Search Assignments and Papers Here ...

Google
 
For ICFAI Objective Questions check out http://www.quizmantra.com

Monday, May 25, 2009

Information Technology & Systems (MB231) : April 2004 Suggested Answers

Suggested Answers

Information Technology & Systems (MB231) : April 2004

Section A : Basic Concepts

1. Answer : (b)

Reason : A macro is a set of operations that accomplishes a specific task. When a macro name is

issued, the entire set of operations is executed.

Tasks like printing a block of the worksheet, copying functions and formulae into a new

row, etc. can be saved as macros.

Hence, from above discussion, we can infer that option (b) is correct.

Option (a) is incorrect. Micros are not defined. So, they are not applicable here.

Option (c) is incorrect. Templates are ready-made designs, that include an overall layout,

font and font-size choices, a color scheme, and other design elements. So, they are not

applicable here.

Option (d) is incorrect. Functions help to write complex formulae more quickly in

spreadsheet programs. So, they are not applicable here.

Option (e) is incorrect. Cell references are ways to get values into a formula correctly, in a

spreadsheet program. So, they are not applicable here.

  

2. Answer : (d)

Reason : An Operating System performs certain basic functions like managing system resources,

controlling input/output processes and communicating between the user and the hardware

system.

An Operating System manages memory by dividing memory into regions which are

dedicated to a single application, preventing other programs from overwriting other

program's data and by moving infrequently-accessed portions of memory out to disk, and

only bringing them back in when they are used.

Hence, from above discussion, we can infer that option (d) is correct.

Option (a) is incorrect. Both (a) and (b) are applicable and not (a) alone.

Option (b) is incorrect. Both (a) and (b) are applicable and not (b) alone.

Option (c) is incorrect. Operating System does not check the contents of memory, to make

sure that a process is not wasting it. So, it is not applicable here.

Option (e) is incorrect, as option (d) is applicable here.

  

3. Answer : (e)

Reason : Following are the characteristics of high-level language:

(i) It is a procedural language that tells the computer what to do and how to do it.

(ii) It is usually compiled or interpreted.

(iii) It enables programmers to create programs at a higher level of abstraction, compared to

machine and assembly language.

(iv) It is user-friendly.

Hence, from above discussion, we can infer that option (e) is correct.

  

4. Answer : (e)

Reason : An index is a separate file from the master file to which it pertains. Each record in the index

contains two items of data: a record key and a storage address.

Following are the disadvantages of indexing a field in a database:

(i) It is slower than direct access.

(ii) Indexed files require more storage space than other types of files.

Hence, from above discussion, we can infer that option (e) is correct.

  

5. Answer : (a)

Reason : The main memory or primary storage is usually referred to as Random Access Memory

(RAM), as it is possible to randomly select and use any location of this memory to directly

store and retrieve data and instructions. Although RAM is fast, it has a drawback. Most

  

personal computer memory chips are Dynamic RAM (DRAM) chips, which are volatile, in which all

data disappear if the power fails.

Hence, from above discussion, we can infer that option (a) is correct.

6. Answer : (c)

Reason : A variable is a place in memory where data can be stored.

Hence, from above discussion, we can infer that option (c) is correct.

Option (a) is incorrect. Constant refers to a fixed value that does not change during the

execution of a program. So, it is not applicable here.

Option (b) is incorrect. Here class refers to Java class file, which is a precisely defined

format for compiled Java. Java source code is compiled into class files that can be loaded

and executed by any Java Virtual Machine. So, it is not applicable here.

Option (d) is incorrect. Method is a procedure or function that is associated with an object or

a class in Java. So, it is not applicable here.

Option (e) is incorrect. Data type specifies what types of data are to be stored in variables.

So, it is not applicable here.

  

7. Answer : (c)

Reason : An RDBMS consists of a collection of tables, each of which is assigned a unique name.

These tables consist of different fields which can be used together as and when necessary.

Hence, from above discussion, we can infer that option (c) is correct.

Options (a), (b), (d) and (e) are not correct regarding RDBMS.

  

8. Answer : (a)

Reason : Protocol is the term for a set of rules which computers must follow when communicating.

Hence, from above discussion, we can infer that option (a) is correct.

Option (b) is incorrect. Packet is the unit of data that is routed between an origin and a

destination on the Internet or any other packet-switched network. So, it is not applicable

here.

Option (c) is incorrect. Frame is a way of dividing up a single web page into independent

areas. So, it is not applicable here.

