Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Unit-I 2 Mark Questions

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 22

UNIT-I

INTRODUCTION

2 MARK QUESTIONS

1. What is System?

A system is a combination or arrangement of parts to form an integrated whole according to some


common principles or rules. A system is a plan or method of doing something. A system is an
assembly of elements arranged in a local order to achieve certain objectives. The organization is
also a system of people where people are selected on the basis of number, quality and ability and
are placed in hierarchical order plan and execute the business activities to achieve certain goals
and objectives.

2. Explain information.

Information is what is used in the act of informing or the state of being informed. Information
includes knowledge acquired by some means. It is processed data which in turn is collection of
raw facts, observations and figures.

3. What is meant by Management?

Management is the process of allocating an organization's inputs, including human and economic
resources, by planning, organizing, directing, and controlling for the purpose of producing goods
or services desired by customers so that organizational objectives are accomplished.

4. Define MIS.

Information system at the management level of an organization that serves the functions of
planning, controlling, and decision making by providing routine summary and exception reports.

5. What do you mean by Data?


Data is a series of non-random symbols, numbers, values or words, a series of facts obtained by
observation or research, a collection of non-random facts, the record of an event or fact. Examples
of Data: Today’s date, Measurements taken on a production line, Records of business
transactions.

[117]
6. Distinguish between Data and Information

S.N DATA INFORMATION


o
1 Data is the raw facts Information is the processed data
2 Data is input Information is output
3 Data is unorganized information is organized
4 Data can’t add anything to Information enhances the knowledge
knowledge
5 Data doesn’t contain an element of Information contain an element of surprise
surprise

7. List out the different types of Information.


a) Action vs. Non Action:
b) Historical, Present, and Futuristic:
c) Documentary V,s. Non Documentary:
d) Formal Vs. Informal
e) Short Term Vs, Long Term
f) Internal Vs. External
g) Recurring Vs. Non Recurring

8. Explain any two types of Information

Formal Vs. Informal: Information generated through is known as formal information. For
example, the financial reports, balance sheets, production plans etc. Similarly any information
which not generated formally, like office gossip is informal information.
Action vs. Non Action: Any information on receiving it if one has to take certain action is known
as action information. For example, if one receives information that something is wrong in the
production line then immediate action has to be taken to rectify the matter.

9. List out the Characteristics of Information

a) Timeliness
b) Appropriateness
c) Accuracy
d) Conciseness
e) Frequency
f) Understandability
g) Relevant
h) Complete
i) Current
j) Economical
[118]
10. What is Intelligence?
Intelligence: Change from an information organizer to an intelligence analyst: What does the
information mean? What are the implications? Are there any trends? If there are any gaping
questions that are unanswered, ask if more data will help you make your decision. If yes, then get
it; if not, then it is time to act.
11. Define IT.
Information technology refers to all forms of technology applied to processing, storing, and
transmitting information in electronic form.

12. What is Information System?


An organized combination of People, Hardware, Software, Communication networks, and Data
resources, that collects, transforms and disseminates information in an organization.

13. Explain the functions of information system.


1. It is a major functional area of a business as like accounting, finance, operations management,
marketing, marketing, and HRM.
2. It is an important contributor to operational efficiency, employee productivity and morale, and
customer service and satisfaction.
3. It is a major source of information and support needed to promote effective decision making by
managers.
4. It is an important ingredient in developing competitive products and services that give an
organization a strategic advantage in the global marketplace.
5. It is a major part of the resources of an enterprise and its cost of doing business, thus posing a
major resource management challenge.
6. A vital, dynamic, and challenging career opportunity for millions of men and women

14. List out the different Activities of Information System


a. Input of data resource
b. Processing of data into information
c. Output of information products
d. Storage of data resource
e. Control of system performance

15. What are all the components of Information System?


i. People,
ii. Hardware,
iii. Software,
iv. Data, and
v. Networks

16. Clearly list out the Software and Hardware Components of Information System
Hardware Resources: Computer systems, Computer peripherals,
Software Resources: System Software, Application, Software, Procedures

[119]
17. Explain the Evolution process of MIS from EDP.
Until the 1960s, the role of most information systems was simple. They were mainly used for
electronic data processing (EDP), purposes such as transactions processing, record-keeping and
accounting. EDP is often defined as the use of computers in recording, classifying, manipulating,
and summarizing data. It is also called transaction processing systems (TPS), automatic data
processing, or information processing.

