You are on page 1of 3

Seat No :_________________ Enrollment No:_____________________

PARUL UNIVERSITY
Faculty of Management
MBA Supplementary Examination, Summer 2015-16

Semester: 1 Date: 02/05/2016


Subject Code: 06200101 Time: 2:00PM to 5:00PM
Subject Name: Management Information System Total Marks: 60
Instruction:
1. Attempt all the questions from each sections.
2. Figure to the right indicates full marks.
3. Make suitable assumptions wherever necessary.
4. Write separate sections on separate answer sheets.

SECTION-A
Q.1 (a) MCQ (One marks each). [03]
1. __________applications are widely adopted by many firms in recent time.
(a) Web 2.0
(b) Web 2.1
(c) Web 1.0
(d) Web 2.2
2. Internal corporate networks based on Internet technology are called
_____________.
(a) extranet
(b) internet
(c) intranet
(d) LAN
3. Company establishes strong relationship with customer using __________
system.
(a) SCM
(b) CRM
(c) ERP
(d) KMS
Q.1 (b) Define following terminology. [03]
1. Data
2. Information System
3. E-business
Q.2 Read the case carefully and answer the given questions. [08]
Information System in Restaurant
A waiter takes an order at a table, and then enters it online via one of the six terminals
located in the restaurant dining room. The order is routed to a printer in the appropriate
preparation area: the cold item printer if it is a salad, the hot-item printer if it is a
hot sandwich or the bar printer if it is a drink. A customer’s meal check-listing (bill)
the items ordered and the respective prices are automatically generated. This ordering
system eliminates the old three-carbon-copy guest check system as well as any
problems caused by a waiter’s handwriting. When the kitchen runs out of a food item,
the cooks send out an ‘out of stock’ message, which will be displayed on the dining
room terminals when waiters try to order that item. This gives the waiters faster
feedback, enabling them to give better service to the customers. Other system features
aid management in the planning and control of their restaurant business. The system
provides up-to-the-minute information on the food items ordered and breaks out
percentages showing sales of each item versus total sales. This helps management plan
menus according to customers’ tastes. The system also compares the weekly sales totals
Page 1 of 3
versus food costs, allowing planning for tighter cost controls. In addition, whenever an
order is voided, the reasons for the void are keyed in. This may help later in
management decisions, especially if the voids consistently related to food or service.
Acceptance of the system by the users is exceptionally high since the waiters and
waitresses were involved in the selection and design process. All potential users were
asked to give their impressions and ideas about the various systems available before
one was chosen.

Questions:
1. What would make the system a more complete MIS rather than just doing
transaction processing?
2. Explain the probable effects that making the system more formal would have on
the customers and the management.
Q.3 (a) Explain any four strategic business objectives of information system. [04]
Q.3 (b) Differentiate between technology approach and human approach. [03]
OR
Q.3 (a) Write a short note on transaction processing system. [04]
Q.3 (b) List out the importance of decision support system. [03]
Q.4 Define collaboration and team work. Explain requirements of collaboration and also [09]
describe the tools and technologies use for collaboration and team work.

SECTION-B
Q.1 (a) MCQ (One marks each). [03]
1. ________ are very simple devices that connect network components, sending a
packet of data to all other connected devices.
(a). Hubs
(b). Switches
(c). Routers
(d). NIC
2. ___________, which handles the movement of data between computers.
(a). IP
(b). TCP
(c). FTP
(d). MTP

3. ___________is the communications standard used to transfer pages on the


Web.
(a). HTML
(b). FTTP
(c). HTTP
(d). XML
Q.1 (b) Define following terminology (One marks each). [03]
1. Computer Network
2. Computer Virus
3. Bus topology
Q.2 Read the case carefully and answer the given questions. [08]
Security Loopholes

Utpal had just joined SystemX as Systems Manager. But he was a worried man
looking at the current state of affairs at SystemX. As a part of assessing hardware and
software requirements, it was found that out of the 364 desktops at the corporate
office; more than half did not have their antivirus software updated with recent virus
signature files. Three - fourths had not changed the default e-mail password (it was
the user name) and no one had installed OS patches. And one of its local mail servers
Page 2 of 3
seemed to be an open relay! For a fleeting moment, he wondered about the situation
at the seven branch offices across the country. SystemX used the Net extensively in
dealing with its branches, customers and suppliers. Information like contract
documents, marketing plans, Cheque and Draft numbers, bank account details and
collection details were regularly transmitted by e-mail. Utpal’s first thought was that
he would recommend that SystemX bring in a security consultant. But the budget
constraints meant that his recommendation was unlikely to find support. He was
beginning to feel a bit out of depth and was wondering what he should do to ensure
that SystemX’s data remained safe and secure.

Questions:
1. What security loopholes come to the front in the situation described? How
can these be plugged?
2. What is the importance of a “security budget” in the context of the given
situation?
Q.3 (a) Write a short note on relational DBMS. [04]
Q.3 (b) Differentiate between e-commerce and m-commerce. [03]
OR
Q.3 (a) Write a short note on computer network topologies. [04]
Q.3 (b) Differentiate between worms and Trojan horse. [03]
Q.4 Explain various e-commerce business models in detail. [09]

Page 3 of 3

You might also like