Вы находитесь на странице: 1из 20

ASSIGNMENT-A

Q.1.

What strategic role can information technology play in business process


reengineering and total quality management?

A.1.

BPR and Information Technology


Business Process Re-engineering has rapidly developed towards a new
management philosophy. The inherent business process orientation changes the
perspective of international management from a structural to that of a process
view. The re-engineering of business processes is only one aspect of the
management of business processes. In particular, the re-engineering of
international business processes needs special attention, because the multifaceted structure of multinational corporations increases the complexity of
business processes, there by influencing the options for redesign. Business
Process Re-engineering has rapidly developed towards a new management
philosophy based upon predecessors like Total Quality Management, Overhead
Value Analysis, Kanban or Just-In-Time-Management. Business processes can
be re-engineered by redesigning the steps, by changing the logical and temporal
sequence of the steps, or by changing any other characteristics of the process.
The role of IT is discussed in contradictory way. Advocates of information
systems favor the view that the new technology is an enabler of process reengineering. IT has to be monitored constantly to determine whether it can
generate new process designs or contribute to the performance of a business
process. The breakthrough of BPR is closely connected with IT, which opens new
dimensions of process reorganization. Moreover, those who take the initiative in
process improvement/redesign, influence the role of IT. If the data processing
department initiates the process change, then IT will have more of a generator
function for new process redesigns. If on the other hand, the top management
sets off the change process, then the process will be first restructured and later
optimized through IT.

Q.2

What are various approaches of MIS development in the Organization?


Explain any two approaches in detail.
A.2

Contemporaryapproaches to MIS

When an information system is being developed, much importance


should be given to the structure of the organization, culture of the
organization, etc. But along with these, especial attention should
also be given to the technical side of MIS. The various
contemporary approaches to MIS development can be summarized
as
1.

The Technical Approach

(a) Based on the mathematical and the normative models.


(b) Physical technology forms the back bone of such an approach.

(c) Such an approach mainly finds much needed contributions from


the disciplines like computer science, management science,
operations research etc.
2.

The BehaviouralApproach

(a) Based on the impact of the behaviour and also on the response
of the people in the organization.
(b) Motivational Feasibility forms a very important and demanding
part of such an approach towards MIS development.
3. The Socio Technical Approach
(a) In the beginning, this approach was finding it hard to survive
but now it is being accepted worldwide and is also being
implemented at a very large scale.
(b) Involves key involvement of both of the above explained
approaches.
(c) Improves the performance of the information system as a
whole.
Porter Millar postulates
Porter and Millar were the ones, who explained the affect of the
information technology on the competition. According to them
information technology is affecting competition in the following
ways:
(a) Causes changes in the structure of the industry and as a result
of this, rule of competitions are altered.
(b) Spawning of the whole new business takes place, and in much
of the cases it is caused from within the companys existing
operations.
(c) Competitive advantage is created usually because of the new
ways; the companies get to outperform their rivals.

(a). Technical Approach


The technical approach emphasises scientific modelling of
businesses, technology and capabilities of systems. Management
science emphasises models of decision-making and management.
Combining this with an understanding of technical issues and

computer science, this provides the technical approach to modern


management.

Business modelling,

Computer science,

Operations research

(b). Behavioural Approach


The behavioural approach looks at the psychological, sociological
and economic aspects of the system. This approach deals with
issues of:
Design,
Implementation,
Business integration,
Management.
The sociological approach looks at these aspects from the point of
view of how groups work together and the nature of organisations.
The psychological approach looks at how people perceive and use
information systems, especially with respect to decision making.
The economic approach looks at how IT systems affect control
structures and costs both within a company and in markets.

Q.3.

What are the benefits & limitations of the relational database model for business
application today? Why is the object-orienteddatabase model gaining acceptance for
developing application and managing the hypermedia database at the business
website?
Relational Database Model is based on tables and for management purposes. This
model was invented by Edgar F. Codd in 1969.Edgar at that time was working at IBM.
In the relational model of a database, all data is represented in terms of tuples
&groupedintorelations. A database organized in terms of the relational model is a
relational database.