Transaction processing systems – these process data resulting from business transactions,
update operational databases, and produce business documents. Examples: sales and inventory
processing and accounting systems.

18. Name out the Six Different Information Systems used in different level of management
a) Executive Support Systems (ESS)
b) Management Information Systems (MIS)
c) Decision Support Systems (DSS)
d) Knowledge Work Systems (KWS)
e) Office Automation Systems (OAS)
f) Transaction Processing Systems (TPS)

19. What is Executive Information System?

Information system at the strategic level of an organization that addresses unstructured decision making
through advanced graphics and communications.
20. Define KWS

Information system that aids knowledge workers in the creation and integration of new
knowledge in the organization

UNIT-II

2 MARK QUESTIONS

1. What is system development life cycle?


The Systems Development Life Cycle (SDLC) is a conceptual model used in project
management that describes the stages involved in an information. system development
project from an initial feasibility study through maintenance of the completed application.

2. What is feasibility study?


Expanding on the Initial Idea, the Feasibility Study involves drawing up the terms of
reference, which state the objectives and scope of the project, how long it should take and
how the results should be presented.

[120]
3. What are the different stages of system development life cycle?
 Feasibility study
 Analysis
 Design
 Implementation
 Testing
 Development
 Maintenance

4. What is system software lifecycle model?


Software life cycle models describe phases of the software cycle and the order in which
those phases are executed. 

5. Explain waterfall model.


This is the most common and classic of life cycle models, also referred to as a linear-
sequential life cycle model. In a waterfall model, each phase must be completed in its
entirety before the next phase can begin. 

6. Depict waterfall diagram.

7. Explain v shaped model?


The V-Shaped life cycle is a sequential path of execution of processes.  Each phase must be
completed before the next phase begins. 

8. Write any two merits and demerits of waterfall model


Merits
 Simple and easy to use.
 Easy to manage due to the rigidity of the model – each phase has specific
deliverables and a review process.

Demerits

[121]
 Adjusting scope during the life cycle can kill a project
 No working software is produced until late during the life cycle.

9. Explain incremental model.


The incremental model is an intuitive approach to the waterfall model.  Multiple
development cycles take place here, making the life cycle a “multi-waterfall” cycle.  Cycles
are divided up into smaller, more easily managed iterations. 

10. What are the merits and demerits of incremental model?


Merits
 Generates working software quickly and early during the software life cycle.
 More flexible – less costly to change scope and requirements.
 Easier to test and debug during a smaller iteration.

Demerits

 Each phase of an iteration is rigid and do not overlap each other.


 Problems may arise pertaining to system architecture because not all
requirements are gathered up front for the entire software life cycle.
11. Explain spiral model.
The spiral model is similar to the incremental model, with more emphases placed on risk
analysis.  The spiral model has four phases: Planning, Risk Analysis, Engineering and
Evaluation.

12. What are the four phases of spiral model?


 Planning,
 Risk Analysis,
 Engineering and
 Evaluation.

13. What are the three activities of system design?


 user interface,
 data, and
 process design.

14. What is data and data flow diagram?


[122]
o Data flow is data flowing between processes, data stores and external entities. It is
data in motion, moving from one place in a system to another.
o Data flow diagram is a method to illustrate how data flows in a system. DFD are
versatile diagramming tools. Only 4 symbols are used to represent both physical
and logical information system

15. What is context diagram?


Context Diagram is the highest level DFD.It defines the boundaries of a system by
showing a single major process and the data inputs and output & entities involved. A
common way to begin is to model the whole system by one process. The DFD that is
involved in this is known as the Context Diagram.

16. What are the components of ERD?


 Object types
 Relationships
 Associative object type indicators
 Super type / Sub type indicators

17. Explain object modeling technique.

The object-modeling technique (OMT) is an object modeling language for software


modeling and designing. OMT was developed as an approach to software development. The
purposes of modeling according to Rumbaugh are:

 testing physical entities before building them (simulation),


 communication with customers,
 visualization (alternative presentation of information), and
 reduction of complexity.

