e.g.s. pillay engineering college rev.0 …coe.egspec.org/ct12017/pdf/1702ba205.pdf · question...
TRANSCRIPT
E.G.S. PILLAY ENGINEERING COLLEGE (An Autonomous Institution, Affiliated to Anna University, Chennai)
Nagore Post, Nagapattinam – 611 002, Tamilnadu.
Rev.0 COE/2017/QB
1702BA205 INFORMATION MANAGEMENT
Academic Year
:
2017-2018
Question Bank
Programme : MBA
Year / Semester : I / II Course Coordinator: Ms L.Aarthi
Ms.R.Nivethitha
Course Objectives
Course Outcomes:
1. Provide students with an understanding
and utility of various Management
Information Systems in the functional
areas of management.
2. Familiarize the students with intricacies
of Enterprise Resource Planning and
dimensions of e- commerce.
3. Enable the students to gain an
understanding about how Information
Systems are developed and
implemented
On completion of the course, students will be able to
CO1: Construct data from various sources
CO2: Understand the system design
CO3: Understand database management system
CO4: Identify the vulnerability and threats
CO5:.Apply the E-Commerce and cloud computing
PART – A ( 2 Mark Questions With Key)
S.No Questions Mark COs BTL
UNIT I INTRODUCTION
1 What is meant by an Information Management? 2 1 K1
Information management (IM) is the collection and management of information from one or
more sources and the distribution of that information to one or more audiences. This
sometimes involves those who have a stake in, or a right to that information.
2
2 List down the characteristics of Information management. 2 1 K1
Operations support system.
Transaction Processing System (TPS)
Process Control System
Enterprise Collaboration System
2
3 How do you differentiate information and data? 2 1 K1
Information Data. 2
It is just text and number It is refined data
Records and Observations Analysis
Unorganized organized
4 Write needs of information technology. 2 1 K1
Education is a lifelong process therefore anytime anywhere access to it is the need
Information explosion is an ever increasing phenomena therefore there is need to get
access to this information
It is a requirement of the society that the individuals should posses technological
literacy
2
5 What are the types of Information system? 2 1 K1
Transaction Processing Systems
Management Information Systems
Decision Support Systems
Executive Information Systems
2
6 What do you meant by OAS? 2 1 K1
E.G.S. PILLAY ENGINEERING COLLEGE (An Autonomous Institution, Affiliated to Anna University, Chennai)
Nagore Post, Nagapattinam – 611 002, Tamilnadu.
Rev.0 COE/2017/QB
Office Automation Systems (OAS) is a Computer system, such as word processing, electronic
mail system, and scheduling system, that is designed to increase the productivity of data
workers in the office.
2
7 What do you understand about intelligence ? 2 1 K1
Intelligence has been defined in many different ways such as in terms of one's capacity for
logic, abstract thought, understanding, self-awareness, communication, learning, emotional
knowledge,
memory, planning, creativity and problem solving
2
8 What is meant by Transaction Process system and give suitable example 2 1 K1
Transaction Processing Systems (TPS)is Computerized system that performs and records the
daily routine transactions necessary to conduct the business. these systems serve the
operational level of the organization
Example; payroll, accounts payable
2
9 Write about Decision Support System. 2 1 K1
A properly designed Decision Support System is an interactive software-based system
intended to help decision makers compile useful information from raw data, documents,
personal knowledge, and/or business models to identify and solve problems and make
decisions.
2
10 What is Management Information Systems? 2 1 K1
A management information system (MIS) is a computerized database of financial information
organized and programmed in such a way that it produces regular reports on operations for
every level of management in a company.
2
11 What is an EIS? 2 1 K1
An executive information system (EIS) is a decision support system (DSS) used to assist
senior executives in the decision-making process. It does this by providing easy access to
important data needed to achieve strategic goals in an organization. An EIS normally features
graphical displays on an easy-to-use interface.
2
12 What is software prototyping? 2 1 K1
Software prototyping is the activity of creating prototypes of software applications, i.e.,
incomplete versions of the software program being developed.
2
13 What is meant by executive information System? 2 1 K1
An executive information system (EIS), also known as an executive support system (ESS), is a
type of management information system that facilitates and supports senior executive
information and decision-making needs. It provides easy access to internal and
external information relevant to organizational goals.
2
14 What is Geographic information system? 2 1 K1
A geographic information system (GIS) lets us visualize, question, analyze, and interpret data
to understand relationships, patterns, and trends.
