0% found this document useful (0 votes)
25 views5 pages

Information Management

important

Uploaded by

Dinesh Deena
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views5 pages

Information Management

important

Uploaded by

Dinesh Deena
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

UNIT I INTRODUCTION

MIS → management information system


DSS → Decision support system

Data, Information, Intelligence, Information Technology, Information System

1. Explain the various components of information system and their development


2. Role of information systems in business today
3. Briefly not on contemporary approaches to information systems.
4. Explain the perspectives of system from the Business information value chain and a socio-technical perspective
on information systems
5. Examine management information structure based on organizational functions

Evolution, types based on functions and hierarchy, Functional Information Systems, DSS EIS, KMS, GIS, International
Information System
1. Trace the evolution of information technology and information system with examples
2. Analyze / Describe the evolution and types of information system based on functions *
a. Suitable illustrations *

3. What is an information system? * * *


a. Explain its evolution in detail
b. Explain its types based on functions and hierarchy. * *
c. Operating elements of an information system

4. Discuss the importance of functional information systems. * *

5. How does DSS help to collect, organize and analyze business data to facilitate business decision-making
activities?
6. Explain the characteristics and functions of DSS
7. Define DSS and explain its hierarchy with examples
8. Do you agree with Simon's satisfying principle theory? Elaborate.

9. Discuss the role and features of DSS, EIS, KMS and GIS
10. Explain the three types of knowledge management system in detail
11. Write short note on
a. Data management subsystem
b. Model management subsystem
c. Knowledge based management subsystem
d. User interface subsystem

12. List the five major dimensions for developing an international information system

Scenario Based
1. Are there good examples of MIS developed for all the three tiers of management in your organization?
2. Information systems are transforming business. Comment whether it is essential for running and managing a
business today. What is their relationship to globalization?
3. Assume that you have implemented a newly developed salary information system in your organization. Identify
its activities and categories it in the suitable information system hierarchy
UNIT II SYSTEMS ANALYSIS AND DESIGN

Systems development methodologies

1. What are the core activities in the system development process?


2. Explain the factors affecting system development
3. Explain the various methodologies of the system development * *
a. What is system development methodology? *

Systems Analysis and Design Tools – System flow chart, Decision table, DFD, ER, Object oriented Analysis and
Design, UML diagram.
1. Who is a system analyst and what are his/ her various responsibilities?
2. Distinguish between system analysis and system design. Describe the activities for each
3. List and explain / Discuss the various tools used in system analysis and design * *
a. With suitable diagrams * *
4. Explain the steps involved in system analysis and design
5. Define detailed system design and explain its different phases.

6. Explain the structure of the decision table with examples. Also outline the benefits of decision tables in software
engineering
7.

8. Explain Data flow Diagram and UML diagram with examples.


9. Describe, with the help of a suitable example, the concept and procedure used in constructing DFD. Elaborate
the symbols used in constructing DFD’s.
10. Describe, with an example, what are the four components in a DFD and describe in detail, step by step, how
data flow diagrams are obtained.

11. Explain the concepts of ER diagram: Entity and attributes, relationship, Cardinality ratios and Removing M:M
relationships.

12. What are the advantages and disadvantages of object oriented analysis and design?
13. Enumerate the process, merits and demerits of object oriented analysis and design
14. Write the process and applications of object oriented analysis and design

15. Explain the two broad categories of Unified modeling language (UML)

Scenario based
1. Develop a human resource database for a manufacturing company and explain the concept of data used in that
database with its detailed functions
2. Explain the scenario with the help of DFD
3. Is the design of MIS less challenging or more challenging or more challenging in an organization operating
under a strong legal framework?
UNIT III DATABASE MANAGEMENT SYSTEMS

DBMS – HDBMS, NDBMS, RDBMS, OODBMS, Query Processing, Concurrency Management, SQL
1. How is organizing data in a traditional file environment done?
2. What is the single most important advantage of databases over conventional file processing systems? Explain
with the help of illustrative examples?
3.

