Professional Documents
Culture Documents
MTTM 4
MTTM 4
m
Teacher/Tutors/Authors for the help and guidance of the student to get an idea of how he/she can
answer the Questions given the Assignments. We do not claim 100% accuracy of these sample
answers as these are based on the knowledge and capability of Private Teacher/Tutor. Sample
60 co
answers may be seen as the Guide/Help for the reference to prepare the answers of the Questions
given in the assignment. As these solutions and answers are prepared by the private teacher/tutor so
the chances of error or mistake cannot be denied. Any Omission or Error is highly regretted though
every care has been taken while preparing these Sample Answers/Solutions. Please consult your own
.
Teacher/Tutor before you prepare a Particular Answer and for up-to-date and exact information, data
70 ar
and solution. Student should must read and refer the official study material provided by the
university.
94 dh
Q1. Explain with the help of suitable examples the co-relation between Data, Information and
Knowledge.
Ans. Data are recorded (captured and stored) symbols and signal readings.
• Symbols include words (text and/or verbal), numbers, diagrams, and images (still &/or
58 ra
Information assigns meaning and improves the reliability of the data. It helps to ensure undesirability
and reduces uncertainty. Therefore, when the data is transformed into information, it never has any
h
useless details. It includes data that possess context, relevance, and purpose. It also involves the
manipulation of raw data which eventually becomes knowledge.
ic
What is Knowledge?: Knowledge is a combination of information, experience, and insight that helps
the individual or the organization. It is linked to doing and implies know-how and understanding.
Knowledge is possessed by each individual and is an outcome of his or her experience. It also covers
the norms to evaluates new inputs from his surroundings.
Characteristics of Knowledge: Here are an important characteristic of knowledge:
• Knowledge is accurate as it conveys the true situation.
• It is available in time to make the most appropriate and correct decisions.
• It is portrayed in common, easy to understood formats.
• It provides all the necessary data.
• Meaningful and useful for the decision-making process.
1
Shrichakradhar.com 9958947060
Q2. Discuss the role of Information Technology in the growth and development of Tourism
Industry. Support your answer with suitable examples.
Ans. Information Technology has played an important role in the hospitality and tourism industry
over the last decade. Technology has helped reduce costs, enhance operational efficiency, and
improve services and customer experience. Both customers and businesses can benefit from improved
m
communication, reservations, and guest service systems.
Technology has helped tourism and hospitality industries replace expensive human labor with
technological labor. This helps reduce labor costs, but also helps avoid customer service issues.
60 co
Here are some examples of the ways that IT continues to improve the hospitality and tourism
industry.
Internet and Marketing
The internet has a powerful impact on hospitality and tourism. A customer’s first experience with
your business is a visit to your website. This includes looking at pictures and reviews from past
.
guests. It is vital for a business to effectively utilize online advertising, social media, blogs, and online
70 ar
purchasing to help convenience their customers, especially when your competitors are doing the
same thing.
Computer Systems
94 dh
Computer systems allow communication between larger hotel chains with multiple locations to
connect easier. They also help keep staff on the same page and make it easier to access information,
making your guests experience much better. Guest requests, housekeeping information, and
reservations can all be found on one system.
58 ra
Mobile Communication
Mobile tablets and smartphones have replaced large desktop computers, making them virtually
extinct. This is helpful, because many travelers take some type of mobile device with them on a trip.
This helps hospitality businesses keep customers advised of changes and delays to their reservations,
k
Technological revolutions
Travel is a basic human nature. Technological revolutions in the last few decades and the resulting
h
changes in the social systems go faster its intensity in the current century. Thus, tourism is presently a
mass phenomenon involving every human being in the world. They need detailed information about
ic
each place they intend to visit. The specific elements of such information needs are:
• Geographical information on location, landscape and climate, etc.
