You are on page 1of 60

Past Years Questions of Module 2

Q.1 : Define Expert System and describe the types of Problems to which they
are applicable.
Ans. Definition
- Expert System Application Categories

Decision Management
Loan portfolio analysis
Employee performance evaluation
Diagnostic/Troubleshooting
Equipment calibration
Medical diagnosis
Software debugging
Design/Configuration
Manufacturability studies
Communications networks
Selection/Classification
Material selection
Information classification
Suspect identification
Process Monitoring/Control
Machine control (including robotics)
Inventory control
Production monitoring
Benefits of Expert Systems
Faster and more consistent than an expert
Can contain knowledge of multiple experts
Does not get tired or distracted
Cannot be overworked or stressed
Helps
preserve
and
reproduce
of human experts

the

Q.2 : Explain the Three Components of Decision Support System.


Ans: DSS Components

knowledge

Q.3 : Explain TPS with suitable example. Illustrate how MIS obtains their data
from various organizations TPS.
Ans : - Definition
Transactions include sales, purchases, deposits, withdrawals,
refunds, and payments
Online transaction processing (OLTP) is a real-time system that
captures transactions immediately
These systems include the accurate recording of transactions as well as
the control procedures used in issuing such documents as
pay checks,
invoices,
customer statements,
payment reminders,
tuition bills,

student schedules unlike other components of management information


system, the transaction processing system of an organization extending
out of the organization linking together the entire financial system,
factory, customers, and suppliers.
Q.4 : How do Executive support system help Senior Managers make better
decisions?
Ans: - Definition
- never structured
- The Role of ESS in the Organization

An ESS can supply the summarized information executives need


and yet provide the opportunity to drill down to more detail if
necessary.
ESS are able to link data from various sources both internal and external
to provide the amount and kind of information executives find useful.
Executive Support Systems don't provide executives with ready- made
decisions. They provide the information that helps them make their
decisions.
ESS rely on graphic presentation of information because it's a much
quicker way for busy executives to grasp summarized information
Support senior management
Address non-routine decisions requiring judgment, evaluation, and
insight
Show summarized information from internal MIS and DSS
E.g. ESS that provides minute-to-minute view of firms financial
performance as measured by inventory etc
Q.5: What is Management Information System? Explain importance of MIS to
business manager.
Ans: - Definition
- Importance to Business managers
- It facilitates planning
- Minimizes information overload
- encourages decentralization
- Brings coordination
- Makes control easier
- Data accuracy

- Consistency of data
- Information completeness
- Relevance
Q.6: Describe the characteristics of Transaction Processing System (TPS) and
role they play in a business.
Ans: - Definition
Roles played by TPS in the organization
Process data generated by and about transactions

Maintain a high degree of accuracy


Ensure data and information integrity and accuracy
Produce timely documents and reports
Increase labour efficiency
Help provide increased and enhanced service
Achieve competitive advantage

Q.7 : Define an expert system, describe how it works, and explain importance
to business.
Ans: - Write the whole question
Q. 8: Write a short note on Decision Support System
Ans:
Definition
Components
Model of DSS
Use of DSS
Q. 9 Differentiate between Model Driven DSS & Data Driven DSS. Giving
suitable examples explain the concept of data mining & OLAP.
Ans:Data-driven
DSS
Most data-driven DSSs are targeted at managers, staff and also
product/service suppliers. It is used to query a database or data warehouse to
seek specific answers for specific purposes. It is deployed via a main frame
system, client/server link, or via the web. Examples: computer-based
databases that have a query system to check (including the incorporation of
data to add value to existing databases.
Model-driven
DSS
Model-driven DSSs are complex systems that help analyse decisions or choose
between different options. These are used by managers and staff members of

a business, or people who interact with the organization, for a number of


purposes depending on how the model is set up - scheduling, decision
analyses etc. These DSSs can be deployed via software/hardware in standalone PCs, client/server systems, or the web.
OLAP
Online Analytical Processing (OLAP) is a capability of management,
decision support, and executive information systems that enables
managers and analysts to interactively examine and manipulate large
amounts of detailed and consolidated data from many perspectives.
Basic analytical operations include:
Consolidation: This involves the aggregation of data. It can be simple
roll-ups or complex groupings involving interrelated data. For example,
sales offices can be rolled up to districts and districts rolled up to
regions.
Drill-Down: OLAP can go in the reverse direction and automatically
display detailed data that comprises consolidated data. For example,
the sales by individual products or sales reps that make up a region's
sales can be accessed easily.
Slicing: This refers to the ability to look at the database from different
For example, one slice of a database might show all sales of a product
within regions. Another slice might show all sales by sales channel. By
allowing rapid alternative perspectives, slicing allows managers to
isolate the information of interest for decision making
Data Mining:
Generally, data mining (sometimes called data or knowledge discovery)
is the process of analyzing data from different perspectives and
summarizing it into useful information - information that can be used to
increase revenue, cuts costs, or both. Data mining software is one of a
number of analytical tools for analyzing data.
Data mining involves six common classes of tasks:

Anomaly detection (Outlier/change/deviation detection) The


identification of unusual data records, that might be interesting or data
errors that require further investigation.

Association rule learning Searches for relationships between


variables. For example a supermarket might gather data on customer

purchasing habits. Using association rule learning, the supermarket can


determine which products are frequently bought together and use this
information for marketing purposes. This is sometimes referred to as
market basket analysis.

Clustering is the task of discovering groups and structures in the data


that are in some way or another "similar", without using known
structures in the data.

Classification is the task of generalizing known structure to apply to


new data. For example, an e-mail program might attempt to classify an
e-mail as "legitimate" or as "spam".

Regression Attempts to find a function which models the data with the
least error.

Summarization providing a more compact representation of the data


set, including visualization and report generation.

Sequential pattern mining Sequential pattern mining finds sets of data


items that occur together frequently in some sequences. Sequential
pattern mining, which extracts frequent subsequences from a sequence
database, has attracted a great deal of interest during the recent data
mining research because it is the basis of many applications, such as:
web user analysis, stock trend prediction, DNA sequence analysis,
finding language or linguistic patterns from natural language texts, and
using the history of symptoms to predict certain kind of disease

Q.10 What is the role of Information Systems in helping people working in


group make decisions more efficiently? (Write about GDSS)
Ans : Business value of GDSS
Supports greater numbers of attendees
Without GDSS, decision-making meeting process breaks
down with more than 5 attendees
More collaborative atmosphere
Guarantees anonymity
Can increase number of ideas generated and quality of decisions
made
Most useful for idea generation, complex problems, large groups

More precise communication;


Synergy: members are empowered to build on ideas of others;
More objective evaluation of ideas;
Stimulation of individuals to increase participation;
Learning: group members imitate and learn from successful behaviors
of others.

