MIS

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 49

Past Years Questions of Module 2

Q.1 : Define Expert System and describe the types of Problems to which
they are applicable.
Ans. Definition
- Expert System Application Categories

Decision Management
Loan portfolio analysis
Employee performance evaluation
Diagnostic/Troubleshooting
Equipment calibration
Medical diagnosis
Software debugging
Design/Configuration
Manufacturability studies
Communications networks
Selection/Classification
Material selection
Information classification
Suspect identification
Process Monitoring/Control
Machine control (including robotics)
Inventory control
Production monitoring
Benefits of Expert Systems
Faster and more consistent than an expert
Can contain knowledge of multiple experts
Does not get tired or distracted
Cannot be overworked or stressed
Helps
preserve
and
reproduce
of human experts

the

knowledge

Q.2 : Explain the Three Components of Decision Support System.


Ans: DSS Components

Q.3 : Explain TPS with suitable example. Illustrate how MIS obtains their
data from various organizations TPS.
Ans : - Definition
Transactions include sales, purchases, deposits, withdrawals, refunds,
and payments
Online transaction processing (OLTP) is a real-time system that
captures transactions immediately
These systems include the accurate recording of transactions as well as the
control procedures used in issuing such documents as
pay checks,
invoices,
customer statements,
payment reminders,
tuition bills,
student schedules unlike other components of management information
system, the transaction processing system of an organization extending out
of the organization linking together the entire financial system, factory,
customers, and suppliers.
Q.4 : How do Executive support system help Senior Managers make better
decisions?
Ans: - Definition
- never structured
- The Role of ESS in the Organization

An ESS can supply the summarized information executives need and


yet provide the opportunity to drill down to more detail if necessary.

ESS are able to link data from various sources both internal and external to
provide the amount and kind of information executives find useful.
Executive Support Systems don't provide executives with ready- made
decisions. They provide the information that helps them make their decisions.
ESS rely on graphic presentation of information because it's a much quicker
way for busy executives to grasp summarized information Support senior
management
Address non-routine decisions requiring judgment, evaluation, and insight
Show summarized information from internal MIS and DSS
E.g. ESS that provides minute-to-minute view of firms financial performance
as measured by inventory etc
Q.5: What is Management Information System? Explain importance of MIS
to business manager.
Ans: - Definition
- Importance to Business managers
- It facilitates planning
- Minimizes information overload
- encourages decentralization
- Brings coordination
- Makes control easier
- Data accuracy
- Consistency of data
- Information completeness
- Relevance
Q.6: Describe the characteristics of Transaction Processing System (TPS)
and role they play in a business.
Ans: - Definition
Roles played by TPS in the organization

Process data generated by and about transactions

Maintain a high degree of accuracy


Ensure data and information integrity and accuracy
Produce timely documents and reports
Increase labour efficiency
Help provide increased and enhanced service
Achieve competitive advantage

Q.7 : Define an expert system, describe how it works, and explain


importance to business.
Ans: - Write the whole question
Q. 8: Write a short note on Decision Support System
Ans:
Definition
9 Components
9 Model of DSS
9 Use of DSS

9
Q. 9 Differentiate between Model Driven DSS & Data Driven DSS. Giving
suitable examples explain the concept of data mining & OLAP.
Ans:Data-driven
DSS
Most data-driven DSSs are targeted at managers, staff and also product/service
suppliers. It is used to query a database or data warehouse to seek specific answers
for specific purposes. It is deployed via a main frame system, client/server link, or
via the web. Examples: computer-based databases that have a query system to
check (including the incorporation of data to add value to existing databases.
Model-driven
DSS
Model-driven DSSs are complex systems that help analyse decisions or choose
between different options. These are used by managers and staff members of a
business, or people who interact with the organization, for a number of purposes
depending on how the model is set up - scheduling, decision analyses etc. These
DSSs can be deployed via software/hardware in stand-alone PCs, client/server
systems, or the web.
OLAP
Online Analytical Processing (OLAP) is a capability of management, decision
support, and executive information systems that enables managers and
analysts to interactively examine and manipulate large amounts of detailed
and consolidated data from many perspectives. Basic analytical operations
include:
Consolidation: This involves the aggregation of data. It can be simple roll-ups
or complex groupings involving interrelated data. For example, sales offices
can be rolled up to districts and districts rolled up to regions.
Drill-Down: OLAP can go in the reverse direction and automatically display
detailed data that comprises consolidated data. For example, the sales by
individual products or sales reps that make up a region's sales can be
accessed easily.
Slicing: This refers to the ability to look at the database from different
For example, one slice of a database might show all sales of a product within
regions. Another slice might show all sales by sales channel. By allowing
rapid alternative perspectives, slicing allows managers to isolate the
information of interest for decision making
Data Mining:
Generally, data mining (sometimes called data or knowledge discovery) is the
process of analyzing data from different perspectives and summarizing it into
useful information - information that can be used to increase revenue, cuts
costs, or both. Data mining software is one of a number of analytical tools for
analyzing data.
Data mining involves six common classes of tasks:

Anomaly detection (Outlier/change/deviation detection) The identification of


unusual data records, that might be interesting or data errors that require
further investigation.

Association rule learning Searches for relationships between variables. For


example a supermarket might gather data on customer purchasing habits.
Using association rule learning, the supermarket can determine which
products are frequently bought together and use this information for
marketing purposes. This is sometimes referred to as market basket analysis.

Clustering is the task of discovering groups and structures in the data that
are in some way or another "similar", without using known structures in the
data.

Classification is the task of generalizing known structure to apply to new


data. For example, an e-mail program might attempt to classify an e-mail as
"legitimate" or as "spam".

Regression Attempts to find a function which models the data with the least
error.

Summarization providing a more compact representation of the data set,


including visualization and report generation.

Sequential pattern mining Sequential pattern mining finds sets of data


items that occur together frequently in some sequences. Sequential pattern
mining, which extracts frequent subsequences from a sequence database,
has attracted a great deal of interest during the recent data mining research
because it is the basis of many applications, such as: web user analysis, stock
trend prediction, DNA sequence analysis, finding language or linguistic
patterns from natural language texts, and using the history of symptoms to
predict certain kind of disease

Q.10 What is the role of Information Systems in helping people working in


group make decisions more efficiently? (Write about GDSS)
Ans : Business value of GDSS
Supports greater numbers of attendees
Without GDSS, decision-making meeting process breaks down
with more than 5 attendees
More collaborative atmosphere
Guarantees anonymity
Can increase number of ideas generated and quality of decisions made
Most useful for idea generation, complex problems, large groups
More precise communication;
Synergy: members are empowered to build on ideas of others;
More objective evaluation of ideas;
Stimulation of individuals to increase participation;
Learning: group members imitate and learn from successful behaviors of
others.
Q.11 How would you use capabilities like Data warehousing and Data
Mining to improve business performance and decision making? Explain.

