You are on page 1of 2

Subject: BA7205 Information Management Subject: BA7205 Information Management

Internal Test: I Class & Sem: I MBA / II Internal Test: I Class & Sem: I MBA / II
Marks: 50 Marks: 50

Part A (5*2=10 Marks) Part A (5*2=10 Marks)


Answer all the Questions Answer all the Questions
1. What is Data? 1. What is Data?
2. What are the difference between Data and 2. What are the difference between Data and
Information? Information?
3. What is meant by TPS? 3. What is meant by TPS?
4. List out the types of information? 4. List out the types of information?
5. What is SDLC? 5. What is SDLC?
Part B (2*13=26 Marks) Part B (2*13=26 Marks)
6. A. What are the two basic classification of 6. A. What are the two basic classification of
Information System? Explain Information System? Explain
(OR) (OR)
B. Describe the Water fall Model. B. Describe the Water fall Model.

7. A. Explain the process of FMIS with Diagram 7. A. Explain the process of FMIS with Diagram
(OR) (OR)
B. What is IT? Explain its application and Role in B. What is IT? Explain its application and Role in
business business
Part C (1*14=14 Marks) Part C (1*14=14 Marks)

8.Utpal had just joined SystemX as Systems Manager. 8.Utpal had just joined SystemX as Systems Manager.
But he was a worried man looking at the current But he was a worried man looking at the current
state of affairs at SystemX. As a part of assessing state of affairs at SystemX. As a part of assessing
hardware and software requirements, it was found hardware and software requirements, it was found
that out of the 364 desktops at the corporate office; that out of the 364 desktops at the corporate office;
more than half did not have their antivirus software more than half did not have their antivirus software
updated with recent virus signature files. Three - updated with recent virus signature files. Three -
fourths had not changed the default e-mail password fourths had not changed the default e-mail password
(it was the user name) and no one had installed OS (it was the user name) and no one had installed OS
patches. And one of its local mail servers seemed to patches. And one of its local mail servers seemed to
be an open relay! For a fleeting moment, he be an open relay! For a fleeting moment, he
wondered about the situation at the seven branch wondered about the situation at the seven branch
offices across the country. offices across the country.
SystemX used the Net extensively in dealing SystemX used the Net extensively in dealing
with its branches, customers and suppliers. with its branches, customers and suppliers.
Information like contract documents, marketing Information like contract documents, marketing
plans, Cheque and Draft numbers, bank account plans, Cheque and Draft numbers, bank account
details and collection details were regularly details and collection details were regularly
transmitted by e-mail. Utpal’s first thought was that transmitted by e-mail. Utpal’s first thought was that
he would recommend that SystemX bring in a he would recommend that SystemX bring in a
security consultant. But the budget constraints security consultant. But the budget constraints
meant that his recommendation was unlikely to find meant that his recommendation was unlikely to find
favour. He was beginning to feel a bit out of depth favour. He was beginning to feel a bit out of depth
and was wondering what he should do to ensure that and was wondering what he should do to ensure that
SystemX’s data remained safe and secure. SystemX’s data remained safe and secure.
Questions: Questions:
a. What security loopholes come to the fore in a. What security loopholes come to the fore in
the situation described? How can these be the situation described? How can these be
plugged? plugged?
b. What is the importance of a “security b. What is the importance of a “security
budget” in the context of the given situation? budget” in the context of the given situation?

You might also like