Professional Documents
Culture Documents
Past Years Questions of Module 2 Q.1: Define Expert System and Describe The Types of Problems To Which They Are Applicable
Past Years Questions of Module 2 Q.1: Define Expert System and Describe The Types of Problems To Which They Are Applicable
Q.1 : Define Expert System and describe the types of Problems to which
they are applicable.
Ans. Definition
- Expert System Application Categories
Decision Management
Loan portfolio analysis
Employee performance evaluation
Diagnostic/Troubleshooting
Equipment calibration
Medical diagnosis
Software debugging
Design/Configuration
Manufacturability studies
Communications networks
Selection/Classification
Material selection
Information classification
Suspect identification
Process Monitoring/Control
Machine control (including robotics)
Inventory control
Production monitoring
Benefits of Expert Systems
Faster and more consistent than an expert
Can contain knowledge of multiple experts
Does not get tired or distracted
Cannot be overworked or stressed
Helps
preserve
and
reproduce
of human experts
the
knowledge
Q.3 : Explain TPS with suitable example. Illustrate how MIS obtains their
data from various organizations TPS.
Ans : - Definition
Transactions include sales, purchases, deposits, withdrawals, refunds,
and payments
Online transaction processing (OLTP) is a real-time system that
captures transactions immediately
These systems include the accurate recording of transactions as well as the
control procedures used in issuing such documents as
pay checks,
invoices,
customer statements,
payment reminders,
tuition bills,
student schedules unlike other components of management information
system, the transaction processing system of an organization extending out
of the organization linking together the entire financial system, factory,
customers, and suppliers.
Q.4 : How do Executive support system help Senior Managers make better
decisions?
Ans: - Definition
- never structured
- The Role of ESS in the Organization
ESS are able to link data from various sources both internal and external to
provide the amount and kind of information executives find useful.
Executive Support Systems don't provide executives with ready- made
decisions. They provide the information that helps them make their decisions.
ESS rely on graphic presentation of information because it's a much quicker
way for busy executives to grasp summarized information Support senior
management
Address non-routine decisions requiring judgment, evaluation, and insight
Show summarized information from internal MIS and DSS
E.g. ESS that provides minute-to-minute view of firms financial performance
as measured by inventory etc
Q.5: What is Management Information System? Explain importance of MIS
to business manager.
Ans: - Definition
- Importance to Business managers
- It facilitates planning
- Minimizes information overload
- encourages decentralization
- Brings coordination
- Makes control easier
- Data accuracy
- Consistency of data
- Information completeness
- Relevance
Q.6: Describe the characteristics of Transaction Processing System (TPS)
and role they play in a business.
Ans: - Definition
Roles played by TPS in the organization
9
Q. 9 Differentiate between Model Driven DSS & Data Driven DSS. Giving
suitable examples explain the concept of data mining & OLAP.
Ans:Data-driven
DSS
Most data-driven DSSs are targeted at managers, staff and also product/service
suppliers. It is used to query a database or data warehouse to seek specific answers
for specific purposes. It is deployed via a main frame system, client/server link, or
via the web. Examples: computer-based databases that have a query system to
check (including the incorporation of data to add value to existing databases.
Model-driven
DSS
Model-driven DSSs are complex systems that help analyse decisions or choose
between different options. These are used by managers and staff members of a
business, or people who interact with the organization, for a number of purposes
depending on how the model is set up - scheduling, decision analyses etc. These
DSSs can be deployed via software/hardware in stand-alone PCs, client/server
systems, or the web.
OLAP
Online Analytical Processing (OLAP) is a capability of management, decision
support, and executive information systems that enables managers and
analysts to interactively examine and manipulate large amounts of detailed
and consolidated data from many perspectives. Basic analytical operations
include:
Consolidation: This involves the aggregation of data. It can be simple roll-ups
or complex groupings involving interrelated data. For example, sales offices
can be rolled up to districts and districts rolled up to regions.
