You are on page 1of 8

NMIMS Global Access

School for Continuing Education (NGA-SCE)

Course: Information Systems for Managers

Internal Assignment Applicable for December 2022 Examination

Assignment Marks: 30
---------------------------------------------------------------------------------------------------------------------
Q.1.
Ans –
Introduction -
Farokh Motorwala runs his D costa cosmetics business in Hyderabad and as per globalization
in market Farokh want to revamp his business and make the brand image stronger in
competitive market. and That’s why He want the develop the IT infrastructure of the
business to grow the business. Existing Businesses on the right track are regularly seeking for
the new opportunities to expand into new regions or countries and to spread and establish
the new markets business firms will face new challenges. In today’s global market business
firms need to use varrious digital IT sources to develop the new customers and satisfy their
requirements then business firms must ensure the technical, legal and financial
considerations to establish the IT infrastructure.
Concept and Applications -
When establishing the IT infrastructure for expansion and develop the business, many
companies seek for cloud or hybrid infrastructures as a cornerstone. Below is consideration
to be consider while develop the IT infrastructure.
1. Choose the right cloud provider.
As today’s world shift toward the cloud infrastructure as it is well documented. According
to research many organizations have accelerated their cloud migration, and the percentage
of companies with most or all IT infrastructure in the cloud is growing the maintain the
accurate data. But there are some complexions to migrate with the Cloud and also some
Risk. The risk factors are crashes and data loss, Missuses of Data, financial expenses and
time costs. We need to make sure to select a provider that can manage this complexion
process and Risk with having the capabilities and infrastructure that’s required.
2. Prepare for an increased workload.
Here we can ensure the IT infrastructure is enough and adequate to handle traffic and
increased workload, when expanding the business, we need recalculate the server workload
to track the ongoing activities and moving targets. On regular targets the workload will be
increase and hence cloud providers can allow equipped the system to handle the workloads.
Real strengths of cloud services is than can be manage the increased workload on a short-
term basis, and offers the flexibility to keep the main load on dedicated servers and connect
virtual machines during load. This infrastructure is far more robust than most on-site servers
and often the most cost-effective to manage workload.
3. Ensure you meet regional legal and compliance requirements.
While expanding the business into new markets, we must ensure to meet the local
compliance and legal requirements can be challenging. In today’s globalization days, data
protection laws worldwide are becoming more significant and complex, and keeping this
Laws on legislation between countries and it can be challenging among the different
countries.
4. Minimize response speed.
When Expanding business reach can't come at the expense of performance. The
infrastructure providers responding speed is become minimized after number of times
enquires. As IT tools speed becomes slow so slow response times is causes to damage the
business and decrease the value of business in market. Before developing the IT
infrastructure there should be confirm the leading providers present shall be there in case of
IT tools maintenance.
5. Increase data volume.
As businesses grow and expand, the volume of data is also increases. This raises several
challenges and complexion to handle it safely. Here should be note that how to store the
data in well manner and at safe zone as well as analyze and process it. For this purpose the
Cloud (or hybrid) storage is a good option for the former, it offers fast and safe access to
processing the data with good scalability and cost-effectiveness than on-site storage. Here
should be make some standard practices to handle and store the data with authorities.
6. Protect your business from DDoS attacks and malicious bots.
As business are expanding in varrious regional areas across boundaries and as per the
business operation the business data is increased at global level. If a business firm is
infrastructure in with IT tools and application like servers and Clouds then all business data
are collected and processed for business purpose, and there is Risk of data loss, data stolen,
damages of data. So that’s why there is requirement is to protect this data from DDos
attacks, Malicious bots, viruses etc. To provide the protection to the business data business
firm should be considered some measures and implement that with IT infrastructure.
7. Enable disaster recovery.
As business is expanded in varrious region and there is risk of happening the natural or
human made disaster and its impacted the business entity so that’s why every business
organization shall be equipped with Disaster recovery measures and procedures. Recovery is
the primary business function for cloud computing, as it can eliminate the need for
traditional infrastructure and significantly increase recovery time at a lower cost. Cloud
facilities can provide an online backup that's faster, safer and less resource-intensive than an
offline backup. While planning the expansion of online business into a new market with
different region we should be make sure to establish the secure a high-quality cloud IT
infrastructure.
A traditional IT infrastructure is made up of the usual hardware and software
components: facilities like data centers, servers, networking hardware desktop computers
and enterprise application software solutions. Below is some the IT infrastructure laws that
should be follow while IT infrastructure development.

