Professional Documents
Culture Documents
Questions and Answers: Information Processing and Management/MBA 5111
Questions and Answers: Information Processing and Management/MBA 5111
Chapter 1
Question: What are some of the toughest management challenges in developing IT solutions to
solve business problems and meet new business opportunities?
Answer: The challenges and opportunities that business managers face in managing information
systems and technologies to meet business goals.
Business / IT Challenges
Information Technology
Business / IT Developments
Business / IT Goals
Give customers what they want, when and how they want it, at the
lowest cost.
INFORMATION TECHNOLOGY
CAN ENABLE INNOVATION INTIATIVES AS
COMPANIES SEEK TO DEVELOP NEW PRODUCTS AND
SERVICE
Response
Support of Business Processes and Operations. Most
companies now use computer-based information systems to
help their employees record customer purchases, keep track
of inventory, pay employees, buy new merchandise, and
evaluate sales trends. Store operations would close down
without the support of such information systems.
support of Business Decision Making. Information systems also help managers and other
business professionals make better decisions. For example, decisions about what lines of
merchandise need to be added or discontinued and what kind of investments they require are
typically made after an analysis provided by computer-based information systems. This function
not only supports the decision making of managers, buyers, and others, but also helps them look
for ways to gain an advantage over other retailers in the competition for customers.
Support of Strategies for Competitive Advantage. Gaining a strategic advantage over
competitors requires the innovative application of information technologies. For example, Bank
management might make a decision to open branches in all districts of the country , with links to
the e-commerce Web site for online access. This offering might attract new customers and build
customer loyalty because of the ease of accessing service provided by such information systems.
Thus, strategic information systems can help provide products and services that give a business a
comparative advantage over its competitors.
Reference James A OBrien, George M. Markos (2011) 10th ed.New York :McGraw-Hill page 8-9
Question #4: Describe the purpose of Change Management and its impact in the
organization? (Page No. 469)
Answer for Question #4: Organizational changes can cause by new business/IT strategies and
applications and other changes in business processes. Change management fostering a new ebusiness culture within the organization by establishing communities of interest for employees
2
and other business stakeholders. Change management involves changing people in innovative
ways and recruits and trains them in the core competencies required in a changing workplace. It
also involves analyzing and defining all changes facing the organization in line with risk and cost
and to minimize the benefit of change.
(Page No.470-471)
Chapter 2
Question: Assume you are consulting one shoe manufacturer in the city and the
factorys survival is in danger because of the competition. What do you advise the
company for the success and survival in the long run?
(Hint: Use Michael porter model)
ANSWER
First the factory has to successfully develop strategies to confront the five
competitive forces that exist in the industry.
1)
2)
3)
4)
5)
After identifying this develop competitive strategy to counter the threats. The
Factory can apply one, some or all strategies based on the situations like cost
leadership, differentiation, innovation and alliance.
(Ref page 46)
Question: Discuss different barriers that may exist in the pathway fordeveloping a successful
e-commerce business
Answer for Question :
a. Design and Development
A poorly designed website will turn customers away!
"No matter how you measure success, the most important thing toremember is that you have to
work to be successful online. A websiteneeds to present information in a professional and easy to
"After the terrorist attacks of September 11th, another ITAA survey inDecember, 2000 found that
an overwhelming 70% of respondents wereconcerned about cyber security and 74% worried that
their personalinformation could be stolen online (Burton, 2001). According to ITAAPresident
Harris N. Miller, the terrorist attacks have createduncertainty and anxiety over internet
security."
c. Legal Issues
Be mindful that any transactions on your website are considered a"contract". Therefore, all
terms must be fulfilled.
"From the legal perspective your web site is considered an invitationto make a contract. When a
customer fills her shopping cart, checksout, completes the form and hits the click-to-purchase
button, she issending you a contract. When you acknowledge the order, you haveconfirmed the
contract. When you have delivered the product, you haveconcluded the contract.
d. Ethical and Moral Issues
The same demand to conduct business in an ethical and moral mannerapplies to ecommerce just
as it does to an offline business. Justbecause you cannot "see" your customer does not mean you
have aninvitation to act in an unscrupulous manner.
e. Physical Boundaries
The Internet and e-commerce have drastically changed the way webusinesses can operate. There
are no longer physical boundaries thatseparate markets from consumers. However, unless a
company makes the attempt to reach the global marketplace by designing multiculturalwebsites,
their business will likely be restricted by language, currency and trade issues.
f. Conflicts, traditional outlets vs. electronic outlets
"The ability to adapt existing analog business models to the Web ismany times difficult and
tumultuous because they can interfere andcompete with existing businesses methods.
