Professional Documents
Culture Documents
Q.1 : Define Expert System and describe the types of Problems to which they
are applicable.
Ans. Definition
- Expert System Application Categories
Decision Management
Loan portfolio analysis
Employee performance evaluation
Diagnostic/Troubleshooting
Equipment calibration
Medical diagnosis
Software debugging
Design/Configuration
Manufacturability studies
Communications networks
Selection/Classification
Material selection
Information classification
Suspect identification
Process Monitoring/Control
Machine control (including robotics)
Inventory control
Production monitoring
Benefits of Expert Systems
Faster and more consistent than an expert
Can contain knowledge of multiple experts
Does not get tired or distracted
Cannot be overworked or stressed
Helps
preserve
and
reproduce
of human experts
the
knowledge
Q.3 : Explain TPS with suitable example. Illustrate how MIS obtains their data
from various organizations TPS.
Ans : - Definition
Transactions include sales, purchases, deposits, withdrawals,
refunds, and payments
Online transaction processing (OLTP) is a real-time system that
captures transactions immediately
These systems include the accurate recording of transactions as well as
the control procedures used in issuing such documents as
pay checks,
invoices,
customer statements,
payment reminders,
tuition bills,
- Consistency of data
- Information completeness
- Relevance
Q.6: Describe the characteristics of Transaction Processing System (TPS) and
role they play in a business.
Ans: - Definition
Roles played by TPS in the organization
Process data generated by and about transactions
Q.7 : Define an expert system, describe how it works, and explain importance
to business.
Ans: - Write the whole question
Q. 8: Write a short note on Decision Support System
Ans:
Definition
Components
Model of DSS
Use of DSS
Q. 9 Differentiate between Model Driven DSS & Data Driven DSS. Giving
suitable examples explain the concept of data mining & OLAP.
Ans:Data-driven
DSS
Most data-driven DSSs are targeted at managers, staff and also
product/service suppliers. It is used to query a database or data warehouse to
seek specific answers for specific purposes. It is deployed via a main frame
system, client/server link, or via the web. Examples: computer-based
databases that have a query system to check (including the incorporation of
data to add value to existing databases.
Model-driven
DSS
Model-driven DSSs are complex systems that help analyse decisions or choose
between different options. These are used by managers and staff members of
Regression Attempts to find a function which models the data with the
least error.
Q.11 How would you use capabilities like Data warehousing and Data Mining
to improve business performance and decision making? Explain.
Ans: For the Data mining use the points given in the answer number 9 and
show its usage in the organization.
Data warehousing:
They choose their targets using a two-pronged process known as the "prehacking stage".
Part 1: Targeting
The hacker determines what network to break into during this phase.
The target may be of particular interest to the hacker, either politically
or personally, or it may be picked at random. Next, they will port scan a
network to determine if it is vulnerable to attacks, which is just testing
all ports on a host machine for a response. Open portsthose that do
respondwill allow a hacker to access the system.
Part 2: Research and Information Gathering
It is in this stage that the hacker will visit or contact the target in some
way in hopes of finding out vital information that will help them access
the system. The main way that hackers get desired results from this
stage is from "social engineering", which will be explained below. Aside
from social engineering, hackers can also use a technique called
"dumpster diving". Dumpster diving is when a hacker will literally
search through users' garbage in hopes of finding documents that have
been thrown away, which may contain information a hacker can use
directly or indirectly, to help them gain access to a network.
Part 3: Finishing The Attack
This is the stage when the hacker will invade the primary target that
he/she was planning to attack or steal from. Many "hackers" will be
caught after this point, lured in or grabbed by any data also known as a
honeypot (a trap set up by computer security personnel).
Grey hat
Main article: Grey hat
A grey hat hacker is a combination of a Black Hat and a White Hat Hacker. A
Grey Hat Hacker may surf the internet and hack into a computer system for
the sole purpose of notifying the administrator that their system has been
hacked, for example. Then they may offer to repair their system for a small
fee.[9]
Elite hacker
A social status among hackers, elite is used to describe the most skilled. Newly
discovered exploits will circulate among these hackers. Elite groups such as
Masters of Deception conferred a kind of credibility on their members.[10]
Script kiddie
A script kiddie (or skiddie) is a non-expert who breaks into computer systems
by using pre-packaged automated tools written by others, usually with little
understanding of the underlying concepthence the term script (i.e. a
prearranged plan or set of activities) kiddie (i.e. kid, childan individual
lacking knowledge and experience, immature).[11]
Neophyte
A neophyte, "n00b", or "newbie" is someone who is new to hacking or
phreaking and has almost no knowledge or experience of the workings of
technology, and hacking.[9]
Blue hat
A blue hat hacker is someone outside computer security consulting firms who
is used to bug test a system prior to its launch, looking for exploits so they can
be closed. Microsoft also uses the term BlueHat to represent a series of
security briefing events.[12][13][14]
Hacktivist
A hacktivist is a hacker who utilizes technology to announce a social,
ideological, religious, or political message. In general, most hacktivism
involves website defacement or denial-of-service attacks.
