IT-for-Mgmt-QA-Extra-Assignment-Column-2

advertisement
10100011101001011001111010101
00010101000100101010101001010
10001100100100010100101001001
IT for Management – key to Q & A
00010111000111000111000011001
Answers to the questions raised at the
end and in between for IT for
01001010100001110010100101010
Management book
01001001001010100010100100100
10010010101001010001000001111
10010010010101001010100111100
10011000011110000011100101100
00010100100100100101001001010
01010100101000101000100100001
11001111000110100100110101011
00010110100101011100000110101
01001010011010100101001010100
00110011001001110010010001100
10100101001010101010100100101
00101001010110100101001001010
10100101001010001010010001001
01010101010101010101010101010
10101010101010101010101010101
18/08/2012
Version 100
Prof. Arun Kumar V Waghchoure
This book is undergoing constant revision, it is a cumulative compiled effort of
student as a part of their extra assignment, it needs cleanup the yellow highlighter
indicates that the content for topic is still awaiting. In case if any student is taking it
up for updating download the word document format of it change the version and use
version history before making changes. Once the changes are made send the new
document copy to the class professor.
Contents
Section 1 – Technology foundation for managers ......................................................... 7
Chapter 1 – What is a computer and how does it work ........................................ 7
Activity A ................................................................................................... 7
Activity B ................................................................................................... 7
Activity C ................................................................................................... 7
Activity D ................................................................................................... 7
Self-Assessment Questions ...................................................................... 7
Chapter 2 – Evolution of Computers ....................................................................... 9
Activity A ................................................................................................... 9
Activity B ................................................................................................. 10
Self Assessment Questions .................................................................... 10
Chapter 3 – Input – Output Devices ........................................................................ 13
Activity A ................................................................................................. 13
Activity B ................................................................................................. 13
Activity D ................................................................................................. 13
Activity E ................................................................................................. 13
Self Assessment questions ..................................................................... 13
Chapter - 4 Secondary Storage Devices................................................................... 16
Activity A ................................................................................................. 16
Activity B ................................................................................................. 16
Activity C ................................................................................................. 17
Activity D ................................................................................................. 17
Activity E ................................................................................................. 17
Self Assessment questions ..................................................................... 17
Chapter 5 - Networking/Internet & Web Technologies ........................................... 21
Activity A ................................................................................................. 21
Activity B ................................................................................................. 21
Activity C ................................................................................................. 23
Activity D ................................................................................................. 23
Self-Assessment Questions .................................................................... 24
Chapter 6 - Operating Systems ................................................................................ 28
Activity A ................................................................................................. 28
Activity B ................................................................................................. 28
Activity C ................................................................................................. 29
Activity D ................................................................................................. 29
Review Questions ................................................................................... 29
Chapter 7 – Other Systems and Application Software ............................................ 32
Activity A ................................................................................................. 32
Activity B ................................................................................................. 32
Activity C ................................................................................................. 33
Activity D ................................................................................................. 33
Review Questions ................................................................................... 35
Chapter 8 - Database Management System ............................................................. 36
Activity A ................................................................................................. 36
Activity B ................................................................................................. 36
Activity C ................................................................................................. 36
Review Questions ................................................................................... 36
Section 2 – Management Information Systems ........................................................... 40
Chapter 1 - Key Definition ...................................................................................... 40
Activity A ................................................................................................. 40
Activity B ................................................................................................. 40
Activity C ................................................................................................. 40
Review Questions ................................................................................... 40
Chapter 2 - The Data cycle ...................................................................................... 42
Activity A ................................................................................................. 42
Activity B ................................................................................................. 42
Activity C ................................................................................................. 42
Review Questions ................................................................................... 43
Chapter 3 - Need for Information /Information systems in organization ................ 45
Activity A ................................................................................................. 45
Activity B ................................................................................................. 45
Activity C ................................................................................................. 45
Review questions.................................................................................... 45
Chapter 4 - Types of Information Systems in an organization ................................ 45
Activity A ................................................................................................. 45
Activity B ................................................................................................. 46
Activity C ................................................................................................. 46
Activity D ................................................................................................. 46
Review Questions ................................................................................... 46
Chapter 5 - Information Reports in an organization ................................................ 46
Review Questions ................................................................................... 46
Chapter 6 - Determining Information needs ............................................................ 47
Activity A ................................................................................................. 47
Activity B ................................................................................................. 48
Activity C ................................................................................................. 48
Review Questions ................................................................................... 49
Chapter 7 Determining Information needs – CSF method ...................................... 49
Activity A ................................................................................................. 49
Activity B ................................................................................................. 50
Chapter 8 - Determining information needs – Data Flow Method .......................... 50
Activity A ................................................................................................. 50
Activity B ................................................................................................. 50
1.
Definition: ......................................................................................................... 50
2.
Purpose/Objective: ............................................................................................ 50

Description: ....................................................................................................... 51
Activity C ................................................................................................. 51
Review Questions ................................................................................... 52
Chapter 9 - Role of Information in Decision Making .............................................. 53
Activity A ................................................................................................. 53
Activity B ................................................................................................. 53
Review Questions ................................................................................... 54
Chapter 10 - Determining Information need – Object Analysis .............................. 56
Activity A ................................................................................................. 56
Activity B ................................................................................................. 56
Activity C ................................................................................................. 57
Review Questions ................................................................................... 57
Chapter 11 - Aligning Information Systems to corporate Goals ............................. 59
Activity A ................................................................................................. 59
Review questions.................................................................................... 60
Chapter 12 - Aligning Information Systems using CSF method ............................. 60
Activity A ................................................................................................. 60
Activity B ................................................................................................. 62
Activity C ................................................................................................. 63
Review Questions ................................................................................... 64
Chapter 13 - Aligning Information systems using chandlers Model ....................... 64
Activity A ................................................................................................. 64
Activity B ................................................................................................. 65
Activity C ................................................................................................. 66
Review Questions ................................................................................... 66
Chapter 14 - Role of IT in Business......................................................................... 67
Activity A ................................................................................................. 67
Activity B ................................................................................................. 68
Activity C ................................................................................................. 69
Reviews in questions .............................................................................. 70
Chapter 15 - Systems Development Cycle – SDLC ................................................ 71
Activity A ................................................................................................. 71
Activity B ................................................................................................. 72
Activity C ................................................................................................. 75
Review Questions ................................................................................... 76
Chapter 16 - Visualising a Software Solution.......................................................... 77
Activity A ................................................................................................. 77
Activity B ................................................................................................. 77
Review Questions ................................................................................... 77
Chapter 17 - Software Testing ................................................................................. 81
Activity A ................................................................................................. 81
Activity B ................................................................................................. 81
Review Questions ................................................................................... 81
Chapter 18 - Information Security ........................................................................... 81
Activity A ................................................................................................. 81
Activity B ................................................................................................. 82
Activity C ................................................................................................. 83
Review Questions ................................................................................... 84
Chapter 19 - Long Range Planning of Information Systems & Technology ........... 86
Activity A ................................................................................................. 86
Activity B ................................................................................................. 87
Activity C ................................................................................................. 88
Review Questions ................................................................................... 89
Self-Assessment Questions
Section 1 – Technology
foundation for managers
Chapter 1 – What is a computer
and how does it work
Activity A
1. Find out 5 Branded Manufactures of
Computers?
Ans:
1. Compaqu/HP
2. DELL
3. LENOVO
4. ACCER
5. ASUS
6. SONY
Activity B
2. Find out manufacture of Printers
Ans:
1. HP
2. CANON
3. TOSIBA
4. ZENIT
Activity C
3. Find out 2 different models of printer
which provide four in one options? (
Print Scan, Fax, Xerox)
Ans:
1. Epson WorkForce 310
2. Canon Pixma MX870
Activity D
4. Find out 2 different models of
Modems used for Broadband?
Ans:
1. Broadband
2. DSL Modem
3. Cable Modem
4. High Speed Broadband
5. Wireless DSL Broadband
1. Which Component of Computer is
called a “brain’ of computer & why?
Describe the function functions of
the distinct parts of this component.
Ans:
The CPU (central processing unit) is the
part of the computer that does most of
the work. It contains arithmetic and logic
parts that can do millions of calculations
per second.
The CPU is what executes program
instructions, which, at the CPU level, are
instructions that are directly to the
hardware.
It is called the brain, I suppose, because it
actually does the work that programs
require. All other parts of the computer
are controlled by the CPU and without it
the computer doesn't work (much like a
human brain).
2. Define the term Hardware.
Ans:
Hardware is the physical aspect of
computers, telecommunications and
other information technology devices. The
term distinguishes the "box", electronic
circuitry and components of a computer
from the program you put in it to make it
do things (software). Hardware is a
collective term. Hardware includes not
only the computer proper but also the
cables, connectors, power supply units
and peripheral devices such as the
keyboard, mouse, audio speakers and
printers.
3. Describe brief classification of
hardware components?
Ans:
There
have
been
made
many
classifications of computer hardware
systems along the years in order to help
the users better understand the
computers that they are working with and
also to become aware of how they might
improve their computers and the way in
which they work with them. In this
respect, one of the good classifications of
computer hardware systems having been
made includes the following: the cooling
device class, the video and monitor class,
the printing class, the networking device
class, the power class, the motherboard,
controller and port types of class, the
mass storage class and finally, but not the
least important one the input device class.
This is only one example of such a
classification of computer hardware
systems but not the only one. These
classifications are very important for the
users to be made aware of because within
them are being clarified for the users
different types of computer systems with
the included types of components that
are very important to be analysed in order
to understand the way in which the
computer functions.
4. Define the terms Software
Ans:
The terms 'software' and 'program' are
often confused, yet the distinction is not
difficult to make. Computer programs are
not mean to be changed during the
normal course of operation. Any value or
information that is changed during the
operation of a computer is data, which
read by a program, not part of it.
However, during routine maintenance a
computer program may be updated. This
is generally done to correct bugs and add
new features. Thus the stable, nonchanging software components are often
programs, whereas anything that is
updated, created, deleted, or otherwise
modified on a regular basis is not a
program
5. Describe brief Classification of
hardware components
Ans
There
have
been
made
many
classifications of computer hardware
systems along the years in order to help
the users better understand the
computers that they are working with and
also to become aware of how they might
improve their computers and the way in
which they work with them. In this
respect, one of the good classifications of
computer hardware systems having been
made includes the following: the cooling
device class, the video and monitor class,
the printing class, the networking device
class, the power class, the motherboard,
controller and port types of class, the
mass storage class and finally, but not the
least important one the input device class.
This is only one example of such a
classification of computer hardware
systems but not the only one. These
classifications are very important for the
users to be made aware of because within
them are being clarified for the users
different types of computer systems with
the included types of components that
are very important to be analysed in order
to understand the way in which the
computer functions.
Chapter 2 – Evolution of
Computers
Activity A
How the Historical Evolution of
Microcomputers occurred from years
2000 to 2006.Happened.
Ans
2000 - Jan 14
2000 - March 8
Intel releases very limited supplies of the
1GHz Pentium III chip.
2000 - June 20
US Government announce restrictions on
exporting cryptography are relaxed
(although not removed). This allows many
US companies to stop the long running,
and rather ridiculous process of having to
create US and international copies of their
software.
British Telecom (BT) claim the rights to
hyperlinks on the basis of a US patent
granted in 1989. Similar patents in the
rest of the world have now expired. Their
claim is widely believed to be absurd since
Ted Nelson wrote about hyperlinks in
1965, and this is where Tim Berners Lee
says he got the ideas for the World Wide
Web from. This is just another in the line
of similar incredible cases — for example
amazon.com's claim to have patented '1click ordering'.
2000 - Jan 19
2000 - Sept 6
Transmeta launch their new 'Crusoe'
chips. Designed for laptops these provide
comparable performance to the midrange Pentium II chips, but consume a
tiny fraction of the power. This new
competitor to Intel in the x86 market
initially appeared exciting and promising.
RSA Security Inc. released their RSA
algorithm into the public domain, in
advance of the US patent (#4,405,829)
expiring on the 20th Sept. of the same
year. Following the relaxation of the US
government restrictions earlier in the year
(Jan. 14) this removed one of the last
barriers to the world-wide distribution of
much software based on cryptographic
systems. It should be noted that the IDEA
algorithm is still under patent and also
that government restrictions still apply in
some places.
2000 - Feb 17
Official Launch of Windows 2000 Microsoft's replacement for Windows
95/98 and Windows NT. Claimed to be
faster and more reliable than previous
versions of Windows. It is actually a
descendant of the NT series, and so the
trade-off for increased reliability is that it
won't run some old DOS-based games. To
keep the home market happy Microsoft
has also released Windows ME, the
newest member of the 95/98 series.
2000 - March 4
Sony releases the PlayStation 2.
2000 - March 6
AMD release the Athlon 1GHz.
2000 - November
Intel releases the Pentium IV.
2001 - Jan 4
Linux kernel 2.4.0 released.
2001 - March 24
Apple released Mac OS X. At its heart is
Darwin, an Open Source operating system
based on BSD. Mac OS X finally gave Mac
users the stability benefits of a protected
memory architecture along many other
enhancements, such as pre-emptive
multitasking. The BSD base also makes
porting Unix applications to Mac OS easier
and gives Mac users a full-featured
command line interface alongside their
GUI.
2001 - November
Microsoft released Xbox, a games console
with a flagship title Halo, a first person
shooter. The console initially cost $299
(£209), and includes the ability to connect
to the proprietary online Xbox Live!
service for multiplayer gaming.
base class, derived class, abstract class
etc., class hierarchy, difference between
public, private and protected class,
inheritance, multiple inheritance and its
problem, public and private inheritance in
C++ and Java.
Introduction to COBOL, various divisions
and sections used in COBOL, simple type
of statements like ADD, SUBTRACT,
COMPUTE, OPEN, CLOSE, MOVE etc. in
COBOL, loop type statement like
PERFORM etc. in COBOL, table handling,
sequential file processing, file sorting and
merging in COBOL. Comparative study of
various programming, languages like C,
C++, Java, LISP, PROLOG, Ada and COBOL.
2002 - May 30
United Linux officially formed.
2003 - March 6
SCO announces it will sue IBM 1 billion US
dollars. The claim is that Linux contains
code inserted by IBM that was the
copywrited property of SCO.
Activity B
How the Historical Evolution of
Programming Languages occurred from
year 2000 to 2006 happened.
A : Evaluation, design and applications of
programming languages, aliasing, Land R
values, Von Neumann bottleneck, basics
of logic and functional programming. Data
types in Ada, parameter passingmechanism, scope of a variable, binding,
coercion,
storage
allocation
of
multidimensional arrays in a computer,
control structures like if statement, while
statement etc., data abstraction.
Data types, simple statements like
(assignment statement, if statement,
switch statement), control statement like
(for loop, while and do-while loops, break
and continue statements etc.), arrays,
functions and pointers in C, C++ and Java.
Introduction
to
object
oriented
programming, concepts of objects, classes
and instances, various types of classes like
Self Assessment Questions
1. Write a brief note on historical
evolution of microcomputers?
Ans:
A Brief History of the Microcomputer
The "Chips" That Started it All
Micro-Chip
All microcomputers use a processor
called a mirco-chip. This is typically a
small square sliver of silicon (glass)
with pathways etched on it via a
chemical process. These pathways
can be transistors or simply "wires"
that connect the transistors. If you
can pack enough of these transistors
on the silicon "die" then those
transistors can become a processing
unit, memory, and a calculator. The
entire thing is called an "integrated
circuit."
Intel
In mid 1974 Intel, a transistor and
memory chip manufacturer, came up
with the first successful "computer
on a chip" design called the 8080. It
ran at two (2Mhz) MegaHertz and
performed computing functions via
an eight (8) bit1 Central Processing
Unit (CPU). The 8080 had a forty (40)
pin design that allowed for a sixteen
(16) bit bus.
This was the improved version of the
8008 which had been designed for
Computer Terminal Corporation
(CTC). Because the 8008 did not
meet
CTCs
performance
specifications
the
8080
was
developed, but by then CTC was
using their own chip. Intel found a
home for the 8080 in the Altair (see
below).
The Birth of the PC
Up to now there was a lot of
speculation about whether or not
the major computer companies were
going to get into the act. Also, by this
time, Dan Bricklin had developed
Visicalc for the Apple II. More and
more people were seeing the power
of a "personal computer" (though
"microcomputer" was still the
common term) the units were
making their manufacturers a tidy
profit. Visicalc was so popular Briklin
"ported" the program over to the
Commodore PET and the Radio
Shack TRS-80.
On August 12, 1981 the shoe finally
dropped. IBM announced the
introduction of the Model 5150
thereby
stepping
into
the
microcomputer market and shaking
the industry to it's foundations.
Though
the
term
"personal
computer" was already in use, at the
time it was synonymous with
"microcomputer." IBM, wanting to
differentiate this microcomputer
from their larger products began
using the term personal computer in
their advertising.
The PC also convinced ever larger
numbers of consumers that the
microcomputer really was a viable
product (after all IBM wouldn't offer
one if it was a toy) and, though it was
never a big hit with the home
consumer (at $2,880 per unit), with
the advent of Lotus 1-2-3* the model
took off with business. By 1984
millions of units were being sold.
At this point there are still no
business
oriented
graphical
computers. The mouse is still an idea
relegated to the laboratory and color
has yet to reach the computer
screen.
2. Write a brief note on Machine
language Programming
Ans:
A brief history of programming
In the 17 Century, the first
calculating machines were invented
by Wilhelm Schickard and Blaise
Pascal (who created the "Pascaline"
in 1642). These mechanical devices
were remarkable creations but they
could only perform specific
calculations. Arguably the first
programmable computer was the
Analytical Engine by Charles
Babbage conceived in 1835 but
never completed
Analytical Engine - 1835
With the Analytical Engine, Babbage
conceived of a machine that could
be programmed to solve any logical
or computational problem. This
project came to the attention of
Lady Ada Lovelace (who, incidently,
was the only legitimate child of Lord
Byron). Lovelace became obsessed
with the project and wrote notes on
programming techniques, sample
programs and the potential for
programmable machines to play
chess and compose music. She is
regarded as the world?s first
computer programmer and is
credited with the invention of the
programming
loop
and
the
subroutine.
Z-3, Robinson and Mark I
During the Second World War,
British
invested
significant
resources into the ?Ultra? project
based at Bletchley Park. This topsecret project utilized machines
built by Alan Turing to decode
German military messages encoded
using the ?Enigma? enciphering
machine. One such machine, called
Robinson, was built in 1940 and is
generally regarded as the first
operational
(although
nonprogrammable) computer.
The first programmable computer
was actually built in Germany by
Konrad Zuse in 1941. In contrast to
the British, the German military
apparently
overlooked
the
significance of Zuse?s achievements
and his work only ever got minor
support and very little recognition
after the war (the original Z-3
machine was destroyed during the
war, but a replica is on display at
the Deutsches Museum in Munich).
Programming Languages
The language a computer can
understand (called "machine code")
is composed of strings of zeros and
ones. This smallest element of a
computer?s language is called "a
bit" ? 0 or 1. Four bits are a nibble.
Two nibbles (8 bits) equal a byte.
The ?words? of a computer
language are the size of a single
instruction encoded in a sequence
of bits (for example, many
computers speak a language with
words that are '32-bits' long).
As machine code is extremely difficult to
work with, a type of language called
?Assembly? was soon developed. Using
an assembly language, programmers use
series of mnemonics that are then
translated by a program into machine
code that the computer can understand.
However, assembly is very similar to
machine code in that all procedures have
to be spelt out in exact detail in a process
that is extremely difficult, slow and prone
to errors.
Chapter 3 – Input – Output Devices
Activity A
Self Assessment questions
Find 3 different manufactures of
keyboard& Mouse, keyboard Mouse
which are used for to interact with the
computer to communicate with external
world.
1. How does a keyboard works
Ans:



