You are on page 1of 15

Final Assignment

Final Assignment
Faculty name: Abu Sayeed Arif

MIS 107, Spring 2020 Final Assignment 

Total Marks: (6 X 5) = 30

Time Frame: 18 May – 4 June, 2020


th th

Instructions
●    Answer all five questions

●    Consider at least five dimensions when you answer each question.

●    Do not discuss on final exam questions with any person.

●    Answer within the context of the textbooks. 

●    Use your own word- do not copy even from the textbook. Use a plagiarism checker before you make your
submission.

●    Make sure you submit Just Once your Final Assignment.

Student ID:2011473630

Student Name: Prangan Roy Rudra

Section:19

NSU Email:prangan.rudra@northsouth.edu

MIS107- Page 1 of 15 Spring 2020


Final Assignment

NORTH SOUTH UNIVERSITY

FINAL ASSIGNMENT

SUBJECT: MIS107

SEMESTER: SPRING 2020

SECTION:19

SUPERVISED BY
ABU S. ARIF
Department Of Management

SUBMITTED BY
Prangan Roy Rudra
ID:2011473630

DATE OF SUBMISSION:
23rd May, 2020

MIS107- Page 2 of 15 Spring 2020


Final Assignment

Letter of Transmittal

Date: 23rd May 2020.

Mr. Abu S. Arif


Course Instructor,
Department of Management,
North South University

Subject: Submission of Final Assignment.

Dear Sir,
It is a great pleasure that, you have given me an opportunity to submit the final assignment, as a partial requirement
of the prerequisite for the completion of MIS-107.

With an information system, businesses can save time and money while making smarter decisions. A company's
internal departments, such as marketing and sales, can communicate better and share information more easily. Since
this technology is automated and uses complex algorithms, it reduces human error.

I have tried at my best to avoid my deficiencies and hope that my endeavor will satisfy you and I also would like to
thank you again for giving me the opportunity to submit this individual final assignment.

Your Obediently,

Prangan Roy Rudra


ID: 2011473630

MIS107- Page 3 of 15 Spring 2020


Final Assignment

1. Draw and explain the requirement analysis phase of the system development life cycle.

Answer:

System Development Life Cycle: One technique of consuming system’s tactic to develop information
system solution, and the most ubiquitous one in organizational systems, analysing and design can be
pragmatic as a multistep, iterative process called the Systems Development Life Cycle (SDLC).

What goes on in each stage of this process:

1. Investigation 2. Analysis 3. Design 4. Implementation 5. Maintenance.

It is vital to realise, however that all of the actions involve in the SDLC are highly related and inter-reliant.
In genuine practice therefore, numerous developmental activities may be proposing at the same time, while
persuaded activities within specified steps may be recurring.

Amplification the requirement analysis phase of the system development life cycle:
It is an in-depth study of end user information desires that produces functional requirements, that are used
as the rudimentary for the strategy of a new information system. System analysis customarily comprises a
factor study of:

 The information desires of a company and end users.


 The activities, resources and products of one or more of the current information system being
used.
 The information system abilities are obligatory to happen one’s information needs and those of
others business stake holders that may use the system.
Organizational analysis: Organizational analysis is a vital stage in system analysis. The members of a
development team have to know something about the organization, its management erection, its people, its
business activities, the environment system, it must deal with, and its existing info system. Someone on the
team must be known this information in more detail for the specific business units or end users work
group, that will be affected by the new or enhanced information system being offered.

Analysis of the present system: It is necessity to analysis how this system uses hardware, software,
network and people resources to convert data resources such as transaction data into information product,
such as reports and parades. Then one should document how the information system activities of input,
processing, output, storage and control are accomplished.

MIS107- Page 4 of 15 Spring 2020


Final Assignment

Logical analysis: One of the primary activities that occur during the analysis phase is the edifice of a
logical model of current system. By assembling and analysing a logical exemplary of the contemporary
system. A system analyst can more easily understand the various processes, functions and data associated
with the system, without getting bogged down with all the issues adjoining the hardware or the software.
Also, by creating a logical model, the various non computer components in a system can be merged,
analysed and understood.

Functional requirements analysis and determination: This phase of system analysis is one of the most
challenging. One may need to work as a squad with IS analysis and other end users to define specific
business information prerequisites.

Examples of Functional requirements:

 User Interface Requirements: Instinctive entry of product data and easy-to-use data entry awning for
web clients.

 Processing Requirements: Fast, automatic intentions of sales sums and shipping costs.

 Storage Requirements: Fast recovery and update from product, assessing and customer databases.

