You are on page 1of 17

01102ÿ45ÿ6789

0 1697ÿ0 7 0 71ÿ1 0ÿ 7ÿ19


60ÿ
ÿ 1ÿ0ÿ ÿ
ÿ
"ÿ"5ÿ0110ÿ4#01024ÿ $5ÿ0110#010ÿ
1%ÿ05ÿ&''ÿ ÿ"5ÿ0110ÿ4#010ÿ4#10 #('(&ÿ
ÿ ÿ
ÿ 75ÿ)*+,ÿ)-.ÿ/01,+,2,ÿ03ÿÿ45ÿ062ÿ03ÿ7*+/*ÿ806ÿ*9:;ÿ20ÿ<ÿ=ÿ>?@ÿ
)*;ÿA6;,2+01ÿ/9BB+;,ÿ('ÿÿCDÿ91Eÿ,*06FEÿG;ÿ91,7;B;Eÿ+1ÿ9G062ÿH''ÿIJÿK;1Eÿ
ÿÿ 806Bÿ)-.ÿ20ÿ2*;ÿL00BE+1920Bÿ03ÿ806BÿK26E8ÿL;12B;@ÿ
ÿ
M@ÿOPQF9+1ÿ7+2*ÿ2*;ÿ*;FQÿ03ÿ,6+29GF;ÿ;P9RQF;,ÿ2*;ÿ/0SB;F92+01ÿG;27;;1ÿT9295ÿU130BR92+01ÿ91Eÿ
V107F;EW;@ÿ ÿ ÿ ÿ ÿ ÿ ÿ ÿÿÿÿÿÿÿÿ ÿ ÿ ÿ XYÿÿÿÿÿ
X@ÿT+,/6,,ÿ2*;ÿB0F;ÿ03ÿU130BR92+01ÿ);/*10F0W8ÿ+1ÿ2*;ÿWB072*ÿ91EÿE;:;F0QR;12ÿ03ÿ)06B+,RÿU1E6,2B8@ÿ
K6QQ0B2ÿ806Bÿ91,7;Bÿ7+2*ÿ,6+29GF;ÿ;P9RQF;,@ÿ ÿÿÿÿ ÿ ÿ ÿ ÿ ÿ ÿXYÿÿÿÿÿ
Z@ÿT+,/6,,ÿ2*;ÿE+33;B;12ÿW;1;B92+01ÿ03ÿ/0RQ62;B,[ÿ7*+F;ÿR;12+01+1Wÿ2*;ÿ\;8ÿ3;926B;,ÿ03ÿ;9/*ÿW;1;B92+01@ÿ
ÿ ÿ ÿ ÿ ÿ ÿ ÿ ÿ ÿ ÿ ÿ ÿ ÿ XYÿÿÿ
]@ÿ^*92ÿE0ÿ806ÿ61E;B,291EÿG8ÿL0RQ62;Bÿ_;270B\`ÿOPQF9+1ÿ2*;ÿ/F9,,+3+/92+01ÿ03ÿ/0RQ62;Bÿ1;270B\ÿ
,2B6/26B;,@ÿÿ ÿ ÿ ÿ ÿ ÿ ÿ ÿ ÿ ÿ ÿ XYÿÿÿÿ
ÿÿ
a@ÿ^B+2;ÿ,*0B2ÿ102;,ÿ01ÿ2*;ÿ30FF07+1Wbÿÿÿÿ ÿÿÿÿ]PÿacXYÿÿÿÿÿÿÿÿÿÿÿÿÿ
+@ÿ L0RQ62;Bÿd9BE79B;ÿ
++@ÿ LB+2+/9FÿK6//;,,ÿe9/20Bÿÿ
+++@ÿ f;B:;B,;ÿK03279B;ÿ
+:@ÿ _;270B\ÿ)0Q0F0W8ÿ
ÿ
g@ÿT;3+1;ÿK8,2;R,ÿ.19F8,+,@ÿOPQF9+1ÿ2*;ÿK8,2;Rÿh+3;ÿL8/F;@ÿÿÿ ÿ ÿ ÿ ÿÿ XYÿÿÿÿÿ
ÿ
i@ÿT;,/B+G;ÿ2*;ÿ+RQ0B291/;ÿ91EÿB0F;ÿ03ÿ/0RQ62;B,ÿ+1ÿ-919W;R;12ÿT;/+,+01ÿjÿ-9\+1WÿfB0/;,,@ÿÿÿXYÿ
ÿ ÿ ÿÿÿÿÿ
k@ÿT;3+1;ÿd9/\+1W@ÿT+,/6,,ÿ2*;ÿQB;/962+01,ÿ2*92ÿ9B;ÿ20ÿG;ÿ9E0Q2;Eÿ9W9+1,2ÿd9/\+1W@ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿXYÿ
ÿ
l@ÿLB+2+/9FF8ÿ919F8,;ÿ2*;ÿ+RQ9/2ÿ03ÿ/0RQ62;B+,92+01ÿ01ÿ2*;ÿ,0/+;28@ÿÿÿÿ ÿXYÿÿ
ÿÿ ÿ
MY@ÿ^B+2;ÿ,*0B2ÿ102;,ÿ01ÿ918ÿ270ÿ03ÿ2*;ÿ30FF07+1Wbÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿ ÿÿÿÿÿ ÿXÿPÿMYcXYÿÿÿÿÿÿÿÿÿÿÿÿÿ
+@ÿ -919W;R;12ÿU130BR92+01ÿK8,2;Rÿÿ
++@ÿ LmUKÿ+1ÿ)06B+,RÿK;/20Bÿ
+++@ÿ U130BR92+01ÿn;,06B/;ÿ.,,;,,R;12ÿ
ÿ
ÿ
Shrichakradhar.com 9958947060