Q.11 How would you use capabilities like Data warehousing and Data Mining
to improve business performance and decision making? Explain.
Ans: For the Data mining use the points given in the answer number 9 and
show its usage in the organization.
Data warehousing:

Congregates data from multiple sources into a single database so a


single query engine can be used to present data.
Mitigates the problem of database isolation level lock contention in
transaction processing systems caused by attempts to run large, long
running, analysis queries in transaction processing databases.
Maintain data history, even if the source transaction systems do not.
Integrate data from multiple source systems, enabling a central view
across the enterprise. This benefit is always valuable, but particularly so
when the organization has grown by merger.
Improve data quality, by providing consistent codes and descriptions,
flagging or even fixing bad data.
Present the organization's information consistently.
Provide a single common data model for all data of interest regardless
of the data's source.
Restructure the data so that it makes sense to the business users.
Restructure the data so that it delivers excellent query performance,
even for complex analytic queries, without impacting the operational
systems.
Add value to operational business applications, notably customer
relationship management (CRM) systems.

Past Years Questions of Module 4


Q.1 Explain an approach to ERP implementation and state the six major
hassles in ERP implementation.
Ans: Hassles in ERP implementation
Inadequate definition of requirements
Implementation in stages
Resistance to change on the part of employees
Appropriate training
Compatibility Issues with ERP Modules
Cost
Speed of implementation
Risk of failure
Q.2 Identify the seven types of hackers and explain what motivates each
group.
Ans: Classifications
White hat
A white hat hacker breaks security for non-malicious reasons, perhaps to test
their own security system or while working for a security company which
makes security software. The term "white hat" in Internet slang refers to an
ethical hacker. This classification also includes individuals who perform
penetration tests and vulnerability assessments within a contractual
agreement. The EC-Council,[7] also known as the International Council of
Electronic Commerce Consultants, is one of those organisations that have
developed certifications, courseware, classes, and online training covering the
diverse arena of Ethical Hacking.[6]
Black hat
A "black hat" hacker is a hacker who "violates computer security for little
reason beyond maliciousness or for personal gain" (Moore, 2005).[8] Black hat
hackers form the stereotypical, illegal hacking groups often portrayed in
popular culture, and are "the epitome of all that the public fears in a computer
criminal".[9] Black hat hackers break into secure networks to destroy data or
make the network unusable for those who are authorized to use the network.

They choose their targets using a two-pronged process known as the "prehacking stage".
Part 1: Targeting
The hacker determines what network to break into during this phase.
The target may be of particular interest to the hacker, either politically
or personally, or it may be picked at random. Next, they will port scan a
network to determine if it is vulnerable to attacks, which is just testing
all ports on a host machine for a response. Open portsthose that do
respondwill allow a hacker to access the system.
Part 2: Research and Information Gathering
It is in this stage that the hacker will visit or contact the target in some
way in hopes of finding out vital information that will help them access
the system. The main way that hackers get desired results from this
stage is from "social engineering", which will be explained below. Aside
from social engineering, hackers can also use a technique called
"dumpster diving". Dumpster diving is when a hacker will literally
search through users' garbage in hopes of finding documents that have
been thrown away, which may contain information a hacker can use
directly or indirectly, to help them gain access to a network.
Part 3: Finishing The Attack
This is the stage when the hacker will invade the primary target that
he/she was planning to attack or steal from. Many "hackers" will be
caught after this point, lured in or grabbed by any data also known as a
honeypot (a trap set up by computer security personnel).
Grey hat
Main article: Grey hat
A grey hat hacker is a combination of a Black Hat and a White Hat Hacker. A
Grey Hat Hacker may surf the internet and hack into a computer system for
the sole purpose of notifying the administrator that their system has been

hacked, for example. Then they may offer to repair their system for a small
fee.[9]
Elite hacker
A social status among hackers, elite is used to describe the most skilled. Newly
discovered exploits will circulate among these hackers. Elite groups such as
Masters of Deception conferred a kind of credibility on their members.[10]
Script kiddie
A script kiddie (or skiddie) is a non-expert who breaks into computer systems
by using pre-packaged automated tools written by others, usually with little
understanding of the underlying concepthence the term script (i.e. a
prearranged plan or set of activities) kiddie (i.e. kid, childan individual
lacking knowledge and experience, immature).[11]
Neophyte
A neophyte, "n00b", or "newbie" is someone who is new to hacking or
phreaking and has almost no knowledge or experience of the workings of
technology, and hacking.[9]
Blue hat
A blue hat hacker is someone outside computer security consulting firms who
is used to bug test a system prior to its launch, looking for exploits so they can
be closed. Microsoft also uses the term BlueHat to represent a series of
security briefing events.[12][13][14]
Hacktivist
A hacktivist is a hacker who utilizes technology to announce a social,
ideological, religious, or political message. In general, most hacktivism
involves website defacement or denial-of-service attacks.
Nation state
Intelligence agencies and cyberwarfare operatives of nation states.[15]

Organized criminal gangs


Criminal activity carried on for profit.[15]
Bots
Bots are automated software tools, some freeware, that are available for the
use of any type of hacker.[15]
Q.3 Explain the Operational Benefits, Business Benefits, and Management
Benefits of ERP.
Ans:
* Operational Benefits
- Quality and efficiency
Decision support
Latest technology
Improved delivery performance
Reduced cycle time
Simplification of product planning
Paperless transitions
Help reduce operating costs
Business Benefits
Decreased costs
Improved customer satisfaction
vendor satisfaction
High profitability
Management Benefits
Enterprise agility
Transparency within the organization
Improved productivity of an organization.
Facilitate Day-to-Day Management
Support Strategic Planning
Q.4 Define Computer Crime and list three types of Computer crime that can be
perpetrated from inside and three from outside the organization.
Ans: Computer crime includes

