KEMBAR78
Understanding MIS and Its Impact | PDF | Information Security | Customer Relationship Management
0% found this document useful (0 votes)
15 views37 pages

Understanding MIS and Its Impact

The document outlines various types of Management Information Systems (MIS) including Transaction Processing Systems (TPS), Management Information Systems (MIS), Decision Support Systems (DSS), and others, detailing their functions and examples. It discusses the impact of Information Technology (IT) on organizations and society, emphasizing efficiency, decision-making, and economic growth. Additionally, it covers concepts like Data Warehouses, Big Data, Knowledge Management, and the challenges faced in these areas.

Uploaded by

omiiii1207
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views37 pages

Understanding MIS and Its Impact

The document outlines various types of Management Information Systems (MIS) including Transaction Processing Systems (TPS), Management Information Systems (MIS), Decision Support Systems (DSS), and others, detailing their functions and examples. It discusses the impact of Information Technology (IT) on organizations and society, emphasizing efficiency, decision-making, and economic growth. Additionally, it covers concepts like Data Warehouses, Big Data, Knowledge Management, and the challenges faced in these areas.

Uploaded by

omiiii1207
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 37

Module 1

1. What are the different types of MIS? (5M)

1. Transaction Processing Systems (TPS):


○ Automates routine, day-to-day transactions.
○ Example: Retail POS systems managing sales and inventory.
2. Management Information Systems (MIS):
○ Converts raw data into structured reports to support decision-making.
○ Example: Monthly sales performance dashboards for managers.
3. Decision Support Systems (DSS):
○ Helps with complex decision-making using tools like simulation and modeling.
○ Example: Forecasting demand using historical data trends.
4. Executive Support Systems (ESS):
○ Provides a high-level overview for strategic planning and decisions.
○ Example: CEO dashboards showing company KPIs.
5. Knowledge Management Systems (KMS):
○ Facilitates the creation and sharing of organizational knowledge.
○ Example: Wikis or SharePoint portals.
6. Office Automation Systems (OAS):
○ Streamlines office communication and document handling.
○ Example: Microsoft Office Suite for documentation.
7. Enterprise Resource Planning (ERP):
○ Integrates business processes across departments into a single system.
○ Example: SAP ERP integrating finance and HR functions.
8. Supply Chain Management Systems (SCM):
○ Optimizes supply chain processes like procurement and logistics.
○ Example: Oracle SCM for inventory tracking.

2. How does IT impact organizations? (5M)

1. Enhanced Efficiency: Automation reduces manual tasks and boosts productivity.


Example: Automated order processing in e-commerce.
2. Improved Decision-Making: Provides real-time data analytics for informed decisions.
Example: Business Intelligence tools like Tableau.
3. Cost Reduction: Streamlines processes, cutting operational costs. Example: Cloud
computing reduces physical infrastructure needs.
4. Global Connectivity: Facilitates international operations through platforms like Zoom or
cloud services.
5. Enhanced Customer Experience: CRM tools enable personalized interactions.
Example: Salesforce helping track customer preferences.
6. Encourages Innovation: Enables product and process innovation using emerging
technologies like AI.
7. Improved Communication: Tools like Teams or Slack improve team collaboration and
communication.
8. Risk Management: Helps identify and mitigate risks through predictive analytics.

3. Explain in detail computer-based information systems (CBIS).

1. Definition: CBIS are systems that collect, process, store, and disseminate information
for decision-making using computer technology.
2. Components:
○ Hardware: Physical devices like servers and laptops.
○ Software: Operating systems, applications, and tools for data processing.
○ Data: Raw facts processed into meaningful information.
○ People: Users and IT staff managing the system.
○ Networks: Connectivity enabling communication and data sharing.
3. Features: Real-time data processing, automation, and scalability.
4. Types of CBIS: Includes TPS, MIS, DSS, and ESS for different levels of
decision-making.
5. Benefits: Enhances efficiency, reduces errors, and improves decision-making.
6. Applications: Used in finance (accounting systems), healthcare (EHR systems), and
retail (inventory management).
7. Example: A bank’s CBIS managing customer accounts, loans, and credit processing.
8. Importance: CBIS bridges the gap between raw data and actionable insights for
businesses.

4. Importance of Information Systems to Society (5M)

1. Improved Communication: Provides instant global communication via email,


messaging apps, and video conferencing tools.
2. Educational Access: E-learning platforms and virtual classrooms democratize
education. Example: Coursera and Khan Academy.
3. Healthcare Advancements: Enables telemedicine, diagnostics, and EHR systems for
better patient care.
4. Economic Growth: Drives digital transformation, creating new job opportunities and
improving productivity.
5. E-Governance: Enhances transparency and service delivery. Example: Digital India
initiative.
6. Social Inclusion: Brings connectivity to remote areas, reducing the digital divide.
7. Environmental Benefits: Smart technologies reduce resource wastage (e.g., IoT for
smart grids).
8. Security Concerns: Poses challenges like cyber threats, requiring continuous vigilance.

Comparison Question: Types of IS with Examples


Feature TPS MIS DSS ESS

Focus Routine Structured data Analytical Strategic insights


operations and for reports support for for executives
transactions decisions

Users Operational staff Middle Managers and Top executives


management analysts

Examples Retail POS Sales reports Forecasting tools CEO dashboards


systems

Input Data Raw transactional Aggregated Historical and Summarized,


data operational data predictive data company-wide
data

Output Processed Periodic Simulations, High-level


transactions performance trend analysis overviews
reports

Technology Database Reporting tools, Analytical BI tools,


Used systems, real-time data aggregation models, data visualization
processing mining software

Scope Narrow and Department or Broad, covering Organization-wide


task-specific process-specific multiple
scenarios

Decision Operational Tactical Semi-structured Strategic


Type (structured) and strategic (unstructured)

5. Compare the Impact of IS on Organizations and Society


Aspect Impact on Organizations Impact on Society

Efficiency Automates workflows to save time Enhances communication and


and costs connectivity

Innovation Encourages product and process Fosters technological


innovation advancements
Decision-Making Provides data-driven insights Informs public policies and
governance

Job Creation Creates IT-related roles like data Offers remote work and gig
analysts opportunities

Globalization Expands global market access Promotes cultural exchange

Security Risks Introduces cyber threats and data Raises concerns over privacy
breaches and ethics

Economic Growth Boosts productivity and revenue Drives digital economies

Environmental Enables sustainability through Supports green initiatives


Impact automation

7. Explain the impact of information systems on organizations and society.

1. Improved Efficiency: Automates repetitive tasks like payroll processing, reducing errors
and increasing productivity. Example: ERP systems in manufacturing.
2. Enhanced Decision-Making: Provides data-driven insights for managers to make
informed decisions. Example: Business Intelligence tools analyzing sales trends.
3. Cost Optimization: Reduces operational costs by streamlining processes and
minimizing waste. Example: Cloud-based storage eliminating physical hardware costs.
4. Global Reach: Enables companies to operate internationally through e-commerce
platforms and global communication tools. Example: Amazon’s worldwide operations.
5. Better Customer Interaction: Personalized services improve customer satisfaction and
retention. Example: CRM tools tracking customer preferences.
6. Job Creation: Introduces IT roles like data analysts, cybersecurity experts, and cloud
architects.
7. Social Benefits: Improves access to education, healthcare, and public services through
e-governance and online platforms. Example: Telemedicine services in remote areas.
8. Security Challenges: Increases vulnerability to cyber threats and data breaches,
demanding advanced security measures.