2
15 List down the components of DSS 2 1 K1
Data Management Component
User Interface Management Component
Knowledge Management Component
2
UNIT II - SYSTEM ANALYSIS AND DESIGN
1 What is system analysis and design? 2 2 K1
A system is an orderly grouping of interdependent components linked together according to a
plan to achieve a specific objective.
2
2 What is system flow chart? 2 2 K1
System flowcharts are a way of displaying how data flows in a system and how decisions are
made to control events. To illustrate this, symbols are used. They are connected together to
show what happens to data and where it goes. The basic ones include: Symbols used in flow
2
E.G.S. PILLAY ENGINEERING COLLEGE (An Autonomous Institution, Affiliated to Anna University, Chennai)
Nagore Post, Nagapattinam – 611 002, Tamilnadu.
Rev.0 COE/2017/QB
charts.
3 What are the Characteristics of a System? 2 2 K1
Organization
Interaction
Interdependence
Integration
Central Objective
2
4 What is structured analysis? 2 2 K1
Structured analysis is a software engineering technique that uses graphical diagrams to
develop and portray system specifications that are easily understood by users.
2
5 What is end user computing? 2 2 K1
End-user computing (EUC) is a term that refers to the technologies that IT professionals use to
deploy, manage and secure the devices, applications and data that workers require to perform
their jobs.
2
6 Define system design. 2 2 K1
Systems design is the process of defining the architecture, modules, interfaces, and data for a
system to satisfy specified requirements. Systems design could be seen as the application of
systems theory to product development.
2
7 What do you meant by CASE tool? 2 2 K1
CASE tools stand for Computer Aided Software Engineering tools As the name implies they
are computer based programs to increase the productivity of analysts They permit effective
communication with users as well as other members of the development team.
2
8 What is a Decision table? 2 2 K1
A decision table is a good way to deal with combinations of things (e.g. inputs). This
technique is sometimes also referred to as a ‘cause-effect’ table.
2
9 What is Data Flow Diagram? 2 2 K1
A data flow diagram (DFD) maps out the flow of information for any process or system. It
uses defined symbols like rectangles, circles and arrows, plus short text labels, to show data
inputs, outputs, storage points and the routes between each destination.
2
10 What is an Entity relationship 2 2 K1
Entity-relationship (ER) diagram, is a graphical representation of entities and
their relationships to each other, typically used in computing in regard to the organization of
data within databases or information systems.
2
11 What are the uses of decision table? 2 2 K1
Compact and structured presentation
Preventing errors is easier
Avoid incompleteness and inconsistency
Modular knowledge organization
Powerful visualisation
2
12 What do you meant by (OOAD)
Object-oriented analysis and design (OOAD) is a popular technical approach to analyzing,
designing an application, system, or business by applying the object-oriented paradigm and
visual modeling throughout the development life cycles to foster better stakeholder
communication and product
quality.
2 2 K1
2
13 What is UML Diagrams 2 2 K1
E.G.S. PILLAY ENGINEERING COLLEGE (An Autonomous Institution, Affiliated to Anna University, Chennai)
Nagore Post, Nagapattinam – 611 002, Tamilnadu.
Rev.0 COE/2017/QB
.
UML (Unified Modeling Language) is a standard language for specifying, visualizing,
constructing, and documenting the artifacts of software systems
2
14 What do you meant by component diagram 2 2 K1
Component diagrams represent a set of components and their relationships. These components
consist of classes, interfaces or collaborations. So Component diagrams represent the
implementation view of a system.
2
15 Define system development life cycle 2 2 K1
The systems development life cycle (SDLC), also referred to as the application development
life-cycle, is a term used in systems engineering, information systems and software
engineering to describe a process for planning, creating, testing, and deploying an
information system.
2
UNIT III- DATABASE MANAGEMENT SYSTEMS
1 Define DBMS 2 3 K1
A database-management system (DBMS) is a computer-software application that interacts
with end-users, other applications, and the database itself to capture and analyze data. A
general-purpose DBMS allows the definition, creation, querying, update, and administration of
databases.
2
2 Define data . 2 3 K1
Data is information that has been translated into a form that is efficient for movement or
processing.
3 What are the four major components of a database system? 2 3 K1
Software
Hardware
Data
Procedures
Database Access Language
Query Processor
Run Time Database Manager
Data Manager
2
4 What is database? 2 3 K1
A database is a collection of information that is organized so that it can be easily accessed,
managed and updated.