Unauthorized use, access, modification, or destruction of


hardware, software, data, or network resources
The unauthorized release of information
The unauthorized copying of software
Denying an end user access to his/her own hardware, software,
data, or network resources
Using or conspiring to use computer or network resources
illegally to obtain information or tangible property
Crimes which can be committed inside the organization
- Electronic Breaking and Entering
Hacking into a computer system and reading files, but neither
stealing nor damaging anything
- Back Doors
A hidden point of entry to be used in case the original entry point
is detected or blocked
- Cyber Theft
Theft of money or information from the targeted PC or system.
Crimes which can be committed outside the organization
- Denial of Service
Hammering
a
websites
equipment
with
too
many requests for information
Clogging
the
system,
slowing
performance,
or crashing the site
- Scans
Widespread probes of the Internet to determine types of
computers, services, and connections looking for weaknesses
- Sniffer
Programs
that
search
individual
packets
of
data as they pass through the Internet
Capturing passwords or entire contents
- Spoofing
Faking an e-mail address or Web page to trick users into passing
along
critical
information
like passwords or credit card numbers

Q.5 Describe challenges posed by Information Technology to Intellectual


property rights?
Ans:
- Protection has been made impossible due to easy reproduction
- Traditional copyright law imposed criminal penalties only if intent to profit
could be proved
- Information isn't information unless it is shared
- Societal interests in unrestricted dissemination of thought outweigh
interests of the individual/corporate owner
- Creator should have moral rights to control work
- Piracy has become a major concern in the Intellectual property rights.
- It has become very difficult to identify the original work now days.
Q.6 Describe Hacking and Computer crimes
Ans:
Hacking
Hacking is
The unauthorized access and use of networked computer systems
Electronic Breaking and Entering
Hacking into a computer system and reading files, but neither
stealing nor damaging anything
Cracker
A malicious or criminal hacker who maintains knowledge of the
vulnerabilities
found
for
private advantage
Common Hacking Tactics
Denial of Service
Hammering
a
websites
equipment
with
too
many requests for information
Clogging
the
system,
slowing
performance,
or crashing the site
Scans
Widespread probes of the Internet to determine types of
computers, services, and connections
Looking for weaknesses
Sniffer
Programs
that
search
individual
packets
of
data as they pass through the Internet
Capturing passwords or entire contents

Spoofing
Faking an e-mail address or Web page to trick users into passing
along
critical
information
like passwords or credit card numbers
Trojan House
A program that, unknown to the user, contains instructions that
exploit
a
known
vulnerability
in some software
Back Doors
A hidden point of entry to be used in case the original entry point
is detected or blocked
Malicious Applets
Tiny Java programs that misuse your computers resources,
modify files on the hard disk, send fake email, or steal passwords
War Dialing
Programs that automatically dial thousands of telephone numbers
in search of a way in through a modem connection.
Password Crackers
Software that can guess passwords
Computer Crime
Computer crime includes
Unauthorized use, access, modification, or destruction of
hardware, software, data, or network resources
The unauthorized release of information
The unauthorized copying of software
Denying an end user access to his/her own hardware, software,
data, or network resources
Using or conspiring to use computer or network resources
illegally to obtain information or tangible property
Many computer crimes involve the theft of money
The majority are inside jobs that involve unauthorized network entry
and
alternation
of
computer
databases
to
cover
the
tracks
of the employees involved
Copyright infringement
Transmission of confidential data
Pornography
Hacking

Use of external ISPs


Moonlighting
Software Piracy
Entry into the private life of any person

Q.7 Security isnt simply a technology issue, its a business issue. Discuss.
Ans. ( First we have to prove that security is a technology issue than we will
have to prove that security is a business issue as well.)
* Technical Issue
- Security management is a technical issue and handled by technical persons.
- Computer crime, hacking, denial service, privacy issues, spoofing, sniffer, war
dialing, password cracking are some of the issues which are related to the
cyber security of a person and they all are technical issues.
- Ex. Denial of service is related to the system speed
Password cracking is related to password hacking and is again a
technical concern.
Spoofing is creating a similar web page is done with the computer
programmes and codes only.
*Business Issue
- Problems related to security affect many things including company goodwill
among customers, supplier, market reputation, profitability of an
organization.
Cost of the top five virus families
Nearly 115 million computers in 200 countries were infected in
2004
Up
to
11
million
be permanently infected

computers

are

believed

to

In 2004, total economic damage from virus proliferation was $166


to $202 billion
Average
damage
$277 and $366

per

computer

is

between

- If the company is suffering from regular securities issues than the


reputation of that company in the market will not be that good.
Hence the company will loose out the customer base with the
passage of time and loose its credibility in the market. The same
situation will make the company least preferable among the
supplier also and their relation with the company will also be
tarnished. So with the passage of time the company will have to
suffer in each and every context of a business. The security
management is also very expensive. Right from taking email
monitoring to maintaining internal and external firewalls, backup
servers, password protection all the mechanisms require money
which is again a business concern for any company.
- HR Perspective : The company facing the security issues has to
train the employees how to survive from the problems and how to
tackle the problem at their level. So again this is a part of HR
which is business context of the security issue.

Q.8 Should companies be responsible for unemployment caused by their


Information System? Why or Why Not?
Ans: - (In this type of answers you should give your opinion and give your
arguments in support to the answers.)
Companies are not responsible for the unemployment caused by their
Information system
- Companies are there to make profit
- If the company does not adopt to the new technology then its competitior
would do it and than there will be a survival issue for the organisation.
- Information system also provide jobs to many people.
- In todays scenario everyone knows that one has to stretch his/herself to the
fullest to make his/herself equipped with contemporary skills of doing a job
and those who fails to do it looses the job.
- The skilled manpower never loses a job may it be recession, may it be
adoptation to new information system etc.Employee who are
* Not creative
* Less flexible
* Directed to the short term benefits

* Unethical
* Less performing are generally removed.

Q.9 List and explain the most common threats against contemporary
information systems.
Ans. : Information systems security remains high on the list of key issues
facing information systems executives. Traditional concerns range from
forced entry into computer and storage rooms to destruction of data. Recent
attention focuses on protecting information systems and data from accidental
or intentional unauthorized access, disclosure, modification, or destruction.
The consequences of these events can range from degraded or disrupted
service to customers to corporate failure.
Hacking is
The unauthorized access and use of networked computer systems
Electronic Breaking and Entering
Hacking into a computer system and reading files, but neither
stealing nor damaging anything
Cracker
A malicious or criminal hacker who maintains knowledge of the
vulnerabilities
found
for
private advantage
Denial of Service
Hammering
a
websites
equipment
with
too
many requests for information
Clogging
the
system,
slowing
performance,
or crashing the site
Scans
Widespread probes of the Internet to determine types of
computers, services, and connections
Looking for weaknesses
Sniffer
Programs
that
search
individual
packets
of
data as they pass through the Internet
Capturing passwords or entire contents
Spoofing