Drill-Down: OLAP can go in the reverse direction and automatically display
detailed data that comprises consolidated data. For example, the sales by
individual products or sales reps that make up a region's sales can be
accessed easily.
Slicing: This refers to the ability to look at the database from different
For example, one slice of a database might show all sales of a product within
regions. Another slice might show all sales by sales channel. By allowing
rapid alternative perspectives, slicing allows managers to isolate the
information of interest for decision making
Data Mining:
Generally, data mining (sometimes called data or knowledge discovery) is the
process of analyzing data from different perspectives and summarizing it into
useful information - information that can be used to increase revenue, cuts
costs, or both. Data mining software is one of a number of analytical tools for
analyzing data.
Data mining involves six common classes of tasks:
Clustering is the task of discovering groups and structures in the data that
are in some way or another "similar", without using known structures in the
data.
Regression Attempts to find a function which models the data with the least
error.
Ans: For the Data mining use the points given in the answer number 9 and show
its usage in the organization.
Data warehousing:
Integrate data from multiple source systems, enabling a central view across
the enterprise. This benefit is always valuable, but particularly so when the
organization has grown by merger.
Provide a single common data model for all data of interest regardless of the
data's source.
Restructure the data so that it delivers excellent query performance, even for
complex analytic queries, without impacting the operational systems.
Cost
Speed of implementation
Risk of failure
Q.2 Identify the seven types of hackers and explain what motivates each
group.
Ans: Classifications
White hat
A white hat hacker breaks security for non-malicious reasons, perhaps to test their
own security system or while working for a security company which makes security
software. The term "white hat" in Internet slang refers to an ethical hacker. This
classification also includes individuals who perform penetration tests and
vulnerability assessments within a contractual agreement. The EC-Council, [7] also
known as the International Council of Electronic Commerce Consultants, is one of
those organisations that have developed certifications, courseware, classes, and
online training covering the diverse arena of Ethical Hacking. [6]
Black hat
A "black hat" hacker is a hacker who "violates computer security for little reason
beyond maliciousness or for personal gain" (Moore, 2005). [8] Black hat hackers form
the stereotypical, illegal hacking groups often portrayed in popular culture, and are
"the epitome of all that the public fears in a computer criminal". [9] Black hat hackers
break into secure networks to destroy data or make the network unusable for those
who are authorized to use the network. They choose their targets using a twopronged process known as the "pre-hacking stage".
Part 1: Targeting
The hacker determines what network to break into during this phase. The
target may be of particular interest to the hacker, either politically or
personally, or it may be picked at random. Next, they will port scan a network
to determine if it is vulnerable to attacks, which is just testing all ports on a
host machine for a response. Open portsthose that do respondwill allow a
hacker to access the system.
Part 2: Research and Information Gathering
It is in this stage that the hacker will visit or contact the target in some way in
hopes of finding out vital information that will help them access the system.
The main way that hackers get desired results from this stage is from "social
engineering", which will be explained below. Aside from social engineering,
hackers can also use a technique called "dumpster diving". Dumpster diving
is when a hacker will literally search through users' garbage in hopes of
finding documents that have been thrown away, which may contain
information a hacker can use directly or indirectly, to help them gain access
to a network.
Part 3: Finishing The Attack
This is the stage when the hacker will invade the primary target that he/she
was planning to attack or steal from. Many "hackers" will be caught after this
point, lured in or grabbed by any data also known as a honeypot (a trap set
up by computer security personnel).