Ans: For the Data mining use the points given in the answer number 9 and show
its usage in the organization.
Data warehousing:

Congregates data from multiple sources into a single database so a single


query engine can be used to present data.

Mitigates the problem of database isolation level lock contention in


transaction processing systems caused by attempts to run large, long
running, analysis queries in transaction processing databases.

Maintain data history, even if the source transaction systems do not.

Integrate data from multiple source systems, enabling a central view across
the enterprise. This benefit is always valuable, but particularly so when the
organization has grown by merger.

Improve data quality, by providing consistent codes and descriptions,


flagging or even fixing bad data.

Present the organization's information consistently.

Provide a single common data model for all data of interest regardless of the
data's source.

Restructure the data so that it makes sense to the business users.

Restructure the data so that it delivers excellent query performance, even for
complex analytic queries, without impacting the operational systems.

Add value to operational business applications, notably customer relationship


management (CRM) systems.

Past Years Questions of Module 4


Q.1 Explain an approach to ERP implementation and state the six major
hassles in ERP implementation.
Ans: Hassles in ERP implementation
Inadequate definition of requirements
Implementation in stages
Resistance to change on the part of employees
Appropriate training
Compatibility Issues with ERP Modules

Cost
Speed of implementation
Risk of failure

Q.2 Identify the seven types of hackers and explain what motivates each
group.
Ans: Classifications
White hat
A white hat hacker breaks security for non-malicious reasons, perhaps to test their
own security system or while working for a security company which makes security
software. The term "white hat" in Internet slang refers to an ethical hacker. This
classification also includes individuals who perform penetration tests and
vulnerability assessments within a contractual agreement. The EC-Council, [7] also
known as the International Council of Electronic Commerce Consultants, is one of
those organisations that have developed certifications, courseware, classes, and
online training covering the diverse arena of Ethical Hacking. [6]
Black hat
A "black hat" hacker is a hacker who "violates computer security for little reason
beyond maliciousness or for personal gain" (Moore, 2005). [8] Black hat hackers form
the stereotypical, illegal hacking groups often portrayed in popular culture, and are
"the epitome of all that the public fears in a computer criminal". [9] Black hat hackers
break into secure networks to destroy data or make the network unusable for those
who are authorized to use the network. They choose their targets using a twopronged process known as the "pre-hacking stage".
Part 1: Targeting
The hacker determines what network to break into during this phase. The
target may be of particular interest to the hacker, either politically or
personally, or it may be picked at random. Next, they will port scan a network
to determine if it is vulnerable to attacks, which is just testing all ports on a
host machine for a response. Open portsthose that do respondwill allow a
hacker to access the system.
Part 2: Research and Information Gathering
It is in this stage that the hacker will visit or contact the target in some way in
hopes of finding out vital information that will help them access the system.
The main way that hackers get desired results from this stage is from "social
engineering", which will be explained below. Aside from social engineering,
hackers can also use a technique called "dumpster diving". Dumpster diving
is when a hacker will literally search through users' garbage in hopes of
finding documents that have been thrown away, which may contain

information a hacker can use directly or indirectly, to help them gain access
to a network.
Part 3: Finishing The Attack
This is the stage when the hacker will invade the primary target that he/she
was planning to attack or steal from. Many "hackers" will be caught after this
point, lured in or grabbed by any data also known as a honeypot (a trap set
up by computer security personnel).
Grey hat
Main article: Grey hat
A grey hat hacker is a combination of a Black Hat and a White Hat Hacker. A Grey
Hat Hacker may surf the internet and hack into a computer system for the sole
purpose of notifying the administrator that their system has been hacked, for
example. Then they may offer to repair their system for a small fee. [9]
Elite hacker
A social status among hackers, elite is used to describe the most skilled. Newly
discovered exploits will circulate among these hackers. Elite groups such as Masters
of Deception conferred a kind of credibility on their members. [10]
Script kiddie
A script kiddie (or skiddie) is a non-expert who breaks into computer systems by
using pre-packaged automated tools written by others, usually with little
understanding of the underlying concepthence the term script (i.e. a prearranged
plan or set of activities) kiddie (i.e. kid, childan individual lacking knowledge and
experience, immature).[11]
Neophyte
A neophyte, "n00b", or "newbie" is someone who is new to hacking or phreaking
and has almost no knowledge or experience of the workings of technology, and
hacking.[9]
Blue hat
A blue hat hacker is someone outside computer security consulting firms who is
used to bug test a system prior to its launch, looking for exploits so they can be
closed. Microsoft also uses the term BlueHat to represent a series of security
briefing events.[12][13][14]
Hacktivist
A hacktivist is a hacker who utilizes technology to announce a social, ideological,
religious, or political message. In general, most hacktivism involves website
defacement or denial-of-service attacks.

Nation state
Intelligence agencies and cyberwarfare operatives of nation states. [15]
Organized criminal gangs
Criminal activity carried on for profit.[15]
Bots
Bots are automated software tools, some freeware, that are available for the use of
any type of hacker.[15]

Q.3 Explain the Operational Benefits, Business Benefits, and Management


Benefits of ERP.
Ans:
* Operational Benefits
- Quality and efficiency
Decision support
Latest technology
Improved delivery performance
Reduced cycle time
Simplification of product planning
Paperless transitions
Help reduce operating costs
Business Benefits
Decreased costs
Improved customer satisfaction
vendor satisfaction
High profitability
Management Benefits
Enterprise agility
Transparency within the organization
Improved productivity of an organization.
Facilitate Day-to-Day Management
Support Strategic Planning
Q.4 Define Computer Crime and list three types of Computer crime that
can be perpetrated from inside and three from outside the organization.
Ans: Computer crime includes
Unauthorized use, access, modification, or destruction of hardware,
software, data, or network resources
The unauthorized release of information
The unauthorized copying of software
Denying an end user access to his/her own hardware, software, data,
or network resources
Using or conspiring to use computer or network resources illegally to
obtain information or tangible property
Crimes which can be committed inside the organization

Electronic Breaking and Entering


Hacking into a computer system and reading files, but neither stealing
nor damaging anything
Back Doors
A hidden point of entry to be used in case the original entry point is
detected or blocked
Cyber Theft
Theft of money or information from the targeted PC or system.

