Unit-I 2 Mark Questions
Unit-I 2 Mark Questions
Unit-I 2 Mark Questions
INTRODUCTION
2 MARK QUESTIONS
1. What is System?
2. Explain information.
Information is what is used in the act of informing or the state of being informed. Information
includes knowledge acquired by some means. It is processed data which in turn is collection of
raw facts, observations and figures.
Management is the process of allocating an organization's inputs, including human and economic
resources, by planning, organizing, directing, and controlling for the purpose of producing goods
or services desired by customers so that organizational objectives are accomplished.
4. Define MIS.
Information system at the management level of an organization that serves the functions of
planning, controlling, and decision making by providing routine summary and exception reports.
[117]
6. Distinguish between Data and Information
Formal Vs. Informal: Information generated through is known as formal information. For
example, the financial reports, balance sheets, production plans etc. Similarly any information
which not generated formally, like office gossip is informal information.
Action vs. Non Action: Any information on receiving it if one has to take certain action is known
as action information. For example, if one receives information that something is wrong in the
production line then immediate action has to be taken to rectify the matter.
a) Timeliness
b) Appropriateness
c) Accuracy
d) Conciseness
e) Frequency
f) Understandability
g) Relevant
h) Complete
i) Current
j) Economical
[118]
10. What is Intelligence?
Intelligence: Change from an information organizer to an intelligence analyst: What does the
information mean? What are the implications? Are there any trends? If there are any gaping
questions that are unanswered, ask if more data will help you make your decision. If yes, then get
it; if not, then it is time to act.
11. Define IT.
Information technology refers to all forms of technology applied to processing, storing, and
transmitting information in electronic form.
16. Clearly list out the Software and Hardware Components of Information System
Hardware Resources: Computer systems, Computer peripherals,
Software Resources: System Software, Application, Software, Procedures
[119]
17. Explain the Evolution process of MIS from EDP.
Until the 1960s, the role of most information systems was simple. They were mainly used for
electronic data processing (EDP), purposes such as transactions processing, record-keeping and
accounting. EDP is often defined as the use of computers in recording, classifying, manipulating,
and summarizing data. It is also called transaction processing systems (TPS), automatic data
processing, or information processing.
Transaction processing systems – these process data resulting from business transactions,
update operational databases, and produce business documents. Examples: sales and inventory
processing and accounting systems.
18. Name out the Six Different Information Systems used in different level of management
a) Executive Support Systems (ESS)
b) Management Information Systems (MIS)
c) Decision Support Systems (DSS)
d) Knowledge Work Systems (KWS)
e) Office Automation Systems (OAS)
f) Transaction Processing Systems (TPS)
Information system at the strategic level of an organization that addresses unstructured decision making
through advanced graphics and communications.
20. Define KWS
Information system that aids knowledge workers in the creation and integration of new
knowledge in the organization
UNIT-II
2 MARK QUESTIONS
[120]
3. What are the different stages of system development life cycle?
Feasibility study
Analysis
Design
Implementation
Testing
Development
Maintenance
Demerits
[121]
Adjusting scope during the life cycle can kill a project
No working software is produced until late during the life cycle.
Demerits
[123]
19. What are inputs to the financial information system?
UNIT – III
2 MARK QUESTIONS
a) Transaction Data: The Transactions of revenues and expenses incurred from each functional
area.
b) Forecasting Data: To compare the actual transition with the anticipated as per the forecast.
c) Financial Intelligence Data: Banks, Government, Stock market, etc.
d) Strategic Plans : The organization’s goal is to increase profits by 30 percent
[124]
A marketing information system (MIS) is a set of procedures and methods designed to
generate, analyze, disseminate, and store anticipated marketing decision information on a regular,
continuous basis. An information system can be used operationally, managerially, and strategically
for several aspects of marketing.
7. What is DSS?
Decision Support Systems (DSS) are a class of computerized information systems that support
decision-making activities. DSS are interactive computer-based systems and subsystems intended
to help decision makers use communications technologies, data, documents, knowledge and/or
models to successfully complete decision process tasks.
[125]
9. List out the different types of DSS.
• Data-Driven DSS
• Model-Driven DSS
• Knowledge-Driven DSS
• Document-Driven DSS
• Communications-Driven and Group DSS
• Inter-Organizational or Intra-Organizational DSS
• Function-Specific or General Purpose DSS
[126]
12. What is EIS?
Several types of interfaces can be available to the EIS structure, such as scheduled reports,
questions/answers, menu driven, command language, natural language, and input/output.
a) scientific investigations,
b) resource management,
c) asset management,
d) archaeology,
e) environmental impact assessment,
f) urban planning,
[127]
g) cartography,
h) criminology,
i) geographic history,
j) marketing,
k) logistics,
l) prospectively mapping, and other purposes.
A geographic information system (GIS) is a computer-based tool for mapping and analyzing things
that exist and events that happen on Earth.
Knowledge Management System (KM System) refers to a system for managing knowledge in
organizations for supporting creation, capture, storage and dissemination of information. It can
comprise a part of a Knowledge Management initiative.
The idea of a KM system is to enable employees to have ready access to the organization's
documented base of facts, sources of information, and solutions. For example a typical claim
justifying the creation of a KM system might run something like this: an engineer could know the
metallurgical composition of an alloy that reduces sound in gear systems. Sharing this information
organization wide can lead to more effective engine design and it could also lead to ideas for new
or improved equipment.