 Network Interconnection architecture

 Construction services

 Interconnections

 Network access

 Information system

 Interconnection service

 Connectivity

 Customers services
Conclusions :
Farukh should consider the above technical and buisness consideration which is explain
indetials and also follow the laws if IT infra which is discussed in the above.
---------------------------------------------------------------------------------------------------------------------
Q.2.
Ans –
Introduction
The chief executive officer is highest ranking employee in the business organization. The CEO
of the business organization is public face of the company. The role of BPCL’s CEO Mr. K.
Padmakar is majorly managerial in nature and they are responsible for managing and
directing the company's overall decision for operations. As per the responsibilities as CEO he
is involved in all corporate decision, managing the operational and Resources functional
activities and delegating meetings and directing agendas to drive the business with varrious
cross functional departments for profitability.
Concepts & Applications:
Roles and Responsibilities
He shall be responsible for managing company organizational processes, structure, strategy,
and communicating with the board. However, as a CEO he shall be required to make specific
difficult decisions and implement it thorough the established practices and guide the
organization stakeholders, employees, workers, etc. The CEO’s main focus is on ensuring that
all the activities within the organization are carried out properly and effectively. CEO of a
company has deal with the varrious level to take strategic decision to grow the business.
The CEO K. Padmakar is to effectively carry out the duties and responsibilities that assigned
to him as per the designation while making positive contributions to the organization’s
success. CEO roles and responsibilities will be varied according to culture and strategic
functional of organization. The Roles and responsibilities such as oversee the strategic
direction, proposed the plans and implement, develop public relation via media, interact
with leaders, maintain accountability with board directors, monitor the performance and
accordingly set the objectives.
Kinds of Decision
The CEO is required to make management decisions to implement the desired changes
according to business requirement and market conditions, along with monitor and carrying
out supervising duties by interacting with organization leaders of cross functional
departments and all the tasks carried out by the middle management and bottom-level
management will be supervised and evaluated by the CEO.
In order to carry out the management roles effectively and implement the decision taken for
the business, the CEO of the organization need to study each and every piece of information
and data with respect to the company’s past performance, current scenario of business, list
of inventories, list of employees working along with their salary details, the cost sheet,
budget, and other expenditure details, along with the books of accounts, and other
necessary information. This information will help the CEO to take the accurate and adequate
decision for business with available resources.
Primary data:
The Collected data from the external sources referred as the primary data. It is a Raw data is
used to processing and manipulation. Primary is first-hand sources data like observation,
experiment, surveys, etc. The primary data is used to process the functional activities by
authorized person or system.
Supporting data:
Supporting data is referred as the details of primary data which is used to process and
manipulate the data functioning and required to support the primary data. Supporting data
is describe the details of respective information, example, drawing, literature, samples,
prototypes, etc.
Kinds of data:

 Qualitative Data

 Quantitative Data

Description of data types:


Qualitative Data:
Qualitative Data is representing the characteristics and details of the data. It is available in
text, sentences, paragraphs. That represent the description of data and cannot be calculated
and computed. For example, data on attributes/ characteristics such as intelligence, honesty,
wisdom, cleanliness, and creativity that collected to explain in detail about some person,
methods and procedure, and an organization and Team. It helps to reach the conclusion
quickly.
Quantitative Data:
Quantitative Data can measure, manipulate, and calculate to understand the information. It
is easy to observe and understand. It is represented in numerical form to perform the
calculations to reach the conclusion and take the decisions. For example, number of
employees works in organization, budget on salary to employees, Business growth rate
presented annually, working hours in months, profit, and loss, etc. such information is
numerical and can be classified as quantitative.
Types of data processing:
Data processing is referred as the carry out the required information to manipulate and
calculate the information to review, reform, classify, transform, and made the conclusion of
certain information as output. The data processing method is helps to determine the query
response time and the reliability of the output. For data processing, the method shall be
chosen according to the information availability, transaction processing, situations, etc.

Following are the common Types of Data Processing Methods

 Manual Data Processing – It is referred as the Data processing activity is processed


by manually without using any electronic devices, such as computer devices. Data is
processed on paper by manual operation by experts in subjects.

 Mechanical Data Processing – It is referred as when the data is processed without


intervention by human intelligence and conclude by automation devices and
electronic devices such as calculators, Typewriters, computers, etc. It helps to
processing with less errors and fast processing speed.