Grey hat
Main article: Grey hat
A grey hat hacker is a combination of a Black Hat and a White Hat Hacker. A Grey
Hat Hacker may surf the internet and hack into a computer system for the sole
purpose of notifying the administrator that their system has been hacked, for
example. Then they may offer to repair their system for a small fee. [9]
Elite hacker
A social status among hackers, elite is used to describe the most skilled. Newly
discovered exploits will circulate among these hackers. Elite groups such as Masters
of Deception conferred a kind of credibility on their members. [10]
Script kiddie
A script kiddie (or skiddie) is a non-expert who breaks into computer systems by
using pre-packaged automated tools written by others, usually with little
understanding of the underlying concepthence the term script (i.e. a prearranged
plan or set of activities) kiddie (i.e. kid, childan individual lacking knowledge and
experience, immature).[11]
Neophyte
A neophyte, "n00b", or "newbie" is someone who is new to hacking or phreaking
and has almost no knowledge or experience of the workings of technology, and
hacking.[9]
Blue hat
A blue hat hacker is someone outside computer security consulting firms who is
used to bug test a system prior to its launch, looking for exploits so they can be
closed. Microsoft also uses the term BlueHat to represent a series of security
briefing events.[12][13][14]
Hacktivist
A hacktivist is a hacker who utilizes technology to announce a social, ideological,
religious, or political message. In general, most hacktivism involves website
defacement or denial-of-service attacks.
Nation state
Intelligence agencies and cyberwarfare operatives of nation states. [15]
Organized criminal gangs
Criminal activity carried on for profit.[15]
Bots
Bots are automated software tools, some freeware, that are available for the use of
any type of hacker.[15]
Computer Crime
Computer crime includes
Unauthorized use, access, modification, or destruction of hardware,
software, data, or network resources
The unauthorized release of information
The unauthorized copying of software
Denying an end user access to his/her own hardware, software, data,
or network resources
Using or conspiring to use computer or network resources illegally to
obtain information or tangible property
Many computer crimes involve the theft of money
The majority are inside jobs that involve unauthorized network entry and
alternation
of
of the
computer
databases
to
cover
employees involved
Copyright infringement
Transmission of confidential data
Pornography
Hacking
Use of external ISPs
Moonlighting
Software Piracy
Entry into the private life of any person
the
tracks
Q.7 Security isnt simply a technology issue, its a business issue. Discuss.
Ans. ( First we have to prove that security is a technology issue than we will have to
prove that security is a business issue as well.)
* Technical Issue
- Security management is a technical issue and handled by technical persons.
- Computer crime, hacking, denial service, privacy issues, spoofing, sniffer, war
dialing, password cracking are some of the issues which are related to the cyber
security of a person and they all are technical issues.
- Ex. Denial of service is related to the system speed
Password cracking is related to password hacking and is again a technical
concern.
Spoofing is creating a similar web page is done with the computer
programmes and codes only.
*Business Issue
- Problems related to security affect many things including company goodwill
among customers, supplier, market reputation, profitability of an organization.
Up
to
11
million
be permanently infected
Average
damage
$277 and $366
computers
per
computer
are
believed
is
to
between
relation with the company will also be tarnished. So with the passage
of time the company will have to suffer in each and every context of a
business. The security management is also very expensive. Right from
taking email monitoring to maintaining internal and external firewalls,
backup servers, password protection all the mechanisms require
money which is again a business concern for any company.
HR Perspective : The company facing the security issues has to train
the employees how to survive from the problems and how to tackle the
problem at their level. So again this is a part of HR which is business
context of the security issue.
Q.9 List and explain the most common threats against contemporary
information systems.
Ans. : Information systems security remains high on the list of key issues facing
information systems executives. Traditional concerns range from forced entry into
computer and storage rooms to destruction of data. Recent attention focuses on
protecting information systems and data from accidental or intentional unauthorized
access, disclosure, modification, or destruction. The consequences of these events
can range from degraded or disrupted service to customers to corporate failure.