The major dimensions for developing international information systems architecture are
UNIT – IV
2 MARK QUESTIONS
The six atomic elements of information are confidentiality, possession, integrity, authenticity,
availability, and utility.
4. What is integrity?
In information security, integrity means that data cannot be modified undetectably. Integrity is
violated when a message is actively modified in transit. Information security systems typically
provide message integrity in addition to data confidentiality.
[129]
5. What is authenticity?
In computing, e-Business, and information security, it is necessary to ensure that the data,
transactions, communications or documents (electronic or physical) are genuine. It is also important
for authenticity to validate that both parties involved are who they claim they are.
7. Define testing.
Testing can also be stated as the process of validating and verifying that a software
program/application/product:
meets the business and technical requirements that guided its design and development;
works as expected; and
can be implemented with the same characteristics.
Error detection and correction or error control is techniques that enable reliable delivery of digital
data over unreliable communication channels. Many communication channels are subject to
channel noise, and thus errors may be introduced during transmission from the source to a receiver.
Error detection techniques allow detecting such errors, while error correction enables
reconstruction of the original data.
[130]
10. Mention various Error detection schemes
Repetition codes
Parity bits
Checksums
Cyclic redundancy checks (CRCs)
Cryptographic hash functions
[131]
Cyber-Theft
Cyber terrorism
Unauthorized Use at Work
Software Piracy
Theft of Intellectual Property
Computer Viruses and Worms
17. Mention the basic security requriments for web, intranets and wireless networks.
Basic security requirements consist of:
Verification of user credentials and services to define user access.
Client integrity checks that consists of endpoint security verification and of redirecting users to
predefined subnets to download compliant anti-virus software, firewalls, operating systems
updates, and patches.
Firewall rules such as granular access control and packet filtering based on protocol, port, and
destination.
IS Audit is a “formal inspec-tion and verification to check whether a Standard or set of guidelines
is being followed, that Re-cords are accurate, or that Efficiency and Effectiveness targets are being
met. An Audit may be carried out by internal or external groups.”
o Identify the inadequacies and examine the effectiveness of the existing policy, standards,
guidelines and procedures;
[132]
o Review existing security controls on opera-tional, administrative and managerial issues, and
ensure compliance to minimum security standards;
Computer ethics is defined as the analysis of the nature and social impact of computer technology
and the corresponding formulation and justification of policies for the ethical use of such a
technology.
UNIT –V
2 MARK QUESTIONS
1. Define E-business
Roughly dividing the world into providers/producers and consumers/clients one can classify
E-businesses into the following categories:
business-to-business (B2B)
business-to-consumer (B2C)
business-to-employee (B2E)
Business-to-government (B2G)
government-to-business (G2B)
government-to-government (G2G)
government-to-citizen (G2C)
consumer-to-consumer (C2C)
consumer-to-business (C2B)
[133]
3. List out some of the E-Business models.
The following is a list of the currently most adopted e-business models such as:
E-shops
E-commerce
E-procurement
E-malls
E-auctions
Virtual Communities
Collaboration Platforms
Third-party Marketplaces
Value-chain Integrators
Value-chain Service Providers
Information Brokerage
Telecommunication
The three main target groups that can be distinguished in governance concepts are Government,
citizens and businesses/interest groups.
[134]
7. Define Supply Chain Management.
Supply chain management can be defined as the way a company finds the raw components it needs
to make products or services, produces those products or services, and delivers them to customers.
The following are the five basic steps in Supply Chain Management
Plan
Source
Make
Deliver
Return
9. Define ERP.
ERP (Enterprise Resource Planning) systems typically include the following characteristics:
• An integrated system that operates in real time (or next to real time), without relying on
periodic updates.
• A common database, which supports all applications.
• A consistent look and feel throughout each module.
• Installation of the system without elaborate application/data integration by the Information
Technology (IT) department.
[135]
11. Mention the components of ERP systems.
Transactional database
Management portal/dashboard
Business intelligence system
Customizable reporting
External access via technology such as web services
Search
Document management
Messaging/chat
Workflow management
ERP’s main objective is to attempt to integrate all departments and functions across a company
onto a single computer system that can serve all those departments’ particular needs—for example,
building a single software program that serves the needs of people in the finance department as well
as those of the human resources (HR) department and in warehousing. ERP creates a single,
integrated system that runs on an enterprise-wide database, so that the various departments can
more easily share information and communicate with each other.
E-CRM is defined as activities to manage customer relationships by using the Internet, web
browsers or other electronic touch points.
Foundational services
Customer-centered services
Value-added services
Business Intelligence (BI) refers to computer-based techniques used in spotting, digging-out, and
analyzing business data, such as sales revenue by products or departments or associated costs and
incomes.
17. What are the functions of Business Intelligence Technologies?
A maturity model can be described as a structured collection of elements that describe certain
aspects of maturity in an organization. A maturity model may provide, for example:
a place to start
the benefit of a community’s prior experiences
a common language and a shared vision
a framework for prioritizing actions
A way to define what improvement means for your organization.
Data mining is the extraction of hidden predictive information from large databases. It is a
powerful new technology to help companies focus on the most important information in their data
warehouses. Data mining tools predict future trends and behaviors, allowing businesses to make
proactive, knowledge-driven decisions.
[137]
structure that is easy to access, understand, and use. The data is then used for query, reporting, and
data analysis.
[138]