0% found this document useful (0 votes)
6 views91 pages

Mis Pyqs and Ia Sol for Ese

Download as pdf or txt
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 91

May 23, Dec 23, Dec 22, Dec 19,

I]
• Introduction To Information Systems (IS): Computer Based Information Systems, Impact
of IT on organizations, Importance of IS to Society.
• Organizational Strategy
• Competitive Advantages and IS.

Sr Questions Marks Repeat


1 What is information system? Explain the necessary element with neat diagram./ 05 03
Explain in detail computer-based information systems. 10
2 Explain importance of Information system. IA
3 List the types of Information system? Explain in brief./ 10 03
What are the different types of MIS?/ 05
What is an Information system? Briefly discuss the various types of computer 10
based information systems.
What are the different types of MIS? Contrast at least two different types of 10
Information System development models./

Contrast the relative objectives of each type of the following types of Information 10
Systems with
an example:
a. TPS
b. DSS
c. OSS
4 Explain the impact of information system on organization and society./ 10,IA 04
How Does IT Impact Organizations?/ 05
Explain the importance of Information systems to Society. 05
5 Categorize the approach to managing information across an entire organization 05
6 Bring out the relevance of the Information System to society. How does a IA
DSS support an organization?
7 What are the components of an information system? Discuss the relevance IA
of information systems to organizational strategy.
8 Discuss competitive advantage achieved in Information System. 10,IA

1 What is information system? Explain the necessary element with neat diagram./ 05 02
Explain in detail computer-based information systems. 10
Information System
An information system is a mechanism designed to collect, process, store, and distribute
information within and outside an organization to improve its effectiveness and efficiency.
It's a combination of people, hardware, software, communication networks, data resources,
policies, and procedures that work together to manage information.

• Purpose: To enhance organizational efficiency and effectiveness.


• Components: People, hardware, software, communication networks, data resources,
policies, and procedures.
• Functions: Collect, process, store, and distribute information.
• Benefits: Helps organizations manage operations, interact with customers and suppliers,
and compete in the marketplace.
• Examples: Financial data processing, human resource management, customer
identification and outreach.
• Modern Trends: Cloud-based information systems and services.
Elements of IS:

1) Computer hardware: Every organization or individual today uses one or the other form
of computer hardware. It offers advantages as mentioned above and is the core element
on which the entire information system is built. Quick, easy, secure, and cost-effective
are key features of computer hardware.
2) Computer software: Software today rules the world through hardware devices. Millions
of apps available today for every human and business activity have empowered both the
customers as well as the organizations. Customized and packaged – both kinds of
software are available today to suit every business and personal need.
3) Communication networks: Communication networks have converted the world into a
global village with almost every individual and organization connected with each other
around the clock. All the new as well as old information today is instantly available for
access from remote locations. Organizations either use a public network or set up their
own to remain connected with customers, suppliers, and distributors on a real-time
basis.
4) Database: The core of any information system is data, and a huge collection of inter-
related data is called a database. Organizations spend a lot of time, efforts, and
resources in creating, processing, storing, and analyzing their databases. Simply put, they
make businesses more effective and efficient.
5) People: People’s ability to build an effective and efficient information system decides
how far it is going to succeed. People are the creators as well as users and the ultimate
beneficiaries of any information system. Employees and customers they both need
effective understanding of the information system to take advantage of it.

2 Explain importance of Information system. IA


Information systems play a crucial role in modern organizations by enhancing efficiency,
decision-making, and communication. Their importance can be summarized in several key
areas:
1) Data Management and Storage: Information systems facilitate the storage and
organization of vast amounts of data, making it easily accessible for analysis and
reporting. This capability allows businesses to manage operational data,
communication records, and historical documents effectively. By utilizing databases
and data warehouses, organizations can streamline their processes and improve data
retrieval times, which is essential for operational efficiency.
2) Enhanced Decision-Making: One of the primary advantages of information systems
is their ability to support informed decision-making. They provide accurate, timely
information that can be analyzed to evaluate different scenarios and outcomes. This
helps managers choose the best course of action based on comprehensive data
analysis, including potential costs and profits associated with various alternatives.
3) Improved Communication: Information systems enhance communication within
organizations by enabling rapid and efficient information sharing. Managers can store
documents in shared folders, allowing employees to access and collaborate on
important files seamlessly. This systematized approach to communication fosters
teamwork and ensures that all employees are aligned with the company's goals and
strategies.
4) Operational Efficiency: By automating routine tasks and processes, information
systems significantly improve operational efficiency. They simplify business
processes, reduce manual errors, and save time, allowing employees to focus on
more strategic activities. For instance, inventory management systems can
automatically track stock levels and reorder supplies, which optimizes resource
management.
5) Competitive Advantage: In today's fast-paced business environment, organizations
that effectively leverage information systems can gain a competitive edge. These
systems enable businesses to analyze market trends, customer preferences, and
operational performance, allowing for the development of new products and
services tailored to consumer needs. Companies that embrace innovative
information technologies are better positioned to adapt to changes and meet
customer expectations

3 List the types of Information system? Explain in brief./ 10 03


What are the different types of MIS?/ 05
What is an Information system? Briefly discuss the various types of computer 10
based information systems.
What are the different types of MIS? Contrast at least two different types of 10
Information System development models./
Contrast the relative objectives of each type of the following types of Information 10
Systems with
an example:
a. TPS
b. DSS
c. OSS
Information Systems have been designed to serve various functional areas. Business
organizations deploy various types of IS.
The very common and important types of IS:
1) Transaction Processing Systems (TPS)
2) Management Information Systems (MIS)
3) Decision Support Systems (DSS)
4) Executive’s Information Systems (EIS)
5) Enterprise Resource Planning (ERP) Systems
4 Explain the impact of information system on organization and society./ 10,IA 04
How Does IT Impact Organizations?/ 05
Explain the importance of Information systems to Society. 05
IS impact on organization:
• Better flow of information: Information systems have streamlined information flow
within organizations. Relevant information about work status, productivity, performance,
market conditions, government policies, and competitor moves is readily available,
facilitating better management decisions.
• Improves transaction processing: Information systems have improved transaction
processing, saving time, increasing data accuracy, and reducing costs. Transactions are
instantly recorded and processed, providing valuable insights into business processes.
• Supports decision making: Information systems enhance decision-making by providing
relevant, accurate, and timely information. This enables better analysis, leading to
informed decisions that help organizations overcome challenges and seize opportunities.
• Supports workgroup and team activity: Information systems provide centralized
information to workgroups and teams, fostering better communication and
collaboration. E-messaging and video conferencing enable teams to discuss issues and
plans without physical presence.
• Improves quality of goods and services: Real-time information helps organizations
maintain better control over production processes, ensuring timely delivery and
improved customer satisfaction.
• Provides executive support: Top executives have access to necessary information about
various business aspects, enabling them to analyze conditions, take corrective actions,
and plan future steps.
• Provides effective data management: Information systems store and process various
business-related data. This data is analyzed to identify critical areas. Data management
assists in formulating appropriate policies and action plans for different situations.
• Improves competitiveness: Information systems help organizations become more
efficient and effective. By better utilizing available resources, organizations can improve
overall operations and reduce costs, ultimately enhancing their competitiveness.
IS impact on Society:
Positive Impact:
• Effective communication system: Information systems have improved communication,
bringing people closer together through platforms like email, online chatting, and social
media.
• Availability of information: People have become more informed due to the ease of
accessing information online. Data warehouses store vast amounts of data, and
education levels have improved significantly.
• Improving globalization and reducing cultural gap: Information systems connect people
worldwide, promoting global interaction and reducing cultural barriers. Even customer-
to-customer business models have benefited.
• Getting better services: Organizations have improved their services to customers in
response to increased accessibility and customer expectations. Customers now have
more power to influence businesses through their choices and feedback.
• Getting a range of online services: Online services like shopping, banking, education,
healthcare, consultation, and bill payments have made people's lives easier by saving
time and money.
Negative Impact:
• Availability of too much information: The rapid growth of information systems has led
to information overload. Fake information can be harmful to society, and rumors spread
quickly. Controlling this misinformation is challenging.
• Increasing fraud: While information systems offer many benefits, they have also
increased online fraud. Billions of dollars are lost annually due to such activities.
• Lack of job security: The growth of information systems has reduced the demand for
traditional jobs, leading to job losses. While new jobs have been created, they are fewer
in number, contributing to job insecurity.
• Security threat: People's valuable data is at risk due to security threats. Data leaks and
theft are common, despite organizations' efforts to improve security systems.

5 Categorize the approach to managing information across an entire organization 05


Categorizing Information Management Approaches
To effectively manage information across an entire organization, a multi-faceted approach is
required. The key components of this approach can be categorized as follows:
1. Data Management: Establishing processes and systems for ingesting, storing,
securing, and maintaining data in a centralized manner. This includes implementing
data governance policies, leveraging data lakes and warehouses, and ensuring data
quality and integrity.
2. Information Systems: Deploying integrated information systems that enable data
collection, processing, storage, and dissemination. Popular examples include
enterprise resource planning (ERP), customer relationship management (CRM), and
business intelligence (BI) systems.
3. Communication and Collaboration: Fostering efficient communication and
collaboration through shared document repositories, email, and other digital
channels. Information systems should facilitate rapid information sharing and
coordinated decision-making across departments.
4. Analytics and Insights: Leveraging information systems to analyze data and generate
actionable insights. This involves processing raw data into meaningful reports,
dashboards, and forecasts to support strategic and operational decision-making.
5. Security and Governance: Implementing robust security measures and governance
frameworks to protect sensitive information and ensure compliance. This includes
access controls, data encryption, regular audits, and clearly defined policies for
information usage and sharing.
By adopting this multi-pronged approach, organizations can effectively manage information
as a strategic asset, driving operational efficiency, informed decision-making, and sustained
competitive advantage.

6 Bring out the relevance of the Information System to society. How does a IA
DSS support an organization?
IS impact on Society:
Positive Impact:
• Effective communication system: Information systems have improved communication,
bringing people closer together through platforms like email, online chatting, and social
media.
• Availability of information: People have become more informed due to the ease of
accessing information online. Data warehouses store vast amounts of data, and
education levels have improved significantly.
• Improving globalization and reducing cultural gap: Information systems connect people
worldwide, promoting global interaction and reducing cultural barriers. Even customer-
to-customer business models have benefited.
• Getting better services: Organizations have improved their services to customers in
response to increased accessibility and customer expectations. Customers now have
more power to influence businesses through their choices and feedback.
• Getting a range of online services: Online services like shopping, banking, education,
healthcare, consultation, and bill payments have made people's lives easier by saving
time and money.
Negative Impact:
• Availability of too much information: The rapid growth of information systems has led
to information overload. Fake information can be harmful to society, and rumors spread
quickly. Controlling this misinformation is challenging.
• Increasing fraud: While information systems offer many benefits, they have also
increased online fraud. Billions of dollars are lost annually due to such activities.
• Lack of job security: The growth of information systems has reduced the demand for
traditional jobs, leading to job losses. While new jobs have been created, they are fewer
in number, contributing to job insecurity.
• Security threat: People's valuable data is at risk due to security threats. Data leaks and
theft are common, despite organizations' efforts to improve security systems.
7 What are the components of an information system? Discuss the relevance IA
of information systems to organizational strategy.
Components of IS given above
Information systems (IS) play a crucial role in shaping and executing organizational
strategies. Here's how the concepts relate to organizational strategy:
1. Competitive Advantage:
Information systems help organizations gain a competitive edge by improving
efficiency, innovation, and decision-making. Tools like Customer Relationship
Management (CRM) or Supply Chain Management (SCM) systems allow businesses
to differentiate their services, reduce costs, and provide unique value to customers.
2. The Strategic IS:
A Strategic Information System (SIS) directly supports an organization’s long-term
goals by aligning technology with business objectives. It involves using IS to enter
new markets, develop new products, or improve operations, ensuring the company
stays ahead of its competitors.
3. Organizational Support:
Information systems provide essential support for operations, decision-making, and
collaboration within an organization. Systems like Enterprise Resource Planning (ERP)
help streamline internal processes, enhancing efficiency and coordination across
different departments, ensuring smooth operations in line with strategic goals.
4. Business Process Reengineering (BPR):
Information systems enable BPR by helping organizations radically redesign core
business processes to improve productivity, quality, and service. IS provides the
technological foundation for automating tasks, eliminating redundancies, and
creating more efficient workflows, all of which support strategic transformation.
Strategies for Competitive Advantage
Organizations constantly strive to develop strategies to counter Porter's five forces. These
strategies must be selected intelligently and followed properly to achieve success. Based on
these strategies, organizations employ their information systems.
1. Cost Leadership Strategy:
• Offers products or services at the lowest cost compared to competitors within the
same industry.
• Example: McDonald's achieves this by offering basic fast-food meals at low prices.
2. Differentiation Strategy:
• Offers unique products or services that competitors cannot easily replicate.
• Example: Apple differentiates itself by selling high-quality products like the iPhone,
iPad, and iPod.
3. Innovation Strategy:
• Continuously introduces new ways to improve products or services or production
methods.
• Example: Samsung invests in R&D to develop innovative products like curved mobile
phone screens.
4. Operational Effectiveness Strategy:
• Improves internal business processes and operations to outperform competitors.
• Example: Fortis Healthcare Systems focuses on improving clinical outcomes and
patient care through data tracking and feedback.
5. Customer-Orientation Strategy:
• Aims to maintain customer loyalty and satisfaction by building strong relationships.
• Example: Apple consistently launches new products that meet customer needs
before they express them.