5 What do you meant by query language ? 2 3 K1
Query language (QL) refers to any computer programming language that requests and
retrieves data from database and information systems by sending queries. It works on user
entered structured and formal programming command based queries to find and extract data
from host databases.
6 What do you meant by data mining ? 2 3 K1
Data mining is the process of sorting through large data sets to identify patterns and establish
relationships to solve problems through data analysis.
7 Define HDBMS 2 3 K1
A hierarchical database model is a data model in which the data is organized into a tree-like
structure. The data is stored as records which are connected to one another through links. A
record is a collection of fields, with each field containing only one value
8 Define RDBMS 2 3 K1
In relational databases, the relationship between data files is relational. Hierarchical and
network databases require the user to pass a hierarchy in order to access needed data. These
databases connect
to the data in different files by using common data numbers or a key field.
E.G.S. PILLAY ENGINEERING COLLEGE (An Autonomous Institution, Affiliated to Anna University, Chennai)
Nagore Post, Nagapattinam – 611 002, Tamilnadu.
Rev.0 COE/2017/QB
9 What are all the properties involved in RDBMS 2 3 K1
It's Values are Atomic
In Each Row is alone.
Column Values are of the same thing.
Columns are undistinguished.
Sequence of Rows is Insignificant.
Each Column has a common Name
10 Write down the steps involved in Query Processing?
Step 1 - Parsing and translation
Step 2 -Optimization
Step 3 -Evaluation
2 3 K1
11 Define SQL 2 3 K1
SQL is Structured Query Language, which is a computer language for storing, manipulating
and retrieving data stored in relational database.
12 What is Data mart? 2 3 K1
A data mart is a repository of data that is designed to serve a particular community of
knowledge workers.
13 What do you mean Concurrency control ? 2 3 K1
Concurrency control is a database management systems (DBMS) concept that is used to
address conflicts with the simultaneous accessing or altering of data that can occur with a
multi-user system.
14 What is meant by Data Warehousing? 2 3 K1
A data warehouse is a federated repository for all the data that an enterprise's various business
systems collect. The repository may be physical or logical.
15 What are the steps involved in data mart ? 2 3 K1
Designing
Constructing
Populating
Accessing
Managing
UNIT-IV SECURITY, CONTROL AND REPORTING
1 Define information security. 2 4 K1
Information security (infosec) is a set of strategies for managing the processes, tools and
policies necessary to prevent, detect, document and counter threats to digital and non-digital
information
2 What do you meant by System testing? 2 4 K1
System Testing is a level of the software testing where a complete and integrated software is
tested. The purpose of this test is to evaluate the system's compliance with the specified
requirements.
3 Define Cryptographic. 2 4 K1
Cryptography involves creating written or generated codes that allows information to be kept
secret. Cryptography converts data into a format that is unreadable for an unauthorized user,
allowing it to be transmitted without anyone decoding it back into a readable format, thus
compromising the data.
4 What do you meant by ARQ? 2 4 K1
Automatic repeat request (ARQ) is a protocol for error control in data transmission. When the
receiver detects an error in a packet, it automatically requests the transmitter to resend the
packet. This process is repeated until the packet is error free or the error continues beyond a
predetermined number of transmissions
5 List out the Types of general controls 2 4 K1
Software controls
E.G.S. PILLAY ENGINEERING COLLEGE (An Autonomous Institution, Affiliated to Anna University, Chennai)
Nagore Post, Nagapattinam – 611 002, Tamilnadu.
Rev.0 COE/2017/QB
Hardware controls
Computer operations controls
Data security controls
Implementation controls
Administrative controls
6 What do you meant by Vulnerability? 2 4 K1
Vulnerability is a cyber-security term that refers to a flaw in a system that can leave it open to
attack. It may also refer to any type of weakness in a computer system itself, in a set of
procedures, or in anything that leaves information security exposed to a threat.
7 Define Disaster Management 2 4 K1
Disaster management as the organization and management of resources and responsibilities
for dealing with all humanitarian aspects of emergencies, in particular preparedness, response
and recovery in order to lessen the impact of disasters..
8 What is data validation? 2 4 K1
Data validation is the process of ensuring that data have undergone data cleansing to ensure
they have data quality, that is, that they are both correct and useful.
9 Define computer crime. 2 4 K1
Computer crime is an act performed by a knowledgeable computer user, sometimes referred to
as a hacker that illegally browses or steals a company's or individual's private information. In
some cases, this person or group of individuals may be malicious and destroy or otherwise
corrupt the computer or data files.