Nation state
Intelligence agencies and cyberwarfare operatives of nation states.[15]
Spoofing
Faking an e-mail address or Web page to trick users into passing
along
critical
information
like passwords or credit card numbers
Trojan House
A program that, unknown to the user, contains instructions that
exploit
a
known
vulnerability
in some software
Back Doors
A hidden point of entry to be used in case the original entry point
is detected or blocked
Malicious Applets
Tiny Java programs that misuse your computers resources,
modify files on the hard disk, send fake email, or steal passwords
War Dialing
Programs that automatically dial thousands of telephone numbers
in search of a way in through a modem connection.
Password Crackers
Software that can guess passwords
Computer Crime
Computer crime includes
Unauthorized use, access, modification, or destruction of
hardware, software, data, or network resources
The unauthorized release of information
The unauthorized copying of software
Denying an end user access to his/her own hardware, software,
data, or network resources
Using or conspiring to use computer or network resources
illegally to obtain information or tangible property
Many computer crimes involve the theft of money
The majority are inside jobs that involve unauthorized network entry
and
alternation
of
computer
databases
to
cover
the
tracks
of the employees involved
Copyright infringement
Transmission of confidential data
Pornography
Hacking
Q.7 Security isnt simply a technology issue, its a business issue. Discuss.
Ans. ( First we have to prove that security is a technology issue than we will
have to prove that security is a business issue as well.)
* Technical Issue
- Security management is a technical issue and handled by technical persons.
- Computer crime, hacking, denial service, privacy issues, spoofing, sniffer, war
dialing, password cracking are some of the issues which are related to the
cyber security of a person and they all are technical issues.
- Ex. Denial of service is related to the system speed
Password cracking is related to password hacking and is again a
technical concern.
Spoofing is creating a similar web page is done with the computer
programmes and codes only.
*Business Issue
- Problems related to security affect many things including company goodwill
among customers, supplier, market reputation, profitability of an
organization.
Cost of the top five virus families
Nearly 115 million computers in 200 countries were infected in
2004
Up
to
11
million
be permanently infected
computers
are
believed
to
per
computer
is
between
* Unethical
* Less performing are generally removed.
Q.9 List and explain the most common threats against contemporary
information systems.
Ans. : Information systems security remains high on the list of key issues
facing information systems executives. Traditional concerns range from
forced entry into computer and storage rooms to destruction of data. Recent
attention focuses on protecting information systems and data from accidental
or intentional unauthorized access, disclosure, modification, or destruction.
The consequences of these events can range from degraded or disrupted
service to customers to corporate failure.
Hacking is
The unauthorized access and use of networked computer systems
Electronic Breaking and Entering
Hacking into a computer system and reading files, but neither
stealing nor damaging anything
Cracker
A malicious or criminal hacker who maintains knowledge of the
vulnerabilities
found
for
private advantage
Denial of Service
Hammering
a
websites
equipment
with
too
many requests for information
Clogging
the
system,
slowing
performance,
or crashing the site
Scans
Widespread probes of the Internet to determine types of
computers, services, and connections
Looking for weaknesses
Sniffer
Programs
that
search
individual
packets
of
data as they pass through the Internet
Capturing passwords or entire contents
Spoofing
Non-work-related download/upload
Leisure use of the Internet
Use of external ISPs
Moonlighting
Q.10 Describe the roles of firewalls, intrusion detection systems, and antivirus
software in promoting security.
Ans : Firewalls
A gatekeeper system that protects a companys intranets and
other computer networks from intrusion
Provides
a
filter
and
safe
transfer
point
for
access to/from the Internet and other networks
Important for individuals who connect to the Internet
Hackers and viruses go hand in hand. A good anti-virus program will protect
you while you surf the Internet, preventing hackers from gaining access to
personal things such as credit card information and bank account access. The
firewall feature included with most anti-virus software will block any
unauthorized incoming connections to your network or computer, preventing
hackers from digging their hooks into your life and your computer.