Option (d) is incorrect. Interface defines which primitive operations and services the lower

layer of protocols offers to the upper layer of protocols. So, it is not applicable here.

Option (e) is incorrect. Header contains certain information to identify the message. So, it is

not applicable here.

  

9. Answer : (d)

Reason : Executive Information System gives top management immediate and easy access to selective

information related to the firm's critical success factors.

Hence, from above discussion, we can infer that option (d) is correct.

Option (a) is incorrect. Transaction Processing System processes data generated from the

occurrence of business transactions. So, it is not applicable here.

Option (b) is incorrect. Management Information System is defined as a computer-based

system that provides flexible and speedy access to accurate data for managerial purposes. It

is not applicable here.

Option (c) is incorrect. Decision Support System provides direct support to decision-makers,

with the use of 'what-if' analysis, 'optimization models' etc. So, it is not applicable here.

Option (e) is incorrect. Artificial Intelligence System deals in computer functions associated

with human intelligence, such as reasoning, learning and problem solving. So, it is not

applicable here.

  

10. Answer : (c)

Reason : Multithreading enables the computer to execute more than one task in a single program.

Hence, from above discussion, we can infer that option (c) is correct.

Option (a) is incorrect. Cooperative Multitasking is the mechanism by which users can run

two or more programs. So, it is not applicable here.

Option (b) is incorrect. Preemptive Multitasking enables the operating system to regain

  

control if an application stops running and crashes. So, it is not applicable here.

Option (d) is incorrect. Multiprocessing refers to the use of two or more processors at a time.

So, it is not applicable here.

Option (e) is incorrect. Cooperative Multitasking and Preemptive Multitasking are not

applicable here.

11. Answer : (b)

Reason : Object-oriented programming achieves component reusability, wherein each program is

developed as a component which can be used in more than one project. C++ is an example of

an object-oriented programming language.

Hence, from above discussion, we can infer that option (b) is correct.

Option (a) is incorrect. C is not an object-oriented programming language. So, it is not

applicable here.

Option (c) is incorrect. Ada is not an object-oriented programming language. So, it is not

applicable here.

Option (d) is incorrect. Fortran is not an object-oriented programming language. So, it is not

applicable here.

Option (e) is incorrect. Basic is not an object-oriented programming language. So, it is not

applicable here.

  

12. Answer : (b)

Reason : "Physical Layer" of a network covers issues related to the physical medium between devices.

Routing capability is usually a characteristic of Network Layer and not Physical Layer.

Hence, from above discussion, we can infer that option (b) is the answer.

Options (a), (c), (d) and (e) are all characteristics of the "Physical Layer".

  

13. Answer : (d)

Reason : Hub is a concentrator that forms the center of a star-configured hierarchical wiring scheme.

Hence, from above discussion, we can infer that option (d) is correct.

Option (a) is incorrect. Router builds internetworks, in which networks that use different

topologies and protocols are interconnected. So, it is not applicable here.

Option (b) is incorrect. Repeater generates the electrical signal and doubles the allowable

length of the cable. So, it is not applicable here.

Option (c) is incorrect. A Redirector at the client workstation determines whether requests

made by a user are for the local operating system or should be redirected to a server on the

network. So, it is not applicable here.

Option (e) is incorrect. Bridge is used to add one network station to another station to

increase the distance of a network. So, it is not applicable here.

  

14. Answer : (a)

Reason : Cache refers to a small amount of extra high-speed memory that stores frequently used data.

Hence, from above discussion, we can infer that option (a) is correct.

Option (b) is incorrect. FAT (File Allocation Table) is a system which is used to catalog the

location of all portions of files on a disk. Files are rarely stored in contiguous locations on a

disk; hence the FAT keeps track of the various segments. So, it is not applicable here.

Option (c) is incorrect. ROM stands for Read Only Memory. In this memory, information is

permanently stored. Data can be read from it, and not written to it. So, it is not applicable

here.

Option (d) is incorrect. DRAM stands for Dynamic RAM. This memory is volatile, in which

all data disappear if the power fails. So, it is not applicable here.

Option (e) is incorrect. Hard disk stores the computer's operating system and applications,

and provides space for the user's data. So, it is not applicable here.

  

15. Answer : (b)

Reason : Packet switching involves subdividing communication messages into fixed or variable

groups called packets.

Packet switching best describes the Internet.

