Suggested Answers
Information Technology & Systems (MB231) : April 2004
Section A : Basic Concepts
1. Answer : (b)
Reason : A macro is a set of operations that accomplishes a specific task. When a macro name is
issued, the entire set of operations is executed.
Tasks like printing a block of the worksheet, copying functions and formulae into a new
row, etc. can be saved as macros.
Hence, from above discussion, we can infer that option (b) is correct.
Option (a) is incorrect. Micros are not defined. So, they are not applicable here.
Option (c) is incorrect. Templates are ready-made designs, that include an overall layout,
font and font-size choices, a color scheme, and other design elements. So, they are not
applicable here.
Option (d) is incorrect. Functions help to write complex formulae more quickly in
spreadsheet programs. So, they are not applicable here.
Option (e) is incorrect. Cell references are ways to get values into a formula correctly, in a
spreadsheet program. So, they are not applicable here.
2. Answer : (d)
Reason : An Operating System performs certain basic functions like managing system resources,
controlling input/output processes and communicating between the user and the hardware
system.
An Operating System manages memory by dividing memory into regions which are
dedicated to a single application, preventing other programs from overwriting other
program's data and by moving infrequently-accessed portions of memory out to disk, and
only bringing them back in when they are used.
Hence, from above discussion, we can infer that option (d) is correct.
Option (a) is incorrect. Both (a) and (b) are applicable and not (a) alone.
Option (b) is incorrect. Both (a) and (b) are applicable and not (b) alone.
Option (c) is incorrect. Operating System does not check the contents of memory, to make
sure that a process is not wasting it. So, it is not applicable here.
Option (e) is incorrect, as option (d) is applicable here.
3. Answer : (e)
Reason : Following are the characteristics of high-level language:
(i) It is a procedural language that tells the computer what to do and how to do it.
(ii) It is usually compiled or interpreted.
(iii) It enables programmers to create programs at a higher level of abstraction, compared to
machine and assembly language.
(iv) It is user-friendly.
Hence, from above discussion, we can infer that option (e) is correct.
4. Answer : (e)
Reason : An index is a separate file from the master file to which it pertains. Each record in the index
contains two items of data: a record key and a storage address.
Following are the disadvantages of indexing a field in a database:
(i) It is slower than direct access.
(ii) Indexed files require more storage space than other types of files.
Hence, from above discussion, we can infer that option (e) is correct.
5. Answer : (a)
Reason : The main memory or primary storage is usually referred to as Random Access Memory
(RAM), as it is possible to randomly select and use any location of this memory to directly
store and retrieve data and instructions. Although RAM is fast, it has a drawback. Most
personal computer memory chips are Dynamic RAM (DRAM) chips, which are volatile, in which all
data disappear if the power fails.
Hence, from above discussion, we can infer that option (a) is correct.
6. Answer : (c)
Reason : A variable is a place in memory where data can be stored.
Hence, from above discussion, we can infer that option (c) is correct.
Option (a) is incorrect. Constant refers to a fixed value that does not change during the
execution of a program. So, it is not applicable here.
Option (b) is incorrect. Here class refers to Java class file, which is a precisely defined
format for compiled Java. Java source code is compiled into class files that can be loaded
and executed by any Java Virtual Machine. So, it is not applicable here.
Option (d) is incorrect. Method is a procedure or function that is associated with an object or
a class in Java. So, it is not applicable here.
Option (e) is incorrect. Data type specifies what types of data are to be stored in variables.
So, it is not applicable here.
7. Answer : (c)
Reason : An RDBMS consists of a collection of tables, each of which is assigned a unique name.
These tables consist of different fields which can be used together as and when necessary.
Hence, from above discussion, we can infer that option (c) is correct.
Options (a), (b), (d) and (e) are not correct regarding RDBMS.
8. Answer : (a)
Reason : Protocol is the term for a set of rules which computers must follow when communicating.
Hence, from above discussion, we can infer that option (a) is correct.
Option (b) is incorrect. Packet is the unit of data that is routed between an origin and a
destination on the Internet or any other packet-switched network. So, it is not applicable
here.
Option (c) is incorrect. Frame is a way of dividing up a single web page into independent
areas. So, it is not applicable here.
Option (d) is incorrect. Interface defines which primitive operations and services the lower
layer of protocols offers to the upper layer of protocols. So, it is not applicable here.