8 Discuss competitive advantage achieved in Information System. 10,IA


II]
• Data and Knowledge Management: Database Approach, Big Data, Data warehouse and
Data Marts, Knowledge Management.
• Business intelligence (BI): Managers and Decision Making, BI for Data analysis and
Presenting Results

Sr Questions Marks Repeat


1 What is Big Data? What are the various challenges and characteristics of Big Data? 10 03
Define Big Data and discuss its basic characteristics? 05 02
2 What is Big Data? Explain how it is stored and managed. IA
3 Explain Data warehouse and Data Mart in an organization./ 10 02
Explain the architecture of Data mart and Data warehouse in an organization. 10, IA
4 What is Data Mart and Data Warehouses? Give two examples which show the 10,IA 02
generation of Big Data.
5 Explain the challenges faced by Knowledge management in different business 05
scenarios.
6 Illustrate Knowledge Management life cycle 10
7 Illustrate the different types of knowledge and explain four modes of knowledge 10
conversion
8 Explain the steps involved in knowledge capturing. 10
9 With the help of an example, explain how business intelligence influences IA 03
decision making?
Discuss the Impact of BI on Decision Making. 10, IA
10 Evaluate the MIS Hierarchy to comment on Decision Support System. 05

1 What is Big Data? What are the various challenges and characteristics of Big Data? 10 03
Define Big Data and discuss its basic characteristics? 05
Big Data implies data that is not just huge but also growing exponentially with time. So
handling such variety of large data is highly impossible using simple dbm tools but requires
advanced tools.
Examples:
i. The New York Stock Exchange generates about one terabyte of new trade data per
day.
ii. A singe Jet engine can generate so many terabytes of data in few minutes of flight
time collected from its various sensors.
Characteristics of Big Data:
The most common characteristics of Big Data are Volume, Variety, Velocity and Value.
i. Volume: Volume implies size of Big Data which is enormous. The size of data helps in
deciding the value of data. As just discussed above one terabyte of data per day
generated by New York Stock Exchange, many terabytes of data generated on social
media daily etc., these are all examples of high volumes of data.
ii. Variety: The next characteristic of Big Data is its Variety. It means that Big data is
diverse in nature. It comes from various sources internal and external to the
organization and is heterogeneous in nature. It can be structured as in case of records
stored in relational tables or unstructured as in multimedia data on websites. The data
generated can be of any type from PDF documents, emails, to photos and videos.
iii. Velocity: The pace with which Big data is generated is very fast. The speed with which
data is generated and processed is termed as Velocity. Velocity can be best explained
with example of a single Jet engine that can generate so many terabytes of data in 30
minutes of flight time collected from its various sensors like temperature, pressure,
fuel monitoring systems. The data generated on social media sites, from mobile
devices and sensors is really extensive and continues. Google alone processes on an
average more than 40,000 search queries every second.
iv. Value: The next characteristic of Big data is the actual Value of this enormous data
that is collected. Just volume is not sufficient but the data should be meaningful and
of help to whichever organization that is collecting it. For example the customer
feedback data collected should help in understanding the customers, their needs and
grievances and accordingly change business policies to satisfy their needs.
Challenges with Big Data:
1) Veracity: Big Data comes from various sources of which all may not be trusted
sources. Hence the authenticity and reliability of data and analysis performed on
such data is questionable. For example, how authentic are the reviews posted on a
shopping site by customers. Some negative feedbacks could be posted by
competitors only to defame the business organization.
2) Validity: Big Data can be dirty and of poor quality. For example incomplete survey
forms filled by customers. The data may not be accurate and complete. Such data
cannot serve as a base for data analysis.
3) Security: Big data breaches are possible and can have disastrous impact. Around 87
million Facebook users had their profiles exposed by Facebook to Cambridge
Analytica, a political consulting firm for some election campaign.
4) Variable: Big Data also changes due to heterogeneous data sources and types. These
inconsistencies lead to difficulty in handling and managing data.

2 What is Big Data? Explain how it is stored and managed. IA


Big Data refers to the massive volumes of structured, semi-structured, and unstructured
data generated at high velocity from a variety of sources such as social media, sensors,
transactions, and more. These data sets are so large and complex that traditional data
processing software can't efficiently store, manage, or analyze them. Big Data is often
characterized by the 5 V's:
1) Volume – The amount of data is massive (terabytes, petabytes, or more).
2) Velocity – Data is generated at an unprecedented speed and must be processed
quickly.
3) Variety – Data comes in many formats like text, images, videos, etc.
4) Veracity – The uncertainty and quality of data (data accuracy and trustworthiness).
5) Value – The meaningful insights that can be extracted from Big Data.
How Big Data is Stored:
Big Data can't be managed with traditional relational databases, so it typically requires
specialized storage solutions like:
1. Distributed File Systems:
o Data is stored across multiple machines (nodes) rather than on a single server.
o Hadoop Distributed File System (HDFS) is an example of a distributed storage
system that allows the storage of Big Data by dividing it into smaller chunks
across multiple nodes.
2. NoSQL Databases:
o These databases handle unstructured and semi-structured data.
o Examples include MongoDB (document-based), Cassandra (column-based), and
HBase (key-value-based).
3. Data Lakes:
o A centralized repository for storing raw, unprocessed data in its native format.
o Allows for large-scale storage without the need for predefined structures, making
it flexible and scalable.
4. Cloud Storage:
o Big Data can be stored on cloud platforms like Amazon S3, Google Cloud Storage,
and Azure Blob Storage, which provide scalability and flexibility.
How Big Data is Managed:
Managing Big Data involves the processes of collection, storage, organization, and analysis,
typically using specialized tools and frameworks:
1. Data Processing Frameworks:
o Hadoop: A framework that processes data in parallel across distributed systems
using the MapReduce programming model.
o Apache Spark: A faster, in-memory processing engine used for Big Data analytics.
2. Data Management Tools:
o Apache Kafka: For real-time data streaming and managing high-throughput data.
o Apache Hive: A data warehouse software built on top of Hadoop for querying and
managing large datasets using SQL-like syntax.
3. Data Governance:
o Ensures data accuracy, security, and accessibility.
o Includes the implementation of security measures, data privacy regulations, and
quality control.
4. Scalability:
o Systems must be scalable to handle increasing volumes of data efficiently, often
achieved through cloud storage or distributed architectures.

3 Explain Data warehouse and Data Mart in an organization./ 10 02


Explain the architecture of Data mart and Data warehouse in an organization. 10, IA

4 What is Data Mart and Data Warehouses? Give two examples which show the 10,IA 02
generation of Big Data.
Data Mart vs. Data Warehouse
1. Data Warehouse:
o A data warehouse is a centralized repository where data from different
sources is consolidated, transformed, and stored for reporting and analysis. It
stores large volumes of historical data and is designed for complex querying
and analysis.
o Purpose: Supports business intelligence activities, such as reporting and data
analysis, at an enterprise-wide level.
o Example: A retail company's data warehouse consolidates sales data,
customer profiles, inventory data, and more, from various branches, enabling
global reporting and analytics.
2. Data Mart:
o A data mart is a subset of a data warehouse that is focused on a specific
business line or department, such as sales, marketing, or finance. It contains
only relevant data for that department and provides quicker access and
simpler reporting compared to the larger data warehouse.
o Purpose: Supports specific departmental needs with targeted datasets.
o Example: A sales department might use a data mart that only contains data
on customer orders, sales performance, and regional sales trends.
Differences:
Aspect Data Warehouse Data Mart

Departmental/Business unit-specific
Scope Enterprise-wide (large-scale)
(smaller scale)

Contains data from multiple Focuses on specific business line or


Data
departments department

Large volumes of data (terabytes to


Size Smaller datasets
petabytes)

Complex to design, maintain, and


Complexity Less complex and easier to manage
manage

Enterprise-wide reporting and Departmental-specific reporting and


Use Case
analysis analysis

Examples of Big Data Generation:


1. Social Media Platforms:
o Platforms like Facebook, Twitter, Instagram generate huge amounts of data
every second through user posts, comments, likes, shares, and multimedia
uploads. For example, Facebook users upload 300 million photos per day,
generating a vast amount of unstructured data that must be stored and
processed in real-time.
2. IoT Devices:
o Smart devices (e.g., smart home sensors, wearable devices, autonomous
cars) generate continuous streams of data. For instance, a single autonomous
vehicle generates terabytes of data per day from its sensors, cameras, and
GPS systems, contributing significantly to the Big Data landscape.
Architecture of Data Warehouse:
It includes:
1. The source systems that provide data to the data warehouse or datamart.
2. The data-integration technology and processes that prepare the data for use.
3. Different architectures for storing data in an organization’s data warehouse or datamarts.
4. Different tools and applications for the variety of users.
5. Metadata, data quality and governance processes that ensure that the warehouse or
mart meets its purpose.
Functions in a Data Warehouse architecture:
1) Data Extraction: In this step, data is collected from various heterogenous sources both
external and internal to the organization.
2) Data Cleaning: In data cleaning, the errors in data are found and simultaneously
corrected.
3) Data Transformation: In this step data is converted into a format to be stored in Data
warehouses, which was previously stored in format suitable for legacy systems.
4) Data Loading: Data Loading involves various functions performed such as sorting,
summarizing, consolidating, checking integrity, and building indices and partitions.
5) Refreshing: This step deals with updating data form data sources to Data warehouse.

