question bank

7
GLS Institute of Computer Technology Management Information System Question Bank (The following questions are for the preparation of your exam. No need to write them in assignment. Only the group no mentioned in the bracket will submit the answers in the softcopy of the assignment.) From the book : Analysis and Design of Information System. By V. Rajaraman Chap-1 (Group No A) 1) Differentiate between data and information with example. 2) Differentiate between strategic information, tactical information and operational information with examples. 3) What is statutory information? Give examples. 4) Justify the need for computer based information systems? 5) Match the levels of hierarchy and types of information used at each level. Justify your answer. 6) Discuss in brief the qualities of information system. How will u ensure that quality aspects of information are maintained? Chap- 2 (Group No A) 1) Differentiate between online transaction processing and batch processing. 2) Differentiate between MIS and DSS. 3) Explain how data will be processed in a bank when a cheque is presented by a customer and payment made to him. From the book : Management Information Systems, Text and Cases. By Waman Jawadekar Chap 5 (Group No B, (Que No 1-10), Group C, (Que No 11-18) 1) Compare and contrast the positive and negative impact of IT on society. 2) Define the term privacy. List down and explain the 5 scenario where individual’s personal information is exposed to the outside world. 3) By what actions individual and organization can ensure that breach of privacy doesn’t occur? 4) Define ethics. What do you mean by respecting ethical values. Explain in brief. 5) Differentiate between ethics and moral. 6) How internet and web technologies has exposed individual’s privacy? 7) Justify that how can technology provide solution to protect individual’s breach of privacy. 8) Define the following terms : Intellectual property, copyright and patents 9) Discuss the issues pertaining to computer software and copy right. 10) Elaborate the scenarios which present challenges to the IPR.

Upload: henil-shah

Post on 26-Nov-2014

124 views

Category:

Documents


6 download

TRANSCRIPT

Page 1: Question Bank

GLS Institute of Computer Technology

Management Information System

Question Bank (The following questions are for the preparation of your exam. No need to write them in assignment. Only the group no mentioned in the bracket will submit the answers in the softcopy

of the assignment.) From the book : Analysis and Design of Information System. By V. Rajaraman

Chap-1 (Group No A)

1) Differentiate between data and information with example.

2) Differentiate between strategic information, tactical information and operational information with examples.

3) What is statutory information? Give examples. 4) Justify the need for computer based information systems? 5) Match the levels of hierarchy and types of information used at each level. Justify your

answer. 6) Discuss in brief the qualities of information system. How will u ensure that quality

aspects of information are maintained? Chap- 2 (Group No A)

1) Differentiate between online transaction processing and batch processing. 2) Differentiate between MIS and DSS.

3) Explain how data will be processed in a bank when a cheque is presented by a customer and payment made to him.

From the book : Management Information Systems, Text and Cases. By Waman

Jawadekar

Chap – 5 (Group No B, (Que No 1-10), Group C, (Que No 11-18)

1) Compare and contrast the positive and negative impact of IT on society. 2) Define the term privacy. List down and explain the 5 scenario where individual’s

personal information is exposed to the outside world. 3) By what actions individual and organization can ensure that breach of privacy doesn’t

occur?

4) Define ethics. What do you mean by respecting ethical values. Explain in brief. 5) Differentiate between ethics and moral.

6) How internet and web technologies has exposed individual’s privacy? 7) Justify that how can technology provide solution to protect individual’s breach of

privacy.

8) Define the following terms : Intellectual property, copyright and patents 9) Discuss the issues pertaining to computer software and copy right.

10) Elaborate the scenarios which present challenges to the IPR.

Page 2: Question Bank

11) Compare the impact of IT on the workplace. Can you fix up the accountability and liability in case of negative impact? How? If not then provide solution for use of IT at

work place. 12) Which are the main sources of poor information quality and performance? Explain in

brief. 13) ‘Zero defect software is myth’ Agree/ Disagree. Justify your answer. 14) Information technology has an impact on the social life of an individual. Justify.

15) What is digital divide? How does it affect the society? 16) Define the following terms : Spamming, Hacking, Jamming, and Sniffing.