• Information Needs in Tourism
hr
2
Shrichakradhar.com 9958947060
Tourists generally need both static and dynamic information. It includes details information about
location, climate, attraction features, history, facilities available, etc. Information about airline, train
and bus schedules, tariffs of transport and accommodation units and current availability of such
facilities is considered as dynamic as they can change very frequently. These items of information
have to be gathered, stored and disseminated on a real time basis. All types of reservation systems
including air, railway and accommodation sectors contain such information.[3] The tourism industry
is made up of three major components: namely,
a) Transport sector,
m
b) Accommodation sector
c) Attraction sector
Q3. Discuss the different generation of computers' while mentioning the key features of each
60 co
generation.
Ans. Five basic generations of computers:
1940 – 1956: First Generation – Vacuum Tubes
These early computers used vacuum tubes as circuitry and magnetic drums for memory. As a result
.
they were enormous, literally taking up entire rooms and costing a fortune to run. These were
70 ar
inefficient materials which generated a lot of heat, sucked huge electricity and subsequently
generated a lot of heat which caused ongoing breakdowns.
These first generation computers relied on ‘machine language’ (which is the most basic programming
94 dh
language that can be understood by computers). These computers were limited to solving one
problem at a time. Input was based on punched cards and paper tape. Output came out on print-outs.
The two notable machines of this era were the UNIVAC and ENIAC machines – the UNIVAC is the
first every commercial computer which was purchased in 1951 by a business – the US Census Bureau.
58 ra
computers to damaging levels of heat. However they were hugely superior to the vacuum tubes,
making computers smaller, faster, cheaper and less heavy on electricity use. They still relied on
99 a
programmers could create instructions in words. About the same time high level programming
languages were being developed (early versions of COBOL and FORTRAN). Transistor-driven
ic
machines were the first computers to store instructions into their memories – moving from magnetic
drum to magnetic core ‘technology’. The early versions of these machines were developed for the
atomic energy industry.
hr
an operating system, a significant leap up from the punch cards and printouts. This enabled these
machines to run several applications at once using a central program which functioned to monitor
memory.
As a result of these advances which again made machines cheaper and smaller, a new mass market of
users emerged during the ‘60s.
1972 – 2010: Fourth Generation – Microprocessors
This revolution can be summed in one word: Intel. The chip-maker developed the Intel 4004 chip in
1971, which positioned all computer components (CPU, memory, input/output controls) onto a single
chip. What filled a room in the 1940s now fit in the palm of the hand. The Intel chip housed thousands
of integrated circuits. The year 1981 saw the first ever computer (IBM) specifically designed for home
3
Shrichakradhar.com 9958947060
use and 1984 saw the MacIntosh introduced by Apple. Microprocessors even moved beyond the
realm of computers and into an increasing number of everyday products.
The increased power of these small computers meant they could be linked, creating networks. Which
ultimately led to the development, birth and rapid evolution of the Internet. Other major advances
during this period have been the Graphical user interface (GUI), the mouse and more recently the
astounding advances in lap-top capability and hand-held devices.
2010- : Fifth Generation – Artificial Intelligence
Computer devices with artificial intelligence are still in development, but some of these technologies
m
are beginning to emerge and be used such as voice recognition.
AI is a reality made possible by using parallel processing and superconductors. Leaning to the future,
computers will be radically transformed again by quantum computation, molecular and nano
60 co
technology.
The essence of fifth generation will be using these technologies to ultimately create machines which
can process and respond to natural language, and have capability to learn and organise themselves.
Q4. What do you understand by Computer Network? Explain the classification of computer
.
network structures.
70 ar
Ans. Computer networks are the basis of communication in IT. They are used in a huge variety of
ways and can include many different types of network. A computer network is a set of computers
that are connected together so that they can share information. The earliest examples of computer
94 dh
networks are from the 1960s, but they have come a long way in the half-century since then.
Types of Computer Network:
There are many different types of network, which can be used for different purposes and by different
types of people and organization. Here are some of the network types that you might come across:
58 ra
• Local Area Networks (LAN): A local area network or LAN is a network that connects
computers within a limited area. This might be in a school, an office or even a home.
• Personal Area Networks (PAN): A personal area network is a network that is based on an
individual's workspace. The individual's device is the center of the network, with other
k
devices connected to it. There are also wireless personal area networks.