18. What is DBMS?

A database management system is a set of software programs that allows users to


create, edit and update data in database files, and store and retrieve data from those database
files. Data in a database can be added, deleted, changed, sorted or searched all using a
DBMS.

[123]
19. What are inputs to the financial information system?

 Strategic plan or corporate policies


o Contains major financial objectives and often projects financial needs.
 Transaction processing system (TPS)
o Important financial information collected from almost every TPS – payroll,
inventory control, order processing, accounts payable, accounts receivable, general
ledger.
o External sources
o Annual reports and financial statements of competitors and general news items.

20. What is MIS?


A marketing information system (MIS) is a set of procedures and methods designed to
generate, analyze, disseminate, and store anticipated marketing decision information on a
regular, continuous basis. An information system can be used operationally, managerially,
and strategically for several aspects of marketing.

UNIT – III

2 MARK QUESTIONS

1. What is meant by FIS?

Financial MIS Provides financial information to all financial managers within an


organization. It integrates financial & operational information from multiple sources. Financial
MIS eases analysis by providing fast financial data. It enables financial analysis from different
aspects; time, product, customer.

2. What are all the sources for Financial Information System?

a) Transaction Data: The Transactions of revenues and expenses incurred from each functional
area.
b) Forecasting Data: To compare the actual transition with the anticipated as per the forecast.
c) Financial Intelligence Data: Banks, Government, Stock market, etc.
d) Strategic Plans : The organization’s goal is to increase profits by 30 percent

3. Define Marketing Information System.

[124]
A marketing information system (MIS) is a set of procedures and methods designed to
generate, analyze, disseminate, and store anticipated marketing decision information on a regular,
continuous basis. An information system can be used operationally, managerially, and strategically
for several aspects of marketing.

4. What are all the advantages of Marketing Information System?


A Marketing Information System offers many advantages:
1. Organized data collection.
2. A broad perspective.
3. The storage of important data.
4. An avoidance of crises.
5. Coordinated marketing plans.
6. Speed in obtaining sufficient information to make decisions.
7. Data amassed and kept over several time periods.
8. The ability to do a cost-benefit analysis

5. What are the two basic types of production methods?


1) Job Shop Production: each order taken by the firm is considered to be a job.
2) Process Production: Goods are produced at a mass scale for general consumption.

6. List out the outputs of Personnel Information System

a) Organizational Resources Planning: It provides proper acquisition and


allocation of the resources of manpower to the required areas of work.
b) Organizational Management: The train and develop the employees of
training and development needs of personals at all levels. Development of suitable training
programmes and employees development programmes.
Payroll and Administration: Distribution of employees’ wages, salaries, incentive payments and
fringe benefits and compensation

7. What is DSS?

Decision Support Systems (DSS) are a class of computerized information systems that support
decision-making activities. DSS are interactive computer-based systems and subsystems intended
to help decision makers use communications technologies, data, documents, knowledge and/or
models to successfully complete decision process tasks.

8. What are the characteristics of DSS?


1. Semi-structured, unstructured decisions
2. Focused of specific decisions
3. Presentation in the form of graphics
4. Develop through prototype(example), iterative process

[125]
9. List out the different types of DSS.
• Data-Driven DSS
• Model-Driven DSS
• Knowledge-Driven DSS
• Document-Driven DSS
• Communications-Driven and Group DSS
• Inter-Organizational or Intra-Organizational DSS
• Function-Specific or General Purpose DSS

10. Mention the components of DSS.

Decision Support Systems has four major components namely

• The user interface


• The database
• The models and analytical tools and
• The DSS architecture and network

11. Draft the framework of DSS.

The following is the framework of DSS

[126]
12. What is EIS?

An Executive Information System (EIS) is a type of management information system intended to


facilitate and support the information and decision-making needs of senior executives by providing
easy access to both internal and external information relevant to meeting the strategic goals of the
organization.

13.Name the several types of interfaces available for EIS.