Hacking is
The unauthorized access and use of networked computer systems
Electronic Breaking and Entering
Hacking into a computer system and reading files, but neither stealing
nor damaging anything
Cracker
A malicious or criminal hacker who maintains knowledge of the
vulnerabilities
found
for
private advantage
Denial of Service
Hammering
a
websites
equipment
with
too
many requests for information
Clogging
the
system,
slowing
performance,
or crashing the site
Scans
Widespread probes of the Internet to determine types of computers,
services, and connections
Looking for weaknesses
Sniffer
Programs
that
search
individual
packets
of
data as they pass through the Internet
Capturing passwords or entire contents
Spoofing
Faking an e-mail address or Web page to trick users into passing along
critical
information
like passwords or credit card numbers
Trojan House
A program that, unknown to the user, contains instructions that exploit
a
known
vulnerability
in some software
Back Doors
A hidden point of entry to be used in case the original entry point is
detected or blocked
Malicious Applets
Tiny Java programs that misuse your computers resources, modify files
on the hard disk, send fake email, or steal passwords
War Dialing
Programs that automatically dial thousands of telephone numbers in
search of a way in through a modem connection.
Password Crackers
Software that can guess passwords
Many computer crimes involve the theft of money
The majority are inside jobs that involve unauthorized network entry and
alternation
of
computer
databases
to
cover
the
tracks
of the employees involved
Many attacks occur through the Internet
Most
companies
dont
reveal
that
they
have
been targets or victims of cybercrime
Unauthorized use of computer systems and networks is time and resource
theft
Doing private consulting
- An IDS has the ability to dynamically change its rules and configurations in
response to changing environmental activity.
- Intrusion detection systems constantly monitor a given computer network for
invasion or abnormal activity. The advantage of this service is the "round-the-clock"
aspect, in that the system is protected even while the user is asleep or otherwise
away from any computer hooked up to the network. User information, access to the
network, and firewall measures are all actively updated and looked after by
intrusion detection systems.
- Intrusion detection systems are highly customizable to accommodate specific
client needs. This allows users to custom-build network security to monitor highlyindividualized activity; from overt attacks to the network to examining suspicious or
specific patterns of activity which may be a masquerade attempt to penetrate
system security from outside the network, or perhaps the work of someone inside
the security network. The system is able, through customization, to monitor both
the outside threats to a given network, and patterns of behavior which may be
threats
operating
within
the
system.
- Intrusion Detection Systems are placed at a strategic point or points within the
network to monitor traffic to and from all devices on the network.
Antivirus Software:
Protection from Viruses
Hackers and viruses go hand in hand. A good anti-virus program will protect
you while you surf the Internet, preventing hackers from gaining access to personal
things such as credit card information and bank account access. The firewall feature
included with most anti-virus software will block any unauthorized incoming
connections to your network or computer, preventing hackers from digging their
hooks into your life and your computer.
Cost Savings
Though some anti-virus programs are quite pricey, there are some very good
options for those wanting something relatively cheap or even free. Many free antivirus programs are available that will protect your system just as well as a
subscription-based anti-virus program. Even if you choose to go with a program you
have to pay for, the cost of the program and subscription to their service will almost
certainly extend the life of your computer, meaning you'll have to purchase new
computers less frequently than those who choose not to use anti-virus software.
Convenience
Though you may find it inconvenient to have to run virus scans and worry
about the security of your computer, you'd have more to worry about without
proper anti-virus protection. A computer left open for viruses and hackers will often
start to show premature signs of wear and a significant slow down will be
noticeable, making normal computing tasks take much longer and causing much
more hassle. Let's assume your system does get infected with a virus. Without
protection you'd be at the mercy of the virus and you'd have to waste time trying to
find it, delete it and restore any damage it has caused and it will still probably be
there, even after deletion. Yet with proper real-time anti-virus software working you
will simply get a notification that a virus has been detected and be asked if you
would like to delete it. These notifications usually come as soon as the virus is
detected, leaving it without enough time to do its damage.
Pornography
Hacking
Non-work-related download/upload
Leisure use of the Internet
Use of external ISPs
Moonlighting
Software Piracy
Theft of Intellectual Property
Privacy Issues
The issues those are discussed above were not there before the extensive usage of
information system.
Q.12 Why are computer systems more vulnerable than manual system to
destruction, error & misuse? Distinguish between fault tolerant system &
high availability computing.
Ans : Computer systems are more vulnerable than manual systems to the
destruction, error and misuse because
- They are automatic systems
- If one has find the method to destroy the system than by using the
same method all the other systems can also be destroyed. That is not
the case with manual system.
