0% found this document useful (0 votes)
228 views71 pages

ISM - Sample Paper PDF

ism sample paper

Uploaded by

Anmol
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
228 views71 pages

ISM - Sample Paper PDF

ism sample paper

Uploaded by

Anmol
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 71
a eo . 2018-19] SION : 201 [ACADEMIC vo RI [2018] MODEL STE BA] B FOURTH SEM ae RGrisaNt INFORMATION sySTEM -210] [BBA MM. : 75, Time :3 hrs. , ual marks. 5 +h question carries ed! Note: Attempt any five questions. Each q sean spetaina? Woeplainithe each Q.1.(a) What are the components of i component. a s of two perspectives: one relating Ans. son system has been defined in term: ; ae ei en ad mao he ure iti ton oleae al rg ofinference making, From a structural perspective; an information system ee ofa seoibcisc oth cthcased| dance Scunolonyanie penay formalized language, : which izational purpose or function. forming a cohesive structure which serves some organv technically as a set of interrelated components An information system can be defined a ner that collect (or retrieve), process, store, and distribute information to support decision ddition to supporting decision making, making and control in an organization. In a coordination, and control, information systems may also help managers and workers analyze problems, visualize complex subjects, and create new products. Three activities in an information system produce the information that organizations need to make decisions, control operations, analyze problems, and create new products or services. These activities are input, processing, and output. Input captures or collects raw data from within the organization or from its external environment. Processing converts this raw input into a more meaningful form. Output transfers the processed information to the people who will use it or to the activities for which it will be used. Information systems also require feedback, which is output that is returned to appropriate members of the organization to help them evaluate or correct the input stage. Components of Information Systems 1. Resources of people: (end users and IS speciali t data administrators ete.), Pecilists, system analyst, programmers, 2, Hardware: (Physical computer equipments a: media). ‘ 3. Software: (programs and procedures), ind associate device, machines and Use an informati item untants, sale; ion syst Persons, engineers, clerks, end users, 2-MP-I Fourth Semester, Information System Management + Computer systems: consist of variety of interconnected peripheral devic Examples are microcomputer systems, midrange computer systems, and large com; a systems. Software Resources Software Resources includes all sets of in¢ornat ‘ processing instructions. a Software Resources * System software, such as an operating system * Application software, which are programs that direct processing for a particular use of computers by end users. Data Resources: Data resources include data (which is raw material of information systems) and database. Data can take many forms, including traditional alphanumeric data, composed of numbers and alphabetical and other characters that describe business transactions and other events and entities. Network Resources: Telecommunications networks like the Internet, intranets, and extranets have become essential to the successful operations of all types of organizations and their computer-based information systems. Telecommunications networks consist of computers, communications processors, and other devices interconnected by communications media and controlled by communications software. Q.2a. Explain the characteristics of an MIS and DSS. Ans. Characteristics of an MIS System Approach: The information system follows a System’s approach. The system's approach implies a holistic approach to the study of system and its performance in the light for the objective for which it has been constituted. This approach is antipiecemeal in nature. Management Oriented: This is an important characteristic of MIS. For designing of MIS, top-down approach should BE followed. Top-down approach suggests that the . system development starts from the determination of management needs and overall business objectives. The MIS development plan should BE derived from the overall business plan. Management oriented characteristic of MIS also implies that the management actively directs the system development efforts. Need Based: MIS design and development should BE as per the information needs of managers at different levels, viz., strategic planning level, management control level and operational control level. In other words, MIS should cater to the specific needs of managers in an organization’s hierarchy. . Exception Based: MIS should BE developed on the exception based reporting principle, which means an abnormal situation, i:e, the maximum, minimum or expected j tolerance limits. In such situations, there should BE exception er at the required level. exception based reporting, MIS should also look at the hould not merely provide past or historical information; nation, on the basis of projections based on which actions a necessary characteristic of: ‘a management information ant because of its ability to produce more meaningful S is developed over relatively long periaite: Sue Erste avy element of planning ig involved. The M igner and needs of the company in mind. h Books MP.1_3 Lp. University-(BBATA} ae ’ of MIS development is quite complex and on, Sub-System Concept: The Proves 0 toon, though viewed as a single entity, is likely to lose insight frequently. Thus, eystems which a7 more meaningful at the must BE broken down into digestible sub planning stage. r rtar that holds the functiona) Central Database: A central database a a7 te Mnaster file of data cover, systems together. Each system requires ACO ts is stared! ‘efficiently and common inventory, personnel, vendors, customers, ete. the data needed by any of the functional usage in mind, one master file Can provide te properly validate it and to place it on systems. It seems logical to gather data once, aS rany other sub system. acentral storage medium, that Can BE accesses Characteristics of a DSS + Facilitation: DSS facilitate and s or decision processes. i ss i teracti ~ Interaction: DSS are computer-based systems designed for Inver etre ues by decision makers or staff users who control the sequence of in — « Ancillary: DSS can support decision makers at any level in an organization. They are NOT intended to replace decision makers. : + Repeated Use: DSS are intended