Crimes which can be committed outside the organization


Denial of Service
Hammering
a
websites
equipment
with
too
many requests for information
Clogging
the
system,
slowing
performance,
or crashing the site
- Scans
Widespread probes of the Internet to determine types of computers,
services, and connections looking for weaknesses
- Sniffer
Programs
that
search
individual
packets
of
data as they pass through the Internet
Capturing passwords or entire contents
- Spoofing
Faking an e-mail address or Web page to trick users into passing along
critical
information
like passwords or credit card numbers
-

Q.5 Describe challenges posed by Information Technology to Intellectual


property rights?
Ans:
- Protection has been made impossible due to easy reproduction
- Traditional copyright law imposed criminal penalties only if intent to profit could be
proved
- Information isn't information unless it is shared
- Societal interests in unrestricted dissemination of thought outweigh interests of
the individual/corporate owner
- Creator should have moral rights to control work
- Piracy has become a major concern in the Intellectual property rights.
- It has become very difficult to identify the original work now days.
Q.6 Describe Hacking and Computer crimes
Ans:
Hacking
Hacking is
The unauthorized access and use of networked computer systems
Electronic Breaking and Entering
Hacking into a computer system and reading files, but neither stealing
nor damaging anything
Cracker

A malicious or criminal hacker who maintains knowledge of the


vulnerabilities
found
for
private advantage
Common Hacking Tactics
Denial of Service
Hammering
a
websites
equipment
with
too
many requests for information
Clogging
the
system,
slowing
performance,
or crashing the site
Scans
Widespread probes of the Internet to determine types of computers,
services, and connections
Looking for weaknesses
Sniffer
Programs
that
search
individual
packets
of
data as they pass through the Internet
Capturing passwords or entire contents
Spoofing
Faking an e-mail address or Web page to trick users into passing along
critical
information
like passwords or credit card numbers
Trojan House
A program that, unknown to the user, contains instructions that exploit
a
known
vulnerability
in some software
Back Doors
A hidden point of entry to be used in case the original entry point is
detected or blocked
Malicious Applets
Tiny Java programs that misuse your computers resources, modify files
on the hard disk, send fake email, or steal passwords
War Dialing
Programs that automatically dial thousands of telephone numbers in
search of a way in through a modem connection.
Password Crackers
Software that can guess passwords

Computer Crime
Computer crime includes
Unauthorized use, access, modification, or destruction of hardware,
software, data, or network resources
The unauthorized release of information
The unauthorized copying of software
Denying an end user access to his/her own hardware, software, data,
or network resources
Using or conspiring to use computer or network resources illegally to
obtain information or tangible property
Many computer crimes involve the theft of money
The majority are inside jobs that involve unauthorized network entry and
alternation

of
of the

computer
databases
to
cover
employees involved
Copyright infringement
Transmission of confidential data
Pornography
Hacking
Use of external ISPs
Moonlighting
Software Piracy
Entry into the private life of any person

the

tracks

Q.7 Security isnt simply a technology issue, its a business issue. Discuss.
Ans. ( First we have to prove that security is a technology issue than we will have to
prove that security is a business issue as well.)
* Technical Issue
- Security management is a technical issue and handled by technical persons.
- Computer crime, hacking, denial service, privacy issues, spoofing, sniffer, war
dialing, password cracking are some of the issues which are related to the cyber
security of a person and they all are technical issues.
- Ex. Denial of service is related to the system speed
Password cracking is related to password hacking and is again a technical
concern.
Spoofing is creating a similar web page is done with the computer
programmes and codes only.
*Business Issue
- Problems related to security affect many things including company goodwill
among customers, supplier, market reputation, profitability of an organization.

Cost of the top five virus families

Nearly 115 million computers in 200 countries were infected in 2004

Up
to
11
million
be permanently infected

In 2004, total economic damage from virus proliferation was $166 to


$202 billion

Average
damage
$277 and $366

If the company is suffering from regular securities issues than the


reputation of that company in the market will not be that good. Hence
the company will loose out the customer base with the passage of time
and loose its credibility in the market. The same situation will make
the company least preferable among the supplier also and their

computers

per

computer

are

believed

is

to

between

relation with the company will also be tarnished. So with the passage
of time the company will have to suffer in each and every context of a
business. The security management is also very expensive. Right from
taking email monitoring to maintaining internal and external firewalls,
backup servers, password protection all the mechanisms require
money which is again a business concern for any company.
HR Perspective : The company facing the security issues has to train
the employees how to survive from the problems and how to tackle the
problem at their level. So again this is a part of HR which is business
context of the security issue.

Q.8 Should companies be responsible for unemployment caused by their


Information System? Why or Why Not?
Ans: - (In this type of answers you should give your opinion and give your
arguments in support to the answers.)
Companies are not responsible for the unemployment caused by their
Information system
- Companies are there to make profit
- If the company does not adopt to the new technology then its competitior would
do it and than there will be a survival issue for the organisation.
- Information system also provide jobs to many people.
- In todays scenario everyone knows that one has to stretch his/herself to the
fullest to make his/herself equipped with contemporary skills of doing a job and
those who fails to do it looses the job.
- The skilled manpower never loses a job may it be recession, may it be adoptation
to new information system etc.Employee who are
* Not creative
* Less flexible
* Directed to the short term benefits
* Unethical
* Less performing are generally removed.

Q.9 List and explain the most common threats against contemporary
information systems.
Ans. : Information systems security remains high on the list of key issues facing
information systems executives. Traditional concerns range from forced entry into
computer and storage rooms to destruction of data. Recent attention focuses on
protecting information systems and data from accidental or intentional unauthorized
access, disclosure, modification, or destruction. The consequences of these events
can range from degraded or disrupted service to customers to corporate failure.
Hacking is
The unauthorized access and use of networked computer systems
Electronic Breaking and Entering