Creative Technology
I-ball
Logitech
Activity B
Find 3 different manufactures of Scanner
& printers
Ans :
1. HP
2. CANON
3. ESPON
4.XEROX
Find 2 Different manufactures of Bar
code Scanners
Ans:
1. Bar-Tech Systems &
Automations Pvt.Ltd. – India
2. Crown India. – India
3. 3s Industries – India
4. Uniqueid (india) Pvt. Ltd. - India
Activity D
?As a Purchase manager carry out SWOT
Analysis of all above Activities listed in A
to D
Activity E
Find 3 different manufactures of Web
Cams.
Ans:
1. HP
2. INTEX
3. IBALL
4. Logitech
As the name suggests, the keyboard
is used to key in text and other
characters in the computer, like I am
doing right now! It is similar to a
typewriter in the arrangement of the
alphabets. However, it also has
special keys. They include the
numeric keys, navigation keys
(located on the lower right side) and
the function keys (F1 - F12). The
keyboard can also be utilized to
perform functions which can be done
using the mouse. For this, you
require to be abreast of certain
keyboard shortcuts
Functioning
of
a
Computer
Keyboard
In general, there are 80-110 keys in a
computer keyboard. The keys may
vary depending upon the brand and
the type of operating system.
Nevertheless, the shape, size and
spacing of keys are almost same for
all keyboards. Also the layout or
arrangement of keys that represent
letters, signs and symbols is same,
which is referred to as QWERTY.
The working of a computer keyboard
can be compared to a miniature
computer. Inside the keyboard, there
are metallic plate, circuit board (key
matrix) and processor, which are
responsible
for
transferring
information from the keyboard to
the computer. Depending upon the
working principle, there are two
main types of keys, namely,
capacitive and hard-contact. Let's
discuss in brief about the functioning
of capacitive and hard contact key.
Capacitive Key
On the underside of a capacitive key,
a metal plunger is fixed, which helps
in activating the circuit flow. When a
capacitive key is pressed, the metal
plunger applies a gentle pressure to
the circuit board. The pressure is
identified by the computer and the
circuit flow is initiated, resulting in
the transfer of information from the
circuit to the currently installed
software.
2. What are different types of
mouse available in market.
Ans:
1. Mechanical: This is a type of
computer mouse that has a
rubber or metal ball on its
underside and it can roll in every
direction. There are sensors
within the mouse, which are
mechanical, detect the direction
in which the ball is moving and
moves the pointer on the screen
in the same direction. A mouse
pad should be used under the
mouse to run on.
2. Optomechanical: This is the same
as the mechanical mouse except
that it uses optical sensors to the
motion of the ball. Your should
use a mouse pad under the
mouse to run on.
Optical: This type uses a laser for
detecting the mouse's movement. You
don't need a
mouse pad but you can use one made for
optical mice. Optical mice do not have
any
mechanical moving parts. The optical
mouse responds more quickly and
precisely than the mechanical and
optomechanical mice and now that they
have been around awhile the price is
pretty comparable.
3. As a manager, what will you look
for purchasing a monitor &
scanner
1. Technology : LCD (Liquid Crystal
Display) monitors are similar to
what is found on portable
computers. LCD monitors
overall generally display much
sharper of an image, are lighter
and more space efficient;
however, they are much more
of an expensive solution for
desktop displays.
2. Size : When looking at LCD /
Flat Panel displays, one of the
most noticeable and
considerable reasons for
purchasing a Flat Panel is its
size. As you will see, a Flat Panel
display is generally about 1-2
foot deep.
3. Resolution : The maximum
resolution is the amount of
pixels that can be displayed
horizontally x vertically. Be
cautious when purchasing a
monitor at any size that
advertises a large resolution
size, such as 1,600 x 1,200 for a
15" monitor.
4. Price : When purchasing a Flat
panel / LCD you should expect
to pay more than a Monitor /
CRT as this is a new and
improved technology. Below is
what you should expect to pay
by size of display.
5. Dot/stripe Pitch : When
purchasing a monitor, Dot Pitch
or Stripe Pitch is a very
important consideration. Dot
Pitch measurement is found on
most monitors and defines the
amount of space (in
millimeters) that separates two
adjacent pixels that are the
same color. The smaller the Dot
Pitch, the sharper the image.
when purchasing a monitor the
Dot Pitch be no bigger than
0.25. Stripe Pitch is a
measurement used with
Trinitron or Diamondtron
monitors and is a measurement
(in millimeters) that separates
two like-colored stripes. The
lower the Stripe Pitch the
higher the quality of image.
Today's consumer scanners commonly
have optical resolutions of 2400 dots
per inch--and that's likely to remain the
maximum for a while because
manufacturers are opting to improve
ease of use rather than upgrade the
core hardware.
1.
2.
Optical Resolution : For
displaying photos on the
Web or printing snapshots,
100 dots per inch is plenty
of resolution; for capturing
text using optical character
recognition, 300 dpi is
standard; any scanner on
the market can easily
perform those But if you
want to make 8-by-10-inch
or larger prints, or enlarge
smaller images, opt for a
scanner with 1200 dpi or
2400 dpi of optical
resolution tasks.
Transperency Adapter :
Scanning slides or film
requires a transparency
adapter--a light source that
shines through the film,
which is normally
Transparency templates
come in different sizes:
Many are sized for three
slides or a 6-inch-long
filmstrip, and some are big
enough for one or more
large-format transparencies
held in place with a
template.
3.
Automatic document
feeder : An automatic
document feeder is helpful
if you need to handle highvolume optical character
recognition or scan extralong pages.
4.
Interface : Scanner makers
are currently releasing
products that come with
USB 2.0 interfaces (which
are backward-compatible
with USB 1.1 connections).
We have not seen great
speed jumps from USB 2.0
scanners so far.
Colour Depth : The amount of color (or
gray-scale) data a scanner can recognize
and save, called bit depth, is measured in
bits per pixel. For almost all forms of
general-purpose use, 24-bit external color
depth is sufficient.
4. As a manager, what will you look
for purchasing a printer & web
cam
Laser printers are relatively faster and
use a laser technology to print.
Because of their faster speed
performance, laser printers are good
for large print volumes in busy offices.
Their toner cartridges prove ultimately
cheaper for large volume jobs, than
using ink cartridges with an inkjet
printer.
1.
Resolution : The resolution
of a printer is measured in
dots-per-inch - dpi. The
higher the number, the
sharper the resulting
impression or image. A
300dpi printer is good
enough. 1200dpi would be
good for photo-printing.
2.
3.
4.
usually measured in pixels.
The higher the number of
pixels a webcam has, the
better the image quality
that it may provide.
Speed : Most printers print
at faster rate for
monochrome (black and
white) printing than for
colour printing. Laser
printers tend to deliver
faster print speed.
Printer Manufacturer : As
an intending buyer,
however, you probably
want to know a thing or two
about what each printer
manufacturer offers in the
context of the printer
technology. some of the
best-known printer makers:
Hewlett Packard (HP),
Epson, Canon, Brother,
Lexmark, Dell, Panasonic,
Toshiba, Xerox, Sharp and
Samsung.
Price :
C4340 –Rs.7,199
2.
Light sensitivity : Choosing a
webcam with the right
sensitivity to light would
depend actually on the type
of environment that you
plan to use it on.
3.
Camera speed : Webcam
speed usually refers to the
number of frames that it
can come up with per
second. A basic webcam can
only do around 15 image
frames per second.
4.
Focus : Basic webcams
usually have permanent
fixed focus features for the
most basic of needs.
5.
Price : LOGITECH S-7500
Webcam –Rs.4800
LOGITECH S-5500
Webcam –Rs.2400
LOGITECH ULTRA VISION
Webcam –Rs.7800
Chapter - 4 Secondary Storage Devices
Activity A
–Rs.8,499
–Rs.8,999
HP Photosmart C6100 –
Rs.15,999
–
Find 2 different manufactures of Floppy
disk drives and Diskettes.
Floppy Diskettes – Imation, Maxell
Floppy disk drives – IBM, Dell
Rs.12,499
Buying a Computer webcam may not
be as easy as we think. We should be
able to know what to look for in terms
of the different webcam features.
1.
Image Resolution : A
webcam’s resolution is
Activity B
Find 2 different manufactures of Hard
Disks.
Seagate, Western Digital.
Activity C
Find 2 different manufactures of Pen
drive
Transcend, Kingston.
Activity D
Find 2 different manufactures of DVD’s
Sony, HP.
Activity E
?As a purchase manager carry out SWOT
Analysis of all above activities listed in A
to D
Self Assessment questions
1. How does a Floppy Drive works?
Ans: - The first
diskettes were introduced
in 1971.
 The floppy
drive works
as follows:1. The floppy disk is
packaged in a 3.5” square
hard plastic envelope.
2. It has a long slit for
read-write head access.
3. A hole in the centre
for mounting the disk
drive hub.
4. The disk is logically
divided into Tracks and
sectors. Data is written or
read from these
sectors by a read write
head.
5. Floppy disks are made
of magnetic oxide-coated
Mylar computer tape
material.
6. These diskettes have
a thinner magnetic
coating, allowing more
tracks
On a smaller surface.
7. The track density is
measured in TPI (tracks
per inch).
8. The TPI has been
increased from 48 to 96
and now 135 in the 3.5”
Diskettes.
9. When the computer
requests the drive to be
accessed, the floppy
revolves on the central
spindle while the read
write head picks up data.
 The
advantages
of floppy disk
drive are as
follows:1. Floppies make it
possible to store an
infinite amount of
information since the
data can span multiple
floppies.
2. Requests for
information can be
answered quickly and at
random.
3. Files can be arranged
sequentially or in a
random manner.
 The
disadvantage
s of floppy
disk drive are
as follows:1. Floppy disks tend to
get corrupted very fast
either due to physical
handling or due to dirt,
moisture, radiation etc.
2. Compatibility of the
drive and alignment of
the head has often been a
cause of Problems when
using a floppy from one
machine onto another.
Floppy disks have lesser storage capacity
as compared to other devices such as CDROMS and Pen drives.
6. Response time of the
order of 20-25
milliseconds is quite
common.
2. How does a Hard Disk Drive
works?
1.
Ans: - IBM developed the
idea of a Winchester or Hard Disk.
 The Hard Disk
works as
follows:1. A hard disk works on
the same principle as
a floppy drive. The
hard disk usually has
one or more platters
each with both the
sides which are
recordable.
2. All the platters rotate
on a central spindle at
a continuous speed.
Typical speeds are of
the order of 7500rpm.
3. Several read write
heads are position on
top of each rotating
surface.
4. When the hard disk
drive receives an
instruction to read or
write information, it
uses the available
data to locate the
correct surface track
and sector and reads
or writes data on it.
5. The hard disk is fast
since it has to at most
wait for the correct
track and sector to
come below the read
write head.
2.
3.
4.
 The
advantages
of Hard Disk
Drive as
follows:A hard disk is a device
and a storage
medium which is
permanently fixed
into the computer.
Hard disks provide
on-line information
and are very fast.
Most computer
configurations allow
extra hard disks to be
added thereby
making it possible to
increase the on-line
storage
incrementally.
Hard disks are
enclosed in a
hermetically closed
container thereby
reducing the chance
of damage and are
therefore a fairly
reliable means of online storage.
 The
disadvantage
s of Hard Disk
Drive as
follows:1. The amount of
storage is restricted
by capacity of the disk
installed at that time
on the computer.
However considering
the decreasing cost of
storage it is better to
buy a Hard Disk of a
much higher capacity
than required to take
care of this issue.
Though usually Hard Disks are reliable
they can crash due to a mechanical
defects or electrical surges which may
have a damaging effect. Hence a back up
on floppies or tapes of at least the critical
data needs to be kept for such
eventualities.
3. How does a Pen Drive works?
Ans: - A pen drive is a
small removable FLASH
MEMORY DRIVE usually
connected to the USB
port of a computer. It
provides storage ranging
from 16MB, to several
Gigabytes. It is a plug and
play device.
 The Pen Drive
works as follows:1. The Pen Drive is really
a memory chip. The
computer reads or
writes to the Pen
Drive as it would to
the RAM. This is
possible since the
Flash Memory card is
directly connected to
the USB- bus just as
the memory is
connected to the CPU
on the bus.
2. The pen drive can be
connected and in an
instance a Windows
based computer
recogninses the
presence of the drive,
loads the necessary
driver and is read to
read or write.
3. The pen drive also has
a write protect tab
just like a floppy drive
has. This prevents the
computer from
writing to the drive if
the user so wishes.
 The advantages
of Pen Drive are
as follows:1. It’s having massive
storage capacity.
2. It is portable and
compact.
3. It is in Solid-State
hence less chance of
damage and
corruption.
4. It provides useful
features such as
Write-Protect switch,
LED Read or Write
indicator as well as
Password protection
software included to
protect our data.
5. It is USB Compliant
making it easy to
connect externally to
any computer making
it plug and play. So, it
doesn’t suffer from
in-compatibility issues
such as those faced in
floppy disks etc.
6. It doesn’t require an
external source of
power.
7. It provides very fast
transfer rates up to
12mbit per second at
full speed.
8. It is very affordable. It
starts at approx
Rs.800/- Rs.1000/- at
the low end.
9. In pen drive data can
be stored for as long
as required even up
to 10 years.
4. As a manger, what will look for
purchasing a DVD?
DVD is the latest mass data storage
device after floppy disk and CDs.






Types: DVD writers also
have single layer DVD writer
or Dual layer DVD writer.
The DVDs useds in a single
layer DVD drive can store
upto 4.3GB. The DVDs in a
dual layer DVD drive can
store upto 8.5GB. The Single
layer DVD drive is cheaper
than the dual layer DVD
drive.
Category : You can
categorize DVD writers into
two. The internal DVD
writer that is permanently
fitted inside the computer
or the external DVD writer
that can be carried with
your anywhere you go.
Memory : DVD drive’s
buffer memory should be
high. At least 8MB buffer
should be there.
Speed : he speed of the
DVD writer should be fast.
This will affect the reading
and writing speed.
Supports : Check the DVD
drive supports CDR, CDRW,
DVDR, DVD+R, DVD RW,
DVD +RW etc.
Price : SONY DRU-170C DVD
Writer Price – 1300/Samsung 22X DVD
Writer SATA Price – 1150/-
Liteon 20X DVD Writer SATA Price –
1250/-
Chapter 5 - Networking/Internet & Web
Technologies
o
Activity A
o
o
? Using Google search collect information
on “Protocol used in Networking”
FTAM File Transfer and
Access Management
Protocol
X.400 Mail
Common management
information protocol
(CMIP)
Activity B
Using Google search collect information
on “seven layers of Networking”

Ans:
The Open Systems Interconnection
model (OSI model) was a product of the
Open Systems Interconnection effort at
the International Organization for
Standardization. It is a way of sub-dividing
a communications system into smaller
parts called layers
Seven layers of networking are used in OSI
model. The seven layers are explained as
below:
7) Application – It deals with users
application program. The Application
Layer is the OSI layer closest to the end
user, which means that both the OSI
application layer and the user interact
directly with the software application.
This layer interacts with software
applications that implement a
communicating component. Such
application programs fall outside the
scope of the OSI model. Application layer
functions typically include identifying
communication partners, determining
resource availability, and synchronizing
communication. When identifying
communication partners, the application
layer determines the identity and
availability of communication partners for
an application with data to transmit.

On TCP/IP stack:
o Hypertext Transfer
Protocol (HTTP),
o File Transfer Protocol
(FTP),
o Simple Mail Transfer
Protocol (SMTP)
o Simple Network
Management Protocol
(SNMP).
6) Presentation – It is used for the
delivery and formatting of information to
the application layer. The Presentation
Layer establishes context between
Application Layer entities, in which the
higher-layer entities may use different
syntax and semantics if the presentation
service provides a mapping between
them. If a mapping is available,
presentation service data units are
encapsulated into session protocol data
units, and passed down the stack.
This layer provides independence from
data representation (e.g., encryption) by
translating between application and
network formats. The presentation layer
transforms data into the form that the
application accepts. This layer formats
and encrypts data to be sent across a
network. It is sometimes called the syntax
layer
On OSI stack:
5) Session – It helps start and end session
of interaction with the other computer.
The application layer uses this session.
The Session Layer controls the dialogues
(connections) between computers. It
establishes, manages and terminates the
connections between the local and
remote application. It provides for fullduplex, half-duplex, or simplex operation,
and establishes check pointing,
adjournment, termination, and restart
procedures. The OSI model made this
layer responsible for graceful close of
sessions, which is a property of the
Transmission Control Protocol, and also
for session check pointing and recovery,
which is not usually used in the Internet
Protocol Suite. The Session Layer is
commonly implemented explicitly in
application environments that use remote
procedure calls
4) Transport – It provides end to end
communication to the application.
Transport Layer is to compare it with a
Post Office, which deals with the dispatch
and classification of mail and parcels sent.
Transport Layer can keep track of the
segments and retransmit those that fail.
The Transport layer also provides the
acknowledgement of the successful data
transmission and sends the next data if no
errors occurred. Transport Layer, typical
examples of Layer 4 are the Transmission
Control Protocol (TCP) and User Datagram
Protocol (UDP).
transit network up to the level of
networks on either side;
3. Sub network Independent
Convergence - which handles
transfer across multiple networks.
2) Data link – It is responsible for media
access control, flow control and error
checking.
Both WAN and LAN service arranges
bits, from the Physical Layer, into logical
sequences called frames. Not all Physical
Layer bits necessarily go into frames, as
some of these bits are purely intended for
Physical Layer functions. For example,
every fifth bit of the FDDI bit stream is not
used by the Layer.
1) Physical – It consists of basic hardware
transmission technologies of a network.
The above layers use this physical layer
for actual transmission.
The major functions and services
performed by the Physical Layer are:


3) Network – It is responsible for routing
packets delivery including routing through
intermediate routers.
Careful analysis of the Network Layer
indicated that the Network Layer could
have at least three sub layers:
1. Sub network Access - that
considers protocols that deal with
the interface to networks, such as
X.25;
2. Sub network Dependent
Convergence - when it is
necessary to bring the level of a

Establishment and termination of
a connection to a
communications medium.
Participation in the process
whereby the communication
resources are effectively shared
among multiple users. For
example, contention resolution
and flow control.
Modulation, or conversion
between the representation of
digital data in user equipment and
the corresponding signals
transmitted over a
communications channel. These
are signals operating over the
physical cabling (such as copper
and optical fiber) or over a radio
link.
Activity C
Using Google search collect information
on “Network topology”
Ans:
Network topology is the layout pattern of
interconnections of the various elements
of the computer network. Network
topologies may be physical or logical.
Physical topology means the physical
design of a network including the devices,
location and cable installation. Logical
topology refers to how data is actually
transferred in a network as opposed to its
physical design. Topology can be
considered as a virtual shape or structure
of a network. This shape does not
correspond to the actual physical design
of the devices on the computer network.
The computers on a home network can be
arranged in a circle but it does not
necessarily mean that it represents a ring
topology.
A local area network (LAN) is one
example of a network that exhibits both a
physical topology and a logical topology.
Any given node in the LAN has one or
more links to one or more nodes in the
network and the mapping of these links
and nodes in a graph results in a
geometric shape that may be used to
describe the physical topology of the
network. Likewise, the mapping of the
data flow between the nodes in the
network determines the logical topology
of the network. The physical and logical
topologies may or may not be identical in
any particular network.
The 3 broad categories of network
topology are explained below:
1) Star topology – In star topology
the server is at the centre with all
the network links emanating from
it terminating at various nodes or
clients. This looks like a star hence
is called star topology.
2) Bus topology – This is the most
popular method of networking. It
has a shared cable running from
the server across all the nodes.
The cabling is much easier since
only one cable runs through the
entire floor or the entire
organization.
3) Mesh topology – In mesh
topology each computer may be
connected to the other with
separate cables. The criss-crossing
of network paths makes it look
like a mesh hence it is called mesh
topology.
Activity D
Using Google search collect information
on “Domain Names”
Ans:
A domain name is an identification
label that defines a realm of
administrative autonomy, authority or
control in the internet. Domain names
are also the hostnames that identify
Internet Protocol (IP) resources such
as web site. Domain names are also
used as simple identification labels to
indicate ownership or control of a
resource.
An important purpose of domain names is
to provide easily recognizable and
memorable names to numerically
addressed internet resources. This
abstraction allows any resource to be
moved to different physical location in the
address topology of the network, globally
or locally in the intranet. Domain names
are often referred to simply as domains
and domain name registrants are
frequently referred to as domain owners.
Domain names are often referred to
simply as domains and domain name
registrants are frequently referred to as
domain owners, although domain name
registration with a registrar does not
confer any legal ownership of the domain
name, only an exclusive right of use. The
domain name space consists of a tree of
domain names. Each node in the tree
holds information associated with the
domain name. The tree sub-divides into
zones beginning at the root zone. The
Internet Corporation for Assigned Names
and Numbers (ICANN) manages the toplevel development and architecture of the
Internet domain name space. It authorizes
domain name registrars, through which
domain names may be registered and
reassigned. The use of domain names in
commerce may subject strings in them to
trademark law. In 2010, the number of
active domains reached 196 million
Self-Assessment Questions
1. What are components of
networks?
A computer network, often simply
referred to as a network, is a collection of
computers and devices interconnected by
communications channels that facilitate
communications and allows sharing of
resources and information among
interconnected devices. Networks may be
classified according to a wide variety of
characteristics such as topology,
connection method and scale
The components of Network are:
Routers
Repeters
Bridges
Hub
Switches
Protocols
Gateway
Filters
Servers
Proxy servers
Modems
Network cards
Cables.
2. ? What are protocols used in
networking
3. ? What are seven layers of
networking?
4. What are Web browsers?
A web browser or internet browser is a
software application for retrieving,
presenting and traversing information
resources on World Wide Web. An
information system is identified by a
uniform resource identifier and may be a
web page, image, video, or other piece of
content. Hyperlink present in resources
enable other users to easily navigate
there browsers to related resources.
The primary purpose of a web browser is
to bring information resources to the
user. This process begins when the user
inputs a Uniform Resource Identifier
(URI), for example
http://en.wikipedia.org/, into the
browser. The prefix of the URI determines
how the URI will be interpreted. The most
commonly used kind of URI starts with
http: and identifies a resource to be
retrieved over the Hypertext Transfer
Protocol (HTTP). Many browsers also
support a variety of other prefixes, such
as https: for HTTPS, ftp: for the File
Transfer Protocol, and file: for local files.
Prefixes that the web browser cannot
directly handle are often handed off to
another application entirely. For example,
mailto: URIs are usually passed to the
user's default e-mail application, and
news: URIs are passed to the user's
default newsgroup reader.
Although browsers are primarily intended
to access the World Wide Web, they can
also be used to access information
provided by Web servers in private
networks or files in file systems. Some
browsers can also be used to save
information resources to file systems. The
major web browsers are Windows
Internet Explorer, Mozilla Firefox, Apple
Safari, Google Chrome, and Opera.
Below are the browsers and there release
dates.