for repeated use. A specific DSS may be used routinely or used as needed for adhoc decision support tasks. Identifiable: DSS may be independent systems that collect or replicate data from other information systems OR subsystems of a larger, more integrated information system. * Task-oriented: DSS provide specific capabilities that support one or more tasks related to decision-making, including : alternatives; choice among alternatives; and decision implementation. * Decision Impact: DSS are intended to improve the accuracy, timeliness, quality and overall effectiveness of a specific decision or a set of related decisions. * Supports individual and group decision making : It provides.a single platform that allows all ee to aoe the oi information and access the same on of truth, while providing autonomy to individual users and devel i reporting content locally. lopment groups to design » Comprehensive Data Access: It allows users to * sources concurrently, leavign organizations the freedom to arvesee Peon = that best suits their unique requirements and preferences. ec » Easy to Develop and Deploy: is Ba deplore delivers an interactive, sealable platform fr ‘thi ‘s. Multiple projects can be created within a t teams creat a wide variety support specific decision making activities and) icated analysis, generate via different channels (Web 4—MP-I Fourth Semester, Information System Management system may be defined as a set of elements which are joined together to achieve a common objective. The elements are interrelated and interdependent. Further, every system is said to be composed of sub-systems, which in turn are made up of other sub-systems. This may be illustrated by taking an example of a business organisation, that may be regarded as a system and the parts of the organisation (divisions, departments, units, etc.) are the sub-systems. The set of elements for a system may be understood as Input Process and Output. Process A system has one or multiple input(s); these inputs are processed through a transformation process to convert these input(s) into output(s). For example, in a manufacturing organisation, raw material is input to a system, which is processed by using various organisational processing facilities to convert it into finished products (output). Similarly, in an information system data is input, which is processed to convert it into information. The three elements of a system are portrayed in Fig. [_ input | Process |— Output Fig, Elements of a System Management Information System or ‘MIS’ is a planned system of collecting, storing, and disseminating data in the form of information needed to carry out the functions of management. The three components of MIS provide a more complete and focused definition, where System suggests integration and holistic view, Information stands for processed data, and Management is the ultimate user, the decision makers. Nature and Scope of MIS: The concept of MIS is interdisciplinary in nature, i.e. it has borrowed its concepts from a large number of disciplines like Accounting, Computers, Organisations, Management, Operations Research and Behavioural Sciences, etc. Because ofits interdisciplinary nature, MIS is neither termed as a pure science nor an art; rather it is considered as a combination of both, An information system is a logical system, which is Computer Science Operations Research Behavioural Sciences Management ciplinary Nature of MIS. g accomplished and thus may be differentiated gs itself and is concerned with the content or ses both physical and information systems. whether MIS is more maanagement-oriented advocates of both the sides, MIS should be than of computers because of simple logic of managers. Computers are used for their capacity to handle large amount of data. inctional areas of every type of business een discu: , MIS caters to information its scope lies in structured as well as d be gathered from internal as well as ppAl-Akash Books MPA, versity LP. Univ re rarehaniaceh advent of computer e organisation vis has increased manifold. of external sources of th re us communication technology; Sak Pepstiuitiod system (MIS)? Briefly explain - .3. What is manage’ jonal areas: sched ion of MIS into following functio} a. Marketing b. Finance c. Human Resource Ans. Management info! 8 ang MIS) refers to the processing rmation system ( Dee serarcciae ia .d support manager: : within ay : i wh computers to manage an‘ eeeiaieitiea: Tie hake may include systems ee Partie Processing system, decision support system, expert system, or executive eietGona with ake e term, ereiee teed in the evademic study of businesses and ha! AT areas, nnology, informatics, e-commerce ang such as information systems, information tec a computer science; as a result, the term is used interchangeably with some of these areas, Management Information System in Marketing: Major Components of a marketing information system. The marketing information systems and its subsystems The above diagram illustrates the major components of an MIS, the environmental factors monitored by the system and the types of marketing decision which the MIs seeks to underpin. MARKETING MODELS: Within the MIS there has to be the means of interpreting information in order to give direction to decision. These models may be computerized or may not. Typical tools are: 4 * Time series sales modes. Brand switching models. © Linear programming. Elasticity models (price, incomes, demand, supply, ete. ). * Regression and correlation models. * Analysis of Variance (ANOVA) models. © Sensitivity analysis. | * Discounted cash flow, Spreadsheet ‘what if models, These and simil i 6 t yi jan ‘i i Scones ane financial models are the Breen gir tens: ai MARKETING STRATEGIES USING MIS. The role of Information Systems in devising Marketing strategies has been increasing over the years, ment oloralas yen in Finance: Management Information Systems (MIS) in Finance hay videly adopted both by corporations as well a5 enabling organizations mt with capacity to maintain large data base! systems are primarily w : anon information easily. Thes? Increasingly they are pudgetanns eeneration of financial reports Processes, These systems, vith increasing hi Planning and decision making nancial transparency, efficienY a (MIS) in Human Reso: ce is considered a; of 7 8 one of the key resource? Be re MIS in human resour® de maine Te°ording and payroll calculation: the aia the employee records which ye ing importance of human tesou"®? 