You are on page 1of 4

1a

Targets a wide Typically targets


● Bus Topology: Uses a single communication path Target audience, sending individuals or specific
shared by all devices, with data transmitted bulk messages. groups.
sequentially. Low complexity but susceptible to
single point failures, limiting reliability and
1d
scalability.
A data mart is:
● Mesh Topology: Employs direct connections
1. Segmented Subset: It's a segmented portion of a
between every device, enhancing redundancy and
larger data warehouse, dedicated to a particular
fault tolerance. High reliability but complex to set
business function, department, or user group.
up and maintain, with increased wiring and costs.
2. Focused Data: Contains consolidated, relevant data
● Star Topology: Features a central hub or switch
from multiple sources, specifically tailored to meet
through which devices communicate. Simplifies
the needs of its designated users.
management and fault isolation, but hub
3. Analysis Ready: Data within a data mart is
dependency risks network disruption if the hub fails.
structured and pre-processed for efficient querying,
Offers scalability and easier expansion.
analysis, and reporting.
4. Enhanced Performance: Its specialized nature
1b
results in faster data retrieval and improved
A Virtual Private Network (VPN) is a technology that
performance compared to querying the entire data
provides secure and private communication over a public
warehouse.
network, typically the internet. It achieves this through:
5. Business-Centric: Designed to serve specific
1. Encryption: VPNs encrypt data, making it
business needs, providing insights into a particular
unreadable to unauthorized parties and enhancing
aspect, such as sales, inventory, or customer
privacy.
behavior.
2. Anonymity: VPNs hide users' IP addresses,
1e
preventing websites and online services from
An expert system is:
tracking their online activities.
1. Knowledge-Based: It emulates human expertise by
3. Remote Access: VPNs enable secure access to
capturing and representing specialized knowledge
private networks or resources from remote
and rules in a computer-readable format.
locations, ensuring a safe connection.
2. Inference Engine: Utilizes logical reasoning and
4. Bypassing Restrictions: VPNs allow users to access
rule-based algorithms to draw conclusions, make
geo-blocked or censored content by masking their
decisions, or solve complex problems.
location.
3. Domain-Specific: Designed for a specific field, it
5. Security: VPNs protect against cyber threats like
focuses on providing expert-level solutions and
hackers and malware, especially when using public
insights within that domain.
Wi-Fi.
4. Data-Driven: Uses input data and user interactions
1c
to process information, evaluate scenarios, and
arrive at informed recommendations.
Phishing Vishing
1f
Uses fraudulent
emails, messages,
Involves phone calls
or links to trick Communication-
or voicemails to
users into Driven DSS Data-Driven DSS
Method deceive individuals
revealing
into sharing personal
sensitive Centers on
or financial data. Emphasizes
information or analyzing large
collaboration and
login credentials. datasets using
information sharing
algorithms,
Focus among decision-
Primarily patterns, and
Primarily voice-based makers through
Commu electronic (emails, trends to derive
(phone calls, communication
nication instant insights for
voicemails). tools.
messages). decisions.

Sense Often creates a Aims to extract


Similarly employs Facilitates group
of sense of urgency valuable
urgency to pressure discussions,
Urgenc to prompt information from
victims. brainstorming, and
y immediate action. Purpose raw data, enabling
consensus-building
fact-based
The attacker's among
decisions and
identity may be Callers might use stakeholders.
predictive analytics.
Caller masked or fake caller IDs,
Identity impersonated in posing as legitimate Decision Supports Utilizes quantitative
electronic organizations. Process qualitative analysis, analysis, statistical
communication. subjective inputs, modeling, and data
and collective visualization to