Several types of interfaces can be available to the EIS structure, such as scheduled reports,
questions/answers, menu driven, command language, natural language, and input/output.

14. What are the advantages of EIS?


Advantages of EIS
 Easy for upper-level executives to use, extensive computer experience is not required in
operations
 Provides timely delivery of company summary information
 Information that is provided is better understood
 Filters data for management
 Improves to tracking information
 Offers efficiency to decision makers

15. What is mean by GIS?

A geographic information system (GIS), or geographical information system, is any system


that captures, stores, analyzes, manages, and presents data that are linked to location.

16. Name the applications of GIS.

GIS technology can be used for

a) scientific investigations,
b) resource management,
c) asset management,
d) archaeology,
e) environmental impact assessment,
f) urban planning,
[127]
g) cartography,
h) criminology,
i) geographic history,
j) marketing,
k) logistics,
l) prospectively mapping, and other purposes.

17. Define GIS.

A geographic information system (GIS) is a computer-based tool for mapping and analyzing things
that exist and events that happen on Earth.

18. What is Knowledge Management System?

Knowledge Management System (KM System) refers to a system for managing knowledge in
organizations for supporting creation, capture, storage and dissemination of information. It can
comprise a part of a Knowledge Management initiative.

19. What is the purpose of KMS?

The idea of a KM system is to enable employees to have ready access to the organization's
documented base of facts, sources of information, and solutions. For example a typical claim
justifying the creation of a KM system might run something like this: an engineer could know the
metallurgical composition of an alloy that reduces sound in gear systems. Sharing this information
organization wide can lead to more effective engine design and it could also lead to ideas for new
or improved equipment.

20. Mention the advantages of KM systems

Some of the advantages claimed for KM systems are:

1. Sharing of valuable organizational information throughout organizational hierarchy.


2. Can avoid re-inventing the wheel, reducing redundant work.
3. May reduce training time for new employees
4. Retention of Intellectual Property after the employee leaves if such knowledge can be
codified.
5. Time management.

21. Define International Information System.


[128]
International Information System is defined as “distributed information systems which support
similar business activities in highly diverse environments commonly found across country
boundaries.”

22. What are the major dimensions of IIS?

The major dimensions for developing international information systems architecture are

1. The global environment


2. The corporate global strategies
3. The structure of the organization
4. The management and business processes
5. The technology platform

UNIT – IV
2 MARK QUESTIONS

1.What is mean by Information Security?


Information security means protecting information and information systems from unauthorized
access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction.

2. What is software security?


Software security—the process of designing, building, and testing software for security—identifies
and expunges problems in the software itself.

3. List out the elements of Information Security.

The six atomic elements of information are confidentiality, possession, integrity, authenticity,
availability, and utility.

4. What is integrity?
In information security, integrity means that data cannot be modified undetectably. Integrity is
violated when a message is actively modified in transit. Information security systems typically
provide message integrity in addition to data confidentiality.

[129]
5. What is authenticity?
In computing, e-Business, and information security, it is necessary to ensure that the data,
transactions, communications or documents (electronic or physical) are genuine. It is also important
for authenticity to validate that both parties involved are who they claim they are.

6. Name the complementary layers of Information Security.


The following are the complementary layers of the Information Security.
 Hardware/software
 Administrative
 Personnel
 Physical

7. Define testing.

Testing can also be stated as the process of validating and verifying that a software
program/application/product:

 meets the business and technical requirements that guided its design and development;
 works as expected; and
 can be implemented with the same characteristics.

8. What is Alpha Testing?


Alpha testing is simulated or actual operational testing by potential users/customers or an
independent test team at the developers' site. Alpha testing is often employed for off-the-shelf
software as a form of internal acceptance testing, before the software goes to beta testing.

9. What is Error Detection and Correction?

Error detection and correction or error control is techniques that enable reliable delivery of digital
data over unreliable communication channels. Many communication channels are subject to
channel noise, and thus errors may be introduced during transmission from the source to a receiver.
Error detection techniques allow detecting such errors, while error correction enables
reconstruction of the original data.