10 What is system audit? 2 4 K1
An information technology audit, or information systems audit, is an examination of the
management controls within an Information technology (IT) infrastructure.
11 Write any five kinds of computer crime 2 4 K1
Data diddling:
• Salami slicing:
• Phreaking:
• Cloning:
• Carding
12 What do you meant by Intranet 2 4 K1
A local or restricted communications network, especially a private network created using
World Wide Web software.
13 What is Global area network? 2 4 K1
A global area network (GAN) is a network used for supporting mobile across an arbitrary
number of wireless LANs, satellite coverage areas.
14 How security of is IS tested? 2 4 K1
Security testing is a process intended to reveal flaws in the security mechanisms of
an information system that protect data and maintain functionality as intended. Due to the
logical limitations of security testing, passing security testing is not an indication that no
flaws exist or that the system adequately satisfies the security requirements.
15 What is validation of software? 2 4 K1
Validation is determining if the system complies with the requirements and performs functions
for which it is intended and meets the organization’s goals and user needs. Validation is done
at the end of the development process and takes place after verifications are completed.
UNIT-V- NEW IT INITIATIVES
1 Define E-commerce. 2 5 K1
Conducting business online. Selling goods, in the traditional sense, is possible to do
electronically because of certain software programs that run the main functions of an e-
commerce Web site, including product display, online ordering, and inventory management.
2 Define CGI. 2 5 K1
E.G.S. PILLAY ENGINEERING COLLEGE (An Autonomous Institution, Affiliated to Anna University, Chennai)
Nagore Post, Nagapattinam – 611 002, Tamilnadu.
Rev.0 COE/2017/QB
The common gateway interface (CGI) is a standard way for a Web server to pass a Web user's
request to an application program and to receive data back to forward to the user.
3 Define Data migration 2 5 K1
Data migration is the process of moving, copying, and restructuring data from an existing
system to the ERP system. Migration is critical to implementation success and requires
significant planning.
4 Write down the list of e-Business tools 2 5 K1
Personal digital assistants (pdas)
Electronic data interchange
File transfer
Facsimile
Video conferencing, Internet, intranets and extranets
5 What do you meant by e-governance? 2 5 K1
E-governance is the application of information and communication technology (ICT) for
delivering government services, exchange of information communication transactions,
integration of various stand-alone systems and services between government-to-customer
6 What is ERP? 2 5 K1
Enterprise resource planning (ERP) is a process by which a company manages and integrates
the important parts of its business. An ERP management information system integrates areas
such as planning, purchasing, inventory, sales, marketing, finance and human resources.
7 Write at least four advantage of ERP 2 5 K1
Complete visibility
Automatic and coherent workflow
A unified and single reporting system.
TO provide Business Intelligence
8 Define business intelligence. 2 5 K1
Business intelligence (BI) is the set of techniques and tools for the transformation of raw data
into meaningful and useful information for business analysis purposes. BI technologies are
capable of handling large amounts of unstructured data to help identify, develop and otherwise
create new strategic business opportunities.
9 Define Data mining. 2 5 K1
Data mining is the process of sorting through large data sets to identify patterns and establish
relationships to solve problems through data analysis. Data mining tools allow enterprises to
predict future trends.
10 Mention some of the data mining techniques. 2 5 K1
Prediction.
Decision trees.
Combinations.
Long-term (memory) processing.
11 List out six component of BI 2 5 K1
Multidimensional aggregation and allocation
De normalization, tagging and standardization
Real time reporting with analytical alert
A method of interfacing with unstructured data sources
Group consolidation, budgeting and rolling forecasts
Statistical inference and probabilistic simulation
12 Define cloud computing. 2 5 K1
Cloud computing is computing in which large groups of remote servers are networked to allow
the centralized data storage, and online access to computer services or resources
13 What is hybrid cloud? 2 5 K1
Hybrid cloud is a composition of two or more clouds (private, community or public) that
E.G.S. PILLAY ENGINEERING COLLEGE (An Autonomous Institution, Affiliated to Anna University, Chennai)
Nagore Post, Nagapattinam – 611 002, Tamilnadu.
Rev.0 COE/2017/QB
remain distinct entities but are bound together, offering the benefits of multiple deployment
models. Hybrid cloud can also mean the ability to connect collocation, managed and/or
dedicated services with cloud resources.
14 Define CMM. 2 5 K1
Capability Maturity Model is a bench-mark for measuring the maturity of an organization's
software process. It is a methodology used to develop and refine an organization's software
development process.
