Beruflich Dokumente
Kultur Dokumente
Q.1.
A.1.
Q.2
Contemporaryapproaches to MIS
The BehaviouralApproach
(a) Based on the impact of the behaviour and also on the response
of the people in the organization.
(b) Motivational Feasibility forms a very important and demanding
part of such an approach towards MIS development.
3. The Socio Technical Approach
(a) In the beginning, this approach was finding it hard to survive
but now it is being accepted worldwide and is also being
implemented at a very large scale.
(b) Involves key involvement of both of the above explained
approaches.
(c) Improves the performance of the information system as a
whole.
Porter Millar postulates
Porter and Millar were the ones, who explained the affect of the
information technology on the competition. According to them
information technology is affecting competition in the following
ways:
(a) Causes changes in the structure of the industry and as a result
of this, rule of competitions are altered.
(b) Spawning of the whole new business takes place, and in much
of the cases it is caused from within the companys existing
operations.
(c) Competitive advantage is created usually because of the new
ways; the companies get to outperform their rivals.
Business modelling,
Computer science,
Operations research
Q.3.
What are the benefits & limitations of the relational database model for business
application today? Why is the object-orienteddatabase model gaining acceptance for
developing application and managing the hypermedia database at the business
website?
Relational Database Model is based on tables and for management purposes. This
model was invented by Edgar F. Codd in 1969.Edgar at that time was working at IBM.
In the relational model of a database, all data is represented in terms of tuples
&groupedintorelations. A database organized in terms of the relational model is a
relational database.
A.3.
S.N
o.
1
2
3
4
5
Name
ABC
XYZ
AAA
CCC
BBB
City
A
S
D
F
G
State
AA
DD
SS
FF
GG
Room
s
12
23
34
43
12
Front
Desk
Yes
Yes
Yes
Yes
Yes
Restaur
ant
Yes
Yes
Yes
Yes
No
Travel
Desk
Yes
Yes
Yes
Yes
Yes
Parkin
g
No
Yes
Yes
Yes
Yes
Room
Rate
1000
2000
1200
2300
3000
6 DDD
H
HH
7 FFF
J
JJ
From S.No. to Room rates are
attributes
From 1 to 7 is tuple
32 Yes
45 No
No
No
No
No
Yes
Yes
1000
700
Q.4.
What are the business benefit and management problems of client/server networks?
Discuss also in Network Computing and Peer-to-peer networks?
A.4.
Client Server there was one powerful computer (known as server) which acts as
a provider of information to other sub-ordinate workstations (called client). Now
Let us discuss the benefits and drawbacks of Server-Client computing over P2P
computing:-
congestion, which rarely takes place in P2P network. Overload can lead to breakingdown of servers. In peer-to-peer, the total bandwidth of the network increases as the
number of peers increase.
(2) Client-Server architecture is not as robust as a P2P and if the server fails, the whole
network goes down. Also, if you are downloading a file from server and it gets
abandoned due to some error, download stops altogether. However, if there would
have been peers, they would have provided the broken parts of file.
(3) Cost: It is very expensive to install and manage this type of computing.
(4) IT professional needs to maintain the servers and other technical details of network.
Q.5.
How can information systems support a companys business operations, discuss making
by their managers, and give them a competitive advantage? Give examples to illustrate
your answer?
A.5.
Information technology provides a platform for a company to connect the global world
with Internet. Internet has a wide range of customers, buyers, service providers, technical
staff, etc. with the help of Internet business can run on a single website like General
Electric Company Information system and technology provide various channels to
communication like E-mail, Instant messages, SMS servers, etc to all employees at any
time all over the world. This type of software helps to saving time and cost. Of the
company
Software are very important for a company for instant Information of stocks, assets
valuation, sales, purchases, and service.
Decision making is very easy to the management after IT because its provide latest
information to the management for employee, stocks, sales, purchase, and services, etc
The management can make a decision after check IT reports.
Q.6
A.6.
In computer networking, topology refers to the layout of connected devices. This article
introduces the standard topologies of networking.
Topology in Network Design
Think of a topology as a network's virtual shape or structure. This shape does not
necessarily correspond to the actual physical layout of the devices on the network. For
example, the computers on a home LAN may be arranged in a circle in a family room, but
it would be highly unlikely to find a ring topology there.
Network topologies are categorized into the following basic types:
bus
ring
star
tree
mesh
More complex networks can be built as hybrids of two or more of the above basic
topologies.
Bus Topology
Bus networks (not to be confused with the system bus of a computer) use a common
backbone to connect all devices. A single cable, the backbone functions as a shared
communication medium that devices attach or tap into with an interface connector. A
device wanting to communicate with another device on the network sends a broadcast
message onto the wire that all other devices see, but only the intended recipient actually
accepts and processes the message.
Ethernet bus topologies are relatively easy to install and don't require much cabling
compared to the alternatives. 10Base-2 ("ThinNet") and 10Base-5 ("ThickNet") both were
popular Ethernet cabling options many years ago for bus topologies. However, bus
networks work best with a limited number of devices. If more than a few dozen computers
are added to a network bus, performance problems will likely result. In addition, if the
backbone cable fails, the entire network effectively becomes unusable.
Ring Topology
In a ring network, every device has exactly two neighbors for communication purposes.
All messages travel through a ring in the same direction (either "clockwise" or
"counterclockwise"). A failure in any cable or device breaks the loop and can take down
the entire network.
To implement a ring network, one typically uses FDDI, SONET, or Token Ring technology.
Ring topologies are found in some office buildings or school campuses.
Star Topology
Many home networks use the star topology. A star network features a central connection
point called a "hub node" that may be a network hub, switch orrouter. Devices typically
connect to the hub with Unshielded Twisted Pair (UTP) Ethernet.