Cost Savings
Though some anti-virus programs are quite pricey, there are some very good
options for those wanting something relatively cheap or even free. Many free
anti-virus programs are available that will protect your system just as well as
a subscription-based anti-virus program. Even if you choose to go with a
program you have to pay for, the cost of the program and subscription to their
service will almost certainly extend the life of your computer, meaning you'll
have to purchase new computers less frequently than those who choose not to
use anti-virus software.
Convenience
Though you may find it inconvenient to have to run virus scans and worry
about the security of your computer, you'd have more to worry about without
proper anti-virus protection. A computer left open for viruses and hackers will
often start to show premature signs of wear and a significant slow down will
be noticeable, making normal computing tasks take much longer and causing
much more hassle. Let's assume your system does get infected with a virus.
Without protection you'd be at the mercy of the virus and you'd have to waste
time trying to find it, delete it and restore any damage it has caused and it will
still probably be there, even after deletion. Yet with proper real-time antivirus software working you will simply get a notification that a virus has been
detected and be asked if you would like to delete it. These notifications usually
come as soon as the virus is detected, leaving it without enough time to do its
damage.
Q.11 Increased use of Information Technology has lead to more concern for
ethical business practices. Do you agree? Discuss.
Ans: Yes. Increased use of Information Technology has lead to more concern
for ethical business practices.
Information
technology
has
both
beneficial
and detrimental effects on society and people
Manage work activities to minimize the detrimental effects of
information technology
Optimize the beneficial effects
Excessive usage of Information system has raised some ethical issues.
- Computer Crime
- Hacking
- Cyber Theft
- Unauthorized Use at Work
Unauthorized use of computer systems and networks is time and
resource theft
Doing private consulting
Doing personal finances
Playing video games
Unauthorized use of the Internet or company networks
Internet Abuses in the Workplace
General email abuses
Unauthorized usage and access
Copyright infringement
Transmission of confidential data
Pornography
Hacking
Non-work-related download/upload
Leisure use of the Internet
Use of external ISPs
Moonlighting
Software Piracy
Theft of Intellectual Property
Privacy Issues
The issues those are discussed above were not there before the extensive
usage of information system.
Q.12 Why are computer systems more vulnerable than manual system to
destruction, error & misuse? Distinguish between fault tolerant system & high
availability computing.
Ans : Computer systems are more vulnerable than manual systems to
the destruction, error and misuse because
- They are automatic systems
- If one has find the method to destroy the system than by using the
same method all the other systems can also be destroyed. That is
not the case with manual system.
- Computer systems are networked hence it becomes easier to
misuse them.
- All the security systems have loop holes which can be used to
harm the computer.
In the event of a system failure, fault-tolerant systems have redundant
processors, peripherals, and software that provide
Fail-over capability: shifts to back up components
Fail-save
capability:
the
system
continues
to operate at the same level
Fail-soft
capability:
the
system
continues
to operate at a reduced but acceptable level
High availability systems
High availability is a system design approach and associated service
implementation that ensures a prearranged level of operational performance
will be met during a contractual measurement period.
Users want their systems, for example wrist watches, hospitals, airplanes or
computers, to be ready to serve them at all times. Availability refers to the
ability of the user community to access the system, whether to submit new
work, update or alter existing work, or collect the results of previous work. If a
user cannot access the system, it is said to be unavailable.[1] Generally, the
term downtime is used to refer to periods when a system is unavailable.
Difference:
- A fault tolerant environment has no service interruption but a significantly
higher cost, while a highly available environment has a minimal service
interruption
- Fault tolerance relies on specialized hardware to detect a hardware fault.
More importantly, the fault tolerant model does not address software failures,
by far the most common reason for downtime. High availability systems
detect downtimes.
Q.13 Discuss the role of Firewalls, Intrusion Detection System & Encryption
system in promoting security.
Ans. Firewalls and Intrusion detecting system is discussed in above questions.
Encryption system:
Encryption
Data is transmitted in scrambled form
It is unscrambled by computer systems for authorized users only
The most widely used method uses a pair of public and private
keys unique to each individual
Q.3 Explain the different types of physical media used in Telecom and
Networks and compare them in terms of speed and cost.
Ans.