Worldwide Web, February 26,
1991
Mosaic, April 22, 1993
Netscape Navigator and
Netscape Communicator, October
13, 1994
Internet Explorer 1, August 16,
1995
Opera, 1996,
Mozilla Navigator, June 5, 2002
Safari, January 7, 2003
Mozilla Firefox, November 9,
2004
Google Chrome, September 2,
2008
making a request for a specific resource
using HTTP and the server responds with
the content of that resource or an error
message if unable to do so. The resource
is typically a real file on the server's
secondary memory, but this is not
necessarily the case and depends on how
the web server is implemented While the
primary function is to serve content, a full
implementation of HTTP also includes
ways of receiving content from clients.
This feature is used for submitting web
forms, including uploading of files.
Web servers are not always used for
serving the world wide web. They can
also be found embedded in devices such
as printers, routers, webcams and serving
only a local network. The web server may
then be used as a part of a system for
monitoring and/or administrating the
device in question. This usually means
that no additional software has to be
installed on the client computer, since
only a web browser is required (which
now is included with most operating
systems).
Common features of web server:
5. What are Web servers?
A web server can be referred to as either
the hardware (the computer) or the
software (the computer application) that
helps to deliver content that can be
accessed through the Internet. The most
common use of Web servers is to host
Web sites but there are other uses like
data storage or for running enterprise
applications.
The primary function of a web server is to
deliver web pages on the request to
clients. This means delivery of HTML
documents and any additional content
that may be included by a document, such
as images, style sheets and Java Scripts. A
client, commonly a web browser or web
crawler, initiates communication by
1. Virtual hosting to serve many
Web sites using one IP address.
2. Large file support to be able to
serve files whose size is greater
than 2 GB on 32 bit OS.
3. Bandwidth throttling to limit the
speed of responses in order to not
saturate the network and to be
able to serve more clients.
4. Server-side scripting to generate
dynamic Web pages, still keeping
Web server and Web site
implementations separate from
each other.
satellite to the other end user's VSAT.
VSAT can handle up to 56 Kbps.
6. What do you understand by
VSAT?
VSAT stands for Very Small Aperture
Terminal. A VSAT is a small-sized
telecommunications earth station that
transmits and receives via satellite. The
terminal size is 0.75 to 3.8 meters in
diameter. VSAT systems generally connect
a large number of geographically
dispersed sites to a central location. VSAT
networks may transmit voice, data, fax, or
video conferencing.
A typical VSAT site consists of a parabolicshaped antenna mounted on the roof of a
building,
Connected by a cable to a chassis inside
the building. Operators install these
antennas at customer sites
and buy transmission capacity on
satellites. A typical VSAT unit contains a
modem for translating satellite
transmissions back into data (and vice
versa) and terrestrial interfaces for
connecting customer.
Very small aperture terminal, an
earthbound station used in satellite
communications of data, voice and video
signals, excluding broadcast television. A
VSAT consists of two parts, a transceiver
that is placed outdoors in direct line of
sight to the satellite and a device that is
placed indoors to interface the
transceiver with the end user's
communications device, such as a PC. The
transceiver receives or sends a signal to a
satellite transponder in the sky. The
satellite sends and receives signals from a
ground station computer that acts as a
hub for the system. Each end user is
interconnected with the hub station via
the satellite, forming a star topology. The
hub controls the entire operation of the
network. For one end user to
communicate with another, each
transmission has to first go to the hub
station that then retransmits it via the
VSATs are most commonly used to
transmit narrowband data (point of sale
transactions such as credit card, polling or
RFID data; or SCADA), or broadband data
(for the provision of Satellite Internet
access to remote locations, VoIP or video).
VSATs are also used for transportable, onthe-move (utilizing phased array
antennas) or mobile maritime
communications.
Most VSAT networks are configured in
one of these topologies:


A star topology, using a central
uplink site, such as a network
operations center (NOC), to
transport data back and forth to
each VSAT terminal via satellite,
A mesh topology, where each
VSAT terminal relays data via
satellite to another terminal by
acting as a hub, minimizing the
need for a centralized uplink site,
A combination of both star and mesh
topologies. Some VSAT networks are
configured by having several centralized
uplink sites (and VSAT terminals
stemming from it) connected in a multistar topology with each star (and each
terminal in each star) connected to each
other in a mesh topology. Others
configured in only a single star topology
sometimes will have each terminal
connected to each other as well, resulting
in each terminal acting as a central hub.
These configurations are utilized to
minimize the overall cost of the network,
and to alleviate the amount of data that
has to be relayed through a central uplink
site (or sites) of a star or multi-star
network.
Chapter 6 - Operating Systems
Activity A
List 5 different types of operating
systems
i) Real-time Operating System
ii) Multi-user and Single-user
Operating Systems
iii) Multi-tasking and Singletasking Operating Systems
iv) Distributed Operating System
v) Embedded System
Activity B
Using Google search collect more
information on “How memory works”.
Surf Minimum 3 different sites.
Wiki.answer.com
Computer memory consists of
rows and columns of tiny
transistors (junction nodes) where
electrical energy is at a certain
level or it's at zero - say 3v on one
transistor that is "on", 0.5v on the
next transistor that is "off".
Memory is binary - a sequence of
0's and 1' - off or on. It is broken
into bits (one 1 or 0), nibbles (4
ones or zeros), bytes (8 ones or
zeros) and so on (kilobytes,
megabytes, gigabytes, terabytes,
petabytes...)
www.ehow.com
The microcomputer has two types
of memory. The manufacturer
installs
machine-readable
instructions or programs in special
chips
on
the
computer's
motherboard.
Users
cannot
change the programs on these
chips. This type of memory is
Read Only Memory, or ROM.
These
instructions
help
your computer start up, find
drives and interpret commands
from your keyboard or other
input devices. They also help the
computer display information for
users in plain English or whatever
language the user chooses. The
memory that computer users
work with when creating, saving
and
retrieving
personal
information is Random Access
Memory, or RAM. Ram chips must
also
be
installed
in
a
microcomputer so that users have
a space in which they can load
software programs and files.
Memory Chips
Microcomputers have special
slots for RAM chips. Normally,
these
chips
work
in
pairs. Computers for sale today
have a minimum of 256
megabytes of RAM installed. Each
byte
roughly
equals
one
alphanumeric character, space or
punctuation
mark on
the
keyboard. A megabyte (MB)
equals 1,048,576 bytes. Many
newer computers and software
requires much more memory
than in the past. It is not
uncommon for microcomputers
to have 1 to 4 gigabytes of
random access memory installed
by the manufacturer. A gigabyte
(GB) of RAM equals roughly 1
billion bytes (1,073,741,824).
Some computers owners also
purchase additional RAM chips to
upgrade
their
computer's
memory, when they find that the
computer does not work quickly
enough or when they have
purchased a computer with a
small amount of RAM.
the hard drive is more efficient than
swapping them into and out of random
access memory.
All random access memory is
temporary. When users restart
the computer or turn it off, any
information in the computer's
RAM disappears. Most computer
users understand that they must
save files that are on the screen
before exiting the software
program they are using. Saving
the file makes a permanent copy
that you can load into the
computer's memory again. The
process of loading software
programs and files into a
computer's
random
access
memory is similar to removing
files from a file cabinet and
placing them on your desk. When
you have finished working with
the files, you will normally return
them to their place in the file
cabinet. This leaves your desk
clear for future tasks and lets you
easily find your files when you are
ready to work again. Just as each
file that you place on your desk
must have space, each byte of
information used on a computer
must have an assigned RAM
address.
Activity C
RAM
Virtual Memory
Microsoft Windows allows PC users to
increase the amount of memory that they
use while working with software and files
by using space on the hard drive.
Windows can extend the computer's RAM
by creating virtual memory, a special area
on the disk for swapping inactive and
active programs in and out of the
computer's memory. This additional
memory helps the computer work faster,
because processing temporary files from
List 3 different types of operating
systems used for networking
i) Windows NT Server
ii) Windows 2000 Server
iii) UNIX
Activity D
Using Internet, Surf Microsoft & Sun
Micro Systems site. Find out
Programming languages Compilers and
interprets they provide.
Microsoft:
- Visual C
- Visual C ++
- Adat
- COBOL
- Perl
- Python
- Mercury
Sun Micro System:
- Java
- Fortran
- Algol
Review Questions
1. What do you understand by
Memory Management?
A> Refers to a variety of methods used to
store data and programs in memory, keep
track of them and reclaim the memory
space when they are no longer needed. It
also includes virtual memory, bank
switching and memory protection
techniques.
Memory management is the act of
managing computer memory. In its
simpler forms, this involves providing
ways to allocate portions of memory to
programs at their request, and freeing it
for reuse when no longer needed. The
management of main memory is critical to
the computer system.
Virtual memory systems separate the
memory addresses used by a process
from actual physical addresses, allowing
separation of processes and increasing
the effectively available amount of RAM
using disk swapping. The quality of the
virtual memory manager can have a big
impact on overall system performance.
Garbage collection is the automated
allocation and deallocation of computer
memory resources for a program. This is
generally
implemented
at
the
programming language level and is in
opposition
to
manual
memory
management, the explicit allocation and
deallocation of computer memory
resources.
Region-based
memory
management is an efficient variant of
explicit memory management that can
deallocate large groups of objects
simultaneously.
2. Comment on the role of
operating system as a system
software
A> Without an operating system, a
computer is little more than a bundle of
plastic, metal, and a few bits of expensive
silicon. Whereas most software runs on a
computer, the operating system is the
software that runs the computer.
System Functions
1. An operating system is the software
that tells the computer how to work.
It handles the memory management,
file storage, and allocation of
resources for the software that runs
on the computer. It also handles all
of the software drivers for the
various bits of hardware that make
up the computer, as well as
peripherals such as printers, mice
and anything else a user might
connect.
User Functions
2. The operating system handles all of
the interactions between the user
and the computer. It presents the
file structure of a hard drive in a
manner that a user can understand,
rather than in the series of ones and
zeroes that it actually is. The
operating system also converts the
physical motions of the user--such as
moving the mouse or typing on the
keyboard--for the computer.
Framework
3. By providing a standard framework
for software development, an
operating system presents a broad
and relatively simple target for
software developers. Without this,
software development becomes very
difficult, involving attempts to
develop for every single hardware
combination. Developing for an
operating system, developers can
work secure in the knowledge that
their software will work anywhere
that the operating system will.
3. Explain the goals of operating
system
A> To Execute user program easier. To
solve the user problem easily. To make
the computer system convenient to use.
You want to be able to load applications,
provide for multitasking either through
timeslice
or
priority/interrupt
mechanisms, you want to be able to
detect a deadlock/race condition and take
an appropriate action to resolve the issue,
you want to have interprocess
communication of some kind, you want to
provide communication services for
different types of hardware and logical
communication constructs, you want to
provide "virtual memory" for applications
that are larger than physical memory, you
want to be able to send a "signal" to
process that are waiting for events such
as serial I/O and you want to provide user
security so that users can have a
workspace that cannot be "hacked".
Above all, you need to provide access
limitations so that viruses cannot gain
control. Read about UNIX/Linux. In my
opinion it's about as close to a perfect OS
as can be found.
An operating system has two goals
- efficient use of a computer system &
- user convenience
an operating system must not only ensure
efficient use of a computer system, but
also provide user convenience.
Facet of user convenience
facets
example
necessity
ability to execute programs, use the file
system
good service
speedy response to computational
requests
user friendly OS
easy-touse commands, Graphical user interface
(GUI)
new programming
concurrent programming model
features for experts
means to set up complex computational
structures
web-oriented features
means to
set up web-enabled servers
evolution
ability to add new features, use new
computers
Chapter 7 – Other Systems and
Application Software
Activity A
Explain 7 layers of conceptual model of
networking systems
i) Layer 7:Application Layer
Defines interface to user
processes for communication
and data transfer in network.
Provides
standardized
services such as virtual
terminal, file and job transfer
and operations
ii) Layer 6:Presentation Layer
Masks the differences of data
formats between dissimilar
systems.
Specifies
architectureindependent data transfer
format
Encodes and decodes data;
Encrypts and decrypts data;
Compresses
and
decompresses data
iii) Layer 5:Session Layer
Manages user sessions and
dialogues
Controls establishment and
termination of logic links
between users
Reports upper layer errors
iv) Layer 4:Transport Layer
Manages end-to-end message
delivery in network
Provides
reliable
and
sequential packet delivery
through error recovery and
flow control mechanisms
Provides
connectionless
oriented packet delivery
v) Layer 3:Network Layer
Determines how data are
transferred between network
devices
Routes packets according to
unique
network
device
addresses
Provides flow and congestion
control to prevent network
resource depletion
vi) Layer 2:Data Link Layer
Defines
procedures
for
operating the communication
links
Frames packets
Detects and corrects packets
transmit errors
vii) Layer 1:Physical Layer
Defines physical means of
sending data over network
devices
Interfaces between network
medium and devices
Defines optical, electrical and
mechanical characteristics
Activity B
List out 5 viruses commonly affect your
computer system
i) Macro virus
This type of virus usually
comes as part of a document
or spreadsheet, often in
email.
Examples: The Melissa and
ILOVEYOU.
ii) Boot sector virus
This type of virus overwrites
the boot sector on your hard
drive or floppy drive.
Examples: NYB, AntiExe, and
Unashamed
iii) File infector virus
This type of virus attaches
itself to executables, for
example .com and .exe files.
Examples: Jerusalem and
Cascade viruses
iv) Stealth virus
This type of virus tries to fool
antivirus software by catching
its requests to the operating
system (asking to open a file,
for example).
Examples: The FRODO or
4096 virus
v) Self-modifying virus
This type of virus was
designed to avoid detection
by antivirus software by
changing itself internally.
There are two types of selfmodifying viruses:
(1) Polymorphic virus - a
polymorphic virus infects
files
with
modified
(usually
encrypted)
operational versions of
itself, which it decrypts
before executing. The
"Dark Avenger's Mutation
Engine" (also known as
MTE or DAME) has been
released by virus writers
to add this capability to
any virus, but is now
detectable
by
most
antivirus tools.
(2) Metamorphic virus - a
metamorphic
virus
rewrites itself completely
each time it infects a new
executable. An example
of a metamorphic virus is
Win95.Zmist.A.
Activity C
List out 5 Anti Viruses Software popularly
used to protect computer system
i) Norton
ii) Kaspersky
iii) McAfee
iv) Trend Micro Titanium
v) Quick Heal
Activity D
Using internet search, surf for minimum
3 sites and collect information on ERP.
i)
wikipedia.org
Enterprise
Resource
Planning (ERP)
integrates
internal
and
external management
information across an entire
organization,
embracing
finance/accounting, manufact
uring, sales and service, etc.
ERP systems automate this
activity
with
an
integrated software applicatio
n. Its purpose is to facilitate
the flow of information
between
all
business
functions
inside
the
boundaries
of
the
organization and manage the
connections
to
outside
stakeholders.
www.erpwire.com
Advantages and Disadvantages of ERP
The foremost advantage of an ERP system
is bringing down the costs and saving the
valuable time which would have
otherwise been wasted in procedural
maneuvers and unwanted delays.
Different software programs maintained
in the departments were proving to be a
great hurdle. Since ERP is a uniform
platform it ensures that there is no
discrepancy in the information that is
processed.
Industry wise advantages
Manufacturing Sector Speeding up the whole
process.
Distribution and retail Stores Accessing the status of the
goods
Transport Sector - Transmit
commodities through online
transactions.
Project Service industry Fastens the compilation of
reports.
Advantages in a corporate
entity
The accounts department
personnel
can
act
independently. They don't
have to be behind the
technical persons every time
to record the financial
transactions
Ensures quicker processing of
information and reduces the
burden of paperwork.
Serving
the
customers
efficiently by way of prompt
response and follow up.
Disposing
queries
immediately and facilitating
the payments from customers
with ease and well ahead of
the stipulated deadline.
It helps in having a say over
your competitor and adapting
to the whims and fancies of
the market and business
fluctuations.
The
swift
movement of goods to rural
areas and in lesser known
places has now become a
reality with the use of ERP.
The database not only
becomes user friendly but
also helps to do away with
unwanted
ambiguity.
ERP is suitable for global
operations as it encompasses
all the domestic jargons,
currency conversions, diverse
accounting standards, and
multilingual facilities .In short
it is the perfect commercial
and scientific epitome of the
verse "Think Local. Act
Global".
ERP helps to control and data
and facilitates the necessary
contacts to acquire the same.
Disadvantages
(1) ERP calls for a voluminous
and
exorbitant
investment of time and
money. The amount of
cash required would even
be looming on the
management given the
fact that such an outlay is
not a guarantee to the
said benefits but subject
to
proper
implementation, training
and use.
(2) In the ever expanding era
of information theft ERP
is no exception.
(3) It is alarming to note the
time taken to implement
the system in the
organization.
These
means large amounts of
workers have to shun
their regular labor and
undertake training. This
not only disturbs the
regular functioning of the
organization but also runs
the organization in the
huge risk of losing
potential business in that
particular period.
(4) There are great benefits
rendered by the system.
On the other hand when
one thinks of this
information reach in the
hands of undeserving
persons who could do
more than misuse ,it is
evident that there is no
way of ensuring secrecy
of information and larger
chances of risk will be
generated as long as they
are in the public domain.
ii) www.erpsoftware360.co
m
Top
5 On-Premise
Enterprise Resource Planning
(ERP) Software Systems
(a) Epicor
(b) Infor
(c) Microsoft Dynamics
(d) Oracle
(e) SAP
Review Questions
1. Explain what are computer viruses,
illustrate your answer with types and
how they affect different areas of
computer
Meaning: Virus" is an umbrella
term used to describe malicious
programs that unwantedly install
themselves
onto
your
computer. Viruses will cause you
a range of damage, from the very
mild to the entire loss of your
computer data.
A good way to describe viruses is
to call them "malware", or
software programs that have
malicious intent.
Viruses/malware are commonly
broken down into:
Classic Viruses - rewrite existing
computer code on your computer
Trojans - are additions to your
system
Worms - they copy themselves
without your direct assistance
Adware and spyware -These
programs "lurk" on your machine
1. What do you understand by
application software? Illustrate
your answer with examples
Application software is software
which helps perform a specific
business function. It make the
computer useful to the user.
Canned Software: Application
software
like
spreadsheet
programmes can be used quite
easily as one would eat canned
food are known as canned
software
Packages Solutions: vendors who
have expertise in a specific
functional area or a specific
domain such as banking etc use
their expertise to develop
softwares which can perform one
or more functions within that
domain.
Enterprise Management Systems:
Packaged solutions which cover
the functioning of the entire
enterprise would be called as
Enterprise Management Systems
Custom Build Application: It can
be termed as in-house software
developed by MNC and big
Companies
as
per
their
requirements.
2. As a Marketing Manager What
criteria will you adopt for selecting
ERP software
A> Criteria #1–A Future Proof Decision
Criteria #2–Rock-Solid Solutions
Criteria #3–Replacement Know-How
Criteria
#4–Elimination
of
Implementation Guesswork
Criteria #5–Tailor-Made Business Fit
The Roadmap
System Settings
Tools to Customize Your System
Advanced Tools
Portals
Criteria #6–Industry Expertise
Criteria #7–Sound Financial Foundation
Criteria #8–Stacking the Technology Odds
in Your Favor
Service-Oriented Architecture
Benefits of SOA to Business
Criteria #9–A Testament to Scalability
Criteria #10–Community Collaboration:
Maximizing Customer Moments Of Truth
Remote Consulting
Client List Server and Data Access
On-Call Web Conferencing User Support
Web-Based Training and Solution
Webinars
Criteria #11–Integrity and Dedication
Criteria #12–Delivering Return on
Investment
Chapter 8 - Database Management
System
Activity A
List out 3 OEM who supply DBMS
Software (use internet search engines to
collect data)
i. Oracle
ii. IBM
iii. Symbian
Activity B
List out 3 OEM who supply SQL Software
(use internet search engines to collect
data)
i. Oracle
ii. Microsoft
iii. IBM
Activity C
Using internet browse IBM site and find
out what business strategy used for
promoting DB2 database against Oracle
RDBMS
DB2 9.7: Run Oracle applications on DB2
9.7 for Linux, Unix, and Windows
DB2 9.7 gives applications
developed on Oracle a bear hug
with PL/SQL support, and more
IBM DB2 9.7 for Linux, UNIX, and
Windows has
out-of-the-box
support for Oracle's SQL and
PL/SQL dialects. This allows many
applications
written
against
Oracle to execute against DB2
virtually unchanged. In this article,
get a high-level overview of what
Oracle compatibility means in
DB2. Whether you want to switch
your custom application to DB2 or
extend your DBMS vendor
support to DB2, now is your time.
DB2 9.7 adds Oracle compatibility
features. Enabling an Oracle
application to DB2 becomes no
more complex than enabling a CProgram written for HP-UX to run
on AIX.
Review Questions
1. As a purchase manager what
features would you look for
purchasing DBMs
- Stock management system
- Purchase order creation
-
Receipt
Issue
Rejection
Monthly ledger
Other transactions related to
store
and
purchase
department
o
o