[130]
10. Mention various Error detection schemes
 Repetition codes
 Parity bits
 Checksums
 Cyclic redundancy checks (CRCs)
 Cryptographic hash functions

11. What are the different types of controls?


 Administrative
 Logical
 Physical
 Access control
12. What is Cryptography?
Cryptography is used in information security to protect information from unauthorized or
accidental disclosure while the information is in transit (either electronically or physically) and
while information is in storage. Information security uses cryptography to transform usable
information into a form that renders it unusable by anyone other than an authorized user; this
process is called encryption. Information that has been encrypted (rendered unusable) can be
transformed back into its original usable form by an authorized user, who possesses the
cryptographic key, through the process of decryption.

13. What is IS Vulnerability?


The existence of a weakness, design, or implementation error that can lead to an unexpected,
undesirable event compromising the security of the computer system, network, application, or
protocol involved.

14. Define Computer Crime.


Computer crime is defined by the Association of Information Technology Professionals (AITP) as
including (1) the unauthorized use, access, modification, and destruction of hardware, software,
data, or network resources; (2) the unauthorized release of information; (3) the unauthorized
copying of software; (4) denying an end user access to his or her own hardware, software, data, or
network resources; and (5) using or conspiring to use computer or network resources to obtain
information or tangible property illegally.

15. State few computer crimes commonly occurring in the society.

 Hacking and Cracking

[131]
 Cyber-Theft
 Cyber terrorism
 Unauthorized Use at Work
 Software Piracy
 Theft of Intellectual Property
 Computer Viruses and Worms

16. What is Cyber-Terrorism?


Cyber terrorism is the leveraging of an organization or government’s computers and information,
particularly via the Internet, to cause physical, real-world harm or severe disruption of
infrastructure.

17. Mention the basic security requriments for web, intranets and wireless networks.
Basic security requirements consist of:
 Verification of user credentials and services to define user access.
 Client integrity checks that consists of endpoint security verification and of redirecting users to
predefined subnets to download compliant anti-virus software, firewalls, operating systems
updates, and patches.
 Firewall rules such as granular access control and packet filtering based on protocol, port, and
destination.

18. What is IS Audit?

IS Audit is a “formal inspec-tion and verification to check whether a Standard or set of guidelines
is being followed, that Re-cords are accurate, or that Efficiency and Effectiveness targets are being
met. An Audit may be carried out by internal or external groups.”

19. State the objectives of security audit.

A security audit has the main objectives to:


o Check the existence security policy, standards, guidelines and procedures;

o Identify the inadequacies and examine the effectiveness of the existing policy, standards,
guidelines and procedures;

o Identify and understand the existing vulner-abilities and risks;

[132]
o Review existing security controls on opera-tional, administrative and managerial issues, and
ensure compliance to minimum security standards;

o Provide recommendations and corrective ac-tions for improvements.

20. Define Computer ethics.

Computer ethics is defined as the analysis of the nature and social impact of computer technology
and the corresponding formulation and justification of policies for the ethical use of such a
technology.

UNIT –V

2 MARK QUESTIONS

1. Define E-business

Electronic business, commonly referred to as "eBusiness" or "e-business", may be defined as the


application of information and communication technologies (ICT) in support of all the activities of
business.

2. What are the classifications of E-Bussiness?

Roughly dividing the world into providers/producers and consumers/clients one can classify
E-businesses into the following categories:

 business-to-business (B2B)
 business-to-consumer (B2C)
 business-to-employee (B2E)
 Business-to-government (B2G)
 government-to-business (G2B)
 government-to-government (G2G)
 government-to-citizen (G2C)
 consumer-to-consumer (C2C)
 consumer-to-business (C2B)

[133]
3. List out some of the E-Business models.

The following is a list of the currently most adopted e-business models such as:

 E-shops
 E-commerce
 E-procurement
 E-malls
 E-auctions
 Virtual Communities
 Collaboration Platforms
 Third-party Marketplaces
 Value-chain Integrators
 Value-chain Service Providers
 Information Brokerage
 Telecommunication

4. What is mean by E-Governance?

E-Governance is the application of Information and Communication Technology (ICT) for


delivering government services, exchange of information communication transactions, integration
various stand-one systems and services between Government-to-Citizens (G2C), Government-to-
Business(G2B),Government-to-Government( G2G) as well as back office processes and
interactions within the entire government frame work.

