You are on page 1of 7


NAME MB0047- MANAGEMENT INFORMATION SYSTEM BK ID B1630 CREDIT 4 MARKS 60 Note: Answer all questions. Kindly note that answers for 10 marks questions should be approximately of 400 words. Each question is followed by evaluation scheme.

Q.No 1 1 Professor A. Van Cauwenbergh of Antwerp University, in a paper presented at the Tenth
Anniversary Conference of the European Institute for Advanced Studies in Management, presented four revisions to traditional Management Theory. In summary, the revisions are: (1) The initiative for the renewal and adjustment of the activities of a firm should come from the different levels in the management hierarchy. Strategy is not a privilege of top management. (2) Firms, especially big firms, are incoherent systems (goals of the different component systems are not simply subdivisions of an overall goal; there are individual, conflicting goals as well). Some of these differences are manifestations of organizational initiative and vitality. Using information systems and central planning and rule-making to suppress all differences is destructive to organizations. (3) The most vital fluid of an enterprise is the aggregate of its entrepreneurial values. The most fundamental and motivation and control come through these shared values relative to work, quality, efficiency, etc. Management often neglects these values and assumes that the collection and dissemination of information will provide sufficient motivation and control. (4) Enterprises are open systems; their structure and operating processes are determined by their environment. This means organizations must be designed to continually adjust to the environment. a. If these revisions are correct, how is planning to be organized? b. How should the information system support the planning organization? A a. Explaining the organizational planning process with diagram Answer:Following are the organizational planning process:Analysis the situation and need for planning Forest development in all aspects Evaluate and re evaluation task accomplishments and resources available

Team bulding and models, tools and techniques environment Vision mission policies objective environment Formation and development of MIS Organization planning of MIS b. Guidelines for planning MIS : Make a provisions in the systems. Carryout alternative plans as recognised in the objectives Compare the systems plan with the organisations plan and ensure changes accordingly. Format the plane of the system, document them,and present to top management. Construct a tool or technique for reviewing or alternative if required. Formulate a system for processing the collected data Allot the responsibility and authority for planning Allot finance for this purpose.

Comparing MIS plan and Business Plan (atleast two) :Business plane Business goals, business plan and strategy

Strategy planning and decisions.

MIS plan Management information system- objective are consistent with the business goals and objective. Information strategy for the business plan implementation plays a supportive role

Explaining significant problem of the Lewis model The significant problem in this model is the resistance to change. the resistance can occur due to three reasons, which are the internal factors, design factors and users attitude. Users resist change as they are habituated to the system. If they are asked to use another system which they are not familiar with, then opposition emerges. It is here , that education, training and motivation will help. Q-2 Information Technology and Computers have brought information age. The spread of Internet & relative ease of access made Information Breach easier. Our future is not secure, if our information is not secure. Information Resources need to be guarded, protected and controlled. List the precautionary measures to be considered to prevent cybercrime? Listing any 5 measures to prevent cyber crime


Use passwords to prevent unauthorised use of the business information system. Also enforce the users to adopt a password which is of certain length, contains special characters , uppercase and lowercase letters by implementing a security. Use a firewall to prevent the employees from accessing risky sites and downloading certain types of file. 2. Encrypt (scramble ) sensitive business data to prevent it falling in to wrong hands. for example customer credit card number and password is encrypted to prevent it being captured by spyware on the internet. Even the data on employees portable system like laptops can be encrypted. In case it gets stolen or lost the firm loses only the hardware asset of laptop but safeguards the business data. 3. Ask the it department to track bug reports and patches to reduce the chances of malware like DoS ,worms, virus and Trojan horses from sneaking in. 4. To detect and delete malware install special malware detection software such as antivirus(ex. Microsoft security essential, Avira and AVG),spyware sweepers( ex.Ad-aware,Symantec). Also enable automatic updates so that new virus definition are used for scanning the system periodically. 5. Training the employees not to download email attachment and open them for E.g. the i love you virus arrives in an email with the subject i love you. It contains a VBSript program which when double clicked does its job of forwarding itself to contact in your outlook address book and deleting files on your system. when ever a new technology or IS is bought in analysie the risks and threats associated with it and update the plan accordingly. Q-3 A - While implementing MIS in any organization change can occur in number of ways. List and explain the steps in the process as suggested by Lewins model. B- Compare between prototype approach and Life Cycle approach Write short note on Answer:The lewins model suggest the three steps in this process:The first step is to communicate openly within the organisation. This makes everyone in the organisation look forward to the new system or the changes with a sense of pride. 2. The second step is to outline a list of activities specifying when they being reach the desired level of stability. 3. The third step is refreezing and reinforcing . this process is often implemented through an external change agent. such as a consultant playing the role of a catalyst. Compare between prototype approach and Life Cycle approach:1.

Prototype Approach Open system with a high degree uncertainly about the information

Necessary to try out the ideas, application and efficiency of the information as a decision support.

Life cycle approach Closed system with little or no uncertain about the information needs. the system remains valid for along time with no significant change. the design would remain stable. No need to try out the application of the information as it is already proven.

Q- 4 There is an information explosion in todays society. There are lot of advantages of DBMS like proper maintenance of the data and maintaining security. Explain the process of data transition using diagram and an example of your own.