1
1i
knowledge for enhance decision
informed choices. accuracy. Data migration in ERP refers to the process of transferring
data from legacy systems or previous software to a new
Involves data ERP system. It involves:
Promotes dialogue,
manipulation, 1. Extraction: Selecting relevant data from various
real-time updates,
querying, and sources, ensuring accuracy and completeness.
Interact and feedback
reporting, focusing
ion exchange, 2. Transformation: Converting and mapping data to
on structured
enhancing shared match the new ERP's format and structure.
information and
understanding. 3. Loading: Importing transformed data into the ERP's
trends.
database, validating and reconciling to ensure
consistency.
1g
4. Testing: Rigorously verifying data integrity,
Computer-Aided Engineering (CAE) is:
functionality, and performance in the new system.
1. Simulation Technology: It employs computer
1j
software and advanced algorithms to simulate and
MRP (Material Requirements Planning):
analyze complex engineering designs and
1. Inventory Management: MRP calculates material
processes.
requirements based on production schedules,
2. Virtual Prototyping: CAE enables engineers to
ensuring optimal inventory levels.
create, test, and refine digital prototypes before
2. Production Planning: Plans manufacturing activities
physical production, reducing time and costs.
by considering material availability, lead times, and
3. Multiple Disciplines: It spans various engineering
order quantities.
fields like structural analysis, fluid dynamics, heat
3. Dependency Analysis: Tracks dependencies
transfer, and electromagnetics.
between materials, components, and
4. Performance Evaluation: CAE assesses factors like
subassemblies, ensuring smooth production flow.
stress, durability, efficiency, and safety, aiding in
MRP II (Manufacturing Resource Planning):
design optimization.
1. Expanded Scope: Enhances MRP by including
1h
additional resources like labor, machinery, and
financial aspects.
Stand-Alone System ERP System 2. Capacity Planning: Balances material availability
with production capacity, optimizing resource
Operates utilization.
Integrates multiple
independently,
business functions, 3. Shop Floor Control: Monitors and manages shop
managing specific
Definiti streamlining floor activities, integrating production processes
tasks or processes
on processes across with business functions.
within a single
the entire
department or ERP (Enterprise Resource Planning):
organization.
function. 1. Integration: Integrates various business functions
like finance, HR, manufacturing, and supply chain
Isolated data Centralized and into a unified system.
storage for shared database
2. Centralized Data: Maintains a single source of truth
Data individual functions, ensures consistent
Silos potentially leading and synchronized for data, ensuring consistency and reducing
to redundancy and data across redundancy.
data inconsistency. departments. 3. Cross-Functional Visibility: Provides real-time
insights across departments, enabling informed
Highly scalable, decision-making.
Limited scalability,
accommodating
often requiring
Scalabil organizational
additional software
ity growth by adding
and resources for
modules or users as
expansion.
needed.

Limited Facilitates seamless


communication communication,
Commu
between different data sharing, and
nicatio
systems, hindering process
n
cross-functional coordination across
collaboration. departments.

Enhances efficiency
Isolated processes
by streamlining
may lead to
Process workflows,
inefficiencies,
Efficien eliminating
duplicate efforts,
cy redundancies, and
and lack of holistic
optimizing
insights.
resources.