2. How does A DBMS store information
A> Database tables/indexes are typically
stored on hard disk in one of many forms,
ordered/unordered Flat files, ISAM,
Heaps, Hash buckets or B+ Trees. These
have
various
advantages
and
disadvantages discussed in this topic. The
most commonly used are B+trees and
ISAM.
Unordered
Unordered storage typically stores the
records in the order they are inserted.
While having good insertion efficiency (),
it may seem that it would have inefficient
retrieval times (), but this is usually never
the case as most databases use indexes
on the primary keys, resulting in or for
keys that are the same as database row
offsets within the database file storage
system, efficient retrieval times.
Ordered
Ordered storage typically stores the
records in order and may have to
rearrange or increase the file size in the
case a record is inserted, this is very
inefficient. However is better for retrieval
as the records are pre-sorted, leading to a
complexity of.
Structured files
Heaps
 simplest and most basic method
o insert efficient, records
added at end of file –
‘chronological’ order
o retrieval inefficient as
searching has to be linear
o deletion – deleted records
marked
requires periodic reorganization if file is
very volatile
 advantages

good for bulk loading data
good for relatively small
relations as indexing
overheads are avoided
o good when retrievals
involve large proportion
of records
disadvantages
o not efficient for selective
retrieval using key values,
especially if large
o sorting may be timeconsuming
not suitable for ‘volatile’ tables
Hash buckets
 Hash functions calculate the
address of the page in which the
record is to be stored based on
one or more fields in the record
o Hashing functions chosen
to ensure that addresses
are spread evenly across
the address space
o ‘occupancy’ is generally
40% – 60% of total file
size
o unique
address
not
guaranteed so collision
detection and collision
resolution
mechanisms
are required
 open addressing
 chained/unchained overflow
 pros and cons
o efficient
for
exact
matches on key field
o not suitable for range
retrieval, which requires
sequential storage
o calculates
where the
record is stored based on
fields in the record
o hash functions ensure
even spread of data
o collisions are possible, so
collision detection and
restoration is required
B+ trees
These are the most used in practice.



the time taken to access any tuple
is the same because same
number of nodes searched
index is a full index so data file
does not have to be ordered
Pros and cons
o versatile data structure –
sequential as well as
random access
o access is fast
o supports exact, range,
part key and pattern
matches efficiently
o ‘volatile’ files are handled
efficiently because index
is dynamic – expands and
contracts as table grows
and shrinks
o less
well suited to
relatively stable files – in
this case, ISAM is more
efficient
ISAM
ISAM stands for Indexed Sequential
Access Method, a method for indexing
data for fast retrieval. ISAM was originally
developed by IBM for mainframe
computers. Today the term is used for
several related concepts:



Specifically, the IBM ISAM
product and the algorithm it
employs.
A database system where an
application developer directly
uses an Application Programming
Interface to search indexes in
order to locate records in data
files. In contrast, a relational
database uses a query optimizer
which
automatically
selects
indexes.
An indexing algorithm that allows
both sequential and keyed access
to data. Most databases now use
some variation of the B-Tree for
this purpose, although the original
IBM
ISAM
and
VSAM
implementations did not do so.

Most generally, any index for a
database. Indexes are used by
almost all databases, both
relational and otherwise.
How Does My Data Get Stored?
How the data is stored in a database is
probably much simpler than you might
think. Databases use a series of Tables to
store the data. A table simply refers to a
two dimensional representation of your
data using columns and rows. For
example:
Joh
Smith
n
jsmith@huh.com
Paul
McCartne
paul@beatles.com
y
Bill
Murray
gopher@caddyshack.co
m
So, then, how does the database keep
things straight? Well, first each database
table is given a unique name. Without a
unique name the DBMS (Data Base
Management System) would get very
confused. Next, each column in the table
is given a unique name. In our example
above it would be something like first
name, last name, email. This doesn't
mean each column that you name has to
be unique within the entire database. It
only has to be unique within the table you
have created. Also notice that the names
don't use any spaces. When naming tables
and columns be sure to keep it simple
with letters and numbers. Spaces and
symbols can be illegal characters that will
mess up the whole works, so if you need
to clarify a name use the "_" instead of
spaces. Let's update our table now:
Table name: contacts
first_na
last_na
email
me
me
John
Smith
Paul
McCartn
paul@beatles.com
ey
Bill
Murray
jsmith@huh.com
gopher@caddyshack.
com
3. Describe SQL with examples (refer to
internet)
SQL
was
developed
at IBM by Donald
D.
Chamberlin and Raymond
F.
Boyce in the early 1970s. This
version,
initially
called SEQUEL (Structured English
Query Language), was designed
to manipulate and retrieve data
stored in IBM's original quasirelational database management
system, System R, which a group
at IBM San Jose Research
Laboratory had developed during
the 1970s. The acronym SEQUEL
was later changed to SQL because
"SEQUEL" was a trademark of
the UK-based Hawker
Siddeley aircraft company.
Examples:
- creating a table
- creating a view
- inserting rows
- updating rows
- deleting rows
- commit -- making changes
permanent
- rollback -- undoing temporary
changes
- enforcing integrity constraints
- using an Embedded C
program
Section 2 – Management Information
Systems
over the year. Thus the conversion of raw
data to some logic/meaning is called
information.
Chapter 1 - Key Definition
Activity A
? Using internet search engine collect
definition of “Data & Information”
Activity B
? Using internet search engine collect
definition of “system concept”
Activity C
? Using internet search engine collect
definition of “Data & Information”
Review Questions
1. How do you relate data and
information? Illustrate with
examples.
Answer:
Data: is the raw form consisting of values
relating to various actions, transactions or
objects.
It may be in the form of text, images,
voice and may represent quantities or
qualities of object.
Information: is the data that has been
processed in a form that is meaningful
and is of real or perceived value in current
or prospective actions or decisions.
Illustration: Leave Records of employee in
an organization.
Data: When a report is generated for
leaves, an excel spreadsheet is produced
by the leave management system. The
leave are generated is a way wherein
month-wise data is available in
chronological order for all employees.
Information: Changing the data to
information is a process in itself. The
above data can be converted to
information by making a pivot out of the
excel spreadsheet against each employee.
In this manner, one can view how many
days of leaves has an employee taken
2. What do you understand by System
Concept?
Answer:
 System concepts provide a useful
framework for describing and
understanding
many
organizational
phenomena
including features of information
system.
 It can be abstract or physical.
Abstract system is an orderly
arrangement of interdependent
ideas or constructs. Physical
system is a set of elements which
operate together to accomplish
an objective.
 Each system is made up of
subsystems and each subsystem is
made up of other subsystems.
Each subsystem is being defined
by its boundaries. This system is
useful in analysis and designing
info systems.
 Systems are classified into
deterministic v/s probabilistic and
closed v/s open systems
 Systems have goal and there may
be various paths to reach the
goal, this is called equi-finality. A
business organization is a system
and every business organization
has a goal to serve a specific
business community or a social
cause. The business organization
can do so by selecting the target
group. Irrespective of the path
taken, it would head towards
reaching the goal.
 Hence from the above, it is clear
that subsystems must be aligned
to the organization’s goal and
from the point of view of
understanding and designing the
info systems, we must ensure that
the functional subsystem which
we are trying to understand or
design is indeed aligned with
organizational goals.
System concept makes it very clear that it
is a flow of event that leads to goal with
various paths by different ways and
means.
3. What do you understand by Value of
Information?
Answer:
 It is the value of change in
decision behavior caused by the
information minus the cost of
obtaining the information.
 In other words, given a set of
possible decisions, a decision
maker will select the one on the
basis of information at hand.
 If new information causes a
different decision to be made, the
value of the new information is
the difference between the
outcome of the old decision and
that of the new decision, minus
the cost of obtaining the new
information.
 Since information reduces a risk,
the probability of risk is multiplied
by the value of the decision would
give the expected value of the
decision.
 Any info which eliminates the risk
factor would have a value at least
equal to the expected value of the
decision.
 Utility of information and
therefore value of information
can be expressed in terms of
form, time and place.

The emphasis is on providing the
right information, to the right
person at the right time and in
right form. If any of these is
incomplete, the value of the
information supplied is diluted.
Chapter 2 - The Data cycle
Activity A
Identify 3 cases where you can apply
concept of data cycle
Activity B
Collect more information on “Data entry”
(Browse minimum 3 sites)
Ans:
The process of entering data into a
computerized database or spreadsheet.
Data entry can be performed by an
individual typing at a keyboard or by a
machine entering data electronically.
Data entry is the act of transcribing some
form of data into another form, usually a
computer program. Forms of data that
people might transcribe include
handwritten documents, information off
spreadsheets from another computer
program, sequences of numbers, letters
and symbols that build a program, or
simple data like names and addresses.
Some people perform jobs that are
exclusively data entry, while others, like
programmers, might have to occasionally
enter data.
Since the advent of computers, and since
the beginning of typing, the need to
collect and neatly present documents has
required data entry. Good typists,
especially those who are also excellent at
10-key typing often are the most qualified
for data entry positions. On the other
hand, many computer programmers are
not terrific typists but still plow their way
through inputting code into programs
when needed.
Data entry requires focus and
concentration, and some find the work
exhausting and even challenging to the
body. For any person who types all day,
paying attention to maintaining good
posture, typing in an ergonomically sound
position, and taking breaks for the eyes
and hands are all important. Most experts
in workplace ergonomics suggest that
people entering long streams of data
should take a break at least once an hour
by moving away from the computer
screen. Hand exercises and stretching
exercises for the body may also help
prevent typing related injuries like carpal
tunnel syndrome
Activity C
Collect information on Data Achieves.
Ans
Data archiving is the process of moving
data that is no longer actively used to a
separate data storage device for longterm retention. Data archives consist of
older data that is still important and
necessary for future reference, as well as
data that must be retained for regulatory
compliance. Data archives are indexed
and have search capabilities so that files
and parts of files can be easily located and
retrieved.
Data archiving is more important in some
fields than others. In a few fields, all of
the data necessary to replicate the work is
already available in the journal article. In
drug development, a great deal of data is
generated and must be archived so
researchers can verify that the reports the
drug companies publish accurately reflect
the data
The Archive provides assistance in
locating data and documentation as
needed by researcher, students, and
faculty. Users consult with Archive staff to
identify research interests and to select
data appropriate for specific projects.
Assistance is also provided in using
printed codebooks and other
documentation. When useful materials
have been identified, the staff makes data
accessible in the computing environment
and platform preferred by individual
users. Technical consulting is provided for
file transfer and access, and other
computing questions.
2. Consider yourself in the role of HR
manger, what type of data we
require to generate MIS for HR
management.
Data archives are often confused with
data backups, which are copies of data.
Data backups are used to restore data in
case it is corrupted or destroyed. In
contrast, data archives protect older
information that is not needed for
everyday operations but may occasionally
need to be accessed.
Ans:
Review Questions
1. What type of data is required in
service industry illustrate your
answer with minimum three sectors?
1. Tourism Services - Data required
like place to go & time takes to go
their. What is the medium to
travel? Which are the spots to
travel? What type of food is
available their. How many should
be their in a group.
2. Advertising Services - data
required like what is the budget.
What is the product to advertise
to which section of the society it
belongs ie its popularity. What are
the plus points of products? Who
is the brand ambassador of the
product?
3. Restaurant Services - Where it is
located ie what type of area.
What should be the food items to
keep? What is the daily
requirement of raw ingredients?
Human Resource
Management information systems are
concerned with activities related to
workers, managers, and other individuals
employed by the organization. Because
the personnel function relates to all other
areas in business, the human
resources management information
system plays a valuable role in ensuring
organizational success.
Activities performed by the human
resources management information
systems include, work-force analysis and
planning, hiring, training, and job
assignments.
The above are examples of the
major management information systems.
There may be other management
information systems if the company is
identified by different functional areas.
Functions:
Benefits administration,
Payroll,
Recruiting
Training,
Performance analysis and review into one
package…
Consider yourself in the role of finance
manager, what type of data you require
to generate MIS for top management.
Financial MIS Provides financial
information to all financial managers
within an organization. It integrates
financial & operational information from
multiple sources. Financial MIS eases
o
analysis by providing fast financial data. It
Profit/loss and cost
systems
enables financial analysis from different
o
Auditing
aspects; time, product, customer. With
o
Internal auditing
Financial MIS, one can analyze historical
o
External auditing
and current data. Also one can monitor
o
Uses and management of
use of funds. Few examples or functions
of Financial MIS are Costing, P&L
reporting, Auditing, Funds management,
etc.
Inputs to the Financial Information
System

Strategic plan or corporate
policies
o
Contains major financial
objectives and often
projects financial needs.

Transaction processing system
(TPS)
o
Important financial
information collected
from almost every TPS –
payroll, inventory control,
order processing,
accounts payable,
accounts receivable,
funds
3. ? Consider yourself in the role of
finance manager, what type of Data
you require to generate MIS for top
management
Data required like-
how much is the
production cycle
ie what time Raw
Material take to
become finished
product.
What is the Net
profit after tax &
why it is low or
high as compare
to past years?
What are the
various ratios eg Profit
earning ratio, debt-equity
ratio.
Is their any
requirement of
more capital to
expand business if
the top
management
wants to.
general ledger.
o
External sources
o
Annual reports and
financial statements of
competitors and general
news items.
Financial MIS Subsystems and Outputs

Financial subsystems
4. ? Consider yourself in the role of
Marketing Manager, what type of
data you require to generate MIS for
top management
Data required like-
The product fall
in which section
of the society &
also in which
generation it is
useful.
What are the
positive & negative points
of our product?
What are the
competitive products in
market & their positive &
negative points?
What is the
budget given by top
management & How to
utilize it?
How we can
improve our sales
eg giving bumper
offer, giving some
other product
free of cost,
reducing the
current price.
Chapter 3 - Need for Information
/Information systems in organization
Activity A
Identify need of information in transport
industry
well we need IT support in transport
industry in Airplane Railway and
Roadways
Airplane -: Systems regarding Radar
maintain air traffic
Railways-: Metro Rails
Roadways-: Maintain Signals
Activity B
? Identify need of information in tourism
Tourism need it in giving better service's
and highly equipped prompt services
Eg -: ticket booking online any where
paying through online bank a\a
Review questions
1. Explain? Why information has no
specification but it has character
& value
The information is use to come to
a conclusion. A decision that can
bring change in your company
either way. But due to the human
character everyone thinking point
of view is different. That’s why
even same information can lead
to different decisions by different
persons. eg Company offers 25%
discount on their product this is
the information, One may think
that they reduce the price I must
try it once atlaest, the other may
think that they reduce the price
means they must sacrifice with
the quality so may not buy it.
2. Can value of information be
improved?
Yes it can be improved and it is improving
also.
3. Is value of information is person
dependent
Yes it is dependent upon the person how
it is uses the information.
4. Can information have a value
which is person independent
Yes he uses the information right way and
becomes independent.
Chapter 4 - Types of Information Systems
in an organization
Activity C
Activity A
? List information needs at 3 level of
management for operations.
Collect more information on “B2B” ebusiness model” (Browse minimum 3
sites)
A business-to-business (B2B) wholesale
distributor refers to a business that
moves products through the supply
chain by purchasing from manufacturers
and
selling to retailers, other
manufacturers, or assemblers. Typically, a
B2B
wholesale distributor does not sell
to the end consumer.
Sites-: 1. wwwWorldofTrade.com
2. www.b2bbyte.com
3. www.yahoo.com
Activity B
Collect more information on “B2C e
business model” (Browse minimum 2
sites)
1. www.EBay.com
2. www.rediff.com
3. www.yahoo.com
Activity C
Collect more information on
“Components of DSS” (Browse minimum
3 sites)
Decision support systems are gaining an
increased popularity in various domains,
including business, engineering, the
military, and medicine. They are especially
valuable in situations in which the
amount of available information is
prohibitive for the
intuition of an unaided human
decision maker and in which precision and
optimality
are of importance.
Sites-:1.www.e-optimization.com
2. www.dmreview.com and
3. www.datawarehouse.com.
Activity D
Collect more information on “Expert
Systems” (Browse minimum 3 sites)
www.pcai.com
www.expss.com
www.tesl.com
Review Questions
1. Explain how a good information
system affects the following
persons in the organizations
a. Finance controller
To analysis of the charts
calculation of risk to maintain.
b. Store dispatch clerk
Maintain records of goods .
2. Explain how a good information
system affects the following
persons in the organizations
a. Materials manager
1. Quality Of product.
2. Quantity of a product.
b. Quality Control Manager
If the quality is good the product
is passed or else the quality is
failed by
system then it is rejected.
3. What type information systems
required in co-operative sectors
like sugar industry?
To operate big hi-tech machines in sugar
industry there is use of system in these
kind of industry
Chapter 5 - Information Reports in an
organization
Review Questions
1. What are structured reports?
There are reports required for internal
management needs and are of a recurring
nature. From these reports, frontline
management can monitor the business.
Reporting requirements can be classified
on the relative structure of the
information and its usage. Structured
reports are well formed and structured
with a pre determined format frequency
etc.
2. What are the characteristics of
MIS reports?
Management uses MIS to recognize,
monitor, measure, limit and manage risk
of a business. For effective management
MIS reports must contain the following
elements :Timeliness: This requires an MIS to
provide
and
distribute
current
information promptly to the appropriate
users.
Accuracy: Inaccurate data can blur the
true picture of an organization. Therefore,
information should receive appropriate
editing, balancing, and internal control
checks.
Consistency: This requires data to be
collected and reported uniformly. If data
are not collected and reported
consistently, analysis can be inaccurate.
Completeness: To make appropriate
decisions, management needs reports
that contain all pertinent information in a
summarized format.
Relevance: If a report includes
inappropriate, unnecessary information,
or if the information is too detailed,
management may have difficulty sorting
what is important from what is not,
diminishing the data’s value.
Reliability and Objectivity: This indicates
the level of trust which can be placed on
the MIS. This stems from the reliability of
the source of the data used for the MIS.
When the source of information is
authentic and they are clearly defined and
have measureable parameters the
reporting tends to be reliable and
objective.
3. What do you understand by
“Presentation Bias”?
Presentation Bias is a term which
describes how a reader of a report can be
‘influenced’ towards a specific direction of
thinking based on the manner in which
data is presented. It is important to know
that influence or bias can be used in a
positive manner to stimulate positive, just
and necessary action or it can be used
with bad intention by de- emphasising
problem areas, diverting attention to
trivial areas by highlighting them etc.
System designers must learn to use
Presentation Bias positively to enhance
the impact of the MIS reports which they
design.
Chapter 6 - Determining Information
needs
Activity A
Using internet Browse & collect on
“System analysis”
Systems analysis is "an explicit formal
inquiry carried out to help someone
(referred to as the decision maker)
identify a better course of action and
make a better decision than he might
otherwise have made." Systems analysis
is the study of sets of interacting entities,
including computer systems analysis. This
field is closely related to requirements
analysis or operations research. The
terms analysis comes from Greek where
they mean respectively "to take apart”.
Analysis is defined as the procedure by
which we break down an intellectual or
substantial whole into parts.
The characteristic attributes of a problem
situation where systems analysis is called
upon are complexity of the issue and
uncertainty of the outcome of any course
of action that might reasonably be taken.
Systems analysis usually has some
combination of the following:
identification an alternative courses of
action; examination of the probable
consequences of the alternatives in terms
of costs, benefits, and risks; presentation
of the results in a comparative framework
so that the decision maker can make an
informed choice from among the
alternatives. The typical use of systems
analysis is to guide decisions on issues
such as national or corporate plans and
programs, resource use and protection
policies, research and development in
technology, regional and urban
development, educational systems, and
health and other social services. Clearly,
the nature of these problems requires an
interdisciplinary approach. There are
several specific kinds or focuses of
systems analysis for which different terms
are used: A systems analysis related to
public decisions is often referred to as a
POLICY ANALYSIS systems analysis that
concentrates on comparison and ranking
of alternatives on basis of their known
characteristics is referred to as decision
analysis.
Activity B
Using Internet Browse & Collect
Information on “Method adopted in
system study”
There are a number of different
approaches to system analysis. When a
computer-based information system is
developed, systems analysis would
constitute the following steps:
1. The development of a feasibility
study, involving determining
whether a project is economically,
socially, technologically and
organizationally feasible.
2. Conducting fact-finding measures,
designed to ascertain the
requirements of the system's endusers. These typically span
interviews, questionnaires, or
visual observations of work on the
existing system.
3. Gauging how the end-users would
operate the system (in terms of
general experience in using
computer hardware or software),
what the system would be used
for etc.
Another view outlines a phased approach
to the process. This approach breaks
systems analysis into 5 phases:
1. Scope definition
2. Problem analysis
3. Requirements analysis
4. Logical design
5. Decision analysis
Use cases are a widely-used systems
analysis modeling tool for identifying and
expressing the functional requirements of
a system.
Activity C
Using internet browse & collect
information on “IEEE standards for SRS
documentation”
1) All documents should have a title page
(to include information such as: title of
the project, course name and number,
team members, place, date, and other
relevant information).
2 )Table of Contents so should be included
as well
3 )Number all sections in the document.
4 )Any reference should be written as
follows:
-For books, manuals etc
[number] NameOfAuthor(s), titleOfWork,
Publisher, Place, Date
-For papers/articles:
[number] NameOfAuthor(s),
TtitleOfWork, JournalName,
VolumeNumber,
IssueNumber, PageNumbers Year
-For papers in Conference Proceedings:
[number] NameOfAuthor(s),
TtitleOfWork, Phrase “Proceedings of the”
Conference
Name, Place, Date[, Publisher, Place Date]
-For websites:
[number] AuthorNames(s), TitleOfWork,
Company’s Name, Place, Date, URL
5 )Do not end section titles with
colons.
6) Every figure/diagram should have a
caption (number and titile). Place it
underneath
the figure/diagram.
7) Every table should have a number and
title, placed above the table.
3. What is the purpose DFD & how
it is different from flow diagram
The program flowchart describes boxes
that describe computations, decisions,
interactions & loops. It is an important to
keep in mind that data flow diagrams are
not program flowcharts and should not
include control elements . A good DFD
should