• Home Area Networks (HAN): A home area network connects devices within a home
99 a
environment. It might include personal computers, tablets, smartphones, printers, TVs and
other devices.
h
• Wide Area Networks (WAN): A wide area network is a network that covers a larger
geographical area, usually with a radius of more than a kilometer.
ic
• Campus Networks: A campus network is a LAN or set of connected LANs which is used by a
government agency, university, corporation or similar organization and is typically a
network across a set of buildings that are close together.
hr
• Metropolitan Area Networks (MAN): Metropolitan area networks are networks that stretch
across a region the size of a metropolitan area. A MAN is a series of connected LANs in a city,
which might also connect to a WAN.
• Enterprise Private Networks: An enterprise private network is used by a company to connect
S
its various sites so that the different locations can share resources.
• Internetworks: Internetworks connect different networks together to build a larger network.
Internetworking is often used to describe building a large, global network.
• Backbone Networks (BBN): A backbone is a part of a network that connects different pieces
and provides a path for information to be exchanged.
• Global Area Networks (GAN): A global area network is a worldwide network that connects
networks all over the globe, such as the internet.
Classification of Network based on use of computer nodes: Network architecture is classified into
following categories :
4
Shrichakradhar.com 9958947060
m
60 co
Peer-to-Peer Network: In the P2P (Peer-to-Peer) network, “peers” generally represent computer
system. These peers are connected to each other with help of Internet. Files might be shared directly
.
without requirement of central server among these systems on the network. It can be said that each
of computers on P2P network usually becomes file server even as client also. In this architecture,
70 ar
system is generally decomposed into various computational nodes that contain the same and
equivalent capabilities, abilities, and responsibilities.
1. In this network, tasks are allocated at each and every device available on network. This
94 dh
network is very essential and important for small environments, usually up to at least 10
computers. There is also no separate division as clients and servers. Each and every computer
in this network are treated same and equally and might send even receive message directly.
This P2P network is generally useful in various fields such as business, education, military, etc.
58 ra
k
99 a
h
ic
hr
S
Advantages :
• Dedicated server or centralized is not very essential, so P2P network is less costly and is
very cheaper. It is affordable.
• P2P is very simple and not complex. This is because all computers that are connected in
network communication in an efficient and well-mannered with each other.
• It is very easy and simple to set up and manage as installation and setup is less painless
and computer manages itself. This is because of built-in support in modern operating
systems.
Disadvantages:
• Security is one of major issues in this type of network. This is because message that is sent
flows freely among connected computers.
5
Shrichakradhar.com 9958947060
• If computer working with some of resources is down and sharing of resources might
become major problem.
• Performance, security, and access can also become major problem and headache with an
increase in number of computers on this network.
2. Client/Server Network: CSN (Client/Server Network) is type of computer network in which
one of centralized and powerful computers (commonly called as server) is hub to which many
of personal computers that are less powerful or workstations (commonly known as clients) are
connected. It is type of system where clients are connected to server to just share or use
m
resources. These servers are generally considered as heart of system.
This type of network is more stable and scalable as compared to P2P network. In this architecture,
system is generally decomposed into client and server processor or processes. This architecture
60 co
supports separation of functionality commonly based on concept of service.
.
70 ar
94 dh
58 ra
Advantages:
• A special Network Operating System (NOS) is provided by server to provide resources to
k
Ans. Physical units of a computer system constitute a computer’s hardware. When you look at a
computer system you are actually looking at the computer hardware.
A computer, like the human brain, receives information, stores it, processes it, and displays results. A
computer receives information from input devices, stores it in memory, processes this information in
the central processing unit and displays the results of processing in a useful form through output
devices. Most commonly used input device is the keyboard. It resembles somewhat like the
typewriter. Using the keyboard one can type in the inputs. Mouse is also another input device
commonly used. The output device usually used is the VDU (i.e., Visual Display Unit). This
resembles very much like the TV screen and it can display both text and graphic images. The output
is displayed after being processed by CPU. The output displayed can be in colour or black and white
6
Shrichakradhar.com 9958947060
as the composition of screen is, just as in the case of TV. Another commonly used output device is the
printer. A printout is a more permanent output than getting the output displayed on the screen. A
computer’s memory like the human’s is limited. Hence, it stores most critical information in its main
memory and less critical and less frequently used information in its secondary memory. Below we
describe each of these parts in detail.
