You are on page 1of 12

Internal Assignment No :- 1 Paper Title :- Management Information System

1. i) what are the characteristic of internal and external information that is used in
managerial decision making ?
The Internal Analysis of strengths and weaknesses focuses on internal factors that give an organization certain
advantages and disadvantages in meeting the needs of its target market. Strengths refer to core competencies that give
the firm an advantage in meeting the needs of its target markets,
The following area analyses are used to look at all internal factors effecting a company:

• Resources: Profitability, sales, product quality brand associations, existing overall brand, relative cost of this new

product, employee capability, product portfolio analysis

• Capabilities: Goal: To identify internal strategic strengths, weaknesses, problems, constraints and uncertainties
The External Analysis takes a look at the opportunities and threats existing your organizations environment. Both
opportunities and threats are independent from the organization.

• Customer analysis: Segments, motivations, unmet needs


• Competitive analysis: Identify completely, put in strategic groups, evaluate performance, image, their objectives,

strategies, culture, cost structure, strengths, weakness

• Market analysis: Overall size, projected growth, profitability, entry barriers, cost structure, distribution system,

trends, key success factors

• Environmental analysis: Technological, governmental, economic, cultural, demographic, scenarios, information-

need areas Goal: To identify external opportunities, threats, trends, and strategic uncertainties.

2. ii) What are the support function provided by decision support system ?
Ans. :- A decision support system (DSS) is a computer-basedinformation system that supports business or
organizationaldecisionmaking activities. DSSs serve the management, operations, and planning levels of an organization
(usually mid and higher management) and help people make decisions about problems that may be rapidly changing and
not easily specified in advance—i.e. Unstructured and Semi-Structured decision problems. Decision support systems can be
either fully computerized, human-powered or a combination of both.

DSS by its characteristics:

1. DSS tends to be aimed at the less well structured, underspecified problem that upper level managers typically face;
2. DSS attempts to combine the use of models or analytic techniques with traditional data access and retrieval functions;
3. DSS specifically focuses on features which make them easy to use by noncomputer people in an interactive mode; and

4. DSS emphasizes flexibility and adaptability to accommodate changes in the environment and the decision makingapproach
of the user

iii) What are the application of Artificial Intelligence System?


Artificial intelligence (AI) has revolutionized information technology. The new economy of information technology
has shaped the way we are living. This special issue aims to report the latest advances in every aspect of artificial
intelligence technology, including machine learning, data mining, computer vision, multiagent systems, evolutionary
computation, and fuzzy logic. Artificial neural network

• Computer vision
• Evolutionary algorithms
• Swarm intelligence
• Pattern recognition
• Image processing and
analysis
• Natural language
processing
• Global optimization
• Machine learning
• Knowledge representation
• Social intelligence
• Control theory
• Uncertain reasoning
• Mathematical tools used in

AI iv) What is ACID

Test ?

The acid-test ratio is a strong indicator of whether a firm has sufficient short-term assets to cover its
immediate liabilities. Commonly known as the quick ratio, this metric is more robust than the current ratio,
also known as the working capital ratio, since it ignores illiquid assets such as inventory.

Calculated by:

V) What is significance of ERP system?

Companies must know thoroughly what enterprise resource is planning before thinking of
implementing them. The catch word of ERP implementation is speed. The quicker it is realized the
quicker and better are the advantages and delivery in terms of results. This in the early hour
procedure has one more grasp. The returns are sought at a shorter period. This deviation from the
conventional practice has become the order of the day as far as many companies are concerned.
Previously Business Process Reengineering (BPR) played an essential role with respect to
implementation. It is significant to distinguish the components of Enterprise Resource Planning.

It is also essential to know that sheer ERP planning does not promise the profit of ERP. It has to be
implemented as planned after understanding the components of enterprise resource planning.
In spite of having improved the implementation issues what remains still and unfettered is the way
in which companies go ahead with ERP implementation.. Some issues that an organization has to
address after defining enterprise resource planning are

• Popular information systems


• Likelihood of fluctuations in the choice of technology
• The ability of market players to stay in tune with it
• The ways and means to implement a business applications like ERP
• To benefit from the same so as to gain a competitive edge
• Their usage and services
• The necessity for innovating software applications

In spite of having improved the implementation issues what remains still and unfettered is the way in
which companies go ahead with ERP implementation. They do it for the heck of it and without
following systematic procedures. In fact they don't even test the desirability of going into ERP. Some
issues that an organization has to address after defining enterprise resource planning are

• Popular information systems


• Likelihood of fluctuations in the choice of technology
• The ability of market players to stay in tune with it
• The ways and means to implement a business applications like ERP
• To benefit from the same so as to gain a competitive edge
• Their usage and services
• The necessity for innovating software applications

Q.3. Explain the various stages of System Development Life Cycle ?