Hacking into a computer system and reading files, but neither stealing
nor damaging anything
Cracker
A malicious or criminal hacker who maintains knowledge of the
vulnerabilities
found
for
private advantage
Denial of Service
Hammering
a
websites
equipment
with
too
many requests for information
Clogging
the
system,
slowing
performance,
or crashing the site
Scans
Widespread probes of the Internet to determine types of computers,
services, and connections
Looking for weaknesses
Sniffer
Programs
that
search
individual
packets
of
data as they pass through the Internet
Capturing passwords or entire contents
Spoofing
Faking an e-mail address or Web page to trick users into passing along
critical
information
like passwords or credit card numbers
Trojan House
A program that, unknown to the user, contains instructions that exploit
a
known
vulnerability
in some software
Back Doors
A hidden point of entry to be used in case the original entry point is
detected or blocked
Malicious Applets
Tiny Java programs that misuse your computers resources, modify files
on the hard disk, send fake email, or steal passwords
War Dialing
Programs that automatically dial thousands of telephone numbers in
search of a way in through a modem connection.
Password Crackers
Software that can guess passwords
Many computer crimes involve the theft of money
The majority are inside jobs that involve unauthorized network entry and
alternation
of
computer
databases
to
cover
the
tracks
of the employees involved
Many attacks occur through the Internet
Most
companies
dont
reveal
that
they
have
been targets or victims of cybercrime
Unauthorized use of computer systems and networks is time and resource
theft
Doing private consulting

Doing personal finances


Playing video games
Unauthorized use of the Internet or company networks
Internet Abuses in the Workplace
General email abuses
Unauthorized usage and access
Copyright infringement
Transmission of confidential data
Pornography
Hacking
Non-work-related download/upload
Leisure use of the Internet
Use of external ISPs
Moonlighting
Q.10 Describe the roles of firewalls, intrusion detection systems, and
antivirus software in promoting security.
Ans : Firewalls
A gatekeeper system that protects a companys intranets and other
computer networks from intrusion
Provides
a
filter
and
safe
transfer
point
for
access to/from the Internet and other networks
Important for individuals who connect to the Internet

Intrusion detection systems


An intrusion detection system (IDS) is a device or software application that
monitors network or system activities for malicious activities or policy violations and
produces reports to a management station
- A signal suggesting that a system has been or is being attacked.

- An IDS has the ability to dynamically change its rules and configurations in
response to changing environmental activity.
- Intrusion detection systems constantly monitor a given computer network for
invasion or abnormal activity. The advantage of this service is the "round-the-clock"
aspect, in that the system is protected even while the user is asleep or otherwise
away from any computer hooked up to the network. User information, access to the
network, and firewall measures are all actively updated and looked after by
intrusion detection systems.
- Intrusion detection systems are highly customizable to accommodate specific
client needs. This allows users to custom-build network security to monitor highlyindividualized activity; from overt attacks to the network to examining suspicious or
specific patterns of activity which may be a masquerade attempt to penetrate
system security from outside the network, or perhaps the work of someone inside
the security network. The system is able, through customization, to monitor both
the outside threats to a given network, and patterns of behavior which may be
threats
operating
within
the
system.
- Intrusion Detection Systems are placed at a strategic point or points within the
network to monitor traffic to and from all devices on the network.
Antivirus Software:
Protection from Viruses

The greatest and most obvious advantage to installing anti-virus software on


your computer is that it will prevent you from getting viruses such as trojans,
malware and spyware. Viruses range in severity from the harmless to the downright
system crippling. Not only can a virus destroy all of the valued data on your
computer, it can make the computer utterly worthless by infecting and destroying
processes vital to your computer's performance.
Protecting Personal Information

Hackers and viruses go hand in hand. A good anti-virus program will protect
you while you surf the Internet, preventing hackers from gaining access to personal
things such as credit card information and bank account access. The firewall feature
included with most anti-virus software will block any unauthorized incoming
connections to your network or computer, preventing hackers from digging their
hooks into your life and your computer.
Cost Savings

Though some anti-virus programs are quite pricey, there are some very good
options for those wanting something relatively cheap or even free. Many free antivirus programs are available that will protect your system just as well as a
subscription-based anti-virus program. Even if you choose to go with a program you

have to pay for, the cost of the program and subscription to their service will almost
certainly extend the life of your computer, meaning you'll have to purchase new
computers less frequently than those who choose not to use anti-virus software.
Convenience

Though you may find it inconvenient to have to run virus scans and worry
about the security of your computer, you'd have more to worry about without
proper anti-virus protection. A computer left open for viruses and hackers will often
start to show premature signs of wear and a significant slow down will be
noticeable, making normal computing tasks take much longer and causing much
more hassle. Let's assume your system does get infected with a virus. Without
protection you'd be at the mercy of the virus and you'd have to waste time trying to
find it, delete it and restore any damage it has caused and it will still probably be
there, even after deletion. Yet with proper real-time anti-virus software working you
will simply get a notification that a virus has been detected and be asked if you
would like to delete it. These notifications usually come as soon as the virus is
detected, leaving it without enough time to do its damage.

Q.11 Increased use of Information Technology has lead to more concern


for ethical business practices. Do you agree? Discuss.
Ans: Yes. Increased use of Information Technology has lead to more concern for
ethical business practices.
Information
technology
has
both
beneficial
and detrimental effects on society and people
Manage work activities to minimize the detrimental effects of
information technology
Optimize the beneficial effects
Excessive usage of Information system has raised some ethical issues.
- Computer Crime
- Hacking
- Cyber Theft
- Unauthorized Use at Work

Unauthorized use of computer systems and networks is time and resource


theft
Doing private consulting
Doing personal finances
Playing video games
Unauthorized use of the Internet or company networks
Internet Abuses in the Workplace
General email abuses
Unauthorized usage and access
Copyright infringement
Transmission of confidential data

Pornography
Hacking
Non-work-related download/upload
Leisure use of the Internet
Use of external ISPs
Moonlighting
Software Piracy
Theft of Intellectual Property
Privacy Issues
The issues those are discussed above were not there before the extensive usage of
information system.
Q.12 Why are computer systems more vulnerable than manual system to
destruction, error & misuse? Distinguish between fault tolerant system &
high availability computing.
Ans : Computer systems are more vulnerable than manual systems to the
destruction, error and misuse because
- They are automatic systems
- If one has find the method to destroy the system than by using the
same method all the other systems can also be destroyed. That is not
the case with manual system.
- Computer systems are networked hence it becomes easier to misuse
them.
- All the security systems have loop holes which can be used to harm
the computer.

In the event of a system failure, fault-tolerant systems have redundant


processors, peripherals, and software that provide
Fail-over capability: shifts to back up components
Fail-save
capability:
the
system
continues
to operate at the same level
Fail-soft
capability:
the
system
continues
to operate at a reduced but acceptable level

High availability systems

High availability is a system design approach and associated service


implementation that ensures a prearranged level of operational performance will be
met during a contractual measurement period.
Users want their systems, for example wrist watches, hospitals, airplanes or
computers, to be ready to serve them at all times. Availability refers to the ability of
the user community to access the system, whether to submit new work, update or
alter existing work, or collect the results of previous work. If a user cannot access
the system, it is said to be unavailable.[1] Generally, the term downtime is used to
refer to periods when a system is unavailable.