(ii) Critical Success Factor
Ans. These four techniques have their relative merits and demerits, and to overcome the
disadvantages, the Research Team at Sloan School of Management, suggested a creative approach
m
termed as CSF approach for information requirement analysis. Its application was found effective and
response-provoking amongst the executives. As a part of the exercise, the executive goals and the
CSFs are identified and reviewed to the satisfaction of both the executives and the system analysts.
60 co
The CSFs for any business are the limited number of areas in which results, if they are satisfactory,
will ensure successful competitive performance for the organisation. These are a few areas where the
things “must go right”, for the business to flourish. The CSFs must receive constant and consistent
attention from the management as well as individual managers. CSFs differ from company to
company and from manager to manager and like organisations may have differing CSFs. There are
.
four prime sources for identifying the CSFs as listed below:
70 ar
• Structure of the particular industry,
• Competitive strategy, industry position and geographical location of the company,
• Environmental factors,
94 dh
• Temporal organisational factors needing immediate attention.
The CSFs are generally not meant for strategic planning, since the data requirements are impossible to
pre-plan. The CSF method centres around information needs for management control where data
requirements could be defined and pre-planned. Most executives have four to eight CSFs.
58 ra
manipulation. Therefore, a computer essentially maintains, in its storage, the data and the programme
or software. A programme causing hindrances of other programme execution in such a way that
99 a
result in the modification or even complete destruction of data without the user’s intentions or
unpredictable behaviour in display, print, etc. or even sabotaging the operational system are some of
h
the examples of perverse activities for computers. The computer system on which a perverse software
is operational is said to be an infected system.
ic
But, how does a software cause a perverse activity? The answer to this question is given in this Unit
in the next few sections, since it requires some more details about computer virus. But we can dwell
for a moment on the reasons for this perverse activity. There are several reasons for it such as:
hr
• for gaining publicity some individuals have made these type of software,
• or are developed by individuals as practical jokes,
• or as personal vendetta against a company or another person,
• or may be it is an in-born natural desire to tease other persons,
S
7
Shrichakradhar.com 9958947060
m
various elements(link, nodes, etc.), including the device location and code installation of a
computer network. In other words, we can say that it is the physical layout of nodes,
workstations, and cables in the network.
60 co
2. Logical Topology: A logical topology describes the way, data flow from one computer to
another. It is bound to a network protocol and defines how data is moved throughout the
network and which path it takes. In other words, it is the way in which the devices
communicate internally.
Network topology defines the layout, virtual shape, or structure of the network, not only
.
physically but also logically. A network can have one physical topology and multiple logical
70 ar
topologies at the same time.
In this blog, we will mainly concentrate on physical topologies. We'll learn about different types of
physical topologies, their advantages, and disadvantages.
94 dh
In a computer network, there are mainly six types of physical topology, they are:
• Bus Topology
• Ring Topology
• Star Topology
58 ra
• Mesh Topology
• Tree Topology
• Hybrid Topology
k
It is a process of collecting and interpreting facts, identifying the problems, and decomposition of a
system into its components.
h
System analysis is conducted for the purpose of studying a system or its parts in order to identify its
objectives. It is a problem solving technique that improves the system and ensures that all the
ic
8
Shrichakradhar.com 9958947060
m
60 co
Outputs and Inputs
.
• The main aim of a system is to produce an output which is useful for its user.
70 ar
• Inputs are the information that enters into the system for processing.
• Output is the outcome of processing.
Processor(s)
94 dh
• The processor is the element of a system that involves the actual transformation of input into
output.
• It is the operational component of a system. Processors may modify the input either totally or
partially, depending on the output specification.
58 ra
• As the output specifications change, so does the processing. In some cases, input is also
modified to enable the processor for handling the transformation.
Control
• The control element guides the system.
k
• It is the decision–making subsystem that controls the pattern of activities governing input,
processing, and output.
