Past Paper ISM

Download as pdf or txt
Download as pdf or txt
You are on page 1of 8

ISM Set 2

1. a)

TPS helps the organisational managers to track of the elementary activities and transactions of the
organization, such as sales, receipts, cash deposits, payroll, credit decisions, and the flow of
materials in a factory. Transaction processing systems (TPS) provide this kind of information. A
transaction pro-cessing system is a computerized system that performs and records the daily
routine transactions necessary to conduct business, such as sales order entry, hotel reservations,
payroll, employee record keeping, and shipping.
The principal purpose of systems at this level is to answer routine questions and to track
the flow of transactions through the organization. How many parts are in inventory? What
happened to Mr. Smith's payment? To answer these kinds of questions, information generally must
be easily available, current, and accurate.

The figure illustrates a TPS for payroll processing. A payroll system keeps track of money paid to
employees. An employee timesheet with the employee's name, social security number, and number
of hours worked per week represents a single transaction for this system. Once this transaction is
input into the system, it updates the system's master file that permanently maintains employee
information for the organization. The data in the system are combined in different ways to create
reports of interest to management and government agencies and to send paychecks to employees.
Transaction processing systems are often so central to a business that TPS failure for a few hours
can lead to a firm's demise and perhaps that of other firms linked to it.

1. b)
Intranets are simply internal company websites that are accessible only by employees. The term
intranet refers to an internal network, in contrast to the Internet, which is a public network linking
organizations and other external networks. Intranets use the same technologies and techniques as
the larger Internet, and they often are simply private access area in a larger company website. A
single organisation performs the regulation of the intranet. A single organization owns intranet.
Likewise with extranets, which are company websites that are accessible to authorized vendors
and suppliers and are often used to coordinate the movement of supplies to the firm's production
apparatus. Multiple organizations perform the regulation of the extranet. Multiple organisations
can own an extranet.

The second portion of the question is subjective, the students may write the answer for intranet or
extranet based on the budget, security options, availability, skilled manpower available at
Company, etc. Please see whether students are giving a proper explanation for either intranet or
extranet based on that give the last 2 marks.

2. a)
Firms invest heavily in information systems to achieve six strategic business objectives:
i. Operational excellence
Businesses continuously seek to improve the efficiency of their operations in order to
achieve higher profitability. Information systems and technologies are some of the most
important tools available to managers for achieving higher levels of efficiency and
productivity in business operations, especially when coupled with changes in business
practices and management behaviour.
ii. New products, services, and business models
Information systems and technologies are a major enabling tool for firms to create new
products and services as well as entirely new business models. A busi ness model describes
how a company produces delivers, and sells a product or service to create wealth.
Today's music industry is vastly different from the industry a decade ag Apple Inc.
transformed an old business model of music distribution based on vinyl records, tapes, and
CDs into an online, legal distribution model based on its own technology platform Apple
has prospered from a continuing stream of innovations, including the iTunes music service,
the iPad, and the iPhone
iii. Customer and supplier intimacy
Each business wants to know the expectations, needs from their customers and serves them
well, the customers generally respond by returning and purchasing more, This raises
revenues and profits. Likewise with suppliers-the more a business engages its suppliers,
the better the suppliers can provide vital inputs. This lowers costs, how to really know your
customers or suppliers is a central problem for businesses with millions of offline and
online customers,
iv. Improved decision making
In a traditional organisation, managers rely on forecasts, best guesses, and luck. The result
is over- or underproduction of goods and services, misallocation of resources, and poor
response times. These poor outcomes raise costs and lose customers. These information
systems and technologies have made it possible for managers to use real-time data from
the marketplace when making decisions. The information systems provide managers with
precise real-time information on customer complaints, network performance,
product/service quality.
v. Competitive Advantage
vi. Survival

2. b)

The students can write about any video conferencing tools such
Zoom, Microsoft Teams, Google meet, Skype etc.

3. Ans:

Field Order_ ID C_ID Cust_FName Name Quantity Price


Table ORDER ORDER Customer Product ORDER Product
Sort
Show √ √ √ √ √ ×
Criteria > 50 <1400
or

Data Types: Short Text (Text), Long Text (Memo), Number, Date/Time, Currency, Auto Number,
Yes/No, OLE Object, Hyperlink, Attachment, Calculated

Q4. a)
Data ware house

Data mart

Hadoop

In-memory computing

Analytical platform

Brief two line explanation of each required

Q4. b)
Ans: Dashboard. Proper justification by giving explanation.