6—-MP-I Fourth Semester, Information System Management management and increasing size of the organizations, maintenance of Q. 4. (a) List the two advantages of DBMS over the file system. Ans. Following are the advantages of DBMS over the file system: * Flexibility: Because programs and data are independent, programs do not have to be modified when types of unrelated data are added to or deleted from the database, or when physical storage changes. ‘ * Fast response to information requests: Because data is integrated into a single database, complex requests can be handled much more rapidly than locating data separately. In many businesses, faster response means better customer service. * Multiple access: Database software allows data to be accessed in a variety of ways (through various key fields), by using several programming languages (both3GL and nonprocedural 4GL programs). * Lower user training costs: Users often find it easier to learn such systems and training costs may be reduced. Also, the total time taken to process requests may be less, which would increase usér productivity. * Less storage: Theoretically, all occurrences of data items need be stored only once, thereby eliminating the storage of redundant data. System developers and database designers often use data normalization to minimize data redundancy. Q.4. (b) What is data model also define Relational data model? Ans. Data models define how the logical structure of a database is modeled. Data Models are fundamental entities to introduce abstraction in a DBMS. Data models define how data is connected to each other and how they are processed and stored inside the system. The very first data model could be flat data-models, where all the data used are to be kept in the same plane. Earlier data models were not so scientific, hence they were prone to introduce lots of duplication and update anomalies. : Relational data model is the primary data model, which is used widely around the world for data storage and processing. This model is simple and it has all the properties and capabilities required to process data with storage efficiency. Tables- In relational data model, relations are saved in the format of Tables. This format stores the relation among entities: A table has rows and columns, where rows represents records and columns represent the attributes. Tuple- A single row of a table, which contains a single record for that relation is called a tuple. Relation instance~ A finite set of tuples in the relational database system , Relation instances do not have duplicate tuples. lation schema describes the relation name (table name), s one or more attributes, known as relation key, which ion (table) uniquely. attribute has some pre-defined value scope, known as ‘The Data Definition Paneinee ie ase schema. DDL also defines additional proper™ e, as the domain of the attributes. ‘The Data Definition B00ks8 MP. LP. University {BBAI-Akash Bo . a constraints that would maintain y,, som Language also provide the facility to specifY data consistency. able ommands of DDL: se or Table. cont is command used to create anew ee Table. ALTER command is used to alter the Seri tabase or table. DROP is used to delete some content in the Abt! NT TRUNCATE is used to delete all the ae sama RENAME is used to rename the content in 00 © Feviaitee) or the Table ting One can notice that DDL only defines the column! other programming languages, Doar the is stored in the data dictionary (metadata). . : ii age): DML stands for Data Manipulation Language The heme ibe cestedby DDL Data Definition Language populated or filled using Data Manipulation Language. DDL fill the rows of the eee row is called Tuple. Using DML, you can insert, modify, delete and retrieve the information from the Table: Procedural DMLs and Declarative DMLs are two types DML. Where Procedural DMLs describes, what data is to be retrieved and also how to get that data. On other hands, Declarative DMLs only describes what data is to be retrieved. It doesn’t describe how to get that data. Declarative DMLs are easier as the user has only to specify what data is required. The commands used in DML are as follow: SELECT used to retrieve the data from the Table. INSERT used to push the data in the Table. UPDATE used to reform the data in the Table. DELETE used to delete the data from the Table, Differences between DDL and DML The basic diffe i aS is 'tesdita deta eee ear hat DDL (Data Definition Language) create the Table Relation) and the DML (Data Manipulation re nn ts ee or modify the schema or Table créated by DDL, n°” LAnEUage) is used to access, -DML is classified i oinddees clansiSadingatons types Procedural and Declarative DMLs whereas the 2.CREATE, AL! commands of DDL. Onthoter une a2, COMMENT and RENAME, ete. are the 4 INSERT, UPDATE, DELETE, MERGE, applied on datal ae data is entered into that Be vewe cola ue © COMES out to be i hen io Co; : Tules ae help to maintain the integrit” ta quality requiremen'® 8 consistency of the 89" ; Thus integrity constrain 'nges made in the databe command and produce output that j ’ 8-MP-I Fourth Semester, Information System Management There are various types of integrity constraints that the databaxe provides, I has its own function and each ensures data intogrity in ite own way. Integrity connte: can be divided into the followi: * Entity integrity constraint * Domain Integrity constraint * Referential Integrity constraint Entity Intogrity Constraint: Entity intogrity constraints as the name implien in applied on each entity. i.e. it is applied on individual rows, The constraint here in to have 4 unique value for each row in the column or a group of columns it is applied to. This attribute is essential when a particular record or row of data is to be accessed, It can be accessed using the entity integrity constraint by supplying the unique value and accessing the entire record. There are two such constraints which ensure uniqueness of data. They are- ° Primary key * Unique keyword Primary key ensures that values in a column are unique so that duplicate values are not allowed and also the primary key column cannot be null. Thus it focuses on two properties- uniqueness and not null. A table can contain only one primary key. Primary key can consist of a column or a group of columns. It is used to uniquely identify records ina table. Unique keyword is just like the primary key but it allows null values. Both these are defined on columns during defining the structure of table. Thus these are used in data definition language. Domain Integrity Constraints: These are the constraints on the domain value and thus are column level constraints unlike