The System Development is the interactive process which consists of the following stages

• Preliminary Investigation: One of the most tedious task is to recognize the real problem of the pre-installed system. The analysis has
to spend hours and days for understanding the fault in the system. This fault could have however overcome if the Preliminary Inv
estigation before installing the system was properly done. This is the first stage of the development of the system. In this stage the
analyst makes a survey by gathering all the available information needed for the system elements and allocation of the requirements to
the software.

• Analysis of the requirement: The analyst understands the nature of the information and the functions of the software which is required
for the system. The analyst makes a brief survey of the requirements and tries to analyze the performance of the system which is to be
developed. He also makes sure that he gets enough information and resources for building the appropriate system.

• System Design: The analyst actually makes number of designs of the system on paper or on the computer and sees to it that the rough
image made of the system comprises of all the requirements or not. Once this is done, the analyst selects and finalizes a best suited
design for the development of the system.

• System Coding: The analyst translates the code or the programs in such a way that they become in machine readable form. The
coding

step is very time consuming and involves number of rooms for errors.

• System Testing: Once the analyst is through with the coding stage he tests the systems and sees to it that it is working as per the
expectations or not. He corrects the flaws in the system if any.

• System Implementation: This is one of the most vital phase as in this phase the analyst actually gives the system to the customer and
expects for a positive feedback.
• System Maintenance: The last stage of the SDLC is that the analyst needs to maintain the system and see to it that it working within
the standards set. He needs to maintain the system by removing the defects of flaws occured.

Q.4. What are the different type of threats to companies Intranet ?


Common Intranet Security Issues.

Here is a list of 10 intranet security issues and what a user and organization do to resolve them:

1. Network security threats. Internal and external threats are common. Some are deliberate threats while others are not. It's best to use a firewall
and some sort of security software like McAfee Network Threat Response.

• 2. Security breaches. There are times when an intranet will encounter suspicious traffic, such as spam, phishing, spyware, adware and malware, so
deploying an effective email filter (and firewall) can help block the suspicious traffic from entering the network.
3. Network attacks. There have been several cases reported of an intranet being attacked. A network-based intrusion prevention system (IPS) or an
intrusion detection prevention system (IDPS) can offer great protection. They also can be deployed for monitoring network traffic and detecting and preventing
well-known threats and attacks.
4. Unauthorized access. This happens much too often when an internal or external user (not authorized) gains access to data and corporate information
stored on an intranet. It may be wise to use some type of authentication like passwords, smart cards, or biometrics; in addition, to deploying a bastion host
before a user has access to the intranet.
5. Misuse of user privileges. Too often are users gaining unauthorized access to systems from the Intranet. Businesses may want to use some type of
intranet monitoring software to see what their employees are doing on the intranet or on their own PCs.

Violations of security policies. At times, users will make illegal attempt to penetrate the network without clearance and permission. Internal
users must understand what happens when someone violates the policy in attempt to protect internal IT systems on the intranet.

7. Malicious content. Intranet users are vulnerable to malicious content(viruses, worms, and Trojan Horses) that attach themselves on emails. Bus inesses
and users alike must remember to always maintain and update their security software on every PC and server on an intranet to ensure protection.
8. Usability problems. There are users who still improperly use the intranet. They do not know how to search, retrieve, send or share data and information;
often, doing more harm than good on the private network. Some users may need formal training.
9. Weak passwords. Users tend to use weak passwords, write down passwords, never change them, or forget them. Network administrators must enco
urage users to overcome these issues and have them use hard-to-guess passwords, as well as not to share them, or write them down.
10. Lack of encryption. Many times unsecured "confidential" data is shown to unauthorized users because they do not use encryption. Using SSL digit al
certificates can help secure the Intranet.
Internal Assignment No :- 2 Paper Title :- Management
Information System MBA :-- 207

Q.1) i. What is the different data transmission mode ?

Data transmission Modes in Computer Networks


Transmission mode means transferring of data between two devices. It is also called communication mode. These modes direct the
direction of flow of information. There are three types of transmission mode. They are :

• Simplex Mode

• Half duplex Mode

• Full duplex Mode

ii) How Does Lan Differs from WAN

Key Difference: LAN is a computer network that connects computers in small


areas. WAN is a network that covers a broad area using private or public
network transports.

