ITSM
ITSM
“Information technology has been one of the leading drivers of globalization, and it may also become one of its major victim” Page A1.1
“Information technology has been one of the leading drivers of globalization, and it may also become one of its major victim” Page A1.2
business case.
7) Management It refers to the process’s and people’s performance measurement and management.
It is about organizing all the essential components and subcomponents for processes. By
this we mean arranging the people, their skills, motivation, performance measures, rewards, the
processes themselves and the structure and systems necessary to support a process.
8) Control BPM is about managing our end-to-end business processes and involves the full cycle of
plan–do–check–act (Deming circle, Walton, 1986).
An essential component of control is to have the ability to measure correctly. If we cannot
measure something, we cannot control and manage it.
9) Improvement It is about making the business processes more efficient and effective.
b) Operational Goals:
At the second level, the business strategy is broken down to small-small
operational goals. These goals should be organized, so that each goal can
be divided into a set of sub-goals.
For example: Reducing the cost for supplied materials is a sample
goal that contributes to the realization of the business strategy mentioned.
“Information technology has been one of the leading drivers of globalization, and it may also become one of its major victim” Page A1.3
“Information technology has been one of the leading drivers of globalization, and it may also become one of its major victim” Page A1.4
Example: Process owner of manufacturing process will be appointed to monitor manufacturing process.
2) Design phase:
This involves evaluation of potential solutions to meet the identified needs, business process designing and
business process modeling.
3) Implementation phase:
This involves project preparation, blue printing, realization, final preparation, go live and support.
Analysis
optimize Design
BPM Life
Cycle
1) Purchase:
It covers the process of materializing procurement into payment for obtaining raw materials required for
production of a product or for providing a service.
It begins from the point of placing an order with a vendor to the point of payment to the vendor.
“Information technology has been one of the leading drivers of globalization, and it may also become one of its major victim” Page A1.6
2) Sales:
It covers the process of materializing order into cash to fulfill customer‟s request for goods and services.
It begins from the initial point of documenting a customer order to the final point of collecting the cash.
“Information technology has been one of the leading drivers of globalization, and it may also become one of its major victim” Page A1.7
3) Accounting:
This cycle covers accounting and Book keeping cycle that involves recording and processing of accounting
events of a company.
It begins when a transaction or financial event occurs and ends with its inclusion in the financial statements.
4) Finance:
Finance is one of the most important and limited resources available with organization. Hence it should be used
properly to target the areas of need, efficiency and improvement in services.
It begins from source of funds to application of funds and involves processes such as resource allocation,
monitoring and analysis.
Financial
reporting
operation and
monitoring
“Information technology has been one of the leading drivers of globalization, and it may also become one of its major victim” Page A1.8
Six Sigma:
Introduction:
Six Sigma is a set of strategies, techniques, and tools for process improvement and quality improvement on
outputs derived from each processes.
It helps in identifying and removing the causes of defects and minimizing deviations in manufacturing and
business processes.
Six Sigma project follows a defined sequence of steps and has quantified value targets and apply processes to
achieve it. For example: reduce process cycle time, reduce pollution, reduce costs, increase customer satisfaction,
and increase profits.
It follows a life-cycle having phases: Define, Measure, Analyze, Improve and Control (or DMAIC).
Phases of Six-Sigma:
1) Define:
In this phase, it identifies the customers and their requirements are gathered. Then develop problem statement,
goals and benefits. It also determines process owner, team and resources.
2) Measure:
In this phase, it defines the metrics used to measure the results provided by each and every process and determine
the deficiencies available in it.
3) Analyze:
After identifying deficiencies, SWOT analysis is required to be done to evaluate the performance of each and every
process by using statistical methods and graphical displays, and thereafter identify possible causes of process
output variations.
These possible causes are analysed statistically to determine root cause of variation.
4) Improve:
After analysing, various solution alternatives are generated to fix the root cause of each and every problem. The
most appropriate solution is identified using solution prioritization matrix and validated using pilot testing.
Cost and benefit analysis is performed to validate the financial benefit of the solution. Thereafter,
implementation plan is drafted and executed.
5) Control:
Once appropriate solution is identified for improvement over process performance, these processes must be
standardized and documented and thereafter monitoring system is implemented to ensure process is
performing as designed and validate expected results.
Project is evaluated and lessons learned are shared with others.
“Information technology has been one of the leading drivers of globalization, and it may also become one of its major victim” Page A1.9
Phases of TQM:
1) Plan: In the planning phase, people define the problem to be addressed, collect relevant data, and ascertain the
problem's root cause;
2) Do: In the doing phase, people develop and implement a solution, and decide upon a measurement to gauge its
effectiveness;
3) Check: In the checking phase, people confirm the results through before-and-after data comparison;
4) Act: In the acting phase, people document their results; inform others about process changes, and make
recommendations for the problem to be addressed in the next PDCA cycle.
“Information technology has been one of the leading drivers of globalization, and it may also become one of its major victim” Page A1.10
BPM implementation
It is used to handle allocating issues such as process owners, process managers, and the method of measuring the
effectiveness and efficiency of a business process according to the different people working in different departments.
By providing an adjustable structure to make key corporate decisions, BPM helps organizations optimize both work
and revenues.
“Information technology has been one of the leading drivers of globalization, and it may also become one of its major victim” Page A1.11
4) Skills required Consultants, Train Employees, Formal Certification, Basic Education, Existing Skill
sets
5) Tools to be used White-Boards, Sticky notes, Software for Mapping, Documenting, Software for
Simulation, Comprehensive BPMS
6) Investments to make Training, Tools, Time
7) Sponsorship/ Buy-in needed Executive Level, Department Level, Process Owner Level, Employee Level
“Information technology has been one of the leading drivers of globalization, and it may also become one of its major victim” Page A1.12
The supportive activities relate to procurement, human resource management, technology development and
infrastructure.
It helps to create value to our customers at minimum cost without any unwanted risks.
Six business functions of the value chain:
Research and development
Design of products, services, or processes
Production
Marketing and sales
Distribution
Customer service
2) Software:
It refers to computer programs that provide quality, reliability and security to the company's financial data
that may be stored, retrieved, processed and analyzed.
Managers rely on the information provided by software to make decisions for the company.
3) Data:
It refers to the raw data related to organization's business practices such as sales orders, customer billing
statements, sales analysis reports, purchase requisitions, vendor invoices, check registers, general ledger,
inventory data, payroll information, timekeeping, tax information etc.
It can be used to prepare accounting statements and reports such as accounts receivable aging, depreciation /
amortization schedules, trial balance, profit and loss, and so on.
“Information technology has been one of the leading drivers of globalization, and it may also become one of its major victim” Page A1.13
5) People:
It helps various system‟s users of various departments to work together. It includes accountants, consultants,
business analysts, managers, chief financial officers and auditors etc.
It allows only authorized users to access the information stored in the accounting system internally as well as
externally.
6) Internal Controls:
It refers to the security measures such as ID and passwords, biometric device etc. used to protect sensitive data
from unauthorized access, virus and network intrusion.
2) Record transaction:
It refers to the process of incorporating the transactions into journals by applying double accounting
principles.
These journals represent a chronological record of accounting and financial events.
It consists of a set of transactions of a major economic event on the financial statements. It combines one or
more types of transactions having related features or similar objectives.
Through the study of transaction cycles, we gain a clear view of a firm‟s processing framework.
2) Revenue Cycle:
It includes transactions related to revenue involving accounts like Sales, Accounts Receivable, Inventory and
General Ledger.
It involves capturing and recording of customer orders; shipment of the goods; and recording of cost of goods
sold. The billing process and the recording of sales and accounts receivable; the capturing and recording of cash
receipts.
3) Expenditure Cycle:
It includes transactions of expenditures involving accounts like Purchases, Accounts Payable, Cash
Disbursements, Inventory and General Ledger.
It includes preparation and recording of purchase orders; receipt of goods and the recording of the cost of
inventory; receipt of vendor invoices; recording of accounts payable and preparation and recording of cash
disbursements. The cycle also includes the preparation of employee paychecks and the recording of payroll
activities.
“Information technology has been one of the leading drivers of globalization, and it may also become one of its major victim” Page A1.15
5) Production Cycle:
This involves the transactions related to recurring set of business activities and related data processing
operations associated with manufacture of products including activities like converting raw materials and labor
into finished goods.
“Information technology has been one of the leading drivers of globalization, and it may also become one of its major victim” Page A1.16
Q-1 Classify each of the following items as belonging in the revenue, expenditure, human resources/payroll, production or
financing cycle.
S. No. Items Classification
1) Purchase raw materials
2) Decide how many units to make next month
3) Pay for raw materials
4) Disburse payroll checks to factory workers
5) Hire a new assistant controller
6) Update the allowance for uncollectible accounts
7) Establish a Rs. 10,000/- credit limit for customer
XYZ company.
It gives freedom to employees from doing same activity every time that saves substantial time. The concept
of “time is money” is very relevant to this topic because of huge operational cost associated with employee
time to complete a manual business process in business organization.
Crux: BPM or BPR software is a fast-growing segment of the enterprise software market because of its support for re-engineering.
Using BPM software tools, enterprises can document workflow and processes, to identify bottlenecks and other impediments to
effectiveness, and recommend alternative and improved business processes. The purpose of BPM software is to update the
documentation, analysis, monitor and re-design business processes in an enterprise.
2) Training users:
Documentation also includes user guides, manuals, and similar operating instructions that help people learn
how an Information System operates.
“Information technology has been one of the leading drivers of globalization, and it may also become one of its major victim” Page A1.18
Documentation helps system designers in developing new systems in the same way that blueprints help
architects design building. It provides information about parts, location of the parts and how these parts are
interacting amongst each other so that system can be designed as planned.
“Information technology has been one of the leading drivers of globalization, and it may also become one of its major victim” Page A1.19
For example: an employee entity might have a Social Security Number, Employee Name, Gross salary as an attribute of
employee and department relationship.
ER diagrams repeatedly bring into play symbols to symbolize three dissimilar types of information.
1) Boxes are commonly used to represent entities.
The entity is defined as a distinguishable object that exists in isolation and is described by a set of
attributes. An entity may be
- a physical object such as a house or a car, an event such as a house sale or a car service, or
- a conceptual object such as a customer transaction or order.
2) Diamonds are normally used to represent relationships.
A relationship is an association that exists between two entities.
For example, Instructor teaches Class or Student attends Class. Most relationships can also be stated inversely. For
example, Class is taught by Instructor.
The relationships on an ER Diagram are represented by lines drawn between the entities involved in the association.
There are three types of relationships between entities – one-to-one, one-to-many and many-to-many
Q-1: Explain different types of relationships in Entity-Relationship Model with suitable examples:
Answer:
S. No. Types of Relationship (Examples and Diagram)
1) One to one relationship (1:1) A one to one Example: A teacher may in-charge of a class. Each class must be in-charge of by
relationship is shown on the diagram by a line one teacher.
connecting two or more entities. Teacher Is in charge of Class
Example: A student has one and only one report card. Each report card is owned by
one and only one student.
Student Owns Report Card
2) One to Many relationship (1:M) A one to many Example: A student may borrow some books from the library. A book in the library
relationship is shown on the diagram by a line may be borrowed by at most a student.
with a “crow‟s foot” symbol denoting the „many‟
Student Borrows Book
end of the relationship.
A class is formed by a group of atleast one student. Each student is allocated to one
and only one class.
Class Formed by Student
3) Many- to One relationship (M:1) It is the Example: As in two or more parent records to a single child record.
reverse of One to many relationship. Child
Parent Records to
“Information technology has been one of the leading drivers of globalization, and it may also become one of its major victim” Page A1.20
4) Many-to-Many relationships (M:M) A many to Example: A student enrolls in at least one course. A course is enrolled by at least
many relationship is shown on the diagram by a one student.
line connecting the two entities with „crow‟s foot‟ Student Enrolls in Course
symbols at both ends.
A student may apply for more than one scholarship. Each scholarship may receive
some applications from student, or none.
Student Applies for Scholarship
Q-2 A university consists of a number of departments. Each department offers several courses. A number of modules make up each course. Students
enroll in a particular course and take modules towards the completion of that course. Each module is taught by a lecturer from the appropriate
department, and each lecturer tutors a group of students. Draw an E-R diagram.
Answer:
Step-1) Define entities:
Step-2) Draw nature and type of relationship
Step-3) Draw E-R diagram:
Q-3 In a school, students are allocated to different classes. Each student must be allocated to exactly one class, and a class is formed by at least 30
students. Each class must be managed by several different students, namely perfect, 1st monitor, 2nd monitor and 3rd monitor. Draw an E-R diagram for the
school, indicating cardinality.
Q-4 Construct an E-R diagram for a car-insurance company whose customers own one or more cars each. Each car has associated with it zero to any
number of recorded accidents.
“Information technology has been one of the leading drivers of globalization, and it may also become one of its major victim” Page A1.21
It helps to understand working of particular process with required entities like data originator, data receiver and data
holder.
Types of DFD:
1) Physical Data flow diagram
2) Logical data flow diagram
1) Physical Data flow diagram:
A logical DFD focuses on the business and how the business operates. It describes the business events that take
place and the data required and produced by each event. The logical model reflects the business.
2) Physical Data flow diagram:
A physical DFD shows how the system will be implemented. The physical model depicts the system.
“Information technology has been one of the leading drivers of globalization, and it may also become one of its major victim” Page A1.22
Example 1: Draw a Context Diagram for a Bank System that interacts with the following five agents: Customers, Bank Managers,
Third Parties, Sales agents and Other Banks.
Solution: The Context Diagram is shown below. This diagram shows the entirety of our proposed Bank System encapsulated as
a single process that sends data to and receives data from various external interfaces.
The interfaces to the right represent human actors.
a) Customers can send Deposit and Withdrawal requests to our system and can receive statements from it.
b) Bank Managers can send Open and Close Account Requests to the system and can receive Management
reports from it.
c) Third Parties can send third party deposits to the system, but obviously not make withdrawal requests.
The interfaces to the left represent human actors.
d) The first interface on the left represents the Other Banks which may send or receive Money Transfers when interacting
with our system. These other banks are likely to be system actors (i.e. computer programs) rather than human actors.
e) The second interface on the left represents the Sales Agents, which are external affiliate companies or individuals who
generate Customer Introductions for our system.
3) Flowchart:
A flowchart is diagrammatic tools to represent the flow of data in a symbolic form. It depicts algorithms,
workflow in sequential steps as boxes of various kinds and their order by connecting them with arrows.
It is an essential tool for programming and it illustrates the strategy and thread of logic followed in the program.
It helps programmer to avoid fuzzy thinking and accidental omissions of intermediate steps.
Different flow chart symbols have different meanings. The most common flow chart symbols are:
Terminator: An oval flow chart shape indicating the start or end of the process.
Process: A rectangular flow chart shape indicating a normal process flow step.
Decision: A diamond flow chart shape indicating a branch in the process flow.
Connector: A small, labeled, circular flow chart shape used to indicate a jump in the process flow.
“Information technology has been one of the leading drivers of globalization, and it may also become one of its major victim” Page A1.23
Input data: A parallelogram that indicates data input or output (I/O) for a process.
Document: It is used to indicate a document or report
Classification of Flowchart
1) Document flowchart:
This flowchart traces the physical flow of documents through an organization i.e, the flow of documents from
the departments, groups, or individuals who first created them to their final destinations.
2) System flowchart:
This typically depicts the electronic flow of data and processing steps in an Information System.
While Document Flowcharts focus on tangible documents, system flowchart concentrates on the
computerized data flows of Information systems.
3) Program flowchart:
It is most detailed and is concerned with the logical/arithmetic operations on data within the CPU and the
flow of data between the CPU on the one hand and the input/output peripherals on the other.
Benefits of flowcharts
The benefits of flowcharts are elucidated below:-
“Information technology has been one of the leading drivers of globalization, and it may also become one of its major victim” Page A1.24
3) Communication:
Flowcharts are used in communicating the facts of a business problem for arriving at the solution.
4) Documentation:
Flowcharts serve as a good documentation which is used in future program conversions.
5) Efficient coding:
Flowcharts act as a guide during the system analysis and program preparation phase.
All instructions coded in a programming language may be checked against the flowchart to ensure that
no steps are omitted.
6) Orderly check out of problem:
Flowcharts serve as an important tool during program debugging. They help in detecting, locating and
removing mistakes.
7) Efficient program maintenance:
The maintenance of operating programs is facilitated by flowcharts. The charts help the programmer to concentrate
attention on that part of the information flow which is to be modified.
Limitations of flowcharts:
The limitations of flowcharts are as given below:
1) Complex logic: Flowchart becomes complex and clumsy where the problem logic is complex.
2) Modification: If modifications to a flowchart are required, it may require complete re drawing.
3) Reproduction: Reproduction of flowcharts is often a problem because the symbols used in flowcharts
cannot be typed.
4) Link between conditions and actions: Sometimes it becomes difficult to establish the linkage
between various conditions and the actions to be taken there upon for a particular condition.
5) Standardization: Program flowcharts, although easy to follow, are not such a natural way of expressing
procedures as writing in English, nor are they easily translated into Programming language.
4) Decision Trees:
A Decision Tree is a logical tree that specifies a set of conditions and set of actions as well as depicting various
situations arising from the permutations of various conditions and simulating actions to be undertaken for each such
situation
It is used in operations research, specifically in decision analysis, to help identifying a strategy most likely to reach
a goal.
In its tree-like representation, the premises(conditions) and conclusions(actions) are shown as nodes, and the branches
(changes in conditions) of the tree connect the premises and the conclusions. The logical operators “AND” and “OR” are
used to replicate the structure of the if- then rules. As such, decision tables (DTs) do not seem to differ much from
a decision tree.
Decision trees are a simple, but powerful form of multiple variable analyses.
“Information technology has been one of the leading drivers of globalization, and it may also become one of its major victim” Page A1.25
5) Decision Table:
A Decision table is a table that specifies a set of conditions and set of actions as well as depicting various situations
arising from the permutations of various conditions and simulating actions to be undertaken for each such situation.
It accompanies a flowchart by defining the possible situations within the program and the appropriate
course of action for each situation.
Decision tables should determine each branches of flowchart. Therefore if programmer attempts to draw a
flowchart directly, he is liable to miss some of the branches.
“Information technology has been one of the leading drivers of globalization, and it may also become one of its major victim” Page A1.26
“Information technology has been one of the leading drivers of globalization, and it may also become one of its major victim” Page A1.27
6) Modularity: The complex problems would require complex decision tables which can be easily broken down to micro-decision
tables.
7) Non-technical: No knowledge of computer language or CPU working is necessary for drawing decision tables.
Problems on flowchart:
1) Draw the program flowchart for finding the sum of first 100 odd numbers.
2) Draw a program flowchart for finding the sum of multiplication of two consecutive numbers sequentially for
first 10 natural numbers.
3) Draw the flowchart for finding the value of K! where K represents an integer greater than one whose value will be
read into the computer each time the program is run.
4) Draw the flowchart for finding the value of K N where K and N are read into the computer each time the program is
run, N has to be >1.
5) Draw the flowchart which will calculate the sum of the first N multiples of an integer K. (For example, if K = 3 and
N = 10), then calculate the sum of (1×3 + 2×3 + ...+ 10×3). Make the flowchart completely general by reading
an integer value for N and K each time this program is run.
6) There are three quantities; Q 1 Q2 and Q3. It is desired to obtain the highest of these in location H and lowest of
these in location L.
7) The square root of a number can be computed by an iterative procedure. The following computational steps are
performed.
8) Draw the flowchart for deriving the sum of the squares of first 20 odd numbers.
9) Draw a flow chart to print the square of odd numbers between 10 to 50 and also print the sum of their square.
(Nov. 2012)
10) The weights of newly born babies in a hospital are input to computer. The hospital in-charge is interested to find
the maximum, minimum and mean weights of all the weights of the babies. Draw a suitable flow chart for his
problem. A value of zero can be used at the end of the list of baby weights. This denotes the end of the list.
11) Draw the program flowchart for computing the annual acquisition, inventory carrying and total costs for lot sizes of
100,200... 2400. The various variables of interests are supposed to be there in the locations symbolized below :
REQ Annual requirements of the item
ACQ Procurement costs/order
COST Cost per unit
Rate Inventory-carrying rate, I.
“Information technology has been one of the leading drivers of globalization, and it may also become one of its major victim” Page A1.28
12) Assume that imported goods from foreign countries are classified into 4 categories for the purpose of levying
customs duty. The rate for each category is as follows :
Class No. (K) Class of Goods Customs duty (%) on Values of Goods V
1 Foods, beverages 10
2 Clothing, footware 15
3 Heavy machinery 30
4 Luxury items 40
Draw the flowchart for computing the appropriate customs duty.
13) The problem is to compute, for a series of transactions, the gross sales (G), the quantity discounts, (D), if any; and the
net sales (N). The raw data to be supplied in the program includes the quantity sold (Q) and unit price (P). The quantity
discount schedule is as follows:
(i) If the purchase mode is via website, an initial discount of 10% is given on the bill amount.
(ii) If the purchase mode is via phone app. An initial discount of 20% is given on the bill amount.
(iii) If done via any other purchase mode, the customer is not eligible for any discount.
Every purchase eligible to discount is given 10 reward points.
(a) If the reward points are between 100 and 200 points, the customer is eligible for a further 30% discount on the
bill amount after initial discount.
(b) If the reward points exceed 200 points, the customer is eligible for a further 40% discount on the bill amount
after initial discount.
Taking purchase mode, bill amount and number of purchases as input draw a flowchart to calculate and display the total
reward points and total bill amount payable by the customer after all the discount calculation. (8 Marks)
15) A bicycle shop in Delhi hires bicycles by the day at different rates as shown in the following table :-
Season Charges per day
Spring (March - May) Rs. 8.00
Summer (June - August) Rs. 9.50
Autumn (Sept - Nov.) Rs. 5.00
Winter (Dec. - Feb.) Rs. 6.00
To attract his customers, the proprietor also gives a discount on the number of days a bicycle is hired for. If the
“Information technology has been one of the leading drivers of globalization, and it may also become one of its major victim” Page A1.29
hire period is more than 10 days, a reduction of 15% is made. For every bicycle hired, a deposit of Rs. 20 must be
paid. Develop a flowchart to print out the details for each customer such as name of customer, number of days a
bicycle is hired for, hire-charges and total charges including the deposit. It is also assumed that there are 25
customers and complete details for each customer such as name of customer, season and number of days the
bicycle is required for is inputted through console.
16) A company has 2,500 employees. Their salaries are stored as J(s), 1, 2, ---- 2500. The salaries are divided in four
categories as under :
(i) Less than Rs. 1,000 (ii) Rs. 1,000 to Rs.2,000
(iii) Rs. 2,001 to Rs. 5,000 (iv) Above Rs. 5,000.
Draw a flow chart for finding the percentage of the employees in each category.
17) The Income-tax for the employees of an organization is calculated on the basis of their Gross Income and the
Investments made by them under Section 80CCC. The taxable income is calculated according to the following rules :
Taxable Income = Gross Income – Investments provided investments are less than 1 lac. Otherwise Taxable Income =
Gross Income – 1,00,000
Following rules are applied to calculate the Income-tax on the Taxable Income:
Taxable Income Income-tax
(i) 0 – 2,50,000 : Nil
(ii) 2,50,001 – 5,00,000 : 10%, on the excess of 2,50,000
(iii) 5,00,001 – 10,00,000 : 25,000 + 20% on the excess of 5,00,000
(iv) 10,00,001 and above : 1,25,000 + 30% on the excess of 10,00,000
Surcharge @ 10% on amount of total tax, if the income of a person exceeds Rs. 10,00,000/- and education cess of 3%
of Income-tax is levied on all the employees, irrespective of the income. Employee number, Name, Gross Income,
Investment amount is given as input.
Draw a flow chart to calculate the Income-tax payable by each employee.
18) A housing society having 400 members pay electricity bills at the following rates:
No. of units consumed Charges/Units (Rs.)
For the first 200 units 2.65
For the next 300 units 3.90
Over 500 units 4.75
Surcharge @ 5% of the bill is to be added to the charges.
19) For the flow chart given below: (4 Marks)
(a) Print the output displayed for using the given two sets of data:
X Y
1st Set : 15 20
2nd Set: 35 30
if following instructions are given:
Instruction
“Information technology has been one of the leading drivers of globalization, and it may also become one of its major victim” Page A1.30
X=X+Y
Y=X-Y
X=X-Y
(b) What interpretation do you make from the instructions given in the flowchart?
(c) Comment about the storage of the variables used in the instructions of flowchart?
20) A university has 3000 students. These students are divided in four categories:
i) B. Tech (iii) M.S.
ii) M. Tech (iv) Ph. D
Draw a flow chart for finding the percentage of the students in each category.
21) An electric supply company charges the following rates from its customers:
No. of unit consumed Charges/unit
For the first 200 units 2.50
For the next 300 units 3.50
Over 500 units 5.00
Computer database of the company has the following information
Consumer name; Address; Unit consumed
Bill date; and Payment Date
If the consumer pays his bill within 15 days from the bill date, 10% discount is given. If he makes the payment after 15
days from the bill date, 5% surcharge is levied. Draw a flow chart to calculate the net amount of the bill for each
consumer and print it.
22) Katrina Kaif (a book publisher) offers discount to customers on the basis of customer type and number of copies
ordered as shown below:
Customer type Number of copies ordered Discount (%)
Book seller More than 10 25
Less than or equal to 10 15
Library More than 5 20
Less than or equal to 5 10
Customer number, name, type, book number, number of copies ordered and unit price are given as input. Draw a
flowchart to calculate the net amount of the bill for each customer and print it. The above is to be carried out for 50
customers.
23) A bicycle shop in a city hires bicycles by the day at different rates for different models as given below:
Model No. Hire rate per day (Rs.)
Model No. 1 14.00
Model No. 2 12.00
Model No. 3 10.00
In order to attract customers, the shopkeeper gives a discount on the number of days a bicycle is hired for. The
policy of discount is as given below:
“Information technology has been one of the leading drivers of globalization, and it may also become one of its major victim” Page A1.31
24) A company Angelina Ltd. is engaged in selling consumer goods to different categories of customers. In order to
increase its sales, different types of discounts are offered to customers.
The policy of discount is as given below:
i) On cooking range, a discount of 12% is allowed to dealers and 9% to retailers irrespective of the value of the order.
ii) A discount of 12% is allowed on washing machine irrespective of the category of customer and the value of the
order.
iii) On decorative products, dealers are allowed a discount of 20% provided that the value of the order is Rs. 10,000/-
and above. Retailers are allowed a discount of 10% irrespective of the value of the order.
Draw a flow chart to calculate the discount for the above policy.
25) The goods imported from the foreign countries are classified into four categories for the purpose of levying custom
duty. The rate of custom duty on value of goods “V” for each category is given below:
“Information technology has been one of the leading drivers of globalization, and it may also become one of its major victim” Page A1.32
31) a) Write the output sequence (at least for first 5 numbers] for the given flowchart, if N=o is selected as the value for N
as input.
b) If the statement “N = N* N” in the computation box of the flowchart is modified as “N = N*(N-1)”. Write the output
sequence (at least first 5 numbers) for the flowchart with N = 0 as the input value for N.
“Information technology has been one of the leading drivers of globalization, and it may also become one of its major victim” Page A1.33
START
CAWL
Input - N
Print “N”
N =N + 1
N =N * N
32) A water distribution company has two categories of consumers (Domestic and Commercial). The charges of water per
unit consumed by these consumers are Rs. 5.00 and Rs. 8.00 respectively. The computer database of the company has the
following information:
- Consumer's name
- Category
- Units consumed
- Bill's date
- Date of payment.
The company processes bills according to the following criterion:
If the consumer is domestic and pays his bill within 10 days of the bill date, 7% discount is given. If he pays the bill within 15
days, no discount is given. If he makes the payment after 15 days of the bill date, 10% surcharge is levied. For commercial
consumers, corresponding percentage be 15%, 0% and 15% respectively.
Draw a Flow chart to calculate the bill amount, discount, surcharge and net amount of the bill for each type of
consumer and print it.
“Information technology has been one of the leading drivers of globalization, and it may also become one of its major victim” Page A1.34
“Information technology has been one of the leading drivers of globalization, and it may also become one of its major victim” Page A2.1
2 Process device
3 Output device
4 Storage device
5 Network device
6 System software
7 Application software
8 DBMS
Hardware
Hardware is a set of physical components of a computer such as keyboard, mouse, printer, hard disk drive,
graphics card, can be called as hardware.
It is used to accept input, execute processing, generate output and hold data and information in computer system
It is a tangible element of computer systems i.e, something we can touch and see.
Hardware is directed by the software to execute any command or instruction.
“Information technology has been one of the leading drivers of globalization, and it may also become one of its major victim” Page A2.2
2) Processing devices:
It is the actual hardware that interprets and executes the program instructions and coordinates how all the
other hardware devices work together.
It can be called as a brain of the system.
It has control unit, arithmetical and logical unit and register unit as main components of CPU.
c) Registers:
- It is an internal memory with high speed memory units within CPU for storing small amount of data
(mostly 32 or 64 bits).
- It extracts the relevant data from cache memory and provide to CPU for arithmetical calculation and
logical operation as per the instructions provided by CPU.
i) Accumulators: They can keep running totals of arithmetic values.
ii) Address Registers: They can store memory addresses which tell the CPU as to where in the memory
an instruction is located.
“Information technology has been one of the leading drivers of globalization, and it may also become one of its major victim” Page A2.3
iii) Storage Registers: They can temporarily store data that is being sent to or coming from the system
memory.
iv) Miscellaneous: These are used for several functions for general purpose.
rapidly.
However, register is used to store memory address for input data and output and cache memory is
used to store program instruction and provide it to CPU for executing current processing through
register memory.
It allows additional processing capability to RAM memory by providing processing capability to
register. Hence it is a type of RAM memory only.
It is a smaller and faster memory.
d) Virtual Memory:
It is an imaginary memory area supported by Windows and other operating system in conjunction
with hard-disk. It can be called as virtual RAM.
If RAM is proved to be insufficient to run a program, windows uses virtual memory to compensate
by combining computer‟s RAM with temporary space on the hard disk i.e, moving data from RAM to
a space called a paging file. It frees up RAM to complete its work. Thus, Virtual memory is an allocation
of hard disk space to help RAM.
e) Secondary Memory:
It refers to the memory for storing the information on a permanent
basis due to its substantial storage capacity.
It cannot be directly accessible by CPU. It requires USB port, CD
Drive etc. to access secondary storage device.
Secondary storage does not lose the data when the device is powered
down hence, it is non-volatile.
Storage devices could differ amongst each other in terms of speed
and access time, cost/portability, capacity and type of access.
Features:
- It is non-volatile (contents are permanent in nature),
- It has greater capacity (they are available in large size),
- It has greater economy (the cost of these is lesser compared to register and RAMs) and
- It has slow speed (slower in speed compared to registers or primary storage).
Examples: USB Pen Drives, Floppy drive, Hard Drive, CD, DVD, Blue ray Disks and Smart cards.