Option (e) is incorrect. Header contains certain information to identify the message. So, it is
not applicable here.
9. Answer : (d)
Reason : Executive Information System gives top management immediate and easy access to selective
information related to the firm's critical success factors.
Hence, from above discussion, we can infer that option (d) is correct.
Option (a) is incorrect. Transaction Processing System processes data generated from the
occurrence of business transactions. So, it is not applicable here.
Option (b) is incorrect. Management Information System is defined as a computer-based
system that provides flexible and speedy access to accurate data for managerial purposes. It
is not applicable here.
Option (c) is incorrect. Decision Support System provides direct support to decision-makers,
with the use of 'what-if' analysis, 'optimization models' etc. So, it is not applicable here.
Option (e) is incorrect. Artificial Intelligence System deals in computer functions associated
with human intelligence, such as reasoning, learning and problem solving. So, it is not
applicable here.
10. Answer : (c)
Reason : Multithreading enables the computer to execute more than one task in a single program.
Hence, from above discussion, we can infer that option (c) is correct.
Option (a) is incorrect. Cooperative Multitasking is the mechanism by which users can run
two or more programs. So, it is not applicable here.
Option (b) is incorrect. Preemptive Multitasking enables the operating system to regain
control if an application stops running and crashes. So, it is not applicable here.
Option (d) is incorrect. Multiprocessing refers to the use of two or more processors at a time.
So, it is not applicable here.
Option (e) is incorrect. Cooperative Multitasking and Preemptive Multitasking are not
applicable here.
11. Answer : (b)
Reason : Object-oriented programming achieves component reusability, wherein each program is
developed as a component which can be used in more than one project. C++ is an example of
an object-oriented programming language.
Hence, from above discussion, we can infer that option (b) is correct.
Option (a) is incorrect. C is not an object-oriented programming language. So, it is not
applicable here.
Option (c) is incorrect.
applicable here.
Option (d) is incorrect. Fortran is not an object-oriented programming language. So, it is not
applicable here.
Option (e) is incorrect. Basic is not an object-oriented programming language. So, it is not
applicable here.
12. Answer : (b)
Reason : "Physical Layer" of a network covers issues related to the physical medium between devices.
Routing capability is usually a characteristic of Network Layer and not Physical Layer.
Hence, from above discussion, we can infer that option (b) is the answer.
Options (a), (c), (d) and (e) are all characteristics of the "Physical Layer".
13. Answer : (d)
Reason : Hub is a concentrator that forms the center of a star-configured hierarchical wiring scheme.
Hence, from above discussion, we can infer that option (d) is correct.
Option (a) is incorrect. Router builds internetworks, in which networks that use different
topologies and protocols are interconnected. So, it is not applicable here.
Option (b) is incorrect. Repeater generates the electrical signal and doubles the allowable
length of the cable. So, it is not applicable here.
Option (c) is incorrect. A Redirector at the client workstation determines whether requests
made by a user are for the local operating system or should be redirected to a server on the
network. So, it is not applicable here.
Option (e) is incorrect. Bridge is used to add one network station to another station to
increase the distance of a network. So, it is not applicable here.
14. Answer : (a)
Reason : Cache refers to a small amount of extra high-speed memory that stores frequently used data.
Hence, from above discussion, we can infer that option (a) is correct.
Option (b) is incorrect. FAT (File Allocation Table) is a system which is used to catalog the
location of all portions of files on a disk. Files are rarely stored in contiguous locations on a
disk; hence the FAT keeps track of the various segments. So, it is not applicable here.
Option (c) is incorrect. ROM stands for Read Only Memory. In this memory, information is
permanently stored. Data can be read from it, and not written to it. So, it is not applicable
here.
Option (d) is incorrect. DRAM stands for Dynamic RAM. This memory is volatile, in which
all data disappear if the power fails. So, it is not applicable here.
Option (e) is incorrect. Hard disk stores the computer's operating system and applications,
and provides space for the user's data. So, it is not applicable here.
15. Answer : (b)
Reason : Packet switching involves subdividing communication messages into fixed or variable
groups called packets.
Packet switching best describes the Internet.
Hence, from above discussion, we can infer that option (b) is correct.
Options (a), (c), (d) and (e) are not applicable.
16. Answer : (c)
Reason : Action Document initiates actions by its recipient. A purchase indent triggers action to
purchase an item from a certain supplier.