Twisted Pair wire
Ordinary telephone wire
Copper wire is twisted
into pairs
Co axial cable
Sturdy copper or
aluminum wire wrapped
with spacers to insulate
and protect it
Fiber-Optic Cable
One or more hair-thin
filaments of glass
fiber wrapped in a
protective jacket
Q.4 Identify and discuss the major types of information systems that serve the
main management groups within a business. What are the relationships
among these systems?
Ans. Already discussed above.
Q.5 you are advising the owner of Sarthak Computer, a new, local computer
repair store that also builds custom computers to order. What competitive
strategies could Sarthak Computer exert? Which ones will it have difficulty
exercising?
Ans.
Cost Leadership
Differentiation Strategy
Innovation Strategy
Growth Strategy
Alliance Strategy
Q.6 Differentiate between application software and system software. Why
cant an end user just load an application program into a computer and start
computing without using an operating system?
Ans.
Actually, a system software is any computer software which manages and
controls computer hardware so that application software can perform a task.
Operating systems, such as Microsoft Windows, Mac OS X or Linux, are
prominent examples of system software. System software contrasts with
application software, which are programs that enable the end-user to perform
specific, productive tasks, such as word processing or image manipulation.
System software performs tasks like transferring data from memory to disk,
or rendering text onto a display device. Specific kinds of system software
include loading programs, operating systems, device drivers, programming
tools, compilers, assemblers, linkers, and utility software.
Software libraries that perform generic functions also tend to be regarded as
system software, although the dividing line is fuzzy; while a C runtime library
is generally agreed to be part of the system, an OpenGL or database library is
less obviously so.
If system software is stored on non-volatile memory such as integrated
circuits, it is usually termed firmware while an application software is a
subclass of computer software that employs the capabilities of a computer
directly and thoroughly to a task that the user wishes to perform. This should
be contrasted with system software which is involved in integrating a
computer's various capabilities, but typically does not directly apply them in
the performance of tasks that benefit the user. In this context the term
ICT to enable the external activities and relationships of the business with
individuals, groups and other businesses.
Potential concerns
Security
Privacy and confidentiality
Authenticity
Data integrity
Access control
Availability
Common security measures
Physical security
All these concerns are taken care of by the internet facility hence E-Business
can be supported by the internet facility.
Communication on the internet happens with many ways
- Email
- Voice mail
- Video conferencing
- Social networking sites
- E commerce sites
- Networks
- WWW
Hence internet supports communication also.
Q.8 Identify and describe three major enterprise applications.
Ans. - Enterprise Resource planning
- Supply chain management
- Customer relationship management
Bank
-
E banking
SMS alert with credit and debit of amount
ATM machines availability
Easy and fast cash transfer facility
Mobile banking
Quick Check clearance of premium customers (Part of CRM)
Saving of time (Customers do not have to stand in queue in order
to get the service.)
- Staff management by ERP
Q.11 What are Knowledge Work Systems? What role do they play in
Knowledge Management? What are the generic requirements of knowledge
work systems?
Ans. Building a Knowledge-Creating Company
A knowledge-creating company or learning organization
Consistently creates new business knowledge
Disseminates it throughout the company
Builds it into its products and services
Explicit Knowledge
Data, documents, and things written down or stored in computers
Tacit Knowledge
The how-to knowledge in workers minds
Represents some of the most important information within an
organization
A knowledge-creating company makes such tacit knowledge
available to others
Knowledge Management
Successful knowledge management
Creates techniques, technologies, systems,
and rewards for getting employees to share
what they know
Makes better use of accumulated workplace and enterprise
knowledge
Knowledge Management Techniques
- Database :
Definition
Types
- Networks
LAN, WAN, MAN
- Software
Definition
Software devices
- Hardware
Definition
Hardware devices
Q. 14 What is network topology? Name and explain principal network
topologies.
