Management information system
SECTION A
1. What is Information System Prototyping? Explaining the concept of System Development Life Cycle (SDLC). Discuss in detail the activities involved in development of E-Commerce based Information System in an organization
2. What challenges do you see for a company that wants to implement collaborative system integration of its various services and departments? How would a company meet such challenges?
3. Explain organization as a system. Define Hierarchical structure of an organization and discuss how characteristics of information changes while traversing different levels of management.
4. Write short notes on any three of the following
a) Information System planning and approaches.
b) Pre-requisites of Information Systems development?
c) Physical & Logical DFD
d) Gantt Chart
e) ERD Diagram
5. What M-Commerce Services and Applications an organization should integrate in its Information System? What operation excellence will they give to the organization?
6. Discuss Data Resource Management Technologies? Why these technologies considered as backbone of modern Information Systems?
7. What is Decision Support System? Explain the components, Decision making Phases and Analytical Models of DSS.
8. What are the goals of Information System security? Explain IS security Management control and any five tools of security management to overcome computer crime.
SECTION B
Q.Please read the case study given below and answer the questions given at the end
Case Study
The near past saw the effective implementation of the online services including Electronic Customer Relationship Management (e-CRM) solution by the US-based IT giant IBM. The conceiving and implementation of online e-CRM solution by IBM was scheduled in association with the leading CRM software vendor – Siebel Systems.
The process followed by IBM to implement the e-CRM solution describing its systems architecture faced quite a lot challenges in implementing the solution, but the benefits reaped by the company after the implementation were enormous.
In January 2000, IBM, the $86 billion IT company, embarked on the largest electronic based Customer Relationship Management (e-CRM) project known at that time. Termed CRM 2000, the project aimed at ensuring that any point of interface between the customer and IBM, through any of its channels, in any country, was dealt with uniformly, providing the same service level, applying the same tools and information.
In other words, IBM wanted to present a unified interface to its customers across the world. In 2004, four years after the project, the company was well on its way towards fulfilling its objective, reporting significant improvement in customer satisfaction levels.
To manage the worldwide installation of Siebel’s e-CRM applications, IBM launched a global program. Installation of e-CRM systems was only a part of the implementation process of CRM solutions at IBM. A more important task was to manage internal business process changes following the installation.
The deployment of the e-CRM solution let to significant productivity improvement at various IBM units within a year of implementation. Without increasing the number of staff manning call centers, more number of calls could be dealt with and more leads were generated.
QUESTIONS
1. Discuss the importance of implementing an online CRM solution in a large multi-product, multinational company.
2. Study the challenges faced in an e-CRM project and identify ways to overcome them.
3. Discuss the implementation process of a mega e-CRM project in a leading IT company in the world.
SECTION C
Q1: A _____ focuses on planning, policies, and procedures regarding the use of corporate data and information.
CIO
systems analyst
database administrator
system operator
Q2: _____ organizational structure employs individuals, groups, or complete business units in geographically dispersed areas who may never meet face to face in the same room.
traditional
virtual
multidimensional
matrix
Q3: _____ are individuals who help users determine what outputs they need from the system and construct the plans needed to develop the necessary programs that produce these outputs.
Data entry operators
Programmers
Database administrators
Systems analysts
Q4: The current major stage in the business use of IS is oriented towards ____.
Cost reduction and productivity
Gaining competitive advantage
Strategic advantage and costs
Improved customer relationship management
Q5: The extent to which technology permeates an area or department is called ____.
Technology diffusion
Technology infusion
Technology collusion
Technology fusion
Q6: According to the ____ theory, organizations adapt to new conditions or alter their practices over time.
Change model
Organizational learning
Organizational culture
Continuous improvement
Q7: A ____ is an abstraction or an approximation that is used to represent reality.
Model
System parameter
System performance standard
System
Q8: ____ gives the computer the ability to make suggestions and act like an expert in a particular field.
Decision support systems
Virtual reality systems
Management information systems
Expert systems
Q9: ____ is an awareness and understanding of a set of information and ways that information can be made useful to support a specific task or reach a decision
Knowledge
Data
Feedback
A process
Q10: ____ attacks have overwhelmed the capacity of some of the Web’s most established and popular sites.
Spam
Credit card fraud
Denial-of-service
Spoofing
Q11: The value of information is directly linked to ____.
its accuracy and completeness
its verifiability
its simplicity and security
how it helps decision makers achieve organizational goals
Q12: ____ is any business-related exchange such as payments to employees, sales to customers, or payments to suppliers.