 Control Requirement: Gestures for data entry errors and swift e-mail confirmation for patrons.

MIS107- Page 5 of 15 Spring 2020


Final Assignment

2. What is the significance of a ERP system within the context of an organization (e.g. Pran Foods)?

Answer:

Enterprise resource planning (ERP) is a cross-functional enterprise system focused by a cohesive suite
of software modules that support the rudimentary internal business processes of a corporation. ERP gives a
company an integrated real time view of its principal business processes such as production, order
processing and inventory management. Although the reimbursements of ERP are many, the costs and risks
are also substantial.

Typical Cost of implementing a new ERP System


12%
15% 43%

15%
15%

Reengineering Software Training and change management


Data Conversions Hardware

PRAN supplementary paved its place in industry through a food processing plant at Ghorashal in 1992.
Through the continuous endeavour, PRAN has now established itself as one of the top manufacturing
companies and has set the grounds for progress for any potentialities. PRAN prides itself on being an
organization that has performed remarkably not only on a native level but on a global level as well.
For being a successful giant conglomerate in Bangladesh, PRAN Foods Ltd need to have vital ERP system
to capitalize its effective performance, productivity and efficiency as well as enhance its keenness in the
souk. Significance of a ERP system within the context of PRAN Foods Ltd.:

 Regulatory compliance and reporting: In this occasion of a product audit or inspection, this feature can
help PRAN Foods Ltd to identify and segregate a unruly so that, it can be unravelled on speedy effect. This
function also avowals product traceability, as it will record what mechanisms were used from
commencement to end and how they were cast-off etc.

 Quality management: Every companies are required to observe with food safety policies. An efficacious
ERP systems for PRAN Foods Ltd must have the capability to record real-time data in various aspects of
supply and manufacturing during production and be able to store data for future salvage.

 Sales and inventory management: This function, aids PRAN Foods Ltd to encounter both food safety
standards and efficiency goals, not only in terms of time but by eliminating surplus in an environment
where ledge life and perishability are natural business chauffeurs.

 Recipe control: This is a composite task which may aid PRAN Foods Ltd. to knob data like quantity, price
quotation, recipe and historic confirmation. Handling changes is considered a chief feature.

 Shelf life: Guise for software that has an automated alert-mechanism to alerts managers when production
materials are impending or past their finishing date.

MIS107- Page 6 of 15 Spring 2020


Final Assignment

 Financial Management: An integrated financial system certifies that costs and expenses are recorded
correctly & can provide material in real-time and having this feature, PRAN Foods Ltd. may have the
facility to analyse its information for decision-making from all areas of business.

Today ERP is still evolving-adapting to expansions in technology and demands of the market. Four
imperative trends are shaping ERP’s continuing evolution: enhancements in integration and flexibility,
extensions in business applications, an edging reach to new users and the implementation of innovative
technologies.

MIS107- Page 7 of 15 Spring 2020


Final Assignment

3. What is the significance of an EDI within the context of an organization (e.g. Daraz)?

Answer:

Electronic Data Interchange: Electronic Data Interchange was one of the initial uses of Information
Technology for Supply Chain Management. EDI comprises the electronic exchange of business operation
documents over the internet and other network between Supply Chain Trading Partner. Data demonstrating
a disparity of business transaction documents (such as purchase orders, invoices, request for a quotations
and shipping notices) are mechanically exchanged between computers consuming standard documents
message formats.

EDI automatically tracks inventory changes, triggers orders, invoices and documents related to transactions
and agendas and authorizations delivery and expenditures.

Significance of an EDI within the context of an organization (e.g. Daraz):

Daraz is a Chinese-owned online marketplace and logistics company which drives in souks of South Asia
and Southeast Asia. Daraz Group functions e-commerce platforms and logistics service in Bangladesh,
Myanmar, Nepal, Pakistan and Sri Lanka.

● By consuming “Electronic Data Interchange”, which helps Daraz to connect with several companies
who want to stake business or curiosity with them. With the help of EDI, Daraz sustain invoice,
inventory/inquiry advice, purchase order, product activity data, purchase order acknowledgement,
advance shipment notice, purchase order change acknowledgement etc. Their EDI is very cost
effective. They have tier based subscription facility. They commerce with all their trading cohorts via a
single web based portal. Which assistances them to mechanizes their supply chain.
● By the support of EDI, Daraz has broken down its purchasing and vending process into small phases,
which makes it calmer for the customers.
● EDI lets Daraz to cooperate more efficiently with its dealers and thrust costs out of the supply chain by
eliminating insufficiencies and manual interferences. Furthermore, by allowing EDI system into
Daraz’s platform welfares itself to mix flawlessly with large and small networks of suppliers.
● Daraz uses EDI Gateway to conversation forecasts, orders, invoices, or any other business document,
and whether its traders need to assimilate with their ERP systems or require a simple web EDI gateway
to achieve 100% supplier uptake.
● Possibly EDI seem complicated, but in reality, it is a vehicle to standardize and simplify infrastructures
between interchange partners. This translates into:
• More precise information
• Increased mechanization – less paper
• Enhanced discernibility on B2B transactions
• Shorter sales cycle faster orders-to-cash more sales!
• Competitive pricing for small suppliers
• Achieve EDI compliance with trading spouse of Daraz.
• Attach with sundry venders