8. Highlight the economic impact of information systems. Give examples.

1. Increased Productivity: Automates labor-intensive tasks, saving time and resources.


Example: Automated production lines in car manufacturing.
2. Cost Reduction: Optimizes operations, reducing waste and overhead costs. Example:
Cloud computing reduces the need for expensive servers.
3. Global Market Access: Expands business opportunities by connecting to global
markets. Example: Small businesses using Shopify for international sales.
4. New Revenue Streams: Creates opportunities for digital products and services.
Example: Subscription-based SaaS platforms like Zoom.
5. Innovation: Drives product and process innovation, giving companies a competitive
edge. Example: AI-powered recommendation systems in retail.
6. Job Market Transformation: Creates new roles while replacing manual jobs with
automated processes. Example: Growth of data science and AI jobs.
7. E-Governance: Improves public service efficiency, reducing costs and enhancing
economic growth. Example: Online tax filing systems like IRS e-file.
8. Risks: Job displacement and growing inequality in access to digital tools.

9. Create an MIS system for any hospital.

MIS for Hospital: Features and Benefits

1. Patient Records Management:


○ Digital storage of patient details, medical history, and treatment plans.
○ Example: Electronic Health Records (EHR) systems.
2. Appointment Scheduling:
○ Enables patients to book appointments online.
○ Example: Scheduling software integrated with the hospital website.
3. Inventory Management:
○ Tracks availability of medicines, equipment, and other resources in real time.
○ Reduces wastage and ensures timely procurement.
4. Billing and Insurance:
○ Automates patient billing and insurance claim processing.
○ Example: Systems like Medisoft for healthcare billing.
5. Lab Test Management:
○ Manages test results, ensuring timely communication to patients and doctors.
6. Staff Management:
○ Tracks shifts, payroll, and performance metrics for hospital employees.
7. Decision Support:
○ Provides analytics to forecast patient admission rates and resource allocation.
○ Example: Dashboards showing hospital occupancy rates.
8. Integration with Public Health Systems:
○ Shares critical data with government health databases for epidemic tracking.
○ Example: COVID-19 case reporting systems.
module 2

1. What is Data Mart and Data Warehouse? Provide examples of Big Data
generation. (5M)

1. Data Warehouse:
○ Centralized system storing data from multiple sources for analysis and reporting.
○ Handles large-scale enterprise data with structured formats.
○ Example: A financial institution's warehouse storing customer transactions across
regions.
2. Data Mart:
○ A subset of a data warehouse tailored for specific departments or functions.
○ Focused on providing data for targeted decision-making.
○ Example: Marketing data mart for analyzing campaign performance.
3. Big Data Generation Examples:
○ E-commerce: Customer browsing patterns, purchase history, and feedback data.
○ Healthcare: Medical imaging data, patient records, and genetic sequencing.
4. Applications: Both data marts and warehouses support BI tools like Tableau for
visualization.
5. Technological Backbone: Uses ETL (Extract, Transform, Load) processes for
integrating and cleansing data.
6. Scalability: Cloud-based solutions like Snowflake handle growing Big Data needs.
7. Role in Big Data: They provide structured inputs to analyze trends and predictions.
8. Future Trends: Integration with AI for enhanced predictive analytics.

2. What is Big Data? Explain its challenges and characteristics. (5M)

1. Definition: Big Data refers to datasets that are large, complex, and generated rapidly,
making traditional processing tools inadequate.
2. Characteristics (5 Vs):
○ Volume: Huge amounts of data (e.g., terabytes or petabytes).
○ Velocity: Rapid data generation and processing. Example: Social media posts.
○ Variety: Different formats like text, images, videos, and IoT sensor data.
○ Veracity: Ensures data accuracy and reduces noise.
○ Value: Extracting actionable insights from raw data.
3. Challenges:
○ Data Storage: Requires scalable infrastructure. Example: Distributed file
systems like Hadoop.
○ Processing Speed: Demands real-time analytics for insights.
○ Security and Privacy: Sensitive data is prone to breaches.
○ Integration: Combining diverse data sources into cohesive datasets.
4. Technologies Used: Apache Spark, Hadoop, and NoSQL databases.
5. Applications: Fraud detection, recommendation engines, and predictive maintenance.
6. Benefits: Drives innovation, enhances decision-making, and optimizes operations.
7. Examples: Netflix analyzing viewer habits to suggest personalized recommendations.
8. Future Trends: AI and machine learning for predictive analytics on Big Data.

3. Illustrate the Knowledge Management Life Cycle.

1. Definition: The Knowledge Management Life Cycle (KMLC) is the systematic process of
creating, storing, sharing, and applying knowledge within an organization.
2. Phases of KMLC:
○ Create: Generating new knowledge through collaboration, research, or
innovation.
○ Capture: Converting tacit knowledge into explicit formats like documents.
○ Organize: Structuring knowledge in databases or repositories.
○ Store: Preserving knowledge for future use using cloud systems or knowledge
bases.
○ Share: Disseminating knowledge across teams using collaboration tools like
SharePoint.
○ Apply: Using stored knowledge to make decisions or solve problems.
3. Technology Role: Tools like CRM, KMS, and wikis support KMLC implementation.
4. Importance: Facilitates learning, innovation, and efficient decision-making.
5. Barriers: Lack of participation or poor technological infrastructure.
6. Examples:
○ IT companies documenting coding standards for new developers.
○ Hospitals storing and sharing best practices for patient care.
7. Benefits: Reduces redundancy, enhances collaboration, and preserves institutional
knowledge.
8. Real-World Example: Siemens uses KMLC to retain critical project knowledge globally.

4. Types of Knowledge and Four Modes of Knowledge Conversion (SECI


Model)

1. Types of Knowledge:
○ Explicit Knowledge: Easily documented and shared. Example: Manuals or
policies.
○ Tacit Knowledge: Based on personal experience, harder to document. Example:
Decision-making skills.
2. SECI Model (Knowledge Conversion):
○ Socialization (Tacit to Tacit): Knowledge shared through observation or
practice. Example: Mentorship programs.
○ Externalization (Tacit to Explicit): Capturing experiences into formal
documentation. Example: Writing research papers.
○ Combination (Explicit to Explicit): Merging different explicit knowledge.
Example: Creating reports by compiling data.
○ Internalization (Explicit to Tacit): Learning from explicit sources to build
expertise. Example: Training sessions.
3. Applications:
○ Socialization in brainstorming sessions.
○ Externalization in creating project documentation.
○ Combination in report generation.
○ Internalization through training and e-learning.
4. Benefits: Encourages collaboration, innovation, and knowledge sharing.
5. Challenges: Capturing tacit knowledge effectively.