4. Explain the database approach to data management.


5. Explain structure of database management systems in detail with a neat diagram.
6. Elaborate the different types of Database management systems. * * *
a. With their structure and applications * *
b. Trace the history of DBMS *

7. With the aid of an example, explain the construction and working of RDBMS
8. Distinguish between DBMS and RDBMS
9. Compare and contrast the structure and functions of RDBMS and OODBMS
10.

11. Describe the role and functions of query processing and concurrency management
12. Why is concurrency management needed? What are the main categories of concurrency management
mechanisms?
13. Describe the need, importance and process of concurrency management

14. Is SQL a DDL and a DML, DML, only or merely a DDL - Explain?

Data warehousing and Data Mart


1. What is a data warehouse? * * *
a. Explain its benefits *
b. What are its components *
c. Explain Characteristics * *
2. Describe the three tier architecture of data warehousing.
3. Differentiate data warehouse with data mart to provide the business cases of data warehouse applications.
4. Bring out the meaning and applications of data warehousing and data mart.

5. What is data mart? What are the reasons for creating a data mart?
6. Define data mart and explain the steps involved in implementing a data mart.
UNIT IV SECURITY, CONTROL AND REPORTING

Security, Testing, Error detection, Controls,


1. Write an essay on computer security and protection with suitable examples.
2. What is the business value of security and control? What are the components of an organization at frameworks
for security and control?
3. Explain about various potential threats of system security and also give their usual defences

4. Explain the types of tests to be involved during system testing

5. Why are information systems vulnerable to destruction, error and abuse? Narrate them

6. What are the tools used for business Intelligence, Explain in detail along with examples
7. Discuss about the most important tools and techniques for safeguarding information system
8. Write a detailed note on system security and control
9. Elaborately discuss the control measures to overcome system security risks.

IS Vulnerability, Disaster Management, Computer Crimes, Securing the Web


1. What are the major threats affecting the information system? Explain the role of IS security in preventing IS.

2. Discuss the role of Information Technology in disaster management. * *


3. Outline the process of disaster management in information management. Explain the benefits of disaster
management.

4. What is computer crime? Explain in detail about the different types of computer crimes
5. Illustrate the source and problems of computer crimes. Also give the security management of web and internet
pages over the computer crimes
6. Analyze the types, reasons and effects of computer crimes. How do you manage computer crimes in web
networks?

7. What are the major threats faced by organizations with the use of the internet? Give some examples of security
measures and technology you would use to prevent those threats

Intranets and Wireless Networks, Software Audit, Ethics in IT, User Interface and reporting.
1. Explain the intranets and Wireless Networks.
2. Elucidate network and its types with example

3. What do you mean by software audit? Explain in detail

4. Describe the key technology trends that raise ethical issues with suitable examples.
5. Discuss the ethical practices to be followed in information technology practices.
6. Explain the impact of IT in everyday life. Also explain the importance of ethics in IT

Scenario Based
1. ‘‘Cyber attacks are nothing but digital nuclear bombs’’ – substantiate this statement.
UNIT V NEW IT INITIATIVES

CMM → capability maturity model (SCAMPI)

Role of information management in ERP, e-business, e-governance,


1. What is ERP? * * *
a. Elaborate the role of information management in ERP * * * *
b. Components of ERP *

2. What is E-business? * * *
a. Explain the applications of E-business *
b. Explain the Recent trends in e-business. *
c. Role of information management in E-business * *

3. Analyze the role of information management in e-governance


4. Compare and contrast e-business, e-commerce and e-governance

Data Mining, Business Intelligence, Pervasive Computing, Cloud computing, CMM


1. What do you mean by data mining? Explain its architecture and its application in business.
2. What are the uses of data mining? What are the various business purposes where business intelligence finds
applications?
3. Give a detailed writing on data mining in the globalized information systems management

4. ‘‘Business organizations believe that cloud computing is very important to the success of their business’’ How?
5. Define business intelligence and explain how it is related to database technology

6. What is cloud computing? Explain the components and models of cloud computing.
7. What is cloud computing and how does it work? What are the advantages of cloud computing? Give examples/
8. Discuss cloud computing and pervasive computing.
9. Write the need, importance and functions of data mining and cloud computing. * *
a. How does cloud computing manage data and information *

10. Explain the principles of ubiquitous computing and their goals


11. Explain the various types of context aware computing with its definition

You might also like