entity integrity constraint which are row level. The domain integrity constraints are used to impose restrictions on some particular column. Thus they affect the domain value. These can be enforced in the form of the following- * Check value * Default value Check is used to impose certain checks like checking if a value is greater than or lesser than a particular value ete, thus the upper and the lower limit can be set. Default value is the value to be provided in case no value is provided by the user. We can set a default value for any column depending on its data-type. These are also used during defining the structure of the tables, in the data definition language statements. Referential Integrity Constraint: Referential integrity constraint makes sure that the values in the column on which itis applied are already present in the column it column of a table refers to the other column of the same or that the values are consistent and similar in both the using: Foreign key a : neces the primary key of same or another table. But it ‘Whenever, same type of attribute exists in two different table is declared as the primary key and in the oth the values in both become consistent. Foreign key is mach aint 4 ning” is important for information system pla! ive and quantitative aspects of cost and benefit a LP. University-{BBA]-Akash Books MP-1.9 Ans. Cost/Benefit Analysis: Cost Benefit analysis CBA isa systematic process for calculating and compairing benefits and costs of a project for purposes: (2) to determine if is a sound investment (feasibility) (2) to sell how it compares with alternates projects. i ; It involves comparing the total expected cost of each option against the total expected benefits, to see whether the benefits outweight the costs and by how much, Process of Cost/Benefit Analysis [CBA]: CBAis a process that presents a picture of various costs and benefits associated with an info s system. Being a process, it consists of several activities, Identification of >| Evaluation of Choice of ' costs and icosts and benefits system benefits Fig. Process of CBA (A) Indentification of Costs and Benefits: At the initial stage of CBA, various cost and benefits assocaited with different info system are identified with a view to measure comparative costs/benefits of a systems so that the systems which gives maximum benefits in relation to its costs is finally selected. However, identification of cost and benefits are difficult to quantity, 8 new info system may enhance the employee morale but now it can be Categories of Costs and Benefits few example, quantified. (A.1) Tangible and 2) Fixed ar 3) Dir AIOE iach vena Sree (Al) Tangible and Intangible Costs and Benefits [C and B] Costs and Benefits over classified as tangible or int ible based on tangibility which refers to the ease with which C and B can be measured. Tangible Cost: An outlay of cash for a Specific item is referred to as tangible cost example Purchase of] hardware/software, employer training and their saing etc. Intangible Cost: Costs that exist but their finanacial value cannot be measured are easy to identify but difficult to quantify. ystem during breaking hours will the bank. In nefits. Benefits which may easily be quantified, e.g. reduced are referred to as intangible costs. They ‘The cost of breakdown of an online s yment and untility bills irrespective of sales, re expenses that change in Proportion to the a: Pays for raw materials, When activity is decreased, les the spending for raw mateiale falls. 10-MP-1 Fourth Semester, When activity is increased, m These expenses are variable Fixed Benefits: Information System Management ‘ore raw material is used and Spending therefore aries, costs. These benefits are constent and do not change. ting from reduced number of employees because of use of a new computer. Variable Costs Fixed Costs Variable Benefits: These benefits ©-8. a system that saves 20 mint the manual system. The amount of time saved A.3 Direct and Indirect Costs and B. This classification is done an the basis that whether C and B can be assigned to any activity directly or indirectly. Direct Costs are those that are associated directly to an operation, for example cost ofa box of CDS. Indirect Costs are not directly associated with an operation, for example, insurace cost, maintenance cost etc, Indirect costs are also known as overheads. Direct Benefits are specifically a tributable toa given operation, for example anew system handling 30% more transfactions. Indirect Benefits are realized as a by product of another operation, for example a elearning product relieves the indoor environment of pallelants that causes allerger and other health problems. are realized on a regular basis, tues white preparing customer notices campared with varies with the number of notices produced, enefits Q. 7. What do you mean System Development Life Cycle? Explain all the phases briefly. Which phase you feel is most creative and why? Ans. System Development Life Cycle ~ The System Development Life C; systems through investigation, yele is the process of developing information analysis, design, inpleme ntation, and maintenance. Books % LP. university (BBAFARSS? MPA. Phase I: Preliminary investigation inthe system development life cycle rst step vg request to change, improy, Preliminary investigation is the fi user’ away of! ‘mine, whether the request is vais preliminary investigation is aT enhance an existing eyatem. The objective i to ae go do nothing, improve or modif and feasible before any recommendation 16 made to do m0" study, nor does it inguet existing system, or build altogether a new On aes al 7 ‘business system. The follos the collections of details to completely describe + ne preliminary investigation hjestives should be accomplished, while workin€ 0° eases = System investigation includes the following two sil 1. Problem Definition 2. Feasibility Study : 1. Problem Definition: Problem Initiati storage etc. Define what the problem really is. State a initiation will describe: 3 define necessary input, output, on include: A goal to be achieved. A problem * Required input (what data has to be acquired to produce the output?) * Required output (i.e. what information is the system supposed to produce?) Problem analysis breaks the problem down into its parts and describes them. The analysis lays down the basis requi ments that the eventual solution must achieve (a logical design). The most important task in creating a séftware products is extracting the requirements. Customers typically know what they want, but not what software should do, while incomplete, ambiguous or contradictory requirements are recognized by skilled and experienced software enginners. Frequently demonstrating live code may help reduse the risk that the requirements are incorrect. . Here are some possible difinitions of problems: 1. The existing system has a poor response time, i.e, itis 2. It is unable to handle workload. - 3. The problem of cost, i.e. the existing system is not economical. 