Hence, from above discussion, we can infer that option (b) is correct.

  

Options (a), (c), (d) and (e) are not applicable.

16. Answer : (c)

Reason : Action Document initiates actions by its recipient. A purchase indent triggers action to

purchase an item from a certain supplier.

Hence, from above discussion, we can infer that option (c) is correct.

Option (a) is incorrect. Information Document serves as a confirmation or proof for the

recipient that certain transactions have occurred. So, it is not applicable here.

Option (b) is incorrect. Turnaround Document is a document designed to initiate action and

then be returned for use in processing the completion of the transaction. So, it is not

applicable here.

Option (d) is incorrect. Transaction Log gives a detailed report of each transaction occurring

during a period. So, it is not applicable here.

Option (e) is incorrect. Edit Report describes errors detected during processing. So, it is not

applicable here.

  

17. Answer : (b)

Reason : In drill down operation, OLAP (Online Analytical Processing) moves in the reverse direction

and automatically displays detailed data that comprise consolidated information.

Hence, from above discussion, we can infer that option (b) is correct.

Option (a) is incorrect. Consolidation involves aggregation of data, like simple roll-ups or

complex groupings involving interrelated data. So, it is not applicable here.

Option (c) is incorrect. Slicing and dicing refers to the ability to look at database from

different viewpoints. So, it is not applicable here.

Option (d) is incorrect. Abstraction is the process of hiding background/implementation

details and representing only the essential features. So, it is not applicable here.

Option (e) is incorrect. Encapsulation allows one to group code and data in an object, which

is a sort of wrapper. This wrapper protects code and data from being accessed by other code.

So, it is not applicable here.

  

18. Answer : (c)

Reason : Processing Controls are developed to identify errors in arithmetic calculation and logical

operations.

Hence, from above discussion, we can infer that option (c) is correct.

Option (a) is incorrect. Input Controls are usually set in the form of login passwords and

other security codes, formatted data entry success, appropriate error signals etc. So, they are

not applicable here.

Option (b) is incorrect. Output Controls are developed to ensure that information products

are correct and complete. So, they are not applicable here.

Option (d) is incorrect. Procedural Controls are methods that specify how an organization's

computer and network resources should be operated for maximum security. So, they are not

applicable here.

Option (e) is incorrect. Facility controls protect an organization's computing and networking

facilities from loss or destruction. So, they are not applicable here.

  

19. Answer : (d)

Reason : In Logical level of data abstraction, each record is described by a type definition and the

interrelationship among these record types is defined.

Hence, from above discussion, we can infer that option (d) is correct.

Option (a) is incorrect. Physical layer of a network covers issues related to the physical

medium between devices. So, it is not applicable here.

Option (b) is incorrect. Data Link Layer of OSI Reference Model is responsible for

establishing an error-free communications path between computers over the physical

channel. So, it is not applicable here.

Option (c) is incorrect. Session Layer provides means for establishing, maintaining and

terminating a dialogue or session between two end users. So, it is not applicable here.

Option (e) is incorrect. View level of data abstraction is the highest level of data abstraction

and describes only a small part of the entire database. So, it is not applicable here.

  

20. Answer : (b)

Reason : Multiplexing is the term used when multiple frequencies are combined in a single physical

transport.

Hence, from above discussion, we can infer that option (b) is correct.

Option (a) is incorrect. Multitasking enables a single user to work with two or more

programs at once. So, it is not applicable here.

Option (c) is incorrect. Multiprocessing refers to the use of two or more processors at a time.

So, it is not applicable here.

Option (d) is incorrect. Circuit switching applies to regular telephone services, wherein a

switch opens a circuit to establish a link between a sender and a receiver and it remains open

till the communication session is completed. So, it is not applicable here.

Option (e) is incorrect. Packet switching involves subdividing communication messages into

fixed or variable groups called packets. So, it is not applicable here.

  

21. Answer : (e)

Reason : Hypertext Database must support the ability to retrieve documents based on links, and to

query documents based on their structure.

Hence, from above discussion, we can infer that option (e) is correct.

Option (a) is incorrect. Computer-Aided Design (CAD) database stores data pertaining to

an engineering design, including the components of the item being designed, the

interrelationship of components and old versions of designs. So, it is not applicable here.

Option (b) is incorrect. Computer-Aided Software Engineering (CASE) database stores data

required to assist software developers. So, it is not applicable here.

