computers in management

19

Upload: mohed-a-khalaf

Post on 07-Nov-2015

6 views

Category:

Documents


2 download

DESCRIPTION

Assignments

TRANSCRIPT

  • - 2 -

    F-2, Block, Amity Campus

    Sec-125, Nodia (UP)

    India 201303

    ASSIGNMENTS

    PROGRAM:

    SEMESTER-I

    Subject Name & Code : Computers In Management (ABF105 (T)) Study COUNTRY : Somalia Permanent Enrollment Number (PEN) : BFIA01512010-2013019 Student Name : Mohamed Abdullahi Khalaf

    INSTRUCTIONS

    a) Students are required to submit all three assignment sets.

    ASSIGNMENT DETAILS MARKS Assignment A Five Subjective Questions 10 Assignment B Three Subjective Questions + Case Study 10 Assignment C 45 Objective Questions 10

    b) Total weightage given to these assignments is 30%. OR 30 Marks c) All assignments are to be completed as typed in word/pdf. d) All questions are required to be attempted. e) All the three assignments are to be completed by due dates (specified from

    time to time) and need to be submitted for evaluation by Amity University. f) The evaluated assignment marks will be made available within six weeks.

    Thereafter, these will be destroyed at the end of each semester. g) The students have to attach a scanned signature in the form.

    Date: 15.12.2010 Signature:

    ( ) Tick mark in front of the assignments submitted

    Assignment A Assignment B Assignment C Computers in Management

  • - 3 -

    Assignment 'A'

    1. What do you understand by an Information System? Explain various categories of information system.

    Answer:

    Information system (IS): Is combination of hardware, software, infrastructure and trained personnel organized to facilitate planning, control, coordination, and decision making.

    It is any written, electronic, or graphical method of communicating information. The basis of an information system is the sharing and processing of informations and ideas. Computers and telecommunication technologies have become essential information system components. Therefore, any combination of information technology and people's activities using that technology to support operations, management, and decision-making becomes an information system.

    Beynon-Davies defines an information system as an example of a system concerned with the manipulation of signs. An information system is a type of socio-technical system. An information system is a mediating construct between actions and technology.

    In a very broad sense, the term information system is frequently used to refer not only to the information and communication technology (ICT) an organization uses, but also to the way in which people interact with this technology in support of business processes.

    The information systems support different types of decisions at different levels of the organizational hierarchy.

    For most businesses, there are a variety of requirements for information. Senior managers need information to help with their business planning. Middle management needs more detailed information to help them monitor and control business activities. Employees with operational roles need information to help them carry out their duties.

    As a result, businesses tend to have several information systems operating at the same time. These are the main categories of information systems:

    a) Executive Support Systems (MIS): are designed to help senior management make strategic decisions. It gathers, analyses, and summarizes the key internal and external information used in the business.

    b) Management Information Systems (MIS): Are mainly concerned with internal sources of information. It usually takes data from the transaction processing systems and summarizes it into a series of management reports. It is used by middle management and operational supervisors.

    c) Decision-Support Systems (DSS): are specifically designed to help management make decisions in situations where there is uncertainty about the

  • - 4 -

    possible outcomes of those decisions. DSS comprise tools and techniques to help gather relevant information and analyses the options and alternatives. It often involves use of complex spreadsheet and databases to create "what-if" models.

    d) Knowledge Management Systems (KMS): are designed to help businesses create and share information. These are used in a business where employees create new knowledge and expertise which can be shared by others in the organization to create commercial opportunities.

    e) Transaction Processing Systems (TPS): are designed to process routine transactions efficiently and accurately. A business will have several TPS; for example:

    Billing systems to send invoices to customers.

    Systems to calculate the weekly and monthly payroll and tax payments. Production and purchasing systems to calculate raw material requirements.

    Stock control systems to process all movements into, within and out of the business.

    f) Office Automation Systems (OAS): are systems that try to improve the productivity of employees who need to process data and information. The best example is the software systems used to improve the productivity of employees working in an office (Microsoft Office) or systems that allow employees to work from home or whilst on the move.

    2. Show with reference to a block diagram, the structure of a digital computer and the interconnection of various units. Explain the functions of various units briefly.