4, The problem of accuracy and reliability. 5. The requisite information is not produced by the existing system. blem of security. i psiloc involved fo" this is again a very important question that too often not in the system development process. ‘The literal meanil ibility is vitali 5 is eee aes ae Se es eae. This stuay'# organization. slow. r ws a ee be formally presented to the ust ee rs Foca bility study report represe" - lyst’s understanding of the problem and rovides* subsequent development of the g; Pp 12-MP-I Fourth Semester, Information System Management The aim of the feasibility most feasible and desirable an overview of the problem a: before committing more res: study is to access alternative s: ystems and to pro system for development. Thus, feasibility study meentne nd acts as an important checkpoint that should be onnplewea jources. The feasibility of a propose | categories, as summarized below. | 1. Organizational Feasibility: pees the objective of the organi d system can be assessed in terms of four major The extent to which a proposed information system a v ‘ization’s strategic plan for information systems determines the organizational feasibility of the system project. The information system must be taken as a sub-set of the whole organization. 2. Economic Feasibility: In this study, costs and returns are evaluated to know whether returns justify the investment in the system project. The economic questions raised by the analyst during the preliminary investigation are for the purpose of estimating the following: (a) The cost of conducting a full system investigation. (6) The cost of hardware and software of the class of. application being considered. (c) The benefits in the form of reduced costs, improved customer serive, improved | resourece utilization or fewer costly errors. Bs 3. Technical Feasibility : Whether reliable hardware and software, capable of | meeting the needs of the proposed system can be acquired or developed by the organization in the required time is a major concern of the technical feasibility. In the other words, technical feasibility includes questions like: (a) Does the necessary technology exist to do what is suggested and can it be acquired? (d) Does the proposed equipment have the technical capacity to hold the data required to use the new system? (c) Will the proposed system provide adequate responses to inquiries, regardless of the number of locations and users?“ (d) Can the system be expanded? (@)Is there any technical surety of accuracy, reliability, ease of access and data security? 4. Operational Feasibility: The willingness and the ability of the management, employees, customers, suppliers, etc., to operate, use and support a proposed system come under operational feasibility. In the other words, the test of operational feasibility asks if the system will work when itis developed and installed. Are there major barriers ? The following questions are asked in operational feasibility. \ involved in the planning and development of the system project? ility would pass the test if the system is developed as per rules, en culture, union agreements, etc., and above all with the ace should also be accessed in terms of categories, the system sl also in terms Bile feaability, Whereas legal feasibility refers to the ea ‘legal point of view, i.e. it checks whether the system — sty _ the land, the schedule feasibility evaluates the probal aR in the time allowed for its development, since for the system ished well before the actual requirement of its usage. MPsoag thot tn nel record system hen’ 8 permeensilo if the nieceng, 260 unlos te? siya poo to under, ae fare rn eae San Sse nel nna ace sae beundanen Tse ar ae pss aon the raion Manyeetenanipuc regen MEETS crepe mata technically trained people isto move too quickly POET yodel ofthe system shoul Ponca Suche expeton mtb endear! Ede of oom thal te developed using various moern nl ch ncaa flow agree 5 Seana da Aictionary and rough dseripon of he reves oD a detated sey of a: Gi) The information eed the argunioton andi end ven i) Bxisting information eystems their ati, esuren ae Git) To expected information eta tera fe sat the information need of uses otc nropns Theinal proc of stem analysis ina stefan regurement of prove ‘aformation ayer. The analy phan priests cles understanding of what a tobe done. The nex saps ta decid sto howe ro solve Teinvotves activites ike: * Gathering Intemation ¢ Defi thonrsrouinment + Prarie requirement * Generate & Evaluate alternative. * Review recommendations with management So also do problem solvers study the systom they intend to change, and the nanistonitvin, before they ce what nods ob 0s? By thoroughly understanding ‘apres operation, a cnt es erngthe and weaknetees on can better cde how eo start intproving it Phase I: System Design: System analy describes what a system should doo 1meet the information needs of wars System design specifies how the system wil stomplsh this objective, It includes the llowing coaponens” = User Interface Design * Data Design + Process Design + Thchnical System Speieations Daring the Design Phase the ayrtem is designed to irements dented in the previous phases, The requirements ehied © te hes Analysis Phase are transformed into «System Design Docume hea ence describes the design of the seiem and thet ean be use at an innate es development in the next phase. Where an interface design activity focuses on designing the interactions betwee? asa a i ee es the logical structure of dtabade ao fee tobe wad fe ee system. Procss design activity fuse onthe detignaf the eaten eee the programs and procedures neededby the proposed reste en Phase II: System Analysis: Primary oie 14-MPA Fourth Semester, Information System Management 5. Conntruction & Testing: One the system specifications ae understand, in physically coated. The required programs are ced, debugged nnd occesoney ee sytem shouldbe ted with wre tt att egur nacaasgyand saat se ‘anatruction of the ayntem takes place onthe basa ofthe systems doson spon phase, the various directions as per aystem specifications ate followed 6. Implementation: In SDLC, implementa ot