Difference:
- A fault tolerant environment has no service interruption but a significantly higher
cost, while a highly available environment has a minimal service interruption
- Fault tolerance relies on specialized hardware to detect a hardware fault. More
importantly, the fault tolerant model does not address software failures, by far the
most common reason for downtime. High availability systems detect downtimes.
-Fault tolerance differs from high availability by providing additional resources that
allow an application to continue functioning after a component failure without
interruption.
-For the fault tolerant system : The most commonly used models are HARP, SAVE,
and SHARPE in the USA, and SURF or LASS in Europe.
For the high availability system : IBM Global Services models are used.

Q.13 Discuss the role of Firewalls, Intrusion Detection System &


Encryption system in promoting security.
Ans. Firewalls and Intrusion detecting system is discussed in above questions.
Encryption system:
Encryption
Data is transmitted in scrambled form
It is unscrambled by computer systems for authorized users only
The most widely used method uses a pair of public and private keys
unique to each individual

Q. 14 You have just been hired as a security consultant by Megamalls Inc.,


a national chain of retail malls, to make sure that the security of their
information systems is up to par. Outline the steps you will take to achieve
this.
Ans.

Step 1: Plan the security check.

Step 2: Hold the meeting of the concerned employees of the organization.


(Function Head, Security manager, Chief information officer)

Step 3: Gather data and test IT security in the organization.

Step 4: identify deficiencies.

Step 5: Analyze and report findings

Step 6: Respond to findings (organization)

Step 7: Issue final report (audit report)

Past Years Questions of Module 1


Q.1 Classify the types of Information Systems and their characteristics of
information used at different levels in an organization.
Ans. Write the whole question of information system.

Q.2 Classify and Explain the attributes of Information in Three Dimensions


Ans.

Q.3 Explain the different types of physical media used in Telecom and
Networks and compare them in terms of speed and cost.
Ans.
Twisted Pair wire
Ordinary telephone wire
Copper wire is twisted
into pairs

Co axial cable
Sturdy copper or
aluminum wire wrapped
with spacers to insulate
and protect it

Fiber-Optic Cable
One or more hair-thin
filaments of glass
fiber wrapped in a
protective jacket

Q.4 Identify and discuss the major types of information systems that serve
the main management groups within a business. What are the
relationships among these systems?
Ans. Already discussed above.
Q.5 you are advising the owner of Sarthak Computer, a new, local
computer repair store that also builds custom computers to order. What
competitive strategies could Sarthak Computer exert? Which ones will it
have difficulty exercising?
Ans.

Cost Leadership
Differentiation Strategy
Innovation Strategy
Growth Strategy
Alliance Strategy
Q.6 Differentiate between application software and system software. Why
cant an end user just load an application program into a computer and
start computing without using an operating system?
Ans.
Actually, a system software is any computer software which manages and controls
computer hardware so that application software can perform a task. Operating
systems, such as Microsoft Windows, Mac OS X or Linux, are prominent examples of
system software. System software contrasts with application software, which are
programs that enable the end-user to perform specific, productive tasks, such as
word processing or image manipulation.
System software performs tasks like transferring data from memory to disk, or
rendering text onto a display device. Specific kinds of system software include
loading programs, operating systems, device drivers, programming tools, compilers,
assemblers, linkers, and utility software.
Software libraries that perform generic functions also tend to be regarded as system
software, although the dividing line is fuzzy; while a C runtime library is generally
agreed to be part of the system, an OpenGL or database library is less obviously so.
If system software is stored on non-volatile memory such as integrated circuits, it is
usually termed firmware while an application software is a subclass of computer
software that employs the capabilities of a computer directly and thoroughly to a
task that the user wishes to perform. This should be contrasted with system
software which is involved in integrating a computer's various capabilities, but
typically does not directly apply them in the performance of tasks that benefit the

user. In this context the term application refers to both the application software and
its implementation.
A simple, if imperfect analogy in the world of hardware would be the relationship of
an electric light bulb (an application) to an electric power generation plant (a
system). The power plant merely generates electricity, not itself of any real use until
harnessed to an application like the electric light that performs a service that
benefits the user.
Typical examples of software applications are word processors, spreadsheets, and
media players.
Multiple applications bundled together as a package are sometimes referred to as
an application suite. Microsoft Office and OpenOffice.org, which bundle together a
word processor, a spreadsheet, and several other discrete applications, are typical
examples. The separate applications in a suite usually have a user interface that
has some commonality making it easier for the user to learn and use each
application. And often they may have some capability to interact with each other in
ways beneficial to the user. For example, a spreadsheet might be able to be
embedded in a word processor document even though it had been created in the
separate spreadsheet application.
User-written software tailors systems to meet the user's specific needs. User-written
software include spreadsheet templates, word processor macros, scientific
simulations, graphics and animation scripts. Even email filters are a kind of user
software. Users create this software themselves and often overlook how important it
is.
In some types of embedded systems, the application software and the
operatingsystem software may be indistinguishable to the user, as in the case of
software used to control a VCR, DVD player or Microwave Oven.
Q.7 How do the Internet and Internet technology work and how do they
support communication and e-business?
Ans. Electronic business, or e-business, may be defined as the application of
information and communication technologies in support of all the activities of
business. Commerce constitutes the exchange of products and services between
businesses, groups and individuals and can be seen as one of the essential activities
of any business. Electronic commerce focuses on the use of ICT to enable the
external activities and relationships of the business with individuals, groups and
other businesses.
Potential concerns

Security
Privacy and confidentiality
Authenticity
Data integrity
Access control
Availability
Common security measures
Physical security
All these concerns are taken care of by the internet facility hence E-Business can be
supported by the internet facility.
Communication on the internet happens with many ways
- Email
- Voice mail
- Video conferencing
- Social networking sites
- E commerce sites
- Networks
- WWW
Hence internet supports communication also.
Q.8 Identify and describe three major enterprise applications.
Ans. - Enterprise Resource planning
- Supply chain management
- Customer relationship management
Q.9 Describe how any organization could practice knowledge
management?
Ans.