“Information technology has been one of the leading drivers of globalization, and it may also become one of its major victim” Page A2.5
4) Output devices:
It refers to the device which displays output in the form of visual, audio or digital.
Example: Monitor, printer, projector etc.
c) Laser Printer: A printer that forms images using an electrostatic process, the
same way a photocopier works.
d) Ink-jet Printer: It is a type of printer that makes images by forcing ink droplets
through nozzles on to paper, plastic or any other objects.
e) Plotter: It is a type of printer that uses computer-directed pens for creating images,
blueprints, schematics, etc.
Software:
Computer software is the collection of computer programs that provide the set of instructions to the CPU for what
to do.
A program is a set of detailed instructions that governs the data processing activities by a computer, and
individuals who perform this task are called programmers.
The process of software development or process of writing programs is called programming or coding.
It has 3-types of software which are as follows: a) System Software, b) Application software and c) DBMS.
It is different from the term hardware which describes the physical aspects of computers. It increases the
capabilities of hardware.
In contrast of Hardware, software is intangible and hardware is a tangible machine.
Software guides the computer at every step where to start and stop during a particular job.
1) Networking Capability:
Operating systems can provide systems such as router to connect with computer networks.
Example: Linux & Windows 8 give us an excellent capability to connect to internet.
2) Hardware Independence:
Every computer could have different specifications and configurations of hardware. If application developer
would have to rewrite code for every configuration he would be in a big trouble.
Operating system provides Application Program Interfaces (API) that can be used by application developers
to create application software to understand the inner workings of operating system and hardware. Thus it gives us
hardware independence.
Example: Windows can accept various configurations of hardware at a same time. It means that hardware has
independent platform from windows.
“Information technology has been one of the leading drivers of globalization, and it may also become one of its major victim” Page A2.7
4) User Interfaces:
User interface is a communication path through which user interacts with the computer system. It is an
important function of which is provided by operating system.
It can be of 2 types: Command user interface (CUI) and Graphical user interface (GUI). CUI was used exclusively
in MS DOS operating system. However, Windows is using Graphical user interface which uses icons and menus
etc. to access the data.
5) File management:
The operating system keeps a track of where each file is stored and who can access it. It provides information
about file size, file name, file organization, latest updation time etc.
7) Task Management:
Task Management feature of Operating system helps in allocating resources to make optimum utilization of
resources.
It facilitates a user to work with more than one application at a time i.e. multitasking and also allows more than
one user to use the system i.e. timesharing.
8) Memory Management:
It allows controlling how memory is accessed and maximizing available memory & storage. It provides
virtual memory by allocating an area of hard disk to create an additional virtual RAM.
It also provide various features to optimize the memory storage capacity i.e, disk scanning, memory splitter,
disk formatting, space utilized, space available, total space available, allocation of memory utilization etc.
Application Software
Introduction:
Application software is a set of programs which is used to perform the processing of data. It uses the platform provided
by operating system. If there is no operating system, then it will not be performed at all.
It provides solution to all real life problems of end users in business, scientific or any other areas.
Examples: Ms Excel, tally, Windows media player etc.
“Information technology has been one of the leading drivers of globalization, and it may also become one of its major victim” Page A2.8
4) Application suite:
It has multiple applications bundled together, their related functions, features and user interfaces to
exchange data with each other.
Example: MS Office 2010 which has Ms Word, MS Excel, MS Access etc.
5) Enterprise Software:
It addresses an enterprise‟s needs rather than individual needs and data distributed environment. Such
organizations would include businesses, schools, interest-based user groups, clubs, charities, or governments.
It provides various services such as online shopping and online payment processing, interactive product
catalogue, automated billing systems, enterprise content management, customer relationship
management, enterprise resource planning, collaboration, HR management, manufacturing etc.
Example: ERP applications like SAP
7) Educational Software:
It holds contents adopted for use by students. Its primary purpose of which is teaching and self learning.
Example: Learning CDs and DVDs,
“Information technology has been one of the leading drivers of globalization, and it may also become one of its major victim” Page A2.9
3) Regular updates:
Licensed application software gets regular updates from developer through internet automatically for
security reasons. Developer also regularly sends personals to correct any problems from time to time.
“Information technology has been one of the leading drivers of globalization, and it may also become one of its major victim” Page A2.10
“Information technology has been one of the leading drivers of globalization, and it may also become one of its major victim” Page A2.11
BLDG-1 Root
Parent of Room
“Information technology has been one of the leading drivers of globalization, and it may also become one of its major victim” Page A2.12
Garments Mobile Garments Glasses Wrist watch Wrist watch Owners of products and
members of brand
Key:
The word "key" is used in the context of relational database design . A key is a set of one or more
columns whose combined values are UNIQUE among all occurrences in a given table.
Each and every attributes within the table can be called as “key”. It can be used to uniquely identify each
record in the table.
“Information technology has been one of the leading drivers of globalization, and it may also become one of its major victim” Page A2.13
5) User-friendly:
DBMS makes the data access and manipulation easier for the user. It also reduces the reliance of users on
computer experts to meet their data needs.
6) Improved security:
It allows multiple users to access the same data resources but that would lead to high level of risk of
“Information technology has been one of the leading drivers of globalization, and it may also become one of its major victim” Page A2.14
unauthorized access, virus, data loss etc. Hence, security control can be defined to protect the data from
unwanted events.
Example: ID and passwords to restrict data access only to authorized users.
1) Cost:
Implementing a DBMS system can be expensive and time-consuming, especially in large enterprises. Training
requirements alone can be quite costly.
2) Security:
Even with safeguards in place, it may be possible for some unauthorized users to access the database. If one gets
access to database then it could be an all or nothing proposition.
Introduction:
This is commonly referred as Software/System Development Life Cycle (SDLC), which is a methodology used to
describe the process of building information systems.
It is the logical starting point in the entire life cycle of a computerized system. Activities start when any enterprise
decides to go for computerization or migrate from existing computerized system to a new one.
SDLC framework provides a sequence of activities for system designers and developers to follow.
It consists of a set of steps or phases in which each phase of the SDLC uses the results of the previous one.
It serves as a guideline to the designer, who seeks to use it as template while working on a project development.
It comprises of important phases such as Investigation, Analysis, design, implementation and maintenance and review.
“Information technology has been one of the leading drivers of globalization, and it may also become one of its major victim” Page A2.15
System Implementation
and Maintenance
END
2) Technical feasibility:
Does the required technology being hardware, software etc. is existed to implement the proposed system or it
is a practical proposition?
3) Operational feasibility:
Whether it is possible to implement system in existing environment of current working practices and existing
procedures? Whether it is comfortable to existing users of the organizations?
4) Legal feasibility:
Is there any conflict between proposed system and legal requirements?
5) Economic Feasibility:
Is proposed system is cost effective? If the operational cost of the project is more than its operational benefit,
then it is not worth to implement the proposed system.
“Information technology has been one of the leading drivers of globalization, and it may also become one of its major victim” Page A2.16
This phase includes a thorough and detailed understanding of the current system, identifies the areas that need
modification to solve the problem, the determination of user/managerial requirements and fair idea about various
systems development tools.
Analysis of present and proposed system will be done on the basis of involved in interviews, questionnaires,
inquiries etc. to gather and collect the required information which will be input for proposed system.
Requirement analysis is a process to gather the information of user requirement and system requirement.
“Information technology has been one of the leading drivers of globalization, and it may also become one of its major victim” Page A2.17
“Information technology has been one of the leading drivers of globalization, and it may also become one of its major victim” Page A2.18
2) Phased Conversion:
It is used with larger systems that can be broken down into individual modules which can be
implemented separately at different times.
3) Pilot Conversion:
New system will first be used by only a portion of the enterprise, for example at one branch or factory.
4) Parallel Conversion:
The old system continues alongside the new system for a few weeks or months.
Adaptive Maintenance: All systems will need to adopt to changing needs within a company as per the
requirement of environment.
Corrective Maintenance: Problems frequently surface after a system has been in use for a short time,
however thoroughly it was tested. Any errors must be corrected.
1) Bluetooth:
Bluetooth is a wireless technology standard for exchanging data over short distances up to 50 meters (164
feet) from fixed and mobile devices , creating personal area networks (PANs) with high levels of security.
It is a feature which is used every day through a number of compatible devices.
“Information technology has been one of the leading drivers of globalization, and it may also become one of its major victim” Page A2.19
These include USB, handheld PDA, phone headset and most popularly the mobile phone.
It can be used in mobile phone to send pictures, videos, exchange business cards and also transfer files to
our PC.
Both data and voice transmissions can be sent and received through the use of short range networks.
Bluetooth is really like a very low-power, short-range radio signal.
Bluetooth signals are secure from the moment they're sent, so unlike any other wireless network we don't have
to worry about turning on security.
Few devices that utilize Bluetooth technology are:
Keyboards and mice, Printers, Cell phones and headsets, PDAs (Personal Digital Assistants), Desktop and
laptop computers, Digital cameras, and Remotes: replacing IR (infrared).
2) Wi-Fi:
Wi-Fi is a popular wireless networking technology that uses radio waves to provide wireless high-speed Internet
and network connections.
It has limited range of 32 meters (120 ft.).
Owner of the wi-fi is The Wi-Fi Alliance that are based on the Institute of Electrical and Electronics Engineers'
(IEEE) having 802.11 standards.
Wi-Fi can be less secure than wired connections because an intruder does not need a physical connection for
hacking.
It uses radio technologies called 802.11 to provide secure, reliable, fast wireless connectivity.
It is used to connect electronic devices to each other on to the Internet.
WI Fi is useful for small, medium and large corporations and campuses for extending standard wired
Ethernet networks to public areas like meeting rooms, training classrooms and large auditoriums.
“Information technology has been one of the leading drivers of globalization, and it may also become one of its major victim” Page A2.20
3) Laptop: Notebook:
Laptop is a small, portable computer and small enough that it can sit on a lap.
It is an extremely lightweight personal computer having weight less than 3 Kg and are small enough to fit easily
in a briefcase.
It uses flat-panel technologies to produce a lightweight and non-bulky display screen.
It is almost equivalent to personal computers having the same CPUs, memory capacity and disk drives.
b) Smart Phone:
It is a mobile phone built on a mobile operating system with more advanced computing capability
connectivity than a feature phone.
It is an integrated version of mobile phone capabilities and features of PDA (personal digital assistance).
It allows users to store information, e-mail and install programs.
“Information technology has been one of the leading drivers of globalization, and it may also become one of its major victim” Page A2.21
It has high-resolution touch screens features and web browsers that display standard web pages as
well as mobile-optimized sites.
High-speed data access is provided by Wi-Fi and mobile broadband.
c) Touchpad:
It is a pointing device featuring a tactile sensor, a specialized
surface that can translate the motion and position of a user's fingers
to a relative position on screen.
It is used in laptop computers as a substitute for a mouse.
It is vary in size and can also be found on PDAs. Wireless
touchpads are also available as detached accessories (*key board).
It can be used to provide motion of a finger and motion of the
cursor.
d) I-pad:
The iPad runs a version of iOS. iOS is designed for finger based use and does
not have a stylus features.
Apple introduced responsive multi touch gestures, like moving two fingers
apart to zoom in.
iOS uses less power, and so gives better battery life than the Intel devices used
by Windows tablets.
f) I-pod:
The iPod is used to play graphics, audio and video files. Hence it is called as
portable media players designed and marketed by Apple Inc. It does not have
phone features.
There were four current versions of the iPod: the ultra-compact iPod Shuffle,
the compact iPod Nano, the touchscreen iPod Touch, and the hard drive-based
iPod Classic.
I-Pods can also serve as external data storage devices ranging from 2 GB for
the iPod Shuffle to 160 GB for the iPod Classic.
“Information technology has been one of the leading drivers of globalization, and it may also become one of its major victim” Page A2.22
4) Ultra-Mobile PC (UMPC):
It is a small version of a pen computer, a class of laptop launched by Microsoft and Intel in 2006.
These are smaller than subnotebooks having a LCD display are operated like tablet PCs using a touch screen or a
stylus, and can also have a physical keyboard.
5) Android:
Android is a Linux-based operating system designed primarily for touch screen mobile devices such as smart
phones and tablet computers.
It enables developers to create various mobile applications called as „apps‟.
It has best handset and tablet manufacturers in the world like Samsung, HTC, Motorola, Sony, Asus and more.
Android devices are available in all shapes and sizes, with vibrant high-resolution displays and cameras, giving the
flexibility to choose the one that‟s just right for a user.
Android is open source that allows the software to be freely modified and distributed by device manufacturers.
Information Technology
“Information technology has been one of the leading drivers of globalization, and it may also become one of its major victim” Page A2.23
3) Automated Processes:
It provides Business Process Automation (BPA) to optimize critical business processes by using the latest
technology. It provides maximum benefit at low cost range.
BPA can be achieved by using integrated ERP software which consists of various modules such as internal
control, human resources, production etc. Activities of ERP are such as accounting, sales & marketing
management, purchase management, production management, costing, inventory control and human resources
management.
Benefits of Automation: Because of automation, enterprises are able to optimize and improve their business
processes through: Greater control over business and IT processes; Reduced costs through higher efficiency
and ; better management of the people involved; Shortened cycle times in the execution of processes
through improved and refined business workflows; and Reduced risks through greater ability to respond to
changing business conditions.
IT encompasses all aspects of functioning of enterprises from strategy to operations and inception to completion.
IT assists management in complying business, regulatory and competitive requirements.
IT assists auditors in providing reasonable assurance on the security, effectiveness, and reliability of information
and applications.
IT becomes a key enabler in enterprises of all types and sizes.
IT is pervasive and its impact is extensive for enterprises, professionals and individuals.
It creates positive customer experience by providing more revenue and growth.
IT also assists Accountants and Auditors in accounting to auditing to perform their jobs effectively and efficiently.
IT assists management in building, maintaining and sustaining the business relationship.
IT is used to frame model to transform the business process by doing BPR.
1) Compliance: It helps in verifying that all processing is in compliance with governmental laws and
regulations, generally accepted accounting procedures, and the organization`s policies and procedures;
2) Operational: It helps in verifying that the program and activities are performed economically, efficient, and
effectively;
3) Cutoff: It helps in verifying that the transaction is re-coded in the proper financial accounting period;
“Information technology has been one of the leading drivers of globalization, and it may also become one of its major victim” Page A2.24
4) Authorization: It helps in verifying that events have occurred in accordance with management`s roles and
responsibilities;
5) Valuation: It helps in verifying that the accounting values fairly present items worth;
6) It helps in determining whether computer system accomplishes the business objectives and goals.
7) It helps in verifying whether internal control recommendations are implemented;
8) It helps in providing specification and proposed design of computer control for systems to be installed;
9) It helps in determining whether efficient use is made of the organization‟s Computer resources; and
10) Existence: Verify that the assets, liabilities, ownership, and/or activities are real.
“Information technology has been one of the leading drivers of globalization, and it may also become one of its major victim” Page A2.25
Appropriate controls are not resident within the computer systems: If threats are not anticipated
and adequate controls are not designed to mitigate or counter them, system and its resources will be vulnerable.
Ready access to terminals: As computerized Information Systems are highly distributed leads to ease in
perpetration of computer related crimes thereby increasing temptation for abuse.
On-line processing of data and validation checks: It would help the prospective perpetrator in
guessing passwords and aid in circumventing controls in inputs to computer.
Impact of IT on control:
Changes in custody of files and documents: In manual system, physical files are managed under the
custodian of physical person. In computerized environment, it is managed by the DBMS that is managed by DBA.
Decline of accountability: Traditional functions, responsibilities and boundaries have been eliminated
by adopting new methods i.e, ID and password. In computerized environment, the person having valid ID and
password are allowed to access the file. Hence no need to have custodian to manage the physical access control.
Transfer of responsibilities: Single action by user through programs may complete the entire processing
cycle of the transaction. Hence, no need to have separate person for separate process in computerized
environment.
Realignment of functions data entry: In manual system, data entry is done manually but in computerized
environment, real time system accepts the input automatically at the time of its occurrence and stores the data at
centralized location called database.
“Information technology has been one of the leading drivers of globalization, and it may also become one of its major victim” Page A2.26
Computing:
Introduction:
Computing
- means any goal-oriented activity requiring, benefiting from or creating computers; and
- includes
designing and building hardware and software systems for a wide range of purposes;
processing, structuring, and managing various kinds of information;
doing scientific studies using computers;
making computer systems behave intelligently;
creating and using communications and entertainment media;
finding and gathering information relevant to any particular purpose, and so on.
1. Computer Science:
Computer science is the study of the theory, experimentation, and engineering that form the basis for design
and use of computers.
It is the systematic study of feasibility, structure, and mechanization of methodical processes or algorithms
that underlie the acquisition, representation, processing, storage, communication of and access to information.
2. Computer Engineering:
It refers to an approach that integrates several fields of electrical engineering and computer science required
to develop computer hardware and software.
It includes design of hardware and software from the stage of design of individual microprocessors, personal
computers, and supercomputers, up to the stage of circuit design.
This focuses not only on how computer systems work but also how they integrate and work a holistic
system.
3. Software Engineering:
It refers to the study of a systematic, disciplined, quantifiable approach to the design, development, operation,
and maintenance of software.
“Information technology has been one of the leading drivers of globalization, and it may also become one of its major victim” Page A2.27
Computing Technologies
Server Popular computing architecture Emerging computing models Information Technology Software Engineering
Server:
Server is a set of computers and CPU connected with various other client based computers through network to
accept the request from various users and provide respond to them.
It requires client server architecture comprises of front end system and back end system and requires middleware
through which they are interlinked.
2) Web Servers:
Web servers are a set of computers that uses HTTP to deliver web pages to users. Every web server has
an IP address and possibly a domain name.
For example: if we enter the URL http://www.icai.org in our browser, this sends a request to the Web server
whose domain name is icai.org. The server then fetches the home page named and sends it to our browser.
3) Mail Server: It is a server that receives incoming e-mail from local users and remote senders and forwards
outgoing e-mail for delivery.
“Information technology has been one of the leading drivers of globalization, and it may also become one of its major victim” Page A2.28
4) Application Server:
This is a program that handles all application operations such as managing application logic, its security
and its updation etc. between users and an enterprise's backend business applications.
5) Database server:
This is a set of computer system that processes database queries by creating and maintaining master
files. It performs tasks such as data analysis, storage, data manipulation, archiving, and other non-user
specific tasks.
6) File server: This is a computer and storage device dedicated to storing files. Any user on the network can
store files on the server.
“Information technology has been one of the leading drivers of globalization, and it may also become one of its major victim” Page A2.30
CISC Approach:
CISC design would try to finish the task in the minimum possible instructions by implementing hardware which could understand and execute series of operations. Thus
the processor would come with a specific instruction ‘MUL’ in its instruction set. ‘MUL’ will load the two values from the memory into separate registers, multiplies the
operands in the execution unit, and then stores the product in the appropriate location. So, the entire task of multiplying two numbers can be completed with one
instruction:
MUL 1:3, 4:2
MUL is referred to as a "complex instruction" as it operates directly on the computer's memory banks and does not require the programmer to explicitly call any loading
or storing functions.
1:1 1:1 1:1 1:1 1:1
RISC Approach: 2:1 2:1 2:1 2:1 2:1
RISC processors use simple instructions that can be executed within a clock cycle. 3:1 3:1 3:1 3:1 3:1 Memory
Thus, ‘MUL’ instruction will be divided into three instructions.
4:1 4:1 4:1 4:1 4:1
(i) "LOAD," which moves data from the memory bank to a register,
(ii) "PROD," which finds the product of two operands located within the registers, and 5:1 5:1 5:1 5:1 5:1
(iii) "STORE," which moves data from a register to the memory banks.
In order to perform the task, a programmer would need to code four lines of assembly: Register
LOAD A, 1:3 A B
LOAD B, 4:2 C D
PROD A, B
STORE 1:3, A
Execution Unit
3) System Design: (It represents the design of computer bus, circuits It includes all of the other hardware components
within a computing system such as:
computer, or between computers that covers all related hardware components (wire, optical fiber, etc.)
and software, including communication protocol.
b) Memory controllers:
It is a digital circuit which manages the flow of data going to and from the main memory and can be a
separate chip or integrated into another chip.
Mobile Computing:
Introduction:
It is the use of portable computing devices (*such as laptop and tablet, PDAs) in conjunction with mobile communications
technologies to enable users to access the Internet and data on their home or work computers from anywhere in the
world.
It provides flexibility in which a computer is expected to be transported during normal usage.
Mobile computing is enabled by use of mobile devices (portable and hand held computing devices) such as PDA,
laptops, mobile phones, MP3 players, digital cameras, tablet PC and Palmtop on a wireless network.
Note: Mere having laptop cannot be called as mobile computing unless it has mobile features.
“Information technology has been one of the leading drivers of globalization, and it may also become one of its major victim” Page A2.32
Mobile Hardware:
It refers to mobile devices and other physical components that receive or access the service of mobility.
These devices will have receptors that are capable of sensing and receiving signals.
These devices are configured to operate in full-duplex mode capable of sending and receiving signals at
the same time.
Example: Portable laptops, Smart phones, Tablet PC‟s to Personal Digital Assistants.
Mobile Software:
Mobile Software is the actual program that runs on the mobile hardware. It is an engine of mobile device.
It can also be called as an operating system of that appliance. Hence it is an essential component that
makes the mobile device operate.
Example: Mobile apps such as whats app, facebook apps, store apps, message etc.
“Information technology has been one of the leading drivers of globalization, and it may also become one of its major victim” Page A2.33
5) Freedom to Roam:
There are various business applications used to give users freedom to roam along with access to data
and services at any time and in any place.
Example: ERP apps, mail apps, flipkart apps, netbanking apps etc.
Network Virtualization
In IT, Virtualization is the process of creating logical computing resources through programming from
available physical resources.
Once installed, the virtualized computing resources such as memory, CPUs, network and storage can all be
pooled and provisioned to workloads without regard for physical location within a data center.
It allows a large physical network to be provisioned into multiple smaller logical networks and conversely
allows multiple physical LANs to be combined into a larger logical network.
It allows administrators to improve network traffic control, enterprise and security.
3) Portable Applications:
Portable applications are needed when running an application from a removable drive without installing it
on the system's main disk drive.
Virtualization can be used to put the application into temporary files in the application's installation
directory and not within the system's permanent file system.
4) Portable Workspaces:
Recent technologies have used virtualization to create portable workspaces on devices like iPods and USB
memory sticks.
Example: Kinsgston 64GB pendrive alongwith RAM of 65536 MB
5) Disaster Recovery:
Virtual machines can be used as "hot standby" environments for physical production servers. Hot
standby is a redundant method in which one system runs simultaneously with an identical primary system.
Upon failure of the primary system, the hot standby system immediately takes over, replacing the primary
system. However, data is still mirrored in real time. Thus, both systems have identical data.
It helps to provides "backup-and-restore" philosophy by providing backup images.
“Information technology has been one of the leading drivers of globalization, and it may also become one of its major victim” Page A2.35
Grid Computing
Grid Computing is a special kind of distributed computing network in which different computers within the
same network share one or more resources.
Processing power, memory and data storage are all community resources that authorized users can tap
into and leverage for specific tasks.
A grid computing system can be as simple as a collection of similar computers running on the same
operating system or as complex as inter-networked systems comprised of every computer platform.
In this system, every resource is shared, turning a computer network into a powerful supercomputer.
Grid Computing
Cloud Computing:
Introduction:
Cloud computing means the use of computing resources as a service through Internet in a virtual manner.
Virtualization is something like if you have windows XP as an operating system and are able to operate windows
10 though it is not stored on user‟s private PC.
Virtualization helps to provide all computing resources including hardware and software in a programmable
way to client PC.
It comprises of servers and clients. Server can be called as back end architecture and client can be called as
front end architecture.
“Information technology has been one of the leading drivers of globalization, and it may also become one of its major victim” Page A2.36
Front end architecture means the computer through which remote users are accessing the server and back end
architecture means the computer where database and all application logics are stored for program execution and
data storage.
It will be protected only when there is Right Architecture for the Right Application (RARA).
It is highly dynamic and scalable.
It allows only authorized users to access any computer resources via Internet from anywhere.
User need not to make investment to develop and maintain IT infrastructures.
It offers services on demand over the network that meet changing business needs.
It makes the location of physical resources and devices irrelevant.
It also helps users to develop, deploy and manage their applications on cloud in a virtual manner.
It provides benefit to small and medium-sized business systems who wishes to completely outsource their
data-centre infrastructure.
Example: Google Apps where any application can be accessed by using a browser and it can be deployed on
thousands of computer through the Internet.
Limitations:
It has low security assurance as to building trust among the clients.
Privacy and organizational autonomy are not possible.
2) Private Clouds:
It resides within the boundaries of an organization and is used exclusively for the organization’s benefits.
These are also called internal clouds or corporate cloud.
Private Clouds can either be private to the organization and administered by a single organization (On-
Premise Private Cloud) or can be managed by third party (Outsourced Private Cloud).
It is built by IT departments for optimizing utilization of IT resources by using the concepts of grid
computing and virtualization.
“Information technology has been one of the leading drivers of globalization, and it may also become one of its major victim” Page A2.38
4) Hybrid Clouds:
It is a combination of both at least one private (internal) and at least one public (external) cloud computing
environments.
It starts with a private cloud initially, and then for additional resources, the public cloud is used. It has
aims to utilize the power of the public cloud along with the properties of private cloud.
With a hybrid cloud, organizations might run non-core applications in a public cloud, while maintaining core
applications and sensitive data in-house in a private cloud.
It is typically offered in either of 2 ways:
- A vendor has a private cloud and forms a partnership with a public cloud provider; or
- A public cloud provider forms a franchise with a vendor that provides private cloud platforms.
“Information technology has been one of the leading drivers of globalization, and it may also become one of its major victim” Page A2.39
“Information technology has been one of the leading drivers of globalization, and it may also become one of its major victim” Page A2.40
“Information technology has been one of the leading drivers of globalization, and it may also become one of its major victim” Page A2.41
“Information technology has been one of the leading drivers of globalization, and it may also become one of its major victim” Page A2.42
2) On demand:
It provides computer resources in a virtual manner to users as per their demand only. The computer
resources available in the cloud were not demanded by users, will not be provided to them.
Example: Tally is available in cloud but was demanded by Mr. A and Mr. B only. It is provided only to them and
not to other users.
3) Pay-Per-Use Mode:
Cloud must provide their resources as a service and they should charge their service on pay-per-use
mode.
Price is decided based on the complexity of services offered.
Application Programming Interfaces (APIs) may be offered to the users so that they can access services on
the cloud by using these APIs.
4) Resiliency:
Cloud must be resilient so that if there is a problem in one component of cloud it will not affect other
components. It means that though all components are integrated amongst each other still they should maintain
isolation amongst them.
5) Multi tenancy:
Since cloud computing is working in a distributed and shared model, multiple users should simultaneously able
to use applications with more efficiency at lower cost by sharing common infrastructure from different
locations.
6) Workload management:
Cloud-computing providers can migrate workloads across servers both inside data center and across data
centers even in a different geographic area. This migration might be necessitated and due considerations must
be given to least cost or efficiency considerations (network bandwidth) or regulatory considerations.
“Information technology has been one of the leading drivers of globalization, and it may also become one of its major victim” Page A2.43
It makes physical location of device, resources and users irrelevant. Moreover, they can access these
resources 24 * 7 hours.
3) Cost Efficiency:
Cloud computing is most cost efficient method to use, maintain and upgrade the cloud computing. On
other hand, traditional desktop software is very expensive for establishment in terms of paying a lot of
licensing fees for multiple users.
In cloud computing, IT users need to pay only for resources on usage basis. He can save substantial
purchase cost unlike traditional approach.
4) Quick Deployment:
Cloud computing gives advantage of quick deployment. It means that user can install software configuration
in a single click within a fraction of second without following actual installation process
It makes entire system fully functional within a second.
3) Technical Issues:
This technology is always prone to outages and other technical issues. Even the best cloud service providers run
into this kind of trouble, in spite of keeping up high standards of maintenance. We will invariably be stuck in case
of network and connectivity problems.
“Information technology has been one of the leading drivers of globalization, and it may also become one of its major victim” Page A2.44
Single
Cryptography Internet Internet revolution (6) Architecture
Computers
Two
Methods EFT Exam
Characteristics
Applic Business
Intranet ples
Approaches ation use Three
TC
Extranet M-Commerce Issues Control s/w
Network Security Benefits N-tier
Protocols
Functions E-Commerce Affect
on ind.
Ownership wise
Features
Business value
Tools to protect inf.
Rules Benefits Risk Types Public Private VPN
& system from CIM Tasks
“People don’t buy products—they buy people. It’s called slavery. I mean networking. It’s called networking.” Page A3.1
2) Technology Trends:
In this trend, telecommunication operators provide open system and unrestricted connectivity in order to
gain more and more competitive advantage. It leads to shifting from old networking architecture into client
server based technology; shifting from analog to digital technology; shifting from wire to wireless
technology etc.
“People don’t buy products—they buy people. It’s called slavery. I mean networking. It’s called networking.” Page A3.2
“People don’t buy products—they buy people. It’s called slavery. I mean networking. It’s called networking.” Page A3.3
1) File Sharing:
It is required for grouping all data files together on a server. It is easier to share documents and data. It
provides centralized file organization.
2) Resource Sharing:
It provides sharing of computer resources such as hard disk, printers, fax etc. amongst multiple users
simultaneously to reduce the cost of installing and maintaining multiple resources in the organization.
3) Remote Access:
It provides remote access facilities to authorized person without any location boundation with the use of
Virtual Private Networking (VPN).
4) Shared Databases:
If allows to make the database available to multiple users at the same time.
It also promotes integrity and confidentiality of data available in the database.
5) Fault Tolerance:
It is the process of implementing fault tolerance for making sure that there are several lines of defense
against accidental data loss. It is an approach for fault prevention.
Example: UPS must be available in case of power failure.
“People don’t buy products—they buy people. It’s called slavery. I mean networking. It’s called networking.” Page A3.4
2) Contention:
It refers to the situation that arises when there is a conflict for some common resource.
Example: Network contention could arise when two or more computer systems try to communicate at the
same time.
3) Routing:
It refers to the process of deciding on how to communicate the data from source to destination in a network.
4) Resilience:
It refers to the ability of a network to recover from any kind of error like connection failure, loss of data etc. It
may happens that if there is a problem in one computer it may affect another computer.
2) Resource Sharing:
All computer resources could be stored at a central location and can be shared across different systems.
Example: In the case of a CBS, Bank data is stored at a Central Data Centre and could be accessed by all
branches as well as ATMs.
3) Computational Power:
It allows distribution of data processing amongst various computer systems so that load of one computer is
bifurcated amongst various computers every computer is free from being overloaded.
For example: Data processing of a bank server is distributed amongst various ATM machines. As a result load of
server is reduced and also ATM machine‟s load is bifurcated amongst various ATM machines.
4) Reliability:
It makes application more reliable because it ensures 24*7 hours availability of critical applications across
different systems distributed across network.
Example: In a city there could be multiple ATM machines so that if one ATM fails, one could withdraw money from
another ATM.