5 Explain the challenges faced by Knowledge management in different business 05


scenarios.
6 Illustrate Knowledge Management life cycle 10
Knowledge Management (KM): is a process that helps organizations manipulate important
knowledge that comprises part of the organization’s memory, usually in an unstructured
format.
For an organization to be successful, knowledge must be effectively disseminated among
people of different departments. Also knowledge must keep growing for the organization to
grow.
The KMS Cycle:
The KMS Cycle consists of six steps. The system is cyclic because the environment and the
knowledge is ever changing and growing. It is continuously refined.
7 Illustrate the different types of knowledge and explain four modes of knowledge 10
conversion
Types of Knowledge
1. Explicit Knowledge:
o Explicit knowledge is knowledge that can be easily documented,
communicated, and shared through formal language. It is structured and can
be stored in various formats like books, databases, or manuals.
o Example: Technical documentation, instruction manuals, research papers.
2. Tacit Knowledge:
o Tacit knowledge is personal and difficult to formalize. It is acquired through
experience and includes insights, intuition, and know-how. This knowledge is
deeply embedded in an individual’s actions and is not easily communicated.
o Example: A doctor’s intuition developed through years of practice or a
craftsman’s skill acquired through hands-on experience.
Four Modes of Knowledge Conversion (SECI Model)
The SECI model, developed by Ikujiro Nonaka and Hirotaka Takeuchi, describes the process
of knowledge creation through the interaction between tacit and explicit knowledge. The
four modes of knowledge conversion are:
1. Socialization (Tacit to Tacit):
o This process involves the sharing of tacit knowledge between individuals
through shared experiences. It is often done informally, without using
language.
o Example: An apprentice learns a craft by observing and working closely with
an expert, gaining hands-on experience.
o Key Concept: Learning by doing or observation, often in a face-to-face
context.
2. Externalization (Tacit to Explicit):
o In this mode, tacit knowledge is articulated and transformed into explicit
knowledge, often through documentation or explanation. This process
typically involves metaphors, analogies, or models to help express complex
insights.
o Example: A professional writing a guidebook or sharing their experiences
through lectures or articles.
o Key Concept: Capturing and converting personal insights into formal
knowledge.
3. Combination (Explicit to Explicit):
o This mode involves combining different sets of explicit knowledge to create
new explicit knowledge. It can involve sorting, adding, and recombining
existing data and information.
o Example: Combining multiple research papers into a comprehensive
literature review or developing a new business strategy by merging reports
from various departments.
o Key Concept: Synthesizing various explicit sources into new, organized
information.
4. Internalization (Explicit to Tacit):
o Internalization happens when individuals absorb explicit knowledge and
transform it into tacit knowledge. This often involves learning by reading or
training and then applying that knowledge in practical situations.
o Example: A student reading textbooks and applying the learned concepts in
real-world projects, gradually mastering them through practice.
o Key Concept: Learning and embodying new knowledge through application
and experience.
Illustration of Knowledge Conversion
The SECI model represents a continuous, cyclical process in which knowledge flows through
individuals, groups, and organizations. Each mode facilitates the transformation of tacit and
explicit knowledge, fostering organizational learning and innovation. This process is often
visualized as a spiral, where each conversion builds on the previous one, expanding the
organization's knowledge base.

8 Explain the steps involved in knowledge capturing. 10


In Knowledge Capturing within a Management Information System (MIS), the primary goal
is to identify, collect, and organize knowledge from various sources. Here are the main steps
involved:
1. Identifying Knowledge Sources
• Locate sources of knowledge, which may include experts, documents, processes,
databases, and organizational systems. This step involves recognizing explicit
knowledge (e.g., manuals, reports) and tacit knowledge (e.g., personal experience
and insights).
2. Knowledge Collection
• Gather information from identified sources. This may involve interviews, surveys,
observations, or data extraction from databases. The goal is to extract both
structured and unstructured information that can later be organized and analyzed.
3. Filtering and Organizing Knowledge
• Sort and prioritize the collected knowledge based on relevance, accuracy, and
usefulness. This step organizes the information to make it accessible and meaningful,
eliminating unnecessary or outdated data.
4. Knowledge Codification
• Convert tacit knowledge (personal know-how) into explicit knowledge (documented
form). This could involve documenting expert insights, writing down steps in a
process, or categorizing knowledge into databases. Codification helps in structuring
knowledge for easy access.
5. Storing and Integrating Knowledge
• Store the organized and codified knowledge in a central repository, such as a
knowledge management system or database. Integration involves linking new
knowledge to existing information, creating a comprehensive and unified knowledge
base.
6. Updating and Maintaining Knowledge
• Regularly review and update the knowledge repository to ensure it remains relevant,
accurate, and up-to-date. Maintenance prevents knowledge from becoming obsolete
and supports continuous learning within the organization.

9 With the help of an example, explain how business intelligence influences IA 03


decision making?
Discuss the Impact of BI on Decision Making. 10, IA
10 Evaluate the MIS Hierarchy to comment on Decision Support System. 05
There are three levels of management activities,
1. Strategic planning
2. Management control
3. Operational control
Hierarchy is the process of ensuring that specific tasks are carried out effectively and
efficiently. Management control is the process by which managers ensure that the resources
are obtained and used effectively and efficiently to achieve the organizational goals.
Strategic planning is the method of deciding the organization's objectives, the improvements
needed to achieve those goals, the tools used to attain those goals, and the policies used to
obtain, manage and distribute those resources.
These levels of management activities are described in detail as follows...
1) Strategic planning
Strategic management is the comprehensive collection of ongoing procedures and processes
used by organizations throughout an enterprise to consistently organize and align resources
and actions with mission, vision, and strategy. Strategic management activities turn the
static plan into a system that provides decision-making input on strategic success.
The strategy consists of making choices on the part of managers to achieve corporate goals
between alternative action plans, dedication to specific product markets, strategic steps and
business strategies. Strategic planning is required from top to bottom levels for management
of all levels.
2) Management control
At middle management, the people perform resource control practices. Management
regulation enables the organization's smooth organizational activities. Management control
facilitates smooth operational activities in the organization. Management control describes
how an organization's actions of individuals or groups are constrained to perform certain
actions while avoiding other actions to achieve organizational objectives. Control of
management falls into two broad categories— regulative and normative controls — but
there are several types within those categories.
It is essential for management to keep a check on the activities and people involved in
operations to avoid any waste of resources and to more effectively use the resources. This
includes making arrangements that are appropriate for managing the various activities
needed for the organization's proper management. It includes the management of various
projects that the organization is handling.
3) Operational control
Operational control systems are designed to ensure day-to-day actions are consistent with
the plans and goals established. This focuses on recent period cases. Operational inspection
systems are derived from management control system specifications.
At low-level management, the operational control tasks are done by the staff. Operational
control helps to make use of available resources without any wastage. This requires proper
computer management with reduced costs and amortization. It also helps manage the
workers involved in activities by the proper direction of supervision. It helps the
organization, in a desirable time, to produce quality products. This involves conducting
routine processes, such as updating and managing user inquiries that belong to the
operational control stage below.
MIS is an important part of an organization as it helps to collect planning and decision-
making information. It also helps in carrying out other organizational tasks such as
recruiting, managing, and regulating. In an organization, MIS performs various functions
such as collecting and processing data to get accurate information for decision making. It
also helps in storing information and retrieving it as and when required.
III]
• Ethical issues and Privacy: Information Security.
• Threat to IS, and Security Controls

Sr Questions Marks Repeat


1 Explain the Ethical issues and threats of information security? 05,IA 02
2 How is data governance achieved in case of MIS? 05
3 Evaluate the role of Confidentiality, Integrity and Availability in order to achieve 10,IA
security.
4 What are the major threats to IS security? How is the privacy of the IA
individual under threat?
5 What are major security threats to the information system? Discuss the measures 10,IA
taken to control information security.
6 Give an understanding on types of Control to achieve Security./ 10,IA 03
Discuss what type of controls that organizations can use to protect their IA
information resources and provide an example of each one./
Identify the measures to improve cyber security with example.

1 Explain the Ethical issues and threats of information security? 05,IA 02

Security Threats:
1. Unintentional Threats
These are unforeseen and unplanned risks that can still cause significant issues if not
properly addressed.
1) Human Errors: Mistakes by employees can lead to severe security risks. Higher-level
employees, like HR or IT staff with access to sensitive data, can unintentionally leak
or lose information. Even contracted staff like guards can pose risks if careless, as
they may forget to follow security protocols (e.g., not logging out or using weak
passwords).
2) Social Engineering: These are attacks where employees are manipulated into
revealing confidential information. Examples include:
o Impersonation: Attackers pretend to be someone they are not to gain access
to information.
o Exterminator: Attackers pose as technicians to infiltrate the system.
o Tailgating: Unauthorized persons physically enter secure premises by
following someone.
o Shoulder Surfing: Attackers spy on sensitive information by watching over an
employee's shoulder.
2. Deliberate Threats
These are intentional attacks aimed at harming the organization's security.
1) Espionage: Unauthorized access to an organization's information through illegal
means.
2) Information Extortion: Attackers steal data and demand a ransom for its return.
3) Sabotage or Vandalism: Defamation or negative actions towards a company to
damage its reputation and customer loyalty.
4) Theft of Equipment or Information: Stealing devices like laptops or smartphones to
access sensitive information.
5) Identity Theft: Stealing someone's identity for misuse, often to gain access to
financial or confidential data.
6) Compromises to Intellectual Property: Theft or misuse of intellectual property like
copyrights, patents, or trade secrets.
7) Software Attacks:These threats focus on exploiting software vulnerabilities.
o Virus: Malicious code that causes harm to systems.
o Worm: Similar to a virus but replicates and spreads automatically.
o Phishing: Fraudulent attempts to trick users into revealing sensitive
information by pretending to be a legitimate source.
o Denial-of-Service (DoS): Attackers overload a system with requests to make it
crash.

8) Alien Softwares: These are programs installed on a system without the user’s
knowledge, often leading to annoying pop-ups or tracking of browsing behavior.
9) SCADA Attacks: SCADA systems control critical infrastructure like power plants. If
these systems are compromised, attackers can disrupt essential services, leading to
significant damage.
10) Cyberterrorism and Cyberwarfare: Cyber terrorism and cyber warfare include
making use of computer systems connected over a network to perform some kind of
harm to other computer systems with the intent of destroying or damaging the
systems or revealing some sensitive information
These are some of the key threats to information security that organizations must guard
against.

4 What are the major threats to IS security? How is the privacy of the IA
individual under threat?
5 What are major security threats to the information system? Discuss the measures 10,IA
taken to control information security.
6 Give an understanding on types of Control to achieve Security./ 10,IA 03
Discuss what type of controls that organizations can use to protect their IA
information resources and provide an example of each one./
Identify the measures to improve cyber security with example.
IV]
• Social Computing (SC): Web 2.0 and 3.0, SC in business-shopping, Marketing, Operational
and Analytic CRM
• E-business and E-commerce – B2B B2C. Mobile commerce.

Sr Questions Marks Repeat


1 Discuss the significance of social computing in marketing in detail. 10,IA
2 What is the need of Social Computing for Businesses? 10
3 Analyse how social computing is inspiring customer service? 05 03
4 Compare and contrast Web 1.0, 2.0, 3.0 with example. 10, 02
Analyse briefly to highlight the difference between Web 2.0 and Web 3.0? 05, IA
5 Define CRM. Describe the different types of CRM. 10 02
How is CRM relevant to Information Systems? IA
What do you mean by CRM? Give its types and relate the role of SC on CRM. 10
6 Discuss the information specific to a marketing CRM. IA
7 Write note on e-commerce. 10
8 Write note on e-business. 10
9 What are the potential benefits of social commerce to the customers and to the 10, IA
business?
10 What is Mobile Commerce? What are the new challenges that it has introduced in 10
business?
11 Develop the plan for delivery application in M-commerce using social computing. 10
12 How have mobile apps impacted the information requirements of customers? IA
13 How is vendor management stream lined through B2B based Information Systems? IA
How has m-commerce influenced business?