Option (c) is incorrect. Multimedia Database contains images, spatial data, audio data, video

data and the like. So, it is not applicable here.

Option (d) is incorrect. Office Information System includes workstation-based tools for

document creation and document retrieval, tools for maintaining appointment calendars, and

so on. So, it is not applicable here.

  

22. Answer : (a)

Reason : Public Data Network (PDN) is the network available for use on a fee per-byte-transmitted

and assures high security and bandwidth.

Hence, from above discussion, we can infer that option (a) is correct.

Option (b) is incorrect. Local Area Network (LAN) is a privately owned network within a

single building or campus of up to a few kilometres in size. So, it is not applicable here.

Option (c) is incorrect. Metropolitan Area Network (MAN) is a bigger version of LAN and

may cover a group of nearby corporate offices or a city and could be either private or public.

So, it is not applicable here.

Option (d) is incorrect. Public Switched Telephone Network (PSTN) was the first

telecommunications network developed for telephones. So, it is not applicable here.

Option (e) is incorrect. Internet is the network of networks. Most of the data are freely

available on Internet. So, it is not applicable here.

  

23. Answer : (c)

Reason : The link between a member and a variable in a C Structure is established using Dot operator.

Hence, from above discussion, we can infer that option (c) is correct.

Option (a) is incorrect. Logical operator is used to test more than one condition and make a

decision. So, it is not applicable here.

Option (b) is incorrect. Increment operator is used to increase the value of a variable. So, it is

not applicable here.

Option (d) is incorrect. Conditional operator is used to evaluate whether an expression is true

or false, and to take action accordingly. So, it is not applicable here.

Option (e) is incorrect. Bitwise operator is used for manipulation of data at the bit level. So,

it is not applicable here.

  

24. Answer : (e)    

Reason : Usenet is the feature of Internet which allows messages about any subject to be posted and

other people on the Internet can reply to them.

Hence, from above discussion, we can infer that option (e) is correct.

Option (a) is incorrect. Internet Paging, also known as "Buddy List" software, runs on the

background of the user's computer, letting him/her know when his friends or coworkers

(only those who are registered) are online. So, it is not applicable here.

Option (b) is incorrect. Internet Fax is the mechanism of sending faxes through computers

connected over the Internet. So, it is not applicable here.

Option (c) is incorrect. Internet Telephony is the mechanism of carrying out telephonic

conversations over the Internet. So, it is not applicable here.

Option (d) is incorrect. Internet Relay Chat is an Internet service that enables a user to join

chat groups, called channels, and get into real-time text-based conversations. So, it is not

applicable here.

25. Answer : (d)

Reason : Collaborative Work Management Tools include calendaring and scheduling tools, task and

project management, workflow systems and knowledge management systems.

Hence, from above discussion, we can infer that option (d) is correct.

Option (a) is incorrect. Audio/Video Teleconferencing enables real-time video/audio

conferences among (1) networked PCs, known as desktop video conferencing or (2)

participants in conference rooms or auditoriums in different locations. So, it is not applicable

here.

Option (b) is incorrect. Electronic Meeting Systems help in carrying out electronic meetings

using a meeting room with networked PCs, a large screen projector and a software. So, they

are not applicable here.

Option (c) is incorrect. Workgroup Support Systems support various teams and workgroups,

each with its own work styles, agendas and tasks. So, they are not applicable here.

Option (e) is incorrect. Data Conferencing is a method where a Groupware Package connects

two or more PCs over the Internet or Intranets, so that a team can share, mark up and revise a

white board of drawings, documents and other material displayed on their screens. So, it is

not applicable here.

  

26. Answer : (a)

Reason : The Vi editor of UNIX has the facility of prefixing a number to any command so as to

enable the command to repeat the instructions many times. This prefixing number is called

Preceding count.

Hence, from above discussion, we can infer that option (a) is correct.

Option (b) is incorrect. There is no such thing as Succession count. So, it is not applicable

here.

Option (c) is incorrect. Word count gives the count of words in a file. So, it is not applicable

here.

Option (d) is incorrect. There is no such thing as Number count. So, it is not applicable here.

Option (e) is incorrect. Character count gives the count of characters in a file. So, it is not

applicable here.

  

27. Answer : (b)

Reason : Boot block is the block in UNIX which is not used by file systems other than the main file

system. It is usually used for booting purpose.

Hence, from above discussion, we can infer that option (b) is correct.