A detailed description is available below:

LAN WAN

Definition
LAN is a computer network that WAN is a network that covers a
connects computers in small broad area using private or
areas. public network transports.
Data transfer rates
LAN offers high data transfer WAN has lower data transfer
rates. rates due to congestion

Speed 80-90 mbps 10-20 mbps

Technology LANs use technologies such as


Ethernet and Token Ring to WAN uses technologies such as
connect to other networks. MPLS, ATM, Frame Relay and
X.25 for data connection over
greater distances.

Bandwidth
High bandwidth is available for Low bandwidth available for
transmission. transmission.

Connection One LAN can be connected to


other LANs over any distance
via telephone lines and radio Computers connected to a
waves. wide-area network are often
connected through public
networks, such as the
telephone system. They can
also be connected through
leased lines or satellites.

Components Layer 2 devices like switches,


bridges. Layer 1 devices like Layers 3 devices Routers,
hubs, repeaters. Multilayer Switches and
Technology specific devices
like ATM or Frame-relay
Switches etc.

Problems LANs tend to have fewer


problems associated with them. WANs have more problems due
to the large amount of system
and data that is present.

Ownership LAN networks can be owned up


private companies or people WAN are not owned up any one
that set it up at homes. organization but exist under
collective or distributed
ownership.

Data Transmission Error


Experiences fewer data Experiences more data
transmission errors. transmission errors.
Cost Set-up costs are low as the
devices required to set up the Set-up costs are high, especially
networks are cheap. in remote locations where setup
is not done. However, WANs
using public networks are
cheap.

Spread
The network is spread to a very The network can be spread
small location. world-wide.

Maintenance costs
Maintenance costs are low as the Maintenance costs are high as
area coverage is small. the area coverage is world-

wide.

iii) What are the features of Search Engine ?

Search engine features


All accounts, free or subscription, include all the features detailed on this page.
Both free (sponsored) accounts and Super-fast setup
subscriptions get the power of our search Advanced site search engine
technology. Other search solutions have Reports track visitors' searches
Automatic site map
severely limited free versions and charge as
Automatic what's new list
much as $10,000 a year for some of these
Optional web search
features.
Complete customization
Scheduled re-indexing
FreeFind gives you the best free and
Content monitoring
subscription service available!
No fixed page limit
Ease of use
All of these powerful features are also Indexing of password-protected
available as an ad-free subscription, plus pages
you'll get the highest priority service and And much more
support.

iii) What is the role of DSS in managerial decision making?


A Decision Support System is an integrated set of computer tools allowing a decision maker to interact directly with computer
o retrieve
t information useful in

making semi structured and unstructured decisions. Example of this decisions include such things
s merger
a and acquisition decisions, plant expansion, new

product decisions portfolio management and marketing decisions.

Decision making is a fundamental managerial activity. It may be conceptualized as consisting of four stages: intelligence,
sign, de
choice and implementation.

iv.) Define ECRM ?

The eCRM or electronic customer relationship management encompasses all the CRM functions with the use of the net environment
i.e., intranet, extranet and internet. Electronic CRM concerns all forms of managing relationships with customers making use of
information technology (IT). eCRM is enterprises using IT to integrate internal organization resources and external "marketing" strategies
to understand and fulfill their customers needs. Comparing with traditionalCRM, the integrated information for eCRM intraorganizational
collaboration can be more efficient to communicate with customer

Q. 2. What are the advantages of E- commerce over traditional way of conducting business?

IRJMST

Volume 2 Issue 3

Online ISSN 2250 - 1959

International Research Journal of Management Science & Technology http:www.irjmst.com

Page 336

E-Commerce can operate all day every day. Physical storefront does not need to be open for customers and suppliers for doing business
electronically. (2)

Reduce cost to buyers

-Electronically open market places will increase competition and reduce buyers cost. (3)

Reduced cost to the suppliers

-The ability to access online databases of bid opportunities, to ·submit bids electronically and to review awards online will reduce supplier's
costs. (4)
Create New markets

-The ability to reach potential customers easily and cheaply will create new markets. (5)

Easy market entry

-Market entry will be easier when geographic limits are no longer relevant. (6

) Increase in variety of goods

-As the market will expand; the variety of goods available will also expand. Wide variety of goods are available than ever before. (7)

Reduce inventories

-Electronically linking the demand for goods and services through just-in-time inventory and integrated manufacturing techniques will
allow companies to maintain reduce inventories. (8

) No Middlemen

-There is a direct contact with customers in e-commerce through internet without any intermediation. Companies can now focus more on
specific customers by adopting different one-to-one marketing strategy. (9)

Improved and better customer service

-Since there is a direct contact with the customers, it is possible to solve their queries regarding price, quality, additional features of the
product, etc and thus resulting in a better improved customer service. Response time is reduced more quickly between the sel ler and
the buyer.