1 Discuss the significance of social computing in marketing in detail. 10,IA


2 What is the need of Social Computing for Businesses? 10
Include marketing points also
Include CRM points also

3 Analyse how social computing is inspiring customer service? 05 03


4 Compare and contrast Web 1.0, 2.0, 3.0 with example. 10, 02
Analyse briefly to highlight the difference between Web 2.0 and Web 3.0? 05, IA

Feature Web 1.0 Web 2.0 Web 3.0

1990s to early Emerging (2020s and


Era Early 2000s to 2010s
2000s beyond)

User interaction and Decentralization and


Focus Information display
social networking personalization

Dynamic and user- Intelligent, interconnected


Content Type Static
generated content

User Interaction Read-only Read and write Read, write, and own

Personal websites, Social media, blogs, Blockchain, AI-based


Examples
directories wikis dApps

HTML, basic HTTP, AJAX, JavaScript, social Blockchain, AI, machine


Technology
static pages platforms learning, semantic web

Controlled by few Shared between User-owned data and


Control
(website owners) platforms and users decentralized networks

Cloud computing, Decentralized storage


Data Storage Centralized servers
centralized databases (e.g., IPFS, blockchain)
Feature Web 1.0 Web 2.0 Web 3.0

Security and Minimal (simple Improved (data policies, Enhanced with blockchain
Privacy security protocols) access controls) and encryption

Data shared with third Controlled by users,


Data Sharing Limited data sharing
parties, advertisers transparent sharing

Basic user identity Linked identities across Digital identity and self-
User Identity
management platforms sovereign identity

Ads, static content Advertising, data Token-based economy,


Business Model
subscription monetization community-driven funding

Complex, with multiple


Programming Advanced, involving
Simple, basic coding technologies and
Complexity blockchain, AI, and IoT
libraries

5 Define CRM. Describe the different types of CRM. 10 02


How is CRM relevant to Information Systems? IA
What do you mean by CRM? Give its types and relate the role of SC on CRM. 10
6 Discuss the information specific to a marketing CRM. IA
A Marketing CRM (Customer Relationship Management) system is specifically designed to
manage and analyze customer interactions and data throughout the customer lifecycle,
focusing on marketing needs and strategies. It’s centered on collecting and organizing
customer information to personalize, automate, and optimize marketing efforts.
Here’s a breakdown of information specific to a Marketing CRM:
1. Customer Data Management
• Demographics: Includes details like age, gender, location, and occupation, helping
segment audiences.
• Behavioral Data: Tracks customer interactions, purchase history, website activity, and
engagement levels.
• Psychographics: Interests, preferences, lifestyle, and values are used to tailor
marketing messages.
2. Lead Management
• Lead Capture and Tracking: Records leads from various sources (e.g., website, social
media, events) and monitors the customer journey.
• Lead Scoring: Assigns scores to leads based on engagement level and potential
conversion likelihood.
• Segmentation: Groups leads based on criteria like industry, needs, or behavior,
making it easier to target specific groups.
3. Campaign Management and Automation
• Campaign Tracking: Monitors the performance of email campaigns, social media ads,
and other marketing efforts.
• Marketing Automation: Automates workflows for tasks such as email marketing,
retargeting, and follow-ups to nurture leads efficiently.
• A/B Testing: Allows testing of different campaign variations to optimize content and
improve engagement rates.
4. Analytics and Reporting
• Performance Metrics: Tracks KPIs like open rates, click-through rates, and conversion
rates for campaigns.
• Customer Journey Analytics: Analyzes each step of the customer journey to identify
drop-off points and optimize the funnel.
• ROI Calculation: Measures the return on investment for marketing activities,
providing insights into cost per acquisition and lifetime value.
5. Customer Segmentation and Personalization
• Targeted Messaging: Uses customer data to tailor messages and offers, improving
relevance and engagement.
• Customer Segmentation: Divides customers into segments based on demographics,
purchasing habits, and engagement levels.
• Personalized Campaigns: Creates dynamic, personalized content in emails, ads, or
product recommendations based on customer preferences and behavior.
6. Social Media Integration
• Social Listening: Monitors social media channels for mentions and trends to
understand customer sentiment.
• Social CRM: Integrates social media platforms for customer engagement and
support.
• Campaign Coordination: Syncs social media campaigns with CRM data for more
cohesive, data-driven marketing.
7. Email and SMS Marketing Management
• Contact List Segmentation: Manages email and SMS lists by segmenting contacts
based on criteria like engagement or demographics.
• Automated Drip Campaigns: Delivers timed email and SMS sequences to nurture
leads through each stage of the funnel.
• Response Tracking: Monitors open, click-through, and conversion rates for email and
SMS communications.
8. Customer Feedback and Survey Tools
• Survey Management: Collects customer feedback through surveys, polls, and review
requests.
• Sentiment Analysis: Analyzes responses to gauge customer satisfaction, improve
product offerings, or adjust strategies.
• NPS (Net Promoter Score): Measures customer loyalty and satisfaction, helping
identify advocates and areas for improvement.

7 Write note on e-commerce. 10


8 Write note on e-business. 10
9 What are the potential benefits of social commerce to the customers and to the 10, IA
business?
Social commerce offers numerous benefits to both customers and businesses by merging the
convenience of e-commerce with the engagement potential of social media. Here are some
of the potential benefits:
Benefits to Customers
1. Convenience and Accessibility
o Customers can browse, compare, and purchase directly within social media
platforms, simplifying the shopping experience.
o Integrations with chatbots and customer service tools mean customers can
get assistance or product information instantly.
2. Personalized Shopping Experience
o Social media algorithms allow for targeted content, showing products that
align with individual preferences, browsing history, and interests.
o Real-time recommendations and customized ads enhance the relevance of
products and promotions.
3. User-Generated Content and Reviews
o Customers can view product reviews, ratings, and real-life images from other
buyers, increasing trust in the product and reducing the risk of dissatisfaction.
o This content gives customers a better idea of the product’s quality and use,
improving purchase confidence.
4. Seamless Social Interaction and Community Engagement
o Customers can ask questions, participate in discussions, and interact with
brands and other users, creating a community-centered shopping experience.
o Engaging with others who share similar interests can enhance product
discovery and validation.
5. Exclusive Deals and Offers
o Brands often provide exclusive discounts, flash sales, or promotions for their
social media followers, giving customers added value for following and
interacting on social channels.
o Influencer collaborations can result in special codes or discounts for followers,
further benefiting customers.
6. Ease of Payment and Integrated Checkout
o Social commerce often includes simplified payment options (e.g., PayPal,
Apple Pay, or in-app purchases) without the need to leave the social platform,
providing a seamless transaction experience.
o Social platforms prioritize secure payment processing, enhancing customer
trust in making purchases.
Benefits to Businesses
1. Increased Brand Awareness and Reach
o Social media platforms allow brands to reach a wider audience, especially
through shareable content, hashtags, and viral marketing.
o A strong social presence can increase brand awareness and attract more
followers and potential buyers.
2. Higher Conversion Rates and Shorter Sales Cycle
o With the option to shop directly from social platforms, businesses reduce the
steps needed for customers to make a purchase, leading to higher conversion
rates.
o Streamlined checkout processes on social media decrease cart abandonment
rates and improve overall sales.
3. Cost-Effective Marketing and Ad Spend Optimization
o Social platforms offer detailed targeting options, allowing brands to reach the
most relevant audience and maximize their ad budget.
o Social commerce minimizes the cost of customer acquisition through organic
growth, user-generated content, and influencer collaborations.
4. Real-Time Customer Insights and Analytics
o Social commerce provides real-time data on customer preferences, product
performance, and buying behaviors, which businesses can use to improve
product offerings and marketing strategies.
o Insights from likes, shares, comments, and purchase data allow businesses to
understand customer sentiment and demand more accurately.
5. Enhanced Customer Engagement and Loyalty
o Businesses can build stronger relationships with customers by interacting
directly through comments, DMs, and live sessions.
o Social commerce encourages loyal followers by creating engaging content,
responding to customer feedback, and offering exclusive deals.
6. Influencer Marketing and Brand Advocacy
o Partnerships with influencers who have a loyal following allow businesses to
reach a larger audience authentically and build brand trust.
o Customers often trust influencer recommendations, leading to increased
credibility and product visibility.
7. Increased Traffic and Retargeting Potential
o Social platforms offer retargeting options for users who interact with product
posts but may not complete a purchase, providing an opportunity to
recapture their interest.
o Increased brand visibility on social platforms helps drive organic traffic to
websites or physical stores if included in the strategy.

10 What is Mobile Commerce? What are the new challenges that it has introduced in 10
business?
Mobile Commerce (m-commerce) refers to the buying and selling of goods and services
through mobile devices like smartphones and tablets. This type of commerce includes
transactions through mobile apps, websites optimized for mobile devices, and other mobile
technologies like SMS-based purchases or mobile wallets (e.g., Apple Pay, Google Pay). M-
commerce has become popular due to the rapid growth of mobile device usage, providing
customers with convenience and businesses with new ways to engage with consumers.
Here are some of the new challenges that mobile commerce has introduced in business:
1. User Experience and Interface Design
• Challenge: Mobile screens are smaller, requiring a simplified, user-friendly interface
to prevent frustration during navigation, browsing, and checkout.
• Impact: Businesses need to invest in mobile-optimized designs or dedicated mobile
apps to create a smooth, intuitive shopping experience.
2. Security and Privacy Concerns
• Challenge: Mobile devices are more susceptible to security vulnerabilities like
malware, phishing, and unsecured Wi-Fi threats. Customers are also increasingly
concerned about data privacy.
• Impact: Businesses need to ensure robust encryption, secure payment gateways,
two-factor authentication, and compliance with privacy laws (e.g., GDPR) to protect
customer data and maintain trust.
3. Cross-Platform Compatibility
• Challenge: Different operating systems (e.g., iOS, Android) and screen sizes require
businesses to ensure compatibility across various devices.
• Impact: Developing responsive websites and adaptable apps that work seamlessly on
multiple platforms and screen dimensions increases development and testing costs.
4. High Customer Expectations for Speed and Responsiveness
• Challenge: Mobile users expect quick loading times, smooth navigation, and real-
time responses, particularly in an environment with variable network speeds.
• Impact: Businesses face pressure to optimize website speed and reduce app load
times, as delays can lead to cart abandonment and lost sales.
5. Maintaining Customer Engagement
• Challenge: Customers have shorter attention spans on mobile and are often
multitasking, making it harder to retain engagement.
• Impact: Businesses need to use mobile-friendly engagement strategies like push
notifications, personalized content, and loyalty programs to keep customers
interested.
6. Payment Integration and Fraud Prevention
• Challenge: Offering multiple, secure payment options (e.g., digital wallets, in-app
payments) is essential, as mobile users prefer diverse payment methods. At the same
time, fraud is a concern due to potential data breaches.
• Impact: Businesses must invest in fraud detection tools and secure payment systems
to build customer trust and prevent unauthorized transactions.
7. Mobile-Specific Marketing Strategies
• Challenge: Mobile users interact with content differently than desktop users,
requiring more personalized, location-based, and visually engaging marketing efforts.
• Impact: Businesses must tailor marketing strategies to mobile, which could involve
geotargeted ads, SMS campaigns, and social media engagement, increasing the need
for specialized marketing resources.
8. Inventory and Fulfillment Management
• Challenge: Mobile commerce increases demand for quick fulfillment options like
same-day or next-day delivery, as customers expect faster service from mobile
orders.
• Impact: Businesses must adopt real-time inventory tracking and optimized logistics
to meet customer demands, potentially increasing operational complexity and costs.
9. Data Management and Analytics
• Challenge: Collecting and analyzing mobile-specific data (e.g., app usage, click-
through rates, and mobile ad interactions) is essential for understanding user
behavior, but can be technically complex.
• Impact: Businesses need advanced analytics tools and strategies to gain insights into
mobile behavior, often requiring investment in specialized data management
systems.
10. Competition and Market Saturation
• Challenge: With the ease of app development and accessibility to a broad customer
base, competition in m-commerce is fierce, leading to market saturation in many
sectors.
• Impact: Businesses must constantly innovate and refine their mobile offerings to
stand out, which may require ongoing investment in R&D, app updates, and
marketing.

11 Develop the plan for delivery application in M-commerce using social computing. 10
Creating a delivery application in mobile commerce (m-commerce) with integrated social
computing can enhance customer engagement, streamline deliveries, and create a
community-driven experience. Here’s a comprehensive plan for such an application:

1. Project Overview
• Objective: Develop a delivery application leveraging m-commerce and social
computing to allow users to order and track deliveries, share reviews, recommend
services, and interact with other users.
• Key Features: Real-time tracking, user reviews, social media integration, personalized
recommendations, gamification, community support, and live chat support.

2. Core Features and Functionalities

Feature Description

User Registration and Users create profiles via email, phone, or social logins (Google,
Profile Facebook, etc.). Profiles include delivery history and preferences.

Real-Time Order GPS-enabled tracking to monitor order status from dispatch to


Tracking delivery. Customers and drivers can communicate via in-app chat.

Social Review and Users rate deliveries, share reviews, and post photos. Friends can
Rating System see each other’s reviews, encouraging social proof.

Social features like a “Community Feed” where users can see


Community Engagement
trending services, top-rated items, and recommendations.

Rewards and Points-based system for completing activities (reviews, referrals)


Gamification to encourage engagement and brand loyalty.
Feature Description

Personalized AI-driven suggestions based on past orders, reviews, and friend


Recommendations activities to personalize the customer’s experience.

