive is a key feature in multimedia, especially in the nonlinear multimedia, in
the sense that the user determines what content is delivered, and how and when it
is delivered. Information-processing devices, such as the computer and many
electronic devices, are the ones mainly used to play, record, or generally access
multimedia content, though multimedia can also be part of a live performance.
When used as an adjective, multimedia can be descriptive of the electronic media
devices used to store and experience multimedia content. Multimedia can be
divided into linear and nonlinear categories. Linear content basically operates with
minimal navigation control by the user, such as a cinema presentation. Nonlinear
content offers the user more control over the application, such as seen in video
games or self-paced computer-based training. Another name for nonlinear
multimedia is hypermedia content. Hypermedia is based on cognitive theories of
how knowledge is structured and learned by people. It progresses in a
nonsequential fashion whereby it is the user who determines the next step.
3. What do you understand by electronic data interchange? What is the
purpose of EDI? State its advantages over traditional paper-based
document transfer system.
Answer:
Electronic Data Interchange (EDI) refers to the structured transmission of data
between organizations by electronic means. It is used to transfer electronic
documents from one computer system to another, i.e. from one trading partner to
another trading partner.
The National Institute of Standards and Technology; defines Electronic Data
Interchange as "the computer-to-computer interchange of strictly formatted messages
that represent documents other than monetary instruments. EDI implies a sequence
of messages between two parties, either of whom may serve as originator or recipient.

-9-

In EDI, the usual processing of received messages is by computer only. Human


intervention in the processing of a received message is typically intended only for
error conditions, for quality review, and for special situations.
EDI can be formally defined as 'The transfer of structured data, by agreed message
standards, from one computer system to another without human intervention'.
The purpose of EDI is not to eliminate paper, but rather to eliminate the time and
the data entry associated with paper. It is generally accepted that 70 percent of one
computer's business data output becomes a second computer's data input. In a paper
environment without EDI this means that the same information is being entered, in
different processes, into both computers which cost time and energy. With EDI, the
computers are linked such that duplicate data entry does not take place.
The purpose of EDI is also to improve the flow and management of business
information. Any information that, today, is on a business form of any kind, is
appropriate for EDI. EDI is currently being used for all of the most common
business transactions such as purchase orders, invoices, quotes, bills of lading, status
reports, receiving advices; and also for some very specific transactions such as
residential mortgage insurance applications, healthcare claim payments, and material
safety data sheets.
Advantages of EDI over traditional paper-based document transfer system
include:

Lowering Operating Cost - EDI replaces paper transactions with


electronic transmissions, saving time and reduced cost of business
transaction and enabling the automatic processing of documents.

Reduced Error and Increases Business Information Accuracy - With the


implementation of EDI, there is no need for re-entering data, thus,
reducing the risk for human error. Each re-entry of data is a potential
source of error.

Increase Productivity - Making personnel more efficient and it improves


business capabilities by speeding up throughput.

Increase Security - Data security and control are maintained through out
the transmission process using passwords, user identification and
encryption.

Inventory Control - EDI can directly and indirectly help organizations


improve their inventory control. Fact and accurate permits better
managing on stock balance, stock in-and-out, stock handling.....etc.

Distribution - Improving delivery of services and goods by reducing


order and delivery time and increase the reliability of meeting targets.

- 10 -

Accounting - EDI facilitated financial processes and potential in


providing faster reconciliation or elimination of tasks, auditing, checking
and improving cash flow.

Faster Trading Cycle - EDI allows faster and streamlining trading cycle
between organizations leading to improved relationships between
trading partners.

Marketing Competitiveness - With the use of EDI, buyer and customer


can easily search for product description, specification, prices and
availability. The use of computers to obtain information is replacing the
use of telephone and catalogues. Companies with EDI will certainly
have an edge.

Better Quality Control - Quality control has becoming a key thrust for
progressive organizations. Many large, corporate buyers are now
insisting their suppliers to conform to company performance criteria.
With EDI, customers have more accurate information on the progress
of their orders. Suppliers are given more specification, inventories are
better managed, wastage being minimized. Fast and accurate
communications permits better management.

Improve Corporate Trading Relationship - Business units, departments


and regional offices are co-ordinate together. This strengthens intercompany relationship, making the entry of new competitors more
difficult and gaining more new business opportunity.

