Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 2

Mumbai University

TPCT’s, TERNA ENGINEERING COLLEGE (TEC), NAVI MUMBAI


COMPUTER ENGINEERING DEPARTMENT
AY:2023-24
Sub: MIS(ILO-7013)
BE-A
Semester: VII
Due Date: 12 August 2023

Course Outcomes:
1. Explain computer based information systems and their impact on organization and society .
2. Explain the usage of tools & techniques for accessing and analyzing information for
decision making
3. Explain the security issues in information systems and methods to protect them
4. Understand Internet based businesses like e-commerce and m-commerce
5. Understand wired and wireless networks and the cloud computing model
6. Understand the various Information systems used by organizations and the methodologies
adopted for their implementation

Assignment I

Sr. Quetions CO’s Mapping


No
1. Identify the reasons why being an informed user of information CO1
systems is important in today’s world.

2. Describe the various types of computer-based Management CO1


Information Systems adopted by an organization.

3. Explain several ways in which IT impacts employees at work. How CO1


does IT change a manager’s job.

4 A canteen wants to design a data warehouse with respect to the four CO2
dimensions: customer, food items, category and bill
a) Design tables assuming suitable attributes and normalize the
database
b) Define primary key, foreign key with its importance in
database design. List the primary and foreign keys in each of
the above tables
c) Draw star schema and snowflake schema for the above design
d) Explain difference between star schema and snowflake
schema

5 Explain characteristics of a Data warehouse. Differentiate between a CO2


data warehouse and a data mart.

6. Define Big data and explain the various characteristics and issues of CO2
Mumbai University
TPCT’s, TERNA ENGINEERING COLLEGE (TEC), NAVI MUMBAI
Big Data.

7. Define Business intelligence and explain its applications for Data CO2
Analysis

8. Identify the factors that contribute to increasing vulnerability of CO3


information resources
9. Explain the different types of deliberate attacks on information CO3
systems
10. Identify the three major types of controls that organizations can CO3
use to protect their information resources and provide an
example of each

You might also like