ASSIGNMENT SOLUTIONS GUIDE (2021)


MTTM- 4: INFORMATION MANAGEMENT SYSTEM AND
TOURISM
Disclaimer/Special Note: These are just the sample of the Answers/Solutions to some of the Questions
given in the Assignments. These Sample Answers/Solutions are prepared by Private

m
Teacher/Tutors/Authors for the help and guidance of the student to get an idea of how he/she can
answer the Questions given the Assignments. We do not claim 100% accuracy of these sample
answers as these are based on the knowledge and capability of Private Teacher/Tutor. Sample

60 co
answers may be seen as the Guide/Help for the reference to prepare the answers of the Questions
given in the assignment. As these solutions and answers are prepared by the private teacher/tutor so
the chances of error or mistake cannot be denied. Any Omission or Error is highly regretted though
every care has been taken while preparing these Sample Answers/Solutions. Please consult your own

.
Teacher/Tutor before you prepare a Particular Answer and for up-to-date and exact information, data

70 ar
and solution. Student should must read and refer the official study material provided by the
university.
94 dh
Q1. Explain with the help of suitable examples the co-relation between Data, Information and
Knowledge.
Ans. Data are recorded (captured and stored) symbols and signal readings.
• Symbols include words (text and/or verbal), numbers, diagrams, and images (still &/or
58 ra

video), which are the building blocks of communication.


• Signals include sensor and/or sensory readings of light, sound, smell, taste, and touch.
What is Information?: Information is a set of data that is processed in a meaningful way according to
k

the given requirement. It is processed, structured, or presented in a given context to make it


meaningful and useful.
99 a

Information assigns meaning and improves the reliability of the data. It helps to ensure undesirability
and reduces uncertainty. Therefore, when the data is transformed into information, it never has any
h

useless details. It includes data that possess context, relevance, and purpose. It also involves the
manipulation of raw data which eventually becomes knowledge.
ic

Characteristics of Information: Here, are important characteristics of the Information:


• The main characteristics of information are accuracy, completeness, relevance, and
availability
hr

• Information is said to be facts provided or learned about someone or something


• No defined connection between ideas
• Its availability to the right person at the right time
• Enhance learning
S

What is Knowledge?: Knowledge is a combination of information, experience, and insight that helps
the individual or the organization. It is linked to doing and implies know-how and understanding.
Knowledge is possessed by each individual and is an outcome of his or her experience. It also covers
the norms to evaluates new inputs from his surroundings.
Characteristics of Knowledge: Here are an important characteristic of knowledge:
• Knowledge is accurate as it conveys the true situation.
• It is available in time to make the most appropriate and correct decisions.
• It is portrayed in common, easy to understood formats.
• It provides all the necessary data.
• Meaningful and useful for the decision-making process.

1
Shrichakradhar.com 9958947060

• Involves communication and reception Information


• It reduces uncertainties and estimates to take action

Q2. Discuss the role of Information Technology in the growth and development of Tourism
Industry. Support your answer with suitable examples.
Ans. Information Technology has played an important role in the hospitality and tourism industry
over the last decade. Technology has helped reduce costs, enhance operational efficiency, and
improve services and customer experience. Both customers and businesses can benefit from improved

m
communication, reservations, and guest service systems.
Technology has helped tourism and hospitality industries replace expensive human labor with
technological labor. This helps reduce labor costs, but also helps avoid customer service issues.

60 co
Here are some examples of the ways that IT continues to improve the hospitality and tourism
industry.
Internet and Marketing
The internet has a powerful impact on hospitality and tourism. A customer’s first experience with
your business is a visit to your website. This includes looking at pictures and reviews from past

.
guests. It is vital for a business to effectively utilize online advertising, social media, blogs, and online

70 ar
purchasing to help convenience their customers, especially when your competitors are doing the
same thing.
Computer Systems
94 dh
Computer systems allow communication between larger hotel chains with multiple locations to
connect easier. They also help keep staff on the same page and make it easier to access information,
making your guests experience much better. Guest requests, housekeeping information, and
reservations can all be found on one system.
58 ra

Mobile Communication
Mobile tablets and smartphones have replaced large desktop computers, making them virtually
extinct. This is helpful, because many travelers take some type of mobile device with them on a trip.
This helps hospitality businesses keep customers advised of changes and delays to their reservations,
k

offer deals, and advertise by using GPS tracking.