IRJMST

Volume 2 Issue 3

Online ISSN 2250 - 1959

International Research Journal of Management Science & Technology http:www.irjmst.com


Page 337

(10)

Teamwork

-The output of the E-Commerce is the teamwork that helps organizations work together. Email is one of the examples of how people
collaborate tQ exchange information and work on solutions. It has changed the way organizations interact with the suppliers, vendors,
and customers. (11)

Information sharing with the customers

-It is possible for the buyers now to keep in touch with the seller's site; fmd the real time information and can make quick purchase
decisions. Knowledge of the customer is increased about the product and its varied features. Thus web is a source of dissemination of
information for its customers. (12)

Customized products

-On the basis of the demand from . the customers for their requirements about the product, it is possible to differentiate the product for
them.
There are many websites that helps in reorganizing, revising or editing the digital products. (13)

Swapping of goods and services

-Swapping is to exchange or using a barter system for goods and services on the websites between the business firms. Here one firm
offers something for a want of something from another firm for its services. The popular sites performing these functions are webswap,
ubarter, etc.(For example instead of accepting cash for a consultancy service from a firm, a person or another firm can buy products i n
exchange from that firm). (14)

Information sharing

-It takes only few seconds to share information over the internet. A firm can e-mail its customers about any new product and can solve
their product related queries and welcome suggestions. This is a major advantage overcoming the limitation of traditional methods of
doing business. (15)

Global reach

-just by creating a web site and uploading it on the server, a firm is able to reach millions of customer worldwide. E-commerce creates
the whole world as a global village from where anyone can buy anything at anytime from anywhere. (16)

Advertising of goods and services

-A business firm can easily promote its product on the website by giving the complete required information over the internet. One of the
tools of E-Commerce is sales promotion from where not only the firm gains but also the customers are benefited.
IRJMST

Volume 2 Issue 3

Online ISSN 2250 - 1959

International Research Journal of Management Science & Technology http:www.irjmst.com

Page 338

(17)

Higher profits

-A very great amount of reduction in cost is measured in doing e-commerce in terms of various kinds of commercial transactions i.e. no
manual handling of the transactions, paperless exchange, easy payments from customers, no transportation except in the case of
tangible products and higher profit margins from higher sales volume. Also business over the internet attracts every customer from all
over the world and exposure in the new markets enhances the profits of the business firm. (18)

E-Payment system

-The electronic payment system on the internet is facilitated by payment gateways (an intermediary) between the business firms and
customers and between business firms for assuring the payments from the customers. E-Payments are made without any loss of time
but security is to be insured when using this system because customers are sending their personal detail related to credit card
numbers. (19)

Ensure secrecy

-The various security measures that are in- built are used in e-commerce transactions to prevent any unauthorized access to information
on the internet. These are encoding, encryption, passwords, etc.

(20) Computer platform

-independent-Customers are not limited by existing hardware systems. Computers have the ability to communicate via the internet,
independent of operating systems and hardware.

Q. 3. Explain the advantage of TPS in supply chain management.

Transaction Processing Activities

¨Data Collection is the process of capturing and gathering all data needed to complete one or more transactions. Can be done manually, or using
devices like scanners and point -of -sale equipment.

¨Data Editing is the process of checking data for validity and completeness.

¨Data Correction is the process of reentering mis-keyed or mis-scanned data that was found during the data editing.
¨Data Manipulation is the process of performing calculations and other data transformations like classifying data and sorting files.

¨Data Storage is the process of placing transaction data into one or more databases.

¨Document Production is the process of creating reports and outputting records. Output can be printed on paper (hard copy) or displayed on the screen
(soft copy ).

Typical transaction processing systems


Many commercial organisations have as their core business the selling of products or services. These businesses are founded around four key
information systems that have transaction processing as their major component:
· sales order processing
· purchase order processing
· accounting
· payroll
We will mainly illustrate businesses that sell products, but those in the service sector are generally much the same, although there may be some
differences. The following is a systems diagram highlighting the major components of these business systems and how they inte ract with each other
and various entities.

As an aside, we may note that a customer for one business such as this could well be a supplier for others. When there are a number of these
linkages, we might refer to them as being part of a supply chain. In some parts of the world, businesses in supply chains form close alliances
and are often seen as being part of a family of businesses. This has become more important with the increasing use of "just-in-time" (JIT)
manufacturing techniques, where there is significant dependence on the reliability of other businesses in the supply chain.

You might also like