Integration with social platforms (Facebook, Instagram) for easy


Social Media Integration
sharing of order experiences and referrals.

In-App Customer Chatbot and live support for real-time assistance. User forums
Support and FAQ sections allow community support for common issues.

3. Technology Stack
• Front-End: React Native or Flutter for cross-platform mobile development.
• Back-End: Node.js with Express or Django for API management.
• Database: Firebase for real-time data or MongoDB for handling user profiles, orders,
and interactions.
• Location and Mapping: Google Maps API or Mapbox for real-time tracking.
• Notifications: Firebase Cloud Messaging (FCM) or OneSignal for in-app notifications
and updates.
• AI/ML for Recommendations: TensorFlow.js or AWS Personalize for recommendation
algorithms.
• Payment Gateway: Stripe, PayPal, or Razorpay for secure in-app payments.
• Social Media API Integrations: Facebook, Instagram, Twitter APIs for social sharing
and engagement.

4. Social Computing Strategy


• User-Generated Content (UGC): Encourage users to create content (e.g., reviews,
photos) for rewards.
• Community Building: Introduce features like friend lists, shared feeds, and group
recommendations.
• Influencer Partnerships: Leverage social influencers to share their delivery
experiences and engage followers, bringing authenticity and new users.
• Gamification Elements: Users earn badges, rank in leaderboards, and receive
rewards based on engagement (e.g., referring friends, reviewing frequently).
• Customer Support Forums: Offer public discussion boards where users can ask
questions and share tips, fostering a self-supporting community.
5. User Experience and Interface Design
• Intuitive and Simple Design: Keep the layout minimal and user-friendly, optimized
for mobile screens.
• Engaging Community Feed: Display friend activities, popular items, and deals in a
feed similar to social media.
• Profile and Rewards Dashboard: Each user’s dashboard shows loyalty points, order
history, and badges.
• Interactive Order Page: Real-time order tracking with GPS and estimated arrival
times. Option to chat with the delivery driver.

6. Marketing and Growth Strategy


• Referral Program: Offer discounts for both referrers and referred users, incentivizing
app sign-ups.
• Social Media Campaigns: Create shareable content for platforms like Instagram and
Facebook to increase app visibility.
• Influencer Marketing: Partner with influencers to review and promote the app,
targeting demographics that align with the brand.
• Email and SMS Marketing: Send reminders, personalized offers, and loyalty program
updates to encourage return users.

7. Security and Privacy


• Data Encryption: Ensure all customer data, including payment details and order
information, is securely encrypted.
• Two-Factor Authentication (2FA): Implement 2FA during login to protect user
accounts.
• Secure Payment Gateways: Use trusted payment providers with secure encryption to
process transactions.
• Compliance: Follow local and international standards (e.g., GDPR, CCPA) to maintain
user data privacy.

8. Performance Metrics and Analytics


• User Engagement: Track metrics like daily active users, session duration, and feature
interaction.
• Conversion Rates: Monitor conversion rates from visits to purchases and analyze
drop-off points.
• Customer Satisfaction: Use in-app ratings and feedback to gauge user satisfaction.
• Social Engagement: Measure shares, reviews, and user interactions to understand
the impact of social computing features.

9. Testing and Feedback Loop


• User Testing: Conduct beta testing with a focus group to gather feedback on usability,
navigation, and social features.
• A/B Testing: Test different versions of key features (e.g., layout, reward system) to
optimize user experience.
• Regular Updates: Roll out updates based on user feedback, security patches, and
technological advancements.

10. Launch and Post-Launch Strategy


• Soft Launch: Release the app in a select market for feedback and refinement before a
full-scale launch.
• User Onboarding: Create an engaging onboarding experience with tutorials and a
welcome offer for new users.
• Feedback and Iteration: Continuously gather feedback from customers and iterate to
improve features, engagement, and retention.
• Loyalty Programs: Introduce loyalty rewards or exclusive offers to encourage ongoing
usage and promote customer loyalty.

12 How have mobile apps impacted the information requirements of customers? IA


Mobile apps have significantly transformed the information requirements of customers by
enabling immediate, personalized, and interactive access to information. Here’s a look at the
key ways they’ve impacted these requirements:
1. Demand for Instant Access and Real-Time Information
• Impact: Customers expect up-to-the-minute information, such as real-time product
availability, order status, delivery tracking, and customer support.
• Example: Ride-hailing apps show real-time driver location and estimated arrival,
catering to the need for instant feedback.
2. Higher Expectation for Personalization
• Impact: Apps can provide tailored recommendations and content based on user
behavior, preferences, and location, setting a standard for personalized experiences.
• Example: E-commerce apps use purchase history to suggest relevant products,
fulfilling customers’ need for curated options without extra effort.
3. Enhanced Product Information and Transparency
• Impact: Customers now expect detailed product information, reviews, and
comparisons readily available on mobile apps, reducing the need for external
research.
• Example: Food delivery apps include nutritional information, ingredients, and
customer reviews, which builds transparency and helps customers make informed
choices.
4. Interactivity and Engagement with Brands
• Impact: Customers expect two-way interaction with brands for feedback, reviews,
and customer support, all available within the app.
• Example: Social media and shopping apps allow users to like, comment, and share
feedback directly on products, fostering a sense of community.
5. Access to Self-Service Options
• Impact: Mobile apps enable customers to access account management, returns,
payment history, and customer support independently, enhancing convenience.
• Example: Banking apps allow customers to check balances, make transfers, and
resolve issues without needing to visit a branch or speak to a representative.
6. Demand for Secure and Private Information Handling
• Impact: With sensitive information shared over apps, customers have grown more
cautious and demand robust security and transparency on how their data is used.
• Example: Apps now clearly state privacy policies, implement secure payment
gateways, and offer features like two-factor authentication to reassure users.
7. Preference for Integrated and Unified Experience
• Impact: Customers increasingly prefer apps that integrate information and services
from multiple sources in one place to avoid switching between platforms.
• Example: Travel apps now bundle bookings, itinerary management, and local
recommendations, providing customers with an all-in-one solution.
8. Expectation for Offline Access
• Impact: Customers often expect certain information (like order details, tickets, or
downloaded content) to be accessible even without an internet connection.
• Example: Many apps provide offline functionality for essential information, like
boarding passes in travel apps, to meet this need for constant access.
9. Need for Visual and Interactive Content
• Impact: Customers are increasingly looking for visual and interactive information,
such as product videos, 3D views, or AR features, to make better-informed decisions.
• Example: Furniture and fashion apps now include AR features for virtual try-ons,
enhancing customers' decision-making process by providing a realistic view of
products.
10. Demand for Simple and Streamlined Interfaces
• Impact: Users require information to be organized intuitively, with easy navigation,
quick access to primary functions, and minimal steps to achieve their goals.
• Example: Food ordering apps offer quick shortcuts to previous orders or favorites,
meeting the customer’s need for speed and efficiency.

13 How is vendor management stream lined through B2B based Information Systems? IA
How has m-commerce influenced business?
Vendor management and B2B-based information systems (IS) have undergone significant
evolution, particularly with the influence of m-commerce. Here's how these advancements
have streamlined vendor management and reshaped business practices:

Streamlining Vendor Management through B2B-Based Information Systems


B2B information systems are essential in enhancing the efficiency, transparency, and overall
management of vendor relationships. Key ways in which they streamline vendor
management include:
1. Centralized Vendor Information and Communication
o Streamlining: B2B IS allows for a single platform where all vendor data,
including contracts, contact details, performance metrics, and communication
histories, are stored.
o Impact: Reduces redundancy and improves information accuracy, facilitating
smoother communication and coordination with vendors.
2. Automated Procurement and Order Processing
o Streamlining: B2B systems automate purchase orders, invoicing, and
inventory management, making order processing faster and less error-prone.
o Impact: Saves time, reduces manual errors, and enables quicker turnaround
times from vendors.
3. Improved Vendor Performance Tracking
o Streamlining: Many B2B IS offer built-in metrics and analytics to assess
vendor performance based on delivery times, quality, compliance, and cost-
effectiveness.
o Impact: Allows businesses to monitor and enforce standards while identifying
high-performing vendors, leading to better relationships and cost efficiencies.
4. Seamless Collaboration and Document Sharing
o Streamlining: B2B IS enables seamless document sharing (e.g., contracts,
specifications, delivery schedules) through cloud storage and secure portals.
o Impact: Minimizes delays in information exchange and fosters real-time
collaboration with vendors, ensuring alignment on product specifications and
delivery timelines.
5. Enhanced Compliance and Risk Management
o Streamlining: B2B systems maintain records of vendor certifications, audits,
and compliance documentation, reducing the risk of regulatory issues.
o Impact: Simplifies compliance tracking, mitigating potential risks related to
vendor management and supporting legal and regulatory adherence.
6. Forecasting and Demand Planning
o Streamlining: B2B IS leverage analytics to forecast demand and manage
inventory, ensuring timely orders from vendors based on anticipated needs.
o Impact: Improves supply chain efficiency and reduces costs by optimizing
inventory and preventing shortages or overstocking.
7. Improved Payment Processes and Terms
o Streamlining: B2B information systems can automate payments, track credit
terms, and facilitate faster payment reconciliation.
o Impact: Enhances cash flow management for both businesses and vendors,
fostering stronger, long-term relationships through timely payments.

Impact of M-Commerce on Business


M-commerce has transformed business practices, bringing new opportunities and
challenges:
1. Enhanced Customer Engagement and Reach
o Influence: M-commerce allows businesses to reach customers on their
mobile devices anytime, anywhere, boosting engagement and potential sales.
o Impact: Increases business reach, especially for e-commerce and retail
sectors, and enables location-based marketing for targeting customers
precisely.
2. Seamless Shopping Experience and Convenience
o Influence: Mobile apps and optimized websites make it convenient for users
to shop, browse, and order on-the-go.
o Impact: Encourages higher conversion rates, reduces cart abandonment, and
improves customer loyalty by providing a user-friendly experience.
3. Personalized Marketing and Recommendations
o Influence: M-commerce platforms collect user data, which can be used to
tailor recommendations, promotions, and content to individual preferences.
o Impact: Drives sales by providing customers with relevant, targeted offers,
which can increase average order value and customer satisfaction.
4. Integration with Social Media and Social Commerce
o Influence: M-commerce integrates easily with social media, allowing
businesses to engage in social commerce and reach broader audiences
through influencers and viral marketing.
o Impact: Facilitates brand discovery and credibility, especially for smaller
businesses, and promotes direct purchases via social platforms.
5. Increased Demand for Mobile-Friendly Payment Solutions
o Influence: M-commerce has pushed businesses to adopt mobile payment
methods (e.g., Apple Pay, Google Pay) and integrate mobile wallets for easy
checkouts.
o Impact: Reduces purchase friction, improves transaction speed, and enhances
security with methods like biometric verification, encouraging customers to
complete transactions on mobile.
6. Demand for Real-Time Customer Service
o Influence: The immediacy of m-commerce means customers expect instant
customer support options, often through chatbots or live chat within apps.
o Impact: Increases customer satisfaction and loyalty by providing quick
responses and efficient problem resolution, especially in sectors like retail and
food delivery.
7. Challenges in Security and Data Privacy
o Influence: M-commerce has brought new security concerns, as mobile
devices can be more vulnerable to fraud and hacking.
o Impact: Businesses need to implement secure authentication, encryption,
and data protection measures to maintain customer trust and comply with
data privacy regulations.
8. Efficient Inventory and Logistics Management
o Influence: M-commerce requires efficient order fulfillment to meet customer
expectations for speed, driving innovation in logistics and inventory tracking.
o Impact: Businesses adopt real-time inventory management and optimized
logistics to ensure quick and accurate order fulfillment, enhancing customer
experience.
V]
• Computer Networks Wired and Wireless technology, Pervasive computing, Cloud
computing model.

Sr Questions Marks Repeat


1 Differentiate between computer network wired and wireless technology. 05, IA 02
2 Explain the applications of computer networks. 05
3 How is pervasive computing transforming the business environment? IA
4 Discuss in detail the application domains of pervasive computing. IA
5 What is Cloud Computing? Explain its models. 10
6 Describe various Cloud Computing Models and highlight their evolution. 10 02
7 Discuss the potential benefits of the cloud computing model to the customers and IA
business.