    Answer:

    In order that a digital computer can solve problems, it should be equipped with the following components:

    Input devices: These are devices that enable you to enter data or give instructions to your computer. The most commonly used input devices are keyboard, mouse, others include scanner, digital cameras, joystick, trackball, and touchpad.

    Output devices: These are devices that allow what is on the computer to bee seen or heard. Output devices include Monitors and printer.

    Processing unit: The processing unit contains these elements:

    - Central processing unit (CPU): this is often referred to as the brain of the computer. It performs the core processing, logic control, and calculation work on the information. A CPU typically consists of:

  • - 5 -

    a- Arithmetic and logical unit (ALU): This is the basic operational units of the CPU that perform arithmetic operations on integers and real numbers, and of units that perform logical operations.

    b- A control unit: This unit is responsible for controlling flow of data and instructions.

    External memory: The amount of memory resident in the CPU is very small and is inadequate to accommodate all programs and data. Out-of-the-processor memory provides the desired storage space. External memory is classified into two categories:

    - Main (or primary) memory: This is a high-speed memory that stays close to the CPU. Programs are first loaded in the main memory and then executed. Usually main memory is volatile, i.e., its contents are lost after power-down.

    - Secondary memory: This is inexpensive, bigger and low-speed memory. It is off-line storage. To store programs and data for future processing, one requires secondary storage to be permanent. Examples are floppy disks, hard disks, and CDROM disks.

    The interconnection diagram for a simple computer is shown below.

    3. What do you understand by a database management system? Explain

    the advantages of database management system over conventional file oriented data processing system.

    Answer:

    Database management system (DBMS) is a collection of programs (software) that allows a computer to perform database functions of storing, retrieving, adding, deleting and modifying data. Relational database management systems (RDBMS)

    Secondary Storage

    Primary Storage

    Output Devices Input Devices

    Control Unit

    A. L. U

  • - 6 -

    implement the relational model of tables and relationships. Examples of DBMS include Microsoft Access, MySQL, Microsoft SQL Server, Oracle and FileMaker Pro.

    The advantages of the database management systems over conventional file-oriented data processing systems are:

    a) Warehouse of Information: The database management systems are warehouses of information, where large amount of data can be stored.

    b) Defining Attributes: The unique data field in a table is assigned a primary key. This helps in identification of data, checks for duplicates, thereby reducing data redundancy.

    c) Systematic Storage: The data is stored in form of tables, in which the primary key helps to eliminate data redundancy, enabling systematic storage of data.

    d) No Language Dependence: The database management systems are not language dependent. Therefore, they can be used with various languages.

    e) Table Joins: The data in two or more tables can be integrated into a single table. This enables to reduce the size of the database and helps in easy retrieval of data.

    f) Multiple Usages: The database can be used simultaneously by a number of users. Various users can retrieve the same data simultaneously. The data in the database can also be modified, based on the privileges assigned to users.

    g) Data Security: Data is the most important asset. Therefore, there is a need for data security. Database management systems help to keep the data secured.

    h) Privileges: Different privileges can be given to different users, for example, some users are allowed edit the database, but not to delete.

    4. Explain the various file-accessing techniques in data management system. Also state the advantages and limitations of each technique.

    Answer:

    There are many ways in which files in data management system can be accessed, these include; accessing it in a form view, table view, query, report, page, or macros.

    5. What is meant by Local Area Network and Wide Area Network? Differentiate between them and give one example of each.

    Answer:

    Local Area Network (LAN) is a group of computers connected together so that they can share files, folders, printers, and peripherals. It is made up of computers connected by cables in the same building or campus. Computers can be networked in several ways, the simplest is peer-to-peer setup that allows peripherals and files to be shared. Another way is to connect PCs through a central computer called server, where other computers drives and folders are shared as well as peripherals.

  • - 7 -

    Wide Area Network (WAN) is a computer networks that covers a large geographical area. Typically a WAN consists of two or more local area networks (LAN).

    Computers connected to a wide-area network are often connected through public networks, such as the telephone system. They can also be connected through leased lines or satellites. The largest WAN in existence is the Internet.