A knowledge-creating company or learning organization


Consistently creates new business knowledge
Disseminates it throughout the company
Builds it into its products and services
Creates techniques, technologies, systems,
and rewards for getting employees to share
what they know
Makes better use of accumulated workplace and enterprise knowledge

Q.10 Describe each type of organizational change enabled by information


technology. Give an example of each type of change in hotel or bank.
Ans. Hotel
- Advance booking or reservation
- Finding nearby hotels (GPS facility)
- Saving of time
- Promotional activities on the internet became possible
- Find the review on the internet
- Staff management by ERP
Bank
-

E banking
SMS alert with credit and debit of amount
ATM machines availability
Easy and fast cash transfer facility
Mobile banking
Quick Check clearance of premium customers (Part of CRM)
Saving of time (Customers do not have to stand in queue in order to
get the service.)
Staff management by ERP

Q.11 What are Knowledge Work Systems? What role do they play in
Knowledge Management? What are the generic requirements of
knowledge work systems?
Ans. Building a Knowledge-Creating Company
A knowledge-creating company or learning organization
Consistently creates new business knowledge
Disseminates it throughout the company

Builds it into its products and services


Explicit Knowledge
Data, documents, and things written down or stored in computers
Tacit Knowledge
The how-to knowledge in workers minds
Represents some of the most important information within an
organization
A knowledge-creating company makes such tacit knowledge
available to others
Knowledge Management
Successful knowledge management
Creates techniques, technologies, systems,
and rewards for getting employees to share
what they know
Makes better use of accumulated workplace and enterprise knowledge
Knowledge Management Techniques

Knowledge Management Systems (KMS)


Knowledge management systems
A major strategic use of IT
Manages organizational learning and know-how
Helps knowledge workers create, organize, and make available
important knowledge
Makes this knowledge available wherever and whenever it is needed
Knowledge includes
Processes, procedures, patents, reference works, formulas, best
practices, forecasts, and fixes

Q.12 What is Business Process Re-engineering? What steps are required to


make it effective? How does it differ from Business Process Management?
Ans. Reengineering Business Processes
Called BRP or simply Reengineering
Fundamental rethinking and radical redesign of business processes
Seeks to achieve improvements in cost, quality, speed, and service

Steps to make BPR more effective are as follows


Step 1: View current process
Step 2: Analyse current process
Step 3: Simulate future process
Step 4: Monitor the process
Step 5: Modify the process
BPR Versus Business Improvement or Business process
management

Q.13 what is IT infrastructure? List and describe the components of IT


infrastructure that firms need to manage.
Ans. IT infrastructure includes database, network, hardware and software
components.
- Database :
Definition
Types
- Networks
LAN, WAN, MAN
- Software
Definition
Software devices
- Hardware
Definition
Hardware devices
Q. 14 What is network topology? Name and explain principal network
topologies.
Ans. Network Topologies

Topology
The structure of a network
Star Network
Ties end user computers to a central computer
Ring Network
Ties local computer processors together in a ring on a relatively equal
basis
Bus Network
Local processors share the same communications channel
Mesh Network
Uses direct communications lines to connect some or all of the
computers in the ring to
each other
Switch
A message-switching computer that handles
data communication between autonomous
local computers

Mesh Network

Switch Network

Q. 15 Compare and contrast E-Commerce Vs. M-Commerce.


Ans.
1. M-commerce stands for Mobile Commerce while E-commerce stands
for Electronic Commerce.
2. M-commerce uses mobile devices for commercial transactions while Ecommerce uses computers.
3. M-commerce is available anyplace you go, even if there is no Internet.
For E-commerce, you still need to go to a place where there is Internet
to access your online transactions.
4. M-commerce is very handy and easy to carry while E-commerce you
cannot always bring with you your computer or laptop anywhere.
5. M-commerce is charged through the callers rate, deduction of users
credit, and mobile banking. E-commerce is charged through the use of
credit cards that are swiped in credit card machines.
6. M- Commerce has a wide reach compare to E-commerce.
7. M- Commerce is a more recent technology compared to E- commerce.
8. Online shopping is somewhat difficult because the screen on mobile
would be smaller compare to Laptops and PC so it becomes somewhat
difficult for a person to see the product clearly on the screen. While
this is not a difficulty in Ecommerce.
Q. 16 Using Michael Porters five forces model describe how businesses
can use information systems to apply competitive strategies.
Ans.
-

A company can use online seller bidding so the buyer sets the price.
This way a company can achieve COST LEADERSHIP.

A company can use online customer design or can opt for Customer
relationship management in order to DIFFERNTIATE the product/service
from the competitor.
A company can go for Business process reengineering or ERP for
INNOVATION in the company.
Wal-Marts merchandise ordering via global satellite tracking. This is an
example of a company which goes for the GROWTH STRATEGY.
Wal-Mart uses automatic inventory replenishment by supplier. This is
an example of a company which goes for the ALLIANCE STRATEGY.

Past Years Questions of Module 3


Q.1 Define Networking. Discuss different forms of networking with its
characteristics, Also Elaborate how each one of them will provide value to
business.
Ans. Write about LAN, WAN , MAN etc..which is already discussed.
Q. 2 In what ways does use of extranet and intranet provides competitive
advantage to a firm?
Ans. The Role of Intranets

Many companies have sophisticated and widespread intranets, offering


Detailed data retrieval
Collaboration
Personalized customer profiles
Links to the Internet
Intranets use Internet technologies
Web browsers and servers
TCP/IP network protocols : Transmission Control Protocol (TCP) and
Internet Protocol (IP)
Communications and collaboration
Business operations and management
Web publishing
Intranet portal management

Business Value of Extranets


Web browser technology makes customer and supplier access to intranets
easier and faster
Another way to build and strengthen strategic relationships
Enables and improves collaboration between a business, customers, and
partners
Facilitates online, interactive product development and marketing

Q. 3 what are the different components of information systems? Explain


Management, Organization & Technology dimensions of information
system.
Ans. Components of an IS

People Resources
Specialists
End users
Hardware Resources
Machines
Media
Software Resources
Programs
Procedures
Data Resources
Product descriptions, customer records, employee files, inventory
databases
Network Resources
Communications media, communications processors, network access
and control software

Operational Dimension of Information system


The operation theory is just similar to any other system, which needs inputs from
user (key in instructions and commands, typing, scanning). The inputted data then
will be processed (calculating, reporting) using technology devices such as
computers, and produce output (printing reports, displaying results) that will be sent
to another user or other system via a network and a feedback method that controls
the operation.
Computer System Concept