Comparison Question: Data Mart vs. Data Warehouse


Feature Data Mart Data Warehouse

Definition Subset of a data warehouse for Centralized repository for enterprise


specific needs data

Focus Department-level Organization-wide

Data Scope Limited and specific Broad and comprehensive

Speed Faster due to smaller datasets Slower for large-scale queries

Complexity Easier to implement and manage Complex integration of diverse data

Cost Lower implementation cost Higher due to scale and infrastructure

Examples Marketing or HR-specific data marts Full enterprise financial and


operational data

Use Case Tactical decisions Strategic planning


Comparison Question: Big Data Characteristics vs. Challenges
Aspect Big Data Characteristics Big Data Challenges

Volume Handles massive data sizes Requires scalable storage solutions

Velocity Data generated at high speeds Processing real-time data efficiently

Variety Incorporates diverse formats Integrating structured and unstructured


data

Veracity Ensures data accuracy Dealing with inconsistencies and


errors

Value Extracts actionable insights Identifying meaningful patterns from


data

Tools Uses Spark, Hadoop, and AI Tools may have steep learning curves

Application Fraud detection, customer Privacy concerns and regulatory


s personalization compliance

Examples Netflix, IoT, and healthcare analytics Data breaches or misuse risks

5. Explain the challenges faced by Knowledge Management in different


business scenarios. (5M)

1. Knowledge Silos:
○ Departments may hoard knowledge, limiting cross-functional collaboration.
○ Example: A marketing team not sharing customer feedback with product
development.
2. Tacit Knowledge Capture:
○ Difficult to document expertise and insights held by employees.
○ Example: Capturing the negotiation skills of a sales expert.
3. Technological Barriers:
○ Lack of adequate tools or infrastructure to store and share knowledge effectively.
○ Example: Outdated intranet systems failing to integrate with modern tools.
4. Cultural Resistance:
○ Employees may be reluctant to share knowledge due to fear of losing job security
or lack of trust.
○ Example: Senior staff not mentoring juniors to protect their role.
5. Rapid Knowledge Obsolescence:
○ In fast-changing industries, knowledge quickly becomes outdated.
○ Example: Tech companies needing constant updates on programming trends.
6. Data Security Risks:
○ Sensitive knowledge shared across platforms can be vulnerable to breaches.
○ Example: Confidential project details exposed in a cyberattack.
7. Overwhelming Volume:
○ Organizations may struggle to differentiate valuable knowledge from excessive
data.
○ Example: Sorting through customer feedback from multiple channels.
8. Solutions:
○ Use robust KMS tools (e.g., SharePoint), encourage a collaborative culture, and
provide regular training.

6. Analyze the impact of Business Intelligence (BI) on decision-making.


(5M)

1. Data-Driven Insights:
○ BI tools analyze historical and real-time data, providing actionable insights.
○ Example: Sales trends helping companies decide product pricing.
2. Improved Decision Accuracy:
○ Reduces guesswork by offering precise and reliable data visualizations.
○ Example: Retailers forecasting demand using customer purchase patterns.
3. Faster Response Time:
○ Enables quick decisions in dynamic environments by automating reporting.
○ Example: Detecting a drop in website traffic and adjusting marketing strategies.
4. Enhanced Operational Efficiency:
○ Identifies bottlenecks and optimizes resources.
○ Example: Identifying low-performing supply chain vendors.
5. Predictive Analytics:
○ Anticipates future trends using machine learning models.
○ Example: Banks predicting loan defaults based on customer credit histories.
6. Visualization Tools:
○ Dashboards and charts make complex data easier to interpret.
○ Example: Tableau or Power BI dashboards summarizing key KPIs.
7. Cost Optimization:
○ Identifies inefficiencies and unnecessary expenses.
○ Example: Streamlining inventory levels based on real-time demand.
8. Challenges:
○ High initial cost, data integration complexities, and user training requirements.

7. Explain Data Warehouse and Data Mart in an organization.

1. Data Warehouse Overview:


○ A centralized repository storing integrated data from various sources.
○ Example: A retail chain’s warehouse holding sales data from all branches.
2. Purpose:
○ Provides comprehensive insights for decision-making and strategic planning.
○ Example: Consolidating data to analyze company-wide performance trends.
3. Data Mart Overview:
○ A smaller, subject-specific subset of a data warehouse.
○ Example: A sales department data mart focusing on product sales data.
4. Usage:
○ Data warehouses serve organization-wide needs; data marts cater to
departmental requirements.
5. Integration with BI Tools:
○ Both systems work with tools like Tableau or Power BI for visualization and
analysis.
6. Real-Time Applications:
○ Warehouses are used for long-term trend analysis, while data marts provide
quick insights for immediate decisions.
7. Advantages:
○ Warehouses offer a holistic view of organizational data; data marts ensure faster
query responses.
8. Example Use Cases:
○ Warehouse: Bank analyzing customer transactions for fraud detection.
○ Data Mart: Marketing team analyzing the performance of a recent campaign.

Comparison Question: Data Warehouse vs. Data Mart


Feature Data Warehouse Data Mart

Definition Centralized repository for Subset of a data warehouse for a


organization-wide data department

Scope Enterprise-level Department or function-level

Complexity Complex due to multiple data sources Simpler, focused on specific needs

Speed Slower for querying due to data size Faster as it handles smaller
datasets

Cost Higher due to scale Lower, limited infrastructure


requirements

Purpose Strategic decision-making Tactical decision-making

Examples Company-wide sales trends analysis Marketing campaign performance


Data Integrates multiple systems (ERP, Focuses on specific data (e.g.,
Integration CRM, etc.) sales data)

Module 3,

1. Evaluate the role of Confidentiality, Integrity, and Availability (CIA) in


achieving security.

1. Confidentiality:
○ Ensures that sensitive data is accessible only to authorized individuals.
○ Techniques: Data encryption, multi-factor authentication, and access controls.
○ Example: Encrypting customer credit card details during online transactions.
2. Integrity:
○ Ensures data accuracy and prevents unauthorized modifications.
○ Techniques: Digital signatures, hash functions, and checksums.
○ Example: Validating file integrity during software downloads using hash values.
3. Availability:
○ Ensures data and systems are accessible to authorized users when needed.
○ Techniques: Redundant systems, disaster recovery plans, and load balancers.
○ Example: Maintaining 99.9% uptime for an e-commerce website during peak
hours.
4. Interdependence:
○ A failure in one area (e.g., breach of confidentiality) can compromise the other
two.
5. Role in Organizations:
○ Guides the development of secure systems and policies.
○ Example: Implementing a secure VPN for remote employees.
6. Challenges:
○ Balancing security with usability. For instance, strict password policies may
frustrate users.
7. Technological Support:
○ Tools like firewalls, IDS/IPS, and backup systems ensure CIA principles are
upheld.
8. Case Study:
○ A bank using multifactor authentication (confidentiality), transaction logs
(integrity), and failover servers (availability).