99 a

Technological revolutions
Travel is a basic human nature. Technological revolutions in the last few decades and the resulting
h

changes in the social systems go faster its intensity in the current century. Thus, tourism is presently a
mass phenomenon involving every human being in the world. They need detailed information about
ic

each place they intend to visit. The specific elements of such information needs are:
• Geographical information on location, landscape and climate, etc.
• Information Needs in Tourism
hr

• Accommodation, restaurant and shopping facilities


• Accessibility though air, railway, water and road and availability of scheduled means of
transport
• Social customs, culture and other special features of the place
S

• Activities and entertainment facilities


• Seasons of visit and other unique features
• Quality of facilities and their standard prices including exchange rates
Though the ultimate users of this information are the tourists, the actual benefits in money terms
accrue to the tourism industry consisting of the destination managers and service providers. The
travel intermediaries like travel agents, tour operators, and reservation system store such information
in respect of each destination to service their clients and improve their business. They need the
information in the easiest retrieval format so that the information needs of the clients are met as
quickly as possible.

2
Shrichakradhar.com 9958947060

Tourists generally need both static and dynamic information. It includes details information about
location, climate, attraction features, history, facilities available, etc. Information about airline, train
and bus schedules, tariffs of transport and accommodation units and current availability of such
facilities is considered as dynamic as they can change very frequently. These items of information
have to be gathered, stored and disseminated on a real time basis. All types of reservation systems
including air, railway and accommodation sectors contain such information.[3] The tourism industry
is made up of three major components: namely,
a) Transport sector,

m
b) Accommodation sector
c) Attraction sector

Q3. Discuss the different generation of computers' while mentioning the key features of each

60 co
generation.
Ans. Five basic generations of computers:
1940 – 1956: First Generation – Vacuum Tubes
These early computers used vacuum tubes as circuitry and magnetic drums for memory. As a result

.
they were enormous, literally taking up entire rooms and costing a fortune to run. These were

70 ar
inefficient materials which generated a lot of heat, sucked huge electricity and subsequently
generated a lot of heat which caused ongoing breakdowns.
These first generation computers relied on ‘machine language’ (which is the most basic programming
94 dh
language that can be understood by computers). These computers were limited to solving one
problem at a time. Input was based on punched cards and paper tape. Output came out on print-outs.
The two notable machines of this era were the UNIVAC and ENIAC machines – the UNIVAC is the
first every commercial computer which was purchased in 1951 by a business – the US Census Bureau.
58 ra

1956 – 1963: Second Generation – Transistors


The replacement of vacuum tubes by transistors saw the advent of the second generation of
computing. Although first invented in 1947, transistors weren’t used significantly in computers until
the end of the 1950s. They were a big improvement over the vacuum tube, despite still subjecting
k

computers to damaging levels of heat. However they were hugely superior to the vacuum tubes,
making computers smaller, faster, cheaper and less heavy on electricity use. They still relied on
99 a

punched card for input/printouts.


The language evolved from cryptic binary language to symbolic (‘assembly’) languages. This meant
h

programmers could create instructions in words. About the same time high level programming
languages were being developed (early versions of COBOL and FORTRAN). Transistor-driven
ic

machines were the first computers to store instructions into their memories – moving from magnetic
drum to magnetic core ‘technology’. The early versions of these machines were developed for the
atomic energy industry.
hr

1964 – 1971: Third Generation – Integrated Circuits


By this phase, transistors were now being miniaturised and put on silicon chips (called
semiconductors). This led to a massive increase in speed and efficiency of these machines. These
were the first computers where users interacted using keyboards and monitors which interfaced with
S

an operating system, a significant leap up from the punch cards and printouts. This enabled these
machines to run several applications at once using a central program which functioned to monitor
memory.
As a result of these advances which again made machines cheaper and smaller, a new mass market of
users emerged during the ‘60s.
1972 – 2010: Fourth Generation – Microprocessors
This revolution can be summed in one word: Intel. The chip-maker developed the Intel 4004 chip in
1971, which positioned all computer components (CPU, memory, input/output controls) onto a single
chip. What filled a room in the 1940s now fit in the palm of the hand. The Intel chip housed thousands
of integrated circuits. The year 1981 saw the first ever computer (IBM) specifically designed for home

3
Shrichakradhar.com 9958947060

use and 1984 saw the MacIntosh introduced by Apple. Microprocessors even moved beyond the
realm of computers and into an increasing number of everyday products.
The increased power of these small computers meant they could be linked, creating networks. Which
ultimately led to the development, birth and rapid evolution of the Internet. Other major advances
during this period have been the Graphical user interface (GUI), the mouse and more recently the
astounding advances in lap-top capability and hand-held devices.
2010- : Fifth Generation – Artificial Intelligence
Computer devices with artificial intelligence are still in development, but some of these technologies

m
are beginning to emerge and be used such as voice recognition.
AI is a reality made possible by using parallel processing and superconductors. Leaning to the future,
computers will be radically transformed again by quantum computation, molecular and nano

60 co
technology.
The essence of fifth generation will be using these technologies to ultimately create machines which
can process and respond to natural language, and have capability to learn and organise themselves.

Q4. What do you understand by Computer Network? Explain the classification of computer

.
network structures.