1 Differentiate between computer network wired and wireless technology. 05, IA 02

Feature Wired Technology Wireless Technology

Network connection using Network connection through radio waves,


Definition
physical cables. no cables.

Uses cables like Ethernet, fiber Uses Wi-Fi, Bluetooth, cellular signals,
Medium
optic, coaxial. infrared.

Generally higher speeds (up to Slower compared to wired (up to 10 Gbps


Speed
100 Gbps with fiber). with Wi-Fi 6).

More reliable and stable due to Less reliable; susceptible to interference


Reliability
direct connection. and signal loss.

More secure as physical access is Vulnerable to attacks if network is not


Security
needed to breach. encrypted (e.g., Wi-Fi).

Installation Higher cost due to cables and Lower initial setup cost; does not require
Cost installation requirements. physical cables.

Limited mobility; devices are High mobility; devices can move freely
Mobility
restricted to cable length. within range of signal.

Maintenance involves managing


Less maintenance once installed,
Maintenance interference, signal range, and
but physical wear can occur.
reconfiguration.

Less prone to interference; Prone to interference from walls,


Interference
usually stable once installed. weather, other wireless devices.
Feature Wired Technology Wireless Technology

More challenging to scale due to Easier to scale; adding devices without


Scalability
cable management. physical limitations.

Example Offices, data centers, desktops, Home networks, mobile devices, IoT
Usage high-speed connections. devices, public Wi-Fi.

Lower latency; suitable for real- Higher latency; affected by distance and
Latency
time applications. obstacles.

2 Explain the applications of computer networks. 05

3 How is pervasive computing transforming the business environment? IA


4 Discuss in detail the application domains of pervasive computing. IA
5 What is Cloud Computing? Explain its models. 10
6 Describe various Cloud Computing Models and highlight their evolution. 10 02
Cloud Computing Deployment Models Based on Infrastructure Ownership
1. Private Cloud:
o Description: A private cloud is dedicated to a single organization, managed
internally or by a third party, and hosted internally or externally.
o Use Case: Suited for organizations needing high control over data, security,
and infrastructure.
2. Public Cloud:
o Description: Services are deployed over the public internet and accessible to
the general public, sometimes for free with premium services as a paid
option.
o Use Case: Suitable for applications requiring scalability and flexibility, like web
hosting and file storage.
3. Hybrid Cloud:
o Description: A combination of public and private clouds, allowing for
flexibility when some workloads benefit from public cloud scalability, while
sensitive data remains in the private cloud.
o Use Case: Ideal for businesses with variable workloads and temporary needs
for additional resources.
4. Community Cloud:
o Description: Shared infrastructure among organizations with common
concerns (e.g., compliance, security), either managed internally or by a third
party.
o Use Case: Suitable for organizations within the same industry with shared
requirements, like healthcare or government institutions.
Cloud Computing Service Models
1. Infrastructure-as-a-Service (IaaS):
o Description: Provides infrastructure services like storage, networking, and
virtualization over the internet. Users manage their applications and
operating systems, while the provider manages hardware.
o Example: AWS EC2, Google Compute Engine.
2. Platform-as-a-Service (PaaS):
o Description: Delivers a platform with tools and a runtime environment for
application development, testing, and deployment. Users focus on the
application, while the provider handles underlying infrastructure.
o Example: Google App Engine, Microsoft Azure App Service.
3. Software-as-a-Service (SaaS):
o Description: Makes software available over the internet on a subscription
basis. The provider handles everything, including application updates and
maintenance.
o Example: Google Workspace, Salesforce, Microsoft 365.
Evolution of Cloud Computing Models
• Initial Phase: Began with IaaS, focusing on virtualized hardware, enabling businesses
to avoid upfront infrastructure costs.
• Next Phase: PaaS emerged, adding development and deployment tools, simplifying
application management.
• Present Phase: SaaS has become popular, providing ready-to-use applications over
the internet, minimizing the need for in-house IT management.
• Current Trend: Hybrid and Multi-Cloud models are increasingly adopted, leveraging
various cloud types for specific needs while maximizing flexibility and control.
7 Discuss the potential benefits of the cloud computing model to the customers and IA
business.
Benefits to Customers
1. Cost Savings:
o Reduced Infrastructure Costs: Customers don't need to invest in expensive
hardware and data centers, as resources are hosted on the cloud.
o Pay-as-You-Go Model: Customers only pay for what they use, allowing for
better cost management and resource efficiency.
2. Accessibility and Mobility:
o Anywhere, Anytime Access: Cloud services are accessible from anywhere
with an internet connection, providing flexibility to work remotely.
o Device Independence: Services can be accessed from any device, enabling
users to work seamlessly across desktops, tablets, and smartphones.
3. Improved Collaboration:
o Real-Time Collaboration: Cloud-based tools allow multiple users to work on a
document or project simultaneously, facilitating teamwork and enhancing
productivity.
o File Sharing and Communication: Files and resources can be shared easily,
improving communication within teams and with external collaborators.
4. Scalability:
o On-Demand Resource Allocation: Customers can scale resources up or down
based on their needs without purchasing or managing additional hardware.
o Automatic Scaling: Cloud services can handle sudden spikes in usage,
ensuring that customers experience uninterrupted service.
5. Enhanced Data Security and Disaster Recovery:
o Data Backup and Recovery: Cloud providers often offer automatic backups
and disaster recovery solutions, safeguarding customer data.
o Security Features: Many providers invest in high-level security infrastructure
and updates, protecting customers against cyber threats.

Benefits to Businesses
1. Operational Efficiency:
o Reduced IT Complexity: Businesses can focus on their core operations as
cloud providers handle infrastructure maintenance, updates, and support.
o Quick Deployment: Cloud services enable faster setup and deployment of
applications, shortening time-to-market for new services.
2. Cost Efficiency and Capital Savings:
o Lower Capital Expenditure: Businesses can avoid large upfront costs
associated with physical infrastructure, transitioning to an operational
expense model.
o Optimized Resource Utilization: Businesses only pay for what they use,
allowing for more efficient budget allocation and cost savings.
3. Business Agility and Flexibility:
o Rapid Scaling: Businesses can scale resources to meet fluctuating demands,
adapting quickly to changes in the market or seasonal trends.
o Support for Innovation: The cloud provides a flexible platform for testing and
developing new products without extensive infrastructure investments.
4. Enhanced Data Management and Analytics:
o Centralized Data: The cloud allows businesses to centralize data from various
sources, improving data organization and accessibility.
o Advanced Analytics and AI Capabilities: Cloud providers often offer tools for
big data analytics and AI, enabling businesses to gain insights and make data-
driven decisions.
5. Improved Security and Compliance:
o Regulatory Compliance: Many cloud providers support compliance standards
(like GDPR, HIPAA), ensuring businesses can meet industry regulations.
o Enhanced Security Features: Cloud providers often offer advanced security
protocols, encryption, and multi-factor authentication to protect business
data.
VI]
• Information System within Organization: Transaction Processing Systems, Functional
Area Information System, ERP and ERP support of Business Process.
• Acquiring Information Systems and Applications: Various System development life cycle
models.

Sr Questions Marks Repeat


1 Write short notes on (1) TPS (2) ERP 10
2 Discuss the scope of an ERP system with a bank? What are the disadvantages of an IA
ERP?
3 What is ERP? How does the design of an information system affect the
implementation of an ERP?
4 Compare and contrast 3 basic types of reports which are closely associated with 10
FAIS and ERP System.
5 What are the functional areas of Information system. Explain in detail. 10, IA
6 Explain the phases of the system development lifecycle with example. 10
7 Describe the tools that augment the traditional SDLC. 10

1 Write short notes on (1) TPS (2) ERP 10


A simple Transaction Processing System
2 Discuss the scope of an ERP system with a bank? What are the disadvantages of an IA
ERP?
Scope of an ERP System in a Bank
1. Core Banking Operations:
o Account Management: Facilitates customer account creation, updates, and
management.
o Transaction Processing: Manages deposits, withdrawals, and fund transfers
seamlessly.
2. Customer Relationship Management (CRM):
o Customer Data Management: Centralizes customer information for better
service delivery.
o Sales and Marketing Automation: Helps in targeting customers with
personalized offerings.
3. Financial Management:
o Accounting: Automates financial reporting, budgeting, and general ledger
management.
o Risk Management: Analyzes risk exposure and assists in compliance with
regulatory requirements.
4. Human Resource Management (HRM):
o Employee Records: Manages recruitment, payroll, benefits, and performance
appraisal.
o Training and Development: Tracks employee training and career
development initiatives.
5. Supply Chain Management:
o Vendor Management: Manages relationships with service providers and
suppliers.
o Procurement: Streamlines the purchasing process for banking operations.
6. Regulatory Compliance:
o Reporting: Ensures timely and accurate reporting to regulatory bodies.
o Audit Trails: Maintains records for compliance audits and risk assessments.
7. Business Intelligence (BI):
o Data Analytics: Provides insights for decision-making through data analysis
and reporting tools.
o Performance Metrics: Tracks key performance indicators (KPIs) to measure
business efficiency.
8. Integration with Third-party Systems:
o Payment Gateways: Integrates with online and mobile payment systems.
o External Financial Systems: Connects with external financial services for
comprehensive operations.

Disadvantages of an ERP System


1. High Implementation Costs:
o Initial costs for software, hardware, and consultancy can be substantial.
2. Complexity:
o The complexity of setup and customization may lead to longer
implementation times and require extensive training for staff.
3. Change Management Challenges:
o Resistance to change from employees accustomed to legacy systems can
hinder adoption.
4. Maintenance and Upgrades:
o Ongoing maintenance and updates can incur additional costs and require
dedicated IT resources.
5. Limited Flexibility:
o Standardized processes may not fit all business needs, making it challenging
for banks to tailor the ERP system to specific requirements.
6. Data Security Risks:
o Centralized databases may pose significant security risks if not adequately
protected against breaches.
7. Dependence on Vendor:
o Organizations may become overly reliant on their ERP vendors for support
and upgrades, which can limit their autonomy.
8. Potential for Downtime:
o System failures or outages can disrupt banking operations, impacting
customer service and operational efficiency.
9. Integration Issues:
o Challenges may arise when integrating the ERP system with existing software
and systems.
10. User Training Requirements:
o Extensive training is needed for users to effectively navigate and utilize the
system, which can be time-consuming and costly.
3 What is ERP? How does the design of an information system affect the IA
implementation of an ERP?
What is ERP?
Enterprise Resource Planning (ERP) is a type of software that organizations use to manage
and integrate the essential parts of their businesses. An ERP software system can integrate
planning, purchasing inventory, sales, marketing, finance, human resources, and more. Key
features of ERP systems include:
• Centralized Database: Consolidates all business data into a single database,
improving accuracy and accessibility.
• Integrated Modules: Different modules for various business functions (finance, HR,
supply chain, etc.) that work together seamlessly.
• Real-time Information: Provides up-to-date data, enabling informed decision-making
and improving operational efficiency.
• Automation: Automates routine tasks, reducing manual effort and errors.
• Improved Reporting: Facilitates better reporting and analytics through centralized
data.
How the Design of an Information System Affects the Implementation of an ERP
1. System Architecture:
o Modular vs. Monolithic: A modular design allows for easier integration and
customization of specific business functions, while a monolithic system may
be more challenging to modify.
o Scalability: The design must accommodate future growth. A scalable
architecture can adapt to increased transaction volumes or additional
functionalities without requiring a complete overhaul.
2. Data Structure:
o Data Consistency: A well-designed information system promotes data
consistency and integrity, ensuring accurate and reliable information across
the ERP system.
o Data Migration: The ease of migrating existing data into the new ERP system
depends on the information system's design. Poorly structured data can
complicate the migration process.
3. User Interface (UI) and User Experience (UX):
o Intuitive Design: A user-friendly interface helps employees adapt to the new
system quickly, reducing training time and resistance to change.
o Accessibility: The design affects how easily users can access and interact with
the system. Mobile-friendly designs can enhance accessibility for remote
workers.
4. Integration Capabilities:
o Interoperability: A well-designed information system supports integration
with existing systems and third-party applications, enabling seamless data
exchange and communication.
o API Availability: Providing APIs in the design allows for easier connections
between the ERP and other software solutions.
5. Security and Compliance:
o Data Security: The design must incorporate security measures to protect
sensitive data, which is especially critical for industries like banking and
healthcare.
o Compliance Features: A compliant design can facilitate adherence to industry
regulations, ensuring that the ERP system meets necessary legal standards.
6. Customization and Configuration:
o Flexibility: A flexible design allows organizations to customize and configure
the ERP system to meet specific business requirements, enhancing user
satisfaction.
o Future Modifications: If the information system is rigidly designed, future
modifications or updates to the ERP may become complex and costly.
7. Change Management:
o Support for Change: The design should support change management
initiatives, facilitating smooth transitions from legacy systems to the new ERP
system.
o Training and Support: A design that incorporates user training resources and
support can ease the implementation process.
8. Performance and Reliability:
o System Performance: The design impacts the system's performance and
responsiveness, affecting user satisfaction and operational efficiency.
o Downtime Management: A robust design considers system reliability and
includes contingency plans for minimizing downtime during implementation