Compared to the bus topology, a star network generally requires more cable, but a failure
in any star network cable will only take down one computer's network access and not the
entire LAN. (If the hub fails, however, the entire network also fails.)
Tree Topology
Tree topologies integrate multiple star topologies together onto a bus. In its simplest form,
only hub devices connect directly to the tree bus, and each hub functions as the root of a
tree of devices. This bus/star hybrid approach supports future expandability of the
network much better than a bus (limited in the number of devices due to the broadcast
traffic it generates) or a star (limited by the number of hub connection points) alone.
Mesh Topology
Mesh topologies involve the concept of routes. Unlike each of the previous topologies,
messages sent on a mesh network can take any of several possible paths from source to
destination. (Recall that even in a ring, although two cable paths exist, messages can
only travel in one direction.) Some WANs, most notably the Internet, employ mesh
routing.
A mesh network in which every device connects to every other is called a full mesh. As
shown in the illustration below, partial mesh networks also exist in which some devices
connect only indirectly to others.
Q.7.
A.7.
Q.8
How do you think sales force automation affects salesperson productivity, marketing
management and competitive advantage?
A.8
ASSIGNMENT-B
Mr. Joshua , Director of the ZION Bank has Customers all over world. A customer may have
one or more accounts in the Bank wide spread across one or more branches. Customers open
bank accounts with a specified opening balance and thereafter may either deposit funds into
the account or withdraws accounts from them. The transactions involve the opening of
accounts, assignments of Account Numbers, Deposit and Withdrawal transactions etc. One of
the most frequent requests for specific transactions carried out in the Bank. Customers would
often want to transfer funds from one account of theirs to another. The account Numbering
scheme now uniquely identifies the Bank Branch to which the account belongs. Customers
often travel to the bank branch to request for a new cheque book. To ensure that Customers
are ensured of high level security, the E-Banking services need to provide Customers with a
unique Personal Identification password which can be changed from time to time. All Services
are
accessible only on correct password verification. The Customer may also look for information
on Interest rates on Fixed Term Deposits which often change from time to time.
Q.1
How Mr. Joshua is going to maintain information on Bank branches and security password
information on customers.
A.1
Q.2
Draw MIS design for the above case study covering every aspect of e-Bank.
A.2
Online
Banking
Login
Services
Create/Manage/V
iew Accounts
Transfer Funds
Pay Bills
Order
Statements
Search
Transactions
ASSIGNMENT-C
Which of them does not support decision making?
1.
Options
DSS,
GDSS,
ESS
All of above
2.
Options
Transaction price system secret socket layer
Transaction processing system
Contact
About
FAQ
3.
Options
Local area network
Wide area network
Start topology
None of the above
4.
Options
General purpose application program
Application specific program
System management programs
System development programs
5.
Which one of the following functional business systems supports the finance business
function?
Options
Cash Management
Financial forecasting
Both a & b
Neither a or b
6.
Options
Disk Cleanup
Scheduled Tasks
Disk Defragmenter
System Restore
7.
Which type of network connects each node to the next, forming a loop.
Options
Star topology
Bus Topology
Ring Topology
All of the above
8.
Which is the most common network topology where each node is connected to a switch.
Options
Star topology
Ring topology
Bus topology
Local area network
9.
Options
Image
Resolution
Contrast
Setting
10. The
manages the hardware components including the CPU, memory storage, and
peripheral devices.
Options
Operating System
Device Drivers
Motherboard
Ports
12. Which of the following is not a way DSS, GDSS, and ESS support decision
making?
Options
Automate certain decision procedures
Provide information about different aspects of the decision situation and the decision
process
Stimulate decision making by helping managers question decision procedures or explore
different solution designs
Generate monthly, hardcopy reports
Options
Data warehousing.
Knowledge acquisition.
Data mining.
Data clustering.
15. Which of the following is NOT a type of information yielded from data mining?
Options
Sequences
Classification
Clustering
Intelligence
17.
Options
Optimization analysis.
Sensitivity analysis.
Forecasting.
Goal-seeking.
18. According to the textbook, National Gypsum uses its DSS application for:
Options
Identifying customer buying patterns and fraud detection.
Price, advertising, and promotion selection.
Defense contract analysis.
Corporate planning and forecasting.
19. A system with software that can analyze and display data using digitized maps to enhance
21. GDSS software tools that allow individuals to simultaneously and anonymously
Options
Improving preplanning.
Increasing participation.
Providing documentation of meetings.
Doing all of the above.
25. A useful tool used during the electronic meeting activity of idea
generation is:
Options
Group matrix.
Policy formation.
Topic commenter.
Personal productivity.
28.
Options
Transaction
Phases
Business processes
Business functions
30. A
transactional e-commerce
businesses provide?
Options
Sale of goods and services.
Sale of goods only.
Online sale of goods.
describes a Business-toBusiness?
Options
Sale of goods online to a consumer.
Sale of goods online to many consumers.
Sale of goods to a business from a Brick
and Mortar business.
Sale of goods to a business online only.
35. What determines how a system will work to meet the business needs defined during
system investigation?
Options
System Implementation
System development
System Review
None
36. Who is involved in helping users determine what outputs tey need and
37. What consists of all activities that, if delayed would delay the
entire project?
Options
Deadline activities
Slack activities
RAD tasks
The critical path
Options
Efficiency
Effectiveness
Productivity
Return on Investment
40. What components of a decision support system allow decisions makers to easily
access and manipulate the DSS and to use common business terms and phrases?
Options
The knowledge base
The model base
The user interface or dialogue
The expert system