A.3.

S.N
o.
1
2
3
4
5

Name
ABC
XYZ
AAA
CCC
BBB

City
A
S
D
F
G

State
AA
DD
SS
FF
GG

Room
s
12
23
34
43
12

Front
Desk
Yes
Yes
Yes
Yes
Yes

Restaur
ant
Yes
Yes
Yes
Yes
No

Travel
Desk
Yes
Yes
Yes
Yes
Yes

Parkin
g
No
Yes
Yes
Yes
Yes

Room
Rate
1000
2000
1200
2300
3000

6 DDD
H
HH
7 FFF
J
JJ
From S.No. to Room rates are
attributes
From 1 to 7 is tuple

32 Yes
45 No

No
No

No
No

Yes
Yes

1000
700

Benefits of Relation base model


Relational Database Model is widely used around the world, as its:
(1)Easy to use:In Relational model data is easily presented & visible. So revision
becomes quite easy as the information is stored insimple tables & rows. Such data is
attractive for the first time user.
(2)Flexibility:An operator or a user can easily link & extract the data & can get the
desired information easily.
(3)Precision: The usage of relational algebra and calculus in the manipulation of the
relations between the tables ensures that here is noambiguity (doubtfulness
or uncertainty), which may otherwise come while establishing the links in a
complicatednetwork type database.
(4)Security:Security control & authorization can be implemented on various tables,
which gives a sense of control to the createdof the table. If someone requires the
protective data then he needs to have the permission from the creator.
(5)Data Independence: Data independence is achieved more easily with normalization
structure used in a relational database thanin the more complicated tree or network
structure.
(6)Data Manipulation Language: The possibility of responding to query by means of
a language based on relational algebra andrelational calculus e.g SQL is easy in the
relational database approach. For data organized in other structure the query
languageeither becomes complex or extremely limited in its capabilities.
Limitations of relational database model
(1)Performance:A major constraint in the use of relational database system is
machine performance. If there is an enormous datain the tables then the performance
gets affected in responding to the sql queries.
(2)Physical Storage Consumption: With an interactive system, for example an
operation like join would depend upon the physicalstorage also. It is, therefore
common in relational databases to tune the databases and in such a case the
physical data layoutwould be chosen so as to give good performance in the most
frequently run operations. It therefore would naturally result in thefact that the lays
frequently run operations would tend to become even more shared.
(3)Slow extraction of meaning from data: If the data is naturally organized in a
hierarchical manner and stored as such, thehierarchical approach may give quick
meaning for that data.Object-oriented database model gaining acceptance for
developing application and managing the hypermedia database at
thebusinesswebsite because its innovative. Multimedia-web based applications for
internet & corporate intranets/ extranets havebecome a major application area for
object technology. Object-oriented database model can handle complex data such
asgraphics, pictures, voice & text, better than the old structure. They are easy to use
& they are the key technology being used inmultimedia based applications for Internet
& corporate extranets. As well as they support inheritance-new objects which can be
automatically created by replacing some or all the characteristics of one or more
parent objectives.

Q.4.

What are the business benefit and management problems of client/server networks?
Discuss also in Network Computing and Peer-to-peer networks?

A.4.

Client Server there was one powerful computer (known as server) which acts as
a provider of information to other sub-ordinate workstations (called client). Now
Let us discuss the benefits and drawbacks of Server-Client computing over P2P
computing:-