guiding client t ws the waftware or herder ‘Requirements Analysis, Scope A Poli ro post developmen process that was purchased. This includes in, Customizations, Systems Integrations, User Hardware and software installation er Training Documentation 7. Maintenance and Support: System maintenance involves the monitoring ‘evaluating and modifying ofa ayer to make desirable or necessary improvements other words, maintenance includes enhancements, modifications or any change rom ‘the original specifications. Therefore, the information analyst should take change as Ihither responsibility so as to keep the functioning at an acceptable level. ‘Software needs tobe maintained not because some ofite modules or programs wear ‘out and need tobe replaced, but because there are often some residual ervors remaining ‘nthe system which have to be removed at soon they are discovered Thi ean on ging, ‘rocess, until the system stabilizes 8. Designing phase of software development lifecycle is moist creative phase Its ‘bridge between requirement specification and Gal solution for satisfaction. The design of a system is a blue print or a plan for a solution of a system. It has many phases started from coding to testing. The design of interface, design of contol and process, ‘nputoutput design et is main part of system designing. Its interface, inpal output, control and process should be very sophisticated and easy, far from completes. @.8 (a) ADSS is used to achieve effectiveness while at MISis used to achieve ‘the efficiency. Comment with a suitable example, ‘Ans: Management Information System: 1, Understandable: Since information is already in a summarized form, it must be ‘understood hy the receiver so that he wll ntarpret it correctly He must be able to davode ‘ny abbreviations, shorthand notation o any other acronyms contained in the information 4, Relevant: Information is good only ifitis relevant. This means that it should be pertinent and meaningful to the decision maker and should be in his area of responsiblity iti. Complete: It should contain all the facts that are necessary forthe decision ‘maker to satisfactorily solve the problem at hand using such information. Nothing ‘important should be left out. Although information cannot always be complete, every reasonable effort should be made to obtain it. ‘e. Available: Information may be useless iit is not readily accesibein the desired ‘orm, when itis needed. Advances in technology have made information more accessible ‘today than ever bofore. ‘Reliable: The information should be counted on to be trustworthy. c should be ‘accurate, consistent with facts and verifiable. Inadequate or incorrect information ‘generally leads to decisions of poor quality. For example, sales figures that hrve not ‘been adjusted for returns and refunds are not reliable. vi, Concise: Too much information is a big burden on management and cannot be ‘processed in time and accurately due to “bounded rationality’. Bounded rationality — LP. University MP4. sty which cannot cort out and inking process neg deterines te imi of Ne OT oration shouldbe tothe point and jgpe ty mounts of iformation “y Bonen atthe right time andthe ee ‘formation must be delivere ribet one matin euoncantece let ore forgotten right pereon itis actully needed. cisions can be delayed becAD8e PrOPET ANd nese, mnt some eine revalingin missed opPOrUNes. Aad iforatn me eon of ant andthe prsetation ofthe pope norma 8 AER iom maker must be reduced as much as possible. ive: Toe informations nat desirableifthe solutions moray, chante peblon The ost of gathering data and processing into information mae, ‘veighed against the benefits derived from using such information to ue : rest Syeteme: The spectrum of applications of ey oe aie ndustal and commercial problems i 80 wide as to dely ot Fa eae oc apnicatioe find their way into most areas of knowledge wort ‘Applications tend to cluster into following major classes. 1. Planning and Scheduling: Systems that fall into this class analyze a set of ong ‘or more potentially complex and interacting goals in order to determine a set of actiong AS nchege thus gta, andor provide a detailed tempore ordering of those action, {eng into noone personnel atari, and other constraints, This class has gre, ‘Smurciel potential which has been recognized. Examples invalve airline shedeling ‘offlights, personnel, and gates; manufacturing job-shop scheduling; and manufacturing recess plannicg, a - ‘2. Configuration of Manufactured Objects | Subassemblies: Configuration, ‘whereby a solution toa problem is synthesized from a given set of elements related by 8 set of constraints, is historically one of the most important of expert system applications. Configuration applications were pioneered by computer companies as a ‘means offacitatng the manufacture of semi-custom minicomputers (MeDermatt 191) ‘The technique has found its way into use in many different industries, for example, ‘modular home building, manufacturing, and other problems involving complex ‘engineering design and manufacturing. 43. Financial Decision Making: The financial services industry has been a vigorous ‘user of expert system techniques. Advisory programs have been created to assist bankers in determining whether to make loans to businesses and individuals. Insurance ‘companies have used expert systems to assess the risk presented by the customer and to determine a price for the insurance. Atypical application in the financial markelsis in foreign exchange trading. 4. Knowledge Publishing: Thisis a relatively new, but also potentially explosive ‘rea. The primary function ofthe expert aystem is to deliver knowledge that is relevant to the user's problem, in the context of the user's problem. ‘The two most widely distributed expert systems in the world are in this category. The first is an advisor which counsels @ user on appropriate grammatical usage in a text, The second is a tax advisor that accompanies tax preparation program and advises the user on tax strategy, tactic ‘and individual tax policy. 5. Process Monitoring and Control: Systems falling in thi class analyze eal data from physical devices with the goal of noticing anomalies, predicting trends, controlling for both optimality and failure correction, real-time systems st actively monitor processes ean be found in the steel making and oil refining industrie® 16-MP4 Fourth 6. Design dovicos and p Semester, Information System Management 1d Manufacturing: These ceases, ranging fom high-level the way to factory floor configuration . 