17) From the book, fill in the blanks, page no 134 18) Solution for the case study No 1,2,3 ( page no :– 135-139)

Chap -6 (Group No D, (Que No 1-10), Group E, (Que No 11-19)

1) Define the word decision making. Explain the characteristics of decision making. 2) Explain the process of decision making. How MIS helps in the decision making process. 3) Explain the concept of rational decision making. Does rationality change from person to

person and situation to situation? 4) Explain in brief the problems in making rational decision.

5) Why does decision maker resort to bounded rationality in a decision making situation? Can a decision be called right or wrong? Justify ur answer.

6) Compare and contrast between open decision making system and closed decision making

system. 7) Based on the degree of knowledge, describe the types of decisions. What will be role of

MIS in the above types of decision making. 8) Differentiate between programmed decision and non programmed decision. 9) Explain the law of requisite variety.

10) Explain the methods for selecting the best alternative in decision making. Justify the appropriateness of the methods.

11) Discuss the analytical modeling techniques for decision analysis. 12) Differentiate between what if analysis and sensitivity analysis. 13) Differentiate between what if analysis and goal seeking analysis.

14) Compare the behavior nature of human and risk taking ability in decision making.. 15) List down the reasons for conflict. Provide methods for conflict resolution.

16) Provide methods for dealing with uncertainty in decision making. 17) Decision making improves with organizational learning. Justify. 18) From the book, fill in the blanks. Page no 162,163

19) Solution of the case study No 1, 2 ( page no 164-167)

Chap -7 (Group No F(Que No 1-11), Group G (Que No 12-24), Group H (Que No 25-32)

1) List the characteristics of information and explain it with example. 2) Explain conceptual model of communication with diagram.

3) Explain the concept of information summarization. Justify the importance of it.

Page 3: Question Bank

4) Do you think that the misuse of information is possible? How? Explain the methods to avoid misuse of information.

5) Bias in information could be controlled. How will you do it? Explain with examples. 6) What attributes information should possess? Provide explanation.

7) Explain different dimensions to measure the quality of information. 8) Explain different parameters which have an impact on information quality. Give

examples.

9) Differentiate between the following with example: 1) Action and No- action information

2) Recurring and non- recurring information 3) Internal and external information

10) Based on application, provide classifications of information with example..

11) Based on usage, explain the classification of information. 12) What are the different methods of data collection? Explain it with example

13) How will you determine the value of information? Does perfect information exists? Explain the concept of VPI.

14) The value of information is different for different person. Justify.

15) Explain the model of a human as an information processor with diagram. 16) Explain the different methods of filtering with example, which an information processor

adopts. 17) Cognitive style of each manager affects their decision making. (Decision taken by one

manager doesn’t follow the decision taken by the another manager in the same situation. )

Justify the reasons for individual differences with example. 18) Summaries the information concepts and their implications in brief w.r.t MIS.

19) Define the word knowledge. Explain the concept of knowledge management. 20) Differentiate between Information and knowledge with example. 21) Define wisdom.

22) List the components of knowledge driven capabilities. 23) Differentiate between explicit and tacit knowledge with example.

24) What you mean by Intellectual Capital? Explain the importance of it. 25) List the myths regarding knowledge management. Provide correction for them. 26) Knowledge management is not an alternative or luxury but a necessity due to demand of

customer centric business environment. Discuss the driving forces behind KM. 27) KM initiate drastically affects workplace scenario. Justify

28) List and explain the key aspects of knowledge management. 29) Explain the barriers in knowledge management process. 30) Explain the concept of business intelligence.

31) From the book, fill in the blanks. Page no 194 32) Solution of the case study No 1, 2 ( page no 195-199)

Chap -8 (Group No I)

1) Explain generalized model of the system with concept of filter and boundary. Explain

with example. 2) Define the following terms with example

Page 4: Question Bank

a. Sensor b. Comparison units

c. Feedback mechanism d. Corrective unit

3) Explain system as a control model with example. 4) Explain the control system model in data processing. 5) Explain how MIS supports the business with illustration.

6) Explain the concept of Decomposition of super system into subsystem with examples and diagram.

7) When you can say system as a black box? Explain with example. 8) Differentiate between the following with example:

a. Open V/s Close system

b. Probabilistic V/s Deterministic systems c. Super V/s Sub system

d. System efficiency and effectiveness 9) Explain different approaches of handling system complexity with example. 10) Explain the concept of entropy and negative entropy with example. How will you

provide negative entropy to the system? 11) The biggest challenge for the system designer is forced change in the system goal.