Advantages of Client Server Networks over Peer to Peer Networks


(1) Centralization: Unlike P2P, where there is no central administration, here in this
architecture there is a centralized control. Servers help in administering the whole
set-up. Access rights and resource allocation is done by Servers.
(2) Proper Management : All the files are stored at the same place. In this way,
management of files becomes easy. Also it becomes easier to find files.
(3) Back-up and Recovery possible: As all the data is stored on server its easy to
make a back-up of it. Also, in case of some break-down if data is lost, it can be
recovered easily and efficiently. While in peer computing we have to take back-up at
every workstation.
(4) Upgradation and Scalability in Client-server set-up: Changes can be made easily
by just upgrading the server. Also new resources and systems can be added by
making necessary changes in server.
(5) Accessibility: From various platforms in the network, server can be accessed
remotely.
(6) As new information is uploaded in database, each workstation need not have its own
storage capacities increased (as may be the case in peer-to-peer systems). All the
changes are made only in central computer on which server database exists.
(7) Security: Rules defining security and access rights can be defined at the time of setup of server.
(8) Servers can play different roles for different clients.

Disadvantages of Client Server Architecture v/s P-2-P Technology


(1) Congestion in Network: Too many requests from the clients may lead to

congestion, which rarely takes place in P2P network. Overload can lead to breakingdown of servers. In peer-to-peer, the total bandwidth of the network increases as the
number of peers increase.
(2) Client-Server architecture is not as robust as a P2P and if the server fails, the whole
network goes down. Also, if you are downloading a file from server and it gets
abandoned due to some error, download stops altogether. However, if there would
have been peers, they would have provided the broken parts of file.
(3) Cost: It is very expensive to install and manage this type of computing.
(4) IT professional needs to maintain the servers and other technical details of network.

Q.5.

How can information systems support a companys business operations, discuss making
by their managers, and give them a competitive advantage? Give examples to illustrate
your answer?

A.5.

Information technology provides a platform for a company to connect the global world
with Internet. Internet has a wide range of customers, buyers, service providers, technical

staff, etc. with the help of Internet business can run on a single website like General
Electric Company Information system and technology provide various channels to
communication like E-mail, Instant messages, SMS servers, etc to all employees at any
time all over the world. This type of software helps to saving time and cost. Of the
company
Software are very important for a company for instant Information of stocks, assets
valuation, sales, purchases, and service.
Decision making is very easy to the management after IT because its provide latest
information to the management for employee, stocks, sales, purchase, and services, etc
The management can make a decision after check IT reports.

Q.6

What is meant by Network topology along with different network models?

A.6.

In computer networking, topology refers to the layout of connected devices. This article
introduces the standard topologies of networking.
Topology in Network Design
Think of a topology as a network's virtual shape or structure. This shape does not
necessarily correspond to the actual physical layout of the devices on the network. For
example, the computers on a home LAN may be arranged in a circle in a family room, but
it would be highly unlikely to find a ring topology there.
Network topologies are categorized into the following basic types:
bus
ring
star
tree
mesh
More complex networks can be built as hybrids of two or more of the above basic
topologies.
Bus Topology
Bus networks (not to be confused with the system bus of a computer) use a common
backbone to connect all devices. A single cable, the backbone functions as a shared
communication medium that devices attach or tap into with an interface connector. A
device wanting to communicate with another device on the network sends a broadcast
message onto the wire that all other devices see, but only the intended recipient actually
accepts and processes the message.
Ethernet bus topologies are relatively easy to install and don't require much cabling
compared to the alternatives. 10Base-2 ("ThinNet") and 10Base-5 ("ThickNet") both were
popular Ethernet cabling options many years ago for bus topologies. However, bus
networks work best with a limited number of devices. If more than a few dozen computers
are added to a network bus, performance problems will likely result. In addition, if the
backbone cable fails, the entire network effectively becomes unusable.

Ring Topology

In a ring network, every device has exactly two neighbors for communication purposes.
All messages travel through a ring in the same direction (either "clockwise" or
"counterclockwise"). A failure in any cable or device breaks the loop and can take down
the entire network.
To implement a ring network, one typically uses FDDI, SONET, or Token Ring technology.
Ring topologies are found in some office buildings or school campuses.