Answer:The following are databases commonly used in the organisation. Flat file Hierarchical database Relationship database Operational database Distributional database External database Object oriented database Flat file :-flat file consists of set of strings in one o r more files that can be taken a part to get the information. The data can be separated by a simple comma for a small data store and or by a tab if the data is complex. For instance, a flat model database containing only zip codes. Hierarchical database:Hierarchical database resembles a tree structure. In this database, each link is nested in order to keep data organised in a particular order on a same level list. Relational database :The relational database represents the database as a collection of relations having a set of raws and columns, each of which is assigned a unique name. Operational database :As the name suggests it support the business operational of the organisation, by storing all the details od current business transactions. for example a customer database contains all information pertaining to name, product purchased. Distributional database:Distributional database allows parts of it to be duplicated and circulated to network servers called nodes at different locations. the network servers could be on the extranet, intranet or the internet network. External database:

External database refers to the wealth of information available for free or for payment on the could be statical in formation from government from government portals or newspapers magazines. Object oriented database:An object oriented database incorporates all objects. it also referred to object database management system. Attributes- these are the data that defines the objects characteristic. the data are very simple and may be numbers, strings, and integers etc. Methods this defines the object behaviour and is also referred to as procedure. Q-5 write a short note a. World wide web :The world wide web is a huge set of interlinked documents, images and other resources, linked by hyperlinks and URLs. These hyperlinks and URLs allow the web servers and other machines that store originals and cached copies of these resources to deliver them asrequired using Hypertext transfer Protocol. HTTP is only one of the communication Protocols used on the internet. Web services also use HTTP to allow software systems to communicate in order to share and exchange business logic and data.

b. Voice over IP:VoIP stands for Voice over IP, where IP refers to the internet Protocol that underlies all internet communication. This phenomenon began as an optional two-way voice extension to some of the instant messaging systems in business across the world. in recent years many VoIP systemshave become easy and convenient to use as a normal telephone. The benefit is that, as the internet carries the actual voice traffic, VoIP can be free or cost much less than the normal telephone call, especially over a long distance and especially for those with always on internet connection. Thus ,VoIP is maturing in to a viable alternative to traditional telephones. Also interoperability between different providers has improved . c. Intranet :It is a private computer network. intranet uses internet protocols and network connectivity to securely share part of an organization s information or operations with its employees .intranet is generally restricted to employees of an organization. The advantages of the intranet. Increased the productivity: intranet can help users to locate and view information faster and use applications relevant to their roles and responsibilities. Reduced time :-with intranet , organization can make more information available to employees in less time.

Improved communication :-intranet can serve as powerful tools for communication within an organization ,vertically and horizontally. Web publishing :- web publishing allows cumbersome corporate knowledge to be maintained and easily accessed throughout the company using hyperlink and web technologies. Business operation and management:- intranet are also being used as platform for developing and deploying application to support business operation and decisions across the inter-networked enterprise. Cost effective :- users can view information and data via web browser rather than maintaining physical documentation across the inter-networked enterprise. Enhance collaboration :-with information easily accessible by all authorized users , teamwork is enabled.

d. Extranet :An extranet is a private network that uses internet protocols, network connectivity and possibly public telecommunication system to securely share a part of an organization information or operation with suppliers. an extranet requires security and privacy. These can include firewalls server management , the issue and use of digital certificates or similar means of user authentication, encryption of massages. there are variety of commercial extranet applications, some of which are for pure file management . Companies can use and extranet to :Exchange large volumes of data using electronic data interchange(EDI) Share product catalogues exclusively with wholesalers or those in the trade Collabora.

Q- 6 Artificial intelligent system functions like a human being and helps a manager in taking quick decisions. Explain the different applications AI using diagram. A a. Diagram b. Applications of cognitive science c. Applications of robotics d. Applications of natural interface e. Explaining each type with an example

Answer:Artificial intelligence can understand, examine , and resolve problem. Such system that uses the ingredients artificially is known as artificial intelligent system. Artificial intelligent is an area of science and technology based on the filed that come under computer science, biology, psychology, mathematics and engineering.

Cognitive science application Expert system Learning system Fuzzy logic Genetic algorithms Neural network Intelligent agent

Artificial intelligent Robotic application Visual perception Tactility Dexterity Locomotive navigation

Natural interface application Natural languages Speech recognition Multi sensory interface Virtual reality

Applications of cognitive science:Cognitive science is nothing but the mental presentations correspondent to computer data structure, and computational processes similar to computational algorithms. Applications of robotics;Engineering and physiology are the basic subjects of robotics. robotic machine are produced using robotic application along with the computer intelligence and physical movement are controlled by computers. The robotic application are developed in such away to give power to robot to view, feel and physical movement. The robotic application also enables the robot to walk in any terrain and helps the robot to navigate and reach the destination correctly. Applications of natural interface:the development of natural interfaces is indispensable to the use of computer by people. Development of normal language and speech recognition are major thrusts in this area of AI. The goal of AI research is to make the computer and robot to talk and understand each other through conversational language as practiced by human beings. Other natural interface research application include the development of multi sensory device that utilise the body movement to control computers. This is related to the emerging are of virtual reality involves using multi sensory human computer interface that enables human users to experience computer simulated objects, space , activities and words as if they actually exist.