5) User communication:
Networks allow users to communicate by using e-mail, newsgroups, video conferencing, etc.
“People don’t buy products—they buy people. It’s called slavery. I mean networking. It’s called networking.” Page A3.5
1) Terminals:
Terminals are the starting and stopping points in any telecommunication network environment. Any input or
output device that is used to transmit or receive data can be classified as a terminal component.
These includes: Video Terminals, Microcomputers, Telephones, Office Equipment and Transaction Terminals.
2) Telecommunications processors:
It supports data transmission between terminals and computers by providing a variety of control and support
functions.
They include Network Interface Card, Modem, Multiplexer and Internetworked Processors.
a) Network Interface Card (NIC):
It is a special card mounted on motherboard through PCI
slot (Peripheral component interconnect slot) in computer
system.
It is used to connect a computer to a computer network through
Ethernet connector by attaching network cable to a server.
It has additional memory called MAC address (media access
control address) for buffering incoming and outgoing data
packets.
b) Modems:
MODEM stands for Modulator/Demodulator Data. The word "modem" is a contraction of modulate and
demodulate.
It is an encoding as well as decoding device used in data transmission to converts a digital
computer signal into an analog telephone signal (i.e. it modulates the signal) and converts an analog
telephone signal into a digital computer signal (i.e. it demodulates the signal) in a data communication
system.
Modems are used for handling up streaming and down streaming of data from a peripheral device to the
CPU and vice versa.
Modems are required to send computer data with ordinary telephone lines because computer data is
in digital form but telephone lines are analog. It provides ability to access remote computers
“People don’t buy products—they buy people. It’s called slavery. I mean networking. It’s called networking.” Page A3.6
f) Router:
Router is a communications processor that interconnects networks based on different rules or
protocols, so that a telecommunications message can be routed to its destination.
It is the backbone of internet through which all remote terminals is being connected. Its primary
purpose is to identify the source and destination IP Address transmitted across the networks.
It allows different networks to communicate with each other.
g) Hub:
A hub is a multi-port connecting device used to interconnect LAN devices through wire or
wireless communication channel. It supports in homogeneous network only.
It allows sharing of network resources such as servers, LAN workstations, printers, etc.
A hub can be used to extend the physical length of a network.
“People don’t buy products—they buy people. It’s called slavery. I mean networking. It’s called networking.” Page A3.7
h) Bridge:
Bridge is a communication processor than connects numerous Local Area Networks (LAN)
having same topology. It boosts the data transmission signal while passing data from one LAN to
another.
i) Repeater:
Repeater is a communications processor used to regenerate or replicate the signal transmitted
over the network. It boosts or amplifies the signal before passing it to the next section of cable
in a network. It solves the problems of signal weakness or signal lost which results as data is
transmitted along the various cables.
j) Gateway:
Gateway is a communications processor connecting various heterogeneous networks that uses
different communication architectures. It is used to transmit the data from one network to
another network having heterogeneous features.
Example: Ethernet port is an example of gateway.
3) Telecommunications Media/Channels:
It refers either to a physical transmission medium such as a wire, or a wireless technique such as
a radio channel in telecommunications and computer networking.
It is used for data transmission and connecting network devices in a LAN, WLAN or WAN.
Telecommunications media is divided into two groups:
1) Guided Media: Twisted Pair, Coaxial cable and Optical fiber.
2) Unguided Media: Wireless
1) Guided Media:
Guided Transmission Media uses a "cabling" system that guides the data signals along a specific path. The data
signals are bound by the "cabling" system. Guided Media is also known as Bound Media.
Some of the common examples of guided media are Twisted Pair, Coaxial cable and Fiber optics.
a) Twisted-Pair Wire:
Twisted-pair is ordinary telephone wire consisting of copper wire twisted into pairs and most widely
used media for telecommunications for both voice and data transmissions.
It is used extensively in home and office telephone systems.
Disadvantages: It creates various unwanted electrical interference (noise) and it is somehow
expensive utility wise and does not offer security.
b) Coaxial Cable:
It consists of copper or aluminum wire wrapped with spacers to
insulate it from a tubular conducting shield. Insulation minimizes
interference of signals the cable carries. Many coaxial cables also
have an insulating outer sheath or jacket.
It can carry a large volume of data and allows high-speed data
transmission used for cable TV systems, and for connection of
“People don’t buy products—they buy people. It’s called slavery. I mean networking. It’s called networking.” Page A3.8
c) Fiber Optics:
It consists of a bundle of glass threads each of which is capable of transmitting messages
modulated onto light waves.
Fiber optics has several advantages over twisted pair and coaxial wire.
It has much greater bandwidth than metal cables.
It carries digital as well as analog signals and provides increased speed and greater carrying
capacity than coaxial cable and twisted-pair lines.
It is not affected by electromagnetic radiation and not susceptible to electronic noise unlike
twisted-pair and coaxial cable.
It is easy to install and more flexible and can be used undersea.
Advantages: Reduced installation effort, Greater communication capacity, Faster transmission
speeds, and Freedom from electrical interference.
Disadvantage: Installation can be difficult and costly to purchase.
2) Unguided Media:
It consists of a means for the data signals to travel without using wire. Hence, the data signals are not bound
by a cabling media and thus called unbound Media.
Some of the common examples of unguided media are Terrestrial Microwave Systems, Radio waves, Micro
Waves, Infrared Waves and Communications Satellites.
a) Micro Waves:
Microwaves has wavelengths ranging from one millimeter up to one meter or equivalently with frequencies
between 300 MHz (0.3 GHz) and 300 GHz hence repeaters must be located within one meter.
These are used for communication, radio astronomy, navigation etc.
Measurement unit of
electromagnetic waves
1 hertz = 0.001 KHz
1 KHz = 0.001 MHz
1MHz = 0.001 GHz
1GHz = 0.001 THz
“People don’t buy products—they buy people. It’s called slavery. I mean networking. It’s called networking.” Page A3.9
b) Infrared Waves:
Infrared radiation is a type of electromagnetic radiation, as are radio
waves, ultraviolet radiation, X-rays and microwaves (along with
extended wavelength). It is invisible to human eyes, but people can
feel it as heat.
Its wavelength is more than those of visible lights and lies between
300GHz to 430 THz.
It is used in Night-vision devices that allow people or animals to be
observed without the observer being detected.
Example: An image of Earth in infrared wavelengths shows relative temperatures around the world. It
can also be used to observe paranormal activities.
c) Terrestrial Microwave:
Terrestrial microwave transmission is required when microwaves are used to transmit data. Because of
the curve of the Earth's surface, the repeaters must be constructed every 30 miles.
Terrestrial microwave transmits high-speed radio signals between relay stations spaced approximately
30 miles apart.
It is widely used to provide communication links when it is impractical or too expensive to install
physical transmission media such as across river, inaccessible terrain etc.
It is used to transmit data as well as voice in the form of electromagnetic waves.
Disadvantage: It cannot bend around the curvature of the earth.
d) Radio Waves:
Radio waves are an invisible form of electromagnetic radiation
that varies in wavelength from around a millimeter to 100,000
km, making it one of the widest ranges in the electromagnetic
spectrum.
It does not require any antenna and repeaters in between for
extending the signal unlike terrestrial microwave.
Radio waves are most commonly used transmission media in
the wireless Local Area Networks.
e) Communication Satellites:
Communication satellite uses the atmosphere of microwaves and radio waves as the medium through
which to transmit signals.
Its wavelength is approximately 1GHz to 40 GHz.
Satellite uses solar-powered electronic device that receives and retransmits signals; the satellite acts as a
“People don’t buy products—they buy people. It’s called slavery. I mean networking. It’s called networking.” Page A3.10
relay station between satellite transmissions stations on the ground (earth stations).
They are used extensively for high-volume as well as long-distance communication of both data and
voice.
It is cost-effective method for moving large quantities of data over long distances.
Disadvantages:
Satellites are very expensive to develop and place in orbit.
It has an age limit of 7-10 years.
Signals weaken over long distances.
Weather conditions and solar activity can also cause noise interference.
Anyone can listen in on satellite signals, so sensitive data must be sent in a secret, or encrypted, form.
4) Computers:
In a telecommunications networks, computers of all sizes and types are connected through media to
perform their communication assignments. They include personal computers, mini-computer, mainframe
computer, super computer and servers etc.
5) Telecommunications Control Software:
It consists of programs i.e, protocols that control and manages telecommunication activities and their
telecommunications components. It manages Host computers, Network Operating Systems (network
servers), Network Management Components and Web browsers etc.
It is resided on network and can provide various services such as performance monitoring, priority
assigning, and transmission error correction.
“People don’t buy products—they buy people. It’s called slavery. I mean networking. It’s called networking.” Page A3.11
3) Network monitoring:
It troubleshoots and watches over the network, informing network administrators of
potential problems before they occur.
4) Security:
It provides authentication, encryption, and auditing functions, and enforces security
policies.
Example: Id and password, Firewall system, intrusion detection system.
“People don’t buy products—they buy people. It’s called slavery. I mean networking. It’s called networking.” Page A3.12
Multi-tier It is client server architecture in which database, application logic and user
(or n-tier or 3 tier interfaces are resided at a separate and independent platform. Hence it is also
architecture)
called as 3-tier architecture.
It uses middleware to connect application layer, database layer and interface
layer amongst each other.
Data traffics are highest between application logic and database server which
requires high bandwidth. It is very expensive.
Class II Area Coverage Based Classification
LAN It is a group of computers and network devices connected together within a
same building over a limited geographical area.
It connects up to 100 approx microcomputers
It has high speed and relatively inexpensive.
It enables multiple users to share software, data, and devices.
LANs use high-speed media (1 Mbps to 30 Mbps or more) and are mostly
privately owned and operated.
Channels are relatively error free.
MAN It is a larger network that usually established over the same city (roughly 40 km in
length). Cable network is an example of a MAN. It is somewhere between a LAN
and a WAN.
It uses fiber optic cable that provides high speed with approx. 10 Mbps bandwidth.
A MAN can support both data and voice. Cable television networks are
examples of MANs.
WAN A Wide Area Network (WAN) is not restricted to any geographical location.
The technology is high speed and relatively expensive. The Internet is an
example of a worldwide public WAN.
It covers a large geographic area with various communication facilities such as
long distance telephone service, satellite transmission, and under-sea cables.
Examples of WANs are interstate banking networks and airline reservation
systems.
Wide area networks typically operate at lower link speeds (about 1 Mbps).
3 Class III Ownership-based Classification
Public Networks established for all user across the world is known as public networks.
Networks Internet is an example of public networks.
Private Private networks used by particular organization, particular campus or
Networks particular enterprise only. This is a network that is not available to the outside
world. Intranet is an example of it.
Virtual A virtual private network (VPN) is a network that uses a public network, such
Private as the Internet, to provide secure access to organization's private network. A
Networks key feature of a VPN is its ability to work over both private networks as well as public
networks like the Internet. Using a method called tunneling, a VPN use the same
hardware infrastructure as existing Internet or intranet links.
“People don’t buy products—they buy people. It’s called slavery. I mean networking. It’s called networking.” Page A3.13
Q-2 Activities provided by LAN (or) Critical Reasons for using LAN:
“People don’t buy products—they buy people. It’s called slavery. I mean networking. It’s called networking.” Page A3.14
installation and updation of software as it prevent user from purchasing multiple copy of software for every
machine in the organization.
It makes software up gradation is much easier as this package is stored centrally on the server.
“People don’t buy products—they buy people. It’s called slavery. I mean networking. It’s called networking.” Page A3.15
Clients are interconnected by local area networks and share application processing with network servers, which
also manage the networks.
Client and Server can operate on separate computer platforms.
Either the client platform or the server platform can be upgraded without having to upgrade the other platform.
The server is able to service multiple clients concurrently; in some client/server systems, clients can access multiple
servers.
Action is usually initiated at the client end, not the server end.
The network system implemented within the client/server technology is commonly called by the computer industry as
Middleware. Middleware is distributed software needed to allow clients and servers to interact. General
Middleware allows for communication, directory services, queuing, distributed file sharing, and printing.
1) Mix-and-Match:
The client server software is independent of hardware and operating System software platforms.
Example: Tally stored on the server can be operated in various computers having different operating
system such as windows professional, windows 7, Mac OS etc.
2) Integrity:
It provides more data integrity as a result of data centralization and high level security provided in
server as well in workstations.
3) Shared Resources:
A server can service many clients at the same time and regulate their access to the shared resources.
4) Scalability:
In a C/S environment, client workstations can either be added or removed and also the server
load can be distributed across multiple servers.
5) Transparency of Location:
C/S software usually asks the location of the server from the clients by redirecting the service calls
when needed.
“People don’t buy products—they buy people. It’s called slavery. I mean networking. It’s called networking.” Page A3.16
Advantages
(i) Peer-to-Peer Networks are easy and simple to set up and only require a Hub or a Switch to connect all the computers
together.
(ii) It is very simple and cost effective.
(iii) If one computer fails to work, all other computers connected to it continue to work.
Disadvantages
(i) There can be problem in accessing files if computers are not connected properly.
(ii) It does not support connections with too many computers as the performance gets degraded in case of high
network size.
(iii) The data security is very poor in this architecture.
“People don’t buy products—they buy people. It’s called slavery. I mean networking. It’s called networking.” Page A3.17
3) Multi-Tier Architecture:
A tier is a distinct part of hardware or software.
“People don’t buy products—they buy people. It’s called slavery. I mean networking. It’s called networking.” Page A3.18
“People don’t buy products—they buy people. It’s called slavery. I mean networking. It’s called networking.” Page A3.19
Network Computing
Q-1 Features of network computing
1) Network computers provide a browser-based user interface.
2) Network computers are microcomputers without floppy or hard disk drives designed as low-cost networking
computing devices.
3) Servers provide the operating system, applets, databases, and database management software needed by
the end users in the network.
“People don’t buy products—they buy people. It’s called slavery. I mean networking. It’s called networking.” Page A3.20
Network Topologies
There are several basic types of network topologies, or structures, in telecommunications networks. Four basic topologies used
in wide area and local area telecommunications networks are the:
1) Star network
2) Ring network
3) Bus network
4) Mesh Network
a) Star topology:
In this topology, all communication channels (wires) are emanating from centralized control.
The processing nodes in a star network interconnect directly with a central system. Each terminal can
communicate only with the central site.
Transmission of information from one node to another node can be done only through central node.
This topology is very beneficial to those organizations that requires centralized database.
For example: a star network may be used in banking for centralized record keeping in an on-line branch office
environment.
b) Bus topology:
In a bus network, a single length of wire is used to connect a number of computers.
This structure is very popular for local area networks.
A bus network has a decentralized approach.
In this topology, a single network cable runs in the building and all nodes are linked with two
“People don’t buy products—they buy people. It’s called slavery. I mean networking. It’s called networking.” Page A3.21
endpoints called the bus. Two ends of the cable are terminated with terminators.
Advantages:
There is no host computer or file server making bus network more reliable.
If one of the microcomputers fails, it will not affect the entire network.
It requires least amount of cable to connect the computers together and therefore is less expensive than
other cabling arrangements.
It is very easy to extend. Two cables can be easily joined with a connector, making a longer cable for more
computers to join the network. A repeater can also be used to extend a bus configuration.
Disadvantages:
Heavy network traffic can slow a bus considerably.
Each connection between two cables weakens the electrical signal.
The bus configuration can be difficult to trouble shoot. A cable break or malfunctioning computer can be
difficult to find and can cause the whole network to stop functioning.
c) Ring topology:
A ring network is much like a bus network except the length of wire
that connects to form a loop.
This topology is also used for local area networks.
Local computer processors are tied together sequentially in a ring with
each device being connected to two other devices.
A ring network has a decentralized approach.
Images of Ring topology
When one computer needs data from another computer, the data is
passed along the ring.
It is considered more reliable and less costly than star networks because if one computer fails, the other
computers in the ring can continue to process their own work and communicate with each other.
These links are unidirectional which ensures that transmission by a node across the whole ring and
comes back to the node, which made the transmission.
Advantages:
It does not require a central computer to control activity nor does it need a file server.
Each computer can communicate directly with another computer in a network by using the common
communication channel and each computer does its own independent applications processing.
“People don’t buy products—they buy people. It’s called slavery. I mean networking. It’s called networking.” Page A3.22
The ring network is not breakdowns as like star network, because when one computer in the ring fails, it does
not affect processing and communication capabilities of other computers in the ring.
Ring networks offer high performance because each station has a similar workload.
Ring networks are easily extendable.
Disadvantages:
It is relatively expensive and difficult to install.
Failure of one computer on the network can affect the whole network.
It is difficult to trouble shoot a ring network.
Adding or removing computers can disrupt the network
d) Mesh topology:
In this structure, each computer is connected amongst each other directly available within the network.
It is fully connected or connected with only partial links.
In fully interconnected topology, each node is connected by a dedicated point to point link to every node. It
is utmost reliable as there are always alternate paths available. It is rarely found because it is very
expensive and time consuming. The purpose of this topology is to provide high level of redundancy in
communication path.
Advantages:
It generates greatest amount of redundancy in the event that one of the
nodes fails where network traffic can be redirected to another node.
Network problems are easier to diagnose.
Disadvantages:
The cost of installation and maintenance is high (more cable is required than any other configuration).
“People don’t buy products—they buy people. It’s called slavery. I mean networking. It’s called networking.” Page A3.23
Data Transmission
Serial Parallel
Asynchronous
Synchronous
In this transmission, synchronization of bit sequence is not possible since data are transmitted in a
single wire and bits are sent one after the other.
It is used either in online system or real time system.
RS-232 is an example of serial port used for mouse and keyboard.
2) Parallel Transmission
In parallel transmission, it sends multiple bits at a time over multiple wires. In
Parallel transmission, there are separate parallel paths available with each bits
of byte so that all character bits are transmitted simultaneously.
Centronic port is an example of parallel port used for printer. Centronic Port
This technology is used in offline system such as integrated circuits, buses and in memory devices within
computer system
Integrated circuits
“People don’t buy products—they buy people. It’s called slavery. I mean networking. It’s called networking.” Page A3.24
“People don’t buy products—they buy people. It’s called slavery. I mean networking. It’s called networking.” Page A3.25
Asynchronous Transmission:
Asynchronous transmission will be used only when sender and receiver wants to communicate with each
other on non-real time basis where receiver might give his reply later on after lapse of some time. Hence,
each character is sent at irregular intervals.
This format of communication will be used to provide more flexibility to sender as well as receiver for
communication and no pressure is put on receiver to respond instantly.
Since a single bit is transmitted during a long period of time and data size is large, the receiver
will not be able to know if this is 00010000, 10000000 or 00000100 . To correct this problem,
each character is preceded by some information indicating the start of character transmission.
The transmission start information is called a start bit (usually 0) and ends by sending end-of-
transmission information is called stop bit (usually 1).
Example of communication using asynchronous format: Wikis, Blog, Mail etc.
It is a connection in which the data flows in only one direction from the transmitter to the receiver. It is
useful if the data do not need to flow in both directions.
Simplex connection shall always use only asynchronous technology over single carrier or single circuit.
“People don’t buy products—they buy people. It’s called slavery. I mean networking. It’s called networking.” Page A3.26
Terminal-A Terminal-B
2) Half-duplex Connection:
It is a connection in which the data flows in one direction or the other, but not both at the same time. It
provides bi-directional communications.
It uses synchronous technology format over single carrier to provide real time information but not at the
same time
Example: Instant messaging, walkie-talkie, Email etc.
It is a connection in which the data flow in both directions simultaneously. Here sender and receiver
terminal both releasing and receiving data signal at same time.
It uses synchronous technology format over single carrier to provide real time information at the same
time at both end.
Example: Telephone, Mobile, Teleconferencing, VOIP i.e, video calling through internet, etc.
“People don’t buy products—they buy people. It’s called slavery. I mean networking. It’s called networking.” Page A3.27
1) Circuit Switching:
A Circuit Switching network is one that establishes a fixed channel between nodes and terminals as
if the nodes were physically connected with an electrical circuit (*wire).
This path will be decided before the data transmission starts.
The system decides on which route to follow for transmission on the basis of resource optimizing
algorithm and transmission goes according to the path between two communicating bodies.
Once the path is decided for data transmission, the route is dedicated and exclusive and released only
when the session terminates.
2) Message Switching:
In this switching, users communicate the message from secondary storage. It contains the data being
delivered from source node to destination node.
As the message is routed from its source to its destination, each intermediate switch within the network stores
the entire message. Hence it requires heavy memory storage capacity.
It provides high level of reliability as to successful delivery of message.
It is used for receiving, storing and forwarding messages from one point to another point.
It transmits heavy volume of data. It is cost effective as one can send data in night when transmission
costs are relatively cheaper.
Example: SMS and voice mail.
3) Packet Switching:
It is a sophisticated means of maximizing transmission capacity of networks.
Packet switching refers to protocols in which messages are broken up into small transmission units called
packets, before they are sent. Each packet is transmitted individually across the net.
Packet switching has a maximum packet size hence requires split up into multiple packets.
The packets may even follow different routes to the destination depends on the type of packet
switching. Because of having different routes, each packet has header information which enables to route
the packet to its destination. At the destination, the packets are reassembled into the original message.
Passwords and other data can be included within the packet and the transmission cost is by packet
and not by message, routes or distance.
Sophisticated error and flow control procedures are applied on each link by the network.
Example: Internet, Intranet and Extranet
Q-2 What are the Steps carried out consistently for every computer in the
network for sending and receiving data.
Different protocols cannot talk to each other hence standard protocols have been structure to resolve the problem. The entire
operation of data transmission over a network is broken down into discrete systematic steps. Each step has its own rules or
protocol.
1) At the sending computer- 3) At the receiving computer,
2) A protocol stack is a combination
of a set of protocols. Each layer specifies protocols –
i) Break data down into packets,
a different protocol– (i) Take data packets off the cable
ii) Add destination address to the
(i) For handling a function or, (ii) Bring packets into computer through
packet,
Network Interface Card (N IC)
(ii) As a subsystem of the common process,
iii) Prepares data for transmission (iii) Strip the packets off any transmitting
through Network Interface Card (iii) Each layer has its own set of rules.
information,
(NIC) Application layer, Presentation layer;
(iv) Copy data from packet to a buffer for
Session layer Transport layer and
reassembly,
network layer and data link layer and
(v) Pass the reassembled data to the
physical layer. application.
“People don’t buy products—they buy people. It’s called slavery. I mean networking. It’s called networking.” Page A3.29
In this layer, source and destination MAC address is provided on packet on the basis of which packet is
passing from one router to another router by following the best shortest path provided by network layer.
“People don’t buy products—they buy people. It’s called slavery. I mean networking. It’s called networking.” Page A3.31
“People don’t buy products—they buy people. It’s called slavery. I mean networking. It’s called networking.” Page A3.32
2 These are different layers. The Internet Application Layer includes the OSI Application
Layer, Presentation Layer, and Session Layer.
3 The OSI reference model was devised In this, the protocols came first and the model came late.
before the protocols were invented.
“People don’t buy products—they buy people. It’s called slavery. I mean networking. It’s called networking.” Page A3.33
1) Fault Management:
A fault is an event that has a negative significance, must be recognized, isolated, corrected and maintains
log files of all faults including network problems and present this information to the network manager.
It includes fault related to connectivity, speed, network devices and network software etc.
2) Configuration Management:
It refers to the monitoring of network and system configuration information so that the impact on network
operations can be tracked and managed.
It includes network changes, additions, and deletions need to be coordinated with the network management
personnel.
Example: Network must have a device containing all features of switches, router and modem.
3) Accounting Management:
For billed networks, accounting management is concerned with tracking of network utilization information,
such that name and ID of individual users, departments, or business units can be appropriately mentioned in
bills.
For non-billed networks, accounting refers to administration of users by making their log files containing
their information such as ID and password, level of access right provided and roles and responsibilities of each
and every user.
4) Performance Management:
It refers to the activity of measuring and availing data of network performance so that performance can be
measured and maintained.
It enables the manager to prepare the network efficiently and effectively.
5) Security Management:
It refers to the management of controlling over access to network resources as established by organizational
security guidelines.
It ensures security such as authentication, authorization and auditing over network hardware, network software,
data and router.
b) Structured threats:
It refers to a computer attack originating from the individual who are highly motivated and technically
competent and has immense knowledge about networking systems design and their vulnerabilities.
Such threats are intentionally conducted by intruders to penetrate networking such as hackers, eavesdropper
etc.
It is unavoidable threat hence it can‟t be avoided by using technology but it can be prevented from harming
the resources and can be mitigated by using risk management approach.
c) Internal Threats:
These threats originate from individuals who have authorized access to the network working within the
organization.
An internal threat may come from disgruntled employees, current employee or contractor etc.
d) External Threats:
These originate from individuals or organizations working outside an organization, who does not have
authorized access to organization‟s computer systems or network.
“People don’t buy products—they buy people. It’s called slavery. I mean networking. It’s called networking.” Page A3.35
Q-2 What are vulnerabilities? Explain various factors responsible for vulnerability?
Vulnerability
Vulnerability is the weakness in the system‟s safeguards that exposes the system to threats.
It may be weakness in an information system, cryptographic system (security systems), or other components
(e.g. system security procedures, hardware design, internal controls) that could be exploited by a threat.
Vulnerabilities potentially “allow” a threat to harm or exploit the system.
Missing safeguards will often determine level of vulnerabilities.
3) Software bugs:
It is a problem contained in the software program itself. It may create many problems such as operational
problem, virus issues, buffer overflow, access validation error, input validation error etc.
4) Insecure default configurations:
It occurs only when users are using ID and password provided by vendors as it is. Most of time intruders
knows these passwords and can access systems effortlessly.
5) Timing windows:
This problem may occur when a temporary file is exploited by an intruder to gain access to the file, overwrite
important data, and use the file as a gateway for advancing further into the system.
6) End users:
Users of computer systems are not professionals and are not always security conscious.
For example: When the number of passwords of an user increases, users may start writing them down where they
are easy to find. Further, kind of negligence such as save confidential files to places where they are not properly
protected.
“People don’t buy products—they buy people. It’s called slavery. I mean networking. It’s called networking.” Page A3.36
2) Assets identification:
After making plan, all assets must be identified available in the organization and must be classified into
personnel, Hardware, system software, application software, Facilities, Documentations, Supplies, Data etc.
3) Assets valuation:
After identifying all assets, its value must be determined to understand its criticality, its importance, its
value, and impact of loss that may arise if such assets are affected by any disaster.
Valuation of asset can be done physically as well as logical basis. For example: the replacement value of the
contents in a micro computer‟s hard disk may be several times more than the replacement value of the disk itself.
4) Threats identification:
After identifying the assets and its valuation, all inherent threats related to the every asset must be
determined and analyzed. It might be structured, unstructured, internal or external.
Examples of threats are: Power failure, communication failure, Earthquake, volcanoes, tsunamis etc.
6) Exposure analysis:
After doing threat analysis, it is equally important to understand the impact of each and every threat if
occurred. It is an analysis of determining the extent of the loss that organization can suffer after disaster taken
place.
7) Controls adjustment:
After doing threat and exposure analysis, it is a time to do security assessment to understand which control is
best to optimize the risk at minimum acceptable level.
Hence, controls must be designed, implemented and operated in such a way so that benefit derived from
such control will be greater than the cost of the control. Such adjustment can be called as Cost benefit
analysis.
submit to management stating that types and numbers of review performed, recommendation for
implementing new asset safeguarding techniques or mechanism etc.
Plan Assets Assets Probabilities Exposures Product Control
identification valuation
Network Security
Network security is a provisions and policies adopted by a network administrator to prevent, monitor and
control unauthorized access, misuse, modification, or denial of a computer network and network accessible resources.
Users choose or are assigned an ID and password or other authenticating information that allows them access to information
and programs within their authority.
1) Privacy/confidentiality:
Privacy assures confidentiality to receiver of the message from unauthorized disclosure and also assures that it is
available only to intended receivers.
It is possible only through cryptography and encryption techniques so that data is secured and can only be
decrypted with a special algorithm and/or mathematical formula.
Cryptography:
Cryptography is a combination of encryption and decryption process to authenticate the electronic
records by using algorithm key i.e, private key and public key.
It ensures information security such as data confidentiality, integrity, authentication, and non-repudiation.
Encryption:
In Cryptography, encryption is the process of encoding messages (or information) from normal text into cipher
text at sender‟s end by using private key.
Decryption is a process of decoding messages from cipher text into normal text by using public key at receiver‟s
end.
1) Plaintext:
It is normal message required to be encrypted by using algorithms.
2) Cipher Text:
It is an output of encryption process that is transmitted often by a messenger or radio.
“People don’t buy products—they buy people. It’s called slavery. I mean networking. It’s called networking.” Page A3.38
3) Encryption Model:
It refers to the algorithm used to execute encryption and decryption process. In absence of such
algorithm, intruder cannot decrypt the cipher text easily.
2) Authentication:
Network security ensures proper authentication that means the receiver must be sure about sender‟s identity and
confirmed that intruder has not sent the message.
“People don’t buy products—they buy people. It’s called slavery. I mean networking. It’s called networking.” Page A3.39
3) Integrity:
It provides data security from unauthorized modification that assures data must be arrived to receiver
exactly as it was sent by sender. There must not be any changes during the transmission - either accidental or
malicious.
4) Non repudiation:
It provides security as to proper recording of transactions incorporated by sender and allows receiver to claim
that transaction has been made if it was thereafter denied by sender that he had not made any transaction.
4) HTTPS: ye server and receiver ke beech me hone wale communication ko secure karke ensure karta hai ki
communication in dono ke beech me hi hona chahiye.
It stands for hypertext transfer protocols. It is a communication protocol for secure communication over a
computer network. It is used to encrypt the data flow between client and server.
It ensures that communication must be done between intended receiver and server only.
“People don’t buy products—they buy people. It’s called slavery. I mean networking. It’s called networking.” Page A3.40
“People don’t buy products—they buy people. It’s called slavery. I mean networking. It’s called networking.” Page A3.41
4. Anti- Malware:
It helps administrators in identifying block and removes malware from the computer system.
Example: Antivirus software is used to scan virus and remove it.
5. Site Blocking:
It is a software-based approach that prohibits access to certain Web sites that are deemed
inappropriate by management.
It also provides log activities and determines the amount of time spent on the Internet and identifies
the sites visited.
For example: Porn sites, illegal sites etc. must be blocked from accessing it.
Geographical area
Interaction
“People don’t buy products—they buy people. It’s called slavery. I mean networking. It’s called networking.” Page A3.42
Hardware required
Network
architecture
Speed
Error
Protocols used
WWW
Requirement of
DNS
How to give access
path
b) Cable TV System:
- It is another method to send signals over the cable TV system.
“People don’t buy products—they buy people. It’s called slavery. I mean networking. It’s called networking.” Page A3.43
- Like DSL, it reuses unused cable of TV channels by using cable modem at the home end and the device at the cable
head-end is called the CMTS (Cable Modem Termination System).
c) Wireless:
- It is used for Internet access in 3G mobile phone networks.
- They can provide data delivery at rates of 1 Mbps or higher to mobile phones and fixed subscribers.