Faking an e-mail address or Web page to trick users into passing


along
critical
information
like passwords or credit card numbers
Trojan House
A program that, unknown to the user, contains instructions that
exploit
a
known
vulnerability
in some software
Back Doors
A hidden point of entry to be used in case the original entry point
is detected or blocked
Malicious Applets
Tiny Java programs that misuse your computers resources,
modify files on the hard disk, send fake email, or steal passwords
War Dialing
Programs that automatically dial thousands of telephone numbers
in search of a way in through a modem connection.
Password Crackers
Software that can guess passwords
Many computer crimes involve the theft of money
The majority are inside jobs that involve unauthorized network entry
and
alternation
of
computer
databases
to
cover
the
tracks
of the employees involved
Many attacks occur through the Internet
Most
companies
dont
reveal
that
they
have
been targets or victims of cybercrime
Unauthorized use of computer systems and networks is time and
resource theft
Doing private consulting
Doing personal finances
Playing video games
Unauthorized use of the Internet or company networks
Internet Abuses in the Workplace
General email abuses
Unauthorized usage and access
Copyright infringement
Transmission of confidential data
Pornography
Hacking

Non-work-related download/upload
Leisure use of the Internet
Use of external ISPs
Moonlighting

Q.10 Describe the roles of firewalls, intrusion detection systems, and antivirus
software in promoting security.
Ans : Firewalls
A gatekeeper system that protects a companys intranets and
other computer networks from intrusion
Provides
a
filter
and
safe
transfer
point
for
access to/from the Internet and other networks
Important for individuals who connect to the Internet

Intrusion detection systems


An intrusion detection system (IDS) is a device or software application that
monitors network or system activities for malicious activities or policy
violations and produces reports to a management station

- A signal suggesting that a system has been or is being attacked.


- An IDS has the ability to dynamically change its rules and configurations in
response to changing environmental activity.
- Intrusion detection systems constantly monitor a given computer network
for invasion or abnormal activity. The advantage of this service is the "roundthe-clock" aspect, in that the system is protected even while the user is asleep
or otherwise away from any computer hooked up to the network. User
information, access to the network, and firewall measures are all actively
updated and looked after by intrusion detection systems.
- Intrusion detection systems are highly customizable to accommodate
specific client needs. This allows users to custom-build network security to
monitor highly-individualized activity; from overt attacks to the network to
examining suspicious or specific patterns of activity which may be a
masquerade attempt to penetrate system security from outside the network,
or perhaps the work of someone inside the security network. The system is
able, through customization, to monitor both the outside threats to a given
network, and patterns of behavior which may be threats operating within the
system.
- Intrusion Detection Systems are placed at a strategic point or points within
the network to monitor traffic to and from all devices on the network.
Antivirus Software:
Protection from Viruses

The greatest and most obvious advantage to installing anti-virus software on


your computer is that it will prevent you from getting viruses such as trojans,
malware and spyware. Viruses range in severity from the harmless to the
downright system crippling. Not only can a virus destroy all of the valued data
on your computer, it can make the computer utterly worthless by infecting
and destroying processes vital to your computer's performance.
Protecting Personal Information

Hackers and viruses go hand in hand. A good anti-virus program will protect
you while you surf the Internet, preventing hackers from gaining access to
personal things such as credit card information and bank account access. The
firewall feature included with most anti-virus software will block any
unauthorized incoming connections to your network or computer, preventing
hackers from digging their hooks into your life and your computer.

Cost Savings

Though some anti-virus programs are quite pricey, there are some very good
options for those wanting something relatively cheap or even free. Many free
anti-virus programs are available that will protect your system just as well as
a subscription-based anti-virus program. Even if you choose to go with a
program you have to pay for, the cost of the program and subscription to their
service will almost certainly extend the life of your computer, meaning you'll
have to purchase new computers less frequently than those who choose not to
use anti-virus software.
Convenience

Though you may find it inconvenient to have to run virus scans and worry
about the security of your computer, you'd have more to worry about without
proper anti-virus protection. A computer left open for viruses and hackers will
often start to show premature signs of wear and a significant slow down will
be noticeable, making normal computing tasks take much longer and causing
much more hassle. Let's assume your system does get infected with a virus.
Without protection you'd be at the mercy of the virus and you'd have to waste
time trying to find it, delete it and restore any damage it has caused and it will
still probably be there, even after deletion. Yet with proper real-time antivirus software working you will simply get a notification that a virus has been
detected and be asked if you would like to delete it. These notifications usually
come as soon as the virus is detected, leaving it without enough time to do its
damage.
Q.11 Increased use of Information Technology has lead to more concern for
ethical business practices. Do you agree? Discuss.
Ans: Yes. Increased use of Information Technology has lead to more concern
for ethical business practices.
Information
technology
has
both
beneficial
and detrimental effects on society and people
Manage work activities to minimize the detrimental effects of
information technology
Optimize the beneficial effects
Excessive usage of Information system has raised some ethical issues.
- Computer Crime

- Hacking
- Cyber Theft
- Unauthorized Use at Work
Unauthorized use of computer systems and networks is time and
resource theft
Doing private consulting
Doing personal finances
Playing video games
Unauthorized use of the Internet or company networks
Internet Abuses in the Workplace
General email abuses
Unauthorized usage and access
Copyright infringement
Transmission of confidential data
Pornography
Hacking
Non-work-related download/upload
Leisure use of the Internet
Use of external ISPs
Moonlighting
Software Piracy
Theft of Intellectual Property
Privacy Issues
The issues those are discussed above were not there before the extensive
usage of information system.
Q.12 Why are computer systems more vulnerable than manual system to
destruction, error & misuse? Distinguish between fault tolerant system & high
availability computing.
Ans : Computer systems are more vulnerable than manual systems to
the destruction, error and misuse because
- They are automatic systems
- If one has find the method to destroy the system than by using the
same method all the other systems can also be destroyed. That is
not the case with manual system.
- Computer systems are networked hence it becomes easier to
misuse them.

- All the security systems have loop holes which can be used to
harm the computer.
In the event of a system failure, fault-tolerant systems have redundant
processors, peripherals, and software that provide
Fail-over capability: shifts to back up components
Fail-save
capability:
the
system
continues
to operate at the same level
Fail-soft
capability:
the
system
continues
to operate at a reduced but acceptable level
High availability systems
High availability is a system design approach and associated service
implementation that ensures a prearranged level of operational performance
will be met during a contractual measurement period.
Users want their systems, for example wrist watches, hospitals, airplanes or
computers, to be ready to serve them at all times. Availability refers to the
ability of the user community to access the system, whether to submit new
work, update or alter existing work, or collect the results of previous work. If a
user cannot access the system, it is said to be unavailable.[1] Generally, the
term downtime is used to refer to periods when a system is unavailable.
Difference:
- A fault tolerant environment has no service interruption but a significantly
higher cost, while a highly available environment has a minimal service
interruption
- Fault tolerance relies on specialized hardware to detect a hardware fault.
More importantly, the fault tolerant model does not address software failures,
by far the most common reason for downtime. High availability systems
detect downtimes.