99 a
• The behavior of a computer System is controlled by the Operating System and software. In
order to keep system in balance, what and how much input is needed is determined by
h
Output Specifications.
Feedback
ic
for action.
Environment
• The environment is the “supersystem” within which an organization operates.
• It is the source of external elements that strike on the system.
S
• It determines how a system must function. For example, vendors and competitors of
organization’s environment, may provide constraints that affect the actual performance of
the business.
Boundaries and Interface
• A system should be defined by its boundaries. Boundaries are the limits that identify its
components, processes, and interrelationship when it interfaces with another system.
• Each system has boundaries that determine its sphere of influence and control.
• The knowledge of the boundaries of a given system is crucial in determining the nature of its
interface with other systems for successful design.
9
Shrichakradhar.com 9958947060
m
60 co
.
70 ar
94 dh
Feasibility study
The first stage of the system life cycle
This is an investigation that is carried out by a systems analyst to find out what the main problems
are with the existing system and if it is technically possible and cost-effective to solve these problems
58 ra
system;
• A set of system objectives which describe what the new system must be able to do;
99 a
During the analysis stage systems analysts investigate the existing system to identify exactly what the
problems are with the existing system
Systems analysts will use a variety of fact-finding methods to gather information for example
hr
• Questionnaires
• Interviews
• Observation
• Examining documents
S
Design
• Alternative possible solutions are identified
• Alternative solutions evaluated
• The best solution is identified
A design specification is produced containing information about:
• Input
• Output
• Data storage
• User interface
• Backup and recovery procedures
10
Shrichakradhar.com 9958947060
• Security procedures
Test plan Typical format for a test plan
m
60 co
.
Implementation
70 ar
This stage involves:
Setting up the system so that it matches the design specification
Testing carried out using the plan to make sure that all the parts of the system work correctly with
normal, extreme and erroneous data
94 dh
• Normal test data is used to check that a system can handle the sort of data that would be
expected during day-to-day use
• Extreme test data is used to check that a system can cope with data that lies on the boundaries
of what is acceptable
58 ra
• Erroneous (or exceptional) test data is used to check that a system can identify data that is
wrong and reject it
Testing using normal, extreme and erroneous data
k
99 a
h
ic
hr
S
11
Shrichakradhar.com 9958947060
m
• detailed instructions on how to operate each part of the system;
• Error messages, their meaning and how to deal with them.
• Where to get more help, such as telephone support lines and on-line tutorials.
60 co
Post-implementation review: Carried out after the new system has been running for a few weeks or
months to identify any modifications that may need to be made.
Maintenance: A new information system may need to be changed due to:
• Change in needs of user
• Problems not found during testing
.
• Improvements required in the way the system works
70 ar
Q7. Describe the importance and role of computers in Management Decision – Making Process.
Ans. Information plays a vital role in decision-making. Even to take very simple decisions, we
94 dh
need information. To understand the role played by information in decision-making, we have to
understand how decisions are taken. Decision-making is basically a process that includes the
following stages:
Information is thus, very important to take decisions.
58 ra
Imagine a simple decision like the one a driver (say) makes when he puts on the brakes to stop a
speeding vehicle when he sees a child crossing the road (in middle of the road). The driver decides
on braking based on a lot of information processing that happens in his brain. At every stage of the
decision-making he uses information that he captures visually. All decisions are like this.
k
First we get information about a problem, format it into a structure and then factor in the
information about the context in which the problem has occurred. Like in the above case instead of
99 a
the child being at the middle of the road and crossing it, the driver would have seen the child about
to cross over with a few steps only he would probably not have braked to stop but would have
h
slowed down, as he would have calculated that by the time the vehicle reaches the crossing stage,
the child would already have passed. So if the problem was structured as ‘how to not hit the child
ic
crossing the road?’, and if the child was at the middle of the road, the driver would have braked but
had the child been at (say) at ninety per cent completion level of crossing the road, the driver would
have only slowed down and not braked to stop. Therefore, we see that the context has a major role in
hr
the decision-making and information is required both about the problem and about the context in
which the problem occurred. The next stage for the decision maker would be to generate
alternatives. In the driver’s case such possible alternatives would be
Stages of Decision- Role of Information
S
making
Identification and One needs information to identify a problem and put it in a
structuring of structured manner. Without information about a problem or
problem/opportunity opportunity, the decision-making process does not even start.