9. In context of Informatio Information Technology(IT)? Explal ystems assist in the design of physical conceptual design of abstract entities all ‘manufacturing processes, System, What are the sratgic use o in with suitable example. : " Ans: Information technology plays an important cle di business and supporting organizational tegetorsen infrmation oes havebeome ky menberraroaetan ce a Atrategieeatons fr the business Teams otek ea Syalonng busines sntogy thy cosines ering value for a ichieve that, chief loping and delivering tion more competitive ‘Support Innovation: Organizations that w: capabilities and develop new products or services fo to speed up the process, Cloud computing enable resources during the development project ona ant to improve their innovation othe market can te dod computing erento net tral Fay Jog bas rather than i inixed reoures. Organization can se the additonal renures a ron plot oerone or speedup development. This provides an important strategic advamtoy peoclng the organization to get new producto market quickly abea athe compedtion Improve Responsiveness: Cloud compating enables organisations to vale up their IT resources quickly in response to changing market cnaiuona, Orgestegs that offer products and services online may finde fiat to handle a surge nf ‘which could esl in lost business Adding resources rm the dud provides asta ‘vantage by enabling them to respond to changes in demand, iereae revenue thd taintain customer satisfaction, Increase Collaboration: IT solatons that improwcllaoraton nan organization can provide an important competitive advantage, Ising field service teams wth Suarsphones, for example, enables service engineers to provie faster more eigen Service to customers. Engineers working ona customer site canst up veo eo conference als with producto echnical experts at headquarters to dscse and rece ‘complex itue,raher than delaying a reps: Offering customer superior serv provides a strategie advantage by differentiating an orgisaton fom compestrs. Enhance Customer Insight Collecting and analysing data o gin geste insight into intomers needs and peferenes provides atrategic vantage. By using power alyticesafomae, organizations can develop cutemized offers and personalize Corinications that be te icrease customer eatisfacton and eter aly Tntroduce New Business Model: Organizations can we IT make rater ‘changes to their business models. A company that traditionally sold produets (rough ‘etal outlets might use IT odevelop an e-commerce model hat enables io reach wider market, reduce its distribution costs and offer a more convenient service t customers. SESSION: 2018-19} ic ee PAPER-II [2018] FOURTH er iaaicnucicy ‘TION SYSTEM EDEN TOT BBA-210] a ‘ime:8 bre sell [Notes Attempt any five questions Hoch question information system, ena ca ng a Jon pte fllws a Stem’ approach, Thy System Approach: The information 0) raya system andl performans system's approach implies a holistic approsch ‘This approach is anti. Tibetan tne jain rnc bax een onlsed i ‘Piecemea! in nature characteristic of MIS. For de ‘Management viene Tis nu imptian racic of MIS For den ct Mesa spn lord Todor peach ets een Sorc ae bene ‘plan should be derived from the overall Sarinwes pics Management oeetadchractaristie of MIS ale plies that ihe SEO eprom dveloment tors eee = should be as per the information needs est ee Mi abel tit ese rere Stcoperatns enrol vl eer wore MIS boulder othe pec ado ‘managers in an organization's hierarchy. s ‘Exception Based: MIS should be developed on the exception based reporting ‘principle, which means an abnormal situation, ie, the maximum, minimum or expected ‘elue vary bod lorena Inch aituations, there sould be expen Pinter oregano ote Oriented ese ecto se opting MIS shoul io ak {oar Inter word MIS bold ot merely pov aso ioral informatio, ‘aber ould rv darmatin on thas presins sed on which actions say bo iti Integrated: nero in eco carcrinico management information ‘pe ntepratin is gent Scat of x ely to produce mare meaning thormaten {Long Term Planning: MIs developed ovr ltiey long periods, Sch stan sees it deep oven: Aha let of ansng lve Th MIS dosent ‘mt av theatre sere td esate cmpary ns Sub-Syrtem Concept Th proces MS developments uta complex andes is likely to lose insight frequently. Thus, the system, though viewed aa a single entity, a be broken down into digestible ‘sub-systems which are more meaningful at the Planning stage Central Database: A central database is the mortar that holds the functional {ystems together. Each aystem requires access to the master file of data covering, [nventory perwnne vendo, carers, tf th dla Mantes ak ‘usage in mind, one master file Can provide the data needed by any of the functional i Y aes elit pi alae i in a pai @-1, b) Explain the Types of Management Information Systems, Kae ein ae port the organization's strategic goals and direction, ‘There ae four types of MIS that wil be introduced in acending onder of aphaeo 1. Transaction Processing Systems These ystems ae designed a handle lage were firt introduced in the 1960 with ing and payments to suppliers 2. Operations Information Systems: These systems were introduced after transaction processing systems. An operations information system exthens comprehensive data, organizes it and summarizes it in a form that io waste ee ‘managers. Most ofthese systems accees data from a transaction proceming eytig sand organize it into a form usable by managers. Managers use operations infereeton systems to obtain sales, inventory, accounting and other performance related information, 8. Decision Support Systems (DSS): ADSS isan interactive computer system ‘hat ean be used by managers without help from computer specialists ASS provides ‘aanagers with the necessary information to make intelligent decisions ADSS bas theed fundamental components: (@) Database management system (DBMS): Stores large amounts of dgta relevant to problems the DSS has been designed to tackle. i) Model-based management system (MBMS): Transforms data from the DBMS into information that is useful in decision making. (Gi) Dialog generation and management system (DGMS): Provides a user-fiendly interface between the eystem and the managers who do not have extensive computa ‘raining. 4. Expert Systems and Artificial Intelligence: These systems use human ‘knowledge captured in a computer to solve problems that ordinarily need human ‘expertise. Mimicking human expertise and intelligence requires thatthe eomputer (1) recognize, formulate and solve a problem; (2) explain solutions and (3) learn from ‘experince. Those systems explain the logic oftheir advice to the user; hence in addition ‘tosclving problems they can also serve a a teacher. They use flexible thinking procesees ‘and can accommodate new knowledge. 