Star Topology
Many home networks use the star topology. A star network features a central connection
point called a "hub node" that may be a network hub, switch orrouter. Devices typically
connect to the hub with Unshielded Twisted Pair (UTP) Ethernet.
Compared to the bus topology, a star network generally requires more cable, but a failure
in any star network cable will only take down one computer's network access and not the
entire LAN. (If the hub fails, however, the entire network also fails.)

Tree Topology
Tree topologies integrate multiple star topologies together onto a bus. In its simplest form,
only hub devices connect directly to the tree bus, and each hub functions as the root of a
tree of devices. This bus/star hybrid approach supports future expandability of the
network much better than a bus (limited in the number of devices due to the broadcast
traffic it generates) or a star (limited by the number of hub connection points) alone.

Mesh Topology
Mesh topologies involve the concept of routes. Unlike each of the previous topologies,
messages sent on a mesh network can take any of several possible paths from source to
destination. (Recall that even in a ring, although two cable paths exist, messages can
only travel in one direction.) Some WANs, most notably the Internet, employ mesh
routing.
A mesh network in which every device connects to every other is called a full mesh. As
shown in the illustration below, partial mesh networks also exist in which some devices
connect only indirectly to others.

Q.7.

Why there is a trend toward cross-functional integrated enterprise systems in business?

A.7.

Cross-functional information systems are integrated combinations of business


information systems that share information resources across the functional units of an
organization. Integrated systems allow the same data to be used for multiple
applications; information output from one function can easily become data input to
another function. Only one integrated database needs to be maintained. Many
organizations are using information technology to develop integrated cross-functional
enterprise systems that cross the boundaries of traditional business functions in order to
reengineer and improve vital business processes all across the enterprise. These

organizations view cross-functional enterprise systems as a strategic way to use IT to


share information resources and improve the efficiency and effectiveness of business
processes, thus helping an e-business attain its strategic objectives.

Q.8
How do you think sales force automation affects salesperson productivity, marketing
management and competitive advantage?
A.8

If you automate non-compelling marketing campaigns in an ineffective attempt to


motivate incompetent sales people you are simply accelerating the pace at which the
marketplace discovers the weaknesses in your offerings, capabilities and/or service and
support.
Most salesforce automation (SFA) implementations I have endured became little more
than spreadsheet-producing beating sticks that worried and inept sales managers use to
beat more inflated pipeline guesses out of their scared, under-quota sales people that
become more creative during a sales meeting than Darren Stephens explaining to his
boss on "Bewitched" why there is a monkey wearing a tutu while riding a donkey in his
living room.
Now the good news: "Perfect practice makes perfect." John Wooden used to stress this
during his championship run at UCLA. If you create and automate tested, effective
campaigns with proven "next steps" that are triggered by key events, i.e. a prospect
downloads a free report or white paper or signs up for a webinar or seminar, your sales
staff will become exponentially more productive and profitable for your organization.
And in sales it's all about compressing sales cycles. If you can do more, faster and better
with fewer people you will bury your competition and dominate your segment and/or
region in no time flat.

ASSIGNMENT-B
Mr. Joshua , Director of the ZION Bank has Customers all over world. A customer may have
one or more accounts in the Bank wide spread across one or more branches. Customers open
bank accounts with a specified opening balance and thereafter may either deposit funds into
the account or withdraws accounts from them. The transactions involve the opening of
accounts, assignments of Account Numbers, Deposit and Withdrawal transactions etc. One of
the most frequent requests for specific transactions carried out in the Bank. Customers would
often want to transfer funds from one account of theirs to another. The account Numbering
scheme now uniquely identifies the Bank Branch to which the account belongs. Customers
often travel to the bank branch to request for a new cheque book. To ensure that Customers
are ensured of high level security, the E-Banking services need to provide Customers with a
unique Personal Identification password which can be changed from time to time. All Services
are
accessible only on correct password verification. The Customer may also look for information
on Interest rates on Fixed Term Deposits which often change from time to time.
Q.1

How Mr. Joshua is going to maintain information on Bank branches and security password
information on customers.