    The main differences between local area networks (LAN) and wide area networks (WAN) are:

    a) A local area network (LAN) exists in a house, university or campus, while a wide area network (WAN) exists over many buildings separated by a vast distance, may be in different countries or continents.

    b) The maximum speed of a LAN can be 1000 megabits per second, while the speed of a WAN can go up to 150 megabits per second.

    c) Computers in a LAN can share a printers and peripherals if they are in the same LAN. On the other hand, a WAN cannot share a printer.

    d) A LAN doesnt need a dedicated computer to direct traffic to and from the Internet, unlike a WAN that needs a special-purpose computer, whose only purpose is to send and receive data from the Internet.

    e) A WAN is more expensive than a LAN.

    f) It is easy to set up and expand a LAN. The equipments needed for a LAN is a network interface card (NIC), cable, switch, and hub. But it is difficult to set up or expand a WAN. The equipment needed include modems, and routers.

    g) Another difference is the networking standard used. A LAN uses the Ethernet standard, while a WAN uses the T1 standard.

  • - 8 -

    Assignment 'B'

    1. What is an Internet? How it differs from Intranet? Explain the various Internet Tools.

    Answer:

    Internet, sometimes called (the Net), is a worldwide system of computer networks in which users at any one computer can, if they have permission, get information from any other computer and sometimes talk directly to users at other computers.

    An Intranet is a computer network that is designed to work like the internet but in a much smaller scale and is restricted only to the employees of the company.

    An intranet often gets confused with the Internet. While there are a lot of similarities between them, they really are two different things. Simply put, the Internet is the global World Wide Web, while an intranet is a private Internet operating within a company. Both the Internet and an intranet use TCP/IP protocol as well as features like e-mail and typical World Wide Web standards. One main difference is that users of an intranet can get on the Internet, but thanks to protection measures like computer firewalls, global Internet users cannot get onto an intranet unless they have access to it. In fact, an intranet can be ran without an Internet connection. While Internet technologies like browsers, servers, and chat scripts are still used, an intranet can be a separate entity as long as its owners do not require that users have access to information found on the Internet.

    There are handful of Internet Tools used to get access to it, these are Applications, clients and servers; enable storage of information on servers for access by users who have client software for a range of purposes more complex than just utility tasks Serverwatch: Information about Internet servers; includes news, downloads,

    and reviews of Web, mail, news, ftp, and other servers; part of internet.com

    FTP RFC: File Transfer Protocol (FTP); describes FTP terms and operation; Request for Comments 959, J. Reynolds, J. Reynolds, October 1985

    FTPplanet: Directory of File Transfer Protocol information and software; includes instruction guides, help, and technical information about using FTP

    FTP Clients: File Transfer Protocol software; description and reviews of downloadable software for transferring files over the Internet; from internet.com portal

    Telnet RFC: The Remote User Telnet Service; describes the telnet protocol and its operation; Request for Comments 818, J. Postel, November 1982

    Telnet Clients: Telnet software; description and reviews of downloadable software for allowing you to login to a remote computer host and use it as if on a terminal; from internet.com portal

    WWW: World Wide Web Consortium; develops interoperable technologies (specifications, guidelines, software, and tools) for the World Wide Web

  • - 9 -

    WWW Browsers: Web Browsers; a list of downloads for Web browser software with reviews; from internet.com portal

    Webreference: Web technician's reference; includes discussion of technical issues involved in Web implementation

    Web Development: Web content development; discussion of a methodology for Web content development involving issues of audience and purpose

    HTML Station: HTML reference; includes demonstrations, tutorials, codes, specification summaries, techniques/technologies descriptions, and supporting information about hypertext markup language (HTML) and related technologies

    2. What is multimedia? List the common multimedia devices. Explain the Application areas of multimedia system.

    Answer:

    Multimedia is used to refer to computer-based interactive communication processes that incorporate text, graphics, sound, animation, and video. The word interactive is a key feature in multimedia, especially in the nonlinear multimedia, in the sense that the user determines what content is delivered, and how and when it is delivered. Information-processing devices, such as the computer and many electronic devices, are the ones mainly used to play, record, or generally access multimedia content, though multimedia can also be part of a live performance. When used as an adjective, multimedia can be descriptive of the electronic media devices used to store and experience multimedia content. Multimedia can be divided into linear and nonlinear categories. Linear content basically operates with minimal navigation control by the user, such as a cinema presentation. Nonlinear content offers the user more control over the application, such as seen in video games or self-paced computer-based training. Another name for nonlinear multimedia is hypermedia content. Hypermedia is based on cognitive theories of how knowledge is structured and learned by people. It progresses in a nonsequential fashion whereby it is the user who determines the next step.