15 What do you meant by Inter cloud? 2 5 K1
The Inter cloud is an interconnected global "cloud of clouds" and an extension of the Internet
"network of networks" on which it is based. The focus is on direct interoperability between
public cloud service providers, more so than between providers and consumers.
PART – B (12 Mark Questions with Key)
S.No Questions Mark COs BTL
UNIT I- INTRODUCTION
1 Define information system and write importance of IS in briefly 12 1 K2
An information system (IS) is a system composed of people and computers that processes or
interprets information. The term is also sometimes used in more restricted senses to refer to
only the software used to run a computerized database or to refer to only a computer system.
Importance Of IS
To control the creation and growth of records
To reduce operating costs
To improve efficiency and productivity
To assimilate new records management technologies
To ensure regulatory compliance
To safeguard vital information
To support better management decision making
2 Write about the Evolution of Information System. 12 1 K2
The first business application of computers (in the mid- 1950s) performed repetitive, high-
volume,transaction-computing tasks.
Transaction processing systems
Management Information Systems (MISs
Decision Support Systems
Intelligent Support System
Data Warehousing:
3 Describe briefly about following with examples
i) Management Information Systems
ii) Decision Support Systems
12 1 K2
Management Information Systems
Information system at the management level of an organization that serves the functions of
planning, controlling, and decision making by providing routine summary and exception
reports.
• TYPE: Management-level
• INPUTS: high volume data
• PROCESSING: simple models
• OUTPUTS: summary reports
• USERS: middle managers
• DECISION-MAKING: structured to semi-structured.
EXAMPLE: annual budgeting
Decision Support Systems
E.G.S. PILLAY ENGINEERING COLLEGE (An Autonomous Institution, Affiliated to Anna University, Chennai)
Nagore Post, Nagapattinam – 611 002, Tamilnadu.
Rev.0 COE/2017/QB
Information system at the management level of an organization that combines data and
sophisticated analytical models or data analysis tools to support semi-structured and
unstructured decision making.
• TYPE: Management-level
• INPUTS: low volume data
• PROCESSING: simulations, analysis
• OUTPUTS: decision analysis
• USERS: professionals, staff managers
• DECISION-MAKING: semi-structured
EXAMPLE: sales region analysis
4 Elaborate the relationship between GIS , KMS,EIS 12 1 K2
Geographic information system (GIS) is a system designed to capture, store, manipulate,
analyze, manage, and present spatial or geographic data. The acronym GIS is sometimes used
for geographic information science (GIScience) to refer to the academic discipline that studies
geographic information systems[and is a large domain within the broader academic discipline
of geo informatics.
GIS can refer to a number of different technologies, processes, and methods. It is attached to
many operations and has many applications related to engineering, planning, management,
transport/logistics, insurance, telecommunications, and business. For that reason, GIS
and location intelligence applications can be the foundation for many location-enabled services
that rely on analysis and visualization
Knowledge management systems refer to any kind of IT system that stores and
retrieves knowledge, improves collaboration, locates knowledge sources, mines repositories
for hidden knowledge, captures and uses knowledge, or in some other way enhances the KM
process.
If my explanation above makes the definition of these systems seem vague, that is because
there is no consensus as to what constitutes a knowledge management system, much like there
is no consensus regarding KM. Furthermore, since KM is involved in all areas of the firm,
drawing a line is very difficult.
Executive information system (EIS), also known as an executive support system (ESS) is a
type of management information system that facilitates and supports senior executive
information and decision-making needs. It provides easy access to internal and external
information relevant to organizational goals. It is commonly considered a specialized form
of decision support system (DSS).
EIS emphasizes graphical displays and easy-to-use user interfaces. They offer strong reporting
and drill-down capabilities. In general, EIS are enterprise-wide DSS that help top-level
executives analyze, compare, and highlight trends in important variables so that they can
monitor performance and identify opportunities and problems. EIS and data
warehousing technologies are converging in the marketplace.
5 What is Prototyping? And discuss the strength and weakness of Prototyping. 12 1 K2
The Prototyping Model is a systems development method (SDM) in which aprototype (an
early approximation of a final system or product) is built, tested, and then reworked as
ecessary until an acceptable prototype is finally achieved from which the complete system or
product can now be developed.
E.G.S. PILLAY ENGINEERING COLLEGE (An Autonomous Institution, Affiliated to Anna University, Chennai)
Nagore Post, Nagapattinam – 611 002, Tamilnadu.