-Fault tolerance differs from high availability by providing additional


resources that allow an application to continue functioning after a component
failure without interruption.
-For the fault tolerant system : The most commonly used models are HARP,
SAVE, and SHARPE in the USA, and SURF or LASS in Europe.
For the high availability system : IBM Global Services models are used.

Q.13 Discuss the role of Firewalls, Intrusion Detection System & Encryption
system in promoting security.
Ans. Firewalls and Intrusion detecting system is discussed in above questions.
Encryption system:
Encryption
Data is transmitted in scrambled form
It is unscrambled by computer systems for authorized users only
The most widely used method uses a pair of public and private
keys unique to each individual

Q. 14 You have just been hired as a security consultant by Megamalls Inc., a


national chain of retail malls, to make sure that the security of their
information systems is up to par. Outline the steps you will take to achieve
this.
Ans. Step 1: Plan the security check.
Step 2: Hold the meeting of the concerned employees of the
organization. (Function Head, Security manager, Chief information
officer)
Step 3: Gather data and test IT security in the organization.
Step 4: identify deficiencies.
Step 5: Analyze and report findings
Step 6: Respond to findings (organization)
Step 7: Issue final report (audit report)

Past Years Questions of Module 1


Q.1 Classify the types of Information Systems and their characteristics of
information used at different levels in an organization.
Ans. Write the whole question of information system.

Q.2 Classify and Explain the attributes of Information in Three Dimensions


Ans.

Q.3 Explain the different types of physical media used in Telecom and
Networks and compare them in terms of speed and cost.
Ans.
Twisted Pair wire
Ordinary telephone wire
Copper wire is twisted
into pairs

Co axial cable
Sturdy copper or
aluminum wire wrapped
with spacers to insulate
and protect it

Fiber-Optic Cable
One or more hair-thin
filaments of glass
fiber wrapped in a
protective jacket

Q.4 Identify and discuss the major types of information systems that serve the
main management groups within a business. What are the relationships
among these systems?
Ans. Already discussed above.

Q.5 you are advising the owner of Sarthak Computer, a new, local computer
repair store that also builds custom computers to order. What competitive
strategies could Sarthak Computer exert? Which ones will it have difficulty
exercising?
Ans.
Cost Leadership
Differentiation Strategy
Innovation Strategy
Growth Strategy
Alliance Strategy
Q.6 Differentiate between application software and system software. Why
cant an end user just load an application program into a computer and start
computing without using an operating system?
Ans.
Actually, a system software is any computer software which manages and
controls computer hardware so that application software can perform a task.
Operating systems, such as Microsoft Windows, Mac OS X or Linux, are
prominent examples of system software. System software contrasts with
application software, which are programs that enable the end-user to perform
specific, productive tasks, such as word processing or image manipulation.
System software performs tasks like transferring data from memory to disk,
or rendering text onto a display device. Specific kinds of system software
include loading programs, operating systems, device drivers, programming
tools, compilers, assemblers, linkers, and utility software.
Software libraries that perform generic functions also tend to be regarded as
system software, although the dividing line is fuzzy; while a C runtime library
is generally agreed to be part of the system, an OpenGL or database library is
less obviously so.
If system software is stored on non-volatile memory such as integrated
circuits, it is usually termed firmware while an application software is a
subclass of computer software that employs the capabilities of a computer
directly and thoroughly to a task that the user wishes to perform. This should
be contrasted with system software which is involved in integrating a
computer's various capabilities, but typically does not directly apply them in
the performance of tasks that benefit the user. In this context the term

application refers to both the application software and its implementation.


A simple, if imperfect analogy in the world of hardware would be the
relationship of an electric light bulb (an application) to an electric power
generation plant (a system). The power plant merely generates electricity, not
itself of any real use until harnessed to an application like the electric light
that performs a service that benefits the user.
Typical examples of software applications are word processors, spreadsheets,
and media players.
Multiple applications bundled together as a package are sometimes referred
to as an application suite. Microsoft Office and OpenOffice.org, which bundle
together a word processor, a spreadsheet, and several other discrete
applications, are typical examples. The separate applications in a suite usually
have a user interface that has some commonality making it easier for the user
to learn and use each application. And often they may have some capability to
interact with each other in ways beneficial to the user. For example, a
spreadsheet might be able to be embedded in a word processor document
even though it had been created in the separate spreadsheet application.
User-written software tailors systems to meet the user's specific needs. Userwritten software include spreadsheet templates, word processor macros,
scientific simulations, graphics and animation scripts. Even email filters are a
kind of user software. Users create this software themselves and often
overlook how important it is.
In some types of embedded systems, the application software and the
operatingsystem software may be indistinguishable to the user, as in the case
of software used to control a VCR, DVD player or Microwave Oven.
Q.7 How do the Internet and Internet technology work and how do they
support communication and e-business?
Ans. Electronic business, or e-business, may be defined as the application of
information and communication technologies in support of all the activities of
business. Commerce constitutes the exchange of products and services
between businesses, groups and individuals and can be seen as one of the
essential activities of any business. Electronic commerce focuses on the use of

ICT to enable the external activities and relationships of the business with
individuals, groups and other businesses.

Potential concerns
Security
Privacy and confidentiality
Authenticity
Data integrity
Access control
Availability
Common security measures
Physical security
All these concerns are taken care of by the internet facility hence E-Business
can be supported by the internet facility.
Communication on the internet happens with many ways
- Email
- Voice mail
- Video conferencing
- Social networking sites
- E commerce sites
- Networks
- WWW
Hence internet supports communication also.
Q.8 Identify and describe three major enterprise applications.
Ans. - Enterprise Resource planning
- Supply chain management
- Customer relationship management

Q.9 Describe how any organization could practice knowledge management?