Ans. Network Topologies
Topology
The structure of a network
Star Network
Ties end user computers to a central computer
Ring Network
Ties local computer processors together in a ring on a relatively
equal basis
Bus Network
Local processors share the same communications channel
Mesh Network
Uses direct communications lines to connect some or all of the
computers in the ring to
each other
Switch
A message-switching computer that handles
data communication between autonomous
local computers
Mesh Network
Switch Network
People Resources
Specialists
End users
Hardware Resources
Machines
Media
Software Resources
Programs
Procedures
Data Resources
Product descriptions, customer records, employee files, inventory
databases
Network Resources
Communications media, communications processors, network
access and control software
Operational Dimension of Information system
The operation theory is just similar to any other system, which needs inputs
from user (key in instructions and commands, typing, scanning). The inputted
data then will be processed (calculating, reporting) using technology devices
such as computers, and produce output (printing reports, displaying results)
that will be sent to another user or other system via a network and a feedback
method that controls the operation.
c. Network computing
Virtual Private Networks (VPN)
Used to establish secure intranets and extranets
The Internet is the main backbone network
Relies on network firewalls, encryption, and
other security features to build a pipe through the Internet
Creates a private network without the high
cost of a separate proprietary connection
Telecommunications Network Model
Bluetooth
Bluetooth is a wireless technology standard for exchanging data over
short distances (using short-wavelength radio transmissions from fixed
and mobile devices, creating personal area networks (PANs) with high
levels of security. A connection between two or more portable devices
without the need for cables or connectors
Uses
Wireless headsets for cell phones.
If the phone has Internet capability, a Bluetooth connection can be
established between the phone and nearby laptop computer to
give the computer, Internet access as well.
Bluetooth enabled printers can print pictures from a bluetooth
enabled cell phone or camera
Advantage
A master Bluetooth device can communicate with a maximum of seven
devices, though not all devices reach this maximum.
low power consumption
Applications
Wireless control of and communication between a mobile phone and a
handsfree headset.
communication between a mobile phone and a Bluetooth compatible
car stereo system.
Wireless Bluetooth headset and Intercom.
Q.6 Define Wi-Fi, Bluetooth and describe the capability of each and which
types of applications each is best suited.
Ans. Answer already discussed above.
Q.7 Draw and Explain the Network Topologies and compare each of them.
Ans. Answer already discussed above.
Q.8 Define LAN, WAN & MAN. Describe the components and the functions of
each component of LAN.
Ans.
Wide Area Network (WAN)
Telecommunication network that covers a large geographic area
Components of LAN
Wiring
Network cables connect all of the devices on your network to a central point,
typically a switch or a hub. Most networks use Unshielded Twisted Pair wiring
. Fiber optic cable is used in cases where very high bandwidth is needed and
where there is a lot of electromagnetic interference. Fiber optic cable is much
more expensive than UTP wiring.
Network Interface Cards
Each networked device contains a Network Interface Card. The NIC may be a
separate board installed into a computers slot, or it may be built into the
motherboard. Either way, the NIC is the bridge between the computer and the
network. It decides whether to process a data packet or not, either passing it
TRICKY QUESTIONS
Q. 1 You have been hired by Sarvoday Visiting Nurse Services, whose
business processes are all manual, paper-based processes. How might a CRM
system benefit them?
Ans.
1. It projects an extremely customer centric face of the company to
the customer. Hence CRM will help Sarvoday Visiting Nurse
Services portray its positive image among the patients
(customers).
2. Identification and targeting the best customers becomes easy.
3. Real-time customization and personalization of the nursing
services. Ex. Diabetes patient will be given QUICKLY the nurse
who specializes in handling diabetic patients. This thing takes
much more effort in the manual system.
4. Track when and how a customer (patient) contacts the company.
GPS system attached with CRM would give the exact location of a
patient hence it would be easier for the company employees to
reach to the patients.
5. Sarvoday Visiting Nurse Services can save all the data related to
a particular patient like when the patient called for the first time,
patient is suffering from which disease, patient is taking which
drug and for how much time etc
6. Grievance handling would be very easy now compared to the
manual process.
7. Sarvoday Visiting Nurse Services will save lot of operation time.
Q.2 "Knowledge increases exponentially," is a phrase with which we are all
familiar. How does this concept apply to electronic business and the
emergence of the digital firm? Support your contentions.
Q.3 Write a note on Linux Vs Windows.
Ans.
1: Full access vs. no access
Having access to the source code is probably the single most significant
difference between Linux and Windows. You can look at this from both sides
of the fence. Some say giving the public access to the code opens the operating
system (and the software that runs on top of it) to malicious developers who
will take advantage of any weakness they find. Others say that having full
access to the code helps bring about faster improvements and bug fixes to
keep those malicious developers from being able to bring the system down.
2: Licensing freedom vs. licensing restrictions
With a Linux licensed operating system, you are free to modify that software
and use and even republish or sell it (so long as you make the code available).