70 ar
Ans. Computer networks are the basis of communication in IT. They are used in a huge variety of
ways and can include many different types of network. A computer network is a set of computers
that are connected together so that they can share information. The earliest examples of computer
94 dh
networks are from the 1960s, but they have come a long way in the half-century since then.
Types of Computer Network:
There are many different types of network, which can be used for different purposes and by different
types of people and organization. Here are some of the network types that you might come across:
58 ra

• Local Area Networks (LAN): A local area network or LAN is a network that connects
computers within a limited area. This might be in a school, an office or even a home.
• Personal Area Networks (PAN): A personal area network is a network that is based on an
individual's workspace. The individual's device is the center of the network, with other
k

devices connected to it. There are also wireless personal area networks.
• Home Area Networks (HAN): A home area network connects devices within a home
99 a

environment. It might include personal computers, tablets, smartphones, printers, TVs and
other devices.
h

• Wide Area Networks (WAN): A wide area network is a network that covers a larger
geographical area, usually with a radius of more than a kilometer.
ic

• Campus Networks: A campus network is a LAN or set of connected LANs which is used by a
government agency, university, corporation or similar organization and is typically a
network across a set of buildings that are close together.
hr

• Metropolitan Area Networks (MAN): Metropolitan area networks are networks that stretch
across a region the size of a metropolitan area. A MAN is a series of connected LANs in a city,
which might also connect to a WAN.
• Enterprise Private Networks: An enterprise private network is used by a company to connect
S

its various sites so that the different locations can share resources.
• Internetworks: Internetworks connect different networks together to build a larger network.
Internetworking is often used to describe building a large, global network.
• Backbone Networks (BBN): A backbone is a part of a network that connects different pieces
and provides a path for information to be exchanged.
• Global Area Networks (GAN): A global area network is a worldwide network that connects
networks all over the globe, such as the internet.
Classification of Network based on use of computer nodes: Network architecture is classified into
following categories :

4
Shrichakradhar.com 9958947060

m
60 co
Peer-to-Peer Network: In the P2P (Peer-to-Peer) network, “peers” generally represent computer
system. These peers are connected to each other with help of Internet. Files might be shared directly

.
without requirement of central server among these systems on the network. It can be said that each
of computers on P2P network usually becomes file server even as client also. In this architecture,

70 ar
system is generally decomposed into various computational nodes that contain the same and
equivalent capabilities, abilities, and responsibilities.
1. In this network, tasks are allocated at each and every device available on network. This
94 dh
network is very essential and important for small environments, usually up to at least 10
computers. There is also no separate division as clients and servers. Each and every computer
in this network are treated same and equally and might send even receive message directly.
This P2P network is generally useful in various fields such as business, education, military, etc.
58 ra
k
99 a
h
ic
hr
S

Advantages :
• Dedicated server or centralized is not very essential, so P2P network is less costly and is
very cheaper. It is affordable.
• P2P is very simple and not complex. This is because all computers that are connected in
network communication in an efficient and well-mannered with each other.
• It is very easy and simple to set up and manage as installation and setup is less painless
and computer manages itself. This is because of built-in support in modern operating
systems.
Disadvantages:
• Security is one of major issues in this type of network. This is because message that is sent
flows freely among connected computers.

5
Shrichakradhar.com 9958947060

• If computer working with some of resources is down and sharing of resources might
become major problem.
• Performance, security, and access can also become major problem and headache with an
increase in number of computers on this network.
2. Client/Server Network: CSN (Client/Server Network) is type of computer network in which
one of centralized and powerful computers (commonly called as server) is hub to which many
of personal computers that are less powerful or workstations (commonly known as clients) are
connected. It is type of system where clients are connected to server to just share or use

m
resources. These servers are generally considered as heart of system.
This type of network is more stable and scalable as compared to P2P network. In this architecture,
system is generally decomposed into client and server processor or processes. This architecture

60 co
supports separation of functionality commonly based on concept of service.

.
70 ar
94 dh
58 ra

Advantages:
• A special Network Operating System (NOS) is provided by server to provide resources to
k

many users that request them.


• It is also very easy and simple to set up and manage data updates. This is because data is
99 a

generally stored in centralized manner on server.


• The server usually controls resources and data security.
h

• This network also boosts speed of sharing resources.


Disadvantages:
ic

• If anyhow server goes down or crashes, entire will be affected by this.


• It is very expensive as compared to P2P. This is due to need for server with greater memory
as well as need for many networking devices such as hubs, routers, switches, etc.
• Cost of NOS being provided is very high.
hr

Q5. Write short notes on the following:


(i) Computer Hardware
S

Ans. Physical units of a computer system constitute a computer’s hardware. When you look at a
computer system you are actually looking at the computer hardware.
A computer, like the human brain, receives information, stores it, processes it, and displays results. A
computer receives information from input devices, stores it in memory, processes this information in
the central processing unit and displays the results of processing in a useful form through output
devices. Most commonly used input device is the keyboard. It resembles somewhat like the
typewriter. Using the keyboard one can type in the inputs. Mouse is also another input device
commonly used. The output device usually used is the VDU (i.e., Visual Display Unit). This
resembles very much like the TV screen and it can display both text and graphic images. The output
is displayed after being processed by CPU. The output displayed can be in colour or black and white

6
Shrichakradhar.com 9958947060

as the composition of screen is, just as in the case of TV. Another commonly used output device is the
printer. A printout is a more permanent output than getting the output displayed on the screen. A
computer’s memory like the human’s is limited. Hence, it stores most critical information in its main
memory and less critical and less frequently used information in its secondary memory. Below we
describe each of these parts in detail.
(ii) Critical Success Factor
Ans. These four techniques have their relative merits and demerits, and to overcome the
disadvantages, the Research Team at Sloan School of Management, suggested a creative approach

m
termed as CSF approach for information requirement analysis. Its application was found effective and
response-provoking amongst the executives. As a part of the exercise, the executive goals and the
CSFs are identified and reviewed to the satisfaction of both the executives and the system analysts.