Manufacturers provide agreat example of the potential conflicts that can occur between
anexisting channel of distribution using distributors and dealers or adirect sales force and
providing order taking over the Internet. Inthese instances, distributors, dealers and direct sales
forces feelthreatened by the new Internet based implementation and justifiablyso. When
existingbusinesses develop an e-commerce strategy it is 70%about adopting new business
models and corporate cultural change andonly 30% about technology."
Chapter 3
Question: How could a business use information technology to increase switching costs and
lock in its customers and suppliers? Use business examples to support your answers. Page 69
Ans: A major emphasis in strategic information systems has been to find ways to create
switching costs in the relationships between a firm and its customers or suppliers. In other words,
investments in information systems technology can make customers or suppliers dependent on
the continued use of innovative, mutually beneficial interenterprise information systems. They
then become reluctant to pay the costs in time, money, effort, and inconvenience that it would
take to switch to a companys competitors.
Lock in customers and suppliers: A businesses investment in IT can lock in customers and
suppliers by building valuable relationships with them, where both parties are experiencing
mutual benefits. If that can be achieved, it will deter both customers and suppliers from
abandoning your firm for a competitor, or from intimidating a firm into accepting a lessprofitable relationship. Page 50 & 52
Question #1: What factors should companies take into consideration when selecting business
application software? Make a list of factors and discuss their importance to this decision.
Answer for Question #1: (Page 134)
A company should take into consideration how to select business application softwares.
Organizations generally seek technology as a method to increase productivity, solve issues and
save money. Not having a well-defined strategy for purchasing software could result in the
purchase of various software products and services that actually cost more money in the long
term, due to long-term maintenance costs, lack of use or the use of similar systems to fill in the
feature gaps or compatibility with the existing system. You may find that purchasing a more
expensive and stable software product will replace several inexpensive and less effective
products, which could in turn reduce the time spent maintaining and integrating many ineffective
software products. To ensure that you select cost effective software solutions that meet a specific
business need, a company can use the following main criteria in evaluating software.
Get the big picture - What are the companys reasons for shopping for new software?
Make a list of the challenges a company would like the software to address
Functionality - Selection of a wrong software package can turn out to be costly and
adversely affect business processes
Compatibility a company should consider the software compatibility with the
existing system
7
Knowledge transfer from supplier a company should know if the software provider
giving all the knowledge a company need to know to use the software on business
processes, do the software provider give training?
User friendly a company should know if the software is user friendly, does it have
manual for users to understand the software? is it user focused?
Cost a company should consider the total cost of ownership of the software. These
components include the software license, software maintenance, and implementation
services. The company has to look at the cost for the next 5-7 years in order to get a good
idea of the long term cost to the organization.
Security A company should know the risk associated with the software
Question: Discuss how cloud computing reshapes the business
Answer for Question: When companies strategically adopt cloud computing, the impact ripples
throughout the organization. Below is an overview of how things change and what the executive
team considers in the transformation.
Strategy. Companies reassess their strategy, looking at where cloud can accelerate
projects or enable them to take advantage of new opportunities. They also look at how
they are currently using cloud computing in the organization.
People. Cloud computing moves organizations toward a service focus, rather than a
functional one. As such, they begin reassessing their talent needs. For example, they look
at IT staff and consider whether they have or can develop the IT architects they will need
to design and manage cloud services.
Technology. Regarding technology, new issues include how to address data security and
governance in the cloud model, as well as how to support the business as it assumes more
of a service focus.
Structure. Changes in the organizations processes may also affect how the organization is
structured. For example, consider the impact that rapid and inexpensive deployment of
technology could have on product development. How do governance models remain relevant and
intact?
Question, Explain how application of Web service plays a vital role for a
business organization? (Page 165)
Answer, Web service can link key business functions for exchange of data in real time
within the Web based application that a business might share with its customers,
suppliers, and other business partners. For example, the business organization can use
web service to check the inventory of a supplier before placing a large order through
the purchase application of a business; check the credit rating of the business with a
credit-reporting agency before approving the purchase through sales application of
the business. It also enhances the development of the easy and efficient e-business and
e-commerce applications. Therefore, Web based business and computing function
through web service technologies enable the company to have good information to
make decision, save time and reduce cost related to wrong decisions. (Page 165)
Chapter 5
Question: What is the relationship between having huge amount of data in database and its
easy accessibility?
Answer: Having huge amount of data help to have accurate information based on our demand.
But when we come to easy accessibility, the amount of date doesnt affect its accessibility
.Rather the logical way of database structure and type of software used between users and
databases determine the easily accessibility of data .Mentioning Face book ,with more than 200
million users with their pieces of content, photo, video and the size of their database is
measured in pet bytes but there is no problem in its easy accessibility, is the life testimony in
our day to day activity. (183).