Putting the problem/ Without information about the context in which the problem has
opportunity in context occurred, one cannot take any decision on it. In a way, the
.information about the context defines the problem.
Generation of Information is a key ingredient in the generation of alternatives for
alternatives decision-making. One has to have information about possible
solutions to generate alternatives.
12
Shrichakradhar.com 9958947060
Choice of best alternative Based on the information about the suitability of the alternatives, a
choice is made to select the best alternative.
• to stop by braking
• to slow down
• to take a sharp turn towards left or right to avoid the child
• press the horn so that the child crosses the road fast
• To drive the vehicle on to the footpath and out of the road to avoid collision, etc
So the decision-maker generates these possible solutions to the problem at hand based on
m
information about such possible solutions. Each of the alternatives represents a possible solution,
which one can generate if one has information about them. In the case of the driver, obviously, he
needs knowledge and information to generate these alternatives, i.e., to stop by breaking the driver
60 co
would need to know that braking stops the vehicle. If he is unaware of this crucial information he
would not have been able to generate this alternative. So information is vital for generation of
alternatives. Now for the choice part also, the decision maker needs to have information about the
suitability of each alternative to decide, which the ‘best’ is. In our example, the driver calculates the
‘payoff’ for each alternative based on his calculation of the outcome that again is based on
.
information. He selects the ‘best’ option that solves the problem. Thus, we can see that information is
70 ar
the key to the decision making process, without information and the right kind of information
decision-making is not possible. Information plays a crucial role in every stage of the decision-
making process.
94 dh
Decision-making is the most important task of managers in an organization. Therefore, to enable
managers to take good quality decisions, it is very important to provide them with the right kind of
information. Information management in organizations therefore assumes a special significance. In
most organizations, business or otherwise, a systematic systems based method is used for
58 ra
information management. Systems based information management works best under a computerized
environment and such computer based information management system is normally called
‘Management Information Systems (MIS)’, which provides the service of information supply to the
managers enabling them to take informed decisions. It may be worthwhile to mention here that MIS
k
does not necessitates the use of computer based technology, but the use of computers and
information technology makes MIS suitable for business organizations in a competitive environment
99 a
as it helps to provide timely and accurate information. MIS done manually, without the help of
computers is neither timely nor accurate.
h
Q8. Define Hacking. Discuss the precautions that are to be adopted against Hacking.
ic
Ans. Definition: Hacking is an attempt to exploit a computer system or a private network inside a
computer. Simply put, it is the unauthorised access to or control over computer network security
systems for some illicit purpose.
hr
Description: To better describe hacking, one needs to first understand hackers. One can easily assume
them to be intelligent and highly skilled in computers. In fact, breaking a security system requires
more intelligence and expertise than actually creating one. There are no hard and fast rules whereby
we can categorize hackers into neat compartments. However, in general computer parlance, we call
S
them white hats, black hats and grey hats. White hat professionals hack to check their own security
systems to make it more hack-proof. In most cases, they are part of the same organisation. Black hat
hackers hack to take control over the system for personal gains. They can destroy, steal or even
prevent authorized users from accessing the system. They do this by finding loopholes and
weaknesses in the system. Some computer experts call them crackers instead of hackers. Grey hat
hackers comprise curious people who have just about enough computer language skills to enable
them to hack a system to locate potential loopholes in the network security system. Grey hats differ
from black hats in the sense that the former notify the admin of the network system about the
weaknesses discovered in the system, whereas the latter is only looking for personal gains. All kinds
of hacking are considered illegal barring the work done by white hat hackers.
13
Shrichakradhar.com 9958947060
m
(3) Choose your apps wisely: Only download apps from trustworthy sources that have
established a good reputation. Make sure you update your software and apps regularly and
get rid of old apps you don’t use.
60 co
(4) Use a password, lock code or encryption: Make sure your passwords are at least eight
characters long, with a mix of upper and lower case, and include numbers or other
characters, and never use the auto-complete feature for passwords. You can use the storage
encryption feature on your phone to protect your private data, and set your screen to
timeout after five minutes or less.