    3. What do you understand by electronic data interchange? What is the purpose of EDI? State its advantages over traditional paper-based document transfer system.

    Answer:

    Electronic Data Interchange (EDI) refers to the structured transmission of data between organizations by electronic means. It is used to transfer electronic documents from one computer system to another, i.e. from one trading partner to another trading partner.

    The National Institute of Standards and Technology; defines Electronic Data Interchange as "the computer-to-computer interchange of strictly formatted messages that represent documents other than monetary instruments. EDI implies a sequence of messages between two parties, either of whom may serve as originator or recipient.

  • - 10 -

    In EDI, the usual processing of received messages is by computer only. Human intervention in the processing of a received message is typically intended only for error conditions, for quality review, and for special situations.

    EDI can be formally defined as 'The transfer of structured data, by agreed message standards, from one computer system to another without human intervention'.

    The purpose of EDI is not to eliminate paper, but rather to eliminate the time and the data entry associated with paper. It is generally accepted that 70 percent of one computer's business data output becomes a second computer's data input. In a paper environment without EDI this means that the same information is being entered, in different processes, into both computers which cost time and energy. With EDI, the computers are linked such that duplicate data entry does not take place.

    The purpose of EDI is also to improve the flow and management of business information. Any information that, today, is on a business form of any kind, is appropriate for EDI. EDI is currently being used for all of the most common business transactions such as purchase orders, invoices, quotes, bills of lading, status reports, receiving advices; and also for some very specific transactions such as residential mortgage insurance applications, healthcare claim payments, and material safety data sheets.

    Advantages of EDI over traditional paper-based document transfer system include:

    Lowering Operating Cost - EDI replaces paper transactions with electronic transmissions, saving time and reduced cost of business transaction and enabling the automatic processing of documents.

    Reduced Error and Increases Business Information Accuracy - With the implementation of EDI, there is no need for re-entering data, thus, reducing the risk for human error. Each re-entry of data is a potential source of error.

    Increase Productivity - Making personnel more efficient and it improves business capabilities by speeding up throughput.

    Increase Security - Data security and control are maintained through out the transmission process using passwords, user identification and encryption.

    Inventory Control - EDI can directly and indirectly help organizations improve their inventory control. Fact and accurate permits better managing on stock balance, stock in-and-out, stock handling.....etc.

    Distribution - Improving delivery of services and goods by reducing order and delivery time and increase the reliability of meeting targets.

  • - 11 -

    Accounting - EDI facilitated financial processes and potential in providing faster reconciliation or elimination of tasks, auditing, checking and improving cash flow.

    Faster Trading Cycle - EDI allows faster and streamlining trading cycle between organizations leading to improved relationships between trading partners.

    Marketing Competitiveness - With the use of EDI, buyer and customer can easily search for product description, specification, prices and availability. The use of computers to obtain information is replacing the use of telephone and catalogues. Companies with EDI will certainly have an edge.

    Better Quality Control - Quality control has becoming a key thrust for progressive organizations. Many large, corporate buyers are now insisting their suppliers to conform to company performance criteria. With EDI, customers have more accurate information on the progress of their orders. Suppliers are given more specification, inventories are better managed, wastage being minimized. Fast and accurate communications permits better management.

    Improve Corporate Trading Relationship - Business units, departments and regional offices are co-ordinate together. This strengthens inter-company relationship, making the entry of new competitors more difficult and gaining more new business opportunity.

  • - 12 -

    Case Study

    Compare the Conventional Banking System with Electronic Banking System covering all details on ATM, Telebanking, Payment systems (various cards like credit card, smart card etc) etc.

    Answer:

    A bank is a financial organization authorized by a government to accept deposits, pay interest, clear checks, make loans, act as an intermediary in financial transactions, and provide other financial services to its customers. Banks provide a number of services to consumers around the world, allowing them to access bank accounts, deposit and withdraw funds, pay bills and more.

    There are different kinds of bank systems, such as: Traditional bank system, and electronic bank system.