have no data flows that split up
into a number of other data flows
have no crossing lines
not include flowchart loops of
control elements
Review Questions
1. What tools are used for system
analysis
Tools for system analysis includea. Data flow method
b. Decision analysis
c. Object analysis.
2. What is difference between
system study & System analysis
System analysis is the process of
successively decomposing a system into
its constituent sub- systems till we gain
clarity about how each function is
performed. This can be done using data
flow, decision analysis and objective
analysis.
System study is a formal process of
gathering everything relevant from the
standpoint of gaining clarity abt the
functioning of a system.it also includes
understanding the potential users and
their expectations abt the system.This can
be done by tracking the workflow, one on
one interviews, structured questionaires
etc
not include data flows that act as signals
to activate processes.
Chapter 7 Determining Information
needs – CSF method
Activity A
Using internet surf & collect information
on “CSF”
Critical success factor (CSF) is the term for
an element that is necessary for an
organization or project to achieve its
mission. It is a critical factor or activity
required for ensuring the success of a
company or an organization. The term
was initially used in the world of data
analysis, and business analysis. For
example, a CSF for a successful
Information Technology (IT) project is
user involvement. "Critical success factors
are those few things that must go well to
ensure success for a manager or an
organization, and, therefore, they
represent those managerial or enterprise
area, that must be given special and
continual attention to bring about high
performance. CSFs include issues vital to
an organization's current operating
activities and to its future success."
Activity B
Activity B
You are working as manager in courier
service prepare CSF for your juniors
Using Internet surf & collect information
on “Levelling of DFD”

1. Definition:
Data Flow Diagramming is a means of
representing a system at any level of
detail with a graphic network of symbols
showing data flows, data stores, data
processes, and data sources/destinations.
As a manager in courier service
Critical success factor will be the type
of courier, its urgency, ensuring ways
to deliver it on time, issuing of
received signature from the recipient
and regular reporting of the staff
members.
Chapter 8 - Determining information
needs – Data Flow Method
Activity A
Using internet surf & collect information
on “DFD”
A data flow diagram (DFD) is a graphical
representation of the "flow" of data
through an information system. DFDs can
also be used for the visualization of data
processing (structured design).On a DFD,
data items flow from an external data
source or an internal data store to an
internal data store or an external data
sink, via an internal process. A DFD
provides no information about the timing
of processes, or about whether processes
will operate in sequence or in parallel. It is
therefore quite different from a
flowchart, which shows the flow of
control through an algorithm, allowing a
reader to determine what operations will
be performed, in what order, and under
what circumstances, but not what kinds of
data will be input to and output from the
system, nor where the data will come
from and go to, nor where the data will be
stored .
2. Purpose/Objective:
The purpose of data flow diagrams is to
provide a semantic bridge between users
and systems developers. The diagrams
are:




graphical, eliminating thousands
of words;
logical representations, modeling
WHAT a system does, rather than
physical models showing HOW it
does it;
hierarchical, showing systems at
any level of detail; and
jargonless, allowing user
understanding and reviewing.
The goal of data flow diagramming is to
have a commonly understood model of a
system. The diagrams are the basis of
structured systems analysis. Data flow
diagrams are supported by other
techniques of structured systems analysis
such as data structure diagrams, data
dictionaries, and procedure-representing
techniques such as decision tables,
decision trees, and structured English.
Data flow diagrams have the objective of
avoiding the cost of:


User/developer misunderstanding
of a system, resulting in a need to
redo systems or in not using the
system.
Having to start documentation
from scratch when the physical
system changes since the logical
system, WHAT gets done, often


remains the same when
technology changes.
Systems inefficiencies because a
system gets "computerized"
before it gets "systematized".
Being unable to evaluate system
project boundaries or degree of
automation, resulting in a project
of inappropriate scope.

Description:
Data Flow Diagrams are composed
of the four basic symbols shown below.
Activity C
Using internet surf & collect information
on “Physical & logical DFD”
Introduction to Logical and Physical
Data Flow Diagrams:
Data flow diagrams (DFDs) are
categorized as either logical or
physical. A logical DFD focuses on the
business and how the business
operates. It describes the business
events that take place and the data
required and produced by each event.
On the other hand, a physical DFD
shows how the system will be
implemented as we mentioned
before. Notice that the logical model
reflects the business, while the
physical model depicts the system.
Features :
The External Entity symbol represents
sources of data to the system or
destinations of data from the system.
The Data Flow symbol represents
movement of data.
The Data Store symbol represents data
that is not moving (delayed data at rest).
The Process symbol represents an activity
that transforms or manipulates the data
(combines, reorders, converts, etc.).
Any system can be represented at any
level of detail by these four symbols.
In the course of developing a set of
leveled data flow diagrams the
analyst/designers is forced to address
how the system may be decomposed into
component sub-systems, and to identify
the transaction data in the data model.
Ideally, systems are developed by
analyzing the current system (the
current logical DFD), then adding
features that the new system should
include
(the
proposed
logical
DFD).Finally the best methods to
implement the new system should be
developed (the physical DFD). After
the logical model for the new system
has been developed, it may be used
to create a
physical data flow diagram for the
new system.
The progression of models from
logical to physical :
The CUSTOMER brings the ITEMS to
the register; PRICES for all ITEMS are
LOOKED UP, and then totaled; next,
PAYMENT is given to the cashier
finally, the CUSTOMER is given a
receipt. The logical DFD illustrates the
processes involved without going into
detail about the physical
implementation of activities. The
physical DFD shows that a bar codethe UPC
PRICE code found on most grocery
store items- is used. In addition, the
physical DFD mentions manual
processes such as scanning, explains
that a temporary file is used to keep a
subtotal of items, and indicates that
the PAYMENT could be made by
CASH, CHECK, or DEBIT CARD. Finally,
it refers to the receipt by its name,
CASH REGISTER RECEIPT.
Steps of Developing DFD :
Before drawing DPI first we need to
conceptualize data flows from a topdown perspective.
To begin with we made a list of
business activities and use it to
determine various
• External entities
• Data flows
• Process
• Data stores
Review Questions
1. Draw context Diagram & first
level DFD for “Account
Receivable”
3. Draw context Diagram & first
level DFD for “Purchase order
system
2. Draw context Diagram & first
level DFD for “Stores inventory
system”
a
Supplier
Payment
Purchase
Order
Delivery
Details
e
Matched Invoice
Accounts
Invoice
ZigZag
Warehouse
System
Stock Report
P.O.Quantitie s
b
Purchaser
Chapter 9 - Role of Information in
Decision Making
Activity A
Using internet surf & collect information
on “decision Models”.
Ans.
Most of previous approaches
to deal with IS priorities have not given
adequate
importance to strategic
aspects. Shin (2001) pointed out several
reasons for
failures in IS planning. One
of these reasons is the lack in connection
between
strategic objectives and
action plans. In this paper a decision
model make
strategic and organizational
connections with the action plan. A
particular IS
planning methodology
(Zachman, 1982), named Business System
Planning
(BSP), has been applied and
adapted in previous work (Almeida el al,
1992).
The adaptation has provided
a more appropriate way for quantitative
analysis
regarding priorities
assignment of IS. A decision model is built
Delivery Note
to incorporate the
use of the ELECTRE I method.
This method allows analysis on the
dominance
d
relations amongst IS
Despatch Note
Customer
modules, based on the study of
outranking relations, using a non
compensatory
logic
(Roy, Order
1996; Vincke,
Matched C.O.
Customer
Copy #1
1992; Belton and Stewart, 2002).
Customer
Order
Activity B
c
Sales and
Marketing
Using internet surf & collect information
on “Herbert Simion Models of the
Decision”.
Ans.
The work of Herbert A. Simon
has drawn increasing attention from
modern scholars who
argue that Simon's work
changed during the Cold War. This is due
to the fact that Simon
seemingly changed the
substance of his research in the 1950s.
This paper argues that
Simon did not change in any
significant way, but was lead by his
interest in decision
making and rationality into
areas of economics, political science,
sociology, psychology,
organization theory, and
computer science. He used elements of
different disciplines to
address his overall interest
and there is therefore a considerable
continuity in Simon's
work. This papealso provides
part of a background for the recent
increase of interest in
Simon's ideas by providing
some details of the RAND Corporation and
the Ford
Foundation's support of
scientific research through the post war
years in general, and
their connections to the
behavioural science research at Carnegie
Mellon University in
particular.
Review Questions
1. Discuss the role of Information
systems in decision making.
Ans. (a) In situation where decision are to
be taken under risk or uncertainty; the
Information
system helps to migrate the risk
by tracking the trend or through analysis
of prior relevant
data.
(b) Historical data can be used in
building Business model used for decision
making processes.
(c) Decision maker cannot wait for
long to make decision even if precise or
accurate sufficient
Information is likely to be
available in future, because this would
entail losing out on
opportunity which could have
otherwise been cashed on.
(d) Information system makes sure
that right information provided at the
time in right format
to ensure quick and relatively
error free decision process.
2. Explain decision-making using
Simons model & distinguish
different type decision.
Ans. (A) The Intelligence Phase: Herbet
Simion divides into three phases :- The
Decision maker
either looks for a problem to
solve or if a problem has been identified
he works towards
defining it correctly. They needs
Information to detect problems in his
business domain
as well as for helping him define
the problem correctly.
(a) Structured MIS which provided
exception reports help a person to
identify where the
deviation are happening from
the standard. The manager can to then
focus on these area
and defing the problem to be
solved.
(b) Business Intelligence which aims
at discovering patterns in historical data
help in
identifying missed opportunities
in the past etc. BI can thus be considered
as the IT support
at the Intelligence phase.
(c) Executive Information System
(EIS) which help a manager browse to
information in variety
of may lead to discovery of
unexpected insights into what is
happening in the organisation.
EISs work as data visualisation
tools.
(B)Design phase : The design phase
Involve identification and definition of
several alternative
solutions to the problem
identified in the intelligence phase.
Various model building
software such as spreadsheet or a
simulation tool etc are way of identifying
different
scenarios and evaluating them.
(C) The Choice Phase :
(a) The Choice from among the
available alternatives depends largely on
economic
consideration. however as
explained elsewhere a decision maker is
subject to time
information constraints. As a
result They cannot evaluate an infinite
number of
alternatives. Therefore uses his
experience or heuristics to arrive at 2 or 3
alternatives and
selects based on there economic
worth. again since most decision in
organisations are
bound to affect some group of
people while some groups of people
negatively the decision
maker ends up satisfying rather
than maximising.
(b) Information systems can make
the decision very objective and provide
alternatives which
are more rational. The satisfying
behaviour will therefore have a lesser
impact on the
outcome of the decision.
(c) The same tools such as model,
simulations could be used prior to
implementation of a
choice of an alternative. Once
implemented structured MIS should
support the monitoring
of the decision. this can be done
by placing appropriate metrics as a part of
the MIS which
will track actual performance
once the decision is implemented.
3. What are the decision models ?
How they are used in
organization.
Ans. Several models of decision making
are described below:
(A) CLASSICAL ECONOMIC :
(a) All decisions and outcomes are
completely known.
(b) The model states that the
Decision maker always seeks to maximize
profit or utility.
.
(c) The decision maker is infinitely
sensitive to difference in utility among
outcomes.
USES: The classical economic model
is a prescriptive model of the decision
maker completely
rational, having complete
information about always choosing the
best alternative. But
in fact all criteria of the model
are rarely met in a decision situation.
Decision making in
the business contex is nothing
but a set of trade off. Taking any course of
action would
also have some disadvantages.
The decision maker therefore merely
evaluates a few
alternatives depending on the
time on hand and take decision in face of
risk.
(B) ADMINISTRATIVE MODEL: The
administrative model of the decision
maker is
descriptive. It assume that the
decision maker:
(a) Does not know all the
alternatives and outcomes.
(b) Makes a limited search to
discover a few satisfactory alternatives.
.
(c) Makes a decision which satisfies
his or her aspiration.
USES : Thus the decision maker
does not completely rational but display
rationality only
within limits imposed by
background, perception of alternatives,
ability to handle a
decision model etc. They
also act balancing act between conflict
tradeoffs – what is
know as “satisfying” i.e.
takes a course of action which is
acceptable / tolerable and
not
necessarily the best option.
Chapter 10 - Determining Information
need – Object Analysis
Activity A
Using internet surf & collect information
on “OOA Approach”.
Ans.
There have been basically 3
approaches in information system
development area:
to make system elements
more reusable, thus improving system
quality and the
productivity of systems
analysis and design (Hoffer et al. 2002).
Though systems
analysis is closed associated
with design, this paper tries to focus on
analysis part of
process-oriented, dataoriented and object-oriented approaches.
As information
technology (both hardware
and software) has been advancing, people
have moved
from the earliest processoriented approach to data-oriented
approach and now
begun to adopt the latest
object-oriented analysis methodology.
Unlike its two predecessors
that focus either on process or data, the
object-oriented
approach combines data
and processes (called methods) into single
entities called
objects. Objects usually
correspond to the real things an
information system deals
with, such as customers,
suppliers, contracts, and rental
agreements. Object-oriented
model is able to thoroughly
represent complex relationships and to
represent data
and data processing with a
consistent notation, which allows an
easier blending of
analysis and design in an
evolutionary process. The goal of objectoriented approach is
the methodology.
Activity B
Using internet surf & collect information
on “Database design”
Introduction :
Database design is the process of
producing a detailed data model of a
database. This logical data model
contains all the needed logical and
physical design choices and physical
storage parameters needed to generate a
design in a Data Definition Language,
which can then be used to create a
database. A fully attributed data model
contains detailed attributes for each
entity.
The term database design can be used to
describe many different parts of the
design of an overall database system.
Principally, and most correctly, it can be
thought of as the logical design of the
base data structures used to store the
data. In the relational model these are the
tables and views. In an object database
the entities and relationships map directly
to object classes and named relationships.
However, the term database design could
also be used to apply to the overall
process of designing, not just the base
data structures, but also the forms and
queries used as part of the overall
database application within the database
management system (DBMS).
Design Process :
tables are structured correctly. Make
adjustments to the tables.
Activity C
1. Determine the purpose of your
database - This helps prepare you
for the remaining steps.
2. Find and organize the
information required - Gather all
of the types of information you
might want to record in the
database, such as product name
and order number.
3. Divide the information into
tables - Divide your information
items into major entities or
subjects, such as Products or
Orders. Each subject then
becomes a table.
4. Turn information items into
columns - Decide what
information you want to store in
each table. Each item becomes a
field, and is displayed as a column
in the table. For example, an
Employees table might include
fields such as Last Name and Hire
Date.
5. Specify primary keys - Choose
each table’s primary key. The
primary key is a column that is
used to uniquely identify each
row. An example might be
Product ID or Order ID.
6. Set up the table relationships Look at each table and decide
how the data in one table is
related to the data in other
tables. Add fields to tables or
create new tables to clarify the
relationships, as necessary.
7. Refine your design - Analyze your
design for errors. Create the
tables and add a few records of
sample data. See if you can get
the results you want from your
tables. Make adjustments to the
design, as needed.
Apply the normalization rules - Apply the
data normalization rules to see if your
Using internet surf & collect information
on “Rules for using keys & attributes in
database”