A.1

Mr. Joshua is going to maintain information on bank branches and security


passwords through proper information systems and network models. The
installation of proper information systems will help collect, process, store, and
disseminate data in the form of information needed to carry out the functions
of the bank and management. This system will put in place a database to
collect, maintain, and store all information on the different bank branches and
information on its clients and customers. This database will ensure that data
on the various accounts the different bank branches are holding, information
on the numerous clients of the bank, and the various services that the bank
offers to its clients are readily available for use of permitted users.
Furthermore, the installation of a proper information system ensures that
information is properly secured and used only by those with access to the
system.
In addition, putting in place the appropriate network model would help
in the circulation of information among the various users within the network.
Such a network system would make information readily available for users and
could process requests of the various clients quickly, saving time and cost.
The appropriate network model would centrally manage clients accounts, as
they may have one or more accounts in the Bank spread across one or more
branches. As customers open bank accounts with a specified opening
balance and either deposit funds into the account or withdraw from them,
personal information is then uploaded to the database. After doing so,
transactions that involve the opening of accounts, assignments of Account
Numbers, and Deposit and Withdrawal would then be stored and reflected in
the central database. The account Numbering scheme now uniquely identifies
the Bank Branch to which the account belongs. Customers often travel to the
bank branch to request for a new cheque book. To ensure that Customers are
ensured of high level security, the E- Banking services need to provide
Customers with a unique Personal Identification password which can be
changed from time to time. All Services are accessible only upon correct
password verification.

Q.2

Draw MIS design for the above case study covering every aspect of e-Bank.

A.2

Online
Banking

Login

Services

Create/Manage/V
iew Accounts

Transfer Funds

Pay Bills

Order
Statements
Search
Transactions

ASSIGNMENT-C
Which of them does not support decision making?

1.
Options

DSS,
GDSS,
ESS
All of above

2.

TPS stands for

Options
Transaction price system secret socket layer
Transaction processing system

Contact

About

FAQ

Transfer peer system


Transfer protocol system

3.

This type of network is contained over a large geographic area.

Options
Local area network
Wide area network
Start topology
None of the above

4.

A web browser is best described as a

Options
General purpose application program
Application specific program
System management programs
System development programs

5.

Which one of the following functional business systems supports the finance business
function?

Options
Cash Management
Financial forecasting
Both a & b
Neither a or b

6.

Options

The utility called


located in the System Tools folder, allows you to select when and
how often maintenance tasks are performed.

Disk Cleanup
Scheduled Tasks
Disk Defragmenter
System Restore

7.

Which type of network connects each node to the next, forming a loop.

Options
Star topology
Bus Topology
Ring Topology
All of the above

8.

Which is the most common network topology where each node is connected to a switch.

Options
Star topology
Ring topology
Bus topology
Local area network

9.

The computer monitor's sharpness or clarity is referred to as its ___________

Options
Image
Resolution
Contrast
Setting
10. The

manages the hardware components including the CPU, memory storage, and
peripheral devices.

Options

Operating System
Device Drivers
Motherboard
Ports

11. ESS is helpful for-Options


Top Management
Middle management
Operational management
None of above

12. Which of the following is not a way DSS, GDSS, and ESS support decision

making?
Options
Automate certain decision procedures
Provide information about different aspects of the decision situation and the decision
process
Stimulate decision making by helping managers question decision procedures or explore
different solution designs
Generate monthly, hardcopy reports

13. Which of the following is primarily a stand-alone DSS that uses

some type of model to perform "what-if" and other kinds of


analyses?
Options
Model-driven.
Data-driven.
Data mart.
Data warehouse.
14. The technology for finding hidden patterns and relationships in large databases and inferring rules from them
to predict future behavior best describes:

Options
Data warehousing.
Knowledge acquisition.
Data mining.
Data clustering.

15. Which of the following is NOT a type of information yielded from data mining?
Options
Sequences
Classification
Clustering
Intelligence

16. Each of the following is a DSS component EXCEPT:


Options
Database.
Software system.
User interface.
Inference engine.