    Traditional Bank system: is system of banking used by thousands of banks, and it is the first banking system used by people. It is a system where bank locations and branch locations offer a full range of services to the customer. Physical bank locations are fully staffed with knowledgeable employees ranging from tellers to loan officers.

    At this banking system, a customer can conduct a number of banking transactions; including cashing a check, withdrawing funds, opening a new account and applying for a loan.

    Electronic Bank System: is a system of banking used by modern banks throughout the world. In this system customers are allowed to securely access funds, account information, conduct transactions without physically being in a bank branch, and other banking services through a personal computer over a wide area network or internet.

    This includes usage of Automated Teller Machines (ATM); it is a computerized machine that permits bank customers to gain access to their accounts with a magnetically encoded plastic card and a code number. It enables the customers to perform several banking operations without the help of a teller, such as to withdraw cash, make deposits, pay bills, obtain bank statements, effect cash transfers, etc. The first (ATM) were used in the 1960s in New York City. Since then, advancements in technology have created a complete electronic banking system available to consumers every time.

    An ATM card works two different ways; as credit or debit. When it is used as a credit card, many banks do not charge fees and the money does not come out of the account immediately. A debit card requires that a pin number be entered at the point of sale. The money automatically comes out of the account and many merchants, and some banks, apply fees to these transactions.

    ATM withdrawals may be conducted at any ATM machine that accepts your debit card. You can withdraw money from your checking or savings accounts. If it is not an

  • - 13 -

    ATM machine from your own bank, it may charge you a fee. You can also deposit money through an ATM machine with your debit card.

    Another feature of electronic banking system is Tele-banking, which is a service by which a bank customer can carry out transactions over the phone using a password. It may involve direct contact with a bank representative or may be automated using the phones keypad.

    Using mobile phones for banking services where you can; deposit, pay, withdrew, send and receive money; is becoming very popular in the world these days. Companies that provide mobile services are trying to attract more customers by offering these kinds of extra services, and giving guarantees.

    When a customer uses electronic banking he/she can sign up for electronic bill paying. Once different accounts are linked to the bank account, automatic payments can be set up to take out of the bank account immediately on the designated day.

    Many companies also allow payments over the phone with an electronic check. This means you give them the routing, checking account and check numbers on your check. The check goes through a process similar to a debit transaction.

    A credit card is a small plastic card issued to users as a system of payment. It allows its holder to buy goods and services based on the holder's promise to pay for these goods and services. The issuer of the card creates a revolving account and grants a line of credit to the consumer (or the user) from which the user can borrow money for payment to a merchant or as a cash advance to the user.

    Another issue related to electronic bank system is the use of Smart Cards. This is a device that includes an embedded integrated circuit chip (ICC) that can be either a secure microcontroller or equivalent intelligence with internal memory or a memory chip alone. The card connects to a reader with direct physical contact or with a remote contactless radio frequency interface. With an embedded microcontroller, smart cards have the unique ability to store large amounts of data, carry out their own on-card functions, and interact intelligently with a smart card reader.

  • - 14 -

    Assignment 'C'

    1. Computer can not do anything without a: a. Chip b. Memory c. Output device

    d. Software () e. None of these

    2. Primary storage is--------------as compared to secondary storage. a. Slow and inexpensive

    b. Fast and inexpensive () c. Fast and expensive d. Slow and expensive e. None of the above

    3. The memory which is programmed at the time it is manufactured:

    a. ROM () b. RAM c. PROM d. EPROM e. None of the above

    4. Which of the following isnt used in the storage phase of a computer-based information system?

    a. Magnetic disk

    b. Keyboard () c. Diskette d. Hard disk e. None of the above

    5. A kind of serial dot matrix printer that forms characters with magnetically charged ink-sprayed dots is called:

    a. Laser Printer () b. Ink-Jet printer c. Both of the above d. None of the above

    6. Which of the following is not applications software? a. Word processing b. Spreadsheet

    c. UNIX () d. Desktop publishing e. None of the above

  • - 15 -

    7. A translator which reads an entire program written in a high-level language and converts it into machine language code is called:

    a. Assembler b. Translator

    c. Compiler () d. System Software

    8. The database structure that treats files as tables is:

    a. Relational database () b. Hierarchical database c. Network database d. All of the above e. None of the above