4 Compare and contrast 3 basic types of reports which are closely associated with IA 10
FAIS and ERP System.
5 What are the functional areas of Information system. Explain in detail. 10
Information systems (IS) support various functional areas in an organization, helping
streamline operations and decision-making across departments. Here are the key functional
areas of an information system, explained in detail:
1. Accounting and Finance Information Systems
• Purpose: These systems manage financial resources, track assets, liabilities, income,
and expenses, and ensure regulatory compliance.
• Functions:
o Financial Reporting: Automates the creation of balance sheets, income
statements, and financial reports.
o Budgeting and Forecasting: Assists in planning and controlling financial
resources.
o Accounts Payable/Receivable: Manages cash inflows and outflows.
o Auditing: Ensures financial integrity and compliance with legal standards.
• Examples: Accounting software like QuickBooks or SAP's Financial Accounting
module.
2. Human Resources Information Systems (HRIS)
• Purpose: These systems handle personnel management, payroll, recruitment, and
compliance.
• Functions:
o Recruitment and Selection: Manages job postings, applications, and
interviews.
o Payroll Management: Automates salary calculations, tax deductions, and
benefits management.
o Employee Information Management: Keeps track of employee records such
as performance, training, and personal data.
o Compliance: Ensures adherence to labor laws and regulations.
• Examples: Systems like Workday or Oracle HCM Cloud.
3. Marketing Information Systems
• Purpose: Marketing IS supports market research, customer analysis, sales
forecasting, and promotional planning.
• Functions:
o Customer Relationship Management (CRM): Tracks interactions with
customers to improve service and loyalty.
o Market Analysis: Collects and analyzes market data to identify trends and
opportunities.
o Sales and Distribution Management: Monitors sales performance and
manages distribution channels.
o Advertising and Promotion Management: Plans and tracks the effectiveness
of marketing campaigns.
• Examples: CRM systems like Salesforce or HubSpot.
4. Operations and Manufacturing Information Systems
• Purpose: Supports the planning, production, and control of manufacturing
processes, ensuring efficiency and quality.
• Functions:
o Inventory Management: Monitors stock levels, orders, and supply chain
logistics.
o Production Planning: Helps in scheduling, resource allocation, and workflow
management.
o Quality Control: Tracks production defects and enforces quality standards.
o Supply Chain Management (SCM): Oversees the entire supply chain, from
raw materials to final delivery.
• Examples: SAP SCM, Oracle SCM, or custom ERP modules.
5. Sales Information Systems
• Purpose: Helps manage customer interactions, sales processes, and order tracking.
• Functions:
o Order Management: Tracks customer orders from initiation to fulfillment.
o Sales Performance Analysis: Analyzes sales data to optimize sales strategies.
o Customer Interaction Management: Facilitates communication with
customers to improve satisfaction.
o Lead Generation and Tracking: Monitors sales leads and converts them into
opportunities.
• Examples: Salesforce, Microsoft Dynamics 365.
6. Supply Chain Management Systems
• Purpose: These systems oversee the procurement, production, distribution, and
inventory management functions.
• Functions:
o Procurement Management: Manages vendor relationships, purchase orders,
and sourcing.
o Logistics Management: Handles transportation and delivery of goods.
o Inventory Control: Optimizes inventory levels and prevents stockouts or
overstocking.
o Supplier Relationship Management (SRM): Streamlines communication and
transactions with suppliers.
• Examples: SAP SCM, Oracle SCM Cloud, or JD Edwards.
7. Customer Relationship Management (CRM) Systems
• Purpose: CRM systems focus on managing relationships with existing and potential
customers.
• Functions:
o Customer Data Management: Stores and organizes customer contact details
and history.
o Sales Force Automation: Assists sales teams in managing leads,
opportunities, and pipeline.
o Customer Service and Support: Tracks customer complaints, service requests,
and feedback.
o Marketing Automation: Automates marketing campaigns and tracks
customer responses.
• Examples: Salesforce, Zoho CRM.
8. Knowledge Management Systems (KMS)
• Purpose: Supports the organization in capturing, storing, and sharing knowledge
across departments.
• Functions:
o Knowledge Capture and Storage: Collects and stores knowledge from various
sources (documents, employees, databases).
o Collaboration Tools: Facilitates collaboration among employees and teams.
o Decision Support: Provides data-driven insights to assist management in
decision-making.
o Content Management: Manages document workflows, archiving, and
retrieval.
• Examples: Microsoft SharePoint, Confluence, and other collaboration platforms.
9. Decision Support Systems (DSS)
• Purpose: DSS helps in decision-making by providing analytical models and
simulations.
• Functions:
o Data Analysis and Reporting: Assists managers in analyzing data and
generating reports for decision-making.
o What-If Scenarios: Simulates potential outcomes of different business
strategies.
o Optimization: Helps in optimizing resources, budgets, and schedules.
o Executive Information Systems (EIS): Provides senior management with easy-
to-understand, high-level data to make strategic decisions.
• Examples: Tableau, Power BI, or custom DSS tools.
10. Information Security Management Systems (ISMS)
• Purpose: Protects organizational data and systems from breaches, ensuring
confidentiality, integrity, and availability.
• Functions:
o Access Control: Manages who can access sensitive data and systems.
o Incident Management: Tracks and responds to security incidents and
breaches.
o Data Encryption: Secures sensitive information during storage and
transmission.
o Compliance Monitoring: Ensures the organization meets security and privacy
regulations.
Examples: Cisco Security Manager, Splunk, or custom ISMS solutions.
6 Explain the phases of the system development lifecycle with example. 10
7 Describe the tools that augment the traditional SDLC. 10
The traditional Software Development Life Cycle (SDLC) consists of a series of stages that
software projects typically follow, including requirements gathering, design, implementation,
testing, deployment, and maintenance. To enhance and streamline these processes, various
tools have emerged to support and augment the traditional SDLC. Here are some key
categories of tools used in each stage of the SDLC:
1. Requirements Management Tools
• Examples: JIRA, Confluence, IBM Engineering Requirements Management DOORS
• Functions:
o Facilitate requirements gathering, documentation, and tracking.
o Enable collaboration among stakeholders to ensure all requirements are
captured and managed effectively.
o Provide traceability from requirements to implementation.
2. Design and Prototyping Tools
• Examples: Lucidchart, Microsoft Visio, Figma, Adobe XD
• Functions:
o Allow for the creation of wireframes, mockups, and prototypes to visualize
the software before development.
o Support design collaboration and feedback collection among teams.
o Enable iterative design processes, making it easier to refine user interfaces.
3. Version Control Systems
• Examples: Git, Subversion (SVN), Mercurial
• Functions:
o Track changes to source code and manage different versions of the software.
o Facilitate collaboration among developers by enabling branching and merging
of code.
o Ensure code integrity and allow for easy rollback to previous versions if
needed.
4. Integrated Development Environments (IDEs)
• Examples: Visual Studio, IntelliJ IDEA, Eclipse
• Functions:
o Provide a comprehensive environment for coding, debugging, and testing
software.
o Include features such as syntax highlighting, code completion, and debugging
tools to enhance developer productivity.
o Often integrate with version control systems and build tools.
5. Continuous Integration/Continuous Deployment (CI/CD) Tools
• Examples: Jenkins, CircleCI, Travis CI, GitLab CI/CD
• Functions:
o Automate the process of integrating code changes and deploying them to
production environments.
o Facilitate automated testing to catch bugs early in the development process.
o Improve collaboration and speed up the delivery of software updates.
6. Testing Tools
• Examples: Selenium, JUnit, TestNG, Postman
• Functions:
o Enable automated testing of applications, including unit tests, integration
tests, and functional tests.
o Provide tools for performance testing, security testing, and user acceptance
testing.
o Help in tracking defects and managing test cases.
7. Project Management Tools
• Examples: Trello, Asana, Microsoft Project, Monday.com
• Functions:
o Facilitate planning, tracking, and managing software projects and resources.
o Enable collaboration among team members and provide visibility into project
progress.
o Support agile methodologies with features for sprint planning, backlog
management, and task tracking.
8. Collaboration and Communication Tools
• Examples: Slack, Microsoft Teams, Zoom, Google Workspace
• Functions:
o Enhance communication among team members, stakeholders, and clients.
o Support file sharing, video conferencing, and real-time collaboration.
o Help in maintaining project documentation and meeting notes.
9. Monitoring and Analytics Tools
• Examples: Google Analytics, New Relic, Splunk
• Functions:
o Monitor application performance and user behavior in real time.
o Provide insights into application health, usage patterns, and potential issues.
o Support data-driven decision-making for future enhancements.
10. Configuration Management Tools
• Examples: Ansible, Chef, Puppet
• Functions:
o Automate the deployment and configuration of servers and applications.
o Ensure consistency across environments (development, testing, production).
o Facilitate infrastructure as code practices, enabling version control for
infrastructure.

Sr Extra Questions Marks Repeat


1 Create MIS system for any hospital. 10
2 Compare between mobile applications like WhatsApp and Telegram on various 05
parameters like multimedia, security, privacy, storage, data usage, notifications etc.
3 Identify the five factors that contribute to the increasing vulnerability of 05
information resources, and provide a specific example of each one?
4 Design MIS for the Educational System. 10

1 Create MIS system for any hospital. 10


Creating a Management Information System (MIS) for a hospital involves several
components that facilitate the management and organization of hospital operations, patient
care, and data reporting. Below is a comprehensive outline of a Hospital Management
Information System, including key features, architecture, and components.
Overview of the Hospital Management Information System (HMIS)
Purpose: To streamline hospital operations, enhance patient care, and improve decision-
making through the efficient management of patient information, resources, and
administrative functions.

Key Components and Features


1. Patient Management
o Patient Registration: Online registration form for new patients, capturing
essential details (name, age, contact, medical history).
o Appointment Scheduling: Module for booking, rescheduling, and canceling
appointments.
o Patient Records: Comprehensive database of patient medical history,
treatment plans, prescriptions, and lab results.
2. Staff Management
o Employee Database: Records for doctors, nurses, and administrative staff,
including qualifications, roles, and schedules.
o Shift Management: Tool for managing staff schedules and shifts.
o Performance Tracking: Module for evaluating staff performance based on
various metrics.
3. Clinical Management
o Electronic Health Records (EHR): Secure storage of patient health records
accessible by authorized personnel.
o Treatment Plans: Documentation and tracking of treatment protocols for
patients.
o Prescription Management: Allows doctors to prescribe medications
electronically, reducing errors.
4. Billing and Financial Management
o Patient Billing: Generation of invoices based on services rendered, including
consultations, lab tests, and treatments.
o Insurance Claims Processing: Automation of insurance claim submissions and
tracking.
o Financial Reporting: Generation of financial statements and reports for
revenue tracking.
5. Inventory Management
o Medical Supplies Management: Tracking of medical inventory, including stock
levels and expiration dates.
o Order Management: Automates the ordering process for supplies and
equipment when stock levels are low.
o Supplier Management: Database for managing suppliers and purchase
orders.
6. Reporting and Analytics
o Custom Reports: Generation of reports for various departments (clinical,
administrative, financial) to aid in decision-making.
o Data Analytics: Tools for analyzing patient demographics, treatment
outcomes, and resource utilization.
o Dashboard: Visual interface for real-time monitoring of key performance
indicators (KPIs).
7. Communication System
o Internal Messaging: Secure messaging platform for communication among
staff.
o Patient Communication: Automated notifications for appointment reminders,
test results, and follow-up care instructions.
o Telemedicine Integration: Enables remote consultations between patients
and healthcare providers.
8. Security and Compliance
o Access Control: Role-based access to ensure data security and confidentiality.
o Data Encryption: Protects sensitive patient data both in transit and at rest.
o Regulatory Compliance: Adherence to healthcare regulations (HIPAA, GDPR)
for patient data protection.