2. Identify measures to improve cybersecurity with people. (5M)

1. Awareness Training:
○ Educate employees about phishing, social engineering, and secure practices.
○ Example: Regular workshops on recognizing fraudulent emails.
2. Strong Authentication:
○ Enforce multi-factor authentication to enhance login security.
○ Example: Google Authenticator or SMS-based OTPs.
3. Defined Policies:
○ Implement clear cybersecurity policies for acceptable device use and data
handling.
4. Access Control:
○ Use role-based access to limit data exposure.
○ Example: Only finance staff access payroll data.
5. Incident Reporting Mechanisms:
○ Encourage employees to report suspicious activities immediately.
○ Example: Hotline or anonymous reporting systems.
6. Password Management:
○ Train employees to use strong, unique passwords and update them regularly.
○ Example: Promoting password managers like LastPass.
7. Social Engineering Defense:
○ Teach employees to verify requests, especially for financial or sensitive actions.
8. Periodic Audits:
○ Regularly review user behavior and security compliance.

3. Major security threats to information security and their control measures.

1. Phishing Attacks:
○ Deceptive emails or websites trick users into revealing sensitive data.
○ Control: Awareness training, email filtering, and anti-phishing tools.
2. Ransomware:
○ Malware encrypts data and demands payment for release.
○ Control: Regular backups, endpoint protection, and avoiding suspicious
downloads.
3. Insider Threats:
○ Employees misusing their access to compromise data.
○ Control: Role-based access, activity monitoring, and behavioral analytics.
4. Denial of Service (DoS):
○ Attacks overwhelm systems, causing downtime.
○ Control: DDoS protection, load balancing, and redundancy.
5. Weak Passwords:
○ Easily guessable or reused passwords lead to unauthorized access.
○ Control: Enforce strong passwords and implement multi-factor authentication.
6. Man-in-the-Middle (MitM) Attacks:
○ Interception of communication between two parties.
○ Control: Use secure protocols like HTTPS and VPNs.
7. Data Breaches:
○ Unauthorized access to sensitive information.
○ Control: Encrypt data, deploy intrusion detection systems, and monitor logs.
8. Examples:
○ The Equifax breach (2017) exposed personal information of 147 million people.

4. Define information security with an example. (5M)

1. Definition:
○ Information security (InfoSec) is the practice of protecting information systems
and data from unauthorized access, use, disclosure, disruption, or destruction.
2. Core Principles:
○ Based on the CIA triad: Confidentiality, Integrity, and Availability.
3. Purpose:
○ Safeguards organizational assets, ensuring operational continuity and trust.
4. Example:
○ A healthcare system encrypting patient medical records to comply with HIPAA
regulations and prevent data breaches.
5. Common Threats:
○ Phishing, malware, insider threats, and physical theft.
6. Technological Tools:
○ Firewalls, encryption, multi-factor authentication, and secure backups.
7. Importance:
○ Protects sensitive information, builds customer trust, and ensures compliance
with laws.
8. Real-World Use:
○ E-commerce platforms implementing SSL certificates to secure customer
transactions.

5. Is security an ethical responsibility? Justify with a case study.

1. Ethical Responsibility:
○ Organizations have a moral duty to safeguard stakeholders' sensitive data.
2. Legal Compliance:
○ Security measures align with laws like GDPR, HIPAA, and CCPA.
3. Customer Trust:
○ Secure systems foster loyalty and confidence among users.
4. Case Study – Facebook-Cambridge Analytica Scandal:
○ Incident: Facebook failed to protect user data, which was exploited for political
campaigns.
○ Impact: Loss of public trust, regulatory fines, and reputational damage.
○ Lesson: Ethical lapses in security can lead to legal and financial repercussions.
5. Benefits of Ethical Security Practices:
○ Reduces breach risks, enhances brand reputation, and ensures long-term
sustainability.
6. Challenges:
○ Balancing cost with security investments and managing user experience.
7. Examples of Best Practices:
○ Transparent data policies, routine audits, and ethical hacking to identify
vulnerabilities.
8. Conclusion:
○ Security is an ethical and strategic necessity in today’s digital landscape.

6. Types of controls to achieve security.

1. Preventive Controls:
○ Aim to stop incidents before they occur.
○ Example: Firewalls, anti-malware software, and access controls.
2. Detective Controls:
○ Identify security breaches and generate alerts.
○ Example: Intrusion Detection Systems (IDS) and log monitoring tools.
3. Corrective Controls:
○ Address incidents and restore systems to normal operation.
○ Example: Backups for data recovery after ransomware attacks.
4. Physical Controls:
○ Protect physical assets and infrastructure.
○ Example: Security cameras, biometric access, and locked server rooms.
5. Administrative Controls:
○ Policies, procedures, and training to guide secure behavior.
○ Example: Acceptable use policies and employee training programs.
6. Technical Controls:
○ Technology-based solutions for securing data.
○ Example: Encryption, VPNs, and secure coding practices.
7. Compensating Controls:
○ Alternative measures when primary controls are not feasible.
○ Example: Manual audits when automated systems are unavailable.
8. Integration:
○ Combining multiple controls (e.g., preventive and detective) strengthens security.

Module 4
1. Analyze briefly to highlight the difference between Web 2.0 and Web 3.0.
(5M)

1. Definition:
○ Web 2.0: The "social web," focusing on user-generated content, interactivity, and
collaboration.
○ Web 3.0: The "semantic web," emphasizing decentralization, AI-driven services,
and personalized experiences.
2. Control:
○ Web 2.0 platforms are centralized, controlled by companies like Facebook or
Google.
○ Web 3.0 is decentralized, built on blockchain for user autonomy.
3. Interactivity:
○ Web 2.0 enables sharing and collaboration (e.g., social media).
○ Web 3.0 adds intelligent agents and machine learning for deeper interactivity.
4. Data Ownership:
○ Web 2.0 companies own and monetize user data.
○ Web 3.0 gives users control over their data via blockchain.
5. Technology:
○ Web 2.0 uses AJAX, HTML5, and cloud computing.
○ Web 3.0 incorporates blockchain, AI, and IoT.
6. Applications:
○ Web 2.0: Social networking, blogging, and video sharing.
○ Web 3.0: Decentralized apps (dApps), smart contracts, and tokenized platforms.
7. Examples:
○ Web 2.0: YouTube, Facebook, Twitter.
○ Web 3.0: Ethereum, Brave Browser, and decentralized finance (DeFi).
8. Impact: Web 3.0 aims for better data privacy, ownership, and a fairer internet.