- Computer systems are networked hence it becomes easier to misuse
them.
- All the security systems have loop holes which can be used to harm
the computer.
Difference:
- A fault tolerant environment has no service interruption but a significantly higher
cost, while a highly available environment has a minimal service interruption
- Fault tolerance relies on specialized hardware to detect a hardware fault. More
importantly, the fault tolerant model does not address software failures, by far the
most common reason for downtime. High availability systems detect downtimes.
-Fault tolerance differs from high availability by providing additional resources that
allow an application to continue functioning after a component failure without
interruption.
-For the fault tolerant system : The most commonly used models are HARP, SAVE,
and SHARPE in the USA, and SURF or LASS in Europe.
For the high availability system : IBM Global Services models are used.
Q.3 Explain the different types of physical media used in Telecom and
Networks and compare them in terms of speed and cost.
Ans.
Twisted Pair wire
Ordinary telephone wire
Copper wire is twisted
into pairs
Co axial cable
Sturdy copper or
aluminum wire wrapped
with spacers to insulate
and protect it
Fiber-Optic Cable
One or more hair-thin
filaments of glass
fiber wrapped in a
protective jacket
Q.4 Identify and discuss the major types of information systems that serve
the main management groups within a business. What are the
relationships among these systems?
Ans. Already discussed above.
Q.5 you are advising the owner of Sarthak Computer, a new, local
computer repair store that also builds custom computers to order. What
competitive strategies could Sarthak Computer exert? Which ones will it
have difficulty exercising?
Ans.
Cost Leadership
Differentiation Strategy
Innovation Strategy
Growth Strategy
Alliance Strategy
Q.6 Differentiate between application software and system software. Why
cant an end user just load an application program into a computer and
start computing without using an operating system?
Ans.
Actually, a system software is any computer software which manages and controls
computer hardware so that application software can perform a task. Operating
systems, such as Microsoft Windows, Mac OS X or Linux, are prominent examples of
system software. System software contrasts with application software, which are
programs that enable the end-user to perform specific, productive tasks, such as
word processing or image manipulation.
System software performs tasks like transferring data from memory to disk, or
rendering text onto a display device. Specific kinds of system software include
loading programs, operating systems, device drivers, programming tools, compilers,
assemblers, linkers, and utility software.
Software libraries that perform generic functions also tend to be regarded as system
software, although the dividing line is fuzzy; while a C runtime library is generally
agreed to be part of the system, an OpenGL or database library is less obviously so.
If system software is stored on non-volatile memory such as integrated circuits, it is
usually termed firmware while an application software is a subclass of computer
software that employs the capabilities of a computer directly and thoroughly to a
task that the user wishes to perform. This should be contrasted with system
software which is involved in integrating a computer's various capabilities, but
typically does not directly apply them in the performance of tasks that benefit the
user. In this context the term application refers to both the application software and
its implementation.
A simple, if imperfect analogy in the world of hardware would be the relationship of
an electric light bulb (an application) to an electric power generation plant (a
system). The power plant merely generates electricity, not itself of any real use until
harnessed to an application like the electric light that performs a service that
benefits the user.
Typical examples of software applications are word processors, spreadsheets, and
media players.
Multiple applications bundled together as a package are sometimes referred to as
an application suite. Microsoft Office and OpenOffice.org, which bundle together a
word processor, a spreadsheet, and several other discrete applications, are typical
examples. The separate applications in a suite usually have a user interface that
has some commonality making it easier for the user to learn and use each
application. And often they may have some capability to interact with each other in
ways beneficial to the user. For example, a spreadsheet might be able to be
embedded in a word processor document even though it had been created in the
separate spreadsheet application.
User-written software tailors systems to meet the user's specific needs. User-written
software include spreadsheet templates, word processor macros, scientific
simulations, graphics and animation scripts. Even email filters are a kind of user
software. Users create this software themselves and often overlook how important it
is.