2
Q6 A 5. Scalability: Facilitates scalability by distributing
Business Process Reengineering (BPR) involves the data processing and access, accommodating
fundamental redesign of business processes to achieve growing user demands.
substantial improvements in performance, efficiency, and 6. Data Warehousing: Replication feeds data
customer satisfaction. Here are key points about BPR: warehouses and analytical systems, enabling
1. Process Redesign: BPR rethinks and redesigns comprehensive business insights.
processes from the ground up, focusing on radical 7. Disaster Recovery: Replicated data serves as a
improvements rather than incremental changes. backup, aiding disaster recovery efforts in case of
2. Holistic Approach: BPR takes a holistic view of data center failures.
processes, often spanning across departments and 8. Data Migration: Supports seamless data migration
functions to eliminate inefficiencies. between systems during upgrades or transitions.
3. Breaks Barriers: BPR challenges traditional 9. Conflict Resolution: Replication tools handle
departmental boundaries, aiming to create conflicts that may arise due to concurrent updates,
seamless, end-to-end workflows. ensuring data coherence.
4. Technology Utilization: BPR leverages technology to 10. Database Replication: Common in relational
automate and streamline processes, enhancing databases, replication synchronizes tables, views,
speed and accuracy. and procedures across servers.
5. Customer-Centric: BPR prioritizes customer needs, 11. Peer-to-Peer Replication: Enables multiple systems
aligning processes to deliver superior value and to act as both publishers and subscribers, allowing
satisfaction. bidirectional data exchange.
6. Change Management: Successful BPR requires 12. Asynchronous and Synchronous: Replication can be
managing organizational change, including asynchronous (delayed) or synchronous
employee training and cultural adjustments. (immediate) based on data urgency and network
7. Risk and Benefits: While BPR can yield significant constraints.
benefits, it carries risks due to its disruptive nature 13. Security and Compliance: Ensures data security and
and potential resistance. compliance by replicating sensitive information
8. Benchmarking: BPR often involves benchmarking while maintaining access controls.
against best practices to identify opportunities for 14. Cloud Replication: Supports data replication to and
improvement. from cloud environments, enabling hybrid or multi-
9. Leadership Commitment: Strong leadership support cloud strategies.
is crucial to drive BPR initiatives and ensure their 15. Application Integration: Integrates disparate
successful implementation. applications by replicating data between them,
10. Continuous Improvement: BPR encourages a culture facilitating seamless data exchange.
of continuous improvement, adapting to changing
market conditions and customer demands. 2a
11. Measurable Results: BPR aims for measurable Local Area Network (LAN):
outcomes, such as cost reduction, faster cycle ● Scope: Limited geographical area, like a single
times, improved quality, and increased building or campus.
competitiveness. ● Speed: High data transfer rates, often in the range
12. Examples: Reengineering a loan approval process in of Mbps to Gbps.
a bank, streamlining supply chain operations, or ● Ownership: Privately owned and controlled by an
transforming customer service workflows. organization.
● Topology: Typically uses Ethernet with star or bus
Q6b topology.
Enterprise Data Replication involves copying and ● Latency: Low latency, suitable for real-time
synchronizing data across multiple locations or systems applications.
within an organization to ensure consistency, availability, ● Cost: Relatively lower setup and maintenance costs.
and data sharing. Here are key points about Enterprise Data ● Examples: Home networks, office networks, school
Replication: networks.
1. Data Consistency: Replication maintains data Metropolitan Area Network (MAN):
consistency and integrity across distributed ● Scope: Covers a larger geographic region, like a city
databases, applications, or servers. or a large campus.
2. Real-time Updates: Allows near real-time updates ● Speed: Offers moderate to high data transfer rates,
across multiple locations, ensuring that data ranging from Mbps to Gbps.
remains current and accurate. ● Ownership: Can be owned by private entities,
3. High Availability: Replicated data enhances system government, or a combination.
availability and fault tolerance, minimizing ● Topology: Often combines multiple LANs using
downtime and data loss. fiber-optic connections.
4. Geographical Distribution: Supports data ● Latency: Generally lower latency than WANs,
distribution across different geographical locations, suitable for local data sharing.
catering to global operations. ● Cost: Moderate setup and maintenance costs
compared to WANs.

3
● Examples: City-wide networks, university campuses,
corporate networks within a city.
Wide Area Network (WAN):
● Scope: Spans across large geographical distances,
even across countries or continents.
● Speed: Data transfer rates can vary widely, often
lower than LAN or MAN due to longer distances.
● Ownership: Can be owned by telecom companies or
multiple organizations.
● Topology: Utilizes various technologies like leased
lines, satellites, and routers.
● Latency: Generally higher latency due to longer
distances and multiple network hops.
● Cost: Higher setup and maintenance costs due to
infrastructure requirements.
● Examples: The internet, global corporate networks
connecting multiple branches.

You might also like