Ans.
A knowledge-creating company or learning organization
Consistently creates new business knowledge
Disseminates it throughout the company
Builds it into its products and services
Creates techniques, technologies, systems,
and rewards for getting employees to share
what they know
Makes better use of accumulated workplace and enterprise
knowledge

Q.10 Describe each type of organizational change enabled by information


technology. Give an example of each type of change in hotel or bank.
Ans. Hotel
- Advance booking or reservation
- Finding nearby hotels (GPS facility)
- Saving of time
- Promotional activities on the internet became possible
- Find the review on the internet
- Staff management by ERP

Bank
-

E banking
SMS alert with credit and debit of amount
ATM machines availability
Easy and fast cash transfer facility
Mobile banking
Quick Check clearance of premium customers (Part of CRM)
Saving of time (Customers do not have to stand in queue in order
to get the service.)
- Staff management by ERP

Q.11 What are Knowledge Work Systems? What role do they play in
Knowledge Management? What are the generic requirements of knowledge
work systems?
Ans. Building a Knowledge-Creating Company
A knowledge-creating company or learning organization
Consistently creates new business knowledge
Disseminates it throughout the company
Builds it into its products and services
Explicit Knowledge
Data, documents, and things written down or stored in computers
Tacit Knowledge
The how-to knowledge in workers minds
Represents some of the most important information within an
organization
A knowledge-creating company makes such tacit knowledge
available to others
Knowledge Management
Successful knowledge management
Creates techniques, technologies, systems,
and rewards for getting employees to share
what they know
Makes better use of accumulated workplace and enterprise
knowledge
Knowledge Management Techniques

Knowledge Management Systems (KMS)


Knowledge management systems
A major strategic use of IT
Manages organizational learning and know-how
Helps knowledge workers create, organize, and make available
important knowledge
Makes this knowledge available wherever and whenever it is
needed
Knowledge includes
Processes, procedures, patents, reference works, formulas, best
practices, forecasts, and fixes
Q.12 What is Business Process Re-engineering? What steps are required to
make it effective? How does it differ from Business Process Management?
Ans. Reengineering Business Processes
Called BRP or simply Reengineering
Fundamental rethinking and radical redesign of business
processes
Seeks to achieve improvements in cost, quality, speed, and service

Steps to make BPR more effective are as follows


Step 1: View current process
Step 2: Analyse current process
Step 3: Simulate future process
Step 4: Monitor the process
Step 5: Modify the process
BPR Versus Business Improvement or Business process
management

Q.13 what is IT infrastructure? List and describe the components of IT


infrastructure that firms need to manage.
Ans. IT infrastructure includes database, network, hardware and software
components.

- Database :
Definition
Types
- Networks
LAN, WAN, MAN
- Software
Definition
Software devices
- Hardware
Definition
Hardware devices
Q. 14 What is network topology? Name and explain principal network
topologies.
Ans. Network Topologies
Topology
The structure of a network
Star Network
Ties end user computers to a central computer
Ring Network
Ties local computer processors together in a ring on a relatively
equal basis
Bus Network
Local processors share the same communications channel
Mesh Network
Uses direct communications lines to connect some or all of the
computers in the ring to
each other
Switch
A message-switching computer that handles
data communication between autonomous
local computers

Mesh Network

Switch Network

Q. 15 Compare and contrast E-Commerce Vs. M-Commerce.


Ans.
1. M-commerce stands for Mobile Commerce while E-commerce
stands for Electronic Commerce.
2. M-commerce uses mobile devices for commercial transactions
while E-commerce uses computers.
3. M-commerce is available anyplace you go, even if there is no
Internet. For E-commerce, you still need to go to a place where
there is Internet to access your online transactions.
4. M-commerce is very handy and easy to carry while E-commerce
you cannot always bring with you your computer or laptop
anywhere.
5. M-commerce is charged through the callers rate, deduction of
users credit, and mobile banking. E-commerce is charged through
the use of credit cards that are swiped in credit card machines.
6. M- Commerce has a wide reach compare to E-commerce.
7. M- Commerce is a more recent technology compared to Ecommerce.
8. Online shopping is somewhat difficult because the screen on
mobile would be smaller compare to Laptops and PC so it

becomes somewhat difficult for a person to see the product


clearly on the screen. While this is not a difficulty in Ecommerce.
Q. 16 Using Michael Porters five forces model describe how businesses can
use information systems to apply competitive strategies.
Ans.
- A company can use online seller bidding so the buyer sets the
price. This way a company can achieve COST LEADERSHIP.
- A company can use online customer design or can opt for
Customer relationship management in order to DIFFERNTIATE
the product/service from the competitor.
- A company can go for Business process reengineering or ERP for
INNOVATION in the company.
- Wal-Marts merchandise ordering via global satellite tracking.
This is an example of a company which goes for the GROWTH
STRATEGY.
- Wal-Mart uses automatic inventory replenishment by supplier.
This is an example of a company which goes for the ALLIANCE
STRATEGY.
Past Years Questions of Module 3
Q.1 Define Networking. Discuss different forms of networking with its
characteristics, Also Elaborate how each one of them will provide value to
business.
Ans. Write about LAN, WAN , MAN etc..which is already discussed.
Q. 2 In what ways does use of extranet and intranet provides competitive
advantage to a firm?
Ans. The Role of Intranets
Many companies have sophisticated and widespread intranets,
offering
Detailed data retrieval
Collaboration
Personalized customer profiles
Links to the Internet

Intranets use Internet technologies


Web browsers and servers
TCP/IP network protocols : Transmission Control Protocol (TCP)
and Internet Protocol (IP)
Communications and collaboration
Business operations and management
Web publishing
Intranet portal management

Business Value of Extranets


Web browser technology makes customer and supplier access to
intranets easier and faster

Another way to build and strengthen strategic relationships


Enables and improves collaboration between a business, customers, and
partners
Facilitates online, interactive product development and marketing

Q. 3 what are the different components of information systems? Explain


Management, Organization & Technology dimensions of information system.
Ans. Components of an IS

People Resources
Specialists
End users
Hardware Resources
Machines
Media
Software Resources
Programs
Procedures

Data Resources
Product descriptions, customer records, employee files, inventory
databases
Network Resources
Communications media, communications processors, network
access and control software
Operational Dimension of Information system
The operation theory is just similar to any other system, which needs inputs
from user (key in instructions and commands, typing, scanning). The inputted
data then will be processed (calculating, reporting) using technology devices
such as computers, and produce output (printing reports, displaying results)
that will be sent to another user or other system via a network and a feedback
method that controls the operation.

Computer System Concept

Management Dimension of Information system

In addition to supporting decision making, information systems may


also help managers and workers analyze problems, visualize complex
subjects, and create new products.
In this section we have to write different systems that we have studies
Ex. TPS, OAS, DSS, GDSS, ESS, MIS, ES. Just the area where they are used
should be written.