Chapter 6
Question # Describe the business values of Telecommunication and how it can contribute to
efficiency of the organization?
Answer for question
Business values , It provide better customer service by reducing delay in filling orders and
improves cash flow by speeding up the billing of customer, credit inquiries can be made and
answered in second, reduce expensive business trips, fast service lock in customers and
suppliers. page 224
How?
Use of internet, extranets and other telecommunication networks can dramatically cut cost,
shorten business lead times and response times, support e commerce, improve the collaboration
of work group develop online operational process, share resource, lock in customer and supplies
and develop new products and services.
For example, traveling salespeople and those at regional sales office can use the internet,
extranets and other networks to transmit customer orders from their laptops or desktops pcs,
thus breaking geographic barriers. Teleconferencing can be used to cut costs by reducing the
need for expensive business trips, allowing customers, suppliers and employees to participate in
meetings and collaborate on joint projects without traveling. Finally business to business e
commerce web sites are used by business to establish strategic relationships with their customers
and suppliers by making business transaction fast, convenient, and tailored to the needs of the
business partners involved. Page 224and 225
The primary role of extranets is to link the internet resources of a company to the intranet of its
customers, suppliers, and other business partners. Extranets can also provide access to
operational company databases and legacy systems to business partners. The extranet also will be
used to alert local low-enforcement agencies where speeding and drunken- drawing
offense occurwith great frequencies. Business intelligence extranets, says deputy director for
traffic operations Rawson, help as all our jobs better
Thus, extranet enable customers, suppliers, consultants sub contactors, business prospects, and
others to access selected intranets web sites and other company databases. The business value of
extranets is derived from several factors. First, it makes customer and supplies access of intranet
10
resources a lot easies and faster than previses business methods. Second, intranets enable a
company to offer new kinds of interactive web-enabled services to their business partners.
Chapter 7
Answer for Question: First data are captured and processed using transaction processing
system of five cycles. 1. Date Entry- capturing of business data, this can be done at an ecommerce web site on the internet. 2. Transaction Processing process data in two ways: i)
Batch processing, where transaction data are accumulated over a period of time and processed
periodically and ii) real-time processing (online processing), where data are processed
immediately after transaction occurs. 3. Database Maintenance- updating the database to reflect
the changes resulting from day to day business transactions. 4. Document and Report
Generation- reports such as purchase orders, paychecks, sales receipts, invoice etc. 5. Inquiry
Processing- making inquiries and receiving a responses regarding the results of transaction
processing activity (Page(s): 284)
Question: Describe the major components of marketing mechanisms and How they contribute in
achieving organizations e-commerce requirements?
Answer:
The principal functions of marketing in business is concerned with the planning, promotion
and sale of existing products in existing markets, and the development of new products and new
markets to better attract and serve present and potential customers.
There are 3 main components of marketing Interactive marketing
- It is customer focused system
that is based on using the internet,
intranets and extranets
It establishes two way
transaction b/n a business and its
customers
and
potential
customers.
Its goal is equipping a
company to use various internet
technologies
including
chat,
Targeted marketing
- Is an important tool in developing advertising
and promotion strategies to strengthen a
companys e-commerce initiatives, mainly by
revolutionizing advertising in the digital arena,
with a new way of doing something old e.g.
using digital bill boards.
It is an advertising and promotion
management concept including 5 main
components. Community- is advertising by
selecting communities online. Content- is
11
discussion
group,
questionnaires instant messaging
and e-mail correspondence to
attract, encourage and keep
customers to become partners in
creating (product development),
purchasing,
delivering
and
improving products and services
12
government agencies can use central Web sites to exchange information and do business
with each other more efficiently than they usually can off the Web. ( pages 354 -355)
Chapter 10
Consider you are a manager of one organization and your organization is on a transition
period to implement management information system (MIS). What are the main issues
that you consider and the actions to be take in the process. Discuss.
I.
Chapter 11
Question: Describe the purpose of Change Management and its impact in the organization?
(Page No. 469)
13
Answer for Question: Organizational changes can cause by new business/IT strategies and
applications and other changes in business processes. Change management fostering a new ebusiness culture within the organization by establishing communities of interest for employees
and other business stakeholders. Change management involves changing people in innovative
ways and recruits and trains them in the core competencies required in a changing workplace. It
also involves analyzing and defining all changes facing the organization in line with risk and cost
and to minimize the benefit of change.
(Page No.470-471)
Question: Describe the reasons of end user resistance and its solutions in implementation of
new IT strategies in an organization.