Rev.0 COE/2017/QB
Strength
Potential exists for exploiting knowledge gained in an early iteration as later iterations
are developed.
Helps to easily identify confusing or difficult functions and missing functionality.
May generate specifications for a production application.
Encourages innovation and flexible designs.
Provides quick implementation of an incomplete, but functional, application
Weakness
Approval process and control is not strict.
Incomplete or inadequate problem analysis may occur whereby only the most obvious
and superficial needs will be addressed, resulting in current inefficient practices being
easily built into the new system.
Requirements may frequently change significantly.
Identification of non-functional elements is difficult to document.
Designers may prototype too quickly, without sufficient up-front user needs analysis,
resulting in an inflexible design with narrow focus that limits future system potential.
6 Describe about Geographic information system. 12 1 K2
A geographic information system (GIS) is a computer system for capturing, storing, checking,
and displaying data related to positions on Earth’s surface. By relating seemingly unrelated
data, GIS can help individuals and organizations better understand spatial patterns and
relationships.
Data Capture
Cartographic data
Photographic interpretation
Digital data
Remote sensing
GIS Maps
GIS Jobs
UNIT II- SYSTEM ANALYSIS AND DESIGN
1 What is system and explain different kinds of systems with examples ? 12 1 K2
A system is an orderly grouping of interdependent components linked together according to a
plan to achieve a specific objective.
Different kinds of system
Physical system
Abstract System
Deterministic System
Probabilistic System
Social System
Adaptive System
Non Adaptive System
Open System
Closed System
2 Explain the system flow chart and what are the symbols are used in flow chart ? 12 1 K2
System flowcharts are a way of displaying how data flows in a system and how
decisions are made to control events.
Flowcharts use special shapes to represent different types of actions or steps in a
process. Lines and arrows show the sequence of the steps, and the relationships among
them. These are known as flowchart symbols.
E.G.S. PILLAY ENGINEERING COLLEGE (An Autonomous Institution, Affiliated to Anna University, Chennai)
Nagore Post, Nagapattinam – 611 002, Tamilnadu.
Rev.0 COE/2017/QB
3 Describe the entity relation and its model 12 1 K2
In software engineering, an entity–relationship model (ER model) is a data model for
describing the data or information aspects of a business domain or its process requirements, in
an abstract way that lends itself to ultimately being implemented in a database such as a
relational database.
Entity–Relationship modeling
One-to-One Entity
One-to-Many Entity
Many-to-Many Entity
4 Explain the advantage & disadvantage of CASE tool. 12 1 K2
CASE tools stand for Computer Aided Software Engineering tools As the name implies they
are computer based programs to increase the productivity of analysts They permit effective
communication with users as well as other members of the development team.
Advantage
Integrate the development done during each phase of system development
Permit effective communication with users
They are useful as communication aids with users of the system
Reduce time to develop applications
Improve documentation
Automate system analysis
Disadvantage
Some tools are expensive
All software engineers need to be trained to use these tools
A lot of time is wasted in using the tools
Software developed using CASE tools are of poor quality
E.G.S. PILLAY ENGINEERING COLLEGE (An Autonomous Institution, Affiliated to Anna University, Chennai)
Nagore Post, Nagapattinam – 611 002, Tamilnadu.
Rev.0 COE/2017/QB
5 Give the system concepts for object modeling –How will you perform object analysis in
the business model.
12 1 K2
Object-oriented analysis and design (OOAD) is a popular technical approach to analyzing,
designing an application, system, or business by applying the object-oriented paradigm and
visual modeling throughout the development life cycles to foster better stakeholder
communication and product quality.
Object-oriented modeling (OOM) is a common approach to modeling applications, systems,
and business domains by using the object-oriented paradigm throughout the entire
development life cycles. OOM is a main technique heavily used by both OOA and OOD
activities in modern software engineering. Efficient and effective communication Useful and
stable abstraction.
Object analysis :
The purpose of any analysis activity in the software life-cycle is to create a model of the
system's functional requirements that is independent of implementation constraints.