- We call the location at which customer packets enter the ISP network for service the ISP‟s POP (Point of
Presence). Packets are moved between the POPs of different ISPs. From this point on, the system is fully digital and
packet switched.
BSNL
Customer’s Home
ISP’s architecture:
Long distance Transmission Line:
It is made up of long distance transmission lines that interconnect routers at POPs in the different cities that the
ISPs serve. This equipment is called the backbone of the ISP.
If a packet is destined for a host served directly by the ISP, that packet is routed over the backbone and delivered to the
host. Otherwise, it must be handed over to another ISP.
Internet Exchange Point:
ISPs connect their networks at IXPs (Internet eXchange Points) to exchange traffic with another ISPs. There are
many IXPs in cities around the world.
An IXP is a room full of routers, at least one per ISP. A LAN in the room connects all the routers, so packets can be
forwarded from any ISP backbone to any other ISP backbone.
IXPs can be large and independently owned facilities.
The connected ISPs are said to be peer with each other.
“People don’t buy products—they buy people. It’s called slavery. I mean networking. It’s called networking.” Page A3.44
Peering:
Peering is a process by which 2 internet networks are connected.
The peering that happens at IXPs depends on the business relationships between ISPs. There are many
possible relationships.
For example: a small ISP might pay a larger ISP for Internet connectivity to reach distant hosts, much as a
customer purchases service from an Internet provider.
Peering Choice:
It refers to the path a packet takes for transmission through the Internet depends on the peering choices of the
ISPs.
If the ISP delivering a packet peers with the destination ISP, it might deliver the packet directly to its peer.
Otherwise, it might route the packet to the nearest place at which it connects to a paid transit provider so that
provider can deliver the packet.
Data centre:
Companies that provide lots of content, such as Google and Yahoo!, locate their computers in data centres that are
well connected to the rest of the Internet.
These data centres are so large (tens or hundreds of thousands of machines) that electricity is a major cost, so data
centres are sometimes built in areas where electricity is cheap.
Intranet
Introduction:
An intranet is a network inside an organization that uses Internet technologies such as web browsers and servers,
TCP/IP network protocols, HTML and server etc. to provide an Internet like environment within the enterprise for
information sharing, communications, collaboration, and the support of business processes.
An Intranet is protected by security measures such as passwords, encryption, and firewalls, and thus can be
accessed by only authorized users through the Internet.
A Company‟s Intranet can also be accessed through the Intranets of customers, suppliers, and other business
partners via extranet links.
Intranets are commonly used to store internal and company-related content such as company policies or employee
benefits.
One difference between the Internet and an intranet is the way the web pages are addressed . On the Internet,
web pages typically are addressed through a full domain name, such as www.microsoft.com but domain name is usually not
needed to access intranet sites but can be accessed directly by providing his IP address in URL.
It is less expensive than making any private networks based on proprietary protocols.
It uses same web browser to access web information such as google chrome, Mozilla etc..
“People don’t buy products—they buy people. It’s called slavery. I mean networking. It’s called networking.” Page A3.46
2) Web Publishing:
It provides capability of accessing web pages through web browser on World Wide Web servers within the
organization as well.
Extranets:
Extranets are network links that use Internet technologies to interconnect the intranet of many businesses of
its customers, suppliers, or other business partners.
It provides secured connection which isolates business communication from the internet.
It provides privacy and security to an Intranet as well as to an extranet itself. It uses VPN, cryptography,
firewall server management and authorization procedures for having a better security.
In this way, Intranets of business partners, material suppliers, financial services, distributors, customers, etc. are
connected to the Extranets by an agreement.
It allows access only to authorized groups through strictly controlled mechanisms and promotes e-
commerce.
“People don’t buy products—they buy people. It’s called slavery. I mean networking. It’s called networking.” Page A3.47
They can exchange large volumes of data using Electronic Data Interchange (EDI) or XML.
They can share product catalogs to whole sellers and retailers.
They can share news with partner companies.
They can both jointly develop and use training programs with other companies.
They can collaborate with other companies on joint development efforts.
They can access services provided by other companies such as an online banking application
managed by one company on behalf of affiliated banks.
“People don’t buy products—they buy people. It’s called slavery. I mean networking. It’s called networking.” Page A3.48
“People don’t buy products—they buy people. It’s called slavery. I mean networking. It’s called networking.” Page A3.49
16. Optimization of resource selection as businesses form cooperative teams to increase the chances of
economic successes, and to provide the customer products and capabilities more exactly meeting his or her
requirements.
17. Ability to undertake major global programs in which the cost and personnel needed to manage a non-
automated system would be unreasonable or prohibitive.
18. Reduced use of ecologically damaging materials through electronic coordination of activities and the
movement of information rather than physical objects).
The risks associated with e-Commerce are multi-faceted. Given below is a sample listing of risks of e-Commerce:
1) Problem of anonymity:
There is need to identify and authenticate users in the virtual global market where anyone can sell to or buy
from anyone, anything from anywhere.
2) Repudiation of contract:
There is possibility that the electronic transaction in the form of contract, sale order or purchase by the trading
partner or customer may be denied.
3) Lack of authenticity of transactions:
The electronic documents that are produced in the course of an E-commerce transaction may not be
authentic and reliable.
4) Data Loss or theft or duplication:
The data transmitted over the Internet may be lost, duplicated, tampered with or replayed.
5) Attack from hackers:
Web servers used for e-Commerce may be vulnerable to hackers.
6) Non-recognition of electronic transactions:
E-commerce transactions, as electronic records and digital signatures may not be recognized as evidence
in courts of law.
7) Lack of audit trails:
Audit trails in e-Commerce system may be lacking and the logs may be incomplete, too voluminous or
easily tampered with
8) Denial of Service:
Service to customers may be denied due to non-availability of system as it may be affected by viruses, e-
mail bombs and floods.
9) Problem of piracy:
Intellectual property may not be adequately protected when such property is transacted through e-commerce.
“People don’t buy products—they buy people. It’s called slavery. I mean networking. It’s called networking.” Page A3.50
“People don’t buy products—they buy people. It’s called slavery. I mean networking. It’s called networking.” Page A3.51
Mobile Commerce
Mobile Commerce or m-Commerce is about the explosion of applications and services accessible from
Internet-enabled mobile devices. It involves new technologies, services and business models.
It is quite different from traditional e-Commerce.
M-commerce (mobile commerce) is the buying and selling of goods and services through wireless
handheld devices such as cellular telephone and personal digital assistants (PDAs).
M-commerce enables users to access the Internet without require plug in.
“People don’t buy products—they buy people. It’s called slavery. I mean networking. It’s called networking.” Page A3.52
3) Preauthorized Transfers:
This is a method of automatically depositing to or withdrawing funds from an individual‟s account,
when the account holder authorizes the bank or a third party (such as an employer) to do so.
For example: Installment of loans in a digital manner.
4) Telephone Transfers:
Consumers can transfer funds from one account to another or can order payment of specific bills by
phone.
“People don’t buy products—they buy people. It’s called slavery. I mean networking. It’s called networking.” Page A3.53
When you look at the stars and the galaxy, you feel that you are not just from any particular piece of land, but from the solar
system. [By. Kalpana Chawla] Page A4.1
CCI Online Learning 1800-3000-0505 www.CAclubindia.com/coaching
CA Guru Gupta –ITSM (Paper -7) CHAPTER-4 BUSINESS INFORMATION SYSTEM
System:
System is an orderly arrangement of a set of interrelated and interdependent elements that operate
collectively to accomplish some common purpose or goal.
All elements of system is available within the boundary of system and environment is available outside the
boundary of system.
All elements are inter-linked amongst each other through interfaces.
Potential interfaces must be available for the sub systems in the form of 1/2n(n-1) where n is the number of
sub systems.
System is bifurcated into small - small components unless each and every component is of manageable size.
If one sub system fails, entire system will be disrupted.
Information System:
- It refers to the system used to store, sort, categorize and manipulate the information.
- It is used to convert input into output.
- It is used to mange the information to provide desired information to management.
- It can be used to take decision to solve unstructured and semi structured problems.
- It can be used to provide business information, government information to recipient.
- It can be used in the field of business, scientific, governance, social and entertainment.
- It has components namely hardware, software, data, procedure, people and network.
When you look at the stars and the galaxy, you feel that you are not just from any particular piece of land, but from the solar
system. [By. Kalpana Chawla] Page A4.2
CCI Online Learning 1800-3000-0505 www.CAclubindia.com/coaching
CA Guru Gupta –ITSM (Paper -7) CHAPTER-4 BUSINESS INFORMATION SYSTEM
2) Management-Level Systems:
It is used for the monitoring, controlling, decision-making, and administrative activities of middle
management.
It deals with predictions or “what if…” type questions. e.g. ―What would happen to our profits if the completion
of the new production plant was delayed by 6 months?‖
3) Operational-Level Systems:
It is used to support operational managers tracking elementary activities.
It includes tracking customer orders, invoice tracking, etc.
It ensures whether business procedures are followed or not.
4) Knowledge-Level Systems:
These systems support discovery, processing and storage of knowledge and data workers. These further
control the flow of paper work and enable group working.
2) Management Level:
This system is used by middle level managers such as General Manager, Regional manager etc. It is required to provide
communications and provide link between top level and bottom level management.
3) Knowledge Level:
This system is used by various users involved in doing analysis to obtain conclusions on any subject matter. It includes
knowledge and data workers who are selected, recruited and trained in a special manner than the non-knowledge
workers.
When you look at the stars and the galaxy, you feel that you are not just from any particular piece of land, but from the solar
system. [By. Kalpana Chawla] Page A4.3
CCI Online Learning 1800-3000-0505 www.CAclubindia.com/coaching
CA Guru Gupta –ITSM (Paper -7) CHAPTER-4 BUSINESS INFORMATION SYSTEM
4) Operational Level:
This system is used by operational managers or supervisors responsible for performing daily operations such as
sales, purchase, expenses, income, and other daily operations etc.
2) Transaction processing:
Transaction processing systems process data in two basic ways:
a) Batch Processing, where transaction data are accumulated over a period of time and processed periodically, and
b) real-time processing (also called online processing), where data are processed immediately after a transaction
occurs.
All online TPS depend on the capabilities of fault tolerant computer systems that can continue to operate even
if parts of the system fail and incorporate real-time processing capabilities.
d) Database maintenance:
An organization‘s databases must be updated by its transaction processing systems so that they are always
correct and up-to-date.
When you look at the stars and the galaxy, you feel that you are not just from any particular piece of land, but from the solar
system. [By. Kalpana Chawla] Page A4.4
CCI Online Learning 1800-3000-0505 www.CAclubindia.com/coaching
CA Guru Gupta –ITSM (Paper -7) CHAPTER-4 BUSINESS INFORMATION SYSTEM
For example: database maintenance ensures that these and other changes are reflected in the data records stored in
the company‘s databases.
3) Access Control:
It provides access control mechanism to prevent unauthorized users to access or modify the transaction.
It ensures that people who are not authorized to use the system are not permissible to influence or
transform the transaction process.
4) Trustworthiness:
A TPS system is designed to be robust and trustworthy.
The system is capable to process transactions very rapidly yet at the same time conduct several checks to
make certain that the data integrity is preserved.
1) Atomicity:
It means that a transaction is either completed in full or not at all. It ensures that transactions take place in
their entirety.
For example: If funds are transferred from one account to another, this only counts as a bone fide transaction if
When you look at the stars and the galaxy, you feel that you are not just from any particular piece of land, but from the solar
system. [By. Kalpana Chawla] Page A4.5
CCI Online Learning 1800-3000-0505 www.CAclubindia.com/coaching
CA Guru Gupta –ITSM (Paper -7) CHAPTER-4 BUSINESS INFORMATION SYSTEM
both the withdrawal and deposit take place. If one account is debited and the other is not credited, it does not
qualify as a transaction.
2) Consistency:
TPS systems exist within a set of operating rules (or integrity constraints). If an integrity constraint states that
all transactions in a database must have a positive value, any transaction with a negative value would be refused.
3) Isolation:
Transactions must appear to take place in seclusion i.e, giving dual account effect at same time.
For example: When a fund transfer is made between two accounts the debiting of one and the crediting of
another must appear to take place simultaneously. The funds cannot be credited to an account before they
are debited from another.
4) Durability:
Once transactions are completed they cannot be undone.
To ensure that this is the case even if the TPS suffers failure, a log will be created to document all completed
transactions.
When you look at the stars and the galaxy, you feel that you are not just from any particular piece of land, but from the solar
system. [By. Kalpana Chawla] Page A4.6
CCI Online Learning 1800-3000-0505 www.CAclubindia.com/coaching
CA Guru Gupta –ITSM (Paper -7) CHAPTER-4 BUSINESS INFORMATION SYSTEM
1) The user:
The user is usually a manager with an unstructured or semi-structured problem to solve. Manager and staff
specialist (analyst) are users of such system
Managers are the users having basic computer knowledge and want DSS to be very user friendly and
system Analysts are the people having expert knowledge about computer system engaged in system
development to fulfill all user‘s need.
2) Database:
DSS include one or more databases i.e, external and internal databases containing both routine and
non-routine data from both internal and external sources.
The data from external sources may come from EIS, includes data about economic conditions,
market demand etc. Data also may come from internal source through TPS and MIS, includes data
about financial and managerial accounting system, marketing, production and personnel department.
3) Planning languages:
It is communication path available in the system so that user can interact with the system in the form of problems
and obtain solutions. It can be 2 types either-
General-purpose planning languages (GPPL):
- It allows users to perform many routine tasks viz. retrieving various data from a database or
performing statistical analyses, budgeting forecasting and worksheet oriented problem.
- For example, GUI, Voice Recognition and working spread sheets are the good examples.
Special-purpose planning languages (SPPL):
- This language is very specific and used to solve statistical problems better than GPPL. Some statistical
languages, such as CPM, PERT, SAS SPSS and Minitab are examples of special purpose
planning languages.
When you look at the stars and the galaxy, you feel that you are not just from any particular piece of land, but from the solar
system. [By. Kalpana Chawla] Page A4.7
CCI Online Learning 1800-3000-0505 www.CAclubindia.com/coaching
CA Guru Gupta –ITSM (Paper -7) CHAPTER-4 BUSINESS INFORMATION SYSTEM
2) Software:
It includes Text base software, Database, and Graphic types such as time series charts, scatter diagrams,
maps, motion graphics, sequence charts, and comparison-oriented graphs (i.e., bar charts) Model base.
3) User Interface:
It includes hardware (physical) and software (logical) components by which people (users) interact with a
machine. Several types of interfaces can be available to the EIS structure, such as scheduled reports,
questions/answers, menu driven, command language, natural language and input/output.
4) Telecommunication:
It involves transmitting data from one place to another in a reliable networked system.
When you look at the stars and the galaxy, you feel that you are not just from any particular piece of land, but from the solar
system. [By. Kalpana Chawla] Page A4.9
CCI Online Learning 1800-3000-0505 www.CAclubindia.com/coaching
CA Guru Gupta –ITSM (Paper -7) CHAPTER-4 BUSINESS INFORMATION SYSTEM
FAX Computer and fax machine is used to transmit the image of documents over telephone line.
Imaging Scanner device uses Optical Character Recognition (OCR) font to read physical data
mentioned on paper and convert it into digital format for storage in a soft file.
Desktop Publishing Computer is used to prepare quality output as it was produced by a typewriter.
Information is timely, transitory, and perhaps even Whereas knowledge is of enduring significance.
short-lived.
Information is a flow of messages Whereas knowledge is a stock, largely resulting from the flow,
Information is acquired by being told. Whereas knowledge can be acquired by thinking
Information comes from fact. Whereas knowledge is derived from information.
For example: Rs. 3450/- is data, my bank account has Example: If my balance falls below Rs. 2500/- I shall have to pay
a balance of Rs.3450/- is information minimum balance charge, is knowledge.
When you look at the stars and the galaxy, you feel that you are not just from any particular piece of land, but from the solar
system. [By. Kalpana Chawla] Page A4.10
CCI Online Learning 1800-3000-0505 www.CAclubindia.com/coaching
CA Guru Gupta –ITSM (Paper -7) CHAPTER-4 BUSINESS INFORMATION SYSTEM
2) Tacit knowledge:
It refers to a knowledge expressed in terms of emotions and feelings. It does not uses any spoken words nor
available in written material. It cannot be easily formalized or interpreted and is very difficult to understand.
It resides in a person’s perception and can’t be captured by organizations or made available to others.
It is unarticulated and represented as intuition, perspective, beliefs, and values that individuals form based
on their experiences.
It is personal, experimental and context- specific. It is difficult to document and communicate.
For example: Emotions, feelings and perceptions of human being.
Q-3 Factors showing “why knowledge has gained so much momentum in recent
times”:
3) Globalization:
Earlier, business has domestic competitor’s only hence if they had knowledge about domestic environment such as
domestic products, domestic market, domestic customers, they can deal with customers better and it is sufficient.
But now domestic market is expanded up to global level, hence expansion in knowledge about international level
product, market and customers and competitors are also required.
When you look at the stars and the galaxy, you feel that you are not just from any particular piece of land, but from the solar
system. [By. Kalpana Chawla] Page A4.11
CCI Online Learning 1800-3000-0505 www.CAclubindia.com/coaching
CA Guru Gupta –ITSM (Paper -7) CHAPTER-4 BUSINESS INFORMATION SYSTEM
Artificial Intelligence
Introduction:
Artificial intelligence (AI) is a research field that studies how to comprehend the intelligent human behaviors on a
computer. It is focusing on creating machines that adopts human behavior.
AI requires proper coding by using various programming language i.e, Prolog, smart talk etc. to execute the
human behavior into computer system. Wrong coding gives wrong behavior to the computer system.
Example: The Deep Blue system which defeated the world chess champion is a well-know example of Artificial
Intelligence.
AI will be applied on expert systems, pattern recognition, natural language processing etc.
It uses special hardware called sensors that is used in various expert systems for heat and humidity probes in
dryers, for automatic parking feature in cars and for more applications.
2) Information Retrieval:
It uses AI-based Intranet and Internet systems that automatically retrieves the relevant data from internet and
used to provide readymade information in graphical form to solve strategic problems.
Natural language technology is used to retrieve online information from text to pictures, videos, maps, and audio
clips in response to English questions.
3) Virtual Reality:
It is used in X-ray machine i.e, vision enabled device providing reality visualization that allows brain
surgeons to see and monitors many small cell tissues transmitted over blood cells and evaluate disease
progression.
Automated animation interfaces that allow users to interact with virtual objects via touch.
4) Robotics:
It is used in machine-vision inspections systems for guiding, identifying, and inspecting products and
providing competitive advantage in manufacturing.
When you look at the stars and the galaxy, you feel that you are not just from any particular piece of land, but from the solar
system. [By. Kalpana Chawla] Page A4.12
CCI Online Learning 1800-3000-0505 www.CAclubindia.com/coaching
CA Guru Gupta –ITSM (Paper -7) CHAPTER-4 BUSINESS INFORMATION SYSTEM
Expert System
Introduction:
It uses Artificial Intelligence to solve problems within a specialized domain.
It is a Knowledge Based Information System (KBIS) that uses its knowledge
about a specific, complex application to act as an expert consultant.
Expert Systems are an extension of DSS/EIS.
Expert system is a computerized system that exhibits expert.
It preserves the accumulated knowledge of one or more domain experts.
They mimic the process of human expert for those who has less expertise.
They are rule-based and pre-programmed on certain assumptions and criteria.
They use strategic logic to solve problems.
Nevertheless, expert System remain supplements rather than replacements
for human experts.
Example: Chess Game, Robot (Chitti), Software reconciling TDS Certificate, System developed in Krish Movie; Neural network
etc.
2) Inference Engine:
This program contains the logic and reasoning mechanisms that simulate the expert logic process and
deliver advice.
It uses data obtained from both the knowledge base and the user to make associations and inferences, form
its conclusions, and recommend a course of action.
3) Knowledge Base:
It is a place where all the knowledge of domain area provided by various experts are stored. It includes the data,
knowledge, relationships, rules of thumb (heuristics), and decision trees used by experts to solve a particular
problem.
It has both factual and heuristic knowledge.
4) Database of Facts:
When you look at the stars and the galaxy, you feel that you are not just from any particular piece of land, but from the solar
system. [By. Kalpana Chawla] Page A4.13
CCI Online Learning 1800-3000-0505 www.CAclubindia.com/coaching
CA Guru Gupta –ITSM (Paper -7) CHAPTER-4 BUSINESS INFORMATION SYSTEM
This holds the user's input about the current problem.
The user may begin by entering facts about the problem or ask whether certain conditions exist. As a result,
gradually a database of facts is built up which the inference engine will use to come to a decision.
The quality and quantity of data gained from the user will influence the reliability of the decision.
5) Explanation facility:
This facility provides the user with an explanation of the logic the ES used to arrive at its conclusion.
b) Rule-based systems:
It is created by storing data and decision rules as if-then rules.
The system asks questions from user and applied if-then rules to answers to draw conclusions and make
recommendations.
It is appropriate when a history of cases is unavailable or when a body of knowledge can be structured within a
set of general rules.
When you look at the stars and the galaxy, you feel that you are not just from any particular piece of land, but from the solar
system. [By. Kalpana Chawla] Page A4.14
CCI Online Learning 1800-3000-0505 www.CAclubindia.com/coaching
CA Guru Gupta –ITSM (Paper -7) CHAPTER-4 BUSINESS INFORMATION SYSTEM
3) Dashboards:
It uses the results provided by business analysis tools and available to
users and giving response to query - “Tell me a lot of things, but without too
much effort”.
This tool provides various architecture for reports in graphical format and
key performance indicator (KPI) that can be used to monitor the progress of
such business activities.
Example: Market trend, inflation rate, growth rate, share market conditions etc.
4) Scorecards:
It uses the results provided by dashboards and provide response to all
user’s query in graphical manner - Tell me how we have performed.
It uses key metrics to compare actual performance with standard performance and
mapping them up to achieve strategic goals throughout the enterprise.
Q-3 Benefits of BI tools for micro-business i.e, small & medium enterprises
Tips: chhota business - PAPER Time
1) Paperless lodgment:
It eliminates paper work and associated costs.
2) Secure AUS key authentication:
AUSkey is a common authentication solution for business-to-government online services.
3) Pre-filled forms:
Reports are automatically pre-filled with information existing internal as well as external environment hence
saving valuable time.
4) Ease of sharing:
It provides sharing of information and resources between client, accountant, tax agent or bookkeeper for
checking;
5) E-record keeping:
It stores the reports securely in the accounting or bookkeeping system;
6) Same time validation:
It receives a fast response that any lodgment has been received.
When you look at the stars and the galaxy, you feel that you are not just from any particular piece of land, but from the solar
system. [By. Kalpana Chawla] Page A4.16
CCI Online Learning 1800-3000-0505 www.CAclubindia.com/coaching
CA Guru Gupta –ITSM (Paper -7) CHAPTER-4 BUSINESS INFORMATION SYSTEM
Standard Business Report (SBR) uses the same standard (XBRL) that simplifies and adds integrity to the performance of
capital market comparisons by analysts and investors;
4) Secure AUS key authentication: It lodges online securely to a range of government agencies; and
5) Streamline the process of aggregating data:
It provides opportunities exist for streamlining the process of aggregating data across different internal departments, or
business units of a company.
6) Same time validation: It provides rapid response that any lodgment has been received.
When you look at the stars and the galaxy, you feel that you are not just from any particular piece of land, but from the solar
system. [By. Kalpana Chawla] Page A4.17
CCI Online Learning 1800-3000-0505 www.CAclubindia.com/coaching
CA Guru Gupta –ITSM (Paper -7) CHAPTER-4 BUSINESS INFORMATION SYSTEM
4) Stage-4 Just-in-Time:
This module is used to ensure that everything will be available AT THE TIME i.e, neither before nor after when the the
process or thing is actually required.
It is a continuous improvement in which non value-adding activities (or wastes) are identified and removed for
ensuring cost reduction and improving delivery, flexibility, quality, performance and innovativeness. It can apply to all parts
of an organization in order taking, purchasing, operations, distribution, sales, accounting, design, etc.
When you look at the stars and the galaxy, you feel that you are not just from any particular piece of land, but from the solar
system. [By. Kalpana Chawla] Page A4.18
CCI Online Learning 1800-3000-0505 www.CAclubindia.com/coaching
CA Guru Gupta –ITSM (Paper -7) CHAPTER-4 BUSINESS INFORMATION SYSTEM
information about the status of inventory and which inventory is transported to which customer as it is.
It enables the user to set certain inventory control parameters (like a safety stock) and calculate the time-phased
inventory requirements.
It works on the basis of the statement “The Customer Is Always Right - So Always Be Right about Your Customers‖.
CRM provides the function and responsibilities of employees who directly work with customers.
When you look at the stars and the galaxy, you feel that you are not just from any particular piece of land, but from the solar
system. [By. Kalpana Chawla] Page A4.19
CCI Online Learning 1800-3000-0505 www.CAclubindia.com/coaching
CA Guru Gupta –ITSM (Paper -7) CHAPTER-4 BUSINESS INFORMATION SYSTEM
2) Relationship:
The relationship between a company and its customers involves continuous bi-directional communication
and interaction. It can be short-term/long-term, continuous/discrete, attitudinal/behavioural etc.
3) Management:
CRM is not only an activity of marketing department but it also involves continuous corporate change in the
culture and process.
Example: Collection of customer information, customer analysis etc is a continuous management process being handled by
CRM module.
When you look at the stars and the galaxy, you feel that you are not just from any particular piece of land, but from the solar
system. [By. Kalpana Chawla] Page A4.20
CCI Online Learning 1800-3000-0505 www.CAclubindia.com/coaching
CA Guru Gupta –ITSM (Paper -7) CHAPTER-4 BUSINESS INFORMATION SYSTEM
When you look at the stars and the galaxy, you feel that you are not just from any particular piece of land, but from the solar
system. [By. Kalpana Chawla] Page A4.21
CCI Online Learning 1800-3000-0505 www.CAclubindia.com/coaching
CA Guru Gupta –ITSM (Paper -7) CHAPTER-4 BUSINESS INFORMATION SYSTEM
3) Distribution:
The third element of supply chain management system is distribution.
It involves several activities i.e, transportation (logistics), warehousing, and customer relationship management
(CRM). The first and most obvious is logistics—the transportation of goods across the entire supply chain.
4) Integration:
The last element of supply chain management is the need for integration.
It is critical that all participants in the service chain recognize the entirety of the service chain. It will
significantly reduce costs and increase value of overall organization.
Organization
When you look at the stars and the galaxy, you feel that you are not just from any particular piece of land, but from the solar
system. [By. Kalpana Chawla] Page A4.22
CCI Online Learning 1800-3000-0505 www.CAclubindia.com/coaching
CA Guru Gupta –ITSM (Paper -7) CHAPTER-4 BUSINESS INFORMATION SYSTEM
1) Workforce Management:
It is used to provide powerful tools to effectively manage labour rules, ensure compliance, and control labour
costs and expenses.
3) Payroll Management:
It is designed to automate manual payroll functions and facilitate salary, deductions, calculations, and eliminate
errors and free up HR staff for more productive tasks. It provides time keeping modules to calculate automatic
deposit and manual cheque writing capabilities.
It encompasses all employee-related transactions as well as integrates with existing financial management
systems.
4) Training management:
It allows manager to track progress of employees, examine the results of courses taken and reschedule
specific courses when needed.
It includes tracking of trainer or training organization, cost associated with training, training locations,
required supplies and equipment and registered attendees.
As a result, all employees will be linked to a skills profile that enlists the skills brought by each and every
When you look at the stars and the galaxy, you feel that you are not just from any particular piece of land, but from the solar
system. [By. Kalpana Chawla] Page A4.23
CCI Online Learning 1800-3000-0505 www.CAclubindia.com/coaching
CA Guru Gupta –ITSM (Paper -7) CHAPTER-4 BUSINESS INFORMATION SYSTEM
employees acquired through training. The skills profile is updated automatically through the training
module.
5) Compensation Management:
It provides full leverage to human capital to sustain a competitive position in a competitive labor market,
which requires integrating employee processes, information and programs with organizational
processes and strategies to achieve optimal organizational results.
6) Recruitment management:
This module helps in hiring the right people with the right target skills.
It includes processes for managing open positions/requisitions, applicant screening, assessments, selection and
hiring, correspondence, reporting and cost analysis.
7) Personnel management:
It comprises of HR master data, personnel administration, recruitment and salary administration.
8) Organizational management:
It includes organizational structure, staffing schedules & job description.
10) Analytics:
The analytics module enables organizations to extend the value of an HRMS implementation by extracting HR
related data for use with other business intelligence platforms.
For example: It is used to analyze Hr profile to identify that which employee is more useful for which job.
Hiring Process
When you look at the stars and the galaxy, you feel that you are not just from any particular piece of land, but from the solar
system. [By. Kalpana Chawla] Page A4.24
CCI Online Learning 1800-3000-0505 www.CAclubindia.com/coaching
CA Guru Gupta –ITSM (Paper -7) CHAPTER-4 BUSINESS INFORMATION SYSTEM
2) Authentication:
Identity management and authentication are inseparable. Identity management includes assigning and managing a
subject‘s identity. Authentication refers to a process of verifying a subject’s identity at the point of object
access to check whether Id and password provided by user is the one that is stored in security database of
system.
3) Authorization:
Once a resource or network verifies a subject’s identity, the process of determining what objects that
subject can access begins. Authorization identifies what systems, network resources, etc. a subject can
access. Related processes also enforce least privilege, need-to-know, and separation of duties.
4) Accountability:
It refers to a process of creating and storing log files containing information that who access which
resource at what time and how many times.
These log files are stored for audit, sent to a log management solution. It provides information that how well the
access control process is working.
When you look at the stars and the galaxy, you feel that you are not just from any particular piece of land, but from the solar
system. [By. Kalpana Chawla] Page A4.26
CCI Online Learning 1800-3000-0505 www.CAclubindia.com/coaching
CA Guru Gupta –ITSM (Paper -7) CHAPTER-4 BUSINESS INFORMATION SYSTEM
A. Infosys’s Finacle
It is comprehensive, agile and integrated business solution addressing all the core needs of banks in easy-to-
configure modules.
It provides single source view into customer accounts and banks provides relevant information to customers
at the right time through the right channel.
When you look at the stars and the galaxy, you feel that you are not just from any particular piece of land, but from the solar
system. [By. Kalpana Chawla] Page A4.27
CCI Online Learning 1800-3000-0505 www.CAclubindia.com/coaching
CA Guru Gupta –ITSM (Paper -7) CHAPTER-4 BUSINESS INFORMATION SYSTEM
wealth management solutions.
6) Customer analytics:
It helps in customer analysis by providing various facilities such as supports operations with comprehensive
intelligence, ranging from data acquisition to reporting and analysis, leveraging quantitative modelling techniques
and multi-dimensional reporting.
7) Islamic banking:
It provides various features to support Islamic banking approach on various products and services offered
by bank. It provides unified, comprehensive and real time view of client across the enterprise for both Islamic
& non-Islamic Product.