Technology Dimension of Information system


(Write just a concept of following points within 2 or 3 lines)
- E- commerce
- M-commerce
- IT security
- Social networking sites
- ERP
- SCM
- CRM
- Wi-Fi and Bluetooth

Q. 4 Write short notes on the following:


a. Client-Server computing
b. Peer-to-peer computing
c. Network computing
Ans.
a. Client-Server computing
Clients
End user personal computers or networked computers
Servers
Used to manage the networks
Processing
Shared between the clients and servers
Sometimes called a two-tier architecture
Larger computer systems are being replaced
with multiple client/server networks

The clientserver model is an approach to computer network


programming developed at Xerox PARC during the 1970s.
It is now prevalent in computer networks.
Email, the World Wide Web, and network printing all apply the client
server model.
b. Peer-to-peer computing
Central Server Architecture
P2P file-sharing software connects all PCs
to a central server
When a PC requests a file, the server searches
all active peers on the network
The server sends the requesting PC a list of
links to all active peers who have the file
Clicking a link connects the two PCs and automatically transfers
the file to the
requesting PC
Advantages
Can better protect the integrity and security
of the content and users of the network
Disadvantages
Directory server can be slowed or overwhelmed by too many
users or technical problems

Pure Peer-to-Peer Architecture


No central directory or server
File-sharing software connects one PC to
another online user
When you request a file, the software searches every online user
and sends you a list of active file names
Clicking a link automatically transfers the file from that users
hard drive to yours

c. Network computing
Virtual Private Networks (VPN)
Used to establish secure intranets and extranets
The Internet is the main backbone network
Relies on network firewalls, encryption, and
other security features to build a pipe through the Internet
Creates a private network without the high
cost of a separate proprietary connection
Telecommunications Network Model

Q. 5 Write short notes on the following:


1. Wireless Web
2. TCP/IP Reference Model for Telecommunication
Ans.
1. Wireless Web
Wi-fi
Wi-Fi is a popular technology that allows an electronic device to
exchange data wirelessly (using radio waves) over a computer network.
Wireless LANS
Uses wireless radio-wave technology to
connect PCs within an office or a building
Can be high-frequency, similar to digital
cellular, or low frequency
A device that can use Wi-Fi (such as a personal computer, video-game console,
smartphone, tablet, or digital audio player) can connect to a network resource
such as the Internet via a wireless network access point. Such an access point
(or hotspot) has a range of about 20 meters (65 feet) indoors and a greater
range outdoors.
Wi-Fi can be less secure than wired connections because an intruder
does not need a physical connection.
Advantages
Wi-Fi allows cheaper option to transmit the data
Also spaces where cables cannot be run, such as outdoor areas and
historical buildings, can host wireless LANs.
Unlike mobile phones, any standard Wi-Fi device will work anywhere in
the world.
Limitations

Wi-Fi networks have limited range.


Due to reach requirements for wireless LAN applications, Wi-Fi has fairly high
power consumption compared to some other standards

Bluetooth
Bluetooth is a wireless technology standard for exchanging data over
short distances (using short-wavelength radio transmissions from fixed
and mobile devices, creating personal area networks (PANs) with high
levels of security. A connection between two or more portable devices
without the need for cables or connectors
Uses
Wireless headsets for cell phones.
If the phone has Internet capability, a Bluetooth connection can be
established between the phone and nearby laptop computer to
give the computer, Internet access as well.
Bluetooth enabled printers can print pictures from a bluetooth
enabled cell phone or camera
Advantage
A master Bluetooth device can communicate with a maximum of seven
devices, though not all devices reach this maximum.
low power consumption
Applications
Wireless control of and communication between a mobile phone and a
handsfree headset.
communication between a mobile phone and a Bluetooth compatible
car stereo system.
Wireless Bluetooth headset and Intercom.
Q.6 Define Wi-Fi, Bluetooth and describe the capability of each and which
types of applications each is best suited.
Ans. Answer already discussed above.

Q.7 Draw and Explain the Network Topologies and compare each of them.
Ans. Answer already discussed above.
Q.8 Define LAN, WAN & MAN. Describe the components and the functions of
each component of LAN.
Ans.
Wide Area Network (WAN)
Telecommunication network that covers a large geographic area

Metropolitan area network (MAN)


A metropolitan area network (MAN) is a computer network that usually
spans a city or a large campus. A MAN usually interconnects a number of local
area networks (LANs) using a high-capacity backbone technology, such as
fiber-optical links
Local Area Network (LAN)
Connects computers within a limited physical area, such as an office,
classroom, or building

Components of LAN
Wiring
Network cables connect all of the devices on your network to a central point,
typically a switch or a hub. Most networks use Unshielded Twisted Pair wiring
. Fiber optic cable is used in cases where very high bandwidth is needed and
where there is a lot of electromagnetic interference. Fiber optic cable is much
more expensive than UTP wiring.
Network Interface Cards
Each networked device contains a Network Interface Card. The NIC may be a
separate board installed into a computers slot, or it may be built into the
motherboard. Either way, the NIC is the bridge between the computer and the
network. It decides whether to process a data packet or not, either passing it

on to the computers processor or discarding it based on the destination


address in the packet.
Hubs
A hub is the central wiring connector on a LAN, where all of the network
cables come together. Each cable plugs into a port on the hub. The hub accepts
incoming data packets from devices on the network and transmits them to all
other computers attached to the hub. Each device NIC receives each packet
and makes its process or discard decision.
Switches
A switch is like a hub in that it is a central point for connecting network
cables; however, a switch is able to receive a packet and transmit it to only the
destination computer. It does this by building a table of which computer is on
which of its ports. This reduces network traffic significantly, especially on a
network of more than 10 computers. It is not unusual to find both hubs and
switches on the same LAN.
Routers
Network routers are essentially very smart switches because they know about
other LANs, while switches only know about the network they are on. Routers
connect LANs together, sometimes across long distances, creating Wide Area
Networks, or WANs. Routers are also used to provide security on LANs by
routing network traffic between LAN segments.
Network Software
All of the network components except the cabling have software that makes
them work. Network software is written to a set of standards that define the
TCP/IP protocol suite. The standard defines layers of software and how they
talk with each other. Using the same set of rules allows networking equipment
from different vendors to work together, allowing you to take advantage of
the best equipment in each category.
Q.10 what is network topology? Name and explain principal network
topologies. Ans. Answer already discussed earlier.