In some types of embedded systems, the application software and the
operatingsystem software may be indistinguishable to the user, as in the case of
software used to control a VCR, DVD player or Microwave Oven.
Q.7 How do the Internet and Internet technology work and how do they
support communication and e-business?
Ans. Electronic business, or e-business, may be defined as the application of
information and communication technologies in support of all the activities of
business. Commerce constitutes the exchange of products and services between
businesses, groups and individuals and can be seen as one of the essential activities
of any business. Electronic commerce focuses on the use of ICT to enable the
external activities and relationships of the business with individuals, groups and
other businesses.
Potential concerns
Security
Privacy and confidentiality
Authenticity
Data integrity
Access control
Availability
Common security measures
Physical security
All these concerns are taken care of by the internet facility hence E-Business can be
supported by the internet facility.
Communication on the internet happens with many ways
- Email
- Voice mail
- Video conferencing
- Social networking sites
- E commerce sites
- Networks
- WWW
Hence internet supports communication also.
Q.8 Identify and describe three major enterprise applications.
Ans. - Enterprise Resource planning
- Supply chain management
- Customer relationship management
Q.9 Describe how any organization could practice knowledge
management?
Ans.
E banking
SMS alert with credit and debit of amount
ATM machines availability
Easy and fast cash transfer facility
Mobile banking
Quick Check clearance of premium customers (Part of CRM)
Saving of time (Customers do not have to stand in queue in order to
get the service.)
Staff management by ERP
Q.11 What are Knowledge Work Systems? What role do they play in
Knowledge Management? What are the generic requirements of
knowledge work systems?
Ans. Building a Knowledge-Creating Company
A knowledge-creating company or learning organization
Consistently creates new business knowledge
Disseminates it throughout the company
Topology
The structure of a network
Star Network
Ties end user computers to a central computer
Ring Network
Ties local computer processors together in a ring on a relatively equal
basis
Bus Network
Local processors share the same communications channel
Mesh Network
Uses direct communications lines to connect some or all of the
computers in the ring to
each other
Switch
A message-switching computer that handles
data communication between autonomous
local computers
Mesh Network
Switch Network
A company can use online seller bidding so the buyer sets the price.
This way a company can achieve COST LEADERSHIP.
A company can use online customer design or can opt for Customer
relationship management in order to DIFFERNTIATE the product/service
from the competitor.
A company can go for Business process reengineering or ERP for
INNOVATION in the company.
Wal-Marts merchandise ordering via global satellite tracking. This is an
example of a company which goes for the GROWTH STRATEGY.
Wal-Mart uses automatic inventory replenishment by supplier. This is
an example of a company which goes for the ALLIANCE STRATEGY.
People Resources
Specialists
End users
Hardware Resources
Machines
Media
Software Resources
Programs
Procedures
Data Resources
Product descriptions, customer records, employee files, inventory
databases
Network Resources
Communications media, communications processors, network access
and control software
Clients
End user personal computers or networked computers
Servers
Used to manage the networks
Processing
Shared between the clients and servers
Sometimes called a two-tier architecture
Larger computer systems are being replaced
with multiple client/server networks
b. Peer-to-peer computing
Central Server Architecture
P2P file-sharing software connects all PCs
to a central server
When a PC requests a file, the server searches
all active peers on the network
The server sends the requesting PC a list of
links to all active peers who have the file
Clicking a link connects the two PCs and automatically transfers the file
to the
requesting PC
Advantages
Can better protect the integrity and security
of the content and users of the network
Disadvantages
c. Network computing
Virtual Private Networks (VPN)
Used to establish secure intranets and extranets
The Internet is the main backbone network
Relies on network firewalls, encryption, and
other security features to build a pipe through the Internet
Creates a private network without the high
cost of a separate proprietary connection
Telecommunications Network Model
Bluetooth
Applications
Q.6 Define Wi-Fi, Bluetooth and describe the capability of each and which
types of applications each is best suited.
Ans. Answer already discussed above.