5. Name the three main target groups in the concept of Governance.

The three main target groups that can be distinguished in governance concepts are Government,
citizens and businesses/interest groups.

6. What is Pervasive Computing?

Ubiquitous computing (ubicomp) is a post-desktop model of human-computer interaction in


which information processing has been thoroughly integrated into everyday objects and activities.
In the course of ordinary activities, someone "using" ubiquitous computing engages many
computational devices and systems simultaneously, and may not necessarily even be aware that
they are doing so. This model is usually considered advancement from the desktop paradigm.

[134]
7. Define Supply Chain Management.

Supply chain management can be defined as the way a company finds the raw components it needs
to make products or services, produces those products or services, and delivers them to customers.

8. List out the five basic steps in Supply Chain Management.

The following are the five basic steps in Supply Chain Management

 Plan
 Source
 Make
 Deliver
 Return

9. Define ERP.

Enterprise Resource Planning is a process by which a company (often a manufacturer) manages and


integrates the important parts of its business. An ERP management information
system integrates areas such as planning, purchasing, inventory, sales, marketing, finance, human
resources, etc.

10. What are the Characteristics of ERP systems?

ERP (Enterprise Resource Planning) systems typically include the following characteristics:

• An integrated system that operates in real time (or next to real time), without relying on
periodic updates.
• A common database, which supports all applications.
• A consistent look and feel throughout each module.
• Installation of the system without elaborate application/data integration by the Information
Technology (IT) department.

[135]
11. Mention the components of ERP systems.

 Transactional database
 Management portal/dashboard
 Business intelligence system
 Customizable reporting
 External access via technology such as web services
 Search
 Document management
 Messaging/chat
 Workflow management

12. What is the objective of ERP?

ERP’s main objective is to attempt to integrate all departments and functions across a company
onto a single computer system that can serve all those departments’ particular needs—for example,
building a single software program that serves the needs of people in the finance department as well
as those of the human resources (HR) department and in warehousing. ERP creates a single,
integrated system that runs on an enterprise-wide database, so that the various departments can
more easily share information and communicate with each other.

13. Define e-CRM.

E-CRM is defined as activities to manage customer relationships by using the Internet, web
browsers or other electronic touch points.

14. Name the different levels of e-CRM.

 Foundational services
 Customer-centered services
 Value-added services

15. List down the factors to be considered for implementing CRM.

 Create a customer-based culture in the organization.


 Adopt customer-based managers to assess satisfaction.
[136]
 Develop an end-to-end process to serve customers.
 Recommend questions to be asked to help a customer solve a problem.
 Track all aspects of selling to customers, as well as prospects.

16. What is Business Intelligence?

Business Intelligence (BI) refers to computer-based techniques used in spotting, digging-out, and
analyzing business data, such as sales revenue by products or departments or associated costs and
incomes.
17. What are the functions of Business Intelligence Technologies?

Common functions of Business Intelligence technologies are reporting, online analytical


processing, analytics, data mining, business performance management, benchmarking, text mining,
and predictive analytics.
18. What is Maturity Model?

A maturity model can be described as a structured collection of elements that describe certain
aspects of maturity in an organization. A maturity model may provide, for example:

 a place to start
 the benefit of a community’s prior experiences
 a common language and a shared vision
 a framework for prioritizing actions
 A way to define what improvement means for your organization.

19. What is Data Mining?

Data mining is the extraction of hidden predictive information from large databases. It is a
powerful new technology to help companies focus on the most important information in their data
warehouses. Data mining tools predict future trends and behaviors, allowing businesses to make
proactive, knowledge-driven decisions.

20. What is Data warehousing?

A data warehouse is a subject-oriented, integrated, time-variant and non-volatile collection of data


in support of management's decision making process. Data warehousing implements the process to
access heterogeneous data sources; clean, filter, and transform the data; and store the data in a

[137]
structure that is easy to access, understand, and use. The data is then used for query, reporting, and
data analysis.

[138]

You might also like