- 11 -

Case Study
Compare the Conventional Banking System with Electronic Banking System covering
all details on ATM, Telebanking, Payment systems (various cards like credit card,
smart card etc) etc.
Answer:
A bank is a financial organization authorized by a government to accept deposits,
pay interest, clear checks, make loans, act as an intermediary in financial
transactions, and provide other financial services to its customers.
Banks provide a number of services to consumers around the world, allowing them
to access bank accounts, deposit and withdraw funds, pay bills and more.
There are different kinds of bank systems, such as: Traditional bank system, and
electronic bank system.
Traditional Bank system: is system of banking used by thousands of banks, and it is
the first banking system used by people. It is a system where bank locations and
branch locations offer a full range of services to the customer. Physical bank
locations are fully staffed with knowledgeable employees ranging from tellers to loan
officers.
At this banking system, a customer can conduct a number of banking transactions;
including cashing a check, withdrawing funds, opening a new account and applying
for a loan.
Electronic Bank System: is a system of banking used by modern banks throughout
the world. In this system customers are allowed to securely access funds, account
information, conduct transactions without physically being in a bank branch, and
other banking services through a personal computer over a wide area network or
internet.
This includes usage of Automated Teller Machines (ATM); it is a computerized
machine that permits bank customers to gain access to their accounts with a
magnetically encoded plastic card and a code number. It enables the customers to
perform several banking operations without the help of a teller, such as to withdraw
cash, make deposits, pay bills, obtain bank statements, effect cash transfers, etc. The
first (ATM) were used in the 1960s in New York City. Since then, advancements in
technology have created a complete electronic banking system available to consumers
every time.
An ATM card works two different ways; as credit or debit. When it is used as a credit
card, many banks do not charge fees and the money does not come out of the
account immediately. A debit card requires that a pin number be entered at the point
of sale. The money automatically comes out of the account and many merchants, and
some banks, apply fees to these transactions.
ATM withdrawals may be conducted at any ATM machine that accepts your debit
card. You can withdraw money from your checking or savings accounts. If it is not an

- 12 -

ATM machine from your own bank, it may charge you a fee. You can also deposit
money through an ATM machine with your debit card.
Another feature of electronic banking system is Tele-banking, which is a service by
which a bank customer can carry out transactions over the phone using a password.
It may involve direct contact with a bank representative or may be automated using
the phones keypad.
Using mobile phones for banking services where you can; deposit, pay, withdrew,
send and receive money; is becoming very popular in the world these days.
Companies that provide mobile services are trying to attract more customers by
offering these kinds of extra services, and giving guarantees.
When a customer uses electronic banking he/she can sign up for electronic bill
paying. Once different accounts are linked to the bank account, automatic payments
can be set up to take out of the bank account immediately on the designated day.
Many companies also allow payments over the phone with an electronic check. This
means you give them the routing, checking account and check numbers on your
check. The check goes through a process similar to a debit transaction.
A credit card is a small plastic card issued to users as a system of payment. It allows
its holder to buy goods and services based on the holder's promise to pay for these
goods and services. The issuer of the card creates a revolving account and grants a
line of credit to the consumer (or the user) from which the user can borrow money
for payment to a merchant or as a cash advance to the user.
Another issue related to electronic bank system is the use of Smart Cards. This is a
device that includes an embedded integrated circuit chip (ICC) that can be either a
secure microcontroller or equivalent intelligence with internal memory or a memory
chip alone. The card connects to a reader with direct physical contact or with a
remote contactless radio frequency interface. With an embedded microcontroller,
smart cards have the unique ability to store large amounts of data, carry out their own
on-card functions, and interact intelligently with a smart card reader.

- 13 -

Assignment 'C'
1. Computer can not do anything without a:
a. Chip
b. Memory
c. Output device
d. Software (
)
e. None of these
2. Primary storage is--------------as compared to secondary storage.
a. Slow and inexpensive
b. Fast and inexpensive (
)
c. Fast and expensive
d. Slow and expensive
e. None of the above
3. The memory which is programmed at the time it is manufactured:
a. ROM (
)
b. RAM
c. PROM
d. EPROM
e. None of the above
4. Which of the following isnt used in the storage phase of a computer-based
information system?
a. Magnetic disk
b. Keyboard (
)
c. Diskette
d. Hard disk
e. None of the above
5. A kind of serial dot matrix printer that forms characters with magnetically
charged ink-sprayed dots is called:
a. Laser Printer (
)
b. Ink-Jet printer
c. Both of the above
d. None of the above
6. Which of the following is not applications software?
a. Word processing
b. Spreadsheet
c. UNIX (
)
d. Desktop publishing
e. None of the above