60 co
The CSFs for any business are the limited number of areas in which results, if they are satisfactory,
will ensure successful competitive performance for the organisation. These are a few areas where the
things “must go right”, for the business to flourish. The CSFs must receive constant and consistent
attention from the management as well as individual managers. CSFs differ from company to
company and from manager to manager and like organisations may have differing CSFs. There are

.
four prime sources for identifying the CSFs as listed below:

70 ar
• Structure of the particular industry,
• Competitive strategy, industry position and geographical location of the company,
• Environmental factors,
94 dh
• Temporal organisational factors needing immediate attention.
The CSFs are generally not meant for strategic planning, since the data requirements are impossible to
pre-plan. The CSF method centres around information needs for management control where data
requirements could be defined and pre-planned. Most executives have four to eight CSFs.
58 ra

(iii) Perverse Software


Ans. “A software which causes a perverse activity.” But, what is a perverse activity for computer?
The answer to this question lies in the basics of the computer. A personal computer has I/O devices,
CPU and Memory and it executes application programme/software which in turn do data
k

manipulation. Therefore, a computer essentially maintains, in its storage, the data and the programme
or software. A programme causing hindrances of other programme execution in such a way that
99 a

result in the modification or even complete destruction of data without the user’s intentions or
unpredictable behaviour in display, print, etc. or even sabotaging the operational system are some of
h

the examples of perverse activities for computers. The computer system on which a perverse software
is operational is said to be an infected system.
ic

But, how does a software cause a perverse activity? The answer to this question is given in this Unit
in the next few sections, since it requires some more details about computer virus. But we can dwell
for a moment on the reasons for this perverse activity. There are several reasons for it such as:
hr

• for gaining publicity some individuals have made these type of software,
• or are developed by individuals as practical jokes,
• or as personal vendetta against a company or another person,
• or may be it is an in-born natural desire to tease other persons,
S

• or an act of a maniac, etc.


All these perverse software are aimed towards producing a variety of disastrous effects while
normally a user wants to do something constructive with the help of the computer system to increase
his or her productivity and efficiency.
There may be different types of perverse software all of which generate a different type of perverse
activity. Yet all these activities have one thing in common, that is, they generate uncertainty for
computer users. The normal MS-DOS operations were designed with bona-fide normal users in mind
and were not geared up to detect such perverse software. Also, standard security checks normally do
not detect the anomaly caused by these perverse software in a computer system. Thus, an infected
computer system may continue to work, causing the infection to spread.

7
Shrichakradhar.com 9958947060

(iv) Network Topology


Ans. Topology is derived from two Greek words topo and logy, where topo means 'place' and logy
means 'study'. In computer networks, a topology is used to explain how a network is physically
connected and the logical flow of information in the network. A topology mainly describes how
devices are connected and interact with each other using communication links.
In computer networks, there are mainly two types of topologies, they are:
1. Physical Topology: A physical topology describes the way in which the computers or
nodes are connected with each other in a computer network. It is the arrangement of

m
various elements(link, nodes, etc.), including the device location and code installation of a
computer network. In other words, we can say that it is the physical layout of nodes,
workstations, and cables in the network.

60 co
2. Logical Topology: A logical topology describes the way, data flow from one computer to
another. It is bound to a network protocol and defines how data is moved throughout the
network and which path it takes. In other words, it is the way in which the devices
communicate internally.
Network topology defines the layout, virtual shape, or structure of the network, not only

.
physically but also logically. A network can have one physical topology and multiple logical

70 ar
topologies at the same time.
In this blog, we will mainly concentrate on physical topologies. We'll learn about different types of
physical topologies, their advantages, and disadvantages.
94 dh
In a computer network, there are mainly six types of physical topology, they are:
• Bus Topology
• Ring Topology
• Star Topology
58 ra

• Mesh Topology
• Tree Topology
• Hybrid Topology
k

Q6. Define Systems Analysis. Explain the System Life Cycle.


Ans. Systems Analysis
99 a

It is a process of collecting and interpreting facts, identifying the problems, and decomposition of a
system into its components.
h

System analysis is conducted for the purpose of studying a system or its parts in order to identify its
objectives. It is a problem solving technique that improves the system and ensures that all the
ic

components of the system work efficiently to accomplish their purpose.


What is a System?
The word System is derived from Greek word Systema, which means an organized relationship
hr

between any set of components to achieve some common cause or objective.


A system is “an orderly grouping of interdependent components linked together according to a plan
to achieve a specific goal.”
Constraints of a System
S

A system must have three basic constraints −


• A system must have some structure and behavior which is designed to achieve a predefined
objective.
• Interconnectivity and interdependence must exist among the system components.
• The objectives of the organization have a higher priority than the objectives of its
subsystems.
Elements of a System: The following diagram shows the elements of a system −

8
Shrichakradhar.com 9958947060

m
60 co
Outputs and Inputs

.
• The main aim of a system is to produce an output which is useful for its user.