System Architecture
1. Client-Server Architecture
o Client Side: User interfaces for patients, doctors, and administrative staff
accessible via web browsers or mobile applications.
o Server Side: Backend server hosting the database and application logic,
ensuring data processing and storage.
2. Database Management System (DBMS)
o Relational Database: Use of a relational database (e.g., MySQL, PostgreSQL)
to store structured data (patient records, billing information).
o Data Warehousing: A separate data warehouse for analytical processing,
allowing for historical data analysis.
3. Integration with Other Systems
o Interoperability: Ability to integrate with external systems (laboratories,
pharmacies, insurance providers) via APIs for seamless data exchange.
o Third-party Software: Integration with accounting software for financial
management and reporting.

Implementation Plan
1. Requirement Analysis
o Conduct interviews with stakeholders (doctors, nurses, administrative staff) to
gather requirements.
o Identify key functionalities and prioritize features for development.
2. System Design
o Create wireframes and prototypes for user interfaces.
o Define database schema and architecture based on requirements.
3. Development
o Implement the system using suitable technologies (e.g., Python, Java,
JavaScript for frontend, RESTful APIs for backend).
o Develop modules iteratively, ensuring quality assurance through testing.
4. Testing
o Conduct unit testing, integration testing, and user acceptance testing (UAT) to
ensure functionality and usability.
o Gather feedback from end-users and make necessary adjustments.
5. Deployment
o Deploy the system on a secure server with data backup mechanisms in place.
o Train staff on using the new system and provide support during the transition.
6. Maintenance and Support
o Establish a support team for ongoing maintenance, updates, and
troubleshooting.
o Regularly gather feedback for continuous improvement of the system.

Conclusion
A Hospital Management Information System (HMIS) enhances the efficiency and
effectiveness of hospital operations, improving patient care and administrative processes. By
implementing a structured approach to developing the system, hospitals can better manage
their resources, streamline workflows, and ultimately provide higher-quality healthcare
services.

2 Compare between mobile applications like WhatsApp and Telegram on various 05


parameters like multimedia, security, privacy, storage, data usage, notifications etc.
Comparison Between WhatsApp and Telegram

Parameter WhatsApp Telegram

- Supports images, videos, voice


- Supports images, videos, voice messages, documents, and location
messages, documents, and sharing.
Multimedia location sharing. - Maximum file size for media: 2 GB.
- Maximum file size for media: - Supports voice and video calls.
100 MB. - More extensive editing tools for photos
- Supports voice and video calls. and videos.
Parameter WhatsApp Telegram

- Built-in photo and video


editing features.

- End-to-end encryption for


messages, calls, photos, and - End-to-end encryption for secret chats
videos. only; regular chats are encrypted in transit
- Security is applied to and stored encrypted.
Security
individual chats but not to - Two-step verification available.
backups. - Self-destructing messages feature for
- Two-step verification added security.
available.

- Requires phone number for


- Allows users to register with a username
registration.
instead of a phone number.
- Status updates visible to all
Privacy - Privacy settings more customizable, such
contacts unless restricted.
as controlling who can see your phone
- Last seen and online status
number and last seen.
can be hidden.

- Stores media in the device


gallery and backups to cloud - Stores media in the cloud, which can be
(Google Drive/iCloud). accessed from multiple devices.
Storage
- Limited to a certain amount of - No limit on the number of messages or
cloud storage based on backup media that can be stored.
plan.

- Data usage may be higher for - Generally lower data usage for sending
video calls and sending large messages.
Data Usage files. - Allows users to choose the quality of
- Users can control data usage media sent (compressed vs.
in settings. uncompressed).

- Push notifications for - Push notifications for messages,


messages, calls, and group channels, and groups.
Notifications chats. - Advanced notification settings allow for
- Notification settings can be more granular control, including custom
customized per chat. sounds and vibration patterns.

- Simple and user-friendly


- Offers more customization options,
interface.
User Interface including chat backgrounds, themes, and
- Limited customization options
fonts.
(themes, colors).
Parameter WhatsApp Telegram

- Groups can support up to 200,000


- Group chats support up to members.
Groups &
1024 members. - Channels for broadcasting messages to
Channels
- Admin controls are limited. an unlimited number of subscribers.
- Advanced admin tools and roles.

- Extensive bot support for automation


- Limited bot functionality;
Bots & and integrations with various services.
primarily used for customer
Integrations - Users can create custom bots for
service and notifications.
different purposes.

- Available on iOS, Android, web, and


- Available on iOS, Android, and
Cross-Platform desktop (standalone app).
web (requires phone
Support - All devices can access the same account
connection).
without needing a phone connection.

Summary
• WhatsApp is best for users looking for a straightforward messaging app with strong
security through end-to-end encryption and a simple interface. It's ideal for personal
communication and small group chats.
• Telegram is suitable for users who prefer extensive customization options, larger
groups, advanced privacy features, and a wide array of bot integrations. Its cloud
storage and multi-device support also make it more versatile for those needing
access to messages and media across multiple platforms.

3 Identify the five factors that contribute to the increasing vulnerability of 05


information resources, and provide a specific example of each one?
The increasing vulnerability of information resources can be attributed to several factors.
Here are five key factors along with specific examples for each:
1. Cyber Threats and Attacks
• Example: Ransomware Attacks: In 2021, the Colonial Pipeline was targeted by a
ransomware attack, which led to significant disruptions in fuel supply across the
eastern United States. The attackers encrypted the company’s data and demanded a
ransom for the decryption key, highlighting the growing threat of ransomware to
critical infrastructure.
2. Insider Threats
• Example: Data Leaks by Employees: In 2013, Edward Snowden, a former NSA
contractor, leaked classified information about global surveillance programs. His
actions exposed the vulnerabilities associated with insider threats, where employees
with access to sensitive information misuse it, either maliciously or negligently.
3. Inadequate Security Measures
• Example: Weak Password Policies: The Yahoo data breaches in 2013 and 2014 were
partly due to inadequate security measures, including weak password policies.
Attackers exploited these vulnerabilities to gain unauthorized access to the accounts
of millions of users, resulting in the compromise of personal data.
4. Technological Advancements
• Example: Internet of Things (IoT) Devices: The Mirai botnet attack in 2016 leveraged
IoT devices with poor security configurations (e.g., default passwords) to launch a
distributed denial-of-service (DDoS) attack. This incident demonstrated how the
proliferation of connected devices can create new attack vectors for cybercriminals.
5. Lack of Employee Training and Awareness
• Example: Phishing Attacks: The 2020 Twitter hack, which involved social engineering
to gain access to employee accounts, underscored the importance of employee
training. Attackers used phishing tactics to trick employees into providing their login
credentials, leading to the compromise of high-profile accounts and sensitive
information.

4 Design MIS for the Educational System. 10


Designing a Management Information System (MIS) for the educational system involves
creating a comprehensive platform that supports various stakeholders, including students,
teachers, administrators, and parents. Below is a detailed outline for an Educational
Management Information System (EMIS), including its key components, features,
architecture, and implementation plan.
Overview of the Educational Management Information System (EMIS)
Purpose: To facilitate the management of educational resources, improve communication
among stakeholders, enhance student learning experiences, and provide data-driven insights
for decision-making.

Key Components and Features


1. Student Management
o Student Registration: Online registration form for new students, capturing
essential details (name, age, contact information, and guardian details).
o Enrollment Management: Module for managing course enrollments,
transfers, and withdrawals.
o Academic Records: Comprehensive database of student grades, attendance,
and behavior records.
2. Course Management
o Course Catalog: List of available courses, including descriptions, prerequisites,
and credits.
o Curriculum Planning: Tools for educators to design and update curricula
based on standards and student needs.
o Scheduling: Class scheduling tool for assigning classrooms, teachers, and
timings.
3. Teacher Management
o Staff Database: Records for teachers and staff, including qualifications, roles,
and schedules.
o Performance Evaluation: Module for evaluating teacher performance based
on student feedback and outcomes.
o Professional Development: Tracking of teachers' training sessions,
workshops, and certifications.
4. Assessment and Evaluation
o Exam Management: Tools for scheduling, conducting, and grading exams and
assessments.
o Grade Book: Electronic grade book for teachers to record and calculate
student grades easily.
o Feedback Mechanism: Allows students to provide feedback on courses and
teaching effectiveness.
5. Communication System
o Internal Messaging: Secure messaging platform for communication among
students, teachers, and administrators.
o Announcements: Centralized announcement board for school news, events,
and updates.
o Parent-Teacher Communication: Tools for regular updates and
communications between parents and teachers.
6. Financial Management
o Tuition Management: Module for managing tuition payments, scholarships,
and financial aid.
o Expense Tracking: Tools for tracking school expenses, budgeting, and
reporting.
o Financial Reporting: Generation of financial statements and reports for
analysis.
7. Reporting and Analytics
o Custom Reports: Generation of reports for academic performance,
attendance, and financials.
o Data Analytics: Tools for analyzing student performance trends, resource
allocation, and operational efficiency.
o Dashboard: Visual interface for real-time monitoring of key performance
indicators (KPIs).
8. Security and Compliance
o Access Control: Role-based access to ensure data security and confidentiality.
o Data Encryption: Protects sensitive student and staff data both in transit and
at rest.
o Regulatory Compliance: Adherence to educational regulations (FERPA, GDPR)
for student data protection.

System Architecture
1. Client-Server Architecture
o Client Side: User interfaces for students, teachers, administrators, and
parents accessible via web browsers or mobile applications.
o Server Side: Backend server hosting the database and application logic,
ensuring data processing and storage.
2. Database Management System (DBMS)
o Relational Database: Use of a relational database (e.g., MySQL, PostgreSQL)
to store structured data (student records, course information).
o Data Warehousing: A separate data warehouse for analytical processing,
allowing for historical data analysis.
3. Integration with Other Systems
o Interoperability: Ability to integrate with external systems (library
management, student information systems) via APIs for seamless data
exchange.
o Third-party Software: Integration with financial software for managing
budgets and expenses.

Implementation Plan
1. Requirement Analysis
o Conduct interviews with stakeholders (students, teachers, administrators,
parents) to gather requirements.
o Identify key functionalities and prioritize features for development.
2. System Design
o Create wireframes and prototypes for user interfaces.
o Define database schema and architecture based on requirements.
3. Development
o Implement the system using suitable technologies (e.g., Python, Java,
JavaScript for frontend, RESTful APIs for backend).
o Develop modules iteratively, ensuring quality assurance through testing.
4. Testing
o Conduct unit testing, integration testing, and user acceptance testing (UAT) to
ensure functionality and usability.
o Gather feedback from end-users and make necessary adjustments.
5. Deployment
o Deploy the system on a secure server with data backup mechanisms in place.
o Train staff, students, and parents on using the new system and provide
support during the transition.
6. Maintenance and Support
o Establish a support team for ongoing maintenance, updates, and
troubleshooting.
o Regularly gather feedback for continuous improvement of the system.

Conclusion
An Educational Management Information System (EMIS) enhances the efficiency and
effectiveness of educational institutions by improving communication, data management,
and decision-making. By implementing a structured approach to developing the system,
educational organizations can better manage their resources, streamline workflows, and
ultimately provide a higher-quality learning experience for students.

You might also like