0% found this document useful (0 votes)
61 views7 pages

Swakshor-Choudhury-Dip-1921623030-Final-Assignment-Spring-2020. (Repaired)

The document provides instructions for a final assignment in an MIS course. It includes 6 questions to answer related to systems development lifecycle, ERP systems, EDI, computer networks, CRM systems, and protecting from DDoS attacks. Students are instructed to answer all questions thoroughly and avoid plagiarism when submitting.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
61 views7 pages

Swakshor-Choudhury-Dip-1921623030-Final-Assignment-Spring-2020. (Repaired)

The document provides instructions for a final assignment in an MIS course. It includes 6 questions to answer related to systems development lifecycle, ERP systems, EDI, computer networks, CRM systems, and protecting from DDoS attacks. Students are instructed to answer all questions thoroughly and avoid plagiarism when submitting.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

Final Assignment

Final Assignment
Faculty name: Abu Sayeed Arif

MIS 107, Spring 2020 Final Assignment 

Total Marks: (6 X 5) = 30

Time Frame: 18 May – 4 June, 2020


th th

Instructions
●    Answer all five questions

●    Consider at least five dimensions when you answer each question.

●    Do not discuss on final exam questions with any person.

●    Answer within the context of the textbooks. 

●    Use your own word- do not copy even from the textbook. Use a plagiarism checker before you make your
submission.

●    Make sure you submit Just Once your Final Assignment.

Student ID:

Student Name:

Section:

NSU Email:

MIS107- Page 1 of 7 Spring 2020


Final Assignment

1. Draw and explain the requirement analysis phase of the system development life cycle.

The system development life cycle referred to as the application development life-cycle. It is a process
for planning, creating, testing, and applying an information system. The system development life cycle
concept applies to a range of hardware and software configurations, as a system can be composed of
hardware only, software only, or a combination of both. There are usually five stages in this cycle: 1.
System Investigation, 2. System Analysis, 3. System Design, 4. System Implementation, 5. System
Maintenance.

Analysis Design

Implementation
Investigation

Maintenance

MIS107- Page 2 of 7 Spring 2020


Final Assignment

Systems analysis, requirements definition: Define project goals into defined functions and operations of the
intended application. This involves the method of gathering and interpreting facts, diagnosing problems, and
recommending improvements to the system. Project goals are going to be further aided by analysis of end-user
information needs and therefore the removal of any inconsistencies and incompleteness in these requirements.
A series of steps followed by the developer include:

1. Collection of facts: Obtain end user requirements through documentation, client interviews,
observation, and questionnaires.
2. Scrutiny of the existing system: Identify pros and cons of the current system in-place, so as to carry
forward the pros and avoid the cons in the new system.
3. Analysis of the proposed system: Find solutions to the shortcomings described in step two and
prepare the specifications using any specific user proposals.

2. What is the significance of a ERP system within the context of an organization (e.g. Pran Foods)?

A multifunctional enterprise wide backbone that accomplishes business processes and information systems
is known as ERP. It is a cross- functional software suite and it supports basic internal business processes of
a business firm or company.
Significances of ERP system are given bellow:
a. Quality and Efficiency – significant improvements in quality and efficiency of customer service,
production, and distribution
b. Decreased Costs – significant reductions in transaction costs, hardware and software, and IT support
staff
c. Decision Support – provides cross-functional information that enables better decision making across the
enterprise
d. Enterprise Agility – breaks down departmental/functional walls and enables more flexible, adaptive
organizational structures

MIS107- Page 3 of 7 Spring 2020


Final Assignment
3. What is the significance of an EDI within the context of an organization (e.g. Daraz)?

MIS107- Page 4 of 7 Spring 2020


Final Assignment
4. Draw and explain a corporate network including switch, router, NIC and communication media.

MIS107- Page 5 of 7 Spring 2020


Final Assignment
5. Explain the systems approach within the context of deploying a CRM system.

CRM is providing the organization with a single complete view of every customer, and providing the
customer with a single complete view of the organization and its extended channels. Businesses today
must be customer-centric or customer-focused. Components of CRM:

Contact and Account Management: CRM software helps to capture and track relevant data about
every past and planned contact with prospects and customers. Information is captured from all
customer touchpoints, such as telephone, fax, e-mail, the company’s Web site, retail stores and
personal contact. CRM systems store the data that integrates all customer account information and
makes it available throughout the company via Internet, intranet, or other network links.

Sales: CRM system provides sales representatives with the software tools and company data sources
they need to support and manage their sales activities and optimize cross-selling and up-selling .

Marketing and fulfillment: CRM system helps marketing professionals to


integrate marketing campaigns by automating such tasks as qualifying leads for targeted marketing
and scheduling and tracking marketing mailings.

Customer service and support: A CRM system provides service representatives with software tools
and real-time access to the common customer database shared by sales and marketing professionals.
CRM helps customer service managers create, assign, and manage requests for service by customers.
Call center software, help desk software, company website are used for customer service and support.

Retention and loyalty programs: Customer retention and loyalty is a major business strategy and
primary objective of customer relationship management. CRM system tries to help a company
identify, reward and market to their most loyal and profitable customers. CRM analytical software
includes data processing tools and other analytical marketing software, and CRM databases
may contains a customer data warehouse and CRM data marts. These tools are wont to identify
profitable and constant customers.

MIS107- Page 6 of 7 Spring 2020


Final Assignment

6. How can an organization protect itself from a DDoS attack?

DDoS attack: A distributed denial-of-service attack occurs when multiple systems flood the bandwidth or
resources of a targeted system, usually one or more web servers. Such an attack  is usually the results
of multiple compromised systems flooding the targeted system with traffic.
Six steps to prevent DDoS attacks:

1. Buy more bandwidth


The most basic step you'll fancy make your infrastructure "DDoS resistant" is to make sure that you
simply have enough bandwidth to handle spikes in traffic which will be caused by envious activity.

2. Build redundancy into your infrastructure


To make it as hard as possible for an attacker to successfully launch a DDoS attack against your
servers, confirm you spread them across multiple data centers with a good load balancing system to
distribute traffic between them. If possible, these data centers should be in several countries, or a minimum
of in several regions of an equivalent country.

3. Configure your network hardware against DDoS attacks


There are a number of simple hardware configuration changes you can take those changes to prevent a DDoS
attack.

4. Deploy anti-DDoS hardware and software modules


Your servers should be protected by network firewalls and more specialized web application firewalls. Many
hardware vendors now include software protection against DDoS protocol attacks such as SYN flood attack.
By monitoring how many incomplete connections exist and flushing them when the number reaches a
configurable threshold value, it prevents a DDos attack.

5. Deploy a DDoS protection appliance


Many security vendors including NetScout Arbor, Fortinet, Check Point, Cisco and Radware offer appliances
that sit ahead of network firewalls and are designed to dam DDoS attacks before they can take effect.They
do this using a number of techniques.

6. Protect your DNS servers


A malicious actor could also be ready to bring your web servers offline by DDoSing your DNS servers. For
that reason it is important that your DNS servers have redundancy, and placing them in different data centers
behind load balancers is also a good idea. A better solution may even be to maneuver to a cloud-based DNS
provider which will offer high bandwidth and multiple points-of-presence in data centers round the world.

MIS107- Page 7 of 7 Spring 2020

You might also like