.
(5) Be skeptical about links and attachments: If you’re not sure about the source, don’t use the
70 ar
link or open the attachment.
(6) Trace or erase: Make sure your data is secure if your mobile device is stolen or lost. You can
set up your device to lock itself after a pre-set number of failed log-in attempts.
94 dh
Q9. Critically analyse the impact of computerisation on the society.
Ans. Everyone knows that this is the age of computer and vast majority of people are using computer.
Development of science and technology has direct effect on our daily life as well as in our social life.
58 ra
Computer technology has made communication possible from one part of the world to the other in
seconds. They can see the transactions in one part of the world while staying in the other part.
Computer development is one of the greatest scientific achievements of the 20 th century. Computers
are used in various fields as well as in teaching and learning. Some of the major computer application
k
enabling them to information as such things as current balances, deposits, overdrafts and
interest charges.
ic
• Road Traffic Control: Computers assist with the control of traffic lights.
• Telephones: Computerized telephone exchanges handle an ever increasing volume of calls
very efficiently.
• Medicine: Computers are widely used in hospitals for such task as maintaining drugs,
surgical equipments and linen, for payroll and also for checkup and treatment of diseases.
Computers have both positive and negative impact in our daily life as well as in our social
life. But the gross development of the nation is faster with the application of computers in
industries and education. The both positive and negative impacts of computers are listed
below.
14
Shrichakradhar.com 9958947060
m
• It can be used for various purposes. i.e. It can be used in any type of work.
Negative Impact of Computer –
• Highly expensive.
60 co
• Accidents.
• Data piracy.
• Increased Unemployment.
• Huge data and information can be lost sometimes.
• Fast changing computer technology.
.
• Service distribution.
70 ar
• Illiteracy of computing and computers.
generate information reports after processing data. The examples of this kind of systems could be
personnel information systems, marketing information systems, sales information systems,
production and operations systems, etc. These systems are designed following the principles of
organisational theory. The major group of users for this kind of systems are the middle levels of
k
management.
(ii) CBIS in Tourism Sector
99 a
Ans. CBIS is a data processing system into a high-quality information and can be used as tools that
support decision-making, coordination and control as well as visualization and analysis.
h
There are 5 components in a computer based information system. Each component is responsible to
perform some specific functionality. So every components must come together in order to produce a
ic
computer based information system. The components of a computer based information system are
stated below:
1.Hardware 2.Software 3.Data 4.Procedures 5.People
hr
1.Hardware: The term hardware refers to machinery. This category includes the computer itself,
which is often referred to as the central processing unit (CPU), and all of its support equipments.
Among the support equipments are input and output devices, storage devices and communications
devices.
S
2.Software: The term software refers to computer programs and the manuals (if any) that support
them. Computer programs are machine-readable instructions that direct the circuitry within the
hardware parts of the system to function in ways that produce useful information from data.
Programs are generally stored on some input/output medium, often a disk or tape.
3.Data: Data are facts that are used by programs to produce useful information. Like programs, data
are generally stored in machine-readable form on disk or tape until the computer needs them.
4.Procedures: Procedures are the policies that govern the operation of a computer system.
“Procedures are to people what software is to hardware” is a common analogy that is used to
illustrate the role of procedures in a system.
15
Shrichakradhar.com 9958947060
5. People: Every system needs people if it is to be useful. Often the most over-looked element of the
system are the people, probably the component that most influence the success or failure of
information systems.
(iii) Information Resource Assessment
Ans. The lower arrow in the Figure represents Information Resource Assessment (IRA) — a process
of using information and knowledge to support the development of the organisation’s strategic
business direction. In effect, it is the mirror image of “Strategic Planning for Information Resource”, in
the sense that it is the process through which information and knowledge are used to identify the
m
strategic comparative advantages and a create and evaluate new strategies, i.e., to influence change in
the “Organisational Strategy Set”.
60 co
.
70 ar
94 dh
58 ra
k
99 a
h
ic
hr
S
16