70 ar
• Inputs are the information that enters into the system for processing.
• Output is the outcome of processing.
Processor(s)
94 dh
• The processor is the element of a system that involves the actual transformation of input into
output.
• It is the operational component of a system. Processors may modify the input either totally or
partially, depending on the output specification.
58 ra

• As the output specifications change, so does the processing. In some cases, input is also
modified to enable the processor for handling the transformation.
Control
• The control element guides the system.
k

• It is the decision–making subsystem that controls the pattern of activities governing input,
processing, and output.
99 a

• The behavior of a computer System is controlled by the Operating System and software. In
order to keep system in balance, what and how much input is needed is determined by
h

Output Specifications.
Feedback
ic

• Feedback provides the control in a dynamic system.


• Positive feedback is routine in nature that encourages the performance of the system.
• Negative feedback is informational in nature that provides the controller with information
hr

for action.
Environment
• The environment is the “supersystem” within which an organization operates.
• It is the source of external elements that strike on the system.
S

• It determines how a system must function. For example, vendors and competitors of
organization’s environment, may provide constraints that affect the actual performance of
the business.
Boundaries and Interface
• A system should be defined by its boundaries. Boundaries are the limits that identify its
components, processes, and interrelationship when it interfaces with another system.
• Each system has boundaries that determine its sphere of influence and control.
• The knowledge of the boundaries of a given system is crucial in determining the nature of its
interface with other systems for successful design.

9
Shrichakradhar.com 9958947060

System Life Cycle


The system life cycle is a series of stages that are worked through during the development of a new
information system.
A lot of time and money can be wasted if a system is developed that doesn’t work properly or do
exactly what is required of it.
A new system is much more likely to be successful if it is carefully planned and developed.

m
60 co
.
70 ar
94 dh
Feasibility study
The first stage of the system life cycle
This is an investigation that is carried out by a systems analyst to find out what the main problems
are with the existing system and if it is technically possible and cost-effective to solve these problems
58 ra

by developing a computer based solution.


Feasibility report contents
• A description of the existing system outlining what is being done and how it is being done;
• A set of problem statements describing exactly what the problems are with the existing
k

system;
• A set of system objectives which describe what the new system must be able to do;
99 a

• A description of some alternative solutions;


• A description of the technical, economic, legal and social factors that have been considered;
h

• A recommended course of action.


Analysis
ic

During the analysis stage systems analysts investigate the existing system to identify exactly what the
problems are with the existing system
Systems analysts will use a variety of fact-finding methods to gather information for example
hr

• Questionnaires
• Interviews
• Observation
• Examining documents
S

Design
• Alternative possible solutions are identified
• Alternative solutions evaluated
• The best solution is identified
A design specification is produced containing information about:
• Input
• Output
• Data storage
• User interface
• Backup and recovery procedures

10
Shrichakradhar.com 9958947060

• Security procedures
Test plan Typical format for a test plan

m
60 co
.
Implementation

70 ar
This stage involves:
Setting up the system so that it matches the design specification
Testing carried out using the plan to make sure that all the parts of the system work correctly with
normal, extreme and erroneous data
94 dh
• Normal test data is used to check that a system can handle the sort of data that would be
expected during day-to-day use
• Extreme test data is used to check that a system can cope with data that lies on the boundaries
of what is acceptable
58 ra

• Erroneous (or exceptional) test data is used to check that a system can identify data that is
wrong and reject it
Testing using normal, extreme and erroneous data
k
99 a
h
ic
hr
S

Installing the new system


Might include:
• Installing any new hardware and software;
• Transferring data from the existing system to the new one;
• Training users how to operate the new system
Producing documentation
Technical documentation
• the system design specification;
• systems flowcharts;

11
Shrichakradhar.com 9958947060

• data flow diagrams;


• a description of the various parts of the system and what each one does;
• screen layouts and user interface designs;
• the test plan.
User documentation
• a description of what the system is designed to do;
• minimum hardware and software requirements of the system;
• instructions on how to load and run the system;

m
• detailed instructions on how to operate each part of the system;
• Error messages, their meaning and how to deal with them.
• Where to get more help, such as telephone support lines and on-line tutorials.

60 co
Post-implementation review: Carried out after the new system has been running for a few weeks or
months to identify any modifications that may need to be made.
Maintenance: A new information system may need to be changed due to:
• Change in needs of user
• Problems not found during testing

.
• Improvements required in the way the system works

70 ar
Q7. Describe the importance and role of computers in Management Decision – Making Process.
Ans. Information plays a vital role in decision-making. Even to take very simple decisions, we
94 dh
need information. To understand the role played by information in decision-making, we have to
understand how decisions are taken. Decision-making is basically a process that includes the
following stages:
Information is thus, very important to take decisions.
58 ra

Imagine a simple decision like the one a driver (say) makes when he puts on the brakes to stop a
speeding vehicle when he sees a child crossing the road (in middle of the road). The driver decides
on braking based on a lot of information processing that happens in his brain. At every stage of the
decision-making he uses information that he captures visually. All decisions are like this.
k