Hence, from above discussion, we can infer that option (c) is correct.
Option (a) is incorrect. Information Document serves as a confirmation or proof for the
recipient that certain transactions have occurred. So, it is not applicable here.
Option (b) is incorrect. Turnaround Document is a document designed to initiate action and
then be returned for use in processing the completion of the transaction. So, it is not
applicable here.
Option (d) is incorrect. Transaction Log gives a detailed report of each transaction occurring
during a period. So, it is not applicable here.
Option (e) is incorrect. Edit Report describes errors detected during processing. So, it is not
applicable here.
17. Answer : (b)
Reason : In drill down operation, OLAP (Online Analytical Processing) moves in the reverse direction
and automatically displays detailed data that comprise consolidated information.
Hence, from above discussion, we can infer that option (b) is correct.
Option (a) is incorrect. Consolidation involves aggregation of data, like simple roll-ups or
complex groupings involving interrelated data. So, it is not applicable here.
Option (c) is incorrect. Slicing and dicing refers to the ability to look at database from
different viewpoints. So, it is not applicable here.
Option (d) is incorrect. Abstraction is the process of hiding background/implementation
details and representing only the essential features. So, it is not applicable here.
Option (e) is incorrect. Encapsulation allows one to group code and data in an object, which
is a sort of wrapper. This wrapper protects code and data from being accessed by other code.
So, it is not applicable here.
18. Answer : (c)
Reason : Processing Controls are developed to identify errors in arithmetic calculation and logical
operations.
Hence, from above discussion, we can infer that option (c) is correct.
Option (a) is incorrect. Input Controls are usually set in the form of login passwords and
other security codes, formatted data entry success, appropriate error signals etc. So, they are
not applicable here.
Option (b) is incorrect. Output Controls are developed to ensure that information products
are correct and complete. So, they are not applicable here.
Option (d) is incorrect. Procedural Controls are methods that specify how an organization's
computer and network resources should be operated for maximum security. So, they are not
applicable here.
Option (e) is incorrect. Facility controls protect an organization's computing and networking
facilities from loss or destruction. So, they are not applicable here.
19. Answer : (d)
Reason : In Logical level of data abstraction, each record is described by a type definition and the
interrelationship among these record types is defined.
Hence, from above discussion, we can infer that option (d) is correct.
Option (a) is incorrect. Physical layer of a network covers issues related to the physical
medium between devices. So, it is not applicable here.
Option (b) is incorrect. Data Link Layer of OSI Reference Model is responsible for
establishing an error-free communications path between computers over the physical
channel. So, it is not applicable here.
Option (c) is incorrect. Session Layer provides means for establishing, maintaining and
terminating a dialogue or session between two end users. So, it is not applicable here.
Option (e) is incorrect. View level of data abstraction is the highest level of data abstraction
and describes only a small part of the entire database. So, it is not applicable here.
20. Answer : (b)
Reason : Multiplexing is the term used when multiple frequencies are combined in a single physical
transport.
Hence, from above discussion, we can infer that option (b) is correct.
Option (a) is incorrect. Multitasking enables a single user to work with two or more
programs at once. So, it is not applicable here.
Option (c) is incorrect. Multiprocessing refers to the use of two or more processors at a time.
So, it is not applicable here.
Option (d) is incorrect. Circuit switching applies to regular telephone services, wherein a
switch opens a circuit to establish a link between a sender and a receiver and it remains open
till the communication session is completed. So, it is not applicable here.
Option (e) is incorrect. Packet switching involves subdividing communication messages into
fixed or variable groups called packets. So, it is not applicable here.
21. Answer : (e)
Reason : Hypertext Database must support the ability to retrieve documents based on links, and to
query documents based on their structure.
Hence, from above discussion, we can infer that option (e) is correct.
Option (a) is incorrect. Computer-Aided Design (CAD) database stores data pertaining to
an engineering design, including the components of the item being designed, the
interrelationship of components and old versions of designs. So, it is not applicable here.
Option (b) is incorrect. Computer-Aided Software Engineering (CASE) database stores data
required to assist software developers. So, it is not applicable here.
Option (c) is incorrect. Multimedia Database contains images, spatial data, audio data, video
data and the like. So, it is not applicable here.