Option (a) is incorrect. Super block is used to control the allocation of disk blocks. So, it is

not applicable here.

Option (c) is incorrect. Data block is used to store the contents of files. So, it is not

applicable here.

Option (d) is incorrect. I-node block contains most information pertaining to files. So, it is

not applicable here.

Option (e) is incorrect. Indirect block is the eleventh data block, which contains the

addresses of the next 256 blocks of the file. So, it is not applicable here.

  

28. Answer : (c)

Reason : Integer Constant in C programming language can have only integer values.

It must not have a decimal point.

Hence, from above discussion, we can infer that option (c) is false with respect to Integer

Constant in C programming language.

Options (a), (b), (d) and (e) are all true with respect to Integer Constant in C programming

language.

  

29. Answer : (e)

Reason : The following tasks are carried out by 'for' loop in C programming language:

I. Initializing the loop counter.

II. Testing the loop counter to determine whether its value has reached the number of

repetitions desired.

III. Incrementing the value of the loop counter each time the segment within the loop has

been executed.

Hence, from above discussion, we can infer that option (e) is correct.

Options (a), (b), (c) and (d) are not correct as all of the three given alternatives are applicable

and not just one or two alternative (s).

  

30. Answer : (e)

Reason : System Administration involves management of the entire system, ranging from maintaining

security, performing backups, providing reliable services to all users etc.

The System Administrator operates using the root account, but it need not be created

separately. It comes with every system.

Hence, from above discussion, we can infer that option (e) is not true regarding System

Administration in Unix.

Options (a), (b), (c) and (d) are all true regarding System Administration in Unix.

  

Section B : Caselets

1. Structured Query Language (SQL) lets users obtain immediate responses to ad hoc data requests. It consists of a

command keyword followed by additional information. By combining keywords, one can create powerful queries

that extract just the information one is looking for. The basic command consists of the following three

subcommands:

SELECT: This designates the particular data items to be accessed.

FROM: This designates the particular table storing the data item (s).

WHERE: This specifies the particular search parameters defining the data items to be selected.

The advantages that BRI would gain by using an SQL relational database system to build the new information

system are as under:

(i) Obtain immediate responses to ad hoc data requests.

(ii) Get timely information on products of various brands.

(iii) Enable managers to track changes fast enough to react to them.

(iv) Retrieve data easily each night from the outlet stores.

(v) Ensure data integrity. i.e., validity of data contained in the database.

(vi) Avoid data redundancy. i.e., repetition of data.

(vii) Avoid data inconsistency.

  

2. TCP (Transmission Control Protocol) is a reliable connection-oriented protocol that allows a byte stream

originating on one system, to be delivered without error to any other system in the network. The internet protocol

(IP) provides for transmitting blocks of data called datagrams from sources to destinations, where sources and

destinations are hosts identified by fixed length addresses.

TCP/IP-based network retrieved data each night from the outlet stores. It used the data to record the financial

books for the stores and to track systemwide beer sales.

The TCP/IP (Transmission Control Protocol/Internet Protocol) Reference Model was used in the grandparent of all

computer networks, the ARPANET, and is presently used by its successor, the worldwide Internet.

It has the following four layers:

(i) Internet Layer:

This is the key layer that holds the whole architecture together. It permits the hosts to inject packets into any

network and make them travel independently to the destination.

The Internet Layer defines an official packet format and protocol called IP (Internet Protocol). This layer

delivers IP packets where they are supposed to reach.

(ii) Transport Layer:

This layer is designed to allow peer entities on the source and destination hosts to carry on a conversation.

Two end-to-end protocols have been defined here. The first one, TCP (Transmission Control Protocol) is a

reliable connection-oriented protocol that allows a byte stream originating on one system, to be delivered

without error to any other system in the network. TCP also handles flow control to make sure a fast sender

does not swamp a slow receiver with more messages than it can handle.

The second protocol, UDP (User Datagram Protocol) is an unreliable, connectionless protocol for

applications that do not want TCP's sequencing or flow control, and those which wish to provide their own.

It is also used for one-shot, client-server type request-supply queries and applications in which prompt

delivery is more important than accurate delivery, such as transmitting speech or video.

(iii) Application Layer:

This layer is just above the transport layer. It contains all the higher level protocols. The early ones include

virtual terminal (TELNET), file transfer (FTP) and electronic mail (SMTP).

The virtual terminal protocol allows a user on one computer to log onto a distant machine and work there.