Management Dimension of Information system


In addition to supporting decision making, information systems may also help
managers and workers analyze problems, visualize complex subjects, and
create new products.
In this section we have to write different systems that we have studies
Ex. TPS, OAS, DSS, GDSS, ESS, MIS, ES. Just the area where they are used
should be written.
Technology Dimension of Information system
(Write just a concept of following points within 2 or 3 lines)
- E- commerce
- M-commerce
- IT security
- Social networking sites
- ERP
- SCM
- CRM
- Wi-Fi and Bluetooth
Q. 4 Write short notes on the following:
a. Client-Server computing
b. Peer-to-peer computing
c. Network computing
Ans.
a. Client-Server computing

Clients
End user personal computers or networked computers
Servers
Used to manage the networks
Processing
Shared between the clients and servers
Sometimes called a two-tier architecture
Larger computer systems are being replaced
with multiple client/server networks

The clientserver model is an approach to computer network programming


developed at Xerox PARC during the 1970s.
It is now prevalent in computer networks.
Email, the World Wide Web, and network printing all apply the clientserver
model.

b. Peer-to-peer computing
Central Server Architecture
P2P file-sharing software connects all PCs
to a central server
When a PC requests a file, the server searches
all active peers on the network
The server sends the requesting PC a list of
links to all active peers who have the file
Clicking a link connects the two PCs and automatically transfers the file
to the
requesting PC
Advantages
Can better protect the integrity and security
of the content and users of the network
Disadvantages

Directory server can be slowed or overwhelmed by too many users or


technical problems

Pure Peer-to-Peer Architecture


No central directory or server
File-sharing software connects one PC to
another online user
When you request a file, the software searches every online user and
sends you a list of active file names
Clicking a link automatically transfers the file from that users hard
drive to yours

c. Network computing
Virtual Private Networks (VPN)
Used to establish secure intranets and extranets
The Internet is the main backbone network
Relies on network firewalls, encryption, and
other security features to build a pipe through the Internet
Creates a private network without the high
cost of a separate proprietary connection
Telecommunications Network Model

Q. 5 Write short notes on the following:


1. Wireless Web
2. TCP/IP Reference Model for Telecommunication
Ans.
1. Wireless Web
Wi-fi
Wi-Fi is a popular technology that allows an electronic device to exchange
data wirelessly (using radio waves) over a computer network.
Wireless LANS
Uses wireless radio-wave technology to
connect PCs within an office or a building
Can be high-frequency, similar to digital
cellular, or low frequency
A device that can use Wi-Fi (such as a personal computer, video-game console,
smartphone, tablet, or digital audio player) can connect to a network resource such
as the Internet via a wireless network access point. Such an access point (or
hotspot) has a range of about 20 meters (65 feet) indoors and a greater range
outdoors.
Wi-Fi can be less secure than wired connections because an intruder does not
need a physical connection.
Advantages
Wi-Fi allows cheaper option to transmit the data
Also spaces where cables cannot be run, such as outdoor areas and historical
buildings, can host wireless LANs.
Unlike mobile phones, any standard Wi-Fi device will work anywhere in the
world.
Limitations
Wi-Fi networks have limited range.
Due to reach requirements for wireless LAN applications, Wi-Fi has fairly high power
consumption compared to some other standards

Bluetooth

Bluetooth is a wireless technology standard for exchanging data over short


distances (using short-wavelength radio transmissions from fixed and mobile
devices, creating personal area networks (PANs) with high levels of security. A
connection between two or more portable devices without the need for cables
or connectors
Uses
Wireless headsets for cell phones.
If the phone has Internet capability, a Bluetooth connection can be
established between the phone and nearby laptop computer to give
the computer, Internet access as well.
Bluetooth enabled printers can print pictures from a bluetooth enabled
cell phone or camera
Advantage

A master Bluetooth device can communicate with a maximum of seven


devices, though not all devices reach this maximum.
low power consumption

Applications

Wireless control of and communication between a mobile phone and a


handsfree headset.
communication between a mobile phone and a Bluetooth compatible car
stereo system.
Wireless Bluetooth headset and Intercom.

Q.6 Define Wi-Fi, Bluetooth and describe the capability of each and which
types of applications each is best suited.
Ans. Answer already discussed above.
Q.7 Draw and Explain the Network Topologies and compare each of them.
Ans. Answer already discussed above.
Q.8 Define LAN, WAN & MAN. Describe the components and the functions
of each component of LAN.
Ans.
Wide Area Network (WAN)
Telecommunication network that covers a large geographic area

Metropolitan area network (MAN)


A metropolitan area network (MAN) is a computer network that usually spans a
city or a large campus. A MAN usually interconnects a number of local area
networks (LANs) using a high-capacity backbone technology, such as fiber-optical
links
Local Area Network (LAN)
Connects computers within a limited physical area, such as an office,
classroom, or building

Components of LAN
Wiring
Network cables connect all of the devices on your network to a central point,
typically a switch or a hub. Most networks use Unshielded Twisted Pair wiring . Fiber
optic cable is used in cases where very high bandwidth is needed and where there
is a lot of electromagnetic interference. Fiber optic cable is much more expensive
than UTP wiring.
Network Interface Cards
Each networked device contains a Network Interface Card. The NIC may be a
separate board installed into a computers slot, or it may be built into the
motherboard. Either way, the NIC is the bridge between the computer and the
network. It decides whether to process a data packet or not, either passing it on to
the computers processor or discarding it based on the destination address in the
packet.
Hubs

A hub is the central wiring connector on a LAN, where all of the network cables
come together. Each cable plugs into a port on the hub. The hub accepts incoming
data packets from devices on the network and transmits them to all other
computers attached to the hub. Each device NIC receives each packet and makes its
process or discard decision.
Switches
A switch is like a hub in that it is a central point for connecting network cables;
however, a switch is able to receive a packet and transmit it to only the destination
computer. It does this by building a table of which computer is on which of its ports.
This reduces network traffic significantly, especially on a network of more than 10
computers. It is not unusual to find both hubs and switches on the same LAN.
Routers
Network routers are essentially very smart switches because they know about other
LANs, while switches only know about the network they are on. Routers connect
LANs together, sometimes across long distances, creating Wide Area Networks, or
WANs. Routers are also used to provide security on LANs by routing network traffic
between LAN segments.
Network Software
All of the network components except the cabling have software that makes them
work. Network software is written to a set of standards that define the TCP/IP
protocol suite. The standard defines layers of software and how they talk with each
other. Using the same set of rules allows networking equipment from different
vendors to work together, allowing you to take advantage of the best equipment in
each category.
Q.10 what is network topology? Name and explain principal network topologies.
Ans. Answer already discussed earlier.
TRICKY QUESTIONS
Q. 1 You have been hired by Sarvoday Visiting Nurse Services, whose
business processes are all manual, paper-based processes. How might a
CRM system benefit them?
Ans.
1. It projects an extremely customer centric face of the company to the
customer. Hence CRM will help Sarvoday Visiting Nurse Services
portray its positive image among the patients (customers).
2. Identification and targeting the best customers becomes easy.
3. Real-time customization and personalization of the nursing services.
Ex. Diabetes patient will be given QUICKLY the nurse who specializes in
handling diabetic patients. This thing takes much more effort in the
manual system.