Option (d) is incorrect. Office Information System includes workstation-based tools for
document creation and document retrieval, tools for maintaining appointment calendars, and
so on. So, it is not applicable here.
22. Answer : (a)
Reason : Public Data Network (PDN) is the network available for use on a fee per-byte-transmitted
and assures high security and bandwidth.
Hence, from above discussion, we can infer that option (a) is correct.
Option (b) is incorrect. Local Area Network (LAN) is a privately owned network within a
single building or campus of up to a few kilometres in size. So, it is not applicable here.
Option (c) is incorrect. Metropolitan Area Network (MAN) is a bigger version of LAN and
may cover a group of nearby corporate offices or a city and could be either private or public.
So, it is not applicable here.
Option (d) is incorrect. Public Switched Telephone Network (PSTN) was the first
telecommunications network developed for telephones. So, it is not applicable here.
Option (e) is incorrect. Internet is the network of networks. Most of the data are freely
available on Internet. So, it is not applicable here.
23. Answer : (c)
Reason : The link between a member and a variable in a C Structure is established using Dot operator.
Hence, from above discussion, we can infer that option (c) is correct.
Option (a) is incorrect. Logical operator is used to test more than one condition and make a
decision. So, it is not applicable here.
Option (b) is incorrect. Increment operator is used to increase the value of a variable. So, it is
not applicable here.
Option (d) is incorrect. Conditional operator is used to evaluate whether an expression is true
or false, and to take action accordingly. So, it is not applicable here.
Option (e) is incorrect. Bitwise operator is used for manipulation of data at the bit level. So,
it is not applicable here.
24. Answer : (e)
Reason : Usenet is the feature of Internet which allows messages about any subject to be posted and
other people on the Internet can reply to them.
Hence, from above discussion, we can infer that option (e) is correct.
Option (a) is incorrect. Internet Paging, also known as "Buddy List" software, runs on the
background of the user's computer, letting him/her know when his friends or coworkers
(only those who are registered) are online. So, it is not applicable here.
Option (b) is incorrect. Internet Fax is the mechanism of sending faxes through computers
connected over the Internet. So, it is not applicable here.
Option (c) is incorrect. Internet Telephony is the mechanism of carrying out telephonic
conversations over the Internet. So, it is not applicable here.
Option (d) is incorrect. Internet Relay Chat is an Internet service that enables a user to join
chat groups, called channels, and get into real-time text-based conversations. So, it is not
applicable here.
25. Answer : (d)
Reason : Collaborative Work Management Tools include calendaring and scheduling tools, task and
project management, workflow systems and knowledge management systems.
Hence, from above discussion, we can infer that option (d) is correct.
Option (a) is incorrect. Audio/Video Teleconferencing enables real-time video/audio
conferences among (1) networked PCs, known as desktop video conferencing or (2)
participants in conference rooms or auditoriums in different locations. So, it is not applicable
here.
Option (b) is incorrect. Electronic Meeting Systems help in carrying out electronic meetings
using a meeting room with networked PCs, a large screen projector and a software. So, they
are not applicable here.
Option (c) is incorrect. Workgroup Support Systems support various teams and workgroups,
each with its own work styles, agendas and tasks. So, they are not applicable here.
Option (e) is incorrect. Data Conferencing is a method where a Groupware Package connects
two or more PCs over the Internet or Intranets, so that a team can share, mark up and revise a
white board of drawings, documents and other material displayed on their screens. So, it is
not applicable here.
26. Answer : (a)
Reason : The Vi editor of UNIX has the facility of prefixing a number to any command so as to
enable the command to repeat the instructions many times. This prefixing number is called
Preceding count.
Hence, from above discussion, we can infer that option (a) is correct.
Option (b) is incorrect. There is no such thing as Succession count. So, it is not applicable
here.
Option (c) is incorrect. Word count gives the count of words in a file. So, it is not applicable
here.
Option (d) is incorrect. There is no such thing as Number count. So, it is not applicable here.
Option (e) is incorrect. Character count gives the count of characters in a file. So, it is not
applicable here.
27. Answer : (b)
Reason : Boot block is the block in UNIX which is not used by file systems other than the main file
system. It is usually used for booting purpose.
Hence, from above discussion, we can infer that option (b) is correct.
Option (a) is incorrect. Super block is used to control the allocation of disk blocks. So, it is
not applicable here.