First we get information about a problem, format it into a structure and then factor in the
information about the context in which the problem has occurred. Like in the above case instead of
99 a

the child being at the middle of the road and crossing it, the driver would have seen the child about
to cross over with a few steps only he would probably not have braked to stop but would have
h

slowed down, as he would have calculated that by the time the vehicle reaches the crossing stage,
the child would already have passed. So if the problem was structured as ‘how to not hit the child
ic

crossing the road?’, and if the child was at the middle of the road, the driver would have braked but
had the child been at (say) at ninety per cent completion level of crossing the road, the driver would
have only slowed down and not braked to stop. Therefore, we see that the context has a major role in
hr

the decision-making and information is required both about the problem and about the context in
which the problem occurred. The next stage for the decision maker would be to generate
alternatives. In the driver’s case such possible alternatives would be
Stages of Decision- Role of Information
S

making
Identification and One needs information to identify a problem and put it in a
structuring of structured manner. Without information about a problem or
problem/opportunity opportunity, the decision-making process does not even start.
Putting the problem/ Without information about the context in which the problem has
opportunity in context occurred, one cannot take any decision on it. In a way, the
.information about the context defines the problem.
Generation of Information is a key ingredient in the generation of alternatives for
alternatives decision-making. One has to have information about possible
solutions to generate alternatives.

12
Shrichakradhar.com 9958947060

Choice of best alternative Based on the information about the suitability of the alternatives, a
choice is made to select the best alternative.
• to stop by braking
• to slow down
• to take a sharp turn towards left or right to avoid the child
• press the horn so that the child crosses the road fast
• To drive the vehicle on to the footpath and out of the road to avoid collision, etc
So the decision-maker generates these possible solutions to the problem at hand based on

m
information about such possible solutions. Each of the alternatives represents a possible solution,
which one can generate if one has information about them. In the case of the driver, obviously, he
needs knowledge and information to generate these alternatives, i.e., to stop by breaking the driver

60 co
would need to know that braking stops the vehicle. If he is unaware of this crucial information he
would not have been able to generate this alternative. So information is vital for generation of
alternatives. Now for the choice part also, the decision maker needs to have information about the
suitability of each alternative to decide, which the ‘best’ is. In our example, the driver calculates the
‘payoff’ for each alternative based on his calculation of the outcome that again is based on

.
information. He selects the ‘best’ option that solves the problem. Thus, we can see that information is

70 ar
the key to the decision making process, without information and the right kind of information
decision-making is not possible. Information plays a crucial role in every stage of the decision-
making process.
94 dh
Decision-making is the most important task of managers in an organization. Therefore, to enable
managers to take good quality decisions, it is very important to provide them with the right kind of
information. Information management in organizations therefore assumes a special significance. In
most organizations, business or otherwise, a systematic systems based method is used for
58 ra

information management. Systems based information management works best under a computerized
environment and such computer based information management system is normally called
‘Management Information Systems (MIS)’, which provides the service of information supply to the
managers enabling them to take informed decisions. It may be worthwhile to mention here that MIS
k

does not necessitates the use of computer based technology, but the use of computers and
information technology makes MIS suitable for business organizations in a competitive environment
99 a

as it helps to provide timely and accurate information. MIS done manually, without the help of
computers is neither timely nor accurate.
h

Q8. Define Hacking. Discuss the precautions that are to be adopted against Hacking.
ic

Ans. Definition: Hacking is an attempt to exploit a computer system or a private network inside a
computer. Simply put, it is the unauthorised access to or control over computer network security
systems for some illicit purpose.
hr

Description: To better describe hacking, one needs to first understand hackers. One can easily assume
them to be intelligent and highly skilled in computers. In fact, breaking a security system requires
more intelligence and expertise than actually creating one. There are no hard and fast rules whereby
we can categorize hackers into neat compartments. However, in general computer parlance, we call
S

them white hats, black hats and grey hats. White hat professionals hack to check their own security
systems to make it more hack-proof. In most cases, they are part of the same organisation. Black hat
hackers hack to take control over the system for personal gains. They can destroy, steal or even
prevent authorized users from accessing the system. They do this by finding loopholes and
weaknesses in the system. Some computer experts call them crackers instead of hackers. Grey hat
hackers comprise curious people who have just about enough computer language skills to enable
them to hack a system to locate potential loopholes in the network security system. Grey hats differ
from black hats in the sense that the former notify the admin of the network system about the
weaknesses discovered in the system, whereas the latter is only looking for personal gains. All kinds
of hacking are considered illegal barring the work done by white hat hackers.

13
Shrichakradhar.com 9958947060

Precautions that are to be adopted against Hacking:


(1) Don’t access personal or financial data with public Wi-Fi.: This may seem like a no-
brainer, but you’d be surprised how many people check their bank accounts or make
purchases with a credit card while using public Wi-Fi. It’s best to do those things on a
secure connection
(2) Turn off anything you don’t need: Hackers can use certain features on your phone to get at
your information, location or connection. So, instead of keeping your GPS, wireless
connection and geo-tracking on all the time, just turn them on when you need them.

m
(3) Choose your apps wisely: Only download apps from trustworthy sources that have
established a good reputation. Make sure you update your software and apps regularly and
get rid of old apps you don’t use.