Comparison Table: Web 2.0 vs. Web 3.0

Feature Web 2.0 Web 3.0

Architecture Centralized Decentralized

Data Ownership Controlled by companies Controlled by users


Technology HTML5, AJAX, cloud Blockchain, AI, IoT

Interactivity User-generated content Machine learning, AI agents

Examples Facebook, YouTube, Twitter Ethereum, Brave Browser, DeFi

Control Managed by corporations Managed by blockchain protocols

Focus Collaboration and sharing Decentralization and intelligence

Privacy Limited Enhanced via cryptography

2. What is Mobile Commerce? What are the challenges it has introduced in


business? (5M)

1. Definition:
○ Mobile commerce (m-commerce) refers to buying and selling goods or services
through mobile devices.
2. Key Features:
○ Location-based services, real-time transactions, and personalized notifications.
3. Examples:
○ Mobile payment systems (e.g., Google Pay, Apple Pay), food delivery apps (e.g.,
Swiggy).
4. Benefits:
○ Increases accessibility, enhances convenience, and supports cashless
transactions.
5. Challenges:
○ Security Risks: Mobile devices are more vulnerable to hacking and malware.
○ Privacy Concerns: Collecting personal data for targeted ads raises ethical
issues.
○ Device Compatibility: Apps must work across various devices and operating
systems.
○ Fraud Risks: Increased instances of payment fraud and identity theft.
○ Connectivity Issues: Poor internet access in rural areas limits m-commerce
adoption.
○ High Competition: Businesses must offer unique features to stand out.
6. Future Trends:
○ AI-driven shopping assistants, augmented reality (AR) for virtual product trials,
and blockchain for secure payments.

3. What do you mean by CRM? Give its types and relate the role of social
computing in CRM.

1. Definition:
○ Customer Relationship Management (CRM) involves managing customer
interactions to enhance satisfaction and retention.
2. Types of CRM:
○ Operational CRM: Automates business processes like marketing and sales.
Example: Salesforce for managing leads.
○ Analytical CRM: Analyzes customer data for insights and trends. Example:
Tableau for sales analytics.
○ Collaborative CRM: Improves communication between teams and customers.
Example: Zoho CRM.
3. Role of Social Computing:
○ Customer Engagement: Direct interactions through platforms like Twitter or
Instagram.
○ Brand Monitoring: Social sentiment analysis tools track customer opinions.
○ Lead Generation: Social platforms act as a source of potential customers.
○ Personalization: AI and social media provide personalized recommendations.
4. Examples:
○ Starbucks uses social media for customer feedback and loyalty programs.
○ Airlines resolve customer complaints on platforms like Twitter.
5. Benefits: Builds trust, increases loyalty, and identifies emerging trends.

4. What is the need for social computing for businesses?

1. Enhanced Collaboration: Improves teamwork using platforms like Slack and Microsoft
Teams.
2. Customer Engagement: Enables direct communication with customers via social
platforms.
3. Market Insights: Provides real-time feedback and sentiment analysis.
4. Cost-Effective Marketing: Leverages organic and paid campaigns to reach a global
audience.
5. Crowdsourcing: Gathers ideas and solutions from a community or customer base.
6. Employee Advocacy: Encourages employees to promote the brand online.
7. Real-Time Crisis Management: Quickly addresses public issues, such as product
recalls or service outages.
8. Case Study Example: Nike engaging customers through interactive Instagram
campaigns.

5. How does social computing inspire customer service?

1. Real-Time Support: Platforms like Twitter and Facebook allow companies to resolve
issues promptly.
2. Feedback Mechanism: Customers can share reviews and complaints, fostering
improvement.
3. Transparency: Public resolution of issues builds trust with other customers.
4. Proactive Engagement: Businesses can anticipate customer needs through sentiment
analysis.
5. Chatbots: AI-powered chatbots provide 24/7 assistance on messaging platforms.
6. Community Building: Forums and groups encourage customers to share experiences
and solutions.
7. Personalized Service: Social platforms enable tailored responses based on user
profiles.
8. Example: Domino’s using Twitter to track and resolve delivery complaints.

6. Write a note on e-commerce. (5M)

1. Definition:
○ E-commerce refers to buying and selling goods or services over the internet.
2. Types:
○ B2B (Business-to-Business): Alibaba.
○ B2C (Business-to-Consumer): Amazon.
○ C2C (Consumer-to-Consumer): eBay.
3. Advantages:
○ 24/7 availability, global reach, and lower operating costs.
4. Challenges:
○ Cybersecurity risks, logistical complexities, and competitive pressure.
5. Technologies:
○ Payment gateways, AI for personalized recommendations, and analytics tools.
6. Future Trends:
○ Integration of AR/VR for immersive shopping and blockchain for secure
transactions.
7. Example:
○ Flipkart offering tailored discounts during the festive season.
8. Environmental Concerns: Increased packaging waste and carbon emissions from
delivery systems.

7. Develop the plan for a delivery application in M-commerce using social


computing.

Plan Outline:

1. Concept:
○ A mobile app that facilitates real-time delivery services (e.g., food, groceries,
parcels) with social computing integration.
2. Features:
○ Real-Time Tracking: GPS-based tracking of deliveries for customers.
○ User Feedback and Ratings: Customers can share experiences and rate
delivery personnel.
○ Social Media Sharing: Integration with social platforms for promotions (e.g.,
referral codes shared via Instagram or WhatsApp).
○ AI Recommendations: Personalized suggestions based on past orders.
3. Role of Social Computing:
○ Customer Engagement: Use polls, quizzes, or contests on platforms like
Instagram to interact with users.
○ Brand Advocacy: Encourage satisfied customers to post reviews on social
media.
○ Collaboration: Delivery agents can communicate via in-app chat for seamless
coordination.
4. Security:
○ Ensure secure payment gateways and privacy-compliant data sharing policies.
5. Marketing Strategies:
○ Partner with influencers to promote the app on social platforms.
6. Challenges:
○ Addressing fraudulent reviews and maintaining delivery speed in high-demand
periods.
7. Example:
○ Swiggy and Zomato using social media to engage with customers and resolve
complaints promptly.
8. Future Enhancements:
○ Augmented Reality (AR) to visualize delivery routes or product previews.

8. Explain CRM and describe the different types of CRM with examples.

1. Definition of CRM:
○ CRM involves strategies and tools to manage customer interactions and build
lasting relationships.
2. Types of CRM:
○ Operational CRM:
■ Automates business processes like sales and marketing.
■ Example: Salesforce streamlining lead generation and conversion.
○ Analytical CRM:
■ Analyzes customer data to identify trends and preferences.
■ Example: Tableau for analyzing customer purchase patterns.
○ Collaborative CRM:
■ Enhances communication across teams and with customers.
■ Example: Zoho CRM enabling email and chat integration for support
teams.
3. Applications:
○ Track customer touchpoints, personalize marketing campaigns, and measure
customer satisfaction.
4. Benefits:
○ Improves customer retention, streamlines processes, and enhances revenue.
5. Challenges:
○ High implementation costs, integration issues, and data security concerns.
6. Examples:
○ Retail: Amazon personalizing recommendations.
○ Hospitality: Marriott enhancing guest experiences through loyalty programs.
7. Social Computing in CRM:
○ Platforms like Twitter and Facebook enable real-time customer support and
engagement.
8. Future Trends:
○ AI-driven chatbots for 24/7 assistance and blockchain for secure data sharing.