4. Track when and how a customer (patient) contacts the company. GPS
system attached with CRM would give the exact location of a patient
hence it would be easier for the company employees to reach to the
patients.
5. Sarvoday Visiting Nurse Services can save all the data related to a
particular patient like when the patient called for the first time, patient
is suffering from which disease, patient is taking which drug and for
how much time etc
6. Grievance handling would be very easy now compared to the manual
process.
7. Sarvoday Visiting Nurse Services will save lot of operation time.
Q.2 "Knowledge increases exponentially," is a phrase with which we are all familiar.
How does this concept apply to electronic business and the emergence of the digital
firm? Support your contentions.
Q.3 Write a note on Linux Vs Windows.
Ans.
1: Full access vs. no access
Having access to the source code is probably the single most significant difference
between Linux and Windows. You can look at this from both sides of the fence.
Some say giving the public access to the code opens the operating system (and the
software that runs on top of it) to malicious developers who will take advantage of
any weakness they find. Others say that having full access to the code helps bring
about faster improvements and bug fixes to keep those malicious developers from
being able to bring the system down.
2: Licensing freedom vs. licensing restrictions
With a Linux licensed operating system, you are free to modify that software and
use and even republish or sell it (so long as you make the code available). Also, with
the linux, you can download a single copy of a Linux distribution (or application) and
install it on as many machines as you like. With the Microsoft license, you can do
none of the above. You are bound to the number of licenses you purchase, so if you
purchase 10 licenses, you can legally install that operating system (or application)
on only 10 machines.
3: Online peer support vs. paid help-desk support
This is one issue where most companies turn their backs on Linux. But its really not
necessary. With Linux, you have the support of a huge community via forums, online
search, and plenty of dedicated Web sites. And of course, if you feel the need, you
can purchase support contracts from some of the bigger Linux companies (Red Hat
and Novell for instance).
However, when you use the peer support inherent in Linux, you do fall prey to time.
You could have an issue with something, send out e-mail to a mailing list or post on
a forum, and within 10 minutes be flooded with suggestions. Or these suggestions

could take hours of days to come in. It seems all up to chance sometimes. Still,
generally speaking, most problems with Linux have been encountered and
documented. So chances are good youll find your solution fairly quickly.
On the other side of the coin is support for Windows. Yes, you can go the same route
with Microsoft and depend upon your peers for solutions. There are just as many
help sites/lists/forums for Windows as there are for Linux. And you can purchase
support from Microsoft itself. Most corporate higher-ups easily fall victim to the
safety net that having a support contract brings.
4: Full vs. partial hardware support
One issue that is slowly becoming nonexistent is hardware support. Years ago, if you
wanted to install Linux on a machine you had to make sure you hand-picked each
piece of hardware or your installation would not work 100 percent.
With Windows, you know that most every piece of hardware will work with the
operating system. Of course, there are times when you will wind up spending much
of the day searching for the correct drivers for that piece of hardware you no longer
have the install disk for.
5: Centralized vs. noncentralized application installation
With Linux you have a centralized location where you can search for, add, or
remove software.
Windows has nothing like this. With Windows, you must know where to find the
software you want to install, download the software (or put the CD into your
machine), and run setup.exe or install.exe with a simple double-click.
6: Flexibility vs. rigidity
Linux system is more flexible compare to windows system.
Q.4 What are the different activities of Supply Chain Management (SCM)? How do
information systems facilitate SCM?
Ans. (The answer here is given in much more detail than it is asked. Students are
advised to write only selective part from the given answer.)
Definition of Supply Chain.
The interrelationships
With suppliers, customers, distributors, and
other businesses
Needed to design, build, and sell a product
Each supply chain process should add value to the products or services a
company produces
Frequently called a value chain

Supply Chain Life Cycle

Roles and Activities of SCM in Business

Planning & Execution Functions of SCM


Planning
Supply chain design

Collaborative demand and supply planning


Execution
Materials management
Collaborative manufacturing
Collaborative fulfillment
Supply chain event management
Supply chain performance management

Benefits and Challenges of SCM


Key Benefits
Faster, more accurate order processing
Reductions in inventory levels
Quicker times to market
Lower transaction and materials costs
Strategic relationships with supplier
Goals and Objectives of SCM

Challenges of SCM
Key Challenges
Lack
of
demand
planning
knowledge,
tools,
and guidelines
Inaccurate data provided by other information systems
Lack of collaboration among marketing, production, and inventory
management
SCM
tools
are
immature,
incomplete,
and
hard to implement
Trends in SCM

Q.5 How does the use of electronic voting machines act as a "double-edged sword?"
Ans. Usage of electronic machines are done because to achieve some objectives
which are mentioned below
- The vote counting process becomes very fast and easy.
- Amount the government has to spent on the counting vote would be reduced.
- The election would be safer.
- It would help improve countrys image if we use electronic voting machines for the
election.
- The conventional methods of spoiling election results with unethical practices
would be stopped at a larger extent if we use electronic voting machine.
There is an another side of a coin to this. Let us look this scenario from a different
context.
- If the electronic voting machine is hacked than the problem would be
more severe compared to the manual election method.
- The cost to overcome the problem would be quite high and which can
surpass the amount within which the manual counting of votes can be
done.
- Electronic voting machine does not make any difference when it comes
to security of the votes as it can be hacked like in the earlier scenario
the boxes were used to stolen.

Q.6 You are working as a project manager for a small IT consulting firm and have
been asked to create a plan for reviewing and auditing completed projects in order
to gauge their success. What factors will you use to measure the success of a
project? What questions would you ask in order to understand why a project
succeeded or failed?
Ans.

Is the project going on time?


What were the issues faced during the project?
What are the standard operating procedures?
Disaster management system is there or not in the firm?
What has been done in terms of the security management?
What if the system would fail? Is there a fault tolerant system in the
organization?
What is a time given for the reporting of the project activities to the
senior management?
How much is the involvement of the senior management in the
project?
What are the outcomes of the project?
Up to which extent the anticipated results have been achieved.
What do you think are the reasons of the success/failure of the project?

You might also like