Data
E-commerce
A transaction
Input
Q13: ____ represent(s) the application of information concepts and technology to routine, repetitive, and usually ordinary business transactions
E-commerce
Transaction processing systems
Management information systems
Decision support systems
Q14: ____ is a collection of single-application software packages in a bundle designed to work similarly so that once you learn the basics for one application, the other applications are easy to learn and use.
Bundled software
Software suite
Productivity applications
General purpose software
Q15: Information systems that support the firm in its interaction with its environment are said to be performing within the ____.
Workgroup sphere of influence
Global sphere of influence
Enterprise sphere of influence
Individual sphere of influence
Q16: _____ is software programs that were developed for a general market and that can be purchased in a store.
Proprietary software
Off-the-shelf software
Contract software
Application software
Q17: ____ describes various program functions and help users operate the computer system
A computer program
Documentation
Systems software
A computer system platform
Q18: ____ is an Internet service that enables you to log on to another computer and access its public files.
Telnet
FTP
Content streaming
Instant messaging
Q19: ____ is a protocol that enables you to copy a file from another computer to your computer.
SLIP
Usenet
Telnet
FTP
Q20: ____ is the process of converting a message into a secret code and changing the encoded message back to regular text.
Encryption
Fraud
Encoding
Cryptography
Q21: ____ converts ciphertext back into plaintext.
Encryption
A firewall
Decryption
An encoder
Q22: Using ____ technology, network managers can route phone calls and fax transmissions over the same network that they use for data.
Voice-over-IP
Content streaming
Hypermedia
XML
Q23: Which of the following is NOT a goal of transaction processing systems?
Capture, process, and store transactions
Produce a variety of documents related to routine business activities
Reduce manual effort associated with processing business transactions
Produce standard reports used for management decision making
Q24: ___ is a form of transaction processing in which all transactions are collected into a group and processed together.
Accumulation processing
Batch processing
Data collection
Data collection
Q25: The data processing activity that involves rekeying miskeyed or misscanned data is called ____.
editing
data storage
data correction
data collection
Q26: With the ___ form of data processing, each transaction is processed immediately.
OLTP
batch processing
active processing
automated transaction processing A(n) ____ is a type of report that summarizes the previous
Q27: Day’s critical activities and is typically available at the beginning of each workday.
Demand report
scheduled report
key-indicator report
exception report
Q28: Which of the following statements, about the use of decision support systems, is true?
They are applied only to the choice phase of the problem-solving process.
They are only applied to frequent, recurring problems.
They are only applied to highly-structured problems
They assist decision makers at all levels within the organization.
Q29: Problems that are routine and have well-defined relationships are called ____.
Structured problems
Programmed decisions
Simple problems
Heuristics
Q30: Using ____, a decision maker can make hypothetical changes to problem data and observe the impact on the results
Simulation
What-if analysis
Optimization
Goal-seeking analysis
Q31: The first stage in the problem-solving process is called the ____ stage. During this stage, potential problems or opportunities are identified and defined.
Choice
Design
Monitoring
Intelligence
Q32: The component of a decision support system that provides decision makers access to a variety of models and assists them in decision making is called the ____.
Model base
model management software
database
dialogue manager
Q33: ____ often referred to as “rules of thumb,” are commonly accepted guidelines or procedures that usually lead to a good decision.
Optimization models
Satisficing models
Heuristics
Programmed decisions
Q34: ____ involves the investigation of new approaches to existing problems.
Systems analysis
Creative analysis
Critical analysis
Organizational analysis
Q35: Which of the following SDLCs listed below takes an iterative approach to the systems development process?
end user
RAD
prototyping
traditional waterfall
Q36: ____ is factors that are essential to the success of certain functional areas of an organization.
Mission-critical factors
Critical success factors
Performance objectives
Strategic factors
Q37: The translation of strategic and organizational goals into system development initiatives is called ____.
Systems development
information systems planning
project planning
project definition
Q38: The four key questions related to fairness in information use are ____.
cost, timing, content, and frequency
notice, consent, accuracy, and authorization
knowledge, control, notice, and consent
knowledge, accuracy, timing, and permission
Q39: Whose responsibility is it to see that the potential consequences of IS use are fully considered?
IS professionals
managers
users
all of the above
Q40: ____ is a crime in which the imposter obtains key pieces of personal information in order to impersonate the victim.
Social engineering
Dumpster diving
Computer fraud
Identity theft
Reviews
There are no reviews yet.