● Daraz permits the creditor to guide a warehouse to brand a shipment, endorse a shipment, or alter or
stop a prior led shipping demand.

MIS107- Page 8 of 15 Spring 2020


Final Assignment

Daraz via digitally assimilating the supply chain, EDI streamlined progressions, protects time, and
increases the precision.

MIS107- Page 9 of 15 Spring 2020


Final Assignment
4. Draw and explain a corporate network including switch, router, NIC and communication media.

MIS107- Page 10 of 15 Spring 2020


Final Assignment

5. Explain the systems approach within the context of deploying a CRM system.

Answer:

CRM (Customer Relationship Management): Dealing the bursting variety of the customer relationship
involves two associated purposes: one, to provide the organization and all of its customer fronting
employees with a single, complete interpretation of every customer at every touch point and across all
channels; and, two, to afford the customer with a single, complete view of the corporation and its lengthy
channels.

CRM practices information technology to create an enterprise wide system that assimilates an automates
many of the customer overhauling procedures in sales, marketing and other customer related services that
interrelate with a company’s client. CRM system also generate an IT framework of WEB permitted
software and databases that assimilates this processes with the rest of a company’s commercial processes.

Explaining the system approach within the context of deploying a CRM system, like:

1. Contact and account management: CRM structure vittles’ the data in a common customer database that
assimilates all customer account info and by organizing the CRM system, makes data available throughout
the company via internet, intranet, or further network links for sales, marketing, service and other CRM
application.

2. Sales: A CRM system offers sales representative through the software gears and company data foundations
they need to support and manage their sales actions and improve cross selling and up selling. Through
using a cross selling technique (by using the CRM system), sales legislatures can better serve their patrons
while instantaneously refining their sales. Upselling mentions to the procedure of finding ways to sale a
new or existing customer a improved invention than they are currently looking for. A CRM system would
also change a marts person to un resolved service, delivery, or payment problems that could be determined
though a personal contact with a customer.

3. Marketing and fulfilment: CRM software supports marketing specialist’s imprisonment and manage
prospect and purchaser response data in the CRM database, an analysis the customer and business worth of
a company’s direct marketing campaign.

4. Customer service and support: CRM assistances customer service managers create, assign, and achieve
request for facility by customs. Call centre software routes calls to customer support agents based on their
skills and authority to handle specific kinds of service request. Helpdesk software customer service
representatives assist customers who are having glitches with a product or service by proving pertinent
provision data and suggestion for determining problem. WEB based self service enables customer to access
personalised support information effortlessly at the company web site, while it provides them an option to
accept further assistance online or by phone from customers’ service personnel.

5. Retention and loyalty program: CRM system attempts to help a company identify, reward, and market to
their supreme loyal and profitable customers. CRM analytical software includes data mining tackles and
other analytical marketing software, while CRFM data bases may require of a customer data ware house
and CRM data stores. These tools are used to identify gainful loyal customers and to direct and appraise a
company’s beleaguered marketing and relationship marketing schemas towards them.

MIS107- Page 11 of 15 Spring 2020


Final Assignment

Benefits and challenges of CRM: CRM permits a business to classify a target its best consumers those who
are most lucrative to the business so they can be retained as lifelong customers for gather and more profitable
services. It makes imaginable real-time customization and personalization of products and services based on
customer wants needs, procurement behaviours, and life cycle. CRM can also preserve track of when a
customer associates the company, regardless of the contact point. In addition, CRM systems can allow a
company to deliver a reliable client experience and larger service and support across all the contact point a
customer picks. All of these welfares would deliver planned commercial value to a corporation and foremost
customer assessment to its customers.