Q.7 Draw and Explain the Network Topologies and compare each of them.
Ans. Answer already discussed above.
Q.8 Define LAN, WAN & MAN. Describe the components and the functions
of each component of LAN.
Ans.
Wide Area Network (WAN)
Telecommunication network that covers a large geographic area
Components of LAN
Wiring
Network cables connect all of the devices on your network to a central point,
typically a switch or a hub. Most networks use Unshielded Twisted Pair wiring . Fiber
optic cable is used in cases where very high bandwidth is needed and where there
is a lot of electromagnetic interference. Fiber optic cable is much more expensive
than UTP wiring.
Network Interface Cards
Each networked device contains a Network Interface Card. The NIC may be a
separate board installed into a computers slot, or it may be built into the
motherboard. Either way, the NIC is the bridge between the computer and the
network. It decides whether to process a data packet or not, either passing it on to
the computers processor or discarding it based on the destination address in the
packet.
Hubs
A hub is the central wiring connector on a LAN, where all of the network cables
come together. Each cable plugs into a port on the hub. The hub accepts incoming
data packets from devices on the network and transmits them to all other
computers attached to the hub. Each device NIC receives each packet and makes its
process or discard decision.
Switches
A switch is like a hub in that it is a central point for connecting network cables;
however, a switch is able to receive a packet and transmit it to only the destination
computer. It does this by building a table of which computer is on which of its ports.
This reduces network traffic significantly, especially on a network of more than 10
computers. It is not unusual to find both hubs and switches on the same LAN.
Routers
Network routers are essentially very smart switches because they know about other
LANs, while switches only know about the network they are on. Routers connect
LANs together, sometimes across long distances, creating Wide Area Networks, or
WANs. Routers are also used to provide security on LANs by routing network traffic
between LAN segments.
Network Software
All of the network components except the cabling have software that makes them
work. Network software is written to a set of standards that define the TCP/IP
protocol suite. The standard defines layers of software and how they talk with each
other. Using the same set of rules allows networking equipment from different
vendors to work together, allowing you to take advantage of the best equipment in
each category.
Q.10 what is network topology? Name and explain principal network topologies.
Ans. Answer already discussed earlier.
TRICKY QUESTIONS
Q. 1 You have been hired by Sarvoday Visiting Nurse Services, whose
business processes are all manual, paper-based processes. How might a
CRM system benefit them?
Ans.
1. It projects an extremely customer centric face of the company to the
customer. Hence CRM will help Sarvoday Visiting Nurse Services
portray its positive image among the patients (customers).
2. Identification and targeting the best customers becomes easy.
3. Real-time customization and personalization of the nursing services.
Ex. Diabetes patient will be given QUICKLY the nurse who specializes in
handling diabetic patients. This thing takes much more effort in the
manual system.
4. Track when and how a customer (patient) contacts the company. GPS
system attached with CRM would give the exact location of a patient
hence it would be easier for the company employees to reach to the
patients.
5. Sarvoday Visiting Nurse Services can save all the data related to a
particular patient like when the patient called for the first time, patient
is suffering from which disease, patient is taking which drug and for
how much time etc
6. Grievance handling would be very easy now compared to the manual
process.
7. Sarvoday Visiting Nurse Services will save lot of operation time.
Q.2 "Knowledge increases exponentially," is a phrase with which we are all familiar.
How does this concept apply to electronic business and the emergence of the digital
firm? Support your contentions.
Q.3 Write a note on Linux Vs Windows.
Ans.
1: Full access vs. no access
Having access to the source code is probably the single most significant difference
between Linux and Windows. You can look at this from both sides of the fence.
Some say giving the public access to the code opens the operating system (and the
software that runs on top of it) to malicious developers who will take advantage of
any weakness they find. Others say that having full access to the code helps bring
about faster improvements and bug fixes to keep those malicious developers from
being able to bring the system down.