There are a lot of reasons for end-user resistance in new information technology
implementation, even if user resistance to share knowledge has the biggest share, immaturity of
technology, immaturity of knowledge management industry, Cost and lack of need are the main
reasons for end-user resistance.
One of the key to solve the problems of end-user resistance to new information technologies is
proper education and training. In addition to this more important thing is the end-user
involvement in organizational change and in the development of new information system can be
the main solution. Answer for Question #5 :( Page: 468)
Chapter 12
Discus the basics of project management and their importance to a successful system development effort 481
Answer for Question: any discussion of information systems design and development would be
incomplete without including a discussion of basic project management concepts, techniques,
and tools. Before we progress any further in our discussion of implementation, we need to
understand how our project, which we hope is on time and within budget, got to this point. The
skills and knowledge necessary to be a good project manager will translate into virtually any
project environment. Page 507
Question:
A major activity during the implementation phase of the system development life cycle is
the acquisition of the hardware and software necessary to implement the new system.
Describe how do companies evaluate and select hardware, software, and IT services to best
fit with the business problem solution? /Page # 509-512/
14
Answer:
Companies may require suppliers to present bids and proposals based on system specifications
developed during the design stage of systems development.
Minimum acceptable physical and performance characteristics for all hardware and software
requirements are established. Most large business firms and all government agencies formalize
these requirements by listing them in a document called an RFP (Request for Proposal) or RFQ
(Request for Quotation). Then they send the RFP or RFQ to appropriate vendors, who use it as
the basis for preparing a proposed purchase agreement.
Companies may use a scoring system of evaluation when there are several competing proposals
for a hardware or software acquisition. They give each evaluation factor a certain number of
maximum possible points. Then they assign each competing proposal points for each factor,
depending on how well it meets the users specifications.
Whatever the claims of hardware manufacturers and software suppliers, the performance of
hardware and software must be demonstrated and evaluated.
On the basis of the size of the investment, independent hardware and software information
services (such as Datapro and Auerbach) may be used to gain detailed specification information
and evaluations.
The evaluation should encompasses to address issues on the hardware, soft ware and IT service
performance, cost, reliability, compatibility, technology, ergonomics,
connectivity,scalability,support, quality, maintenance, flexibility, efficiency, backup, raining,
documentations, accessibility, business position of the vendor, system development and
conversion strategy, as appropriate, and carrying out rating of these evaluations tools and
awarding to the winner vendor.
Chapter 13
Question : One of your friends who are recently started his own magazine invites you to handle
the Technology column of the magazine. You agreed to handle the column and you received
topic from the magazine management office to submit your article on the issue of Internet
abuses in the workplace. The message you received also request you to define activities of the
following internet abuses in the workplace for readers i.e General E-mail abuses, Unauthorized
Usage and Access, Copyright Infringement/Plagiarism, Newsgroup Postings, Transmission of
Confidential Data, Pornography, Hacking, Non-Work-Related Download/Upload, Leisure Use of
the Internet, Usage of External ISPs and Moonlighting.
Define at least 7 of internet abuses in the workplace?
Answer:
15
Question: Mention at least four security measures provided by computer devices, which measure
physical traits (Biometric security) that make each individual unique.
Answer:
Voice verification
Fingerprints
Hand geometry
Signature dynamics
Keystroke analysis
Retina scanning
Face recognition
Genetic pattern analysis
16
Chapter 14
Answer for Question : The management of global information technology has cultural and
political implications, for example hardware choices are difficult in some countries because of
high prices, high tariffs, import restrictions, lack of local service or spare parts and others. It is
also challenging to manage international date communications networks such as internet,
intranet, extranet and other networks. In addition establishing computing facilities
internationally is another global challenge.
Some of the strategies to solve the systems development problems that arise in global
information technology can be to transform an application used in the home office into a global
application, to set up a multinational development team with key people from several
subsidiaries to ensure that the system design meets the needs of local sites as well as corporate
head quarters, to outsource the development work to global offshore development companies
that have the skills and experience required to develop global business/ information technology/
applications and others. (Pages: 606, 611-612)
Question: Discuss the three components of IT management and explain how IT should be
managed. (Page: 580)
Answer for Question: Managing the IS/ IT that support the modern business processes of
companies today is a major challenge for both business and IT managers. Managing IT in a
large company has three major components:
1. Managing the joint development and implication of business/IT strategies: this
approach led by CEO and CIO, Proposals are developed by business and IT managers
and professionals regarding the use of IT to support the strategic business priorities of
the company.
2. Managing the development and implementation of new business/IT applications and
technologies: which is the primary responsibility of the CIO & CTO. In this component
17
18