The file transfer protocol provides a way to move data efficiently from one computer to another. Electronic

mail was originally just a kind of file transfer, but later a specialized protocol was developed for it called

SMTP. Other protocols have been added to these over the years, such as Domain Name Service (DNS) for

mapping host names onto their addresses, HTTP, the protocol used for fetching pages on the world wide web

and many others.

(iv) Host-to-Network Layer:

The TCP/IP Reference Model does not discuss much about this layer except that the host has to connect to

the network using some protocol so that it can send IP packets over it. This protocol varies from host to host

and from network to network.

  

3. Online Analytical Processing (OLAP) is a capability of management, decision support and executive information

systems that enables managers and analysts to interactively examine and manipulate large amounts of detailed and

consolidated data from various perspectives. An OLAP session takes place online in real-time, with rapid

responses to queries, so that the decision-making process is undisturbed.

Online transactional information gave BRI accurate, up-to-date picture of ongoing operations. It helped them to

continually stay on top of sales performance and make adjustments quickly whenever necessary. The delays

associated with old-style batch processing were removed.

  

4. The advantages of using an online service for a consumer to contact vendors are as follows:

(i) He/she can be free and more direct on the online services than on the telephone.

(ii) Payments can directly be made to the vendor, from the comfort of home, through the web-site with the help

of credit card or other payment mode.

(iii) In many cases, one can track the status of shipment through the web-site.

The disadvantages of using an online service for a consumer to contact vendors are as follows:

(i) The web-site may be down and the vendor cannot be contacted.

(ii) Face-to-face conversation is not possible.

(iii) The urgency of a delivery may not be communicated properly to the vendor.

  

5. This action is of course not ethical.

The actions that can be taken against the competitor and ways by which such problems can be prevented in the

future, are as follows:

(i) Sue the competitor and see to it that legal actions are taken against him/her.

(ii) Institute proper Ethical Code in the organization to prevent employees from getting wrongly influenced by

competitors.

(iii) Take strict action against employees who resort to unethical practices.

(iv) Allow only authorised users to access the Bulletin Board Service.

(v) Use proper passwords and user names for validation.

(vi) Institute suitable firewalls to prevent the Bulletin Board Service from being flooded with unwanted data.

(vii) Make an employee in-charge of the smooth functioning of the Bulletin Board Service.

  

6 The problems faced by Sherwin-Williams managers were as follows:

(i) There was little horizontal communication between individual stores or districts.

(ii) The managers used to spend a lot of time every week producing the sales reports.

(iii) As upper management was always in a hurry to see the data, there was only enough time to collect basic

sales figures.

(iv) The top management was unable to get more detailed data from individual stores.

(v) For the same reason, detailed comparisons among regions were not possible by top management.

(vi) Even, district managers were not able to compare their sales to those of the other districts.

  

7. MIS can be defined as a computer-based system that provides flexible and speedy access to accurate data for

managerial purposes.

Managers at Sherwin-Williams can use MIS to request information at their networked workstation that supports

their decision-making activities. This information takes the form of periodic, exception and demand reports and

immediate responses to enquiries. Web browsers, application programs and database management software

provide access to information in the Intranet and other operational databases of the organization. The information

reports generated by MIS can be categorized into four major reporting alternatives:

(i) Periodic Scheduled Reports:

This traditional form of providing information to managers uses a pre-specified format, designed to provide

managers with information on a regular basis. Typical examples of such periodic schedules are daily/weekly

sales analysis reports, monthly financial statements etc.

(ii) Exception Reports:

Such reports are generated only in exceptional situations. The information content may or may not be

included in periodic reports. Such reports help the managers to take immediate remedial measures and save

costs to the organization.

(iii) Demand Reports and Responses:

Here, information is available whenever a manager demands it. For example, web browser and DBMS query

languages and report generators enable managers at PC workstations to get immediate responses, or find and

obtain customized reports as a result of their requests for the information they need.

(iv) Push Reporting:

Information is pushed to a manager's workstation. Nowadays, many companies are using web casting

software to selectively broadcast reports and other information to the networked PCs of managers, over their

corporate Intranet.

However, to make effective use of MIS, managers have to start making use more of their personal computers

which are internetworked.

  

Section C: Applied Theory

8. The various functional information systems of an organization are:

(i) Marketing Information Systems

The various components are:

(a) Interactive Marketing

This is a type of marketing that is based on using the Internet, Intranets etc. to establish a two-way

interaction between a business and its customers or potential customers.