8) Payments:
It manages end-to-end payments and processes payments regardless of payment instruments. Example:
payment through cheque, amount transfer, payment through Demand draft, online payment either through debit
card or credit card etc.
9) Origination:
It provides facility for initiation and completion of home loan, personal loan as well as commercial loan
process by providing online loan application form, provide online KYC norms, store customer information, store
his financial information. This system has loan module that simplifies and strengthens the complete credit
lifecycle process across retail and commercial loans.
Basically origination process begins when a borrower submits their financial information to a bank for loan
processing and end up when underwrite will take decision either approving, suspending or declining the loan.
10) Dashboards:
It provides facility of dashboard. Dashboard is a visual display of most important information needed to achieve
various objectives simultaneously in a consolidated manner on a single screen so that various information can be
monitored at a glance.
B. Nucleus FinnOne:
Introduction:
It is made and marketed by India-based Company Nucleus software
It is a multi-lingual web-based application comes with a wide variety of integrated applications covering
different aspects of global web banking.
It includes a loan origination system that automates and manages the processing of many types of loans,
a credit card application system with fraud detection tools.
It provides complete focused on banking and financial services in the areas of Retail & Corporate Banking,
Cash Management, Relationship Banking, Financial CRM, Credit Risk & Appraisal, EAI, Internet Banking, FX,
Basel II, Data warehousing and Analytics.
C. Oracle's FLEXCUBE:
Oracle FLEXCUBE helps banks transform their business model from decentralized operations towards centralization
of key functions, such as accounting, customer information, and management information.
It is supported by role based dashboards that guide business users to take action on critical tasks, track their
pending activities, and get insights into customer information and interaction.
When you look at the stars and the galaxy, you feel that you are not just from any particular piece of land, but from the solar
system. [By. Kalpana Chawla] Page A4.28
CCI Online Learning 1800-3000-0505 www.CAclubindia.com/coaching
CA Guru Gupta –ITSM (Paper -7) CHAPTER-4 BUSINESS INFORMATION SYSTEM
The application also provides comprehensive product processing capabilities to cater to various lines of business.
Banks using Oracle FLEXCUBE can take advantage of the high fidelity reports provided by the system for better
management and operational controls.
It provides the ability to create or modify products rapidly, helping banks respond quickly to market needs.
Payment Mechanisms
Introduction:
It refers to the payment of amount by using debit card, credit card, and charge cards. It can also be understand in another terms
called E-Payment.
E-Commerce will have a direct bearing on the validity of the information to individuals, corporations or the country‘s
economic interests and reputation. The validity of the transaction price, period, and the number of hours as part of the
agreement is remain intact.
With the increase in online shopping and e-commerce industry, it has now become a requirement that the web stores are
integrated with a payment gateway.
Payment gateway is fundamentally a service used to process credit card transactions when orders are accepted online from
clients. Hence, it represents a physical POS (Point-of-sale) terminal, which is set in every retail outlet these days. Payment
gateways use a special code for acquiring sensitive information like credit card numbers, so that information passes securely.
Many hotels and other places and items could swipe of the card, POS terminals Regulations, ATM cash forms of payment.
In general, the integration of the payments process appears to be important ingredient for both businesses and regulators. Since
we are here to discuss the chapter which revolves around BIS; thus the payment mechanism will be considered in terms of online.
Here on-line ecommerce transaction involves more than just a financial transaction; it is also called ‗Whole Transaction
Processes‘.
Payment Gateways
When you look at the stars and the galaxy, you feel that you are not just from any particular piece of land, but from the solar
system. [By. Kalpana Chawla] Page A4.29
CCI Online Learning 1800-3000-0505 www.CAclubindia.com/coaching
CA Guru Gupta –ITSM (Paper -7) CHAPTER-4 BUSINESS INFORMATION SYSTEM
1) Credit Card:
In a credit card transaction, the consumer presents his ability to pay by presenting his credit card number to
the merchant.
The merchant can verify it with the bank, and create a purchase slip for the consumer to endorse.
The merchant then uses purchase slip to a collect funds form the bank; and
On the next billing cycle, the consumer receives a statement from the bank with a record of the transaction.
When you look at the stars and the galaxy, you feel that you are not just from any particular piece of land, but from the solar
system. [By. Kalpana Chawla] Page A4.30
CCI Online Learning 1800-3000-0505 www.CAclubindia.com/coaching
CA Guru Gupta –ITSM (Paper -7) CHAPTER-4 BUSINESS INFORMATION SYSTEM
When you look at the stars and the galaxy, you feel that you are not just from any particular piece of land, but from the solar
system. [By. Kalpana Chawla] Page A4.31
CCI Online Learning 1800-3000-0505 www.CAclubindia.com/coaching
CA Guru Gupta –ITSM (Paper -7) CHAPTER-4 BUSINESS INFORMATION SYSTEM
Crux:
To address these growing security concerns and pave the way for uninhibited growth of electronic commerce on the net, the two
leading credit card brands, Visa and MasterCard, teamed up some years ago to develop a common standard to process card
transactions on the Internet, called the Secure Electronic Transaction (SET) standard.
2) Electronic Cheques:
Credit card payments will undoubtedly be popular for commerce on the Internet.
However, following 2-systems have been developed to let consumers use electronic cheques to pay Web
merchants directly.
When you look at the stars and the galaxy, you feel that you are not just from any particular piece of land, but from the solar
system. [By. Kalpana Chawla] Page A4.32
CCI Online Learning 1800-3000-0505 www.CAclubindia.com/coaching
CA Guru Gupta –ITSM (Paper -7) CHAPTER-4 BUSINESS INFORMATION SYSTEM
2) Contactless Cards:
Contactless smart cards don’t need to be inserted into a reader .
Just waving them near a reader is just sufficient for the card to exchange data. This type of cards is used for
opening doors.
3) Combi Cards:
Combi cards contain both technologies and allow a wider range of applications.
When you look at the stars and the galaxy, you feel that you are not just from any particular piece of land, but from the solar
system. [By. Kalpana Chawla] Page A4.33
CCI Online Learning 1800-3000-0505 www.CAclubindia.com/coaching
CA Guru Gupta –ITSM (Paper -7) CHAPTER-4 BUSINESS INFORMATION SYSTEM
4) Electronic Purses:
Electronic purse is yet another way to make payments over the net. It is very similar to a pre-paid card.
It is a smart way to pay for the little things in life.
For Example: Bank issues a stored value cards to its customers, the customer can then transfer value from
their accounts to the cards at an ATM, a personal computer, or a specially equipped telephone. The electronic purse
card can be used as a ATM card as well as a credit card.
While making purchases, customers pass their cards through a vendor's point of sale terminal . No credit
check or signature is needed. Validation is done through a Personal Identification Number (PIN Number).
Once the transaction is completed, funds are deducted directly from the cards and transferred to the
vendor's terminal.
When you look at the stars and the galaxy, you feel that you are not just from any particular piece of land, but from the solar
system. [By. Kalpana Chawla] Page A4.34
CCI Online Learning 1800-3000-0505 www.CAclubindia.com/coaching
By CA Guru Gupta (ITSM) CHAPTER-5 BUSINESS PROCESS AUTOMATION THROUGH APPLICATION SOFTWARE
Intro Types
Business
Application Category – nature of application
Controls
Objectives 2) Steps
objective
Controls Business Process 2) Activities
in BPA Automation [2 & 5] 2) IT processes
Types of
control
Classification Key Benefits / reason
of information
Information 2) Benefits
Processing Application used to
Application Managerial achieve BPA
control Control Delivery Channels How to choose
1) Information delivery channel
Boundary Managerial 2) Product delivery channel
function based
comtrol
Emerging
Input
Technology Environment
Process Architecture
Network Cloud
Output Virtualization Computing Models
Grid
Computing
Database Characteristics
Applications
Need Disadvantages Advantages
“If anything is certain, it is that change is certain. The world we are planning for today will not exist in this form tomorrow.” Page A5.1
Business Application
Introduction:
Business Application as a computer program used to fulfill a person’s need for regular occupation or commercial activity.
Hence, business applications are software or set of software used by business people to fulfill business needs.
It is used to keep track of inventory levels, checking for bank account balances, checking status of delivery of goods
dispatched, and all other business activities.
1) Batch Processing:
It is defined as a processing of large set of data in a specific way, automatically, without needing any user intervention.
The data is first collected, during a work day, for example, and then batch-processed, so all the collected data is
processed in one go at the end of the work day.
It is possible to perform repetitive tasks on a large number of pieces of data rapidly without needing the user to monitor it.
Batched jobs can take a long time to process.
In batch processing, there is a time delay in occurrence and recording of transaction.
For example: Batch processing is used in producing bills, stock control, producing monthly credit card statements, etc.
2) Online Processing:
In online processing, data is processed immediately while it is entered (i.e, the transactions are recorded at the moment they
occur), the user usually only has to wait a short time for a response..
For example: games, word processing, booking systems). Interactive or online processing requires a user tosupply an input.
Interactive or online processing enables the user to input data and get the results of the processing of that data immediately.
“If anything is certain, it is that change is certain. The world we are planning for today will not exist in this form tomorrow.” Page A5.2
3) Real-time Processing:
Real time processing is a subset of interactive or online processing. An application that allows query handling/ responses to
updates in system is classified as real time processing system.
Input is continuously, automatically acquired from sensors, for example, which is processed immediately in order to
respond to the input in as little time as possible. After the system is finished responding, it reads the next set of input data
immediately to process that.
This system doesn't need a user to control it, it works automatically.
Whenever there is a rapid reaction required due to some sort of change, real time processing can take action without
the need of a user or long processing time beforehand.
Real time processing is used in warning systems on aircraft, alarm systems in hazardous zones, burglar alarms etc.
Particulars
No Yes Yes
No No Yes
1) Custom-built Application:
It refers to the customization of applications either for execution of one function or integrate processes across the
company to perform multiple functions automatically like an ERP.
These applications can however be configured to meet a particular company’s requirements.
Customization involves additional coding while configuration is based on settings which are inputted by the user.
For Example: Billing, Inventory, Attendance etc.
2) Packaged Software:
These are the standard applications which are not free but are licensed.
Customization may or may not be allowed to suit business requirements.
For Example: Tally, Oracle 9i, etc.
3) Leased application:
“If anything is certain, it is that change is certain. The world we are planning for today will not exist in this form tomorrow.” Page A5.3
A new method for getting applications is being used today, i.e. leased applications, where user pays fixed rent for using the
application for agreed terms.
Many specialized vendors provide users with this option to get their job done by paying monthly rent. This is referred to
as outsourcing.
2) Large Business:
It refers to the business software designed for the larger or more ambitious businesses, being used by large business
establishments.
The business tools that tend to be favored by larger businesses include CRM, for recording customer information and
finding out trends in buying habits; and sales force automation, which helpful for organizing and managing sales teams and
leads.
Business may also choose to use human resources software; business intelligence and dashboard tools; database
management systems; and enterprise resource planning and supply chain management tools. However, these may not be
for everyone and can add cost and complexity to small businesses’ IT systems.
3) Compliance Applications:
It covers software that helps in complying with applicable laws and regulations and meeting the compliance
requirements
“If anything is certain, it is that change is certain. The world we are planning for today will not exist in this form tomorrow.” Page A5.4
It adopts e-compliance for its citizens with government promoting e-filing of documents, e-payments taxes, e-storage of
data, etc.
Example: Avalara trust file GST for GST compliance; Optial start smart for internal control related compliance; R Mail for
mail security compliance; HR Laws.com for HR compliance etc.
Business Process:
A business process is a set of activities that are designed to accomplish specific organizational goals.
“If anything is certain, it is that change is certain. The world we are planning for today will not exist in this form tomorrow.” Page A5.5
To better understand a business process, the activities may be arranged in the form of a flowchart or process matrix.
It is a strategy to automate business processes so as to bring benefit to enterprise in terms of cost, time and effort.
It requires integration amongst various business process to achieve the predetermined objectives of business.
It provides enterprise-wide automation and management for both business and IT workflow.
BPA improves accuracy, performance and efficiency of the key business processes and as a result enterprise will
become more efficient and responsive to customer and employee needs.
It avoids repetition in task and manual data manipulation by providing automation.
BPA is fluctuating from the range of automating a simple data-entry up to complex and automated financial
management processes.
It provides rapid growth in communication technology making it faster and reliable.
Benefits from BPA: cost reduction, elimination of human error, freeing people from routine and volume, and allow
management to do what they are best at: make decisions, analyze data implications and trends and focus on providing better
customer service.
It makes the business flexible, more faster, more efficient and robust.
2) Integration:
BPA allows applications and operating systems not only to read data, but also to pass data between the component
“If anything is certain, it is that change is certain. The world we are planning for today will not exist in this form tomorrow.” Page A5.6
3) Automation:
Orchestration and integration unite with automation to deliver the capability to provide a rules-based process of
automatic execution that can span multiple systems and enable a more effective, nimble and efficient business process.
Step-1: Why we plan to implement BPA? The answer to this question will provide justification for implementing
BPA.
Step-2: Understand the rules/regulations The underlying issue is that any BPA created needs to comply with
under which it needs to comply with? applicable laws and regulations.
Step-3: Document the process, we wish to The current process which are planned to be automated need to be
automate. correctly and completely documented at this step.
Step-4: Define the objectives/goals to be This enables the developer and user to understand the reasons for
achieved by implementing BPA? going for BPA. The goals need to be precise and clear.
Step-5: Engage the business process Once the entity has been able to define the above, the entity needs to
consultant? appoint an expert, who can implement it for the entity.
Step-6: Calculate the ROI for project. The answer to this question can be used for convincing top
management to say „yes‟ to the BPA exercise.
Step-7: Development of BPA Once the top management grant their approval, the right business
solution has to be procured and implemented covering the necessary
BPA.
Step-8: Testing the BPA Before making the process live, the BPA solutions should be fully
tested.
Step 1: Define why we plan to implement a BPA?
The primary purpose for which an enterprise implements automation may vary from enterprise to enterprise.
A list of generic reasons for going for BPA may include any or combination of the following:
1) Lack of management understanding of business processes.
2) Errors in manual processes leading to higher costs.
3) Unable to recruit and train new employees, but where employees are urgently required.
4) Lengthy or incomplete new employee or new account on-boarding.
“If anything is certain, it is that change is certain. The world we are planning for today will not exist in this form tomorrow.” Page A5.7
“If anything is certain, it is that change is certain. The world we are planning for today will not exist in this form tomorrow.” Page A5.8
The developed BPA needs to meet the objectives for which the same is being developed.
Step 8: Testing the BPA
Once developed, it is important to test the new process to determine how well it works and identify where additional
“exception processing” steps need to be included.
The process of testing is an iterative process, the objective being to remove all problems during this phase.
Testing allows room for improvements prior to the official launch of the new process, increases user adoption and
decreases resistance to change.
Documenting the final version of the process will help to capture all of this hard work, thinking and experience which can
be used to train new people.
3) Application integration:
It automates IT and business processes by combining applications that drive business. Complex processes such as
database queries, data transformation and spreadsheet integration can be automated.
6) File transfers:
It can be automated to deliver and retrieve data on set schedules.
7) Printing:
It provides automation to simplify print jobs.
“If anything is certain, it is that change is certain. The world we are planning for today will not exist in this form tomorrow.” Page A5.10
6) Cost Saving:
Automation leads to saving in time and labor costs through higher efficiency and better management of the people involved;
7) To remain competitive:
To provide the level of products and services as offered by competition.
1) Tally:
It is an accounting application that helps entity to automate processes relating to accounting of transactions.
It also helps to achieve automation of few processes in inventory management.
The latest version has been upgraded to help user achieve TAX compliances also.
“If anything is certain, it is that change is certain. The world we are planning for today will not exist in this form tomorrow.” Page A5.11
It has features such as Remote Access Capabilities, Tax Audit and Statutory Compliance, Payroll, Excise for
Manufacturers, Multilingual Support, VAT Composition Returns, TDS, VAT (Value Added Tax), Rapid Implementation, Real
Time Processing, Dynamic Interactive Reports and Unique Drill-Down Facility, Unlimited Companies and Periods of
Accounting.
2) SAP R/3:
It is an ERP software that allows an entity to integrate its business processes.
It aims at better utilization of the resources and helps entity achieve better business performance.
It has the features such as time management, reporting and analytics, budget monitoring, workflow approval, sales
management, team management, leave management, travel management, recruitment management and demand planning.
This is used by most of the large enterprises across the world and covers enterprise automation end-to-end.
3) MS Office Applications:
These are various office automation systems made available by Microsoft Corporation which include MS Word, MS Excel,
MS PowerPoint, MS Access, etc.
Each of these software help to achieve automation of various tasks in the office.
It has features such as customized ribbon, backstage view, built-in graphics toolset, enhanced security, excel spark lines,
pivot for Excel, PowerPoint broadcast, Power Point compression, paste, preview and outlook conversation view.
4) Attendance Systems:
Many attendance automation systems are available in the market. The application helps entity to automate the process of
attendance tracking and report generation.
It has features such as supervisor login access, holiday pay settings, labour distribution, employee scheduling and
rounding, employee view time card, overtime settings, battery-backed employee database and optional door/gate access
control.
“If anything is certain, it is that change is certain. The world we are planning for today will not exist in this form tomorrow.” Page A5.12
Two critical elements for managing departmental stores have been automated in India; they include the billing
processes and inventory management. It has features such as point of sale, multi-channel operation, supplier database,
products database, purchase ordering, management reporting, multiple promotions, loyalty schemes, stock control and
inventory management.
2) Completeness:
It ensures that no valid transactions have been omitted from the accounting records.
3) Accuracy:
It ensures that all valid transactions are accurate, consistent with the originating transaction data, and information is
recorded in a timely manner.
4) Validity:
It ensures that all recorded transactions fairly represent the economic events that actually occurred, are lawful in nature,
and have been executed in accordance with management's general authorization.
“If anything is certain, it is that change is certain. The world we are planning for today will not exist in this form tomorrow.” Page A5.13
6) Error Handling:
It ensures that errors detected at any stage of processing receive prompts corrective action and are reported to the
appropriate level of management.
7) Segregation of Duties:
It ensures that duties are assigned to individuals in a manner that ensures that no one individual can control both the
recording function and the procedures relative to processing a transaction.
1) Preventive Control: Those, which prevent occurrence of an error/fraud, say security guards
2) Detective Control: Those, which capture an error, say audit trail.
3) Corrective Control: Those, which correct an error or reduce the loss due to error/risk, say insurance policy.
Information Processing
It refers to an effort to create information from raw data is known as Information Processing.
Processed data will be meeting the needs of the users.
Computer can be used as an aid to process this data so as to provide information, which has meaning and gives value to the
users to take effective decision.
Information is necessary for decision making and survival of an entity as success of business depends upon making right
decisions at the right time on the basis of the right information available.
“If anything is certain, it is that change is certain. The world we are planning for today will not exist in this form tomorrow.” Page A5.14
Delivery Channels
Delivery channels refer to the mode through which information or products are delivered to users.
“If anything is certain, it is that change is certain. The world we are planning for today will not exist in this form tomorrow.” Page A5.15
A) Managerial controls:
In this part, we shall examine controls over the managerial functions that must be performed to ensure the development,
implementation, operation and maintenance of information systems in a planned and controlled manner in an organization. The
“If anything is certain, it is that change is certain. The world we are planning for today will not exist in this form tomorrow.” Page A5.16
controls at this level provide a stable infrastructure in which information systems can be built, operated, and maintained on a day-
to-day basis
1) Top Management:
Top management must ensure that information systems function is well managed. It is responsible primarily for long – run
policy decisions on how Information Systems will be used in the organization.
4) Programming Management:
It is responsible for programming new system; maintain old systems and providing general systems support software.
5) Data Administration:
Data administration is responsible for addressing planning and control issues in relation to use of an organization‟s data.
6) Operations Management:
It is responsible for planning and control of the day-to-day operations of information systems.
8) Security Administration:
It is responsible for access controls and physical security over the information systems function.
B) Application controls:
In the second part, we shall examine the application functions that need to be in place to accomplish reliable information processing.
1) Boundary: It comprises the components that establish the interface between the user and the system.
2) Input: It comprises the components that capture, prepare, and enter commands and data into the system.
3) Processing: It comprises the components that perform decision making, computation, classification, ordering, and
summarization of data in the system.
4) Output: It comprises the components that retrieve and present data to users of the system.
5) Database: It comprises the components that define, add, access, modify, and delete data in the system.
6) Communication: It comprises the components that transmit data among subsystems and systems.
The senior managers who take responsibility for IS function in an organization, face many challenges.
Major Functions of Top manager:
a) Planning: It refers to determining the goals of the information systems function and the means of achieving these goals;
b) Organizing: It refers to gathering, allocating, and coordinating the resources needed to accomplish the goals;
c) Leading: It refers to motivating, guiding, and communicating with personnel; and
d) Controlling: It refers to comparing actual performance with planned performance as a basis for taking any corrective
actions that are needed.
Types of IS Plans for IS functions:
a) Strategic plan:
The strategic Plan is the long-run plan covering, say, the next three to five years of operations. Plans need to be
reviewed regularly and updated as the need arises. The planning depends upon factors such as the importance
of existing systems, the importance of proposed information systems, and the extent to which IT has been integrated
into daily operations.
b) Operational plan:
The Operational Plan is the short-plan covering, say, next one to three years of operations. Plans need to be
reviewed regularly and updated as the need arises.
“If anything is certain, it is that change is certain. The world we are planning for today will not exist in this form tomorrow.” Page A5.18
It comprises six major phases – Planning; Design; Control; Coding; Testing; and Operation and Maintenance with Control
phase running in parallel for all other phases.
“If anything is certain, it is that change is certain. The world we are planning for today will not exist in this form tomorrow.” Page A5.19
Hence, he must check whether information system is developed as per quality assurance standards or not to make
the software error free.
“If anything is certain, it is that change is certain. The world we are planning for today will not exist in this form tomorrow.” Page A5.20
It deals with programs for transforming data into codes that are meaningless to anyone who does not possess the
authentication to access the respective system resource or file.
A cryptographic technique encrypts data (clear text) into cryptograms (cipher text) and its strength depends on the time and
cost to decipher the cipher text by a cryptanalyst.
The three techniques of cryptography are
o transposition (permute the order of characters within a set of data),
o substitution (replace text with a key-text) and
o product cipher (combination of transposition and substitution)
Cryptosystems
Cryptography
b) Passwords:
User identification by an authentication mechanism with personal characteristics like name, birth date, employee
code, function, designation or a combination of two or more of these can be used as a password boundary access
control.
A few best practices followed to avoid failures in this control system are;
- periodic change of passwords, - limited entry attempts
- minimum length of password, - avoid usage of common dictionary words, and
- encryption of passwords
d) Identification Cards:
Identification cards are used to store information required in an authentication process.
These cards are used to control over the user identification process through the application for a card, preparation of the
card, issue, use and card return or card termination phases.
“If anything is certain, it is that change is certain. The world we are planning for today will not exist in this form tomorrow.” Page A5.22
What you have (Token), what you know (password/PIN) and who you are (Biometric)
2) Batch Controls:
These controls are put in place at locations where batch processing is being used.
Batch processing is where there is a time gap between occurrence and recording of transactions, that is,
transactions are not recorded at the time of occurrence but are accumulated and a set (based on number/ time) is
processed.
The objective is to ensure accuracy and completeness of the content and that they are not lost during
transportation.
Details required to be maintained on batch control sheet of each batch while
implementing batch control:
Batch number, type, date, voucher type;
Total Monetary Amount: for example, for a cash payment batch, the total payout of cash payment vouchers;
Total Items: for example, the supporting with batch;
“If anything is certain, it is that change is certain. The world we are planning for today will not exist in this form tomorrow.” Page A5.23
Total Documents: for example, total number of voucher with the batch; and
Hash Totals: for example, total of voucher number or account code (if numeric).
3) Validation Controls:
These controls validate the accuracy/correctness of input data.
Input validation controls are intended to detect errors in the transaction data before the data are processed.
Validation procedures are most effective when they are performed as close to the source of the transactions
as possible.
There are 3-levels of input validation controls:
1) Field interrogation
2) Record interrogation, and
3) File interrogation.
1) Field Interrogation:
It involves programmed procedures that examine the characters of the data in the field. The following are some common
types of field interrogation.
Various field checks used to ensure data integrity have been described below:
Tips:
b) Limit Check:
This is a basic test for data processing accuracy and may be applied to both the input and output data. The
field is checked by the program against predefined limits to ensure that no input/output error has occurred or
at least no input error exceeding certain pre-established limits has occurred.
c) Check Digit:
One method for detecting data coding errors is a check digit. A check digit is a control digit (or digits) added
to the code when it is originally assigned that allows the integrity of the code to be established during
subsequent processing. The check digit can be located anywhere in the code, as a prefix, a suffix, or
embedded someplace in the middle.
d) Cross Checks:
It may be employed to verify fields appearing in different files to see that the result tally.
e) Arithmetic Checks:
Simple Arithmetic is performed in different ways to validate the result of other computations of the values of
selected data fields. Example: The discounted amount for Rs. 4,000 at 5% discounted may be computed
twice by the following different ways: 4,000 – 4,000 × 5/100 = 3,800 or Next time again at (3800/(100-
5))*100.
f) Picture Checks:
“If anything is certain, it is that change is certain. The world we are planning for today will not exist in this form tomorrow.” Page A5.24
2) Record Interrogation:
These are discussed as follows:
a) Sequence Checks: These are exercised to detect any missing transactions, off serially numbered
vouchers or erroneous sorting.
b) Format Completeness Checks: These are used to check the presence and position of all
the fields in a transaction. This check is particularly useful for variable data field records.
c) Redundant Data Checks: These are used to check for fields that are repeated in two or more
records.
d) Password: These are used to authorize users to access, read and write information.
(3) Processing Controls:
Data processing controls perform validation checks to identify logical errors during processing of data.
It ensures both completeness and accuracy of data being processed.
It is enforced through the database management system that stores the data.
a) Run-to-run totals:
These help in verifying data that is subject to process through different stages.
If the current balance of an invoice ledger is Rs. 150,000 and the additional invoices for the period is of total Rs. 20,000/-
then the total sales value should be Rs. 170,000. A specific record (probably the last record) can be used to maintain the
control total.
b) Reasonableness verification:
Two or more fields can be compared and cross verified to ensure their correctness.
For example the statutory percentage of provident fund can be calculated on the gross pay amount to verify if the
provident fund contribution deducted is accurate.
c) Edit checks:
Edit checks similar to the data validation controls can also be used at the processing stage to verify accuracy and
completeness of data.
d) Field initialization:
Data overflow can occur, if records are constantly added to a table or if fields are added to a record without initializing it,
i.e., setting all values to zero before inserting the field or record.
e) Exception reports:
“If anything is certain, it is that change is certain. The world we are planning for today will not exist in this form tomorrow.” Page A5.25
f) Existence/Recovery Controls:
The check-point/restart logs, backup and recovery control that enables a system to be recovered if failure is temporary and
localized.
e) Retention controls:
Retention controls consider the duration for which outputs should be retained before being destroyed.
Consideration should be given to the type of medium on which the output is stored.
Retention control requires that date of production should be determined for each output item.
Consideration shall also be given to legislative requirements which would affect the retention period.
“If anything is certain, it is that change is certain. The world we are planning for today will not exist in this form tomorrow.” Page A5.26
f) Existence/Recovery Controls:
These are needed to recover output in the event that it is lost or destroyed.
If the output is written to a spool files and has been kept, then recovering and new generation is easy.
Check/restart point helps in recovery when a hardware cause problems in a printing program.
Here the order in which transactions are processed against the product master record must be done based on a
sorted transaction codes.
“If anything is certain, it is that change is certain. The world we are planning for today will not exist in this form tomorrow.” Page A5.27
Terminology Meaning
1) Business Process It is a process of an organization’s objectives through the improvement, management and
Management control of essential business process.
2) Business Process BPA is a strategy to automate business processes so as to bring benefit to enterprise in
automation terms of cost, time and effort. The core objective of BPA is achieved through integrating
various business processes.
3) Business process re- It is defined by Mr. Hammer Champhy is: “BPR is the fundamental rethinking and radical
engineering redesign of processes to achieve dramatic improvement, in critical, contemporary
measures of performance such as cost, quality, service and speed”.
4) Flowchart It is a diagrammatic representation of the flow of data from origin to destination.
5) Data Flow diagram It is a diagrammatic representation of logical flow of data
6) System Component It is a process to documentation of resources utilized in developing the system along with its
Matrix functionality.
7) Decision Table It refers to the table which provides potential conditions used to solve the problems by making the
various permutations and combinations and listing the number of actions to be undertaken which
requires to be assigned for each such permutations arising out of such specified conditions.
8) System Software and System software is computer software that is designed to control and operate the computer
Operating software hardware and data processing application.
An Operating System (OS) is a set of computer programs that manages computer hardware
resources and acts as an interface with computer applications programs.
9) Database Management It is a collection of software which is designed to control data retrieval, data processing, data
System storage, file organization and file processing needed by application program etc.
10) Database Model A database model is a type of data model that determines the logical structure of a database
and fundamentally determines the manner in which data can be stored, organized and
manipulated.
11) Computer Network Computer Network is a collection of computers and other hardware interconnected by common
communication channels that allow sharing of resources and information. Hence, a network is a
group of devices connected to each other.
12) SDLC This is commonly referred as Software/System Development Life Cycle (SDLC), which is a
methodology used to describe the process of building information systems.
14) Server Server is a computer (Hardware) or device on a network dedicated to run one or more services (as
a host), to serve the needs of the users of other computers on a network.
15) Computer Architecture Computer architecture is a science and art of selecting and interconnecting hardware
components to create computers that meet functional, performance and cost goals.
16) Cloud Computing Cloud computing is the use of various services, such as software development platforms, servers,
storage, and software, over the Internet, often referred to as the "cloud."
17) Mobile computing It is the use of portable computing devices (*such as laptop and handheld computers) in conjunction with
mobile communications technologies to enable users to access the Internet and data on their
home or work computers from anywhere in the world.
18) Network It is a collection of computers and other hardware components interconnected by
communication channels.
19) Components of Network 1) Terminals
2) Telecommunications processors,
3) Telecommunications Media/Channels,
4) Computers and
5) Telecommunications Control Software.
20) Transmission Transmission technology refers to the technology used to transmit the data and
Technology information between two machines.
21) Transmission modes It refers to the direction in which communication is going on between sender and
receiver.
22) Transmission Technique Transmission technique refers to the ways in which packets are filtered and forwarded through
the network. Example telephone lines, IP Addresses, E-mail, SMS etc.
23) Network Architecture It refers to the layout of the network, consisting of the hardware, software, connectivity,
communication protocols and mode of transmission, such as wired or wireless.
24) Network Protocol A protocol is a software which provides a formal set of rules that performs variety of actions to be
undertaken necessary for data transmission and communications over network.