9. Write a note on e-business.

1. Definition:
○ E-business refers to all forms of business conducted online, including
e-commerce and internal processes.
2. Components:
○ E-commerce: Online buying and selling.
○ Supply Chain Management: Digitally managing logistics and inventory.
○ Online Marketing: Using digital platforms to promote products/services.
3. Advantages:
○ Cost savings, global reach, and automation of repetitive tasks.
4. Challenges:
○ Cybersecurity risks, compliance with international laws, and dependence on
internet connectivity.
5. Technologies:
○ CRM tools for customer management, ERP systems for resource planning, and
analytics for decision-making.
6. Examples:
○ Amazon as a B2C e-business.
○ Alibaba supporting B2B e-business operations.
7. Future Trends:
○ Blockchain for secure supply chain management and AI for predictive analytics.
8. Environmental Impact:
○ Encouraging paperless operations but increasing digital energy consumption.

10. Compare and contrast Web 1.0, Web 2.0, and Web 3.0 with examples.

Feature Web 1.0 Web 2.0 Web 3.0

Definition Static web Social web (read-write) Semantic web


(read-only) (decentralized, AI-driven)

Control Centralized by Collaborative but still Decentralized using


owners centralized blockchain

Interaction Limited User-generated content, Intelligent interaction with


interactivity AI

Examples Static websites Social media (e.g., Decentralized apps (e.g.,


(e.g., Yahoo) Facebook, YouTube) Ethereum)

Technology HTML, HTTP AJAX, HTML5, cloud Blockchain, AI, IoT


computing
Data Owned by website Owned by platforms Owned by users
Ownership creators

Privacy Limited Better but centralized Enhanced through


cryptography

Applications Informational sites Social networking, Decentralized finance,


e-commerce smart contracts

11. How is e-commerce supported by MIS? Give one case to describe the
same. (5M)

1. Support Functions of MIS in E-Commerce:


○ Order Management: Tracks customer orders from placement to delivery.
○ Inventory Management: Ensures real-time stock updates and replenishments.
○ Customer Relationship Management (CRM): Analyzes customer behavior for
personalized marketing.
○ Payment Integration: Provides secure transaction processing.
○ Reporting and Analytics: Offers insights into sales trends and website
performance.
2. Case Study Example:
○ Amazon:
■ Inventory Management: MIS ensures real-time updates on product
availability.
■ Customer Data Analysis: Analyzes browsing and purchase history to
recommend products.
■ Logistics Tracking: Manages delivery timelines and shipment tracking.
3. Benefits:
○ Streamlines operations, reduces costs, and enhances customer satisfaction.

12. Briefly describe the risks of social computing to businesses with


examples.

1. Data Breaches:
○ Sensitive customer or business data can be exposed.
○ Example: Companies facing leaks due to poorly secured social media accounts.
2. Reputation Damage:
○ Negative posts or reviews can go viral, harming brand image.
○ Example: Airlines dealing with viral customer complaints.
3. Misinformation:
○ False information spreads quickly, creating trust issues.
4. Privacy Concerns:
○ Collecting user data for targeted marketing can lead to ethical issues.
5. Employee Misuse:
○ Inappropriate use of social media during work hours or sharing company secrets.
6. Cybersecurity Threats:
○ Social platforms are targets for phishing attacks and malware.
7. Compliance Risks:
○ Violating privacy laws like GDPR when handling customer data.
8. Example: Facebook's data-sharing scandal with Cambridge Analytica.

13. Compare mobile applications like WhatsApp and Telegram on various


parameters. (5M)

Feature WhatsApp Telegram

Ownership Owned by Meta (centralized) Independent, partly decentralized

Security End-to-end encryption for chats End-to-end encryption in secret


chats

Cloud Storage Limited; chat backups on Google Unlimited cloud storage


Drive

Group Groups up to 1024 members Supports groups with 200,000+


Features members

Data Usage Optimized for low bandwidth Consumes slightly more data
File Sharing Limited to 2GB per file Up to 2GB, unlimited storage

Multimedia Basic audio, video, and document Rich multimedia sharing options
sharing

Customization Limited themes Advanced themes and bot


integration

Module 5 :

1. List the main differences between Wireless and Wired Technology. (5M)

Feature Wired Technology Wireless Technology

Definition Uses physical cables like Ethernet or Uses electromagnetic waves for data
fiber-optic for connectivity. transmission.

Speed Generally faster and more stable. Speed depends on signal strength
and interference.

Mobility Restricted to the length of the cable. Enables mobility and portability of
devices.

Security More secure as physical access is Susceptible to hacking but can be


required. mitigated with encryption.
Installation Complex and time-consuming due to Easier and quicker to set up.
cabling.

Cost Higher initial cost for cables and Lower cost as no physical
infrastructure. infrastructure is required.

Applications Data centers, gaming setups, and IoT, smart homes, mobile networks,
offices. and public Wi-Fi.

Maintenance Difficult due to cable management. Easier, though prone to interference


issues.

2. Describe various Cloud Computing models and highlight their evolution.


(*)

1. Cloud Computing Models:


○ Infrastructure as a Service (IaaS):
■ Provides virtualized hardware like servers and storage.
■ Example: Amazon EC2.
○ Platform as a Service (PaaS):
■ Offers development platforms without managing infrastructure.
■ Example: Google App Engine.
○ Software as a Service (SaaS):
■ Delivers software over the internet.
■ Example: Microsoft 365.
2. Evolution of Cloud Computing:
○ 1990s: Emergence of virtual machines enabling resource sharing.
○ 2000s: Rise of cloud platforms like Amazon Web Services (AWS).
○ 2010s: Adoption of hybrid cloud and serverless computing.
○ 2020s: Growth of edge computing and AI-integrated cloud services.
3. Hybrid Cloud:
○ Combines public and private clouds for flexibility.
○ Example: IBM Hybrid Cloud.
4. Key Benefits:
○ Cost efficiency, scalability, and on-demand access.
5. Challenges:
○ Security risks, data compliance issues, and vendor lock-in.
6. Future Trends:
○ Quantum computing integration and sustainability-focused cloud solutions.

3. Explain the applications of computer networks. (5M)

1. Communication:
○ Enables email, instant messaging, and video conferencing.
○ Example: Tools like Zoom and Microsoft Teams.
2. Resource Sharing:
○ Allows sharing of devices like printers and scanners.
○ Example: Office LAN networks.
3. Data Transfer:
○ Facilitates fast file sharing across devices.
○ Example: Cloud storage services like Google Drive.
4. E-Commerce:
○ Powers online shopping platforms and secure payment gateways.
○ Example: Amazon, PayPal.
5. IoT Integration:
○ Connects smart devices for automation in homes and industries.
○ Example: Smart thermostats and security cameras.
6. Healthcare:
○ Supports telemedicine, patient monitoring, and medical imaging systems.
7. Education:
○ Enables virtual learning, collaborative research, and online courses.
○ Example: Platforms like Coursera and Moodle.
8. Entertainment:
○ Facilitates online gaming, video streaming, and social media.
○ Example: Netflix, YouTube.