Should trace all the inputs &
outputs shown on the context
diagram
Each department, person,
location, equipment should
be converted into equivalent
processes.
The name of the process
should be a verb.
There should be no hanging
links, no looping & no
crisscrossing of dataflows.
The diagram should be
leveled.
About 10-15 processes at
every level is ideal.
While drawing a DFD, the golden rule is
“think shallow”.
Review Questions
1. What is Object ? List five
tangible, intangible object.
Ans. An Object is any ‘Thing’ of interest
in the real world system which is being
modelled.
Tangible Object
(a) Desk and Chairs.
(b) White Board & maker.
(c) Computer and Projector.
(d) Notebooks.
(e) Text books.
Intangible Object
(a) Course.
(b) Batch.
(c) Lecture.
(d) Knowledge Shared.
(e) Subject.
2. What are the characteristics of
an Object?
Ans. Following characteristics of Objects
are given below:
(a) Study the system.
(b) Identify as many objects as
possible – Objects are nouns.
(c) Understand the Object
Relationships: The objects interact which
other Objects and
represents this is in the form of
an Object Relationship Diagram – The
relationship is in the
form of various roles played by
the interacting objects.
(d) Identify Business Event And
Object related Events: For each pair of
interacting Object
identify as many events as
possible. An events is by definition
something which can or has
happened. Event represent
possibilities in the real world which the
object would have to
respond to. thus a complete list
of events identified at the analysis stage
ensures the
behaviour of each object and
hence the behaviour of the system is
completely
understood. Event can be either
singleton events where in the object
generates its own
events and then responds.
3. What is difference between
entity and object.
Ans. Entity: The relationship is in the
form of various roles played by interacting
objects should be
captured.
Objects: An Object is any ‘Thing’ of
intrest in the real world system which is
being modelled.
Chapter 11 - Aligning Information
Systems to corporate Goals
Activity A
Using internet surf & collect information
on “Methods” used for aligning
information systems to corporate goals”
pinpointing them. Nevertheless, it is an
approach that should be pursued as it
provides value in giving due focus to a
limited set of factors, which are deemed
to be the most critical for an organization
or individual.
A) The Critical Success Factor
Method:
Critical Success Factor (CSF) is a
business term for an element
which is necessary for an
organization or project to achieve
its mission.
A company (or product designer) may
use the critical success factor method
as a means for identifying the important
elements of their success.
For example, a CSF for a successful POF
system design is user involvement.
The critical success factor method is a
means for identifying these important
elements of success. It was originally
developed to align information
technology planning with the strategic
direction of an organization. CSFs are used
by organization to give focus on a number
of factors that help define its success.
They help the organization and its
personnel to understand the key areas in
which to invest their resources and time.
Ideally, these CSFs are observable in
terms of the impact on the organization
to allow it to have guidance and
indications on its achievement of them.
CSFs are however broadly divided in 3
types :
 Those inherent to any business
 Those specific to the sector
 Those which are company specific
& depend upon company strategy
CSFs can be utilized in both the
organization and the individual levels.
Their identification is largely qualitative
and can result in differing opinions in
B) The Alfred Chandler’s Strategy
Trilogy :
Alfred chandler’s Strategy model
implies that in successful
organization Business strategy,
organizational strategy& System
strategy are the three sides of the
triangle each representing one of
the strategies seem to be well
balanced. A change in one impacts
one or both the other strategies.
It also means that system strategy
can be derived based on a good
understanding of the other two
strategies.
Review questions
1. Explain Role of CSF method in
deciding aligning Information
Systems to corporate
goal.
Ans. The success of every organization
depend upon a handful of factor which
may be called as
Critical success Factors. The role of
CSFs is to
(a) Step into the shoe of customer
and ask a question as to why would you
do business with
the said organization. The
customer perspectives would provide
several CSFs – Customer
service, ambience, experience
etc are example of such CSFs.
(b) Identify the key constraint in
that business. Every business has some
key constraint. For
instance the number of room in
the hotel, the number of Cars available in
the rental
service or an expensive ship, or
the Arc furnace in a steel plant. all these
constraints need
to exploited fully to get the best
out business. Hence it help to ask the
question as to what
is the key constraint.
(c) several service delivered
measures.
(d) Internal financial measures such
as operating cost etc are standard.
2. Explain Role of Alfred Chandler’s
method in deciding aligning
Information Systems to
corporate goal.
Ans. The Model implies that in successful
organisations these three sides of triangle
each
representing one of the strategies
seem to be well balanced. A change in
one impact one or
both the other strategies.
(a) The system or IT strategy can be
derived based on a good understanding of
the other two
strategies. This idea support
various previous models such as the
strategy set transform
which basically suggest that
system & IT strategy should be derived by
transforming
business strategy. This idea is
indeed provides an easy mechanism for
CIO to arrive at a
suitable IT/business strategy.
(b) Mrs Fields Cookies case
developed by the Harvard Business School
and Quoted in literature
related to IT strategy is indeed a
case in point.
(c) Mrs. Fields started the business
of making fresh cookies from her home
and selling it to
friends in the neighbourhood.
Gradually the popularity of the cookies
lead to her starting
the first stores. In a very few
years Mrs Fields owned over 400 stores
across 5 continents.
There are several themes which
run through this case.
Chapter 12 - Aligning Information
Systems using CSF method
Activity A
Using Internet surf & collect information
on 03 cases study of vertical industries
applying CSF for their business goals”.
Ans :Example 1 : Malaysian Airlines
Malaysian Airlines Triples Sales & Reduces
Call Centre Cost by 18% using CSF
Example 2
Example 3 :
State Bank of India
Opryland, always actively searching for
better ways to manage these high
volumes of guests, has implemented a
LANSA based Wireless solution that allows
hotel agents to check-in and check-out
guests, process credit cards, print receipts
and program room keys at the curbside or
anywhere else in or nearby the hotel.
The solution, LMS Wireless Express from
LANSA solution partner Agilysys, has
reduced queues at the reception desk and
allows guests to check-in and check-out
closer to where their room is.
Example 2
BAS Insurance gives travelers the All Clear
with LANSA
BAS Insurance Services Limited (BIS) is
based in Essex, U.K. and offers specialist
insurance, marketing and administrative
services. BIS is a market-leader with their
AllClear Travel insurance, which provides
cover irrespective of age, medical
condition or disability. BIS used LANSA to
take their AllClear Travel insurance
product to the Web and to develop and
run branded travel insurance sites for a
growing number of well-known insurance
companies.
Activity B
Using Internet surf & collect information
on 03 cases study of Service industries
applying CSF for their business goals”.
Example 1.
Wireless curbside check-in at Opryland
Hotel
Opryland Hotel Nashville, part of the
Gaylord Entertainment Company, is the
largest hotel-convention center under one
roof in the world with 2,883 guestrooms,
600,000 square feet of convention space,
nine acres of indoor gardens, a quartermile indoor river, retail shops and
restaurants. Over four million guests stay
in the hotel annually.
Nikki Hunt, Head of IT at BIS, says, "We
host nearly twenty branded travel
insurance sites and another ten branded
member benefit schemes. Without
LANSA's Web ability, we could not have
grown to where we are today. We were
the first to offer branded insurance and
member benefit sites. While others have
followed, no one has had the same
success."
Example 3
Royal Wagenborg manages ship and shore
with LANSA
The Royal Wagenborg
group, a global logistics
provider based in the
Netherlands, provides shipping, towage,
offshore supply services, passenger
services, stevedoring, warehousing and
dispatch, crane rental, standard and
special road transport as well as the
assembly of prefab constructions.
Wagenborg uses LANSA on its ships and
on land, for fleet management, crewing,
chartering, passenger reservations, ship
maintenance, replenishments of goods
and parts and for an XML-based supplier
portal.
Harry Meyer, IT Manager at the Royal
Wagenborg group, says, "LANSA paints
the complete picture. Windows clients
with a SQL Server database on board our
ships, Windows clients with a central
iSeries server for our offices onshore,
Web access for third parties and XML data
exchange with our suppliers. We can do it
all with our own team. This was the
deciding factor. LANSA's methodology
appeals to us and fits our pragmatic
business culture."
Activity C
Using Internet Browse Coca Cola & Pepsi
website & collect information on how
they are applying CSF for their business
goals”.
There are many factors contributing to
Coca-Cola's success, however, I believe
that their key success factors are
Marketing, Innovation, and Globalization.
Marketing: Coca-Cola is seen as one of
the founding fathers of the modern day
marketing model. They were among the
pioneers of advertising techniques and
styles used to capture an audience. They
were also one of the first companies to
offer a gimmick with their product, this
being a mini yo-yo. It was around 1900
when Coca-Cola began presenting their
signature drink as a delicious and
refreshing formula. This slogan has been
repeated for over the last 100 years
selling Coke all over the world. Through its
intense marketing campaigns, Coke has
developed an image that is reflected in
what we think of when we buy Coke and
what we associate with drinking Coke.
This image has been subconsciously
installed in our brain by the advertising
campaigns that show Coca Cola
associated with "good times."
Innovation: Coca-Cola has been able to
survive and grow in an ever-changing
market because of its ability to
systematically innovate and deliver new
products. In the late 90s the company,
typically showing earnings growth of 1520% per year, turned in three straight
years of falling profits. It was apparent
that the market was changing and in
order to keep up with these changes,
Coca-Cola had to move from a single core
product to a total beverage company.
Dynamic Marketing Strategy:- In the age
of Mass Marketing during the period 1800
to 1900, they could reach millions of
people through advertising. With the
advancement of time during the age of
Information Technology, they used
diversified tools of IT (Internet, Television
etc) to reach billions of people.
Target Market Country-wise:- They had tie
ups with different ad-agencies in different
countries wherein they used variety of
themes to showcase their advertisements.
Depending upon the variables like
Climate, Taste and Preference of the
consumer etc different products were
promoted across different nations but
they still managed to hold their Global
Branding across the globe.
Consumer Feedback:- The company
managed to take the relevant feedbacks
from the consumers in a closed loop.
After getting the relevant feedbacks from
consumers across the globe they
succeeded in taking necessary actions and
were ready to bounce back after plugging
the loopholes. In a nutshell, they left no
stone unturned.
Varied Promotional Schemes & Offers:Coca Cola keep coming up with variety of
schemes, gifts and offers for its
customers. The best part of their
promotion included Diaries, Dailies,
Calendars, Clocks for the corporate and
individuals which resulted in 24 X 7
advertising as these promotional gifts
were used by the customers in some form
or the other. In this way they were able to
make their presence felt in the mind of
the customers.
Effective Distribution System:- Coca Cola
is supposed to have one of the best
Distribution Network. They went on
making many strategic partners and
appointed Distributors, Dealers and SubDealers for various areas which made it
easy for the company to penetrate into
the markets (both Urban & Rural) at a
faster pace thereby enhancing its
Networking System.




Product Innovation
Size of Organization
Established Brand Loyalty
Price
Review Questions
1. What do you understand by CSF’s
as applied to Specific to company
strategy
Ans : CSF means critical success factor.
It means aligning the things which are
very important to star & run the business.
You have to understand the requirement
of the customer than according to that
provide the goods & services for eg. To
start the business of tour & travellers CSF
are as following
 Frequency of vehicle
 Safe & comfortable seating
arrangement
 Collaboration with good
hotels & guides
 Gives discount offer & festival
/ seasonal offers
2. what do you understand by “
Functional Adequacy” ? Illustrate
your answer with examples.
Ans : In organization all system &
strategies are functionally complete in
terms of their basic functional features as
well as technically sound. The system
should be rated in the quadrant 9.9. This
is an ideal for all kind of systems. It shows
the system is very good in aligned to the
requirement of the organization.
For eg. If company’s godown at Bhiwandi ,
sales office / head office at Andheri. End
of the month sales officer booked the
order & confirm the delivery status
request physical stock. The company
using the “ ERP” or “SAP” system he will
come to know the balance stock, rate, sr.
number, expiry date & other relevant
information with out calling godown in
charges / manager.
It shows all functions working properly &
give correct data within few minutes.
Chapter 13 - Aligning Information
systems using chandlers Model
Activity A
Using Internet Browse Macdonald site &
find what “ Business & Organizational
strategy” they followed
A key element of McDonald's strategy
since the beginning has been the policy of
the company to own all property on
which a McDonald's outlet was built,
regardless of whether that location was
franchised or company-owned. Rental
income varies from property to property,
but it has been estimated that
McDonald's generates more money from
its rent than from its franchise fees.
McDonald's real estate holdings and rent
generated from these holdings are an
important component of the company's
value and income. McDonald's is unique
in the fast-food industry in that it owns
much of its real estate. In most cases,
McDonald's restaurants are located on
prime high-traffic real estate that is highly
visible and easily accessible. McDonald's
conditions for a franchise location include
a corner lot with at least 35,000 square
feet of land whose entrance and exit were
facilitated by a traffic light. McDonald's
also earns money by marketing excess
land. The company was also testing new
methods for raising revenue, such as
selling retail merchandise in certain
stores.
In 2002 Jim Cantalupo came out of
retirement to lead McDonald's
turnaround back to profitability and
restore the image of one the world's best
known brands. The new strategy was
called the McDonald's Plan to Win and
focused on what the company identified
as its five key drivers of success: people,
products, place, price, and promotion.
The first driver of exceptional customer
experiences would focus on people, the
employees who dealt with the customers
on a daily basis. In response to a
customer service ranking that rated
McDonald's dead last in the fast-food
industry, even lower than the IRS.
McDonald's vowed to do a better job of
staffing its restaurants at busy times and
rewarding employees for delivering
outstanding customer service. An
interactive e-learning program to costeffectively train employees in customer
service attitudes and skills would be
instituted.
Activity B
Using Internet Browse Dell computer site
& find what “ systems & IT strategy’s
they followed
Dell Computer's strategy was built around
a number of core elements: build-to-order
manufacturing, mass customization,
partnerships with suppliers, just-in-time
components inventories, direct sales,
market segmentation, customer service,
and extensive data and information
sharing with both supply partners and
customers. Through this strategy, the
company hoped to achieve what Michael
Dell called "virtual integration"—a
stitching together of Dell's business with
its supply partners and customers in real
time such that all three appeared to be
part of the same organizational team
Dell built its computers, workstations, and
servers to order; none were produced for
inventory. Dell customers could order
custom-built servers and workstations
based on the needs of their applications.
Desktop and laptop customers ordered
whatever configuration of microprocessor
speed, random access memory (RAM),
hard-disk capacity, CD-ROM drive,
fax/modem, monitor size, speakers, and
other accessories they preferred. The
orders were directed to the nearest
factory. Until recently Dell had operated
its assembly lines in traditional fashion,
with workers each performing a single
operation. An order form accompanied
each metal chassis across the production
floor; drives, chips, and ancillary items
were installed to match customer
specifications. As a partly assembled PC
arrived at a new workstation, the
operator, standing beside a tall steel rack
with drawers full of components, was
instructed what to do by little red and
green lights flashing beside the drawers.
When the operator was finished, the
components were automatically
replenished from the other side of the
drawers and the PC chassis glided down
the line to the next workstation. However,
Dell reorganized its plants in 1997, shifting
to "cell manufacturing" techniques
whereby a team of workers operating at a
group workstation (or cell) assembled an
entire PC according to customer
specifications. The result had been to
reduce assembly times by 75 percent and
to double productivity per square foot of
assembly space. Assembled computers
were tested, then loaded with the desired
software, shipped, and typically delivered
within five to six business days of the
initial order.
This sell-direct strategy meant, of course,
that Dell had no in-house stock of finished
goods inventories and that, unlike
competitors using the traditional value
chain model (Exhibit 6), it did not have to
wait for resellers to clear out their own
inventories before it could push new
models into the marketplace. (Resellers
typically operated with 60-70 days'
inventory.) Equally important was the fact
that customers who bought from Dell got
the satisfaction of having their computers
customized to their particular liking and
pocketbook.
Dell had three PC assembly plants—in
Austin, Texas; Limerick, Ireland; and
Penang, Malaysia. The company was
constructing another plant in Ireland to
serve the European market as well as a
new plant in China (the company
expected the market for PCs in China to
soon be huge). Both of the new plants
were expected to come into use at the
end of 1998.
Activity C
Using Internet Browse Apple computer
site & find what “ systems & IT strategy’s
they followed
A key element of Apple's networking
strategy is Macintosh integration with
IBM systems. The goal is to provide basic
connectivity for the Macintosh, and then
provide developers and customers with a
set of protocols, interfaces, and tools that
enable the development of consistent,
integrated Macintosh applications for the
IBM environments.
Apple will implement the IBM Systems
Application Architecture technologies that
complement the Macintosh, thereby
enabling user transparent access to IBM
data and services. Apple's product
development will continue to focus on the
core
networking protocols, interfaces, and
services that enable commercial
developers and customers to create
applications for end users. This helps to
produce highly functional software in the
shortest possible time by allowing
developers to concentrate on the
application and user interface, rather than
networking.
Apple will continue to enhance the AppleIBM product line through improvements
in functionality, performance, and
usability. The commitment is to provide
customers with a common Macintosh
view of IBM data, services, and
applications through support of
Macintosh-complementary SAA
technologies
Review Questions
1. Explain what do you understand
by “Business & Organizational
strategy”
Ans : Business strategy is formula to
start & make ahead step to successes of
organization it can be replicate formula. It
is foundation of business , every
successful business should have –
 Uniqueness which is separate
from other compotators
 Unbeat culture which attract
customers & employees
 Forecasting & planning
techniques
 Maintain quality & reduce
overheads expense
An organizational strategy is support &
promotes the business strategy. Every
organization have their own different kind
of Organizational strategy like
 Vertical or horizontal or flat
structure.
 Advance technology which
supports the communication
& transitions.
 Strong back office and
analytical function
 Back up on the accounting,
MIS and decision making
processes.
 Trust on employees &
motivated them.
Neutral and it empower peoples. It must
be easy to understand & operate every
person. The IT strategy eliminated several
supervisory levels which supports the
organizational decision to have a flat
organization and reduce cost improve
direct influence which was a business
imperative. Communication technology
like – emails, voicemail, video conference
helps to save time & money. High level of
automation also reduced the head count.
Standardization of systems, processes &
software also made it easy for forecasting
& planning.
2. Explain what do you understand
by “Organizational strategy”
Ans : An organizational strategy is support
& promotes the business strategy. Every
organization have their own different kind
of Organizational strategy like
 Vertical or horizontal or flat
structure.
 Advance technology which
supports the communication
& transitions.
 Strong back office and
analytical function
 Back up on the accounting,
MIS and decision making
processes.
 Trust on employees &
motivated them.
Further, it gives empowerment,
responsibility to the manager / workers &
motivate to work as a team. Select the
right person for right job, it means
according to requirement of job / works
appoint the candidate. For running the
stable business, updated the information
than analyses & apply.
3. Explain what do you understand
by “IT & Systems strategy”
Ans : The coherence of the IT strategy
with the business & organizational
strategy is excellent. IT is organizationally
4. Using Internet Browse HCL
Computer site & find how they
adopted all above in practice
Ans : HCL have adopted the best practices
of Business & Organizational strategy by
incorporating them in various Business
Lines as listed below :
 Business Process Outsourcing
 Custom application service
 Engg and R&D services
 Enterprise application services
 Enterprise transformation
services
 IT Infrastructure management
Chapter 14 - Role of IT in Business
Activity A
Using Internet collect information on
“Dis-Intermediation”
In economics, disintermediation is the
removal of intermediaries in a supply
chain: "cutting out the middleman".
Instead of going through traditional
distribution channels, which had some
type of intermediate (such as a
distributor, wholesaler, broker, or agent),
companies may now deal with every
customer directly, for example via the
Internet. One important factor is a drop in
the cost of servicing customers directly.
Disintermediation initiated by consumers
is often the result of high market
transparency, in that buyers are aware of
supply prices direct from the
manufacturer. Buyers bypass the
middlemen (wholesalers and retailers) in
order to buy directly from the
manufacturer and thereby pay less.
Buyers can alternatively elect to purchase
from wholesalers. Often, a B2C company
functions as the bridge between buyer
and manufacturer.
To illustrate, a typical B2C supply chain is
composed of four or five entities (in
order):





Supplier
Manufacturer
Wholesaler
Retailer
Buyer
It has been argued that the Internet
modifies the supply chain due to market
transparency:





Supplier
Manufacturer
Buyer
The term was originally applied to
the banking industry in about
1967: disintermediation referred
to consumers investing directly in
securities (government and
private bonds, and stocks) rather
than leaving their money in
savings accounts, then later to
borrowers going to the capital
markets rather than to
banks.(OED, Google News
Archive) The original cause was a
US government regulation
(Regulation Q) which limited the
interest rate paid on interest
bearing accounts that were
insured by FDIC.
It was later applied more
generally to "cutting out the
middleman" in commerce, though
the financial meaning remained
predominant. Only in the late
1990s did it become widely
popularized.
A prime example of disintermediation is
Dell, Inc., which sells many of its systems
direct to the consumer — thus bypassing
traditional retail chains. In the nonInternet world, disintermediation has
been an important strategy for many big
box retailers like Walmart, which attempt
to reduce prices by reducing the number
of intermediaries between the supplier
and the buyer. Disintermediation is also
closely associated with the idea of just in
time manufacturing, as the removal of the
need for inventory removes one function
of an intermediary.
Activity B
Using Internet collect information on
“Virtual value Chain”
The virtual value chain, created by John
Sviokla and Jeffrey Rayport, is a business
model describing the dissemination of
value-generating information services
throughout an Extended Enterprise. This
value chain begins with the content
supplied by the provider, which is then
distributed and supported by the
information infrastructure; thereupon the
context provider supplies actual customer
interaction. It supports the physical value
chain of procurement, manufacturing,
distribution and sales of traditional
companies.
To illustrate the distinction between the
two value chains consider the following:
“when consumers use answering
machines to leave a message, they are
using an object that is both made and sold
in the physical world, however when they
buy electronic answering services from
the phone company they are using the
marketspace—a virtual realm where
products and services are digital
information and are delivered through
information-based channels.” (Rayport et
al. 1996) There are many businesses that
employ both value chains including banks
which provide services to customers in
the physical world at their branch offices
and virtually online. The value chain is
separated into two separate chains
because both the marketplace (physical)
and the marketspace (virtual) need to be
managed in different ways to be effective
and efficient (Samuelson 1981).
Nonetheless, the linkage between the two
is critical for effective supply chain
management.
Activity C
Using Internet collect information on
“ERP”
Enterprise resource planning (ERP)
integrates internal and external
management information across an entire
organization, embracing
finance/accounting, manufacturing, sales
and service, CRM, etc. ERP systems
automate this activity with an integrated
software application. Its purpose is to
facilitate the flow of information between
all business functions inside the
boundaries of the organization and
manage the connections to outside
stakeholders.
ERP systems can run on a variety of
hardware and network configurations,
typically employing a database to store
data.
ERP systems typically include the
following characteristics:




An integrated system that
operates in real time (or next to
real time), without relying on
periodic updates.
A common database, which
supports all applications.
A consistent look and feel
throughout each module.
Installation of the system without
elaborate application/data
integration by the Information
Technology (IT) department.
Origin of "ERP"
In 1990 Gartner Group first employed the
acronym ERPas an extension of material
requirements planning (MRP), later
manufacturing resource planning and
computer-integrated manufacturing.
Without supplanting these terms, ERP
came to represent a larger whole,
reflecting the evolution of application
integration beyond manufacturing. Not all
ERP packages were developed from a
manufacturing core. Vendors variously
began with accounting, maintenance and
human resources. By the mid–1990s ERP
systems addressed all core functions of an
enterprise. Beyond corporations,
governments and non–profit
organizations also began to employ ERP
systems.
ERP's scope usually implies significant
changes to staff work practices. Generally,
three types of services are available to
help implement such changes—
consulting, customization, and support.
Implementation time depends on
business size, number of modules,
customization, the scope of process
changes, and the readiness of the
customer to take ownership for the
project. Modular ERP systems and can be
implemented in stages. The typical project
for a large enterprise consumes about 14
months and requires around 150
consultants. Small projects can require
months; multinational and other large
implementations can take years.[
Customization can substantially increase
implementation times.
Advantages
The fundamental advantage of ERP is that
integrating the myriad processes by which
businesses operate saves time and
expense. Decisions can be made more
quickly and with fewer errors. Data
becomes visible across the organization.
Tasks that benefit from this integration
include:

Sales forecasting, which allows
inventory optimization



Order tracking, from acceptance
through fulfillment
Revenue tracking, from invoice
through cash receipt
Matching purchase orders (what
was ordered), inventory receipts
(what arrived), and costing (what
the vendor invoiced)
ERP systems centralize business data,
bringing the following benefits:




They eliminate the need to
synchronize changes between
multiple systems—consolidation
of finance, marketing and sales,
human resource, and
manufacturing applications
They enable standard product
naming/coding.
They provide a comprehensive
enterprise view (no "islands of
information"). They make real–
time information available to
management anywhere, anytime
to make proper decisions.
They protect sensitive data by
consolidating multiple security
systems into a single structure.
Disadvantages





Customization is problematic.
Re–engineering business
processes to fit the ERP system
may damage competitiveness
and/or divert focus from other
critical activities
ERP can cost more than less
integrated and/or less
comprehensive solutions.
High switching costs increase
vendor negotiating power vis a vis
support, maintenance and
upgrade expenses.
Overcoming resistance to sharing
sensitive information between
departments can divert
management attention.