MIS107- Page 12 of 15 Spring 2020


Final Assignment

6. How can an organization protect itself from a DDoS attack?

Answer:

Denial of Service Attacks:


Major attacks alongside e-commerce and corporate web sites in the ancient few years have verified that the
internet is extremely vulnerable to a variety of stabbings by criminal hackers, chiefly distributed denial of
service (DDoS) attacks. Denial of service assaults via the internet depend on three coatings of networked
computer system:1) the victim’s website, 2) the victim’s internet service provider(ISP), and 3) the spots of
“zombie” or slave processers that the cyber-criminals requisitioned.

Prevention of DDoS attack, a pathway

An organization can be protected from (DDoS) attack in following ways:

Defending Against Denial of Service (DDoS)

 At the zombie machines: Set and implement security policies, scan regularly for Trojan horse programs
and susceptibilities. Close unused harbours. Remind users not to open .exe mail attachments.
 At the ISP: Monitor and block traffic spikes. Filter speckled IP addresses. Organize security with
network breadwinners.
 At the victim’s website: Create backup servers and network connections. Edge connections to each
server. Install manifold instructions-detections systems and multiple routers for inbound traffic to
reduce obstruct opinions.
Email Monitoring: E-mail is also the battleground for efforts by companies to enforce policies against
illegal, personal, or destructive messages by employees against the stresses of some employees and others
who see much strategies as violations of confidentiality rights. The tide is turning toward orderly nursing
of trade e-mail traffic consuming content-monitoring software that images for perturbing words that
strength cooperation corporate safety.

MIS107- Page 13 of 15 Spring 2020


Final Assignment

Viral Defences: Several companies are building defences against the spread of virus by centralizing the
spreading and updating of antivirus software as an accountability of there IS departments. These days,
corporate antivirus shield is a centralized function of information technology. Someone installs it for PC
and notebook or, increasingly, distributes it over the network. The antivirus software runs in the
background, exploding up every so often to reassure. The trend right now is to mechanize the process
completely.

Security Codes: These topographies add another level of protection to stowed data resources. For even
severer security, however, passwords can be knotted, or encrypted, to avoid their theft or indecorous use.
In addition, smart cards, which contain microchips that generate random numbers to add to an end user’s
password, are used in some sheltered systems.

Backup Files: Backup files, which are identical files of data or programs, are another important security
portion. Files can also be protected by file holding events that involve storing copies of files from earlier
periods can be used to rebuild new current files.

Security Monitors: Security of a network may be provided by enthusiastic system software suites
recognized as system security monitors. Such agendas provide the security measures needed to allow only
sanctioned users to admittance the networks.

Biometric Security: Biometric security is a fast-growing zone of computers security. These are security
trials provided by computer devices that measure physical personalities that make each individual
distinctive, such as expression verification, fingerprints, hand geometry, signature dynamics, keystroke
analysis, retina scanning, face recognition, and genetic pattern analysis. The digitized signal is processed
and compared to a previously treated profile of the individual stored on compelling disk. If the profiles
match, the distinct is allowed entry into a computer grids and given admission to harmless system
resources.

Computer Failure Controls: A diversity of controls can avoid such computer catastrophe or minimize its
effects. A backup computer system competence can be arranged with disaster retrieval organizations.
Major hardware or software changes are usually carefully scheduled and applied to avoid snags.

Fault –Tolerant Systems: Fault-tolerant computer systems, though, proposal a fail-soft competence so
that the computer system can linger to function at a reduced but satisfactory level in the event of a major
system catastrophe.

Disaster Recovery: Organizations develop disaster regaining actions and solemnize them in a disaster
recovery strategy. It stipulates which employees will participate in disaster recovery and what their
responsibilities will be; what hardware, software, and facilities will be used and the precedence of
applications that will be treated. Arrangements with other firms for use of alternative facilities as a tragedy
recovery site and off-site storage of an administrations databases are also portion of an effective disaster
recovery struggle.

Information System Controls: Information system panels are intended to monitor and maintain the
excellence and security of the input, processing, output, and storage doings of any information system.

MIS107- Page 14 of 15 Spring 2020


Final Assignment

Auditing IT Security: An audit track can be defined as the incidence of documentation that permits a
transaction to be outlined through all stages of its information dispensation. This journey may begin with a
transactions presence on a source document and end with its conversion into information in a final output
manuscript report. Many times, this electronic audit trail takes the form of control fuels that mechanically
record all computer network activity on magnetic disk or tape procedures.

The DDoS is an outside intrusion, but not one that looks to install approximately within the company in
order to gain information.  Instead, this type of attack constantly hits the server with requests that business
is stopped.  DDoS can cause a lot of damage to an organization that rely on the obtainability of key info
systems. Hence, we have delineated the above activities that can mitigate the effects of an attack.

MIS107- Page 15 of 15 Spring 2020

You might also like