 Electronic Data Processing – It is referred as when the data is collected and


processed by using the electronic devices like computers, calculators, servers,
Internet portals, data drives, portable disk drives, etc. It is a electronic automation
data processing system to access and handle the data in safe and easy way.
Conclusion : Processed date is information which is used as databases, and these
data is useful for decision making .Information system is the essential compenent of
the organisation that binds the orgainasation internally as well as enables it
interactions with outside the world through the internet.
--------------------------------------------------------------------------------------------------------------

Q.3. (A)
Ans –
Introduction:
Bring your own device (BYOD) is defined as the use of the personal computer devices by
connective with the organizational networks and access work-related systems and servers by
using the potentially sensitive or confidential data to work on organizational projects.
Personal devices can be smartphones, personal computers, Laptops, tablets, or USB drives.
Employees can be using their own devices to connect with the network of organization and
work for the organizational objectives.
As a current trend in market of Information Technology there are more organizations that
support and provide the platform to employees to work from home by connecting with the
organizational portal and data servers’ systems. In such practices they are maintaining a
flexible schedule or connecting anytime, anywhere on work. BYOD concept is providing the
flexibility to IT employees to perform their work objectives and provide the solutions have
become more prevalent. In today’s world scenario more companies may allow the BYOD
practices to perform their productivity at any location, official presence is not mandatory in
such practices. while other many companies consider it part of “Shadow IT” which refers to
software or hardware not supported by IT.
In the practices BYOD the security is most important and challenging factor to IT companies.
In such case there are risk to IT firms about the data security because personal devices are
used to make the productivity against the IT firms’ objectives by connecting the personal
devices to the IT firms network system and there may be chances to leak, damage or steal
the data by hacking the firm’s system. So that’s why personal devices security is more
important to secure the firm networking system.
In the Practices of BYOD concept there are three levels mentioned below. Employee can
access the network system and data system of company and perform their activities.
Unlimited access – In this level, employee is getting the unlimited access to networks and
data system of organization and use it anytime, anywhere to perform the task and support
the business. There is no limitation to access the data by employee and such access is
approved and provided by organization to give the productivity with adequate security
arrangements of access permission.
Access to non-sensitive systems and data only – In this level, system access is provided and
supported to the employees only for accessing and using the non-sensitive system and data
networks only, such access is provided to perform the varrious task by projected employees.
This kind of access is provided to the employees who perform the task on the data only and
could not enter the or access the sensitive data networks from organization servers.
Access to sensitive data with IT control over personal devices – In this level, such access is
provided to selected and responsible employees who work on the project by using the
sensitive data portal of organization under the control of IT department over the employee
personal devices. IT has controlled the use of such data to avoid the misuse of sensitive data
by employees’ devices and it’s impacted on the business of organization.

Conclusion : BYOD has its advantages and disadvantages in terms of worker productivity
/output and increasing organizations revenue.After careful consideration istaken and various
contingency plans are in place, than can an organization implement atrial period of BYOD.
--------------------------------------------------------------------------------------------------------------
Q.3. (B)
Ans –
Introduction :
BYOD practices having create the efficiencies potentially in the way employees’
performances. However, they also perform n well manner and introduce vulnerabilities in
the network system through accessing sensitive data portal on unsupported and unsecured
personal devices.
BYOD concept has both advantages and disadvantages and its according to the how
employees and access users are performing their tasks and it’s growing comprehensively
means that all IT departments must be aware and proactive. Policies on BYOD management
are becoming more prevalent in IT industry and within organizations and are important to
addressing what can be a security challenges which should be detect and project the
practices to use the networking access for business purpose.
BYOD Pros and Cons
Advantages of supporting BYOD

 Increase the employee productivity

 Increased employee job satisfaction and retention

 supporting to the flexible work arrangements that anytime, anywhere

 Increased employee effectiveness with his own devices with more comfort and speed

 Upgraded technologies are used on personal devices by IT firm

 Claim for the maintenance of software licensing, hardware, and other devices
Disadvantages of supporting BYOD

 Possibility of data leak, data stolen, data loss by using the employee personal device

 firewall or anti-virus software is not installed to personal devices mandatorily so


there may be possibility to leak and hack the data networks and system

 In causes to increase the costing of IT department to provide the support of personal


devices with network facilities

 Lack of network facilities

 Firms’ Sensitive data stored on personal devises, and it can be misused

 Firms access can be hacked by personal devices by other networks

Conclusions : In the above answer pros and cons of BYOD is explained.

--------------------------------------------------------------------------------------------------------------

You might also like