Integration of truly independent
businesses can create
unnecessary dependencies.
Extensive training requirements
take resources from daily
operations.
Reviews in questions
1. Explain what do you understand
by “Business scope Transform ”
illustrate with examples.
Ans : IT help to growth in business &
innovative business ideas. IT lead to the
growth of several hitherto unheard
business and innovative business models
for even exiting established business.
The ideal example is BPO model. It is
possible only due to the convergence of
telecom and IT technologies. Imagine
serving customer in the US sitting at a
BPO in India.
2. What is impact of IT on Business
network Transform?
Ans : Business network transform is the
transformation of the network consisting
of customers, suppliers and other
business partners. It is fundamental
change in the way the organization
conducts it business with its business
partners. The close alliance, the level of
trust , the sharing of information and the
transparency helps in the network as a
whole to respond faster and better. More
over it creates a barrier for entry for
others thereby giving a competitive
advantage to the network as a whole and
the business entity which is at the center
of this network. Thus in today’s world
competition is not between singular
entities but rater between network of
organization trying to provide an efficient
value chain.
3. Explain how outsourcing is used
for Business scope Transform”
Ans : Outsourcing usually means
delivering highly customized solutions for
very specific problems. Therefore, it is in
the processes and procedures related to
the solution where the most innovative,
out-of--the-box thinking can provide the
most value. Don’t discount the value of
innovative thinking, which can be a major
discriminator in your selection and
assessment of a service provider.





Cost savings — The lowering of
the overall cost of the service to
the business. This will involve
reducing the scope, defining
quality levels, re-pricing, renegotiation, and cost restructuring. Access to lower cost
economies through offshoring
called "labor arbitrage" generated
by the wage gap between
industrialized and developing
nations.
Focus on Core Business —
Resources (for example
investment, people,
infrastructure) are focused on
developing the core business. For
example often organizations
outsource their IT support to
specialised IT services companies.
Cost restructuring — Operating
leverage is a measure that
compares fixed costs to variable
costs. Outsourcing changes the
balance of this ratio by offering a
move from fixed to variable cost
and also by making variable costs
more predictable.
Improve quality — Achieve a
steep change in quality through
contracting out the service with a
new service level agreement.
Knowledge — Access to
intellectual property and wider
experience and knowledge.
Contract — Services will be
provided to a legally binding





contract with financial penalties
and legal redress. This is not the
case with internal services.
Catalyst for change — An
organization can use an
outsourcing agreement as a
catalyst for major step change
that can not be achieved alone.
The outsourcer becomes a
Change agent in the process.
Enhance capacity for innovation
— Companies increasingly use
external knowledge service
providers to supplement limited
in-house capacity for product
innovation.
Reduce time to market — The
acceleration of the development
or production of a product
through the additional capability
brought by the supplier.
Commodification — The trend of
standardizing business processes,
IT Services, and application
services which enable to buy at
the right price, allows businesses
access to services which were
only available to large
corporations.
Creating leisure time —
Individuals may wish to outsource
their work in order to optimize
their work-leisure balance.
In short expand the business or enter in
new business and concentrate on it.
Chapter 15 - Systems Development Cycle
– SDLC
Activity A
Using internet collect information on
“Waterfall models of SLDC”
Software life cycle models describe
phases of the software cycle and the
order in which those phases are
executed. There are tons of models, and
many companies adopt their own, but all
have very similar patterns.
Each phase produces deliverables
required by the next phase in the life
cycle. Requirements are translated into
design. Code is produced during
implementation that is driven by the
design. Testing verifies the deliverable of
the implementation phase against
requirements.
Requirements:- Business requirements
are gathered in this phase. This phase is
the main focus of the project managers
and stake holders. Meetings with
managers, stake holders and users are
held in order to determine the
requirements. Who is going to use the
system? How will they use the system?
What data should be input into the
system? What data should be output by
the system? These are general questions
that get answered during a requirements
gathering phase. This produces a nice big
list of functionality that the system should
provide, which describes functions the
system
should
perform, business logic that processes
data, what data is stored and used by the
system, and how the user interface should
work. The overall result is the system as a
whole and how it performs, not how it is
actually going to do it.
Design :The software system design is
produced from the results of the
requirements phase. Architects have the
ball in their court during this phase and
this is the phase in which their focus lies.
This is where the details on how the
system
will
work
is
produced.
Architecture,
including
hardware and software, communication,
software design (UML is produced here)
are all part of the deliverables of a design
phase.
Implementation :Code is produced from
the deliverables of the design phase
during
implementation, and this is the longest
phase of the software development life
cycle. For a developer, this is the main
focus of the life cycle because this is
where
the
code
is
produced. Implementation my overlap
with both the design and testing phases.
Many tools exists (CASE tools) to actually
automate the production of code using
information gathered and produced
during the design phase.
Testing
:During
testing,
the
implementation
is
tested
against
therequirements to make sure that the
product is actually solving the needs
addressed and gathered during the
requirements phase. Unit tests and
system/acceptance tests are done during
this
phase.
Unit tests act on a specific component of
the system, while system tests act on the
system as a whole. So in a nutshell, that is
a very basic overview of the general
software development life cycle model.
Now lets delve into some of the
traditional and widely used variations.
Waterfall Model
This is the most common and classic of life
cycle models, also referred to as a linearsequential life cycle model. It is very
simple to understand and use. In a
waterfall model, each phase must be
completed in its entirety before the next
phase can begin. At the end of each
phase, a review takes place to determine
if the project is on the right path and
whether or not to continue or discard the
project. Unlike what I mentioned in the
general model, phases do not overlap in a
waterfall model.
Activity B
Using Internet collect information on
“Prototype used in SLDC “
In the traditional SDLC, software is
created on a well planned pattern. There
will be planning, consultation, creation,
testing, documentation and launching.
ultimately, the prototype model is geared
This pattern is seen in most development
to be changed constantly until it reaches
software. Since it’s planned right from the
its intended audience and function.
start, it should be efficient as planned.
When the plan is properly executed,
Prototype Models Types
everything will work as it is written.
However, it is important to note that this
There are four types of Prototype Models
type of development is all focused on the
based on their development planning: the
developers and not the consumers.
Patch-Up
Although it has its advantages, the
Prototype, First-of-a-Series Prototype and
structured creation of a program makes it
Selected Features Prototype.
Prototype,
Nonoperational
harder to create variations before the
program is launched.
Patch Up Prototype
To answer that need, another model for
developing software is created. Called the
This type of Prototype Model encourages
Prototype model, the development of the
cooperation of different developers. Each
program is not based on strict planning,
developer will work on a specific part of
but it is based on the response of the
the program. After everyone has done
users instead. The prototyping is a
their part, the program will be integrated
concept that bases its development by
with each other resulting in a whole new
creating prototypes after prototypes until
program. Since everyone is working on a
the “perfect” software is created.
different field, Patch Up Prototype is a
As a type of SDLC, the Prototype Model
fast
slowly builds from a simple concept of
developer is highly skilled, there is no
what a program is. Little by little the
need to overlap in a specific function of
software is updated and tested in a real
work. This type of software development
time environment. Users will be able to
model only needs a strong project
test and improve the software as they are
manager
created. This goes in a different pattern if
development
you compare it to the regular SDLC
manager will control the work flow and
pattern, and the feedback is only in the
ensure there is no overlapping of
later stage. If there are any changes, it has
functions among different developers.
development
who
of
model.
If
each
can
monitor
the
the
program.
The
to go back to the drawing board, wasting
more time.
Non-Operational Prototype
There are different types of a prototype
A non-operational prototype model is
model of SDLC. Each of them has their
used when only a certain part of the
own advantage and disadvantage but
program should be updated. Although it’s
not a fully operational program, the
This is another form of releasing a
specific part of the program will work or
software in beta version. However,
could be tested as planned. The main
instead of giving the public the full version
software or prototype is not affected at all
of the software in beta, only selected
as the dummy program is applied with the
features or limited access to some
application.
is
important tools in the program is
assigned with different stages will have to
introduced. Selected Features Prototype
work with the dummy prototype. This
is applied to software that are part of a
prototype is usually implemented when
bigger suite of programs. Those released
certain problems in a specific part of the
are independent of the suite but the full
program arises. Since the software could
version should integrate with other
be in a prototype mode for a very long
software. This is usually done to test the
time, changing and maintenance of
independent feature of the software.
Each
developer
who
specific parts is very important. Slowly it
has become a smart way of creating
Prototype Model Disadvantages
software by introducing small functions of
the software.
Implementing the prototype model for
creating software has disadvantages.
First of a Series Prototype
Since its being built out of concept, most
of the models presented in the early stage
Known as a beta version, this Prototype
are not complete. Usually they lack flaws
Model could be very efficient if properly
that developers still need to work on
launched. In all beta versions, the
them again and again. Since the prototype
software is launched and even introduced
changes from time to time, it’s a
to the public for testing. It’s fully
nightmare to create a document for this
functional software but the aim of being
software. There are many things that are
in beta version is to as for feedbacks,
removed, changed and added in a single
suggestions or even practicing the firewall
update of the prototype and documenting
and security of the software. It could be
each of them has been proven difficult.
very successful if the First of a Series
Prototype is properly done. But if the
There is also a great temptation for most
program is half heartedly done, only
developers to create a prototype and stick
aiming for additional concept, it will be
to it even though it has flaws. Since
susceptible to different hacks, ultimately
prototypes are not yet complete software
backfiring and destroying the prototype.
programs, there is always a possibility of a
designer flaw. When flawed software is
Selected Features Prototype
implemented, it could mean losses of
important resources.
Lastly, integration could be very difficult
for a prototype model. This often happens
their honest opinion about the software.
If something is unfavorable, it can be
changed. Slowly the program is created
with the customer in mind.
when other programs are already stable.
The prototype software is released and
Activity C
integrated to the company’s suite of
software. But if there’s something wrong
the prototype, changes are required not
only with the software. It’s also possible
that the stable software should be
changed in order for them to be
integrated properly.
Prototype Model Advantages
Creating software using the prototype
model also has its benefits. One of the key
advantages
a
prototype
modeled
software has is the time frame of
development. Instead of concentrating on
documentation, more effort is placed in
creating the actual software. This way, the
actual software could be released in
advance. The work on prototype models
could also be spread to others since there
are practically no stages of work in this
model. Everyone has to work on the same
thing and at the same time, reducing man
hours in creating a software. The work will
even be faster and efficient if developers
will collaborate more regarding the status
of a specific function and develop the
necessary adjustments in time for the
integration.
Another advantage of having a prototype
modeled software is that the software is
created using lots of user feedbacks. In
every prototype created, users could give
Using internet collect information on “
RAD method “
Rapid application development (RAD) is a
software development methodology that
uses minimal planning in favor of rapid
prototyping. The "planning" of software
developed using RAD is interleaved with
writing the software itself. The lack of
extensive pre-planning generally allows
software to be written much faster, and
makes it easier to change requirements.
Rapid application development is a
software development methodology that
involves methods like iterative
development and software prototyping.
According to Whitten (2004), it is a
merger of various structured techniques,
especially data-driven Information
Engineering, with prototyping techniques
to accelerate software systems
development.
In rapid application development,
structured techniques and prototyping
are especially used to define users'
requirements and to design the final
system. The development process starts
with the development of preliminary data
models and business process models
using structured techniques. In the next
stage, requirements are verified using
prototyping, eventually to refine the data
and process models. These stages are
repeated iteratively; further development
results in "a combined business
requirements and technical design
statement to be used for constructing
new systems".
RAD approaches may entail compromises
in functionality and performance in
exchange for enabling faster development
and facilitating application maintenance.
When organizations adopt rapid
development methodologies, care must
be taken to avoid role and responsibility
confusion and communication breakdown
within a development team, and between
team and client. In addition, especially in
cases where the client is absent or not
able to participate with authority in the
development process, the system analyst
should be endowed with this authority on
behalf of the client to ensure appropriate
prioritization of non-functional
requirements. Furthermore, no increment
of the system should be developed
without a thorough and formally
documented design phase.
Ans : The spiral model of development
combines the features of the prototyping
model and the waterfall model. The spiral
model is favored for large, expensive, and
complicated projects. The advantage of
the spiral model is also that the
requirements and risk of a the software
are revisited in every cycle and that too
for the entire software developed till that
point. This ensures the success of the
software so developed. The final system is
thoroughly evaluated and tested. Routine
maintenance is carried out on a
continuing basis to prevent large-scale
failures and to minimize downtime
Review Questions
1. What do understand by “
waterfall model of SLDC ?
Illustrate with examples
Ans : SDLC means system development
life cycle waterfall method is one of the
most commonly used lifecycles for
developing software solutions. It is
suggests that each stage much like a
waterfall. Ti therefore means we must be
able to analysis 100% if the system & its
requirements before moving to the design
phase. The model is that there is no scope
for going back from the next stage to the
previous stage. Some proponents of this
model have therefore added feedback
flows so that during design if some
problems are detected one could go back
to the analysis stage correct the analysis
and then revisit the design phase.
2. What do understand by “ Spiral
Model of SLDC ? illustrate with
examples
3. “Maintenance is important phase
of SLDC” comment
Ans : Software Development Life Cycle is a
model of a detailed plan on how to
create, develop, implement and
eventually fold the software. It’s a
complete plan outlining how the software
will be born, raised and eventually be
retired from its function. Although some
of the models don’t explicitly say how the
program will be folded, it’s already
common knowledge that software will
eventually have it’s ending in a never
ending world of change web, software
and programming technology. The
maintenance of software is an important
aspect of SDLC. The software will
definitely undergo change once it is
delivered to the customer. Change could
happen because of some unexpected
input of values into the system/software
or the changes in the system could
directly affect the software operations.
Sometimes new changes are
implemented which requires the system
updates
Chapter 16 - Visualising a Software
Solution
Activity A
Using Internet Collect information on GUI
(Graphical User Interface)
In computing a graphical user interface
(GUI, sometimes pronounced gooey) is a
type of user interface that allows users to
interact with electronic devices with
images rather than text commands. GUIs
can be used in computers, hand-held
devices such as MP3 players, portable
media players or gaming devices,
household appliances and office
equipment. A GUI represents the
information and actions available to a
user through graphical icons and visual
indicators such as secondary notation, as
opposed to text-based interfaces, typed
command labels or text navigation. The
actions are usually performed through
direct manipulation of the graphical
elements.
The term GUI is historically restricted to
the scope of two-dimensional display
screens with display resolutions capable
of describing generic information, in the
tradition of the computer science
research at the Palo Alto Research Center
(PARC). The term GUI earlier might have
been applicable to other high-resolution
types of interfaces that are non-generic,
such as videogames, or not restricted to
flat screens, like volumetric displays.
Activity B
Using Internet collect information on
Web Designing?
Web design is used as a general term to
describe any of the various tasks involved
in creating a web page. More specifically,
it refers to jobs focused on building the
front-end of a web page.
The web consists of myriad pages,
presenting information using different
technologies and linked together with
hyperlinks. There are two basic aspects to
any web page found on the Internet. The
first is a presentation that the user
interacts with, usually visually, while the
second is a back-end that includes
information for non-human browsers.
The basic markup language used to tell a
browser how to present information is
called the HyperText Markup Language
(HTML). A stricter version of HTML is also
widely used, known as eXtensible
HyperText Markup Language (XHTML).
Using HTML or XHTML, a web designer is
able to tell a browser how a web page
should appear. In the last few years there
has been a push towards separating the
underlying structure of a web-page (using
HTML) from the visual presentation of the
site (using Cascading Style Sheets or CSS).
This approach has a number of major
benefits in both the short and long term,
and is gathering popularity as time
progresses.
Review Questions
1. What do you understand by
Stakeholder Analysis?
Stakeholder management is critical to the
success of every project in every
organization I have ever worked with. By
engaging the right people in the right way
in your project, you can make a big
difference to its success... and to your
career."
Stakeholder Management is an important
discipline that successful people use to
win support from others. It helps them
ensure that their projects succeed where
others fail.
Stakeholder Analysis is the technique
used to identify the key people who have
to be won over. You then use Stakeholder
Planning to build the support that helps
you succeed.
The benefits of using a stakeholder-based
approach are that:
 You can use the opinions of the
most powerful stakeholders to
shape your projects at an early
stage. Not only does this make it
more likely that they will support
you, their input can also improve
the quality of your project

Gaining support from powerful
stakeholders can help you to win
more resources – this makes it
more likely that your projects will
be successful