- 14 -

7. A translator which reads an entire program written in a high-level language


and converts it into machine language code is called:
a. Assembler
b. Translator
c. Compiler (
)
d. System Software
8. The database structure that treats files as tables is:
a. Relational database (
)
b. Hierarchical database
c. Network database
d. All of the above
e. None of the above
9. Combining of records from two or more files into a single ordered file is
called:
a. Sorting
b. Searching
c. Merging
d. None of the above (
)
10. Which of the following is a query language?
a. Dbase
b. Access
c. Fox Pro
d. All of the above (
)
e. None of the above
11. Which of the following are popular DBMS packages?
a. Dbase
b. Access (
)
c. FoxPro
d. All of the above
e. None of the above
12. Web browser is a:
a. Hardware
b. Software (
)
c. Hyperlink
d. All of the above
e. None of the above
13. Which of the following communication system uses simplex transmission
mode?
a. Radio
b. Television
c. Cable

- 15 -

d. All of the above (


)
e. None of the above
14. Searching on a net can be done through:
a. Search Engines (
)
b. Indexes
c. Both of these
d. None of these
15. Private networks set up by companies for their employees for purposes such
as e-mail, group, brainstorming, access to corporate database etc is called:
a. Internet
b. Intranet (
)
c. Pop-up-windows
d. All of these above
e. None of the above
16. Which of the following functions is supported by e-mail systems?
a. Composition (
)
b. Reporting
c. Transfer
d. Disposition
e. All of the above
17. The internal structure of the World Wide Web is built on a set of rules called:
a. Hyper Text Transfer Protocol (
)
b. TCP/IP
c. All of the above
d. None of the above
18. Which of the following is not a wide area network?
a. ARPANET
b. INDONET
c. OMNINET
d. None of the above (
)
19. ___________ is used to connect a terminal to a computer through public
telephone lines.
a. Modem (
)
b. Internet
c. Network
d. None of these
20. Following is the disadvantage of using interpreters.
a. Fast response
b. easy to write
c. Less memory requirements
d. Time consuming (
)

- 16 -

21. To install multimedia facility into a computer one needs:


a. Sound card
b. Speakers
c. CD-ROM
d. All of the above (
)
e. None of the above
22. The links that take the user to new page is:
a. Hypertext
b. Hyperlink (
)
c. Hyper Text Transfer Protocol
d. All of the above
23. Application software can be acquired through:
a. Customs programming
b. Pre-written packages
c. Both of the above (
)
d. None of the above
24. Which of the following is not a utility program?
a. Editing
b. Sorting
c. Merging
d. None of the above (
)
25. The malicious program that damages your computer is called:
a. Worm
b. Viruses (
)
c. Bugs
d. None of the above
26. Data entry can be performed with all of the following except?
a. OCR
b. COM (
)
c. Voice recognition systems
d. None of the above
27. The two kinds of main memory are:
a. Primary and Secondary (
)
b. Random and sequential
c. RAM and ROM
d. All of the above
28. What is the name of the screen symbol that shows the placement of the next
character?
a. Mouse
b. Cursor (
)
c. Track Ball
- 17 -

d. All of the above


29. A command that lets you change one or more fields in a record is:
a. Insert
b. Delete
c. Modify (
)
d. None of the above
30. Data elements of related type are grouped into?
a. Record (
)
b. Title
c. String
d. All of the above
31. A Hacker is:
a. A software program
b. An unauthorized person (
)
c. A virus
d. All of the above
32. The interface between user and computer system is provided by:
a. Compiler
b. Utility programs
c. Operating systems (
)
d. All of the above
33. The process of navigating and exploring the World Wide Web is called:
a. Browsing
b. Surfing
c. Both of the above (
)
d. None of the above
34. An unauthorized access to network can be prevented through:
a. Passwords
b. Digital signatures (
)
c. Encryption
d. All of the above
35. Which of the following is not a search engine?
a. Altavista
b. Lycos
c. Infoseek (
)
d. Gopher
36. Computer Network spanning a global area is:
a. LAN
b. MAN
c. WAN (
)
d. All the above
- 18 -

37. Transmission Channels used in LAN are:


a. Coaxial cable
b. Fiber-optics cable
c. Twisted wire
d. Both (a) and (b)
e. All of the above (
)
38. Remote access to distant computers is called:
a. Telnet
b. FTP
c. Both of the above
d. None of the above (
)
39. The floppy disks come in two sizes. They are:
a. 3.5 inch & 5.25 inch (
)
b. 2 inch and 3.5 inch
c. 2 inch and 4.25 inch
d. None of the above
40. 1 Byte is equal to combination of:
a. 16 bits
b. 8 bits
c. 2 bits
d. None of the above (
)

- 19 -

Das könnte Ihnen auch gefallen