    9. Combining of records from two or more files into a single ordered file is called:

    a. Sorting b. Searching c. Merging

    d. None of the above () 10. Which of the following is a query language?

    a. Dbase b. Access c. Fox Pro

    d. All of the above () e. None of the above

    11. Which of the following are popular DBMS packages? a. Dbase

    b. Access () c. FoxPro d. All of the above e. None of the above

    12. Web browser is a: a. Hardware

    b. Software () c. Hyperlink d. All of the above e. None of the above

    13. Which of the following communication system uses simplex transmission mode?

    a. Radio b. Television c. Cable

  • - 16 -

    d. All of the above () e. None of the above

    14. Searching on a net can be done through:

    a. Search Engines () b. Indexes c. Both of these d. None of these

    15. Private networks set up by companies for their employees for purposes such as e-mail, group, brainstorming, access to corporate database etc is called:

    a. Internet

    b. Intranet () c. Pop-up-windows d. All of these above e. None of the above

    16. Which of the following functions is supported by e-mail systems?

    a. Composition () b. Reporting c. Transfer d. Disposition e. All of the above

    17. The internal structure of the World Wide Web is built on a set of rules called:

    a. Hyper Text Transfer Protocol () b. TCP/IP c. All of the above d. None of the above

    18. Which of the following is not a wide area network? a. ARPANET b. INDONET c. OMNINET

    d. None of the above () 19. ___________ is used to connect a terminal to a computer through public

    telephone lines.

    a. Modem () b. Internet c. Network d. None of these

    20. Following is the disadvantage of using interpreters. a. Fast response b. easy to write c. Less memory requirements

    d. Time consuming ()

  • - 17 -

    21. To install multimedia facility into a computer one needs: a. Sound card b. Speakers c. CD-ROM

    d. All of the above () e. None of the above

    22. The links that take the user to new page is: a. Hypertext

    b. Hyperlink () c. Hyper Text Transfer Protocol d. All of the above

    23. Application software can be acquired through: a. Customs programming b. Pre-written packages

    c. Both of the above () d. None of the above

    24. Which of the following is not a utility program? a. Editing b. Sorting c. Merging

    d. None of the above () 25. The malicious program that damages your computer is called:

    a. Worm

    b. Viruses () c. Bugs d. None of the above

    26. Data entry can be performed with all of the following except? a. OCR

    b. COM () c. Voice recognition systems d. None of the above

    27. The two kinds of main memory are:

    a. Primary and Secondary () b. Random and sequential c. RAM and ROM d. All of the above

    28. What is the name of the screen symbol that shows the placement of the next character?

    a. Mouse

    b. Cursor () c. Track Ball

  • - 18 -

    d. All of the above

    29. A command that lets you change one or more fields in a record is: a. Insert b. Delete

    c. Modify () d. None of the above

    30. Data elements of related type are grouped into?

    a. Record () b. Title c. String d. All of the above

    31. A Hacker is: a. A software program

    b. An unauthorized person () c. A virus d. All of the above

    32. The interface between user and computer system is provided by: a. Compiler b. Utility programs

    c. Operating systems () d. All of the above

    33. The process of navigating and exploring the World Wide Web is called: a. Browsing b. Surfing

    c. Both of the above () d. None of the above

    34. An unauthorized access to network can be prevented through: a. Passwords

    b. Digital signatures () c. Encryption d. All of the above

    35. Which of the following is not a search engine? a. Altavista b. Lycos

    c. Infoseek () d. Gopher

    36. Computer Network spanning a global area is: a. LAN b. MAN

    c. WAN () d. All the above

  • - 19 -

    37. Transmission Channels used in LAN are: a. Coaxial cable b. Fiber-optics cable c. Twisted wire d. Both (a) and (b)

    e. All of the above () 38. Remote access to distant computers is called:

    a. Telnet b. FTP c. Both of the above

    d. None of the above () 39. The floppy disks come in two sizes. They are:

    a. 3.5 inch & 5.25 inch () b. 2 inch and 3.5 inch c. 2 inch and 4.25 inch d. None of the above

    40. 1 Byte is equal to combination of: a. 16 bits b. 8 bits c. 2 bits

    d. None of the above ()