60 co
(4) Use a password, lock code or encryption: Make sure your passwords are at least eight
characters long, with a mix of upper and lower case, and include numbers or other
characters, and never use the auto-complete feature for passwords. You can use the storage
encryption feature on your phone to protect your private data, and set your screen to
timeout after five minutes or less.

.
(5) Be skeptical about links and attachments: If you’re not sure about the source, don’t use the

70 ar
link or open the attachment.
(6) Trace or erase: Make sure your data is secure if your mobile device is stolen or lost. You can
set up your device to lock itself after a pre-set number of failed log-in attempts.
94 dh
Q9. Critically analyse the impact of computerisation on the society.
Ans. Everyone knows that this is the age of computer and vast majority of people are using computer.
Development of science and technology has direct effect on our daily life as well as in our social life.
58 ra

Computer technology has made communication possible from one part of the world to the other in
seconds. They can see the transactions in one part of the world while staying in the other part.
Computer development is one of the greatest scientific achievements of the 20 th century. Computers
are used in various fields as well as in teaching and learning. Some of the major computer application
k

fields are listed below.


• An aid to management: The computer can also be used as a management tool to assist in
99 a

solving business problems.


• Banking: Branches are equipped with terminals giving them an online accounting facility and
h

enabling them to information as such things as current balances, deposits, overdrafts and
interest charges.
ic

• Industrial Application: In industry, production may be planned, coordinated and controlled


with the aid of a computer.
• Engineering Design: Computer help in calculating that all the parts of a proposed design are
hr

satisfactory and also assist in the designing.


• Meteorology: Data is recorded at different levels of atmosphere at different places, using
remote sensors carried on a satellite.
• Air Travel: Small computers are installed as a part of the plane's equipment.
S

• Road Traffic Control: Computers assist with the control of traffic lights.
• Telephones: Computerized telephone exchanges handle an ever increasing volume of calls
very efficiently.
• Medicine: Computers are widely used in hospitals for such task as maintaining drugs,
surgical equipments and linen, for payroll and also for checkup and treatment of diseases.
Computers have both positive and negative impact in our daily life as well as in our social
life. But the gross development of the nation is faster with the application of computers in
industries and education. The both positive and negative impacts of computers are listed
below.

14
Shrichakradhar.com 9958947060

Positive Impact of Computer –


• The work can be done in very less time.
• More information can be stored in small space.
• Multitasking and multiprocessing capabilities of data.
• Easy to access data.
• Impartiality.
• Documents can be kept secret.
• Error free result.

m
• It can be used for various purposes. i.e. It can be used in any type of work.
Negative Impact of Computer –
• Highly expensive.

60 co
• Accidents.
• Data piracy.
• Increased Unemployment.
• Huge data and information can be lost sometimes.
• Fast changing computer technology.

.
• Service distribution.

70 ar
• Illiteracy of computing and computers.

Q10. Write short notes on any two of the following:


94 dh
(i) Management Information System
Ans. Management Information Systems (MIS)
These systems are designed for providing information to the key functionaries in an organisation.
These systems make use of the already processed transaction data which is outputted from TPS and
58 ra

generate information reports after processing data. The examples of this kind of systems could be
personnel information systems, marketing information systems, sales information systems,
production and operations systems, etc. These systems are designed following the principles of
organisational theory. The major group of users for this kind of systems are the middle levels of
k

management.
(ii) CBIS in Tourism Sector
99 a

Ans. CBIS is a data processing system into a high-quality information and can be used as tools that
support decision-making, coordination and control as well as visualization and analysis.
h

There are 5 components in a computer based information system. Each component is responsible to
perform some specific functionality. So every components must come together in order to produce a
ic

computer based information system. The components of a computer based information system are
stated below:
1.Hardware 2.Software 3.Data 4.Procedures 5.People
hr

1.Hardware: The term hardware refers to machinery. This category includes the computer itself,
which is often referred to as the central processing unit (CPU), and all of its support equipments.
Among the support equipments are input and output devices, storage devices and communications
devices.
S

2.Software: The term software refers to computer programs and the manuals (if any) that support
them. Computer programs are machine-readable instructions that direct the circuitry within the
hardware parts of the system to function in ways that produce useful information from data.
Programs are generally stored on some input/output medium, often a disk or tape.
3.Data: Data are facts that are used by programs to produce useful information. Like programs, data
are generally stored in machine-readable form on disk or tape until the computer needs them.
4.Procedures: Procedures are the policies that govern the operation of a computer system.
“Procedures are to people what software is to hardware” is a common analogy that is used to
illustrate the role of procedures in a system.

15
Shrichakradhar.com 9958947060

5. People: Every system needs people if it is to be useful. Often the most over-looked element of the
system are the people, probably the component that most influence the success or failure of
information systems.
(iii) Information Resource Assessment
Ans. The lower arrow in the Figure represents Information Resource Assessment (IRA) — a process
of using information and knowledge to support the development of the organisation’s strategic
business direction. In effect, it is the mirror image of “Strategic Planning for Information Resource”, in
the sense that it is the process through which information and knowledge are used to identify the

m
strategic comparative advantages and a create and evaluate new strategies, i.e., to influence change in
the “Organisational Strategy Set”.

60 co
.
70 ar
94 dh
58 ra
k
99 a
h
ic
hr
S

16

You might also like