5. Considerations: A potential problem with relying on electronic communication 1nd prooesting of information i the loss ofthe vital human element Sometimes because ofthe complexity of information, an MIS report cannot effectively summarize it. Very ‘ich information is needed to coordinate and run an enterprise and certain classes of {information cannot be quantified. For example, it might be wrong to evaluate an ‘employee's performance solely based on numbers generated by an MIS. Numbers can {indicate a performance problem but a face-to-face meeting will be necessary to discuss the nature of the problem. Se Te ORS MPaLg . 2, What is data? How is it different from information? With suitable example, prove that every information isa yrocensed date isnottrue help, ot Fever (1g) red with, ted to ain contains numbers, statements ga ‘Ans. Data is defined as the collection of facts and details like tex, observations, symbols or simply description of things, event or entity gatheray’” view to drawing inferences. It is the raw fact, which should be procorg information. It is the unprocessed data, that characters before it is refined by the researcher, The term datas derived from Latin term datuns’ which refers a something given: ‘The concept of data is connected wit scientific research, which is collected by van, organizations, government departments, institutions and non-government agenses gy 8 Variety of reasons. There can be two types of data: + Primary Data > Qualitative Data > Quantitative Data ‘Secondary Data > Internal Data > External Data Differences between Data and Information ‘The points given below are substantial, so far as the difference between data and information is concerned: 1. Raw facts gathered abst a condition, ven idea entity or anything le whith isbare and random, i called data, Information efereto facta cocnring «pete ‘event or subject, which are refined by processing. 2. Data are simple text and numbers, while information is proocesed and interpreted dat, 3. Datain inn soorganicod frie ite randomly called fst and fires with ae proceed te drow conclosion Go tbe othor handy whan the data is crane becomes information, which present data na beter way and eves meaning to aa based drain and neo hich are sore in come jit ‘by a person. As against this, information is considered more reliable than data, proper analy ix conducted to conver ata into nfrmation by researcher or investigator. 5. The data collected by the researcher, mayor may nthe wel ht, ax wire the data is gathore, i isnot known what chey ae about or what they ropes Conversely information vaunble snd uf tothe raearher eae ix prsei integra oes ond realy aati threocer rte may pei the nots he reearhr bt inate specs requranents neocons ene l nnlevent has 0% te elinate, during the transformation of Gata into nfrmation. 7. When it comes to dependency, data does not depend o= i=tormation. Howev®"_ information cannot exist without dat, 2. Whatis Database? What ar the advantage of wing database Perot over traditional approach for storage and retrieval of data? Explain Wit example. | | types of consistency constraints. For example, the balance of « bank account pare —_ ‘Semester, Information Syatem Management | Ans, Adatabaso isa collection of information, coossed, managed and updated. Data thats organized vo that ican be easily organized into rows, columns and tables, and it levant information. Data gots updated, expanded rocess workloads to create and id runs ‘update themselves, querying the data they contain en ‘The database approach offers a number of to traditional file processing systems, 1. Program-Data Independence: The separation of data descriptions from the pplication programs that use the data is called Data independence With the dochory ‘approach, Data descriptions are stored ina central location called the repsitary Ting property of database systems allows an organication' data a change withowt cheagig _ the application programs that process the data, 2. Data Redundancy and Inconsistency: In File-processing System, les having diferent formats and application programs may created by different programmers Similarly different programs may be written in several programming languages The fame information placed at different files which cause redundancy and inconsistency ‘consequently higher storage and access cost. For Example, the address and telephone ‘numberof person may exist in two files containing saving account records and checking sccount records, Now a change in person's address may reflect the saving acount records Dut not any where inthe whole system. This results the data inconsistency. One solution ‘avoid this data redundancy is keeping the multiple copies of same information, replace it by a system where the address and telephone number stored at just one place Physically while it is accessible to all applications from this itself. DBMS can handle Data Redundancy and Inconsistency. )___& Difficulty in accessing Data: - In Classical file organization the data is stored ‘in the files. Whenever data has to be retrieved as per the requirements then a new pplication program has to be written. This is tedious process. 4. Data isolation: - Since data is scattered in various files, and files may be in different formats, itis difficulty to write new application programs to retrieve the appropriate data, ig applications against it potential advantages compared, 5, Concurrent access: - There is no central control of data in classical fle ‘organization, So, the concurrent access of data by many users is difficult to implement. 6. Security Problems: - Since there is no centralized control of data in classical file organization, So, security, enforcement is difficult in File-processing system. ‘7. Intogrity Problem: -The data values stored in the database must satisfy certain sy never fall below a prescribed amount. These constraints are enforced in the system by adding ‘appropriate code in the various application programs. However, when new constraints fare added, itis dificult to change the programs to enforce them. The problem compounded when constraints involve several data items from different fies. 48, Improved Data Sharing:-A database i designed as a shared corporate resource. Authorized internal and external users are granted permission to use the ‘database, and each user is provided one or more user views to facilitate this use. A

You might also like