Option (c) is incorrect. Data block is used to store the contents of files. So, it is not
applicable here.
Option (d) is incorrect. I-node block contains most information pertaining to files. So, it is
not applicable here.
Option (e) is incorrect. Indirect block is the eleventh data block, which contains the
addresses of the next 256 blocks of the file. So, it is not applicable here.
28. Answer : (c)
Reason : Integer Constant in C programming language can have only integer values.
It must not have a decimal point.
Hence, from above discussion, we can infer that option (c) is false with respect to Integer
Constant in C programming language.
Options (a), (b), (d) and (e) are all true with respect to Integer Constant in C programming
language.
29. Answer : (e)
Reason : The following tasks are carried out by 'for' loop in C programming language:
I. Initializing the loop counter.
II. Testing the loop counter to determine whether its value has reached the number of
repetitions desired.
III. Incrementing the value of the loop counter each time the segment within the loop has
been executed.
Hence, from above discussion, we can infer that option (e) is correct.
Options (a), (b), (c) and (d) are not correct as all of the three given alternatives are applicable
and not just one or two alternative (s).
30. Answer : (e)
Reason : System Administration involves management of the entire system, ranging from maintaining
security, performing backups, providing reliable services to all users etc.
The System Administrator operates using the root account, but it need not be created
separately. It comes with every system.
Hence, from above discussion, we can infer that option (e) is not true regarding System
Administration in Unix.
Options (a), (b), (c) and (d) are all true regarding System Administration in Unix.
Section B : Caselets
1. Structured Query Language (SQL) lets users obtain immediate responses to ad hoc data requests. It consists of a
command keyword followed by additional information. By combining keywords, one can create powerful queries
that extract just the information one is looking for. The basic command consists of the following three
subcommands:
SELECT: This designates the particular data items to be accessed.
FROM: This designates the particular table storing the data item (s).
WHERE: This specifies the particular search parameters defining the data items to be selected.
The advantages that BRI would gain by using an SQL relational database system to build the new information
system are as under:
(i) Obtain immediate responses to ad hoc data requests.
(ii) Get timely information on products of various brands.
(iii) Enable managers to track changes fast enough to react to them.
(iv) Retrieve data easily each night from the outlet stores.
(v) Ensure data integrity. i.e., validity of data contained in the database.
(vi) Avoid data redundancy. i.e., repetition of data.
(vii) Avoid data inconsistency.
2. TCP (Transmission Control Protocol) is a reliable connection-oriented protocol that allows a byte stream
originating on one system, to be delivered without error to any other system in the network. The internet protocol
(IP) provides for transmitting blocks of data called datagrams from sources to destinations, where sources and
destinations are hosts identified by fixed length addresses.
TCP/IP-based network retrieved data each night from the outlet stores. It used the data to record the financial
books for the stores and to track systemwide beer sales.
The TCP/IP (Transmission Control Protocol/Internet Protocol) Reference Model was used in the grandparent of all
computer networks, the ARPANET, and is presently used by its successor, the worldwide Internet.
It has the following four layers:
(i) Internet Layer:
This is the key layer that holds the whole architecture together. It permits the hosts to inject packets into any
network and make them travel independently to the destination.
The Internet Layer defines an official packet format and protocol called IP (Internet Protocol). This layer
delivers IP packets where they are supposed to reach.
(ii) Transport Layer:
This layer is designed to allow peer entities on the source and destination hosts to carry on a conversation.
Two end-to-end protocols have been defined here. The first one, TCP (Transmission Control Protocol) is a
reliable connection-oriented protocol that allows a byte stream originating on one system, to be delivered
without error to any other system in the network. TCP also handles flow control to make sure a fast sender
does not swamp a slow receiver with more messages than it can handle.
The second protocol, UDP (User Datagram Protocol) is an unreliable, connectionless protocol for
applications that do not want TCP's sequencing or flow control, and those which wish to provide their own.
It is also used for one-shot, client-server type request-supply queries and applications in which prompt
delivery is more important than accurate delivery, such as transmitting speech or video.
(iii) Application Layer:
This layer is just above the transport layer. It contains all the higher level protocols. The early ones include
virtual terminal (TELNET), file transfer (FTP) and electronic mail (SMTP).
The virtual terminal protocol allows a user on one computer to log onto a distant machine and work there.