Find the objects
Organize the objects
Describe how the objects interact
Define the behavior of the objects 6 Describe about UML Diagrams? 12 1 K2
UML (Unified Modeling Language) is a standard language for specifying, visualizing,
constructing, and documenting the artifacts of software systems
Two broad categories of diagrams
Structural Diagrams
Class diagram
Object diagram
Component diagram
Deployment diagram
Behavioral Diagrams
Use case diagram
Sequence diagram
Collaboration diagram
State chart diagram
Activity diagram
UNIT-III Database Management Systems
1 Explain the characteristics and users of DBMS 12 1 K2
Characteristics
Real-world entity
Relation-based tables
Isolation of data and application
Less redundancy
Consistency
Query Language
Security
USER
Administrators
Designer
2 Define in your own words , a data base and data base management system .discuss the
objectives , advantage and disadvantage of database
12 1 K2
E.G.S. PILLAY ENGINEERING COLLEGE (An Autonomous Institution, Affiliated to Anna University, Chennai)
Nagore Post, Nagapattinam – 611 002, Tamilnadu.
Rev.0 COE/2017/QB
A database management system stores data, in such a way which is easier to retrieve,
manipulate and helps to produce information
Advantage
Improved data sharing
Improved data security
Better data integration
Minimized data inconsistency
Improved data access
Improved decision making
Disadvantage
Increased costs
Management complexity
Maintaining currency
Frequent upgrade/replacement cycles
3 Explain the various tier of architecture in DBMS
The design of a Database Management System highly depends on its architecture. It can be
centralized or decentralized or hierarchical. DBMS architecture can be seen as single tier or
multi tier. n-tier architecture divides the whole system into related but independent n modules,
which can be independently modified, altered, changed or replaced
First tier architecture
Second tier architecture
Third tier architecture
Database (Data) Tier
Application (Middle) Tier
User (Presentation) Tier
4 Describe about HDBMS with example. 12 1 K2
A hierarchical database model is a data model in which the data is organized into a tree-like
structure. The data is stored as records which are connected to one another through links. A
record is a collection of fields, with each field containing only one value. The entity type of a
record defines.
The hierarchical database model mandates that each child record has only one parent, whereas
each parent record can have one or more child records. In order to retrieve data from a
hierarchical database the whole tree needs to be traversed starting from the root node. This
model is recognized as the first database model created by IBM in the 1960s. Which fields the
record contains.
Example ; IBM
5 Explain the various steps of query processing and describe the SQL command 12 1 K2
steps of query processing
1. Parsing and translation
Translate the query into its internal form. This is then translated into relational
algebra. Parser checks syntax, verifies relations.
2. Optimization
Amongst all equivalent evaluation plans choose the one with lowest cost. Cost
is estimated using statistical information from the database catalog.
3.Evaluation
The query-execution engine takes a query-evaluation plan, executes that plan,
and returns the answers to the query. A relational algebra expression may have
E.G.S. PILLAY ENGINEERING COLLEGE (An Autonomous Institution, Affiliated to Anna University, Chennai)
Nagore Post, Nagapattinam – 611 002, Tamilnadu.
Rev.0 COE/2017/QB
many equivalent expressions. Each relational algebra operation can be
evaluated using one of several different algorithms.
SQL command
CREATE
SELECT
INSERT
UPDATE
DELETE and
DROP
6 Discuss the problem of data warehouse? 12 1 K2
Underestimation of resources for data loading
Hidden problems with source systems
Required data not captured
Increased end-user demands
Data homogenization
High demand for resources
Data ownership
High maintenance
Long-duration projects
Complexity of integration
UNIT IV - SECURITY, CONTROL AND REPORTING
1 Describe the Types of tests in system testing 12 1 K2
Graphical user interface testing
Usability testing
Software performance testing
Compatibility testing
Load testing
Volume testing
Security testing
2 Explain the information system control 12 1 K2
Controls
Administrative
Logical
Physical
-General controls
-Application controls 3. Explain the Vulnerability consequences? 12 1 K2
Familiarity
Connectivity
Password management flaws
Fundamental operating system design flaws
Internet Website Browsing
Software bugs
Unchecked user input
Not learning from past mistakes
4. Discuss the common threats to computerized information systems 12 1 K2
Trojan
E.G.S. PILLAY ENGINEERING COLLEGE (An Autonomous Institution, Affiliated to Anna University, Chennai)
Nagore Post, Nagapattinam – 611 002, Tamilnadu.