TRICKY QUESTIONS
Q. 1 You have been hired by Sarvoday Visiting Nurse Services, whose
business processes are all manual, paper-based processes. How might a CRM
system benefit them?
Ans.
1. It projects an extremely customer centric face of the company to
the customer. Hence CRM will help Sarvoday Visiting Nurse
Services portray its positive image among the patients
(customers).
2. Identification and targeting the best customers becomes easy.
3. Real-time customization and personalization of the nursing
services. Ex. Diabetes patient will be given QUICKLY the nurse
who specializes in handling diabetic patients. This thing takes
much more effort in the manual system.
4. Track when and how a customer (patient) contacts the company.
GPS system attached with CRM would give the exact location of a
patient hence it would be easier for the company employees to
reach to the patients.
5. Sarvoday Visiting Nurse Services can save all the data related to
a particular patient like when the patient called for the first time,
patient is suffering from which disease, patient is taking which
drug and for how much time etc
6. Grievance handling would be very easy now compared to the
manual process.
7. Sarvoday Visiting Nurse Services will save lot of operation time.
Q.2 "Knowledge increases exponentially," is a phrase with which we are all
familiar. How does this concept apply to electronic business and the
emergence of the digital firm? Support your contentions.
Q.3 Write a note on Linux Vs Windows.
Ans.
1: Full access vs. no access
Having access to the source code is probably the single most significant
difference between Linux and Windows. You can look at this from both sides
of the fence. Some say giving the public access to the code opens the operating

system (and the software that runs on top of it) to malicious developers who
will take advantage of any weakness they find. Others say that having full
access to the code helps bring about faster improvements and bug fixes to
keep those malicious developers from being able to bring the system down.
2: Licensing freedom vs. licensing restrictions
With a Linux licensed operating system, you are free to modify that software
and use and even republish or sell it (so long as you make the code available).
Also, with the linux, you can download a single copy of a Linux distribution (or
application) and install it on as many machines as you like. With the Microsoft
license, you can do none of the above. You are bound to the number of licenses
you purchase, so if you purchase 10 licenses, you can legally install that
operating system (or application) on only 10 machines.
3: Online peer support vs. paid help-desk support
This is one issue where most companies turn their backs on Linux. But its
really not necessary. With Linux, you have the support of a huge community
via forums, online search, and plenty of dedicated Web sites. And of course, if
you feel the need, you can purchase support contracts from some of the bigger
Linux companies (Red Hat and Novell for instance).
However, when you use the peer support inherent in Linux, you do fall prey to
time. You could have an issue with something, send out e-mail to a mailing list
or post on a forum, and within 10 minutes be flooded with suggestions. Or
these suggestions could take hours of days to come in. It seems all up to
chance sometimes. Still, generally speaking, most problems with Linux have
been encountered and documented. So chances are good youll find your
solution fairly quickly.
On the other side of the coin is support for Windows. Yes, you can go the same
route with Microsoft and depend upon your peers for solutions. There are just
as many help sites/lists/forums for Windows as there are for Linux. And you
can purchase support from Microsoft itself. Most corporate higher-ups easily
fall victim to the safety net that having a support contract brings.
4: Full vs. partial hardware support

One issue that is slowly becoming nonexistent is hardware support. Years ago,
if you wanted to install Linux on a machine you had to make sure you handpicked each piece of hardware or your installation would not work 100
percent.
With Windows, you know that most every piece of hardware will work with
the operating system. Of course, there are times when you will wind up
spending much of the day searching for the correct drivers for that piece of
hardware you no longer have the install disk for.
5: Centralized vs. noncentralized application installation
With Linux you have a centralized location where you can search for, add, or
remove software.
Windows has nothing like this. With Windows, you must know where to find
the software you want to install, download the software (or put the CD into
your machine), and run setup.exe or install.exe with a simple double-click.
6: Flexibility vs. rigidity
Linux system is more flexible compare to windows system.
Q.4 What are the different activities of Supply Chain Management (SCM)? How
do information systems facilitate SCM?
Ans. (The answer here is given in much more detail than it is asked. Students
are advised to write only selective part from the given answer.)
Definition of Supply Chain.
The interrelationships
With suppliers, customers, distributors, and
other businesses
Needed to design, build, and sell a product
Each supply chain process should add value to the products or services
a company produces
Frequently called a value chain
Supply Chain Life Cycle

Roles and Activities of SCM in Business

Planning & Execution Functions of SCM


Planning
Supply chain design

Collaborative demand and supply planning


Execution
Materials management
Collaborative manufacturing
Collaborative fulfillment
Supply chain event management
Supply chain performance management
Benefits and Challenges of SCM
Key Benefits
Faster, more accurate order processing
Reductions in inventory levels
Quicker times to market
Lower transaction and materials costs
Strategic relationships with supplier
Goals and Objectives of SCM

Challenges of SCM
Key Challenges
Lack
of
demand
planning
knowledge,
tools,
and guidelines
Inaccurate data provided by other information systems
Lack of collaboration among marketing, production, and
inventory management

SCM
tools
are
hard to implement

immature,

incomplete,

and

Trends in SCM

Q.5 How does the use of electronic voting machines act as a "double-edged
sword?"
Ans. Usage of electronic machines are done because to achieve some
objectives which are mentioned below
- The vote counting process becomes very fast and easy.
- Amount the government has to spent on the counting vote would be reduced.
- The election would be safer.
- It would help improve countrys image if we use electronic voting machines
for the election.
- The conventional methods of spoiling election results with unethical
practices would be stopped at a larger extent if we use electronic voting
machine.
There is an another side of a coin to this. Let us look this scenario from a
different context.
- If the electronic voting machine is hacked than the problem would
be more severe compared to the manual election method.

- The cost to overcome the problem would be quite high and which
can surpass the amount within which the manual counting of
votes can be done.
- Electronic voting machine does not make any difference when it
comes to security of the votes as it can be hacked like in the
earlier scenario the boxes were used to stolen.

Q.6 You are working as a project manager for a small IT consulting firm and
have been asked to create a plan for reviewing and auditing completed
projects in order to gauge their success. What factors will you use to measure
the success of a project? What questions would you ask in order to
understand why a project succeeded or failed?
Ans.
- Is the project going on time?
- What were the issues faced during the project?
- What are the standard operating procedures?
- Disaster management system is there or not in the firm?
- What has been done in terms of the security management?
- What if the system would fail? Is there a fault tolerant system in
the organization?
- What is a time given for the reporting of the project activities to
the senior management?
- How much is the involvement of the senior management in the
project?
- What are the outcomes of the project?
- Up to which extent the anticipated results have been achieved.
- What do you think are the reasons of the success/failure of the
project?
-

You might also like