Justify it. 12) Explain the following terms in brief.

a. DPS

b. TPS c. APS

d. BPS e. IPS

Chap -9 (Group No J)

1) Why long range plan o MIS is necessary? How it is linked with the business plan of the organization?

2) What are the components of MIS plan? What is the purpose of each of them?

3) Draw a matrix of the class of information versus users, and explain the nature of use in each case.

4) Define functional management information. On what parameters functional management information could be assessed? Explain in detail

5) List down the difficulties to determine a correct and complete set of information .

Discuss various methods for determining the information requirement. 6) Match the method for determining information requirement with the degree of

uncertainty. Justify your answer. 7) Differentiate between prototype approach and life cycle approach of MIS

development and implementation with diagram.

8) List the guidelines for the system designer for successful implementation of the system.

9) List down the factors to assure the quality of the parameters.

Page 5: Question Bank

10) Do you think organization structure of MIS differs from one organization to another. Justify your answer.

11) List features which contribute to the success of MIS. 12) List features which contribute to the failures of MIS.

13) From the book, fill in the blanks. Page no 307

Chap -12 (Group No K )

1) Discuss in brief the model of information processing system. 2) How MIS helps in Business system integration? Convert MIS design into EIS. 3) From the book, fill in the blanks. Page no 413,414

Chap -13 (Group No K ) 1) Distinguish between the manufacturing sector and service sector in terms of

characters, focus and deliverables.

2) What is the difference between product management and service management? 3) Explain different characters of service concept.

4) Explain service quality model with diagram. 5) Explain different stages in Service Process Cylce. 6) List down the factors which influence the customer service design and show

relationship between them. 7) Explain each module of SMS with diagram and example of your own choice.

8) What are the expectations and perception of good service? Explain with example. 9) Applications in Service industry will be efficient and effective, if appropriate IT is

chosen.

10) What care should be taken while configuring the hardware and software platform in service applications.

11) From the book, fill in the blanks. Page no 451 Chap -14 (Group No L )

1) What is the purpose of DSS in MIS?

2) Explain different types of Decision Support System with example. 3) Explain different approaches on which DSS can be developed. Give example 4) Explain different cost accounting system with example.

5) Explain in brief ABC analysis. 6) Write a short note on GDSS.

7) Define knowledge. Define IC 8) Explain the process of knowledge management 9) Explain knowledge management system architecture.

10) Write a short note on knowledge base Expert System. 11) List the benefits of DSS.

12) From the book, fill in the blanks. Page no 497 13) Identify the following as Tacit or Explicit Knowledge

Page 6: Question Bank

a. S/W product b. Smart card

c. Consultant’s advice d. On line help

e. Tea testing process by tester 14) What is simulation? What are the assumption and limiatations of using the simulation

model in DSS?

15) Which is the type of DSS that can be integrated in the MIS and which are types not worthy of integration?

Chap -8 : From the book, MIS: Managing The Digital Firm (Lauden and Lauden

1) Define the following terms: Security and Control 2) Give reasons why information systems are vulnerable. 3) Explain how systems are vulnerable by the use of internet and Wi-Fi.

4) Define the following terms : a. Malware

b. Worms c. Trojan Horse d. Spyware

e. Keyloggers f. Hacker and Cracker

g. Cyber vandalism h. Botnet i. DoS

j. DDoS k. Identity theft

l. Phishing m. Evil twins n. Pharming

o. Click fraud p. Social Engineering

q. Patches r. AUP s. Authorization policies

t. Token u. Smart card

v. Authentication w. Access control x. IDS

y. UTM z. Encryption

aa. Digital certificate bb. Fault tolerant system

Page 7: Question Bank

cc. Recovery oriented computing. dd. Down time

ee. DPI 5) Differentiate between spoofing and sniffing.

6) Explain computer crime with examples. 7) Write a short note on Cyber terrorism and Cyberwarfare. 8) What do you mean by software vulnerability? Explain.

9) Differentiate between general control and application control. 10) Explain the process of risk assessment with example.

11) Write a short note on Security policy. 12) Write a short note on disaster recovery planning and business continuity planning. 13) Explain the role of Auditing in Information System.

14) Write a short note on biometric authentication. 15) Explain with diagram :firewall.

16) Explain public key encryption with diagram. 17) Differentiate between high availability computing and fault tolerant computer system.

* * * * *