25)
26)
27)
28)
29)
30)
31)
32)
33)
34)
35)
36)
37)
38)
39)
40)
41)
42)
43)
BUSINESS:
"The regular production or purchase and sale of goods undertaken with an objective of earning profit and acquiring
wealth through the satisfaction of human wants.“
Business comprises of activities such as production, distribution, trading etc., involvement of buyer and seller,
exchange of goods and services, considerations, profit objective, presence of risks and uncertainties, satisfy
customer’s need and social obligations.
Business does not function in isolation. It requires continuous interaction with the environment.
Awareness of the environment is not a special project to be undertaken only when warning of change becomes deafening. Page B1.1
CCI Online Learning 1800-3000-0505 www.CAclubindia.com/coaching
BY CA GURU GUPTA ITSM] CHAPTER-1 BUSINESS ENVIRONMENT
capital of organization.
However, profitability is a relative amount and determines the scope of a company’s profit in relation to
the size of business. It is a measurement of business efficiency and its success or failure. It represents
survival of business that totally depends upon the profit.
Example: To determine the worth of an investment in a company, investors cannot rely on a profit calculation
alone. Instead, an analysis of a company’s profitability is necessary to understand if the company is efficiently
utilizing its resources and its initial investment.
2) Growth:
It consists with increase in assets, increase in manufacturing facilities, increase in sales volume in existing
products or through new products, improvement in profits and market share, increase in manpower
employment, acquisition of other enterprises and so on.
3) Stability:
It is a strategy of least resistance even in an unfriendly and aggressive external environment. It ensures that
business’s going concern will remain maintained.
It is least expensive but risky objective in terms of time, talent and other resources. It minimizes tensions of
managers.
Examples: If business is stable, there should be no decrease in sale, no capital loss, no loss of key employees etc.
4) Survival:
Survival is a will to continue existing features of business as long as possible.
Example: If businessman wants to survive in dynamic market, he must do planning, differentiate himself, know the
numbers in his finger, use your time well, get good people, streamline internal process and system with environment,
get online, manage cash, continuous improvement etc.
5) Efficiency:
Business enterprise requires efficiency to achieve their goals, doing things in the best possible manner
and utilizing resources within time constraint to get highest productivity.
Awareness
CCI Online of the environment is not a special project to be
Learning undertaken only when warning of change becomes
1800-3000-0505 deafening. Page 1.2
www.CAclubindia.com/coaching
BY CA GURU GUPTA (ITSM) CHAPTER-1 BUSINESS ENVIRONMENT
ENVIRONMENT:
Introduction:
Environment is sum of several external and internal forces that affect the functioning of business. It is
divided into 2 parts: Internal and external (Micro and macro) environment.
Environment refers to the element which is available outside the boundary of organization.
Internal environment factors that has a direct impact on the business and is within the control of the
entrepreneurs. These are internal management, machinery, methods of production, human resources,
financial resources, vision, mission and objective, relationship etc.
External Environment factors are either micro or macro environment. They are beyond the control of
individual enterprise and are dynamic in nature. These are technological, physical, political and socio
cultural, customer, supplier, etc.
If one want to understand business environment he has to do 2 things namely 1) Understand
internal and external factor of organization; and 2) Conduct environmental scanning to understand the
changes taken place in external environment.
Awareness
CCI Online of the environment is not a special project to be
Learning undertaken only when warning of change becomes
1800-3000-0505 deafening. Page 1.3
www.CAclubindia.com/coaching
BY CA GURU GUPTA ITSM] CHAPTER-1 BUSINESS ENVIRONMENT
skills, and tools to guide your organization from “as-is” to your desired “to-be” .
2) Environment is dynamic:
The environment is constantly changing in nature. Due to varied influences, environment is dynamic which
causes to continuously change its shape and character.
3) Environment is multi-faceted:
Shape and characters of an environment depends upon the perception of the observer. A particular
change or a new development in environment may be viewed differently by different observers.
It is frequently seen that same development is welcomed as an opportunity by 1 company while another
company perceives it as a threat.
Rivals Buyer
Societal
value & New Entrant
Lifestyle
Population and
demographic
Awareness
CCI Online of the environment is not a special project to be
Learning undertaken only when warning of change becomes
1800-3000-0505 deafening. Page 1.4
www.CAclubindia.com/coaching
BY CA GURU GUPTA (ITSM) CHAPTER-1 BUSINESS ENVIRONMENT
Environmental Influences
Q-1 Explain the four Environmental Influences on Business:
1) Opportunity:
It is a favorable condition in the organization's environment which enables it to consolidate and
strengthen its position.
Example: Growing demand, invention in new technology, new job offer etc.
2) Threat:
Threat is an unfavorable condition in the organization's environment which creates a risk for, or
causes damage to, the organization.
Example: Emergence of strong new competitors who offers stiff competition; launching of new similar
products by competitors, etc.
3) Strength:
Strength is an inherent capacity of organization which can be used to gain strategic advantage over its
competitors.
Example: Superior research and development skills, Latest technology, skilled human resources, well
equipped machineries, better internal control, TQM system, availability of sufficient funds etc.
4) Weakness:
A weakness is an inherent limitation or constraint of an organization which creates a
strategic disadvantage.
Example: Over dependence on a single product line, obsolescence of product, obsolete technology,
unskilled labour, insufficient funds, inferior raw material etc.
Awareness
CCI Online of the environment is not a special project to be
Learning undertaken only when warning of change becomes
1800-3000-0505 deafening. Page 1.5
www.CAclubindia.com/coaching
BY CA GURU GUPTA ITSM] CHAPTER-1 BUSINESS ENVIRONMENT
2) Comparative Account:
It presents information about both external and internal environment in a structured form to compare
external opportunities and threats with internal strengths and weaknesses.
It helps in matching external with internal environments so that a strategist can come out with suitable
strategy by developing patterns of relationship such as high opportunities and high strengths, high
opportunities and low strengths, high threats and high strengths, high threats and low strengths.
3) Oversimplification of Complexities:
Managers tend to simplify such complexity by focusing on aspects of the environment, which perhaps
historically important but might not actually.
Strategic managers always find ways to oversimplify the complexities in understanding the environment,
while still achieving a useful and usable level of analysis.
2) The next step might be the auditing of environmental influences to identify different environmental
influences likely to affect the organization's development or performance. It is useful to relate such influences
Awareness
CCI Online of the environment is not a special project to be
Learning undertaken only when warning of change becomes
1800-3000-0505 deafening. Page 1.6
www.CAclubindia.com/coaching
BY CA GURU GUPTA (ITSM) CHAPTER-1 BUSINESS ENVIRONMENT
to growing trends towards globalization as well as to predict scenarios of possible futures to consider the extent of
strategies might need to change.
3) The final step is to focus on explicit consideration of organization’s environment such as competitive area
to analyze organization's competitive position to relate with those other organizations competing for the same
resources.
Introduction:
Micro Environment Macro Environment
It refers to the forces that are very close to the It refers to all forces that are part of the larger
company and affect its ability to do routine periphery and distantly affect organization as well as
functions. micro environment.
Micro-environment is related to small area or Macro environment has broader dimensions.
immediate periphery of an organization. It mainly consists with the element of economic,
It consists of suppliers, consumers, marketing technological, political, legal and socio-cultural in terms
intermediaries and competitors, etc. of individuals, groups, agencies, events, conditions etc.
Micro-environment influences an organization It is largely external to the enterprise and thus
regularly and directly. beyond the direct influence and control of the
organization. It has powerful influence over its
These are specific to the business and affect its
functioning.
working on short term basis.
The elements of macro environment are general
environment and affect the working of all the
firms in an industry.
Awareness
CCI Online of the environment is not a special project to be
Learning undertaken only when warning of change becomes
1800-3000-0505 deafening. Page 1.7
www.CAclubindia.com/coaching
BY CA GURU GUPTA ITSM] CHAPTER-1 BUSINESS ENVIRONMENT
product or service. A father may buy a product as a customer for his daughter who will be a consumer.
The marketer has to closely monitor and analyze changes in consumer tastes and preferences and their
buying habits.
2) Competitors:
Competitors are the other business entities that compete for resources as well as markets. They are
threat to organization. Hence study of competitive environment is mandatorily required.
There are a few major questions that may be addressed for analyzing competitions. Who are the
competitors? What are their present strategy and business objective? Who are the most powerful competitors?
3) Organization:
Organization consists of number of individuals coming from outside occupying different positions and
each one has different and varied interests on organization.
These are the factors that must be considered to study the organization i.e, owners, Board of directors
and Employees etc.
Study of organization helps in understanding of its own strengths and capabilities in a particular business,
i.e., availability of resources, goals, objectives etc. in environment.
4) Market:
Market is a place where commodities are sold and services are rendered to the customers. It may be large
or small in size. The market is larger than the customers.
The market must be carefully analyzed in terms of its size, its growth and its attractiveness. The marketer
should study the trends, development and the key success factors of the market. Important issues are: Cost
structure of the market; the price sensitivity of the market; Technological structure of the market, the existing
distribution system of the market.
5) Suppliers:
Supplier provides raw materials, equipment, services etc. for production of final products.
Suppliers must be carefully analyzed to control the cost structure of finished goods.
Organizations must take major decisions on “outsourcing” or “in-house” production depending on this
supplier environment.
6) Intermediaries:
Intermediaries exert considerable influence on the business organizations.
They provides the services of assisting buyers and sellers in purchasing and selling of products and
rendering as well as receiving of services between service provider and service receiver.
1) Demographic Environment:
The term demographic denotes characteristics of population in area, district, country or in world.
It includes factors such as age, income, educational attainment, asset ownership, home ownership,
employment status and location.
Factors such as general age profile, sex ratio, education, growth rate affect the business with different
magnitude. Many multinationals are interested in India considering its population size.
Awareness
CCI Online of the environment is not a special project to be
Learning undertaken only when warning of change becomes
1800-3000-0505 deafening. Page 1.8
www.CAclubindia.com/coaching
BY CA GURU GUPTA (ITSM) CHAPTER-1 BUSINESS ENVIRONMENT
iii) Ethnic Mix: (ethnic means connected or relating to different racial or cultural groups of
people)
This reflects the changes in the ethnic make-up of a population and has implications both for a
company's potential customers and for the workforce.
Issues that should be addressed include:
Changes in the ethnic mix of the population?
Will new products and services be demanded or can existing ones be modified?
How managers manage more culturally diverse workforce?
2) Economy Environment:
It refers to the nature and direction of the economy in which a company competes. It helps to determine the
strength and size of the market.
It includes general economic situation in the region and the nation, conditions in resource markets (man,
money, market, material and machines etc.) which influence the supply of inputs to the enterprise and their
costs, quality, availability and reliability of supplies.
Strategists must assess a number of key economic factors such as interest rates, tax rates, inflation
rates, money market rates, price fluctuations etc. for both domestic and key international markets.
3) Political-Legal Environment:
This is partly general to all similar enterprises and partly specific to an individual enterprise.
It includes factors such as political issues, government policies, law and order situation, political ideas
and stability, general and specific legal enactments and framework in which the enterprise has to function
and the degree of effectiveness with which they are implemented.
Awareness
CCI Online of the environment is not a special project to be
Learning undertaken only when warning of change becomes
1800-3000-0505 deafening. Page 1.9
www.CAclubindia.com/coaching
BY CA GURU GUPTA ITSM] CHAPTER-1 BUSINESS ENVIRONMENT
ii) Legal:
Business organizations prefer to operate in a country having sound legal system. Businesses
must understand the relevant laws relating to companies, competition, intellectual property, foreign
exchange, labour and so on and do their business according to the laws and regulations.
iii) Political:
Political pressure groups put influence and limitations on organizations to pay more
attention to consumer’s rights, minority rights, and women rights.
4) Technological Environment:
(Q-5 Write a short note on technological environment? Ans: Introduction + Factors + Key questions for assessment
of technology)
Technology is the most dynamic of all the environmental factors in terms of various dynamic products and
dynamic processes (R&D, Quality inspections etc.) in the industry.
Changes in technology vitally affect the organization’s cost, profitability, market price, quality, product lines,
growth and development.
Technology and business are highly inter related and inter dependent with each other.
Technology can act as both opportunity, if adopted, and threat, if not adopted, in a business. For example,
an innovative internet system for telecommunication system if not adopted will become the weakness in e-
commerce business.
It improves the quality of social life and raises the standard of living.
Question-7: Suppose, Dell Computer Corporation wants to reduce its paperwork flow, schedules its
payments more efficiently, and is able to coordinate its inventories efficiently and effectively by using the
capabilities of the Internet. What are the questions can be asked to assess the technological environment?
Awareness
CCI Online of the environment is not a special project to be
Learning undertaken only when warning of change becomes
1800-3000-0505 deafening. Page 1.10
www.CAclubindia.com/coaching
BY CA GURU GUPTA (ITSM) CHAPTER-1 BUSINESS ENVIRONMENT
5) Socio-Cultural Environment:
It helps to provide consistency to perform their operations in a similar manner.
It includes factors such as social traditions, social values and beliefs, level and standards of literacy
and education, the ethical and moral standards etc. required to be analyzed to determine
interrelationship amongst individuals.
6) Global Environment:
Globalization refers to the process of integration of the world into one huge market (i.e, vasudhaiva
kutumbkam).
At the company level, globalization means 2 things:
(a) the company commits itself with several manufacturing locations around the world and offers products
in several diversified industries, and
(b) it also means ability to compete in domestic markets with foreign competitors.
Awareness
CCI Online of the environment is not a special project to be
Learning undertaken only when warning of change becomes
1800-3000-0505 deafening. Page 1.11
www.CAclubindia.com/coaching
BY CA GURU GUPTA ITSM] CHAPTER-1 BUSINESS ENVIRONMENT
There are several reasons why companies go global. These are discussed as follows:
1) It secures reliable and cheaper source of raw-materials for production of products.
2) It requires to spent large sums on R&D for new products in the case of high-tech industries such as
electronics and telecommunications organizations to increase sales volume.
3) It reduces high transportation costs.
4) It is being realized that the domestic markets are no longer adequate and rich.
5) It helps in developing attractive new products which sell them first in their home markets and at later in
foreign market.
6) One reason could be the rapid shrinking of time and distance across the globe i.e, faster communication,
speedier transportation, growing financial flows and rapid technological changes.
Q-11: What are the developments are responsible for TRANSNATIONAL OPERATION of
companies:
Increasing emphasis on market forces in all developing countries.
A growing role for the private sector in all developing countries;
Rapidly changing technologies that are transforming the nature, organization, an location of
international production;
The globalization of firms and industries;
The rise of services to constitute the largest single sector in the world economy; and regional economic
integration, which has involved both the world's largest economies as well as select developing countries.
Awareness
CCI Online of the environment is not a special project to be
Learning undertaken only when warning of change becomes
1800-3000-0505 deafening. Page 1.12
www.CAclubindia.com/coaching
BY CA GURU GUPTA (ITSM) CHAPTER-1 BUSINESS ENVIRONMENT
It leads to more privatization of manufacturing and public sectors, less government interference in business
decisions.
9) Market-side efficiency:
Integration of global markets implies that costs, quality processing time, and terms of business become
dominant competition drivers.
Customers can now make a genuine choice of products and services on the basis of maximum value for
money.
1) Political:
It is required to be analyzed to know how and up to what extent government intervening organization.
It includes goods and services that government wants to provide or be provided or does not want to be
provided. Governments have great influence also on health, education and infrastructure of a nation.
2) Economy:
Awareness
CCI Online of the environment is not a special project to be
Learning undertaken only when warning of change becomes
1800-3000-0505 deafening. Page 1.13
www.CAclubindia.com/coaching
BY CA GURU GUPTA ITSM] CHAPTER-1 BUSINESS ENVIRONMENT
3) Socio cultural:
It is analyzed to know how it affects the demand for a company's products and how that company
operates.
4) Technological:
It is analyzed to know how it affects production level and influence outsourcing decisions. Furthermore,
technological shifts can affect costs, quality, and lead to innovation.
5) Legal:
It is analyzed to know how it affects the company operation, costs and the demand for its products.
6) Environmental Analysis:
It is analyzed to know how it affects operation and the products /services of industries such as tourism, farming,
and insurance industries etc. if there is a change in existing climate.
It helps in creating new markets and diminishing or destroying existing ones.
1) Trends:
Trends are the general tendencies or the courses of action along which events take place.
Trends are grouping of similar or related event that tends to move in a given direction, increasing
or decreasing in strength of frequency of observations and usually suggests a pattern of change
in a particular area.
(For example, consumer behavior, technology uses).
2) Issues:
Issues are the current concerns that arise in response to events and trends which is more difficult.
It starts with a value shift, or a change in how an issue is viewed.
Awareness
CCI Online of the environment is not a special project to be
Learning undertaken only when warning of change becomes
1800-3000-0505 deafening. Page 1.14
www.CAclubindia.com/coaching
BY CA GURU GUPTA (ITSM) CHAPTER-1 BUSINESS ENVIRONMENT
3) Events:
It is a specific occurrences taking place in different environmental sectors.
Events are certain happening in the internal or external organizational environment which can be
observed and tracked.
4) Expectations:
Expectations are the demands made by interested groups in the light of their concern for issues.
2) Exchange of resources:
The organization receives inputs in the form of finance, materials, manpower, equipment etc. from the
external environment through contractual and other arrangements and used these inputs in producing output of
products and services.
Organization need to communicate with several external organizations say supplier group for getting input
and say clientele group such as customers, shareholders, general public etc. for providing output.
Resources are exchanged with environment to fulfill all needs of all environmental factors such as customer,
shareholders, government and general public etc.
Awareness
CCI Online of the environment is not a special project to be
Learning undertaken only when warning of change becomes
1800-3000-0505 deafening. Page 1.15
www.CAclubindia.com/coaching
BY CA GURU GUPTA ITSM] CHAPTER-1 BUSINESS ENVIRONMENT
It offers a range of opportunities, incentives and rewards on the one hand and a set of constraints, threats
and restrictions on the other. In both ways, the organization is conditioned and constrained.
Example: Governmental control over the organization is one such power relationship. Other organizations,
competitors, markets, customers, suppliers, investors etc., also exercise considerable collective power and influence
over the planning and decision making processes of the organization.
1) Least resistance:
At first level, it covers businesses that manage to survive by way of coping with their changing external
environments.
They are simple goal-maintaining units. They are very passive in their behavior. They are solely guided by
the signals of the external environment. They are not ambitious at all and hence they are least resistance.
3) Dynamic response:
At a still higher sophisticated level, businesses are partially manageable and controllable by their
action. They are highly dynamic and powerful. They are not merely recognizing threats but also they
convert threats into opportunities.
They are highly confident of their own strengths and the weaknesses . They generate a contingent
set of alternative courses of action to make the adverse environment positive towards them.
Competitive Environment
Competition plays a vital and lead role for growth and development of business. It provides the information of
on-going situation of markets and hence also provides many opportunities to develop the new products
with high quality and sound technology to satisfy the consumer needs.
Competition has its own benefits and demerits as well. Competition reduces the profit margin per unit but
increases the choice of customers as to selection of products at acceptable price range.
Competition affecting the rate of growth, income distribution and consumer welfare.
Businesses have to consider competitor’s strategies, profits levels, costs, products and services
when preparing and implementing their business plans.
Awareness
CCI Online of the environment is not a special project to be
Learning undertaken only when warning of change becomes
1800-3000-0505 deafening. Page 1.16
www.CAclubindia.com/coaching
BY CA GURU GUPTA (ITSM) CHAPTER-1 BUSINESS ENVIRONMENT
(v) What are their financial positions?
(vi) What are they likely to do next?
(vii) Who are the potential future competitors?
Kieretsus:
The word “Kieretsus” is a japanese term which is being used to refer “LARGE CO-OPERATIVE
NETWORKS OF BUSINESS.
It provides the benefit of co-operation amongst such large co-operative groups of network.
This concept enhances the abilities of individual member and prefers to do business with
other kieretsu members.
It is a loosely-coupled group of companies, usually in related industries.
Kieretsu members are peers and may own significant amounts of each other’s stock and have many
common board members. However, they are different in ownership pattern.
However, they remain independent companies and will not share information at all.
Awareness
CCI Online of the environment is not a special project to be
Learning undertaken only when warning of change becomes
1800-3000-0505 deafening. Page 1.17
www.CAclubindia.com/coaching
BY CA GURU GUPTA ITSM] CHAPTER-1 BUSINESS ENVIRONMENT
Industry Competitor’s
Supplier’s bargaining
Buyer’s bargaining powers
powers
Awareness
CCI Online of the environment is not a special project to be
Learning undertaken only when warning of change becomes
1800-3000-0505 deafening. Page 1.18
www.CAclubindia.com/coaching
By CA Guru Gupta (ITSM) chapter-2 Business Policy & Strategic Management
Without a strategy the organization is like a ship without a rudder. Page B2.1
CCI Online Learning 1800-3000-0505 www.CAclubindia.com/coaching
By CA Guru Gupta (ITSM) chapter-2 Business Policy & Strategic Management
It requires changing direction as and when required not in order to survive but in order to maintain their success.
Strategic vision should create enthusiasm and engages members of the organization towards the organization’s vision.
It should clearly provide the direction to achieve their goals.
Mission: an Introduction
It is a visualization of organization's future.
A company’s Mission is an OPEN statement which provides focus on its present business scope – “who we are
and what we do”.
A mission is not a confidential affair exclusive for the top management; rather it has to be open to the entire
company. It represents the common purpose which is required to be shared and pursued.
Without a strategy the organization is like a ship without a rudder. Page B2.2
CCI Online Learning 1800-3000-0505 www.CAclubindia.com/coaching
By CA Guru Gupta (ITSM) chapter-2 Business Policy & Strategic Management
According to Glueck & Jauch, mission is an answer to the question ‘what business are we in’.
It describes an organization’s present capabilities, customer focus, activities, and business makeup.
It defines the role and responsibilities of an organization required to be played in the society.
It provides direction, supervision and control to each and every member of organization.
To facilitate the translation of objective and goals into a work structure involving the assignment of tasks to
responsible personnel within the organization.
To specify and translation of organizational purposes into goals in such a way that cost, time, and
performance parameters can be assessed and controlled.
It should be precise, clear, feasible, distinctive and motivating. It should indicate major components of strategy.
It defines the company’s business and what needs are trying to satisfy, which customer groups it is targeting and
which technologies and competencies it uses and the what activities it performs.
Good mission statements are highly personalized and unique to the organization for which they are developed.
It gives to organization its own special identity, business emphasis and path for development.
Technology, competencies and activities are important in defining a company’s business because they
indicate the boundaries on its operation.
Objective: an Introduction
Objectives are organizations performance targets – the results and outcomes it wants to achieve. They
function as yard stick for tracking an organizations performance and progress.
Objectives are open-ended attributes that denote the future states or outcomes. Goals are close-ended
attributes which are precise and expressed in specific terms.
Thus the goals are more specific and translate the objectives to short term perspective.
Attempting to achieve objective is an unending process. For example: organizations sustainability.
It provides meaning and sense of direction to organizational endeavour.
It acts as benchmarks for guiding organizational activity and for evaluating how the organization is performing.
Without a strategy the organization is like a ship without a rudder. Page B2.3
CCI Online Learning 1800-3000-0505 www.CAclubindia.com/coaching
By CA Guru Gupta (ITSM) chapter-2 Business Policy & Strategic Management
Strategy
Definition as per William F. Glueck: - “A unified, comprehensive and integrated plan designed
to assure that the basic objectives of the enterprise are achieved.”
It consists of the combination of competitive moves and business approaches to convince customers,
compete successfully and achieve organizational objectives .
It is formulated at top level management, implemented at middle level management and operated at lower level
management.
It has distinct characteristics such as they are prolonged, integrated, multi functional, action oriented etc.
It is flexible and dynamic .
Effective strategy reduces the complexities and uncertainties of environment.
Strategy should be partly pro-active and partly re-active.
Strategy can never be perfect, flawless and optimal.
Strategy is reactive:
Strategy is sometimes reactive because when market and competitive conditions take an unexpected turn, some
kind of strategic reaction or adjustment is required. Hence, a portion of a company's strategy is always
developed as a reasoned response to unforeseen developments.
Reactive actions on the part of managers to unanticipated developments and fresh market conditions.
Without a strategy the organization is like a ship without a rudder. Page B2.4
CCI Online Learning 1800-3000-0505 www.CAclubindia.com/coaching
By CA Guru Gupta (ITSM) chapter-2 Business Policy & Strategic Management
Crux: Crafting a strategy thus involves grouping of proactive as well as reactive strategy and then adapting first one piece
and then another as circumstances changes.
Corporate Strategy
Introduction:
Corporate strategy is basically the growth design of the firm; it spells out the growth objective - the direction,
extent, pace and timing of the firm's growth.
It also spells out the strategy for achieving the growth. Thus, we can also describe corporate strategy as the
objective-strategy design of the firm.
In corporate strategy, the set of goals has a system of priorities; the combination, the sequence and the timing
of the moves, means and approaches are determined in advance; the implications of decisions and it should be
flexible and contingent.
Without a strategy the organization is like a ship without a rudder. Page B2.5
CCI Online Learning 1800-3000-0505 www.CAclubindia.com/coaching
By CA Guru Gupta (ITSM) chapter-2 Business Policy & Strategic Management
It ensures that the right fit is achieved between the firm and its environment.
It helps build the relevant competitive advantages for the firm.
2) Setting objectives:
It is required to indicate the yardsticks for measuring the company’s performance and progress to ensure
whether achieving objectives .
3) Crafting a strategy:
It is required to achieve the desired outcomes and move the company along the strategic course that
management has charted.
Without a strategy the organization is like a ship without a rudder. Page B2.6
CCI Online Learning 1800-3000-0505 www.CAclubindia.com/coaching
By CA Guru Gupta (ITSM) chapter-2 Business Policy & Strategic Management
Q-7) What are the 3 assessments are relevant while crafting strategy / making strategic decision:
In making strategic decisions, inputs from a variety of assessments are relevant. However, the core of any strategic
decision should be based on three types of assessments.
1) The first concerns organizational strengths and weaknesses.
2) The second evaluates competitor strengths, weaknesses, and strategies, because an organization's
strength is of less value if it is neutralized by a competitor's strength or strategy.
3) The third assesses the competitive context, the customers and their needs, the market, and the market
environment.
Without a strategy the organization is like a ship without a rudder. Page B2.7
CCI Online Learning 1800-3000-0505 www.CAclubindia.com/coaching
By CA Guru Gupta (ITSM) chapter-2 Business Policy & Strategic Management
Q-8) What are the Principal aspects in managing the strategy-execution process:
Strategic management
Introduction:
Strategic management is defined as the art and science of formulating, implementing and evaluating cross
functional decisions that enable the organization to achieve its objectives.
Strategic management is not only related to a single specialization but covers cross functional or overall
organization.
Strategic Management refers to the managerial process of
- forming a strategic vision,
- setting objectives,
- crafting a strategy,
- executing and implementing the strategy; and
- monitoring of such vision, objectives and strategy and applies corrective adjustments wherever it
requires.
Strategic planning is an important component of strategic management which involves developing a strategy
to meet competition and ensures long-term survival and growth.
It assists manager in creating and delivering a superior value to targeted customers and ensures dynamic business
environment to adopt changing needs.
Without a strategy the organization is like a ship without a rudder. Page B2.8
CCI Online Learning 1800-3000-0505 www.CAclubindia.com/coaching
By CA Guru Gupta (ITSM) chapter-2 Business Policy & Strategic Management
Without a strategy the organization is like a ship without a rudder. Page B2.9
CCI Online Learning 1800-3000-0505 www.CAclubindia.com/coaching
By CA Guru Gupta (ITSM) chapter-2 Business Policy & Strategic Management
1) Top-management decisions:
Strategic issues involve strategic thinking in totality but there is also a lot of risk involved. Hence, it
requires strategic decisions require to be considered by top management who is more qualified & experienced.
4) Future oriented:
Strategic thinking involves predicting the future environmental conditions and how to orient for the changed
conditions.
Without a strategy the organization is like a ship without a rudder. Page B2.10
CCI Online Learning 1800-3000-0505 www.CAclubindia.com/coaching
By CA Guru Gupta (ITSM) chapter-2 Business Policy & Strategic Management
Without a strategy the organization is like a ship without a rudder. Page B2.11
CCI Online Learning 1800-3000-0505 www.CAclubindia.com/coaching
CA Guru Gupta (ITSM) CHAPTER-3 STRATEGIC ANALYSIS
Introduction
The strategic management process, after deciding the vision, mission, goals
and objectives of the organization, turns its focus to scanning of environment Scanning of environment
in which all organizations work as sub-systems.
That is environmental scanning covers both scanning of external External Internal
environment and internal environment. environment environment
The scanning of external environment leads to the identification of the
opportunities and threats. Identification of Study of
opportunities and strengths and
The scanning of internal situation leads to the study of strengths and threats weakness
weaknesses which will decide as to what extent each company is going to
capitalize the opportunities and neutralize the threats.
STRATEGIC ANALYSIS
It is a scanning of external environment with internal situation which helps in providing judgment about
what strategy to pursue.
The 2 most important situational considerations are:
industry and competitive conditions and (other’s quality)
a company's own competitive capabilities, resources, internal strengths and weaknesses, and his market
position. (own quality)
It also helps in providing accurate diagnosis of the company's situation for deciding long-term
direction, setting appropriate objectives, and crafting an appropriate strategy.
It helps in evaluation of alternatives to provide choices about strategy.
Strategic Analysis
Opportunities, threats, trends, strategic and uncertainties Strategic strengths, weaknesses, problems, constraints and uncertainties
2) Balance:
Strategy will be so formulated so that it matches the internal potential of the organization with the
environmental opportunities; balance opportunities, influences and constraints.
3) Risk:
An important aspect of strategic analysis is to identify potential imbalances or risks and assess their
consequences. The complexity and intermixing of variables in the environment reduces the
strategic balance in the organization.
Competitive markets, liberalization, globalization, booms, recessions, technological advancements,
inter-country relationships all affect businesses and pose risk at varying degree.
A broad classification of the strategic risk is external risk and internal risk.
SITUATIONAL ANALYSIS
It refers to the analysis of overall elements of macro environment that covers such as economy at
large, population demographics, societal values and lifestyles, governmental legislation and regulation,
technological factors, assess their impact and influence, and adapt the company’s direction and strategy
as needed.
These factors are enough to have a bearing on the decisions the company makes about its direction,
objectives, strategy, and business model.
Influences coming from the macro environment have a direct / indirect impact on a company's
business situation and shape the company's direction and strategy.
Figure: From Thinking Strategically about the Company's Situation to Choosing a Strategy
2) Competitive situation:
This analysis provides the details about the nature, type and strength of main competitors.
It includes who are they; what are they up to; how do they compare; What are their competitive advantages?
3) Distribution situation:
This analysis provides the way to review the distribution situation.
It includes how are you getting your product to market; Do you need to go through distributors or other
intermediaries?
4) Environmental factors:
This analysis provides the details about external and internal environment’s factors which are required to be
considered.
It includes economic or sociological factors that impact on your performance.
3) Triggers of change:
It involves sufficient understanding of changing in environment that provides information of factors
relating to competition pressures. However, it is very difficult to identify and account all
environmental changes.