By communicating with
stakeholders early and frequently,
you can ensure that they fully
understand what you are doing
and understand the benefits of
your project – this means they
can support you actively when
necessary
You can anticipate what people's reaction
to your project may be, and build into
your plan the actions that will win
people's support.
2. Write a use case for car rental.
Ans : A travel agent wants to offer to
customers the ability to book complete
packages that may consist of services
offered by various providers. The
available services may car rental.
The goal of the consumer is to get the
best combination of services and prices
suiting their needs. The travel agent tries
to maximize customer satisfaction and sell
packages. Service providers aim to sell as
many products as possible. Credit card
companies guarantee and perform
payments for purchased products.
In this scenario, service providers offer
Web Services that could be used by the
Travel agent to query their offerings and
perform various tasks such as
reservations. Credit card companies
provide services to guarantee payments
made by consumers. The client should be
able to query, reserve and purchase any
available service. The basic steps of the
interaction are listed below:
1. The client interacts with the travel
agent to request information
about various services.
2. Prices and availability matching
the client requests are returned
to the client. The client can then
perform one of the following
actions:
a. The client can refine their
request for information,
possibly selecting more
services from the provider
OR
b. The client may reserve
services based on the
response, OR
3. The client may quit the
interaction with the travel agent
4. When a customer makes a
reservation, the travel agent then
checks the availability of the
requested services with each
service provider.
5. Either - All services are available,
in which case they are reserved.
OR
- For those services that are
not available, the client is
informed.
Either -Given alternative options for those
services. OR
-Client is advised to restart the search by
going back to step 1.
- Go back to step 3.
6. For every relevant reserved
service the travel agent takes a
deposit for the reservation. A
credit card can be used as a form
of deposit
7. The client is then issued a
reservation number to confirm
the transaction.
8. Between the reservation time and
the final date for confirmation,
the client may modify the
reservation. Modifications may
include cancellation of some
services or the addition of extra
services.
a. Client is expected to fully
pay for those relevant
services that require full
payment prior to final
confirmation.
Requirements
1. Need to facilitate cancellation of
orders and exception handling.
2. Needs callbacks to be able to
express asynchronous
interactions such as credit
checking in a credit card company
or availability from an airline.
3. Needs hierarchical composition to
be able to reuse established
choreographies such as that used
by a credit card company.
4. Needs reference passing to
enable the car hire company to
interact with the credit card
company on behalf of the user.
5. Need to demarcate transactional
boundaries in order to define the
collaboration boundaries in order
to provide guidance on the
underlying infrastructure required
to implement the collaboration.
6. Need variable timeouts to model
different interactions that have a
different time-to-live. For
instance, each carrier may impose
a different limitation on the
lifetime of a pending reservation.
Need to be able to express concurrent
paths in order to check availability of
services at multiple service providers.
3. What is the importance of user
GUI?
1. One of the most important
features of a good user interface
is the practice of adding clear
navigation aids. Some websites
lack this common sense and
jumble up the local organization
of information. This makes it
frustrating for the users who vow
never to visit the website. Clear
graphics, summary screens, text
overviews and graphic identity
schemes can help users find a
particular product or service
without wasting their time.
2. Another important aspect of a
good graphic user interface is an
efficient hierarchy of information.
Users need to have information in
minimum possible steps.
Research suggests that users
prefer menus with a maximum of
five links. So, an efficient
hierarchy of information with
minimum steps throughout the
menu pages will do the trick.
3. Custom web site design in India
prefers to design websites with an
easy user interface in mind. The
firms make sure that the interface
metaphors should be logical,
familiar and simple. The same
goes ecommerce website design
in India. The websites are built
with a consistent pattern of
modular units, graphic themes,
easy shopping cart features, basic
layout grids and easy hierarchies
of organizations. A company
specializing custom ecommerce
website India ensures the
corporate identity is present on
every web page, thus creating a
consistent user interface.
Custom web site design in India always
has a consistent approach in the layout of
titles, page headers, footers, and
navigation links. Through constant
research on the needs of the target
audience, Indian website designers create
sample scenarios. This helps them to
determine whether a casual user be
intimated by a complex menu scheme or
whether an experienced user seeking a
specific information can be helped by the
design of the web page.
Chapter 17 - Software Testing
Chapter 18 - Information Security
Activity A
Activity A
Using internet collect information on
“ISO standards on software testing”
Activity B
Using internet collect information on
“User acceptance software testing”
Review Questions
1. What do you understand by
white box software testing?
White-box testing (a.k.a. clear box testing,
glass box testing, transparent box testing,
or structural testing) is a method of
testing software that tests internal
structures or workings of an application,
as opposed to its functionality. In whitebox testing an internal perspective of the
system, as well as programming skills, are
required and used to design test cases.
The tester chooses inputs to exercise
paths through the code and determine
the appropriate outputs. This is analogous
to testing nodes in a circuit.
White-box testing is usually done at the
unit level. It can test paths within a unit,
paths between units during integration,
and between subsystems during a system
level test. Though this method of test
design can uncover many errors or
problems, it might not detect
unimplemented parts of the specification
or missing requirements.
Using internet collect information on “IT
Security, control, Audit & governance”
IT Security, as a concept, is often
synonymous with Computer Security,
Information Security, Information
Assurance, or Cyber Security.
Each of these security concepts have
slight differences in meaning, but
primarily focus on the protection of
information or data, not computer
systems.
If information is so important, then what
is it?
Information could simply be data flowing
through a computer network, or the key
elements of a computer operating system,
or even a simple electronic document
stored on a hard drive.
Information can be stolen, modified,
corrupted and even used as a weapon to
deny access to information stored on
other computer systems or networks.
Today, we will look at the principle goals
in the overall concept of IT security and
take a look at some of the various
certifications available to IT security
professionals.
Control:
A control system is a device or set of
devices to manage, command, direct or
2. Why user acceptance is most
important test?(information on
user acceptance software
testing)
User Acceptance Testing (UAT) is essential
for the successful implementation of any
system and relies on the end user – often
the client – investing sufficient time into
the process. It determines the success of a
project. Completed successfully it will
remove any unintended errors before you
launch the system.
regulate the behavior of other devices or
systems. There are two common classes
of control systems, with many variations
and combinations: logic or sequential
controls, and feedback or linear controls.
There is also fuzzy logic, which attempts
to combine some of the design simplicity
of logic with the utility of linear control.
Some devices or systems are inherently
not controllable. A control system is a
device or set of devices to manage,
command, direct or regulate the behavior
of other devices or systems.
IT Audit :
An information technology (IT)
audit or information systems (IS) audit is
an examination of the controls within an
entity's information technology
infrastructure. These reviews may be
performed in conjunction with a financial
statement audit, internal audit, or other
form of attestation engagement. An IT
audit is the process of collecting and
evaluating evidence of an organization's
information systems, practices, and
operations. Obtained evidence evaluation
can ensure whether the organization's
information systems safeguard assets,
maintains data integrity, and is operating
effectively and efficiently to achieve the
organization's goals or objectives."
IT Governance:
IT Governance is "a framework for the
leadership, organizational structures and
business processes, standards and
compliance to these standards, which
ensure that the organization’s IT supports
and enables the achievement of its
strategies and objectives."
Activity B
Using internet collect Information on
“Information Security Standards BS7799
?”
Ans:
BS 7799-3:2005 is the latest iteration of
the BS7799 series, and is officially titled:
Information Security Management
Systems - Guidelines for Information
Security Risk Management
BS7799 is a very detailed security
standard. It is organized into ten major
sections, each covering a different topic
or area:
1. Business Continuity Planning
The objectives of this section are as
follows: To counteract interruptions to
business activities and to critical business
processes from the effects of major
failures or disasters.
2. System Access Control
The objectives of this section are as
follows: 1) To control access to
information 2) To prevent unauthorised
access to information systems 3) To
ensure the protection of networked
services 4) To prevent unauthorized
computer access 5) To detect
unauthorised activities. 6) To ensure
information security when using mobile
computing and tele-networking facilities
3. System Development and
Maintenance
The objectives of this section are as
follows: 1) To ensure security is built into
operational systems; 2) To prevent loss,
modification or misuse of user data in
application systems; 3) To protect the
confidentiality, authenticity and integrity
of information; 4) To ensure IT projects
and support activities are conducted in a
secure manner; 5) To maintain the
security of application system software
and data.
4. Physical and Environmental Security
The objectives of this section are as
follows: To prevent unauthorised access,
damage and interference to business
premises and information; to prevent
loss, damage or compromise of assets and
interruption to business activities; to
prevent compromise or theft of
information and information processing
facilities.
5. Compliance
The objectives of this section are as
follows: 1) To avoid breaches of any
criminal or civil law, statutory, regulatory
or contractual obligations and of any
security requirements 2) To ensure
compliance of systems with organizational
security policies and standards 3) To
maximize the effectiveness of and to
minimize interference to/from the system
audit process.
of security controls customized to the
needs of individual organizations or
parts thereof.
ISO/IEC 27001:2005 is designed to
ensure the selection of adequate
and proportionate security
controls that protect information
assets and give confidence to
interested parties.
ISO/IEC 27001:2005 is intended to
be suitable for several different
types of use, including the
following:
It covers the following:





Risk assessment
Risk treatment
Management decision making
Risk re-assessment
Monitoring and reviewing of risk
profile
 Information security risk in the
context of corporate governance
 Compliance with other risk based
standards and regulations




Activity C
Using internet collect information on
“ISO Standards on Information Security”
Ans:
ISO/IEC 27001:2005 covers all types of
organizations (e.g. commercial
enterprises, government agencies,
not-for profit organizations). ISO/IEC
27001:2005 specifies the
requirements for establishing,
implementing, operating, monitoring,
reviewing, maintaining and improving
a documented Information Security
Management System within the
context of the organization's overall
business risks. It specifies
requirements for the implementation




use within organizations to
formulate security requirements
and objectives;
use within organizations as a
way to ensure that security risks
are cost effectively managed;
use within organizations to
ensure compliance with laws
and regulations;
use within an organization as a
process framework for the
implementation and
management of controls to
ensure that the specific security
objectives of an organization are
met;
definition of new information
security management processes;
identification and clarification of
existing information security
management processes;
use by the management of
organizations to determine the
status of information security
management activities;
use by the internal and external
auditors of organizations to
determine the degree of
compliance with the policies,



directives and standards
adopted by an organization;
use by organizations to provide
relevant information about
information security policies,
directives, standards and
procedures to trading partners
and other organizations with
whom they interact for
operational or commercial
reasons;
implementation of businessenabling information security;
use by organizations to provide
relevant information about
information security to
customers.
Review Questions
1. What are the objectives of
Information Security
Management?
Ans:
Security objectives are met when:
*Information is available and usable when
required, and the systems that provide it
can appropriate resist attacks and recover
from or prevent failures (availability)
* Information is observed by or disclosed
to only those who have a right to know
(confidentiality)
* Information is complete, accurate and
protected against unauthorized
modification (integrity)
* Business transactions, as well as
information exchanges between
enterprises, or with partners,
can be
trusted (authenticity and nonrepudiation).
Information Security Management
ensures that the confidentiality, integrity
and availability of an organization’s
assets, information, data and IT services is
maintained. Information Security
Management must consider the following
four perspectives:
Organizational – Define security policies
and staff awareness of these
* Procedural – Defined procedures used
to control security
* Physical – Controls used to protect any
physical sites against security incidents
* Technical – Controls used to protect the
IT infrastructure against security
incidents.
2. What steps organization should
take to implement Information
Security Standards BS7799
Ans:
You can aspire for BS 7799 certification
with the following steps.


Step 1: Establish importance of
information security in the
organization. In the current
scenario, this should not be
difficult. However, it will help if
you identify the critical business
processes, which are dependent
on information, and what is the
business risk if any—check if the
three pillars of information
security are compromised (i.e.
confidentiality, integrity and
availability).
Step 2: Set up a Security
Organization. You will need
organizational involvement to
define and implement security
measures. A steering committee
for BS 7799 project, a security
forum with representation of key
business and technology
departments, appointment of an
Information Security Officer and
defining security responsibilities








for protection of various assets
will have to be done.
Step 3: Define the Security Policy
for the company. This should be
endorsed by top management
and should convey their concern
and commitment.
Step 4: Define the scope of
Information Security
Management System (ISMS). This
could be business specific,
location specific or function
specific.
Step 5: Undertake risk
assessment. Start with business
risk assessment. This will help you
in identifying the risk areas for
detailed risk evaluation. Identify
and prioritize all the risks.
Step 6: Identify the controls
objectives and the control
options.
Step 7: Select appropriate
controls to fulfill the control
objectives. These controls will be
in the form of security policies,
procedures and products. Prepare
guidelines on how to implement
these controls.
Step 8: Implement and monitor
the controls. You should be able
to prove adequacy of the controls
in reducing the risks.
Step 9: Make a table of all the 127
controls and map the controls
implemented by you against
relevant control objectives. One
control may address more than
one control objective. If there are
some gaps, find out, whether
these are omissions or there are
no requirements of controls. Fill
up all the gaps.
Step 10: Make statement of
applicability, which justifies the
controls in place as well as those,
which really are not required. For
all exclusions, you should have a
justification backed by risk
assessment.




Step 11: Invite a certification body
for pre-assessment. Some of the
accredited certification agencies
are DNV, BSI, STQC.
Step 12: Take appropriate
measures to comply with all
observations.
Step 13: Get the final assessment
done.
Step 14: Acquire the coveted
certificate, which is valid for three
years. An external audit will be
done once a year.
3. What do you understand by
BCP/DR ? illustrate with example
Ans:
Business continuity planning (BCP) is
“planning which identifies the
organization's exposure to internal and
external threats and synthesizes hard and
soft assets to provide effective prevention
and recovery for the organization, whilst
maintaining competitive advantage and
value system integrity”. It is also
calledBusiness continuity & Resiliency
planning (BCRP). .
In plain language, BCP is working out how
to stay in business in the event of disaster.
Typical incidents include local events like
building fires, regional incidents like
earthquakes or floods, or national
incidents like pandemic illnesses.
However, it is not limited to just that. Any
event that could cause the potential for
loss of business should be considered,
including any event that the business is
dependent on, such as loss of source of
supply, loss of critical infrastructure (a
major piece of machinery or
computing/network resource), or the
result of theft or vandalism. As such, risk
Using internet collect Information on The
cash & Mcfarlan’s strategic grid?
management must be incorporated as
The strategic grid model is an IT specific
part of BCP.
model that can be used to assess the
Disaster recovery is the process, policies
and procedures related to preparing for
recovery or continuation of technology
infrastructure critical to an organization
after a natural or human-induced disaster.
Disaster recovery is a subset of business
continuity. While business continuity
involves planning for keeping all aspects
of a business functioning in the midst of
disruptive events, disaster recovery
focuses on the IT or technology systems
that support business functions.
nature of the projects that the IT
organization has in its portfolio with the
aim of seeing how well that portfolio
supports the operational and strategic
interests of the firm.
The CIO plots projects and systems from
the IT organization’s portfolio on a two
dimensional graph. The X axis represents
As IT systems have become increasingly
critical to the smooth operation of a
company, and arguably the economy as a
whole, the importance of ensuring the
continued operation of those systems, or
the rapid recovery of the systems, has
increased.
impact of the project on IT strategy. One
way of expressing what we mean by this
is: what options does this project offer
the firm by way of affecting one of
Porter’s five forces in our favor? Does it
It is estimated that most large companies
spend between 2% and 4% of their IT
budget on disaster recovery planning,
with the aim of avoiding larger losses in
the event that the business cannot
continue to function due to loss of IT
infrastructure and data. Of companies
that had a major loss of business data,
43% never reopen, 51% close within two
years, and only 6% will survive long-term.
change the nature of competition in our
As a result, preparation for continuation
or recovery of systems needs to be taken
very seriously. This involves a significant
investment of time and money with the
aim of ensuring minimal losses in the
event of a disruptive event.
enable us to substitute one of ours for
market, affect the bargaining power of
buyers or suppliers, raise or lower the
barriers to entry into our market, or
change switching costs for our products
and services? Does it enable us to offer
completely new products and services, or
one of someone else’s in the eyes of
their customers?
The Y axis represents the impact of the
Chapter 19 - Long Range Planning of
Information Systems & Technology
project on IT operations. One way of
expressing this is to say that projects that
Activity A
are high on this axis improve the
efficiency or quality of our existing
systems and business processes, or lower
their costs.

The graph is usually drawn like so:


improvements for individual
users.
Factory: high operational impact,
low strategic impact. This
quadrant is about operational
improvements that affect large
portions of the firm, and are
aimed at improving performance
or decreasing cost.
Turnaround: low operational
impact, high strategic impact.
This quadrant is about exploiting
new technologies to provide
strategic opportunities.
Strategic: high operational
impact, high strategic impact. IT
organizations that have most
projects in this quadrant
understand that IT can both
improve core operations of the
firm while simultaneously
generating strategic options.
Activity B
Another way to think about the two axes
is in relation to Argyris’ organizational
learning styles: single loop and double
Using internet collect information on
Gartner’s group technology forecasts ?
Ans:
loop learning. Impact on operational
ability is like single loop learning:
incremental process improvements on
what we already do. Impact on strategy
is like double loop learning: look for a
completely new process.
GartnerGroup until 2001
Gartner is an information technology
research and advisory company providing
technology related insight. Research
provided by Gartner is targeted at CIOs
and senior IT leaders in industries that
include government agencies, high-tech
McFarlan divides the grid made by these
and telecom enterprises, professional
axes into four quadrants:
services firms, and technology investors.
Gartner clients include large corporations,

Support: low operational impact,
low strategic impact. This
quadrant is about local process
government agencies, technology
companies and the investment
community. The company consists of
Fleisher) who moved on to Warner Music
Research, Executive Programs, Consulting
Group in 2005.
and Events. Founded in 1979, Gartner has
over 4,300 employees, including 1,200
in R&D.
Gartner uses hype cycles and magic
quadrants for visualization of its market
Activity C
Using internet collect information on
“Gartner’s magic quadrant”
Positioning Technology Players Within a
Specific Market
analysis results.
History
The company was founded in 1979
by Gideon Gartner. Originally a private
company, the Gartner Group was
launched publicly in the 1980s, then
acquired by Saatchi & Saatchi, a Londonbased advertising agency, and then
acquired in 1990 by some of its
executives, with funding from Bain
Capital and Dun & Bradstreet. In 2001 the
name was simplified to Gartner.
In the course of its growth, Gartner has
acquired numerous companies providing
related services, including Real
Decisions (which became Gartner
Measurement, now part of Gartner's
consulting division), and Gartner
Dataquest (Gartner's market research
firm). It has also acquired a number of
direct competitors,
including NewScience in the late
1990s, Meta Group in 2005 and AMR
Research and Burton Group in early 2010.
The Chairman and CEO is Gene Hall (since
August 2004). Business performance
under Hall's management has continued
to grow since taking over from his
predecessor Michael Fleisher (Michael D.
Who are the competing players in the
major technology markets? How are they
positioned to help you over the long haul?
Gartner Magic Quadrants are a
culmination of research in a specific
market, giving you a wide-angle view of
the relative positions of the market's
competitors. By applying a graphical treatment and a uniform set of evaluation
criteria, a Gartner Magic Quadrant quickly
helps you digest how well technology
providers are executing against their
stated vision.
Magic Quadrants provide a graphical
competitive positioning of four types of
technology providers, where market
growth is high and provider differentiation
is distinct. Roll over the quadrants in the
graphic above for more information.
How Do You Use Magic Quadrants?
Clients use Magic Quadrants as a first step
to understanding the technology
providers they might consider for a
specific investment opportunity.
Keep in mind that focusing on the leaders'
quadrant isn't always the best course of
action. There are good reasons to
consider market challengers. And a niche
player may support your needs better
than a market leader. It all depends on
how the provider aligns with your
business goals.
How Do Magic Quadrants Work?
Magic Quadrants provide a graphical
competitive positioning of four types of
technology providers, where market
growth is high and provider
differentiation is distinct:
Leadersexecute well against their current
vision and are well positioned for
tomorrow.
Visionariesunderstand where the market
is going or have a vision for changing
market rules, but do not yet execute well.
Niche Playersfocus successfully on a small
segment, or are unfocused and do not
out-innovate or outperform others.
Challengersexecute well today or may
dominate a large segment, but do not
demonstrate an understanding of market
direction.
Review Questions
1. Explain Alfred Chandler’s
Business model?
Ans:
Alfred Chandler’s presented a simple
business model based on :
1. Business Strategy
2. Organizational Strategy
3. Systems & IT Strategy
Alfred Chandlers presented a simple but
very effective model which brought out
the close relationship that exist and
should exist between Business Strategy,
Organization and Processes / IT strategy,
model implies that in successful
organisations these three sides of triangle
each representing one of the strategies
seem to be well balanced.A change in one
impacts one or both other strategies.It
also means that systems or IT strategy can
be divided based on a good
understanding of the other two strategies.
This idea supports various previous
models such as the strategy set transform
which basically suggest that Systems & IT
strategy should be derived by
transforming business strategy.
One of the best cases on this subjects is
that of Mrs Fields Cookies. This case
developed by Harvard Business School
and quoted in literature related to IT
strategy is indeed a case in point.
2. Explain Cash & McFarlan’s
strategic Grid?
ANS:
The Strategic Grid for IT from McFarlan, is
a tool that can be used to assess
thecurrent operational dependence on
information systems (low, high) versus the
future potential strategic impact of
information systems (low, high).
Combining the 2 views in a matrix results
in 4 possible combinations:
1.
Support (currently low,
low in the future too). IT has little
relevance and simply supports
some processes. Firms or
systems in this quadrant will
place the least amount of
emphasis on IT (planning) in
terms of senior management
concern and involvement.
2.
Turnaround (currently
low, high in the future). IT will be
a key feature of future strategic
planning. Significant top
management involvement in IT
(planning) must be established.
3.
Factory (currently high,
low in the future). It is important
in terms of day-to-day operations
but it is not felt that there are
any major IT developments on
the horizon that will
fundamentally alter the nature of
the business. The level of senior
management involvement is
decreasing.
4.
Strategic (high, high). IT
Strategy is very important and
plays a critical role in the
formulation of the overall
business strategy. High level of
involvement of top management
in IT strategy.
One can use the McFarlan Grid to analyze
the impact of information systems as a
whole for an organization or for a division
or department of an organization. But the
strategic grid can also be used to analyze
the dependence and impact of individual
IT applications or systems.
3. Explain Nolan’s 5 Stages growth
model?
Ans:
Stage 1 – Initiation
Stage 1 key points:
user awareness "Hands Off".
IT personnel are "specialized for
technological learning".
IT planning and control is lax.
emphasis on functional applications to
reduce costs.
Stage 2 – Contagion
Stage 2 key points:
proliferation of applications.
users superficially enthusiastic about
using data processing.
management control even more lax.
rapid growth of budgets.
management regard the computer as
"just a machine".
rapid growth of computer use throughout
the organisation's functional areas.
computer use is plagued by crisis after
crisis.
Stage 3 – Admin & Integration
Stage 3 key points:
rise of control by the users.
large data processing budget growth.
demand for on-line database facilities.
data processing department operates like
a computer utility.
formal planning and control within data
processing.
users more accountable for their
applications.
use of steering committees, applications
financial planning.
data processing has better management
controls, standards, project management.
data administration is introduced.
identification of data similarities, its
usage, and its meanings within the whole
organisation.
applications portfolios are integrated into
the organisation.
data processing department serves more
as an administrator of data resources than
of machines.
use of term IT/IS rather than "data
processing".
Stage 4 – Maturity
Stage 4 key points:
systems that reflect the real information
needs of the organisation.
use of data resources to develop
competitive and opportunistic
applications.
data processing organisation viewed
solely as a data resource function.
data processing emphasis on data
resource strategic planning.
ultimately, users and DP department
jointly responsible for the use of data
resources within the organization.
manager of IT system takes on the same
importance in the organisational
hierarchy as (say) the director of finance
or director of HR.
Stage – 5 Decline
Each technology has a lifespan and unless
it is renovated and extended it may be
natural death.
Download