Also, with the linux, you can download a single copy of a Linux distribution (or
application) and install it on as many machines as you like. With the Microsoft
license, you can do none of the above. You are bound to the number of licenses
you purchase, so if you purchase 10 licenses, you can legally install that
operating system (or application) on only 10 machines.
3: Online peer support vs. paid help-desk support
This is one issue where most companies turn their backs on Linux. But its
really not necessary. With Linux, you have the support of a huge community
via forums, online search, and plenty of dedicated Web sites. And of course, if
you feel the need, you can purchase support contracts from some of the bigger
Linux companies (Red Hat and Novell for instance).
However, when you use the peer support inherent in Linux, you do fall prey to
time. You could have an issue with something, send out e-mail to a mailing list
or post on a forum, and within 10 minutes be flooded with suggestions. Or
these suggestions could take hours of days to come in. It seems all up to
chance sometimes. Still, generally speaking, most problems with Linux have
been encountered and documented. So chances are good youll find your
solution fairly quickly.
On the other side of the coin is support for Windows. Yes, you can go the same
route with Microsoft and depend upon your peers for solutions. There are just
as many help sites/lists/forums for Windows as there are for Linux. And you
can purchase support from Microsoft itself. Most corporate higher-ups easily
fall victim to the safety net that having a support contract brings.
4: Full vs. partial hardware support
One issue that is slowly becoming nonexistent is hardware support. Years ago,
if you wanted to install Linux on a machine you had to make sure you handpicked each piece of hardware or your installation would not work 100
percent.
With Windows, you know that most every piece of hardware will work with
the operating system. Of course, there are times when you will wind up
spending much of the day searching for the correct drivers for that piece of
hardware you no longer have the install disk for.
5: Centralized vs. noncentralized application installation
With Linux you have a centralized location where you can search for, add, or
remove software.
Windows has nothing like this. With Windows, you must know where to find
the software you want to install, download the software (or put the CD into
your machine), and run setup.exe or install.exe with a simple double-click.
6: Flexibility vs. rigidity
Linux system is more flexible compare to windows system.
Q.4 What are the different activities of Supply Chain Management (SCM)? How
do information systems facilitate SCM?
Ans. (The answer here is given in much more detail than it is asked. Students
are advised to write only selective part from the given answer.)
Definition of Supply Chain.
The interrelationships
With suppliers, customers, distributors, and
other businesses
Needed to design, build, and sell a product
Each supply chain process should add value to the products or services
a company produces
Frequently called a value chain
Supply Chain Life Cycle
Challenges of SCM
Key Challenges
Lack
of
demand
planning
knowledge,
tools,
and guidelines
Inaccurate data provided by other information systems
Lack of collaboration among marketing, production, and
inventory management
SCM
tools
are
hard to implement
immature,
incomplete,
and
Trends in SCM
Q.5 How does the use of electronic voting machines act as a "double-edged
sword?"
Ans. Usage of electronic machines are done because to achieve some
objectives which are mentioned below
- The vote counting process becomes very fast and easy.
- Amount the government has to spent on the counting vote would be reduced.
- The election would be safer.
- It would help improve countrys image if we use electronic voting machines
for the election.
- The conventional methods of spoiling election results with unethical
practices would be stopped at a larger extent if we use electronic voting
machine.
There is an another side of a coin to this. Let us look this scenario from a
different context.
- If the electronic voting machine is hacked than the problem would
be more severe compared to the manual election method.
- The cost to overcome the problem would be quite high and which
can surpass the amount within which the manual counting of
votes can be done.
- Electronic voting machine does not make any difference when it
comes to security of the votes as it can be hacked like in the
earlier scenario the boxes were used to stolen.
Q.6 You are working as a project manager for a small IT consulting firm and
have been asked to create a plan for reviewing and auditing completed
projects in order to gauge their success. What factors will you use to measure
the success of a project? What questions would you ask in order to
understand why a project succeeded or failed?
Ans.
- Is the project going on time?
- What were the issues faced during the project?
- What are the standard operating procedures?
- Disaster management system is there or not in the firm?
- What has been done in terms of the security management?
- What if the system would fail? Is there a fault tolerant system in
the organization?
- What is a time given for the reporting of the project activities to
the senior management?
- How much is the involvement of the senior management in the
project?
- What are the outcomes of the project?
- Up to which extent the anticipated results have been achieved.
- What do you think are the reasons of the success/failure of the
project?
-