Examples: Internet and the new e-commerce, Increasing globalization, Changes in the long-term
industry growth rate, Product and market innovation, Technical know-how, and Changes in cost and
efficiency etc.
It describes the stages of changes namely rapid growth, early maturity, saturation, and decline.
Identify the competitive characteristics that differentiate firms in the industry typical variables are
- price/quality range (high, medium, low);
- geographic coverage (local, regional, national, global);
- degree of vertical integration (none, partial, full);
- product-line breadth (wide, narrow);
- use of distribution channels (one, some, all); and
- degree of service offered (no-frills, limited, full).
Plot the firms on a two-variable map using pairs of these differentiating characteristics
Assign firms that fall in the same strategy space to the same SGM.
Draw circles around each strategic group making the circles proportional to the size of the group's
respective share of total industry sales revenues
5) Likely strategic moves of rivals:
It requires continuous pays attention to what competitors are doing.
A company can't expect to gain advantage against its rivals without
understanding their strategies, monitoring their actions,
his strengths and weaknesses and anticipating what moves they are likely to
make next.
TOWS Matrix
Heinz Weihrich has developed a matrix called TOWS matrix by comparing strengths and weaknesses
of organization with that of market opportunities and threats.
It has been criticized that after conducting the SWOT Analysis, managers frequently fail to come to
terms with the strategic choices that the outcomes demand.
In order to overcome this, TOWS Matrix are developed which re-organizes them and integrates
them more fully into the strategic planning process while using same SWOT.
It is a good way to use brain storming.
It is used to create alternative strategies that might not otherwise be considered.
It forces strategic managers to design various growth, stability or retrenchment strategies.
It can be said that TOWS matrix is an improvement over the SWOT matrix because it is used to
provide various strategic alternatives but SWOT defines strength, weakness, opportunity and threat only.
The matrix is outlined below:
Internal Organizational Strengths Organizational Weaknesses
ST: strengths in the organization can be WT: the strategies pursued must
Environmental Threats
used to minimize the existing threats. minimize the weaknesses and as far as
possible, cope with existing threats
Portfolio Analysis
INTRODUCTION
A business portfolio is a collection of businesses and products that make up the company.
In order to design the business portfolio, the business must analyze its current business portfolio
and decide which business should receive more, less, or no investment.
Depending upon analyses, businesses may develop growth strategies for adding new products or
businesses to the portfolio.
It helps to provide best fit between company’s strengths and weaknesses with opportunities in the
environment.
It helps strategists in taking strategic decisions with regard to individual products or businesses in a
firm’s portfolio.
It is used for competitive analysis and corporate strategic planning in multi-product and multi
business firms.
Its main advantage is to channelize the resources at corporate level to those businesses that
possess the greatest potential.
It is used to Analyzing portfolio may begin with identifying key businesses also termed as strategic
business unit (SBU).
It is a unit of company that has a separate mission and objectives and that can be planned
independently from other company businesses.
It can be a company division, a product line within a division, or even a single product or brand.
Organization may be composed with multiple SBUs, each of which is responsible for its own profitability.
SBU is a profit center which focuses on products and markets. Every SBU has discrete marketing plan,
analysis of competition, and marketing campaign.
Characteristics of an SBU:
It has single business or collection of related businesses that can be planned for separately.
It has its own set of competitors.
It has a manager who is responsible for strategic planning and profit.
2) Experience Curve:
It is a concept used for applying a portfolio approach. It is akin
to a learning curve. It explains the efficiency increase gained by
workers through repetitive productive work.
In the matrix, the vertical axis represents market growth rate and provides a measure of market attractiveness and the
horizontal axis represents relative market share and serves as a measure of company strength in the
market.
2) Cash Cows:
It represents SBU or products having large market share in a mature, slow growing industry.
SBU in this stage are established, successful and need little investment. It generates cash that can
be utilized for investment in other products. They are the base of an organization and they are the
corporation’s key source of cash.
SBU in this stage has highest net cash flow.
SBU in this stage usually follow stability strategies and when cash cows loose their appeal and
move towards deterioration, then retrenchment policy will be pursued.
In long run when the growth rate slows down, stars become cash cows.
3) Question Marks:
It represents SBU or products having low relative market share and located in a high growth
industry.
SBU in this stage require huge amount of cash to maintain or gain market share.
SBU in this stage has lower net cash flow.
SBU in this stage are generally offered new goods and services which have a good commercial
prospective. There is no specific strategic that can be adopted. If the firm thinks it has dominant
market share, then it can adopt expansion strategy, else retrenchment strategy.
Most business started as question marks as the company tries to enter a high growth market in
which there is already a market share. If ignored, then question marks may become dogs, while if
huge investment is made, then they have potential becoming stars and then to cash cows when
the growth rate reduces.
4) Dogs:
It represents SBU or products having weak market shares in low growth market because of high
costs, poor quality, ineffective marketing, etc.
SBU in this stage neither generate huge cash nor require huge amount of cash for investment.
Moreover, sometimes they need cash to survive.
SBU in this stage generally adopt retrenchment strategies because these firms can gain market
share only at the expense of their rival/competitor’s firms.
Unless a dog has some other strategic aim, it should be liquidated if there are fewer prospects
for it to gain market share. Number of dog should be avoided and minimized in an organization
by means of divestment or liquidation.
3. Harvest: Here the objective is to increase short-term cash flow regardless of long-term effect.
4. Divest: Here the objective is to sell or liquidate the business because resources can be better
used elsewhere.
The growth-share matrix has done much to help strategic planning study. However, there are problems
and limitations with the method.
BCG matrix can be difficult, time-consuming, and costly to implement.
Management may find it difficult to define SBUs and measure market share and growth.
It provides little advice for future planning.
It provides too much emphasis on market-share growth or growth through entry into attractive
new markets which can cause unwise expansion into hot, new, risky ventures or giving up on
established units too quickly.
$
Low
R&D High Low
Relative Market Share
BCG matrix classifies businesses as low and high, but generally businesses can be medium also.
Market is not clearly defined in this model.
High market share does not always leads to high profits. There are high costs also involved with
high market share.
Growth rate and relative market share are not the only indicators of profitability. This model
ignores and overlooks other indicators of profitability.
At times, dogs may help other businesses in gaining competitive advantage. They can earn even
more than cash cows sometimes.
2) Market Development:
It refers to a growth strategy where the business seeks to sell its existing products into new
markets.
It consists of marketing of present products to customers in related market areas by adding different
channels of distribution or by changing the content of advertising or the promotional media.
This strategy may be achieved through new geographical markets, new product dimensions or
packaging, new distribution channels or different pricing policies etc.
3) Product Development:
It refers to a growth strategy where business aims to introduce new products into existing
markets.
It is a strategy for company growth by offering modified or new products to current markets.
It involves substantial modification of existing products or creation of new but related items that
can be marketed to current customers through establish channels.
4) Diversification:
It refers to a growth strategy where a business aims to introduce new products in new markets.
Markets
Increase the quantity used Develop new product for
Find new application for current the same market Market Product
users Development
Penetration
III. Market development IV. Diversification involving new Existing
Expand geographically products and new markets
Target new segments Related Existing Products and New
Unrelated services
ADL Matrix:
Introduction:
This matrix has been derived from the name Arthur D. Little. ADL Matrix
The ADL matrix is a portfolio analysis method that is based on product life
cycle. Stage of Industry Firms competitive
maturity position
The approach forms a 2-dimensional matrix based on stage of industry
maturity and the firms competitive position.
It represents position
It represents business
Each of these dimensions can be further split up into the following in industry’s life cycle strength which helps in
categories to better analyze a firm and accordingly determine the future categorizing SBU
strategic actions.
1. Embryonic 1. Dominant
Stage of industry maturity is an environmental measure that represents 2. Growth 2. Strong
3. Maturity
a position in industry's life cycle which is categorized into Embryonic, Growth, 4. Ageing
3. Favorable
4. Tenable
Maturity and Ageing. 5.Weak
2) Strong:
By virtue of this position, the firm has a considerable degree of freedom over its choice of
strategies.
It is often able to act without its market position being unduly threatened by its competitions.
In this case, the company might not be a monopoly but definitely has a strong presence and loyal
customers.
3) Favorable:
Companies with favorable competitive position usually operate in fragmented markets and no one
competitors stand out clearly, results in the market leaders a reasonable degree of freedom.
4) Tenable:
Here each company caters to a niche segment defined by a product variety or segmented
demographically i.e, either geographical.
5) Weak:
In this scenario, company financials are too weak to gain a strong hold in the market and is
expected to die out within a short span of time although the opportunities for improvement do
exist.
Strategic Planning
Introduction:
Strategic planning is process of developing an organizational strategy to achieve overall business
objective of organization.
It is a function of top level management in the organization and relates the organization with
environment.
It gives direction to the organization and involves making decisions and allocating resources to pursue
the strategy.
It deals with one or more of 3-key questions: What are we doing? For whom do we do it? How to improve and
excel?
It determines where an organization is going over the next year or more.
The flow of planning can be from corporate to divisional level or vice-versa. Hence, there are 2-
approaches for strategic planning - top down or bottom up.
Top down approach:
It is a centralized approach to strategy formulation in which the head office determines mission,
strategic intent, objectives and strategies for the organization as a whole and for all parts.
Unit managers are seen as implementers of pre-specified corporate strategies.
Bottom up approach:
It is a decentralized approach to strategy formulation in which division and subsidiary companies
determines the mission, objectives, or strategies by operational level of management.
Top management prefers to act as a facilitator in implementing the corporate level strategy
It is better
CCI Online to have an
Learning exact answer to the wrong question rather than having an approximate answer to the www.CAclubindia.com/coaching
1800-3000-0505 right question. Page B4.1
CA Guru Gupta (ITSM) CHAPTER-4 STRATEGIC PLANNING
2) Setting objectives:
It is required to indicate the yardsticks for measuring the company’s performance and progress to
ensure whether achieving objectives .
3) Crafting a strategy:
It is required to achieve the desired outcomes and move the company along the strategic course that
management has charted.
Q-3) What are the 3 assessments are relevant while crafting strategy / making strategic decision:
In making strategic decisions, inputs from a variety of assessments are relevant. However, the core of any strategic
decision should be based on three types of assessments.
1) The first concerns organizational strengths and weaknesses.
2) The second evaluates competitor strengths, weaknesses, and strategies, because an organization's
strength is of less value if it is neutralized by a competitor's strength or strategy.
3) The third assesses the competitive context, the customers and their needs, the market, and the market
environment.
Strategic Alternatives
Grand Strategies / Directional Strategies
Various strategy alternatives are available to firm for achieving its growth objective.
Selection of alternative strategy shall be done on the basis of nature of alternatives, how they have been
classified into a few broad categories as well as proper analysis of scope of such alternatives strategy.
The corporate strategies a firm can adopt have been classified into four broad categories: stability,
expansion, retrenchment and combination known as grand strategies.
Grand strategies, which are often called master or business strategies, are intended to provide basic
direction for strategic actions.
It requires co-ordination and sustained efforts directed towards achieving long-term business objectives.
It is better
CCI Online to have an
Learning exact answer to the wrong question rather than having an approximate answer to the www.CAclubindia.com/coaching
1800-3000-0505 right question. Page B4.3
CA Guru Gupta (ITSM) CHAPTER-4 STRATEGIC PLANNING
1) Stability Strategies:
Basic features The firm stays with its current businesses and product markets; maintains the existing level of
effort; and is satisfied with incremental growth.
Characteristics ▪ Its aim is to enhance functional efficiencies in an incremental way through optimum
utilization of resources.
▪ It helps in attaining growth objective of firms employing this strategy.
▪ It does not involve a re-definition of the business of the corporation.
▪ It is basically a safety-oriented, status quo-oriented strategy.
▪ It does not warrant much of fresh investments.
▪ The risk is also less.
▪ The firm has benefit of concentrating its resources and attention on the existing
businesses / products and markets.
▪ This strategy does not permit the renewal process of bringing in fresh investments and
new products and markets for the firm.
Reason It is less risky, involves less changes and people feel comfortable with things as they are.
The environment faced is relatively stable.
Expansion may be perceived as a threat.
2) Expansion Strategy:
Basic features This strategy seeks significant growth within the current businesses as well as by entering new
business being related or unrelated to existing businesses.
Characteristics It is an opposite of stability strategy.
It provides highest risks and highest rewards as compared to stability strategy.
It is a true growth strategy. A firm with a substantial growth ambition can meet its
objective only through the expansion strategy.
It involves a re-definition of business of the corporation.
It allows renewal in existing process of firm through fresh investments and new
businesses/products/markets is facilitated only by expansion strategy.
It is a highly versatile strategy. Thus offers several permutations and combinations for
growth and can generate many alternatives within the strategy by altering its
propositions regarding products, markets and functions and pick the one that suits it most.
It has 2 major strategy routes: Intensification and Diversification. Both of them are growth
strategies.
a) Intensification strategy: It assists firm in achieving growth by working with its
current businesses. Intensification encompasses 3-alternative routes:
It is better
CCI Online to have an
Learning exact answer to the wrong question rather than having an approximate answer to the www.CAclubindia.com/coaching
1800-3000-0505 right question. Page B4.4
CA Guru Gupta (ITSM) CHAPTER-4 STRATEGIC PLANNING
Pune
CA Guru Gupta
(providing coaching to
CA students)
diversification Indore
Utilizing existing
CPT Diversification
resources
IPCC Final
Introduces new
product
MBA
It is better
CCI Online to have an
Learning exact answer to the wrong question rather than having an approximate answer to the www.CAclubindia.com/coaching
1800-3000-0505 right question. Page B4.5
CA Guru Gupta (ITSM) CHAPTER-4 STRATEGIC PLANNING
- They are combined to increase their strength and financial gains along with breaking the trade barriers.
Acquisition is a process when one organization takes over the other organization and controls all its business
operations.
- Here, one organization overpowers the weaker one.
- Acquisitions often happen during recession in economy or during decline profit margins.
- In this process, deal gets finalized on unfriendly terms because powerful entity either force to consumes the
operation or company in loss is force to sale.
This strategy avoids the risk and saves time and skills required for internal growth opportunities.
It builds up the necessary resource base required to materialize growth.
Types of Mergers:
Diversification strategy
i) Vertically integrated diversification:
In this strategy, firms opt to engage in businesses that are related to the existing business of the firm but the
firm remains vertically within the same process.
It has 2-components – forward integration and backward integration sequentially in the chain.
The firm cannot jump outside the vertically linked product-process chain.
a) Forward Integration:
It is moving forward in the value chain and entering business lines that use existing products.
It is better
CCI Online to have an
Learning exact answer to the wrong question rather than having an approximate answer to the www.CAclubindia.com/coaching
1800-3000-0505 right question. Page B4.6
CA Guru Gupta (ITSM) CHAPTER-4 STRATEGIC PLANNING
Forward integration will also take place where organizations enter into businesses of distribution channels.
b) Backward Integration
It is a step towards creation of effective supply by entering business of input providers.
Strategy employed to expand profits and gain greater control over production of a product.
Here a company will purchase or build a business that will increase its own supply capability or lesser
its cost of production.
BACKWARD INTEGRATION
Transport
HORIZONTAL INTEGRATION
By-Products
Competitive
products Manufacturer
Repairs and
Complementary
Servicing
products
FORWARD INTEGRATION
Distribution Transport Marketing
outlets Information
It is better
CCI Online to have an
Learning exact answer to the wrong question rather than having an approximate answer to the www.CAclubindia.com/coaching
1800-3000-0505 right question. Page B4.7
CA Guru Gupta (ITSM) CHAPTER-4 STRATEGIC PLANNING
It involves adding complementary products and services across several market areas to establish a wide
distribution network.
It provides the benefits of achieving business synergy, improve product development and increased
market share.
However, concentric diversification provide linkage of new product with existing ones. While in vertically
integrated diversification, the new product falls within the firm's current process-product chain.
3) Retrenchment Strategy:
Basic Features
The firm retrenches some of the activities in a given businesses, or drops the business as
such through sell-out or liquidation
Characteristics
A business organization can re-define its business by divesting a MAJOR product
line or market, product or services.
Retrenchment or retreat becomes necessary or expedient in adverse situations in
the environment and when any other strategy is likely to be suicidal.
In business parlance also, retreat is not always a bad proposition to save the
enterprise's vital interests, to minimize the adverse effects of advancing forces.
The nature, extent and timing of retrenchment are matters to be carefully decided by
management, depending upon each contingency.
Retrenchment includes
- Cut back on its capital and revenue expenditures, replacement of worn-out
machinery and personnels, advertising, R & D activities, employee welfare
subsidies, community development projects, executives perks, and so on.
- Slashing or postponements in case of hard times, inventory levels, manufacturing
level, manpower, plant maintenance, dividend to shareholders and interest on
deposits.
- Withdrawing from some marginal markets, withdrawal of some brands and sizes of
products, withdrawal of even some slow moving products, winding up some branch
offices, abolition of some executive positions and so on.
- Sale of some manufacturing facilities and individual product divisions, retirement from
production or marketing stage, taking over by another enterprise, liquidation of
companies, dissolution of firm, closure of entire business.
Reason
The management no longer wishes to remain in business either partly or wholly due to
continuous losses and unviability.
The environment faced is threatening.
Stability can be ensured by reallocation of resources from unprofitable to profitable
businesses.
It is better
CCI Online to have an
Learning exact answer to the wrong question rather than having an approximate answer to the www.CAclubindia.com/coaching
1800-3000-0505 right question. Page B4.8
CA Guru Gupta (ITSM) CHAPTER-4 STRATEGIC PLANNING
4) Combination Strategies:
Basic Features The firm combines the above strategic alternatives in some permutation/combination so as to suit
the specific requirement of the firm.
Characteristics
The above strategies are not mutually exclusive. It is possible to adopt a mix of the
above to suit particular situations. An enterprise may seek stability in some areas of activity,
expansion in some and retrenchment in the others.
For some organizations, a strategy by diversification and/or acquisition may call for a
retrenchment in some obsolete product lines, production facilities and plant locations.
Reasons
The organization is large and faces complex environment.
The organization is composed of different businesses, each of which lies in a different
industry requiring a different response.
STRATEGIC ADVANTAGE
Uniqueness perceived by Low cost position
the customer
Industry wide
Differentiation Overall cost
leadership
STRATEGIC TARGET
Focus
Particular segment only
It is better
CCI Online to have an
Learning exact answer to the wrong question rather than having an approximate answer to the www.CAclubindia.com/coaching
1800-3000-0505 right question. Page B4.9
CA Guru Gupta (ITSM) CHAPTER-4 STRATEGIC PLANNING
There is a risk that if unique product would not be Strategies such as market penetration and
valued high by customers to justify the higher price, a market development offer substantial
cost leadership strategy easily will defeat a focusing advantages.
differentiation strategy. Focus strategies are most effective when
Another risk in this strategy is that competitors may consumers have distinctive preference
develop ways to copy the differentiating features quickly. and rival firms are not attempting to give
specialize in the same target segment.
It requires strong coordination amongst the R&D and
marketing functions. There is a risk in this strategy that
competitors may develop ways to copy the
Example: Honda (quality), Wal-Mart (More for your money) differentiating features quickly.
Rolex (Prestige), Nike athletic shoes (image and brand
mark), BMW Group Automobiles, Apple Computer It covers only a narrow market as company
(product's design), Mercedes-Benz automobiles ideally focuses on a few target market.
(Engineering design & Performance). Example: Rolls Royce (Luxury automobiles)
It is better
CCI Online to have an
Learning exact answer to the wrong question rather than having an approximate answer to the www.CAclubindia.com/coaching
1800-3000-0505 right question. Page B4.10
CA Guru Gupta (ITSM) CHAPTER-4 STRATEGIC PLANNING
Best cost
MARKET TARGET provider
strategy
It is better
CCI Online to have an
Learning exact answer to the wrong question rather than having an approximate answer to the www.CAclubindia.com/coaching
1800-3000-0505 right question. Page B4.11
CA Guru Gupta (ITSM) CHAPTER-4 STRATEGIC PLANNING
Retrenchment strategy
Retrenchment grand strategy is followed when an organization substantially reduces the scope of its
activity.
It involves the process which is initialized from attempting to find out the problem areas and
diagnose the causes of the problems and final steps are taken to solve the problems. These steps
result in different kinds of retrenchment strategies.
If the organization chooses –
- to focus on ways and means to it adopts at turnaround strategy.
reverse the process of decline,
- none of these actions work, then it may choose to abandon the total
activities, resulting in a liquidation strategy.
2. Divestment Strategies
Divestment strategy involves retrenchment of some of the activities in a given business of the firm. It includes
cutting of a major division; profit centre; SBU; or sell-out of some of the businesses as such.
It is better
CCI Online to have an
Learning exact answer to the wrong question rather than having an approximate answer to the www.CAclubindia.com/coaching
1800-3000-0505 right question. Page B4.12
CA Guru Gupta (ITSM) CHAPTER-4 STRATEGIC PLANNING
3. Liquidation Strategies
This strategy is a most extreme and unattractive strategy.
It involves closing down a firm and selling all its assets. Hence, it is considered as the last resort
because it leads to serious consequences such as loss of employment for workers and other employees,
termination of opportunities etc.
Small-scale units, proprietorship firms, and partnership ventures liquidate frequently but medium-and
large-sized companies rarely liquidate in India such as company, government, banks and financial
institutions, trade unions and other agencies.
It is very difficult to find buyers for selling out the assets for implementing a liquidation strategy.
It will be utmost attractive strategy when a "dead business is worth more than alive", it is a good
proposition.
Abandoned and systematic plan is desirable before execution of liquidation strategy to reap the
maximum benefits for the firm and its shareholders.
Under the Companies Act, 1956, liquidation/winding up may be either by the court, voluntary, or subject to
the supervision of the court.
It is better
CCI Online to have an
Learning exact answer to the wrong question rather than having an approximate answer to the www.CAclubindia.com/coaching
1800-3000-0505 right question. Page B4.13
CA Guru Gupta (ITSM) CHAPTER-5 FORMULATION OF FUNCTIONAL STRATEGY
Logistics Strategy:
It is a process that integrates the flow of supplies of an organization to ensure that right materials are
available at the right place, at the right time, of the right quality, and at the right cost .
It helps in recording the cost of transporting materials as low as possible consistent with safe and reliable
delivery.
Supply chain management helps in logistics and enables a company to have constant contact with its
distribution team which could consist of trucks, trains, or any other mode of transportatio n.
This strategy helps in change management in logistics operations such as emerging technologies and
industry initiatives.
Most of the time, strategists should not be formulating strategy at all, they should be getting on with implementing they already have. Page 5.1
CCI Online Learning 1800-3000-0505 www.CAclubindia.com/coaching
BY CA GURU GUPTA (ITSM) CHAPTER-5 FORMULATION OF FUNCTIONAL STRATEGY
Logistic Management:
It includes management of inbound and outbound goods, transportation, warehousing, handling of material,
fulfilment of orders, inventory management, supply/demand planning. Although these activities also form part of
Supply chain management, the latter has different components.
Logistic management is one of its part relating to planning, implementing, and controlling the movement
and storage of goods, services and related information between the point of origin and the point of consumption.
CCI Online
MostLearning 1800-3000-0505
of the time, strategists should not be formulating strategy www.CAclubindia.com/coaching
at all, they should be getting on with implementing they already have. Page 5.2
BY CA GURU GUPTA [ITSM) CHAPTER-5 FORMULATION OF FUNCTIONAL STRATEGY
2) Procurement:
Procurement requires careful resource planning, quality issues, identifying sources, negotiation,
order placement, inbound transportation and storage.
Organizations have to coordinate with suppliers in scheduling without interruptions. Suppliers are involved in
planning the manufacturing process.
3) Manufacturing:
Flexible manufacturing processes will be in place to respond to market changes.
They should be adaptive to accommodate customization and changes in the taste and preferences.
Manufacturing should be done on the basis of just-in-time (JIT) and minimum lot sizes. Changes in the
manufacturing process be made to reduce manufacturing cycle.
4) Physical distribution:
It assist management to provide availability of the products at right time at right place which is
important for each channel participant.
Supply chain management links a marketing channel with customers.
5) Outsourcing:
Outsourcing is not limited to the procurement of materials and components, but also includes
outsourcing of services that traditionally have been provided within an organization.
The company focuses on those activities where it has competency and everything else will be outsourced.
6) Customer services:
Organizations must build customer relationship and also provide immense focus upon the level of
customer satisfaction and trying to make them cent percent satisfied.
This in turn helps in producing positive feelings in the organization and the customers.
7) Performance measurement:
There has to be a strong relationship amongst the supplier, customer and organization.
Supplier capabilities and customer relationships can be correlated with a firm performance. Performance
is measured in different parameters such as costs, customer service, productivity and quality.
Most of the time, strategists should not be formulating strategy at all, they should be getting on implementing they already have. Page B5.3
CCI Online Learning 1800-3000-0505 www.CAclubindia.com/coaching
BY CA GURU GUPTA (ITSM) CHAPTER-5 FORMULATION OF FUNCTIONAL STRATEGY
Strategies such as product development, market penetration, and concentric diversification require that new
products be successfully developed and that old products be significantly improved.
Management supports for R&D is often constrained by resource availability.
R&D strategy always tied with external opportunities to internal strengths and is linked with objectives.
Well formulated R&D policies match market opportunities with internal capabilities.
There must be effective interactions between R&D departments and other functional departments in
implementing R&D strategy. Conflicts between marketing, finance/accounting, R&D, and information
systems departments can be minimized with clear policies and objectives.
Tabular presentation
Situation In house R & D R & D Experts are appointed
Technology changes Market grow
Slow Moderate
Rapidly Slow
Slow Fast
Fast Fast
CCI Online
MostLearning 1800-3000-0505
of the time, strategists should not be formulating strategy www.CAclubindia.com/coaching
at all, they should be getting on with implementing they already have. Page 5.4
BY CA GURU GUPTA [ITSM) CHAPTER-5 FORMULATION OF FUNCTIONAL STRATEGY
Ancillary Units Raw materials sent to respective ancillary units Central Units
ABC Ltd- Provides processed Plastics Raw materials
BCD Ltd.- Provides processed Aluminium
CDE Ltd – Provides processed Steel
DEF Ltd. – Provides processed Rubber
Testing, standardization and
EFG Ltd. – Provides processed Cotton
fabricating the equipment
Sale to Buyers
Production System:
The production system is concerned with the capacity, location, layout, product or service design, work
systems, degree of automation, extent of vertical integration etc.
Strategies related to production system are significant as they deal with vital issues affecting the
organizational capability to achieve its objectives.
Strategy implementation would have to take into account the production system factors which involves
long term decisions and influence not only the operations capability of an organization but also its ability to
implement strategies and achieve objectives.
Most of the time, strategists should not be formulating strategy at all, they should be getting on implementing they already have. Page B5.5
CCI Online Learning 1800-3000-0505 www.CAclubindia.com/coaching
BY CA GURU GUPTA (ITSM) CHAPTER-5 FORMULATION OF FUNCTIONAL STRATEGY
For example: Excel Industries, a pioneering company in the area of industrial and agro chemicals, adopts
a policy of successive vertical integration for import substitution. It starts with the end product and then
integrates backward to make raw materials for it.
CCI Online
MostLearning 1800-3000-0505
of the time, strategists should not be formulating strategy www.CAclubindia.com/coaching
at all, they should be getting on with implementing they already have. Page 5.6
BY CA GURU GUPTA [ITSM) CHAPTER-5 FORMULATION OF FUNCTIONAL STRATEGY
which stands for Products as customer solution, price as customer cost, place as convenience and promotion
as communication.
3) Place:
It stands for company activities that make the product available to target consumers.
One of the most basic marketing decision is choosing the most appropriate marketing channel.
Strategies should be taken for the management of channels by which ownership of product is transferred from
producers to customers. In many cases goods are not directly moved to the customer rather it is moved through the
channel of wholesellers and retailers, in that case such strategy will also be applicable to them.
Most of the time, strategists should not be formulating strategy at all, they should be getting on implementing they already have. Page B5.7
CCI Online Learning 1800-3000-0505 www.CAclubindia.com/coaching
BY CA GURU GUPTA (ITSM) CHAPTER-5 FORMULATION OF FUNCTIONAL STRATEGY
4) Promotion:
It stands for activities that communicate the merits of the product and persuade to target
consumers for buying it.
Strategies are needed to combine individual methods such as advertising, personal selling, and sales
promotion into a coordinated campaign.
3) Publicity:
It is also a non-personal, high flexible and dynamic form of promotion similar to advertising.
However, no payments are made to the media as in case of advertising. Organizations skillfully
seek to promote themselves and their product without payment. Thus it is way of reaching
customers with negligible cost.
The media for publicity are such as press releases, press conferences, reports, stories, and
internet releases. These releases must be of interest to the public.
4) Sales promotion:
Sales promotion includes all activities that are undertaken to promote the business but are not
specifically included under personal selling, advertising or publicity.
Activities like discounts, contests, money refunds, installments, kiosks and exhibitions
constitute sales promotion.
All these are meant to give a boost to the sales. Sales promotion done periodically may help in
getting a larger market share to an organization.
CCI Online
MostLearning 1800-3000-0505
of the time, strategists should not be formulating strategy www.CAclubindia.com/coaching
at all, they should be getting on with implementing they already have. Page 5.8
BY CA GURU GUPTA [ITSM) CHAPTER-5 FORMULATION OF FUNCTIONAL STRATEGY
Physical evidence: It refers to the environment in which the market offering is delivered and where the firm and
customer interact.
Process: It refers to the actual procedures, mechanisms and flow of activities by which the product / service is
delivered.
Analysis
Most of the time, strategists should not be formulating strategy at all, they should be getting on implementing they already have. Page B5.9
CCI Online Learning 1800-3000-0505 www.CAclubindia.com/coaching
BY CA GURU GUPTA (ITSM) CHAPTER-5 FORMULATION OF FUNCTIONAL STRATEGY
2) Augmented Marketing:
It is a provision of additional customer services and benefits to satisfy additional requirement of customers like
movies on demand, on-line computer repair services, secretarial services, etc.
It provides a set of benefits that promise to promote customer services to an unexpected level.
3) Direct Marketing:
Marketing through various advertising media that interact directly with consumers, generally calling for the
consumer to make a direct response.
Direct marketing includes Catalogue Selling, Mail, Tele-computing, Electronic Marketing, Shopping, and
TV shopping.
4) Relationship Marketing:
The process of creating, maintaining, and enhancing to make strong and valuable relationships with
customers and other stakeholder.
For example: British Airways offers special lounges with showers at 199 airports for frequent flyers. Thus,
providing special benefits to select customers to strength bonds. It will go a long way in building relationships.
5) Services Marketing:
It is applying the concepts, tools, and techniques, of marketing to services.
Services is any activity or benefit that one party can offer to another party that is essentially intangible and
does not result in the, banking, savings, retailing, educational or utilities.
6) Person Marketing:
People are also marketed. Person marketing consists of activities undertaken to create, maintain or
change attitudes or behavior towards particular people.
For example, politicians, sports stars, film stars, professional i.e., market themselves to get votes, or to promote
their careers and income.