The file transfer protocol provides a way to move data efficiently from one computer to another. Electronic
mail was originally just a kind of file transfer, but later a specialized protocol was developed for it called
SMTP. Other protocols have been added to these over the years, such as Domain Name Service (DNS) for
mapping host names onto their addresses, HTTP, the protocol used for fetching pages on the world wide web
and many others.
(iv) Host-to-Network Layer:
The TCP/IP Reference Model does not discuss much about this layer except that the host has to connect to
the network using some protocol so that it can send IP packets over it. This protocol varies from host to host
and from network to network.
3. Online Analytical Processing (OLAP) is a capability of management, decision support and executive information
systems that enables managers and analysts to interactively examine and manipulate large amounts of detailed and
consolidated data from various perspectives. An OLAP session takes place online in real-time, with rapid
responses to queries, so that the decision-making process is undisturbed.
Online transactional information gave BRI accurate, up-to-date picture of ongoing operations. It helped them to
continually stay on top of sales performance and make adjustments quickly whenever necessary. The delays
associated with old-style batch processing were removed.
4. The advantages of using an online service for a consumer to contact vendors are as follows:
(i) He/she can be free and more direct on the online services than on the telephone.
(ii) Payments can directly be made to the vendor, from the comfort of home, through the web-site with the help
of credit card or other payment mode.
(iii) In many cases, one can track the status of shipment through the web-site.
The disadvantages of using an online service for a consumer to contact vendors are as follows:
(i) The web-site may be down and the vendor cannot be contacted.
(ii) Face-to-face conversation is not possible.
(iii) The urgency of a delivery may not be communicated properly to the vendor.
5. This action is of course not ethical.
The actions that can be taken against the competitor and ways by which such problems can be prevented in the
future, are as follows:
(i) Sue the competitor and see to it that legal actions are taken against him/her.
(ii) Institute proper Ethical Code in the organization to prevent employees from getting wrongly influenced by
competitors.
(iii) Take strict action against employees who resort to unethical practices.
(iv) Allow only authorised users to access the Bulletin Board Service.
(v) Use proper passwords and user names for validation.
(vi) Institute suitable firewalls to prevent the Bulletin Board Service from being flooded with unwanted data.
(vii) Make an employee in-charge of the smooth functioning of the Bulletin Board Service.
6 The problems faced by Sherwin-Williams managers were as follows:
(i) There was little horizontal communication between individual stores or districts.
(ii) The managers used to spend a lot of time every week producing the sales reports.
(iii) As upper management was always in a hurry to see the data, there was only enough time to collect basic
sales figures.
(iv) The top management was unable to get more detailed data from individual stores.
(v) For the same reason, detailed comparisons among regions were not possible by top management.
(vi) Even, district managers were not able to compare their sales to those of the other districts.
7. MIS can be defined as a computer-based system that provides flexible and speedy access to accurate data for
managerial purposes.
Managers at Sherwin-Williams can use MIS to request information at their networked workstation that supports
their decision-making activities. This information takes the form of periodic, exception and demand reports and
immediate responses to enquiries. Web browsers, application programs and database management software
provide access to information in the Intranet and other operational databases of the organization. The information
reports generated by MIS can be categorized into four major reporting alternatives:
(i) Periodic Scheduled Reports:
This traditional form of providing information to managers uses a pre-specified format, designed to provide
managers with information on a regular basis. Typical examples of such periodic schedules are daily/weekly
sales analysis reports, monthly financial statements etc.
(ii) Exception Reports:
Such reports are generated only in exceptional situations. The information content may or may not be
included in periodic reports. Such reports help the managers to take immediate remedial measures and save
costs to the organization.
(iii) Demand Reports and Responses:
Here, information is available whenever a manager demands it. For example, web browser and DBMS query
languages and report generators enable managers at PC workstations to get immediate responses, or find and
obtain customized reports as a result of their requests for the information they need.
(iv) Push Reporting:
Information is pushed to a manager's workstation. Nowadays, many companies are using web casting
software to selectively broadcast reports and other information to the networked PCs of managers, over their
corporate Intranet.
However, to make effective use of MIS, managers have to start making use more of their personal computers
which are internetworked.
Section C: Applied Theory
8. The various functional information systems of an organization are:
(i) Marketing Information Systems
The various components are:
(a) Interactive Marketing
This is a type of marketing that is based on using the Internet, Intranets etc. to establish a two-way
interaction between a business and its customers or potential customers.