2: Licensing freedom vs. licensing restrictions
With a Linux licensed operating system, you are free to modify that software and
use and even republish or sell it (so long as you make the code available). Also, with
the linux, you can download a single copy of a Linux distribution (or application) and
install it on as many machines as you like. With the Microsoft license, you can do
none of the above. You are bound to the number of licenses you purchase, so if you
purchase 10 licenses, you can legally install that operating system (or application)
on only 10 machines.
3: Online peer support vs. paid help-desk support
This is one issue where most companies turn their backs on Linux. But its really not
necessary. With Linux, you have the support of a huge community via forums, online
search, and plenty of dedicated Web sites. And of course, if you feel the need, you
can purchase support contracts from some of the bigger Linux companies (Red Hat
and Novell for instance).
However, when you use the peer support inherent in Linux, you do fall prey to time.
You could have an issue with something, send out e-mail to a mailing list or post on
a forum, and within 10 minutes be flooded with suggestions. Or these suggestions
could take hours of days to come in. It seems all up to chance sometimes. Still,
generally speaking, most problems with Linux have been encountered and
documented. So chances are good youll find your solution fairly quickly.
On the other side of the coin is support for Windows. Yes, you can go the same route
with Microsoft and depend upon your peers for solutions. There are just as many
help sites/lists/forums for Windows as there are for Linux. And you can purchase
support from Microsoft itself. Most corporate higher-ups easily fall victim to the
safety net that having a support contract brings.
4: Full vs. partial hardware support
One issue that is slowly becoming nonexistent is hardware support. Years ago, if you
wanted to install Linux on a machine you had to make sure you hand-picked each
piece of hardware or your installation would not work 100 percent.
With Windows, you know that most every piece of hardware will work with the
operating system. Of course, there are times when you will wind up spending much
of the day searching for the correct drivers for that piece of hardware you no longer
have the install disk for.
5: Centralized vs. noncentralized application installation
With Linux you have a centralized location where you can search for, add, or
remove software.
Windows has nothing like this. With Windows, you must know where to find the
software you want to install, download the software (or put the CD into your
machine), and run setup.exe or install.exe with a simple double-click.
6: Flexibility vs. rigidity
Linux system is more flexible compare to windows system.
Q.4 What are the different activities of Supply Chain Management (SCM)? How do
information systems facilitate SCM?
Ans. (The answer here is given in much more detail than it is asked. Students are
advised to write only selective part from the given answer.)
Definition of Supply Chain.
The interrelationships
With suppliers, customers, distributors, and
other businesses
Needed to design, build, and sell a product
Each supply chain process should add value to the products or services a
company produces
Frequently called a value chain
Challenges of SCM
Key Challenges
Lack
of
demand
planning
knowledge,
tools,
and guidelines
Inaccurate data provided by other information systems
Lack of collaboration among marketing, production, and inventory
management
SCM
tools
are
immature,
incomplete,
and
hard to implement
Trends in SCM
Q.5 How does the use of electronic voting machines act as a "double-edged sword?"
Ans. Usage of electronic machines are done because to achieve some objectives
which are mentioned below
- The vote counting process becomes very fast and easy.
- Amount the government has to spent on the counting vote would be reduced.
- The election would be safer.
- It would help improve countrys image if we use electronic voting machines for the
election.
- The conventional methods of spoiling election results with unethical practices
would be stopped at a larger extent if we use electronic voting machine.
There is an another side of a coin to this. Let us look this scenario from a different
context.
- If the electronic voting machine is hacked than the problem would be
more severe compared to the manual election method.
- The cost to overcome the problem would be quite high and which can
surpass the amount within which the manual counting of votes can be
done.
- Electronic voting machine does not make any difference when it comes
to security of the votes as it can be hacked like in the earlier scenario
the boxes were used to stolen.
Q.6 You are working as a project manager for a small IT consulting firm and have
been asked to create a plan for reviewing and auditing completed projects in order
to gauge their success. What factors will you use to measure the success of a
project? What questions would you ask in order to understand why a project
succeeded or failed?
Ans.