4. What is Cloud Computing? Explain its models.

1. Definition:
○ Cloud computing delivers IT resources (e.g., servers, storage, software) over the
internet on a pay-as-you-go basis.
2. Models of Cloud Computing:
○ Infrastructure as a Service (IaaS):
■ Provides hardware infrastructure virtually.
■ Example: Azure Virtual Machines.
○ Platform as a Service (PaaS):
■ Offers development tools and platforms for building applications.
■ Example: Heroku.
○ Software as a Service (SaaS):
■ Provides software applications over the internet.
■ Example: Dropbox.
3. Deployment Types:
○ Public Cloud: Shared resources accessible to multiple users. Example: AWS.
○ Private Cloud: Dedicated resources for a single organization. Example:
VMware.
○ Hybrid Cloud: Combines public and private clouds.
4. Advantages:
○ Scalability, cost savings, and remote access.
5. Challenges:
○ Data security concerns, potential downtime, and compliance issues.
6. Applications:
○ Startups using IaaS to avoid infrastructure costs.
○ SaaS for productivity tools like Google Workspace.
7. Future Trends:
○ Serverless computing and AI-driven cloud management.

5. Analyze the key benefits of cloud computing.

1. Cost Efficiency:
○ Reduces upfront investments in hardware and software.
2. Scalability:
○ Resources can be scaled up or down based on demand.
○ Example: E-commerce platforms during sales events.
3. Accessibility:
○ Enables remote access to resources from anywhere.
○ Example: Employees accessing files via cloud storage.
4. Disaster Recovery:
○ Ensures quick recovery of data and applications during failures.
○ Example: Cloud backups after ransomware attacks.
5. Collaboration:
○ Supports real-time collaboration on projects.
○ Example: Google Docs allowing multiple users to edit simultaneously.
6. Automatic Updates:
○ Software updates and maintenance are handled by the provider.
7. Eco-Friendly:
○ Shared infrastructure reduces energy consumption.
8. Innovation:
○ Facilitates adoption of emerging technologies like AI and Big Data analytics.
Module 6 :

1. Write a short note on TPS and ERP.

1. Transaction Processing System (TPS):


○ Definition: Handles routine, repetitive business transactions like payroll and
order processing.
○ Example: Retail POS systems that record sales transactions.
○ Features:
■ High volume of transactions.
■ Real-time or batch processing.
■ Ensures data integrity and accuracy.
○ Applications: Banking (ATM transactions), inventory management, and billing
systems.
2. Enterprise Resource Planning (ERP):
○ Definition: Integrates all core business processes into a unified system.
○ Example: SAP ERP managing finance, HR, and supply chain operations.
○ Features:
■ Real-time data sharing across departments.
■ Scalable and customizable for different industries.
○ Applications: Manufacturing (production planning), healthcare (patient
management).
3. Key Differences:

Feature TPS ERP

Focus Handles daily transactions Integrates business


processes

Scope Department-specific Organization-wide

Examples POS, payroll systems SAP, Oracle ERP

Data Handling Real-time or batch Real-time data integration


processing
Users Operational staff Managers and executives

2. Describe the tools that augment the traditional SDLC.

1. Prototyping Tools:
○ Allow early visualization of system design to gather feedback.
○ Example: Figma for UI/UX prototypes.
2. CASE Tools (Computer-Aided Software Engineering):
○ Automate SDLC activities like modeling and code generation.
○ Example: Rational Rose for UML modeling.
3. Version Control Systems:
○ Track changes in source code.
○ Example: Git and GitHub.
4. Automated Testing Tools:
○ Streamline testing for performance and functionality.
○ Example: Selenium for web application testing.
5. Integrated Development Environments (IDEs):
○ Provide a unified platform for coding, debugging, and deployment.
○ Example: IntelliJ IDEA.
6. Project Management Tools:
○ Help in tracking SDLC progress and resource allocation.
○ Example: Jira for Agile workflows.
7. Collaboration Tools:
○ Enhance team communication during development.
○ Example: Microsoft Teams or Slack.
8. DevOps Tools:
○ Facilitate continuous integration and delivery (CI/CD).
○ Example: Jenkins.

3. Compare and contrast basic types of reports associated with FAIS and
ERP systems.

Feature FAIS Reports ERP Reports


Focus Department-specific insights Organization-wide performance
analysis

Data Scope Limited to functional areas (e.g., Integrates data across multiple
HR, sales) departments

Customization Highly customizable for Standardized for consistency


departmental needs

Timeliness Periodic (daily, weekly, monthly) Real-time updates

Examples Sales reports, inventory updates Financial statements, supply


chain efficiency

Technology Used Standalone tools or legacy Modern ERP platforms (e.g.,


systems SAP)

Decision-Making Tactical decisions for department Strategic decisions for executives


Support heads

Integration Limited integration with other Fully integrated with business


systems processes

4. Write a short note on Blockchain for DeFi.

1. Definition:
○ Blockchain is a decentralized ledger ensuring transparency, immutability, and
security for decentralized finance (DeFi) applications.
2. Key Features:
○ No intermediaries (e.g., banks).
○ Automated transactions via smart contracts.
○ Transparency ensures all transactions are visible on the blockchain.
3. Use Cases in DeFi:
○ Peer-to-peer lending platforms (e.g., Aave).
○ Decentralized exchanges (e.g., Uniswap).
○ Stablecoins pegged to fiat currencies (e.g., USDT).
4. Advantages:
○ Reduced transaction costs.
○ Global accessibility to financial services.
○ Enhanced security with cryptography.
5. Challenges:
○ Regulatory uncertainties, scalability issues, and smart contract vulnerabilities.
6. Example: Ethereum as a blockchain hosting DeFi applications.

5. Write a short note on DeFi Architecture.

1. Definition:
○ DeFi architecture consists of layers of decentralized applications (dApps) built on
blockchain infrastructure.
2. Components:
○ Blockchain Layer: Provides the foundational decentralized ledger (e.g.,
Ethereum).
○ Protocol Layer: Includes DeFi protocols like Aave for lending or Uniswap for
trading.
○ Application Layer: User-facing interfaces like wallets (e.g., MetaMask).
○ Aggregation Layer: Combines data from multiple dApps for a unified experience
(e.g., Zapper).
3. Key Features:
○ Interoperability between DeFi platforms.
○ Transparency through open-source protocols.
4. Applications:
○ Yield farming, decentralized insurance, and liquidity pools.
5. Challenges: High gas fees, user complexity, and scalability issues.

6. Write a short note on the role of Smart Contracts in DeFi.

1. Definition:
○ Smart contracts are self-executing programs on a blockchain that automate
transactions based on predefined rules.
2. How They Work:
○ Encoded with conditions like “if X happens, execute Y.”
○ Example: Automatically release loan collateral once repayment is complete.
3. Applications in DeFi:
○ Lending platforms: Manage collateral and repayments (e.g., Compound).
○ Decentralized exchanges: Facilitate trustless token swaps (e.g., Uniswap).
○ Insurance: Automate claims processing.
4. Advantages:
○ Eliminates intermediaries, reducing costs.
○ Provides transparency and trust through immutable code.
5. Challenges:
○ Bugs or vulnerabilities in code can be exploited.
○ Lack of legal frameworks for dispute resolution.
6. Examples: Smart contracts deployed on Ethereum power DeFi platforms like
MakerDAO.