5. a)
Ans: 1. Client/server computing—
Distributed computing model. Clients linked through network controlled by network server
computer. Server sets rules of communication for network and provides every client with an
address so others can find it on the network.
2.Packet switching
– Method of slicing digital messages into parcels (packets), sending packets along
different communication paths as they become available, and then reassembling
packets at destination
3.T C P /I P and connectivity

Protocols: rules that govern transmission of information between two points


Transmission Control Protocol/Internet Protocol (T C P / I P)
Common worldwide standard that is basis for the Internet
Department of Defence reference model for T C P / I P
Four layers-
Application layer
Transport layer
Internet layer
Network interface layer

5. b)
Ans: risk assessment-Determines level of risk to firm if specific activity or process is not properly
controlled.
Types of threat

Probability of occurrence during year

Security control--Ranks information risks, identifies security goals and mechanisms for achieving
these goals .Drives other policies- Acceptable use policy (A U P)
Disaster Recovery Planning and Business Continuity Planning—
The Role of Auditing--

6. a)
Ans: Portal,
E-tailer
Content provider
Transaction broker
Market creator
Service provider
Community provider

6. B) Ans: Most important management challenges--

Developing clear understanding of business objectives--


Knowing how to choose the right technology to achieve those objectives
Develop an e-commerce presence map--
Four areas: websites, e-mail, social media, offline media
Develop a timeline: milestones--
Breaking a project into discrete phases

7.
a) Push technologies is used in updating cricket scores on the websites. It is also used whenever
software updates are to be done using the web on laptops or desktops

b) Pull technology is used in most of the websites where http request and response are used to send
data to the server and display the received information on the website

8.

a) A scrum master is like a project manager for an agile project. He or she conducts daily meetings
in the morning for the team, assigns tasks to team members and reviews the progress daily in
the evening
b) A sprint is a like a mini project typically with a duration of 2 to 4 weeks. The project scope is
broken into sprints and executed

9.

Ans:

a) Proper example to differentiate the absolute and relative referencing expected

b) What-if-Analysis 3 techniques: Data Table, Goal Seek and Scenario manager. Suitable example
expected.

10.

Ans:

a) I) Students can write about at least 4-5 points from the given list.
Expanding Attack Surface (Wide coverage)
Complexity:
Lack of Security Awareness
Privacy Concerns
Human Error
Insider Threats
Rapid Technological Advancements
Cybercrime Sophistication
Resource Constraints
Supply Chain Risks (third party dependance
Nation-State Threats
Legal and Regulatory Challenges

a) (ii)
Students can write about at least 4-5 points from the given list.
To avoid vulnerabilities in information systems within an organization, several security
measures and techniques can be employed. These measures aim to protect against a wide
range of threats and vulnerabilities. Here is a list of key security measures and techniques:
Access Control
Regular Software Patching and Updates
Firewalls and Intrusion Detection/Prevention Systems (IDS/IPS
Network Segmentation
Encryption
Vulnerability Scanning and Penetration Testing
User Training and Awareness
Incident Response Plan
Data Backup and Recovery
Security Monitoring and Logging
Secure Development Practices
Security Policies and Documentation
Third-Party Risk Management
Regular Security Audits and Compliance
Zero Trust Security Model
Mobile Device Management (MDM
Employee Exit Procedures

(B)
i) Farmers using online banking facilities provided by Telangana Local Rural Bank (TLRB)
may face several security issues due to the unique challenges of rural environments and
the nature of online transactions. Here are some security issues faced by farmers using
online banking in rural areas:
Limited Digital Literacy.

Poor Internet Connectivity


Unsecured Devices
Phishing Attacks.
Weak Passwords.
Lack of Two-Factor Authentication (2FA.
Device Security.
Identity Theft.
Social Engineering.
Cash Handling Risks.
Financial Fraud.
Infrastructure Vulnerabilities.

b) ii)
To address these security issues, TLRB should take proactive measures, including:

 Conducting digital literacy and cybersecurity awareness programs for rural


customers.
Implementing strong authentication methods like 2FA.
 Offering a user-friendly and secure mobile banking app for areas with poor internet
connectivity.
 Providing clear instructions and alerts to users regarding potential online threats.
 Monitoring for unusual account activity and implementing fraud detection
systems.
 Collaborating with law enforcement agencies to address cybercrime in rural areas.
 Regularly updating security policies and procedures to adapt to evolving threats.
By addressing these challenges and educating farmers about online banking security,
TLRB can help ensure that its rural customers can use online banking services with
confidence and security.

You might also like