17.

Models that ask "what-if" questions repeatedly to determine the


impact of changes in one or more factors on outcomes best
describes:

Options
Optimization analysis.
Sensitivity analysis.
Forecasting.
Goal-seeking.
18. According to the textbook, National Gypsum uses its DSS application for:

Options
Identifying customer buying patterns and fraud detection.
Price, advertising, and promotion selection.
Defense contract analysis.
Corporate planning and forecasting.

19. A system with software that can analyze and display data using digitized maps to enhance

planning and decision making best describes:


Options
Geographic information system.
Executive support system.
Demographic analysis system.
Location analysis system.

20. An interactive computer-based system to facilitate the solution to unstructured problems

by a set of decision makers working together as a group best describes a(n):


Options
Group decision-support system.
Decision-support system.
Executive support system.
Geographic information system.

21. GDSS software tools that allow individuals to simultaneously and anonymously

contribute ideas on the meeting topics are called:


Options
Electronic questionnaires.
Tools for voting or setting priorities.
Electronic brainstorming tools.
Idea organizers.

22. A GDSS can enhance group decision making by:

Options
Improving preplanning.
Increasing participation.
Providing documentation of meetings.
Doing all of the above.

23. Each of the following is a basic GDSS element EXCEPT:


Options
Hardware.
Software tools.
A data warehouse.
A user interface.

24. Contingencies affecting the outcome of group meetings include:


Options
The design of an electronic meeting system and its technology.
The nature of the group.
The manner in which the problem is presented to the group.
All of the above.

25. A useful tool used during the electronic meeting activity of idea

generation is:
Options
Group matrix.
Policy formation.
Topic commenter.
Personal productivity.

26. An information system at the strategic level of an

organization designed to address unstructured decision


making through advanced graphics and communications

best described as:


Options
Decision-support system.
Executive support system.
Management information system.
Group decision support system.

27. SSL is a-Options


Protocol
A technology
A kind of digital signature
A virus

28.

Assembling a product, identifying customers and hiring employees are--

Options
Transaction
Phases
Business processes
Business functions

29. The computer can potentially be used to monitor most of our

actions, thus robbing us of------Options


Tapping
Backlog
Privacy
Security

30. A

is a programmable electronic device that

can input, process, output, and store data.


Options
Computer
Motherboard
CPU
Operating System

31. The nonvolatile, permanent memory that remains

in the computer even when it is turned off is


called:
Options
ALU
CPU
RAM
ROM

32. The computer and equipment that connects

to it are called the:


Options
Motherboard
Software
Control Unit
Hardware

33. Which of the following do

transactional e-commerce
businesses provide?
Options
Sale of goods and services.
Sale of goods only.
Online sale of goods.

Online sale of transactions.

34. Which of the following best

describes a Business-toBusiness?
Options
Sale of goods online to a consumer.
Sale of goods online to many consumers.
Sale of goods to a business from a Brick
and Mortar business.
Sale of goods to a business online only.

35. What determines how a system will work to meet the business needs defined during

system investigation?
Options
System Implementation
System development
System Review
None

36. Who is involved in helping users determine what outputs tey need and

constructing the plans needed to produce these outputs?


Options
CIO
Application programmer
System Programmer
System Analyst

37. What consists of all activities that, if delayed would delay the

entire project?
Options
Deadline activities

Slack activities
RAD tasks
The critical path

38. The concept in which organizations adapt to new

conditions or alter their practices over time is called


Options
Organizational Learning
Organizational change
Continuous improvement
Re-engineering
39.

What is the measure of the output achieved divided by input required

Options
Efficiency
Effectiveness
Productivity
Return on Investment

40. What components of a decision support system allow decisions makers to easily

access and manipulate the DSS and to use common business terms and phrases?
Options
The knowledge base
The model base
The user interface or dialogue
The expert system

Вам также может понравиться