7) Organization Marketing:
It consists of activities undertaken to create, maintain, or change attitudes and behavior of target
audiences towards an organization.
Both profit and nonprofit organizations practice organization marketing.
8) Place Marketing:
Place marketing involves activities undertaken to create, maintain, or change attitudes and behavior towards
particular places say, business sites marketing, tourism marketing.
9) Enlightened Marketing:
A marketing philosophy holding that a company’s marketing should support the best long-run
performance of marketing system; its five principles include customer-oriented marketing, innovative
marketing, value marketing, sense-of-mission marketing, and societal marketing.
11) Synchro-marketing:
When the demand for the product is irregular due to season, some parts of the day, or on hour basis,
Most of the time, strategists should not be formulating strategy at all, they should be getting on with implementing they already have. Page
CCI Online
5.10Learning 1800-3000-0505 www.CAclubindia.com/coaching
BY CA GURU GUPTA [ITSM) CHAPTER-5 FORMULATION OF FUNCTIONAL STRATEGY
causing idle capacity or over-worked capacities, synchro-maketing can be used to find ways to alter
the same pattern of demand through flexible pricing, promotion, and other incentives.
For example: woollens or coolers; or hospitals underbooked on weekend or end of the week.
12) Concentrated Marketing:
A market-coverage strategy in which a firm goes after a large share of one or few sub-markets.
13) Demarketing:
Marketing strategies to reduce demand temporarily or permanently, the aim is not to destroy demand, but
only to reduce or shift it. This happens when there is overfull demand.
For example: buses are overloaded in the morning and evening, roads are busy for most of times, zoological
parks are over-crowded on Saturdays, Sundays and holidays. Here de-marketing can be applied to regulate
demand.
Most of the time, strategists should not be formulating strategy at all, they should be getting on implementing they already have. Page B5.11
CCI Online Learning 1800-3000-0505 www.CAclubindia.com/coaching
BY CA GURU GUPTA (ITSM) CHAPTER-5 FORMULATION OF FUNCTIONAL STRATEGY
capital and working capital borrowings; reserves and surplus as sources of funds; and relationship
with lenders, banks and financial institutions.
Strategies related to the sources of funds are important since they determine how financial resources will
be made available for the implementation of strategies. Organizations have a range of alternatives regarding
the sources of funds. While one company may rely on external borrowings, another may follow a policy of
internal financing.
Most of the time, strategists should not be formulating strategy at all, they should be getting on with implementing they already have. Page
CCI Online
5.12Learning 1800-3000-0505 www.CAclubindia.com/coaching
BY CA GURU GUPTA [ITSM) CHAPTER-5 FORMULATION OF FUNCTIONAL STRATEGY
3) Value of Business:
The third approach, letting the market determine a business's worth, involves 3 methods.
First, base the firm's worth on the selling price of a similar company. A potential problem,
however, is that sometimes comparable figures are not easy to locate, even though substantial
information on firms that buy or sell to other firms is available in major libraries.
The second approach is called the price-earnings ratio method. To use this method, divide the
market price of the firm's common stock by the annual earnings per share and multiply this number
by the firm's average net income for the past five years.
The third approach can be called the outstanding shares method. To use this method, simply
multiply the number of shares outstanding by the market price per share and add a premium (per share
amount).
Most of the time, strategists should not be formulating strategy at all, they should be getting on implementing they already have. Page B5.13
CCI Online Learning 1800-3000-0505 www.CAclubindia.com/coaching
BY CA GURU GUPTA (ITSM) CHAPTER-5 FORMULATION OF FUNCTIONAL STRATEGY
uncertainties.
It provides ability to achieve the competitive advantages by accepting the firm’s external opportunities and threats
and its internal strengths and weaknesses.
2) Training:
The workforce will be more competent if employees are well trained to perform their jobs property.
3) Appraisal of Performance:
The performance appraisal must identify any performance deficiencies experienced by employees due
to lack of competence. Such deficiencies, once identified, can often be solved through counselling,
coaching or training.
4) Compensation:
A firm can usually increase the competency of its workforce by offering pay and benefit packages
that are more attractive than those of their competitors.
This practice enables organizations to attract and retain the most capable people.
Most of the time, strategists should not be formulating strategy at all, they should be getting on with implementing they already have. Page
CCI Online
5.14Learning 1800-3000-0505 www.CAclubindia.com/coaching
BY CA GURU GUPTA [ITSM) CHAPTER-5 FORMULATION OF FUNCTIONAL STRATEGY
1) Cost leadership which means the firm aims to become a low cost leader in the industry.
2) Differentiation under which the firm seeks to be a unique industry in terms of dimensions
highly valued to the customers.
3) Facilitation of change:
The Human resource will be more concerned with substance rather than form, accomplishments rather
than activities, and practice rather than theory.
The personnel function will be responsible for maintaining it as well as in devoting more time to
promote adopting changes.
4) Diversion of workforce:
Diverse workforce has a great challenge in these days. Workforce diversity can be observed in terms of
male and female workers, young and old workers, educated and uneducated workers, unskilled and
professional employee etc. Moreover, it also has people of different castes, religious and nationalities.
Workforce will comprise more of educated and self conscious workers because they will ask for
higher degree of participation in activities. Money will no longer be the sole motivating force and hence
non-financial incentives will also play an important role in motivating the workforce.
Most of the time, strategists should not be formulating strategy at all, they should be getting on implementing they already have. Page B5.15
CCI Online Learning 1800-3000-0505 www.CAclubindia.com/coaching
CA Guru Gupta (ITSM) CHAPTER-6 STRATEGY IMPLEMENTATION &
CONTROL
Introduction:
It is a process that simply put strategies and plans into actions to achieve desire goals.
Strategic-management process does not end when the firm decides what strategies to pursue. There
must be a translation of strategic thought into strategic action which requires support of all managers
and employees of the business.
Implementing strategy affects an organization from top to bottom and all the functional and divisional
areas of a business.
A B
Sound
Strategy Formulation
(Success)
C D
Flawed
Weak Excellent
Strategy Implementation
Reason:
Square A is the situation where a company apparently has formulated a very competitive strategy, but is showing difficulties in implementing
it successfully. This can be due to various factors, such as the lack of experience (e.g. for startups), the lack of resources, missing
leadership and so on. In such a situation the company will aim at moving from square A to square B, given they realize their
implementation difficulties.
Square D is the situation where the strategy formulation is flawed, but the company is showing excellent implementation skills. When a
company finds itself in square D the first thing they have to do is to REDESIGN their strategy before readjusting their
implementation/execution skills.
Square C is reserved for companies that haven't succeeded in coming up with a sound strategy formulation and in addition are bad at implementing
their flawed strategic model. Their path to success also goes through business model RE-DESIGN and implementation/execution RE-
ADJUSTMENT.
Q-2 Types of linkages exist between Strategy formulation and strategy implementation:
The forward linkages deal with the impact of the formulation on implementation while the backward linkages are
concerned with the impact in the opposite direction.
1) Forward Linkages:
All the elements of the strategy formulation starting with objective setting through environmental and
organizational appraisal, strategic alternatives.
With the formulation of new strategies, or reformulation of existing strategies, many changes have to be
adopted within the organization.
For instance, the organizational structure has to undergo a change in the light of the requirements of the
modified or new strategy. The style of leadership has to be adapted to the needs of the modified or new
strategies. In this way, the formulation of strategies has forward linkages with their implementation.
2) Backward Linkages:
Just as implementation is determined by the formulation of strategies, the formulation process is also affected by
factors related with implementation.
While dealing with strategic choice, past strategic actions also determine the choice of strategy.
Organizations tend to adopt those strategies which can be implemented with the help of the present
structure of resources combined with some additional efforts. Such incremental changes, over a period
of time, take the organization from where it is to where it wishes to be.
It forces accountability to the top, inadequate planning for products and markets, line/staff conflicts,
poor delegation of authority, minimizes career development opportunities, and low employee
The M-form structure was developed in the 192 0s, in response to coordination and control related problems in large firms.
It is composed of operating divisions where each division represents a separate business to which the top corporate officer delegates
responsibility for day-to-day operations and business unit strategy to division managers.
By such delegation, the corporate office is responsible for formulating and implementing overall corporate strategy and manages
divisions through strategic and financial controls.
Benefits from Multi divisional structure:
This would enable the firm to –
- more accurately monitor the performance of individual businesses,
- simplifying control related problems,
- facilitate comparisons between divisions,
- improving the allocation of resources and
- seek ways to improve performance.
Marketing Marketing
Production Production
Personnel Personnel
President
Dis-advantages:
- It produces conflicts revolving around duties, authority, and resource allocation.
- Goals to be achieved are vague and the technology used is poorly understood,
- a continuous battle for power between product and functional mangers.
Q-1 Phases for development of Matrix structure proposed by Davis & Lawrence:
1) Cross-functional task forces:
Temporary cross-functional task forces are initially used when a new product line is being introduced. A
project manager is in charge as the key horizontal link.
2) Product/brand management:
If the cross-functional task forces become more permanent, the project manager becomes a product or
brand manager and a second phase begins.
In this arrangement, function is still the primary organizational structure, but product or brand managers
act as the integrators of semi permanent products or brands.
3) Mature matrix:
It involves a true dual-authority structure.
Both the functional and product structures are permanent.
All employees are connected to both a vertical functional superior and a horizontal product
manager. Functional and product managers have equal authority and must work well together to resolve
disagreements over resources and priorities.
However, the matrix structure is not very popular because of difficulties in implementation and
trouble in managing.
5) Network Structure:
It is a new structure of organization having a radical organizational design.
It can also be termed as a "non-structure” by its virtual elimination of in house business functions.
The organization is electronically connected through information system to some completely
owned divisions, partially owned subsidiaries, and other independent companies.
An organisation organized in this manner is often called a virtual organization because it is composed of a
series of project groups or collaborations linked by constantly changing non-hierarchical, cobweb-like networks.
Instead of having salaried employees, it may contract with people for a specific project or length of time.
Long-term contracts with suppliers and distributors replace services that the company could provide for itself.
It becomes most useful when the environment of a firm is unstable and is expected to remain so.
It is cheaper and functioning in time saving mode. Managers are usually engaged in coordinating and
controlling functions.
It uses information systems to reduce the transaction costs of the marketplace.
An organization's business functions are scattered worldwide rather than having location at one place
Companies like Nike, Reebok and Benetton use the network structure in their operations function by
subcontracting manufacturing to other companies in low-cost
It provides flexibility and adaptability to cope with rapid technological change and shifting patterns of
international trade and competition.
Disadvantages:
- The availability of numerous potential partners can be a source of trouble.
- Contracting out functions to separate suppliers/distributors may restrain specialized firm in
their getting proper accountability and execution of specialization.
6) Hourglass Structure
In the recent years information technology and communications have significantly altered the functioning of
organizations.
The role played by middle management is diminishing as the tasks performed by them are increasingly being
replaced by the technological tools.
It consists of 3 layers with restricted middle layer. Information technology links the top and bottom levels in the
organization. It takes away many tasks that are performed by the middle level managers.
A shrunken middle layer coordinates diverse lower level activities. The managers in the hourglass structure are
generalists and perform wide variety of tasks. They would be handling cross-functional issues emanating such as those
from marketing, finance or production.
Merits:
- It has benefit of reduced costs. It also helps in enhancing responsiveness by simplifying decision making.
Decision making authority is shifted close to the source of information so that it is faster.
Demerits:
- However, with the reduced size of middle management the promotion opportunities for the lower levels
diminish significantly.
- Continuity at same level may bring monotony and lack of interest and it becomes difficult to keep the
motivation levels high.
Q-3 Write a short notes on “Why Identifying Core Competences are important”:
Value chain analysis is useful in describing the separate activities which are necessary to support an
organization's strategies and how they link together both inside and outside the organization.
Every activity should necessarily involve a threshold competence hence it is really important to
identify these competences that supports in achieving organization's competitive advantage.
It is differ from one organization to another depending on how the company is positioned and the
strategies it is pursuing.
reduction.
Strategic Change:
The changes in the environmental forces often require businesses to make modifications in their existing
strategies and bring out new strategies. Strategic change is a complex process and it involves a corporate
strategy focused on new markets, products, services and new ways of doing business.
Crux: Change process is not a one-time application but a continuous process due to dynamism and ever changing environment. The
process of unfreezing, changing and refreezing is a cyclical one and remains continuously in action.
Strategic Control:
Strategic Control focuses on the dual questions of whether: (1) the strategy is being implemented as planned;
and (2) the results produced by the strategy are those intended.
It ensures that performance of planned activities must be executed as per standards to achieve the
pre-determined goals and results.
It is intended to regulate and check the behavior of events and people, to put restrictions on undesirable
tendencies, to make people conform to certain norms and standards, to measure progress to keep the system
on track.
It ensures that what is planned is translated into results to keep a watch on proper use of
resources and safeguarding of assets.
It involves monitoring the activity and measuring results against pre-established standards,
analyzing and correcting deviations as necessary and maintaining/adapting the system.
2) Management Control:
It is a process applied to assure that resources are obtained and used effectively and efficiently in
the accomplishment of the organization’s objectives”.
When compared with operational, management control is more inclusive and more
aggregative in the sense of holding integrated activities of a complete department, division or
even entire organization instead of particular activities of subunits.
Its main purpose is to achieve short and long range enterprise goals in an effective and efficient
manner.
3) Strategic Control:
It is a process of evaluating strategy formulated and implemented. It is directed towards identifying
problems and changes in assumptions and making necessary adjustments.
Strategic control focuses on the dual questions of:
- whether the strategy is being implemented as planned; and
- whether the results produced by the strategy are those intended."
Strategies once formulated are not immediately implemented. There is time gap between the
stages of strategy formulation and their implementation.
Strategies are often affected on account of changes in internal and external environments of
organizations.
1) Premise control:
A strategy is formed on the basis of certain assumptions or premises about the complex and
dynamic environment.
It provides systematic and continuous monitoring of environment to verify the validity and accuracy of
of assumptions on which the strategy has been built.
It primarily involves monitoring of 2 types of factors:
a. Environmental factors such as economic (inflation, liquidity, interest rates), technology, social
and regulatory.
b. Industry factors such as competitors, suppliers, substitutes.
2) Strategic surveillance:
The strategic surveillance is unfocused.
It involves general monitoring of various sources of information to uncover unanticipated information having
a bearing on the organizational strategy.
It involves casual environmental browsing, reading financial and other newspapers, business magazines,
meetings, conferences, discussions at clubs or parties and so on can help in strategic surveillance.
Strategic surveillance may be loose form of strategic control, but is capable of uncovering information
relevant to the strategy.
3) Special alert control:
At times unexpected events may force organizations to reconsider their strategy.
Sudden changes in government, natural calamities, terrorist attacks, unexpected merger/acquisition by
competitors, industrial disasters and other such events may trigger an immediate and intense review of
strategy.
Organizations to cope up with these eventualities, form crisis management teams to handle the situation.
4) Implementation control:
Managers implement strategy by converting major plans into concrete, sequential actions that form
incremental steps.
Implementation control is directed towards assessing the need for changes in the overall strategy in
light of unfolding events and results associated with incremental steps and actions.
Strategic implementation control is not a replacement to operational control. It unlike operational controls
continuously monitors the basic direction of the strategy.
The 2-basis forms of implementation control are:
a) Monitoring strategic thrusts: Monitoring strategic thrusts help managers to determine whether the
overall strategy is progressing as desired or whether there is need for readjustments.
b) Milestone Reviews:
All key activities necessary to implement strategy are segregated in terms of time, events or
major resource allocation.
It normally involves a complete reassessment of the strategy.
It also assesses the need to continue or refocus the direction of an organization.
As a weakness: Culture, as a weakness can obstruct the smooth implementation of strategy by creating resistance to
change. An organization’s culture could be characterised as weak when many sub-cultures exists, few values and
behavioural norms are shared and traditions are rare. In such organizations, employees do not have a sense of
commitment, loyalty and sense of identity.
Even if you're on the right track, you'll get run over if you just sit there. Page B7.1
CCI Online Learning 1800-3000-0505 www.CAclubindia.com/coaching
CA Guru Gupta (ITSM) CHAPTER-7 REACHING STRATEGIC EDGE
Even if you're on the right track, you'll get run over if you just sit there. Page B7.2
CCI Online Learning 1800-3000-0505 www.CAclubindia.com/coaching
CA Guru Gupta (ITSM) CHAPTER-7 REACHING STRATEGIC EDGE
Even if you're on the right track, you'll get run over if you just sit there. Page B7.3
CCI Online Learning 1800-3000-0505 www.CAclubindia.com/coaching
CA Guru Gupta (ITSM) CHAPTER-7 REACHING STRATEGIC EDGE
Even if you're on the right track, you'll get run over if you just sit there. Page B7.4
CCI Online Learning 1800-3000-0505 www.CAclubindia.com/coaching
CA Guru Gupta (ITSM) CHAPTER-7 REACHING STRATEGIC EDGE
Benchmarking:
Introduction:
A benchmark is an approach of setting goals and measuring productivity based on standard
industry practices
It is used to measure and compare all the different aspects of performance with the best practices,
identifying gaps and finding out novel methods to not only reduce the gaps but to improve the
situations.
It helps in improving performance by learning from best practices.
This exercise must be repeated periodically to protect environment from being outdated.
It is a process of continuous improvement in search for competitive advantage.
While comparing gaps in performance between the organization and better performers is identified.
Further, gaps in performance are analyzed to seek explanations. Such comparisons have to be
meaningful and credible.
Even if you're on the right track, you'll get run over if you just sit there. Page B7.5
CCI Online Learning 1800-3000-0505 www.CAclubindia.com/coaching
CA Guru Gupta (ITSM) CHAPTER-7 REACHING STRATEGIC EDGE
Feasibility of making the improvements in the light of the conditions that apply within the organization
is also examined.
(5) Prepare a report and Implement the steps necessary to close the
performance gap:
A report on the Benchmarking initiatives containing recommendations is prepared. Such a report
includes the action plans for implementation.
(6) Evaluation:
Business organizations evaluate the results of the benchmarking process in terms of improvements
vis-à-vis objectives and other criteria set for the purpose.
It also periodically evaluates and reset the benchmarks in the light of changes in the conditions that
impact the performance.
Even if you're on the right track, you'll get run over if you just sit there. Page B7.6
CCI Online Learning 1800-3000-0505 www.CAclubindia.com/coaching
CA Guru Gupta (ITSM) CHAPTER-7 REACHING STRATEGIC EDGE
Quality efforts often require reducing process or product-design variation and statistical methods
are ideally suited to support this objective.
5) Sustained management committment to Quality:
If an organization is serious about implementing TQM, the commitment has to start at the top and
remain constant and unchanged in its commitment to quality.
If quality is managed it reflects senior management's values.
6) Quality responsibility:
Another basic TQM precept is that the responsibility for quality is not restricted to an
organization's quality assurance department, but is shared by everyone in an organization.
TQM requires that everyone takes responsibility for quality.
In all over world, only a few companies are fully committed to TQM with quality assurance.
7) Quality measurement:
The quality measurement aspect of TQM asks the question: Where are we? and where are we going?
It is an extremely important concept, and in order to improve quality,
- we need to know where we are (or stated differently, what the current quality levels are), and
- we need to have some idea where we are going (or what quality levels we aspire to).
8) Customer Focus:
According to Lee Iacocca had only three rules: Satisfy the customer, satisfy the customer, and
satisfy the customer. This sums up the importance of customer focus in the TQM philosophy.
According to him, satisfaction of customers will determine the success of an organization.
9) Root cause corrective action:
Most of us have experienced instances in which problems we thought were corrected but it continues
to occur.
TQM seeks to prevent this by identifying the root causes of problems, and by implementing corrective
actions that address problems at the root cause level.
10) Continuous improvement and learning:
TQM also has a philosophy of continuous improvement and learning in all areas of an organization.
It requires universal quality responsibility and universal quality measurement concepts.
Quality measurement is needed to focus on improvement efforts to optimize their performance.
Improvements may be of several types:
- Enhancing value to the customer through new and improved products and services;
- Developing new business opportunities;
- Reducing errors, defects, and waste;
- Improving responsiveness and cycle time performance; and
- Improving productivity and effectiveness in the use of all resources.
Even if you're on the right track, you'll get run over if you just sit there. Page B7.7
CCI Online Learning 1800-3000-0505 www.CAclubindia.com/coaching
CA Guru Gupta (ITSM) CHAPTER-7 REACHING STRATEGIC EDGE
Short Notes:
“TQM is a management philosophy, an abstract entity!
Correct but…………
TQM is not an overnight cure for an organization's quality problems.
TQM implementation process is not a program.
A TQM implementation effort has a beginning, but if implemented properly, it does not have
an ending.
The continuous improvement process continues indefinitely in organizations that successfully
implement TQM.
TQM requires patience when embarking on its journey.
Even if you're on the right track, you'll get run over if you just sit there. Page B7.8
CCI Online Learning 1800-3000-0505 www.CAclubindia.com/coaching
CA Guru Gupta (ITSM) CHAPTER-7 REACHING STRATEGIC EDGE
It has measures to control and promote the quality of products and services such as customer
satisfaction level, defect rates, and repairs and maintenance rates etc. and hence receive much
attention in the strategic plan to develop financial and marketing objectives.
2) Changing Relationships with Customers and Suppliers:
In TQM, quality is defined as products and services beyond present needs and expectations of
customers. Innovation is required to meet and exceed customer’s needs.
Traditional management places customers outside of the enterprise and within the domain of marketing and
sales. TQM views everyone inside the enterprise as a customer of an internal or external supplier,
and a supplier of an external or internal customer.
Marketing concepts and tools can be used to assess internal customer needs and to communicate internal
supplier capabilities.
(INDUSTRY)
TQM Traditional Management
(Industry) (Marketing and sales)
Customer
Supplier Customer
Supplier Supplier
Customer
Supplier Customer
3) Organizational Structure:
TQM views the enterprise as a system of interdependent processes, linked laterally over time through a
network of collaborating (internal and external) suppliers and customers.
Each process is connected to the enterprise's mission and purpose through a hierarchy of
micro- and macro-processes.
Every process contains sub-processes and is also contained within a higher process. This structure
of processes is repeated throughout the hierarchy.
4) Organizational Change:
In TQM the environment in which the enterprise interacts is considered to be changing constantly.
Hence, Management must provide leadership for continual improvement and innovation in processes
and systems, products, and services.
Even if you're on the right track, you'll get run over if you just sit there. Page B7.9
CCI Online Learning 1800-3000-0505 www.CAclubindia.com/coaching
CA Guru Gupta (ITSM) CHAPTER-7 REACHING STRATEGIC EDGE
Technology
Business Process Leadership
Government
Climatic Conditions
Human Behavior Company
Customer’s need Change Strategy
Financial budget
Economic condition
Innovations
Improvement
5) Teamwork:
In TQM, individuals co-operate in team structures such as quality
circles, steering committees, and self-directed work teams.
Departments work together towards system optimization through
cross-functional teamwork.
Six Sigma means maintenance of the desired quality in processes and end products. It is an approach to
take systemic and integrated efforts toward improving quality and reducing cost.
It is highly disciplined process that helps in developing and delivering near-perfect products and services.
It strives to meet and improve organizational goals on quality, cost, scheduling, manpower, new products
and so on.
It works continuously towards revising the current standards and establishing higher ones.
Six Sigma works on the basis of probability concept and normal distribution in statistics. Six Sigma
strives that 99.99966% of products manufactured are defect free.
Six Sigma puts the customer first and uses facts and data to drive better solutions.
Six Sigma efforts target 3 main areas which leads to substantial reduction in cost:
- Improving customer satisfaction
- Reducing cycle time
- Reducing defects
Even if you're on the right track, you'll get run over if you just sit there. Page B7.10
CCI Online Learning 1800-3000-0505 www.CAclubindia.com/coaching
CA Guru Gupta (ITSM) CHAPTER-7 REACHING STRATEGIC EDGE
DMAIC: DMADV:
DMAIC methodology is an acronym for 5 different DMADV is again acronym for the steps
steps used in six sigma directed towards improvement followed in implementing six sigma.
of existing product, process or service.
It is a strategy for designing new products,
The five steps are as follows: processes and services.
1) Define: The five steps are as follows:
In this phase, it identifies the customers and their
requirements are gathered. Then develop problem 1) Define :
statement, goals and benefits. It also determines process At start, 6-sigma experts formally define
owner, team and resources. goals of the design activity that are
consistent with strategy of organization
2) Measure: and customer demands.
In this phase, it defines the metrics used to measure the
results provided by each and every process and
2) Measure:
determine the deficiencies available in it. Next identify the factors that are critical
to quality (CTQs).
3) Analyze:
Measure factors such as product
After identifying deficiencies, SWOT analysis is required capabilities and production process
to be done to evaluate the performance of each and capability and also assess the risks
every process by using statistical methods and graphical involved.
displays, and thereafter identify possible causes of
process output variations. 3) Analyze:
Develop and design alternatives.
These possible causes are analysed statistically to
determine root cause of variation. Create high-level design and evaluate to
select the best design.
4) Improve:
4) Design:
After analysing, various solution alternatives are
Develop details of design and
generated to fix the root cause of each and every
optimize it.
problem. The most appropriate solution is identified
using solution prioritization matrix and validated using Verify designs may require using
pilot testing. techniques such as simulations.
Cost and benefit analysis is performed to validate the 5) Verify:
financial benefit of the solution. Thereafter, Verify designs through simulations or pilot
implementation plan is drafted and executed. runs.
5) Control: Verified and implemented processes are
handed over to the process owners.
Once appropriate solution is identified for improvement
over process performance, these processes must be
standardized and documented and thereafter
monitoring system is implemented to ensure process
is performing as designed and validate expected results.
Project is evaluated and lessons learned are shared with
others.
Even if you're on the right track, you'll get run over if you just sit there. Page B7.11
CCI Online Learning 1800-3000-0505 www.CAclubindia.com/coaching
CA Guru Gupta (ITSM) CHAPTER-7 REACHING STRATEGIC EDGE
Q-2 Characteristic of Six Sigma making it separate from other quality programs:
1) Customer focused:
While moving towards Six sigma, it is almost an obsession to keep external customer needs in plain
sight, driving the improvement effort. External customers are mostly those who buy business's products
and services.
2) Produce major returns on investment:
It helps in improving the returns and brings loyalty to customers.
It helps in avoiding and reducing all possible defects leading to increased cost and reduced customer
satisfaction.
It helps a company to save more money by delivering near perfect products and services.
4) Proactive management:
Being proactive means acting in advance of events rather than reacting to them.
Even if you're on the right track, you'll get run over if you just sit there. Page B7.12
CCI Online Learning 1800-3000-0505 www.CAclubindia.com/coaching
CA Guru Gupta (ITSM) CHAPTER-7 REACHING STRATEGIC EDGE
It includes defining ambitious goals and reviewing them frequently, setting clear priorities, focusing on
problem prevention rather than fire-fighting, and questioning why we do things instead of blindly defending
them.
5) Boundaryless collaboration:
Six sigma requires breaking of barriers amongst the hierarchy within management and improves
teamwork up, down, and across organizational lines.
Huge opportunities are available for providing value to customers through improved collaboration.
Billions of dollars are lost every day because of disconnects and outright competition between groups.
The coming of e-commerce has changed the character of the market, created new driving forces and
key success factors and formation of new strategic groups.
The creativeness with which a company incorporates e-commerce practices holds enormous potential for
reconfiguring its value chain and affecting its company's competitiveness.
Internet economy presents new opportunities and new threats that demand strategic response and that
require managers to craft bold new strategies.
What is Internet Technology?
Internet is an integrated network of banks of servers and high-speed computers, digital switches and
routers, telecommunications equipment and lines, and individual users' computers.
Digital switches and routers are used to direct the transmission of messages between senders and
receivers across the network.
The backbone of the Internet consists of telecommunications lines (fibre optic lines, telephone
lines, wireless technology etc.) that allow computers to transfer data in digital form at very high speed.
The bandwidth of the line determines the capacity or speed of the data transfer.
It provides E-commerce facility and transmission is done within fraction of seconds at lowest cost.
Internet makes physical location of data is irrelevant. Any authorized user can access any data from
anywhere in the world.
Internet requires various protocols (i.e, communication standards) and topologies through which
communication is possible.
Even if you're on the right track, you'll get run over if you just sit there. Page B7.13
CCI Online Learning 1800-3000-0505 www.CAclubindia.com/coaching
CA Guru Gupta (ITSM) CHAPTER-7 REACHING STRATEGIC EDGE
3) Low Entry barriers into e-commerce: (jo chahe wo e-commerce me aa sakta hai,,, no
rok tok)
Outsourcing is required to be done because entire function of e-commerce cannot be handled by a single
person.
Outsourcing covers value added functions such as Handling of E-commerce software, establishment of
website, maintenance of database, security system etc.
Hence, the software necessary for establishing a Web site is often available at lower cost and available
to every needy person.
5) Companies can reach beyond their borders to find best suppliers and
close collaboration with them:
In an e-commerce environment, companies using Internet to integrate foreign suppliers into their supply
chain networks more tightly, boosting savings and speeding new products to market.
It helps to extend their geographic search for suppliers and can collaborate electronically with chosen
suppliers to streamline ordering and shipping of parts and components, improve just-in-time deliveries and
communicate speedily and efficiently.
Even if you're on the right track, you'll get run over if you just sit there. Page B7.14
CCI Online Learning 1800-3000-0505 www.CAclubindia.com/coaching
CA Guru Gupta (ITSM) CHAPTER-7 REACHING STRATEGIC EDGE
Even if you're on the right track, you'll get run over if you just sit there. Page B7.15
CCI Online Learning 1800-3000-0505 www.CAclubindia.com/coaching
CA Guru Gupta (ITSM) CHAPTER-7 REACHING STRATEGIC EDGE
1) Educational institutions:
Educational institutions are using strategic-management techniques and concepts more frequently.
The significant change in the competitive climate has taken place in the educational environment. Hence,
they are adopting different strategies for attracting best students.
The academic institutions have also joined hands with industries in order to deliver education to their
employees.
The educational delivery system has also undergone considerable changes with the introduction of
computers and internet technologies.
Nearly 200 students can access virtual lectures anytime and chat with professors.
2) Medical organizations:
Hospitals are creating new strategies today as advances in the diagnosis and treatment of chronic
diseases are undercutting that earlier mission.
Hospitals are beginning to bring services to the patient as much as bringing the patient to the
hospital.
Pathological laboratories have started collecting door-to-door samples.
Chronic care will require day-treatment facilities, electronic monitoring at home, user-friendly
ambulatory services, decentralized service networks, and laboratory testing.
It includes such as sharing results of medical tests and prescribing medicine.
The 10 most successful hospital strategies today are providing free-standing outpatient surgery
centers, outpatient surgery and diagnostic centers, physical rehabilitation centers, home health
services, cardiac rehabilitation centers, preferred provider services, industrial medicine services,
women’s medicine services, skilled nursing units, and psychiatric services.
Even if you're on the right track, you'll get run over if you just sit there. Page B7.16
CCI Online Learning 1800-3000-0505 www.CAclubindia.com/coaching