Rev.0 COE/2017/QB
Virus
Worm
Spyware
Scareware
Keylogger
Adware
Backdoor
Crimeware
SQL Injection
5 Explain the types of computer crime 12 1 K2
Data diddling: modifying data
• Salami slicing: skimming small amounts of money
• Phreaking: making free long distance calls
• Cloning: cellular phone fraud using scanners
• Carding: stealing credit card numbers online
• Piggybacking: stealing credit card numbers by spying
• Social engineering: tricking employees to gain access
• Dumpster diving: finding private info in garbage cans
• Spoofing: stealing passwords through a false login page
6 What is wireless network and its types –elaborate 12 1 K2
A wireless network is any type of computer network that uses wireless data connections for
connecting network nodes
-Communications satellites
-Cellular and PCS systems use several radio communications technologies
-Radio and spread spectrum technologies
Types of wireless networks
Wireless PAN
Wireless LAN
Wireless mesh network
Wireless MAN
UNIT-V New IT Initiatives
1
Explain the functional modules of ERP 12 1 K2
Human Resource.
Inventory.
Sales & Marketing.
Purchase.
Finance & Accounting.
Customer Relationship Management(CRM)
Engineering/ Production.
Supply Chain Management (SCM)
2 Describe the E-business tools and its advantage 12 1 K2
business to business (B2B)
business to consumer (B2C) (also known as e-Commerce)
government to consumer (G2C)
Government to business (G2B).
3 Elaborate the Architecture for Data Mining 12 1 K2
E.G.S. PILLAY ENGINEERING COLLEGE (An Autonomous Institution, Affiliated to Anna University, Chennai)
Nagore Post, Nagapattinam – 611 002, Tamilnadu.
Rev.0 COE/2017/QB
4 Explain the Characteristics Cloud computing 12 1 K2
Agility improves with users' ability to re-provision technological infrastructure resources.
Application programming interface (API)
Cost reductions claimed by cloud providers. A public-cloud delivery model converts capital
expenditure to operational expenditure. This purportedly lowers barriers to entry, as
infrastructure is typically provided by a third party and does not need to be purchased for
onetime or infrequent intensive computing tasks.
Device and location independence enable users to access systems using a web browser
regardless of their location or what device they use (e.g., PC, mobile phone). As
infrastructure is off-site (typically provided by a third-party) and accessed via the Internet,
users can connect from anywhere.
Maintenance of cloud computing applications is easier, because they do not need to be
installed on each user's computer and can be accessed from different places.
Multitenancy enables sharing of resources and costs across a large pool of users thus
allowing for:
Centralization of infrastructure in locations with lower costs (such as real estate,
electricity, etc.)
peak-load capacity increases (users need not engineer for highest possible load-levels)
5 Discuss the fundamental model of cloud computing 12 1 K2
6 What is software audit? Explain the principles of software audit? 12 1 K2
A software audit review, or software audit, is a type of software review in which one or more
auditors who are not members of the software development organization conduct "An
independent examination of a software product, software process, or set of software processes
to assess compliance with specifications, standards, contractual agreement
E.G.S. PILLAY ENGINEERING COLLEGE (An Autonomous Institution, Affiliated to Anna University, Chennai)
Nagore Post, Nagapattinam – 611 002, Tamilnadu.
Rev.0 COE/2017/QB
PART – C (20 Mark Questions with Key)
S.No Questions Mark COs BTL
UNIT I INTRODUCTION
1 Explain the evolution of information system as envisaged Nolan’s Six-stage Model. 20 1 K3
2 Explain the System development methodologies and its pros &cons. 20 1 K3
UNIT-II SYSTEM ANALYSIS AND DESIGN
1 Elaborate the decision table methodologies with suitable examples 20 1 K3
2 Describe the Object Oriented Analysis and Design (OOAD) and explain how it benefit to
the user.
20 1 K3
UNIT III- DATABASE MANAGEMENT SYSTEMS
1 Describe about data mart and elaborate what are the steps involved in data mart 20 1 K3
2
How do you differentiate hierarchy and network data model? Discuss the advantage and
limitation of a relational DBMS of business application in today business‘s environment.
20 1 K3
UNIT IV- SECURITY, CONTROL AND REPORTING
1
Increased dependence on computer has brought with it problem of vulnerability to
dishonest and unethical practice – elaborate the statement
20 1 K3
2 Assume that you have joined as a chief security officer for major IT service company.
Formulate a strategy for a company to ensure a good security culture is developed,
implemented and maintained.
20 1 K3
UNIT V - NEW IT INITIATIVES
1
What is ERP? Explain with suitable examples .Do you think ERP should be adopted by the
management of industries of all sizes? If so briefly explain the steps implementing ERP in
an organization.
20 1 K3
2 Elaborate how BI is applied to solve business problem -discuss. 20 1 K3