(b) Sales Force Automation:

Sales people are provided with portable computers and necessary sales contact management software,

which dramatically speeds up the capture and analysis of sales data from the field and their transmission

to marketing managers at the company headquarters.

(c) Sales/Product Management:

Computer-based systems can be used to generate sales analysis reports that analyse sales by product,

product line, customer, salesperson and sales territory.

Marketing pricing decision is another onerous task that can be handled with the help of such systems. In

general, such systems are used to evaluate the performance of current products and the prospects of

success of proposed products.

(d) Advertising and Promotions:

Marketing information systems use information from market research and models of promotion to (1)

select the appropriate media and promotional methods, (b) allocate financial resources and (c) evaluate

the results of various advertising and promotional campaigns.

(e) Market Research and Forecasting:

Information systems that support market research activities provide marketing intelligence to help

managers make better marketing forecasts and develop more effective marketing strategies. Various

statistical software tools help managers analyse market research data and forecast sales and other

important market trends.

(ii) Manufacturing Information Systems

The various components are:

(a) Computer Integrated Manufacturing (CIM):

Computers are used to help engineers design better products using both Computer Aided Engineering

and Computer Aided Design (CAD). Production processes are improved with the help of Computer

Aided Process Planning. Planning of material types required for the production process is done with the

help of Materials Requirement Planning Systems. This is further integrated with production scheduling

and shop floor operations, and such an integration is known as Manufacturing Resource Planning.

(b) Computer Aided Manufacturing (CAM):

The production process is automated by monitoring and controlling the process through Manufacturing

Execution System, or by directly controlling a physical process (process control), or a machine tool

(machine control), or machines with some human-like work capabilities (robots).

(c) Manufacturing Execution System (MES):

These are performance-monitoring systems for shop floor operations. MES includes shop floor

scheduling and control, machine control, robotics control and process control.

(d) Process Control Systems:

They are computer systems that control an ongoing physical manufacturing process. Such systems

require use of special sensing devices that measure physical phenomena such as temperature, pressure

etc.

(iii) Human Resource Information Systems:

The various components are:

(a) Staffing:

Information systems that support staffing must record and track human resources within the company

and maximize their use. For example, a personnel record-keeping system keeps track of additions,

deletions and other changes to the records in the personnel database. Another application that can

improve the efficiency of this sub-function is personnel requirement forecasting. It provides forecasts of

personnel requirements in each major job category for various company departments or for new projects

being planned by the departments.

(b) Training and Development:

Information systems allow HR managers to plan and monitor employee recruitment, training and

development programs by analyzing the success history of present programs. They also analyze the

career development status of each employee to determine whether development methods such as training

programs and periodic performance appraisals should be recommended.

(c) Compensation Analysis:

The range and distribution of employee compensation (like wages, salaries, incentive and fringe

benefits) can be analyzed with the help of information systems. This helps the company to make

comparisons of such compensations with industry standards and other economic indicators.

(iv) Accounting Information Systems:

They are based on the double entry bookkeeping concept, and also on more recent ones like responsibility

accounting, activity based costing etc. Computer-based accounting systems record and report the flow of

funds through an organization on a chronological basis and produce important financial statements such

as Balance Sheets and Income Statements. Such systems also produce forecasts of future conditions such

as projected financial statements and financial budgets.

  

9. Novell Netware Operating System is a 32-bit network operating system that runs on processors of Intel 80386 and

above. The operating system provides services to client workstations, and to client-server operating systems.

Netware provides different types of services. The core services called the Netware Core Protocol (NCP) include

file access, file locking, resource tracking and allocating, event notification and other services to workstations that

request them. Netware is an ideal platform for server applications as it is modular and expandable. Additional

core services can be installed by loading netware loadable modules (NLM). These services could be name space

support, internetworking, host connectivity, messaging services, communication services, etc.

The most significant feature of NetWare 4.1 is Netware Directory Services (NDS), which provides both users and

network administrators with a single integrated view of an entire network and the servers connected to it. NDS

supports a network of servers where users can log in once and access the resources of any server depending on

their access rights.

Users and resources such as file servers and printers are represented by NOS as objects in the NDS tree. If any

information about a network resource is required, such as current statistics, then the user has to just double-click

the object that represents the volume.

0 Comments:

 

Interview Preparation | Placement Papers