(b) Sales Force Automation:
Sales people are provided with portable computers and necessary sales contact management software,
which dramatically speeds up the capture and analysis of sales data from the field and their transmission
to marketing managers at the company headquarters.
(c) Sales/Product Management:
Computer-based systems can be used to generate sales analysis reports that analyse sales by product,
product line, customer, salesperson and sales territory.
Marketing pricing decision is another onerous task that can be handled with the help of such systems. In
general, such systems are used to evaluate the performance of current products and the prospects of
success of proposed products.
(d) Advertising and Promotions:
Marketing information systems use information from market research and models of promotion to (1)
select the appropriate media and promotional methods, (b) allocate financial resources and (c) evaluate
the results of various advertising and promotional campaigns.
(e) Market Research and Forecasting:
Information systems that support market research activities provide marketing intelligence to help
managers make better marketing forecasts and develop more effective marketing strategies. Various
statistical software tools help managers analyse market research data and forecast sales and other
important market trends.
(ii) Manufacturing Information Systems
The various components are:
(a) Computer Integrated Manufacturing (CIM):
Computers are used to help engineers design better products using both Computer Aided Engineering
and Computer Aided Design (CAD). Production processes are improved with the help of Computer
Aided Process Planning. Planning of material types required for the production process is done with the
help of Materials Requirement Planning Systems. This is further integrated with production scheduling
and shop floor operations, and such an integration is known as Manufacturing Resource Planning.
(b) Computer Aided Manufacturing (
The production process is automated by monitoring and controlling the process through Manufacturing
Execution System, or by directly controlling a physical process (process control), or a machine tool
(machine control), or machines with some human-like work capabilities (robots).
(c) Manufacturing Execution System (MES):
These are performance-monitoring systems for shop floor operations. MES includes shop floor
scheduling and control, machine control, robotics control and process control.
(d) Process Control Systems:
They are computer systems that control an ongoing physical manufacturing process. Such systems
require use of special sensing devices that measure physical phenomena such as temperature, pressure
etc.
(iii) Human Resource Information Systems:
The various components are:
(a) Staffing:
Information systems that support staffing must record and track human resources within the company
and maximize their use. For example, a personnel record-keeping system keeps track of additions,
deletions and other changes to the records in the personnel database. Another application that can
improve the efficiency of this sub-function is personnel requirement forecasting. It provides forecasts of
personnel requirements in each major job category for various company departments or for new projects
being planned by the departments.
(b) Training and Development:
Information systems allow HR managers to plan and monitor employee recruitment, training and
development programs by analyzing the success history of present programs. They also analyze the
career development status of each employee to determine whether development methods such as training
programs and periodic performance appraisals should be recommended.
(c) Compensation Analysis:
The range and distribution of employee compensation (like wages, salaries, incentive and fringe
benefits) can be analyzed with the help of information systems. This helps the company to make
comparisons of such compensations with industry standards and other economic indicators.
(iv) Accounting Information Systems:
They are based on the double entry bookkeeping concept, and also on more recent ones like responsibility
accounting, activity based costing etc. Computer-based accounting systems record and report the flow of
funds through an organization on a chronological basis and produce important financial statements such
as Balance Sheets and Income Statements. Such systems also produce forecasts of future conditions such
as projected financial statements and financial budgets.
9. Novell Netware Operating System is a 32-bit network operating system that runs on processors of Intel 80386 and
above. The operating system provides services to client workstations, and to client-server operating systems.
Netware provides different types of services. The core services called the Netware Core Protocol (NCP) include
file access, file locking, resource tracking and allocating, event notification and other services to workstations that
request them. Netware is an ideal platform for server applications as it is modular and expandable. Additional
core services can be installed by loading netware loadable modules (NLM). These services could be name space
support, internetworking, host connectivity, messaging services, communication services, etc.
The most significant feature of NetWare 4.1 is Netware Directory Services (NDS), which provides both users and
network administrators with a single integrated view of an entire network and the servers connected to it. NDS
supports a network of servers where users can log in once and access the resources of any server depending on
their access rights.
Users and resources such as file servers and printers are represented by NOS as objects in the NDS tree. If any
information about a network resource is required, such as current statistics, then the user has to just double-click
the object that represents the volume.
0 Comments:
Post a Comment