Extras :

1. How is data governance achieved in MIS? (5M)

1. Definition:
○ Data governance involves policies, processes, and technologies to manage data
availability, usability, integrity, and security in MIS.
2. Key Steps:
○ Policy Development: Define rules for data management, security, and privacy.
○ Ownership Assignment: Assign data stewards to oversee data accuracy and
compliance.
○ Access Control: Implement role-based access permissions to ensure only
authorized users can access specific data.
○ Data Quality Management: Use tools to monitor and correct inaccuracies.
3. Technology Integration:
○ Use ETL (Extract, Transform, Load) tools and data catalogs for consistent
integration.
○ Example: IBM InfoSphere or Alation for data governance.
4. Regular Audits:
○ Conduct periodic checks to ensure adherence to governance policies.
5. Compliance:
○ Align data governance practices with regulations like GDPR, HIPAA, or CCPA.
6. Example:
○ A bank using MIS to ensure customer transaction data is accurate, encrypted,
and accessible only to relevant teams.
7. Benefits:
○ Improves decision-making, ensures data security, and builds stakeholder trust.
2. Evaluate the MIS hierarchy to comment on Decision Support Systems
(DSS). (5M)

1. MIS Hierarchy Overview:


○ Operational Level: Uses TPS for routine tasks like order processing.
○ Managerial Level: Employs MIS to generate structured reports for mid-level
management.
○ Strategic Level: Leverages DSS and ESS for high-level decision-making.
2. Role of DSS in Hierarchy:
○ Bridges the gap between operational and strategic systems by providing tools for
semi-structured decisions.
○ Integrates real-time and historical data to generate actionable insights.
3. Features of DSS:
○ What-if analysis, predictive modeling, and decision trees.
○ User-friendly interfaces with interactive dashboards.
4. Applications:
○ Supply chain optimization, financial risk analysis, and market forecasting.
5. Importance:
○ Enhances agility in decision-making and reduces uncertainty.
6. Case Study Example:
○ Airlines using DSS to adjust ticket pricing based on demand and competitor
pricing.

3. Categorize the approach to managing information across an entire


organization.

1. Centralized Approach:
○ All data is stored and managed from a single repository.
○ Advantages: Ensures consistency, reduces duplication, and simplifies
governance.
○ Disadvantages: Bottlenecks in access and increased dependency on
centralized systems.
○ Example: ERP systems integrating all departments.
2. Decentralized Approach:
○ Departments manage their own data independently.
○ Advantages: Greater flexibility and faster access.
○ Disadvantages: Risk of data silos and inconsistencies.
○ Example: Independent CRM systems for each sales region.
3. Hybrid Approach:
○ Combines centralized governance with decentralized operations.
○ Advantages: Balances efficiency with departmental autonomy.
○ Example: Cloud-based data lakes with department-specific analytics tools.
4. Key Technologies:
○ Data warehouses, cloud platforms, and collaboration tools.
5. Best Practices:
○ Establish clear policies, use integration tools, and promote collaboration.

4. Identify five factors contributing to the increasing vulnerability of


information resources with examples. (5M)

1. Increased Connectivity:
○ More devices and networks create a larger attack surface.
○ Example: IoT devices in smart homes vulnerable to hacking.
2. Human Errors:
○ Employees accidentally exposing sensitive data.
○ Example: Clicking on phishing emails leading to ransomware attacks.
3. Sophisticated Cyber Threats:
○ Hackers using advanced malware and zero-day exploits.
○ Example: WannaCry ransomware attack.
4. Data Proliferation:
○ Growing data volumes make security and governance challenging.
○ Example: Unsecured cloud storage exposing customer records.
5. Third-Party Risks:
○ Outsourcing to vendors with weaker security standards.
○ Example: SolarWinds supply chain attack compromising government systems.
6. Inadequate Updates:
○ Failure to patch outdated software leaves systems vulnerable.
○ Example: Exploits in unpatched legacy systems.

5. Explain the phases of the System Development Life Cycle (SDLC) with
examples.

1. Planning:
○ Define project scope, objectives, and feasibility.
○ Example: Analyzing the need for a new payroll system.
2. Analysis:
○ Gather and document user requirements.
○ Example: Interviewing HR staff to identify desired features.
3. Design:
○ Develop system architecture and UI prototypes.
○ Example: Wireframing an e-commerce site.
4. Development:
○ Write code and build the system.
○ Example: Developing a database for order processing.
5. Testing:
○ Ensure the system meets requirements and functions as expected.
○ Example: QA testing an inventory management system.
6. Implementation:
○ Deploy the system and train users.
○ Example: Rolling out an ERP system in phases.
7. Maintenance:
○ Provide ongoing support and updates.
○ Example: Fixing bugs in a CRM after feedback.

6. Explain the steps involved in knowledge capturing.

1. Identify Knowledge Sources:


○ Locate tacit (experience-based) and explicit (documented) knowledge.
2. Extract Knowledge:
○ Use interviews, observations, or surveys to capture tacit knowledge.
3. Document Knowledge:
○ Convert tacit knowledge into explicit formats, such as manuals or databases.
4. Organize Knowledge:
○ Categorize and structure knowledge for easy access.
5. Store Knowledge:
○ Use repositories like knowledge management systems (KMS).
○ Example: SharePoint or Confluence for organizational documentation.
6. Validate Knowledge:
○ Verify accuracy and relevance with subject matter experts.
7. Update Regularly:
○ Ensure knowledge remains current with regular reviews.

7. Features of an Executive Support System (ESS). (5M)

1. High-Level Summarization:
○ Provides key performance indicators (KPIs) and strategic insights.
2. Real-Time Data:
○ Access to up-to-date information for quick decision-making.
3. Drill-Down Capabilities:
○ Allows users to explore detailed data behind high-level metrics.
4. Visualization Tools:
○ Graphs, dashboards, and charts for easy interpretation.
5. Scenario Analysis:
○ Enables what-if simulations for strategic planning.
6. Integration:
○ Pulls data from multiple systems like ERP, CRM, and BI tools.
7. Ease of Use:
○ Simple interfaces designed for executives with limited technical expertise.
8. Examples:
○ Corporate dashboards showing sales trends and financial health.

8. Are blogs and wikis different? Justify with applications. (5M)

Feature Blogs Wikis

Purpose Share opinions or updates Collaborative knowledge creation


chronologically

Content Single author or small group Open to multiple contributors


Control

Editing Limited to original authors Editable by authorized users

Applications Marketing, personal journaling Internal documentation, knowledge


bases

Examples WordPress blogs Wikipedia, corporate wikis

Structure Chronological Non-linear with cross-linking

You might also like